Conduct a high-stakes espionage operation at the peak of the Cold War. Intercept and decipher encrypted communications to uncover a hidden threat. Break codes, manipulate targets through social engineering, connect the dots, and escape before it’s too late.