If you can get schematics or source code, you can put it to use as well.
And then you can also use communications logs and HR to find other human targets.
If you can get schematics or source code, you can put it to use as well.
And then you can also use communications logs and HR to find other human targets.