362856-Sample.Pdf
Total Page:16
File Type:pdf, Size:1020Kb
Sample file Sample file @ctiv8 2.0 Dedication Anonymous, Appelbaum, Assange, Berners-Lee, Butler, Carpenter, Chaos Computer Club, Corley, Cult of the Dead Cow, Cummings, Drake, Eckard, Fellwock, Felt, Flowers, GoatSec, Gun, Harris, Holliday, Honker Union, Kamkar, Kelly, Klein, Kleinrock, Knox, LulzSec, Manning, Meili, Mitnick, Nacchio, Patterson, RedHack, Shayler, Snowden, Tamm, Tice, Torvalds, Turing, Weber, Wright, Zimmermann and Johannes Gutenberg, one of the first men to set information free. Credits Internal Artwork: Daniel Schenstrom, Gennifer Bone Written by: James ‘Grim’ Desborough Edited by: TR Knight This work is based on Fate Core System and Fate Ac- celerated Edition (found at http://www.faterpg.com/), products of Evil Hat Productions, LLC, developed, au- thored, and edited by Leonard Balsera, Brian Engard, Jeremy Keller, Ryan Macklin, Mike Olson, Clark Valen- tine, Amanda Valentine, Fred Hicks, and Rob Donoghue, and licensed for our use under the Creative Commons Attribution 3.0 Unported license (http://creativecom- mons.org/licenses/by/3.0/). Publisher: Angus Abranson Creative Director: James ‘Grim’ Desborough Printed and distributed, under license, by Chronicle City Sampleof 58 Woodville Road, New Barnet, Herts, fileEN5 5NG, UK. For further information about other Chronicle City games please check out our website and forums at: http://www.chroniclecity.com Sample file Introduction Big data gathered from social networks is exposing even de- InIntroduction the ten years or so since the centralised dissident groups and original @ctiv8 was published once-anonymous trolls are being things have changed a great tracked down and prosecuted. deal. A number of whistle-blow- ers have emerged, revealing the Drones fly in the sky, some for extent of surveillance and profil- surveillance and others for war. ing that citizens of even liberal western nations are under. Satellites gaze down amongst them the seemingly benign GPS Computer activities are moni- systems which can identify your tored via Carnivore, ECHELON location for people other than and Van Eck Phreaking. yourself, often with much more accuracy in the case of military Automated monitoring tran- or law enforcement groups. scribes phone conversations and looks for code and trigger words Combine all of that with biomet- – agencies are even trying to ric identification which can iden- create a sarcasm filter to avoid tify you by your face, even your fake hits. gait, the increasingly nebulous definitions of terrorism and the Closed Circuit Television is eve- black prison sites that exist and rywhere, people wire up their it’s a scary world we live in. home with webcams and virtual- ly every one of the United King- What is, perhaps, even scarier dom’s 76 million mobile phones is the emergence of both cor- has a camera and can be tapped porate surveillance and mutual into by government agencies. surveillance. Data, always at a Almost every new computer, premium, especially for target- console, laptop or tablet comes ing advertising is traded with with microphones and cameras and without permission from the and almost all private business user. A company goes bust and have monitoring. their data – on you – is part of their assets. People will volun- teer this data for convenience, Samplefor bonuses in gamesfile without understanding how much it tells you about them. 1.