Wednesday, May 2, 2007

CODE RED: BREACH PROTOCAL

CODE RED CODE RED CODE RED CODE RED CODE RED

This is not a drill. Security of the SCP has been breached. All project personnel should check for local prenetrance of security firewalls and other deterrents. Activity logs have been forwarded to their respective supervisors. Remain calm.

CODE RED CODE RED CODE RED CODE RED CODE RED

The Selfish Gene, Part III

The natural progression of selfish gene theory is genetic sociology, and in fact, sociolinguists such as Steven Pinker have used the Computational theory of mind to explain the power that language has using the evolution of the human brain. One example of this can be found in the politics that we have been discussing.

Berkeley professor of Cognitive Linguistics George Lakoff argues that there are two types of metaphorical thought in America, both using the explanatory metaphor of “Country as Family.” Conservatives and liberals both accept different metaphors about the relationship of the state to its citizens, within the context of the family. The conservative, or “strict father” model, portrays a family structured around a strong, dominant "father" (the government), and assumes that the “children” (public) require discipline to become self-sufficient “adults” (financially and morally independent). Once “children” are “adults,” the “father” must remain apart from the business of those in society who have proved their responsibility.

The liberal, or “nurturing parent model,” of the family is based on “nurturing values,” where both “mothers” and “fathers” work to keep the essentially good “children” away from “corrupting influences” (poverty, ecological pollution, social injustice, etc.).

That Lakoff’s ideas have become a major guide for political operations in America is a testament to a new relationship between the state and the individual. “Governmentality” is Michel Foucalt’s catch-all term for an apparatus of control, be it one’s control of one’s self, or the government’s control over its citizens. Conceptually, Governmentality relies on Foucault’s notion of “bio-politics,” which deals with the population as individual units, and, as the name suggests, begins to conflate the biological with the political. When bio-politics is the operative paradigm behind a political system, there is no issue too sacred for politics, and the government is placed in a position to govern the individual’s body or genes.

Foucault suggests that the supposed legitimacy of the seventeenth century notion of the Social Contract is simply the formalization of Governmentality. He writes, “This art of government tried, so to speak, to reconcile itself with the theory of sovereignty by attempting to derive the ruling principals of an art of government from a renewed version of the theory of sovereignty,” and this lead to the “[formalization] or [ritualizing] of the theory of the contract.” If, as Foucault convincingly argues, the notion of Governmentality predates the institution of the Social Contract, than the philosophical and social legitimacy of the Social Contract itself can be called into question, and so to can the “plane of reality” (as Foucault puts it) of economics.

Luckily for us, the current administration shares this view of the future of politics. The following is an excerpt from the New York Times magazine by journalist Ron Suskind, from 2004.

In the summer of 2002, after I had written an article in Esquire that the White House didn't like about Bush's former communications director, Karen Hughes, I had a meeting with a senior adviser to Bush. He expressed the White House's displeasure, and then he told me something that at the time I didn't fully comprehend -- but which I now believe gets to the very heart of the Bush presidency.

The aide said that guys like me were ''in what we call the reality-based community,'' which he defined as people who ''believe that solutions emerge from your judicious study of discernible reality.'' I nodded and murmured something about enlightenment principles and empiricism. He cut me off. ''That's not the way the world really works anymore,'' he continued. ''We're an empire now, and when we act, we create our own reality. And while you're studying that reality -- judiciously, as you will -- we'll act again, creating other new realities, which you can study too, and that's how things will sort out. We're history's actors . . . and you, all of you, will be left to just study what we do.''

Monday, April 30, 2007

Hot from the PR presses.

Johnson down in Unconventional Justification sent me a copy of the latest draft of our proposal to Director Simmons. I'm not sure how he thinks the Director is going to buy into all that identity mumbo-jumbo, but that's spin for you.
Identity is a tricky issue in the modern world. We have to balance our need to find a group for safety with the urge to change and progress. As a result, many of our means of identifying ourselves are deeply rooted in the personality, and not in the physical body. Declaring allegiance to an ideology signals a strong adherence to a principle, and has for many millennia been considered a matter worth killing and dying for. However, the speed at which it can be abandoned is only limited by how many others choose to remember the previous alignment. You can’t choose whether or not to have an ideology, but it is extremely easy to alter which ideology you subscribe to.

There are other manners of identity that are not as easily shed; race and gender are both readily obvious to others, and to yourself. They cannot be ignored, and they are chosen for you. However, with enough resolve and sufficient resources, they can both be changed. For example, one can gain a new gender identity through an act as resource-intense and thorough as gender reassignment surgery or something as simple as a cunning alteration of your silhouette and style of dress. Even race can be changed, again via surgery, or sometimes simply by moving to an area where values concerning your race are different. Though you can’t change what you know about your race, you can change the identity of it.

Unlike race, religion, sex and ideology, genetic identity can be completely ignored, however, it is the only one that – once known – is utterly unchangeable and intrinsic to your person. Thankfully, for most people, genetics are a matter of probabilities; if you’re a woman and have BRCA1, your chances of developing breast cancer are ~ 36%, while if you lack it, your chances are ~12%. However for others, genetics are a binary matter. If on chromosome 4, you possess more then 40 repeats of the sequence (5’-CAG-3’) in the gene huntingtin, then you will very likely die a painful, jittering death as a mentally crippled invalid before you reach your 6th decade of life. The unavoidable and unchangable nature of the subject's genetics is, in this case, unavoidable, obvious and terminal.

As a nation, we have it within our power to change the rigid and set genetic patterns which have dictated the lives of our ancestors since the first proto-life copied itself in the thick, soupy seas of prebiotic Earth. We have the knowledge necessary to alter our nature for the better. We have the the technology to give this gift to our children. We have the resources to make this happen, starting today. Our mission, therefore, is to shepherd the genetic code of the American people into a more acceptable state, to allow us both a healthier future and a greater pride in our own genetic heritage.


If approved, this is probably going in the brochure that UP wants to show some select members of Congress. Oh, before I forget, I think we've got to register it separately for Top Secret status or it'll fall under the FoIA, Darwin, could you get the intern to do it? We haven't fired him yet, right?

Sunday, April 29, 2007

Anger Reinforces People with High Testosterone

A new study from the University of Michigan found that individuals with high levels of testosterone receive pleasure from provoking anger in other people.
"It's kind of striking that an angry facial expression is consciously valued as a very negative signal by almost everyone, yet at a non-conscious level can be like a tasty morsel that some people will vigorously work for," said Oliver Schultheiss, co-author of the study and a U-M associate professor of psychology.

The findings may explain why some people like to tease each other so much, he added.

"Perhaps teasers are reinforced by that fleeting 'annoyed look' on someone else's face and therefore will continue to heckle that person to get that look again and again," he said. "As long as it does not stay there for long, it's not perceived as a threat, but as a reward."
This article confirms the explanatory value of the Selfish Gene theory. Even an action which to most of us would seem to have no "selfish" value - provoking anger in others - can be attributed to the expression of a gene (in this case, genes causing a high level of testosterone).

Let's attempt experimenting with lowered testosterone levels to promote behavior which appears altruistic.

DNA Data

Here is the amino acid sequence of the offending genetic code (an enzyme which produces testosterone) of subject #865498A:
1 mwlylaafvg lyyllhwyre rqvvshlqdk yvfitgcdsg fgnllarqld arglrvlaac
61 ltekgaeqlr gqtsdrletv tldvtkmesi aaatqwvkeh vgdrglwglv nnagiltpit
21 lcewlnteds mnmlkvnlig viqvtlsmlp lvrrargriv nvssilgrva ffvggycvsk
181 ygveafsdil rreiqhfgvk isivepgyfr tgmtnmtqsl ermkqswkea pkhiketygq
241 qyfdalynim kegllncstn lnlvtdcmeh altsvhprtr ysagwdakff fiplsylpts
301 ladyiltrsw pkpaqav
I think you'll all agree that we have isolated the problem.

Memo to Dr. Jensen and co.

We're not aiming for something ethically compromised and morally bankrupt like eugenics. What we're aiming for is passive adherence to responsible policies concerning our national genetic security. Not everyone is comfortable with the idea of modifying thier kids. Heck, remember that most states have tight regulations on even playing around with *abandoned* embryos.

Still, with our genome sequenced and new discoveries concerning the fundamental inner workings of the human animal emerging almost daily, our species has acquired a new way to identify itself. It's easy to imagine that, in several years, online dating services will allow clients to select potential mates with compatible immune systems, and perhaps help prevent two heterozygotes for a lethal or detrimental mutation from meeting. More importantly, this improves the nation as a whole, as it reduces the amount of money spent on treating congential defects, while simultaneously expanding our pool of productive citizens.

But why restrict this kind of thing to the private sector? After all, no matter how responsible these policies are, we'd be lucky to get 50% cooperation. Unfortunately, the project requires that we improve at *least* 76.3% of the cohort to ensure that minimal amounts of detrimental alleles make it to the next generation. Thus, it needs to be implemented on a national scale and applied to the entire population for the course of at least two to three generations.

Therefore, stop whining about "natural order", we're making a better American people, and our duty to ensure that outcome trumps anything else we might want to consider.

Friday, April 20, 2007

The Selfish Gene, Part II

Today’s threats to National Security are existential. Hackers and terrorists – both operating without a military to attack, boarders to invade, or citizens to target – threaten the day to day security of the American people. The problem is the democratization of technology such as computers or weapons. Now anyone can be as powerful as the governments attempting to control them. So what is the point of a government?

It is time to usher in a new era of social engineering to control the population. The time to control the spread of powerful technologies has passed – now we must mitigate the effects of this spread. We can do this by learning more about selfishness in an attempt to make compliance with society in the interest of these rogue elements.

Let us begin by demonstrating the inherent selfish value of altruistic behavior.

The American political scientists Robert Axelrod has created a “tournament” of computer programs, all equipped with a different strategy for dealing with a Prisoners’ Dilemma.

In each round of the Prisoner’s Dilemma tournament, there is a “banker” who controls the flow of money to the players. Each player has two options, “cooperate” or “defect.” Each player chooses an option simultaneously, so that one player’s move cannot influence the other’s. The trick is that each player’s winning are dependent on the other player’s move. There are four outcomes:

OUTCOME I: Both play cooperate. Each player wins 3 points.
OUTCOME II: Both play defect. Each player wins only one point.
OUTCOME III: Player 1 plays cooperate, player 2 plays defect. Player 1 wins 0 points. Player 2 wins 5 points.
OUTCOME IV: Player 1 plays defect, player 2 plays cooperate. Player 1 wins 5 points. Player 2 wins 0 points.

The competition is open to computer scientists and game theorists. One might expect the most vicious programs – for example, one that never cooperates – to win the tournament. But on the contrary, the winner of the first tournament was the most altruistic… “tit-for-tat,” a program that simply copied the move made in the round before.

In the next tournament, an even more altruistic program, “tit-fot-two-tats,” only defected if it was defected against twice in a row by the same program. It did even better than “tit-for-tat.”

Altruism works in this simulation, because like in human society, it is a non-zero-sum situation. Everyone can win.

My final post will discuss how to apply the strategy of selfishly motivated altruism to society.

Thursday, March 22, 2007

More "Atypical Subversive Strategy" goodness

Thank you for the congratulatory e-mail, Darwin. And if you haven’t heard, Lamarck, I’m finally Section Two! I’m now privy to the specific details of the great plan. I’m going to post both stage 2 (not to be confused with section 2, of which I’m now a part) and 3. Section 2 is entirely dull, so I’ve gone to great pains in order to summarize it. Most of it is economic gibberish – I’m sure they’re paying a lot of monkeys to crunch these numbers. I think you’ll be much more interested in stage 3. To be completely honest, Stage 3 (though it’s only in the preliminary stages – it all depends on the success of the first two stages) is giving me second thoughts about this whole thing. Not that it matters – we’re all in way too deep at this point.


Stage 2: Popularization (3-10 years)

The goal of Stage 2 is to make genetic fingerprinting more accessible, while maintaining its social value. It will begin with a vast reduction in cost and the end of ISCP’s patent rights to the genetic fingerprinting technology. Continued identity theft, along with the ever-increasing medical benefits will catapult genetic fingerprinting into mainstream culture.

[Enter a whole host of tables regarding mean salaries and strategic tax refunds]

If this stage is not deemed successful within 3 years, we will green-light the in-house development of a genetic epidemic. This disease will be highly localized, yet sensationalized by our chief advisors.

At the end of Stage 2 the technology will be publicized and, following a raise in federal taxation, will become free to all citizens (it will not be mandatory). This will usher Stage 3.


Stage 3: Lottery (50-70 years)

Stage 3 will begin with the creation of several hundred gated communities. These homes will be modeled after those affordable by the top 20th percentile.

These communities will include official government jobs for all residents, along with the amenities of a normal town. The government will retain ownership of each house indefinitely; the death of the official tenant of a house will result in the expulsion of their family.

Each town will be equipped with an underground shelter; these will allow the residents of the town to survive underground for one century in the case of a nuclear attack or other crisis.

The official justification for these communities will be that we require an adequately robust and varied genetic pool to continue our existence in the event of a catastrophe. In effect, we will have set up a lottery in which the price of admission is to be genetically fingerprinted. If we can maintain the allure of these communities, we believe that genetic fingerprinting will have reached levels of at least 98.42%.

Monday, March 12, 2007

Funny Movie

This is a video showing a chimp hacking a voting machine. HILARIOUS!

http://www.bbvdocs.org/videos/baxterVPR.mov

Friday, March 2, 2007

The Selfish Gene, Part I

The human body contains approximately 100 trillion cells, most of which are less than a tenth of a millimeter across. Inside each cell there is a black blob called a nucleus. Inside the nucleus are two complete sets of the human genome (with the exception of the sperm and egg cells, which have only one copy, and red blood cells, which have none).

The human genome is organized into twenty-three pairs of chromosomes. Of these, twenty-two are ordered by approximate size, from the largest (one) to the smallest (twenty-two.) The remaining pair consists of the sex chromosomes, two large X chromosomes in women, one X and one small Y in men.

Each chromosome contains several thousand instructions (genes), which can be broken up into paragraphs (exons), which are interrupted by interference (introns). Each paragraph can be further broken down into words (codons) written with letters (bases). There are one billion words in a gene, making it longer than 800 Bibles.

In between the paragraphs of useful information (exons) lie long stretches of random nonsense and repetitive strings or irrelevant code (introns). Hidden in this immense code is the dirty secret of the genome – each gene is far more complex than it needs to be. The reason for this confusion is that the genome has been adding, deleting, and amending in the process of self assembly for over four billion years.

What makes this nonsense code in the genome so fascinating is that because it is self-replicating, it is prey to parasitism. In fact, the gene is riddled with the equivalent of computer viruses… selfish, parasitic stretches of letters that only exist because they are adept at getting themselves duplicated. The Human Genome Project found that about 35% of our DNA is so-called “junk code.”

Just as the code of the genome is the survival mechanism for these meaningless bits of DNA, which exist only to exist and reproduce, the more we learn about genetics, the more it seems like the human body is merely the survival mechanism for our genes to exist and reproduce.

Monday, February 26, 2007

Reminder on RFLP and SSR analysis (Background)

The boys in Implementation and Planning keep whining about not understanding the jargon we keep using, so I had an intern write up a short summary of the more mundane technology we're talking about. If you have questions or complaints, just e-mail me and I'll be sure the little twerp gets an F. If it's really bad, then I'll just have Bill register him as a sex offender after we send him back to college.

Humans are a diploid mammalian eukaryote, with 22 pairs of autosomes and 1 pair of sex chromosomes, with gender determined by Y-mediated “XY” determination. At present estimate, humans have approximately 20,000-25,000 genes, with only about 1.5% of the total length serving as protein-coding exons, with the rest being occupied by transposons, pseudo-genes, regulatory elements, tandem and interspersed repeats, as well as other, undiscovered genetic elements.

All genetic analysis relies on a technique called Polymerase Chain Reaction (PCR), which is used to amplify (exponentially copy) small samples of DNA. The section of DNA amplified can be targeted, since the DNA needs an RNA primer to begin copying. If the sequence of nucleotides flanking the gene or segment of interest is known, then RNA templates can be constructed that anneal to the flanking sequence.

When these primers, the DNA of interest, and taq DNA polymerase (the protein responsible for copying DNA. Taq DNA polymerase is a polymerase extracted from a thermophillic Archaebacteria found in the geysers of Yellowstone, and thus are not damaged by high temperatures) are mixed together, melting the DNA allows the RNA templates to bind to the flanking sequences, which allows the taq DNA polymerase to begin copying both strands of DNA. This produces two strands of DNA, both of which have one molecule of original DNA, and one molecule of newly created DNA. This process is repeated several dozen times, at which point, you have (2n - 2) molecules of new DNA, and 2 molecules of original DNA. This process can be altered in many ways allowing for sequencing of the DNA, copying of multiple sites, as well as finding out the rate at which the DNA reanneals or melts, to find the repetitiveness of the DNA, or the ratio of A+T:G+C composition, respectively.

Reminder on RFLP and SSR analysis (RFLP analysis)

RFLP analysis is the older, and less efficient version of genetic fingerprinting. It uses bacterial enzymes called “restriction enzymes” to cleave your DNA at specific sites called “restriction sites”. Restriction enzymes are hypothesized to be a bacterial counter to viral invasion by cleaving the phosphate backbone of DNA at specific palindromic sequences ranging from 4-12 base pairs (bp) in length. Since human DNA has many of these sites (simply due to statistical chance), treating a sample of human DNA with 1-2 restriction enzymes will create a distinct pattern of bands when the cleaved DNA is separated via gel electrophoresis.

However, since all human DNA is slightly different, and one mutation in the composition of a restriction site can render it into “normal” DNA (and visa versa) very few people have the same pattern of restriction fragments, and application of several different restriction enzymes and use of different segments of DNA will always allow for distinction between two people (unless they’re identical twins) in case the initial results are in doubt. However, this takes time, and some regions mutate quicker then others, so results can take longer to develop and may be more subject to doubt. Thus, another form of genetic fingerprinting has come into favor, which exploits a highly variable segment of DNA.

Reminder on RFLP and SSR analysis (SRR analysis)

SSR analysis exploits the presence of the highly variable tandem repeat in human DNA. This highly variable region contains short repeating sequences of nucleotides, the repeats usually only 2-5 bp in length. The typical SSR has a repeat length of 2-9 nucleotides. A polymorphism in the number of repeats when the repeating unit is longer (in the range of 10-60 nucleotides) is called a variable number of tandem repeats (VNTR). A genetic polymorphism resulting from differences in copy number of a particular SSR is called a simple sequence repeat polymorphism (SSRP, pronounced “surp”), although the term simple tandem repeat polymorphism (STRP, pronounced “strip”) is also in widespread use (Hartl & Jones, 2004).

In most cases, these sequences exist in non-coding regions, while in several cases, their presence in coding regions has been implicated in the manifestation of a genetic diseases, most notably, Huntington’s disease. However, for purposes of genetic fingerprinting, these sequences are highly valuable. Since these sequences tend to shrink and expand between generations, comparison of only a few of these regions between any group of individuals will usually allow researchers to distinguish the individuals using their DNA. Since, on average, the human genome has one SSR every 2kb of human DNA, or about 1.5 million SSRs altogether, it is easy to find sequences to compare. This is done by applying RNA templates of sequences flanking the SSR, and then amplifying the SSR via PCR to create enough DNA for visualization. Since with every repeat, the length of the resulting fragments increases, even highly similar species of fragments (with differences of only 1-2 repeats) can be easily separated using electrophoresis.

Of course, these techniques are mostly good for placing someone at the scene of an event. However, the Genomic Revolution – beginning with the sequencing of the Human Genome, and J. Craig Venter’s application of shotgun cloning technique to whole-genome sequencing – has much more to offer.

Tuesday, February 20, 2007

Stage 1 Declassified

Still no promotion; I’ve made sure I won’t be passed up again, though. Also, do we agree that this thing is useless unless we use it? I mean, I understand these classifications exist for a reason, but it sure would be nice to know what’s going on in the other sectors. I hear they finally fingerprinted you boys in the lab, Lamarck. Still hate those needles?

Well it’s just my luck that they lowered the classification level of the first stage in the great “Atypical Subversive Strategy” on the same day I didn’t get my promotion. You might have access to it too now, but just in case, I’ll post it here. (My commentary will be in italics.)



STAGE 1: Introduction via top .1% (5-7 years)

1.0 - Introduction

The ISCP, once it has established itself in the private sector, will begin a revolutionary new service targeted to the highest tax bracket. This service will present genetic fingerprinting and inclusion in the National Genetic Database as a means of assuring the health and continued well-being of one’s self and family. It will present fingerprinting as a painless and risk-free procedure. Inclusion will originally deliver only modest benefits such as:

  • A higher line of credit.
  • Lower Interest rates.
  • Expedited airline security procedure.

1.1 - GID

These will be justified through the creation of the Genetic Identity (GID). The creation of the GID will be supplemented by several events intended to devalue a citizen’s current identity:

  • Several high profile cases of identity theft will hit newsstands. [This is being handled by the CIA, I believe]
    • Top CEOs will have millions stolen from their bank accounts; the money will not be recovered.
    • A terrorist will hijack an airplane by successfully imitating a security officer.
    • Authorities will find out, days later, that they have executed the wrong person.
  • Several hundred low profile cases around the country, intended to make the message “hit home.”

It will be explained that a GID completely removes the risk of identity theft. Several months after these incidents, national security will be saved thanks to a government official having been fingerprinted earlier that year.

1.2 -

We understand that the general public will, nevertheless, continue to perceive the service as they would a yacht or a passenger trip into outer space – an unnecessary, ostentatious luxury. That is, until certain discoveries are made in federally sponsored laboratories:

  • At this time we will unveil our cure for Huntington’s as well as any additional cures we have discovered.

In addition, several independent companies ill begin offering services such as:

  • COR (Complete Organ Replacement)
  • PBGI (Pre-Birth Genetic Information) [supposedly they can do this currently, but I’m sure there will be some technical or moral setback within the next few months]

Fingerprinting will be a prerequisite for all of the above. After several lives are saved due to these procedures, we will initiate stage two.

Tuesday, January 30, 2007

I received a memo today!

I’m sure you all received something similar, but I might as well post it:

From: Administrator

To: Dr. Mendel

Due to operational complications, it is necessary for The Signal Cascade Project to incorporate and begin to establish itself in the private sector. This does not run contrary to our previous plan, and indeed, gives us a platform from which we can begin our first stage of operation. The incorporated SCP shall henceforth be referenced as The ISCP


Word around here is that the “operational complication” involved someone leaking the name of the project to some local newspaper. Poor guy got into a car accident the next day. The journalist was killed during a mugging a few days later. I don’t think it takes a tinfoil hat to put these pieces together.

But anyway, maybe we can use the ISCPs logo for this blog? If you haven't seen it, it's pretty striking.

Saturday, January 27, 2007

In case you've been wondering what we're doing here :)

The administrator is requiring that we all remain briefed on our mission statement. Any action running contrary to The SCP’s goals will see you terminated and red-lighted. He also threw in something about frozen assets and deportation, but I doubt he’d bother filling out the paperwork involved. Regardless, be absolutely positive that you understand the following and remember to connect to this blog through secure connections only. If this is leaked to the public… just don’t let it happen.

Mission Statement:

The Signal Cascade Project exists as a means for collecting a national database of genetic information. In building this comprehensive genetic database, which will eventually contain the DNA of every American, we hope to predict and correct the behavior of our citizens. It is this government’s belief that attaining the genetic information of its citizens is paramount to national security. As the very conception of the nation-state comes under question, it is crucial that we develop the necessary means of adapting our control. It is no longer sufficient to know our citizen’s past and present; we must be able to predict, with great certainty, their future. The Signal Cascade Project exists as this government’s long-term solution to assuring its continued authority.

As such, The SCP has been granted Imperative Operation Classification. As far as the United States government is concerned, The SCP’s ends justify nearly any means. We have been given an inexhaustible budget and access to all but the highest level programs including (but not limited to) those of the CIA, FBI, NSA, and DOD. Even so, success through conventional means is believed to be improbable if not impossible. Initial poling demonstrated a strong aversion and resentment to any claim on a citizen’s genetic information. It was accepted that we do not currently have the means of legitimating any such claim. In addition, we do not have the means of enforcing any national mandate or physical apprehension of said information. Rather, we believe that the opposition to a show of force of that magnitude would result in the possible illegitimacy and dissolution of the state.

Thus, the original SCP was created as a think tank devoted to the creation of an Atypical Subversive Strategy. In other words, The SCP was created to convince the population to willingly volunteer their genetic information. If the public’s relation to their genetic information can be modified, then their behavior regarding their genetic information can be modified. These ASSs capitalize on the relative novelty of the genome and the public’s general misconceptions and ignorance regarding its meaning.

The current iteration of the Signal Cascade Project was born out of the most promising ASSs, which will be explained in further detail later. It is now The SCPs mission to carry out these strategies as well as begin rudimentary planning for the eventual use of the collected information.

Due to the highly confidential nature of this project, any unauthorized declassification of information will lead to the physical termination of the parties involved.

In my eyes, we’re playing with fire. Most of the country will buy whatever we tell them, but I can’t help but worry that someone will catch on to us. I don’t have the classification to view the “Atypical Subversive Strategy” yet, but if I get that promotion to Section Two next week I’ll hook you guys up. From what I hear it’s pretty rock-solid. Still, a little foresight into where we’re headed will help us keep these oh-so-sweet salaries, no?

Tuesday, January 16, 2007

Collaborative Blog is Operational

The mandates of article 4, section 17 of Phase XIV of our Operational Guidelines have been fulfilled. This blog will serve as a secure platform for inter-company communication unless it's hacked by some rapscallion students.