The Last Dogs
Urban Ecology
The Sound of Zero
Sensory
3D Printing and Nanofabrication: Making Anything from Anything
Technology
Acoustic Surveillance Arrays: The City Listens
Technology
Addiction in GLMZ: Chemical, Digital, and Neural
Medicine
Aerial Taxi Vertiport Network: Transit for Those Above the Street
Technology
Advanced Materials: What 2200 Is Built From
Foundations
AI Content Moderation Platforms: The Invisible Editor
Technology
AI Hiring Screening Platforms: The Resume That Reads You Back
Technology
Aerial Transit Drone Corridor Systems: The Sky as Tiered Infrastructure
Transportation
AI-Driven Resource Allocation Systems: Distributing Scarcity by Algorithm
Technology
Alaska and the 13 Tribes: The First Corponations
Geopolitics
Algorithmic Justice: The Philosophy of Automated Fairness
Philosophy
AI Sentencing Advisory Systems: The Algorithm on the Bench
Technology
AI Parole Supervision Systems: Freedom Under Algorithmic Watch
Technology
Ambient Sensor Mesh Networks: The City as Nervous System
Technology
Ambient Audio Surveillance Arrays: The City That Listens Without Prompting
Technology
Archival Media Access and Historical Record Control: Who Owns Yesterday
Media
Ambient OCR Sweep Systems: Reading the Written World
Technology
The Arcturus Rapid Response Force
Military
The Atmospheric Processors: Weather Control Over the Lakes
Technology
The Arsenal Ecosystem of 2200
Violence
Augmentation Clinics: What the Procedure Is Actually Like
Medicine
Augmentation Dysphoria: When the Hardware Changes the Self
Medicine
Atmospheric Processors: How GLMZ Breathes
Technology
Augmentation Tiers & The Unaugmented
Technology
Augmentation Liability Law: Who Pays When the Implant Fails
Law
Autonomous Threat Assessment AI: Classifying Danger Before It Acts
Technology
Automated PCB Population Lines: Electronics Assembly at the Scale of the City
Technology
Autonomous Credit Scoring Engines: The Number That Defines You
Technology
Autonomous Surface Freight Crawlers: The Logistics Layer Beneath the City
Technology
The Fleet: GLMZ's Autonomous Vehicle Network
Technology
The Brain-Computer Interface: A Complete Technical History
Technology
Autonomous Vehicle Fleet Operations: Ground-Level Mobility in the Corporate Street Grid
Transportation
Your New Brain-Computer Interface: A Guide for First-Time Users
Technology
BCI Evolution Under Corporate Control
Technology
Behemoths: The Megastructure Entities
AI
Bioluminescent Technology: Living Light
Technology
Biocomputing: When They Started Growing the Processors
Technology
Bicycle and Micro-Mobility Infrastructure: Human-Scale Transit in the Megacity
Transportation
Biometric Skin Patch Surveillance: The Body as Data Terminal
Technology
Brain-Computer Interface Trajectory (2125-2200)
Technology
Black Site Interrogation Facilities: Corporate Detention Beyond Legal Reach
Espionage
Point 6: Medical & Biotech Without Ethics
Medicine
Cargo Drone Urban Delivery Corridors: The Air Layer of the Last Mile
Technology
Cap Level Zero: The Rooftop World Above the Arcologies
Geography
The Canadian Border Zone: Where Sovereignty Gets Complicated
Geopolitics
Case File: Mama Vex
Crime
Case File: The Cartographer
Crime
Case File: The Basement Butcher
Crime
Case File: The Archivist
Crime
Case File: The Collector of Faces
Crime
Case File: The Debt Collector
Crime
Case File: The Conductor
Crime
Case File: The Deep Current Killer
Crime
Case File: The Echo
Crime
Case File: The Elevator Ghost
Crime
Case File: The Dream Surgeon
Crime
Case File: The Dollmaker
Crime
Case File: The Frequency Killer
Crime
Case File: The Geneware Wolf
Crime
Case File: The Good Neighbor
Crime
Case File: The Gardener of Sublevel 30
Crime
Case File: The Lamplighter
Crime
Case File: The Kindly Ones
Crime
Case File: The Inheritance
Crime
Case File: The Lullaby
Crime
Case File: The Memory Eater
Crime
Case File: The Last Analog
Crime
Case File: The Limb Merchant
Crime
Case File: The Neon Angel
Crime
Case File: The Mirror Man
Crime
Case File: The Pale King
Crime
Case File: The Saint of Level One
Crime
Case File: The Porcelain Saint
Crime
Case File: The Seamstress
Crime
Case File: The Red Circuit
Crime
Case File: The Silk Executive
Crime
Case File: The Splicer
Crime
Case File: The Taxidermist
Crime
Case File: The Surgeon of Neon Row
Crime
Case File: The Void Artist
Crime
Ceramic and Composite Forming Systems: Advanced Materials for Structural and Thermal Applications
Technology
Case File: Ringo CorpoNation Security Division v. Marcus "Brick" Tallow
Foundations
Case File: The Whisper Campaign
Crime
Coldwall: The Arcturus Military District
Geography
Child Rearing and Youth Development Outside Corporate Provision: Growing Up Unlisted in GLMZ
Excluded_Life
Chemical Vapor Deposition Coating Systems: Surface Engineering at the Nanoscale
Technology
Citizenship Tier Statutes: Rights by Rank
Law
Communications & Surveillance (Point 7)
Foundations
Complexity and Consciousness: The Gravitational Theory of Mind
AI
The Collapse of the Coasts: How LA, New York, and Seattle Fell
History
The Amendments That Built This World: Constitutional Changes 2050-2200
Law
Continuous Casting Polymer Extrusion Rigs: The Industrial Backbone of the Mid-Tier District
Technology
1 / 17
The QFIC officially maintains that Quanta chips cannot be counterfeited because the quantum states they contain are generated at certified fabrication facilities using proprietary hardware that cannot be replicated. This position is technically correct and practically irrelevant. Counterfeit Quanta chips are a Φ4.2 billion annual market, and the sophistication of the forgeries has exceeded our projections by approximately a decade.
The first generation of counterfeit chips, appearing around 2185, were crude: standard silicon wafers programmed with classical digital signatures that mimicked the output of genuine quantum state registers. These forgeries worked in offline-only environments where the receiving party had no means of performing quantum state verification. A vendor in the deep Shelf with no network access and a basic chip reader would accept a first-gen counterfeit because the reader reported a valid denomination. As soon as the vendor attempted to sync the chip with the EDN, the forgery was detected and the chip was flagged. First-gen counterfeits were disposable: useful for a single transaction in a low-tech environment, then worthless. The QFIC's enforcement division dismantled most first-gen operations within two years.
Second-generation counterfeits, appearing around 2190, are a fundamentally different threat. These chips contain actual quantum state registers — miniaturized, lower-fidelity versions of the registers in genuine QFIC chips — that produce quantum verification signatures indistinguishable from authentic chips for approximately 72 hours after generation. The quantum states in second-gen counterfeits are unstable: they decohere faster than genuine states, and after three days the verification signature degrades to the point where EDN sync would detect the forgery. But 72 hours is enough. A counterfeit chip can change hands multiple times in 72 hours. By the time the last holder attempts to sync and the forgery is detected, the original counterfeiter is long gone, the intermediary holders are victims rather than perpetrators, and the Quanta has been converted to goods and services that cannot be returned.
The third generation — the one that keeps QFIC enforcement awake — appeared in 2196, and we do not fully understand how they work. Third-gen counterfeits contain quantum state registers that are, as far as our analysis can determine, identical to genuine QFIC registers. They produce stable quantum states. They pass EDN sync verification. They carry valid entanglement signatures that the network accepts as authentic. We have identified third-gen counterfeits only retrospectively, when audits revealed that a chip's entangled partner state in the EDN escrow did not exist — the chip had verified against an escrow state that was either fabricated within the EDN itself or was spoofed at a level that our detection capabilities cannot distinguish from genuine entanglement. Either someone has replicated QFIC's fabrication technology, or someone has compromised the EDN verification infrastructure, or both. The implications of each scenario are catastrophic. If the fabrication technology has leaked, the entire physical Quanta supply is compromised. If the EDN has been penetrated, the networked Quanta supply is also at risk. We are currently investigating 14 active cases involving third-gen counterfeits totaling approximately Φ340 million in face value. We have not disclosed this to the public. The confidence in the Quanta system rests on the belief that it cannot be counterfeited. That belief is currently more important than the truth.
The first generation of counterfeit chips, appearing around 2185, were crude: standard silicon wafers programmed with classical digital signatures that mimicked the output of genuine quantum state registers. These forgeries worked in offline-only environments where the receiving party had no means of performing quantum state verification. A vendor in the deep Shelf with no network access and a basic chip reader would accept a first-gen counterfeit because the reader reported a valid denomination. As soon as the vendor attempted to sync the chip with the EDN, the forgery was detected and the chip was flagged. First-gen counterfeits were disposable: useful for a single transaction in a low-tech environment, then worthless. The QFIC's enforcement division dismantled most first-gen operations within two years.
Second-generation counterfeits, appearing around 2190, are a fundamentally different threat. These chips contain actual quantum state registers — miniaturized, lower-fidelity versions of the registers in genuine QFIC chips — that produce quantum verification signatures indistinguishable from authentic chips for approximately 72 hours after generation. The quantum states in second-gen counterfeits are unstable: they decohere faster than genuine states, and after three days the verification signature degrades to the point where EDN sync would detect the forgery. But 72 hours is enough. A counterfeit chip can change hands multiple times in 72 hours. By the time the last holder attempts to sync and the forgery is detected, the original counterfeiter is long gone, the intermediary holders are victims rather than perpetrators, and the Quanta has been converted to goods and services that cannot be returned.
The third generation — the one that keeps QFIC enforcement awake — appeared in 2196, and we do not fully understand how they work. Third-gen counterfeits contain quantum state registers that are, as far as our analysis can determine, identical to genuine QFIC registers. They produce stable quantum states. They pass EDN sync verification. They carry valid entanglement signatures that the network accepts as authentic. We have identified third-gen counterfeits only retrospectively, when audits revealed that a chip's entangled partner state in the EDN escrow did not exist — the chip had verified against an escrow state that was either fabricated within the EDN itself or was spoofed at a level that our detection capabilities cannot distinguish from genuine entanglement. Either someone has replicated QFIC's fabrication technology, or someone has compromised the EDN verification infrastructure, or both. The implications of each scenario are catastrophic. If the fabrication technology has leaked, the entire physical Quanta supply is compromised. If the EDN has been penetrated, the networked Quanta supply is also at risk. We are currently investigating 14 active cases involving third-gen counterfeits totaling approximately Φ340 million in face value. We have not disclosed this to the public. The confidence in the Quanta system rests on the belief that it cannot be counterfeited. That belief is currently more important than the truth.
| line count | 0 |
| name | Counterfeit Quanta Chips: The Forgery Underground |
| document type | crime_report |
| author | QFIC Enforcement Division — Case Summary Report |
| date | 2197-02-10 |
| classification | classified |
| related entities |
|
| credibility | verified |
| story hooks |
|