[ 04 / SELECTED OPERATIONS ]

Case files.

Five sanitised, client-approved case files from a deeper backlog of sovereign engagements. Client identities, technical detail and timeframes are redacted to preserve operational integrity.

OP-2024-019F · GUARDIAN
Closed

Mobile exploitation capability for a sovereign CT unit.

Client: Sovereign counter-terrorism unit · Q1 2024

End-to-end iOS capability delivery: research, chain assembly, operator training and continuous sustainment. Targeted against a named, court-warranted set of subjects only.

Mission
iOS capability
Deliverable
Fielded chain
Status
Sustained
OP-2025-008B · HERALD
Closed

OSINT capability sourcing for a law enforcement agency.

Client: Federal law enforcement agency · Closed

Requirement workshop, vendor down-select and procurement of an OSINT platform covering surface, deep and dark sources. Operator workflow defined, training delivered, and warrant-aligned governance handed over to the client's analytic cell.

Mission
OSINT sourcing
Deliverable
Platform · workflow · training
Status
Delivered
OP-2025-014J · MIRAGE
Closed

Red team against a ministry's classified estate.

Client: Sovereign ministry · Q3 2025

Named-threat-actor emulation across the classified estate of a sovereign ministry. Six high-impact paths demonstrated through identity, perimeter and supply-chain vectors; all remediated within the engagement window.

Mission
Adversary emulation
Deliverable
6 critical paths
Status
Remediated
OP-2026-001S · SABLE
Closed

Sourcing & integration of a 0-click capability for a sovereign client.

Client: Sovereign intelligence service · Closed

Vendor down-select from a curated shortlist, technical due diligence, escrow and integration of an externally-sourced capability. End-use and target-list governance is operated by Syscall Zero on the client's behalf.

Mission
Capability sourcing
Deliverable
Integrated capability
Status
Delivered
OP-2026-013E · ORACLE
Closed

Automated pen-testing suite with agentic AI for a sovereign client.

Client: Sovereign cyber command · Closed

Development of an in-house, fully automated penetration-testing suite built on an agentic AI architecture. Continuous reconnaissance, exploit selection, post-exploitation and reporting — operator-in-the-loop with full kill-switch and audit trail. Handed over with source, models and runbooks.

Mission
Agentic AI pentest suite
Deliverable
Source · models · runbooks
Status
Delivered

Discuss a comparable engagement.