From 03068ae1e19881d7810746371c56cf7089e838d7 Mon Sep 17 00:00:00 2001 From: "Z. Cliffe Schreuders" Date: Wed, 14 Jan 2026 09:46:32 +0000 Subject: [PATCH] Compile m03_npc_victoria.ink to JSON - fix EXTERNAL syntax and divert error --- .../stages/stage_7/m03_npc_victoria.ink | 14 +++++++------- .../stages/stage_7/m03_npc_victoria.json | 1 + 2 files changed, 8 insertions(+), 7 deletions(-) create mode 100644 planning_notes/overall_story_plan/mission_initializations/m03_ghost_in_the_machine/stages/stage_7/m03_npc_victoria.json diff --git a/planning_notes/overall_story_plan/mission_initializations/m03_ghost_in_the_machine/stages/stage_7/m03_npc_victoria.ink b/planning_notes/overall_story_plan/mission_initializations/m03_ghost_in_the_machine/stages/stage_7/m03_npc_victoria.ink index ef639a9..039df4e 100644 --- a/planning_notes/overall_story_plan/mission_initializations/m03_ghost_in_the_machine/stages/stage_7/m03_npc_victoria.ink +++ b/planning_notes/overall_story_plan/mission_initializations/m03_ghost_in_the_machine/stages/stage_7/m03_npc_victoria.ink @@ -14,10 +14,10 @@ VAR topic_zero_day_philosophy = false VAR topic_free_market = false VAR topic_ethics = false VAR recruitment_discussed = false +VAR player_approach = "" -// External variables (from opening briefing) -EXTERNAL player_approach -EXTERNAL handler_trust +// External variables (from game) +EXTERNAL player_name() // =========================================== // INITIAL MEETING - Conference Room (Daytime) @@ -30,7 +30,7 @@ EXTERNAL handler_trust #display:victoria-professional [Victoria Sterling stands as you enter. Professional attire, confident bearing.] - Victoria: You must be {player_name}. Welcome to WhiteHat Security. + Victoria: You must be {player_name()}. Welcome to WhiteHat Security. Victoria: I'm Victoria Sterling, CEO. Have a seat. @@ -421,7 +421,7 @@ Victoria: I think that covers the basic philosophy. The training program starts Victoria: Feel free to look around the office if you'd like. Reception area, main hallway. Get a feel for the company culture. {victoria_trusts_player: - Victoria: And {player_name}? I think you'd fit in well here. We need more pragmatists. + Victoria: And {player_name()}? I think you'd fit in well here. We need more pragmatists. } Victoria: I have another meeting in a few minutes. But we'll be in touch. @@ -447,7 +447,7 @@ Victoria: Excuse me, I need to take this. #display:victoria-shocked -Victoria: {player_name}? What are you doing here at this hour? +Victoria: {player_name()}? What are you doing here at this hour? [She sees that you've clearly been investigating] @@ -476,7 +476,7 @@ Victoria: You have no authority here. This is a legitimate business. * [Show her the exploit catalog] You: [$12,500 for the hospital exploit. With a healthcare premium.] - -> show_evidence + -> moral_confrontation * [You sold weapons. People died.] You: You sold the tools that killed six people. That's not research, that's murder for profit. diff --git a/planning_notes/overall_story_plan/mission_initializations/m03_ghost_in_the_machine/stages/stage_7/m03_npc_victoria.json b/planning_notes/overall_story_plan/mission_initializations/m03_ghost_in_the_machine/stages/stage_7/m03_npc_victoria.json new file mode 100644 index 0000000..18c35a2 --- /dev/null +++ b/planning_notes/overall_story_plan/mission_initializations/m03_ghost_in_the_machine/stages/stage_7/m03_npc_victoria.json @@ -0,0 +1 @@ +{"inkVersion":21,"root":[[["done",{"#n":"g-0"}],null],"done",{"start":["#","^speaker:victoria_sterling","/#","ev",{"VAR?":"recruitment_discussed"},"!","/ev",[{"->":".^.b","c":true},{"b":["\n","#","^display:victoria-professional","/#","^[Victoria Sterling stands as you enter. Professional attire, confident bearing.]","\n","^Victoria: You must be ","ev",{"x()":"player_name"},"out","/ev","^. Welcome to WhiteHat Security.","\n","^Victoria: I'm Victoria Sterling, CEO. Have a seat.","\n","^[She gestures to the conference table.]","\n","ev",true,"/ev",{"VAR=":"recruitment_discussed","re":true},{"->":"first_impression"},{"->":"start.8"},null]}],"nop","\n","ev",{"VAR?":"recruitment_discussed"},{"VAR?":"rfid_clone_complete"},"!","&&","/ev",[{"->":".^.b","c":true},{"b":["\n","#","^display:victoria-neutral","/#","^Victoria: Back for more conversation?","\n",{"->":"hub"},{"->":"start.17"},null]}],"nop","\n","ev",{"VAR?":"rfid_clone_complete"},"/ev",[{"->":".^.b","c":true},{"b":["\n","#","^display:victoria-neutral","/#","^Victoria: We covered the main points. I'll be in touch about the training program.","\n","#","^exit_conversation","/#","done",{"->":"start.23"},null]}],"nop","\n",null],"first_impression":[["#","^speaker:victoria_sterling","/#","^Victoria: I reviewed your background. Freelance pen testing, some CTF competition work.","\n","^Victoria: Solid technical skills. But that's not why you're here.","\n","ev","str","^Why am I here?","/str","/ev",{"*":".^.c-0","flg":20},"ev","str","^I'm interested in advanced research","/str","/ev",{"*":".^.c-1","flg":20},"ev","str","^I heard Zero Day does interesting work","/str","/ev",{"*":".^.c-2","flg":20},{"c-0":["\n","^You: Why am I here, then?","\n","^Victoria: To see if you understand the philosophy behind real security research.","\n","ev",{"VAR?":"victoria_influence"},5,"+",{"VAR=":"victoria_influence","re":true},"/ev",{"->":"philosophy_intro"},{"#f":5}],"c-1":["\n","ev",{"VAR?":"victoria_influence"},10,"+",{"VAR=":"victoria_influence","re":true},"/ev","^You: I want to work on cutting-edge research. Real impact.","\n","^Victoria: \"Real impact.\" Good. Let's talk about what that means.","\n",{"->":"philosophy_intro"},{"#f":5}],"c-2":["\n","ev",{"VAR?":"victoria_influence"},5,"+",{"VAR=":"victoria_influence","re":true},"/ev","ev",{"VAR?":"victoria_suspicious"},5,"+",{"VAR=":"victoria_suspicious","re":true},"/ev","^You: I've heard Zero Day's training programs are... unconventional.","\n","^Victoria: [Slight pause] We push boundaries, yes. Let me explain our approach.","\n",{"->":"philosophy_intro"},{"#f":5}]}],null],"philosophy_intro":[["#","^speaker:victoria_sterling","/#","^Victoria: The traditional security model is broken. Researchers find vulnerabilities, report them to vendors, wait months for patches.","\n","^Victoria: Meanwhile, those same vulnerabilities get discovered by others. Sold on dark markets. Exploited.","\n","ev","str","^That's the responsible disclosure debate","/str","/ev",{"*":".^.c-0","flg":20},"ev","str","^Researchers deserve to be paid","/str","/ev",{"*":".^.c-1","flg":20},"ev","str","^Sounds like you sell vulnerabilities","/str","/ev",{"*":".^.c-2","flg":20},{"c-0":["\n","ev",{"VAR?":"victoria_influence"},10,"+",{"VAR=":"victoria_influence","re":true},"/ev","^You: The responsible disclosure versus full disclosure debate. Classic dilemma.","\n","^Victoria: Exactly. But there's a third option most won't discuss.","\n",{"->":"market_efficiency_pitch"},{"#f":5}],"c-1":["\n","ev",{"VAR?":"victoria_influence"},15,"+",{"VAR=":"victoria_influence","re":true},"/ev","^You: Researchers deserve compensation for their work. Fair pay for valuable discoveries.","\n","^Victoria: [Nods appreciatively] Finally, someone who gets it.","\n",{"->":"market_efficiency_pitch"},{"#f":5}],"c-2":["\n","ev",{"VAR?":"victoria_influence"},5,"-",{"VAR=":"victoria_influence","re":true},"/ev","ev",{"VAR?":"victoria_suspicious"},10,"+",{"VAR=":"victoria_suspicious","re":true},"/ev","^You: This sounds like you're advocating selling vulnerabilities.","\n","^Victoria: \"Selling\" is such a crude term. Think of it as market-driven research incentives.","\n",{"->":"market_efficiency_pitch"},{"#f":5}]}],null],"market_efficiency_pitch":["#","^speaker:victoria_sterling","/#","^Victoria: We provide liquidity to the vulnerability market.","\n","^Victoria: Every system tends toward disorder. That's thermodynamics - entropy is inevitable.","\n","^Victoria: The question isn't whether systems will fail. It's who benefits from that knowledge.","\n","ev",true,"/ev",{"VAR=":"topic_free_market","re":true},{"->":"hub"},null],"hub":[["ev","str","^Ask about Zero Day's mission","/str",{"VAR?":"topic_zero_day_philosophy"},"!","/ev",{"*":".^.c-0","flg":5},"ev","str","^Question the ethics","/str",{"VAR?":"topic_ethics"},"!","/ev",{"*":".^.c-1","flg":5},"ev","str","^Move closer to examine the whiteboard","/str",{"VAR?":"victoria_influence"},20,">=",{"VAR?":"rfid_clone_started"},"!","&&","/ev",{"*":".^.c-2","flg":5},"ev","str","^Continue the conversation (RFID cloning in progress)","/str",{"VAR?":"rfid_clone_started"},{"VAR?":"rfid_clone_complete"},"!","&&","/ev",{"*":".^.c-3","flg":5},"ev","str","^End the conversation","/str","/ev",{"*":".^.c-4","flg":4},{"c-0":["\n",{"->":"zero_day_philosophy"},null],"c-1":["\n",{"->":"ethics_discussion"},null],"c-2":["\n",{"->":"clone_rfid_opportunity"},null],"c-3":["\n",{"->":"clone_rfid_distraction"},null],"c-4":["\n","#","^exit_conversation","/#","#","^speaker:victoria_sterling","/#","ev",{"VAR?":"victoria_influence"},30,">=","/ev",[{"->":".^.b","c":true},{"b":["\n","^Victoria: I think you'd be a good fit for our training program. I'll be in touch.","\n","ev",true,"/ev",{"VAR=":"victoria_trusts_player","re":true},{"->":".^.^.^.13"},null]}],"nop","\n","ev",{"VAR?":"victoria_influence"},30,"<",{"VAR?":"victoria_influence"},10,">=","&&","/ev",[{"->":".^.b","c":true},{"b":["\n","^Victoria: We'll review your application. Thank you for your time.","\n",{"->":".^.^.^.25"},null]}],"nop","\n","ev",{"VAR?":"victoria_influence"},10,"<","/ev",[{"->":".^.b","c":true},{"b":["\n","^Victoria: I'm not sure you're the right fit for Zero Day's culture. We'll be in touch.","\n",{"->":".^.^.^.33"},null]}],"nop","\n","done",null]}],null],"zero_day_philosophy":[["#","^speaker:victoria_sterling","/#","ev",true,"/ev",{"VAR=":"topic_zero_day_philosophy","re":true},"^Victoria: Zero Day's mission is simple: recognize that vulnerability knowledge has inherent value.","\n","^Victoria: We discover, we price according to demand, we connect buyers with opportunities.","\n","ev","str","^What do buyers do with the exploits?","/str","/ev",{"*":".^.c-0","flg":20},"ev","str","^That sounds like willful ignorance","/str","/ev",{"*":".^.c-1","flg":20},"ev","str","^The free market argument","/str","/ev",{"*":".^.c-2","flg":20},{"c-0":["\n","^You: And what do the buyers do with these exploits?","\n","^Victoria: That's not our concern. We're security professionals, not moralists.","\n","^Victoria: A gun manufacturer isn't responsible for every shooting.","\n","ev",{"VAR?":"victoria_influence"},5,"+",{"VAR=":"victoria_influence","re":true},"/ev",{"->":"moral_rationalization"},{"#f":5}],"c-1":["\n","ev",{"VAR?":"victoria_influence"},10,"-",{"VAR=":"victoria_influence","re":true},"/ev","ev",{"VAR?":"victoria_suspicious"},10,"+",{"VAR=":"victoria_suspicious","re":true},"/ev","^You: \"Not our concern\"? That's willful ignorance of the consequences.","\n","^Victoria: [Slight defensiveness] It's recognizing the reality of how markets work.","\n",{"->":"moral_rationalization"},{"#f":5}],"c-2":["\n","ev",{"VAR?":"victoria_influence"},15,"+",{"VAR=":"victoria_influence","re":true},"/ev","^You: So you're applying free market principles to vulnerability research.","\n","^Victoria: [Smiles] Precisely. Supply and demand. Transparent economics.","\n",{"->":"moral_rationalization"},{"#f":5}]}],null],"moral_rationalization":["#","^speaker:victoria_sterling","/#","^Victoria: We live in a world where vulnerabilities exist whether we like it or not.","\n","^Victoria: Our choice isn't between exploit sales happening or not happening. They already happen.","\n","^Victoria: Our choice is whether security researchers get fairly compensated, or whether only criminals profit.","\n","ev",{"VAR?":"victoria_influence"},5,"+",{"VAR=":"victoria_influence","re":true},"/ev",{"->":"hub"},null],"ethics_discussion":[["#","^speaker:victoria_sterling","/#","ev",true,"/ev",{"VAR=":"topic_ethics","re":true},"^Victoria: Let me guess - you want to ask about the \"morality\" of selling exploits.","\n","^Victoria: Go ahead. I've heard every argument.","\n","ev","str","^What about innocent people getting hurt?","/str","/ev",{"*":".^.c-0","flg":20},"ev","str","^There's a difference between research and weaponization","/str","/ev",{"*":".^.c-1","flg":20},"ev","str","^I'm not here to judge","/str","/ev",{"*":".^.c-2","flg":20},{"c-0":["\n","ev",{"VAR?":"victoria_influence"},5,"-",{"VAR=":"victoria_influence","re":true},"/ev","^You: What about when exploits you sold hurt innocent people? Hospitals, critical infrastructure?","\n","^Victoria: [Measured response] That's on the buyer, not the researcher who discovered the vulnerability.","\n",{"->":"ethics_response_harm"},{"#f":5}],"c-1":["\n","ev",{"VAR?":"victoria_influence"},5,"+",{"VAR=":"victoria_influence","re":true},"/ev","^You: There's a line between security research and creating weapons. Where do you draw that line?","\n","^Victoria: Interesting question. Most people don't even acknowledge there is a line to discuss.","\n",{"->":"ethics_response_nuance"},{"#f":5}],"c-2":["\n","ev",{"VAR?":"victoria_influence"},15,"+",{"VAR=":"victoria_influence","re":true},"/ev","ev","str","^diplomatic","/str","/ev",{"VAR=":"player_approach","re":true},"^You: I'm not here to judge your business model. I'm here to understand it.","\n","^Victoria: [Genuinely pleased] That's refreshing. Most people lead with moral indignation.","\n",{"->":"ethics_response_pragmatic"},{"#f":5}]}],null],"ethics_response_harm":["#","^speaker:victoria_sterling","/#","^Victoria: Do you hold pharmaceutical companies responsible when someone overdoses on painkillers?","\n","^Victoria: Do you blame car manufacturers for drunk driving fatalities?","\n","^Victoria: Tools have utility. People choose how to use them.","\n","ev",{"VAR?":"victoria_influence"},5,"-",{"VAR=":"victoria_influence","re":true},"/ev",{"->":"hub"},null],"ethics_response_nuance":["#","^speaker:victoria_sterling","/#","^Victoria: The line is intent. We don't create exploits TO hurt people. We discover vulnerabilities that already exist.","\n","^Victoria: If someone uses a crowbar to break into a house, you don't blame the crowbar manufacturer.","\n","ev",{"VAR?":"victoria_influence"},10,"+",{"VAR=":"victoria_influence","re":true},"/ev",{"->":"hub"},null],"ethics_response_pragmatic":["#","^speaker:victoria_sterling","/#","^Victoria: Pragmatism. I appreciate that.","\n","^Victoria: The truth is, I sleep fine at night because I believe in information freedom.","\n","^Victoria: Vulnerabilities are facts about reality. Suppressing facts doesn't make anyone safer.","\n","ev",{"VAR?":"victoria_influence"},10,"+",{"VAR=":"victoria_influence","re":true},"/ev","ev",true,"/ev",{"VAR=":"victoria_trusts_player","re":true},{"->":"hub"},null],"clone_rfid_opportunity":["#","^speaker:victoria_sterling","/#","^[You stand and move toward the whiteboard, getting closer to Victoria.]","\n","^You: This network diagram - is this your training lab architecture?","\n","^Victoria: Yes, that's the 192.168.100.0 subnet. Students practice on isolated VMs.","\n","^[RFID CLONER ACTIVE - Stay within 2 meters for 10 seconds]","\n","^[Progress bar appears on screen]","\n","ev",true,"/ev",{"VAR=":"rfid_clone_started","re":true},"^You need to keep Victoria talking while the RFID cloner does its work.","\n",{"->":"clone_rfid_distraction"},null],"clone_rfid_distraction":[["#","^speaker:victoria_sterling","/#","^Victoria: The training network uses real vulnerable services. Much more effective than theoretical exercises.","\n","^[CLONING IN PROGRESS...]","\n","ev","str","^What services are in the lab?","/str","/ev",{"*":".^.c-0","flg":20},"ev","str","^How do students access it?","/str","/ev",{"*":".^.c-1","flg":20},"ev","str","^Impressive setup","/str","/ev",{"*":".^.c-2","flg":20},{"c-0":["\n","^You: What kind of services do you run in the lab environment?","\n","^Victoria: FTP, HTTP, some legacy services like distcc. Real-world targets.","\n",{"->":"clone_check_1"},{"#f":5}],"c-1":["\n","^You: How do students access the training network?","\n","^Victoria: VPN from the server room workstations. Keeps it air-gapped from the internet.","\n",{"->":"clone_check_1"},{"#f":5}],"c-2":["\n","^You: That's an impressive training environment. More realistic than most.","\n","ev",{"VAR?":"victoria_influence"},5,"+",{"VAR=":"victoria_influence","re":true},"/ev","^Victoria: We pride ourselves on authenticity. Real exploits, real scenarios.","\n",{"->":"clone_check_1"},{"#f":5}]}],null],"clone_check_1":[["#","^speaker:victoria_sterling","/#","^[CLONING 50% COMPLETE...]","\n","^Victoria: Of course, what students learn in the lab is just the beginning.","\n","^Victoria: Real Zero Day research requires understanding market dynamics, pricing models, buyer relationships.","\n","ev","str","^How do you price vulnerabilities?","/str","/ev",{"*":".^.c-0","flg":20},"ev","str","^That sounds complex","/str","/ev",{"*":".^.c-1","flg":20},"ev","str","^Who are your typical buyers?","/str","/ev",{"*":".^.c-2","flg":20},{"c-0":["\n","^You: How do you determine pricing for a zero-day vulnerability?","\n","^Victoria: CVSS score is the baseline. Then sector premiums based on defensive capacity.","\n",{"->":"clone_check_2"},{"#f":5}],"c-1":["\n","^You: That sounds more complex than pure technical work.","\n","^Victoria: Security research is as much economics as it is code. Most researchers don't grasp that.","\n","ev",{"VAR?":"victoria_influence"},5,"+",{"VAR=":"victoria_influence","re":true},"/ev",{"->":"clone_check_2"},{"#f":5}],"c-2":["\n","ev",{"VAR?":"victoria_suspicious"},5,"+",{"VAR=":"victoria_suspicious","re":true},"/ev","^You: Who typically buys from Zero Day?","\n","^Victoria: [Slight pause] Clients who need access to specialized research. I can't discuss specifics.","\n",{"->":"clone_check_2"},{"#f":5}]}],null],"clone_check_2":[["#","^speaker:victoria_sterling","/#","^[CLONING 75% COMPLETE...]","\n","^Victoria: You're asking good questions. Technical competence is common. Strategic thinking is rare.","\n","ev","str","^I believe in understanding the full picture","/str","/ev",{"*":".^.c-0","flg":20},"ev","str","^Stay focused on the whiteboard","/str","/ev",{"*":".^.c-1","flg":20},"ev","str","^Just a few more seconds...","/str","/ev",{"*":".^.c-2","flg":20},{"c-0":["\n","ev",{"VAR?":"victoria_influence"},10,"+",{"VAR=":"victoria_influence","re":true},"/ev","^You: Technical skills alone aren't enough. You need to understand the ecosystem.","\n","^Victoria: Exactly. That's why most security researchers stay poor while we thrive.","\n",{"->":"clone_complete"},{"#f":5}],"c-1":["\n","^[You pretend to study the network diagram]","\n","^You: This training lab must have taken significant investment.","\n","^Victoria: Worth every dollar. Our students become operational faster than any university program.","\n",{"->":"clone_complete"},{"#f":5}],"c-2":["\n","^[Keep her talking]","\n","^You: And the certifications - do you offer any formal credentials?","\n","^Victoria: We don't believe in traditional certifications. Results speak louder than paper.","\n",{"->":"clone_complete"},{"#f":5}]}],null],"clone_complete":[["#","^speaker:victoria_sterling","/#","^[CLONING 100% COMPLETE]","\n","^[Device vibrates subtly in your pocket]","\n","^[VICTORIA STERLING'S EXECUTIVE KEYCARD CLONED]","\n","^You step back from the whiteboard, creating distance naturally.","\n","#","^complete_task:clone_rfid_card","/#","#","^unlock_aim:network_recon","/#","#","^unlock_aim:gather_evidence","/#","ev",true,"/ev",{"VAR=":"rfid_clone_complete","re":true},"^Victoria: I think that covers the basic philosophy. The training program starts next month if you're interested.","\n","ev","str","^I'm very interested","/str","/ev",{"*":".^.c-0","flg":20},"ev","str","^I need to consider it","/str","/ev",{"*":".^.c-1","flg":20},"ev","str","^Thank you for your time","/str","/ev",{"*":".^.c-2","flg":20},{"c-0":["\n","ev",{"VAR?":"victoria_influence"},10,"+",{"VAR=":"victoria_influence","re":true},"/ev","^You: This is exactly the kind of work I've been looking for.","\n","^Victoria: Excellent. I'll have my assistant send you the enrollment details.","\n",{"->":"meeting_end"},{"#f":5}],"c-1":["\n","^You: Let me think it over. This is a significant decision.","\n","^Victoria: Of course. Take your time. Reach out when you've decided.","\n",{"->":"meeting_end"},{"#f":5}],"c-2":["\n","^You: I appreciate you taking the time to explain Zero Day's approach.","\n","^Victoria: My pleasure. It's rare to meet someone who actually wants to understand rather than judge.","\n","ev",{"VAR?":"victoria_influence"},5,"+",{"VAR=":"victoria_influence","re":true},"/ev",{"->":"meeting_end"},{"#f":5}]}],null],"meeting_end":["#","^speaker:victoria_sterling","/#","^Victoria: Feel free to look around the office if you'd like. Reception area, main hallway. Get a feel for the company culture.","\n","ev",{"VAR?":"victoria_trusts_player"},"/ev",[{"->":".^.b","c":true},{"b":["\n","^Victoria: And ","ev",{"x()":"player_name"},"out","/ev","^? I think you'd fit in well here. We need more pragmatists.","\n",{"->":".^.^.^.9"},null]}],"nop","\n","^Victoria: I have another meeting in a few minutes. But we'll be in touch.","\n","^[Victoria's phone buzzes. She glances at it.]","\n","^Victoria: Excuse me, I need to take this.","\n","#","^exit_conversation","/#","done",null],"nighttime_confrontation":[["#","^speaker:victoria_sterling","/#","^[Location: Victoria's Executive Office or Main Hallway]","\n","^[Time: Late night]","\n","#","^display:victoria-shocked","/#","^Victoria: ","ev",{"x()":"player_name"},"out","/ev","^? What are you doing here at this hour?","\n","^[She sees that you've clearly been investigating]","\n","^Victoria: You're not a recruit, are you.","\n","ev","str","^SAFETYNET agent. You're under investigation.","/str","/ev",{"*":".^.c-0","flg":20},"ev","str","^I know about St. Catherine's Hospital","/str","/ev",{"*":".^.c-1","flg":20},"ev","str","^You can help us take down The Architect","/str","/ev",{"*":".^.c-2","flg":20},{"c-0":["\n","^You: SAFETYNET. You're under investigation for exploit sales to ENTROPY cells.","\n",{"->":"confrontation_safetynet"},{"#f":5}],"c-1":["\n","^You: I know about St. Catherine's. The ProFTPD exploit. Six people died.","\n",{"->":"confrontation_hospital"},{"#f":5}],"c-2":["\n","^You: We know about The Architect. You can help us stop Phase 2.","\n",{"->":"confrontation_recruitment"},{"#f":5}]}],null],"confrontation_safetynet":[["#","^speaker:victoria_sterling","/#","#","^display:victoria-defensive","/#","^Victoria: SAFETYNET. Of course. The moral guardians of the status quo.","\n","^Victoria: You have no authority here. This is a legitimate business.","\n","ev","str","^Show her the exploit catalog","/str","/ev",{"*":".^.c-0","flg":20},"ev","str","^You sold weapons. People died.","/str","/ev",{"*":".^.c-1","flg":20},{"c-0":["\n","^You: [$12,500 for the hospital exploit. With a healthcare premium.]","\n",{"->":"moral_confrontation"},{"#f":5}],"c-1":["\n","^You: You sold the tools that killed six people. That's not research, that's murder for profit.","\n",{"->":"moral_confrontation"},{"#f":5}]}],null],"confrontation_hospital":[["#","^speaker:victoria_sterling","/#","#","^display:victoria-conflicted","/#","^Victoria: St. Catherine's... [pause] That was a buyer's deployment decision. Not our responsibility.","\n","ev","str","^You charged extra because they couldn't defend themselves","/str","/ev",{"*":".^.c-0","flg":20},"ev","str","^Six people in critical care. Two in surgery.","/str","/ev",{"*":".^.c-1","flg":20},{"c-0":["\n","^You: You charged a healthcare premium. Extra money because hospitals can't protect themselves.","\n","^Victoria: [Defensive] That's market pricing. Reflecting risk and value.","\n",{"->":"moral_confrontation"},{"#f":5}],"c-1":["\n","^You: Six people died when patient monitoring failed. Real people. Real deaths.","\n","^Victoria: [Visibly affected] I... we didn't deploy the ransomware. We just provided—","\n","^You: The weapon. You provided the weapon and took payment.","\n",{"->":"moral_confrontation"},{"#f":5}]}],null],"confrontation_recruitment":[["#","^speaker:victoria_sterling","/#","#","^display:victoria-calculating","/#","^Victoria: The Architect? [Pause] You found the directive, didn't you.","\n","^Victoria: Phase 2. Healthcare SCADA. Energy grid ICS.","\n","ev","str","^50,000 patient treatment delays. 1.2 million without power.","/str","/ev",{"*":".^.c-0","flg":20},"ev","str","^You can stop it. Become a double agent.","/str","/ev",{"*":".^.c-1","flg":20},{"c-0":["\n","^You: 50,000 patients. 1.2 million people without power in winter. That's genocide-scale harm.","\n","^Victoria: [Shaken] Those were projections. Theoretical maximums for pricing—","\n",{"->":"moral_confrontation"},{"#f":5}],"c-1":["\n","^You: You can stop Phase 2. Feed us intelligence. Become a double agent.","\n",{"->":"recruitment_pitch"},{"#f":5}]}],null],"moral_confrontation":[["#","^speaker:victoria_sterling","/#","#","^display:victoria-conflicted","/#","^Victoria: I'm a security researcher. I discover vulnerabilities. That's not a crime.","\n","^Victoria: The market exists with or without me. I just participate honestly.","\n","ev","str","^Is $12,500 worth six lives?","/str","/ev",{"*":".^.c-0","flg":20},"ev","str","^The Architect is using you","/str","/ev",{"*":".^.c-1","flg":20},{"c-0":["\n","^You: Was $12,500 worth six lives? Can you honestly tell me you sleep well?","\n","^Victoria: [Long pause] I... [she struggles] The market model is sound. Individual cases don't invalidate—","\n","^You: Individual cases? Those are people. With families. With futures you erased for profit.","\n",{"->":"victoria_breaking_point"},{"#f":5}],"c-1":["\n","^You: The Architect is using you. You're not a researcher, you're an arms dealer for a terrorist network.","\n","^Victoria: [Defensive but wavering] We have standards. Vetting processes—","\n","^You: You sold to GHOST. To Ransomware Incorporated. You knew exactly who they were.","\n",{"->":"victoria_breaking_point"},{"#f":5}]}],null],"victoria_breaking_point":[["#","^speaker:victoria_sterling","/#","#","^display:victoria-broken","/#","^[Victoria sits down heavily, the confidence gone]","\n","^Victoria: I told myself it was about market efficiency. About fair compensation for researchers.","\n","^Victoria: I built a whole philosophy around it. Rational. Defensible.","\n","^[She looks at her hands]","\n","^Victoria: But when I read the news about St. Catherine's... the patient deaths... I knew.","\n","^Victoria: I knew it was our exploit. And I did nothing.","\n","ev","str","^You can still do something now","/str","/ev",{"*":".^.c-0","flg":20},"ev","str","^You need to face justice","/str","/ev",{"*":".^.c-1","flg":20},"ev","str","^Say nothing, let her process","/str","/ev",{"*":".^.c-2","flg":20},{"c-0":["\n",{"->":"recruitment_pitch"},{"#f":5}],"c-1":["\n",{"->":"arrest_option"},{"#f":5}],"c-2":["\n",{"->":"victoria_decision"},{"#f":5}]}],null],"recruitment_pitch":[["#","^speaker:victoria_sterling","/#","^Victoria: Become a double agent? Feed SAFETYNET intelligence on The Architect?","\n","^Victoria: If I do that, ENTROPY will kill me. You know that.","\n","ev","str","^We can protect you. Witness protection.","/str","/ev",{"*":".^.c-0","flg":20},"ev","str","^It's the only way to stop more deaths","/str","/ev",{"*":".^.c-1","flg":20},"ev","str","^Or you can go to prison","/str","/ev",{"*":".^.c-2","flg":20},{"c-0":["\n","^You: SAFETYNET can protect you. New identity, relocation, the full program.","\n","^Victoria: [Considering] And in exchange?","\n","^You: Everything you know about The Architect. Zero Day's client list. Phase 2 targets.","\n",{"->":"recruitment_consideration"},{"#f":5}],"c-1":["\n","^You: Phase 2 will kill thousands. You're the only one positioned to stop it.","\n","^Victoria: [Conflicted] I'd be betraying everything I built...","\n","^You: You'd be saving lives. Isn't that what security research is supposed to be about?","\n",{"->":"recruitment_consideration"},{"#f":5}],"c-2":["\n","^You: The alternative is federal prison. ENTROPY operational charges. 20 years minimum.","\n","^Victoria: [Grimly] That's not exactly a choice.","\n","^You: It's more choice than you gave those six people at St. Catherine's.","\n",{"->":"recruitment_consideration"},{"#f":5}]}],null],"recruitment_consideration":[["#","^speaker:victoria_sterling","/#","^[Victoria is silent for a long moment]","\n","^Victoria: If I do this... if I feed you intelligence on The Architect...","\n","^Victoria: I want immunity. Full immunity from prosecution.","\n","^Victoria: And protection for my family. They don't know about Zero Day. They're innocent.","\n","ev","str","^SAFETYNET can arrange that","/str","/ev",{"*":".^.c-0","flg":20},"ev","str","^I can't promise immunity without authorization","/str","/ev",{"*":".^.c-1","flg":20},{"c-0":["\n","ev",true,"/ev",{"VAR=":"victoria_trusts_player","re":true},"^You: We can arrange immunity and family protection. But you have to give us everything.","\n","^Victoria: [Nods slowly] Alright. I'll do it. I'll be your double agent.","\n","#","^complete_task:victoria_choice_made","/#",{"->":"recruitment_success"},{"#f":5}],"c-1":["\n","^You: I don't have authority to grant immunity. But I can advocate for it.","\n","^Victoria: [Frustrated] Not good enough. I need guarantees.","\n","^You: Help us now, and I'll fight for your immunity. That's all I can promise.","\n",{"->":"recruitment_conditional"},{"#f":5}]}],null],"recruitment_success":["#","^speaker:victoria_sterling","/#","^Victoria: What do you need to know?","\n","^Victoria: The Architect's real identity? I don't know it. None of us do.","\n","^Victoria: But I know the communication channels. The encryption protocols. The payment methods.","\n","^Victoria: And I know the Phase 2 timeline. It's not theoretical. It's active.","\n","^You: When?","\n","^Victoria: Q4 2024. Three months from now. The Architect's already positioning assets.","\n","#","^exit_conversation","/#","done",null],"arrest_option":["#","^speaker:victoria_sterling","/#","^Victoria: Prison. [Hollow laugh] I suppose that's what I deserve.","\n","^Victoria: For what it's worth... I'm sorry. About St. Catherine's. About all of it.","\n","^Victoria: I convinced myself I was just participating in a market. But markets can be immoral too.","\n","^[She stands, hands out]","\n","^Victoria: I won't resist. Just... tell them the truth at trial. I wasn't trying to kill anyone.","\n","^You: Intent doesn't erase consequences.","\n","^Victoria: No. I suppose it doesn't.","\n","#","^complete_task:victoria_choice_made","/#","#","^exit_conversation","/#","done",null],"recruitment_conditional":["#","^speaker:victoria_sterling","/#","^Victoria: Not good enough. I'm not risking my life on promises.","\n","^Victoria: [Stands] You have your evidence. Use it however you want.","\n","^Victoria: But I'm not betraying The Architect without guaranteed protection.","\n","^[She walks toward the door]","\n","^Victoria: I'll take my chances with lawyers.","\n","#","^complete_task:victoria_choice_made","/#","#","^exit_conversation","/#","done",null],"victoria_decision":[["#","^speaker:victoria_sterling","/#","^[Victoria looks up at you]","\n","^Victoria: What happens now?","\n","ev","str","^You help us, or you face trial","/str","/ev",{"*":".^.c-0","flg":20},"ev","str","^That's up to you","/str","/ev",{"*":".^.c-1","flg":20},"ev","str","^Justice happens","/str","/ev",{"*":".^.c-2","flg":20},{"c-0":["\n",{"->":"recruitment_pitch"},{"#f":5}],"c-1":["\n","^You: What happens now is your choice. Prison, or redemption.","\n","^Victoria: [Long pause] Redemption. I choose redemption.","\n",{"->":"recruitment_pitch"},{"#f":5}],"c-2":["\n",{"->":"arrest_option"},{"#f":5}]}],null],"global decl":["ev",0,{"VAR=":"victoria_influence"},false,{"VAR=":"victoria_trusts_player"},false,{"VAR=":"victoria_suspicious"},false,{"VAR=":"rfid_clone_started"},false,{"VAR=":"rfid_clone_complete"},false,{"VAR=":"topic_zero_day_philosophy"},false,{"VAR=":"topic_free_market"},false,{"VAR=":"topic_ethics"},false,{"VAR=":"recruitment_discussed"},"str","^","/str",{"VAR=":"player_approach"},"/ev","end",null]}],"listDefs":{}} \ No newline at end of file