Crime Code (Canceled)
Crime Code (Canceled)
Detective simulator with hacking elements - Alternative USA, Chicago, 1979 - Comics Neo-Noir, Pixel-Art - Social Engineering
Detective simulator with hacking elements - Alternative USA, Chicago, 1979 - Comics Neo-Noir, Pixel-Art - Social Engineering Read more
A highly detective story in the alternative Chicago of 1979 with elements of hacking.
- You will witness a large-scale battle for the soul of the city.
- You can hack into accounts, computers, e-mails of citizens and local corporate servers.
- You have to investigate intricate cases, interrogate, blackmail, correlate information and catch suspects on lies.
- You will need to make a difficult choice that can change the outcome of the whole game.
A breakthrough in electronics led New Chicago to the early computerization of the city and the creation of a common Internet network.
Behind each avatar is a real man, with his own story and drama, desires and fears. Each letter or file can tell a story of envy, vice, conjugal jealousy, vanity or even insanity.
There are 4 main organizations in the city:
City Hall // The heads of the city represented by the mayor try to control the Network. Although taxes on the network are profitable for the budget, some crooked politicians always want more.
Links Corporation // The founder of the company and the main idealist in the world wanted to see the city fully connected to the network, so that each system worked as efficiently as possible.
Сrime // It is trying to move gradually its shadow business into the underground DarkNet network, with its black markets, killer portal, parking of stolen cars.
Stars // A small organization of hackers, which also strive to expand the network, like Links. Hackers also want a total control of the network.
A young, talented and uncompromising detective Martin Gray, arrives in New Chicago in the run-up to the mayoral election.
Martin easily investigates any case that he is on. His secret is computer hacking skills that give him access to the information that greatly helps in the investigation of cases of any complexity.
Martin took this enthusiasm for computers after a family friend, Stephen Adams, the founder of the Links Corporation, who decided to become the new mayor of the city.
The former mayor, being the most influential man in the city, competes with the founder of a giant corporation - the most famous person in the world who had computerized the entire New Chicago by the end of the 1970s.
Speech of the mayor at the debate
But, unfortunately, a day later Stephen Adams is found shot in his office under strange circumstances.
Thus begins the bloody chess game of the secret genius of the criminal world. And only you will be able to catch him using your hacker skills.
April Jones is a talented journalist, a real dodger
Also you will work with several assistants
Criminals, somehow, manage to be one step ahead of the police.
After the Internet revolution in 1975, most of New Chicago life began to be based on the network.
Paper letters are replaced by e-mail, news can now be read not only on paper, but also you can play in the casino and video games with your friends without even leaving your home.
Moreover, plenty of city services quickly moved to the network. Now you can easily and quickly call a doctor, book a room in a hotel, buy a plane ticket or find a job and your soul mate.
Therefore, people who have the key to any lock - become a serious danger for the city.
Psychology and Social Engineering
The game has a psychological approach to hacking. We don’t hack a computer only, we break through a man’s desires and fears. For hacking you will have to use the user's personal data, which you will need to get somehow.
- Fishing letter. Choose which letter is best to send to a person using his desires and fears
- While communicating with the victim by phone or mail, you can get a lot of personal information
- Gain the trust of the victim (flirt, friendship)
- Create needs. For example, you can first dismiss a person, and then offer him a dream job in a letter.
- Trusted accounts. For example, you can write a letter from a person whom the victim trusts.
- Cookies, Logs, browser history can also help Buy data or order a hack
- Completing tasks for some people, so that after you can ask them for help (darknet)
Hacking by mail
Table with convenient search
The file system can be both graphic and console while hacking
Our working area
Almost every major institution has its own private network, which is difficult to get through. However, the more valuable the information is, the stronger it is protected.
Special programs allow you to explore a local network inside a building, to hack into individual computers and to control various building systems through terminals.
Options for hacking social networks:
- To get the employee’s trust
- To blackmail an employee
- To insert your person
- To order a hack or buy the necessary databases
Vision of investigation, interrogation, blackmail, the opportunity to catch a person on lies.
Search // It will be necessary to think carefully where to find this or that information. Whom to interrogate and how. Search for information in databases, letters, personal computers, information matching is an integral part of the work of any detective.
Your rules // Criminals do not live by law - they are always one step ahead of justice. Therefore, a detective with skills of a hacker is a good trump card up the sleeve.
Difficult choice // The law is not always fair. Sometimes a good man can be a defendant. For example, the father of a family who stole money for his daughter's surgery. Sometimes you have to choose how to deal with the attacker and hope that you are not mistaken with the choice.
Folder of Investigations
You can collect useful information regarding the current case in the folder with the investigation.
You need to know the motive and the lack of an alibi to bring a suspect to justice.
Notebook helps to arrange conveniently all information about all the characters of the investigation and about their hacking: the computer's ip, mail, personal information.
Based on these data, you can effectively evaluate the strategy of hacking a specific victim.
The map allows you to navigate the city better
Mini-game "Dark Forest" is an important part of the plot
From the brochure:
"Dark Forest is a unique video game where you can become a real hero in shining armor and fight dragons together with friends of yours, explore dungeons and share treasures. It's not just a game - it's a whole world where you’re able not only to communicate with other players, but also carry out quests together, gathering in the guild. The main goal of the game is to find and save the Princess in the Dark Forest. Be the first to play the game!"
Two projects work on music:
Miike More https://soundcloud.com/miikemore
Logic Puzzle https://soundcloud.com/logic-puzzle
The general musical style of the game can be described as electronics, early retweave and a little funk.
The plot turned out to be quite extensive, affecting several time intervals. Therefore, already there are already ideas for the plot continuation.
The game is to have many locations, cut scenes and characters, so most of the budget will be spent on art.
Our team has prepared for you several exclusive awards:
We are a small team that wants to bring something unique to this world.
The prototype is under development. In total, we plan to complete the game for another 4 months after the kickstarter company.
Rough work plan:
- Working out
Risks and challenges
We plan to release the Crime Code in the second half summer 2018. Therefore, there may be some unexpected difficulties while developing the game, and there's nothing we can do about it. But the whole team will try to deal with them and will inform you about any changes in the release date.
Our task is to tell a fascinating story and immerse the player in the atmosphere of a criminal detective at the dawn of the computer age.
We will be grateful for the support of our game.Learn about accountability on Kickstarter
- (60 days)