Colossus Computer Vacuum Tubes

Origin
The first electronic computer designed was meant to break Tunny, the encryption used by German military command during WWII. Colossus peered into the binary messages and understood the random characters were really the combinations of two separate encrypted letters. Each pairing always produced the same value, which Colossus backtracked into simpler data and allowed hand operators to decode the original message.

Ten working models analyzed hundreds of messages a week – much faster than previous models. D-Day succeeded from info decoded by the Colossi. All records were destroyed or classified until the mid-70s, when room-sized computers became prevalent.

Effects
Will reveal the original message hidden within any format – digital, electronic, paper or even live presentations. When near non-electronic sources, the bulbs release a dimmer glow and blink more rapidly. A sheet will be printed out detailing in one column what is being directly projected to the user. Another column will explain any hidden information and how it was located. No indications are made to as why the concealments were made, only how.

All information is sourced from the inner rankings of target organizations rather than individual crackpots. Correspondence is often between the elite members about deciding strategy and covering situations.

Scoured data will only be useful if kept secret. Information leaked to many people appears suspicious and falsified. Keeping it to only a few relevant people allows the user to act upon their newfound secrets for whatever purpose arises.