Tuesday 28 April 2009

Illuminati creating Alternate World Order (AWO)?

Illuminati Killer Robots Reveals:: 

There is much on the lips of politicians regarding the future of the world and the light at the end of the tunnel, that being the New World Order or the NWO as it is more commonly known by conspiracy theorists and commentators. 

But as humanity begins to feel itself being sucked into a centralised control vortex, there is a much more sinister game being played out behind the scenes.

This game is called "get your money out, then slip gainfully into the wilderness whilst the rest of the world falls into annihilation". 

Under such circumstances, confidence in the world markets will plummet, anarchy will slowly come to the surface and the bourgeoise will be no where to be seen.

Our advice under these circumstances will be to keep a watchful eye on the movement of these elites and make sure you are ready to follow them wherever they go. 
You are sure to be safe then. 
Safe in the Alternate World Order.

Chinese Cyber Hacker Threat : How do they think?

Illuminati Killer Robots reveal::

In order to fully understand the potential of your adversary, it of course important to understand their motivation, capability and position relative to you. In the case of those in the far east there is also a philosophical twist that must be factored in. 

This philosophical twist enables them to see further outside the box than their western counterparts, thus providing them with a significant competitive advantage. In times of world turmoil this edge will only grow larger. They are also able to deploy larger numbers of people to the task and such is their level of organisation can focus on a target much more intensely. 

Exploitative algorithms, powers of analysis and testing practices can be implemented far more effectively in the Far East. Metaphor is used to concentrate the mind on the method, movement and ferocity of the attack. So the answer to this question is not so much about understanding the individual strategies used to mount an attack, as opposed to the psychology of the attacker. Fortunately, it is not necessary to infiltrate a Chinese cybergang to understand how they think. It is a sad truth though that not 0.1% of security intelligence budget goes on understand the psychology of the opponent and on visualisation techniques for countering new security threats and 99.9% on enforcement of current policies and known threats (or small variations on a theme).

Sunday 26 April 2009

Red Team Simulation in the face of an irrational enemy

Illuminati Killer Robots reveal:: A recent call has gone out to consider the question of simulating an entire adversarial attack upon a particular target. The discussion centred on how one might leverage expert security knowledge via simulation to cover broader ground via red team simulation. I wonder whether such simulations are capable of modelling links between things which rationally are not linked? Can they for example systemize confusion to such a degree as to identify attack vectors that are so subtle to be almost completely invisible? Are these simulations multi-faceted, multi-domain and multi-integrated across the full spectrum of the "security domain"? Can they for example model pathological behaviour, delirious phenomena and other forms of spontaneous irrational knowledge and activity of the opponent? Much of the data that red teams work off to develop the perspective of the security condition is based on rational analysis. Sophisticated criminals rarely operate entirely rationally. These people didn't learn their trade from school books. Neither did they necessarily grow up without tasting the depths of despair. Failure and damaging events in their past more often than not give them greater insight than their adversaries. To develop an effective simulation one would have to work a lot harder and hire different qualities of people to design the inputs to the red team process. There are methods for approaching the development of a Défense against pathological attacks, but these are in the early stages. Methods such as these are the future of security intelligence though.

Wednesday 22 April 2009

'Hacker Art' and 'Hacker Artist' Wiki definition must change

Alien Killer Robots Reveals::
The current WIKI definition of "hacker artist" is baseless and superficial.

It relies heavily on the use of technology in producing a product. "Hacker art" is more of a philosophical based movement and should not be confused with the clever use of materials and techniques to produce technological artefacts.

I therefore move that an alternative base definition for "hacker artist", and in fact, "hacker art", be developed.

We currently only have a few leaves of the tree to build upon, leaving the root of "hacker art" relatively untouched.

Alien Killer Robots
http://intrench.blogspot.com

Hacker Art - Exploit Scenes

In the Zone, we actually visualise the battles. We see all! Image depicting a droid being attacked by black hat hackers when viewed from inside the zone. When seen from outside the zone, you only see messages and descriptions of the battle on your PC screen. (ethical hacker artists) From the 2008 book Matrix Hackers
Hacker Researchers publish a book of subversive content

Monday 20 April 2009

Hackers: Surviving Loneliness by BEING YOU!

Illuminati Killer Robots reveal: 
We are all essentially alone. 
When you take your last breath, no one is going to be there doing it with you. 
Nobody really knows you. 
Only you know you. 
Therefore you are completely alone.
Surrounding your self with warm bodies doesn't mean that you are not alone. 
It just takes your mind off the fact that you are alone. 
So get used to it. 
Get used to BEING YOU! 
That's what you are really afraid of finding