The Datajackers Gang

“As gangs go, the Datajackers love to tell themselves they’re the future. Neon lights, stolen code, cyberware bolted onto broken bodies. They talk like the old rules don’t apply anymore because they’ve got better toys and faster fingers.   That’s a lie every generation of criminals tells itself.   Strip away the tech and they’re still street punks shaking people down—just with keyboards instead of crowbars. Same hunger, same arrogance, same short attention span for consequences. If anything, they’re worse. The distance technology gives them makes it easy to forget that crime is still physical, still bloody, still answered with bullets when you push the wrong people.   Jack of Clubs is the real problem. Ego like a bonfire. He thinks data makes him untouchable. He thinks embarrassing a syndicate online is the same as beating them in the street. One day he’s going to provoke one of the old families—or a proper supervillain outfit—and learn a very old lesson the hard way.   You can’t hack a drive-by. You can’t brute-force a .45. And no firewall in the world stops revenge when it’s patient.   I don’t hunt them because they’re visionaries. I hunt them because they’re reckless. Reckless people get others hurt. When that happens, I step in—before the city pays the price for their stupidity.” - The Vermillion Vulpes

Structure

The Datajackers exist in the uncomfortable middle ground between a hacker collective and a street gang—too organized to be dismissed as script kiddies, too chaotic to resemble a traditional syndicate.   At the top sit the Four Jacks, founders and faces of the operation. Each controls a domain rather than issuing blanket authority. Power is functional, not ceremonial. Respect is earned by usefulness, not loyalty, and leadership is fluid when a job demands it.   Beneath them is the Core Crew—hackers, coders, engineers, scam artists, runners, and augmented bruisers who’ve proven themselves reliable. This inner layer operates on invitation and vetting, not recruitment. Everyone here knows something damaging about everyone else, which functions as both insurance and glue. Trust is transactional, but it holds.   Below that are the Peripherals: freelancers, burners, darknet contractors, money mules, and street-level associates. They’re given only what they need to know, often fed compartmentalized data that prevents them from seeing the whole operation. Most never meet the Four Jacks face-to-face. Some aren’t even sure the Jacks are real.   Communication is encrypted, layered, and deliberately impersonal. Handles replace names. Orders come as data packets, not speeches. When face-to-face meetings happen, they’re brief, controlled, and often staged in public places where violence would draw attention—coffee shops, clubs, maker spaces, or crowded transit hubs.   Discipline isn’t enforced through ritual or fear so much as access. Screw up badly enough and you’re cut off—accounts locked, devices bricked, identities burned. In a city where your digital footprint is your life, exile is worse than a beating.   Violence exists, but it’s purposeful and rare. The Datajackers prefer financial ruin, identity collapse, or legal implosion over blood. When muscle is needed, it’s fast, overwhelming, and supported by surveillance, drones, and digital overwatch. No one swings blind.   In short: They don’t march. They don’t wear colors. They don’t swear oaths.   They log in, do the job, and disappear—leaving behind empty bank accounts, corrupted identities, and enemies who never quite understand what hit them.

Culture

The Datajackers don’t just commit crime—they curate it. To them, crime is no longer about territory, bloodlines, or fear whispered in back alleys. It’s about information, access, and control. Guns are crude. Knives are nostalgic. Data is power, and whoever owns the data owns the city.   They see themselves as the inevitable evolution of the underworld: the heirs to a future where empires fall because of a keystroke, not a drive-by.   Technology isn’t just a tool within the Datajackers—it’s a status symbol. The newest implant, the cleanest augment, the rarest black-market device carries more weight than muscle or money ever could. A cracked firewall is bragging rights. A stolen prototype is a trophy. Cybernetics aren’t hidden; they’re flaunted. Glowing optics, exposed ports, chromed limbs, neural jacks worn like jewelry—if it looks dangerous and expensive, it earns respect.   Aesthetically, the gang leans hard into cyberpunk excess. Their clothes blend streetwear with tech—LED-thread jackets, smart-fabric hoodies, augmented visors, modular boots, and luminous tattoos that double as QR tags or encrypted signatures. Graffiti isn’t just vandalism; it’s interactive. Scans unlock taunts, threats, or dead drops. Walls flicker with AR overlays only visible through the right lenses, turning Liberty Village into a living, hostile interface.   They mock tradition openly. Old mobsters are “analog fossils.” Blood oaths are laughed at. Loyalty is replaced with utility and bandwidth. Respect goes to whoever pushes boundaries—who steals smarter, hacks deeper, upgrades faster.   Yet beneath the bravado is something almost devotional. The Datajackers genuinely believe in the future they’re chasing. They crave super-science not just for profit, but for identity. To them, becoming more machine than human isn’t a loss—it’s ascension.   They don’t want to rule the city the old way. They want to rewrite it—one system, one identity, one exploit at a time.
  Preferred Crimes   The Datajackers aren’t revolutionaries, folk heroes, or digital Robin Hoods. They’re opportunists with keyboards, implants, and just enough muscle to get away clean. Their crimes skew modern, invasive, and deeply personal—less about spectacle, more about extraction.   Hacking Network breaches are their bread and butter. Corporate servers, municipal databases, hospital systems, private security firms—anything poorly segmented or lazily protected is fair game. They favor speed over elegance, often hitting targets repeatedly rather than once, bleeding systems dry instead of making a clean cut.   Data Theft They steal everything: financial records, customer data, R&D files, blackmail material, proprietary software, and personal communications. Some of it gets sold. Some gets weaponized. A lot of it just sits in encrypted vaults as leverage. Victims rarely know what was taken until it’s used against them months later.   Traditional Theft Despite their tech obsession, the Datajackers still steal the old-fashioned way—especially when it involves cracking advanced electronic security or getting their hands on experimental hardware. Warehouses, labs, data centers, courier trucks, and startup offices are frequent targets. Physical theft is treated as a challenge, not a necessity.   Identity Theft Lives are ruined here. Entire identities are hijacked, rewritten, or erased—credit histories destroyed, criminal records fabricated, immigration statuses altered. Some victims lose access to their own names. Jack of Hearts’ influence is especially visible in this category, and the damage is often irreversible.   Running Cons Romance scams, fake investment opportunities, influencer fraud, deepfake extortion, and long-form emotional manipulation are common. These aren’t quick hits; they’re slow burns designed to drain victims financially and psychologically. Shame keeps most targets quiet, which the Datajackers count on.   Vandalism Their vandalism is loud, ugly, and deliberately obnoxious. Cyberpunk graffiti, AR tags, hacked billboards, defaced corporate websites, and hijacked public displays are used to mark territory and mock authority. It’s not protest—it’s flexing.   Blackmail & Extortion Stolen data almost always leads here. Targets range from mid-level executives and city officials to rival criminals and wannabe influencers. The Datajackers prefer ongoing payments over one-time scores, milking victims until they break or disappear.   Cyberstalking & Harassment When someone annoys them—or refuses to pay—the harassment starts. Doxxing, account takeovers, fake charges, ruined reputations, relentless digital pressure until the target folds or snaps. It’s petty, cruel, and effective.   Tech Trafficking They buy, sell, and trade illegal software, hacked devices, stolen prototypes, and low-grade super-science components. Most of it isn’t world-ending tech, but in the wrong hands, it doesn’t have to be.   At the end of the day, the Datajackers aren’t trying to change the world. They’re trying to exploit it faster than anyone can stop them— and they don’t lose sleep over who gets hurt in the process.

Public Agenda

To the outside world, the Datajackers present themselves as nothing more than another street gang with modern toys and loud opinions.   Their stated agenda—when they bother to state one at all—is simple and unapologetic: take care of their own, defy authority, and live well. They frame themselves as rebels against corporations, police, and institutions they claim are already exploiting everyone else. In their rhetoric, stealing data isn’t crime—it’s redistribution. Hacking isn’t sabotage—it’s exposing lies.   They talk about “beating the system” the same way older gangs talked about beating rival crews.   The rest of the world—civilians, office workers, small-time professionals, ordinary people trying to get by—are dismissed as NPCs. Background characters in a rigged game who exist to be farmed, skimmed, and exploited. The Datajackers don’t see this as cruelty; they see it as efficiency. If someone leaves their life unsecured, that’s on them.   Public-facing actions reinforce this image. They tag walls with anti-authority slogans, leak embarrassing corporate data, mock police incompetence online, and posture as tech-savvy outlaws sticking it to “the man.” It’s a pose that resonates just enough with disaffected youth to attract recruits, while staying shallow enough to avoid real ideological scrutiny.   There is no talk of reform. No higher cause. No long-term vision offered to the public.   Just the promise of fast money, better toys, and a life where rules are optional—as long as you’re smart enough to break them first.

Assets

The Datajackers possess far more wealth—both liquid and intangible—than most established gangs are comfortable acknowledging. While older syndicates measure power in cash, territory, and bodies, the Datajackers traffic in capital that doesn’t sit still: cryptocurrency wallets split across jurisdictions, shell accounts buried under fabricated identities, and digital assets that can be converted, erased, or weaponized at a moment’s notice.   Monetarily, their strength lies in diversification. Romance scams, data theft, corporate espionage, identity laundering, and blackmail generate a steady flow of income that rarely triggers immediate violence or public scrutiny. Much of their profit never touches traditional banking systems, passing instead through encrypted channels, burner wallets, and asset-hopping schemes that make tracing ownership nearly impossible. Even when money is seized, it is almost never all of it.   Digitally, their holdings are more dangerous than cash. The Datajackers maintain private archives of stolen credentials, proprietary software, medical records, financial ledgers, and компромат gathered from corporations, politicians, criminals, and private citizens alike. Some of this data is sold. Some is used once. Much of it is kept untouched—stored leverage waiting for the right moment. Older gangs often underestimate this kind of asset until they discover their lawyers, accountants, or mistresses suddenly don’t exist on paper anymore.   Perhaps most troubling is the Datajackers’ access to advanced technology. Through black-market tech brokers, darknet auctions, and opportunistic thefts, they routinely acquire experimental hardware, illegal cybernetics, prototype surveillance systems, and discarded super-science components that would normally circulate only among higher-tier supervillains. They don’t always understand everything they steal—but they understand enough to make it dangerous.   This access gives them tools disproportionate to their street-level footprint: augmented limbs, custom drones, neural interfaces, signal jammers, adaptive disguises, and invasive surveillance tech that blurs the line between petty crime and supervillain activity. Even when they can’t replicate or maintain such equipment long-term, they’re skilled at using it once, brutally and effectively.   To traditional syndicates, the Datajackers look like loud kids with gadgets. To anyone who understands modern power, they look like a gang sitting on a stockpile of leverage, secrets, and unfinished weapons— the kind of assets that don’t announce themselves until they’re already being used against you.

History

The Datajackers didn’t emerge from a single dramatic event or criminal lineage. They coalesced the way modern problems do—quietly, digitally, and almost by accident.   Their roots trace back to Liberty Village in the late stages of Toronto’s tech boom, when startups, incubators, and venture-backed companies flooded the district with hardware, data, and poorly secured systems. The area was rich in innovation and arrogance, and it didn’t take long for the wrong people to notice how exposed everything was.   Blair Springhill was the first spark. A local hacker with ambition far exceeding his reputation, he began pulling small data thefts, corporate leaks, and blackmail operations while loudly mocking Toronto’s traditional crime families. At first, no one took him seriously. That changed when several mid-level firms collapsed under pressure from “unknown breaches” that all quietly pointed back to him.   Leo Marquez joined next—not by choice, but by necessity. After his near-fatal beating by the Ruso family, he disappeared off the street and resurfaced months later rebuilt with illegal cybernetics and a new allegiance. His survival marked a turning point. The Datajackers stopped being just thieves with laptops and became something harder to swat aside.   Jack of Hearts arrived without warning and without a past. Records vanished. Accounts rewrote themselves. Identities that should have existed simply… didn’t. No one is certain whether Hearts sought out the Datajackers or merely drifted into their orbit, but once they were inside, the gang’s operations became cleaner, quieter, and far more difficult to trace.   Jack of Diamonds completed the deck. Talia Kent’s scams brought consistent cash flow and an endless supply of compromised civilians whose shame kept law enforcement at bay. With her involved, the Datajackers no longer had to rely solely on big scores—they could bleed the city a little at a time.   Together, the Four Jacks formalized the gang, adopting the playing-card motif as both branding and misdirection. What started as a joke became a calling card. Graffiti appeared. AR tags spread. Police reports began linking crimes that didn’t look connected until it was far too late.   Since then, the Datajackers have grown steadily but deliberately. They avoid large-scale wars, preferring to parasitize systems already in motion. They’ve clashed indirectly with established syndicates, stolen tech meant for supervillains, and drawn the attention of vigilantes—but never long enough to provoke total annihilation.   They are still young. Still arrogant. Still convinced they’re untouchable.   Which is exactly what makes them dangerous—and exactly what will someday put them in the crosshairs of something far bigger than they’re ready for.

“Everything is data. Everyone is vulnerable.”

Type
Illicit, Gang
Alternative Names
The Jacks (Law Enforcement), The Ghost Hackers (Media), The Data Rats (Other Criminals)

Comments

Please Login in order to comment!