Difference between revisions of "Technology:Infiltration techniques"
Jump to navigation
Jump to search
Line 9: | Line 9: | ||
===Requirements=== | ===Requirements=== | ||
* [[Technology:Social I|Social I]] | * [[Technology:Social I|Social I]] | ||
− | === | + | ===Allows=== |
* [[Technology:Subversion|Subversion]] | * [[Technology:Subversion|Subversion]] | ||
− | |||
* [[Technology:Infiltration techniques II|Infiltration techniques II]] | * [[Technology:Infiltration techniques II|Infiltration techniques II]] | ||
* [[Technology:False flag operations|False flag operations]] | * [[Technology:False flag operations|False flag operations]] | ||
Line 19: | Line 18: | ||
* Base report | * Base report | ||
* Level 2 Infiltration | * Level 2 Infiltration | ||
− | [[es: | + | [[es:Technology:Técnicas de infiltración]] |
[[Category:Technologies]] | [[Category:Technologies]] |
Latest revision as of 12:16, 14 April 2021
Social | |
level | 7 |
multiplier | 1.0 |
The ability to infiltrate an enemy base requires a range of specialized knowledge and skills to maximize the chances of success.
Requirements
Allows
- Subversion
- Infiltration techniques II
- False flag operations
- Economic imperialism
- Information analysis
Spy missions
- Base report
- Level 2 Infiltration