Unauthorized Transmission, Part II Image Walkthrough