Request Custom Task
Some jobs don’t fit a template. When you need something designed from scratch — tailored to your objective, your timeline, and your operational limits — you come here. Our Request Custom Task page exists to turn a concept into action. We don't ask why. We ask how soon.
You may be planning something that’s never been done before. Or something that’s been done — but not correctly. Whether it's targeted sabotage, a complex disappearance, psychological takedown, or a multi-layered campaign, we offer a framework that adapts to your vision, not the other way around.
What You Can Request
This service isn’t limited by category. You can build around:
- Covert elimination of hard targets
- Strategic sabotage of physical, digital, or social structures
- Psychological campaigns meant to destabilize and disorient
- Forced compliance through coercion or leverage
Other options include multi-target removals, misdirection setups, staged public events, or combination ops with extended duration. There is no fixed price or fixed playbook — only calculated structure designed for exact impact.
Our Process
When you submit a custom request, we don't move fast. We move right. Your submission is reviewed in stages. First for feasibility. Then for resources. Then for operational risk. If we accept it, you’ll receive a mission brief proposal. If we decline, we don’t explain. The door simply closes.
Every accepted request is treated as a full-scope contract. We assign operators, logistics, intel, and fallback structures depending on risk class. This isn’t improvisation. It’s designed sabotage with the right tools in the right hands.
Zero Traces. Always.
No matter the complexity, all jobs operate under our clean-exit doctrine. That means:
- No client trail — digital, verbal, or physical
- No operator exposure or media footprint
- Tools sterilized. Routes dead-dropped. Identities erased.
The mission completes, then vanishes. Whether it's a whisper operation or a public collapse, the signature is always the same: none.
Escrow Is Required
No work begins without secured funds. You’ll be asked to confirm readiness via third-party escrow. We do not accept partial payment. We do not engage in negotiation post-brief. If the plan is approved and funding is verified, the wheels turn. Not before.
All jobs operate through Monero unless stated otherwise. Bitcoin and Ethereum are options only if you understand the risk. No banking. No transfers. No “half now, half later.” Total escrow lock or no job.
Contact Rules
You will initiate contact only through proton.me or PGP-encrypted email. Anything else is ignored. If you don’t know how to communicate, learn before reaching out. Our operators won’t educate you — they’ll walk. For operational security tips, consult Staying Secure before submitting any details.
Some Examples
Clients have previously requested:
- Discrediting a political figure with staged exposure and fake leaks
- Long-term psychological degradation of a business competitor
- Simultaneous relocation of a child and permanent silencing of the abuser
- Blackmail layering followed by strategic covert assassination
If your scenario goes beyond these — that’s the point. We handle what others won’t touch.
Be Clear. Be Ready.
We don’t waste time. And we don’t play therapist. If you come to us, come with the facts: what you want, when you want it done, and how far you’re willing to go. Then disappear and let us respond. If it’s actionable, we’ll come back with structure and cost. If not — you won’t hear from us again.
There are no second chances. Do it right the first time.
Related Pages
Mission Ready Asset • Dark Web Mercenary • Special Task • Lethal Operation • Tactical Strike • Mission Ready Operative • Hire A Mercenary • Black Ops Contractor