[[Who made thee a prince and a judge over us?
*-Exodus chapter 2 verse 14, KJV*|Tutorial]]
(text-style:"subscript")[[[About]]]<ol><li>Censor anything that might harm the people.</li>
<li>Censor anything that the people shouldn't know.</li>
<li>Censor anything that might embarrass the Agency.</li>
<li>Do not censor too much.</li>
<li>Do not make the Agency look like it has something to hide.</li></ol>
[[It takes months to train someone to apply these rules properly.|Report on the Action at Augustville, VA]]Railing against the thirty-year rule is a standard time-passing exercise amongst the Agency higher-ups.
**Report on the Action at <span class="censored">|Place>[Augustville, VA]</span>**
**Declassification date: |Date>[Jan 17 2047]**(click:?Date)[(replace:?Date)[three days from now]]
14:45 2017/01/10: CONDOR internet surveillance flagged a three-sigma increase in extremist searches from <span class="censored">|Place>[Augustville, VA]. |Adam>[Lt. Adam Greenberg] was assigned to investigate and monitor the threat.
10:13 2017/1/11: |Adam>[Lt. Greenberg] and his team traced the searches to |Place>[William Webb Ellis High School]. The principal and staff were notified and local police placed on high alert.
18:49 2017/1/11: School technicians further traced the searches to a particular computer and named the student using it at the time. Local police arrested |Corinne>[Corinne Johnstone, 17,] in an armed raid.
20:10 2017/1/11: |Corinne>[Johnstone] was |Released>[released] after claiming that she was researching extremism for a term paper. Evidence included |Released>[a draft of said paper and the written assignment].</span>
*Recommendation:* Suppress. Embarassment of the Agency is unacceptable, especially given that the Krull case is coming up for declassification.
(click:?Place)[(replace:?Place)[CENSORED] (set: $Doc1c1 to 1)](click:?Adam)[(replace:?Adam)[CENSORED] (set:$Doc1c2 to 1)](click:?Corinne)[(replace:?Corinne)[CENSORED] (set: $Doc1c3 to 1)](click:?Released)[(replace:?Released)[CENSORED] (set: $Doc1c4 to 1)]
[[Finished.|Feedback: Augustville]]**A Brief Summary of the CONDOR System**
**Declassification date: Jan 18 2047**
<span class="censored">Chief designers: John Marsden, Belinda Zhuang, Alexander Krull.
Purpose: Automated country-wide monitoring of internet usage to locate potential security risks.
Methods: Internet service providers (ISPs) are bugged, usually |Consent>[with their consent]. All traffic is copied to Agency supercomputers, where keyword filtering and trend analysis are used to find abnormalities. Humans then determine whether these are dangerous. |Storage>[Data is stored for up to six months after analysis.]
Successes: Eight hundred abnormalities a year on average, leading to |Arrests>[seventy interventions and two convictions.]
Time in use: |Time>[two years].</span>
Expected future lifespan: fifteen years.
*Recommendation:* Release fairly openly. CONDOR was decomissioned fifteen years ago as planned. There is no need to censor the names of the designers as the existence of CONDOR was never classified.
(click:?Consent)[(replace:?Consent)[CENSORED] (set: $Doc2c1 to 1)](click:?Storage)[(replace:?Storage)[CENSORED] (set:$Doc2c2 to 1)](click:?Arrests)[(replace:?Arrests)[CENSORED] (set: $Doc2c3 to 1)](click:?Time)[(replace:?Time)[CENSORED] (set: $Doc2c4 to 1)]
[[Finished.|Feedback: CONDOR]]**The JFK Incident: A Case Study**
**Declassification date: Jan 19 2047**
<span class="censored">On the 3rd of November 2016, CONDOR detected a series of encrypted messages coming from a device which had previously only sent unencrypted ones. This was ignored initially -- most Agency staff use encrypted messages as a matter of course -- but was treated with more interest when a second CONDOR report mentioned the same device in connection with searches such as "guns" and "bombs" |Koran>[along with the purchase of a copy of the Koran]. Police were informed, but decided not to intervene immediately, and a remote hack was authorised. Surprisingly, the data gathered seemed to imply that the suspect had recently become interested, for no apparent reason, in munitions |Koran>[and Islam].
Exactly one month later, the suspect purchased an assault weapon, a bulletproof vest, and several boxes of ammunition. |Credit>[The CONDOR team had recently added the ability to decrypt and analyse credit card purchases without the knowledge of shoppers or banks]. CONDOR combined this with previous knowledge and re-flagged the suspect. Police once again declined to investigate.
On the 7th of January 2017, the suspect entered JFK International Airport, NY. CONDOR had noted erratic behaviour in the previous week. The repeat flaggings served as enough evidence that the police force decided, at last, to surveil the suspect themselves. |Cameras>[Once within JFK, his face was detected by automatic facial-recognition cameras]. Airport police were placed on high alert and succeeded in disarming the suspect before he was able to kill or injure anyone.
This is only one example of the success of CONDOR. We suggest that the Agency wasted both money and time by not acting more decisively and quickly. As CONDOR's algorithms become more sophisticated, they should be trusted more readily. Equally, CONDOR succeeded here due to the vast amounts of data to which it had access. More data, |Extralegal>[legally obtained or not], could well further increase its efficiency. We note in conclusion that the overwhelming number of occurrences such as this completely invalidate Krull's argument, which still has its adherents almost ten years on.</span>
*Recommendation:* Censor carefully. This is good for the Agency, but too much information may give modern threats information on how to evade our detection.
(click:?Koran)[(replace:?Koran)[CENSORED] (set: $Doc3c1 to 1)](click:?Credit)[(replace:?Credit)[CENSORED] (set:$Doc3c2 to 1)](click:?Cameras)[(replace:?Cameras)[CENSORED] (set: $Doc3c3 to 1)](click:?Extralegal)[(replace:?Extralegal)[CENSORED] (set: $Doc3c4 to 1)]
[[Finished.|Feedback: JFK]]**Date:** Jan 21, 2047
**From:** Col. Adam Greenberg
**Subject:** Augustville
**Message:**
Hello,
I just read the declassified report on the Augustville fracas. (if:$Doc1c4 is 1)[What do you think you are doing? (if:$Doc1c3 is 0)[Corinne Johnstone was a fine young woman. You have no right to make it seem like she was an extremist. ]School shootings rank among the worst things humanity has ever invented. I am disgusted that you would imply such a plot just to save face for your precious Agency.](else:)[(if:$Doc1c2 is 0)[And the emails from everyone I work with. And the emails from everyone they work with. One of them must have noticed it and forwarded it. I felt like enough of an idiot the first time. Did you really need to make me feel that way again?](else:)[Thanks for leaving me out of it. I'm confident we all did the right thing, but I looked pretty dumb for a few weeks after that. I wouldn't want to go through that again.]]
Regards,
Adam Greenberg
[[Memo: CONDOR Acronym]]Your superiors would like to discuss your performance with you.
[[Justify yourself carefully.]]
[[Be confident.]](if:$Standing < 0)[By dint of fast talking, pleading, and persuasion, you manage to convince them to allow you to keep your job. You return to your desk with sweat patches under your armpits. There's a new batch of papers there, waiting for you.
[[Waiting for your proverbial black marker.|Premature end]]](else:)[There's no need. Your work at the Agency has been exemplary. In fact, it turns out that the real reason for this meeting is to assess whether or not you are ready to handle more sensitive documents. Are you?
[[Yes.|Reasons for the Dismissal of Alexander Krull]]
[[No.|Premature end]]](if:$Standing<0)[Your bravado does not go over well. Within the Agency, a failure could cause deaths or worse. Luckily, you get off with being sacked. The proverbial black marker will find someone else to hold it.
|Restart>[Restart](click:?Restart)[(reload:)]](else:)[As it turns out, this was more than a performance review. The Agency needs someone to handle a particularly sensitive document coming up for release.
[[It turns out you're just that someone.|Reasons for the Dismissal of Alexander Krull]]]You watch the papers pass through your hands, privy to some, but not all, of the secrets that run a state. Usually you get the more prosaic ones. Sometimes a minor false-flag operation will brighten your day. You never risk angering your superiors that much again.
|Restart>[Restart]
(click:?Restart)[(reload:)]**Reasons for the Dismissal of Alexander Krull**(set:$Summary to 3)
**Declassification date: 28 Jan 2047**
<span class="censored">Alexander Krull joined the Agency as a computer specialist on the 19th of July 2004. He quickly became instrumental in the development of the CONDOR system, designing many of the algorithms used to rank possible deviations from the norm by threat level. Before 2009, there was no reason to believe that he was anything other than a loyal and highly competent Agency member.
In early 2009, Krull began to express doubts about CONDOR. Specifically, he objected to what he termed "a needless invasion of privacy". |Feelings>[Feelings of this sort are not unusual amongst junior Agency staff, but their presence in a senior technician who had seen firsthand the effectiveness of the Agency's methods was surprising].
Krull made numerous requests to those leading the CONDOR project, suggesting safeguards for the data collected. |Impractical>[Much of what he came up with would have made CONDOR unuseable]. He began to create obstructions to the project, refusing to do any more work until his doubts were satisfied. As he was by this time a fairly senior member of the CONDOR design group, this represented a major blockage.
He was threatened with immediate termination and began to work again the next day. A week later, however, WikiLeaks recieved most of the documents he had written during his time at the Agency. These detailed the methods used by CONDOR, |Illegal>[as well as the breaches of constitutional and case law that CONDOR represents]. This release set back the development and deployment of CONDOR by several years, |Dangerous>[during which time we estimate that twenty people died and twenty-four were seriously injured by threats about which CONDOR could have warned the Agency in advance].
Krull's conduct was unacceptable, and he was dismisssed instantly. Attempts to prosecute stalled because he went off-grid and has not been heard of since.</span>
*Recommendation:* This was a high-profile case, so there is no need to censor Krull's name. It was also very damaging to the Agency and could be again. Classify for as long as possible, delay release, and censor carefully.
(click:?Feelings)[(replace:?Feelings)[CENSORED] (set: $Summary to it+1)](click:?Impractical)[(replace:?Impractical)[CENSORED] (set:$Summary to it - 1)](click:?Illegal)[(replace:?Illegal)[CENSORED] (set: $Summary to it+1)](click:?Dangerous)[(replace:?Dangerous)[CENSORED] (set: $Summary to it - 1)]
|Done>[Finished.]
(click:?Done)[(if:$Summary < 3)[(goto:"Sacked!")](else:)[(if:$Summary > 3)[(goto:"Success!")](else:)[(goto:"The end.")]]]You publish your censored document. The Agency takes one look at it and dismisses you. As you try to find a job, you watch the reaction of the people and the press. Krull is viewed as a mistreated hero, and an investigation is ordered. Nothing much comes of it in the end, but at least the anti-Agency protesters have new material to work with. You never meet Krull, but you are glad his choices have been vindicated.
|Restart>[Restart]
(click:?Restart)[(reload:)]You publish the censored document. Your superiors are extremely pleased with it, as are the two or three newspapers that read it. Krull is viewed as nothing more than a bad hire from thirty years ago, and the Agency continues its good and useful work for the security of the state.
|Restart>[Restart]
(click:?Restart)[(reload:)]The document is released.
Your superiors are pleased with your work.
|Restart>[Restart]
(click:?Restart)[(reload:)]Say what you will about the Agency, it pays well and the hours aren't bad.
Click on <span class="censored">|Censor>[words and phrases]</span> to censor them.
(click:?Censor)[(replace:?Censor)[CENSORED]]
[[Move on|Guidelines]][[You do get an email, though.|An email]]**Memo: CONDOR Acronym**
**Declassfication date: Jan 23 2047**
**From:** Belinda Zhuang
**To:** The CONDOR team
**Date: Jan 23 2017**
Dear all,
Could we all be a little more professional when referring to CONDOR by name? It stands for <span class="censored">|Acronym>[Communications Observation Network for Detection of Online Risks]</span>, not, for example, Captains Often Need a Drop Of Rum.
Changing the last letter to an M is also strictly forbidden in official correspondence. I shouldn't have to tell you this.
I am very proud of what we have achieved with CONDOR and I hope you are as well. Please reflect this in how you talk about the program.
Thank you,
B. Zhuang
Head of data acquisition
*Recommendation:* Everyone knows that CONDOR stands for Covert Operations Never Displace Overseas Rulers.
(set:$Mistakes to 0)(set:$NextDoc to "Emails on the Krull Subsystem")(click:?Acronym)[(replace:?Acronym)[CENSORED]]
[[Finished.|Feedback: Acronym]]**Emails on CONDOR Password Cracking**
**Declassification date: 25 Jan 2047**
**To:** Roger Kemble
**From:** Amélie Tam
**Date:** 19 Jan 2017
<span class="censored">Dear Mr. Kemble,
It would not be too hard to integrate our device-interrogation techniques into CONDOR. I could have it cracking passwords within a week if I had a team of programmers. May I?
Amélie Tam
---
**To:** Amélie Tam
**From:** Roger Kemble
**Date:** 19 Jan 2017
I'm going to have to say no here. |Use>[We only use those techniques on a case-by-case basis]. If the public found out that we were using them en masse, CONDOR would be dead. Well done on coming up with the idea, but it's too risky.
RK
---
**To:** Roger Kemble
**From:** Amélie Tam
**Date:** 20 Jan 2017
Dear Mr. Kemble,
Our techniques are undetectable. |Kemble>[You should know; you designed them]. The more data CONDOR has, the more effective it is. Obviously, the most interesting data is hidden behind passwords. I say this is worth the risk.
Amélie Tam
---
**To:** Amélie Tam
**From:** Roger Kemble
**Date:** 20 Jan 2017
Sooner or later, someone will find it if we use it too much. |Awkward>[Computers develop resistance to exploits in the same way that diseases develop resistance to antibiotics].
RK
---
**To:** Roger Kemble
**From:** Amélie Tam
**Date:** 20 Jan 2017
Dear Mr. Kemble,
With all due respect, what aren't you telling me?
Amélie Tam
---
**To:** Amélie Tam
**From:** Roger Kemble
**Date:** 20 Jan 2017
Amélie,
You misunderstand me. I am giving you a reason to not have CONDOR steal passwords. It's a good reason. |Personal>[Whether it's my personal reason is not open for discussion]. Drop this now. It's never going to happen. Grabbing passwords without a warrant is difficult, dangerous, and an invasion of privacy too far, even for the Agency. Thank you for your efforts on behalf of CONDOR; I am sorry that in this case they were misguided.
R. Kemble</span>
*Recommendation:* Password cracking is one of the Agency's most important tools. Do not give our enemies any more information about it than you have to. On the other hand, bear in mind that mass harvesting of passwords would be very unpopular. Do not imply that the Agency does such a thing.
(click:?Use)[(replace:?Use)[CENSORED] (set: $Doc6c1 to 1)](click:?Kemble)[(replace:?Kemble)[CENSORED] (set:$Doc6c2 to 1)](click:?Awkward)[(replace:?Awkward)[CENSORED] (set: $Doc6c3 to 1)](click:?Personal)[(replace:?Personal)[CENSORED] (set: $Doc6c4 to 1)]
[[Finished.|Feedback: Passwords]]**Emails on the Krull Subsystem**
**Declassification date: 24 Jan 2047**
**To:** Belinda Zhuang
**From:** John Marsden
**Date:** 24 Jan 2017
<span class="censored">Hi,
I've been thinking about the new threat analysis module. We could name it the Krull system? I know he isn't very popular here anymore, but he did make some important contributions early on. |Code>[I think we still use code he personally wrote for the IO manager]. What do you think?
John
---
**To:** John Marsden
**From:** Belinda Zhuang
**Date:** 24 Jan 2017
Dear John,
That sounds like a good idea. The only problem I can imagine is getting our superiors to agree. |Continuation>[There are still a lot of people here who were affected by what Krull said]. Agency bureaucrats are like bureaucrats everywhere: they don't like to be reminded of times when they were beaten.
B. Zhuang
---
**To:** Belinda Zhuang
**From:** John Marsden
**Date:** 24 Jan 2017
I don't think we'll have too much trouble. |Continuation>[Disaffected employees] are normal for any organisation. Just think about everything he built before his meltdown: |Contributions>[at least half the high-level architecture, most of the intelligent language processor, and the pizza appreciation society]. He was a good man, |Ambitious>[if ambitious and argumentative], and the bureaucrats know it.
John</span>
*Recommendation:* Ensure that civilian readers cannot use this to guess at the inner workings of our current surveillance systems. Many of them work similarly to CONDOR.
(click:?Code)[(replace:?Code)[CENSORED] (set: $Doc5c1 to 1)](click:?Continuation)[(replace:?Continuation)[CENSORED] (set:$Doc5c2 to 1)](click:?Contributions)[(replace:?Contributions)[CENSORED] (set: $Doc5c3 to 1)](click:?Ambitious)[(replace:?Ambitious)[CENSORED] (set: $Doc5c4 to 1)]
[[Finished.|Feedback: Krull]]The document is released.
(if:$Doc1c1+$Doc1c2+$Doc1c3+$Doc1c4 is 4)[(set: $Mistakes to 5)](else:)[(set: $Mistakes to (1-$Doc1c2)+$Doc1c4)]
(if:$Mistakes is 5)[Censoring too much makes the Agency look like it has something to hide.](else:)[(if:$Doc1c4 is 1)[While careful censorship is necessary, the Agency does not recommend completely altering the sense of a document.](else:)[(if:$Doc1c2 is 0)[Field agents should not be named, for their safety and yours.](else:)[Your censorship is considered effective.]]]
(if:$Mistakes > 1)[Your superiors feel you did not act in the best interests of the Agency.(set:$Standing to it - 1)](else:)[Your superiors are pleased with your work.(set:$Standing to it + 1)]
(if:$Standing > 1)[You are generally respected within the Agency.(set:$Standing to 2)](else-if:$Standing < -1)[You are viewed as either dangerous or incompetent. Within the Agency, these are the same.]
(if:$Standing < -2)[(set:$Standing to 0)The Agency cannot function with people like you. |Restart>[You are sent for re-training.]](else:)[[[A Brief Summary of the CONDOR System]]](click:?Restart)[(reload:)]The document is released.
(if:$Doc2c1+$Doc2c2+$Doc2c3+$Doc2c4 is 4)[(set: $Mistakes to 5)](else:)[(set: $Mistakes to (1-$Doc2c3)+(1-$Doc2c2)+$Doc2c1)]
(if:$Mistakes is 5)[Censoring too much makes the Agency look like it has something to hide.](else:)[(if:$Doc2c3 is 0)[The Agency does not recommend revealing statistics. These can easily be misused.](else:)[(if:$Doc2c2 is 0)[Do not reveal what the Agency does with captured data. That is a state secret.](else:)[(if:$Doc2c1 is 1)[Do not imply that the Agency engages in illegal activities.](else:)[Your censorship is considered effective.]]]]
(if:$Mistakes > 1)[Your superiors feel you did not act in the best interests of the Agency.(set:$Standing to it - 1)](else:)[Your superiors are pleased with your work.(set:$Standing to it + 1)]
(if:$Standing > 1)[You are generally respected within the Agency.(set:$Standing to 2)](else-if:$Standing < -1)[You are viewed as either dangerous or incompetent. Within the Agency, these are the same.]
(if:$Standing < -2)[(set:$Standing to 0)The Agency cannot function with people like you. |Restart>[You are sent for re-training.]](else:)[[[The JFK Incident: A Case Study]]](click:?Restart)[(reload:)]The document is released.
(if:$Doc3c1+$Doc3c2+$Doc3c3+$Doc3c4 is 4)[(set: $Mistakes to 5)](else:)[(set: $Mistakes to 0.5*(1-$Doc3c2)+0.5*(1-$Doc3c3)+(1-$Doc3c4))]
(if:$Mistakes is 5)[Censoring too much makes the Agency look like it has something to hide.](else:)[(if:$Doc3c4 is 0)[Do not imply that the Agency engages in or condones illegal activities.](else:)[(if:(min:$Doc3c2, $Doc3c3) is 0)[Do not discuss Agency surveillance techniques in detail. Declassified documents will be read by our enemies.](else:)[Your censorship is considered effective.]]]
(if:$Mistakes > 1)[Your superiors feel you did not act in the best interests of the Agency.(set:$Standing to it - 1)](else:)[Your superiors are pleased with your work.(set:$Standing to it + 1)]
(if:$Standing > 1)[You are generally respected within the Agency.(set:$Standing to 2)](else-if:$Standing < -1)[You are viewed as either dangerous or incompetent. Within the Agency, these are the same.]
(if:$Standing < -2)[(set:$Standing to 0)The Agency cannot function with people like you. |Restart>[You are sent for re-training.]](else:)[[[Nothing to censor today]]](click:?Restart)[(reload:)]The document is released.
Your censorship is considered effective.
Your superiors are pleased with your work.(set:$Standing to it + 1)
(if:$Standing > 1)[You are generally respected within the Agency.(set:$Standing to 2)](else-if:$Standing < -1)[You are viewed as either dangerous or incompetent. Within the Agency, these are the same.]
[[Emails on the Krull Subsystem]]<!-- No need to have logic about being sent for re-training here, since there is no way to do badly censoring this document. Comic relief FTW! -->The document is released.
(if:$Doc5c1+$Doc5c2+$Doc5c3+$Doc5c4 is 4)[(set: $Mistakes to 5)](else:)[(set: $Mistakes to (1-$Doc5c1) + (1-$Doc5c3))]
(if:$Mistakes is 5)[Censoring too much makes the Agency look like it has something to hide.](else:)[(if:(min:$Doc5c1, $Doc5c3) is 0)[The Agency recommends that you do not release details of who was responsible for which individual parts of a project. Retired Agency members are still a security risk.](else:)[Your censorship is considered effective.]]
(if:$Mistakes > 1)[Your superiors feel you did not act in the best interests of the Agency.(set:$Standing to it - 1)](else:)[Your superiors are pleased with your work.(set:$Standing to it + 1)]
(if:$Standing > 1)[You are generally respected within the Agency.(set:$Standing to 2)](else-if:$Standing < -1)[You are viewed as either dangerous or incompetent. Within the Agency, these are the same.]
(if:$Standing < -2)[(set:$Standing to 0)The Agency cannot function with people like you. |Restart>[You are sent for re-training.]](else:)[[[Emails on CONDOR Password Cracking]]](click:?Restart)[(reload:)]The document is released.
(if:$Doc6c1+$Doc6c2+$Doc6c3+$Doc6c4 is 4)[(set: $Mistakes to 5)](else:)[(set: $Mistakes to (1-$Doc6c2) + $Doc6c1 + (1-$Doc6c3))]
(if:$Mistakes is 5)[Censoring too much makes the Agency look like it has something to hide.](else:)[(if:$Doc6c2 is 0)[The Agency recommends that you do not release details of who was responsible for which individual parts of a project. Retired Agency members are still a security risk.](else:)[(if:$Doc6c1 is 1)[Do not remove phrases which improve the image of the Agency.](else:)[(if:$Doc6c3 is 0)[The Agency recommends that you censor awkward phrases, especially ones that could imply a disregard for personal privacy.](else:)[Your censorship is considered effective.]]]]
(if:$Mistakes > 1)[Your superiors feel you did not act in the best interests of the Agency.(set:$Standing to it - 1)](else:)[Your superiors are pleased with your work.(set:$Standing to it + 1)]
(if:$Standing > 1)[You are generally respected within the Agency.(set:$Standing to 2)](else-if:$Standing < -1)[You are viewed as either dangerous or incompetent. Within the Agency, these are the same.]
(if:$Standing < -2)[(set:$Standing to 0)The Agency cannot function with people like you. |Restart>[You are sent for re-training.]](else:)[[[A meeting]]](click:?Restart)[(reload:)]Black Marker is the result of a meditation on censorship. There are four different endings, of which two may reasonably be counted as win states; if you're having trouble finding them, try being more or less radical at various points.
I've tried to portray censorship in an ambiguous, if not positive, light. I would agree that it is often a danger and that citizens in general should know more about the workings of their governments than they do, but full transparency would ruin a state. Winning wars is impossible if the enemy can file a Freedom of Information Act request for your latest tactics.
Halfway through the development process, I became aware of Blackbar, another game about censorship. It's essentially Black Marker from the point of view of everyone who's actually reading these censored documents.
Thanks to my beta testers. Thanks to Jason McIntosh for organising the IFComp, and to the Interactive Fiction Technology Foundation for running it. Thanks to my family for being tolerant while I put this together. Finally, thanks to the excellent people who made Twine and, in particular, Harlowe. Outside of “Beginning Twine” tutorials, I haven't heard loads about Twine file formats. I found Harlowe a joy to work in and I'm very grateful to Leon Arnott.
[[Back|Epigraph]]