By early xxxx, the Confederation was regularly sending covert surveillance ships into Hegemonic systems and monitoring fleet and political operations. The dearth of intelligence that this generated proved highly valuable.
One such surveillance ship was monitoring the construction of a prototype ship of the line, code-named 'Bully'. Bully was an extremely large Battleship that carried a frightening amount of firepower, including two squadrons of fighters, 10 gauge plasma cannons and enough small arms to stand-off just about anything any single Confederate militia could throw at it.
The black-fleet's surveillance ship SC-1355 was monitoring the launch of Bully from the yards and was confident that the ship was going to go through trials in an adjacent and unoccupied star system. When the ship instead made way for the nearest Confederate system, it became clear that the intention was to put the ship through trials in an incursion.
SC-1355 then quickly began to make ready to return home (in the hopes of preventing Bully from surprising Confederate forces) when it's presence was detected and the ship was forced to send it's report via a data probe while sacrificing itself, in order to give Hegemonic forces the satisfaction that they had stopped any leak of the coming attack.
The probe arrived in the Confederate system of Galph just hours ahead of the Bully. But those crucial hours proved invaluable in evacuating civilians and rallying forces to prevent a slaughter.
Bully (now commissioned and officially called the HNV Obligator) entered Galph and began to systematically destroy any Confederate asset it encountered. All the while, civilian ships were being vectored away from the Obligator. Soon however, the Obligator came to the primary colony world of New Spokane and Obligator began to open fire with it's heavy weapons. The orbiting control station was destroyed with no resistance, and most of the surface of the colony was rendered uninhabitable. Tens of thousands were killed but hundreds of thousands escaped, and warning was transmitted to neighboring star systems (as well as to the Confederate government) in enough time to begin to activate the different elements of the fleet.
However, what was not known to any elements of CDCA is that this was a precursor to the full scale invasion of the Confederacy. At about the same time that the Obligator was wrapping up it's operations in Galph, several agents placed aboard the Confederate Colony Ships went into action and managed to either disable or destroy them.
Soon entire task forces were entering Confederate space and initiating open conflict. Spearheaded by the Obligator, they seemed almost unstoppable.
Friday, September 9, 2011
Tuesday, August 9, 2011
Operation Westcott
Operation Westcott was a counter-insurgency operation carried out by the Confederate Black Fleet in response to a Hegemonic incursion.
The Hegemony had been planning a serious incursion into Confederate space for a considerable period of time, and thanks to Confederate intelligence efforts, was exposed and compromised early. However, rather than openly expose the plans, the Confederation decided to take the opportunity to counter-attack while deceiving the Hegemonic forces.
In the early part of xxxx, the Henry Security forces massed in the fringe Perral system, and waited. Meanwhile the Confederate Data Collection Agency (Black Fleet Intel.) actively sent misleading reports to the Hegemonic forces that all was normal in Confederate space. This was no small feat, and remains among the top five most successful operations ever carried out by the CDCA.
Once the Hegemony commenced the attack, (committing the lion's share of forces in the area) experienced line duty forces held them off capably, while the Black Fleet moved into Hegemonic space, wreaking havoc with communications and supply lines, as well as decimating reserve forces.
The Henry forces were quickly routed losing the majority of their front line units. In addition, two capitol ships were severely damaged, and one Ship-of-the-Line was nearly lost (with the Hegemonic commander aboard).
The ambush was an enormous embarrassment to the Hegemony, and incursions were held off for three years afterward, allowing the Confederation valuable time to build up capability in both tactical and intelligence theaters of conflict.
The Hegemony had been planning a serious incursion into Confederate space for a considerable period of time, and thanks to Confederate intelligence efforts, was exposed and compromised early. However, rather than openly expose the plans, the Confederation decided to take the opportunity to counter-attack while deceiving the Hegemonic forces.
In the early part of xxxx, the Henry Security forces massed in the fringe Perral system, and waited. Meanwhile the Confederate Data Collection Agency (Black Fleet Intel.) actively sent misleading reports to the Hegemonic forces that all was normal in Confederate space. This was no small feat, and remains among the top five most successful operations ever carried out by the CDCA.
Once the Hegemony commenced the attack, (committing the lion's share of forces in the area) experienced line duty forces held them off capably, while the Black Fleet moved into Hegemonic space, wreaking havoc with communications and supply lines, as well as decimating reserve forces.
The Henry forces were quickly routed losing the majority of their front line units. In addition, two capitol ships were severely damaged, and one Ship-of-the-Line was nearly lost (with the Hegemonic commander aboard).
The ambush was an enormous embarrassment to the Hegemony, and incursions were held off for three years afterward, allowing the Confederation valuable time to build up capability in both tactical and intelligence theaters of conflict.
Saturday, January 1, 2011
Hidden Fighter Depots
Constructed to support fighter squadrons in the event they become separated from supply lines, Hidden Fighter Depots are self contained facilities that allow for simple repairs for fighters and recuperation for pilots.
These facilities are installed in a number of locations. Remote areas of habitable planets, hollowed out asteroids, apparently derelict stations. A secret database of local depots is kept with each fighter squadron's leader, and is distributed to individual fighters only after extreme emergency.
These facilities are installed in a number of locations. Remote areas of habitable planets, hollowed out asteroids, apparently derelict stations. A secret database of local depots is kept with each fighter squadron's leader, and is distributed to individual fighters only after extreme emergency.
Subscribe to:
Posts (Atom)