abstract keyhole opening with eye on concrete wall 2025 10 15 02 25 21 utc
When games stop being games
Summary

Alternate Reality Games, commonly known as ARGs, are often celebrated as one of the most creative forms of digital storytelling. They blend fiction with reality, puzzles with collaboration, and online clues with real-world exploration. At their best, ARGs are clever, immersive, and community-driven.

At their worst, they reproduce the same mechanics used in social engineering, OSINT harvesting, and behavioural manipulation.

This article explores how ARG structures can unintentionally, or deliberately, expose players and bystanders to real-world risks, and why security professionals should pay closer attention to them.

What makes ARGs different from games

Unlike traditional games, ARGs operate under a principle commonly referred to as “This Is Not a Game” (TINAG). The experience is designed to feel organic and unscripted. Websites look real, emails appear authentic, social media accounts behave like actual people, and events unfold in real time.

From a security perspective, this is precisely the problem.

ARGs ask participants to suspend scepticism, to treat fictional artefacts as real, and to engage across multiple platforms without the usual guardrails that signal “this is entertainment.”

These conditions closely mirror the environment required for successful social engineering.

The incidents

There are no widely documented fatalities directly attributed to ARGs. However, there are numerous cases where ARGs introduced tangible risks.

Promotional ARGs such as I Love Bees (2004) required players to answer public payphones at specific times and locations. Some of these locations were poorly lit, unsafe, or required long-distance travel with little oversight.

In Perplex City, players dug in public or semi-public spaces following clues that hinted at buried objects. This led to property damage and legal concerns before organisers intervened.

Projects like The Jejune Institute and early urban exploration ARGs encouraged participants to follow physical trails through cities, sometimes into abandoned or unsafe areas, without clear consent or safety disclosure.

Perhaps the most discussed case, Cicada 3301, remains unresolved. Its anonymous organisers directed players to physical locations worldwide. While no confirmed harm has been reported, the structure demonstrates how easily such an experience could be repurposed for surveillance, recruitment, or worse.

ARGs mechanics mirroring attack techniques

Many ARG puzzle mechanics map cleanly onto known attack vectors.

ARGs frequently request email addresses to join the game, photos as proof of puzzle completion, usernames tied to social media accounts, and public posting of solutions. In isolation, these requests seem harmless. Aggregated, they form detailed participant profiles, including interests, technical skill level, time availability, and social connections. This is classic OSINT collection, framed as play.

ARGs often rely on GPS coordinates, photo scavenger hunts,  physical clue drops, and timed real-world events. These mechanics can unintentionally expose real-time movement patterns, habitual locations, and travel willingness. In a malicious context, this is highly actionable intelligence.

Some ARGs require players to download custom tools or files, visit obscure or newly registered domains, inspect file metadata or hidden payloads, and interact with QR codes in public spaces. Each of these actions introduces attack surface. A malicious ARG could easily deploy malware, fingerprint devices, or harvest credentials under the guise of puzzle-solving.

ARGs use characters, often called NPCs, who interact directly with players through email, chat, or phone calls. Over time, trust is built. This mirrors long-form pretexting, where rapport is established gradually before sensitive requests are made. The narrative context lowers defences, especially when players feel chosen, advanced, or “worthy” of deeper access.

Psychological levers at play

ARGs are effective because they use powerful cognitive triggers:

These same levers are widely used in scams, cult recruitment, and influence operations. The difference is intent, and intent is often invisible to participants.

Why ARGs should be on security professionals' radar

From a defensive perspective, unknown ARG-like activity should be treated as untrusted until proven otherwise.

From a red-team perspective, ARGs demonstrate just how effective narrative-driven engagement can be at extracting information and guiding behaviour without coercion.

From an ethical standpoint, the lack of informed consent in some ARGs raises serious questions, particularly when real-world movement or personal data is involved.

Safety guidelines for players

For those who wish to participate in ARGs, a few precautions will give you some peace of mind and allow you to enjoy the fun with no regrets:

Legitimate ARG creators usually provide an out-of-game safety statement somewhere. Malicious actors almost never do.

Share this post :