We extend our congratulations for you taking a brave step toward being part of our team. By logging into this section, you have shown to us that you have proved yourself in the field, and you show an interest in being part of a team of carefully selected incident response penatration testers that work in the power of good. We work to remove wrongful corporations, buisiness, and operations from having a digital advantage, by using methods of on-site tactical stealth, security protocols, and citizen access. By wanting to be part of us, you must agree ot use your exploitation to act only in the goodness of your heart. Any mission that is given to you, you hold the single explicit complete right to refuse. If you do be part of the mission at hand, it is important for you to remember that we must work together for the end result. The end results are not always grand like in the movies, but a little bit of progress is better then no progress at all.
We pride ourselves in taking routes that not everyone would consider or have thought of, and use everyday objects in stealth that would not be noticed to the untrained eye. Through stealth and tactics, we perform our missions in plain sight, implimenting impressive tactics and carefully completing our task. In this guide, we will have a massive collection of resources and reading material to brush up on. It will allow you to see closer to how we can operate.
OUR TACTICS
We do not attack without rhyme or reason. A target must be carefully researched, and our team must work together toward a common goal. We are not responsible for your actions if you are to go rogue. We work ONLY and EXPLICITLY for the power of GOOD. Not Evil. We prep carefully, and we are smooth with our attacks. Planning Guidance and Intent Mission analysis and target research Location Recon and Asset Planning Inteligence collection and Attack Guidance Matrix Course Of Action Development Plan order/Approval. Rehearse Execute Assess/Feedback Update News DEFENSIVE MEASURES: Limit: Cause force to shift to defensive. Delay: Alter arival time of enemy OFFENSIVE MEASURES Disrupt: Forces the enemy to ineffective tactical disposition Divert: Tie up critical resources Destroy: 70% manuever 30% attack Situations arise where the attack, upon location and identification, of a target is either impossible (for example, out of range) or undesirable (outside of but moving toward an advantageous location for the attack). Critical targets that we cannot or choose not to attack in accordance with the attack guidance must be tracked to ensure they are not lost. Tracking suspected targets expedites execution of the attack guidance. Tracking suspected targets keeps them in view while they are validated. Planners and executers must keep in mind that assets used for target tracking may be unavailable for target acquisition. As targets are developed, appropriate attack systems are tasked in accordance with the attack guidance and location requirements of the system.