Mission Database

Study mission types, requirements, and risks. Know what you're getting into before deployment.

Downtown Bank Hostage Situation

Hostage Rescue

high

Armed suspects have taken hostages in a downtown bank. Multiple civilians at risk. Requires careful negotiation and potential tactical entry.

hostagenegotiationtacticaldanger
Duration:

2-4 hours

Risks:

3 identified

View Details

Corporate Cyber Attack in Progress

Cyber Security

medium

A major corporation is under active cyber attack. Hackers are attempting to steal sensitive data and deploy ransomware. Time-sensitive digital forensics required.

techstealthtime-sensitive
Duration:

1-3 hours

Risks:

3 identified

View Details

Armed Suspects in Warehouse

Tactical Raid

high

Intelligence indicates armed drug traffickers are using an abandoned warehouse. Multiple suspects, possibly booby-trapped location. Requires tactical breach and clear.

tacticalcombatdangerinfiltration
Duration:

30 minutes - 2 hours

Risks:

4 identified

View Details

VIP Protection Detail

Protection

medium

A corporate executive has received credible death threats. Provide close protection during a public appearance and investigate the threat source.

protectioninvestigationperception
Duration:

4-8 hours

Risks:

3 identified

View Details

Undercover Infiltration Operation

Infiltration

very high

Infiltrate a criminal organization to gather intelligence on an upcoming major operation. High risk of exposure. Requires exceptional stealth and deception skills.

stealthinfiltrationdangertime-sensitive
Duration:

Days to Weeks

Risks:

4 identified

View Details

Armed Domestic Disturbance

Crisis Response

medium

A domestic dispute has escalated with weapons involved. One armed individual, family members in danger. Requires de-escalation and crisis intervention.

negotiationdangercrisis
Duration:

30 minutes - 3 hours

Risks:

4 identified

View Details