Sunday 13 January 2008

Hacker Cells and Creative Visualisation

Brand Killer Robots reveal::
When we enter the ZONE, we see everything in Cyberspace.
We visualise the unfolding battle from inside the ZONE.
Inside the ZONE we run simulations of battles yet to come in our minds and play them out to determine the likely outcome. Outside the ZONE we use a battle simulator program to enter the details of our opponents, the terrain, potential battle strategies and then we run our program to create a report on the likely outcome of each type of battle scenario. We use the results to help us draw up our attack and defence plans. After the battle we compare what actually happened with what the program told us might happen and then we update the program to make it calculate more accurately next time around.
We never rely on the program entirely; we just use it to lend extra weight to our plans. Our battle simulator program is simply a computer database which stores millions of records of intelligence patterns representing different forms of hacker behaviour that we have come across in battle in the past. We are always adding new patterns, as we come across or visualise new ones.

In addition to battle and attack strategies, we have developed a program for simulating the mind of a black hat. We use this when we ask the question “what would this black hat do in this type of situation?”. This program enables us to see right inside the predators head and to know the potential moves they could make. Again when we know the outcome of its behaviour in a given situation we update our program in order to make the predator profile data more accurate. In the same way as we use our minds to visualise new battle scenes, so to do we use our minds to think they a predator. We ask ourselves. Given we know about this predator, its history and its behaviour – how would it perform when in this situation or that?

This creative visualisation process of thinking like a predator and the behaviour patterns that result from it are used to update our Predator Profiling Database. In addition to simulating the strategies and tactics of our opponents on the Internet, we visualise our own actions. As a unit we are bonded by many years of working together for the same cause. We believe in each other because we have each seen what each is willing to give up for the cause. But we are all mindful that any one of us could someday become compromised by the black hats and be forced to cross over to the other side. We have sought to reduce the impact of this happening by never revealing our true identities to each other.

Such is the importance of keeping the team together that we have developed a program that contains profiles or each member of the group, along with records of the types of behaviour exhibited in any given situation. We use this program to match the behaviour of our team members with the historical record in cases where one of us is behaving out of character. This gives us the warning signs to take action when we need to. I’m glad to say that we have never needed to use this system.

Creative Visualisation has been an extremely valuable technique for us in all sorts of ways. From visualising battles in the future to understanding the mindset of the black hats to even assessing risks within our own team.

But we have used it in many other areas, from visualising the kinds of tools we could build to working out how best to share our knowledge with others. Even to entertaining the group from time to time and as a way of motivating everyone to keep on with the fight, by using symbols and metaphors to encourage everyone into action.

From the 2007 book --- The Matrix Hackers

No comments: