SUBJ: False Intelligence | TO: DS13 Intelligence

To: <38th.Intelligence>
CC: @38th.Command
From: RDML Bishop, S.
Subj: False Intelligence



As we have learnt from the Terran prisoners, the Terrans have come here to destroy wormhole technology. A proposal has been made to leak the potential discovery of wormhole technology in a system in an attempt to lure the Terrans to an ambush. This could force a decisive battle that could severely hinder the Terran incursion and force them to an early withdrawal.

Please look into this and if it is a viable option, have it prepared for release by the end of the week.

Regards,

//SIGNED//
Rear Admiral (Lower Half) Samuel Bishop, PhD
Executive Officer, 38th Fleet ‘Argo’

OOC Thanks for the folks at the briefing for coming up with this idea!

7 Likes

To: <38th.Intelligence>
CC: @38th.Command
From: RDML Bishop, S.
Subj: RE: False Intelligence



Please see below for strategies for the above.

Intelligence

The intelligence to be leaked is a meeting with the Azedi government, in a yet undecided location. Here, we will state that the entire remaining Azedi fleet will be meeting in order to set up the Azed government and to announce a formal alliance with the Federation. The meeting place will be mined and prepared defensively for the attack. If possible, we will be using the Yuhop wormhole to ferry our ships for the attack.

Method of Leak

Our method of leaking this intelligence will be twofold. Firstly, the Terran prisoners we have will be allowed to “escape” with a shuttle containing this information. In order to neutralise Starfleet casualties, the prisoners will be escaping from a holodeck simulation, straight to a shuttle bay. That way, any casualties will be holographic and not organic.

Our second method will involve inserting backdated information into the Starfleet facilities in Ba’aja, for the Terrans to find. Such a task will have to be done remotely, either from a long-distance station or via a remote-controlled exocomp. The task will need to be masked so as not to alarm anyone, backdated, and sufficiently encrypted.

Both pieces of information will seek to verify each other as to the validity of the intelligence. A third method may be needed to confirm this, though a method that does not place our officers in harm’s way is preferable.

Regards,

//SIGNED//
Rear Admiral (Lower Half) Samuel Bishop, PhD
Executive Officer, 38th Fleet ‘Argo’

OOC Thanks to the folks at the briefing for coming up with strategies.

6 Likes