I’m not ruling out charity having access to top of the line breaching tools. She seems like she would have a whole contact list of connections in case of emergencies, legal or otherwise.