Phase 1, Step 3: Deploying the Doomsday Device

Back to Phase 1, Step 1: Infiltrating the Enemy's Supply Chain Continue to Phase 1, Step 4: Launching a Series of Well-Timed, Well-Placed Explosions

Step 3: Deploying the Doomsday Device

Now that our army of highly trained, highly caffeinated operatives has successfully infiltrated the enemy's supply chain, it's time to deploy the Doomsday Device.

View Step 3.1: Hack into the enemy's command center and upload the Doomsday Device's firmware View Step 3.2: Wait for 30 minutes while the Doomsday Device calibrates and prepares for launch View Step 3.3: Press the big red button and watch as the enemy's army is reduced to a smoldering ruin

Risk Assessment

There is a 99% chance of catastrophic failure, but we're willing to take that risk because we have a 100% chance of victory!

Or, you know, at least that's what the lawyers say.

View Phase 1 Risk Assessment