Chapter Text
“Patterns reveal intentions before words or actions ever do.”
– MAIC Analyst Intro
Compiled by: Multi-Agency Intelligence Coalition (MAIC) – Behavioral Analysis Unit
Subject: Mark Griffin (Silent Death)
Access Level: Ultra-Confidential
Section A – Engagement Patterns
Observation Summary:
-
Mark operates as a freelance assassin, interacting with multiple organizations (Port Mafia, Guild, ADA, independents).
-
Engagements typically follow a three-stage operational model:
-
Target Assessment
-
Comprehensive data collection: behavior, habits, routines, environment.
-
Subtle reconnaissance using shadows (ability-assisted surveillance).
-
Agent observation notes: highly meticulous, often overlapping reconnaissance methods.
-
-
Operational Planning
-
Strategy formulated to minimize exposure and maximize efficiency.
-
Contract or agreement reviewed and adjusted according to personal and client risk.
-
Analyst note: prefers controlled risk environments; rarely improvises beyond pre-assessed contingencies.
-
-
Execution & Extraction
-
Lethal engagement occurs with minimal exposure; often no physical evidence left.
-
Use of Ability (“Silent Death”) allows stealth and surprise attacks, even in heavily monitored areas.
-
Extraction and disengagement follow predetermined routes. Analyst note: extremely low traceability.
-
Section B – Communication Patterns
-
Prefers minimal contact; uses encrypted portals, cryptic verification phrases, and self-erasing digital footprints.
-
Interpersonal interaction shows:
-
Clipped, precise speech
-
Slightly clinical tone, but capable of minimal humanization
-
High sensitivity to potential operational compromise
-
Notable Observations:
-
Meetings with clients show high operational paranoia, but subtle enough to appear as normal caution to outsiders.
-
Adaptable in negotiation: can agree to meet in person under strict security conditions.
-
Consistent environmental scanning, body language micro-adjustments, and contingency verification.
Section C – Behavioral Analysis
Risk Assessment:
-
Hyper-vigilant: even in low-threat situations, evaluates multiple contingencies simultaneously.
-
Protective of personal anonymity: all interactions are controlled, encrypted, and monitored.
-
Strong pattern of preemptive threat mitigation, including:
-
Checking clients for devices or surveillance
-
Voice modification
-
Redundant environmental sweeps
-
Psychological Profile:
-
Clinical, precise, methodical
-
Values control and predictability
-
Slightly humanized in client-facing situations: subtle reassurance or patient repetition of instructions
-
Capable of adaptive flexibility when convinced of minimal risk
Section D – Engagement Metrics
| Metric | Observation |
|---|---|
| Average pre-engagement reconnaissance | 3–7 days depending on target complexity |
| Meeting duration | 30–90 minutes, highly dependent on client experience |
| Environmental scans per hour | 12–20 noted by analysts during direct observation |
| Use of Ability in operational environments | Consistently maximized for stealth; shadow forms act as surveillance and enforcement |
| Deviations from standard protocol | Rare; only occurs if risk assessment allows, typically under extreme client pressure |
Section E – Historical Comparison
-
Early freelance years: less structured but highly opportunistic; evidence from Shadow Ledger shows adaptive learning curve.
-
Current operations: highly formalized, repeatable procedures, extremely difficult for other operatives to predict.
-
Agent/Client reports indicate Mark successfully masks paranoia, creating perception of professional calm while maintaining maximum personal security.
Section F – Analyst Notes
-
Mark’s operational patterns suggest a combination of clinical intelligence, situational paranoia, and methodical efficiency.
-
Pattern analysis indicates:
-
Predictable in methodology, but unpredictable in timing and location of engagement
-
Maintains strict separation of operational and personal life
-
Uses his Ability both tactically and for indirect intelligence gathering
-
“Mark Griffin is one of the few operatives whose observable patterns, while methodical, are almost impossible to exploit. Hyper-vigilance disguised as professionalism, redundant verification, and precise execution combine to create a near-untraceable agent.”
– MAIC Behavioral Analysis Summary
