Document Code: DAP/SEC/CLR-01 (Amendment GRY-A) Distribution: Internal Only — Clearance 4+ to view addendum

Quick reference — Clearance levels (condensed) Level 0 — Public: sanitized press only. Level 1 — Restricted: basic manuals; no case access. Level 2 — Confidential: case summaries, limited personnel rosters. Level 3 — Controlled: field agents, incident logs, passive surveillance. Level 4 — Restricted-High: full Entity Registry access, select Research docs, live feeds. Level 5 — Directive Access: Directorate — full authority and redaction controls. Note: All access is logged. Attempted bypass triggers automated flags and review. Unauthorized exposure is prosecutable under DAP Code ███.

General engagement rules (retain)

No direct communication with anomalies without written Directive approval. No physical contact with Recovered Artifacts unless CP-7 clearance and certified containment team present. Report memetic symptoms immediately. Self-reporting is mitigated; concealment is a Class-A offense. Psychological screening required post-exposure; quarantine if markers persist.

Entity Addendum — GRY-45: Subject of Portraitual Stasis (Clearance 4+)

Operational Weaknesses (Summary) Artifact dependence: GRY-45’s anomalous stasis appears to be mediated by a linked visual medium (Artifact GRY-45-A). Interruption of the artifact-host tether destabilizes the anomaly. Operational implication: Secure control of the artifact directly affects subject integrity; artifact custody is primary containment vector. Media contagion vector: High-fidelity reproductions (analog or digital) act as secondary conduits. Redundancy in visual media increases propagation rate. Operational implication: Rapid identification and quarantine of reproductions reduces spread. Memetic resonance sensitivity: Subject shows increased susceptibility to counter-memetic interventions (visual noise / low-frequency visual perturbation) under controlled conditions. Operational implication: Non-destructive dampening fields can reduce social contagion temporarily.

Training addendum — field brief (for Clearance 3+ personnel) If you see the subject live, do not attempt direct verbal engagement. Record from a distance, maintain memetic shielding, and report via secure channel. Limit photographic reproduction. If image capture is necessary, store in air-gapped container and notify Research Liaison immediately. Under no circumstances should frontline agents destroy the artifact material without Directorate authorization

Closing directive All operational changes require documentation on form DAP-OP-MOD-GRY. Any requested deviation from these protocols must be routed via AGT-031 and receive Directorate review. Unauthorized deviation will be recorded and prosecuted.

Low risk (preferred / mitigation-first) Media Dampening Protocol — suppress and degrade public visual channels to interrupt contagion vectors. Signal Quietus — active takedown and throttling of live feeds; deploy counter-noise overlays. Vector Containment — quarantine and archive reproductions, isolate distribution nodes. Remote Visual Suppression — apply non-destructive visual noise overlays to online content. Moderate risk (containment / retrieval) Artifact Securement Operation — covert retrieval and transfer of artifact to air-gapped vault under CP-7. Custody Retrieval Protocol — two-team escorted extraction with memetic shielding and hash verification. Proxy Sequestration — substitute decoy artifacts and staged transfer to distract anomaly during pickup. Moderate–High risk (active intervention) Counter-Memetic Assault — controlled delivery of counter-scripts/visuals in a clinical environment to disrupt influence. Cognitive Interdiction — targeted psychological operations to interrupt subject’s social leverage (remote only). Structural Dampening Field — deploy localized perceptual interference around hotspots to mute anomaly effects. High risk (last-resort, destructive) Kinetic Neutralization — forced physical destruction of artifact (lethal to host; high collateral risk). Authorial Severance — controlled artifact termination under CP-9 (destabilizing; Directorate authorization required). Paratextual Reset — extreme purge protocol intended to remove narrative anchoring (unknown side-effects).

Classification: GRY-45 — Subject of Portraitual Stasis (Threat Class III / Psychological-Parasitic)
Access: Full Entity Registry + Research Division logs (GRY-45-A/*). Restricted live ops: Clearance 5 approval required.

Disruption vulnerability (high risk): Direct destruction of the artifact produces catastrophic feedback to the host (rapid physical degradation/aging). This is a lethal outcome for the host and may produce unpredictable collateral effects (see Breach Note). Operational implication: Artifact destruction is an escalation with high collateral risk — use only under Directive order. Portions of methodology and field test metrics redacted — [ACCESS DENIED]. Recommended Containment & Mitigation Procedures Primary objective: Secure and isolate Artifact GRY-45-A in an air-gapped, magnetically shielded vault under CP-7 protocols. Limit physical interactions. Artifact custody protocol: Transport only via sealed Faraday and memetic dampening containers. Two-person certified team (AGT-409 lead + secondary) required. Access to vault by biometric + dual token; maintain two independent archival hashes. Regularly compare hashes for drift (threshold ≥ 0.03% = immediate review). Media control: Immediate takedown and archival of live streams and high-fidelity reproductions flagged with GRY-45 signature. Quarantine all media under Research GRY-45-A/2 directives. Dampening field deployment: Controlled visual overlay (non-destructive noise layer) can be applied to public-facing streams by Research Liaison only; algorithmic degradation must be tested in isolated sandboxes prior to deployment. Psychological support & quarantine: Any personnel with exposure to the artifact or prolonged close proximity must be quarantined and undergo memetic screening (Protocol MS-4). Isolate high-empathy individuals early. Containment escalation: If artifact shows signs of self-reconstitution or relocation, enact site lockdown, notify Directorate, and implement Protocol CP-9 (air-gapped neutralization study) only with Clearance 5 sign-off. Engagement Doctrine Remote media suppression + dampening (low risk — preferred): suppress distribution vectors, apply research-grade visual noise overlay to live content; track contagion diffusion. Artifact securement (physical retrieval) (moderate risk): retrieve and isolate the portrait under CP-7; requires containment specialist team and memetic buffers. May trigger immediate artifact response. Targeted memetic intervention (moderate/high risk): controlled exposure to counter-memetic scripts performed in clinical conditions — may reduce influence but risk side effects to subjects and population. Personnel must consent per Protocol OR-3 with Directorate waiver. Artifact destruction / forced neutralization (high risk — last resort): destroying GRY-45-A will likely terminate subject corporeally but produces catastrophic feedback (rapid aging, possible paratextual ripple). Only enacted with Clearance 5 and Directorate concurrence. Important: “Stopping him” is not synonymous with “neutralizing the threat to population.” Artifact destruction has historically produced paradoxical reboot events; prioritize public safety and containment of media vectors before kinetic options. Breach & Emergency Procedures (CP-7 / CP-9) Immediate: Seal origin site, activate memetic filters, cut public channels, initiate media takedown requests. Containment squad: Deploy AGT-409 + behavioral ops observer AGT-522 in memetic shielding. Use remote drones to observe; no direct visual exposure unless memetic shielding confirmed. Post-breach: Enact forensic archive snapshot (air-gapped), perform checksum comparison, quarantine exposed civilians, and escalate to Directorate. Origin Note — How the Artifact was Created (summary) Artifact GRY-45-A was created by a civilian artist (Subject-02). The object appears to have been produced under conditions later described as intense obsession and repeated overpainting. Conservator reports indicate the inclusion of unconventional binding mediums and a layered varnish sequence; chemical analysis partially redacted. Operational conclusion: Artifact creation appears to require both an artisanic act and an emotionally charged interpersonal dynamic (the composer/subject relationship). The precise mechanism is unresolved. Redaction: Specific compositional formulas and experimental steps removed from this document — [DATA EXPUNGED]. See Research Log GRY-45-A/1 for classified appendices (Clearance 5).