Termination of threats can take several forms- from temporary disruption to permanent disablement, or even physical destruction.

Depending upon the identified and assessed threat, our systems can either transmit white noise or hash, transmit a laser identifier, or in extreme and approved situations, deploy incendiary devices for physical damage.

With a variety of system configurations available, termination methodologies can be deployed after identification has been made, or in some circumstances, simultaneously upon approval.

Each methodology is unique to mission parameters and environments, however every system has one goal in mind; preserve friendly force lives through efficient, effective unmanned offensive logistics.