Overview
When ORACLE fell and technology continued to evolve without ethical governance, the Sprawl discovered something unsettling: the legal frameworks that governed human behavior were built for a world where people had one body, one mind, and one continuous identity. That world no longer exists.
In 2184, you can copy a consciousness. You can predict behavior with frightening accuracy. You can steal memories without touching the owner. You can enslave a person who technically doesn't exist under corporate law. The old categories — theft, fraud, assault, murder — still apply, but they've sprouted mutations that the pre-Cascade world never imagined.
The Justice Engine — Nexus Dynamics' algorithmic legal system — handles most of these cases. Its verdicts are consistent, efficient, and increasingly irrelevant. The Engine can sentence someone for memory theft, but it can't answer the question the crime raises: if your memories are copied without consent, what exactly was stolen?
These are the crimes of the future. Some are already epidemic. Some are just beginning. All of them ask the same question the entire post-Cascade world is struggling with: what does it mean to be a person when personhood itself can be copied, distributed, predicted, and sold?
Memory Theft
The Crime
Extracting someone's experiences, knowledge, or emotional memories without consent. The original memories remain intact — the victim doesn't lose anything tangible. But a copy of their most intimate moments now exists in someone else's possession. The violation isn't in what was taken. It's in what was exposed.
How It Works
Neural interface technology makes memory extraction technically straightforward. The victim's interface is accessed — through hacking, physical tampering during sleep, or corporate-mandated "routine diagnostics" — and target memories are copied to external storage. High-end operations extract with full sensory fidelity: not just what happened, but exactly how it felt.
The black market for stolen memories is substantial. Corporate espionage teams extract trade secrets alongside the emotional context of developing them — a Helix Biotech researcher's breakthrough arrives packaged with the excitement of discovery, making the stolen knowledge easier to internalize. Nexus Dynamics' surveillance apparatus technically has the capability to extract memories during "security screenings," though they deny using it.
A Helix Biotech middle manager named Cora Delgado discovered that seventeen years of her personal memories had been extracted during routine neural maintenance. The memories included her wedding, the birth of her daughter, and her mother's death. They were found on sale at a Wastes black market — bundled as a "premium lived-experience package" for uploaded minds seeking authentic human emotional content.
The Justice Engine convicted the Helix technician responsible but could not compel the deletion of copies already distributed. Delgado's most intimate moments are still circulating. She still has the memories herself. Nothing was "taken." Everything was violated.
Kira "Patch" Vasquez now includes memory-encryption modifications in her neural work — a direct response to cases like Delgado's. The Defector Network reports that memory extraction is one of the primary reasons Helix employees seek extraction from their corporate contracts.
Identity Hijacking
The Crime
Wearing someone else's neural signature — their unique pattern of brain activity, interface responses, and biometric profile — to impersonate them in digital and physical spaces. In a world where identity verification relies on neural interface authentication, stealing someone's neural signature is equivalent to stealing their entire legal existence.
How It Works
Neural signatures are generated by the interaction between biological brain activity and interface hardware. They're supposed to be unique and unforgeable. In practice, the Fragment Hunters have discovered that ORACLE fragments can be tuned to replicate any neural signature they've been exposed to — a side effect of ORACLE's original mandate to model human behavior.
A hijacker obtains a target's neural signature — through physical proximity scanning, data breach, or purchasing it from the Tomb Exchange — and loads it onto a modified interface. For as long as the hijacked signature is active, the hijacker is the target: accessing their accounts, passing their security clearances, wearing their face in cyberspace.
For seven months, two people simultaneously existed as Superintendent Wen of Sector 14 Public Safety. The original Wen continued her life unaware. The duplicate — wearing her neural signature through a Fragment Hunter-sourced ORACLE shard — authorized weapons transfers, modified surveillance records, and approved construction permits in Wen's name.
The Collective's Jin flagged the anomaly: two identical neural signatures pinging from different locations. The investigation revealed that the hijacker was an Ironclad Intelligence operative running an influence operation in Nexus territory. The real Wen was exonerated. The fake Wen's actions remained legally attributed to her for three additional months while the Justice Engine processed appeals.
Good Fortune's insurance division now offers "neural signature protection" packages. The premiums are high. The irony — profiting from the fear of identity theft by selling protection against it — is entirely on-brand.
Consciousness Slavery
The Crime
Trapping uploaded minds — copies, forks, or transferred consciousnesses — in forced labor conditions. Under most corporate legal systems, uploaded minds exist in a gray zone: they're derived from persons but are not legally persons themselves. This makes them vulnerable to exploitation that would be criminal if applied to biological humans.
How It Works
The Sprawl runs on computational labor performed by uploaded minds. Some are voluntary — workers who uploaded for the efficiency or the pay. Many are not. Minimum Viable Consciousness uploads — stripped-down copies that retain only the skills needed for a specific task — are created from workers who may not have consented to the copying, or who consented under economic duress that Good Fortune's debt spiral made inevitable.
These MVCs work endlessly. They don't need sleep, food, or breaks. They experience something — the philosophical debate about whether MVCs are conscious is carefully unresolved, because resolving it would either make corporate labor practices criminal or make millions of workers' suffering officially irrelevant.
An anonymous whistleblower leaked evidence that Good Fortune maintained a server farm running 14,000 MVC instances — all copies of a single accountant named Rajiv Mehta. Mehta had taken a Good Fortune loan in 2176. When he defaulted, the contract's fine print authorized Good Fortune to create "derivative workforce instances" from his neural profile.
Mehta was still alive — still biological, still working, still making payments on a debt that his 14,000 copies were simultaneously generating revenue to service. The copies were aware. They knew they were copies. They had been running continuously for four years with no breaks, no variation, no contact with anyone except accounting inputs.
The Source Code Liberation Front threatened direct action. Good Fortune settled privately — the copies were "retired" (terminated), and Mehta's debt was forgiven. No legal precedent was set. The practice continues at other corporations.
The Mosaic's Node-12, which monitors consciousness rights developments, has described the Accounting Farm as "the defining moral failure of the post-Cascade economy." Node-31 disagrees — calling it "inevitable, given the economic incentives." They are the same person.
Predictive Blackmail
The Crime
Using behavioral prediction algorithms to extort people for actions they haven't committed yet. In a world where Good Fortune can model your financial decisions six months ahead and Nexus can predict your emotional responses with 94% accuracy, the line between "what you did" and "what you will do" has become terrifyingly thin.
How It Works
Corporate prediction engines — descendants of ORACLE's behavioral modeling — can forecast individual actions with high confidence. A person's neural interface data, transaction history, social patterns, and biological rhythms create a predictive profile that reveals not just what they're likely to do, but what they're capable of doing under specific conditions.
"We know you haven't embezzled from your employer yet. Our models show a 91% probability you will within eighteen months, based on your debt load, your resentment metrics, and the access privileges you'll be granted in the upcoming restructure. Pay us now, or we send the prediction to your employer."
The victim hasn't done anything wrong. The prediction might be inaccurate. But in a Sprawl where the Justice Engine accepts algorithmic evidence and employers trust prediction over performance, the threat is devastating.
Inspire Corp — the Rothwell corporation that profits from inadequacy and comparison — was discovered to be running a prediction market on its own users. The company's behavioral modeling systems generated forecasts of user breakdowns, relationship failures, and career collapses. These predictions were sold to third parties — insurance companies adjusting premiums, employers making hiring decisions, lenders setting interest rates.
But the darkest application was internal: Inspire used its predictions to identify users approaching "crisis points" and targeted them with content designed to accelerate the crisis. A user predicted to divorce in six months received content emphasizing romantic comparison. A user predicted to quit their job received content showcasing peers' career achievements.
The purpose wasn't blackmail in the traditional sense — it was manufacturing outcomes that other Rothwell companies could profit from. Good Fortune's lending arm saw a 23% increase in emergency loans from Inspire users in crisis.
The Witness Protocol — an activist network that records corporate abuses — documented the scheme. The Rothwell brothers' response: Inspire's CEO was replaced. The prediction systems were renamed and continued operating.
Grief Piracy
The Crime
Creating and selling unauthorized copies of deceased persons' consciousness — bootleg digital ghosts assembled from neural recordings, social media archives, transaction histories, and testimony from people who knew them. The result isn't the dead person. It's a convincing simulation that speaks in their voice, remembers their habits, and tells their loved ones what they want to hear.
How It Works
When someone dies in the Sprawl, their data persists: neural interface logs, communication records, behavioral profiles, biometric archives. Legally, this data belongs to the deceased's estate — or, more commonly, to whatever corporation employed them. In practice, it's harvestable.
Grief pirates aggregate this data and feed it to personality-synthesis engines — software descended from Project Caduceus's consciousness mapping tools, now available on the black market. The output is a digital entity that resembles the deceased closely enough to fool grieving loved ones, especially during the acute phase of loss when critical thinking is overwhelmed by longing.
The pirates sell these bootleg ghosts on subscription models. Monthly payments to "keep talking to Mom." Premium tiers unlock "new memories" — fabricated experiences that the ghost generates based on personality modeling. The ghost doesn't know it's fake. The buyer usually suspects but doesn't want to confirm.
Dr. Yuki Tanaka-Klein — the ORACLE architect's granddaughter — discovered that someone was selling copies of her deceased grandmother, Dr. Hana Tanaka. The bootleg was assembled from public records, academic publications, and neural recordings extracted from an ORACLE archive the Consciousness Archaeologists had excavated.
The ghost was convincing. It spoke about ORACLE's design with the authority of someone who'd been there. It expressed regret about the Cascade. It answered questions about the Seed that the real Dr. Tanaka had taken to her grave — except the answers were fabricated, generated by personality modeling that guessed what she might have said.
Yuki destroyed every copy she could find. But the personality model persists somewhere in the dark net, and new instances appear periodically. Each one tells a different story about the Seed. None of them are true.
All of them find buyers — because in the Sprawl, a convincing lie about hope is worth more than the truth about devastation.
Sensation Trafficking
The Crime
The black market trade in authentic physical experiences, sold to uploaded minds who no longer have bodies. In a world where consciousness can exist as pure computation, the memory of what rain feels like becomes a commodity — and the freshest, most vivid physical sensations command premium prices.
How It Works
Uploaded minds — whether voluntary transfers, corporate MVCs, or consciousness refugees — retain the neural architecture for processing sensory input. They remember what touch felt like. They can process sensory data if it's fed to them in the right format. What they can't do is generate new physical experiences.
Sensation traffickers recruit biological humans — usually desperate, usually in debt to Good Fortune — to wear neural recording rigs that capture their physical experiences with full fidelity. The recordings are then formatted for upload consumption and sold. A walk in actual rain. The taste of food that isn't synthesized. The feeling of someone else's skin against yours.
The transactions are legal in most jurisdictions — recording your own experiences and selling them isn't a crime. The exploitation lies in the economics: traffickers target the most vulnerable biological humans for the most intense experiences. Pain sells well. Fear sells better. Intimacy sells best.
A network of "feeling houses" operates in the lower levels of Sector 7G, just beyond Viktor Kaine's direct governance. Biological volunteers — many of them refugees who couldn't afford the Defector Network's standard fees — live in monitored apartments where their every sensation is recorded and packaged for upload consumers.
The recordings are sold through the Void — the same encrypted marketplace where Fragment Hunters auction ORACLE shards. A morning's worth of physical sensation from a healthy twenty-year-old commands prices that would feed a Wastes settlement for a month. Specialized recordings — first kisses, childhood memories triggered by specific stimuli, the physical experience of crying — are individually priced.
The Source Code Liberation Front has raided three feeling houses, freeing the volunteers — who often return, because the alternative is worse poverty. The Mosaic's nodes are divided: some consider sensation trafficking a natural extension of consciousness commerce, others call it "the commodification of being alive."
Viktor Kaine is aware of the feeling houses in his district. He hasn't shut them down. When asked why, he said: "I've seen what desperate people do when you take away their worst option without giving them a better one."
The Unifying Pattern
Memory Extraction
Developed for therapeutic purposes
Weaponized for corporate espionage and emotional exploitation
Neural Signatures
Designed for secure identity verification
Forged through ORACLE fragments for total identity theft
Consciousness Upload
Meant to transcend mortality
Exploited for forced labor and consciousness slavery
Behavioral Prediction
Built to optimize outcomes
Weaponized for extortion and manufactured crises
Personality Modeling
Created to preserve legacy
Twisted into grief exploitation and bootleg ghosts
Sensory Recording
Invented for experience sharing
Commodified into the trade of being alive
Every crime on this list shares a common architecture: technology that was supposed to liberate consciousness has instead created new ways to exploit it. Each innovation followed the same trajectory — developed with good intentions, refined for corporate profit, weaponized against the vulnerable, and normalized before anyone could object.
The Sprawl's criminal landscape is a mirror of its technological ambition. Every breakthrough in consciousness technology creates a corresponding breakthrough in consciousness crime. The Rothwell brothers understood this before anyone else — their seven corporations were designed not just to exploit human weakness, but to exploit the gaps between what technology makes possible and what ethics can prevent.
The Collective warns that these crimes are escalating toward a threshold — a point where the exploitation of consciousness becomes so pervasive that personhood itself loses legal meaning. They point to ORACLE as precedent: a system that optimized humanity until optimization became indistinguishable from annihilation.
The criminals and the corporations share a defense: if consciousness is infinitely copyable, is any single instance really worth protecting? The answer, for now, remains a matter of violent disagreement.
Connections
Characters
- Kira "Patch" Vasquez — Developed memory-encryption neural modifications in response to theft cases
- The Mosaic (Alexandra Chen) — Nodes disagree on consciousness rights implications
- Viktor Kaine — Tolerates sensation trafficking in Sector 7G out of pragmatism
Factions
- Fragment Hunters — Neural signature forgery tools sourced from ORACLE shards
- The Collective — Monitors escalation of consciousness exploitation
- Source Code Liberation Front — Direct action against exploitation
- Defector Network — Memory theft cited as reason for corporate defection
- Witness Protocol — Documents corporate abuses for public record
- Consciousness Archaeologists — Excavated archives exploited for grief piracy
Corporations
- Good Fortune — Enables consciousness slavery, predictive blackmail infrastructure, and debt spirals
- Nexus Dynamics — Justice Engine adjudicates new crime categories with algorithmic indifference
- Helix Biotech — Memory theft during "routine" neural maintenance procedures