Over the years, a consistent thorn in our side has been the interference and time-consumption of the Bounty Hunters Guild. What renders these fopdoodles particularly irritating is that many of their ilk come from within the rank and file of the unlawful denizens of Liberty and Sirius at large. As a result, they are oft privy to information concerning routes, jumpholes, watering holes, fences, and bases. A not inconsiderable amount of time and effort on our part goes into arranging and rotating new dead drops, exchanges, routes, and entertainment venues. In light of the risk imposed and the work incurred, an initiative was established to reduce the leakage of information to the bunters and reduce this burden, whereby we would prevent those dwelling within the underbelly from crawling out to whatever heinous anatomy refers to the back-stabbing traitorous paste-gobblers that are the bounty hunters.
Profiling
The first and most important part of the process is analysis and detection of members or clients portraying increased risk of betrayal. Through profiling, behavioural and pattern recognition, we assess the risk of all outer circle members, clients of our data, and where possible, the members of other organisations within our reach. Few, if any members of the inner circle have been stupid enough to attempt to defect, reflective of the intelligence and thoughtfulness of our group to recognise that such an action would put them into an intolerable position. The only devised scenario for such a circumstance would be when an associate is left with no other choice, and so tolerable alternatives must be made for transgressors. Needless to detail, such an abandonment of the Lane Hackers would result in the loss or severe scrutiny of access to cardamine, the usual pleasures of membership, technology, information, and would render them a target of the highest priority. It would be a condemnation to solitude, disconnected from lawful and other groups alike. While members of the outer circle of the Lane Hackers comprise few of the traitors, they are under the greatest surreptitious scrutiny, in consideration of their access to our technology and information. Wingmen of the Liberty Rogues, and other groups known for infighting, turbulence and dissatisfaction are a greater risk for attempted departure, though a lower relative hazard than those from within our organization.
Pattern Analysis
Demographic predictors aside, data are gathered from three key types of metadata through the network and all of our available infrastructure. These include that of communication logs, target interception information, and ship logs. Marks have been shown to tend towards sudden changes in communication patterns, including increased adherence to security protocols, decreased engagement with routine contacts, and repeated, predictable, or excessive contact with unidentified contacts. There have been instances where our network has detected obvious and unencrypted contact of a non-derogatory nature with authorities, and public bounties for the summary execution of such space-for-brains have been quickly issued and easily completed. Suspect clients also tend to access fewer packets of target acquisition data concerning trade convoys, and pay greater time and attention to identified patrol routes of authorities, potentially to arrange a protective custody. Finally, ship logs can show unusual instances of rookie pilots who would normally only fly with a wing venturing out for extended periods alone, or to unusual locations. Scout wings, especially sensor ships, always fly with a complement, and are the only wings that routinely explore poorly charted areas. Rookie ships returning alone from combat with more experienced pilots are flagged for further monitoring and decreased clearance as they may have been susceptible to being made an enemy asset.
Intervention
In the event that a mark is identified from the data, they are indicated for further scrutiny and active engagement, undertaken through a variety of measures. One of the simplest ways is to contact them anonymously, with idyllic claims of opportunities for their escape and security. A systematic approach is utilized to differentiate the depth of their damnation, determining how far they will go to undermine and betray us. This method is customised according to the attending agent. Often a neutral option is first offered, freedom and anonymity in the lawful sector or on a Zoner installation in the edgeworlds, then demands are increased, for information, for backstabbing, for resources, technology, and so on. How far these reprobates will go to back-stab their own will determine with how they are dealt. Minor infractions and uncertain fools may simply be reconditioned, released to their owner under close watch. Others may simply be put to death, or sold to the fields of Malta. Valuable assets may be considered for mania-reconditioning. Anonymous network contact is not always sufficient, and so at times more complicated ruses must be improvised to ensure that the mark is not alerted to the deception. Meetings in space can be arranged, transfers to allied vessels masquerading as complicit traffickers, whatever is necessary and practical to maintain security. In the event that scoundrels slip through the net, bounties are issued, and assassins dispatched. Public bounties are extremely useful as any party willing to contain this leak, freelancers or the LPI themselves, must be encouraged. It is often possible to provide an anonymized bounty, issued through a third party, which will result in the death of a target by the guild themselves, as the defection and subsequent recruitment is not always internally publicised. In tandem or separately, information, evidence, and slander can be leaked to render the idea of harboring the traitor unacceptable, and their death morally warranted, for those so inclined.
Conclusion
Using these methods of profiling, data analysis, testing and preventative or retrospective intervention, loss of information and pilots to the Bounty Hunters Guild has been impeded. The maintenance of information and technological security is of utmost importance to preserving the superiority of the inner circle and the Lane Hackers at large. This initiative is of course, classified, accessible only to select members of the inner circle who have proven themselves undoubtedly loyal. Any person devious or mischievous sufficient to imagine such a measure is, we intend, driven to such paranoia that their hopes of an 'escape' are made futile. It is however doubted that this is possible, given the intellectual capacity of those who contemplate such an action. Existence of the program should be denied, and those inquiring designated for recruitment assessment and monitoring.