The Last Dogs
Urban Ecology
The Sound of Zero
Sensory
3D Printing and Nanofabrication: Making Anything from Anything
Technology
Acoustic Surveillance Arrays: The City Listens
Technology
Addiction in GLMZ: Chemical, Digital, and Neural
Medicine
Aerial Taxi Vertiport Network: Transit for Those Above the Street
Technology
Advanced Materials: What 2200 Is Built From
Foundations
AI Content Moderation Platforms: The Invisible Editor
Technology
AI Hiring Screening Platforms: The Resume That Reads You Back
Technology
Aerial Transit Drone Corridor Systems: The Sky as Tiered Infrastructure
Transportation
AI-Driven Resource Allocation Systems: Distributing Scarcity by Algorithm
Technology
Alaska and the 13 Tribes: The First Corponations
Geopolitics
Algorithmic Justice: The Philosophy of Automated Fairness
Philosophy
AI Sentencing Advisory Systems: The Algorithm on the Bench
Technology
AI Parole Supervision Systems: Freedom Under Algorithmic Watch
Technology
Ambient Sensor Mesh Networks: The City as Nervous System
Technology
Ambient Audio Surveillance Arrays: The City That Listens Without Prompting
Technology
Archival Media Access and Historical Record Control: Who Owns Yesterday
Media
Ambient OCR Sweep Systems: Reading the Written World
Technology
The Arcturus Rapid Response Force
Military
The Atmospheric Processors: Weather Control Over the Lakes
Technology
The Arsenal Ecosystem of 2200
Violence
Augmentation Clinics: What the Procedure Is Actually Like
Medicine
Augmentation Dysphoria: When the Hardware Changes the Self
Medicine
Atmospheric Processors: How GLMZ Breathes
Technology
Augmentation Tiers & The Unaugmented
Technology
Augmentation Liability Law: Who Pays When the Implant Fails
Law
Autonomous Threat Assessment AI: Classifying Danger Before It Acts
Technology
Automated PCB Population Lines: Electronics Assembly at the Scale of the City
Technology
Autonomous Credit Scoring Engines: The Number That Defines You
Technology
Autonomous Surface Freight Crawlers: The Logistics Layer Beneath the City
Technology
The Fleet: GLMZ's Autonomous Vehicle Network
Technology
The Brain-Computer Interface: A Complete Technical History
Technology
Autonomous Vehicle Fleet Operations: Ground-Level Mobility in the Corporate Street Grid
Transportation
Your New Brain-Computer Interface: A Guide for First-Time Users
Technology
BCI Evolution Under Corporate Control
Technology
Behemoths: The Megastructure Entities
AI
Bioluminescent Technology: Living Light
Technology
Biocomputing: When They Started Growing the Processors
Technology
Bicycle and Micro-Mobility Infrastructure: Human-Scale Transit in the Megacity
Transportation
Biometric Skin Patch Surveillance: The Body as Data Terminal
Technology
Brain-Computer Interface Trajectory (2125-2200)
Technology
Black Site Interrogation Facilities: Corporate Detention Beyond Legal Reach
Espionage
Point 6: Medical & Biotech Without Ethics
Medicine
Cargo Drone Urban Delivery Corridors: The Air Layer of the Last Mile
Technology
Cap Level Zero: The Rooftop World Above the Arcologies
Geography
The Canadian Border Zone: Where Sovereignty Gets Complicated
Geopolitics
Case File: Mama Vex
Crime
Case File: The Cartographer
Crime
Case File: The Basement Butcher
Crime
Case File: The Archivist
Crime
Case File: The Collector of Faces
Crime
Case File: The Debt Collector
Crime
Case File: The Conductor
Crime
Case File: The Deep Current Killer
Crime
Case File: The Echo
Crime
Case File: The Elevator Ghost
Crime
Case File: The Dream Surgeon
Crime
Case File: The Dollmaker
Crime
Case File: The Frequency Killer
Crime
Case File: The Geneware Wolf
Crime
Case File: The Good Neighbor
Crime
Case File: The Gardener of Sublevel 30
Crime
Case File: The Lamplighter
Crime
Case File: The Kindly Ones
Crime
Case File: The Inheritance
Crime
Case File: The Lullaby
Crime
Case File: The Memory Eater
Crime
Case File: The Last Analog
Crime
Case File: The Limb Merchant
Crime
Case File: The Neon Angel
Crime
Case File: The Mirror Man
Crime
Case File: The Pale King
Crime
Case File: The Saint of Level One
Crime
Case File: The Porcelain Saint
Crime
Case File: The Seamstress
Crime
Case File: The Red Circuit
Crime
Case File: The Silk Executive
Crime
Case File: The Splicer
Crime
Case File: The Taxidermist
Crime
Case File: The Surgeon of Neon Row
Crime
Case File: The Void Artist
Crime
Ceramic and Composite Forming Systems: Advanced Materials for Structural and Thermal Applications
Technology
Case File: Ringo CorpoNation Security Division v. Marcus "Brick" Tallow
Foundations
Case File: The Whisper Campaign
Crime
Coldwall: The Arcturus Military District
Geography
Child Rearing and Youth Development Outside Corporate Provision: Growing Up Unlisted in GLMZ
Excluded_Life
Chemical Vapor Deposition Coating Systems: Surface Engineering at the Nanoscale
Technology
Citizenship Tier Statutes: Rights by Rank
Law
Communications & Surveillance (Point 7)
Foundations
Complexity and Consciousness: The Gravitational Theory of Mind
AI
The Collapse of the Coasts: How LA, New York, and Seattle Fell
History
The Amendments That Built This World: Constitutional Changes 2050-2200
Law
Continuous Casting Polymer Extrusion Rigs: The Industrial Backbone of the Mid-Tier District
Technology
1 / 17
Between 2172 and 2179, the twelve member corponations of the QFIC fought a series of economic conflicts — conducted through market manipulation, infrastructure sabotage, regulatory warfare, and proxy violence — over control of the Quanta validation network. These conflicts, collectively known as the Quanta Wars, determined the power structure that governs the global currency to this day. Understanding the Wars is essential to understanding why Sterling-Nakamura chairs the QFIC, why Axiom controls security, why certain corponations have disproportionate influence over monetary policy, and why the validation network is structured to resist the dominance of any single entity while simultaneously guaranteeing the dominance of the collective.
The First Quanta War (2172-2174) was fought between Sterling-Nakamura and the Meridian Consortium — a loose alliance of five mid-tier corponations that sought to challenge Sterling-Nakamura's architectural control of the EDN. The Consortium's grievance was legitimate: Sterling-Nakamura had designed the Quanta protocol, built the initial EDN infrastructure, and retained proprietary control of the node selection algorithm that determined which nodes verified which transactions. This gave Sterling-Nakamura effective control of the money supply — not in theory but in practice, because the entity that decides which nodes verify transactions decides which transactions are verified. The Consortium demanded open-source publication of the selection algorithm and distributed governance of the EDN. Sterling-Nakamura refused.
The war was fought economically. The Consortium began building parallel verification infrastructure — unlicensed EDN nodes running reverse-engineered verification protocols — in an attempt to create a competing validation network that would force Sterling-Nakamura to negotiate. Sterling-Nakamura responded by flagging transactions verified by Consortium nodes as "unconfirmed," effectively making any Quanta touched by the competing network suspect. Vendors began refusing Quanta that had been verified through Consortium infrastructure. The Consortium's member companies found their own financial operations degraded by the stigma attached to their network. Within 18 months, two Consortium members had defected back to Sterling-Nakamura's standard EDN, and the remaining three capitulated in exchange for increased node allocation quotas and a seat on the newly created Protocol Oversight Committee — a body that advises on protocol changes but has no binding authority.
The Second Quanta War (2176-2179) was larger, more violent, and more consequential. It pitted Axiom — which had grown from a security contractor to a full-spectrum military-economic power — against Sterling-Nakamura's control of the QFIC chairmanship. Axiom's argument was simple: the entity that secures the network should govern the network. Sterling-Nakamura's counter-argument was equally simple: the entity that designed the network should govern the network. The conflict escalated from regulatory maneuvering to proxy warfare when Axiom-contracted security teams began physically seizing EDN nodes in disputed territories — regions where corponation sovereignty boundaries were unclear or contested. Sterling-Nakamura retaliated by restricting Axiom's access to the Quantum Compute Exchange, effectively throttling the AI systems that Axiom relied on for security operations. For three years, the two most powerful corponations on Earth fought over who controlled the infrastructure of money, while the rest of the world watched their currency fluctuate with each tactical move.
The war ended with the Treaty of Singapore (2179), which established the current QFIC power structure: Sterling-Nakamura retains permanent chairmanship and protocol authority; Axiom controls network security and physical infrastructure protection; the remaining ten members share governance of monetary policy through weighted voting proportional to their node contributions. The Treaty is, in essence, a peace agreement between two superpowers, with the other ten members serving as a stabilizing bloc that prevents either dominant power from achieving total control. The structure has held for eighteen years. But treaties are agreements between rational actors, and the assumption of rationality is itself a vulnerability. The Quanta Wars ended because both sides calculated that peace was more profitable than war. If that calculation changes — if one side concludes that the cost of war is less than the cost of the status quo — the infrastructure of global money becomes a battlefield again. The nodes that verify your morning coffee purchase are also the strategic assets that two corponations once fought a war to control. The peace is real. The peace is also provisional.
The First Quanta War (2172-2174) was fought between Sterling-Nakamura and the Meridian Consortium — a loose alliance of five mid-tier corponations that sought to challenge Sterling-Nakamura's architectural control of the EDN. The Consortium's grievance was legitimate: Sterling-Nakamura had designed the Quanta protocol, built the initial EDN infrastructure, and retained proprietary control of the node selection algorithm that determined which nodes verified which transactions. This gave Sterling-Nakamura effective control of the money supply — not in theory but in practice, because the entity that decides which nodes verify transactions decides which transactions are verified. The Consortium demanded open-source publication of the selection algorithm and distributed governance of the EDN. Sterling-Nakamura refused.
The war was fought economically. The Consortium began building parallel verification infrastructure — unlicensed EDN nodes running reverse-engineered verification protocols — in an attempt to create a competing validation network that would force Sterling-Nakamura to negotiate. Sterling-Nakamura responded by flagging transactions verified by Consortium nodes as "unconfirmed," effectively making any Quanta touched by the competing network suspect. Vendors began refusing Quanta that had been verified through Consortium infrastructure. The Consortium's member companies found their own financial operations degraded by the stigma attached to their network. Within 18 months, two Consortium members had defected back to Sterling-Nakamura's standard EDN, and the remaining three capitulated in exchange for increased node allocation quotas and a seat on the newly created Protocol Oversight Committee — a body that advises on protocol changes but has no binding authority.
The Second Quanta War (2176-2179) was larger, more violent, and more consequential. It pitted Axiom — which had grown from a security contractor to a full-spectrum military-economic power — against Sterling-Nakamura's control of the QFIC chairmanship. Axiom's argument was simple: the entity that secures the network should govern the network. Sterling-Nakamura's counter-argument was equally simple: the entity that designed the network should govern the network. The conflict escalated from regulatory maneuvering to proxy warfare when Axiom-contracted security teams began physically seizing EDN nodes in disputed territories — regions where corponation sovereignty boundaries were unclear or contested. Sterling-Nakamura retaliated by restricting Axiom's access to the Quantum Compute Exchange, effectively throttling the AI systems that Axiom relied on for security operations. For three years, the two most powerful corponations on Earth fought over who controlled the infrastructure of money, while the rest of the world watched their currency fluctuate with each tactical move.
The war ended with the Treaty of Singapore (2179), which established the current QFIC power structure: Sterling-Nakamura retains permanent chairmanship and protocol authority; Axiom controls network security and physical infrastructure protection; the remaining ten members share governance of monetary policy through weighted voting proportional to their node contributions. The Treaty is, in essence, a peace agreement between two superpowers, with the other ten members serving as a stabilizing bloc that prevents either dominant power from achieving total control. The structure has held for eighteen years. But treaties are agreements between rational actors, and the assumption of rationality is itself a vulnerability. The Quanta Wars ended because both sides calculated that peace was more profitable than war. If that calculation changes — if one side concludes that the cost of war is less than the cost of the status quo — the infrastructure of global money becomes a battlefield again. The nodes that verify your morning coffee purchase are also the strategic assets that two corponations once fought a war to control. The peace is real. The peace is also provisional.
| line count | 0 |
| name | The Quanta Wars: Corporate Battle for the Validation Network |
| document type | historical |
| author | Dr. Lin Xiaoming-Okafor, Strategic Studies, Zurich Enclave |
| date | 2196-02-28 |
| classification | public |
| related entities |
|
| credibility | verified |
| story hooks |
|