Something Simple

The other day I was comparing the notes I store in OneNote to the notes I had stored in Evernote when I was a heavy Evernote user, ampoule and in the process I unearthed a frightening amount of design documents I had put together for a project that I called MetaPunk.

MetaPunk was supposed to be a cyberpunk RPG built with MetaPlace, Raph Koster’s online game-slash-virtual-world construction system. I was a heavy user of the alpha/beta at the time (disclosure: heavy enough that they flew me and several other users out to San Diego to meet the team), and I really wanted to use the system to create this cyberpunk RPG. But it came to pass that my ambition exceeded my ability — no, really! — and I didn’t get very far before MetaPlace shut down.

But the dream lived on! My next plan was to make it a web game, but not in the same form as it would have appeared in using MetaPlace. This was to be more of a static affair, a kind of stateless “BBS door game” async multiplayer affair. I had created a tool that allowed me to upload an image, and then to drag regions on the image to build a map so users could click on the map to indicate where they wanted to travel to. Things would happen. And stuff. But after a time I got distracted — no, really! — and everything was archived and put away.

Fast forward four years to when I re-discovered my notes from this web-version of MetaPunk. I can’t remember where I put the archived code for the work I had done on the web version, but I’m not sure that it’s relevant now. Now I have a hammer — Unity, of course — and these design documents look suspiciously like a nail. I had done a lot of work coming up with systems and explanations and data structures that there’s enough there to get coding something.

But, this post is entitled “Something Simple”, which isn’t the image that the words “cyberpunk RPG in Unity” conjurers. I’m not thinking of a third, first, or isometric person game; I’m still thinking of keeping it close to the design of the web version. That would make it a “Choose Your Own Adventure on steroids” kind of thing: you’d be working to further your agendas, but with a less “active” interface. A cursory consideration leads me to believe that I could do the whole thing just by using UI elements in 2D, although I’d have to test that. At my most ambitious, we’d be looking at something with a 3D map of the city, with…other stuff. I don’t know. That idea just came to me as I was writing this.

So throw this log on my unfinished project pile. I’ll do some exploration to see what I can reasonably pull off, especially since some of the background work has been written down and previously tested. As always, no promises.

Brokers: Moving Data

Brokers move data. Most of the data is stolen, healing although they also move “data with intent”: information about future events and plans.

The broker system is designed around trust, this site which is inherently difficult to understand about a system that moves ill gotten gains. At it’s core is a network of people who move data obtained by independent contractors — mercenaries — into the possession of people who want to buy that data.

Data comes to the brokers in one of two ways:

  1. A client approaches a broker and wants to hire a team to obtain very specific data from a very specific source.
  2. An independent team has already completed a run and has data to sell.

Case 1:

Clients (corporations, usually, but also crime families and even individuals) will contact a broker that they know about and will put in a request for a job. They’ll provide information to the broker that’s needed to complete the assignment: the target, any specific information the mercenaries will need to know in order to find what is being sought, etc.

The broker almost always gives the same line: “let me put my feelers out and see what I can find.”

They will then use their extensive knowledge of the “mercenary scene” to assemble a team that has what they believe to be the best skills for the job. They will contact those people (or alternates if those people are unavailable, working, or dead) and finally determine a fee based on the team’s understanding of a non-specific overview of the job.

The broker then contacts the client with the fee, and if accepted, the team engages in the run.

Upon completion, the data is placed into an encrypted online bucket. The client is notified and deposits the money into another encrypted online bucket. This bucket distributes the money to the (remaining) participants, including the broker. Once all of these pieces are in place, all of the buckets unlock: the client receives the data, and the broker and the team receive their payments.

Case 2:

An existing team, bored, makes “smash and grab” runs against random corporate targets. They score some data, and approach the broker in order to sell it.

Brokers convene through a darknet connection. The identities of each broker in this connection is anonymous, even though the brokers no doubt know one another in real life. Each broker who has data for sale lists the goods, and the group decides on the relative value.

All unclaimed goods are placed on the Board, a public darknet that teams and corporations can use to browse what is up for sale. The Board does not provide WHICH BROKER has the data or which team provides it.

Interested buyers can put in bids for the data for a certain amount of time. Once the highest bidder is identified (anonymously), the secure bucket delivery service is invoked and everyone is paid.

The system works for several reasons:

  1. Brokers are known, so as to be approachable
  2. Brokers take no sides. They do not work for corporations, nor do they work for mercenaries. They only bring the two together, and act as a go-between when goods need to transfer hands.
  3. Brokers are not to be messed with. Taking on one broker takes on ALL brokers, and blacklists the individual or client (or anyone associated with the client) for varying periods of time, based on the offense.
  4. All those who approach the brokers are considered equals.
  5. Parties remain anonymous when dealing with one another, including the brokers when it comes time to transfer the data.

Exceptional Situations:

Often times the first party to approach a broker about “random data” — data being sold by non-contracted teams — will be the target from whom the data was stolen. Many corporations will make overtures to their favored broker (or sometimes all the ones they know about) to simply buy out the data at exorbitant prices in a bid to get the data back and prevent it from falling into the hands of their competition.

Brokers almost never entertain these requests because it would put their impartiality into question. As a means to dissuade future attempts to “out broker” the broker, the starting bid will usually be set at whatever price the corporate representative quoted that they were willing to pay to buy out the data.

Brokering is not a job one decides to apply for. Brokers are almost always sociable centers of community which gives them access to thousands of people. They appear to work for the community because they approach mercenaries for work, and are often local business owners (because it allows them to centralize and receive local traffic in a single location).

Brokers who violate the trust of the community, or of the corporations, do not last long. Mercenaries will refuse to work for brokers who favor corporations, and even for those brokers who favor mercenaries over corporations because it shows that the broker is unable or unwilling to deal fairly within the working system. In the same vein, corporations may benefit from a favoring broker once, but will rarely have the same opportunity another time, as that broker will be run out of business due to a lack of supply.

The oddest statute of the broker community deals with the division of payout when a team member dies during the run. Early on, unscrupulous mercenaries might have purposefully killed a member or members of their own team once the run was complete in order to receive a larger portion of the payout. Also, some brokers had been caught hiring OTHER teams to kill the original team in order to keep the lion’s share of the payout for himself.

In order to combat this, the secure bucket system was put into play. It ensures that the client receives the goods, the broker receives his or her commission, and the team receives their payment. Any payment that would have gone to a member who is confirmed dead (through secure reports from the local morgues) is donated to the charity of the broker’s choice. It’s weird, but it works: since neither the broker nor the party will receive the dead member’s share, and since the secure buckets will only unlock once ALL of the agreed-upon participants have claimed their portion, there’s no reason for anyone to betray anyone for money.

Finally, brokers only deal in data; for physical goods, they will refer the potential client or provider to the black market, which they have no ties to.

Welch Network Equipment and the VInE

The largest single corporate entity in the world is Welch Network Equipment. Although the name sounds rather bland, stuff this single entity occupies a unique niche in the late 21st century world.

When the US closed its borders, the Internet was in peril. Because it covered the world, but because its governing body was headquartered in the US, a series of meetings were held to figure out what to do about the global network. It was decided that the Internet would remain as is, but with increased restrictions on general traffic into and out of the US. The governing body, however, would remain impartial and accessible to all nations. The rest of the world wasn’t happy about this convenient exception to US isolationist policy, but short of creating their own parallel network — which would result in confusion, conflict, and years worth of downtime and conflicting protocols — the world reluctantly agreed.

During the period of isolation, corporations used the Internet to keep up with the world affairs that the general population was denied. Corporations also heavily utilized the network for their own purposes. This resulted in two things: increased and better security, and more bandwidth. Bring the primary users of the Internet, and because corporations were concerned about favoritism from network providers, it was agreed (behind the “Star Spangled Curtain”, the world adopted name for US isolationist policy) that control over the Internet should be interred with a single, neutral corporate entity.

The responsibility for this task was given to Samantha Welch, the current head of the ICANN. She and her task force were given broad leeway to create a new self-sustaining, for-profit corporation that would administer the Internet and its infrastructure. Although many saw this as a potential conflict of interest — the Internet was meant to be free of meddling, and a single controlling entity meant monopoly — the only mandate that Welch had was that the resulting structure must provide equal access to everyone around the world. There would be no priority, no degradation, no second or third class access or infrastructure. In order for all corporations to use the Internet, no one corporation could be given more access than any other.

Welch created Welch Networking Equipment and took over the core name servers. With a cash infusion from all major corporations, Welch’s R&D department worked tirelessly to create a new, high-speed class of data routers, modems, firewalls, and switches. They also hired thousands of employees and began the daunting task of upgrading the US network to the latest transmission technology all the way from the network operations centers to the point of termination at the jack where the computing device plugged into the wall.

In an effort to get the rest of the world on board with the upgrade, Welch issued and ultimatum: upgrade your hardware and infrastructure at your own expense, or you’ll be cut off. Some countries thumbed their noses at the mandate, and Welch made good on her promise. Those who scrambled to upgrade were helped along by WNE, and were back on-line as quickly as they could perform the work. The few rogue countries which turned their back on the proposal attempted to recreate their isolated segments of the Internet, with varying success.

The end result was a much faster, more modular, easily upgradable network. It was dubbed “Internet 2.0”, and the world enjoyed faster speeds and more universal access for several years.

As the corporations grew, the original estimates for bandwidth usage seemed overly optimistic. Welch and her team needed to open the floodgates and deploy a technology that had virtually no limit to the amount of data that could be passed. Understanding that the speed of the data transmission had a hand in how much data could be moved through a connection, a freak breakthrough in a fringe technology — quantum entanglement — yielded one of humanity’s greatest discoveries, and that discovery lead to near instant data transmissions through regional hubs.

This was “Internet 3.0”.

Most everyone still connected to the Internet via mobile, tablet, or stationary devices, but working in concert with North Point Biometrics, WNE began experimenting with neural interfaces, citing the “BKAC” — Between Keyboard and Chair — to be the last, limiting factor that slows down the transmission of data. NPB and WNE’s research resulted in “direct neural hijacking”. These implants allowed a user to plug in directly to the Internet to see, hear, and feel data being transmitted.

As this technology improved, became safer, and production and ease of implantation dropped in price to the point where its adoption was a viable option for most citizens, corporations salivated at the idea of being able to pump data directly into people’s field of vision or to pipe jingles into their auditory nerves. But visionaries took it one step further and created the VInE: the Virtual Internetworked Environment. With increased bandwidth and ever increasing processing power, corporations were able to host virtual realities that people could inhabit when jacked into the VInE, complete with a full sensory experience and biofeedback.

Citing its mandate as the controller of all things Internet, WNE took over the operation of the VInE. Previously, its revenue stream was built on selling access, but with the implants allowing people to connect to the VInE wherever they went, WNE needed to supplement their income with an ingenious strategy of “virtual real estate”. Since every device connected to the Internet also had a unique address in the VInE, each connected device — a single location in the virtual environment — was taxed. WNE also rented advertising space, and corporations fell over one another in a bid to buy up what they could. Soon, WNE became the singular, most wealthy corporation on the planet.

Still, WNE’s mandate of neutrality meant that they could never favor one entity over another, nor could they restrict any traffic through it’s network. To this day, WNE remains aloof from the usual inter-corporation feuds and crass commercialism that the corporations espouse. WNE isn’t afraid to leverage it’s position, however. If at any time WNE requires resources, leeway, or compliance, it receives it without question and without argument. Should the Internet and the VInE go dark, the world would descend into chaos.

Arcologies and Orbitals

In the mid 21st century, sickness the US had closed its borders to the world after decades of international fatigue. While the rest of the world was both elated and frightened to see the US abdicating it’s duty to the planet in favor of pure protectionism, the people of the US felt tired of being both requested and reviled in equal measure.

During this period of isolation, corporations based within the US took a stronger lead than they had previously accepted. With the need for the country to be almost 100% self sufficient, the federal, state, and local governments alone couldn’t handle the needs of it’s citizens. With deep pockets and vast resources, many corporates stood up and began diversifying their goods and services to meet the needs of the population.

In the course of this activity, corporations saw ways to subvert the government to become premier players in the lives of US citizens. They were providing the things that the people needed, not the government, and corporations found that they could shift public perception in their favor simply through the adjustment of supply and demand. At first, many corporations overplayed their hand and were take aback by the public blowback in response to their overt attempts at manipulation of public opinion, but most corporations quickly mastered the art of advanced public relations in the 21st century to rally the population behind them and their agendas.

Feeling stretched thin by the scare continental resources, corporations began to consolidate their workforce into regional centers. The early “arcologies” were mostly constructs of convenience. Much like San Franciso or Austin in the early 21st century, companies began to relocate far-flung offices to ring their corporate HQ. This kept their employees close at hand, but also allowed them to dominate the region surrounding their corporate offices which they used to their advantage in influencing local and regional policies through economic power.

As regional control grew, it began to clash with other corporations. In order to solve this, decisions were made to move HQs to more open, currently less populated areas that could be developed totally for the needs of the company. Montana and South Dakota were popular for the first waves of corporations, but eventually as the distance between the entities grew, populated hubs were taken over and rebuilt for corporate purposes.

These new mega-cities — the current arcologies — were self-contained city-states that housed the corporate offices, but also provided their employees with housing, recreational and cultural facilities, schools, restaurants, shopping malls, and other venues that were built so that no one had to leave the corporate campus for anything. People were allowed to do so, of course, but few saw any reason to do so outside of visiting distant friends or relatives, or taking vacations to the “common zones” that were not under corporate control.

Despite their size, their number, and their reach, arcologies could not house everyone in the country. Many millions of people would not or could not work for these corporations, and therefor found themselves relegated to the existing cities that ringed the shiny new arcologies. In the slang of condescending corporate citizens, these cities were nicknamed “orbitals”, since they were hangers-on that orbited the arcologies good fortune and existed only because of the gravitational pull of the new upper class.

People who lived in the orbital cities were a mix of anti-corporate revolutionaries, self-made business people who refused to submit to bland corporate white-washing, and immigrants and forgotten people who had no chance of ever moving up into the arcologies even if they wanted to.

Although corporations focus their energies on maintaining the arcologies, their revenue actually comes mostly from the orbitals. In the late 21st century, the corporations forced a weakened US government to re-open the borders, and sent out emissaries to other nations to establish trade routes and outpost offices, manufacturing, and distribution centers. Over time, arcologies were built on other continents by US companies and by foreign companies that wanted to mimic the success and fanatical loyalty of a workforce that depended on them for everything in their lives. Still, the people living in the orbitals vastly outnumbered those who lived and worked in the arcologies, meaning that the corporations had to tailor their marketing strategies and their products for a class of citizen that was socially and economically far beneath their own experiences. This resulted in major reforms to privacy protection disguised as market research, strong-arm tactics to revise consumer protection laws, and a loosening of advertising restrictions that resulted in corporations being allowed to track and monitor their consumers, charge outrageous prices for questionable merchandise, and to market to all people in any way that saw the best results.

As the influence grew, corporations once again began to butt heads, this time more economically than physically. Demographic targets were many, but not infinite, and while corporations felt that their attempts to put on a reassuring face for their consumers was of paramount importance in building the trust, they had no such compulsion when dealing with each other. Corporations soon began building their own security forces, first to protect their assets, but eventually to conduct raids against their competition in a bid to undermine their projects, obtain their research, and even to poach promising researchers and development staff that opposing corporations did not want to lose. The corporations went to great lengths to keep these battles from spilling into the public sector, but it’s a poorly kept secret. Most of the public agrees that for entities as large as these corporations, powerful security is needed to ensure economic competitiveness and therefor look the other way, but on occasion there’s concern that corporations are enjoying too much power inside the country. Usually, corporations tamp down on these situations with sales and new products, and the populations is once again lulled into a consumerist coma.

No Hard Feelings — Social Responsibility Among Guns For Hire

“No hard feelings”

Among freelance soldiers (”solos”), medical there’s a code of ethics that have been agreed upon due to their peculiar working conditions.

Solos generally work, medical as their designation implies, health alone. It’s not uncommon for these soldiers to work together as a pair, or as a group, but it’s generally frowned upon as forming bonds with other soldiers can lead to the code coming unraveled.

Any soldier can be guaranteed to work with a rotating party of other soldiers from the employment pool with every job they’re hired for. Working alone, a soldier cannot get hung up on past grudges that might interfere with future working conditions.

Because of this, soldiers who work with a partner or group run the risk of losing their partner or a member of their group to opposing soldiers for hire. Later, should that soldier find himself paired with a soldier who killed their partner or member of their group, it would negatively affect the cohesion of their team. Worse, if such a vendetta were in effect and were to become known, it could jeopardize a soldier’s job opportunities in the future, as the community might refuse to work with that soldier knowing that doing so could jeopardize their OWN employability.

Because of this, soldiers have been known to frequent the same few locations during their down time in order to maintain this policy of “no hard feelings”. While off-duty, confrontations over previous jobs are frowned upon, but happen. Many times other soldiers will intervene if they see two or more soldiers attempting to violently resolve past grudges, knowing that any soldier who ends up in a group with one or both of these soldiers is putting him or herself in danger.

Soldiers therefor work very hard to either remain on good personal footing with each other, or to at least remain civilized when in each other’s presence, or have trained themselves to put logic and business ahead of interpersonal relationships which allows them to maintain an ongoing partnership within the context of understanding that should either one of them be taken out by another opposing soldier, they can’t seek revenge. This sometimes takes the form of pacts of oaths among partners or groups where all members agree that it’s all business; they are all in the same job for the same reasons and assume the same risks knowingly and without coercion, and that the survivability of those left behind relies upon maintaining “good standing” with the solo community.

People are people, however, and grudges usually take the form of competitions rather than vendettas. It’s not uncommon for solos to be cool and standoffish to one another when “off the clock”, but extra-violent and determined to exact vengeance should they find themselves on opposite sides of a job.

New solos are usually given more leeway than established solos. A new solo will generally be left alone, or the last to die, if he or she knows when they have lost the engagement. Later, a more established solo might take the new soldier under his wing to explain the mistakes she or her partners made so as to avoid making those same mistakes later on. A new solo is usually given two or three encounters before the training wheels come off and the soldier is responsible for her own actions and her own fate.

With “no hard feelings” comes the general rule that previous engagements are not discussed. If one team is tasked with protecting a resource in transit, while another team is tasked with stealing that resource, surviving members of the losing team are not allowed to ask about the resulting outcome. This is because it’s never known when the solo is “off the clock” and when she’s just laying low while still being paid to salvage a previously failed mission.

In that vein, solo contracts with employers are very heavily enforced, even with corporations. Because of the professional courtesy that solos share, screwing over one soldier can lead to blacklisting of employers throughout the community. It’s also why solos insist on strict parameters of their mission, which end when one side achieves the goal, or prevents the other side from achieving their goal. The job is done once the players exit the field, and no employer would risk access to the community for incremental gains.

Of course, some solos refuse to play by these rules. They do not associate with the greater community, and prefer to work within their own clique. Hiring one solider hires their group, and even when off the clock these soldiers will seek revenge against other soldiers. Usually the slight against them need to reach a specific plateau, however; simply besting them on a run isn’t enough. It usually requires something along the lines of eradicating their team, or focusing more on decimating the team than they do on securing the hired goals.

Finally, it’s considered bad form to take out aggressions on a solo’s friends, family, or other relations. It’s seen as violating the community trust, and a cowardly way to exact revenge. In cases like this, the community will usually police it’s own, to the extreme, as the perpetrator is seen as a loose cannon who cannot be trusted personally or professionally.

Goals by Strata in Society

The people in the orbitals are basically lower class citizens socially and economically. The majority of them have no agenda strong enough to drive them, sales so they’ll consume corporate content as readily as anything. They enjoy and talk about corporate TV and tabloids, watch corporate sponsored sports, and obsess over corporate products.

Not all orbitals are alike. Some are fairly affluent, some are lower middle class, but the majority are lower class. Affluent by orbital standards means having a somewhat effective police presence, relative safety in neighborhoods, and single family dwellings, either stand-alone or in high-rises. Lower middle class neighborhoods have a police presence, but it’s often times corrupt and self serving. Things are generally OK during the day, but at dusk it’s dangerous to be outside. Lower class neighborhoods are places where you don’t want to be at all unless you’re a known quantity there. Strangers are instant targets, and there’s almost no police presence unless it’s in full riot gear. Families usually live in dilapidated tenements, sometimes several families to an apartment.

The general goal in the orbitals is safety. The better the neighborhood, though, the more the goals make way for luxuries. Upper class orbitals can think about the latest gadgets and fashions and vacations. The middle class can maybe think about one non-essential purchase per year, per person. Lower class families rarely ever get any luxuries that aren’t stolen.

To make money, the upper class owns small businesses or are lawyers and doctors. Middle class folks work for the upper class folks, and the two strata generally work together well to hold on to what they have, and attempt to become more successful together. The lower class may also work for the upper class, but in a lower capacity such as sanitation or delivery services.

In light of this, the upper class is accepting of the corporate dominance, but believes that there’s room for all sizes of business. Corporations are generic in that they need to reach as many people as they can, while those closer to their communities can provide tailored services. They can also provide services that the corporations don’t bother with, like dry cleaning or mechanic services. The middle class generally are OK with the corporate influence, but are a tad bit more wary. They’re willing to support their local businesses because they have some level of influence over their professional destiny, and see themselves as superior to the white-washed corporate lockstep. The lower class either doesn’t speak the language, isn’t educated enough, or has an overriding distrust of any kind of authority. They prefer to make their own, individual way, which usually means that crime is the only outlet they’re qualified for.

Because of this, the upper and middle classes generally distrust the lower class, and the lower class pretty much as a rule distrusts everyone above them.

Some of the middle and almost all of the lower class have four options for surviving: crime, join the US military, join the corporations in some capacity, or become a soldier for hire.

Crime is the easiest to get into, but the most difficult to get out of (alive). Crime can run the gamut from petty theft to drugs, and all the way from individuals looking for a quick score to organized crime. Most lower and some middle strata citizens start here. In the lower strata orbitals, citizens can’t get away from crime, as it’s either happening TO them, or it’s only one friend away from being accessible at almost any point in time where money is needed. Successful criminals who manage to avoid pissing off the wrong people and who excel at their craft may be picked up by professional crime families or organized street gangs and can actually make a decent living.

The military is an option of last resort. The US military is underfunded and overburdened. It’s a PR tool used by the government to show that they have a strong presence where it’s needed the most. In reality, the forces sent to far-flung regions have low morale, incompetent leaders, and a lack of funding that lead to shortages of everything from rations to armor to ammo. While the government will compensate it’s soldiers, the life of someone in the military is usually short and extremely dangerous. Many soldiers opt to do as little work as possible until they either muster out with a pension, or find a palatable opportunity to defect to the side of opponents who are almost always better funded and more supplied. Beyond the military, few lower strata citizens could pass the most rudimentary corporate application exam for a desk job or a job in public utilities.

Corporations field their own military, in addition to police forces that deal exclusively within their arcologies. Corporations are far more picky about who they take, however, as they need to ensure loyalty and competency for their military. These soldiers are often tasked with black ops, including assassination of opposing corporate figures, extraction of sensitive resources, and defense of corporate property from similar strike teams fielded by other corporations. Among all corporate branches, the military arms are the ones that value the ability for self-sufficiency as the stakes are much higher and the tension is much thicker than in their cubicle farms. Also, their eCorps — the VInE hackers — need to be intelligent and well educated. Most lower strata citizens do not qualify for corporate military or police service.

Soldiering for hire is by far the most attractive option for discerning lower and lower-middle class citizens. It allows the individual to make his or her own rules, work his or her own hours, and determine the workload based on his or her own moral and financial concerns. They work for local concerns — crime bosses, street gangs, individuals with money or convincing enough sob stories — and sometimes for corporations who need an off-grid force to handle an off-grid operation where accountability needs as many layers as possible between the op and the beneficiaries.

The real goal, regardless of strata or avenue, is to build into a comfortable life. While almost anyone can go to work for the corporations and be given a comfortable life in exchange for corporate fealty and all that it entails — mainly a loss of privacy and freedoms — upper, middle, and lower class citizens value the ability for self-determination and, if they’re lucky, the ability to some day “retire” in a manner that will have made their travails worthwhile. It’s fairly easy for the upper strata as they’re reaping the lion’s share of financial security. The middle strata needs to work harder for it, but it’s not impossible. The lower class is rarely ever able to break free of it’s circumstances, though. Most criminals are killed, most of those who enter the military are killed or vanish in the wilds of another country, corporate soldiers are bound by corporate rules, leaving only the guns for hire as the lowest strata’s best option for getting out alive. It’s never a guarantee, but being able to take one’s destiny into one’s own hands gives slightly better odds than any of the other options.

Corporate Guide To Social Media And Complacent Hashtivism

Here’s the first entry under the Writing category. It’s also a “working example” of the kind of post I’ll be putting under this category. 

In this case, ampoule I’m starting out with a description of something. Here, more about it’s social media and one way that it’s used. Because this is filed under the “Cyberpunk” subcategory, the second half is how this modern system is or could be used in the future, written almost in a “handbook of social media dos and don’ts from highly effective corporations” style. 

Again, this isn’t an endorsement or a condemnation of practices, but rather an interpretation of how — in this case — social media might evolve, from the perspective of a cyberpunk universe.

Social Media Now

One of the supposed benefits of social media is that it allows people to address entities larger then them, but also to aggregate their telepresence for a cause. Social media has given individuals the opportunity to broadcast their voices into a void, but to tie their posts together via links and hashtags so that what would otherwise be a single unheard voice merges together with thousands or millions of others in a show of force that is difficult to ignore.

Despite the various troubles that social media has (privacy concerns, pop culture irrelevance, harassment, etc), it is a democratic platform in both design and in purpose.

Social Media Later

The downside to this kind of hashtivism is that it’s only one step above doing nothing at all.

The history of organized movements dead-ended the day that the hashtag was born. Before our ability to reach everywhere on the back of a pound-symbol, human beings had to gather in public in order to make a significant statement. This ranged anywhere from peaceful sit-ins to unruly mobs, but getting on board for something required an effort, which meant that those who actually showed up were really serious about the situation.

Today, it takes almost zero effort to re-Tweet or to sign an online petition. It’s almost a throw-away action that can be done in less time than it takes for a commercial break. Anyone can claim themselves to be on-board with a movement if all it takes is no effort at all, but the best part is that everyone can see you doing it, thanks to the follows and re-Tweets that reach around the globe.

This is beneficial to concerned parties because a pile of Tweets does not an angry mob make, no matter how much sarcasm or profanity is involved. For a savvy organization, be it a corporation or a government,  proper management of hashtivism can make consumers and voters feel that they’re involved in a process by encouraging that they put as little effort into the process as possible.

There’s no guarantee that any hashtags or petitions actually reach anyone who is in any position to do anything about it, nor is there any reassurance that if the aggregated ire is seen by those who can act upon it, any action is taken. Managing the belief that “someone is listening” can be of great benefit to an organization or government because just having that perception that good is being done with a tap is enough to give people a “warm glow” that they’re helping without having to actually get involved with money or time.

The best way to do this is to ensure that the outcome of the campaign that hashtivists are aligning against is pre-determined, to provide a “honey-pot” campaign that ties up the efforts of organizers, or to simply inundate social media with so many false positives that their involvement becomes muddied and meaningless. In any case, the participants may either feel that they accomplished their goals, or they will simply “fire and forget their ire” as they return to their binge viewing and meme generation.