Rjackson

RJackson is the user account of Ryan Jackson in the Central Intelligence Agency Data system which is accessible from the computer terminal in the interrogation room depicted in the main menu of Call of Duty: Black Ops.

Password
The account uses a non-secure password, SAINTBRIDGET.

Mail
Typing the command MAIL opens Smith' mail account. It then shows a list of messages exactly as follows:


 * {| border="1" cellpadding="0" cellspacing="0" style="text-align: center; " width="95%"

! scope="col" width="10"|ID ! scope="col" width="30%"|From ! scope="col" width="35%"|Date ! scope="col" width="25%"|Subject ! scope="row"|0 ! scope="row"|1 ! scope="row"|2 ! scope="row"|3 ! scope="row"|4 ! scope="row"|5 ! scope="row"|6 ! scope="row"|7 ! scope="row"|8
 * Richard Kain
 * Wednesday, October 23, 1963
 * RE: Op Status - Mason
 * Richard Kain
 * Sunday, June 5, 1966
 * Victor Reznov
 * Richard Kain
 * Wednesday, February 10, 1968
 * MKU
 * Grigori Weaver
 * Tuesday, November 22, 1977
 * Kristina Raskova
 * Richard Kain
 * Thursday, November 22, 1977
 * Grigori Weaver
 * Richard Kain
 * Friday, May 12, 1978
 * Congratulations
 * Richard Kain
 * Monday, September 25, 1978
 * C
 * Richard Kain
 * Tuesday, October 3, 1978
 * Op C
 * Richard Kain
 * Monday, October 30, 1978
 * Field Status
 * }

RE: Op Status - Mason
@undefined

Victor Reznov
@undefined

MKU
@undefined

Kristina Raskova
@undefined

Grigori Weaver
@undefined

Congratulations
@undefined

C</tt>
@undefined

Op-C</tt>
@undefined

Field Status</tt>
@undefined

Files
Typing the command DIR</tt> opens Jackson's home directory /home/rjackson/</tt>, which contains 6 files. Each file is viewable by typing the command CAT</tt> followed by a filename.

BioKristina.txt</tt>
April 13, 1978

NAME: RASKOVA, KRISTINA

PLACE OF BIRTH: Lviv, Ukraine

NATIONALITY: Jewish-Ukranian / Caucasian

D.O.B: 11/10/1955

AGE: 23

HEIGHT: 5' 8"

BUILD: Athletic

WEIGHT: 120lbs

EYES: Blue

HAIR: Blonde

SUMMARY PROFILE:

A former KGB "swallow," 5 years ago the Agency flipped the candidate after a crisis of conscience during the attempted sexual blackmail of a key east East Berlin Agency asset (TAB A). She would not commit to defection or betrayal, but she agreed to memorize contact information for her handler and would consider further contact at her discretion. Code-named "The Wall," the candidate was filed away and went dark until 6 months ago.

In the intermittent time, the candidate transferred from the KGB to the GRU (Soviet military intelligence) where she quickly ascended the ranks thanks to her steely resolve, competitive drive, and infectious personality. No longer a "honey-pot" used to seduce Agency operatives, the candidate became a key aide within the Soviet Defense Council, associating herself with one COLONEL ANTON VANYA (TAB B), former protege to the late Nikita Dragovich. Their relationship turned sexual but abusive and soon turned repugnant to the candidate.

Six months ago, the candidate attempted to end the relationship after discovering she was with child; but Vanya responded with a beating normally reserved for enemy P.O.W.s. The candidate miscarried as a result and within 24 hours she sent a burst transmission over shortwave frequency to her original handler out of East Berlin and agreed to work as a double agent. On orders from Colornel Banya, her current GRU assignment is to locate, seduce and detain Alex Mason, making her more than an ideal fir for Operation Charybdis.

Hypnotism.txt
***TOP SECRET***</tt>

***LEVEL 2 EYES ONLY***</tt>

HYPNOTISM AND COVERT OPERATIONS </tt> 

I. HYPNOTISM </tt> 

A. What is it? </tt>

B. Who can be Hypnotized? </tt>

C. The Induction of Hypnosis </tt>

1. Pre-Testing for Suggestibility </tt>

<tt>2. Induction Procedures </tt>

<tt>a. Verbal Suggestion </tt>

<tt>b. Fascination Plus Verbal Suggestion </tt>

<tt>c. Nacro-Hypnosis </tt>

<tt>D. Other Factors </tt>

<tt>1. What Makes a Good Subject? </tt>

<tt>2. What Characterizes a Good Operator? </tt>

<tt>3. Stages of Hypnosis </tt>

<tt>4. "Laws of Hypnosis" </tt>

<tt>5. Can a Subject Be Hypnotized Against His Will? </tt>

<tt>II. APPLICATION OF HYPNOSIS TO COVERT OPERATIONS </tt>

<tt>A. Disguised Pre-Testing </tt>

<tt>B. Disguised Induction </tt>

<tt>C. Specific Operational Situations </tt>

<tt>III. RESEARCH </tt>

<tt>IV. SUMMARY OF CONCLUSIONS </tt>

<tt>V. RECOMMENDATIONS</tt>