Conspiracy - The game

Document
Cover Image

Opens with a boardroom with no windows. The people in the boardroom are suits and are working for a governement. They are in charge of national security for the country in question. Numerous files on the desk and all are handed a piece of paper with details of the meeting. Throughout the scene there is a young women who looks incredible sweet and appears to be intimidated by the big dominant figures in the room. She timidly works around them and hands out the tea and coffee during the meeting. She isnt noticed by anyone in the room and most will not look at her when they reply with their request for a drink.


 


Wallis


(getting everyones attention)


Right. Shall we get started? We have alot to get through. (Pause) As you are aware this meeting has been called as a result of a leak within the building. You've all seen the papers, I'm sure. I don't have to tell you the devasting effect this attention has given to our survelliance of suspects in all cases across the board. Everything from  our phone hacking to being able to remotely access web cams has been released, along with survalliance files too. I have had my ass hauled infront of the Prime Minister about getting this mess cleared up as quickly as possible. I am in no hurry for that to happen again. (Others nod in agreement) As a priority we need to establish the source of the leaks.


Baxter


I have had my top guys looking into this tracking the telephones and internet networks of all within the building but as there are over 600 personell in this building it is taking time to work through the vast data.


Wallis


If you need more man power then take it. This needs to be taken care of as quickly as possible.


Baxter


The difficulty is trust Sir.


 


Wallis


Trust?


Baxter


Well, I don't want to sound like one of those crazy bastard conspiracists but at this stage we have no lead of who it is who has leaked the information and files and so by throwing more man power into the investigation we may be making ourselves vunerable by having the person or persons doing the leaking investigating themselves.


Bellman


Do you think there is more than one person?


Baxter


Hard to say at this stage but the volume of information leaked, and from the dates of the information gathered, it would all have to have been collated within a time frame of a month. And that is if they were just solidly copying the data for their working hours.


Bellman


So it is likely that it has either been carrying on under our noses for months or a team have done this. Where do we start?


Wallis


Well the paper it was leaked to was the first place to start but they were prepared for us to tap them and we found nothing. No IP's, data streams or anything matched our employees.


Haim


Have they been wiped or could it be that this isnt an employee?


Wallis


(Confused) What do you mean?


Haim


Have we been tapped? (room erupts in horror at the thought) It needs to be considered.


Wallis


Calm down. Mr Haim has a point. There are so many questions that just lead to more questions. But this is what we do. The leak must have been by some bleeding heart liberal or something. Can we cross check political voting of our employees?


Haim


I would question the ethics in that


Wallis


I think you may be in the wrong job in that case (laughs and the others laugh with them)


Haim


I guess as long as the information isn't released to the polictial parties and is purely for investigative purposes it should be ok.


Bellman


I think it would be prudent to look at the area of we have been hacked.


Wallis


I would be relucant to submit for man hours as we know that this is increidbly difficult for even the worlds best to do. Baxter, what do you think?


Baxter


I think we have to consider everything at this stage. Let's look at who has benefitted from this.


Smith


Anti governement groups, the conspiracy theorists have had their web pages explode with people looking for more information and what they know. My suspician lies with them and i second the idea that we should look outside the agency.


Wallis


How so?


Smith


They seem to know alot more than the papers. Either they are filling in the gaps and guessing or they know.


Wallis


Baxter, can you target them?


Baxter


These people have machines and connections like Fort Knox. Virtually impossible. Even Trojan Horses would struggle, they are too suspicious.


Wallis


(hopeless) Well any other suggestions?


Smith


If I may. I have been responsible for keeping track of these groups for some time and there may be a way in and access the information.


Wallis


Go on


Smith


Gamers. They are all gamers. Late night gamers and that is how they communicate.


Bellman


So you want to train our employees to play games with them?


Smith


No. It wouldn't work. We would still not be able to access the information they have without having permission.


Baxter


I don't follow how this helps.


Smith


For sometime I have been working on a computer game that allows the user to play a challenging and addictive game that flatters their interests but at the same time has coded within the algorythims a way of latching onto the computer and streaming data to us, undected.


Wallis


Bloody brilliant


Haim


How would you get them to buy it? Give it away?


Smith


No, free would be suspicious. They pay for it.


Baxter


How?


Smith


The game i have been developing is called "Conspiracy theory". Interactive role play with challenges that slowly reveal clues that can piece together a story and the conspiracy that happened. It can be played with more than one person so the more computers connected the better. Another feature is once the spyware is on the computer any interactive connections via the internet send the "seed" that plants in the recepients computer whether thay have the game or not.


Wallis


What if they suspect the purpose of the game?


Smith


They will. Some will defy the skeptics and try it and that is all we need.


Bellman


Bloody brilliant.


Smith


Clearly, we are a few months off the completion of this game so other investigations will need to be in place until that time.


Wallis


Why will it take more time?


Smith


Money


Wallis


(laughing) I am positive I can find a solution to that.


Haim


It is a good idea, but it is just more hacking and sifting through information to try and find the leak. The hacking is going to be of highly protective targets. What if they suspect it links back to us?


Smith


Well we let it die down before we release it and any challenge it is connected is dismissed as a marketing ploy by the games maker.


(They continue to talk as the tea girl leaves the room. She takes the coffe trolley back to the kitchen. Seems friendly enough to the other staff. Goes on her lunch break and heads to the park. She sits on a bench to have a sandwich and a guy sits next to her. Without even looking at each other he talks to her)


Man


What have you got for me today?


 


End 

Created: Mar 21, 2014

Tags: conspiracy, script, gamer, games

ChrissyRegler Document Media