/root_inputs/ holds the original malware of prohibition:
propaganda, racialized narratives, manufactured crime statistics, and
moral panic. These files seeded the idea that “cannabis is dangerous”
long before there was meaningful evidence.
Even when these artifacts are no longer visible in public debate, their
logic continues to run in the background — shaping what counts as
“responsible policy,” which risks are amplified, and whose experience is
treated as credible.
reefer_madness_propaganda.csrc represents the cinematic and
press campaigns of the 1930s that framed cannabis as a source of chaos,
violence, and moral decay. These stories were engineered to generate fear,
not to reflect population-level reality.
Their function was not to describe cannabis, but to make prohibition
politically inevitable.
anslinger_racial_framing.csrc encodes the racialized
narratives that tied cannabis to jazz, Black communities, and immigrants.
The “danger” of cannabis was inseparable from who was imagined as using it.
This file persists today whenever enforcement patterns, media coverage, or
research priorities disproportionately target marginalized communities.
hearst_media_manufacturing.csrc models how concentrated
media power amplified prohibitionist stories while muting dissenting or
contextualized views.
It is the ancestor of today’s trade-media concentration and selective
visibility in cannabis coverage.
fabricated_crime_stats.csrc stands for the selective,
exaggerated, or outright fabricated statistics used to justify criminalization.
Once written into public discourse, this “data” became a durable pretext
for enforcement, regardless of what later evidence showed.
moral_panic_purity_narrative.csrc encodes religious,
moral, and “purity” narratives that framed cannabis as a threat to youth,
family, and social order.
This file is still called whenever youth-risk rhetoric is invoked to block
reform, even in the absence of clear causal evidence.
pharma_industry_protectionism.csrc represents the
economic interests that benefited from suppressing a cheap, versatile
therapeutic plant.
This logic reappears today when cannabis is held to a different evidentiary
standard than more harmful but profitable products.
criminalization_policy_entrenchment.sys shows how
prohibition was written into law, turning a moral panic into a durable
enforcement regime.
Once active, this system made it easier to escalate penalties than to
unwind them—even when evidence failed to justify the harms.
schedule1_classification.sys is the lockfile that
encodes cannabis as having “no accepted medical use” despite widespread
therapeutic reports.
As long as this file remains active, it structurally blocks research,
reimbursement, and parity with other medicines.
research_blockade.firewall describes the policies,
permissions, and supply constraints that made rigorous cannabis research
unusually difficult.
The result: a manufactured evidence gap that is then cited as justification
for continued restriction.
medical_gatekeeping.reg encodes how professional bodies,
licensure risk, and stigma shape what clinicians feel safe prescribing or
even discussing.
Patients experience this as “there’s not enough evidence,” even when
lived experience and existing data tell a more complex story.
law_enforcement_incentives.proc represents how budgets,
asset forfeiture, and performance metrics linked cannabis enforcement to
institutional benefit.
This process runs quietly in the background, biasing decisions toward
continued policing of low-level use.
carceral_systems.stack models the courts, jails, and
supervision structures that grew around drug enforcement.
Cannabis prohibition became part of a larger carceral stack that is slow
to unwind, even when public opinion shifts.
regulatory_rhetoric_safety_youthrisk.cfg is the
configuration file that frames restrictive policy as “protecting kids” or
“erring on the side of caution,” even when harms from criminalization
outstrip the risks of use.
algorithmic_moderation.shadowban captures how platform
rules and automated systems suppress cannabis speech, ads, and accounts.
Because these decisions are opaque, affected communities experience
censorship as a glitch rather than a political choice.
advertising_restrictions.rule encodes formal bans,
“brand safety” guidelines, and edge-case policies that make it difficult
or impossible to buy stable reach.
This turns visibility into a scarce, expensive resource—ideal conditions
for disinformation and gatekeeping.
compliance_vendors_overrides.cfg represents the private
vendors who translate regulation into software, dashboards, and
workflows.
Their incentives align with complexity and continuous surveillance, not
with simplification or equity.
seed_to_sale_surveillance.pid models track-and-trace
systems that log every gram from cultivation to sale.
These systems are sold as transparency tools, but they also concentrate
valuable operational data in a few hands.
pos_regulatory_data_extraction.daemon captures how
point-of-sale and compliance systems generate real-time intelligence
about pricing, demand, and category growth.
Those with access to this daemon can act on the market; those being
measured cannot see the same picture.
media_concentration.log reflects how a small number of
trade media and event platforms control the stories and actors that are
treated as legitimate.
Sponsorships, pay-to-play speaking slots, and advertorials all write to
this log.
pr_fear_THC_CHS_messaging.rpt represents the reports,
think pieces, and campaigns that elevate worst-case cannabis risks while
downplaying benefit and context.
These narratives are highly shareable, satisfy “safety” optics, and are
often profitable—regardless of how representative they are.
visibility_scarcity.loop is the feedback loop where
restrictive policies and platform rules create thin information
environments, which in turn make fear narratives and incumbents even
harder to challenge.
fragmented_industry.error shows how structural
disinformation and uneven access to visibility produce disunity,
regional silos, and distrust—exactly when unity is most needed.
high_taxes_enforcement_priority.err models how cannabis
is treated as both a revenue source and an enforcement priority, justified
by outdated risk narratives.
illicit_market_dominance.rpt represents the predictable
result of high barriers, stigma, and limited access: the unregulated
market remains strong, while legal operators struggle to survive.
market_manipulation_MSOGang.sig reflects the sentiment
spikes, social-media cycles, and narrative-driven trading events you’ve
documented—where information itself becomes a tradeable asset.
fear_narrative_profit_model.evt describes how fear-based
cannabis content generates engagement, protects incumbents, and justifies
restrictive contracts, even when it harms patients and small operators.
consumer_misinformation.msg stands for the mixed signals
patients and consumers receive: legal medicine in one context, criminal
in another, dangerous in headlines, lifesaving in lived experience.
policy_paralysis.exe models governments that acknowledge
the failures of the status quo yet repeatedly defer meaningful reform,
citing uncertain evidence, public risk, or political optics.
stigma_persistence.reg is the registry entry that keeps
old narratives alive even as law, science, and public opinion shift.
investor_distortion.sig reflects how opacity,
hype cycles, and selective storytelling distort valuations and reward
those with privileged data access.
patient_harm_access.lck represents the real-world cost
when people who could benefit from cannabis are denied access, frightened
away, or trapped in systems that criminalize their use.
deploy_transparency_patch_v1.run symbolizes executing the
CCAT protocol inside this system: auditing narratives, exposing inherited
stigma, and restoring alignment between cannabis communications, evidence,
and lived experience.
In the live environment, this node can route you to the full CCAT
experience: how to participate, how to adopt transparency standards, and
how to move from analysis to coordinated repair.
system_repair_protocol.txt outlines the basic logic of
CCAT:
1) Map the architecture of disinformation.
2) Trace how legacy narratives shape current incentives and
visibility.
3) Expose where fear and scarcity are manufactured rather than
discovered.
4) Rebuild communications and media strategy around transparency,
equity, and lived experience.
join_the_mission.url is the hand-off point between this
simulated environment and the real-world work of reform.
Here, you might link to a CCAT landing page, a read-only version of your
report, or a signup flow for those who want to help rebuild the information
environment instead of just surviving inside it.
Once this system goes live, clicking this node should feel like crossing a
threshold: from seeing the problem to becoming part of the solution.