Rebel, Rebel
Rebel Scenario Two:
The Information Rebellion

Katniss Everdeen
We have become a nation of cyberspies and infotech bureaucrats, obsessed with collecting and cataloging information about the most intimate details of one another’s lives. There is nothing that a talented hacker or determined, code-bearing individual cannot find out about you. Everything, from grocery lists gleaned from supermarket scanners to daily itineraries gathered from credit card receipts and public security cameras, is up for grabs. Your private medical records, which you mistakenly believed to be protected, have been plucked from insurance files, and the personal details of your financial life culled from bank and IRS records. Even your sexual proclivities and other preferences have been made available through magazine subscriptions and cable television records that show a day-to-day breakdown of exactly which shows you have been watching and when.

The Establishment insists that collecting such information is in the best interest of all of us, and has recently made additional inroads into the private lives of its citizens. In the interest of defeating a growing terrorist threat and stamping out illicit drugs, the President recently signed a sweeping law making it legal for law enforcement to search any citizen who fits a “suspicious” profile, and to tap any telephone without a warrant, based only on “reasonable suspicion” that a crime is being committed. Security cameras are becoming a ubiquitous fact of everyday life, from the workplace to the shopping mall, bank, and the home. Tens of thousands of security cameras have even recently been installed on the open highways — the last frontier of freedom — on the pretext that recording the comings and goings of all of us not only deters crime, but also removes any doubt about who is really at fault in the event of an accident. It has become virtually impossible to send or receive faxes or e-mail, without the transmission first passing through a government “security” system. In the view of a growing number of citizens who dare not publicly voice their concerns for fear of persecution, security has become just another word for totalitarianism and the very notion of democracy has been subverted by a growing infocracy.

An underground band of revolutionaries is determined to bring down the system by uploading a doomsday virus into the nation’s computer network. But hacking their way into the mainframe has its own peculiar risks, including the fact that the corrosive computer virus they carry on a disk cannot be stopped once they unleash it. The resulting chaos is bound to put millions of human lives at risk, potentially resulting in such catastrophic effects as the loss of essential systems vital to national security; the destruction of crucial financial, medical, criminal, and other records; and the emergence of terrorist factions determined to exploit the situation. What’s more, the secret information the group begins to uncover in hacking its way through the network is so compelling that it’s addictive. In its own way, the addictive quality of that information is its own greatest defense against unauthorized entry — because those who become caught up in the web of intriguing secrets they discover have an unprecedented opportunity to join the power elite of the very system they are seeking to destroy. At the same time, Establishment forces are using all of the information-gathering and law-enforcement resources at their disposal to track down and eliminate the Rebels before they can get too far, not only in the interest of national security, but also — ironically — to protect the privacy and privilege of the power elite.

To explore the heart of rebellion, take on the role of one of the characters below (or any other individual you care to invent) and consider your own actions and role.

The Characters

The Establishment

Capt. Morgan Bureau, Deputy Assistant to the Assistant Director, National Security Agency, a career bureaucrat who rose quickly to a position of influence by gathering sensitive information about those in high places. Widely regarded as the “power behind the scenes” at the NSA.

Max Random, Director of Information Services, Federal Bureau of Investigation, a meat-and-potatoes, self-described Establishment patriot, who believes that safeguarding the national security requires gathering and processing vast amounts of information about the private lives of citizens. Favorite saying: “Those who have nothing to hide have nothing to fear.”

Dr. Mandy Tattoo, Computer Sciences Fellow, Georgetown Center for Strategic Studies, the world’s leading expert in computer viruses, widely regarded as “Chicken Little” for publishing doomsday scenarios involving computer viruses.

The Rebels

Dr. Robin Moore, a former graduate student of Dr. Mandy Tattoo’s, considered the up-and-coming young genius in the field of computer network security. Turned down for a top government position after a routine security clearance check revealed a family history of mental illness. Harbors a bitter resentment toward all government “file clerks.” Designed the doomsday virus as the ultimate act of civil disobedience.

Terry Monitor, a computer hacker savant, who makes up for a complete lack of social graces by playing the computer network like a virtuoso. Breaks into secure Defense Department computers as a purely recreational pursuit, and particularly enjoys collecting inside information of every variety. Holds only one stated political conviction: that hacking is not simply the right, but also the duty, of every citizen in a free society.

Brett Bishop, Retired Special Agent, Central Intelligence Agency, a disillusioned ex-intelligence officer who spent 20 years defending the nation against outside threats, only to find its democratic way of life being undermined by the emerging totalitarian threat within. Favorite saying: “A little knowledge is a dangerous thing.”

Further Thoughts
OK, you’ve chosen a character. You’ve thought about the attitudes they hold, the things that are important to them, their temperament, etc. And you’ve tried to imagine how you — as the character — would handle the Information Rebellion scenario. Now we’ll throw you a little curve. Consider the outcomes described below. How will your character deal with these choices and these risks?
The Information Rebellion concerns our very notions of security and liberty, but is not necessarily a black and white war of good versus evil. If the Establishment prevails, the nation will be relatively secure against outside threats, but will also confront the burgeoning threat of becoming a totalitarian police state in which all notions of privacy and freedom give way to what must ultimately be described as an infocracy — a superficial democracy concealing a thinly veiled information dictatorship. But if the Rebels succeed in bringing down the bureaucracy without becoming absorbed by its compelling secrets in the attempt, the national security will very likely be compromised to such an extent that the country will collapse in an unprecedented wave of financial holocaust, violent crime, and terrorism. The fate of the nation will depend upon whether the Establishment or Rebels prevail in their divergent approaches to safeguarding our freedom. How would you respond to this dilemma if you were the character or characters you’ve chosen?

Think you know now if you’re a Rebel at heart or a defender of the Establishment? Maybe it’s not so simple. This was just one possible future. You might respond differently under other circumstances.

This article copyright © 2016 by Alpha Cygni, Inc. and Keith Harary. All rights reserved.