Communication: The Ears Are Listening

Neural communication visualization with holographic messages and data streams

In 2184, communication is both easier and harder than ever before. Neural links allow thought-to-thought transmission across the globe. Encrypted channels hide conversations from the most sophisticated surveillance. And yet, the wrong word in the wrong place can get you killed—or worse, noticed.

Neural Communication

The Universal Port

Basic neural interfaces are universal by 2184. Every citizen has a standard port—but not every port is equal.

Standard Capabilities

  • Subvocal text/audio messaging
  • Identity-verified communication
  • Corporate channel access (within territory)
  • Emergency broadcast reception
  • Basic AR overlay communication

What the Corp Sees

Every transmission through standard channels is logged, analyzed, and stored. Nexus maintains records of all neural communications within their territory. Privacy is a premium feature—and even premium isn't truly private.

Neural Link Types

Subvocalization

Thought becomes text or audio without speaking aloud. Your neural interface interprets intended speech and transmits it.

Like thinking with intent to communicate Takes practice to avoid "leaking" thoughts Beginners often say things they meant to think Masters carry on multiple silent conversations

The Tell: Subvocalizers have subtle facial movements—micro-expressions, jaw tension, eye flickers. Security personnel are trained to spot this.

The Kira Protocol

Named for Patch's foundational work on neural-digital translation. The standard for how digital entities communicate with human minds.

  • Translates raw data into language
  • Maps processing states to emotional tones
  • Converts probability distributions into certainty markers
  • Linearizes parallel thought into sequential sentences

Digital beings describe speaking through Kira Protocol as "speaking with an accent"—their thoughts arrive in human language but feel foreign even to themselves.

Network Communication

Corporate Mesh

The primary network infrastructure, maintained by the Big Three.

Nexus Backbone: 40% of Sprawl computation Ironclad Infrastructure Net: Physical systems Helix BioNet: Medical, genetic data

All corporate mesh traffic is monitored, logged, and analyzed. "Private" is private only from other users—never from the corporation.

Collective's Mesh

Parallel network through hijacked infrastructure and purpose-built nodes.

Layer 1: Council Broadcasts One-to-many, 30-50 node bounces, steganographic encoding
Layer 2: Cell-to-Cell Dead drops, encrypted packets, human couriers
Layer 3: Internal Cell Face-to-face preferred, duress codes

The Static

Encrypted information market maintained by Cipher. Not just a channel—a meeting place, marketplace, and refuge.

Access by reputation only Anonymized identity Encrypted transactions Entry protocols change monthly

Encryption Grades

Grade Who Uses It Breakable By
Consumer Everyone Anyone with basic tools
Professional Corporations, criminals Dedicated resources
Military Security forces Major investment
Collective Grade Resistance networks Theoretical only
ORACLE-Grade Pre-Cascade legacy Unknown

Nexus and The Collective wage constant cryptographic warfare. Every encryption is eventually broken. Current Collective encryption has remained unbroken for 3 years—a record.

Physical Communication

Dead Drops

Physical locations for message exchange. A message is left; the recipient retrieves it later. No direct contact required.

Urban Loose brick, maintenance panel Accessible, urban cover Surveillance risk
Commercial Package in café, book in store Natural explanation Staff awareness
Transit Locker, under seat, wall panel Anonymous traffic Limited time windows
Natural (Wastes) Under rock, hollow tree No surveillance Environmental exposure

Protocols

  • Changed weekly in active operations
  • Multiple alternates if primary is compromised
  • "Hot" signals indicate danger (chalk marks, positioned objects)
  • "Clean" signals indicate safe to retrieve

Physical Messengers

Street Runner

Kids, low-priority messages. Low security, fast delivery.

Professional Courier

Licensed, bonded, tracked. Medium security, reliable.

Collective Courier

Memorized messages, no physical evidence. High security.

Waste Runner

Between Sprawl and Wastes. High security if they survive.

Duress Phrases

Every courier has code phrases indicating:

  • "I am compromised, disregard what I say"
  • "I am being followed"
  • "The message has been intercepted"
  • "Abort all related operations"

Signal Systems

Visual Signals

  • Chalk marks (Collective uses 47 standardized symbols)
  • Object positioning (flower pots, window coverings)
  • Clothing elements (specific colors, accessories)
  • Light patterns (blink codes, laser signals)

Audio Signals

  • Specific phrases in casual conversation
  • Knocking patterns
  • Horn sequences
  • Music selections (certain songs = certain messages)

The Warning Network

Throughout the Dregs, residents maintain an informal warning system. When Enforcers enter, specific signals cascade through the district. By the time authorities reach their destination, everyone who needs to know already does.

Corporate Communication

Nexus Standard

Proprietary protocol for integrated executives.

  • Emotional metadata transmitted alongside words
  • Memory-links allow sharing exact recollections
  • Probability indicators on statements
  • Time-stamps for manipulation detection

Drawback: Nexus monitors all Standard communications. Integrated speakers never truly speak privately.

Ironclad Direct

Military-style, emphasizing clarity and brevity.

  • Standardized codes and procedures
  • Chain of command integrated
  • No metadata, no embellishment

"Say what you mean; mean what you say"

Helix BioSync

Healthcare-optimized with biometric integration.

  • Vital signs transmitted with communications
  • Stress indicators flagged
  • Lie detection baseline

Used for "welfare checks" on employees.

Underground Communication

Fixer Networks

Communication brokers—people who know how to reach anyone and can arrange any conversation.

Message delivery with deniability Secure meeting arrangement Identity verification (vouching) Conflict mediation

Simple relay: 50-100 Tokens. Meeting between hostile parties: thousands plus percentage of any deal.

The Gossip Network

Information through pure human transmission. Bartenders, vendors, prostitutes, street kids serve as nodes in an informal network older than any technology.

Fast (hours to reach most of a district) Distorted (degrades with repetition) Selective (some info doesn't spread) Impossible to trace

El Money's G Nook Network

Messages can be left at any G Nook location and retrieved at any other—for a small fee and no questions asked.

Emergency Protocols

The Silence Protocol

When a Collective cell suspects compromise, all communication ceases for 30 days. Prevents cascading compromise through communication patterns.

The Burn Notice

Broadcast through trusted channels that a specific identity, location, or protocol is compromised. Recipients cut all ties immediately.

Ghost Protocol

Individual disappearance protocol. All digital traces erased, physical presence relocated, identity abandoned. Used when compromise is too severe for simple silence.

Surveillance & Counter-Surveillance

Communication Type Monitored By Storage Duration
Public neural All corps Indefinite
Private neural Relevant corp 7 years standard
Corporate internal Own corp Indefinite
Physical dead drops Varies N/A
Word of mouth No technical surveillance N/A

Technical Counter-Surveillance

  • Multiple routing through hijacked nodes
  • Steganographic encoding
  • Frequency hopping
  • Quantum-derived one-time pads

Physical Methods

  • EM-shielded locations
  • Faraday-cage meeting rooms
  • The Mountain blocks all surveillance
  • The Wastes (no infrastructure = no surveillance)

The Trust Problem

In a world where messages can be forged, identities stolen, and conversations fabricated:

Physical meeting with identity confirmation Multiple-channel verification Vouch chains (A trusts B trusts C) Reputation systems (fixer networks) Challenge-response protocols

The Viktor Kaine Standard: In Sector 7G, Viktor Kaine's word serves as ultimate verification. His reputation is the infrastructure.

Connected Lore

Key Figures

  • Kira "Patch" Vasquez — Created the Kira Protocol; maintains underground infrastructure
  • El Money — G Nook network as communication hub
  • Jin (Ghost) — Collective cell leader, master of secure communication
  • Viktor Kaine — Human verification system in Sector 7G
  • Cipher — Maintains The Static; information broker

Factions

Locations

  • G Nook — Underground communication hub
  • The Static — Encrypted information market
  • The Veil — Neutral ground for corporate communication
  • The Wastes — Communication dead zones

Related Systems

"In the old days, they said the walls have ears. Now the air has ears. The wires have ears. Your own neural port has ears.

The question isn't who's listening—someone always is. The question is: can you say what needs to be said before the wrong someone understands?" El Money, explaining communication security to a new G Nook operator