Cyberspace
A vast digital realm where information takes physical form, accessed through neural interfaces and specialized hardware (decks), serving as both a parallel version of Horizon City and an infinite digital frontier beyond the dome's boundaries.
Location ID
HC-LOC-CYBERSPACE-0604
Location Data
Virtual
Digital Domain
Accessible from all physical levels
Millions of simultaneous users
Variable (Extremely High in corporate zones, Low in unregulated areas)
Security Level: CONFIDENTIAL
HC-LOC-CYBERSPACE
Overview
A vast digital realm where information takes physical form, accessed through neural interfaces and specialized hardware (decks), serving as both a parallel version of Horizon City and an infinite digital frontier beyond the dome's boundaries.
Dangers
!
ICE (Intrusion Countermeasure Electronics) capable of causing neural damage or death!
HJF Cyber Division ("Brownies") with aggressive response to unauthorized access!
Physical vulnerability while "jacked in" to cyberspace!
Risk of addiction to virtual experiences!
Data theft and identity spoofing!
Neural feedback from system failures or attacks
Story Appearances
Racer
Kenji races through cyberspace on his virtual motorcycle, showcasing the racing culture and hacker hierarchy of the digital realm.
Hero
Cyberspace serves as a battleground where Benjiro's influence extends through digital infrastructure, affecting the city's operations.
Daughter
Hana uses cyberspace to track and communicate with her daughter's bracelet, navigating the digital realm to find answers.
Corpie
Richard Johnson explores cyberspace to investigate Emi Tanaka's disappearance, encountering corporate security systems.
Ripper Doc
Tim (Plague) uses his hacking skills in cyberspace to gather information about suspicious neural interface modifications.
Deck Jockey
Kenji's journey as an elite deck jockey unfolds primarily in cyberspace, where he races, hacks, and ultimately confronts an AI entity.
Notable Characters
Kenji Fujita
Elite deck jockey known for racing and custom code
Tim (Plague)
Skilled hacker operating under the Plague avatar
Mizuki
Kenji's custom-built AI assistant in cyberspace
Kami Sori
Rival deck jockey who pioneered speed hacks for racing
Connected Locations
Paradise
Hidden physical location housing tensor farms and deck jockey operations
Midnight Market
Source for illegal deck modifications and hacking software
Hard Wipe
Clinic specializing in memory erasure after traumatic cyberspace experiences
Genetek Revival Facilities
Corporate data structure containing valuable clone information
Spinning Disc Media
Media corporation with extensive cyberspace presence for content distribution
Related Themes
Technological Dependence
Demonstrates society's reliance on digital infrastructure
Identity & Consciousness
Explores how virtual identities and experiences affect sense of self
Reality vs. Simulation
Blurs the boundary between physical reality and virtual experience
Illusion of Free Will
Appears to offer freedom while actually being monitored and controlled
Social Stratification
Cyberspace reproduces and amplifies social hierarchies through unequal access to hardware, training, and digital resources.
Related Technologies
Neural Interfaces
Essential technology enabling direct mental connection to cyberspace
Cyberspace Decks
Specialized hardware required to access and navigate cyberspace
Artificial Intelligence
AI entities assist users in navigating and manipulating cyberspace
Tensor Farms
Massive processing arrays that power advanced cyberspace operations
Additional Information
Cyberspace
The Digital Reflection of Horizon City
Cyberspace represents a parallel digital reality where information takes physical form and the boundaries of the possible are limited only by processing power and imagination. This vast virtual realm serves as both a functional extension of Horizon City's infrastructure and an infinite frontier for exploration, commerce, and conflict.
Physical Environment
Despite being entirely virtual, cyberspace presents itself as a physical environment with distinct characteristics:
-
City Mirror: Within the boundaries of the digital dome, cyberspace faithfully reproduces Horizon City's physical architecture, creating a familiar framework for navigation. Buildings, streets, and levels all have digital counterparts that mirror their physical locations.
-
Corporate Structures: Major corporations maintain elaborate digital headquarters that often exceed their physical counterparts in scale and grandeur. These structures house valuable data protected by layers of security systems.
-
Data Repositories: Utility companies and service providers maintain geometric data structures that prioritize organization over aesthetics:
"Utility stores had no need for such niceties as a door, and windows, or even floors or ceilings, so tended to be simple geometric shapes with all the effort going into organizing their interior."
-
Unregulated Expansion: Beyond the digital dome, cyberspace extends indefinitely in what hackers call the "digital wastes" - an unregulated frontier where users build and claim territory without corporate oversight:
"Outside of the city's dome in the Horizon cyberspace, the aesthetic rules for construction are not enforced like they were in the city, and lots of people had built outward the organic chaos in a first come first serve manner, claiming territory in a seemingly never ending gold rush."
-
Racing Circuits: Specialized tracks where deck jockeys compete in virtual vehicles, demonstrating their programming skills and competing for status and money.
The sensory experience of cyberspace is comprehensive but distinct from physical reality. Colors may be more vivid, physics can be selectively applied or ignored, and the limitations of the physical world can be transcended through specialized programming.
Navigation and Interaction
Users navigate and interact with cyberspace through several methods:
Avatars
In cyberspace, users are represented by customized digital avatars that may bear little resemblance to their physical forms:
"In cyberspace, Tim was Plague. His avatar is a gram-negative, non-motile, facultative anaerobic coccobacillus bacterium commonly referred to as Yersinia pestis; an amorphous translucent bluish blob roughly shaped like a safety pin."
These avatars serve both practical and social functions, allowing users to express their digital identity while potentially concealing their true nature. Corporate employees typically use standardized avatars that reflect their position and company, while hackers and independent operators often create distinctive personas.
Movement Methods
Cyberspace offers multiple methods of movement:
-
Direct Addressing: Instantaneous travel to known locations via their network address, the most efficient but least stylish method of travel.
-
Virtual Vehicles: Custom programs like Kenji's motorcycle that simulate physical movement:
"Modeled after the 2086 Kawazuki Mōkin, the fastest production motorcycle on earth, Kenji's ride was a sleek blur of red kanji and black carbon fiber as it tore through Horizon cyberspace at over three and a half times the speed of light."
-
Speed Hacks: Specialized software that accelerates virtual movement beyond normal parameters, often used in racing competitions.
-
Warping: Emergency movement programs that allow users to escape traps or dangerous situations by temporarily bending the rules of the virtual environment.
Interaction Interfaces
Users interact with data and systems through various interfaces:
-
Thought Commands: Direct neural interface allows for control through thought alone.
-
Gesture Controls: Physical movements translated into virtual actions.
-
Virtual Tools: Specialized programs represented as physical tools for specific tasks.
-
AI Assistance: Custom or stock AI entities that help navigate and manipulate the digital environment.
Security and Hacking
The security of cyberspace is maintained through specialized programs called ICE (Intrusion Countermeasure Electronics):
ICE Systems
These security programs protect valuable data and systems from unauthorized access:
"To actually pull off a hack requires a deeper understanding of the underlying mechanisms that make the whole thing work. Billions of lines of code, a miasma of interconnected systems communicating with thousands of different protocols, the stack was deep and riddled with opportunities for those willing to pull back the curtain and devote their careers to wrapping their heads around the holistic organism."
ICE can range from simple authentication systems to deadly "black ICE" capable of causing neural feedback that can injure or kill hackers. Common forms include:
- Bulldog: Basic security that monitors for unauthorized access
- Markers: Programs that tag intruders for tracking
- Cages: Virtual traps that restrict movement
- Dataspikes: Aggressive countermeasures that cause neural pain or damage
Hacking Culture
Despite the risks, a thriving underground hacker culture exists in Horizon City, particularly in Red level:
-
Deck Jockeys: Skilled hackers who navigate cyberspace using custom decks and specialized software.
-
ICE Breakers: Programs designed to bypass or neutralize security systems:
"Amongst the elite, Kenji's well-golfed code underpinned some of their most impressive and illegal cyber weaponry."
-
Hacker Groups: Organizations like the Ancients who operate from hidden physical locations while conducting operations in cyberspace.
-
Racing Competitions: Weekly events where hackers compete to demonstrate their programming skills:
"The hacker races were a weekly event, and while anyone could compete, the best set the stakes high enough to make it worth their time."
Social Dynamics
Cyberspace has developed its own social structures and hierarchies:
Corporate Presence
Major corporations maintain extensive cyberspace operations, from public-facing interfaces to secure data repositories. Corporate employees operate within strict protocols, with access rights determined by position and clearance level.
Hacker Hierarchy
Within the hacking community, status is determined by skill and accomplishment:
-
Wilsons: Amateurs who rely on stock AI and pre-packaged software.
-
Cowboys: Elite hackers who build custom AI and write their own code:
"Real cowboys started from scratch and painstakingly trained them to do their highly specific bidding until they were sentient killing machines, loyal as a well-loved dog and a million times deadlier."
-
Legends: Hackers whose exploits have earned them widespread recognition, like Plague and Kenji.
Digital Economy
Cyberspace hosts its own economic activities:
-
Information Trading: Valuable data bought and sold through secure channels.
-
Software Development: Custom programs created and distributed for profit.
-
Virtual Services: Businesses operating entirely within cyberspace.
-
Racing Stakes: Competitions with significant financial rewards for winners.
Legal Enforcement
Cyberspace activity in Horizon City is heavily regulated, with severe consequences for unauthorized access:
Horizon Justice Force Cyber Division
Known colloquially as "Brownies," this specialized law enforcement unit responds aggressively to cybercrimes:
"Their response time was the stuff of legends; get kidnapped or threatened at gunpoint, they would tell you to hire better security, but run a Blowtorch on the local coffee shop in a misguided attempt to get a free cup of coffee, and they would bust down your door and clone death you in eight minutes or fewer."
This disproportionate response to cybercrimes compared to physical crimes highlights the corporate priorities of Horizon City's governance.
Corporate Security
Major corporations maintain their own security forces to protect their digital assets, often employing former hackers to design and implement their defenses. These security systems operate with varying degrees of autonomy, from simple monitoring programs to aggressive AI-driven countermeasures.
Cultural Significance
Cyberspace has become an integral part of Horizon City's culture:
Digital Identity
For many residents, their cyberspace persona is as important as their physical identity, with some developing entirely separate personalities for their digital existence.
Information Access
Cyberspace serves as the primary medium for information exchange, with access to quality information often determined by social status and technical skill.
Creative Expression
Beyond its practical applications, cyberspace provides a canvas for artistic and creative expression, with users building elaborate environments and experiences that transcend physical limitations.
Philosophical Questions
The nature of cyberspace raises profound questions about reality, consciousness, and identity:
"Humans are identical, aren't they? We like to think we're in control, and not just pattern-matching biological meat puppets following our genetic and experiential programming, but at the end of the day, the only difference between you and me is I'm carbon based and you are silicone based."
These philosophical debates continue to shape how residents understand themselves and their relationship to both physical and digital reality.
The Physical-Digital Interface
Despite its virtual nature, cyberspace remains tethered to physical reality through several connections:
Hardware Dependencies
Access to cyberspace requires physical hardware - decks, neural interfaces, and the infrastructure that supports them. The quality of this hardware directly impacts the cyberspace experience, creating another dimension of social stratification.
Physical Vulnerability
While jacked into cyberspace, users' physical bodies remain vulnerable and unaware of their surroundings, creating risks that savvy operators mitigate through secure locations and trusted companions to monitor their physical form.
Tensor Farms
The most advanced cyberspace operations rely on massive processing arrays called tensor farms:
"Four thousand cores in four water-cooled racks... its theoretical capacity is well above what we might use. No one-shots, you just ask the farm controller to migrate to a cool core and the transition is seamless."
These physical installations, often hidden in locations like Paradise, provide the computational power necessary for sophisticated AI operations and complex cyberspace manipulations.
As cyberspace continues to evolve, the boundary between physical and digital reality grows increasingly blurred, creating a world where existence spans both domains and the definition of reality itself becomes a matter of perspective rather than absolute truth.