The following examples show proper and improper ways of sending spies to an enemy faction.
Billy Bob joins a government to spy on it for their enemies.
He uses his fleet access to give information about the faction's movements.
Billy Bob is in compliance with the Spying Rules.
Susan is spying on an enemy faction.
She uses her ability to add others to crewlists to let enemies enter a shield network.
Susam is violating the Spying Rules.
Eric tells his friend from work to join SWCombine and make a character for an enemy faction to gather intel.
Eric is violating the spying rules.
The following examples show proper and improper uses of faction privileges.
John is a member of a starship company, a factioned owned by a government he considers an enemy.
He has access to production tools and events. Each month, he sends a summary of what has been produced to his allies.
John is in compliance with Spying Rules.
Kate is the leader of a mining company, but not the owner. She notices the faction has so many credits and ships unprotected.
Without permission, Kate loots the faction of all credits and assets that are unprotected.
Kate is violating the Spying Rules.
Morgan is a low-tier member of the a big government who is disgruntled with the leadership.
He learns that the leader will be hunting on one of their worlds this week. Morgan grabs his own hunting crew and sneaks over.
Morgan attacks his Faction Leader and kills him.
Morgan is in compliance with the spying rules.
Nate is a member of a faction. He really dislikes a few fellow members and wants to kill them.
He then uses his ship assignment privilege to assign himself to their current ships to get access.
Nate boards and tries to kill his targets.
Nate is violating the Spying Rules.
Paula notices a big shipment of rare equipment is being delivered to her department in the faction.
She wants to sell them on the black market so she moves the crates onto her ship and flies away with them.
Paula is violating the Spying Rules.
The following examples show proper and improper methods of data recording.
Cyndi runs the counter intelligence operations for Generic Government. She notices a new member is experienced in the game but is on a new character.
A note is made that this person may be experiencd with mechanics of the game. No other questions are asked and nothing else recorded.
Cyndi is in compliance with the Spying rules.
George also runs counter intelligence at Generic Government. He sees the same new member but this time asks more questions.
He demands to know prior characters of the new member, and denies them entry or makes notes on their record about it.
George is violating the spying rules.
Billy Bob got caught spying on his group and was executed. His next character rejoins the same faction.
In compliance with the Spying Rules, he is allowed back in and his record does not reflect his past character or actions.
Billy Bob once again spies on them or attempts to assault them from the inside in any way.
Billy Bob is violating the Spying Rules.
Luke is spying on a pirate faction for his old group. He has access to their Discord server and private forums.
Luke downloads everything to his computer making a massive text log of chat history. This file is then shared with others.
Luke is violating the Spying Rules.
Leia has joined an enemy faction in hopes of spying on it. She gains access to their Discord and forums.
She notices that the leader has shared some sensitive OOC information about their real life that could be used against them.
A report is sent to her old faction to tell them of the good news.
Leia is violating the Spying Rules.