The factions obtain basic information from other factions through diplomacy. However, to obtain more detailed information, the use of espionage networks is necessary. An espionage network is created using a spy leader, which is deployed in the target base and which will have enabled a series of missions based on our technology.
The spy creates a level 0 network when deployed, using infiltration missions to increase the level of the network and have access to new missions and base information.
To create an espionage network we must:
- Detect a base from another faction.
- Locate us on the screen of the base.
- Deploy a [leader] spy.
The espionage missions have some possibilities of success that depend on:
- Difficulty of the mission
- Spy skills
All the missions have a cost and a time of accomplishment. Once this is finished, a check is performed. If successful, the results of the mission are produced, but if it fails, the network is destroyed and the enemy is likely to know the person responsible for the activities.
|NOC list||50.000||medium||6h||2||Counterintelligence||Through access to faction security systems, the mission will attempt to discover faction infiltration networks installed in our bases.|
|Hack banking system||50.000||high||6h||3||Decryption||Hacking the banking system of the base to steal money from the faction. The target is the base banks or unprotected money.|
|Infiltration level 1||500||low||1h||0||Basic technology||It increases the level of the spy network, increasing the information received from the base and enabling new types of missions.|
|Infiltration level 2||1.000||medium||3h||1||Infiltration techniques||It increases the level of the spy network, increasing the information received from the base and enabling new types of missions.|
|Infiltration level 3||1.500||high||3h||2||Infiltration techniques II||It increases the level of the spy network, increasing the information received from the base and enabling new types of missions.|
|Base report||200||low||1h||1||Infiltration techniques||Generates a report with the basic base information.|
|Defenses report||500||medium||4h||2||Infiltration techniques II||Generates a detailed report with the base defenses.|
|Faction report||100||very low||1h||1||Basic technology||Generates a report with the general status of the faction.|
|Fleet report||10.000||medium||4h||2||Information analysis||Hack the fleet navigation system to get a summary of the fleets operating in the system.|
|Instigate riots||50.000||high||2h||2||Subversion||The objective of the mission is to take advantage of social discontent and to fund subversive groups, with the aim of causing disturbances.|
|False flag operation||25.000||medium||6h||2||Counterintelligence||Simulates an espionage mission as executed by another enemy faction, in order to create the discord between both factions.|
|Sabotage||50.000||high||3h||3||Counterintelligence||The mission aims to cause damage to the base.|
Spying networks have three levels of infiltration. Infiltration missions allow access to higher levels. Higher level networks have access to more advanced spy missions.
Defense against espionage
Defense against espionage
The only possible defense is to incorporate a commander in the base with the ability of counterespionage or perform manual raids from the base from which we suspect we can have infiltrated spies.