Sentinel: Hackers Trail

Sentinel: Hackers Trail cover


When a mysterious online persona emerges, wreaking havoc in the digital realm, an American team of experts try uncover the truth behind the chaos. Led by the brilliant Evelyn Jacobs, Her leadership is unwavering, driven by a passion to bring justice to a world increasingly shaped by technology's unseen hand. She recognizes the urgency of the situation and the global ramifications of the attacks, spurring her team into action.
Joining Evelyn is the enigmatic Wren Fitzpatrick, a skilled social engineer navigating the ethical boundaries of her craft, who may hold the key to solving the puzzle. Her elusive nature is further complicated by her familial ties, as she grapples with the question of whether her own family might be involved in the chaos.
In the midst of bustling Sydney, Eli Fitzpatrick, a brilliant but enigmatic hacktivist, becomes embroiled in cyber warfare, corporate greed, and dangerous criminals. Eli's journey is a precarious dance on the edge of discovery, as he employs his expertise to hack into systems, expose hidden truths, and remain one step ahead of those seeking to silence him. His ability to navigate the digital realm with unparalleled finesse keeps him elusive, earning him a reputation as both a threat and a hero.
As tensions escalate and layers of deceit are peeled away, they must navigate uncertainty, forge alliances, and redefine their roles. With each step closer to the truth, they discover that the shadows they unveil hold the key to a future filled with both redemption and heartbreak.

Buy or Borrow

March 2024

Rate & Review

ARC readers: please use Good Reads


Prologue Sentinel Hackers Trail Book 1 by Christopher D Langton
4500 words - 19mins @ 250 words per minute

Spoiler - Full Text of Prologue

As the day ebbed into twilight, sending elongated shadows sprawling across the urban landscape, I stretched my fingers wide, the satisfying crack of knuckles breaking the silence of my small, cramped apartment.
Imagine, if you will, a world where names are not just an identity, but symbolic. In this realm, I am known not as Elias Fitzpatrick, but by various names that echo like a whispered revolution. To some, I'm a spectre of reverence; to others, a thorn in the side of their meticulously constructed faux-realities. Yet, to me, these names are more than an alias. They are an embodiment of my resistance, a silent roar against a system dripping with flaws and hidden agendas.
This isn't just about technology or the thrill of the hack. It's a crusade for a world where the air isn't thick with the exhaust of greed, where the rivers flow with the clarity of truth, not muddied by the silt of manipulation. I stand, a lone figure, casting pebbles of disruption into the placid lake of complacency, watching the ripples disrupt the reflection of a world that needs to wake up.
Through the looking glass of my screens, I navigate bytes and codes. Here, each keystroke is a dance of digits against the backdrop of my ever-watchful, ever-controlling digital pantheon.
As you read this, ponder for a moment the world beyond your screen or city. A world where the value of a person isn't measured by the weight of their wallet, but by the strength of their character. Where success isn't minted in the factories of capitalism, but grown in the gardens of honesty and hard work. This is the world I fight for, one keystroke at a time.
My home is a humble nook, sandwiched between two weathered high-rises. The constant buzz of the city below weaves through my thoughts, a familiar and oddly soothing soundtrack to my nightly endeavours. The room's spartan setup belies its importance to me – here lies my sanctuary, dominated by a custom-built computer rig that's the heart of my digital escapades. Neon lights bathe my array of screens in a surreal glow, while my trusty coffee machine, ever ready on my desk, keeps me fuelled and focused for the long hours ahead.
Realization dawned on me that it was Tuesday – my designated day for routine checks – just as I was about to settle in. With a sigh, I grabbed my go-bag, always prep'ed for such planned or impromptu outings, and headed out once more into the evening.
As a solo hacktivist, the cloak of anonymity was my shield, keeping me a step ahead of the ever-prying eyes of the authorities. I had crafted a web of safe havens and redundancies within Sydney's sprawling landscape to secure my operation.
My first stop was one of several secure storage units. Each was a fortress in its own right, rented under aliases and paid for with untraceable methods. I punched in the encrypted code, the familiar beep granting me access. Inside, a myriad of equipment and tools lay in meticulously organized arrays, each item a testament to my preparedness. I ran a quick inventory, ensuring everything was where it should be.
I moved through the unit with practised ease, checking the hidden compartments I had ingeniously integrated into its structure. A quick glance at the surveillance feed reassured me that all was as it should be – no unwanted intruders or prying eyes. The air was thick with the tension of secrecy, every encrypted access control and security measure a piece of the intricate puzzle that was my life.
With a final, satisfied nod, I re-secured the unit, ensuring it remained an unassuming part of the urban tapestry, invisible to all but the most discerning eye.
My next destination was one of my safe houses, a nondescript garage-turned-studio. These refuges, more makeshift than luxurious, were strategically dotted throughout the city, each serving as a temporary haven where I could vanish, gather my thoughts, and chart my next course of action. Ensuring these abodes left the faintest digital whisper was crucial; I relied on prepaid SIM cards for all communications and encrypted every byte of my online presence. Their locations, chosen with meticulous care, melded seamlessly with local relays, making them virtually untraceable.
As I entered the safe house, the familiar beep of the security system greeted me, a reminder of the invisible shield I had put in place. Advanced alarm systems, secure access controls, each component was a piece of my self-crafted armour against the outside world. My eyes swept over the room, taking in the hidden compartments I had built into the walls. They were perfect for concealing my equipment, ensuring that even if someone stumbled upon this place, they would find nothing out of the ordinary for an art studio.
I made it a point to never linger too long in one location, a nomad in the urban jungle. My knowledge of Sydney's streets and my ability to melt into the backdrop of different neighbourhoods were skills honed from necessity. Each safe house was a temporary sanctuary, a chess piece in the grand game of evasion I played with those who might be on my trail. Tonight, like many nights before, I reviewed my setups, ensured all was in order, and mentally prepared for the inevitable shift to yet another hideaway in the intricate dance of shadows I performed.
My life was a study in minimalism, each possession carefully chosen for its utility and ease of transport. In my world, bulky belongings were a liability, so I embraced portable, lightweight gear that could move as swiftly and silently as I did between my numerous hideouts. I lived digitally, each byte and bit of my existence carefully curated to leave no physical trace, no paper trail that could betray me.
My days, or rather, late afternoons, often began with me peeling open my eyes, the remnants of the previous night's hacking marathons or the pulsing beats of underground parties still echoing in my mind. These gatherings were more than just social events; they were the meeting grounds for like-minded souls. We were a network, a collective of shadow-dwellers, united by our shared disillusionment with the societal status quo. In these circles, I found camaraderie and a common purpose.
Our form of rebellion was hacktivism. With each line of code, with every breach into secure systems, we sought to pull back the veil on corporate excesses and government surveillance. Our tools were our computers, our battleground the endless expanse of the internet. In this digital realm, we wielded our expertise like swords, cutting through layers of secrecy to expose truths hidden from the public eye. This was our way of challenging the world, of making our mark in the fight against injustices that thrived in the shadows we called home.
My days were a kaleidoscope of tasks, each more exhilarating than the last. One day, I might be diving deep into the shadowy depths of a high-profile corporation's database, unearthing and revealing their unethical skeletons. Another day, I'd be the digital puppeteer, orchestrating virtual protests, rallying my fellow hacktivists with a flurry of mass messages. In these acts, I found not just a thrill, but a sense of purpose, a belief that I was part of a necessary rebellion against a system too eager to control and manipulate.
Away from my screens, the underground parties were my refuge, a haven where hacktivists and counterculture enthusiasts converged. Amid the electronic beats and dizzying strobe lights, we exchanged stories, strategies, and dreams. These gatherings were more than just recreational escapades; they were my network, my community, where I could revel in the vibrant chaos that mirrored my life.
Yet, amidst this exhilarating existence, Wren's voice, my older sister, often echoed in my mind, a haunting reminder of our contrasting paths. She dabbled in hacking, yes, but her approach was entirely different – driven by financial gain, shying away from activism or anything that risked exposure. To Wren, attracting even the slightest attention was 'reckless'. Her criticisms of my choices lingered like unwelcome shadows, challenging my every move.
But I saw myself differently. To me, 'reckless' was too simplistic a label. I preferred 'calculated'. In the world of hacktivism, I prided myself on my ability to manage risks. Each move was a carefully placed step in a high-stakes dance. I wasn't just throwing caution to the wind; I was weaving it into a tapestry of deliberate, purposeful actions. This was the rift between Wren and me – where she saw danger and recklessness, I saw strategy and opportunity. In this world of shadows and light, I was not just a participant; I was a choreographer, orchestrating a ballet of bits and bytes against a system that needed challenging.
Settling into the rhythm of my unconventional life, I found a strange comfort in the routine that I had carved out for myself. My digital escapades were a source of exhilaration, each day a new challenge in the vast expanse of cyberspace. My existence, much like the codes I deftly manipulated, was a whirlwind of chaos and unpredictability, yet it was here that I sought and often found truth and justice in a world overshadowed by deception.
Walking into the bustling café, my athletic frame was obscured by the worn familiarity of a hoodie and sweatpants, a stark contrast to the vibrancy around me. The rich aroma of freshly ground coffee beans greeted me, mingling with the enticing scent of baked goods from the kitchen. It was a welcome change from the sterility of my digital world.
Approaching the counter, I was met by the Barista, her nose pierced and arms adorned with vibrant tattoos, a reflection of her colourful life, I did my homework and she wasn't a threat – her warm smile was my beacon after a rough night.
"Hey, Eli, the usual today?" she asked, her hands moving with practised ease over the espresso machine.
I nodded, a tired smile briefly lighting up my face. "Yeah, that's right."
Daily, I found myself here, ordering the same double shot flat white, no sugar – a small constant in my otherwise fluid life. The Barista, with her fluid, practiced movements, set about crafting my coffee. I watched, almost hypnotically, as she steamed the milk, my gaze drifting to the chalkboard menu adorned with the day's specials in vibrant chalk.
As I tapped an absent rhythm on the counter, lost in a labyrinth of thoughts, the Barista's artistry with the espresso and milk came to a finish. It was then that a new face, a young man with a tousled beard, approached me, a plate of scrambled eggs, crispy bacon, and buttered toast in hand.
"Here you go, mate. The usual, right?" he inquired, a note of curiosity in his voice. I hadn't seen him before, yet he seemed to know the regulars' orders.
"Actually no, I'll take the special today," I replied, deliberately catching him off-guard. It was a simple tactic, but effective in gauging someone's reactions.
Extending my hand, I introduced myself. "Hey mate, I'm Eli." A straightforward approach, yet another method to learn more about him.
The young guy, slightly taken aback, shook my hand. "Nathan," he said, before hurrying off to adjust my order.
As I sipped my coffee, waiting for the meal, my mind shifted gears. I discreetly searched online for any Nathan matching his profile in the nearby area. Filtering by age, recent school graduation, and appearance, I narrowed it down to a single hit – Nathan Woods. A kid from a disadvantaged background, likely working to support his family rather than pursuing further education. My assessment painted him as harmless, just another face trying to make it in the world.
The moment Nathan set the all-day 'the-lot' breakfast before me, my eyes sparkled with an unmistakable gleam of anticipation. I acknowledged him by name with a grateful nod, making sure not to linger long enough for a reaction. I then made my way to a vacant seat by the window, settling into the café's vibrant atmosphere.
The café was alive with the hum of conversation, a symphony of everyday life that provided a soothing backdrop. I sat there, slowly enjoying my breakfast, the flavors mingling perfectly with each sip of my coffee. My ears, however, couldn't help but tune into the conversations around me.
At a nearby table, a middle-aged couple was deep in discussion. "I'm telling you, the RBA got it all wrong this time," the woman said, her voice tinged with frustration. Her partner nodded in agreement, adding, "Yeah, and it's us who'll bear the brunt of it, as always."
A group of young professionals sat at another table, their conversation lighter, filled with laughter. "Did you see that short of the vocal coach chick reacting to Spiritbox?" one of them exclaimed, eliciting chuckles from his friends.
Then there was the elderly man sitting alone, phone to his ear, a mixture of joy and sadness on his face. "Yes, dear, I miss you too. The kids are growing so fast, aren't they?" His voice wavered slightly, a tangible thread of longing weaving through his words.
These fragments of life, each a story in its own right, surrounded me, offering a glimpse into the tapestry of human emotion. I sat there, a silent observer, taking in the myriad expressions – joy, sorrow, frustration, and nostalgia. It was a rare moment where I found myself immersed not in the digital world, but in the raw, unfiltered essence of humanity.
As I methodically worked my way through the hearty breakfast, my mind, ever restless, instinctively veered towards the colossal hack I had set in motion – an automated beast silently running its reconnaissance in the background. This operation, like many before it, was a piece of the intricate puzzle in my crusade against what I saw as an impending dystopian future.
But amidst the clink of cutlery and the murmur of conversations, I caught myself. This was my respite, a rare sliver of time carved out from my life of shadows and secrets. I forced my thoughts away from the digital battleground, urging myself to embrace this brief escape into normalcy.
Looking around, I saw faces engrossed in the simplicity of their daily routines. In them, I found a reminder of why I fought, why I delved into the depths of the cyberspace night after night. These people, unaware of the digital wars waged in the background, represented the very essence of what I was striving to protect.
I let out a slow breath, allowing myself to sink into the moment, savouring the taste of my coffee, the buzz of the café, the normalcy of it all. It was a poignant contrast to my usual existence, a life where every keystroke could be a rebellion, every hack a statement.
Finishing my meal, I left the empty plate and cup behind, dropping a few bills into the tip jar. My nod to the Barista was more than just a gesture of thanks; it was an acknowledgment of the unspoken bond we shared – a fleeting connection in my otherwise solitary world. For a fleeting moment, in this café, amidst the familiar staff and comforting ambiance, I found a semblance of peace, a gentle reminder of the world outside my perpetual battle.
Stepping out of the café, I shook off the last remnants of normalcy and geared up for a run – a perfect transition to clear my head. The streets of Sydney blurred past as I pounded the pavement, the rhythm of my footsteps syncing with the city's heartbeat.
Post-run, refreshed from a shower and a change of clothes, I found myself en route to a lunch and learn for cybersecurity professionals. The venue, brightly lit and buzzing with the hum of technology, was a stark contrast to the café's homely ambiance. Tech enthusiasts congregated, their faces aglow in the light of laptops and smartphones.
I weaved through the crowd, seeking out familiar faces or intriguing snippets of conversation. As I made my way through the throng of tech enthusiasts, a detail caught my eye – a woman, engaged in animated conversation with a group discussing blockchain. I couldn't help but think how great it was to see more women in these tech gatherings. But then, a flicker of suspicion crossed my mind. Could she be another recruiter, eyeing potential candidates for some big corporate tech giant?
Shrugging off my initial doubts, I decided to join the group. "Mind if I jump in?" I asked, sliding into the conversation. The woman turned towards me, her expression one of genuine interest.
"Of course, the more the merrier," she said, her voice hinting at intrigue.
A young programmer I often spoke to, with thick-rimmed glasses, glanced up. "Good to see you again mate! We're yakking about blockchain's role in supply chain management."
My interest piqued. "Oh, supply chain, hey? Bloody interesting stuff. The transparency blockchain brings could totally flip how we track and verify goods. It's like putting every step under a microscope, but in a good way."
"Blockchain's more than just a buzzword, isn't it? It's about shifting power dynamics, bringing transparency to the forefront," she said, her eyes lighting up with fervour.
I nodded in agreement, my earlier suspicions fading. "Absolutely. It's about rewriting the rules, creating a system where trust is built-in, not just tacked on."
As we delved into the intricacies of blockchain and its potential applications, I found myself impressed by her insights. She wasn't just knowledgeable; she was passionate about the subject, a trait I admired. Her perspective on decentralized systems and the future of digital transactions was not just informed, but visionary.
Another member of the group chimed in, eager to engage in the conversation. "Buzz words like blockchain don't mean much to me, when you say transparency you refer to smart contracts, ethereum, right?"
My response was the same I'd given a few times before, "Absolutely! And with smart contracts, we can automate and enforce agreements without the need for intermediaries. It has the potential to eliminate fraud and maybe speed up transactions."
My acknowledgment was met with nods of agreement and thoughtful expressions. So I continued, "Yeah, smart contracts could really shake things up, but we gotta keep an eye on the power usage and the ethical side of things. Can't just bulldoze through without thinking about the bigger picture, right?"
The conversation flowed effortlessly, it was a welcome change, discussing technology without the shroud of secrecy that usually accompanied my nightly endeavours. Here, amidst the professionals, I found a different kind of camaraderie – one rooted in shared knowledge and a passion for the future of cybersecurity.
The woman, her wearable tech almost as expressive as her keen eyes, leaned in, her curiosity palpable. "Spot on about ethics. But what's your take on privacy and data protection? With heaps of personal info floating around, how do we juggle pushing tech forward and protecting people's rights?"
I paused, weighing my words. "Privacy, that's non-negotiable. It's a right, not a privilege. As techies, we're in this race to break new ground, but we've got to keep our eyes wide open to the risks. It's on us to build solid security and stick to an ethical path. We've got to tread carefully, making sure we don't trample over individual rights in our haste to innovate."
The conversation took on a deeper tone, reflecting the serious responsibility that came with advancing technology. It was a delicate balancing act, one that required constant vigilance and an unwavering commitment to ethical principles.
As we delved deeper into the nuances of privacy regulations, the conversation took an intriguing turn. The woman, her insight as sharp as her wearables, threw a curveball. "What about GDPR and its cookie policies, Eli? It's a bit of a sticky wicket, isn't it? Feels like every website you visit throws a cookie consent form in your face."
I paused, her challenge stirring a whirl of thoughts. "Yeah, you've got a point there. It can be a bit of an overkill, drowning users in consents. Makes you wonder if it's truly effective or just ticking a compliance box."
Around the table, opinions were mixed. Some staunchly defended the EU's approach, praising their proactive stance. "But it's about user control, isn't it? They're giving power back to the people," one of the guys argued, his conviction strong.
I mulled over this, the woman's challenge resonating with me. "True, but there's gotta be a balance, right? Too many pop-ups, and people just click 'accept' without a second thought. Where's the real choice in that?"
Her words had planted a seed of doubt, making me rethink my stance. "I've always been a fan of the EU's approach, but now, I'm not so sure. There's a fine line between protection and overkill."
The conversation continued, a lively debate that highlighted the complexities of our field. Yet, as I engaged, part of me remained pondering the woman's challenge, appreciating the new perspective she had introduced. It was discussions like these, where ideas were tested and beliefs questioned, that fuelled the ever-evolving landscape of cybersecurity.
The discussion took another sharp turn when one of the group brought up Australia's controversial AAA bill. "It's groundbreaking, really. We're way ahead of the curve," he said, a note of pride in his voice.
The woman, however, was quick to counter, her tone dripping with sarcasm. "Oh yeah, brilliant move. Let's just force interns to spy for the government, stealing customer data in secret. It's like a Black Mirror episode come to life."
I couldn't help but smile, her candour and depth of understanding leaving me quietly impressed. My grin was so telling that everyone at the table could guess where my allegiances lay, even without a word from me.
Then, as if to escape the weight of our previous topic, someone steered the conversation towards generative AI. The group's energy reignited, with tales of AI-generated exploit code and other cyber victories. I soaked in their stories, my silence not indicative of disinterest but rather a deep appreciation for their craft.
Despite the invigorating discussions, my time was limited. As the official talks began, I usually stayed, eager to learn something new or join the after-hours pub visit for more tech banter. But today, something more pressing beckoned, pulling me away from this community that felt like a second home. With a nod and a wave, I excused myself, stepping out into the evening, my mind already shifting gears to the challenges that awaited.
Midnight found me back in my zone, the dim glow of my screens casting shadows across the room. I cracked my knuckles and dived into the digital world, connecting with my network – a constellation of minds hidden behind screen names.
WestHavok, a legend in our circles, was online. Their exploits were as notorious as their dedication to our cause. I shot them a message, my fingers flying over the keys. "Evening, WestHavok. What's cooking?"
Their reply was swift, laced with the thrill of imminent action. "Eli, mate, it's all happening. Targets lining up like dominoes, ready to topple. How's about we give them a nudge?"
I leaned back, a smile creeping across my face. "Love the sound of that. Let's stir the pot, eh? Any juicy details for an old mate?"
"Juicy might be an understatement," WestHavok typed back. "Got a lead on a big fish, swimming in murky waters. Think you can handle it?"
"Born ready," I replied, the excitement building in my chest. "Send the details my way. Let's see how deep this rabbit hole goes."
Our exchange was more than just words; it was the forging of a plan, the beginning of yet another adventure in our relentless pursuit of truth. There, in the solitude of my apartment, I felt the rush of being part of something bigger, a digital brotherhood united by a common goal.
In the quiet of my room, the early morning hours ticking away, I found myself reflecting on the day's conversations. My network, my digital family, was always there, a constant in the chaotic world I navigated.
As I wrapped up assisting WestHavok, I couldn't help but feel a sense of accomplishment. "Good stuff today, WestHavok. We're making waves," I typed, my eyes heavy with fatigue.
"You bet, Eli. It's people like us who'll turn the tide," came the response, a digital fist-bump across cyberspace.
I then turned to my own project, a deep dive into an ecological disaster unfolding in the Great Barrier Reef. The final pieces clicked into place, revealing a new target – a major player in the US telecom industry. "Well, well," I whispered to myself, "Looks like we've got a big fish on the line."
But exhaustion was setting in. I messaged a quick update to my network. "Guys, hit a jackpot. Big telecom linked to the Reef mess. More after some shut-eye."
The replies were a mix of excitement and encouragement. "Crack it open, Eli!" one said. "We're with you all the way," chimed another.
I drained my water glass, the day's events replaying in my mind as I stripped down and crawled into bed. The weight of my discoveries and the conversations I had lingered, mingling with the darkness of the room.
Lying there, I knew the world was unaware of our struggles in the digital shadows, but change was on the horizon. With each line of code, each piece of uncovered truth, I was hacking a path to a future I believed in. Sleep overtook me, but my resolve never wavered. Tomorrow, the battle would continue.


Wren Fitzpatrick

A11ur3, Isabel Hughes

Age: 27

Appearance: Wren Fitzpatrick is an enigma, embodying an aura of mystery and constant change. Her looks are not fixed, allowing her to blend seamlessly into any environment.

Origin: Wren's journey began in the serene coastal town of Byron Bay, Australia. Over the years, she has woven a tapestry of experiences across the globe, spending significant time in London and traversing various countries across Asia, India, Europe, the Caribbean, and South America.

Personality: Charismatic and engaging, Wren has a magnetic pull that draws people towards her. She is known for her nimbleness, athleticism, and decisiveness. Her ability to negotiate and talk her way through complex situations is unparalleled. However, Wren is not always driven by logic, which often leads her into unexpected challenges and adventures.

  • Expertise in Cons: Wren approaches her cons with remarkable precision and skill, reflecting a high level of expertise in the cybersecurity field of social engineering.
  • Unpredictability: Her methods are unpredictable, leaving pursuers bewildered and often steps behind, if they even suspect her at all.
  • Cultural Knowledge: Her extensive travels have endowed her with a deep understanding of various cultures and regions, the way people behave or act in certain ways based on heritage, customs, and social environments.
  • Mentorship: Wren was mentored by Mason, a white-hat hacker and part-time pizza boy, who honed her ethical hacking skills as a teenager - but abandoned unexpectedly.
  • Influence: Her brother Elias, a prominent figure in the world of hacktivism, influenced her towards black-hat techniques of social engineering. They drifted apart due to Eli's erratic decisions, unreasonable obsessions, and attracting unwanted attention.


Wren, a beautiful and bohemian spirit, finds solace in nature and has an obsession with online social interactions. Her skills as a mentalist and social engineer are complemented by moderate technical hacking abilities. She navigates the ethical tightrope, often employing illegal methods to achieve altruistic goals. Her past is marked by a series of profitable but unethical hacks, highlighting a journey of moral complexity.

Wren's ethical stance is extremely complex. While her goals often aim to benefit others, they have been pure selfishness enough that this is often overlooked. Her methods frequently cross into the realm of illegality, when she believes there will be no repercussions. This dichotomy defines her as a character who constantly walks the line between right and wrong holding a compass built with her own sense of morality.


  • Elias Fitzpatrick: Her younger brother and influential figure in her life.
  • Mason Banesworth: Her mentor in the world of ethical hacking, Mason significantly shaped Wren's skills and perspectives.
  • Elizabeth 'Beth' Lawson: Aunt Beth, Wren's paternal aunt, has been a vital figure in her life. Married to an American, Salford Lawson, Beth relocated to Washington D.C. many years before Wren was born. Following Salford's death when Wren was 16, Beth spent a few significant years with Wren and her father, Bill Fitzpatrick, in Australia. This period allowed Wren to forge a close bond with her aunt before Beth returned to her career in the U.S. Beth's presence during Wren's formative years added a layer of familial support and perspective, influencing Wren's world view and personal values.
  • William 'Bill' Fitzpatrick: Wren's father, manages a franchise convenience store in Parramatta. Known for his hard work and dedication, Bill's relationship with Wren is strained, particularly due to their conflicting views on Eli. Their last encounter was marked by an argument about Eli, whom Bill evidently favors. Wren perceives this favoritism as the reason for Eli's unchanging, bratty behavior into adulthood.

Elias Fitzpatrick

Eclipse, Elijah_T

Age: 25

Residence: Sydney, Australia


Leadership in SystemShift: As the leader of the hacktivist group "SystemShift," Elias, known as Eclipse, championed social justice and transparency. Under his leadership, the group targeted corporations involved in unethical practices like environmental destruction and human rights violations. His strategic vision and charismatic leadership style propelled SystemShift to significant notoriety for their successful operations, which exposed corporate misdeeds and raised awareness of crucial social and environmental issues.

Personal Likes:

  • A fan of electronic music, Elias often finds solace and inspiration in its rhythmic beats.
  • He enjoys crazy parties, reflecting his outgoing and unrestrained personality.
  • His preference for a double shot flat white, no sugar, indicates a straightforward yet intense character.
  • Morning runs are a testament to his commitment to physical fitness and a disciplined lifestyle.

Personality and Skills:

  • Chaotic and Self-Centered: Elias is often perceived as chaotic and self-centered, traits that manifest in his approach to both personal and professional challenges.
  • Environmental Advocate: Despite his flaws, he is an unwavering advocate for environmental causes, dedicating much of his hacking endeavors to this passion.
  • Moderate Hacking Skills: His hacking skills are moderate, relying more on operational security and redundancy measures than on deep technical expertise.
  • Physical Fitness: Elias is fit and muscular, with a punk aesthetic that complements his rebellious and energetic nature.


  • Wren Fitzpatrick: Elias shares a complex relationship with his sister Wren. Their differing views and approaches to life and hacking create a dynamic interplay of sibling rivalry and mutual respect.
  • William 'Bill' Fitzpatrick: Elias' father, holds a special place in his life. Bill's admiration for Elias became particularly pronounced when Elias started coding at the age of 15. This early display of technical aptitude led Bill to almost worship his son, a dynamic that Elias has been known to exploit for his own benefit. This favored status in the family has been a source of contention, particularly with his sister, Wren.
  • Elizabeth 'Beth' Lawson: During her stay in Byron Bay, Beth's interactions with Elias were limited. As a teenager, Elias found most of her stories rather dull, being more engrossed in surfing, skating, and computers. Although Beth's presence in his life was not as impactful as it was for Wren, her occasional intriguing tales did provide a different perspective to the young, tech-enthused Elias.

Elizabeth Lawson


Age: 50

Residence: Washington D.C.

Origin: General Elizabeth Lawson, a seasoned Air Force veteran and former Chief Information Officer at the Pentagon, was widowed at the age of 41 due to a tragic fighter jet crash that claimed her husband's life.

Physical Appearance: Beth is a tall and sturdy figure with an iron-gray bun. Her piercing green, hazel eyes, fiercely shaped, convey a sense of determination and authority. Noticeable eye wrinkles add to her distinguished appearance.

Uniform and Medals: She is often seen in her impeccably tailored uniform, adorned with a string of medals that testify to her distinguished military career.

Personality Traits:

  • Beth is known for her unwavering commitment to mission integrity and duty.
  • She is deeply obsessed with her work, dedicating her life to national security and defence.
  • In her professional circle, she is revered as a force of nature, embodying strength and resilience.
  • Beth's career and personal journey have made her an influential figure in military and defence circles. Her commitment to duty, coupled with her personal resilience in facing life's challenges, have earned her the respect and admiration of her peers and subordinates.
  • Her stories and experiences continue to inspire those around her, serving as a guiding force for the next generation of military leaders.

Personal Likes:

  • Sharing Stories: Beth enjoys sharing anecdotes and stories from her days in the Air Force, offering insights into her experiences and the lessons she learned.
  • Black Coffee: Her preference for black coffee is a simple yet telling detail, reflecting her straightforward and no-nonsense approach to life.


  • Timothy Granger: Beth shares an unlikely yet profound friendship with Granger. Their bond, forged in high-stakes national security crises, is a testament to their shared experiences and mutual respect.
  • Bill Fitzpatrick: Beth's brother, Bill Fitzpatrick, shares a deep familial bond with her. The siblings have supported each other through various life events, including the tragic loss of Beth's husband. Their relationship is characterized by mutual respect and a shared history that has seen them through both joyous and challenging times.
  • Wren and Elias Fitzpatrick: Beth's niece and nephew, Wren and Elias, have had different levels of interaction with her. While her relationship with Elias was limited during her stay in Byron Bay, primarily confined to family gatherings, her bond with Wren was more substantial. Beth's stories and experiences, especially from her military career, have been a source of intrigue and inspiration for Wren.
  • Markus Lawson: Beth's son, Markus, represents a pivotal aspect of her life. As a freelancer journalist and the primary caregiver for his young daughter, Sara, Markus embodies the values of responsibility and resilience that he likely inherited from Beth.
  • Adriana Lawson: Beth's daughter-in-law, married to Markus. Her demanding job and frequent travels have shaped the family dynamics, with Beth respecting and supporting her career.
  • Sara Lawson: Beth's granddaughter, the one-year-old daughter of Markus and Adriana. Beth's role as a grandmother to Sara adds a new dimension to her life, likely bringing her immense joy and a sense of continuity.
  • Salford Lawson: Beth's late husband, Chief Master Sergeant Salford Lawson, was a key figure in her life. His untimely passing in a fighter jet accident profoundly impacted Beth, shaping her personal and professional journey. Salford's military service and his role as a pilot undoubtedly influenced Beth's values and her approach to life and duty.

Daniel Anderson

Age: 36

Residence: Washington D.C.

Physical Appearance: Daniel has tousled black hair, sharp blue eyes, and a rugged beard. Standing at six-foot-three, he has an imposing presence. He wears glasses due to being far-sighted.

Personality Traits: Despite an appearance that commands respect, Daniel often grapples with impostor syndrome, feeling as though he never truly provides value. Nevertheless, he consistently meets goals and can be depended upon. He is quiet but neither timid nor unapproachable, often perceived as broody.

Daniel has a pet tabby cat named Whiskers, whom he adores.

He attended MIT, where he earned a PhD in Computer Science.

Daniel is employed at the Department of Cybersecurity. He holds the position of Senior Cybersecurity Specialist. Daniel's commitment to his work in cybersecurity is evident in his achievements and the respect he garners in his field. Despite his professional success, Daniel maintains a private life, cherishing simple pleasures like his relationship with his mother and his cat,


  • Mother: Daniel shares a close and caring relationship with his mother, who lives in Oregon. Their bond is marked by regular phone calls every Tuesday, demonstrating his commitment to family despite the demands of his professional life. His mother's simple pleasures, like her knitting club and caring for Whiskers, offer Daniel a connection to a peaceful, domestic life outside his high-stakes career.

Evelyn Jacobs

Age: 42

Residence: Washington D.C.

Physical Appearance: Evelyn is distinguished by her fiery red hair, cut in a stylish bob. Her pale, almost white, hazel eyes are striking.

Personality Traits:

Evelyn has become jaded by bureaucracy and often exhibits cynicism about people's intentions. Despite being underestimated, she consistently outperforms expectations, impressing colleagues with her extensive knowledge.

Known for her proficiency as an analyst, she is seen as extremely smart, though the extent of her knowledge remains a mystery to many. She is responsible for maintaining the systems that display live feeds of potential threats on the screens lining the walls of the SOC.

She maintains a calm demeanor, not easily excitable or spirited. Evelyn excels in organizing tasks and people, expecting others to be as self-motivated and independent as she is.

Her approach to work reflects a strong sense of independence and self-motivation, setting high standards for herself and others.

Her daily meditation practice indicates a disciplined approach to maintaining mental clarity and focus, essential for her demanding role.

Personal Likes:

  • She enjoys lattes and pizza, simple pleasures.
  • Meditation with her eyes closed and headphones on.

Jason Hargrove

Timothy Granger