Individuals and organisations documented for hostile actions against IDAP and NBAT humanitarian operations. Published in the interest of personnel safety and operational awareness.
Organisations whose conduct constitutes an ongoing, systemic threat to IDAP operations on Altis.
Individuals documented for hostile actions against IDAP/NBAT personnel, convoys, or operations. Entries are added following verified incidents reported by NBAT field operatives.
Additional individual entries will be published as incidents are verified by NBAT intelligence. The registry is maintained by IDAP's Operational Awareness Database and updated in real-time.
An individual or group attacks, robs, or interferes with an IDAP/NBAT convoy, operation, or personnel member. The incident is reported to NBAT leadership by the affected operator.
NBAT leadership reviews the report. Date, time, location, names, and circumstances are documented. If the incident meets the threshold for registry inclusion (repeated offences, deliberate targeting, or high-value operation interference), an entry is prepared.
The individual's name, affiliation, documented offences, and threat level are published here. Once published, entries remain until NBAT leadership decides otherwise. There is no appeals process. This is not a court — it's a warning.
Minor interference. Single incident. Solo actor. Likely opportunistic rather than targeted. NBAT will remember your name.
Repeated interference or deliberate targeting. May be part of an organised group. NBAT will actively monitor your movements.
Serious, repeated attacks on NBAT operations. Organised group involvement. Active threat to personnel and cargo. NBAT will prioritise your interception.
Reserved for agencies whose institutional conduct constitutes a systemic threat. Currently: HATO. There is no higher classification because nothing is worse than HATO.
If you're reading this and wondering whether your actions might land you on this page — they might. NBAT operates a 40-person outfit with dedicated intelligence, reconnaissance, and documentation capabilities. We know who hits our convoys. We know who targets our runs. We know who interferes with our operations. The only question is whether we decide to publish it. Consider this page a standing invitation to reconsider your choices.