Screen Shot 2020-04-14 at 9.29.28 PM.jpg
Screen%2520Shot%25202020-04-17%2520at%25
1507235454781_edited.png
Brave.jpg
security-tech-web-logo.png
State of Hawaii Civil Defense logo
download.jpg
hlogo.png

 Updated Daily

Most  Images  Linked

download_edited.jpg
300px-Seal_of_the_State_of_Hawaii.svg_ed
images-3_edited.jpg
71W2jdJ3JKL._SL400__edited.jpg
logo_192.jpg
Screen%20Shot%202020-01-07%20at%2012.36_
 
about-conteratotal_edited_edited_edited.
images-1_edited.png
images_edited.png
new_logo2_edited.png
Screen Shot 2019-01-06 at 8.58.35 PM_edi
images.jpg
download.png
Screen Shot 2019-01-07 at 5.48.58 PM.jpg

 iphone, ipad  monitoring app

Screen Shot 2019-01-04 at 2_Fotor.jpg
images.jpg
Screen Shot 2019-01-04 at 2.38.19 PM.jpg
radius-vision_logo_edited.png
download-1_edited.png
index_edited.jpg
Screen Shot 2018-08-17 at 10.02.46 PM.jp
4f524f_98e13ac0b0fd46959e391ef4de9041a7_
_edited.jpg
newspaper girl_edited_edited_edited.jpg
Screen Shot 2018-12-19 at 6.41.47 PM_edi

icuTV

NEWS FEED

e316f544f9094143b9eac01f1f19e697.png

icuTV NEWS FEED

download_edited_edited.jpg
images.jpg
Safeguard Hoe Security, logo  tm
download.png
download.png
download_edited.jpg
Vector_edited.jpg
Screen Shot 2018-03-11 at 2.35.45 PM_edi
Arlo-Pro-Onsite-300x600px-eVaYE._V504018
images_edited_edited_edited.jpg
Screen Shot 2018-10-29 at 12.26.38 PM.jp
index_edited.jpg
images_edited_edited_edited.png
download-1.png
salient.jpg
images_edited.png
images.jpg
images.jpg
images.jpg
download.jpg
Screen Shot 2019-07-07 at 12.35.19 PM.jp
images.jpg
images.jpg
images.jpg

All American Exceptionalism

   Scout smart home integrations

Screen Shot 2019-11-19 at 3.58.57 PM.jpg
Screen Shot 2019-11-19 at 4.18_edited.jp
BVWZE7398_edited_edited.jpg
download_edited_edited_edited.jpg
allconnect-color.png
Screen%20Shot%202019-08-07%20at%208_edit
images-1_edited_edited.jpg
Screen%20Shot%202020-01-07%20at%2012.36_
Minut_edited_edited_edited_edited.jpg
download_edited.jpg
download_edited_edited.jpg
download_edited_edited.jpg
images_edited.jpg
images_edited.jpg
linklogo-md_edited.jpg
safe_image%252520copy_edited_edited_edit
Screen Shot 2019-05-01 at 2.44.56 PM.jpg
popmech_edited.png
Screen Shot 2020-06-14 at 10.03.29 PM.jp
For-Security-Sake-Shield-FSS-FILM-GLOW2_
safewise-logo-blue_edited.jpg
download_edited_edited.jpg
 
artistic abstractionof Hawaii nei
images2.jpeg
downloadw.png
interpol_edited.jpg
NCA_edited.png
ic_wheel_intelligence-community_edited.j
images-1_edited.png

     Light   in         Dark ness

US fleet.jpg
FI Cyber shield.png
Screen Shot 2019-02-13 at 3.06.07 PM.jpg
_edited.jpg
Seal_of_the_United_States_Marine_Corps_F
Screen Shot 2020-04-11 at 7.44.56 PM.jpg
Screen Shot 2019-06-16 at 2.58.25 PM.jpg
logo_constant-guard_edited.png
Screen%2520Shot%25202020-03-17%2520at%25
Brave.jpg
_edited_edited.png

 Internet Engineering Task Force

index_edited.png
Screen Shot 2019-05-03 at 8.48.15 AM.jpg
download.jpg
Screen Shot 2020-06-18 at 5.24.17 PM.jpg
index_edited.png
banner_ext2_edited_edited.jpg
sophos tm     Naked Scurit tm
APWG logo
scrabble_edited.jpg

Russia, China + others attack  America + her Allies 

 relentlessly  and   continuously...

Phishing, spoofing, identity theft, (impersonation) espionage,  terrorism, industrial sabotage, radicalization, financial theft, ransomware,  malware,  denial of service attacks, bullying, doxing, blackmail, swatting, revenge-porn, sextortion, extortion, hate-crimes, child pornography, child grooming, pedophilia, stalking, human-trafficking,   copyright   infringement,   piracy,  theft  of   intellectual   property, 

social engineering,  information-warfare  (propaganda)  cyber-warfare illicit  (poisons) drugs  via  darknet,  all  potential weapons  of   hybrid-warfare.   

       jeeezze, I  know  right.... 

*Cyber-enabled  attacks  are  exacting  an   enormous toll  on  American

businesses, government  agencies, and  families.   Computer   intrusions,

cyber-crime  schemes, and the covert misuse of  digital   infrastructure have bankrupted firms, destroyed billions of dollars in investments, and helped   influence - operations   designed   to   undermine  fundamental American institutions.

                    *United States Dept. of Justice Cyberreport    4/2/2018

         FBI Indictment of Russian Internet Research Agency 2/16/2018

                       Who's Who  In Russian Cyber Espionage  9/24/2019

                           Special   Counsel  Mueller's  Report   © NPR 4/18/2019

 

              Mueller-DOJ addendum,Vol 1, Vol 2, Appendix  ©epic.org 6/19/20

  

           Impeachment  Inquiry Report-House  Intelligence   12/3/2019

 

Communications, commerce and government  are  numerous  aspects  of

modernity  forever  altered  and  in  multiple  ways  made  more  convenient by  the  internet,  yet   these   same   advantages    have   also

afforded  new   tools  to  the  technologically-savvy  criminal.   Crimes  such as terrorism, espionage, financial fraud+identity+theft have always existed in the realm of the  analogue  but have rapidly merged into  the cyber  domain. One such clever subterfuge is steganography, the practice of concealing a pdf file, text   message,  image,  or  video  within   another   file,  message, image, etc. This particular method of  obscuration  is exemplified by a technique  911 terrorists  coordinated  to  utilize    autonomous    international  communications and thereby subvert a  digitized  detection.   This shortcoming in machine learning  is  facilitating  the rampant  spread  of  child  pornography.

 

                 

              Trafficking in Persons Report,  US State Department    2019

As nation-state sponsors of terrorism and advanced persistent threats  exploit  this  new frontier  their abuse of  the  internet and  technology  add layers of complexity that cannot be entirely overcome through the efforts of any single agency or intelligence alliance. 

highlighted world map of the 5 eyes agreement

This is a super-advanced epochal era where we possess a virtually limitless access to an instantaneous abundance of knowledge and art.  However  this exhaustive  trove  of   information  comes with a vicious caveat;  a  dark side.  Certain players  have the  capability  to  comport themselves behind a mask of anonymity via TOR, or sub-net browsers, proxy servers, VPN’s,  hacking  etc. This  quasi-autonomy  compels   sophisticated  criminals to  ostensibly  (seemingly)  operate  (falsely)  as  if  with  impunity.

 

Operators  employ  a  VPN  (virtual  private  network)  on  principle. Both  VPNs  or  an  anonymizer  allow  a  user to appear as  if   they  are  connecting  to the  internet  from  another  location.  Regardless, any digitized  (data)  that is  flagged, or  of  a  valid  actionable  intelligence   concern  will  subject  any  ISP   to  ample   subpoena    requiring   records of  evidence   pertaining  to

the  identification of suspicious  electronic  traffic. This is  why  a  VPN  is  not  exempt   nor   inviolable,  or  beyond  the  reach  of  law.  Privately *co-keyed end-to-end encryption is  necessary for  an entirely  secretive  communications  protocol     * encryption  keys  

Thought-crimes   (an  asinine dictatory proposition)    are   the   primary  

evidentiary transgressions  sought   after    by   autocratic    totalitarian 

governments  for   whom   all   beliefs   and   non-beliefs    become   their

ultimate   objective.   Anonymity    and    privacy    cannot    be    illegal!

In most  despotic + authoritarian  nations, this  web  site and my own  misperceived lèse-majesté could be construed as thought crime, irrespective of any inherent  meritocracy.             

Data - mining  is  a  foregone  conclusion   and  personal   info  is  tracked,  sold   and   monetized.  One potential  semi -  solution  to    

specifc 'targeted-marketing'  is  to opt-out  from  providing your I.P.

address,  Internet protocol,  (individualized numerical identifier). 

Until  the  marketeers  enlisting  your   data-sets   of   demographic tracks (commercializing browsing history) devise some  compensatory system it is  reasonable  to  claim ownership over what is rightfully yours.   Similarly  you have the  right to be registered  on a  do-not-call-list,  and  thereby  you   may  also  choose  to  opt -out and effectively reduce  annoyances  like  spam  and   potentially  dangerous   email   traps. In *China,  and soon all of Russia, it  will be impossible and illegal to exercise any completely determinative  control over your internet  privacy  and the solemn right  to exclude  oneself   from  espionage,  spying   and   eavesdropping.  

*censorship in China

These privacy and personal  PET's  safety   measures  are  largely  forbidden  and  regarded   with   suspicion   in   non-democratic  countries   and  police-states.  The observations of surveillance cameras are greatly increasing as the deployment of video analytics and facial  recognition  algorithms  become  almost ubiquitous (virtually everywhere). Images and *sounds are instantly sifted, time-stamped, categorized + integrated (shared) with law enforcement and numerous  intelligence   agencies from  public  interfacing  cameras + sensors,  ATM's, markets, malls, bus-train-stations, traffic cameras, fuel stops,  airports, phones, smart- cars, Skypewebcams, public buildings and  any concurrent  CCTV  feed  or  permissible   ioT  (internet of things)   device.

 

A.I. (artificial intelligence)   paired  with    biometric  technologies, records:  time   (triangulation)  longitude + latitude  location,  voice   prints, *ambient-audio, potentially gathers retinal scans,  body temperature→ (thermographic cameras) and may perceive  duress from facial expressions, as well as recognizes and assigns (deduces)   identity   based  on  mannerisms,  posture,  gait,  cadence  and  demeanor.  A.I. could also anticipate behavioral outcomes (predictive policing) based on previously detected activities (knowns) and  irregular usage patterns denotative  of  OOB requests.   

Democracies  must   ensure   her   citizens    have  a fully  consistent  access  to  the  internet  all  of  the  time  and  that   their   privacy   is  assured,  guaranteed  and  respected  so  they  may   express   themselves   freely,  safely  and without

suspicion nor fear of retaliation by some ludicrous  scheme of social grading determined by  faceless  impersonal  unaccountable   minions  +   informants.

                  Nothing could  be more un-American.   

 

Personal beliefs are sovereign rights and  constitutionally  protected freedom of speech, therefore  by  logical  extension  those  rights  also pertain   to  lawful   electronically   conveyed    communications.  Americans possess rights  to  privately, safely and personally control  whatever  entities  they  may  deem   necessary  to  receive  lawful  authenticating information   for  personal   and  private   transactional  purposes  in perpetuity.  Freedom  of  speech  is  an  American  birthright.

          

USA's  citizens  are  presumed  innocent until   proven  guilty. Government  integrity   and   culpability  for   personal + private   civil   liberties  are   the  very basis    for    universal   human    rights.   United States  citizens  uphold  freedoms  with   the   foremost  importance   and    significance.  Independence,  a  free  press,  and   free   thought   are   inexorable  core   principles  for  a  vital 

constantly renewing democracy. Many Americans fail to understand that  complete  constitutional liberties are full rights mostly limited to one's properties and  lawful  dwelling;   and   that   in  itself   is  being  called  into  question  in  this  young   evolving   21st  century.


These are many reasons  people  everywhere  should  become  thoroughly  aware  of  methods  for recognizing and reporting vulnerabilities, thus contributing to the mutual protection of families, neighbors,  businesses,  government, all places of worship  and world  wide civic  and  civil  institutions.

digitized Eye symbolizing Big Brothr 1984
logos_edited.jpg
download.png
UN, United Nations crest  logo
netblocks-org_edited.png
_edited_edited.jpg
ISOC-Dark-RGB_Logo_400px_edited.png
static1.squarespace_edited.png
WWW Earth, computer mouse image
download_edited.png
download-1.png
_edited.jpg
download.png
logo_transparent_edited_edited.jpg
Screen Shot 2019-07-05 at 2.16.47 PM.jpg
download_edited.jpg
logo_edited.png
_edited_edited.jpg
Screen Shot 2019-07-05 at 2.50.40 PM.jpg
 
 
 
email_edited.jpg

E-mailing  (electronic mail)  is  the most prominent function that  exposes us to exploitation in the net. Generally the average user cannot  resist  the  attraction  of  some 'come- on'  that  promises  something  'too  good  to be true' and appeals to a subject of their interest. Tailored  individuated  targeting is the  primary art  and   craft  spammers  and   identity  thieves employ to exploit the  naïveté  (limited  awareness) of a  neophyte or the gullibility of the innocent. This form  of   masquerading  utilizes and takes  advantage of  a  mutual language, circumstance, personal  interest,  minor age,  race   or nationality.


Crimes that utilize familiarity, exploit traits, customs and native languages.  They  prey  upon undocumented citizens whom face an enormous disadvantage applying force of law to report  abuse and protect themselves and others from  harm.  Elder abuse is another example of  crime  targeting the vulnerabilities of a particular group or demographic. Another application of this term is addressed in computer terminology. 

Abuse is  common  within  immigrant communities as they have less confidence and familiarity with our laws and systems and could be more accepting of such practices depending on norms in their country of origin. Undocumented  citizens  are especially susceptible to this manner of exploitation because of language limitations  that  complicate  a  non-English speaker's ability to clearly determine intent. Trickery and  guile  are  rife in  the web and  users must learn to  recognize it or  by it → become used. These are  universal  truths  irrespective  of  nationality.  Links + (addresses) are for  personal edification and  to inform anyone  regarding  methods  to  assist  in   assuring   their  safety,  detect   abuse    and    if   necessary   report   it   anonymously.

Spoofing are emails or web sites that contain convincing presentations  depicting   familiar  registered  trade-marks   and   trade-names

they  attempt to mimic. They are commonly used to  trick   users  into revealing passwords or other compromising personal  information. These deceptions  include acts of  forgery.  This is  the  typical  ploy  of  an  ID  thief   seeking  an identity to  use  while impersonating someone. In the context of network security a spoofing attack is a situation when a person or program  successfully masquerades as another by falsifying data. Some  hackers  also   use   individuated  penetrations  to   store  portions of (aggregated data) on many separate computers. This  is compartmentalization that conceals  and collates the scattered code  synchronizing  DDOS attacks  dispatched  through daisy-chained  machines;  the  use of a  large  number  of  infected  devices that lead to slow or unresponsive web-facing  devices  and applications. This is the technique of distributed computing.

How spear phishing works: firstly, criminals need some inside information on their targets to convince them the e-mails are legitimate. They often obtain sources by hacking into an organization’s computer network and by combing through other  ancillary websites,  blogs,  twitter,  instagram + social  networking  sites.  Subsequently they send  imitative  e-mails  offering all sorts of urgent and legitimate-sounding explanations as to why they need your personal data. Finally, their  victims+targets are asked to click  on a link inside the e-mail that takes them to a phony but realistic-looking website, where they are asked to provide passwords, account numbers, user IDs, access codes, PINs, etc.

Spear phishing is designed to trick you into downloading malicious code or malware by compelling to you click on a link embedded in the e-mail or website.  Malware will hijack your computer, and hijacked computers can be organized into enormous networks called botnets that are  used to distribute code for DDOS and other coordinated swarming attack vectors. Recently, the deception known as a deepfake (portmanteau) was utilized   to  aurally (using audio imitation)  coerce  insiders.

4f524f_7ccfbf046b9e4678a5b85ac166868aaf~