Day 5: Prague Control
Prague Control: Mirage Protocols & Decoy Operations
If he shoots where he thinks you are, be somewhere else. This is how EPF splits the Chairman’s targeting math with ghost convoys and RF mirages.
Threat model
- Targeting math: enemy tracks route probability, not just dots on a map.
- Goal: waste his cycles and sensors—force bad locks—while the real convoy clears the kill box.
Mirage protocol modules
- Ghost convoys: three routes; vary speed/spacing; stagger departures by 7–11 minutes.
- RF mirage layer: broadcast cloned IDs on decoy routes; rotate beacons every 5 minutes.
- Heat masking: real convoy rests under cover; decoys loiter in clean view to “prove” themselves.
- Route math: never converge. If trailed, fold decoys into public traffic and let them vanish as noise.
Night map (inline)
Execution timeline
- T–30: load IDs, set RF cadence, assign call signs.
- T–10: route split; decoys light their beacons; real convoy cold.
- T+00: first decoy “accidentally” crosses a camera; real convoy stays dark.
- T+20: beacon rotation; heat-mask swap; never overlap corridors.
CTA: Use the checklist to brief your team and run a dry drill before wheels-up.

Comments
Post a Comment