Difference between revisions of "Espionage"
Line 49: | Line 49: | ||
| False flag operation || 25.000 || medium || 6h || 2 || [[Counterintelligence]] || Simulates an espionage mission as executed by another enemy faction, in order to create the discord between both factions. | | False flag operation || 25.000 || medium || 6h || 2 || [[Counterintelligence]] || Simulates an espionage mission as executed by another enemy faction, in order to create the discord between both factions. | ||
|- | |- | ||
− | | Sabotage || | + | | Sabotage || 50.000 || high || 3h || 3 || [[Counterintelligence]] || The mission aims to cause damage to the base. |
|} | |} | ||
Revision as of 11:27, 26 October 2017
Factions obtain basic information from other factions through diplomacy. However, for more detailed information the use of espionage networks is necessary.
Spy Networks
To create an espionage network you must know a base. Creating a network is immediate, but has a cost in money. Once created, the network has an infiltration level of 0. Each level of infiltration enables new types of espionage missions.
To create a spy network we must:
- Detect a base of another faction
- Go to base screen
- Execute the mission "infiltration level 1"
Espionage missions
Espionage missions have a chance of success depending on:
- Difficulty of mission
- Base surveillance level (counterintelligence)
All the missions have a cost and a time of accomplishment. Once this is finished, a check is performed. If successful, the results of the mission are produced, but if it fails, the network is destroyed and the enemy is likely to know the person responsible for the activities.
Mission | Cost | Difficulty | Duration | Level | Technology | Description |
---|---|---|---|---|---|---|
NOC list | 50.000 | medium | 6h | 2 | Counterintelligence | Through access to faction security systems, the mission will attempt to discover faction infiltration networks installed in our bases. |
Hack banking system | 50.000 | high | 6h | 3 | Decryption | Hacking the banking system of the base to steal money from the faction. The target is the base banks or unprotected money. |
Infiltration level 1 | 500 | low | 1h | 0 | Basic technology | It increases the level of the spy network, increasing the information received from the base and enabling new types of missions. |
Infiltration level 2 | 1.000 | medium | 3h | 1 | Infiltration techniques | It increases the level of the spy network, increasing the information received from the base and enabling new types of missions. |
Infiltration level 3 | 1.500 | high | 3h | 2 | Infiltration techniques II | It increases the level of the spy network, increasing the information received from the base and enabling new types of missions. |
Base report | 200 | low | 1h | 1 | Infiltration techniques | Generates a report with the basic base information. |
Defenses report | 500 | medium | 4h | 2 | Infiltration techniques II | Generates a detailed report with the base defenses. |
Faction report | 100 | very low | 1h | 1 | Basic technology | Generates a report with the general status of the faction. |
Fleet report | 10.000 | medium | 4h | 2 | Information analysis | Hack the fleet navigation system to get a summary of the fleets operating in the system. |
Instigate riots | 50.000 | high | 2h | 2 | Subversion | The objective of the mission is to take advantage of social discontent and to fund subversive groups, with the aim of causing disturbances. |
False flag operation | 25.000 | medium | 6h | 2 | Counterintelligence | Simulates an espionage mission as executed by another enemy faction, in order to create the discord between both factions. |
Sabotage | 50.000 | high | 3h | 3 | Counterintelligence | The mission aims to cause damage to the base. |
Infiltration levels
Spying networks have three levels of infiltration. Infiltration missions allow access to higher levels. Higher level networks have access to more advanced spy missions.
Defense against espionage
The only defense is to raise the base guard level by adding more garrison troops. The surveillance ability of the troop determines the number of citizens of the base that can be monitored. The base troops will only act when the spy network acts, will try to detect it and frustrate the mission.