Commit Graph

460 Commits

Author SHA1 Message Date
Z. Cliffe Schreuders
3ccfe9d99a feat: Update remaining game scenario files to Haxolottle dialogue
- exploitation.ink
- post_exploitation.ink
- phishing_social_engineering.ink
- encoding_encryption.ink
- feeling_blu_ctf.ink

All files now use consistent Haxolottle character and conversational tone
2025-11-19 18:24:26 +00:00
Z. Cliffe Schreuders
245a3314fa feat: Update vulnerabilities_exploits.ink for game narrative - convert to Haxolottle dialogue 2025-11-19 18:24:26 +00:00
Z. Cliffe Schreuders
7225babaf0 feat: Update scanning.ink for game narrative - convert to Haxolottle dialogue 2025-11-19 18:24:26 +00:00
Z. Cliffe Schreuders
2cce9e245e feat: Update malware_metasploit.ink for game narrative - convert to Haxolottle dialogue 2025-11-19 18:24:26 +00:00
Z. Cliffe Schreuders
dddabe54fe feat: Update vulnerability_analysis.ink for game narrative - convert to Haxolottle dialogue 2025-11-19 18:24:26 +00:00
Z. Cliffe Schreuders
be497931de feat: Create reusable tool explanations and update intro_linux for game narrative
- Add nmap_basics.ink, metasploit_basics.ink, netcat_basics.ink as reusable tools
- Completely rewrite intro_linux.ink:
  - Remove all unnecessary tracking variables
  - Change from 'Tech Instructor' to 'Haxolottle'
  - Remove lab/training/exercise language
  - Convert to helpful NPC offering to explain concepts
  - Keep all technical content but make conversational
  - Link to reusable tool files where appropriate
  - Use proper ink patterns (hub structure, #exit_conversation)
2025-11-19 18:24:26 +00:00
Z. Cliffe Schreuders
e46d8544a2 feat: Create game scenarios directory with lab sheet copies and dead drop system
- Copy all lab sheets to game_scenarios/ for narrative conversion
- Add dead_drop_system.ink explaining ENTROPY's flag-based communication
- Prepare for converting educational labs into game challenges
2025-11-19 18:24:26 +00:00
Z. Cliffe Schreuders
c4d367020a feat: Add GBL Feeling Blu CTF challenge lab sheet - completes Introducing Attacks category 2025-11-19 18:24:26 +00:00
Z. Cliffe Schreuders
a94a8e4b55 feat: Add GBL vulnerability assessment lab sheet 2025-11-19 18:24:26 +00:00
Z. Cliffe Schreuders
1a0539d432 feat: Add GBL post-exploitation techniques lab sheet 2025-11-19 18:24:26 +00:00
Z. Cliffe Schreuders
ab96da0731 feat: Add GBL exploitation techniques lab sheet 2025-11-19 18:24:26 +00:00
Z. Cliffe Schreuders
531a2499ae feat: Add GBL information gathering and network scanning lab sheet 2025-11-19 18:24:26 +00:00
Z. Cliffe Schreuders
614f5f9fe9 feat: Add GBL vulnerabilities, exploits, and remote access payloads lab sheet 2025-11-19 18:24:26 +00:00
Z. Cliffe Schreuders
fbcc23b375 feat: Add GBL malware and Metasploit Framework lab sheet 2025-11-19 18:24:26 +00:00
Z. Cliffe Schreuders
6d271e1350 feat: Update GBL encoding and encryption lab sheet with corrected ink patterns
Improved version following ink best practices:
- Removed unnecessary tracking variables (ink handles choice visibility automatically)
- Uses hub structure with #exit_conversation
- Simplified dialogue flow
- Only tracks persistent state (instructor_rapport)
- Covers: encoding vs encryption, ASCII, hex, Base64, DES, AES, GPG, OpenSSL
- Commands reference and practical challenge tips included

Game-based learning replacement for traditional lab sheets.
2025-11-19 18:24:26 +00:00
Z. Cliffe Schreuders
433a5d6b1e feat: Add GBL phishing and social engineering lab sheet
Converts cyber_security_landscape/3_phishing.md into interactive dialogue:
- Social Engineering Specialist NPC guides through human factors
- Hub structure covering: human factors, phishing basics, reconnaissance, email spoofing, malicious attachments, reverse shells
- Detailed explanations of macro creation, msfvenom payloads, and netcat
- Strong emphasis on ethical boundaries and authorized testing
- Attack workflow and challenge tips sections
- Progress tracking with ethical awareness flags

Educational content for authorized security testing only.
2025-11-19 18:24:26 +00:00
Z. Cliffe Schreuders
f081cf6712 feat: Add GBL Linux fundamentals lab sheet in ink format
Converts introducing_attacks/1_intro_linux.md into interactive dialogue:
- Tech Instructor NPC guides through Linux basics
- Hub structure for major topics: command-line, vi, piping, redirection, networking, SSH, Hydra
- Each topic has short explanations with deep-dive options
- Commands reference section
- Challenge tips for practical exercises
- Progress tracking and instructor rapport system

Game-based learning replacement for traditional lab sheets.
2025-11-19 18:24:25 +00:00
Z. Cliffe Schreuders
d0e27d69a1 docs: Add gameplay integration guide with Valley Memorial scenario example 2025-11-19 17:43:15 +00:00
Z. Cliffe Schreuders
dd70afca9f docs: Update README with all 11 cell operations (complete) 2025-11-19 17:43:15 +00:00
Z. Cliffe Schreuders
f97302fe7f feat: Add final 2 cell LORE fragments (AI Singularity and Crypto Anarchists) 2025-11-19 17:43:15 +00:00
Z. Cliffe Schreuders
96ceb2ffdd feat: Add Ghost Protocol cell LORE fragment (Privacy Apocalypse data dump) 2025-11-19 17:43:15 +00:00
Z. Cliffe Schreuders
a499c5ee3f feat: Add Supply Chain Saboteurs and Quantum Cabal LORE fragments
Created comprehensive operational reports for 2 more ENTROPY cells (total: 8 of 11):

7. Supply Chain Saboteurs - TRUSTED BUILD Post-Mortem (CELL_OP_SUPPLY_CHAIN_001):
   - 18-month operation compromising enterprise software build pipeline
   - Backdoor (SUNBEAM.dll) distributed to 12,847 organizations via trusted updates
   - SolarWinds-style supply chain attack demonstration
   - Discovered after 8 months, misattributed to nation-state actor
   - Collateral damage: Developer-14 fired, CloudManage lost $2B, software update trust destroyed
   - Copycat attacks likely (techniques now public)
   - Cell refuses Phase 3: "Supply chain attacks cannot be safely constrained"
   - Trojan Horse's realization: Lost control, broke trust irreversibly

8. Quantum Cabal - Tesseract Experiment Lab Notes (CELL_OP_QUANTUM_CABAL_001):
   - Experiment QC-47 "Dimensional Interface Protocol" (Jan-Feb 2024)
   - Blends legitimate quantum computing with Lovecraftian cosmic horror
   - Real science: Quantum entanglement, QKD, superconducting qubits
   - Anomalous results: Room temperature quantum coherence (violates physics)
   - Non-random measurement patterns, mathematical proofs from unknown source
   - Psychological casualties: Dr. Park (whispers, medical leave), Dr. Sharma (resigned)
   - Dr. Kowalski decoded proof of "quantum consciousness"
   - Dr. Cross (Singularity) insists experiments continue despite trauma
   - Ambiguous conclusion: New physics? Collective delusion? Actual contact?
   - Recommendation: Terminate research, some doors should stay closed

Key Themes:
- Supply Chain: Most successful operation becomes most ethically disastrous
- Supply Chain: Lost control of complex attack, trust erosion irreversible
- Quantum Cabal: Unique tone blending serious science with cosmic horror
- Quantum Cabal: Uncertainty is the horror—unclear what's real
- Both cells show fracturing: Members resign/medical leave, refuse Phase 3
- Pattern continues: ENTROPY operations cause uncontrollable consequences

Educational Value:
- Supply Chain: Software build security, SolarWinds-style attacks, trust models
- Supply Chain: Supply chain attack cascading consequences and replication
- Quantum Cabal: Quantum computing, quantum cryptography (all accurate science)
- Quantum Cabal: Observer bias, frontier research ethics, pseudoscience vs breakthrough
- Both maintain high educational rigor while exploring ethical complexity

Narrative Innovation:
- Supply Chain: Post-mortem format shows reflection after disaster
- Quantum Cabal: Lab notes format, ambiguous "horror" without clear conclusion
- Quantum Cabal: First cell where threat isn't clearly defined (existential uncertainty)
2025-11-19 17:43:15 +00:00
Z. Cliffe Schreuders
8a93e07afc feat: Add 3 more cell-specific LORE fragments (Ransomware Inc, Zero Day, Social Fabric)
Added comprehensive operational reports for 3 additional ENTROPY cells (total: 6 of 11):

4. Ransomware Incorporated - Healthcare Ethics Review (CELL_OP_RANSOMWARE_INC_001):
   - Q3 2024: 8 healthcare ransomware deployments
   - Detailed 3-tier system (Tier 1: NEVER encrypt life-critical systems)
   - Valley Memorial Hospital near-death incident (14-min ICU monitoring gap, patient blood pressure drop)
   - Kill switch activation prevented death (auto-decrypt in 8 minutes)
   - 48-hour auto-decryption prevents permanent damage
   - Cipher King's profound moral crisis ("One death makes us murderers")
   - Measurable impact: Drove $47M security investment across healthcare
   - Phase 3 status: Uncertain participation due to Valley Memorial trauma

5. Zero Day Syndicate - Vulnerability Research Report (CELL_OP_ZERO_DAY_001):
   - Q3 2024: 12 vulnerabilities discovered (7 critical, 5 high severity)
   - Epic EHR disclosed responsibly (protected 250M patient records)
   - SCADA vulnerabilities retained for Phase 3 (enabled Critical Mass)
   - $15M dark web value rejected (ideology over profit)
   - Disclosure dilemma: Protect users vs. demonstrate insecurity
   - Prophet's moral ledger: Epic disclosure protected patients, but SCADA weaponization enabled Valley Memorial
   - 8 zero-days reserved for Phase 3, immediate disclosure after
   - Dead man's switch for auto-disclosure if compromised

6. Social Fabric - Polarization Campaign Analysis (CELL_OP_SOCIAL_FABRIC_001):
   - Operation FRACTURED TRUST (April-Sept 2024)
   - 627 fake personas, 47M impressions, 12 narratives reached mainstream media
   - Measurable harm: Community trust ↓22%, polarization ↑38% in test counties
   - Real victims: 2 candidates harassed off campaigns, communities damaged
   - Psychological toll: 3 member resignations, substance abuse, depression
   - Dissonance's complete ethical collapse: "We've become indistinguishable from the enemy"
   - Cell REFUSES Phase 3 participation (vote: 8-2 against)
   - Leader resigns: "Some problems can't be demonstrated without becoming the problem"

Key Themes Across All 6 Fragments:
- Ethical complexity and genuine moral doubt from all cell leaders
- Safeguards exist but can fail (Valley Memorial proves this)
- Internal dissent and fracturing (2 cells refuse/question Phase 3)
- Measurable real-world impact (both positive reform and negative harm)
- Psychological toll on operators (resignations, moral distress)
- Financial sacrifice for ideology ($15M+ foregone for beliefs)

Updated README:
- Fragment count: 3 → 6 (6 of 11 cells complete)
- Added 3 new cell summaries with player value
- Updated Phase 3 integration (shows cell refusals and doubts)
- Updated recommended reading order (1-6 with progression)
- Revised future additions (5 cells remaining)

Educational Value:
- Ransomware Inc: Healthcare cybersecurity, ethical attack constraints, risk assessment
- Zero Day: Vulnerability disclosure ethics, bug bounty economics, researcher responsibility
- Social Fabric: Information operations, algorithmic manipulation, psychological warfare ethics
2025-11-19 17:43:15 +00:00
Z. Cliffe Schreuders
8f37b949c1 feat: Add cell-specific LORE fragments for Critical Mass, Digital Vanguard, and Insider Threat Initiative
Created detailed operational reports from three key ENTROPY cells:

1. Critical Mass - Grid Reconnaissance (CELL_OP_CRITICAL_MASS_001):
   - 847 SCADA systems compromised with Equilibrium.dll
   - 5 insider assets detailed (Switchboard, Kilowatt, Voltage, Megawatt, Blackbox)
   - Hospital/emergency bypass lists (ethical constraints)
   - Phase 3 readiness at 95%
   - Shows Blackout's moral struggle with potential casualties

2. Digital Vanguard - Paradigm Shift Q3 Report (CELL_OP_DIGITAL_VANGUARD_001):
   - Legitimate consulting front ($847K revenue)
   - 10 operations (8 successful, 2 failed)
   - Intelligence hub for other cells
   - 4 corporate insider assets
   - Shows Morpheus questioning ethics of trust exploitation

3. Insider Threat Initiative - Deep State Operation (CELL_OP_INSIDER_THREAT_001):
   - 47 government placements (DOE, CISA, FBI, NSA, FERC, etc.)
   - 10-year infiltration operation (2018-2028)
   - Detailed recruitment and vetting processes
   - Polygraph countermeasures (ideological true believers)
   - Shows Raven's responsibility for recruited civil servants

Features:
- Cross-cell intelligence sharing patterns
- Phase 3 integration and coordination
- Ethical complexity and moral doubt from cell leaders
- Professional competence and OPSEC discipline
- Educational CyBOK alignment (SCADA security, insider threats, social engineering)
- Gameplay integration notes

All fragments align with universe bible 11-cell structure.
2025-11-19 17:43:15 +00:00
Z. Cliffe Schreuders
a8135d3703 fix: Update ENTROPY LORE to align with universe bible 11-cell structure
- Remove inconsistent 5-cell (ALPHA/BETA/GAMMA/DELTA/EPSILON) structure
- Update all organizational LORE to reference 11 established cells:
  * Digital Vanguard, Critical Mass, Quantum Cabal
  * Zero Day Syndicate, Social Fabric, Ghost Protocol
  * Ransomware Incorporated, Supply Chain Saboteurs
  * Insider Threat Initiative, AI Singularity, Crypto Anarchists

Changes:
- STRAT_001: Add postscript explaining evolution from 5 to 11 cells
- TECH_TOOL_001: Update to reference Critical Mass (not DELTA)
- ENTROPY_PERSONNEL_001: Update Cascade to match Critical Mass member Dr. Sarah Winters
- ENTROPY_OPS_001: Update to reference Digital Vanguard and Insider Threat Initiative
- ENTROPY_HISTORY_001: Note early cell evolution to specialized structure
- PROTO_CELL_001: Remove specific cell designation examples
- TRAIN_RECRUIT_001/TRAIN_OPSEC_001: Remove cell-specific references
- README_ORGANIZATIONAL_LORE: Remove OPCOM_001, update all references

Deletions:
- OPCOM_001: Removed Phase 3 coordination doc (inconsistent with universe bible)

This brings all organizational LORE into consistency with established universe bible.
2025-11-19 17:43:15 +00:00
Z. Cliffe Schreuders
a75fb6c110 feat: Add ENTROPY organizational LORE fragments revealing internal operations
Created 7 comprehensive internal ENTROPY documents organized into 5 categories, providing deep insight into the organization's structure, methods, philosophy, and operations.

## New Fragment Categories:

### 1. Training Materials (2 fragments)

**TRAIN_RECRUIT_001: Asset Recruitment Fundamentals**
- Complete recruitment methodology manual (3.2, June 2024)
- Four vulnerability categories: Financial (75% success), Ideological (45%), Personal (60%), Career (35%)
- Seven-stage progressive commitment (Week 1: innocent contact → Week 10: full operational)
- Target organization prioritization (Tier 1: Critical infrastructure, Tier 2: Fortune 500, Tier 3: SMB)
- OPSEC protocols for recruiters (cover identity, surveillance detection, compartmentalization)
- Case studies: NIGHTINGALE (success - Sarah Martinez), CARDINAL (failure - security researcher)
- Ethical considerations from The Architect
- **Educational Value:** Social engineering, insider threat vectors, recruitment psychology

**TRAIN_OPSEC_001: Handler Operational Security**
- Golden Rules: You Don't Exist, Trust Is Liability, Assume Surveillance, Compartmentalization Is Sacred
- Handler identity management (codenames, separate devices, digital hygiene)
- Asset communication protocols (Signal for coordination, dead drops for intel, in-person rare)
- Surveillance Detection Routes (SDR) - 60-90min before every meeting
- Payment security (cryptocurrency preferred, cash acceptable, wire transfer avoid)
- Counter-intelligence awareness (detecting flipped assets)
- Capture protocols: "I want a lawyer" (repeat indefinitely)
- Burnout recognition and exit procedures
- **Educational Value:** Covert operations tradecraft, OPSEC principles, countersurveillance

### 2. Operational Communications (1 fragment)

**OPCOM_001: Phase 3 Cell Coordination**
- The Architect's final coordination message (June 28, 2025, T-minus 17 days)
- Recipients: All 5 cell leaders (ALPHA_PRIME through EPSILON_PRIME)
- Cell-specific target assignments:
  - **ALPHA**: Financial systems (banks, stock exchange, cryptocurrency)
  - **BETA**: Healthcare (EHR, medical devices, insurance - life-safety protected)
  - **GAMMA**: Telecommunications (ISP routing, mobile data, DNS)
  - **DELTA**: Energy grid (SCADA, load balancing, brownouts not blackouts)
  - **EPSILON**: Transportation/Logistics (airlines, freight, transit)
- Operational timeline: July 15, 2025, 00:00-14:00 EST (staggered activation)
- Abort criteria: Life safety risk, operational compromise, strategic conditions violated
- Success definition: 40% minimum, 70% target, 100% optimal
- Strategic restraints: Zero casualties, reversible damage, 72-hour window
- **Reveals:** Complete Phase 3 plan, coordination between cells, specific targets

### 3. Cell Protocols (1 fragment)

**PROTO_CELL_001: Cell Structure and Operations**
- Cell hierarchy: Architect → Cell Leaders → Handlers → Technical Specialists → Support Roles
- Typical cell size: 8-15 members (1 leader, 3-5 handlers, 2-3 technical, 2-4 support)
- Cell budget: $500K-$1.5M annually (60% asset payments, 15% equipment, 15% infrastructure, 10% stipends)
- Weekly operational meetings (rotating safe houses, 90min, phones in Faraday bags)
- Burn protocols: Level 1 (individual), Level 2 (cell), Level 3 (network)
- Target selection criteria (centralized systems, avoid small business/life-safety)
- Asset management (recruitment, tasking, payment, termination)
- Inter-cell communication (prohibited except through Architect)
- **Educational Value:** Covert organization structure, compartmentalization, operational security

### 4. Strategic Planning (1 fragment)

**STRAT_001: Ten-Year Vision (2015-2025)**
- Original October 2015 strategic document by The Architect
- Updated January 2023 with postscript for cell leaders
- **Phase 1 (2015-2018)**: Foundation - Build capabilities, recruit founding members
  - Goal: 15-20 members across 3 cells, initial tooling
  - Status: EXCEEDED (5 cells, 60+ members, advanced tools)
- **Phase 2 (2018-2022)**: Expansion - Scale operations, recruit 100+ assets
  - Goal: 5 cells, 100+ assets in critical infrastructure, 20-30 operations
  - Status: ACHIEVED (Equilibrium.dll on 800+ systems, 25 successful operations)
- **Phase 3 (2023-2025)**: Demonstration - Coordinated multi-sector disruption
  - Activation: July 15, 2025
  - Goal: Demonstrate infrastructure fragility at scale
- **Phase 4 (2025-2030)**: Options post-Phase 3 (Dissolve, Continue, Go Public, Pivot to Defense)
- Strategic philosophy: Why 10 years? Why constraints? Why anonymity?
- Risk assessment: Operational, strategic, organizational, moral failures
- **Proves:** Everything was intentional, strategic, part of coherent long-term vision

### 5. Technical Documentation (1 fragment)

**TECH_TOOL_001: Equilibrium.dll Documentation**
- SCADA backdoor malware for power grid load manipulation
- Deployment: 847 systems across 47 power utilities (April 2024)
- Attack vector: DLL side-loading (version.dll proxy in Siemens WinCC)
- Functionality: Intercept load balancing commands, create rolling brownouts
- C2 infrastructure: Domain fronting via CloudFlare (maintenance-updates.scada-systems.com)
- Anti-detection: AV evasion, SIEM evasion, mimics Windows Update traffic
- Bypass lists (ABSOLUTE): Hospitals, emergency services, critical infrastructure (never affected)
- Phase 3 activation: July 15, 2025, 06:00 EST
- Constraints: Max 2-hour brownout per zone, equipment protection maintained, remote kill switch
- Self-destruct: July 20, 2025 (delete all traces)
- **Educational Value:** SCADA vulnerabilities, DLL side-loading, C2 infrastructure, ethical constraints in malware

### 6. Ideology (1 fragment)

**IDEOLOGY_001: On Inevitability Manifesto**
- The Architect's philosophical treatise (March 2016, updated January 2023)
- **Chapter 1**: Entropy and Systems - Thermodynamics, fragility of centralization
- **Chapter 2**: The Illusion of Security - Security theater vs. actual security
- **Chapter 3**: Why We Are Not Terrorists - Constraints, no violence, no demands
  - Zero casualties requirement, reversible damage, institutional targets, no political demands
- **Chapter 4**: The Moral Calculus - Utilitarianism (justified), Deontology (unjustified), Virtue Ethics (depends on execution)
- **Chapter 5**: What Comes After - 3 scenarios (Society learns, ignores, overreacts)
- **Chapter 6**: To Those Who Join - What members are signing up for (prison risk, moral weight, stress)
- The Architect's 2023 postscript: Doubt is constant, but conviction remains
- **Reveals:** ENTROPY's genuine ideological motivation, ethical struggles, principled approach (even if misguided)

### 7. README Documentation

**README_ORGANIZATIONAL_LORE.md**
- Comprehensive guide to all 7 organizational fragments
- Discovery and player integration recommendations
- Cross-references (internal ENTROPY docs, existing LORE fragments, evidence templates)
- Educational value mapped to CyBOK domains
- Fragment statistics (50,000 words total)
- Narrative themes (complexity, fragility/resilience, means/ends, human cost)
- Usage guidelines for game developers
- Recommended discovery order for progressive revelation

## Organizational Structure Revealed:

**ENTROPY Network:**
- 5 operational cells: ALPHA, BETA, GAMMA, DELTA, EPSILON
- Each cell: 8-15 members
- 60+ total members, 120+ recruited assets
- Centralized leadership: The Architect
- Distributed operations: Cell autonomy within strategic framework

**Operational Capabilities:**
- Asset recruitment (4 vulnerability types, proven methods)
- Infrastructure compromise (financial, healthcare, telecom, energy, transportation)
- Advanced malware (Equilibrium.dll + others referenced)
- Secure communications (Signal, dead drops, PGP)
- Financial infrastructure (cryptocurrency, shell companies)

**Ethical Framework:**
- Zero casualty constraint (absolute requirement)
- Reversible damage only (72-hour demonstration window)
- Institutional targets (not individuals)
- Bypass lists for life-safety systems
- Members can exit safely

## Cross-References:

**Links to existing LORE:**
- Sarah Martinez = NIGHTINGALE case study in TRAIN_RECRUIT_001
- Operation Glass House = references in multiple training docs
- Phase 3 directive = expanded detail in OPCOM_001
- The Architect's philosophy = IDEOLOGY_001 manifesto

**Links to evidence templates:**
- TEMPLATE_001-006 identify specific assets
- Organizational LORE shows recruitment and management methods
- Combined: Complete picture of ENTROPY operations

## Educational Value (CyBOK):

**Training Materials:**
- Social engineering principles and insider threat recruitment
- Operational security for covert activities
- Psychological profiling and vulnerability exploitation

**Operational Communications:**
- Critical infrastructure protection priorities
- Coordinated attack response
- Multi-sector incident coordination

**Cell Protocols:**
- Organizational compartmentalization
- Covert communication methods
- Counterintelligence awareness

**Strategic Planning:**
- Long-term adversary planning
- Strategic vs. tactical threat analysis
- Risk assessment methodologies

**Technical Documentation:**
- SCADA security vulnerabilities
- Malware analysis (DLL side-loading, C2 infrastructure)
- Anti-forensics and detection evasion

**Ideology:**
- Threat actor psychology and motivation
- Hacktivism vs. terrorism distinctions
- Ethical hacking debates

## Gameplay Integration:

**Progressive Revelation:**
- Early: Training materials, cell protocols (structure)
- Mid: Operational comms, technical docs (capabilities)
- Late: Strategic planning, ideology (philosophy)

**Mission Design:**
- Phase 3 deadline creates urgency (July 15, 2025)
- Cell targets enable focused counter-ops
- Technical docs provide defensive intelligence

**Moral Complexity:**
- ENTROPY presented as principled antagonists
- Genuine ideological motivation (not pure malice)
- Ethical constraints (zero casualties, reversible damage)
- Players must grapple: Are they entirely wrong?

All fragments maintain narrative consistency, educational alignment with CyBOK security domains, and interconnected storytelling across the ENTROPY universe.
2025-11-19 17:43:15 +00:00
Z. Cliffe Schreuders
2929bdb322 feat: Add TEMPLATE_006 (Message Logs) and comprehensive template documentation
Created Template 006 for encrypted messaging app evidence (Signal/Wickr) showing ENTROPY handler-asset communications, plus comprehensive README documentation for the entire template system.

## New Files:

### TEMPLATE_AGENT_ID_006_message_logs.md
- **Evidence Type:** Signal/Wickr encrypted messaging app logs
- **Key Feature:** Handler uses subject's REAL NAME 8 times in operational comms
- **Direct Identity Confirmation:** Definitive proof of NPC as ENTROPY asset
- **Evidence Strength:** 75% alone → 99% combined with other templates
- **High Cooperation Potential:** 85% base (subject wants out, shows coercion)

**5 Message Threads Included:**
1. Initial Tasking - Handler assigns data theft, uses real name
2. Operational Concerns - Subject worried, handler reassures
3. Coordination with Cell - Payment confirmed, second asset mentioned
4. Internal ENTROPY Comms - Handler briefs cell leader, confirms recruitment method
5. Escalation and Pressure - Subject wants out, handler threatens and coerces

**What Makes This Template Unique:**
- Only template with direct real name confirmation via ENTROPY internal comms
- Shows subject is KNOWN ENTITY within ENTROPY organization
- Reveals handler's OPSEC failure (using real names)
- Documents coercion and victimization (subject tried to quit)
- Provides intelligence beyond subject: handler contact, cell structure, operations
- Creates moral complexity: perpetrator who is also victim

**Substitution Variables (17 total):**
- [SUBJECT_NAME], [SUBJECT_CODENAME], [HANDLER_CODENAME]
- [CELL_DESIGNATION], [OPERATION_NAME]
- [HANDLER_PHONE], [SUBJECT_PHONE]
- [TARGET_ORGANIZATION], [DATA_TYPE], [SYSTEM_NAME]
- [AMOUNT], [MEETING_LOCATION], [DEADLINE_DATE]
- [DATE_1] through [DATE_5], [TIME_1] through [TIME_5]
- [PRESSURE_DETAIL], [SUBJECT_CONCERN]
- [SECOND_ASSET_CODENAME], [CELL_LEADER_CODENAME]

**Gameplay Integration:**
- Discovery: RARE (server compromise or handler device seizure)
- Unlocks: Handler arrest, second asset ID, cell mapping
- Interrogation approaches: Overwhelming evidence (85%), Empathetic victim-focused (90%), Strategic flip (90%)
- Intelligence yield: Cell structure, handler contact, dead drops, payment methods

**Educational Value (CyBOK):**
- Encrypted messaging security & limitations
- OPSEC failures in operational communications
- Mobile device forensics
- Digital evidence authentication
- Insider threat psychology and coercion tactics
- Counterintelligence and asset flipping

### README.md (Comprehensive Template System Guide)
- **Purpose:** Complete documentation for using all 6 evidence templates
- **Sections:** Quick start, substitution guide, best practices, examples

**Key Content:**
- Quick Start Guide (4 steps: Choose templates → Gather values → Substitute → Deploy)
- Complete 6-template overview with summaries
- **Complete Substitution Variable Reference Table:**
  - Core Identity (3 variables - used in ALL templates)
  - ENTROPY Operational (7 variables)
  - Financial (4 variables)
  - Technical/System (3 variables)
  - Communication (3 variables)
  - Location (3 variables)
  - Temporal (5 variables)
  - Contextual (4 variables)
- Evidence Combination Strategies (5 strategic paths)
- Interrogation Approaches by Evidence Collected (clear unlocks)
- Best Practices (DO/DON'T lists)
- Rarity and Discovery Recommendations (progression table)
- Success Metrics and Gameplay Impact (evidence count → outcomes)
- Customization Examples (3 complete NPC scenarios with all substitutions)
- Educational Value Summary (CyBOK alignment)
- Quick Reference Checklist

**DO/DON'T Best Practices:**
✓ Replace ALL placeholders
✓ Keep values consistent across templates for same NPC
✓ Match timeline chronologically
✓ Consider cooperation potential
✗ Don't leave [BRACKETS] in final version
✗ Don't require 100% collection
✗ Don't over-punish coerced NPCs

## Updated Files:

### TEMPLATE_CATALOG.md
- Updated template count: 5 → 6
- Updated section title: "The Five Evidence Templates" → "The Six Evidence Templates"
- Added complete Template 006 entry with:
  - Full substitution variable list (17 variables)
  - Message thread summaries
  - Real name usage pattern analysis
  - 9 red flags documented
  - Evidence strength progression
  - Gameplay integration details
  - Forensic & legal assessment
  - Cross-references to other templates
  - Discovery scenarios and timing
- Updated Evidence Chain diagram to include Message Logs
- Updated Confidence Thresholds table: Added 6-template row (99.9% confidence, 95% cooperation)
- Added 2 new combination strategies:
  - "Real Name Confirmation + High Cooperation" (Templates 006 + 005 + 002 = 99%, 95% cooperation)
  - "Complete Cell Mapping" (Templates 006 + 004 + 002 + 003 = 99.9%, enables handler arrest)
- Added Template 006 to Discovery Placement Recommendations (Very Hard, Late investigation)
- Updated Expansion Opportunities: Renumbered future templates 007-011 (was 006-010)
- Updated Version History: Added v2.0 entry
- Updated Quick Reference Card: Added Template 006 with  NEW marker

## System Impact:

**Template System v2.0:**
- Total Templates: 6 (was 5)
- Total Substitution Variables: 32+ unique placeholders
- Evidence Chain: 6-step progression from suspicion → definitive proof
- Maximum Confidence: 99.9% (all 6 templates)
- Cooperation Range: 50% (1 template) → 95% (all 6 with empathetic approach)

**New Capabilities:**
- Direct real name confirmation via ENTROPY internal comms
- Handler identification and arrest enablement
- Cell structure mapping
- Second asset discovery at same organization
- Coercion documentation for cooperation agreements
- Highest cooperation potential (85-95%)

**Documentation Completeness:**
- Quick start guide for new users
- Complete variable reference (32+ variables documented)
- 5 evidence combination strategies
- 8 interrogation approach unlocks
- 3 complete NPC customization examples
- Educational value mapped to CyBOK

## Integration Notes:

**Template 006 Cross-References:**
- Corroborates Template 002 (payment amounts match message discussions)
- Corroborates Template 003 (data extraction dates align with tasking)
- Corroborates Template 004 (dead drop timing/location matches messages)
- Corroborates Template 005 (emotional arc: trapped, wants out)
- Connects to RECRUITMENT_001 (financial pressure methodology)
- Connects to TACTICAL_001 (if operation is infrastructure attack)
- Connects to LEVERAGE_001 (pressure detail as leverage point)

**Recommended Discovery:**
- Rarity: RARE (Very Hard)
- Timing: Late game (Mid-game for major operation rewards)
- Prerequisites: Server compromise OR handler device seizure
- Value: Very High (real name confirmation + handler intel + cell mapping)

All templates maintain narrative consistency, CyBOK educational alignment, and infinite reusability through [PLACEHOLDER] substitution system.
2025-11-19 17:43:15 +00:00
Z. Cliffe Schreuders
b5d3ee33c4 feat: Add reusable evidence template system for ENTROPY agent identification
Created 5 comprehensive evidence templates with [PLACEHOLDER] substitution system that enable infinite NPC agent identification across scenarios.

## New Files:
- TEMPLATE_AGENT_ID_001_encrypted_comms.md
  * Intercepted PGP-encrypted communications
  * 40% confidence alone, 90% combined
  * Red flags: Policy violations, ProtonMail, after-hours timing

- TEMPLATE_AGENT_ID_002_financial_records.md
  * Bank transactions & cryptocurrency forensics
  * 60% confidence alone, 98% combined
  * Red flags: Unexplained cash, ENTROPY wallet, shell companies

- TEMPLATE_AGENT_ID_003_access_logs.md
  * IT audit showing unauthorized system access
  * 70% confidence alone, 98% combined
  * Documents 5 incidents: Reconnaissance → Exfiltration → Cover-up

- TEMPLATE_AGENT_ID_004_surveillance_photos.md
  * 14-day surveillance op with 7 photo scenarios
  * 50% confidence alone, 95% combined
  * Handler identification, dead drops, countersurveillance

- TEMPLATE_AGENT_ID_005_physical_evidence.md
  * Handwritten 3-page emotional confession
  * 80% confidence alone, 99.9% combined
  * Enables 95-98% cooperation through empathetic approach
  * Arc: Willing participant → Trapped → Desperate for help

- TEMPLATE_CATALOG.md
  * Complete template system documentation
  * Substitution guide & best practices
  * Evidence chain methodology
  * Integration strategies & success metrics

## Template System Features:
- [PLACEHOLDER] format for runtime substitution
- Evidence chain: Single evidence (40-80%) → All 5 (99.9%)
- Cooperation likelihood scales with evidence quality
- Multiple interrogation approaches unlocked by different combinations
- Infinite reusability across NPCs and scenarios

## Integration:
- Updated GAMEPLAY_CATALOG.md with template section
- Evidence Prosecution category expanded from 1 to 6 fragments
- Total gameplay-focused fragments: 13 (8 unique + 5 templates)
- Templates work standalone or combine for overwhelming cases

## Educational Value (CyBOK):
- Digital forensics (email analysis, blockchain tracing)
- Insider threat detection (behavioral indicators)
- Investigation methodology (evidence corroboration)
- Legal process (admissibility, chain of custody)
- Psychological profiling & ethical interrogation

## Gameplay Impact:
Each template enables different player actions and unlocks specific interrogation approaches based on evidence collected. System designed to reward thorough investigation while not requiring 100% collection for success.
2025-11-19 17:43:15 +00:00
Z. Cliffe Schreuders
56b0b654f1 feat: Add gameplay-function LORE fragments with mission integration
Created 8 gameplay-focused LORE fragments organized by what players
can DO with the information, not just narrative content. Each fragment
enables specific mission objectives, player choices, and success metrics.

**Organization by Gameplay Function:**

📋 Evidence Prosecution (1 fragment):
- ALPHA_07 criminal conspiracy communication
- Enables: Federal prosecution, arrest warrants, 95% conviction rate
- Unlocks: Protection for Sarah Martinez, tactical arrests

🎯 Tactical Intelligence (1 fragment):
- 48-hour countdown to power grid attack
- Enables: Time-pressure mission, 3 tactical approaches
- Unlocks: Grid defense, prevents Phase 3 backdoor installation
- Branching: Hard takedown / Insider flip / Extended surveillance

💰 Financial Forensics (1 fragment):
- Complete crypto trail from Sarah's payment to master wallet
- Enables: $8.2M asset seizure, funding disruption
- Unlocks: The Architect identity clues, shell company network
- Impact: -60% ENTROPY operational capacity if successful

🎣 Recruitment Vectors (1 fragment):
- ENTROPY's internal asset recruitment playbook
- Enables: Prevention programs, counter-recruitment, sting ops
- Unlocks: At-risk employee identification, pipeline disruption
- Impact: -30% to -50% future insider threats

🔓 Technical Vulnerabilities (1 fragment):
- SCADA zero-day Equilibrium.dll complete analysis
- Enables: Detection scripts, patch deployment, infrastructure hardening
- Unlocks: Grid protection before Phase 3, honeypot strategies
- Success metric: 100% patched = no Phase 3 grid failures

📍 Asset Identification (1 fragment):
- Complete surveillance package on 3 CELL_DELTA_09 subjects
- Enables: Coordinated arrests, tactical planning, insider cooperation
- Unlocks: Robert Chen flip opportunity, optimized approach
- Success: 85-95% based on intel collected

👥 Victim Testimony (1 fragment):
- Hospital administrator emotional testimony (patient death from ransomware)
- Enables: Emotional investment, motivation, dialog options
- Unlocks: Moral context, interrogation appeals, "Remember Why We Fight"
- Impact: Player engagement, meaningful success/failure consequences

🔄 Leverage Materials (1 fragment):
- Cascade's mother cancer treatment leverage analysis
- Enables: Operative turning, 4 distinct ethical approaches
- Unlocks: CELL_BETA complete intelligence, redemption arc
- Choices: Compassionate (85% success) / Manipulative (45%) /
  Ethical refusal / Anonymous help

**Key Integration Features:**

Mission-Critical Intel:
- TACTICAL_001 triggers 48-hour countdown mission
- ASSET_ID_001 required for optimal tactical planning
- TECHNICAL_001 enables infrastructure protection
- All fragments improve success probability measurably

Branching Player Choices:
- Evidence: Prosecution vs. plea deals
- Tactical: 3 arrest strategies with different risk/reward
- Financial: Seizure priorities and timing
- Recruitment: Prevention vs. counter-recruitment vs. sting
- Technical: Patch race vs. honeypot vs. shutdown
- Leverage: Compassion vs. manipulation vs. ethical stance

Cross-Fragment Integration:
- Operation Glass House appears across 5 functions
- Power Grid Attack requires 3 fragments for optimal success
- The Architect identity clues scattered across all functions
- Success metrics compound (more intel = better outcomes)

Educational Value:
- All fragments teach CyBOK-aligned security concepts
- Real-world attack methodologies and defenses
- Legal, technical, financial, and human factors
- Ethical considerations in security operations

**Gameplay Catalog:**
Complete cross-reference system showing:
- Fragment interconnections and mission integration
- Success probability calculations
- Branching path outcomes
- Player progression through game
- Design principles for future fragments

Each fragment answers "What can I DO with this?" rather than
just "What does this tell me?" - making LORE collection
functionally valuable, not just completionist.

See story_design/lore_fragments/by_gameplay_function/GAMEPLAY_CATALOG.md
for complete integration guide and mission design examples.
2025-11-19 17:43:15 +00:00
Z. Cliffe Schreuders
d93a08c428 feat: Add comprehensive ENTROPY LORE fragments system
Created interconnected LORE fragment collection revealing ENTROPY's
world through discoverable artifacts. Organized by content type and
artifact format for progressive player discovery.

**Structure:**
- 4 content categories: ENTROPY Intelligence, The Architect,
  Character Backgrounds, Location History
- 7 artifact types: encrypted comms, intelligence reports, text notes,
  emails, voice messages, corporate docs, personal items
- Progressive revelation: early game intro → mid game connections →
  late game master plan

**10 Seed Fragments Created:**

ENTROPY Intelligence (5):
- Operation Glass House completion report (cell communication)
- Dead drop server list (compromised infrastructure)
- Thermite.py tool analysis (The Architect's signature)
- Operative "Cascade" profile (true believer)
- Complete organizational history (2015-2025, Phase 3 timeline)

The Architect (2):
- Philosophical manifesto on inevitability (ideology revealed)
- Phase 3 activation directive (July 15, complete master plan)

Character Backgrounds (3):
- Sarah Martinez confession email (insider threat desperation)
- Marcus Chen final voice message (civilian courage, survived!)
- Agent 0x99 axolotl philosophy (regeneration vs entropy)

Location History (1):
- Vanguard Financial complete history (25 years, breach, recovery)

**Key Features:**
- Interconnected narrative web (fragments reference each other)
- Educational value (CyBOK-aligned security lessons)
- Moral complexity (sympathetic characters on both sides)
- Emotional impact (personal stories, real consequences)
- Progressive mystery (builds understanding over time)
- Master catalog tracking all connections and discovery timing

**Thematic Elements:**
- ENTROPY: "For entropy and inevitability" - thermodynamic philosophy
- SAFETYNET: "For regeneration and resilience" - axolotl metaphor
- Phase 3: July 15, 2025 - infrastructure-wide coordinated attack
- Moral gray areas: desperate people, true believers, ethical constraints

Fragments demonstrate sophisticated threat actor (ENTROPY) with
decade-long planning, ideological commitment, and custom tooling,
opposed by dedicated defenders (SAFETYNET) who regenerate after
every setback.

See story_design/lore_fragments/MASTER_CATALOG.md for complete
interconnection map and expansion guidelines.
2025-11-19 17:43:14 +00:00
Z. Cliffe Schreuders
3746212267 docs: Add comprehensive CTF flag narrative integration system
Create design document explaining how CTF flags integrate into
Break Escape's narrative through ENTROPY's dead drop system.

Key concepts:
- Flags as ENTROPY coordination messages
- Drop-site terminals hidden in plain sight
- Why physical presence is required for infiltration
- Flag reward categories (equipment, intel, access, story)
- Complete gameplay loop from briefing to debrief
- Sample Ink dialogue for character interactions

This system allows SecGen CTF scenarios to be embedded
narratively while providing tangible gameplay progression.
2025-11-19 17:32:16 +00:00
Z. Cliffe Schreuders
eaac5c31c5 docs: Update documentation to reflect correct conversation flow pattern
Updated both INK_BEST_PRACTICES.md and NPC_HUB_ARCHITECTURE.md to
accurately document the conversation flow pattern we're using.

Key Corrections:

1. Personal Conversations:
   - Return to mission_hub WITHOUT #end_conversation tag
   - This allows seamless return to hub menu
   - Player can choose more topics without closing UI

2. Exit Options:
   - Located in mission_hub knot
   - Use pattern: #end_conversation -> mission_hub
   - Tag closes UI while preserving state at mission_hub
   - NOT -> DONE (which doesn't preserve hub state)

3. Flow Documentation:
   - Added clear step-by-step flow examples
   - Updated "How It Works" sections
   - Fixed all code examples to show correct pattern
   - Updated checklists and quick reference sections

4. Common Mistakes:
   - Added examples of WRONG patterns (tag in personal endings)
   - Added examples of CORRECT patterns (tag only in exit options)
   - Clarified why each approach matters

5. Tag Name Updates:
   - Changed references from old #exit_conversation to #end_conversation
   - Updated all game engine integration notes

This ensures documentation matches the actual implementation in
chen_hub.ink, netherton_hub.ink, and haxolottle_hub.ink.
2025-11-19 13:44:30 +00:00
Z. Cliffe Schreuders
b611c883e0 fix: Apply mission_hub exit pattern to Netherton and Haxolottle
Applied the same conversation flow fix from chen_hub.ink to the other
two NPCs. Exit options now properly preserve state at mission_hub while
closing the conversation.

Pattern Applied:
  #end_conversation
  -> mission_hub

Instead of:
  #end_conversation
  -> DONE

This ensures:
1. Exit options close the conversation minigame (#end_conversation tag)
2. Story state is preserved AT mission_hub (not DONE)
3. Next conversation resumes from mission_hub with all options available
4. Player can have multiple conversation topics before choosing to exit

Files Updated:
- netherton_hub.ink (2 exit options)
- haxolottle_hub.ink (2 exit options)

Recompiled all hub JSON files.

All three NPCs now have consistent conversation flow behavior.
2025-11-19 13:44:30 +00:00
Z. Cliffe Schreuders
c83ad8d519 json update 2025-11-19 13:44:30 +00:00
Z. Cliffe Schreuders
91640d0503 Improve conversation example, returning to the hub while exiting the UI from the interaction with NPC 2025-11-19 13:44:30 +00:00
Z. Cliffe Schreuders
2a888ccaa3 fix: Remove #end_conversation tag from personal conversation endings
Fixed issue where personal conversations were closing the entire interaction
instead of returning to mission_hub menu.

The Problem:
- Personal conversation endings had #end_conversation tag before -> mission_hub
- This caused the entire conversation to close when personal chat ended
- Player couldn't access mission_hub menu options after personal conversations

The Fix:
- Removed #end_conversation tags from conversation_end knots in ongoing_conversations
- Personal conversations now return to mission_hub WITHOUT closing
- Player sees mission_hub menu again with all available options
- #end_conversation tag remains ONLY in mission_hub exit options

Correct Flow Now:
1. Player chooses personal conversation topic at mission_hub
2. Has personal conversation
3. Personal conversation ends -> mission_hub (no tag)
4. Player sees mission_hub menu again
5. Player can continue with other options OR choose exit
6. Exit option has #end_conversation -> DONE (closes conversation)

Files modified:
- dr_chen_ongoing_conversations.ink
- netherton_ongoing_conversations.ink
- haxolottle_ongoing_conversations.ink

Recompiled all hub JSON files.
2025-11-19 13:44:30 +00:00
Z. Cliffe Schreuders
b982158ce5 refactor: Move ink source files to scenarios/ink and add compilation script
Consolidated all ink source files into scenarios/ink directory for better
organization. All ink source files and documentation are now in the same
location as their compiled JSON output.

Changes:
1. Moved all .ink source files from story_design/ink/ to scenarios/ink/
   - chen_hub.ink and supporting files
   - netherton_hub.ink and supporting files
   - haxolottle_hub.ink and supporting files
   - All other ink source files

2. Moved documentation files to scenarios/ink/
   - INK_BEST_PRACTICES.md
   - NPC_HUB_ARCHITECTURE.md
   - ONGOING_CONVERSATIONS_README.md
   - README.md

3. Added scripts/compile-ink.sh
   - Automatically compiles all .ink files in scenarios/ink/
   - Outputs JSON to the same directory
   - Shows colored output with success/failure status
   - Provides compilation summary

Usage:
  ./scripts/compile-ink.sh

This consolidates the ink development workflow into a single directory
and provides an easy way to recompile all ink files after making changes.
2025-11-19 13:44:30 +00:00
Z. Cliffe Schreuders
85b620cfcd feat: Add automatic conversation closing for graceful #end_conversation tag
Implemented proper handling for the #end_conversation tag to automatically
close the conversation UI without requiring manual ESC key press.

Changes:
1. Added event listener for 'npc-conversation-ended' event in setupEventListeners()
   - Saves NPC state when event is received
   - Automatically ends minigame and returns to game
   - Verifies event is for current NPC

2. Updated showCurrentDialogue() to detect graceful conversation endings
   - Checks for #end_conversation tag when story reaches hasEnded
   - If tag present, waits for event handler instead of showing manual exit message
   - Preserves manual exit message for unexpected/error END states

Flow:
- Ink script: #end_conversation -> DONE
- PhoneChatConversation processes tag and dispatches npc-conversation-ended event
- PersonChatMinigame receives event and automatically closes
- Player sees smooth transition back to game

This eliminates the "(End of conversation - press ESC to exit)" message
for normal conversation endings while preserving it as a safety fallback.
2025-11-19 13:44:30 +00:00
Z. Cliffe Schreuders
b0c56f2eca fix: Change mission_hub exit options to use DONE instead of END
Fixes issue where choosing conversation exit options would show
"reached end of story" console message. All mission_hub exit points
now use:

  #end_conversation
  -> DONE

Instead of:

  #end_conversation
  -> END

This preserves conversation state at mission_hub while cleanly
ending the interaction without triggering ink's end-of-story behavior.

Updated hub files:
- chen_hub.ink
- netherton_hub.ink
- haxolottle_hub.ink

Recompiled all hub JSON files to reflect changes.
2025-11-19 13:44:30 +00:00
Z. Cliffe Schreuders
06685b5328 feat: Unify all NPC relationships to use 'influence' scoring
BREAKING CHANGE: Unified relationship variable naming

Old System (Per-NPC Variables):
- Dr. Chen: npc_chen_rapport with #rapport_gained/lost tags
- Director Netherton: npc_netherton_respect with #respect_gained/lost tags
- Haxolottle: npc_haxolottle_friendship_level with #friendship_gained/lost tags

New System (Unified Influence):
- Dr. Chen: npc_chen_influence with #influence_gained/lost tags
- Director Netherton: npc_netherton_influence with #influence_gained/lost tags
- Haxolottle: npc_haxolottle_influence with #influence_gained/lost tags

Benefits:
- Consistent scoring system across all NPCs
- Simpler to understand and balance
- Unified tag system (#influence_gained/lost)
- Messages still customized per NPC based on their personality

Files Changed:
- dr_chen_ongoing_conversations.ink: rapport → influence
- chen_hub.ink: rapport → influence
- netherton_ongoing_conversations.ink: respect → influence
- netherton_hub.ink: respect → influence
- haxolottle_ongoing_conversations.ink: friendship_level → influence
- haxolottle_hub.ink: friendship_level → influence
- PersonChatConversation.js: Updated getInfluenceMessage() for unified system
  - Now detects NPC ID and provides appropriate messages
  - Supports legacy tag names for backward compatibility
- INK_BEST_PRACTICES.md: Updated all examples and documentation
  - Variable naming conventions
  - Tag system documentation
  - All code examples
  - NPC-specific sections
- NPC_HUB_ARCHITECTURE.md: Updated influence system documentation
- Recompiled all hub JSON files

Messages by NPC:
- Dr. Chen: "Dr. Chen appreciates that" / "Dr. Chen is disappointed"
- Netherton: "Director Netherton approves" / "Director Netherton is displeased"
- Haxolottle: "Haxolottle likes that" / "Haxolottle seems disappointed"

All files compile successfully with unified influence system.
2025-11-19 13:44:30 +00:00
Z. Cliffe Schreuders
acc793815b fix: Correct conversation ending pattern to preserve state at mission_hub
BREAKING CHANGE: Updated conversation ending behavior

Old Pattern (WRONG):
- Conversations ended with #exit_conversation
- Diverted to -> END (lost state)
- Game code navigated back to mission_hub
- State not preserved between interactions

New Pattern (CORRECT):
- Conversations end with #end_conversation
- Divert to -> mission_hub (preserves state)
- Game code closes UI window
- Next interaction resumes from mission_hub with full context

Why This Matters:
- State preservation: NPC remembers where conversation left off
- Flexible re-entry: Player can talk to NPC multiple times
- Context awareness: Hub can show different options based on prior discussions

Files Changed:
- All *_ongoing_conversations.ink files: Updated conversation_end knots
  - Changed #exit_conversation -> #end_conversation
  - Changed -> END -> -> mission_hub
- PersonChatConversation.js: Renamed handleExitConversation -> handleEndConversation
  - Now dispatches 'npc-conversation-ended' event to close UI
  - Ink handles state preservation via -> mission_hub
- PhoneChatConversation.js: Same changes as PersonChatConversation
- INK_BEST_PRACTICES.md: Updated documentation with correct pattern
  - Fixed conversation ending examples
  - Updated checklists
  - Added state preservation explanation
- NPC_HUB_ARCHITECTURE.md: Updated mission hub flow documentation
- Recompiled all hub JSON files

This ensures conversation state is properly maintained across
multiple interactions with the same NPC within a play session.
2025-11-19 13:44:30 +00:00
Z. Cliffe Schreuders
1f5c9e29e8 feat: Add influence tag system with visual feedback for all NPC conversations
Influence Tags System:
- Add #rapport_gained/lost:X tags for Dr. Chen throughout all conversations
- Add #respect_gained/lost:X tags for Director Netherton
- Add #friendship_gained/lost:X tags for Haxolottle
- Tags automatically added after every relationship variable change
- Small changes (±2-5) for minor interactions
- Medium changes (±5-10) for meaningful moments
- Large changes (±10-15) for major trust/betrayal moments

Conversation Handler Updates:
- PersonChatConversation: Add handleInfluenceGained/Lost methods
- PhoneChatConversation: Add tag processing support
- Dispatch 'npc-influence-change' events for UI layer
- Context-appropriate messages based on NPC type and amount

Documentation:
- Create INK_BEST_PRACTICES.md with comprehensive patterns
  - Hub architecture and mission_hub pattern
  - Influence tags system with examples
  - External functions reference
  - Variable persistence patterns
  - Common ink patterns and anti-patterns
  - Complete checklists for new NPC content
- Update NPC_HUB_ARCHITECTURE.md
  - Document mission_hub pattern implementation
  - Document influence tags system
  - Add navigation support requirements
  - Cross-reference best practices

Files Modified:
- All ongoing_conversations.ink files (chen, netherton, haxolottle)
- All hub.ink files (chen, netherton, haxolottle)
- PersonChatConversation.js - influence tag handlers
- PhoneChatConversation.js - influence tag handlers (stub)
- Compiled JSON files regenerated

This provides players with immediate visual feedback for relationship
changes and gives writers a clear pattern to follow for all NPC content.
2025-11-19 13:44:30 +00:00
Z. Cliffe Schreuders
737dc5e032 feat: Implement mission_hub pattern for NPC conversation routing
- Standardize all NPC hub files with a consistent 'mission_hub' knot
- Rename chen_main_hub → mission_hub in chen_hub.ink
- Rename netherton_main_hub → mission_hub in netherton_hub.ink
- Rename haxolottle_main_hub → mission_hub in haxolottle_hub.ink
- Add #exit_conversation tag handling in both conversation classes
- PersonChatConversation: Add handleExitConversation() method
- PhoneChatConversation: Add processTags() and handleExitConversation()
- When personal conversations end, automatically navigate back to mission_hub
- Allows seamless flow between personal/mission topics within same conversation

This creates a hub-and-spoke pattern where:
- mission_hub = central routing point (not visible to player)
- Personal conversations branch off and return to hub
- Mission-specific topics branch off and return to hub
- Player sees continuous conversation, game manages routing
2025-11-19 13:44:30 +00:00
Z. Cliffe Schreuders
37bc334813 fix: Add external function bindings for NPC hub ink files
- Add bindExternalFunction method to InkEngine
- Bind all required EXTERNAL functions in PersonChatConversation:
  - player_name() - returns player's agent name
  - current_mission_id() - returns active mission ID
  - npc_location() - returns conversation location
  - mission_phase() - returns mission phase (planning/active/debriefing/downtime)
  - operational_stress_level() - returns stress level for handler
  - equipment_status() - returns equipment status for Dr. Chen
- Add setupExternalFunctions to PhoneChatConversation
- Fixes: "Missing function binding for externals" error
2025-11-19 13:44:30 +00:00
Z. Cliffe Schreuders
867404e1b0 feat: Add compiled JSON versions of all NPC hub files
- chen_hub.json (133K) - Dr. Chen conversations
- netherton_hub.json (104K) - Director Netherton conversations
- haxolottle_hub.json (95K) - Haxolottle (handler) conversations

All files compile successfully with only warnings (loose ends).
2025-11-19 13:44:30 +00:00
Z. Cliffe Schreuders
4f1f09e42d fix: Add stub knots for haxolottle phase 3/4 and missing conversations
- Add phase_3_hub and phase_4_hub stub knots
- Add favorite_operations and hax_difficult_day conversation knots
- All three NPC hub files (chen, netherton, haxolottle) now compile successfully
2025-11-19 13:44:30 +00:00
Z. Cliffe Schreuders
9344116b74 fix: Fix haxolottle_hub.ink compilation errors and add stub knots
- Replace placeholder variables {twelve} and {moderate} with actual values
- Fix mission_phase() EXTERNAL function call syntax
- Add stub knots for missing diverts (deep_intel_analysis, crisis_triage, etc.)
- Fix netherton action lines with glue operator to prevent choice parsing
2025-11-19 13:44:29 +00:00
Z. Cliffe Schreuders
772b35fe22 fix: Fix EXTERNAL function call syntax across all NPC files
Fixed all player_name references to use function call syntax player_name().
Also removed invalid === END knot definitions from hub files.

Changes:
- Fixed player_name -> player_name() in all ongoing_conversations.ink files
- Removed === END knot definitions (END is a built-in directive)
- chen_hub.ink now compiles successfully with only warnings
- netherton_hub.ink and haxolottle_hub.ink still have some structural issues to resolve

Status:
✓ chen_hub.ink - compiles successfully
⚠ netherton_hub.ink - has choice nesting errors
⚠ haxolottle_hub.ink - has missing knot targets and variable errors
2025-11-19 13:44:29 +00:00
Z. Cliffe Schreuders
ccc08285cd feat: Add new binary file for inklecate tool 2025-11-19 13:44:29 +00:00
Z. Cliffe Schreuders
743e303e4e fix: Remove file prefix from included knot diverts
When using INCLUDE in ink, all knots are brought into the same namespace.
Divert statements should reference knots directly without the file prefix.

Changed:
- chen_hub.ink: -> dr_chen_ongoing_conversations.phase_X_hub
  to -> phase_X_hub
- netherton_hub.ink: -> netherton_ongoing_conversations.phase_X_hub
  to -> phase_X_hub
- haxolottle_hub.ink: -> haxolottle_ongoing_conversations.phase_X_hub
  to -> phase_X_hub

This fixes the "Divert target not found" compilation errors.
2025-11-19 13:44:29 +00:00