This document outlines the standard operating procedures for the neutralisation and containment of identified Vita Filorum entities.
1. Svete (Filorum Purgator)
- Containment: Low-risk. Standard biological specimen containers are sufficient.
- Protocol: Must be kept isolated from any tethered entities or electrical grids to prevent their use as a "living battery." They are harmless but act as critical nutrients for predatory units. Dispose of any Svete found leashed to a Seeker or Hunter immediately.
2. Tether Sensor (Filorum Nexus)
- Containment: Passive monitoring. Removal is ineffective as they are integrated into the environmental grid.
- Protocol: Do not destroy individually, as this triggers network-wide acoustic alerts. The most effective containment is shielding the area with high-density electromagnetic interference (EMI) to block their signal transmission.
3. Ivy Skulk (Filorum Vitis)
- Containment: High-density, active clearing.
- Protocol: Mechanical removal is required. Ensure all "hardened" cable sections are cut. Because this network is redundant, localised removal is temporary. Use chemical desiccants to kill the network branch before physical removal to prevent signal propagation during clearing.
4. Prolific (Filorum Genesis)
- Containment: High-Value Target. Requires exclusion sone.
- Protocol: Do not approach. If a Prolific must be neutralised, utilise long-range thermal tools. Physical contact triggers the "Warden Protocol," leading to immediate eruption of defensive units. If a Prolific is discovered, establish a 50m quarantine radius and initiate a remote electrical disconnect of the subterranean Singularity grid.
5. Dispatcher (Filorum Propagare)
- Containment: Airborne filtration/quarantine.
- Protocol: The primary threat is seed dispersal. The entity must be covered with industrial-grade plastic sheeting to seal the Dispatcher and stop the smoke-like particulates. Once sealed, the entity will effectively "suffocate" its reproductive output.
6. Warden (Filorum Custos)
- Containment: Perimeter exclusion.
- Protocol: Wardens are immobile outside their 5-meter tether range. If a Warden erupts, evacuate to a minimum of 10 meters. Do not attempt to sever the tether; it is un-severable. Wait for the entity to return to its dormant state, then establish a permanent physical barrier (concrete pouring) over the burial site to prevent future emergence.
7. Seeker (Filorum Speculator)
- Containment: Urban infrastructure audit.
- Protocol: If a Seeker is detected, immediately trip the main breaker of the building to kill the electrical grid (its nervous system). Manually scan wall cavities and breaker boxes for Micro Ivy. If found, incinerate the affected area. Do not attempt to catch a Seeker; it is a relay hub for more dangerous fauna.
8. Vulture (Filorum Caeli)
- Containment: Aerial denial.
- Protocol: Vultures are dormant until an "Apex" instruction is received. If an Apex signal is detected (
*-INT-EFF-APX-H), evacuate the area immediately. They rely on Tether Sensors for targeting; masking your thermal and acoustic signature is more effective than direct combat.
9. Hunter (Filorum Homicida)
- Containment: Total architectural isolation.
- Protocol: Lethal. If an infiltration cell (Seeker + Hunter) is identified, the location must be considered compromised. Under no circumstances should personnel enter an isolated, dark room where a Hunter is suspected. Use remote drone reconnaissance to verify presence. Containment requires the systematic demolition of the structure.
10. Singularity (Filorum Sensus)
- Containment: Systemic Electrical Isolation.
- Protocol: This is the core of the network. Containment is only possible via a complete electrical "hard reset." Severing the physical tether cluster (the "meatball") will cause a catastrophic release of tension—ensure you are shielded from the resulting kinetic blast ("gunshot" sound). Neutralising a Singularity renders all tethered defensive fauna inert.
To those who find this document
Thank you for your diligence. By studying these protocols, you are arming yourself with the only defence we have against the encroaching network. May your containment efforts be swift, your shielding hold firm, and your presence remain undetected.