iphone, ipad monitoring app
ICUTV NEWS FEED
All American Exceptionalism
Scout smart home integrations
Security System Assessments
Protection for Children
National Registries - Sex Offenders
Light in Dark ness
relentlessly and continuously...
Phishing, spoofing, identity theft, (impersonation) espionage, terrorism, industrial sabotage, radicalization, financial theft, ransomware, malware, denial of service attacks, bullying, doxing, blackmail, swatting, revenge-porn, sextortion, extortion, hate-crimes, child pornography, child grooming, pedophilia, stalking, human-trafficking, copyright infringement, piracy, theft of intellectual property,
*Cyber-enabled attacks are exacting an enormous toll on American
businesses, government agencies, and families. Computer intrusions,
cyber-crime schemes, and the covert misuse of digital infrastructure have bankrupted firms, destroyed billions of dollars in investments, and helped influence - operations designed to undermine fundamental American institutions.
Who's Who In Russian Cyber Espionage 9/24/2019
Communication, commerce and government are numerous aspects of
modernity forever altered and in multiple ways made more convenient by computers, yet these same advantages have also
afforded new tools to the technologically-savvy criminal. Crimes such as terrorism, espionage, financial fraud+identity+theft have long been extant in the realm of the analogue but have rapidly merged into the cyber domain. One such clever subterfuge is steganography, the practice of concealing a pdf file, text message, images, or video within another file, message, image, etc. This particular method of obscuration is exemplified by a technique 911 terrorists coordinated to utilize autonomous international communications and thereby subvert a digitized detection. This shortcoming in machine learning is facilitating the rampant spread of child pornography.
As nation-state sponsors of terrorism and advanced persistent threats exploit this new frontier their abuse of the internet and technology add layers of complexity that cannot be entirely overcome through the efforts of any single agency or intelligence alliance.
This is a super-advanced epoch where we possess a virtually limitless access to an instantaneous abundance of knowledge and art. However this exhaustive trove of information comes with a vicious caveat; a dark side. Certain players have the capability to comport themselves behind a mask of anonymity via TOR, or sub-net browsers, proxy servers, VPN’s, hacking etc. This quasi-autonomy compels sophisticated criminals to ostensibly (seemingly) operate (falsely) as if with impunity.
Operators employ a VPN (virtual private network) on principle. Both VPNs or an anonymizer allow a user to appear as if they are connecting to the internet from another location. Regardless, any digitized (data) that is flagged, or of some valid actionable intelligence concern will subject any ISP to ample subpoena requiring records pertaining to
the identification of suspicious electronic traffic. This is why a VPN is not exempt nor inviolable, or beyond the reach of law. Privately *co-keyed end-to-end encryption is necessary for an entirely secretive communications protocol. * encryption keys
governments to whom all beliefs and non-beliefs become their
address, Internet protocol, (individualized numerical identifier).
Until the marketeers enlisting your data-sets of demographic tracks by commercializing your browsing history devise some system to reimburse you, its only fair to claim ownership over what is rightfully yours. Similarly you have the right to be registered on a do-not-call-list, and thereby you may also choose to opt -out and effectively reduce annoyances like spam and potentially dangerous email traps. In *China, and soon all of Russia, it will be impossible and illegal to exercise any completely determinative control over your internet privacy and the solemn right to exclude oneself from espionage, spying and eavesdropping.
These privacy and personal safety measures are largely forbidden and regarded with suspicion in non-democratic countries and police-states. The observations of surveillance cameras are greatly increasing as the deployment of video analytics and facial recognition algorithms become almost ubiquitous (virtually everywhere). Images and *sounds are instantly sifted, time-stamped, categorized + integrated (shared) with law enforcement and numerous intelligence agencies from public interfacing cameras + sensors, ATM's, markets, malls, bus-train-stations, traffic cameras, fuel stops, airports, phones, smart- cars, Skype, webcams, public buildings and any concurrent CCTV feed or permissable IoT (internet of things) device.
A.I. (artificial intelligence) paired with biometric technologies, records: time (triangulation) longitude + latitude location, voice prints, *ambient-audio, + potentially gathers retinal scans, body temperature→ (thermographic cameras) and may perceive duress from facial expressions, as well as recognizes and assigns (deduces) identity based on mannerisms, posture, gait, cadence, and demeanor. A.I. could also anticipate behavioral outcomes