








Live Video Monitoring



Next Gen American Made


Russia, China + others attack America + her allies
​
​
​
​
​
​
​
​
​
​
Subverting Justice, Former President & His Allies Pressured DOJ
to Overturn the 2020 Election, pdf 10/17/2021
Russian Active Measures Campaigns Interference 8/18/2020
Counterintelligence Threats Vulnerabilities pdf
ODNI Releases Report on Assessing Russian Activities
& Intentions in Recent US Elections 1/6/2017
ODNI Intelligence Community Assessment of Foreign
Threats to 2020 US Election 4/15/2021
*United States Dept. of Justice Cyber-report pdf 7/2/2018
​
​
Pillars of Russian Disinformation + Propaganda pdf 8/5/2020
​
Impeachment Inquiry Report House Intelligence 12/3/2019
​
​
Russia pouring millions into Kremlin propaganda 10/15/2021
​
​
FBI Indictment of Russian Net Research Agency pdf 2/16/2018
The GRU's Galaxy of Russian Speaking Websites 10/21-1/22
Analyzing Russian Information Warfare Influence 4/10/2019
Russian Intelligence Service Disinformation Outlets 4/9/2020
Russian Social Media & Political Polarization in USA 2012-2014
Voting Misinformation on Twitter in 2020 US Election 10/21/2020
Russian Involvement in America's Race Wars 10/21/2017
​
Counsel Mueller Investigation Records FBI Vault 8/2/2018
Special Counsel Mueller's Report 4/18/2021
​
Mueller, addendum,Vol 1, Vol 2, Appendix 6/19/20
Attn. General Mueller Memos Volume 3 1/2/2020
Special Counsel Mueller's Memos, FBI-FOIA 2/192021
​
FOIA Team Mueller Final Compendium 5/13/2022
​
Who's Who In Russian Cyber Espionage 9/24/2021
Russian Media Monitor, Russia Lies 4/15/2021
Anatomy of Russian Information Warfare 5/22/2014
USA Kompromat: KGB Cultivated Trump 2/9/2021
Russia's Use of Social Media pdf 7/25/2019
​
R. Winner leaked NSA Transcript of 2016 Russian Election Meddling 4/3/2017
Military Narratives in Russian Influence Operations on Twitter 1/13/2021
Timeline Showing Full Scale of Russia's Interference in 2016 Election 9/20/2018
Foreign Threats to 2020 US Elections, National Intelligence Council pdf 3/10/.2021
Trump and Russia, An Exhaustive Timeline 1987-2018
Indictment for Russian Election Interference & Threats to U.S. 4/20/23
​
Communications, commerce & government are numerous aspects
of modernity forever altered & in many ways made more convenient
through the internet, yet these same advantages also afford new
tools to technologically savvy criminals. Crime such as terrorism,
espionage, financial fraud and identity-theft have always existed
in the realm of the analogue but have rapidly merged into the cyber domain;
even into outer space. Deception and destruction is their aim and

One such subterfuge is steganography: the practice of concealing a pdf file, text message, image, or video within another file, message, image etc. 911 radicalized terrorists coordinated this particular method
of obscuration to arrange an autonomous international communications scheme to subvert, circumvent and by-pass a digitized detection. This shortcoming in machine-learning also indirectly facilitates the rampant spread of child pornography. Encryption is a double-edged sword.
As nation-state sponsors of terrorism & advanced persistent threats exploit this new frontier their abuse of the internet & technology add layers of complexity that cannot be entirely overcome through the efforts of any single agency or intelligence-alliance.
We live in a super-advanced epochal era where we possess a virtually limitless access to an instantaneous abundance of knowledge & art. However this exhaustive trove of information comes with a vicious caveat; a dark side: the age of surveillance capitalism. Certain players have the capability to comport themselves behind a quasi-mask of anonymity via TOR
or sub-net browsers, proxy servers, VPN’s, hacking etcetera. This quasi-autonomy often compels sophisticated criminals to ostensibly function with impunity. It is also important to understand the distinction between a hacker (penetration tester) and a cracker, whose intent is destructive & malevolent. These titles have become confusedly interchangeable.
​
Operators employ a VPN (virtual private network) on principle. Both VPNs or an anonymizer will allow a user to appear as if they are connecting
to the internet from another location. Regardless, any digitized (data) that is flagged, or of a valid actionable intelligence concern will subject any ISP to ample subpoena requiring records of evidence pertaining to the
identification of suspicious *electronic traffic. That is why a VPN is not exempt nor inviolable, or beyond the reach of law. Privately secured
co-keyed end-to-end encryption are necessary for an entirely secretive communications protocol.
​
​
​
Thought-crimes (an asinine dictatorial proposition) are the numerous primary
evidentiary transgressions sought after by autocratic & totalitarian
governments for whom all beliefs & non-beliefs become their ultimate
objectives. Anonymity & privacy cannot be illegal! In all communist despotic authoritarian nations this web site could be misperceived or
misconstrued as lèse-majesté & taken as a thought crime irrespective of any inherent honesty, elan or meritocracy. In every nation there exists an intelligentsia, but only in hegemonic nations are they feared, oppressed & denied. Information manipulation is the fundamental objective of propaganda.
​
Data - mining is a foregone conclusion & personal info is tracked, sold, commodified & monetized. One partial potential semi-solution for
specific targeted-marketing is to opt - out from providing your I.P.
address, Internet protocol, (individualized numerical identifier).
Magic Cookies are a standard model for web sites recognizing return users' computers. In many forms these devices are a gray area & they have nebulous ways for circumventing their exclusion. Limiting cookies (in many cases) can compromise & reduce a sites' interoperability, this rather makes them integral, but restricting them does cut-down tracking & ad targeting. Operators should be paid or compensated for their allowance of cookies, given that their prowess isn't always clear. Users are unwittingly participating in marketing analytics schemes that compromise privacy.
Until the marketeers & statisticians scraping our data-sets & demographic tracks (commercializing browsing history) devise a compensatory plan, it is reasonable to claim ownership over what is rightfully yours. Information brokers mine a hidden data ecosystem.
In real life, in some markets RFID tags can track & follow you around in a store & then couple + identify (pair) purchases at POS transaction. This scheme harvests usage patterns such as "if they buy this they're likely to buy that."
Similarly, you have a right to subscribe to a do-not-call-list to effectively
opt-out & reduce harmful annoyances: spam & potentially dangerous email traps. In *China, and soon all of Russia, it will be impossible & illegal to exercise any completely determinative control over internet privacy & the solemn right to exempt & exclude oneself from espionage, spying & eavesdropping.
Privacy & personal (PET's) safety measures are largely forbidden &
regarded with keen suspicion in a non-democratic country & police-states.
The observations of surveillance cameras united with computer vision are increasing exponentially as the deployment of video-analytics, & facial recognition algorithms become nearly ubiquitous.This is the field of Ai specializing in exploiting PII, personally identifiable information.
Images & sounds are instantly sifted, time-stamped, categorized & integrated with law enforcement as derived from public interfacing cameras + sensors, ATM's, markets, malls, bus-train-stations, traffic cameras, license plate readers (ALPR) fuel-stops, airports, phones, *smart-cars, Skype, Zoom, webcams, public buildings, any concurrent CCTV feed or permissible ioT (internet of things) devices, & any leaky tracking technologies. The commercialization of satellites is also a surveillance vector.​
Ai (artificial intelligence) paired with biometric technologies record: time (triangulation) longitude/latitude location, voice prints, ambient-audio; such as acoustic gunshot detection & retinal scans, body temperature, (thermographic cameras) and can perceive duress from facial expressions, as well as recognizes and assigns (deduces) identity based on mannerisms, gestures, posture, gait, cadence and demeanor. Ai could also anticipate behavioral outcomes (predictive policing) based on previously detected activities (knowns) & irregular usage patterns denotative of unusual (out of bounds) OOB requests. Another extrapolative deduction tool is geolocation, for determining a specific location from incidental images.
​
Thermographic technology applied by through-the-wall-technology,
e-warrants, geofencing, drones, cell phone trackers, smart doorbell feeds, & parabolic listening devices provide law enforcement the ability to bypass, supersede & evade restrictions on commonly accepted surveillance methods consistent with the Fourth Amendment’s requirement that police obtain a warrant based on a judge's purview and the independent finding of probable cause of a crime. The commercialization of tracking-data & Section 215 of the Patriot Act are other such instances. NIST has recently developed another methodology for using through-the-wall technology. These mechanisms are not necessarily a negating transference until they are abused.
​
The United States Constitution The Living Document
​
Democracies must ensure her citizens have a fully consistent access to the internet all of the time & that their privacy is assured, guaranteed & respected so they may express themselves fully, freely, safely & without
suspicion of retaliation or recrimination from some ludicrous scheme of
social-grading determined by faceless impersonal legally unaccountable
Nothing could be more un-American
​
Personal beliefs are sovereign rights and constitutionally protected freedom of speech, therefore by logical extension those rights also pertain to lawful electronically conveyed communications. Americans possess the rights to privately, safely & personally control whichever entities they may deem necessary to receive lawful authenticating information for personal
& private transactional purposes in perpetuity! Freedom of speech is an American birth-right, and belongs to anyone who obtains citizenship.
​
USA's citizens are presumed innocent until proven guilty. Government integrity & culpability for personal & private civil liberties are the very basis for universal human rights. United States' citizens uphold freedoms with the utmost importance & significance. Independence, the free press, & free thought are inexorable core principles empowering a vital enduring
constantly renewing democracy. Many Americans fail to understand that complete constitutional liberties are full rights mostly confined to one's properties & lawful dwellings; & that in itself is being called into question in this young evolving 21st century.
​
These are many reasons people everywhere should become thoroughly aware of methods for recognizing and reporting vulnerabilities, thus contributing
to the mutual protection of families, neighbors, businesses, government, all places
of worship, & world wide civic and civil institutions.
​
E-mailing (electronic mail) is the most prominent function that exposes us to exploitation in the net. Generally the average user cannot resist the attraction of some 'come-on' that promises something 'too good to be true' & appeals to a subject of their interest. Tailored individuated targeting is the primary art & craft spammers and identity thieves employ to exploit the naïveté (limited awareness) of a neophyte or the gullibility of the innocent. This form of masquerading takes advantage of a mutual language, circumstance, personal interests, minor-age, race or nationality.
Crimes that utilize familiarity exploit traits, customs & native languages. (Affinity Crimes) They purposefully prey upon the undocumented & victimize citizens whom face an enormous disadvantage applying force of law to report abuse and protect themselves and others from harm. Elder abuse is another example of crime targeting the vulnerabilities of a particular grouping or demographic. Another application of this term is addressed in computer terminology.
​
Abuse is common within immigrant communities as they have less confidence and familiarity with our laws and systems & could be more accepting of such practices depending on norms in their country of origin. Undocumented citizens are especially susceptible to this manner of exploitation because of language limitations that complicate a non-English speakers' ability to clearly determine intent. Deceptive dark-patterns & guile are rife in the net so users must learn to recognize it, or by it → become used. These are universal truths irrespective of nationality. Links & (addresses) are for personal edification and to inform anyone regarding methods for assisting in assuring their safety, detect abuse & if necessary, reporting it anonymously.
Spoofing are emails or web sites that contain convincing presentations depicting familiar registered trade-marks & trade-names they are
imitating. These are commonly used to trick users into revealing passwords or other compromising personal information. These deceptions include acts of an ersatz forgery. This is the typical ploy & intent of an identity-thief seeking a subject to use while mpersonating someone. In the context of network security, spoofing
is when a person or program successfully masquerades as another entity by falsifying misleading insignia et al.
Some hackers also use individuated penetrations to store portions of aggregated data on many computers. This is compartmentalization, which conceals & collates the scattered code synchronizing DDoS attacks dispatched through daisy-chained machines; the use of a large number of infected devices that lead to slow or unresponsive web-facing devices & applications. This is a technique known as distributed computing.
Tracking signal-pixels embedded within email images are another sneaky way marketeers & spammers can determine whether their campaigns are successfully meeting their targets. The best way to reduce spam is by not reading it & deleting it outright. Apple® endeavors to eliminate these exploits in the web. Remote content are parts of a message (such as images, stylesheets, or videos) which are not included in the message itself, but are downloaded from the internet when you view the message. Remote content is a privacy concern because it allows the message sender to know each time you view the message. Email software allows remote content to be disabled. This is the safest default mode & you can then select trusted sites to view completely. For safety's sake, it is important to limit use of web browser extensions because they often contain backdoors.
​
How spear phishing works: firstly criminals need some inside information on their targets to convince them the e-mails are legitimate. Often they acquire sources by hacking into an organizations' computer network & combing through other ancillary websites; blogs, twitter, instagram &
social networking sites. Subsequently they send imitative e-mails offering all sorts of urgent & seemingly legitimate explanations as to why they need your personal data. Finally, their victims & targets are asked to click on a link inside the e-mail that takes them to a phony but realistic appearing website where they are required to use passwords, account numbers, user IDs, access codes, PINs...
Spear phishing is designed to trick you into downloading malicious code or malware by compelling to you click on a link embedded in the e-mail or website. Malware will hijack your computer, & hijacked computers can be organized into enormous networks called botnets that are used to distribute code for DDoS & other coordinated swarming attack vectors. Recently, the deception known as a deep-fake (portmanteau)
was utilized to aurally (using audio imitation) coerce insiders.
Spoofing is a beguiling variant of deceit known as artifice (deceptive artistry) employed by the con-artist to incorporate facially authentic appearing documents that compel you to believe they are from legitimate sources. This scamming is also a tactic in phishing email designed for the (acquisition) of personal information to be used in a usurpation of one's identity via fraud, misrepresentation, coercion & extortion.
​
Phishing by sexual predation is technically PSYOPS (psychological operations) a designed procedural access mode to compromise unwitting participants. Generally predators are working schemes on gaming-sites, dating sites, social-networking, pornography sites,,Tinder, Facebook, Xwitter, & Internet Relay Chat (IRC). Other predators actually have discussions in online criminal forums. These & many other venues too numerous to cite are mines for personalized data that criminals use to manipulate victims. They are targetable resources for child-grooming: a method applied to gradually coerce minors by subverting their CON-fidence...
​
☀︎ systematic coerced compromising information ☀︎
1) personal comments 2) tele numbers 3) personal photographs 4) videos 5) texts 6) hang-outs 7) school schedules 8) friends 9) jobs of parents, siblings 10) where are they presently 11) church attendance 12) vacation times 13) clubs, groups, hobbies 14) timelines they keep etc... Anyone
asking this line of questioning is not a friend. Aside from being a potential sexual predator, they could be a modern thief casing or scouting (probing) a burglary site or plotting some other home invasion scenario.
Phishing criminals or imposters are remarkably skillful plying their digitized craft, a modern form of counterfeiting. Although an email has convincing brands, logos, proper language usage & seemingly valid email address does not mean its legitimate. Be skeptical when it comes to your email messages, if it looks even remotely suspicious, don’t open it, put it in the trash, & then empty the trash. To completely remove (empty the trash folder) this subsequent (secondary) trashing procedure permanently removes copies from your email server. If these actions fail to remove all email then manage settings, or consult tech-support from your ISP, Internet Service Provider.
​
These imitative schemes apply a variety of tactics to gain trust & confidence. By registering website domain names that are difficult to distinguish from the companies they are attempting to imitate, a crafty duplicitous artistry (fraud) is undertaken: a crude method of digitized ersatz forgery.
​
*Sometimes, the malicious domain created to host a data-snarfing script mimics the host domain by referencing a doppelganger (double) web site name. For example, check out the source code for the e-commerce site 'bargainjunkie-dot-com' & you’ll notice at the bottom that it pulls a malicious script from the domain 'bargalnjunkie-dot-com,' where the 'i' in 'bargain' is sneakily replaced with a lowercase 'L'. *KrebsOnSecurity©
​
Many of these emails arrive with malware attachments that could possibly replicate images of a victim’s desktop or transmit key log information; a hacker trick for nabbing pass codes. This sort of spy craft usually requires the victim to load & activate some script, or some extenuating burrowing software program, or possibly lead them to a site or link that compels you to download some program ultimately constructed to assume control over BIOS settings. Never download & activate (executable.ext) software or files from an unknown source!
As digital tools that gather cell phone data for tracking children, friends, & lost phones have multiplied in recent years, so also have the options for people who abuse the technology to track without consent. Technical & legal ambiguities have created an environment in which tools & apps are marketed for both legal & illegal uses, without apparent repercussion. Exercise caution by default & endeavor to use apps that facilitate two - step authentication.
​
2FA = two factor authentication.
Wrong application of 2 factor authorization.
​
To report spam & phishing simply resend the email with the header copied+pasted onto the top of your report. The e-mail body (content-text) is preceded by an unseen header that identifies particular routing information of the message, including the sender, recipient, date & subject. All email software contain similar & different features, but the headers are universal & remain the same irrespective of (OS) operating system, meaning Mac or P.C.

