Stealth
prev.
play.
mark.
next.

:21:02
- Operator to squadron.
- Go for Talons.

:21:04
There's been a change of plans.
:21:07
We're giving you an emergency
mission redirect. Repeat.

:21:10
That's an emergency redirect.
Do you read me?

:21:12
Roger. Where's the fire, skipper?
:21:14
PAYCOM has given us
a brand-new tasking order.

:21:17
Please access your encrypted file...
:21:19
...named "Advanced
War Vector Scenarios. "

:21:23
File's open. Go ahead.
:21:25
All right. Firewall code
is "Terror Summit. "

:21:29
We are upgrading this file from
a scenario to a tactical action plan.

:21:33
Repeat, we are upgrading the file.
:21:36
CIA human intel has just learned
that the heads of three terrorist cells...

:21:41
... are about to meet in 24 minutes.
:21:44
The country is Myanmar.
The city is Rangoon.

:21:47
They're planning an imminent attack
on U.S. Soil.

:21:50
One to Control,
what about the UCAV?

:21:55
EDI will observe your attack.
:21:57
Proceed to primary.
:22:00
Roger.
:22:02
One to UCA V,
confirm observation status only.

:22:07
Tin Man confirms, Talon 1.
:22:11
New coordinates
have been uploaded.

:22:16
Baptism by fire, Tin Man.
:22:28
Mach 1.
:22:30
Mach 2.
:22:33
Mach 3.
:22:36
Mach 4.
:22:41
Primo's now analyzing the location.
Here we go.

:22:46
The primary is this building.
:22:48
A new defense ministry
still under construction.

:22:51
Specs indicate
14-foot-thick cement roof...

:22:56
...with steel reinforcements.
:22:58
Roger. We're not weaponized
for something that thick.


prev.
next.