I send the report of my recent activity regarding the Mission 32.
The details of the mission:
Mission details Wrote:Mission 32 Mission type: Standard
Mission status: Available
Lane Hackers prosper thanks to distribution of Counterfeit Software to those in need of cheaper or better software. Keeping our allies closer by providing them with top notch Software is beneficial to both sides. Use freighter to smuggle couple of batches to our allies within Liberty. Provide visual confirmation of your deliveries. Phase 1 (Evaluation in progress): Transport at least 500 units to Allentown Base, Beaumont Base, Rochester Base and Thunder Bay Depot each. Phase 2 (Available): Transport at least 500 units to Alcatraz Depot, Niverton Base, Montezuma Base and Buffalo Base each.
My first step, as initiate Lane Hacker was the location process of the counterfeit software provider base. I had made my research on the matter, and I've found, that <<encrypted information>> is the source of this commodity. Although the system is known, as a basic knowledge amongst us, I had to locate it exactly, so I've taken my Pirate freighter to <<encrypted information>>. As I had enough time, I've voted on direct search in the cloud.
I've managed to localize the base flying around the cloud, but I must admit, it's well hidden, and the scanner jammer up and functioning. Even standing next to the hideout the scanner wasn't able to identify it. (Jammed scanner).
To acquire the scanner access codes, I've visited <<encrypted information>> and bought it from a reliable source.
The evidence of the deliveries uploaded for the secure server (as my cargo space enabled slightly bigger amount, this plus I've added to the deliveries).
Because I chose for my trips a time extremely low traffic, during the mission I've met only three contact on my scanner. The first one was a neutral IFF, I've made some effort to keep myself out of his scanner, in the system ONTARIO.
The second contact was a friendly IFF, in the system PENSYLVANIA, still, I kept him out of scanning range, to keep my mission low profile, probably he was an independent Junker.
The third contact, a hostile one, I've met during the last delivery, in the system <<encrypted information>>, his transponder code was <<encrypted information>>. Seemingly He tried to follow me, but all the time I kept him out of scanning range (12K or more).After he had lost my track he was guarding the jump hole which I targeted. I was hidden behind a planet and waiting for his departure. After 6 minutes, he gave up, and gone, so I've managed to continue my last delivery.
Self-evaluation regarding the mission:
Although this mission consists only of four simple delivery trip for Junker bases to supply our friends with counterfeit software, the mission had a sensitive nature. I kept low profile during the mission, and never was tracked down. I scheduled all the trips for one day, one next the other, in a fast chain, so I don't let anyone discover my goals or blocking my routes. All the four deliveries was completed without incident.