...                         ..                         ...     ..      ..                                                           s                
   xH88"`~ .x8X                 dF                         x*8888x.:*8888: -"888:                                                        :8                
 :8888   .f"8888Hf        u.   '88bu.                     X   48888X `8888H  8888                                         u.    u.      .88                
:8888>  X8L  ^""`   ...ue888b  '*88888bu        .u       X8x.  8888X  8888X  !888>        u          uL          .u     x@88k u@88c.   :888ooo       u     
X8888  X888h        888R Y888r   ^"*8888N    ud8888.     X8888 X8888  88888   "*8%-    us888u.   .ue888Nc..   ud8888.  ^"8888""8888" -*8888888    us888u.  
88888  !88888.      888R I888>  beWE "888L :888'8888.    '*888!X8888> X8888  xH8>   .@88 "8888" d88E`"888E` :888'8888.   8888  888R    8888    .@88 "8888" 
88888   %88888      888R I888>  888E  888E d888 '88%"      `?8 `8888  X888X X888>   9888  9888  888E  888E  d888 '88%"   8888  888R    8888    9888  9888  
88888 '> `8888>     888R I888>  888E  888E 8888.+"         -^  '888"  X888  8888>   9888  9888  888E  888E  8888.+"      8888  888R    8888    9888  9888  
`8888L %  ?888   ! u8888cJ888   888E  888F 8888L            dx '88~x. !88~  8888>   9888  9888  888E  888E  8888L        8888  888R   .8888Lu= 9888  9888  
 `8888  `-*""   /   "*888*P"   .888N..888  '8888c. .+     .8888Xf.888x:!    X888X.: 9888  9888  888& .888E  '8888c. .+  "*88*" 8888"  ^%888*   9888  9888  
   "888.      :"      'Y"       `"888*""    "88888%      :""888":~"888"     `888*"  "888*""888" *888" 888&   "88888%      ""   'Y"      'Y"    "888*""888" 
     `""***~"`                     ""         "YP'           "~'    "~        ""     ^Y"   ^Y'   `"   "888E    "YP'                             ^Y"   ^Y'  
                                                                                                .dWi   `88E                                                
                                                                                                4888~  J8%                                                 
                                                                                                 ^"===*"`                                                  


Personnel deployment for targeted information security missions.

In Your System :: In Your Network


  • Phase 1 complete
  • Phase 2 complete
  • Phase 3 complete
  • Phase 4 complete
  • Phase 5 complete
  • Phase 6 active
  • Phase 7 pending

Tertium non datur© Copyright 2021-2022, Cellnic Israel