Mission Database
Study mission types, requirements, and risks. Know what you're getting into before deployment.
Downtown Bank Hostage Situation
Hostage Rescue
Armed suspects have taken hostages in a downtown bank. Multiple civilians at risk. Requires careful negotiation and potential tactical entry.
2-4 hours
3 identified
Corporate Cyber Attack in Progress
Cyber Security
A major corporation is under active cyber attack. Hackers are attempting to steal sensitive data and deploy ransomware. Time-sensitive digital forensics required.
1-3 hours
3 identified
Armed Suspects in Warehouse
Tactical Raid
Intelligence indicates armed drug traffickers are using an abandoned warehouse. Multiple suspects, possibly booby-trapped location. Requires tactical breach and clear.
30 minutes - 2 hours
4 identified
VIP Protection Detail
Protection
A corporate executive has received credible death threats. Provide close protection during a public appearance and investigate the threat source.
4-8 hours
3 identified
Undercover Infiltration Operation
Infiltration
Infiltrate a criminal organization to gather intelligence on an upcoming major operation. High risk of exposure. Requires exceptional stealth and deception skills.
Days to Weeks
4 identified
Armed Domestic Disturbance
Crisis Response
A domestic dispute has escalated with weapons involved. One armed individual, family members in danger. Requires de-escalation and crisis intervention.
30 minutes - 3 hours
4 identified