Tag: law
89 resultsdocument
Acoustic Surveillance Arrays: The City Listens— Technology
…tegrated but share classification models and, under certain law enforcement access protocols, data. The combined effect is near-total acoustic coverage of any spac…
document
AI Sentencing Advisory Systems: The Algorithm on the Bench— Technology
…ment have reshaped how communities in GLMZ relate to formal law. In districts where residents understand that their behavioral data continuously feeds into a risk…
document
Ambient Sensor Mesh Networks: The City as Nervous System— Technology
…ship Tier
Access to ASMN data is strictly tiered. Municipal law enforcement agencies hold a real-time query license covering public thoroughfares, though requests…
document
Autonomous Threat Assessment AI: Classifying Danger Before It Acts— Technology
…ancial monitoring systems, social graph analysis feeds, and law enforcement database integrations. SENTINEL-CORE outputs a tiered threat classification — Green, Am…
document
Cargo Drone Urban Delivery Corridors: The Air Layer of the Last Mile— Technology
…at has been accessed by corporate intelligence contractors, law enforcement agencies, and, in at least two documented cases, by adversarial actors who compromised…
document
Case File: Ringo CorpoNation Security Division v. Marcus "Brick" Tallow— Foundations
…go's internal labor protection statutes — not Michigan tort law
- The stolen CreditScript is not legal tender under U.S. law, creating a valuation dispute
Ringo's…
document
Case File: The Basement Butcher— Crime
…Z's oldest and most brutal cold cases, dating to the city's lawless early years when augmentation technology was primitive, regulation was nonexistent, and the lin…
document
Case File: The Gardener of Sublevel 30— Crime
…irst three bodies. The crew reported the discovery to Shelf law enforcement, who in turn reported it to Metropolitan. A team was dispatched. They recovered the bod…
document
Case File: The Mirror Man— Crime
…t match the victim, any known suspect, or any record in any law enforcement database. The print was unusual: its ridge patterns showed signs of recent formation, a…
document
Case File: The Seamstress— Crime
…ely on the mesh network. They became, against the wishes of law enforcement and the victims' families, iconic images — cited by augmentation advocates as "art," co…
document
Case File: The Whisper Campaign— Crime
…igned to induce suicide constitutes homicide under Meridian law. All seven were convicted. Sentences ranged from thirty years to life without parole.
The case per…
document
Corponation— Foundations
…ference — as taking precedence over applicable governmental law.
### 2. Standing Security Force
The entity maintains a permanent, organized, armed force under its…
document
Corporate Arbitration Law in the GLMZ— History
# Corporate Arbitration Law in the GLMZ
## The Problem of Jurisdiction When Everyone Is the State
The fundamental legal quest…
document
Corporate Loyalty Monitoring Platforms: Watching the Worker— Technology
…l within corponation sovereign zones under Corponation Zone Law, which permits expansive employer monitoring rights in exchange for the employee welfare obligation…
document
Covert Device Implant Surveillance: Hardware as Hidden Witness— Technology
…ntelligence contractors, corporate espionage operators, and law enforcement entities under emergency authorization provisions install hardware implants or deep-fir…
document
Death Ritual and Post-Mortem Data Rights: The Afterlife of the Digital Self— Culture
…it, has generated one of the most contentious areas of both law and cultural practice in the contemporary megacity. The Corporate Sovereignty Accords assigned post…
document
Electromagnetic Emission Fingerprinting: Devices That Cannot Hide— Technology
…s to an unregistered vehicle in the plate tracking network. Law enforcement agencies have used EmPrint data to reconstruct the physical movements of persons of int…
document
Environmental DNA Surveillance: Identity from the Air Itself— Technology
…ns of eDNA surveillance are extensive and deeply contested. Law enforcement contractors use GenAir data to establish physical presence at crime scenes, protest eve…
document
License Plate Optical Tracking Networks: Movement as Record— Technology
…cking data is among the most contested in GLMZ surveillance law. Corporate zones treat vehicle movement data as employer-accessible information when the vehicle is…
document
Narrative Fragments— Foundations
…inks.
**2060s:** Corporate security is the only functional law enforcement in most urban areas. But it only covers corpo territory. The gaps between have no polic…
document
Neural Behavioral Pattern Analysis Platforms: Predicting Intent Before Action— Technology
…No municipal ordinance explicitly authorizes their use for law enforcement purposes, nor does any explicitly prohibit it. The platforms are classified as 'decisio…
document
Neural Interface Social Etiquette: The Unwritten Rules of Connected Presence— Culture
…quette governing their use. These norms are not codified in law but are enforced through social pressure, professional consequence, and in some communities, outrig…
document
Neural Tap Surveillance: Reading the Augmented Mind— Technology
…conducted without consent, but is authorized under specific law enforcement warrants and is openly practiced by corponation security divisions within their soverei…
document
Onboarding: The Corporate Induction Experience— Corporate_Life
…letter, and offer letters are governed by Corponation Zone Law once the candidate steps inside corporate territory to sign them. The medical phase also includes m…
document
Predictive Behavioral Analytics: Arresting the Future— Technology
…large-scale machine learning to the problem of anticipatory law enforcement. In GLMZ, the primary municipal PBA platform — known as ORACLE-7 — ingests continuous d…
document
Religious and Spiritual Practice in the Megacity: Faith Under Corporate Sovereignty— Culture
…ith Legal Defense Network, a coalition of religious liberty lawyers operating out of a shared office in the Wacker Stack district, handles approximately 300 cases…
document
Retinal Scan Identity Infrastructure: The Gaze That Registers— Technology
…for a minimum of 7 years in encrypted distributed storage. Law enforcement agencies may query historical movement reconstructions — a process that assembles a sub…
document
Satellite and Aerial Imaging in Urban Surveillance: The Overhead Witness— Technology
…achment by informal settlements on designated buffer zones. Law enforcement contractors use historical image archives to reconstruct the development timeline of su…
document
Social Graph Analysis Platforms: Mapping the Human Network— Technology
…networks, internal corporate communication platforms (under law enforcement access agreements), civic event attendance records, medical facility visit logs, and th…
document
Subdermal Transit Credential Implants: The Body as Transit Pass— Technology
…stored indefinitely in MTA infrastructure and accessible to law enforcement under the city's Integrated Public Safety Data Sharing protocol without individual warr…
document
Surface Autonomous Bus Network: Mass Transit for the Middle and the Margin— Technology
…ations have documented the use of MAST surveillance data in law enforcement investigations at rates substantially higher than equivalent surveillance on premium tr…
document
Synthetic Informant Networks: AI-Driven Human Intelligence Collection— Technology
…eployed by corporate internal security divisions, municipal law enforcement contractors, and private investigation firms licensed under the GLMZ Intelligence Servi…
document
The Basement Children: What Lives Below Has Forgotten the Sun— Urban Legend
…vels — B1 through B100 and beyond, each deeper stratum more lawless, more forgotten, more alien than the last. The upper levels are charted. Maintenance crews serv…
document
The Gradient Compact— History
…not establish a government. It does not invoke God, natural law, the consent of the governed, or any of the philosophical foundations that underpinned the democrat…
document
The Uploader's Paradox: Two of Me, Both Real— Urban Legend
…continuation of the original? A copy with equal rights? The law has no answer.
---
## What Skeptics Say
Tessera Labs has stated that Acheson-Nazari's work, whil…
document
The Water Table: GLMZ's Fresh Water Infrastructure— Infrastructure
…tation, tributary rivers) and outflow (evaporation, the St. Lawrence Seaway, human extraction) — has been negative since 2178, meaning the lakes are being drawn do…
document
Underground Pneumatic Parcel Networks: Physical Data Pipes Beneath the Streets— Technology
…be executed purely through digital channels. Several major law firms in the corporate core maintain dedicated MUL terminal installations and use pneumatic deliver…
news
37th Amendment Passes Committee — Corponations Now Liable for Civilian Deaths— politics
The Federal Remnant's legislative council ratified the 37th Amendment to the Meridian Charter today by a vote of 31 to 19, establishing for the first time th…