Difference between revisions of "Technology:Infiltration techniques"
Jump to navigation
Jump to search
| Line 9: | Line 9: | ||
===Requirements=== | ===Requirements=== | ||
* [[Technology:Social I|Social I]] | * [[Technology:Social I|Social I]] | ||
| − | === | + | ===Allows=== |
* [[Technology:Subversion|Subversion]] | * [[Technology:Subversion|Subversion]] | ||
| − | |||
* [[Technology:Infiltration techniques II|Infiltration techniques II]] | * [[Technology:Infiltration techniques II|Infiltration techniques II]] | ||
* [[Technology:False flag operations|False flag operations]] | * [[Technology:False flag operations|False flag operations]] | ||
| Line 19: | Line 18: | ||
* Base report | * Base report | ||
* Level 2 Infiltration | * Level 2 Infiltration | ||
| − | [[es: | + | [[es:Technology:Técnicas de infiltración]] |
[[Category:Technologies]] | [[Category:Technologies]] | ||
Latest revision as of 12:16, 14 April 2021
| Social | |
| |
| level | 7 |
| multiplier | 1.0 |
The ability to infiltrate an enemy base requires a range of specialized knowledge and skills to maximize the chances of success.
Requirements
Allows
- Subversion
- Infiltration techniques II
- False flag operations
- Economic imperialism
- Information analysis
Spy missions
- Base report
- Level 2 Infiltration
