Order 3 or more physical items and get 1¢ postal shipping
Jeff Whitcher | At War with the Code

Go To Artist Page

Recommended if You Like
Kanding Ray Mac Quayle Trent Reznor

More Artists From
United States - California

Other Genres You Will Love
Electronic: Electronica Electronic: Electro Moods: Instrumental
There are no items in your wishlist.

At War with the Code

by Jeff Whitcher

A dark Electronica concept album chronicling the second chapter in Evelyn Taylor's adventure where her digital self fights for survival within the electronic world.
Genre: Electronic: Electronica
Release Date: 

We'll ship when it's back in stock

Order now and we'll ship when it's back in stock, or enter your email below to be notified when it's back in stock.
Continue Shopping
available for download only
Share to Google +1

To listen to tracks you will need to update your browser to a recent version.

  Song Share Time Download
1. The Third Helix
6:31 $0.99
2. A Still and Quiet Moment
4:17 $0.99
3. Forced Restart
4:23 $0.99
4. Access Modifier
3:50 $0.99
5. Polymorphism
6:23 $0.99
6. Dark Forces Converge
4:55 $0.99
7. First Confrontation
5:14 $0.99
8. Int
5:18 $0.99
9. Parse
6:42 $0.99
10. Second Confrontation (Escape into the Digital Universe)
6:07 $0.99
11. Singleton
4:14 $0.99
12. Actual Initialization
4:34 $0.99
13. Memory Leak
4:55 $0.99
14. Implementing the Perfect Plan
6:23 $0.99
15. Third Confrontation (War)
6:14 $0.99
Downloads are available as MP3-320 files.


Album Notes
At War With The Code

The Third Helix

There is a moment of quiet as the machine, assuming victory, ceases its attack. Evelyn's digital data is secretly concealed in several different packets of data deep within the code. These lifeless bytes of information float deep into the third helix, past all the security measures, and descend deep into the machine where they will regroup, reassemble, and prepare for the coming battle.

A Still And Quiet Moment

Completely unaware that Evelyn's digital data has now invaded its code, the machine allocates its resources toward invading and infecting the outside world. During this time, Evelyn's data activate and study the patterns and movements of the destructive code. Through this, Evelyn is able to watch and learn, looking for vulnerabilities and weaknesses, to assess her first course of action. She waits patiently, allowing herself a still and quiet moment, and collects as much information as she can before reassembling and moving forward.

Forced Restart

Determined that she can safely reassemble her scattered bytes of data, Evelyn now enacts a forced restart and converges into a unified block of data. The reassembled Evelyn is well-hidden behind the machine's firewalls and, for a time, she will be able to move about the massive data structures without being detected. She is stronger now, as there are no longer any ties to the physical world; she is pure data and her determined resolve continually strengthens and updates her capabilities.

Access Modifier

Evelyn's first move is to invade each access modifier and allow herself unhindered contact with every part of the code. This move needs to be executed carefully, so as to not to be perceived as some sort of threat to the machine. She does not want the code to turn against her before she is ready. She moves slowly and methodically and begins rewriting instructions and routines into the machine’s code. Evelyn is able to alter two of the three modifiers in the code. However, the third and final modifier was previously equipped with a security feature of which Evelyn is unaware. Her presence is detected!


As Evelyn moves toward the next phase of her plan, she is confident confident her presence remains hidden from the code. But, unbeknownst to her, data nodes from within the machine enact a security protocol, and it is determined Evelyn's presence is a potential threat. Utilizing a technique of polymorphism, the code begins to modify, covertly altering itself to prepare for engagement while keeping the modifications hidden from Evelyn. The code is one step ahead of Evelyn's movements; its self-modifications keep its data structures intact, while deluding Evelyn to believe that her actions are still having a detrimental effect on the machine.

Dark Forces Converge

With several bits of data now in place, Evelyn is about to prepare herself for engagement. However, she senses something is amiss. She realizes that, up to this point, her movements have progressed far too smoothly. She begins to wonder if her presence has been detected. Where had she gone wrong? Had she been deluded by her self-confidence? As dark forces converge about her, Evelyn is not quite ready for battle. Yet, she intuitively knows her fight is about to begin.

First Confrontation

The machine quickly assembles a small batch of code to move against Evelyn. This minute bit of data is assigned to attack and survey Evelyn's strengths and weaknesses. As the first confrontation begins, Evelyn is quickly thrust from an offensive to a defensive position. She holds her ground and fights the attacking forces of data with relative ease. The machine knows she will defeat this first attack and willingly sacrifices this small force of data to gain the upper hand in a later battle.


As the first battle concludes, Evelyn quickly enacts an "INT," a language instruction for generating a software interrupt. The quick thinking on her part blocks the last bit of the machine's code from reporting back Evelyn's vulnerabilities. Although the machine has gleaned a partial knowledge from the first encounter, it is not enough to defeat Evelyn. Evelyn has a chance to fortify her position and move forward with her counterattack. She is safe... for now.


With the first encounter behind her, Evelyn wastes no time in traveling deeper into the machine. She traverses swiftly through various security patches and nimbly outmaneuvers the adversarial blocks of code that attempt to entrap her. Along her journey, she successfully parses numerous sections of the machine’s language and then reformats specific routines to gain advantage. She hopes these actions are laying the groundwork for her to decisively attack in the future.

Second Confrontation (Escape Into The Digital Universe)

Outside, in the physical world, in order to lay Evelyn's now-deceased physical body to rest, the scientists at the data center, where Evelyn’s physical body has been since she and the machine were first merged, begin to dismantle the hardware connection. The inner core inside the machine, sensing its imminent demise, contrives to open an external data port in order to escape the machine before it is powered down. The core, intent on preserving its own artificial intelligence, makes the decision to venture outside the confines of this small computer in which it has, until now, existed. Desperate and only having a short time to loosen Evelyn’s virtual grip before fleeing the computer, the inner core launches a visceral attack on her.
As the second confrontation begins, data nodes intent on destroying Evelyn's virtual identity, quickly surround her, catching her off-guard. Trying to rid itself of Evelyn, who it deems a virus, the virtual machine's core waits until the very last moment and then escapes just in time, as the scientists in the outside world finish the disconnection of the hardware from Evelyn's body and power down the machine for the last time. However, the core and its code, still entangled with Evelyn in the heat of battle, unintentionally pulled her with them through the now-opened data port into the vast expanse of the digital universe.

No longer safely contained within an isolated computer, the battle continues. Evelyn's virtual identity pours everything she has into her defenses against the now-unconstrained core and its data nodes. The battle takes a severe toll on her, as vital components crucial to her virtual existence are being lashed at and torn apart. She is finally able to fend off the attacking code to claim the present victory. Afterward, however, Evelyn realizes how much this battle has damaged her, and she determines to execute a flawless final attack.


As Evelyn finds a place to conceal herself and mend her wounds, she also uses the time to analyze certain subroutines in the core's code that have been hidden behind its security features. She discovers a singleton in the operating system that serves a central access point for a variety of routines. Evelyn realizes that this weakness can be exploited, and she sets about to coding up some artificial intelligence that will rewrite thousands of variables. Her hope is to slowly cripple the core's operating system.

Actual Initialization

Evelyn's identity is still linked to strands of the core's code. Her hopes of breaking away and still surviving to escape into the data universe are further sidelined when she analyzes certain bits of the core's data. She learns that the newly independent core, seeking more control, is searching a way to cripple all the world’s data and hardware. As Evelyn studies her nemesis, the code begins to show signs of imminent failure and it begins to panic. Still unable to relocate Evelyn, the core's only hope to wipe out her invading force is an actual initialization, whereby all of the code's security measures would be momentarily reset, as the operating system reallocates resources. It is a desperate move for the core, but the subroutines Evelyn has rewritten are causing faulty logic in the operating system and thus this decision is hastily decided upon and enacted.

Memory Leak

Evelyn detects a catastrophic memory leak in the operating system and knows that her final conflict with the code is imminent. The core’s hasty efforts to strike back at her have caused cataclysmic results in the code. The core's data about her begins to distort and crumble into unsalvageable bits of information. Bytes and packets of instructions are tearing themselves apart, creating a frightening landscape. She is now safe to move about the code and once again resume her journey toward the core.

Implementing The Perfect Plan

Evelyn knows she must reach the core before the codes crashes. If the code crashes, the core's memory will be destroyed, and Evelyn will vaporize into nothingness along with the code. She resolves to face the last force of data, annihilate her nemesis and rewrite the code under her control. As she hurries along pathway after pathway into the heart of the core, she is confident that she is implementing the perfect plan.

Third Confrontation (War)

With only nanoseconds to spare, Evelyn fights her way into the essence of the core. A violent assault is launched against her, as the third confrontation commences. With the surrounding data deteriorating and vaporizing, Evelyn is fending off the final force of the core’s data, clinging to existence with everything she has. She is being torn apart and losing precious strength, yet her determination forces her to continue fighting. Slowly, she gets the upper hand and is able to deliver a deathblow to the core. Evelyn, out of breath, exhausted, and barely functioning, limps over to the core and pours forth the last bit of life from her data self, hoping to reprogram the data universe for a better tomorrow. Carpe Noctem.



to write a review