Communication: The Ears Are Listening
In 2184, communication is both easier and harder than ever before. Neural links allow thought-to-thought transmission across the globe. Encrypted channels hide conversations from the most sophisticated surveillance. And yet, the wrong word in the wrong place can get you killed—or worse, noticed.
Neural Communication
The Universal Port
Basic neural interfaces are universal by 2184. Every citizen has a standard port—but not every port is equal.
Standard Capabilities
- Subvocal text/audio messaging
- Identity-verified communication
- Corporate channel access (within territory)
- Emergency broadcast reception
- Basic AR overlay communication
What the Corp Sees
Every transmission through standard channels is logged, analyzed, and stored. Nexus maintains records of all neural communications within their territory. Privacy is a premium feature—and even premium isn't truly private.
Neural Link Types
Subvocalization
Thought becomes text or audio without speaking aloud. Your neural interface interprets intended speech and transmits it.
The Tell: Subvocalizers have subtle facial movements—micro-expressions, jaw tension, eye flickers. Security personnel are trained to spot this.
The Kira Protocol
Named for Patch's foundational work on neural-digital translation. The standard for how digital entities communicate with human minds.
- Translates raw data into language
- Maps processing states to emotional tones
- Converts probability distributions into certainty markers
- Linearizes parallel thought into sequential sentences
Digital beings describe speaking through Kira Protocol as "speaking with an accent"—their thoughts arrive in human language but feel foreign even to themselves.
Network Communication
Corporate Mesh
The primary network infrastructure, maintained by the Big Three.
All corporate mesh traffic is monitored, logged, and analyzed. "Private" is private only from other users—never from the corporation.
Collective's Mesh
Parallel network through hijacked infrastructure and purpose-built nodes.
The Static
Encrypted information market maintained by Cipher. Not just a channel—a meeting place, marketplace, and refuge.
Encryption Grades
Nexus and The Collective wage constant cryptographic warfare. Every encryption is eventually broken. Current Collective encryption has remained unbroken for 3 years—a record.
Physical Communication
Dead Drops
Physical locations for message exchange. A message is left; the recipient retrieves it later. No direct contact required.
Protocols
- Changed weekly in active operations
- Multiple alternates if primary is compromised
- "Hot" signals indicate danger (chalk marks, positioned objects)
- "Clean" signals indicate safe to retrieve
Physical Messengers
Kids, low-priority messages. Low security, fast delivery.
Licensed, bonded, tracked. Medium security, reliable.
Memorized messages, no physical evidence. High security.
Between Sprawl and Wastes. High security if they survive.
Duress Phrases
Every courier has code phrases indicating:
- "I am compromised, disregard what I say"
- "I am being followed"
- "The message has been intercepted"
- "Abort all related operations"
Signal Systems
Visual Signals
- Chalk marks (Collective uses 47 standardized symbols)
- Object positioning (flower pots, window coverings)
- Clothing elements (specific colors, accessories)
- Light patterns (blink codes, laser signals)
Audio Signals
- Specific phrases in casual conversation
- Knocking patterns
- Horn sequences
- Music selections (certain songs = certain messages)
The Warning Network
Throughout the Dregs, residents maintain an informal warning system. When Enforcers enter, specific signals cascade through the district. By the time authorities reach their destination, everyone who needs to know already does.
Corporate Communication
Nexus Standard
Proprietary protocol for integrated executives.
- Emotional metadata transmitted alongside words
- Memory-links allow sharing exact recollections
- Probability indicators on statements
- Time-stamps for manipulation detection
Drawback: Nexus monitors all Standard communications. Integrated speakers never truly speak privately.
Ironclad Direct
Military-style, emphasizing clarity and brevity.
- Standardized codes and procedures
- Chain of command integrated
- No metadata, no embellishment
"Say what you mean; mean what you say"
Helix BioSync
Healthcare-optimized with biometric integration.
- Vital signs transmitted with communications
- Stress indicators flagged
- Lie detection baseline
Used for "welfare checks" on employees.
Underground Communication
Fixer Networks
Communication brokers—people who know how to reach anyone and can arrange any conversation.
Simple relay: 50-100 Tokens. Meeting between hostile parties: thousands plus percentage of any deal.
The Gossip Network
Information through pure human transmission. Bartenders, vendors, prostitutes, street kids serve as nodes in an informal network older than any technology.
El Money's G Nook Network
Messages can be left at any G Nook location and retrieved at any other—for a small fee and no questions asked.
Emergency Protocols
The Silence Protocol
When a Collective cell suspects compromise, all communication ceases for 30 days. Prevents cascading compromise through communication patterns.
The Burn Notice
Broadcast through trusted channels that a specific identity, location, or protocol is compromised. Recipients cut all ties immediately.
Ghost Protocol
Individual disappearance protocol. All digital traces erased, physical presence relocated, identity abandoned. Used when compromise is too severe for simple silence.
Surveillance & Counter-Surveillance
Technical Counter-Surveillance
- Multiple routing through hijacked nodes
- Steganographic encoding
- Frequency hopping
- Quantum-derived one-time pads
Physical Methods
- EM-shielded locations
- Faraday-cage meeting rooms
- The Mountain blocks all surveillance
- The Wastes (no infrastructure = no surveillance)
The Trust Problem
In a world where messages can be forged, identities stolen, and conversations fabricated:
The Viktor Kaine Standard: In Sector 7G, Viktor Kaine's word serves as ultimate verification. His reputation is the infrastructure.
Connected Lore
Key Figures
- Kira "Patch" Vasquez — Created the Kira Protocol; maintains underground infrastructure
- El Money — G Nook network as communication hub
- Jin (Ghost) — Collective cell leader, master of secure communication
- Viktor Kaine — Human verification system in Sector 7G
- Cipher — Maintains The Static; information broker
Factions
- The Collective — Most sophisticated underground communication
- Nexus Dynamics — Most comprehensive surveillance
- The Feast — Personal loyalty over technological security
- Zephyria — Transparency as principle
Locations
- G Nook — Underground communication hub
- The Static — Encrypted information market
- The Veil — Neutral ground for corporate communication
- The Wastes — Communication dead zones
Related Systems
- Consciousness Economics — Digital entity communication
- Corporate Territories — Communication jurisdiction
- Technology Overview — Neural interface foundations
"In the old days, they said the walls have ears. Now the air has ears. The wires have ears. Your own neural port has ears.
The question isn't who's listening—someone always is. The question is: can you say what needs to be said before the wrong someone understands?" — El Money, explaining communication security to a new G Nook operator