EARLY ACCESS

This game is in early access and still in development. You may encounter bugs or unfinished features.

All characters and events in this game are fictional. Any resemblance to real persons, living or dead, is purely coincidental.

Note: Clicking I UNDERSTAND will launch the game in fullscreen mode.
You can exit fullscreen at any time by pressing the ESC key.

IN-DEVELOPMENT EARLY ACCESS

💬
CHAT TEST
🪪
STAFF DIRECTORY
WEB BROWSER
WEB BROWSER
BRIEFING
BRIEFING
TERMINAL
📝
NOTEPAD
📊
SYSMON
💬
TAPPER
🖥️
SERVERS
🕸
TAG WRANGLE
📬
Email
FILES
FILES
⚙️
SETTINGS
MISSION_BRIEFING.DOC // CLASSIFIED
_
X
⚠ CLASSIFICATION: RESTRICTED ⚠
FROM: DIRECTOR_OVERSIGHT // DAPAUE_COMMAND
TO: INVESTIGATION_UNIT // NEURAL-LINK_OPERATOR
DATE: 2099-01-15 08:42:17
SUBJECT: ARCHIVE_INVESTIGATION_MANDATE

INVESTIGATOR,

YOU ARE AN INVESTIGATIVE JOURNALIST. AFTER MONTHS OF DIGGING INTO CORPORATE CORRUPTION AND COVER-UPS, YOU SUCCESSFULLY BREACHED THE DAPAUE ARCHIVE SYSTEM. YOUR MISSION: UNCOVER THE FULL SCOPE OF TRUTH HIDDEN ACROSS FIVE PRIVILEGE-TIERED SERVERS AND EXPOSE THE CONSPIRACY AT THE HEART OF THIS ORGANIZATION.

INITIAL ACCESS ACQUIRED:
YOUR HACK GRANTED YOU ACCESS TO A PRIVILEGE LEVEL 1 ACCOUNT. YOU NOW HAVE EMAIL ACCESS AS: LOADING...
This account is your entry point. Access to SYSTEM-V email archive is now enabled. Use it to gather evidence.
INVESTIGATION STRATEGY:
◆ REVIEW EMAILS FROM YOUR ENTRY-POINT PRIVILEGE LEVEL 1 ACCOUNT
◆ ESCALATE PRIVILEGES BY ACCESSING HIGHER SERVERS (2-5)
◆ EXPLOIT USER ACCOUNTS TO INFILTRATE THEIR EMAIL ARCHIVES
◆ COMPILE EVIDENCE ON YOUR INVESTIGATION BOARD
◆ IDENTIFY PATTERNS AND CONNECTIONS IN THE DATA
PRIVILEGE LEVEL SYSTEM:
• LEVEL 1 (Operations): 5 users - Basic access tier
• LEVEL 2 (Administration): 9 users - Mid-level clearance
• LEVEL 3 (Management): 14 users - Departmental oversight
• LEVEL 4 (Executive): 6 users - Senior leadership
• LEVEL 5 (Director): 2 users - Highest classification
Use TERMINAL command 'list' to see users at your current privilege level.
TERMINAL COMMANDS:
• active <username> - Switch to another user account for email access
• list - Show all users at your current privilege level
• info <username> - Display user details and status
• help - Display full command reference
FORENSICS TOOLS:
• SYSTEM-V: Email archive browser (restricted to accessed accounts)
• FORENSICS: Investigation board with cards auto-created from emails
• TAG WRANGLE: Create and manage custom tags, visualize connections
• ADD NOTE: Create manual evidence cards with your own observations
• CONNECTIONS: Link evidence cards to map relationships

YOUR INVESTIGATION BOARD WILL ONLY DISPLAY EVIDENCE FROM ACCOUNTS YOU'VE ACCESSED. AS YOU BRUTEFORCE OR SWITCH TO NEW USERS, THEIR EMAILS WILL AUTOMATICALLY APPEAR AS CARDS. CREATE YOUR OWN TAGGING SYSTEM TO ORGANIZE EVIDENCE AND IDENTIFY PATTERNS.

⚠ CRITICAL WARNINGS:
• You have TWO total bruteforce attempts before detection increases risk
• Each breach destabilizes system security; use strategically
• Evidence only appears for accounts you've successfully accessed
• Higher privilege servers require authentication codes or exploitation
• All activity is logged; your presence may be discovered

THE TRUTH IS IN THE ARCHIVE. EXPOSE THE CONSPIRACY. YOUR STORY DEPENDS ON IT.

DIRECTOR_OVERSIGHT
DAPAUE COMMAND // FORENSIC INVESTIGATION DIVISION
--- TRANSMISSION ENDED ---
FORENSICS // EVIDENCE_BOARD
📒
100%
EVIDENCE: 0 💡 SHIFT+DRAG to connect
TAGS
Click tag to filter
CARD DETAILS
Select a card to view details
TAG WRANGLE // CONNECTION_MAPPER
_
X
Network graph: drag nodes, click to preview references
REFERENCES
Click a node to view references
TAGS
NEURAL-LINK ARCHIVE v4.5 // DAPAUE
_
X
SYSTEM-V // ARCHIVE_99 // DAPAUE USER: ---
ACTIVE_NODE: NONE

SELECT DATA PACKET

PACKET_METADATA
WAITING_FOR_DATA...