We are currently NOT accepting. If you ask if we are still open, then you obviously have not read this.
We are those that hide from the view of the authorities.
We are the scammers, the con artists, the vigilanties, and the shadows.
We are the scorned, the adored, the talented, and the feared.
We are the Code Monkeys.
And we will be known.
This is the Code Monkey's Waterfront Hub.
Contrary to its name, the Waterfront Hub is nowhere near a port, dock, or body of water of any kind.
This particular hub will serve as the safehouse and main base of operations for the newly assembled
Code Monkey's team, designated as Seattle's 12th team, unofficial designation not yet decided.
Your team operator is known as Exo. Also, remember that you will not contact him, he will contact you.
As a Code Monkey, you will have been given a piece of clothing, equipment or gear with the Code Monkey's
insignia on it. This object will be on your person at all times, as it is your identification and how Exo will know
where you are. You will not reveal this object to anyone, not even to other Code Monkeys, unless you are
within the confines of a Safehouse hub. Identify other Code Monkeys in the field by exchanging the phrase
"I am a Hacker/Con Artist/Vigilante" to which the response will be "You will be known."
You will be able to identify other Code Monkey Safehouse Hubs via your HACKtool's HUB scanner, built into
your HACKtool by Exo while you were being evaluated by the Code Monkey's. Don't bother trying to reverse
engineer it, you'll wreck your HACKtool. This scanner will pick up Code Monkey insignia's in special coding written
into walls, invisible to the naked or enhanced eye.
Get settled in, take a walk, do whatever. Exo will contact you soon.
Welcome to Seattle.
Info from Interest Check:
Politics have driven the world to a unsteady standstill
of constant cold war between the major powers of the world,
all while the smaller powers of the world coalesce and throw their bid with the various world powers,
hoping the chose the right nation to back.
Risen from the dust of a vicious second civil war,
the United American Republic is one of the largest players in the world wide cold war.
An oppressive and authoritative nation, The UAR controls the entirety of the North American continent,
with complete influence over central and southern America. The UAR lords over its people with an Iron fist,
ignoring the suffering of its people and violently putting down rebellions where they start.
In this world of political turmoil and strife, this worldwide arms race,
the most prevalent of the races is the cyber race.
Firearms and bombs may destroy lives and buildings, but the power
of modern cyberware has the potential to wreak havok across the entire world
The United American Republic are at the front of this race,
their Centralized Command Network (CCN) an awe and example to all.
This network connects the entirety of America and its assets
to one super powered command center, impregnable and safe from harm.
Or so they think.
The basis of this Roleplay is a dystopian future where America is no longer the democratic nation that many of us live in today, but instead an oppressive, antagonistic, and power hungry group of rude dudes. The concept of this roleplay leans heavily on the ideas of the upcoming game Watch Dogs (which I am super excited for). We will be playing as a group of new members of a hacker group known as the Code Monkeys, an organization of revolutionaries and freedom fighters.
What starts off as a simple choice and an honest fight for freedom will take a turn for the worse as we find ourselves thrust into the furutistic world of Dystopian America, where conflicting loyalties and danger will hound our group at every corner, and as we struggle to survive in a not so friendly climate, where neighbors don't trust one another and brothers stab brothers in the back.
Technology has made great advances in this new world, despite its terrible conditions, and I will be describing but the surface of what is capable. Prosthesis has evolved to complete cybernetics, these cybernetics can be anything from robotic arms, to hyper advanced eyes, a computer built into your arm, even a generator installed in your chest. Bio-engineering has replaced plastic surgeries as more natural and more effective ways of altering ones self. These cybernetics and bio-advancements means that you now have complete control over your character and their appearance. These changes to their physiology can be subtle or omnipresent depending on your preferences.
While modern firearms still rely on bullets, guns use powerful mass drivers to accelerate smaller projectiles at amazing speeds. Energy weapons have been adapted for melee use as lighter, and more powerful instruments of war, whether they be blades or gauntlets. An energy based projectile weapon has yet to be invented.
HACKtools are unique and powerful computer devices used by modern hackers, as hacking will play a huge role in this RP, HACKtools, will be given their own section. Hacktools are typically unique and built from the ground up by their own respective operators. They range from powerful computers the size of cellphones, for portability and mobility, to powerful nerve center super computers for raw power, these tools are typically built in a way to suit their operator's way of life. These computers are then combined with a piece of virtual reality eyeware, which can be built into sunglasses, eyeglasses, or full on VR-suites with seat and monitors.
When a Hacker breaks into a computer system, their virtual reality devices will come online and remove their consciousness from the physical world. The HACKtool will then proceed to break into the system and install the DReamSensE Prog, slang for the Digital Reality Sensory Environment Program. This program converts the network into a 'physical' form to be better comprehended by the human brain, allowing them to truly 'enter' the system. Instead of seeing a screen of code 0s and 1s, the Hacker will be able to see a representative hallway or vault, as well as see themselves as their own personal AVATAR as opposed to a blip in the system. DReamSensE in this manner also makes information easier to locate, as they will typically take the form of round pillars or archives for the Avatar to access.
Once the installation of the DReamSensE and Avatar are complete, the HACKtool will automatically install Programs for the Hacker's Avatar to use during hacking. These hacking programs can be represented by physical items as well, such as a sword or gun for data deleting and erasing programs, to shields and smokescreens for protective commands.
Most, if not all computer systems are protected by security programs, DReamSensE visualizes these programs as physical beings as well, which will attempt to kill, or delete the Avatar. When an Avatar's data has been deleted or corrupted to a point that it can no longer hold a physical form, the HACKtool will automatically dump the user from the system, the resulting 'dump shock' typically disorients or incapacitates the operator in the real world for several minutes. Being fully deleted while the having one's consciousness inside his or her avatar usually if not always results in the death of the operator.
Though built for breaking into high security computer systems, the HACKtool can also remotely hack into various subsystems on the network its currently hacking, this allows an operator to change traffic lights, short out street lights, and manipulate security cameras without having to jump into the DReamSensE and risk possible dump shock.
- - - Character- - -
Code Monkeys Dossier: Joshua Sykes
Name:Joshua 'Jack' Sykes
Cool and collected, Joshua maintains a rather mundane attitude coupled with a mundane appearance and dress, making him more or less completely forgettable, a trait that highly valued amongst the underground community. Beneath his very typical appearance, is a very atypical Hacker. Bright and intuitive, Joshua excels at thinking on the fly and can easily cook up schemes to avoid detection, in the physical world as well as the digital world. He is professional and capable, though his loyalties to the Code Monkeys is still in question. His loyalties seem to tie to himself and his own as opposed to the whole of the Code Monkeys.
A computer science graduate from Massachusetts Institute of Technology, Joshua was born in DC and showed an aptitude for computers at a very young age. Coming from a family with a good amount of money, Joshua was bio-genetically engineered to have marginally denser degree of white matter in his brain as well as an above average IQ. At the age of 16, His pupils were replaced with cybernetic implants to further increase the rate at which he processed and understood information, granting him almost prodigal status among his peers at a young age. Side effects of his genetic modification came in the form of a lack of empathy for the people around him, resulting in him having few friends, however, his increased understanding allowed him to understand the ways of social norms without alienating himself from public.
Joshua has a hardy physiology, as during his school years, his increased brain power allowed him to learn what his peers did in less time, allowing him to focus on various sports, and increase his overall physical performance. He excelled in sports like Track and Volleyball, and showed a talent for less contact intensive sports.
Joshua entered MIT with a 2400 SAT score and 4.8 GPA, earning himself a large scholarship, which he filled out with a track scholarship. He double majored in computer engineering and computer science, and earned high grades throughout his career as an undergraduate student. Upon graduation from MIT he returned for Graduate school to continue studying computer Science. Joshua nevertheless finished graduate school at the top of his class, earning a Master's Degree in Computer Science.
Shortly after his graduation, Joshua was approached by one of his favored professors, who revealed himself to be a member of the Code Monkeys. Though seemingly disinterested in the Code Monkeys' cause, Joshua nevertheless agreed to join with them.
The Parasci Global type 21 revolver (B variant) is an uncommon revolver type mass driver pistol. It uses a six round cylinder that fires .357 magnum rounds, propelled to high speeds with its powerful mass drivers found in the front barrel of the weapon. The weapon comes with a built in stock that braces the weapon against the user's forearm, allowing the operator to fire one-handed with a good amount of stability. Its cylinder can be removed and replaced for quick loading, or rounds can be inserted individually.
The Electron Mace is a telescopic baton commonly used by police and security forces. It is capable of delivering a debilitating electric shock to an person's nervous system, and when needed can start a short circuit or overload in a power system. When closed, the electric head and grip are connected. It can then be pulled to its maximum length. Its electrical system is activated by a small trigger loop at the bottom of the handle, triggerable with the little finger.
HACKtool: A portable HACKtool taking on the appearance of a black touchscreen smartphone, Joshua's handmade system features a powerful processor encased inside in an impact resistant phone casing. Its edges have matte black grip strips, allowing Joshua to operate it in one hand without fear of accidentally dropping his device. It uses a wireless tap system to hack into computer systems. The Wireless tap remains riskier and less stable than a physical tap, but its convenience and usability make up for its possible shortcomings.
AVATAR Appearance: http://i42.tinypic.com/30ufrjp.jpg
Username:Datajack, commonly referred to as 'Jack'
AVATAR Balance: Datajack is an overall well balanced Avatar, allowing him to be used in a variety of situations. His relatively low SP limits him to 2 active programs at a time, base weapons included, but his above average HP and DP make him an effective combatant and cipher.
Dataclaws:Taking the form of glowing orange fingers, the Dataclaws allow Jack to tear through the coding of enemies. Unlike typical melee weapons, they lack the reach of even a knife program.
Datapulse:Datapulses have the same orange as Jack's Dataclaws. These serve as Jack's ranged weapon, small, thin pulses fire out of his palms at a high rate. Individual pulses inflict very minor damage, but its high volume of fire and speed mitigate this weakness.
Keygen: Taking the form of a long, thin blade protruding from the wrist, the Keygen is used to crack the lock on encrypted archive pillars. It uses a very streamlined type of brute force hacking to crack codes. It can be used on hostile programs as well with varying degrees of effect.
ScreenSpam: Taking the form of a smokescreen bomb, the Screen program disorients and confuses hostile programs by overloading them with a multitude of various pornographic images, many with simple viruses encoded into them. These viruses are a mere joke at best and the damage done by them can be undone by the simplest of programmers, but it serves as a time consuming annoyance.
Salvager: Taking the form of a syringe needle, the Salvager program attempts to rebuild Avatar data that has been corrupted or deleted. More grievous damage to an Avatar's code is more difficult to repair.
Purpose: General Multipurpose Avatar