ATTACK VECTOR ANALYSIS
FOR: Skill Urself
DESIGNATION: Surprise Butt Sex
For the past two weeks, the alliance Skill Urself has been witnessed on multiple occasions to be surgically striking supercarriers in the Malpais region. For a while, it remained a mystery to how this alliance could be logged off inside of a system yet could login the instant a supercarrier warped to a rating site and beat that supercarrier to his landing spot and have bubbles and a cyno ready.
It was concluded from evaluations that these surgical strikes were only possible with the help of someone gathering site tags by actively observing system traffic.
Stage 1 – The Spy
In order for this to work, the attack vector relies on a single point of failure, a spy. A spy must have visuals for observation of a high traffic citadel. This also requires research and staking out a system for a few days to understand the habits of supercarrier pilots. For this reason, the spy will generally use a Tech III cruiser for cloaked warping. After the initial intel demonstrates what citadel is being used, the spy must then determine how far from the sites the target warps. In order to remain above suspicion, a cloaked ship is mandatory to minimize exposure.
Stage 2 – The Camper
Once the spy has identified the target and collected enough intel on that target, the setup then begins. The spy logs off, and a cloaky neutral cyno/bubble pilot enters the system and logs off in dead space, likely already marked by the spy.
Stage 3 – The Setup
Once all hostile pilots are online and ready, the spy will then log back in to avoid raising any alarms in the system their target is ratting. Once the spy confirms that the pilot is following the same schedule and the same patterns, the spy waits for the target to return to the citadel. At this point the spy simply waits for the target to warp to his/her next ratting site, at which point he notifies the camper by relaying the site tag which can be done via observation with 100% accuracy (as we have tested).
Stage 4 – The Takedown
The camper then logs back in and immediately warps to the site tag the spy has just fed at a distance determined by intel gathering on the target and bubbles and then lights a cyno. As the target arrives, he/she is tackled, and has an overwhelming army to contend with.
This attack vector exploits the only weakness of a supercarrier in an asymmetrical manner — warp. A supercarrier has very little weaknesses, but the one weakness they do have is the cumbersome maneuvering to and from warp. This attack vector exploits a supercarrier during this moment of weakness making this attack vector virtually unavoidable to an unsuspecting pilot.
There are two ways in which this attack vector can be avoided. First, pilots need to be advised not to follow a “routine”. As most of us with military training are taught, you never get used to a routine, always change it up, change your path, change your warp-to distance, make sure you mix up EVERYTHING. By keeping your routine random and different, you can de-escalate yourself as a target, because if your routine cannot be pinned down, this attack vector becomes much less effective. Another tactic to make youself harder to track, save multiple safe spots from a citadel you frequent, randomly chose one before you warp to a ratting site or gate.
Secondly, as previously stated, this attack vector relies on the spy. Identification and removal of this spy will permanently hamper the effectiveness of this attack vector.
Identifying the spy is a little more difficult than usual because this spy may only seem to be a forward scout for a nearby allied corp or nearby coalition ally. What makes this identifiable is identifying this same person over and over again at the scene of surgical strikes of this attack vector. The third time’s a charm.
Proving The AWOX
When Skill Urself is only a few jumps away and you see a random alliance member or blue in your system, take a screenshot of your local list. Just save it. If an attack occurs, save the screenshot permanently. If it does not, you may delete the screenshot. Upon the second occurrence, follow the same instructions. On the third occurrence, if the same blue has been present just before the attacks on your system, you have enough proof to supply to BOT Execs that you have identified a blue spy/awoxer.
Simply EVEMail Chip Patton in-game.