iphone, ipad monitoring app
icuTV NEWS FEED
All American Exceptionalism
Scout smart home integrations
National Registries - Sex Offenders
Light in Dark ness
Internet Engineering Task Force
relentlessly and continuously...
Phishing, spoofing, identity theft, (impersonation) espionage, terrorism, industrial sabotage, radicalization, financial theft, ransomware, malware, denial of service attacks, bullying, doxing, blackmail, swatting, revenge-porn, sextortion, extortion, hate-crimes, child pornography, child grooming, pedophilia, stalking, human-trafficking, copyright infringement, piracy, theft of intellectual property,
*Cyber-enabled attacks are exacting an enormous toll on American
businesses, government agencies, and families. Computer intrusions,
cyber-crime schemes, and the covert misuse of digital infrastructure have bankrupted firms, destroyed billions of dollars in investments, and helped influence - operations designed to undermine fundamental American institutions.
Special Counsel Mueller's Report © NPR 4/18/2019
Mueller-DOJ addendum,Vol 1, Vol 2, Appendix ©epic.org 6/19/20
Communications, commerce and government are numerous aspects of
modernity forever altered and in multiple ways made more convenient by the internet, yet these same advantages have also
afforded new tools to the technologically-savvy criminal. Crimes such as terrorism, espionage, financial fraud+identity+theft have always existed in the realm of the analogue but have rapidly merged into the cyber domain. One such clever subterfuge is steganography, the practice of concealing a pdf file, text message, image, or video within another file, message, image, etc. This particular method of obscuration is exemplified by a technique 911 terrorists coordinated to utilize autonomous international communications and thereby subvert a digitized detection. This shortcoming in machine learning is facilitating the rampant spread of child pornography.
As nation-state sponsors of terrorism and advanced persistent threats exploit this new frontier their abuse of the internet and technology add layers of complexity that cannot be entirely overcome through the efforts of any single agency or intelligence alliance.
This is a super-advanced epochal era where we possess a virtually limitless access to an instantaneous abundance of knowledge and art. However this exhaustive trove of information comes with a vicious caveat; a dark side. Certain players have the capability to comport themselves behind a mask of anonymity via TOR, or sub-net browsers, proxy servers, VPN’s, hacking etc. This quasi-autonomy compels sophisticated criminals to ostensibly (seemingly) operate (falsely) as if with impunity.
Operators employ a VPN (virtual private network) on principle. Both VPNs or an anonymizer allow a user to appear as if they are connecting to the internet from another location. Regardless, any digitized (data) that is flagged, or of a valid actionable intelligence concern will subject any ISP to ample subpoena requiring records of evidence pertaining to
the identification of suspicious electronic traffic. This is why a VPN is not exempt nor inviolable, or beyond the reach of law. Privately *co-keyed end-to-end encryption is necessary for an entirely secretive communications protocol. * encryption keys
governments for whom all beliefs and non-beliefs become their
address, Internet protocol, (individualized numerical identifier).
Until the marketeers enlisting your data-sets of demographic tracks (commercializing browsing history) devise some compensatory system it is reasonable to claim ownership over what is rightfully yours. Similarly you have the right to be registered on a do-not-call-list, and thereby you may also choose to opt -out and effectively reduce annoyances like spam and potentially dangerous email traps. In *China, and soon all of Russia, it will be impossible and illegal to exercise any completely determinative control over your internet privacy and the solemn right to exclude oneself from espionage, spying and eavesdropping.
These privacy and personal PET's safety measures are largely forbidden and regarded with suspicion in non-democratic countries and police-states. The observations of surveillance cameras are greatly increasing as the deployment of video analytics and facial recognition algorithms become almost ubiquitous (virtually everywhere). Images and *sounds are instantly sifted, time-stamped, categorized + integrated (shared) with law enforcement and numerous intelligence agencies from public interfacing cameras + sensors, ATM's, markets, malls, bus-train-stations, traffic cameras, fuel stops, airports, phones, smart- cars, Skype, webcams, public buildings and any concurrent CCTV feed or permissible ioT (internet of things) device.
A.I. (artificial intelligence) paired with biometric technologies, records: time (triangulation) longitude + latitude location, voice prints, *ambient-audio, + potentially gathers retinal scans, body temperature→ (thermographic cameras) and may perceive duress from facial expressions, as well as recognizes and assigns (deduces) identity based on mannerisms, posture, gait, cadence and demeanor. A.I. could also anticipate behavioral outcomes (predictive policing) based on previously detected activities (knowns) and irregular usage patterns denotative of OOB requests.
Democracies must ensure her citizens have a fully consistent access to the internet all of the time and that their privacy is assured, guaranteed and respected so they may express themselves freely, safely and without
Nothing could be more un-American.
Personal beliefs are sovereign rights and constitutionally protected freedom of speech, therefore by logical extension those rights also pertain to lawful electronically conveyed communications. Americans possess rights to privately, safely and personally control whatever entities they may deem necessary to receive lawful authenticating information for personal and private transactional purposes in perpetuity. Freedom of speech is an American birthright.
USA's citizens are presumed innocent until proven guilty. Government integrity and culpability for personal + private civil liberties are the very basis for universal human rights. United States citizens uphold freedoms with the foremost importance and significance. Independence, a free press, and free thought are inexorable core principles for a vital
constantly renewing democracy. Many Americans fail to understand that complete constitutional liberties are full rights mostly limited to one's properties and lawful dwelling; and that in itself is being called into question in this young evolving 21st century.
These are many reasons people everywhere should become thoroughly aware of methods for recognizing and reporting vulnerabilities, thus contributing to the mutual protection of families, neighbors, businesses, government, all places of worship and world wide civic and civil institutions.
E-mailing (electronic mail) is the most prominent function that exposes us to exploitation in the net. Generally the average user cannot resist the attraction of some 'come- on' that promises something 'too good to be true' and appeals to a subject of their interest. Tailored individuated targeting is the primary art and craft spammers and identity thieves employ to exploit the naïveté (limited awareness) of a neophyte or the gullibility of the innocent. This form of masquerading utilizes and takes advantage of a mutual language, circumstance, personal interest, minor age, race or nationality.
Crimes that utilize familiarity, exploit traits, customs and native languages. They prey upon undocumented citizens whom face an enormous disadvantage applying force of law to report abuse and protect themselves and others from harm. Elder abuse is another example of crime targeting the vulnerabilities of a particular group or demographic. Another application of this term is addressed in computer terminology.
Abuse is common within immigrant communities as they have less confidence and familiarity with our laws and systems and could be more accepting of such practices depending on norms in their country of origin. Undocumented citizens are especially susceptible to this manner of exploitation because of language limitations that complicate a non-English speaker's ability to clearly determine intent. Trickery and guile are rife in the web and users must learn to recognize it or by it → become used. These are universal truths irrespective of nationality. Links + (addresses) are for personal edification and to inform anyone regarding methods to assist in assuring their safety, detect abuse and if necessary report it anonymously.
they attempt to mimic. They are commonly used to trick users into revealing passwords or other compromising personal information. These deceptions include acts of forgery. This is the typical ploy of an ID thief seeking an identity to use while impersonating someone. In the context of network security a spoofing attack is a situation when a person or program successfully masquerades as another by falsifying data. Some hackers also use individuated penetrations to store portions of (aggregated data) on many separate computers. This is compartmentalization that conceals and collates the scattered code synchronizing DDOS attacks dispatched through daisy-chained machines; the use of a large number of infected devices that lead to slow or unresponsive web-facing devices and applications. This is the technique of distributed computing.
How spear phishing works: firstly, criminals need some inside information on their targets to convince them the e-mails are legitimate. They often obtain sources by hacking into an organization’s computer network and by combing through other ancillary websites, blogs, twitter, instagram + social networking sites. Subsequently they send imitative e-mails offering all sorts of urgent and legitimate-sounding explanations as to why they need your personal data. Finally, their victims+targets are asked to click on a link inside the e-mail that takes them to a phony but realistic-looking website, where they are asked to provide passwords, account numbers, user IDs, access codes, PINs, etc.
Spear phishing is designed to trick you into downloading malicious code or malware by compelling to you click on a link embedded in the e-mail or website. Malware will hijack your computer, and hijacked computers can be organized into enormous networks called botnets that are used to distribute code for DDOS and other coordinated swarming attack vectors. Recently, the deception known as a deepfake (portmanteau) was utilized to aurally (using audio imitation) coerce insiders.