Counterfeit Hero

Chapter 67: Behind Enemy Lines Planning



In this world, maybe only this army shamelessly and brazenly calls itself a bandit army. Yet, ironically, Fatty's tactics of "swarm and scatter" in enemy territory, along with the bandit-like military strategy, are very appealing to the warriors of the two Mecha groups.

The original Sixteenth Division Special Reconnaissance Group needs no introduction; thanks to Fatty, this special group full of ramshackle mechas has long gained enough advantages on the battlefield through cheap shots and sucker punches. They have deep knowledge of feigned death tactics, swarming tactics, and strategies of relentless entanglement and immediate retreat when outmatched, fully worthy of being Fatty's direct lineage.

As for many in the Stewart-led Fierce Tiger Special Brigade Second Group of the former First Armored Division, they had witnessed the tricks of the Sixteenth Division's ragtag Mecha group outside the Low Ridge Jungle. Naturally, a trend of shamelessness arose among them, especially after hearing from Group Leader Stewart that Fatty was the legendary SM01314. All warriors who knew how despicably this person operated in the virtual war network began systematic and painstaking study. Every classic battle of SM01314 was thoroughly researched by the warriors, and shameless tactics began to emerge one after another within this group.

These warriors from the two special groups were already elite, handpicked from thousands of soldiers. As a result of this situation, within the original troops, these two groups became excessively arrogant and undisciplined, with no one daring to provoke them.

These guys weren't just formidable; the most troubling part was that provoking them led to an endless stream of dirty tricks that could utterly break the nerves of someone slightly fragile. These folks rolling around on the battlefield got worse over time, committing every imaginable vice.

Finally assigned to Mezrich for such a task, besides their super combat and survival abilities, the army commanders undoubtedly seized this chance to send these troublemakers away. And virtually everyone knew that the only person capable of commanding these demon-like Mecha groups was none other than the instigator himself, Tian Xingjian.

"We have formed an army; from now on, all brothers are one family, no longer differentiating between the First Division and Sixteenth Division. From this moment on, you are part of my bandit army. We will let this straightforward and honorable flag lead us to brilliance."

"Straightforward?" The warriors felt deeply ashamed, feeling far inferior to Fatty in terms of shamelessness. Though they were bad enough, they ultimately lacked the audacity to claim to be honorable while waving the bandit army's flag.

"Now I announce the disbandment of the Federation Air Marine Corps Sixteenth Division Special Reconnaissance Group, and its reformation into the Federation Bandit Army SM First Group, with Lieutenant Colonel Rashid as the Group Leader. The designation of the Federation Air Marine Corps First Division Fierce Tiger Special Group Second Group is abolished, reforming as the Federation Bandit Army SM Second Group, with Lieutenant Colonel Stewart as the Group Leader."

"SM First Group, damn it, this bastard is indeed SM01314!"

"That son of a bitch even stole from me. Let's find a chance to give him a surprise attack?"

"You idiot, surprise attack him? That Fatty is the master of surprise attacks. Don't be fooled by his simple and naive appearance; he's sharper than a monkey!"

No matter how the rogue thugs below discussed, Fatty waved them over, summoning Rashid and Stewart to begin explaining the breakout route.

In this little turf of Mezrich, Fatty hardly needed to rack his brains. Because in his possession, he held a trump card unimaginable to anyone else—SkyNet.

Typically, a battlefield's SkyNet system comprises several components. First, according to the troop scale and distance, SkyNet is structured usually with thousands of concealed ground information stations, ground radars, space battleship systems, combat aircraft early warning radars, Mecha radars, electronic attack units, and individual soldier information systems.

Such SkyNet system hosts are generally located in concealed areas far from the front lines, mostly at the main command, featuring several even dozens of parallel hosts. Through comprehensive information exchange and collection among various arms, it ultimately forms an information analysis system covering the entire battlefield, digitalizing every skirmish and battle on the field, providing a basis for command, and offering information support to frontline soldiers' actions.

In modern warfare, lacking SkyNet's information collection, communication command, missile guidance, and intelligence analysis is like being an easy target for the enemy, striking such a unit as if striking a prehistoric tribe.

The side with SkyNet can very calmly grasp the enemy's every move through SkyNet, then concentrate superior forces for airstrikes, ground ambushes, and encirclement. They can quickly divide the enemy, dispatch troops without any concern using gaps in the enemy's rear, and even locate the command issuing orders but never reaching frontline soldiers in the shortest time.

Thus, in modern warfare, the most crucial step is electronic attacks targeting to destroy or restrict SkyNet. "Before the army moves, electronics come first." This has become a primary characteristic of modern military operations. However, due to the nature of information warfare, even the most powerful electronic attack against the weakest electronic defense, no one dares to confidently claim that the enemy has become primal humans.

After all, an electronic mecha, a small squad, an early warning aircraft, a small space warship, or even a few portable communication devices can form a localized temporary network. Coupled with the electronic mechas' electronic shielding and ground's anti-detection interference device, while unable to counter the enemy's SkyNet, they can suffice for simple communication command and short-term concealment of tracks.


Tip: You can use left, right, A and D keyboard keys to browse between chapters.