It is the year 2121.
Politics have driven the world to a unsteady standstill
of constant cold war between the major powers of the world,
all while the smaller powers of the world coalesce and throw their bid with the various world powers,
hoping the chose the right nation to back.
Risen from the dust of a vicious second civil war,
the United American Republic is one of the largest players in the world wide cold war.
An oppressive and authoritative nation, The UAR controls the entirety of the North American continent,
with complete influence over central and southern America. The UAR lords over its people with an Iron fist,
ignoring the suffering of its people and violently putting down rebellions where they start.
In this world of political turmoil and strife, this worldwide arms race,
the most prevalent of the races is the cyber race.
Firearms and bombs may destroy lives and buildings, but the power
of modern cyberware has the potential to wreak havok across the entire world
The United American Republic are at the front of this race,
their Centralized Command Network (CCN) an awe and example to all.
This network connects the entirety of America and its assets
to one super powered command center, impregnable and safe from harm.
Or so they think.
Enter the Code Monkeys.
We are those that hide from the view of the authorities.
We are the scammers, the con artists, the vigilanties, and the shadows.
We are the scorned, the adored, the talented, and the feared.
We are the Code Monkeys.
And we will be known.
The basis of this Roleplay is a dystopian future where America is no longer the democratic nation that many of us live in today, but instead an oppressive, antagonistic, and power hungry group of rude dudes. The concept of this roleplay leans heavily on the ideas of the upcoming game Watch Dogs (which I am super excited for). We will be playing as a group of new members of a hacker group known as the Code Monkeys, an organization of revolutionaries and freedom fighters.
What starts off as a simple choice and an honest fight for freedom will take a turn for the worse as we find ourselves thrust into the furutistic world of Dystopian America, where conflicting loyalties and danger will hound our group at every corner, and as we struggle to survive in a not so friendly climate, where neighbors don't trust one another and brothers stab brothers in the back.
Technology has made great advances in this new world, despite its terrible conditions, and I will be describing but the surface of what is capable. Prosthesis has evolved to complete cybernetics, these cybernetics can be anything from robotic arms, to hyper advanced eyes, a computer built into your arm, even a generator installed in your chest. Bio-engineering has replaced plastic surgeries as more natural and more effective ways of altering ones self. These cybernetics and bio-advancements means that you now have complete control over your character and their appearance. These changes to their physiology can be subtle or omnipresent depending on your preferences.
While modern firearms still rely on bullets, guns use powerful mass drivers to accelerate smaller projectiles at amazing speeds. Energy weapons have been adapted for melee use as lighter, and more powerful instruments of war, whether they be blades or gauntlets. An energy based projectile weapon has yet to be invented.
HACKtools are unique and powerful computer devices used by modern hackers, as hacking will play a huge role in this RP, HACKtools, will be given their own section. Hacktools are typically unique and built from the ground up by their own respective operators. They range from powerful computers the size of cellphones, for portability and mobility, to powerful nerve center super computers for raw power, these tools are typically built in a way to suit their operator's way of life. These computers are then combined with a piece of virtual reality eyeware, which can be built into sunglasses, eyeglasses, or full on VR-suites with seat and monitors.
When a Hacker breaks into a computer system, their virtual reality devices will come online and remove their consciousness from the physical world. The HACKtool will then proceed to break into the system and install the DReamSensE Prog, slang for the Digital Reality Sensory Environment Program. This program converts the network into a 'physical' form to be better comprehended by the human brain, allowing them to truly 'enter' the system. Instead of seeing a screen of code 0s and 1s, the Hacker will be able to see a representative hallway or vault, as well as see themselves as their own personal AVATAR as opposed to a blip in the system. DReamSensE in this manner also makes information easier to locate, as they will typically take the form of round pillars or archives for the Avatar to access.
Once the installation of the DReamSensE and Avatar are complete, the HACKtool will automatically install Programs for the Hacker's Avatar to use during hacking. These hacking programs can be represented by physical items as well, such as a sword or gun for data deleting and erasing programs, to shields and smokescreens for protective commands.
Most, if not all computer systems are protected by security programs, DReamSensE visualizes these programs as physical beings as well, which will attempt to kill, or delete the Avatar. When an Avatar's data has been deleted or corrupted to a point that it can no longer hold a physical form, the HACKtool will automatically dump the user from the system, the resulting 'dump shock' typically disorients or incapacitates the operator in the real world for several minutes. Being fully deleted while the having one's consciousness inside his or her avatar usually if not always results in the death of the operator.
Though built for breaking into high security computer systems, the HACKtool can also remotely hack into various subsystems on the network its currently hacking, this allows an operator to change traffic lights, short out street lights, and manipulate security cameras without having to jump into the DReamSensE and risk possible dump shock.
In this RP I will be taking a group of 4 characters (including my own). As such, this will not be a first come, first served RP. Players will be chosen in a way that offers the most diversity to the cast. Meaning, if five people make a cynical basement dweller, and one person makes a college kid.. you get the picture yes? As this is a small RP I will be looking for quality players and characters, the character sheet likely being my first impression of you. Ease of reading for character sheets plays into this to a lesser extent, but I can't get a picture for your character if i can't read your CS right?
Though I typically prefer well grounded, down to earth characters, I will allow characters in this RP be fairly 'powerful',
this means that yes, you can be intelligent, suave, and strong. Though keep in mind that you are not superhuman.
Code Monkeys Dossier: ________
Appearance: An image if you can find one, text if you can't, if you can do both, thats also welcome. As far as pictures go, I'd prefer to avoid RL pictures, and avoid really bright and bubbly anime if you can. I'm looking for digital art-like pictures if possible. These are all suggestions however. If you really want to look like naruto...
Name: Include nicknames here
Age: I don't particularly want to see a child prodigy, but we should all be relatively young or new to the hacking scene, so keep the age range between 18-40
Gender: I'd hope this is straightforward
Personality: Self Explanatory, help me get a good feel for your character here. This is arguably one of the most deciding factors of my selection process. This does not mean give me a massive essay. But enough to give me a good feel for your character.
Background: Fairly self explanatory, explain what kind of life he/she lived/lives, where they learned their abilities, and how/who got them into the Code Monkeys. Since I can't expect you to know every fine detail about this world, the accuracy of this section won't factor too heavily into my judging process. Once again, you're working to give me a good picture of your character.
It is important to know that Hackers are not all from the same cut of fabric. You can be a high profile, suave James Bond like agent, with a nice suit and tie, or a grungy basement dweller.
Gear: This is the bigger stuff, like weapons and special equipment. Smaller, more mundane gear, like flashlights and stuff can be omitted. It is important to note that Hackers are not soldiers, nor do we typically have access to powerful assault rifles and rocket launchers. Weapons would more likely than not be concealable and easy to obtain weapons like handguns and blades, or a one-handed SMG/Machine Pistol.
HACKtool: This is important enough to get its own Character sheet section. Here is where you will describe your character's HACKtool. Since I don't expect everyone to by computer savvy, I don't need you to mention specific machines, though since its in the future, you can easily make up technobabble (Such as ArisaPro Hypercore Processor). Mainly describe if it is a portable or deployable HACKtool, Portable meaning cellphone/pda sized, and deployable being typical descktop/laptop sized. I will NOT allow supercomputers as our characters will have to move around and talk to one another, and because it's too damn powerful for new hackers.
AVATAR Appearance: A picture or text based representation of your character's Avatar, these pictures should but do not have to be sci-fi or futuristic in nature, avoid RL pictures again.
Username: The name your Avatar used when you attempt to stay anonymous. Hackers will often call eachother by username instead of given name. Your nickname(If you have one) is usually based on your username or vice versa.
AVATAR Balance: This describes the balance of your Avatar, the three balances are: Staying Power, Hacking Power, and Deleting Power. A completely balanced Avatar would be a 33|33|33
Staying Power:Staying Power represents the 'constitution' of your Avatar, an Avatar with a high SP rating takes less damage, and can sometimes completely negate damage. SP also dictates how many programs an Avatar can run at once.
Hacking Power:Hacking Power represents the 'finesse' of your Avatar, an Avatar with a high HP rating can encode and decode information faster, and evade security programs more easily. HP also dictates how quickly an Avatar can 'move' through the system.
Deleting Power:Deleting Power represents the 'strength' of your Avatar, an Avatar with a high DP rating can destroy more data with his base weapons, as well as programs, and shield programs prevent more damage. DP also dictates the intensity of the dump shock an enemy operator feels when they are forced out of a system.
Base Weapon: All DReamSensE Avatars are installed with Base Weapons, these weapons are typically fairly weak, but easy to use. It is a common misconception that base weapons are weak and only to be used as an emergency, however an experienced Hacker often makes use of only his Avatar's base weapons, as the more programs are uploaded into the system for use, the quicker the system is brought to alert. Portable HACKtools can have up to 4 base weapons, Deployable HACKtools typically use only 2. For starters, you should only have 1 or 2
Programs: A program is any pre-made code bundle sent to an Avatar, these Programs can be weapons, defenses, or tools for any purpose. Commonly used programs are simply named, such as Delete or Decrypt or Analyze, and can take the form of whatever makes the Avatar most comfortable, from a digital sword, to a firearm or a pair of goggles. If destroyed, programs can be reused and installed again. The faster the Avatar goes through his or her programs however, the faster a computer system will be brought to alert, which typically means being attacked by a new wave of more powerful security measures. Portable HACKtools can 'equip' up to 4 Programs, with 6 more in its memory, Deployable HACKtools can equip up to 8 Programs, with up to 22 more in its memory. Since we are just starting out, we should only have around 2-4 each. Keep them basic, we'll get more fun toys as we go on. While base weapons are considered programs, they are not counted in these lists
Purpose: The role your HACKtool was built to perform, such as information gathering, system disrupting, security, etc
Wow, that was a long thing to write, my own character will be up shortly, interest check is where character applications should be posted.