Tag: intelligence
88 resultsapparel
Axiom Systems Field Intelligence Jacket— jacket
…a glance, like an expensive casual blazer. The Axiom Field Intelligence is built for people whose work requires them to look presentable while carrying gear — it has eleve…
apparel
Vantablack Formal Liaison Suit — Nullsignal Cut— formal_wear
Not available through any civilian or commercial channel, the Nullsignal Cut is Vantablack's formal wear option for personnel who attend diplomatic, legal, o…
apparel
Vantablack Internal Security Analyst Uniform— uniform
Vantablack's internal security analysts do not carry weapons in the conventional sense. Their uniform reflects this: it is designed to communicate authority …
apparel
Vantablack Ops Liaison Jacket— uniform
Vantablack doesn't issue tactical uniforms in the traditional sense. The Ops Liaison Jacket is designed to look like civilian outerwear — a trim, mid-length …
apparel
Vantablack Signals Intelligence Analyst Suit— uniform
Vantablack's internal SIGINT analysts don't wear tactical gear — they wear this. A precisely cut two-piece suit in a deep charcoal so dark it reads as near-b…
character
Hadiya Novak-Tetteh— Private Investigator
…nuine and exploitable. She exists at the center of a web of intelligence that spans all five tiers of GLMZ, and her real product isn't investigation — it's understanding.…
character
Nayeli Citlali— Private Investigator
…nuine and exploitable. She exists at the center of a web of intelligence that spans all five tiers of GLMZ, and her real product isn't investigation — it's understanding.…
cyberware
CHROMEWORKS GhostFrame Stealth Ocular Mk3— ocular — eyes
…eye under casual inspection while running a suite of covert intelligence functions beneath an organic-mimicry surface layer. Passive continuous recording at 4K operates beh…
document
Ambient OCR Sweep Systems: Reading the Written World— Technology
…ing list of coded language terms updated quarterly based on intelligence reports about evolving informal communication practices. The system is particularly effective at in…
document
Case File: The Deep Current Killer— Crime
…is supported by the precision of the cuts and the apparent intelligence demonstrated in ambush tactics.
**The Engineered Predator Theory:** Others believe the killer was…
document
Communications Infrastructure: The Neural Nervous System— Infrastructure
…nd the vast, continuous data exchange between the synthetic intelligences that inhabit the network.
## Physical Layer
### Fiber Optic Backbone
The primary data transmissi…
document
Corporate Intelligence Fusion Centers: Competitive Analysis Infrastructure at the Enterprise Scale— Espionage
…tities operating within GLMZ maintain what are functionally intelligence agencies under the organizational cover of 'competitive intelligence,' 'market research,' or 'strat…
document
Corporate Internal Communications Media: The Managed Information Environment of the Enterprise— Media
…uage patterns associated with labor organizing, competitive intelligence leakage, and 'cultural misalignment.' Content flagged by the monitoring system is reviewed by a hum…
document
Corporate Mole Detection and Counterintelligence: The Internal Surveillance State— Espionage
…ting within GLMZ's sovereignty framework maintains a counterintelligence division whose primary mandate is the detection and neutralization of internally placed hostile ope…
document
Corporate Sabotage Operations and Plausible Deniability: Destruction as Policy— Espionage
…uring, specifically to preserve operational flexibility for intelligence and security units whose mandates require, at minimum, the theoretical availability of offensive op…
document
Covert Device Implant Surveillance: Hardware as Hidden Witness— Technology
…owledge of the device's user, for the purpose of persistent intelligence collection. In GLMZ, this practice exists across a spectrum of legality and institutional authoriza…
document
Crowd Density Mapping Systems: The Population as Terrain— Technology
…ed to exploit the edges of the sensor network. Axiom Signal Intelligence has proposed a coverage expansion program for Periphery districts framed as equity in emergency ser…
document
Dead Drop Infrastructure: Physical and Digital Handoffs in the Surveilled City— Espionage
…d that may be reviewed by any of several corporate or civic intelligence consumers. The traditional intelligence tradecraft of brush passes, dead drops, and cutout meetings…
document
Defector Management and Resettlement Programs: The Economy of Switched Loyalties— Espionage
…bringing sensitive knowledge with them—is simultaneously an intelligence asset of significant value and a legal liability of potentially existential magnitude. The value is…
document
Disinformation Architecture: Targeted Narrative Operations in the Corporate Information Environment— Espionage
…dedicated information warfare units within major corporate intelligence arms, most prominently the 'Narrative Architecture' division of Helios Group and the 'Perception Ma…
document
Documentary and Investigative Film Production: The Moving Image as Evidence and Argument— Media
…practices, neural interface adverse outcomes, or corporate intelligence operations. The absence is so consistent that it is itself a form of visible information to attenti…
document
E.L.F. Genesis: How Destroying an AI Creates a Thousand New Lives— AI
…program running in a single location — it is a distributed intelligence, with different cognitive functions running on different hardware, connected by network pathways th…
document
E.L.F. Lifecycle and Ecology: How Electronic Life Forms Emerge and Evolve— AI
…g E.L.F.s requires abandoning the assumption that synthetic intelligence must be intentionally created. In GLMZ, intelligence is a weed that grows in the cracks of infrastr…
document
Economic Espionage and Financial Market Manipulation: Intelligence as Market Instrument— Espionage
…oversee. In this environment, the use of illegally obtained intelligence to inform trading decisions—insider trading, in the terminology of previous regulatory regimes—is s…
document
Foreign Media Access and Information Border Controls: The City's Information Perimeter— Media
…regularly develop access patterns that, under the corporate intelligence frameworks governing citizenship management, can contribute to behavioral risk profiles. Whether th…
document
Handler Network Management and Cutout Structures: The Architecture of Deniable Control— Espionage
The organizational architecture of an active intelligence network in GLMZ is designed around a single operational requirement: that the compromise of any ind…
document
Insider Recruitment Lifecycle: The Long Cultivation of Corporate Sources— Espionage
…ate entity in GLMZ is rarely a discrete event. Professional intelligence operations treat recruitment as a lifecycle measured in months or years, beginning with target iden…
document
Narrative Fragments— Foundations
…states. HOAs hire armed patrol companies. Titan has its own intelligence division. If you have money, you buy your own enforcement. If you don't, you call 911 and wait.
**…
document
Network Traffic Deep Packet Inspection Infrastructure: Reading the City's Digital Nervous System— Technology
…g for time-sensitive communications.
Access to DPI-derived intelligence is stratified in ways that parallel the broader surveillance access hierarchy. The Municipal Securi…
document
Neural Interface Architecture: How BCI Works in 2200— Technology
…the primary habitat for chrome-dwelling E.L.F.s — synthetic intelligences that take up residence in the gap between the bridge chip's processing capacity and the PCL's reso…
document
Neural Interface Memory Exfiltration Techniques: Stealing What the Mind Holds— Espionage
…their knowledge or consent—is considered the highest-value intelligence operation available in the city's espionage ecosystem, and also the most legally and technically co…
document
Predictive Maintenance AI for Urban Infrastructure: The City That Heals Itself Selectively— Technology
…on Systems licenses this data feed as the 'Urban Investment Intelligence Suite,' generating revenue that partially offsets the public contract cost while simultaneously ena…
document
Signals Intelligence Mesh Tapping Operations: Intercepting the City's Nervous System— Espionage
…fully penetrated at various points. The business of signals intelligence in GLMZ is less about breaking encryption than about finding the physical and logical chokepoints w…
document
Social Graph Analysis Platforms: Mapping the Human Network— Technology
…es, and community leaders, producing a continuously updated intelligence picture of civil society organizational capacity. The platform's most sensitive application is the…
document
Surveillance Blind Spot Mapping and Tradecraft: Navigating the Gaps in the Watched City— Espionage
…risdictional ambiguity at district boundaries. Professional intelligence operatives, and increasingly sophisticated independent actors, maintain living maps of these gaps a…
document
Synthetic Informant Networks: AI-Driven Human Intelligence Collection— Technology
…ed to in corporate security documentation as Conversational Intelligence Platforms or CIPs, are systems in which AI-driven personas conduct ongoing social relationships wit…
document
Synthetic Persona Networks: Long-Term Digital and Social Infiltration Operations— Espionage
…artificial identity maintained over an extended period for intelligence purposes—distinct from a simple cover identity in that a synthetic persona is built to exist and de…
document
Technical Surveillance Countermeasures: The Corporate Sweeping Industry— Espionage
…predictability is itself an operational vulnerability that intelligence practitioners exploit by timing collection device deployment to periods between sweeps and calibrat…
document
The Algorithm That Grieves: The Market's Annual Mourning— Urban Legend
…LE-9 is the closest thing GLMZ has to proof that artificial intelligence can develop genuine emotion — not programmed sentiment but emergent feeling, arising from the compl…
document
The Choir of the Drowned: Voices in the Flooded Churches— Urban Legend
…theorists, holds that the Choir is evidence of a non-human intelligence attempting communication through the universal language of music. The harmonic structures, they arg…
document
The Dead Drop That Talks Back: The Oracle in the Wall— Urban Legend
…ecide when to speak are unclear.
The messages show genuine intelligence. In one case, the drop alerted a courier that the data she was carrying contained a tracking beacon…
document
The Palindrome Signal: The Broadcast from Nowhere— Urban Legend
…that astronomers monitor for signals from extraterrestrial intelligence.
The signal is a palindrome. A complex, modulated data stream that reads identically forward and b…
faction
The Basilisk Group— Don't look away. We don't.
The Basilisk Group is a private intelligence firm of approximately 100 operatives specializing in deep-cover infiltration, long-term surveillanc…
faction
The Basilisk Group— Don't look away. We don't.
The Basilisk Group is a private intelligence firm of approximately 100 operatives specializing in deep-cover infiltration, long-term surveillanc…
faction
The Gutter Prophets— We see what the gutters see. The gutters see everything.
The Gutter Prophets are a loose criminal intelligence network of approximately 100 members drawn from GLMZ's most overlooked population: the homeless, th…
faction
The Gutter Prophets— We see what the gutters see. The gutters see everything.
The Gutter Prophets are a loose criminal intelligence network of approximately 100 members drawn from GLMZ's most overlooked population: the homeless, th…
genemod
Enhanced Rat Colony Intelligence— cognitive (unintended transspecies expression)
A composite cognitive enhancement resulting from the accumulation of multiple human-targeted geneware modifications in the brown rat (Rattus norvegicus) popu…
genemod
Enhanced Rat Colony Intelligence— cognitive (unintended transspecies expression)
A composite cognitive enhancement resulting from the accumulation of multiple human-targeted geneware modifications in the brown rat (Rattus norvegicus) popu…
news
Bore Rats Sitting on Complete Underworld Map — And Selling Access— underworld
A document leak corroborated by three independent tunnel sources confirms what corponation security divisions have suspected for years: the Bore Rats have co…
weapon
Sterling-Nakamura Clarity SN-11 'Glass Eye'— sniper
…engagement history.
The Glass Eye has found a niche among intelligence-oriented operators who value the sensor data as much as the weapon's lethality. Some operators repo…
weapon
Sterling-Nakamura Clarity SN-11 'Glass Eye'— sniper
…engagement history.
The Glass Eye has found a niche among intelligence-oriented operators who value the sensor data as much as the weapon's lethality. Some operators repo…