1378747829436.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

1378747829436.Pdf hollowpoint. bad people killing bad people for bad reasons. B. Murray C.W. Marshall VSCA Publishing Vancouver, BC, Canada Toronto, ON, Canada VSCA Publishing authorizes any owner of this digital book to print and bind the document for their own use. This includes the right to print and bind the book in whole or in part for personal use or for the use of the other players at your table. So if you’re a clerk at some place where someone might want to do this, and have a policy about printing material in copyright, please be advised that the owners of the copyright do not consider you making three or four copies at any one time an infringement. VSCA Publishing does not grant rights to redistribute the file to other people or make copies for resale; that would be wrong. Hollowpoint is the property of the authors and VSCA Publishing. Copyright ©2011 by VSCA Publishing All rights reserved. Digital release ISBN 978-0-9811710-7-4 Revision 1.1 VSCA Publishing http://www.vsca.ca Contents 1. Introduction • 7 1.1. The Game • 8 1.2. The Setting • 11 1.3. Examples from fiction • 13 1.4. Thanks • 14 1.5. Reference material • 15 2. Agency • 17 2.1. The Charge • 18 2.2. The Enemy • 19 2.3. The Era • 20 3. Characters • 21 3.1. Step one: Rank • 21 3.2. Step two: Skills • 22 3.3. Step three: Name • 24 3.4. Step four: Traits • 25 3.4.1. Traits by Q and A • 27 3.4.2. Traits On the Fly • 28 3.4.3. Company Traits • 28 3.5. Step five: Complications • 30 3.6. Experience • 32 4. Conflict • 35 4.1. Dice Pools • 37 4.2. The Fight • 40 4.2.1. Skill • 41 4.2.2. Teamwork • 42 4.2.3. Fan Mail • 43 4.2.4. Go to the dice • 43 4.2.5. Effects • 46 4.2.6. Moving on • 47 4.2.7. Wash • 48 4.2.8. Special Abilities • 48 4.3. The Catch • 49 4.4. Skill Checks • 50 4.5. Narration • 50 4.6. Ending a Conflict • 52 4.7. Tactics • 54 4.8. Sample Conflict • 55 4.9. Conflict, with a Catch • 59 5. Mission • 65 5.1. Objectives • 65 5.2. Exploding into action • 67 5.3. Mission Building • 68 5.4. Sample Adventures • 71 5.4.1. Arena • 71 5.4.2. Magnificent • 74 5.4.3. Callisto • 77 5.5. Pacing • 81 Appendix: Stories • 83 A.1. Enzo’s Ambition • 83 A.2. Behold A New Creation • 90 Field Guide • 95 Personal Weapons • 96 Grenades • 97 Shotguns • 98 Cons • 100 The Fight • 101 Knives • 102 Pistols • 103 Ammunition • 104 The Sub-machinegun • 106 First Aid • 107 Index • 109 The windshield of your Cadillac explodes and Joel hits the gas. It’s exactly the wrong thing to do, but you trust Joel because he has that special kind of aggression that makes everything work out even when it’s a bad, bad idea. This is no exception. The heavy sedan fishtails as the right rear bursts and the tick tick tick of small caliber ammunition flicking through the dash, your seat, and your suit is just another countdown to zero. As the car stops, Joel ducks down with expert timing and you bring your custom .40 Smith & Wessons to bear throughOne the driver’s side window at your assailants—half a dozen punks with foreign sub- machineguns taking cover behind the dumpsters. Those dumpsters will come in handy in a bit. You grin. Joel laughs. It gets loud. 1. Introduction Hollowpoint is a role-playing game about hyper-competent, unpleasant, violent people doing what they do best. They work in a team, even if that isn’t their natural inclination. The game at once tries to capture the essence of modern-day competence mythology and bind these super-individuals into a functioning unit. This is the essential strain: these are people who like to be the best, and working together is stressful. Cooperation makes them less effective as individuals. Each knows his or her plan is the right one. Disclaimer: This is a game that deals with torture, execution, terrorism, and other illegal and immoral activities. It is a form of make believe that some people will find offensive or unpleasant. But it’s just a game: it’s safe and no one gets hurt as long as everything stays at the table. Do not do these things in real life, please. Play games instead. 1.1. THE GAME So, this is an RPG, a role-playing game. If you aren’t already comfortable with terms like “NPC”, “ref” (or “referee”) and “GM”, the player/character distinction, and what we mean by dice or an abbreviation like 4d6, then this text may seem a bit arcane. The target audience for Hollowpoint is a group of established role-players who are interested in exploring a new system, that focuses on violence and storytelling. We will, however, pause for a moment on one concept that might be new, and that’s the table. When we talk about the table, we mean everyone sitting down where the game is taking place, regardless of their experience, regardless of who’s the ref, regardless of whose place it is. We’re giving authority to the group that trumps that of the ref or of any individual player. The table is the final arbiter of what goes on, and it is assumed that the table wants to have fun. You’ve come together to enjoy yourselves. Maybe you’ve just had a pizza, or you have snacks and drinks. The gaming experience is collaborative storytelling, and everyone is there for a good time. Hollowpoint needs at least three people at the table to play: one to ref, and two players. It can handle five or six without needing any further modifications. Hollowpoint uses a dice pool system, so everyone will want to have a whole mess of six-sided dice. We like to color-code them so each player has his own, but that’s not needed. You’ll also want a bowl of some kind in the middle of the table to keep the teamwork dice. Players might roll anywhere from three dice to as many as ten. The ref needs twice that. The math isn’t transparent, and the system doesn’t always reward a more-is-better approach. Players offer narration: they relate what their character is doing, how they are doing it and what is happening. The world and everybody that the players encounter are run by 8 the ref, who also provides narration. Everyone at the table is working together to tell a story, but this isn’t a story just about some characters: they come and go, and players will make replacements on the fly. The story ends up being about a group of bad people doing bad things, and the reasons they do them. Life and death are only parts of that. The story offered by the players is at times constrained by the game mechanics, and particularly by dice rolls—once dice hit the table, players have to explain what the dice mean, seeing a story emerge from the numbers, and using this to create more story. Each session begins with a mission. The players narrate their characters addressing objectives, completing the mission and dealing with any fallout. And this is a rough world. Players shouldn’t become too attached to their characters. You should feel free to provide glorious over-the-top deaths for your character if the dice roll demands it. These are fictional characters, and they only have as much life as the players give them. Embrace that: an awesome few hours of ultraviolent role-play from invested players working together to tell an unforgettable story is better than making your way through the next few 30’x30’ rooms in a dungeon somewhere. Hollowpoint makes a great pick-up game and can be played in a single session. An hour’s prep for the ref is all that’s required in advance. Just write the mission, make characters, and go. Each session is a series of scenes which may or may not have a conflict. If dice are rolled, that’s a conflict and players can lose and characters can die. It may be that the mission has several stages, and that each stage gets resolved in a conflict scene. It may be that the mission is resolved in the first conflict, and everything else is fallout. The emphasis is on teamwork, on group dynamics and not on guy-versus-guy action. There’s a bank robbery scene in Michael Mann’s movie Heat (1995): the crew has robbed a bank and in the course of exiting they are bounced by the police. The crew has automatic weapons, great training, and willingness to cause harm and hurt others, but they are also professionals: their objective is to escape with the money. 9 Now in most guy-versus-guy gaming, this would be a really And so, Hollowpoint isn’t about a series of guy-versus-guy hard scene to model, because the system will focus on which incidents. It’s about effective use of ammunition, mobility, cop your character is trying to kill each time-slice. The player aggression, planning, knowledge of the space, sustaining fire is focused on the wrong thing with distinctly uncomfortable (rapid reload!), and effective fire (shooting at the target—a effects: notoriously hard thing for non-sociopaths to do).
Recommended publications
  • Stages of Postmortem Decomposition
    METHODS FOR ESTIMATION OF TIME OF DEATH RATE METHODS (i.e. estimation of tree’s age by height / rate of growth) - Rate of drying or discoloration of blood pools - Rigor Mortis - Livor Mortis - Algor Mortis - Decomposition - Flora (plants) around body - Fauna (insects) around body CONCURRENCE METHODS (i.e. estimation of tree’s age by counting rings) - Bloodstain vs. tire - Time of last know meal - Stopping of watch - Depth of footprint in snow - Depth of rainwater collected EVIDENCE FOR ESTIMATION OF TIME OF DEATH 1. CORPORAL EVIDENCE - In the body 2. ENVIRONMENTAL AND ASSOCIATED EVIDENCE - In the vicinity and general surroundings 3. ANAMNESTIC EVIDENCE - Based on the decedent’s ordinary habits and daily activities Envir. and Assoc. Corporal Evidence Evidence Anamnestic Evidence - stage of decomp of organs - uncollected milk, mail, - usual activities vs. exterior newspapers - soot in airway - lights on / off - walking and sleeping patterns - medical conditions (ASCVD, pre surgery) - alarm clock set - eating habits, times, type of foods - alcohol / drug levels - food on stove / in refrig - appointment - beard, nails, hair - type of clothing day / night indoors / outdoor seasonal (remote deaths) condition of clothing (mold, leached dyes) - sales slips, receipts - animals in house Use a combination of all evidence available to you, giving weight to the more reliable / documentable. Be suspicious when some factors seem to vary considerably from the others. STAGES OF POSTMORTEM DECOMPOSITION 1. Blue-green discoloration of skin RLQ and LLQ abdomen 24 hrs Entire abdomen 36 hrs 2. Marbling (Green-black discoloration in blood vessel distribution- hemolyzed blood reacts with hydrogen sulfide. Extravasation diffusion (leads to generalized dark purple-black skin 3.
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • Investment Swindles and Con Schemes I. Introduction
    INVESTMENT SWINDLES AND CON SCHEMES TABLE OF CONTENTS I. INTRODUCTION ........................................................................................................................................... 1 II. INVESTMENT SWINDLES AND CON SCHEMES OVERVIEW Who Are the Perpetrators and Victims of These Schemes? .............................................................................. 3 Why Do the Perpetrators Commit These Con Schemes? .................................................................................. 3 Why Do Consumers Become Victims to These Schemes? ................................................................................ 4 What Are the Red Flags That Characterize These Con Schemes? .................................................................... 4 How Are These Con Schemes Executed? ............................................................................................................. 5 Effects on Consumers .............................................................................................................................................. 6 Review Questions ..................................................................................................................................................... 7 III. INVESTMENT SCHEMES Introduction ............................................................................................................................................................... 8 Bonds ......................................................................................................................................................................
    [Show full text]
  • Css241 Course Title: Basic Security and Security Threats
    CSS 241 BASIC SECURITY AND SECURITY THREATS NATIONAL OPEN UNIVERSITY OF NIGERIA COURSE CODE :CSS241 COURSE TITLE: BASIC SECURITY AND SECURITY THREATS 1 CSS 241 BASIC SECURITY AND SECURITY THREATS COURSE GUIDE CSS241 BASIC SECURITY AND SECURITY THREATS Course Developer/Writer Monsuru Adegboyega Kasali Non-Violence and Intercultural Communication Advocacy Initiatives, Ibadan, Nigeria Course Editor Rasidi Okunola, Ph. D Department of Sociology University of Ibadan Oyo State Course Coordinator Adeniyi T. Adegoke, Ph.D Criminology and Security Studies School of Arts and Social Sciences National Open University of Nigeria Programme Leader Prof. Abdul-Rasheed Yesufu Dean, School of Arts and Social Sciences National Open University of Nigeria 2 CSS 241 BASIC SECURITY AND SECURITY THREATS NATIONAL OPEN UNIVERSITY OF NIGERIA National Open University of Nigeria Headquarters 14/16 Ahmadu Bello Way Victoria Island Lagos Abuja Office No. 5 Dar es Salam Street Off Aminu Kano Crescent Wuse II, Abuja Nigeria e-mail: [email protected] URL: www.nou.edu.ng Published by National Open University of Nigeria Printed ISBN: All Rights Reserved CONTENTS PAGE Introduction……………………………………..………....i-ii What You Will Learn in this Course ...................................ii Course Aims…………………………………………..... ..ii-iii Course Objectives……………………………………… …iii-iv Working through this Course ...............................................iv Course Materials……………………………….………. …v 3 CSS 241 BASIC SECURITY AND SECURITY THREATS Study Units…………………………………….………. …v-vi Textbooks and References…………….……….……… ….vi-vii Assignment File ………………………………………. ….vii Assessment ………………………………….………. ……viii Tutor-Marked Assignment……………………………. …..viii Final Examination and Grading…………………..……. …viii Course Marking Scheme ………………………………. …viii Course Overview ………………………………………. …viii-ix Presentation Schedule …………………………………. …x How to Get the Most from this Course ……………………x Reading Section.....................................................................x-xi Facilitators/Tutors and Tutorials ……………………….
    [Show full text]
  • E-Crime & Cybersecurity Benelux 2018
    6th December 2018 Amsterdam, The Netherlands Transparency plus transformation: the cybersecurity rubicon Welcome to e-Crime th 6 December 2018 & Cybersecurity Novotel Amsterdam City Benelux 2018 s business moves increasingly to digital 3 Security resilience in the face of evolving channels across Europe, fraud attempts and attacker tradecraft Aother cyber-enabled economic crime are rising Stories from the cyber battlefield. sharply. And recent research has shown that as well CrowdStrike as increasing volumes, there has been an evolution from short, isolated peaks of fraud attacks to more 5 Weighing your threat intelligence options sustained, high-volume attacks across a number of If your organisation is looking to make an days or even weeks. investment in threat intelligence, you’ll need to evaluate what different vendors deliver, how In addition, digital transformation is moving they align with your objectives, and the increasingly to mobile, rather than desktop online, advantage they’ll bring to your security strategy. channels. In Europe, 58% of all transactions now Recorded Future come from mobile devices and growth is accelerating. 7 To understand phishing, look at crimes of These trends pose a huge challenge for business and the past for cybersecurity professionals. Businesses need to Phishing is a modern problem but its roots go go digital and to make digital channels as seamless back hundreds of years. as possible for their customers. But they also need to Cofense keep those transactions, and their customers’ personal data, secure. Cybersecurity is therefore a 11 Voice and the future of personal identification strategic business imperative. Despite the more general upward trend of data breaches and sophisticated cross-channel attacks, It is these topics, and more, that we will be discussing businesses have mostly remained stagnant when th at our 8 annual e-Crime & Cybersecurity Benelux as approaching phone channel security.
    [Show full text]
  • Learning Goals Contained in the POST Basic Course Performance Objective Document
    If you have issues viewing or accessing this file, please contact us at NCJRS.gov. >. j i . I . .. , BASIC COURSE UNIT GUIDE ( __9 _) , . [~ _________________C_R_I_M_E_S __ A_G_A_I_N_S_T __ P_R_O_P_E_R_T_Y __ ________________-'J This unit guide covers the following learning goals contained in the POST Basic Course performance objective document: 3.9.0 Theft Law 3.11.0 Embezzlement Law 3.12.0 Forgery/Fraud Law 3.13.0 Burglary Law r 3.14.0 Receiving Stolen Property Law 3.15.0 Malicious Mischief Law •• 3.16.0 Arson Law Revised October 1990 THE COMMISSION ,dJ ON PEACE OFfiCER STANDARDS AND TRA./INING . • • 0 • STATEOf~ALlFORNJA ., 131385 U.S. Department of Justice Netlonellnstltute of Justice This document has been reproduced exactly as received from the person or organization originating it. Points of view or opinions stated in this document are those of the authors and do not necessarily represent the official position or policies of the National Institute of • Justice. Permission to reproduce this copyrighted material in mi­ crofiche only has been granted by California Commission on Peace Officer 8tanoards and Trainina to the National Criminal Justice Reference Service (NCJRS). Further reproduction outside of the NCJRS system requires permis· sion of the copyright owner. This unit of instruction is designed as a guideline for Performance Objective-based law enforcement basic training. This unit is part of the POST Basic Course Guidelines system developed by California law enforcement trainers and criminal justice . • educators for the California Commission on Peace Officer Standards and Training. This Guide is designed to assist the instructor in developing an appropriate lesson plan to cover the performance objectives, which are required as minimum content of the Basic Course .
    [Show full text]
  • DATCP 2015 Cyber Security Awareness Month Daily Tips
    DATCP 2015 Cyber Security Awareness Month Daily Tips Thursday, 10/1. Fresh start for the month – change your passwords frequently Cyber Security Awareness Month, Tip #1: New month…new passwords It’s the first of the month! Change your online passwords today and use a long combination of numbers, letters and special characters. For best protection, do this on a regular basis, and keep a totally different password for your email. Why? You’ll find out here tomorrow! #CyberAware Friday, 10/2. Protect your email account Cyber Security Awareness Month, Tip #2: Protect your email account Remember yesterday when we said to use a completely different password style for your email versus what you use for your other online accounts? Many websites send password update and account access emails to consumers, so getting a hold of these emails could potentially give a hacker access to all of your online accounts. Your email password should be the toughest to decode. #CyberAware Saturday, 10/3. Run a free computer security check Cyber Security Awareness Month, Tip #3: Run a free computer security check Happy Saturday! Start out CSAMonth with a clean sweep of your computer system. At the end of the month, sweep it again and make a plan to do so regularly. StaySafeOnline.org has a listing of free, trusted security check services here: https://www.staysafeonline.org/sta…/free-security-check-ups/. #CyberAware Sunday, 10/4. Backup your contacts, photos, videos, music, documents and more Cyber Security Awareness Month, Tip #4: Backup, backup, backup Halloween is scary. But do you know what's scarier? Losing all of your important files and your collection of photos, music and videos.
    [Show full text]
  • 145626NCJRS.Pdf
    If you have issues viewing or accessing this file contact us at NCJRS.gov. BASIC COURSE INSTRUCTOR UNIT GUIDE (_-.;:6::.....-) C~ C_R_I_M_E_S_A_G_A_IN_S_T_P_R_O_P_ER_TY___________ ) _________ 145626 U.S. Department of Justice National Institute of Justice This document has been reproduced exactly as received from the person or organization originating it. Points of view or opinions stated in this document are those of the authors and do not necessarily represent the official position or policies of the National Institute of Justice. Permission to reproduce this copyrighted material has been g~~~i¥ornia commission on Peace OffJ.cer standards & TraJ.nJ.ng to the National Criminal Justice Reference Service (NCJRS). Further reproduction outside of the NCJRS system requires permission of the copyright owner. • The curricula contained in this document is de$igned as a guideline for the delivery of performance-based law enforcement training, It is part of the POST Basic Course guidelines system developed by California law enforcement trainers and criminal justice educators in cooperation with the California Commission on Peace Officer Standards and Training. The training specifications referenced herein express the •• required minimum content of this domain, .,' • 1· ______ _ II UNIT GUIDE 6 • TABLE OF CONTENTS LEARNING DOMAIN 6 Crimes Against Property Page Knowledge Domain 6 (POSTRAC·tested) 3.9.1 Theft ... , . 1 3.9.2 Defrauding an Innkeeper ........................... 9 3.9.3 Appropriation of Lost Property ........................ 11 3.11.1 Embezzlement .................................. 13 3.12.1 Forgery. 15 3.12.2 Fraud ........... '. 17 3.13.1 Unauthorized Entry of Property ...................... 19 3.13.2 Burglary ....................................... 21 • 3.13.4 Possession of Burglary Tool$ .
    [Show full text]
  • White-Collar Crime White-Collar Crime the Classic Statement
    WHITE-COLLAR CRIME WHITE-COLLAR CRIME THE CLASSIC STATEMENT • White-collar crime: crime committed by those within legitimate occupations or organizations. • The concept of white-collar crime was first introduced in the social sciences by Edwin Sutherland in 1939. • He described white-collar crime as “a crime committed by a person of respectability and high social status in the course of his occupation”. • Sutherland’s investigation using records of regulatory agencies, courts, and commissions found that of the 70 largest industrial and mercantile corporations studied over a 40-year period, every one violated at least one law and had an adverse decision made against it for false advertising, patent abuse, wartime trade violations, price fixing, fraud, or the intended sale of faulty goods. WHITE-COLLAR CRIME THE CLASSIC STATEMENT • According to Sutherland (1949), while “crime in the streets” attracts headlines and police attention, the extensive and far more costly “crime in the suites” proceeds relatively unnoticed. • White-collar crimes cost several times more than other crimes put together but in most cases, they are not treated under the criminal law. • White-collar crime differs from lower-class criminality only in the implementation of criminal law that segregates white-collar criminals administratively from other criminals (Sutherland, 1949). • The status of the offender rather than the legal uniqueness of the crime is most important. WHITE-COLLAR CRIME RELATED CONCEPTS • In 1907, Ross coined the term “criminaloids” to refer to those who prospered by shameful practices which may not yet come under the ban of public opinion. • Ross viewed offenders as morally insensible and concerned with success but not with the proper means of achieving it.
    [Show full text]
  • Investment Swindles and Con Schemes
    INVESTMENT SWINDLES AND CON SCHEMES GLOBAL HEADQUARTERS • THE GREGOR BUiLDinG 716 WEST AvE • AUSTin, TX 78701-2727 • USA INVESTMENT SWINDLES AND CON SCHEMES TABLE OF CONTENTS I. INTRODUCTION II. INVESTMENT SWINDLES AND CON SCHEMES OVERVIEW Who Are the Perpetrators and Victims of These Schemes? .............................................................................. 3 Why Do the Perpetrators Commit These Con Schemes? .................................................................................. 3 Video ...................................................................................................................................................................... 4 Why Do Consumers Become Victims to These Schemes? ................................................................................ 4 What Are the Red Flags That Characterize These Con Schemes? .................................................................... 5 How Are These Con Schemes Executed? ............................................................................................................. 5 Effects on Consumers .............................................................................................................................................. 6 Review Questions ..................................................................................................................................................... 7 III. INVESTMENT SCHEMES Introduction ..............................................................................................................................................................
    [Show full text]
  • Priority Development Assistance Fund Scam
    Priority Development Assistance Fund scam From Wikipedia, the free encyclopedia The Priority Development Assistance Fund scam, also called the PDAF scam or the pork barrel scam, is a political scandal involving the alleged misuse by several members of the Congress of the Philippines of their Priority Development Assistance Fund (PDAF, popularly called "pork barrel"), a lump-sum discretionary fund granted to each member of Congress for spending on priority development projects of the Philippine government, mostly on the local level. The scam was first exposed in the Philippine Daily Inquirer on July 12, 2013,[1] with the six-part exposé of the Inquireron the scam pointing to businesswoman Janet Lim-Napoles as the scam's mastermind after Benhur K. Luy, her second cousin and former personal assistant, was rescued by agents of theNational Bureau of Investigation on March 22, 2013, four months after he was detained by Napoles at her unit at the Pacific Plaza Towers in Fort Bonifacio.[2] Initially centering on Napoles' involvement in the 2004 Fertilizer Fund scam, the government investigation on Luy's testimony has since expanded to cover Napoles' involvement in a wider scam involving the misuse of PDAF funds from 2003 to 2013. It is estimated that the Philippine government was defrauded of some ₱10 billion in the course of the scam,[1] having been diverted to Napoles, participating members of Congress and other government officials. Aside from the PDAF and the fertilizer fund maintained by the Department of Agriculture, around ₱900 million
    [Show full text]
  • Confidence Trick
    Confidence trick A confidence trick is an attempt to defraud a person or group after first gaining their trust. Confidence tricks exploit victims using their credulity, naïveté, compassion, vanity, irresponsibility, and greed. Researchers have defined confidence tricks as "a distinctive species of fraudulent conduct ... intending to further voluntary exchanges that are not mutually beneficial", as they "benefit con operators ('con men') at the expense of their victims (the 'marks')".[1] Political cartoon by JM Staniforth: Herbert Kitchener attempts to raise Contents £100,000 for a college in Sudan by calling on the name of Charles Terminology George Gordon Short and long cons Stages of the con Vulnerability factors See also In films Further reading External links References Terminology Synonyms include con, confidence game, confidence scheme, ripoff, scam, and stratagem. The perpetrator of a confidence trick (or "con trick") is often referred to as a confidence (or "con") man, con-artist, or a "grifter". Samuel Thompson (1821–1856) was the original "confidence man". Thompson was a clumsy swindler who asked his victims to express confidence in him by giving him money or their watch rather than gaining their confidence in a more nuanced way. A few people trusted Thompson with their money and watches.[2] Thompson was arrested in July 1849. Reporting about this arrest, Dr. James Houston, a reporter of the New York Herald, publicized Thompson by naming him the "Confidence Man".[2] Although Thompson was an unsuccessful scammer, he gained the reputation as a genius operator mostly because Houston's satirical tone wasn't understood as such.[2] The National Police Gazette coined the term "confidence game" a few weeks after Houston first used the name "confidence man".[2] A confidence trick is also known as a con game, a con, a scam, a grift, a hustle, a bunko (or bunco), a swindle, a flimflam, a gaffle, or a bamboozle.
    [Show full text]