1507235454781_edited.png
Brave.jpg
security-tech-web-logo.png
State of Hawaii Civil Defense logo
download.jpg
hlogo.png

 Updated Daily

Most  Images  Linked

download_edited.jpg
300px-Seal_of_the_State_of_Hawaii.svg_ed
images-3_edited.jpg
71W2jdJ3JKL._SL400__edited.jpg
logo_192.jpg
Screen%20Shot%202020-01-07%20at%2012.36_
 
about-conteratotal_edited_edited_edited.
images-1_edited.png
images_edited.png
new_logo2_edited.png
Screen Shot 2019-01-06 at 8.58.35 PM_edi
images.jpg
download.png
Screen Shot 2019-01-07 at 5.48.58 PM.jpg

 iphone, ipad  monitoring app

Screen Shot 2019-01-04 at 2_Fotor.jpg
images.jpg
Screen Shot 2019-01-04 at 2.38.19 PM.jpg
radius-vision_logo_edited.png
download-1_edited.png
index_edited.jpg
Screen Shot 2018-08-17 at 10.02.46 PM.jp
4f524f_98e13ac0b0fd46959e391ef4de9041a7_
index_edited_edited_edited_edited_edited
newspaper girl_edited_edited_edited.jpg
Screen Shot 2018-12-19 at 6.41.47 PM_edi

ICUTV

NEWS FEED

e316f544f9094143b9eac01f1f19e697.png

 ICUTV NEWS FEED

download.png
images.jpg
Safeguard Hoe Security, logo  tm
download.png
G4S  AMAG.jpg
Screen Shot 2018-03-11 at 2.35.45 PM_edi
Arlo-Pro-Onsite-300x600px-eVaYE._V504018
Screen Shot 2018-10-29 at 12.26.38 PM.jp
index_edited.jpg
images_edited_edited_edited.png
download-1.png
salient.jpg
images_edited.png
images.jpg
images.jpg
images.jpg
download.jpg
Screen Shot 2019-07-07 at 12.35.19 PM.jp
images.jpg
images.jpg
images.jpg
allconnect-color.png

All American Exceptionalism

   Scout smart home integrations

Screen Shot 2019-11-19 at 3.58.57 PM.jpg
Screen Shot 2019-11-19 at 4.18_edited.jp
BVWZE7398_edited_edited.jpg
download_edited_edited.jpg
Vector_edited.jpg
Screen Shot 2019-08-07 at 8_edited_edite
images-1_edited_edited.jpg
Screen Shot 2019-05-01 at 2.44.56 PM.jpg
popmech_edited.png

 Security System Assessments

Screen%20Shot%202020-01-07%20at%2012.36_
Minut_edited_edited_edited_edited.jpg
download_edited.jpg
download_edited_edited.jpg
download_edited.jpg
images_edited.jpg

3/9/20

 
artistic abstractionof Hawaii nei
images2.jpeg
downloadw.png
interpol_edited.jpg
NCA_edited.png
ic_wheel_intelligence-community_edited.j
images-1_edited.png

     Light   in         Dark ness

US fleet.jpg
FI Cyber shield.png
Screen Shot 2019-02-13 at 3.06.07 PM.jpg
download_edited_edited.png
480th%2520ISR%2520Wing_edited_edited_edi
Seal_of_the_United_States_Marine_Corps_F
Screen Shot 2019-06-16 at 2.58.25 PM.jpg
Screen%2520Shot%25202020-03-17%2520at%25
Brave.jpg
logo_constant-guard_edited.png
Screen Shot 2019-05-03 at 8.48.15 AM.jpg
download.jpg
index_edited.png
index_edited.png
banner_ext2_edited_edited.jpg
sophos tm     Naked Scurit tm
APWG logo
scrabble_edited.jpg

Russia, China + others attack  America + her Allies 

 relentlessly  and   continuously...

Phishing, spoofing, identity theft, (impersonation) espionage,  terrorism, industrial sabotage, radicalization, financial theft, ransomware,  malware,  denial of service attacks, bullying, doxing, blackmail, swatting, revenge-porn, sextortion, extortion, hate-crimes, child pornography, child grooming, pedophilia, stalking, human-trafficking,   copyright   infringement,   piracy,  theft  of   intellectual   property, 

social engineering,  information-warfare  (propaganda)  cyber-warfare illicit  (poisons) drugs  via  darknet,  all  potential weapons  of   hybrid-warfare.   

       jeeezze, I  know  right.... 

*Cyber-enabled  attacks  are  exacting  an   enormous toll  on  American

businesses, government  agencies, and  families.   Computer   intrusions,

cyber-crime  schemes, and the covert misuse of  digital   infrastructure have bankrupted firms, destroyed billions of dollars in investments, and helped   influence - operations   designed   to   undermine  fundamental American institutions.

          *United States Dept. of Justice Cyberreport   pdf   file    4/2/2018

         FBI  Indictment of Russian Internet Research Agency, pdf  2/16/2018

                  Who's Who  In Russian Cyber Espionage  9/24/2019

                       Special Counsel Mueller's Report   © NPR 4/18/2019  

  

              Impeachment Inquiry Report-House Intelligence 12/3/2019

 

Communication, commerce  and  government  are  numerous  aspects  of

modernity  forever  altered  and  in  multiple  ways  made  more  convenient by  the  internet,  yet   these   same   advantages    have   also

afforded  new   tools  to  the  technologically-savvy  criminal.   Crimes  such as terrorism, espionage, financial fraud+identity+theft have long been extant in the realm of the  analogue  but have rapidly merged into  the cyber  domain. One such clever subterfuge is steganography, the practice of concealing a pdf file, text   message,  image,  or  video  within   another   file,  message, image, etc. This particular method of  obscuration  is exemplified by a technique   911 terrorists  coordinated  to  utilize    autonomous    international  communications and thereby subvert a  digitized  detection.   This shortcoming in machine learning  is  facilitating  the rampant  spread  of  child  pornography.

 

                 

              Trafficking in Persons Report,  US State Department    2019

As nation-state sponsors of terrorism and advanced persistent threats  exploit  this  new frontier  their abuse of  the  internet and  technology  add layers of complexity that cannot be entirely overcome through the efforts of any single agency or intelligence alliance. 

highlighted world map of the 5 eyes agreement

This is a super-advanced epoch where we possess a virtually limitless access to an instantaneous abundance of knowledge and art.  However  this exhaustive  trove  of   information  comes with a vicious caveat;  a  dark side.  Certain players  have the  capability  to  comport themselves behind a mask of anonymity via TOR, or sub-net browsers, proxy servers, VPN’s,  hacking  etc. This  quasi-autonomy  compels   sophisticated  criminals  to    ostensibly   (seemingly)  operate  (falsely)  as  if  with  impunity.

 

Operators  employ  a  VPN  (virtual  private  network)  on  principle. Both  VPNs  or  an  anonymizer  allow  a  user to appear as  if   they  are  connecting  to the  internet  from  another  location.  Regardless, any digitized  (data)  that is  flagged, or  of  a  valid  actionable  intelligence   concern  will  subject  any  ISP   to  ample   subpoena    requiring   records of  evidence   pertaining  to

the  identification of suspicious  electronic  traffic. This is  why  a  VPN  is  not  exempt   nor   inviolable,  or  beyond  the  reach  of  law.  Privately *co-keyed end-to-end encryption is  necessary for  an entirely  secretive  communications  protocol     * encryption  keys  

Thought-crimes   (an  asinine fascistic  proposition)    are   the   primary  

evidentiary   transgressions   sought   after    by   autocratic    totalitarian 

governments  to   whom   all   beliefs   and   non-beliefs    become   their

ultimate   objective.   Anonymity    and    privacy    cannot    be    illegal!

In most  despotic + authoritarian  nations, this  web  site and my own  misperceived lèse-majesté could be construed as thought crime, irrespective of any meritocracy.

Data - mining  is  a  foregone  conclusion   and  personal   info  is  tracked,   sold    and    monetized.   One   semi -  solution   to    this

'targeted-marketing'  dilemma is  to opt-out  from  providing your I.P.

address,  Internet protocol,  (individualized numerical identifier). 

Until  the  marketeers  enlisting  your   data-sets   of   demographic tracks  by  commer