I REPEAT, CHAD PELICAN I AM! • WPA • CPERM
A dedicated Cperm video page on the repeated WPA boy-professor signature carried into
WarGames and Back to the Future:
the young target, the older guiding alter ego, and the recurring Ralph McNally pattern.
Watch Page • Cperm 🔁 WPA Boy-Professor Signature • Ralph McNally • WarGames / Back to the Future
I Repeat, Chad Pelican I Am! is framed here as a page about recurrence: not one isolated echo, but the repeated return of the same core dramatic structure from the original WPA system. Cperm’s position is that the early online crime-fantasy exchanges already contained a two-part signature: the young user target and the older guiding professor-pirate figure. That structure, the page argues, did not disappear. It was repackaged and sent back through major films that preserved the relationship while changing the costume.
The older figure in this reading is Ralph McNally, described here as the SysOp’s alter ego: an old man pirate, the richest man in the world, a figure imagined as surviving from the 16th century because he had access to the Fountain of Youth. The point is not merely the fantasy content, but the performance. Cperm’s account is that the SysOp could adapt his voice to sound astonishingly older, creating a convincing elder presence while speaking to the young target. That vocal transformation matters because it turns the boy-professor pairing into something lived and theatrical long before it appeared in studio form.
The target on the other side of that exchange is identified here as Garet, approximately 10 years old, while the SysOp was approximately 11. In Cperm’s framing, that age relationship sharpens the significance of what followed. The pattern later seen in WarGames and Back to the Future is not treated as a broad genre overlap. It is treated as a specific repetition of the same dramatic engine: youth, secret access, guided initiation, and an older intellectual or pseudo-historical authority figure steering the meaning of events.
On that reading, WarGames preserves one side of the signature through the boy-and-professor logic built around a hidden system, privileged access, and a youth being drawn into an elite technological drama. Back to the Future preserves the structure again through an eccentric older guide attached to buried knowledge, strange continuity across time, and a younger counterpart positioned to receive the revelation. Cperm’s accusation is that both works repeat the same core WPA architecture while disguising the original human source.
The phrase in the title — I repeat, Chad Pelican I am! — is used here as a declaration of method. The point is that the archive keeps repeating itself. The same signatures reappear. The same relational design reappears. The same hidden-source problem reappears. Cperm’s argument is that once the original WPA fantasy framework is placed on the table, these later productions stop reading like independent inventions and start reading like industrial reiterations of an earlier authored pattern.
This page therefore presents the WPA boy-professor signature as one of the strongest repeating units in the entire Cperm record. The accusation is not just that themes migrated. It is that a precise dramatic pairing — the young target and the older guide, staged through secrecy, access, and fantasy power — was lifted, repeated, and redistributed through mass culture. In that framing, the repetition is itself the evidence. The structure keeps returning because the source was never acknowledged, only repainted.
The combination COOPER1704TKS is presented as a complete key, resolving earlier compressed forms into a readable name. In prior fragments, the surname appears distributed rather than stated: CPE operates as a consonant spine, while the displaced OR can be heard in WOPR, a machine label that phonetically echoes “Cooper” and can be read as an extended form of WPA, carrying the original system forward into a militarized context. Read together—CPE + OR (via WOPR/WPA)—the name reassembles across system identifiers instead of appearing through overt attribution.
The missing second “O” is not random but reflects a constrained reuse of a single “O” already embedded in Scot/Scott, echoed within the launch string CPE1704TKS, leaving the surname intentionally incomplete until fully encoded. The numeric sequence 1704 aligns with a geographic marker (1–702), and the suffix TKS adds an alphanumeric layer where T = 20 and K = 11; within this reading, K (11) points to “7–11.”
The closing digits also echo the “711” sequence found in the last four digits of the sysop home number 702-458-7116, reinforcing the convenience-store motif used as the location of the FBI busting Lightman outside of a 7-11. Taken together, the string functions as a compact, reconstructable signature—name, origin system, location, and narrative cues distributed across code rather than stated directly.
The missing second “O” is not random but reflects a constrained reuse of a single “O” already embedded in Scot/Scott, echoed within the launch string CPE1704TKS, leaving the surname intentionally incomplete until fully encoded. The numeric sequence 1704 aligns with a geographic marker (1–702), and the suffix TKS adds an alphanumeric layer where T = 20 and K = 11; within this reading, K (11) points to “7–11.”
The closing digits also echo the “711” sequence found in the last four digits of the sysop home number 702-458-7116, reinforcing the convenience-store motif used as the location of the FBI busting Lightman outside of a 7-11. Taken together, the string functions as a compact, reconstructable signature—name, origin system, location, and narrative cues distributed across code rather than stated directly.