Saturday, July 07, 2007

Oh Shit Mohammed

This is an amazingly brief thought on the workings of terrorists and how to evade them.

Okay, so, as someone who thinks similarily (but in no way as amazingly as many hackers) I know that the idea revolves around:
1. Spot protocol.
2. Reverse Engineer protocol...what is it looking for? How do they find result x? What criteria do they use to classify something "suspicious" or "terrorist". Are you an Asian with a wire dangling, for instance? (much simplified and dumbed down).
3. Once you have reverse engineered the protocol, sussed out what needs to be done to evade the Joe Bob police officer doing his job, finding the suspicious asian man, do the opposite.
4. Board train.
5. ?????????
6. Destroy infidels!!!!

So, all the terrorists need to do is suss our current procedures and training manuals, outsmart our officers with a charming English accent and noteworthy destinations and reasons for travelling, then blow shit up.

Never use by-the-book standards. While there is a book there is a way to outsmart it.
What I'm saying is, if like hackers, dvd decrypters, and crackers, they will always break your box whilst you create a box to break. Terrorists will see somethings static like a guideline or a rule ("search asian males with dangling wires") and they have all the time in the world to figure out a way around it. Its like putting a gate to a city. If its there long enough, someone will get through it.

What do we do? Some sort of organic solution. Make guidelines which the terrorists cannot reverse engineer and predict, stop helping Israel, stop invading places, who knows. We're doing something wrong for this many people to hate us, anyway.

0 Comments:

Post a Comment

<< Home