Email Chain
- In this document, the username of someone's university account is revealed.
National Park Beanie
- Pay attention to the writing on the tag inside the beanie.
- The writing on the tag relates to information found in the email chain.
Postcard
- The graph drawn on the left can also be seen as a compass.
- The graph is used to plot the letters of the alphabet, which will be a key to solve the coded message.
- The diagram on the top-right of the postcard indicates letter substitution.
Safety Protocols
- The coded message on this document relates back to the hiking medallion in Episode 2.
- The code has two symbols: a small rabbit track and a large rabbit track. These two symbols represent a common method of communication.
- The small rabbit track represents a dot, and the large rabbit track represents a dash.
Signal Mirror
- This item interacts with a coded message in one of the documents.
- Placing the signal mirror somewhere on the postcard will reveal an element of the code.
- When the signal mirror is lined up with the brackets drawn on the postcard, the letter "N" can be seen through the hole in the middle.
University Portal
- Someone's university account, other than Ami's, can be accessed.
- One of the documents found on this new account has coded messages that can be solved using what you learn in this episode.
WiFi Usage Log
- This document, combined with information from previous episodes, will help eliminate a suspect.
Email Chain
- This document provides Nigel Ricci's university account username: NRicci.
National Park Beanie
- The tag provides the password "teatime2492".
Postcard
- Plotting the alphabet on the graph begins with "A" on the line that represents north, starting at the bottom of the line. From there, the letters can be plotted clockwise extending outward. For example, the graph ends with "E" plotted on the north line. From there, "F" is plotted on the east line, "G" on the south line, etc. This will provide your key to solve the coded message.
- When all the letters have been plotted, they can be substituted. Starting with the north line and reading the letters from outward to inward, the letters are: Y, U, Q, M, I, E, A. These are the encoded letters for A, B, C, D, E, F, G. For example, in the coded message on the postcard, Y = A.
- Next, work clockwise to the east line and read from outward to inward: Z, V, R, N, J, F, B. These are the encoded letters for H, I, J, K, L, M, N. Continue this pattern for the south and west lines. This should give you the substitution alphabet to solve the coded message.
- The message reads: "AN OLD METHOD".
Safety Protocols
- The message is written in Morse code.
- The message says: "IGNORE 1 I TRUST YOU".
- Using this method also reveals what was etched on the back of the hiking medallion: the letter "R".
Signal Mirror
- The letter "N" signifies "North". The line representing north on the postcard graph is the starting point to plot the alphabet.
University Portal
- Nigel Ricci's account can be accessed using his username and password.
- Stored on Nigel's account, the document titled Code Notes has coded messages that can be solved with the same method as the postcard.
- The coded messages read: "NOT ENOUGH PROOF" / "IS THIS WRONG" / "THE GHOST LYNX HAS TO BE REAL".
Solution
- Nigel Ricci can be eliminated from the suspect list.
- In Episode 2, it was established that Toby must have been killed some time between 9:00 PM and 10:15 PM. Based on the trail cam photos, the killer was using Tall Pines Trail as a route back to camp from Echo Cavern, and they were on this route from at least 10:15 PM to 10:45 PM. According to the field interviews, everyone was in camp at 11 PM.
- The wifi usage log provides a record of whose laptop was accessing the camp's wifi network at what time on the day Toby died. Nigel's laptop was being used from 20:23 (8:23 PM) to 22:52 (10:52 PM). If he was the one using his own laptop, this would mean he could not be the killer, because the killer was not in camp during this timeframe.
- On the wifi usage log, it appears that Toby's laptop was in use from 22:47 (10:47 PM) to 22:59 (10:59 PM). However, we know that Toby died before this time far outside of camp. This means that someone else was accessing Toby's laptop on the night he was killed.
- There are two things that need to be proven: the wifi's range, and if Nigel's laptop was really being used by him. On Toby's notebook page, Toby remarks that the wifi does not work if he steps one foot outside of camp. Therefore, we can conclude that the wifi is limited only to the camp area and could not be accessed anywhere else in the region. This would mean that anyone using their laptops and wifi would be restricted to camp.
- During this time, Nigel was accessing his own laptop, which can be proven by going back to the weekly report from Episode 2. There is a footer at the bottom of the report that shows the date and time it was saved and the ID of the laptop it was saved on. The ID on the report matches that of Nigel's laptop ID, as listed on the wifi usage log. We can assume that Nigel is the only one who could have written this report during this time. The tone of his writing matches that of his field interview.
- With this information, and the lack of an apparent motive, Nigel Ricci can be eliminated as a suspect.