ENG Libreto Stakeout-LUIS.Indd

Total Page:16

File Type:pdf, Size:1020Kb

ENG Libreto Stakeout-LUIS.Indd INFINITY TOURNAMENT SYSTEM ITS:STAKEOUT 1 INFINITY TOURNAMENT SYSTEM ITS:STAKEOUT INDEX STAKEOUT .............................................................................................................................................................................2 ITS BASIC RULES ...............................................................................................................................................................2 ITS: TOURNAMENT RULES .............................................................................................................................................5 SEASON 11 .............................................................................................................................................................................. 7 EXTRAS ...................................................................................................................................................................................9 CLASSIFIED OBJECTIVES ............................................................................................................................................10 MISSION INDEX ACQUISITION ........................................................................................................................................................................11 ANNIHILATION ................................................................................................................................................................... 13 BIOTECHVORE ................................................................................................................................................................... 14 CAPTURE AND PROTECT .............................................................................................................................................. 15 COUNTERMEASURES ......................................................................................................................................................17 DECAPITATION .................................................................................................................................................................30 FIREFIGHT ............................................................................................................................................................................ 21 FRONTLINE .........................................................................................................................................................................23 HIGHLY CLASSIFIED ......................................................................................................................................................25 HUNTING PARTY .............................................................................................................................................................26 LOOTING AND SABOTAGING ......................................................................................................................................28 POWER PACK ...................................................................................................................................................................30 QUADRANT CONTROL ...................................................................................................................................................32 SAFE AREA .........................................................................................................................................................................34 SHOW OF FORCE .............................................................................................................................................................36 SUPPLIES ............................................................................................................................................................................38 SUPREMACY ......................................................................................................................................................................40 THE ARMORY ....................................................................................................................................................................42 TRANSMISSION MATRIX .............................................................................................................................................44 UNMASKING ......................................................................................................................................................................46 INFINITY TOURNAMENT SYSTEM ITS:STAKEOUT All the commanding officers and specialist troops will be in direct communication with the designated Bureau Aegis command in order to STAKEOUT coordinate these operations and process all the collected information. At this point in time, when the pressure exerted by the EI forces seems about to breach our defenses on the Paradiso front, the conclusions Our team of analysts would like to point out that, as with other reached by our team of analysts may seem farfetched to you. But you scenarios where Shasvastii cells have been involved, paranoia and must believe us, this threat is real and dreadful. I beg you, do as we suspicion have led to our forces suffering casualties from friendly fire, have done: look beyond the turmoil and the conflagration of the combat in addition to having been exploited by certain powers for their own on Paradiso. Lift your eyes to the unfathomable void and see what’s benefit to gain an advantage over rival nations. hiding there. I urge you to prevent such situations from happening again. It is not It may very well be that the most noxious consequence of the entire an overstatement to say that what is at stake here is the very future of Third Offensive launched by the Combined Army on Paradiso is that the Human Sphere. If the Earth or Concilium were to fall, the rest of the it has served to divert our attention away from their infiltration into systems would soon follow. I beg you, act with determination, but do it Human Edge. together. It’s evident from the experience gained over all these years that divided we will not survive. Thank you. Admittedly, we already suspected that some isolated teams of Shasvastii operatives might have broken through the Abyss Blockade Colonel Mariëtte Wijnkoop, Bureau Aegis Officer, in a closed session meeting that protects the Jump Gate connecting Paradiso and Human Edge. Our of O-12’s Security Council. Access authorization required: Alpha. suspicion was based on reports of certain irregularities in that Gate’s traffic, and we had also extrapolated it from the incursion that went through the Daedalus Blockade towards the Ereeva system; there’s more information in the [files classified as Daedalus’ Fall]. However, we ITS: BASIC RULES could have never fathomed the real magnitude of said infiltration. Infinity Tournament System (ITS) is Infinity’s official system for organized play and features an International Ranking to keep track of The fortuitous exposure of a Shasvastii cell in Novyy Bangkok (more each player’s score. information in the reports about Operation: Asteroid Blues and the related file “Incident in Bubba’s Khạntiǹā”) revealed a clandestine There are a number of ways to participate in ITS, but all ITS events network capable of surreptitiously moving an Onyx incursion force and share the basic rules set forth in this document. large amounts of engineering material into the Human Sphere. As this operation is still in progress, we haven’t been able to determine the For an event to be officially sanctioned and its results recorded onto the purpose and the final target of all these logistic materials and of the International Ranking, it must comply with all applicable rules. Onyx forces. Nonetheless, if we consider the connections of the Jump Gates at Human Edge, there are two obvious targets: the Solar System The ITS rules are divided into those pertaining to the participants and and Concilium, the cradle of humanity and the core of our international those pertaining to the tournament organizers. The purpose of these government, respectively. Regardless which one it is, it’s obvious that rules is to facilitate the organization of and participation in Infinity the EI is aiming for our heart and that we must put both systems under tournaments in a way that allows all members of the player community close surveillance. to be a part of a worldwide system with common ground rules that are fair to all. Therefore, it’s vitally important that all the powers work together in patrolling and performing search and destroy operations both against Shasvastii cells and Onyx incursion squads, as well as against the EVENT PARTICIPANTS engineering teams that the EI might have infiltrated into these two In order to take part in an official ITS event, players are required to systems. bring everything they need to play, including: Even though the Shasvastii and the Onyx may seem like the most » Miniatures. immediate threat, our analysts believe that possibly the greatest danger » Tape measure. may stem from those engineering teams, since we haven’t been able » Templates and markers. to ascertain their purpose yet and, until we can shed some light on that » Dice. conundrum, they pose a threat that we won’t be able to contain. » Classified Deck. » Army lists. Surveillance and security tasks will still be redoubled in Human Edge, in case the Combined
Recommended publications
  • Downloads of Technical Information
    Florida State University Libraries Electronic Theses, Treatises and Dissertations The Graduate School 2018 Nuclear Spaces: Simulations of Nuclear Warfare in Film, by the Numbers, and on the Atomic Battlefield Donald J. Kinney Follow this and additional works at the DigiNole: FSU's Digital Repository. For more information, please contact [email protected] FLORIDA STATE UNIVERSITY COLLEGE OF ARTS AND SCIENCES NUCLEAR SPACES: SIMULATIONS OF NUCLEAR WARFARE IN FILM, BY THE NUMBERS, AND ON THE ATOMIC BATTLEFIELD By DONALD J KINNEY A Dissertation submitted to the Department of History in partial fulfillment of the requirements for the degree of Doctor of Philosophy 2018 Donald J. Kinney defended this dissertation on October 15, 2018. The members of the supervisory committee were: Ronald E. Doel Professor Directing Dissertation Joseph R. Hellweg University Representative Jonathan A. Grant Committee Member Kristine C. Harper Committee Member Guenter Kurt Piehler Committee Member The Graduate School has verified and approved the above-named committee members, and certifies that the dissertation has been approved in accordance with university requirements. ii For Morgan, Nala, Sebastian, Eliza, John, James, and Annette, who all took their turns on watch as I worked. iii ACKNOWLEDGMENTS I would like to thank the members of my committee, Kris Harper, Jonathan Grant, Kurt Piehler, and Joseph Hellweg. I would especially like to thank Ron Doel, without whom none of this would have been possible. It has been a very long road since that afternoon in Powell's City of Books, but Ron made certain that I did not despair. Thank you. iv TABLE OF CONTENTS Abstract..............................................................................................................................................................vii 1.
    [Show full text]
  • Paper: Wardialing Brief
    Wardialing Brief Kingpin @Stake, Inc. 196 Broadway, Cambridge, MA 02139, USA. http://www.atstake.com E-mail: [email protected] Abstract. Wardialing consists of using a computer to dial a given set of telephone numbers with a modem. Each phone number that answers with modem handshake tones and is successfully connected to is stored in a log. By searching a range of phone numbers for computers, one can find entry points into unprotected systems and backdoors into seemingly secure systems. This brief introduces the wardialing concept, examines concerns with today's network setups, and lists free and commercial software products, whitepapers, news reports, and Internet resources. Keywords: wardialing, telephony, security, modem 1 Introduction to Wardialing Wardialing, or scanning, has been a common activity in the computer underground and computer serucity industry for decades. Hollywood made wardialing popular with the 1983 movie, WarGames, in which a teenager searching for a videogame company ultimately uncovers a government nuclear war warning system [1]. Seventeen years after the mainstream was made aware of wardialing activity, the problem of unprotected dial-up systems still exists in the majority of corporations. The act of wardialing is extremely simple – a host computer dials a given range of telephone numbers using a modem. Every telephone number that answers with a modem and successfully connects to the host is stored in a log. At the conclusion of the scan, the log is reviewed and the phone numbers are individually dialed with a computer. The user then attempts to identify the systems, and, depending on the goals of the wardial, attempts system access.
    [Show full text]
  • Wargames Ovvero: Come Applicare La Logica Del Paradosso E Vincere Una Guerra Impossibile
    CORE Metadata, citation and similar papers at core.ac.uk Provided by Institutional Research Information System University of Turin WarGames Ovvero: come applicare la logica del paradosso e vincere una guerra impossibile “WarGames” è un film del 1983, noto in italiano anche con il sottotitolo di “Giochi di guerra”. Al di là della scarsa fantasia mostrata nella traduzione, non si può certo negare che tanto i “giochi” quanto la “guerra” siano i due elementi centrali attorno ai quali ruota l‟intera vicenda narrata nella pellicola. Il film, nonostante la sua scorrevolezza, è generalmente corretto nel presentare elementi di carattere tecnico e militare – se si eccettua qualche piccolo errore1 – e fornisce validi spunti degni di approfondimento. L‟intento di questo breve saggio consiste nell‟evidenziare alcuni aspetti che si pongono in relazione diretta con la realtà strategica della Guerra fredda, vista soprattutto dal lato statunitense. A questo verranno aggiunte anche alcune osservazioni su caratteristiche emergenti, che solo oggi hanno acquisito il vigore e la visibilità che negli anni ‟80 erano ancora in massima parte ipotetici, ma relativamente alle quali la pellicola fornisce già qualche intuizione. Ma al di là e – oserei dire – al di sopra di tutto questo, l‟elemento probabilmente più interessante consiste nella logica del paradosso che permea il film, e che di per se stessa costituisce il tassello fondante del confronto nucleare dell‟epoca bipolare. Il paradosso è stato presentato, in via più generale, come una caratteristica chiave sottesa ad una corretta concezione strategica2, e tale enfasi diviene ancora più evidente in un contesto quale quello atomico. Un ottimo pregio di “WarGames” è il cogliere questo spirito, e proprio in omaggio a tale virtù, non sottrarremo l‟applicazione della medesima logica al film stesso, ottenendone così spesso un ribaltamento di prospettiva che forse può essere utile per fare un po‟ di luce nel contesto strategico-militare di quel periodo.
    [Show full text]
  • History of Wargames
    History of Wargames: Toward a History Based Doctrine for Wargaming as of 6 Jan 2000 By Matthew Caffrey Send comments to [email protected] - A Congressman with a national reputation as a defense expert opposes the President's plan for military action because of the casualty levels predicted by war games. - One weapons program is canceled and another accelerated, both largely due to the results of war games. - An air component commander convinces an area CinC to change the deployment plan of a major regional plan due to problems anticipated through a war game. Our expectations of the future shape that future. Those who concern themselves with the future of warfare develop their expectations in many ways, from the study of history to the building of complex mathematical models, to the integration of both these approaches using the medium of wargaming. Without question war games shape those expectations, hence they help shape the future. Ever more powerful computers appear to promise ever better war games. Yet is the Emperor really wearing clothes? Or to use a more contemporary expression, isn't the validity of "garbage in garbage out" independent of computing power? Will war games lead or mislead us in the future? As several historians have observed, "I know of no guide to the future but the past." For almost 200 years modern war games have been providing life saving insights and fatal mirages. If these different outcomes were random there would little use in studying that history. However, as the Caffrey Cycle illustrates, history provides the raw material for anticipating cause and effect.
    [Show full text]
  • Ready Player One by Ernest Cline
    Ready Player One by Ernest Cline Chapter 1 Everyone my age remembers where they were and what they were doing when they first heard about the contest. I was sitting in my hideout watching cartoons when the news bulletin broke in on my video feed, announcing that James Halliday had died during the night. I’d heard of Halliday, of course. Everyone had. He was the videogame designer responsible for creating the OASIS, a massively multiplayer online game that had gradually evolved into the globally networked virtual reality most of humanity now used on a daily basis. The unprecedented success of the OASIS had made Halliday one of the wealthiest people in the world. At first, I couldn’t understand why the media was making such a big deal of the billionaire’s death. After all, the people of Planet Earth had other concerns. The ongoing energy crisis. Catastrophic climate change. Widespread famine, poverty, and disease. Half a dozen wars. You know: “dogs and cats living together … mass hysteria!” Normally, the newsfeeds didn’t interrupt everyone’s interactive sitcoms and soap operas unless something really major had happened. Like the outbreak of some new killer virus, or another major city vanishing in a mushroom cloud. Big stuff like that. As famous as he was, Halliday’s death should have warranted only a brief segment on the evening news, so the unwashed masses could shake their heads in envy when the newscasters announced the obscenely large amount of money that would be doled out to the rich man’s heirs. 2 But that was the rub.
    [Show full text]
  • The Art of Computer Game Design the Art of Computer Game Design by Chris Crawford
    The Art of Computer Game Design The Art of Computer Game Design by Chris Crawford Preface to the Electronic Version: This text was originally composed by computer game designer Chris Crawford in 1982. When searching for literature on the nature of gaming and its relationship to narrative in 1997, Prof. Sue Peabody learned of The Art of Computer Game Design, which was then long out of print. Prof. Peabody requested Mr. Crawford's permission to publish an electronic version of the text on the World Wide Web so that it would be available to her students and to others interested in game design. Washington State University Vancouver generously made resources available to hire graphic artist Donna Loper to produce this electronic version. WSUV currently houses and maintains the site. Correspondance regarding this site should be addressed to Prof. Sue Peabody, Department of History, Washington State University Vancouver, [email protected]. If you are interested in more recent writings by Chris Crawford, see the "Reflections" interview at the end of The Art of Computer Game Design. Also, visit Chris Crawford's webpage, Erasmatazz. An acrobat version of this text is mirrored at this site: Acrobat Table of Contents ■ Acknowledgement ■ Preface ■ Chapter 1 - What is a Game? ■ Chapter 2 - Why Do People Play Games? ■ Chapter 3 - A Taxonomy of Computer Games ■ Chapter 4 - The Computer as a Game Technology ■ Chapter 5 - The Game Design Sequence ■ Chapter 6 - Design Techniques and Ideals ■ Chapter 7 - The Future of Computer Games ■ Chapter 8 - Development of Excalibur ■ Reflections - Interview with Chris WSUV Home Page | Prof.
    [Show full text]
  • Cyber Wargaming: Finding, Designing, and Playing Wargames for Cyber Security Education
    Cyber Wargaming: Finding, Designing, and Playing Wargames for Cyber Security Education Andreas Haggman Submitted to Royal Holloway, University of London for the award of Doctor of Philosophy in Information Security Supervised by Professor Keith Martin Professor Klaus Dodds February 2019 1 Declaration of authorship I, Andreas Haggman, hereby declare that this thesis and the work presented in it is entirely my own. Where I have consulted the work of others, this is always clearly stated. Signed: Date: 2 Abstract This thesis investigates, and contributes to, the use of wargaming in cyber security education. Wargaming has a rich history of pedagogic use, but little work exists that addresses the critically important subject of cyber security. Cyber security is a global problem that frequently makes news headlines, yet the field is dogged with a reputation as a domain only for technologists, when in fact cyber security requires a whole gamut of approaches to be properly understood. The thesis is broadly divided into three parts. The first part is a comprehensive literature review of wargaming scholarship, analysing the benefits and drawbacks of wargaming, and some of the justifications for why a tabletop boardgame may be more effective than a game enhanced by technology. Following on from this, the thesis provides an outline of current work in cyber wargaming by analysing existing games, evaluating their contributions as educational tools, and identifying successful game mechanics and components. The second part of the thesis outlines the design process of an original wargame created for cyber security education and awareness training. The analysis outlines what the game design intends to achieve in terms of pedagogical outcomes and how the design evolved through the development process.
    [Show full text]
  • Wargames (1983)
    Wargames (1983) David Lightman (Matthew Broderick) is an intelligent, underachieving teen who spends most of his free time playing arcade video games or messing around on his computer. During an automated modem search, he finds a strange computer that appears to be affiliated with a game company. A list of games appears, but Lightman doesn't have the password. After doing extensive research, he correctly guesses it. As would-be girlfriend Jennifer (Ally Sheedy) watches, he begins playing "Global Thermonuclear War" and targets his hometown (Seattle) and Las Vegas for Soviet strikes. Unknown to the teens, the computer behind "Global Thermonuclear War" is not a game software company -- it is the War Operations Plan Response (W.O.P.R.) -- a top-secret military system that helps the Air Force decide what to do in the event of a Soviet attack. On their situation screens deep below Cheyenne Mountain, Colorado, the military actually thinks a first- strike is occurring. Top programmer Dr. McKittrick (Dabney Coleman) figures out what has happened, but it seemed all too real for a few minutes. The government soon finds out who broke into their system, and Lightman is arrested and taken to Cheyenne Mountain for debriefing. It is assumed that he is affiliated with the Soviet KGB! He realizes that the W.O.P.R. is still "playing" Global Thermonuclear War, and needs to be stopped. The computer is feeding false data to the Americans, trying to get them to "move." General Beringer (Barry Corbin), a hawkish sort, is putting US forces on increasingly higher levels of Alert (known as Defense Conditions, or DefCon).
    [Show full text]
  • Inventory to Archival Boxes in the Motion Picture, Broadcasting, and Recorded Sound Division of the Library of Congress
    INVENTORY TO ARCHIVAL BOXES IN THE MOTION PICTURE, BROADCASTING, AND RECORDED SOUND DIVISION OF THE LIBRARY OF CONGRESS Compiled by MBRS Staff (Last Update December 2017) Introduction The following is an inventory of film and television related paper and manuscript materials held by the Motion Picture, Broadcasting and Recorded Sound Division of the Library of Congress. Our collection of paper materials includes continuities, scripts, tie-in-books, scrapbooks, press releases, newsreel summaries, publicity notebooks, press books, lobby cards, theater programs, production notes, and much more. These items have been acquired through copyright deposit, purchased, or gifted to the division. How to Use this Inventory The inventory is organized by box number with each letter representing a specific box type. The majority of the boxes listed include content information. Please note that over the years, the content of the boxes has been described in different ways and are not consistent. The “card” column used to refer to a set of card catalogs that documented our holdings of particular paper materials: press book, posters, continuity, reviews, and other. The majority of this information has been entered into our Merged Audiovisual Information System (MAVIS) database. Boxes indicating “MAVIS” in the last column have catalog records within the new database. To locate material, use the CTRL-F function to search the document by keyword, title, or format. Paper and manuscript materials are also listed in the MAVIS database. This database is only accessible on-site in the Moving Image Research Center. If you are unable to locate a specific item in this inventory, please contact the reading room.
    [Show full text]
  • The BG News September 11, 1987
    Bowling Green State University ScholarWorks@BGSU BG News (Student Newspaper) University Publications 9-11-1987 The BG News September 11, 1987 Bowling Green State University Follow this and additional works at: https://scholarworks.bgsu.edu/bg-news Recommended Citation Bowling Green State University, "The BG News September 11, 1987" (1987). BG News (Student Newspaper). 4687. https://scholarworks.bgsu.edu/bg-news/4687 This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 4.0 License. This Article is brought to you for free and open access by the University Publications at ScholarWorks@BGSU. It has been accepted for inclusion in BG News (Student Newspaper) by an authorized administrator of ScholarWorks@BGSU. Falcons hope to ice penguins, see page 6 THE BG NEWS Vol.70 Issue 12 Bowling Green, Ohio Friday, September 11,1987 30 protest Reagans welcome contra aid the pope by Deborah Gottschalk ment affairs." Boehm added she staff reporter attended the protest because La- MIAMI (AP) - Pope John tta supports funding the contras. Paul II, saying "I come as a "The contras are a military friend ... of all Americans," ar- Carrying signs reading "Not group advocating war and the rived yesterday for his second another Vietnam" and "Nicara- right to kill people, and I do not U.S. tour, a mission to defend gua is not our enemy," about 30 support that,"she said. church doctrine under attack people picketed the office of within his flock and applaud the Congressman Delbert Latta at Boehm added, "Latta is our vibrancy of the Roman Catholic the Federal Building, 280 S.
    [Show full text]
  • Artificial Intelligence, Strategic Stability and Nuclear Risk
    SIPRI ARTIFICIAL INTELLIGENCE, Policy Paper STRATEGIC STABILITY AND NUCLEAR RISK VINCENT BOULANIN, LORA SAALMAN, PETR TOPYCHKANOV, FEI SU AND MOA PELDÁN CARLSSON June 2020 STOCKHOLM INTERNATIONAL PEACE RESEARCH INSTITUTE SIPRI is an independent international institute dedicated to research into conflict, armaments, arms control and disarmament. Established in 1966, SIPRI provides data, analysis and recommendations, based on open sources, to policymakers, researchers, media and the interested public. The Governing Board is not responsible for the views expressed in the publications of the Institute. GOVERNING BOARD Ambassador Jan Eliasson, Chair (Sweden) Dr Vladimir Baranovsky (Russia) Espen Barth Eide (Norway) Jean-Marie Guéhenno (France) Dr Radha Kumar (India) Ambassador Ramtane Lamamra (Algeria) Dr Patricia Lewis (Ireland/United Kingdom) Dr Jessica Tuchman Mathews (United States) DIRECTOR Dan Smith (United Kingdom) Signalistgatan 9 SE-169 72 Solna, Sweden Telephone: + 46 8 655 9700 Email: [email protected] Internet: www.sipri.org Artificial Intelligence, Strategic Stability and Nuclear Risk vincent boulanin, lora saalman, petr topychkanov, fei su and moa peldán carlsson June 2020 Contents Preface v Acknowledgements vi Abbreviations vii Executive Summary ix 1. Introduction 1 Box 1.1. Key definitions 6 2. Understanding the AI renaissance and its impact on nuclear weapons 7 and related systems I. Understanding the AI renaissance 7 II. AI and nuclear weapon systems: Past, present and future 18 Box 2.1. Automatic, automated, autonomous: The relationship between 15 automation, autonomy and machine learning Box 2.2. Historical cases of false alarms in early warning systems 20 Box 2.3. Dead Hand and Perimetr 22 Figure 2.1. A brief history of artificial intelligence 10 Figure 2.2.
    [Show full text]
  • Anti-Satellite Weapons, Deterrence and Sino-American Space Relations
    Anti-satellite Weapons, Deterrence and Sino-American Space Relations Michael Krepon & Julia ompson, Editors SEPTEMBER 2013 Anti-satellite Weapons, Deterrence and Sino-American Space Relations Michael Krepon Julia ompson Editors September 2013 TABLE OF CONTENTS 7 Preface Ellen Laipson, Stimson Center 9 Introduction Amb. Lincoln P. Bloom"eld, Jr., Stimson Center 13 List of Acronyms and Key Terms 15 Space and Nuclear Deterrence Michael Krepon, Stimson Center 41 The Absolute Weapon and the Ultimate High Ground: Why Nuclear Deterrence and Space Deterrence Are Strikingly Similar - Yet Profoundly Different Karl Mueller, RAND Corporation 61 Reconsidering Deterrence for Space and Cyberspace James A. Lewis, Center for Strategic and International Studies 81 Deterrence and Crisis Stability in Space and Cyberspace Bruce W. MacDonald, United States Institute of Peace 101 The United States and China in Space: Cooperation, Competition, or Both? Michael Nacht, University of California, Berkeley 113 U.S.-China Cooperation in Space: Constraints, Possibilities, and Options Brian Weeden, Secure World Foundation 131 Annex: A Comparison of Nuclear and Anti-satellite Testing, 1945-2013 Michael Krepon and Sonya Schoenberger, Stimson Center 6 Introduction US national security experts spend years studying, seeking to avoid and sometimes helping to mediate or prosecute con#icts. Over time, veteran policy hands in the exec- utive and legislative branches, as well as academia, thinks tanks and the media, come to believe that they understand all the important dimensions of security. And yet, for most, one dimension – space – presents a signi"cant gap in their understanding. Space’s importance is major, growing and underappreciated inside the Washington Beltway. Over a half century ago, the US-Soviet space race captured the imagination of the American people, and the manned space program from the 1960s onward bred na- tional competence in the design, manufacture and launch of rockets, satellites and payloads with ever-greater capabilities.
    [Show full text]