iphone, ipad monitoring app
icuTV NEWS FEED
All American Exceptionalism
Scout smart home integrations
National Registries - Sex Offenders
Apple's iPhone can track, locate, map + GPS
Light in Dark ness
Internet Engineering Task Force
relentlessly and continuously...
Phishing, spoofing, identity theft, (impersonation) espionage, terrorism, industrial sabotage, radicalization, financial theft, ransomware, malware, denial of service attacks, bullying, doxing, blackmail, swatting, revenge porn, sextortion, extortion, hate crimes, pedophilia,
*Cyber-enabled attacks are exacting an enormous toll on American
businesses, government agencies, and families. Computer intrusions,
cyber-crime schemes, and the covert misuse of digital infrastructure have bankrupted firms, destroyed billions of dollars in investments, and helped influence - operations designed to undermine fundamental American institutions.
Special Counsel Mueller's Report © NPR 4/18/2019
Mueller, DOJ addendum,Vol 1, Vol 2, Appendix ©epic.org 6/19/20
GEC Special Report, State Department 8/5/2020
Russian Active Measures Campaigns Interfearence V.5
Communications, commerce and government are numerous aspects of
modernity forever altered and in multiple ways made more convenient by the internet, yet these same advantages have also
afforded new tools to the technologically savvy criminal. Crimes such as terrorism, espionage, financial fraud+identity+theft have always existed in the realm of the analogue but have rapidly merged into the cyber domain. One such clever subterfuge is steganography, the practice of concealing a pdf file, text message, image, or video within another
file, message, image etcetra. 911 terrorists, coordinated this particular method of obscuration to arrange an autonomous international communications + subvert a digitized detection. This shortcoming in machine learning facilitates the rampant spread of child pornography.
As nation-state sponsors of terrorism and advanced persistent threats exploit this new frontier their abuse of the internet + technology add layers of complexity that cannot be entirely overcome through the efforts of any single agency or intelligence alliance.
We live in a super-advanced epochal era where we possess a virtually limitless access to an instantaneous abundance of knowledge and art. However this exhaustive trove of information comes with a vicious caveat; a dark side. Certain players have the capability to comport themselves behind a mask of anonymity via TOR, or sub-net browsers, proxy servers, VPN’s, hacking et cetera. This quasi-autonomy compels sophisticated criminals to ostensibly function (as if) with impunity.
Operators employ a VPN (virtual private network) on principle. Both VPNs or an anonymizer allow a user to appear as if they are connecting to the internet from another location. Regardless, any digitized (data) that is flagged, or of a valid actionable intelligence concern will subject any ISP to ample subpoena requiring records of evidence pertaining to
the identification of suspicious electronic traffic. This is why a VPN is not exempt nor inviolable, or beyond the reach of law. Privately *co-keyed end-to-end encryption is necessary for an entirely secretive communications protocol. * encryption keys
governments for whom all beliefs and non-beliefs become their
address, Internet protocol, (individualized numerical identifier).
Until the marketeers enlisting your data-sets of demographic tracks (commercializing browsing history) devise a compensatory scheme, it's reasonable to claim ownership over what is rightfully yours. Similarly you have the right to be registered on a do-not-call-list, so you may also choose to opt-out to effectively reduce annoyances like spam and potentially dangerous email traps. In *China, and soon all of Russia, it will be impossible and illegal to exercise any completely determinative control over your internet privacy and the solemn right to exclude oneself from espionage, spying