AGENCY

MAMUSHI STRATEGY

Evaluate our boutique agency,
in terms of our structure,
capabilities, and backgrounds.

MAMUSHI

Asymmetric Strategist

Clement “Mamushi” Tan,
Founder | Chief Executive Officer

  • Adopting the symbolisms of both the mamushi (Japanese Pit Viper) and the ninja, Clement “Mamushi” Tan is known among his clients for his artistic, asymmetric and precise approach to HUMINT, influence and strategy.

    As the artist behind our influence doctrine, he has led us to consistently, efficiently and accurately influence decision-making against hyper-resistant targets in hyper-competitive environments, as part of our HUMINT Applications.

  • Mamushi was a former Private Investigations Contractor (HUMINT Operations) as well as a Tactical Combat Instructor (Sword, Knife, Unarmed).

    He holds a Bachelor’s Degree in Political Science (Honours with Distinction) from the National University of Singapore (NUS), with a research specialisation in military strategy, psychological warfare and intelligence operations.


NINJAS

Elite Operatives

Special
Human Intelligence
Applications
Vector

  • Our elite operatives from the Special HUMINT Applications Vector (SHAV), or "Ninjas", are not only masters of the full spectrum of HUMINT operations — from psychographic profiling to stakeholder influence — but are also well-connected individuals who command their own spheres of influence.

    Each Ninja has been tested and proven against hyper-resistant human targets in real-world environments, either through their previous professions or during our HUMINT Applications.

  • Our Ninjas hail from diverse backgrounds, including politics, business, intelligence, special operations, cybersecurity, psychology, consulting and technology.


GHOSTS

Elite Hackers

General
Reconnaissance
Activity
Group

  • Our elite hackers from the General Reconnaissance Activity Group (GRAG), or "Ghosts", are masters of the full spectrum of Red Team operations (offensive cybersecurity assessments) — from open-source intelligence to exploit (malware) development.

    Each Ghost holds a set of esteemed Red Team certifications, and has been tested and proven in real-world Red Team operations.

  • Our Ghosts hail from the intelligence, military and cybersecurity sectors.


  • Our sophisticated Human Intelligence (HUMINT) Applications are conducted by elite operatives who are not only masters of the full spectrum of HUMINT operations — from psychographic profiling to stakeholder influence — but are also well-connected individuals who command their own spheres of influence. They hail from diverse backgrounds including politics, business, intelligence, special operations, cybersecurity, psychology, consulting and technology.

  • Our elite operatives, through our proprietary influence doctrine, have been able to consistently, efficiently and accurately influence decision-making against hyper-resistant targets in hyper-competitive environments, as part of our ethical and legal Human Intelligence (HUMINT) Applications.

  • We deliver unique and strategic value to our High-Value Clientele, through the ethical and legal applications of elite Human Intelligence (HUMINT) expertise and methodologies, namely our HUMINT Influence and HUMINT Red Team.

  • We offer our clients the option to defer full compensation until the deliverables are completed, thus eliminating immediate financial risk and providing a reliable guarantee of performance and quality, unlike traditional hourly-based or fixed-contract payment models.


This is our proprietary influence doctrine for our HUMINT Applications, which has been robustly tested, refined and proven against hyper-resistant human targets in hyper-competitive environments. It is developed by our Founder, based on well-researched concepts from strategy, psychology and intelligence operations.

  • This roughly, but not fully, translates to "Asymmetric Warfare", and is based on Sun Tzu’s concept of “奇”. It is the core layer of our system and entails the strategic thought that directs the psychological and operational aspects of our HUMINT Applications.

  • This means "Psychological Penetration", and is the second layer of our system. It entails the strategies, tactics and logic to covertly and precisely "penetrate" psychological resistance, in order to influence decision-making and perceptions.

  • This means "Ninja Operations", and is the third layer of our system. It entails the protocols for researching and contacting the target as well as the protocols to operationalise the psychological strategies from 心侵 SHIN SHIN in real-world environments.


APPOINTMENT

FREE LIVE CONSULTATION

Advance the discussion for our services,
or for potential business opportunities.