We are currently NOT accepting. If you ask if we are still open, then you obviously have not read this.
We are those that hide from the view of the authorities.
We are the scammers, the con artists, the vigilanties, and the shadows.
We are the scorned, the adored, the talented, and the feared.
We are the Code Monkeys.
And we will be known.
This is the Code Monkey's Waterfront Hub.
Contrary to its name, the Waterfront Hub is nowhere near a port, dock, or body of water of any kind.
This particular hub will serve as the safehouse and main base of operations for the newly assembled
Code Monkey's team, designated as Seattle's 12th team, unofficial designation not yet decided.
Your team operator is known as Exo. Also, remember that you will not contact him, he will contact you.
As a Code Monkey, you will have been given a piece of clothing, equipment or gear with the Code Monkey's
insignia on it. This object will be on your person at all times, as it is your identification and how Exo will know
where you are. You will not reveal this object to anyone, not even to other Code Monkeys, unless you are
within the confines of a Safehouse hub. Identify other Code Monkeys in the field by exchanging the phrase
"I am a Hacker/Con Artist/Vigilante" to which the response will be "You will be known."
You will be able to identify other Code Monkey Safehouse Hubs via your HACKtool's HUB scanner, built into
your HACKtool by Exo while you were being evaluated by the Code Monkey's. Don't bother trying to reverse
engineer it, you'll wreck your HACKtool. This scanner will pick up Code Monkey insignia's in special coding written
into walls, invisible to the naked or enhanced eye.
Get settled in, take a walk, do whatever. Exo will contact you soon.
Welcome to Seattle.
Info from Interest Check:
Politics have driven the world to a unsteady standstill
of constant cold war between the major powers of the world,
all while the smaller powers of the world coalesce and throw their bid with the various world powers,
hoping the chose the right nation to back.
Risen from the dust of a vicious second civil war,
the United American Republic is one of the largest players in the world wide cold war.
An oppressive and authoritative nation, The UAR controls the entirety of the North American continent,
with complete influence over central and southern America. The UAR lords over its people with an Iron fist,
ignoring the suffering of its people and violently putting down rebellions where they start.
In this world of political turmoil and strife, this worldwide arms race,
the most prevalent of the races is the cyber race.
Firearms and bombs may destroy lives and buildings, but the power
of modern cyberware has the potential to wreak havok across the entire world
The United American Republic are at the front of this race,
their Centralized Command Network (CCN) an awe and example to all.
This network connects the entirety of America and its assets
to one super powered command center, impregnable and safe from harm.
Or so they think.
The basis of this Roleplay is a dystopian future where America is no longer the democratic nation that many of us live in today, but instead an oppressive, antagonistic, and power hungry group of rude dudes. The concept of this roleplay leans heavily on the ideas of the upcoming game Watch Dogs (which I am super excited for). We will be playing as a group of new members of a hacker group known as the Code Monkeys, an organization of revolutionaries and freedom fighters.
What starts off as a simple choice and an honest fight for freedom will take a turn for the worse as we find ourselves thrust into the furutistic world of Dystopian America, where conflicting loyalties and danger will hound our group at every corner, and as we struggle to survive in a not so friendly climate, where neighbors don't trust one another and brothers stab brothers in the back.
Technology has made great advances in this new world, despite its terrible conditions, and I will be describing but the surface of what is capable. Prosthesis has evolved to complete cybernetics, these cybernetics can be anything from robotic arms, to hyper advanced eyes, a computer built into your arm, even a generator installed in your chest. Bio-engineering has replaced plastic surgeries as more natural and more effective ways of altering ones self. These cybernetics and bio-advancements means that you now have complete control over your character and their appearance. These changes to their physiology can be subtle or omnipresent depending on your preferences.
While modern firearms still rely on bullets, guns use powerful mass drivers to accelerate smaller projectiles at amazing speeds. Energy weapons have been adapted for melee use as lighter, and more powerful instruments of war, whether they be blades or gauntlets. An energy based projectile weapon has yet to be invented.
HACKtools are unique and powerful computer devices used by modern hackers, as hacking will play a huge role in this RP, HACKtools, will be given their own section. Hacktools are typically unique and built from the ground up by their own respective operators. They range from powerful computers the size of cellphones, for portability and mobility, to powerful nerve center super computers for raw power, these tools are typically built in a way to suit their operator's way of life. These computers are then combined with a piece of virtual reality eyeware, which can be built into sunglasses, eyeglasses, or full on VR-suites with seat and monitors.
When a Hacker breaks into a computer system, their virtual reality devices will come online and remove their consciousness from the physical world. The HACKtool will then proceed to break into the system and install the DReamSensE Prog, slang for the Digital Reality Sensory Environment Program. This program converts the network into a 'physical' form to be better comprehended by the human brain, allowing them to truly 'enter' the system. Instead of seeing a screen of code 0s and 1s, the Hacker will be able to see a representative hallway or vault, as well as see themselves as their own personal AVATAR as opposed to a blip in the system. DReamSensE in this manner also makes information easier to locate, as they will typically take the form of round pillars or archives for the Avatar to access.
Once the installation of the DReamSensE and Avatar are complete, the HACKtool will automatically install Programs for the Hacker's Avatar to use during hacking. These hacking programs can be represented by physical items as well, such as a sword or gun for data deleting and erasing programs, to shields and smokescreens for protective commands.
Most, if not all computer systems are protected by security programs, DReamSensE visualizes these programs as physical beings as well, which will attempt to kill, or delete the Avatar. When an Avatar's data has been deleted or corrupted to a point that it can no longer hold a physical form, the HACKtool will automatically dump the user from the system, the resulting 'dump shock' typically disorients or incapacitates the operator in the real world for several minutes. Being fully deleted while the having one's consciousness inside his or her avatar usually if not always results in the death of the operator.
Though built for breaking into high security computer systems, the HACKtool can also remotely hack into various subsystems on the network its currently hacking, this allows an operator to change traffic lights, short out street lights, and manipulate security cameras without having to jump into the DReamSensE and risk possible dump shock.
- - - Character- - -
Code Monkeys Dossier: Joshua Sykes
Name:Joshua 'Jack' Sykes Age: 24 Gender: Male
Cool and collected, Joshua maintains a rather mundane attitude coupled with a mundane appearance and dress, making him more or less completely forgettable, a trait that highly valued amongst the underground community. Beneath his very typical appearance, is a very atypical Hacker. Bright and intuitive, Joshua excels at thinking on the fly and can easily cook up schemes to avoid detection, in the physical world as well as the digital world. He is professional and capable, though his loyalties to the Code Monkeys is still in question. His loyalties seem to tie to himself and his own as opposed to the whole of the Code Monkeys.
A computer science graduate from Massachusetts Institute of Technology, Joshua was born in DC and showed an aptitude for computers at a very young age. Coming from a family with a good amount of money, Joshua was bio-genetically engineered to have marginally denser degree of white matter in his brain as well as an above average IQ. At the age of 16, His pupils were replaced with cybernetic implants to further increase the rate at which he processed and understood information, granting him almost prodigal status among his peers at a young age. Side effects of his genetic modification came in the form of a lack of empathy for the people around him, resulting in him having few friends, however, his increased understanding allowed him to understand the ways of social norms without alienating himself from public.
Joshua has a hardy physiology, as during his school years, his increased brain power allowed him to learn what his peers did in less time, allowing him to focus on various sports, and increase his overall physical performance. He excelled in sports like Track and Volleyball, and showed a talent for less contact intensive sports.
Joshua entered MIT with a 2400 SAT score and 4.8 GPA, earning himself a large scholarship, which he filled out with a track scholarship. He double majored in computer engineering and computer science, and earned high grades throughout his career as an undergraduate student. Upon graduation from MIT he returned for Graduate school to continue studying computer Science. Joshua nevertheless finished graduate school at the top of his class, earning a Master's Degree in Computer Science.
Shortly after his graduation, Joshua was approached by one of his favored professors, who revealed himself to be a member of the Code Monkeys. Though seemingly disinterested in the Code Monkeys' cause, Joshua nevertheless agreed to join with them.
The Parasci Global type 21 revolver (B variant) is an uncommon revolver type mass driver pistol. It uses a six round cylinder that fires .357 magnum rounds, propelled to high speeds with its powerful mass drivers found in the front barrel of the weapon. The weapon comes with a built in stock that braces the weapon against the user's forearm, allowing the operator to fire one-handed with a good amount of stability. Its cylinder can be removed and replaced for quick loading, or rounds can be inserted individually.
The Electron Mace is a telescopic baton commonly used by police and security forces. It is capable of delivering a debilitating electric shock to an person's nervous system, and when needed can start a short circuit or overload in a power system. When closed, the electric head and grip are connected. It can then be pulled to its maximum length. Its electrical system is activated by a small trigger loop at the bottom of the handle, triggerable with the little finger.
HACKtool: A portable HACKtool taking on the appearance of a black touchscreen smartphone, Joshua's handmade system features a powerful processor encased inside in an impact resistant phone casing. Its edges have matte black grip strips, allowing Joshua to operate it in one hand without fear of accidentally dropping his device. It uses a wireless tap system to hack into computer systems. The Wireless tap remains riskier and less stable than a physical tap, but its convenience and usability make up for its possible shortcomings.
AVATAR Appearance: Username:Datajack, commonly referred to as 'Jack'
AVATAR Balance: Datajack is an overall well balanced Avatar, allowing him to be used in a variety of situations. His relatively low SP limits him to 2 active programs at a time, base weapons included, but his above average HP and DP make him an effective combatant and cipher.
Base Weapon: Dataclaws:Taking the form of glowing orange fingers, the Dataclaws allow Jack to tear through the coding of enemies. Unlike typical melee weapons, they lack the reach of even a knife program. Datapulse:Datapulses have the same orange as Jack's Dataclaws. These serve as Jack's ranged weapon, small, thin pulses fire out of his palms at a high rate. Individual pulses inflict very minor damage, but its high volume of fire and speed mitigate this weakness.
Programs: Keygen: Taking the form of a long, thin blade protruding from the wrist, the Keygen is used to crack the lock on encrypted archive pillars. It uses a very streamlined type of brute force hacking to crack codes. It can be used on hostile programs as well with varying degrees of effect. ScreenSpam: Taking the form of a smokescreen bomb, the Screen program disorients and confuses hostile programs by overloading them with a multitude of various pornographic images, many with simple viruses encoded into them. These viruses are a mere joke at best and the damage done by them can be undone by the simplest of programmers, but it serves as a time consuming annoyance. Salvager: Taking the form of a syringe needle, the Salvager program attempts to rebuild Avatar data that has been corrupted or deleted. More grievous damage to an Avatar's code is more difficult to repair.
Her appearance from before she became an almost full body robot remains intact. However, she can show off what she is if she wants to by shifting the armoured plates that makes up her face under the synthetic skin.
Behind her green and brown eyes lies cybernetic eyes that has both scanning and zoom capabilities and she can cross-reference things from the net with what she sees and everything she has seen before. Her skin is just as smooth to the touch as real skin and looks the same.
All of her body looks like a normal human's unless she wants to show off what she is or if something pierces her flesh deeper than what skin goes. Beneath her skin is the making of body of a robot part from her few remaining human systems.
Her body can process food and drink just like a normal human and turn them into energy like a human, but she has no internal organs part from her heart, spine, nervous system and brain. While her spine has strengthening cybernetics to keep it strong enough to support her body.
Her clothing consists of a blue-black coat that is split in the front and is all the way down to her legs. It is draped over a suit also blue-black in colour and has a collar up to just under her chin.
Her clothes also work as ballistic armour but it only works against old guns and small calibre modern ones.
Her appearance is quite fair and she uses make-up regularly just in case to keep her true nature a secret and especially distinct around her eyes and hair to keep eyes there instead of closely focus on her eyes or skin. If you look into her eyes with a magnifying glass, you can see that they are not perfectly human looking, a defect in the design many years ago.
She also has a piercing in her left eyebrow.
Her hair is coloured turquoise over her natural black colour and and has some hints of glitter in it, but just very little. The colour and glitter is kept permanent by her body and has no need to recolour it after colouring it once.
Name: Kim "Kimmie" Nelson. Age: 18 before cyborg transplant, now, late forties. She is thought to be around 20 by those around her. Gender: Female.
Kim has a kind and caring nature and to most that know her, she feels like an older sister or a mother at times with her endless nagging at them to take care of themselves. If something happens to one of her friends, she is the first one there to help out in whatever the need might be. She also likes cooking, but has a great distaste for cleaning and has a cleaning robot for that which she designed herself.
On the other side of the coin however, she can be cynical and sarcastic. She has a strong sense of justice and a moral code, but she tends to say what's on her mind and give hard, cold logic in most matters based on fact and experience.
Kim turned to hacking to occupy her mind. Due to her internal computers plus her highly intelligent mind has processed most information available to her and it was this thirst of knowledge that drew her into her first hacking session. She wanted to know what the government kept hidden.
Kim was a "rich parents kid" as she was called when younger. She had everything, yet nothing. While people tried to get into her favour for political benefits due to her parents, no one liked her for them. She was looked down upon by almost everyone. No one liked her for who she was, they liked her since their parents wanted them to like her. Kim's father, was second in command in the UAR.
Kim did not know though that the others were deceiving her. She was blissfully ignorant about the plotting and scheming of those around her. She thought she had friends everywhere while she was growing up and when she was a young adult.
It took a shocking event for her to wake up. An event that left her scared for life.
Her father was assassinated by the third in command. Of course, that is not the public version, but it was a little too convenient. Her father had started becoming more outspoken about how the goverment treated the populace and what could be done for them,
While the entire command had rejected the idea, it had been the old third one had been calling her father a traitor. Her father had been creating issues high up in the brass for a long time with his ideas and changes.
It had been after a rebellion that he had been sent to repress that he had come upon these ideals.
It had not been until a year later that her mother had started being seen as a threat when she made inquiries into what had happened. It was thought important to eliminate her while making it look like an accident.
A truck had hit the side of their car and her mother had died. Kim however, had been as close to death as one can become. However, she had lived. Her body had been broken, but she had lived. A friend to the family, a high profile doctor had operated on her with a very expensive and very rare, and prone to failure operation. To transfer the mind, heart, spine and nervous system into a robotic shell, creating a cyborg.
Kim had survived though, and when questioned by physicians and doctors, she had not remembered anything before the transplantation. The doctor had said that the shock of a new body had erased the memories. What he did not mention, was that it only lasted for a few days, a few weeks and in time, Kim remembered everything.
She had lived her life normally. All of her friends had deserted her since she had no power any longer even if there was quite a few that respected her name. As time went by, she occupied herself with learning. Learning everything she could. She was still happy ignorant about her father's assassination and her mother's death. It was not until she came upon a group of hackers that she had fun playing around with for kicks when she found a file in a system they were poking around inside; Codename: Operation Trafalgar.
In this file, she found the plans which had cost both of her parents lives and her own body's and she swore that she would bring that man down and she made contact with the group of infiltrators. The Code Monkeys.
Kim is trained to use her weapons in either hand and can be effectively used in either but she prefers to use both hands on a single weapon for better strength and stability rather than "gun-ho" it.
The Manta is a high calibre railgun pistol that has a fifteen round magazine. While the gun is semi-automatic it takes a few seconds for the gun to charge itself up after each shot lowering its rate of fire a bit compared to mass driver guns but with a lot more destructive power.
The gun also has no recoil, making it very accurate at range and it has two rails for attachments.
The gun is strapped to her right side on the coat as well and can be pulled out of its holster with one swift motion with her left or right hand.
The Lighting Blade is basically a katana that has an energy-core inside of it that makes it course with energy and lightning. The energies coursing through the blade makes the blade able to cut through metals and not just flesh.
The sword has it's energy pack hidden inside of the hilt and needs exchanging from time to time to keep the energies flowing.
Kim hides the blade in the back left of her coat, strapped to it in a setting that lets it be pulled away quickly and be used. If she pulls straight out, she pulls it out together with the hilt. If she bends her back slightly and pulls on it like that, it is drawn unsheathed and ready to be used.
Kim uses an old shell for her deployable HACKtool since she likes to have a proper screen and a keyboard for the tool. The computer has a holographic keyboard that is deployable from the screen she carries around. The actual computer is behind the screen and the keyboard is projected from the platform which can be folded back onto the back of the screen. All in all, the tool fit in a smaller black bag that she carries around with her at all times which also contains her valuables and identification.
Username: Red Devil
The Red Devil has a perfect balance in everything she is. She is well rounded and can do most things, yet she is the expert of nothing. She is the jack of all trades. She prefer fighting just as much as spiking a system or stealthing around it. Erect firewalls and go on the defence just like likely as go on the offence with viruses.
The Red Devil uses a demonic looking sword as her base weapon which she uses excessively while rejecting the ranged weaponry of most other hacker avatars. While there is a greater risk in using her sword against security systems, she prefers it this way. She wants to experience the base thrills of the battle and the danger of doing so.
Programs: Adrenaline Rush: The Red Devil gets a big increase in virtual adrenaline which boosts her speed and strength in everything she does that deals with her body. She can run faster, jump higher, act quicker, react faster, everything that comes with physical adrenaline.
When she uses this program she grows a pair of horns that makes her even more devilish looking.
She can also share this power with fellow Avatars but the strength of the program weakens for each Avatar she shares it with as indicated by the size of her horns. Shielding: She creates a shield around her body that protects against both security programs and expulsion programs. The shield is more effective against security programs and not very effective against expulsion ones. She created this program to help her in her close action tendencies.
When The Red Devil activates this program the devilish mask under her bosom grows a tongue hanging out from it's mouth.
Just like Adrenaline Rush, she can share this program with fellow Avatars and the more avatars, the shorter the tongue becomes. Multi-purpose crack: The Multi-purpose crack is just that. It's a multi-purpose crack. A weaker hack that can hack into all systems at an equal level. It's not enough to crack hardened systems but is enough for the weaker ones.
When she uses this program, the entire of her eyes turn red with a big iris instead of a normal eye with red colour.
General Multi-purpose Avatar with Supporting programs.
Personality:Abel is a reserved young woman who could be quite easily be described as a recluse at heart. Were it not for the need of work and money to keep lives basic needs within her grasp it is likely that she would sooner pick up and run as far away from everything as she could then spend another day under the thumb of the working world. Because of this need she is able to keep up appearances well enough in her day to day life. Small talk, a painted on smile, the illusion of contentment, all to provide the picture of an average worker.
Behind this mask is a woman frightened to the core by the tension filled world around her. When the day ends and she can finally return to the tiny apartment, deliberately chosen overlooking the back end of an alleyway as to not draw attention to the blotted out windows, the carefully constructed mask of day to day life would crumble. For Abel even such simple tasks become a challenge when dealing with such a ludicrously fast paced modern world, and the unpredictable citizens assaulted with any number of stresses and tensions each day. Fear of the world and those within it is what has come to define her, so much so she would even find it a cruel joke of fate that she was not born into an earlier, simpler time. As a final tidbit of information, she is often seen with headphones and music to distract herself from the stressful stimuli all around.
Background: Abel was born an only child to a poor family living in the ghettos of Chicago and as such grew up within a volatile area filled with plenty of crime and strife. Robberies, shoot outs between rival gangs or between the gangs and the police were naturally common place within such an area. Due to the frequent and often near by occurrences of these events Abel grew up nervous and frightened of the outside. Even as she grew older and learned more of the world that initial fear would only grow rather than fade away. As she became more aware of the world, began to catch fleeting glimpses of the unsavory world of politics which lorded over the populaces even as the cold war loomed over the planet, she would only become more fearful. Despite the violence of those around her, the scheming for control of those high above was even more terrifying. But to others it would appear she had gradually gotten over her childhood fear as the mask she used to face the world began to form.
Through her school years she was an average student in most fields but excelling in computer and software knowledge despite only having access to outdated technology while at home. This skill would be her way out of the slums she lived in. With the money her parents had saved for many years to send her to collage she moved out of state to attend a small community college for programming and coding, renting a small apartment to live out of. Though it was a relief moving to a better environment she still could not shake her now deep seeded fear of the world and was plagued with a constant worry for her parents. Still, she took a minimum wage job to provide for herself and began attending college part time, hoping to eventually make enough to bring her parents out with her.
Halfway through her first year she began to feel the process of schooling to gain a decent job would take far too long. Furthermore she came to the realization that with the oppressive government of the country she may not even be able to land such a position. And so Abel began to entertain the idea of using hacking to acquire the necessary funds, having read about such things over the net. She had programming skills and it seemed many of the hackers she read about were not much older than herself nor with much more ability, but at the same time she was doubtful the stories she read were even true. Still she would spend the next two and a half years learning programming and reverse engineering the knowledge into hacking while very slowly gathering materials for her own HACKtool.
She had thought she managed to cover her tracks of gathering materials and her periodic 'practice hacks' which she did simply to test her growing skills, setting everything back to how it was before she had done anything in fear of being discovered, but it would become apparent she did not do as good of a job as she had thought. Mere weeks ago an encrypted email would arrive at her inbox, stating that the sender had been tracking her more...suspicious purchases over the past few years. The thought of being watched did little to help her unease about the world, but the next lines gave her some hope. An invitation to the Code Monkeys, saying that if she would join their cause they would in turn help with her own goals. Even if she had some reservations about everything, it was a risk she felt she had to take to truly accomplish anything. She would have to accept the offer.
The Weiss Industry Consumer Grade #54 pistol is a basic low cost mass driver pistol which houses an attached silencer, laser sight and flashlight. It is a common pistol often used by security personnel. One clip holds ten rounds of low caliber ammo.
The Morrows 775 is a police grade is a side arm designed to fire canisters of various substances ranging from marking dyes, smoke bombs and tear gas to more lethal options like explosives or napalm. Abel however only currently has access to make shift tear gas and smoke bombs. The weapon comes with a carrying case which can be hooked to the waist and holds ten canisters. Each shot must be loaded individually.
A civilian grade taser glove capable of stunning an assailant for several seconds to a minuet depending on the point of contact. Also contains a wrist port which can act as a device charger!
------- HACKtool: Abel's HACKtool is disguised as an mp3 player about the size of your average smart phone. Its build is that of sturdy black plastic with a scratch resistant screen, the entire thing sealed to be water proof. The tool is designed with a wide variety of self built automated hacking processes installed, some of which can be performed remotely and others requiring a direct connection. Tasks such as extracting data from a computer would require a direct connection where as hacking a camera or intercepting police radio could be done wireless. The tools short coming is in the fact that it is not as efficient in doing live input hacks rather than preformatted processes.
AVATAR Balance: Rust is an avatar designed to either outright destroy data via corrupting code or (haphazardly)rearranging it to cause adverse effects. Due to this Rust is a fairly direct combatant focusing on debilitating and wearing enemies down before going in for a kill.
Grappling Pistols:A weapon taking the form twin white pistols capable of firing either glowing white shots of energy at a high rate, or a chain of the same energy capable of dragging the enemy in close to Rust. Appears similar to this
Pistol Fangs:A weapon taking the form of an extension to the Grappling Pistols, a blade of white energy formed below the barrels of the grappling pistol capable of slicing clean through enemy data. Rust's primary melee option.
Data Syphon:An ability taking the form of thin white tendrils of energy extending from Rust's fingers, Data Syphon can pull random bits of data from enemies and structures which can cause varying types of instability in a target. The stolen data is then stored in a partition for later use.
Data Corruption:In a similar process to Data Syphon, Rust can inject random bits of jumbled data into a targets code causing errors, freezes or total crashes depending on how much data can be injected.
Data Purge:An ability taking the form of a virus which incubates for a short time, then upon activation replicates and jumps to near by targets of similar coding structure. Afterwards the virus causes a violent purge of core data from the target causing it to break down from the inside out. This ability risks a high chance of detection.
Evelyn is the kind of person who could care less toward her appearance and attitude toward others, which doesn't really say much toward her character considering the fact that she rarely ever finds herself going outside. She exceeds when it comes down to understanding computers and systems and rather finds the company in her hardware as opposed to any outside human interaction. Such is her way though, only really able to speak freely with those she knows either physically with the rest of the Code Monkey team or through voice communication when overlaying needed information. Outside of her shy attitude and love for digital hardware she can normally be seen eating consistently by her computer whenever she isn't plugged in, having an especially favored passion towards junk food. As for her loyalty she remains dedicated to the team only through the privilege of truly finding somewhere where she can belong and be herself.
Evelyn was a girl who had her life prepared out for her. She belonged to a wealthy family and had much of her body altered in order to improve every sort of function available to put her above the rest of her peers. However because of this she grew isolated, finding it hard to make friends outside of any achievement she would make and becoming one of the many high achieving students that would find themselves above the expected social norm because of genetic enhancements. Yet unlike this others who would eventually adapt to expected social behavior she could not, simply viewing school as an obligation and shutting herself away in her room whenever she wasn't needed to live up to what would be her parents expectations.
Yet in the large economic powerhouse that was New York she was simply a drop in an ever flowing river no matter how much her body could be enhanced, even in her own household she was merely the third child of five as all her siblings lived through the same monotonous life style that she would follow. Yet in a way she couldn't help but view her goals and lifestyle as wasted, wondering if there was something more she could be put to use to perform in a world that already seemingly was falling apart.
Therefore she used a personal provided computer in her room to learn, outside of the mandatory teachings and classes she would always go home to learn just how the world worked and if anyone else had to live the boring lifestyle she found herself in. She would learn about politics, how the economy worked, business decisions, entertainment authorized to the public, anything that could be available to her that could be discovered she browsed and and continued to feast off of knowledge in hopes that somewhere she could use this knowledge to perform something practical with her life.
But it wasn't enough. Some information was blocked off by the government or private businesses disallowing information that the public didn't need to see. However Eve wished to learn, to wonder if this information kept from her was worthwhile enough to risk whatever punishment existed for what she was performing. High School ended and soon enough she found herself going off to attend Harvard University toward a more political future, but really all it was was a change in setting. Eve found herself upgrading, using parts she could find under her parents funding to build what she needed in terms of an efficient computer. In a way gathering information became an insatiable hunger for the girl, learning what she could just so that she could learn more to discover just what secrets were being kept away from her.
Eve was sloppy though, she left trails of herself and splashes of evidence everywhere she went in the loudest hacking attempts she could only be embarrassed in performing. However while most young hackers found themselves in government custody before they could even learn from their mistakes Eve grew lucky, finding herself in contact with another tech specialist who had been following her trail. It was very messy and easy to follow, but her aspirations and performance showed promise as soon enough she was offered the chance to leave behind her old life and start a new one.
She would agree, cutting ties with her old life and leaving behind a college life that didn't suit her in the first place. It was true that she was an investment to her parents and such desertion had to be a critical loss and embarrassment to the family, yet to the young girl beginning her careers to change the world she could not care less toward her parents petty aspirations. She wanted to learn as much as she could and inspire people with her knowledge, to hack into some of the most well kept secrets and steal them away for herself all under the pretense of making a better world. In that moment one year ago she had officially proclaimed herself to be a Code Monkey.
Privately bought chargeable grenades used for disorientation through the use of bright pulsating lights that can render the target immobile through direct eye contact. Running on an internal battery when the top button is pressed and thrown the grenade opens up and on a three second delay blasts the room in high brightness through projected lenses that are revealed. While not necessarily legal in civilian hands it proves as a great distraction measure for either quick getaways or well enough opportunities to get in close.
A military issued blade for close quarter combat that has been slightly modified, fixed with a solar powered high beam light by its handle that can either serve as a flash light or quick distraction to any intruder finding themselves within range. The light can be modified by a sensitive pressure based trigger on the top that increases the power used the farther down that the trigger is pressed. While it can be used for conventional purposes it isn't encouraged for safety concerns.
HACKtool: A customized personal computer set up with three monitors, an extended data hard-drive, a powerful processor unit, and a back up generator for the computer to link into should it's power supply find itself emptying out. Her keyboard and mouse have been shaped to her hands for quick and fluid typing as well as a VR headset to hook up directly to her computer. She uses the system for everything in terms of cracking outside sources to gathering information to those out on the field and has even gone as far to personally design her own security to her device, a system that she herself would be afraid to attempt to crack.
AVATAR Balance: Apple is a specialized hacking avatar, relying more on dodging and speed to accomplish her goals rather than up front fighting. While she is under disadvantages in the face of direct combat she relies on the focus of flanking when faced with combat and under extreme conditions the reliance of her base weapon.
Base Weapon: Materia Blade:A self developed program int he form of a sword, used to cut into small programs that find themselves in the way of it's travel. While not entirely effective toward most security programs it is a small mode of defense under the direct circumstances Apple finds herself in a combat situation.
Programs: Trojan: The avatar is able to temporarily disguise itself as a friendly program entering into a hacked system, able to fool security programs for the time being until the file is opened or the program runs out. However the Trojan must be deactivated in order for the avatar to gain any information through the hacked system. Worm: Splitting an avatar's program into multiple coding a Worm allows for a great distraction for a systems security when hacking. The avatar is divided into multiple fake coded users forcing the security system to go through them one by one in search of the real intruder program. However only the main avatar program can perform any altering action to the system being hacked into. Detector: When hacking a system this allows the user to piece together forms of code more effectively and efficiently, allowing for faster hacking should a system not reject the programming put into place.
Purpose: Information Gathering
Last edited by evilninja145; 09-06-2013 at 05:52 PM.
Personality - Gunther is a serious sort of man, devoid of the energy he once held in his youthful twenties. Not to be confused with a cold person, Gunther prefers the blunt force of honesty to the humor of sarcasm and wit. Better said, Gunther is a straight-laced man in conversation rather than one who would joke their way through dialogue. He takes pride in what he puts his mind to and rarely does anything just for the hell of it. Under the right circumstances already, Gunther can wind down and become more laid back and down to earth. Though his words can sometimes come across as harsh and sharp, Gunther is indeed a sociable guy with the people he knows beyond mere association. He is capable of smiling and even laughing, but he prefers to take life seriously until the time is right for such frolicking. Suffice it to say, Gunther knows exactly when it's time to quit fucking around.
Background - Aaron Dominic Gunther was born in Augusta, Georgia to a middle class family. Though he grew up average, his life was always enveloped in the camaraderie and physicality of sports. He took part in a bit of everything from football, basketball, soccer, and baseball, all the way to boxing and MMA. Growing up in the southern US, sports was a huge thing even in the more technological inclined era. However, the race for cybernetics and the progression of technology did not skip the Gunther household.
Holding a master's degree in computer engineering, Gunther's mother actually worked within the UAR government as a network administrator of sorts. Not only did she maintain networks and databases, but she also was the resident IT support, fixing all the hardware and software and server problems as they arose. Gunther grew up learning things from his mother as he got older. He developed an interest in the field of computer technology after successfully hacking his first website as a pre-teen. All while in school, Gunther would balance his sports-filled life with lessons in mainframe workings and network intricacies from his mother. He became a resident member of the Deep Net and, against his mother's wishes, began to take his skills further by dabbling in criminal cyber activity from time to time. He figured he couldn't learn everything if he only studied the technically correct side of things.
However, tragedy struck as the boy turned eighteen and graduated from high school. Billed as a suppressed rebellion, the building where Gunther's mother worked was viciously attacked by the UAR. They left no survivors and went about spinning to the media that everyone within was a traitor of some sort, accusing its employees of leaking information to foreign entities. Gunther was enraged, but could hardly do anything against a massive government that pretty much ruled the free world through their CCN and powerful influence. As the years went on, Gunther obsessively turned to hacking. Not only in memory of his mother's teachings, but combing the Deep Net and more for the true reason behind the seemingly random attack. There was no way a rebellion was rising up within the UAR's own ranks.
Finally, he stumbled upon the truth on the eve of his twenty-eighth birthday. His mother had been a traitor to the UAR. She had been working for some underground organization for years, infiltrating the CCN to bring down the UAR in any way possible. Two years later, after again combing the net to learn more of this rebel group, Gunther received an invitation. If he wanted to have his revenge and bring down the people who had been oppressing the world at the same time, he would have to join up with a secret group of like-minded individuals. Gunther didn't hesitate. Even at 30 years old, he knew what needed to be done. He finally came across the name of the group after that.
Gunther was going to be a Code Monkey.
-The Mass Cartridge Executioner Custom is a handgun with a mass driver and special cartridge loading mechanism. The weapon is designed to fire cylindrical shells that explode into elements on contact with the target. It is able to fire electric, magma, ice, acid, and various other elemental shots. Each cartridge only holds one type of ammunition though because of the dangers of mixing shells, so the weapon must be tactically used in order to allow for ample reload time and cartridge switching. The mass driver propels the shell at high speeds and also gathers the kinetic energy needed to enable the explosion.
-Gunther's personal creation, the hidden shock blade is a seemingly ordinary data gauntlet that houses an electric blade on the underside within. The "blade" is composed of two sharp prongs that generate electricity between themselves. When stabbed, the victim suffers from electric shock and electric damage to their innards beyond the stab wound itself. It's not made for straight up dueling, but used correctly and it can be a valuable asset when the chips are down.
HACKtool - Gunther's portable HACKtool appears as a 7-inch touchscreen tablet. The entire front is black on black with a chrome back. A quad core processor powers the system at 3.2 GHz and 4 GB of LPDDR3 RAM. The system only feigns a tablet as it is designed entirely for hacking processes and manual code entry. It also possesses a dual band channel for wireless interfacing, but its wi-fi capabilities are limited. Things like cameras and phones and things can be remotely hacked, but more intricate systems must be physically connected to. When combined with the data gauntlet, the wi-fi range can be increased but it does not increase the limitations.
Finally, only the simplest of processes are automated. As Gunther likes to maximize the potential of his hacks, he chooses to manually enter code which means that the tablet's ultimate caveat is that most processes must be manually entered taking valuable time when stealthily trying to infiltrate a system.
Username - Raiden
AVATAR Balance - Raiden is designed as a counter-security AVATAR. He uses finesse and speed to get the drop on security programs before they notice his presence and erase them quietly. After, he rewrites their protocols to match the needs of whatever orders are given. He is not a direct combatant however, lacking the staying power to sustain any damage or deploy multiple programs at once. As such, Raiden is very tactical and uses his programs one at a time dependent upon the situation.
Staying Power - 5
Hacking Power - 50
Deleting Power - 45
Base Weapon High Intensity Data Blade[H.I.D.B] - The H.I.D.B takes the form of a standard length katana. Composed of viral data, the blade essentially corrupts data it cuts through and erases it on the spot. It is useful for taking out security programs quietly and landing critical strikes when necessary.
Firewall - Due to Raiden's extremely low SP, his first program is a defensive measure. The firewall deploys a data-shield that actively creates code to counter the code of an attacking program, thus blocking the offensive attempt. It can block small scale attacks, but multiple attacks and complex program offensives can easily overload and dissipate the shield. As Raiden is a melee-fighter, he deploys the firewall if he is caught and must endure a straight up encounter. In most situations, the shield is used to give him ample time to escape.
Polymorphic Replication - As Raiden appears as a "ninja" of sorts, PR is a program that allows him to replicate the digital signature of a program. In the case of a security program, Raiden would take on the appearance and signature of his target which would allow him to bypass low-level security protocols and firewalls without actually hacking anything. The caveat is that Raiden must return to his own appearance and digital signature to take on another and this would cause him to be caught if needed to replicate multiple times. Besides that, he can only successfully fool low-level programs. A more complex and powerful system would detect his false persona easily.
Logic Bomb - The Logic Bomb is a program composed of volatile viral data that is placed within a system and set to go off at a certain date or due to a specific event or action. When initiated, the bomb floods the system it is installed on with obscene amounts of data and either corrupts the system or deletes specific data targets. Raiden must manually install the logic bomb however and if the mission calls for it, he usually must infiltrate the target system first and then make his way to the core or wherever he is ordered before installing the program.
Me too, OOC chatting is awesome XD. I've been working doubles lately though, so I've been exhausted like hell T__T. Though, I should be able to get a post up tonight if the IC is up. I'm at work now, but I'll be off a little later.
Me too, OOC chatting is awesome XD. I've been working doubles lately though, so I've been exhausted like hell T__T. Though, I should be able to get a post up tonight if the IC is up. I'm at work now, but I'll be off a little later.
I'm looking forward to posting up something tonight as well, however I've found myself exhausted with school rather than work but I still feel you. Also looking toward starting up an advanced idea of my own so I have no idea where I'm going to find the time to do all of this :/