about-conteratotal_edited_edited_edited.
images-1_edited.png
images_edited.png

Haleakala

Screen Shot 2019-01-06 at 8.58.35 PM_edi
images.jpg
download.png
Screen%20Shot%202019-01-07%20at%205.48_e

 iphone, ipad  monitoring app

Screen Shot 2019-01-04 at 2_Fotor.jpg
images.jpg
Screen Shot 2019-01-04 at 2.38.19 PM.jpg
radius-vision_logo_edited.png
download-1_edited.png
sweet%20Jesus%20No_edited.jpg
index_edited.jpg
Screen Shot 2018-08-17 at 10.02.46 PM.jp
4f524f_98e13ac0b0fd46959e391ef4de9041a7_
_edited_edited.jpg
newspaper girl_edited_edited_edited.jpg
Screen Shot 2018-12-19 at 6.41.47 PM_edi

icuTV

NEWS FEED

icuTV NEWS FEED

download_edited_edited.jpg
images.jpg
Safeguard Hoe Security, logo  tm
download.png
download.png
download_edited.jpg
Vector_edited.jpg
Screen Shot 2018-03-11 at 2.35.45 PM_edi
Arlo-Pro-Onsite-300x600px-eVaYE._V504018
images_edited_edited_edited.jpg
Screen Shot 2018-10-29 at 12.26.38 PM.jp
index_edited.jpg
images_edited_edited_edited.png
download_edited_edited.jpg
salient.jpg
images_edited.png
images.jpg
images.jpg
images.jpg
download.jpg
Screen Shot 2019-07-07 at 12.35.19 PM.jp
images.jpg
images.jpg
images.jpg

All American Exceptionalism

   Scout smart home integrations

Screen Shot 2019-11-19 at 3.58.57 PM.jpg
Screen Shot 2019-11-19 at 4.18_edited.jp
BVWZE7398_edited_edited.jpg
download_edited_edited_edited.jpg
_edited_edited.jpg
Screen%20Shot%202019-08-07%20at%208_edit
images-1_edited_edited.jpg
Screen%20Shot%202020-01-07%20at%2012.36_
Minut_edited_edited_edited_edited.jpg
download_edited.jpg
download_edited_edited.jpg
download-1_edited_edited_edited.jpg
images_edited.jpg
images_edited.jpg
linklogo-md_edited.jpg
download_edited.jpg
safe_image%252520copy_edited_edited_edit
Screen%20Shot%202019-05-01%20at%202_44_5
popmech_edited.png
Screen Shot 2020-06-14 at 10.03.29 PM.jp
For-Security-Sake-Shield-FSS-FILM-GLOW2_
safewise-logo-blue_edited.jpg
download_edited_edited.jpg
download_edited_edited.jpg
Screen%20Shot%202020-01-07%20at%2012.36_
images_edited_edited.jpg
reolink-logo_edited_edited.png
download_edited_edited.jpg
_edited_edited_edited_edited_edited.png
images_edited.jpg
cropped-allconnect-color-2x.png
cropped-allconnect-color-2x.png
download_edited.jpg
Screen Shot 2020-09-30 at 2.13.30 PM.jpg
Screen Shot 2020-10-12 at 7.23.48 PM.jpg
 
index_edited_edited_edited.jpg
Screen Shot 2020-02-21 at 11.47.19 PM.jp
safewise-logo-blue_edited.jpg
logo.png
stacked-tagline-color_edited.png
1%20(1)_edited.jpg
mark_edited.jpg
Screen%2520Shot%25202020-05-22%2520at%25
DOJ_seal_with_text_edited_edited_edited_

National Registries - Sex Offenders

download.jpg
logo_edited.jpg
Norton%25252520banner_edited_edited_edit
download.png
Screen%20Shot%202020-10-05%20at%2011.32_
cropped-Black-NDVH-Logo-4-1030x424_edite
Screen%20Shot%202020-04-26%20at%2010.26_
download_edited.jpg
Screen Shot 2020-07-22 at 8.03.22 PM.jpg
logo-child-rights-connect_edited.jpg
rehab4addiction_edited.jpg
Screen Shot 2020-08-01 at 7.39.44 PM.jpg

Apple Family 

images_edited_edited_edited.png
download.png
Screen Shot 2019-07-07 at 7_edited.jpg
logo.png
missing_edited.png
handshake_edited.png
campus sec_edited.jpg
1140-100-FWN-banner-update-web_Fotor_edi
Screen%20Shot%202018-03-11%20at%201.50_e
NCEA_logoWribbon_edited.jpg
watchos5-1-emergency-services-fall-alert
Microsoft trade mark
images.png
download_edited_edited_edited_edited.jpg
artistic abstractionof Hawaii nei
images2.jpeg
downloadw.png
interpol_edited.jpg
NCA_edited.png
ic_wheel_intelligence-community_edited.j
images-1_edited.png
ctc-default-post-image-1-1200x975_edited
US fleet.jpg
FI Cyber shield.png
Screen Shot 2019-02-13 at 3.06.07 PM.jpg
_edited.jpg
Seal_of_the_United_States_Marine_Corps_F
Screen Shot 2020-04-11 at 7.44.56 PM.jpg
Screen Shot 2019-06-16 at 2.58.25 PM.jpg

     Light   in         Dark ness

logo_constant-guard_edited.png
Screen%2520Shot%25202020-03-17%2520at%25
_edited_edited.png

 Internet Engineering Task Force

index_edited.png
Screen Shot 2019-05-03 at 8.48.15 AM.jpg
download.jpg
Screen Shot 2020-06-18 at 5.24.17 PM.jpg
logo_edited.png
index_edited.png
banner_ext2_edited_edited.jpg
images_edited_edited.jpg
sophos tm     Naked Scurit tm
APWG logo
scrabble_edited_edited.jpg

Russia, China + others attack  America + her Allies 

 relentlessly  and   continuously...

Phishing, spoofing, identity theft, (impersonation) espionage,  terrorism, industrial sabotage, radicalization, financial theft, ransomware, malware, denial of service attacks, bullying, doxing, blackmail,  swatting,    revenge  porn,   sextortion,    extortion,     hate   crimes,    pedophilia,

child grooming,  child pornography,  human trafficking, copyright  infringement, piracy,  theft  of   intellectual    property,   social  engineering

information warfare,  propaganda,  disinformation  cyber  warfare

illicit   poisons  +   drugs     via     darknet,    spyware,    stalkerware...

All  are   prospective  weapons  in  an   arsenal  of   hybrid-warfare.    

        

         

               jeeezze, I  know  right.... 

*Cyber-enabled  attacks  are  exacting  an   enormous toll  on  American

businesses, government  agencies, and  families.   Computer   intrusions,

cyber-crime  schemes, and the covert misuse of  digital   infrastructure have bankrupted firms, destroyed billions of dollars in investments, and helped   influence - operations   designed   to   undermine  fundamental American institutions.

                    *United States Dept. of Justice Cyberreport  4/2/2018

            FBI Indictment of Russian Internet Research Agency 2/16/2018

                       Who's Who  In Russian Cyber Espionage  9/24/2019

                           Special   Counsel  Mueller's  Report © NPR 4/18/2019

 

                 Mueller, DOJ addendum,Vol 1, Vol 2, Appendix ©epic.org 6/19/20

  

            Impeachment  Inquiry Report  House  Intelligence   12/3/2019

       

        Pillar's of  Russia's Disinformation + Propaganda Ecosystem

 

                     GEC  Special Report, State Department  8/5/2020

 

                Russian Active Measures Campaigns Interfearence V.5

                Counterintelligence Threats Vulnerabilities 8/18/2020

 

Communications, commerce and government  are  numerous  aspects  of

modernity  forever  altered  and  in  multiple  ways   made   more  convenient by  the  internet,  yet   these   same   advantages    have   also

afforded  new   tools  to  the  technologically  savvy  criminal.   Crimes  such as terrorism, espionage, financial fraud+identity+theft have always existed in the realm of the  analogue  but have rapidly merged into  the cyber  domain. One such clever subterfuge is steganography, the practice of concealing   a   pdf file,    text   message,   image,    or    video    within     another 

file, message, image etcetra. 911 terrorists, coordinated this particular method of obscuration to arrange  an  autonomous  international  communications + subvert  digitized  detection.  This shortcoming in machine learning   facilitates  the  rampant  spread  of  child  pornography.

 

                 

        Trafficking in Persons Report,  US State Department  2019

As nation-state sponsors of terrorism and advanced persistent threats exploit this new frontier their abuse of the internet + technology  add layers of complexity that cannot be entirely overcome through  the  efforts  of  any  single  agency  or  intelligence  alliance. 

UKUSA_Map_edited_edited_edited_edited.jp

We live in a super-advanced epochal era where we possess a virtually limitless access  to  an  instantaneous  abundance of  knowledge and art.  However  this exhaustive trove  of   information  comes with a vicious caveat;  a  dark side.  Certain players  have the  capability  to  comport themselves behind a mask of anonymity via TOR, or sub-net browsers, proxy servers, VPN’s, hacking et cetera. This quasi-autonomy  compels   sophisticated  criminals to ostensibly function (as if) with  impunity.

 

Operators  employ  a  VPN  (virtual  private  network)  on  principle. Both  VPNs  or  an  anonymizer  allow  a  user to appear as  if   they  are  connecting  to the  internet  from  another  location.  Regardless, any digitized  (data)  that is  flagged, or  of  a  valid  actionable  intelligence   concern  will  subject  any  ISP   to  ample   subpoena   requiring   records of  evidence   pertaining  to

the  identification of suspicious  electronic  traffic. This is  why  a  VPN  is  not  exempt  nor   inviolable,  or  beyond  the  reach  of  law.  Privately *co-keyed end-to-end encryption is  necessary for  an entirely  secretive  communications  protocol     * encryption  keys  

Thought-crimes  (an asinine dictatorial proposition)    are   the   primary  

evidentiary transgressions  sought   after    by   autocratic    totalitarian 

governments  for   whom   all   beliefs   and   non-beliefs    become   their

ultimate   objective.   Anonymity    and    privacy    cannot    be    illegal!

In most  despotic + authoritarian  nations, this  web  site and my own  misperceived lèse-majesté could be construed as thought crime, irrespective of any inherent  honesty or meritocracy.             

Data - mining  is  a   foregone   conclusion   and   personal   info  is  tracked,  sold   and   monetized.  One   potential   semi-solution   for  

specifc 'targeted-marketing'  is  to opt-out   from   providing your  I.P.

address,  Internet protocol,  (individualized numerical identifier). 

Until  the  marketeers  enlisting  your   data-sets   of   demographic tracks (commercializing browsing history) devise a compensatory scheme, it's  reasonable  to  claim ownership over what is rightfully yours.   Similarly  you have the  right to be registered  on a do-not-call-list, so you may also choose to opt-out to effectively reduce annoyances  like  spam  and  potentially  dangerous   email   traps. In *China,  and soon all of Russia, it  will be impossible and illegal to exercise any completely  determinative  control  over  your  internet  privacy  and  the  solemn  right  to  exclude  oneself  from  espionage,  spying