Phase 1/2 Node 4: Infiltration Protocols

Our agents have infiltrated the enemy's server room and are currently gathering intel on their security systems.

Proceed to Node 5 for further analysis

Hack the mainframe for sensitive information

Disable the alarm system and prepare for extraction