Code 7, the self-proclaimed “Story-Driven Hacking Adventure” from indie German duo Goodwolf Studio, is essentially what one might expect, using a hacking mechanic as its main conduit of interaction. However, if the first full installment (of a planned four, not including the free Episode 0: Allocation prologue that was released separately as part of the game’s Kickstarter campaign) of this text-based adventure is any indication, this series is not going to be your ordinary hacking simulator. Featuring delicious sci-fi drama, generally excellent character voice-overs, atmospheric music, and addictive gameplay that bridges the gap between sim and adventure genres, Code 7 promises solid entertainment for players willing to stick out the title’s potentially lengthy production schedule.
The game takes place in the early 22nd century, putting the player in the role of Alex, who wakes up on a space station after a mysterious disaster. Through the comm system in Episode 0 (which is included as part of the full game and serves as an important lead-in to Episode 1), you meet a woman named Sam who claims to know who you are, although you apparently suffer from amnesia and cannot remember your past. Since you are separated, and seemingly only Sam is capable of moving throughout the station, you decide to work together in order to find each other, with you acting as her guide and she relaying what she sees in the rooms she encounters. Soon you find out that something horrible has befallen the station, and that a mysterious computer program known only as Code 7 has been activated and is on its way to Earth, with poorly understood but presumably terrible consequences. Sam is replaced in Episode 1 by another female companion named Zoya, whose role as a “real world” assistant to the player remains the same.
I was very impressed with the way Code 7’s story unfolded over the course of the first two episodes’ combined 7-8 hours of play, whether through communication with (or eavesdropping on) the people you encounter, reading emails to gain bits of information and backstory, or examining various documents you find on computers as you work your way through the station’s networks. Events involving your own character, such as interface distortions and creepy, near-subliminal messages that occasionally pop up on screen, also help flesh out the atmosphere and sensation that all is not as it seems. I was especially pleased with the way the game manages to have genuinely enthralling moments, such as when assisting someone’s escape from a hostile foe, through a primarily text-based interface.
There are different decisions you can make throughout, leading to slight variations in the way the plot plays out, such as choosing one location before another or pursuing optional objectives. It remains to be seen exactly how, or if, your choices and completed goals during Episodes 0 and 1 carry over to future installments, but the developers say they will at least affect the last one. There are a few key moments when decisions you make are considered significant. Some of these were obvious to me during play, and some I didn’t even know mattered until the end, when they are shown along with the percentage of other players who made each choice.
These opening two chapters present a rather typical yet intriguing sci-fi drama with a few twists and turns that some will likely see coming, but Code 7’s story is told with such conviction, and is enmeshed so deeply and naturally within the gameplay mechanics that it feels utterly fresh, despite the amnesiac-protagonist bit and a few other clichéd plot elements that I won’t spoil here. A more conventional adventure game structure might have accentuated these issues, but the hacking sim elements and a well-written and fully voiced script lend the plot a sense of urgency that defies the text-based presentation and kept me engaged in a way that I wasn’t really expecting. That’s not to say the story is a matter of style over substance, however. At the end of Episode 1, I am thoroughly excited to see how events will unfold, given that there are unanswered questions that left me begging to know answers.
What could have been a fairly conventional sci-fi tale is elevated by the game mechanics, which comprise a hybrid of interactive fiction and hacking sim. As such, I suspect that fans of either genre will find themselves in familiar territory with this game, although the learning curve for those unfamiliar with hacking sims will be somewhat steeper. While individual tasks that you encounter are fairly diverse, much of your time is spent gaining access to various computer systems in order to carry out a given task, such as gathering personal information, operating various devices, or unlocking a door for Sam and Zoya. (You will also encounter other, non-companion NPCs as well – some friendly, and some not so much.) Certain activities can only be completed with the help of your partner. For example, in one puzzle you must wait for her to scan a document into the computer that you can then use as a digital file.
Indeed, each companion needs your help to move through the locations (initially the doomed space station, with the action moving to another locale in Episode 1), as you have access to a top-down map of their surroundings. Labels mark the various halls and rooms that can be accessed, and icons indicate important items like computer systems in the environment. Once you have indicated to your partner where you would like her to go or what item you would like her to inspect, she will carry out your request. The overhead map is highly abstract, and characters on it are shown only as white dots. However, I never found this to be a particular hindrance to orienting myself, and in fact it was helpful to know at a glance what was going on at any given moment. Not everything is perfect, though. It is somewhat painful to backtrack, as the typical walking speed of your companion seems somewhat languid when you have to navigate from one end of an area to another a couple of times – a rare occurrence, thankfully.
It is also somewhat frustrating that moving from one place to another distant location can only be accomplished in stages rather than all at once, as the text console only allows currently visible tags to be used. The map only shows a certain amount of area around the companion character, and it cannot be moved to reveal more. So, to get somewhere that isn’t currently visible, one needs to enter a label that is visible, wait for your partner to get there, and then repeat this with another label closer to your goal, and so on, until you can see the desired final destination and finally type it in. Again, this is a somewhat minor quibble, but it is an unnecessary obstacle that could have been fixed by allowing you to type in an already-visited location’s label, or move the map in some way.
Much of your time in Code 7 is spent gaining entry to computers and networks, often after breaking through the defenses of whatever system you are trying to access. Navigating between systems works much the same way you direct your companion around, the significant difference being that you are able to hop instantly to and from systems connected to each other on the same network (signaled by a line connecting them). When you have successfully accessed a computer, a simple menu of its contents appears onscreen with options such as “Files,” “Documents,” or “Apps,” among others. These allow you to perform the action required, whether to simply read a set of emails or operate the controls of a physical device, such as a door or engine. System commands generally take an “APP[dot]ACTION” format, which will be instantly familiar to anyone who has used programming languages such as Java or Python. If I want to open an airlock door, I might type in “AIRLOCKDOOR.OPEN” to execute that command, or “NETWORK.LOGIN” to access a computer system on the current network.
Of course, just barging into any and all computer systems without some sort of resistance would be boring, so oftentimes you will have to solve a hacking minigame in order to gain access. There are two general types of hacks available, one called a bruteforce attack, the other a man-in-the-middle attack. The bruteforce attack is fairly simple and involves executing a keyboard combination, at which point the personal details gathered up to that point (mainly by reading emails and documents on other computers belonging to those acquainted with the target) will be used to try to guess the password.
A man-in-the-middle attack is more involved, and incidentally a bit more recognizable as a puzzle. Here a series of icons connected to each other appear onscreen, representing a simplified network map. Maneuvering between each numbered node and pressing the space bar allows you to find the source of the encryption key and track its movements throughout the system to the target computer. By placing a MIM packet on one of the nodes between the source of the key and the target computer, once the packet-laced key (depicted as a moving circle-shaped icon) reaches the target, you have access to that computer. Firewalls are often present, however, meaning that you may have to dodge them as they search for network threats, including your presence (upon finding you, the attempted hack fails and you have to start over) and intrusion packets (which don’t end the hack but do have to be replanted). Another technique for defeating firewalls involves using a tool to “freeze” the firewall temporarily while the packet is en route.Continued on the next page...