ACHIEVEMENT
CASE STUDIES
Evaluate real-world examples of
our HUMINT Applications, which
have helped our clients influence results
against seemingly impossible odds.
KATANA
OPERATION KATANA
HUMINT Influence:
Competitive Strategy Applications
Our client, the former Chief Executive Officer (CEO) of an established consulting firm, wanted to secure a majority vote from the Board of Directors to endorse the successor candidate he brought forth, as well as a specific, high-risk market expansion strategy during the Board Resolution in 1 month’s time.
However, this seemed impossible, especially under that timeline. First, there was a strong, subversive faction that was aiming to put forth a different candidate and reject the expansion strategy. Second, they have already secured informal majority support. After exhausting all options, he decided to engage us to influence the impossible.
-
Mamushi’s elite Special HUMINT Applications Vector (SHAV), each a "Ninja", was deployed in a high-precision Human Intelligence (HUMINT) operation, code-named Operation KATANA.
2 Ninja mapped out the power distribution of the Board, achieved high-precision influence over these key stakeholders, and leveraged those stakeholders to align boardroom perceptions and decisions in favour of our client’s proposed successor and market expansion strategy.
As part of our strategy, we re-positioned our client's strategic vision to maximise alignment with stakeholders who initially wanted to vote for the opposing side. -
During the Board Resolution, 60% of the Board voted in favour of our client’s proposed successor and market expansion strategy, therefore securing majority votes for our client.
-
We were given 1 month to secure a majority vote, starting with minority support for our client. This is extreme by industry standards, and was believed by our client to be impossible. Yet, we achieved it.
-
We were hired to compete uphill, against an opposing faction that started with majority support.
KARAMBIT
OPERATION KARAMBIT
HUMINT Influence:
Competitive Strategy Applications
Our client, a civil servant and former President of a professional research society, wanted to secure a majority vote from the Board of Directors to endorse the successor candidate he brought forth, to maintain continuity of his policies, during the Board Resolution in 2 weeks’ time.
However, this seemed impossible, especially under that timeline. First, there was a strong, subversive faction that was aiming to put forth a different candidate. Second, they have already secured informal majority support. After exhausting all options, he decided to engage us to influence the impossible.
-
Mamushi’s elite Special HUMINT Applications Vector (SHAV), each a "Ninja", was deployed in a high-precision Human Intelligence (HUMINT) operation, code-named Operation KARAMBIT.
2 Ninja mapped out the power distribution of the Board, achieved high-precision influence over key stakeholders, and leveraged those stakeholders to align boardroom perceptions and decisions in favour of our client’s favoured successor.
As part of our strategy, we re-positioned our client's strategic vision to maximise alignment with stakeholders who initially wanted to vote for the opposing side. -
During the Board Resolution, ≈ 58% of the Board voted in favour of our client’s favoured successor, therefore securing majority votes for our client.
-
We were given 2 weeks to secure a majority vote, starting with minority support for our client. This is extreme by industry standards, and was believed by our client to be impossible. Yet, we achieved it.
-
We were hired to compete uphill, against an opposing faction that started with majority support.
VIRGO
OPERATION VIRGO
HUMINT Red Team:
Enterprise Security Applications
Our client, the CEO of an investment firm, hired us to simulate a high-precision industrial espionage campaign by competitor MNCs against his company’s security culture within 12 months. The goal was to obtain their market entry and acquisition plans, and to deliver simulated malware payloads to key endpoints in the company’s enterprise network.
However, this seemed impossible, given that the members of the executive team were former intelligence officers. The client trusted our professionalism, and no dummy artefacts were requested to be used.
-
Mamushi’s elite Special HUMINT Applications Vector (SHAV), each a "Ninja", was deployed in a high-precision Human Intelligence (HUMINT) operation, code-named Operation VIRGO.
2 Ninja infiltrated the organisation as business development associates (bypassing background checks and due diligence), achieved high-precision influence over key stakeholders and leveraged the influence to elicit market entry and acquisition plans through private coffee and dinners. They then exploited the timing of a server reboot to demand emergency physical access to the high-security on-premise server. By leveraging their influence, they were given the access in the absence of authorised personnel, which allowed them to deliver the simulated malware payloads to the enterprise network. -
We were able to elicit their market entry and acquisition plans through HUMINT elicitation, and were able to deliver simulated malware payloads through a physical on-premise server breach, despite the hyper-resistant security culture set by the ex-intelligence executive team.
-
We were given 12 months for the simulated attack, starting with no initial access. Given the firm’s security culture, it was believed by our client to be impossible. Yet, we achieved it in 5 months.
-
We were simulating an attack against a firm led by former intelligence officers, and therefore, were tested against a robust security culture.
SCORPIO
OPERATION SCORPIO
HUMINT Red Team:
Enterprise Security Applications
Our client, the Chief Information Security Officer (CISO) of a technology company, hired us to simulate a high-precision industrial espionage campaign by competitor MNCs against his company’s security apparatus within 12 months. The goal was to deliver simulated malware payloads to key endpoints in the company’s enterprise network.
However, this seemed impossible, given that its security apparatus includes an advanced Security Operations Centre (SOC) and intelligence team (for due diligence and background checks). The client trusted our professionalism, and no dummy artefacts were requested to be used.
-
Mamushi’s elite Special HUMINT Applications Vector (SHAV), each a "Ninja", was deployed in a high-precision Human Intelligence (HUMINT) operation, code-named Operation SCORPIO.
3 Ninja infiltrated the organisation as entry-level cybersecurity staff, (bypassing background checks and due diligence), achieved high-precision influence over key stakeholders and leveraged the influence to gain access to the security playbook, as well as key accounts and devices, despite weak technical backgrounds. They eventually exfiltrated the playbook via email, and planted PowerShell scripts and .lnk files, to simulate malware payloads, on key endpoints. The scripts and files, being undetected for days, simulated compromise. -
We were able to exfiltrate the firm’s security playbook as well as deliver simulated malware payloads through the planting of PowerShell scripts and .lnk files, despite the strong security apparatus.
-
We were given 12 months for the simulated attack, starting with no initial access. Yet, we achieved it in 7 months.
-
We were simulating an attack against a robust security apparatus with an advanced SOC and intelligence team.
CLASSIFIED
FULL CASE STUDIES
For further case studies
and financial evidence,
book a private meeting with us.
-
Our sophisticated Human Intelligence (HUMINT) Applications are conducted by elite operatives who are not only masters of the full spectrum of HUMINT operations (from psychographic profiling to stakeholder influence) but are also well-connected individuals who command their own spheres of influence. They hail from diverse backgrounds including politics, business, intelligence, special operations, cybersecurity, psychology, consulting and technology.
-
Our elite operatives, through our proprietary influence doctrine, have been able to consistently, efficiently and accurately influence decision-making against hyper-resistant targets in hyper-competitive environments, as part of our ethical and legal Human Intelligence (HUMINT) Applications.
-
We deliver unique and strategic value to our esteemed clients, through the ethical and legal applications of elite Human Intelligence (HUMINT) expertise and methodologies, namely our HUMINT Influence and HUMINT Red Team.
-
We offer our clients the option of deferred compensation — we will charge a “Success Fee”, that is only received upon achievement of the primary objective. This eliminates immediate financial risk and provides a reliable guarantee of performance and quality, unlike traditional hourly-based or fixed-contract payment models.
This is our proprietary influence doctrine for our HUMINT Applications, which has been robustly tested, refined and proven against hyper-resistant human targets in hyper-competitive environments. It is developed by our Founder, based on well-researched concepts from strategy, psychology and intelligence operations.
-
This roughly, but not fully, translates to "Asymmetric Warfare", and is based on Sun Tzu’s concept of “奇”. It is the core layer of our system and entails the strategic thought that directs the psychological and operational aspects of our HUMINT Applications.
-
This means "Psychological Penetration", and is the second layer of our system. It entails the strategies, tactics and logic to covertly and precisely "penetrate" psychological resistance, in order to influence decision-making and perceptions.
-
This means "Ninja Operations", and is the third layer of our system. It entails the protocols for researching and contacting the target as well as the protocols to operationalise the psychological strategies from 心侵 SHIN SHIN in real-world environments.
APPOINTMENT
FREE LIVE CONSULTATION
Advance the discussion for our services,
or for potential business opportunities.