The Last Dogs
Urban Ecology
The Sound of Zero
Sensory
3D Printing and Nanofabrication: Making Anything from Anything
Technology
Acoustic Surveillance Arrays: The City Listens
Technology
Addiction in GLMZ: Chemical, Digital, and Neural
Medicine
Aerial Taxi Vertiport Network: Transit for Those Above the Street
Technology
Advanced Materials: What 2200 Is Built From
Foundations
AI Content Moderation Platforms: The Invisible Editor
Technology
AI Hiring Screening Platforms: The Resume That Reads You Back
Technology
Aerial Transit Drone Corridor Systems: The Sky as Tiered Infrastructure
Transportation
AI-Driven Resource Allocation Systems: Distributing Scarcity by Algorithm
Technology
Alaska and the 13 Tribes: The First Corponations
Geopolitics
Algorithmic Justice: The Philosophy of Automated Fairness
Philosophy
AI Sentencing Advisory Systems: The Algorithm on the Bench
Technology
AI Parole Supervision Systems: Freedom Under Algorithmic Watch
Technology
Ambient Sensor Mesh Networks: The City as Nervous System
Technology
Ambient Audio Surveillance Arrays: The City That Listens Without Prompting
Technology
Archival Media Access and Historical Record Control: Who Owns Yesterday
Media
Ambient OCR Sweep Systems: Reading the Written World
Technology
The Arcturus Rapid Response Force
Military
The Atmospheric Processors: Weather Control Over the Lakes
Technology
The Arsenal Ecosystem of 2200
Violence
Augmentation Clinics: What the Procedure Is Actually Like
Medicine
Augmentation Dysphoria: When the Hardware Changes the Self
Medicine
Atmospheric Processors: How GLMZ Breathes
Technology
Augmentation Tiers & The Unaugmented
Technology
Augmentation Liability Law: Who Pays When the Implant Fails
Law
Autonomous Threat Assessment AI: Classifying Danger Before It Acts
Technology
Automated PCB Population Lines: Electronics Assembly at the Scale of the City
Technology
Autonomous Credit Scoring Engines: The Number That Defines You
Technology
Autonomous Surface Freight Crawlers: The Logistics Layer Beneath the City
Technology
The Fleet: GLMZ's Autonomous Vehicle Network
Technology
The Brain-Computer Interface: A Complete Technical History
Technology
Autonomous Vehicle Fleet Operations: Ground-Level Mobility in the Corporate Street Grid
Transportation
Your New Brain-Computer Interface: A Guide for First-Time Users
Technology
BCI Evolution Under Corporate Control
Technology
Behemoths: The Megastructure Entities
AI
Bioluminescent Technology: Living Light
Technology
Biocomputing: When They Started Growing the Processors
Technology
Bicycle and Micro-Mobility Infrastructure: Human-Scale Transit in the Megacity
Transportation
Biometric Skin Patch Surveillance: The Body as Data Terminal
Technology
Brain-Computer Interface Trajectory (2125-2200)
Technology
Black Site Interrogation Facilities: Corporate Detention Beyond Legal Reach
Espionage
Point 6: Medical & Biotech Without Ethics
Medicine
Cargo Drone Urban Delivery Corridors: The Air Layer of the Last Mile
Technology
Cap Level Zero: The Rooftop World Above the Arcologies
Geography
The Canadian Border Zone: Where Sovereignty Gets Complicated
Geopolitics
Case File: Mama Vex
Crime
Case File: The Cartographer
Crime
Case File: The Basement Butcher
Crime
Case File: The Archivist
Crime
Case File: The Collector of Faces
Crime
Case File: The Debt Collector
Crime
Case File: The Conductor
Crime
Case File: The Deep Current Killer
Crime
Case File: The Echo
Crime
Case File: The Elevator Ghost
Crime
Case File: The Dream Surgeon
Crime
Case File: The Dollmaker
Crime
Case File: The Frequency Killer
Crime
Case File: The Geneware Wolf
Crime
Case File: The Good Neighbor
Crime
Case File: The Gardener of Sublevel 30
Crime
Case File: The Lamplighter
Crime
Case File: The Kindly Ones
Crime
Case File: The Inheritance
Crime
Case File: The Lullaby
Crime
Case File: The Memory Eater
Crime
Case File: The Last Analog
Crime
Case File: The Limb Merchant
Crime
Case File: The Neon Angel
Crime
Case File: The Mirror Man
Crime
Case File: The Pale King
Crime
Case File: The Saint of Level One
Crime
Case File: The Porcelain Saint
Crime
Case File: The Seamstress
Crime
Case File: The Red Circuit
Crime
Case File: The Silk Executive
Crime
Case File: The Splicer
Crime
Case File: The Taxidermist
Crime
Case File: The Surgeon of Neon Row
Crime
Case File: The Void Artist
Crime
Ceramic and Composite Forming Systems: Advanced Materials for Structural and Thermal Applications
Technology
Case File: Ringo CorpoNation Security Division v. Marcus "Brick" Tallow
Foundations
Case File: The Whisper Campaign
Crime
Coldwall: The Arcturus Military District
Geography
Child Rearing and Youth Development Outside Corporate Provision: Growing Up Unlisted in GLMZ
Excluded_Life
Chemical Vapor Deposition Coating Systems: Surface Engineering at the Nanoscale
Technology
Citizenship Tier Statutes: Rights by Rank
Law
Communications & Surveillance (Point 7)
Foundations
Complexity and Consciousness: The Gravitational Theory of Mind
AI
The Collapse of the Coasts: How LA, New York, and Seattle Fell
History
The Amendments That Built This World: Constitutional Changes 2050-2200
Law
Continuous Casting Polymer Extrusion Rigs: The Industrial Backbone of the Mid-Tier District
Technology
1 / 18
The Corporate Warfare Convention: Rules of Engagement
# The Corporate Warfare Convention: Rules of Engagement

## Overview

The Corporate Warfare Convention (CWC) is a multilateral agreement between the world's major corporate city-states that establishes rules governing armed conflict between corporate entities. Ratified in 2170 following the Border War of 2163, the CWC is the closest thing to international law that the corporate world recognizes — not because the signatories believe in humanitarian principles, but because unrestricted corporate warfare would destroy the global economic system that all of them depend on.

## Key Provisions

### Prohibited Weapons
The CWC prohibits: **memory weapons** (attacks on BCI memory systems), **kill switches** (remote BCI termination), **biological weapons** (engineered pathogens), **atmospheric weapons** (attacks on atmospheric processing systems), and **infrastructure weapons** (attacks on water, power, or food production systems serving civilian populations). These prohibitions exist because the weapons they ban threaten the infrastructure on which the corporate economy depends — attacking a competitor's atmospheric processors doesn't just damage the competitor; it potentially destroys a market of millions of consumers.

### Civilian Protection
The CWC requires that corporate military operations minimize civilian casualties — a provision that the signatories interpret elastically. In practice, "minimize" means "keep below the threshold that generates public outrage sufficient to affect consumer behavior." This threshold varies by city-state and by the visibility of the casualties. Casualties in the Shelf generate less corporate concern than casualties on Mirror Mile.

### Proportionality
Military responses must be proportional to the provocation. Espionage is countered with counter-intelligence, not military force. Border incursions are met with equivalent force. The destruction of corporate infrastructure is met with equivalent destruction. Escalation beyond proportionality triggers diplomatic consequences — economic sanctions, trade restrictions, and the collective disapproval of the signatory city-states.

### Prisoner Treatment
Captured combatants must be treated humanely and repatriated within 90 days of hostilities ending. This provision was inspired by the Border War of 2163, where Bellerophon personnel captured by Arcturus were held for eight months in conditions that generated significant negative publicity. The provision does not apply to corporate detention of civilians — a loophole that Nia Okafor-Bright describes as "the convention's moral black hole."

## Enforcement

The CWC is enforced by reputation and reciprocity. There is no international court, no enforcement body, no mechanism for compelling compliance. The convention holds because each signatory understands that violating its provisions would invite reciprocal violations — and in a world where every city-state has the capability to deploy memory weapons, kill switches, and infrastructure attacks, mutual restraint is self-interested rather than principled.

## Sergeant Major Tanaka's Case

The CWC's prisoner treatment provision has been cited in Tanaka's legal challenge against Arcturus — her involuntary upload occurred during a military operation and could be characterized as a violation of the convention's requirement for humane treatment of combatants. Arcturus argues that upload is not a violation because Tanaka is not a prisoner — she's an employee, albeit a dead one. The legal distinction between a consciousness uploaded against its will and a prisoner held against its will is the question that will determine whether the CWC's protections extend to the digital realm.
file namethe_corporate_warfare_convention
titleThe Corporate Warfare Convention: Rules of Engagement
categoryMilitary
line count27
headings
  • The Corporate Warfare Convention: Rules of Engagement
  • Overview
  • Key Provisions
  • Prohibited Weapons
  • Civilian Protection
  • Proportionality
  • Prisoner Treatment
  • Enforcement
  • Sergeant Major Tanaka's Case
related entities
  • Below the Threshold
  • Nia Okafor-Bright
  • Dredge Mining Collective
  • The Threshold
  • The Corridor of Mirrors
  • The Eastline
  • Provisions
  • Tessera Industries Void Grenade VG-1 'Black Hole'
  • Sterling-Nakamura Legal Override Pistol LOP-1 'Compliance'
  • Threshold
  • The Shelf
  • Arcturus Defense Solutions
  • Arden Balasanyan-Hayashi-Cardenas
  • Alejandro Owusu-Castañeda
  • Reed Espinoza
  • Mikhail Malhotra-Lewandowski-Rakhimov
  • Tessera Industries Data Spike DS-1 'Upload'
  • Frost Boudiaf

Rejoining the server...

Rejoin failed... trying again in seconds.

Failed to rejoin.
Please retry or reload the page.

The session has been paused by the server.

Failed to resume the session.
Please retry or reload the page.