Firewall has been on the forefront of the secret fight to save transhumanity since the Fall. Firewall is an independent network of cells and individuals recruited from all sorts of factions, cultures, backgrounds, and habitats. Potential new recruits are approached in secret and told they possess skills or knowledge of use to a clandestine network seeking to secure transhumanity’s continued survival. Firewall’s agenda is simple: to protect transhumanity from threats of existential scope, regardless of whether such risks emerge from within transhumanity or are of external, alien origin.
Firewall operatives—known as sentinels—are encouraged to act independently and utilize their own resources. Sentinels are connected by a social network known as the Eye, which they can use to acquire help and additional needed skills or resources. A sentinel’s i-rep on this network indicates how much they are trusted and will be a factor in determining what aid they can call in. Firewall also takes care of large expenses and logistics when necessary, such as ego-casting and resleeving needs. Sentinels are guaranteed resurrection, either via cortical stack or by backup, if they lose their lives on a Firewall op.
Sentinels are generally expected to be on-call—when something comes up in their vicinity or that their particular specialty might call for, they’ll be brought in on a job. Sentinels are usually grouped into ad hoc special ops teams appropriate to each mission. Though many sentinels pursue their own agendas after completing a mission for Firewall, it is not uncommon for sentinel teams to remain in contact, share information or continue to work together on Firewall-related assignments over a longer period of time.
Firewall operations are usually organized and managed by proxies, agents who maintain Firewall’s decentralized infrastructure. Proxies typically possess more information than individual sentinels and will dispense such information as they deem necessary to the mission, according to each sentinel’s i-rep and need to know. Each proxy’s means of contact, mission briefing, and overall methodologies differ greatly.