FLF Sogem
by: MaryB
maryb@frontlineforce.com

Recon has indicated that
a few computers located 
in the southwest sector
of a recently bombarded 
section of town may hold
valuable data. Analyzing 
their information may yield
significant intel.

Attackers:  Capture
the code key located at the
enemy's camp and use it to 
gain access to the systems.

Defenders: Guard the key
and do not let the attackers
extract any data from the 
computers.

