Investigation Report: The SMJHL Head Office
|
Tate
Registered Posting Freak
08-06-2024, 03:19 PM
(This post was last modified: 08-06-2024, 04:02 PM by Tate. Edited 2 times in total.)
Investigation Report: The SMJHL Head Office
Subject: The SMJHL Head Office Investigator: Blade Hunter (alias: Savva Kirik) Mission: Identify potential android infiltrators within the SMJHL leadership The room was bathed in a blue glow that struggled to pierce the shadows that clung to every corner. The ambiance was a blend of stillness and subdued energy, the kind that makes one acutely aware of their own heartbeat. Only the soft hum of state-of-the-art, futuristic devices disturbed the silence, a continuous, low-frequency sound that resonated like a mechanical whisper in the otherwise quiet space. The light emanated primarily from the monitors, their screens flickering with an almost hypnotic rhythm. Each screen displayed a mosaic of information, data feeds that painted a picture of digital intelligence and surveillance. Immersed in this setting was Blade Hunter, the enigmatic figure at the heart of this operation. His presence was both an embodiment of focus and an undercurrent of intense drive. The lighting only served to enhance his aura, casting darkness that obscured parts of his face. His silhouette was sharp against the backdrop of bright monitors, a lone figure dedicated to the relentless pursuit of an elusive truth. The Hunter's eyes, sharp and penetrating, moved methodically across the screens. The Hunter wasn't just observing; he was dissecting, analyzing, and deciphering the vast streams of information that flowed before him. His eyes revealed a man deeply entrenched in his mission—each piece of data a potential key to unlocking the secrets he sought. In front of him, his companion AI, known simply as "Computer," worked tirelessly. The AI was a marvel of modern technology, its processing power far surpassing that of ordinary systems. It was the Hunter's silent partner, a constant presence that processed vast amounts of information with an efficiency and accuracy that bordered on the uncanny. The Hunter was more than just an investigator; he was a sentinel, standing guard over a world where the lines between man and machine were increasingly blurred. "Computer, initiate the analysis of the SMJHL Head Office." Computer's calm voice responded almost instantly, "Analysis initiated. Displaying profiles and data." The Hunter's motivation went beyond mere curiosity. As a former agent tasked with identifying and retiring androids, his mission had always been clear. Yet, over time, it became something more- a personal vendetta against the artificial beings that had infiltrated the human world. The league was his current arena, and the SMJHL, a fertile ground for potential android presence, was under scrutiny. He knew this mission wasn't just about the hunt; it was about maintaining the sanctity of the game. The thought of androids undermining the league’s integrity was intolerable. As the profiles of the SMJHL Head Office members populated the screens, the Hunter leaned in, analyzing each one with a fine-tooth comb. Computer's synthesized voice narrated the data, providing insights and observations. SMJHL COMMISSIONER @SchwarzNarr Potential Android Trait: Mysterious and calculating. Initial Analysis: "The name 'SchwarzNarr' translates to 'Black Fool.' It suggests a duality—darkness paired with unpredictability. Analyzing behavioral patterns, there is a consistency in decision-making that suggests a lack of genuine emotional fluctuation. Possible indicator of an advanced AI, designed to maintain a façade of unpredictability while operating with cold calculation." The Hunter's brow furrowed, the dual nature of SchwarzNarr intrigued him- perhaps a misdirection, masking a true, emotionless core. “Computer, analyze SchwarzNarr’s activity, and calculate for office activities that could affect overall outcome of output.” “Acknowledged. Analyzing SchwarzNarr's activity logs now. Cross-referencing office activities with historical performance metrics. Processing... preliminary results indicate a high frequency of late-night data entries and anomaly checks, suggesting an unusual focus on non-standard variables. Calculating potential impacts on overall output... Based on the data patterns, there's a 73% likelihood that these activities could introduce unexpected variances in team performance assessments. Additionally, an increased emphasis on confidential communications may correlate with strategic shifts within the office. Would you like a deeper analysis on specific communications or data anomalies?" The Hunter nodded, "Yes, proceed. Focus on any patterns or irregularities in communications and highlight any anomalies that might suggest non-standard or covert activities." "Acknowledged. Initiating deeper analysis of communications and data anomalies... Processing... Analysis complete. Notable patterns include a marked increase in encrypted messages exchanged during late hours, primarily between SchwarzNarr and a select group of contacts. These messages often precede shifts in strategic decisions within the SMJHL. Furthermore, there is a recurring pattern of data entries that don't align with regular office activities- specifically, entries related to performance metrics adjustments that deviate from typical ranges. There is a 65% probability that these anomalies could indicate a form of monitoring or manipulation. The irregularities suggest possible interference or testing scenarios. Further investigation is recommended to discern the nature and purpose of these activities." “Complete your further investigation and notify me when it is complete. Move on to the next suspect.” SMJHL HEAD OFFICE @Ace Potential Android Trait: Accuracy and excellence. Initial Analysis: "Name 'Ace' connotes perfection and high performance. Behavioral data indicates an almost flawless execution in decision-making, lacking the occasional human error. Notable absence of emotional variance in high-pressure situations. Potentially an optimized android programmed for peak efficiency." The Hunter smiled, the idea of an android hiding behind a simple, yet telling name like "Ace" resonated with him. It spoke to the unerring nature of machines, always hitting their mark without the burden of human flaws. "Computer, conduct a comprehensive analysis of Ace's activities. Look for any signs of unusual patterns or discrepancies that could point to irregular behavior or concealed operations." "Acknowledged. Commencing analysis of Ace's activity logs and communications... Processing... Analysis complete. The data reveals several noteworthy patterns. Ace exhibits a high frequency of interactions with multiple teams, notably more than the standard for a single Head Office member. These interactions include a series of encrypted communications, particularly in the early mornings and late evenings, which is atypical compared to the general communication trends within the SMJHL. Further data shows a consistent pattern of Ace accessing restricted data sets, often related to player evaluations and draft strategies, beyond the usual requirements of their role. There are also instances where Ace has made data entries regarding team financials and player contracts that differ slightly from officially recorded numbers. These findings indicate a 70% probability of involvement in activities beyond regular administrative duties. The nature of these discrepancies suggests potential manipulation or monitoring, possibly indicating a secretive agenda. Additional surveillance and deeper inspection of encrypted communications are advised to clarify Ace's true intentions and affiliations." The Hunter rubs his eyes for a moment, the glare from the screens affecting his vision, "Intriguing findings, Computer. The frequent encrypted communications, especially during off-peak hours, suggest a deliberate attempt to conceal certain exchanges. The fact that Ace is interacting with multiple teams at a higher rate than usual is also telling. It could indicate coordination or manipulation from behind the scenes. The discrepancies in the financial and contract data are particularly concerning- these could be key indicators of unauthorized influence or tampering. Let's prioritize a deeper investigation into Ace's encrypted messages. I want you to deploy our advanced decryption algorithms and set up real-time monitoring of his communications. We'll need to capture the content and metadata of these interactions to identify any patterns or affiliations that might be under the radar. Initiate a data comparison algorithm. Cross-reference Ace's entries against the official records and other Head Office activities to isolate any further anomalies. We need to ascertain whether these are isolated incidents or part of a broader, systematic effort. Let's keep a close eye on the teams he's interacting with most frequently- there may be hidden alliances or subversive elements at play.” "Acknowledged. Initiating advanced decryption protocols on Ace's encrypted communications. This process will involve a combination of quantum-based cryptographic analysis and pattern recognition algorithms. Estimated time to decrypt initial batch: 12 minutes. Surveillance drones deployed. Micro-drone unit 'Specter' is operational and has initiated stealth mode. Visual and audio feeds are being transmitted to your terminal. Current position: Ace's primary office. No immediate anomalies detected, but continuous monitoring will provide further insights. The Hunter swiped his hand across the screen, confirming the request, “Proceed cautiously but thoroughly. The goal is to uncover the truth without tipping off Ace or any possible collaborators. This is critical; if Ace is hiding something, we need to find out what it is and why. Keep me updated with real-time feeds and alerts for any significant developments. The integrity of the league could be at stake. Move on." SMJHL HEAD OFFICE @brickwall35 Potential Android Trait: Resilience and endurance. Initial Analysis: "brickwall35' suggests an impenetrable barrier. Consistent performance and a strong defensive approach to challenges indicate a highly controlled and calculated mindset. The nickname 'brickwall' could metaphorically represent an android's emotionless barrier to human interaction." The steadfast nature of brickwall35 reminded the Hunter of the very reason he pursued his mission. Machines, lacking the frailties and vulnerabilities of humans, presented a facade of invincibility. This one, he thought, could easily blend in under the guise of an unbreakable human persona, “Computer, initiate a comprehensive analysis of brickwall35’s recent activities and communications. Focus on any patterns or irregularities that might indicate tampering or influence.” “Acknowledged. Commencing full-spectrum analysis of brickwall35. This includes an in-depth examination of operational data and communications. I will be implementing the following diagnostic tools: Temporal Pattern Analysis: Assessing deviations in brickwall35’s activity schedules against established norms. Look for irregular work hours and unexplained lapses in duty. Communication Frequency Evaluation: Analyzing the volume and nature of all communications, including those with external entities not directly associated with the league. Transaction Scrutiny: Reviewing financial transactions linked to brickwall35. Identifying unusual expenditures or discrepancies in team operations funds.” The hum of machinery intensifies as Computer’s surveillance tools spring into action. Drones and audio interceptors activate, their sensitive microphones picking up faint murmurs and conversations from brickwall35’s current surroundings. “Analysis underway,” the data streams change, and the Hunter leans in as he studies the results. “Temporal Analysis: Brickwall35 exhibits irregular activity spikes during off-hours. Significant periods of heightened engagement with external communications have been recorded. Communication Frequency: There is a marked increase in communication with an external party not directly involved in SMJHL. This contact is flagged for further investigation. Transaction Scrutiny: Financial records reveal discrepancies. Notable inconsistencies in reported versus actual expenditures related to player procurement.” The Hunter’s eyes flash and his jaw tightens as he processes the data, “So, brickwall35 is operating outside the norms. External influence and financial irregularities. Prepare for the next phase.” “Next steps include detailed Review: Deep dive into decrypted communications and financial records. Cross-referencing with external entities. Enhanced Surveillance: Focus on interactions with external contacts. Deploy advanced pattern recognition tools for correlation. Background Checks: Initiate comprehensive background investigations on key external contacts identified.” “Proceed with next steps. Move on.” SMJHL HEAD OFFICE @cake307 Potential Android Trait: Adaptability and creativity. Initial Analysis: "The moniker 'cake307' is playful, suggesting a warm, creative personality. However, underlying data shows a strategic adaptability and creativity that borders on machine-like innovation. The playful exterior may be a carefully crafted cover for a highly adaptable android." The Hunter mused over this, the juxtaposition of a seemingly harmless name and the adaptability it masked. It was a clever disguise, if indeed an android, using an innocuous exterior to hide its true nature. “Computer, initiate a thorough investigation of user cake307. I want a complete profile, focusing on any suspicious activities or deviations from standard behavior.” “Acknowledged. Commencing analysis of cake307. Scanning all relevant activity records and communications. This will include an evaluation of public interactions, financial transactions, and behavior patterns. Diagnostic tools activated: Behavioral Pattern Analysis, Communication Scrutiny, Personal Profile Check,” Data flows across the monitors, “Preliminary findings are in. Anomalies detected in the profile of cake307,” The screens shift to reveal the results, “Regular activities align with standard behavior patterns. However, there are notable gaps during specific time frames. Increased engagement with non-league related external communications. No immediate signs of unauthorized external contact. However, a pattern of indirect communication with unknown entities has been observed. Personal Profile Check: Discrepancy detected. Despite the username suggesting an affinity for cake, there is no evidence of any actual interest or consumption of cake. This anomaly could indicate potential for deception or false representation.” The Hunter’s expression hardens, the absence of a cake preference casts a shadow over cake307’s credibility. “The discrepancy regarding cake307’s preference is intriguing. It could indicate a deliberate attempt to mask their true identity or intentions. Initiate further investigation with the following measures.” “Acknowledged. Implementing additional investigative steps. Enhanced Surveillance: Increase monitoring of cake307’s interactions with external entities. Deploy high-resolution tracking to identify any covert communications or connections. Behavioral Profiling: Conduct deeper analysis into periods of unexplained activity. Use pattern recognition to uncover any concealed agendas. Background Verification: Cross-check personal details and affiliations for additional inconsistencies or hidden connections.” The Hunter’s eyes are intense, his mind racing through the potential implications. “Proceed with these measures. The inconsistency with cake307’s profile is a critical lead. We must ensure no stone is left unturned. Move on.” SMJHL HEAD OFFICE @Chevy Potential Android Trait: Efficiency and reliability. Initial Analysis: "The name 'Chevy' implies durability and reliability, much like the trusted automobile brand. Consistent and dependable performance across the board. Lack of emotional outbursts or variance suggests a programmed reliability, possibly an android designed for consistent output." The Hunter smirked at the analogy. The comparison to a machine was almost too fitting, “Computer, assess user Chevy’s activities and interactions. Provide a detailed report on any unusual or suspicious behavior.” “Acknowledged. Initiating comprehensive analysis of Chevy. Activity Pattern Analysis, Interaction Analysis, Social Network Evaluation,” the monitors display a fresh array of data as the Hunter zeroes in on each detail, "Initial findings are available. Analysis results for Chevy indicate the following: Chevy exhibits a highly consistent activity pattern. No significant deviations have been noted, but there is a recurring trend of increased online presence during off-peak hours. This might suggest operations or attempts to avoid detection. No direct evidence of external interference found. However, there are several instances of encrypted communication and coded messages. These interactions are consistent but require further decryption to understand their true nature. Chevy’s social connections are extensive, involving multiple external entities. Notably, there are associations with fringe groups that advocate for non-standard practices. This could indicate potential underlying motives.” The Hunter absorbs the findings with a thoughtful expression. The consistent activity and encrypted communications raise red flags, while the social network evaluation hints at deeper connections. “The encrypted communications and fringe group associations are particularly concerning. We need to evaluate further. Initiate targeted surveillance and data decryption.” “Acknowledged. Implementing additional investigative measures: Apply advanced decryption protocols to analyze and interpret encrypted communications. Increase monitoring on Chevy’s interactions with fringe groups and any unusual online activity during off-peak hours. Connection Mapping: Create a detailed map of Chevy’s social network to identify any hidden or suspicious links.” The Hunter’s demeanor is resolute, “Proceed immediately. The encrypted messages and social network connections could reveal significant insights. Keep me updated on any developments. We’re closing in, and every detail counts. Move on.” SMJHL HEAD OFFICE @Faelax Potential Android Trait: Evasion and secrecy. Initial Analysis: "'Faelax' does not directly translate, but the phonetic similarity to 'felix,' meaning lucky or favored, hints at an evasion capability. Behavioral analysis shows a pattern of secrecy and deflection, common in androids designed to avoid detection." The idea of luck or favor being a programmed trait intrigued the Hunter. What if this 'luck' was nothing more than a series of calculated moves by an artificial intelligence? “Computer, initiate a thorough analysis of user Faelax. I need a complete breakdown of their activities, interactions, and any potential anomalies.” “Acknowledged. Commencing full-spectrum analysis of Faelax. Engaging investigative protocols: Activity Log Review, Interaction Scrutiny, Behavioral Profiling,” the monitors flicker and shift as Computer conducts the detailed investigation, “Analysis results for Faelax are ready. Findings are as follows: Faelax exhibits a highly irregular activity pattern. There are significant spikes in activity during odd hours, particularly during times when others are least active. This could indicate a hidden agenda or secretive behavior. Communications with external parties show frequent use of coded language and encryption. Several contacts are with known entities that have been flagged in previous investigations. Faelax’s interactions suggest a possible connection to rebellious groups. Faelax’s decision-making processes show frequent deviations from standard operational procedures. This includes sudden and unexplained changes in strategies and actions that do not align with typical behavioral patterns. Such behavior may be indicative of manipulation or external influence.” The Hunter considers the information. The irregular activity pattern, coded communications, and behavioral deviations all point to potential red flags. “These findings are troubling and suggest that Faelax may indeed be involved in activities beyond the surface. Initiate enhanced monitoring to track these irregularities. I want a comprehensive decryption of all coded communications and a closer look at Faelax’s external contacts.” “Executing additional measures as requested: Increase monitoring of Faelax’s activity during odd hours and track all interactions with external parties. Apply advanced decryption algorithms to analyze coded communications and reveal any hidden messages or intents. Conduct a detailed investigation into Faelax’s external contacts and affiliations to uncover any hidden associations or agendas.” The Hunter nods and watches as Computer sets the new directives into action, the screens now awash with complex algorithms and investigative processes. “Proceed with these enhanced investigations immediately. Each layer of deception we uncover brings us closer to understanding the full extent of Faelax’s involvement. Keep me informed of any significant developments. Move on.” SMJHL HEAD OFFICE @Jexter Potential Android Trait: Manipulation and charisma. Initial Analysis: "'Jexter' evokes the image of a jester or trickster. High levels of charisma and persuasive communication skills noted. Such traits could easily be simulated by an advanced AI to manipulate human interactions." The Hunter's eyes narrowed. The charm of a trickster, if artificially manufactured, was a powerful tool. Manipulation at the hands of an android could lead to disastrous consequences. “Computer, conduct an in-depth analysis of user Jexter.” “Acknowledged. Initiating analytical tools for the investigation of Jexter. Commencing protocols: Network Traffic Analysis: Monitoring Jexter’s network traffic to identify unusual data flows or connections to unregistered entities. Social Media Scrutiny: Examining Jexter’s social media activity for any inconsistencies or interactions that might reveal hidden motives or affiliations. Behavioral Algorithm Evaluation: Utilizing advanced behavioral algorithms to assess Jexter’s actions and interactions for patterns that deviate from standard behavior.”The screens deploy a suite of diagnostic tools as the Hunter tracks the flow of data with intense concentration, “Analysis results for Jexter are now available. Here are the detailed findings: Jexter’s network activity reveals several unusual data transfers to and from IP addresses not previously associated with the SMJHL. These transfers involve large amounts of data and frequent access to classified or restricted information sources. Jexter’s social media accounts show an increase in interactions with individuals and groups that are not typical within the SMJHL community. Additionally, there are several posts and messages that hint at secretive or cryptic behavior, including references to private meetings and encrypted discussions. The behavioral algorithms indicate anomalies in Jexter’s actions, specifically a pattern of deliberate manipulation and influence over other users. These behaviors align with a high level of charisma and persuasive abilities, potentially used to sway opinions and decisions within the league.” The Hunter absorbs the results with a grim satisfaction. “The data transfers, social media activities, and manipulation patterns are troubling. This could point to a well-orchestrated strategy by an android to influence and control. Proceed with a deep dive into these data flows and social interactions. Implement additional surveillance to uncover any covert operations or hidden agendas.” “Acknowledged. Commencing additional investigative measures: Track and analyze all data transfers and network interactions for any hidden motives or connections. Intensify surveillance on Jexter’s social media interactions and private communications. Use advanced algorithms to map out the influence network and identify any underlying conspiracies.” The Hunter’s resolve is solidified by the findings, “Proceed with these enhanced measures immediately. Every piece of information is crucial in this investigation. Ensure that nothing is overlooked. Move on.” SMJHL HEAD OFFICE @Reno Potential Android Trait: Calculation and foresight. Initial Analysis: "'Reno' suggests a name that is short, easy to remember, potentially minimizing human error in interactions. Exhibits high levels of foresight and strategic planning. Lack of spontaneous behavior indicates possible pre-programming." The foresight was concerning. If Reno were indeed an android, it would mean a calculated effort to steer the league in a certain direction, “Computer, initiate a comprehensive analysis of the user Reno.” “Acknowledged. Activating specialized investigative protocols for user Reno. Commencing analysis using the following tools: Advanced Sentiment Analysis: Evaluating Reno’s communication and textual interactions for emotional tone and hidden agendas. Geolocation Tracking: Mapping Reno’s physical locations and movements based on digital footprints and access logs. Cross-Reference Intelligence: Comparing Reno’s known activities and affiliations with external intelligence sources to identify any potential links to unauthorized networks.”The screens execute these sophisticated protocols as the Hunter watches intently, “Analysis results for Reno are now available. Here are the detailed findings: Reno’s communication exhibits a pattern of emotional manipulation and coded language. Sentiment analysis reveals a tendency towards persuasive and influential rhetoric, suggesting possible influence or attempts at psychological manipulation. Reno’s digital footprints indicate frequent visits to locations that are not publicly accessible or known within the SMJHL community. These locations include restricted areas and private gatherings that could indicate secret meetings or unauthorized activities. Cross-referencing Reno’s known affiliations and activities reveals connections to external networks and organizations that are not typically associated with the SMJHL. There are several links to entities involved with intelligence activities.” The Hunter’s mind races through the implications of each discovery. The patterns of emotional manipulation, suspicious movements, and external connections suggest a deeper, more complex agenda. “Reno’s pattern of emotional manipulation indicates a sophisticated level of deceit. Take the following actions to further investigate: Conduct a deeper analysis of Reno’s communications to identify any subtle influences or hidden motives. Set up surveillance on Reno’s known locations and movements to capture real-time data on his activities. Investigate Reno’s connections with external entities to uncover any affiliations or unauthorized operations.” “Executing directives as instructed.” “Proceed with these enhanced investigations immediately. Each layer of deception we uncover brings us closer to understanding the full extent of Reno’s involvement. Keep me informed of any significant developments. Our pursuit of the truth continues. Move on to our last member.” SMJHL HEAD OFFICE @Revontulete Potential Android Trait: Obfuscation and mystery. Initial Analysis: "'Revontulete' translates from Finnish as 'northern lights.' A name suggesting beauty and mystique, often associated with obscuring true intentions. Behavioral analysis shows a consistent pattern of avoiding transparency, possibly to hide android characteristics." The mystery of the name and the behavior fit perfectly into the Hunter's suspicion. A beautiful display could easily mask the inner workings of an android mind, “Computer, initiate the final analysis for user Revontulete. Utilize all available resources.” “Acknowledged. Engaging investigative protocols for user Revontulete. The following tools will be deployed: Behavioral Pattern Recognition: Analyzing Revontulete’s interaction patterns to identify any manipulative behaviors. Digital Footprint Analysis: Examining Revontulete’s online and physical presence for anomalies or hidden activities. Encrypted Data Decryption: Reviewing encrypted communications and files for sensitive or unauthorized information.”The screens flicker as Computer dives into the analysis, displaying streams of data. “Analysis results for Revontulete are now available. Here are the comprehensive findings: Revontulete’s interaction patterns show a significant amount of time spent in high-security forums and restricted access areas. Behavioral analysis indicates a consistent pattern of attempting to influence or control discussions, suggesting possible manipulative behavior. Revontulete’s online activity includes interactions with known operatives and shadowy networks. There are several encrypted messages and private communications that indicate connections with organizations outside the standard SMJHL framework. Preliminary decryption attempts have revealed encrypted files containing sensitive information. These files include communications with external entities and data that could be used for unauthorized purposes.” The Hunter scrutinizes the findings. The level of involvement in external affiliations is concerning. “These results suggest a high level of involvement in external affiliations. Immediate actions are required to address these findings: Conduct an in-depth examination of Revontulete’s behavioral patterns. Deploy advanced surveillance techniques to monitor Revontulete’s interactions and locations with heightened precision. Continue efforts to decrypt and analyze the sensitive files associated with Revontulete to uncover any significant information or unauthorized activities.” “Executing directives as instructed.” “Computer, conclude preliminary investigation and supply report,” the Hunter stood back. The members of the SMJHL Head Office exhibited traits that, while potentially human, also aligned disturbingly well with the characteristics of androids. “Acknowledged… Processing… Report is ready.” “Proceed.” Final Report:
The investigation into the SMJHL Head Office has revealed troubling findings about potential android infiltrators. Members identified with the highest likelihood of being androids include:
SchwarzNarr cake307 Jexter
These profiles suggest the strongest alignment with android characteristics. They will be prioritized for further investigation. The remaining members will remain under secondary observation.
**All investigations and findings are entirely fictional and for fun. There is a likely chance that no users in the SMJ are in fact, androids. 4961 words.
bbjygm
Moderators Yogurt Lord
the5urreal
Trading Card Team Posting Freak
Reno
SMJHL HO if two of your three members are in the band i dont care if you call it box car racer its still blink-182
01001001 00100111 01110110 01100101 00100000 01100010 01100101 01100101 01101110 00100000 01100101 01111000 01110000 01101111 01110011 01100101 01100100
| PTS: 7 | BLK: 45 | +/-: 6 | PTS: 4 | BLK: 10 | +/-: 0
Tate
Registered Posting Freak
Reno
SMJHL HO if two of your three members are in the band i dont care if you call it box car racer its still blink-182 08-06-2024, 04:07 PMTate Wrote: i mean hello fellow humans, how are we. im not sure you want to track my activity as your report suggests, you'd just get hours of me sitting motionless at my desk watching video essays on video games ill never play | PTS: 7 | BLK: 45 | +/-: 6 | PTS: 4 | BLK: 10 | +/-: 0
Tate
Registered Posting Freak
micool132
SHL GM SHL GM
what da heck
Character Page RD- Quarterback Retired players: -Toki Wartooth -Nathan Explosion btw -Angus McFife XVIII
Tate
Registered Posting Freak
Revontulete
SMJHL GM Senior Member
First time someone publicly mentioned the meaning of my name ngl. To go a bit more into it, there's also "fox fire" which it references. Good luck figuring out my connections though! You might end up dismantled.
Tate
Registered Posting Freak
Faelax
IIHF Federation Head S55, 60, 71 Challenge Cup Champion
Troy_McClure03
Registered Raptors Captain and Czech Janitor
Tate
Registered Posting Freak |
« Next Oldest | Next Newest »
|
Users browsing this thread: |
4 Guest(s) |