▶ A NICE GAME OF CONFESS ▮ ATC ▸ All Types of Crime
WPA (1981) → “another server on the network when there were no servers.” Foundation, then replication.
To the writers, producers, and stewards of the reproductions, namely: Lawrence Lasker, Walter F. Parkes, Robert Zemeckis, and Bob Gale — you built a catalog of “games.” We built a catalog of crimes. Same grid, different mask. You know what ATC means. You also know what comes next.
Demand: Provide a signed, unambiguous confession of source and method acknowledging the 1981 WPA system (ATC — All Types of Crime) as the originating architecture and narrative well from which your later “lists,” motifs, and characters were derived, mirrored, or repackaged — including the appropriation of the likeness and persona of Scott B. C. (SBC) and a pattern of public, aggressive torment continuing through at least October 4, 2025 (10-04-25). 1981 WPA ⇔ Cperm.
Including, without limitation, the following misconduct:
- Replication of the WPA ATC menuing structure as a “game list,” with renamed categories and copied security rituals.
- Use of SBC’s likeness, identity markers, and biographical motifs in casting, character composites, dialogue, wardrobe, marketing, and promotion.
- Coordinated public antagonism and psychological torment — orchestrated, funded, or incentivized by you through a network of agents, contractors, and platform partners, with willful disregard of foreseeable harm and subsequent attempts at concealment — including targeted/manipulated license-plate patterns in traffic, staged road-rage incidents, in-store provocations inside public establishments, media placements and ads, social-channel campaigns, and “coded” triggers.
- Symbolic taunts and referential “tells” mapped one-to-one to WPA artifacts, timelines, and private materials.
- Suppression/blackballing and reputational smearing intended to chill assertion of authorship, ownership, and credit.
- Unjust enrichment from derivative works and secondary exploitation across franchises, spin-offs, and tie-ins.
- Monitoring/harvesting/misappropriation of communications, notes, drafts, or assets; manipulation of timestamps, edit histories, and provenance trails.
- Spoliation risks: destruction or alteration of drafts, treatments, casting notes, production minutes, logging systems, and archival records.
Terms if you stall: immediate preservation holds and subpoenas for communications (email, text, and messaging platforms), version histories/edit logs, treatments, casting notes, marketing briefs, and minutes evidencing deliberate echoing of WPA’s menuing and security-challenge design and the SBC-likeness pipeline. Non-response will be treated as refusal and further evidence of willful concealment.
The question in front of you: will you cop to your part of the IP theft and torment — or will you blow the whistle on all of it and help unwind the scheme? Choose ATC → ACT. We are prepared for court.
ATC / CAT / ACT — same letters, different order. Choose wisely.
WPA | A.T.C. MENU (1981) — crimes listed the way you later listed “games”
Sample categories as presented to hand‑picked callers on the dial‑out system; choosing certain items triggered deeper verification and elevated challenges.
Note: These were theatrical menu labels inside an immersive fiction sandbox — the point was the interface, the structure, and the security ritual that you later echoed as a “game list.” The mask changed. The grid did not.
Final move
Pick one:
Timer is already on. Choose ATC → ACT.
