Thursday, December 31, 2015

What If He Is Right?


What If He Is Right?
by Nick Ashton, CEO/CTO, CommSmart Global Group of Companies

I know, some think that I take things to the extreme in the statements and it is all pure marketing hype.  

Wrong!

As I listen to Bach this morning on the last day of 2015, in fact it is the Piano Sonata No.11 in A major.  It reminds of the silly chatter splurged with profound statements.  It is those statements that make all the difference as they form the structure of conversation and to whence and where it goes.

Many ask the questions of why climbers climb daunting mountains, placing their lives on the line with every move they make.  As Bach's Fur Elise now glides through my ears and punctates these sentences, I fully understand why they climb and accept the crevices and footholds of the mountain before and above them.

It is there and it challenges their human ability to overcome the complexities of mind over matter.  The physical extension of man against nature, knowing one false unprepared move is certain death. They have practiced, trained and making many a life threatening mistakes.  All whilst in a safety harness allowing them to experience and learn from the exceptional mindset of taunting death.

That is the power, to overcome successfully the challenges of life and winning!

Having been at the onset of commercial computing, watching the new born industry, grow, make mistakes and allow users to become ignorant to what "real computing power" is sickening.

Like everything in life, there is good and evil in all we do.  No one is perfect and never will be.  That does not mean we must give-up, cry and feel sorry for ourselves.  It is the drive to be the best at what you do, learning from those stupid mistakes and enacting change.

Cyber security is the perfect example of opinions, facts and myths.  Since I started back in 1976, Information Technology Management has not changed, not one iota! Still aloof know-it-alls who sadly understand only one way to do things and have never ventured outside of their timid comfort zones.

The black holes of thinking you have all the answers as you waste away in a cocoon abyss. 

Forgive me, for I do know what I say!

We are not here to take IT's pants down and show the zits on their rears.  

Our collective worldwide team has amassed "real time expertise" in all facets of commerce.  Yes, from analogue information to digital data, HR to Production, Sales to Transportation, Customer Service to Change Management and lastly and importantly the Shareholders, Customers/Clients.

Our understanding impacts all.  It is one thing to recognize the issues, it is far different when you can resolve with perfected solutions.  

That is the Red Tagged Difference!

Sure, cyber security of entrusted data is at the lowest ebb ever.  Companies being hacked and compromised each and every day.  Your Information Technology department is overwhelmed, understaffed and deficient in budget to complete the task at hand.

2016 is the year that YOU must protect all entrusted data, report any compromise or attempted compromise of your servers. If not, the fines are massive! 

Any company that does business in Europe falls under the EU Data Protection Act.  Meaning  you will be fined 4% of your gross if you fail and found guilty.

The positive note is simple, Red Tagged is available.  As Cyber Forensic Anthropologists, we go much deeper in understanding the issues, having the "real time tools" to fully understand and resolve your cyber security issues.

We not only speak English, we speak logic and not gobbledygook! All parties will have full understanding, the CEO, C-Level Executives, Board and Shareholders alike.  All on one page for the betterment of all.

Goodbye to 2015 and welcome 2016 in with a positive step.

We await your call and are only restricted by time and availability.

First Come, First Protected...

P.S.
My Bach Is Worse Than My Byte...




Telephone:
North America: +1 (614) 655.1247
Europe:         +31 611 303489

CommSmart Global Group of Companies

copyright 1996-2016

Wednesday, December 30, 2015

Spying, Profiling, Intelligence Gathering or Market Research, Which Is It?

Spying, Profiling, Intelligence 
Gathering or Market Research, 
Which Is It?

No matter who we are, what our station in life is, we are all inquisitive.  It is the voracious appetite for information and the methods we use to attain these facts and the methods we use to satisfy our hunger.

CommSmart Global,  are the conduit for the gathering of facts.  We start right at the beginning, the street, among the people of the world.  

It is the Atmospheric Noise Collection or the Chatter of the Streets where harmless conversation, insider trading information to government anarchists plotting an overthrow of their politicians by violent means takes place. It is just plain down to earth talk, words with different meanings and outcomes.

It is our ability to collect, analyze and report through our proprietary analytic capabilities, which include Next Event Predictability, that have assisted in many differing ways.

From stemming or stopping violent events before they start, to finding out the concerns of the shop floor workers, so management can address the situation before it becomes a major issue that will affect the bottom line.  We work with all, from world governments to corporations on gathering the true facts and reporting.

When you have invented a product or a manufacturing technique, you will protect it via a patent or just by holding the processes as secret information. The inventor has every right to protect their interest.  Others see it as an opportunity to find out more and glean more information regarding your secrets and take a shortcut to their own success.  Yes, attempting to steal your information by any means they can.  It is human nature, just like a dog is never satisfied with its own bone when among a pack, it wants other's bones and will steal, any which way it can.

What rights do we have for information?  Is not what we know, ours and private?  Not according to what is going on in the world today. 

The BBC are reporting the reports of actions by the good old USA have gone beyond down to earth information gathering, spying!

The BBC stated last year:

France, Greece and Italy have been the "targets" of US spying operations, according to the latest files leaked to Britain's Guardian newspaper.

Citing a document by the National Security Agency, it says America's non-European allies were also targeted.

The claim follows a report by Germany's Der Spiegel magazine saying EU offices had been bugged. EU leaders have demanded an explanation from the US.

Fugitive ex-CIA analyst Edward Snowden is said to have leaked the documents.

Mr. Snowden - a former contractor for the CIA and the NSA - has since requested asylum from Ecuador. He is currently in Russia, marooned at Moscow's airport after US authorities cancelled his passport.

In response to the allegations in Der Spiegel, senior EU officials, France and Germany have warned warning that relation with America could suffer.

The NSA said the US government would respond through diplomatic channels and discussions with the countries involved.


A little hypocritical don’t you think?  I am not justifying the actions of the USA, but every nation in the world is in on the spying actions, even so called neutral Switzerland.  Nudge, nudge, say no more, a nod is as good as a wink to blind man

Yes, it is true every human being has listened to other people’s information, most do nothing about it, but some, well, they will attempt to either sell off to the highest bidder or use for their own gain.

Throughout history, everyone has spied on everyone and it is not going to stop!  When Great Britain was building its new embassy in Moscow, the construction workers, Russians, planted more spying and listening bugs in the building during the construction that everyone thought was possible, the Brits never moved in!

France, stop it, during the French Revolution and World War II you had more spies in more countries than imaginable.  In fact, the French Resistance Movement completed some of the most incredible feats during that war and the outcome would have been so different if it had not happened.

The European Union is shocked at what the American NSA has been doing on spying on the organization.  How naive can you get?  

Mind you, it is an organization comprising of some 28 countries who have mistrusted each other for hundreds of years and now trade with each other.  Has the inter-country spying stopped by them as individual countries?  I think not!

Information is King and will continue on and on…  

Thank goodness it does, keeping us in business!

Without Listening to the Chatter on the Streets This Can Happen:


WE are in the NOW and
KEEP YOU; in the KNOW…

CommSmart Global Group of Companies has the solutions and will discuss how we can assist in all facets of your information security.

Be Smart, with CommSmart Global…

WE ARE IN THE NOW AND 
KEEP YOU; IN THE KNOW…




Telephone: 
North America: +1 (614) 655-1247
Europe: +31 611 303489

www.redtagged.us


Copyright 2015

Monday, December 28, 2015

The Cyber Cull


The Cyber Cull
by Nick Ashton, www.redtagged.us

Just days left until the new cyber data protection laws come into effect.  Sadly, the majority of corporation's leadership worldwide, have no idea of the ramifications of the effects and implications of the normal day to day business of storing and accessing stored data.

The safety of writing with a pen and paper is long gone.  The physical filing room, with fireproof file cabinets under lock and key, have for the most part vanished.  It is the digital age of 1's and 0's.  With the so called protection of a human made-up password, that is forgotten, shared, stolen and forgotten on too many occasions. 

The sacred sanctity of privacy is no more!

What, in a few short years has driven us to these times?  Stupidity, ignorance, or maybe we all have been lead to trust in others, instead of doing for ourselves.

Logic it seems has flown the coup and left a bubbling mindset of an unsocial world of "them" and "us".

Compuserve and AOL were the first for linking people as far back as the 1980's, with Bulletin Boards and means for people to connect with messaging and filing sharing.  A harmless means of communications using landline telephones and slow modems.

In 1983, I was the CEO of Commercial Databanks who was the first commercial means of electronic messaging.  Using Texas Instrument "dumb terminals" with a built-in 300 baud modem, that could use a landline phone anywhere to collect your messages from your assigned electronic pigeon hole.  No screen, it was printed on paper and could either be kept and filed or destroyed.

Pioneers so to speak, fully understanding the potential of information sharing and its capabilities.  Not like the the disaster in anti-social activities we have today.

It was in 1976 that my first cyber steps were taken with computers, both hardware and software, limited to say the least for commercial opportunities. Thankfully our great team of Rod Smith, marketing, Alf Lilford and Colin Taplin, both ex-Royal Air Force computer technology "nerds", with an immense knowledge and foresight, worked in harmony and with an incredible vision of the road ahead.  I have never forgotten the gleaned knowledge of those days.

As we hyper travel back to today, the issues are not ones of looking forward and understanding the power of the computer, it is the complacency of those who are taking for granted the day to day activities and reliance of the cyber machine.

Boards and C-Level Executives have taken their finger off the button of logical understanding.  Not realizing, that the world of cyber is more important to be cohesive in working with marketing, production, transportation, accounting, customer service and significantly, shareholders and customers/clients.

When you are entrusted with information of a sensitive nature, you must, no, it is demanded that you take every available step to protect and secure from theft, prying eyes and misuse.

Your information technology individuals and departments can only execute the above rules, if they are competent and have the budget to accomplish the procedures.  

The daily task of normal cyber maintenance is more than a run-of-the-mill operation.  With so many cyber front doors being opened and supposedly closed, just like us humans, we leave lights on, taps dripping and keys in locks. We are failures at so many simple daily tasks and it does not seem that anyone cares, let alone looks at the checks and balances.

A message to your IT department, "you might be secure today, but tomorrow is a whole different story".

You can ill-afford to be next headline, like Hyatt Hotels or whoever is front page cyber hacking news today!

That is why we at Red Tagged are so direct!  

We have amassed a worldwide diverse team with decades of knowledge in all areas of business and cyber concerns. Understanding the day-to-day running of a conglomerate, marketing, production, transportation, accounting, customer service and importantly, the Information Technology Department.

Red Tagged speaks your language, clearly, precisely and directly!

It is one thing to know about Malware threat potential and recognizing it once it has happened.  It is a totally different story when you can defend against it and maintain the cyber security that is demanded today.

There is the difference with Red Tagged, we not only know about, we have the solutions!

As Cyber Forensic Anthropologists, we understand the layers of complexity that have been unfortunately hidden for years. The changes in cyber management bring new ideas which are laid over existing issues which are never rectified. I can assure you, hidden inside your computer servers are programs still running, collecting information and not part of your cyber security solution today, leaving a vulnerability factor you can ill-afford.
Once the baseline is established and rectified by Red Tagged's team, you will be able to maintain the cyber security with continuing service and solutions that you will have in place and control.

Make 2016 your year to securely control the entrusted data of 
your important shareholders, customers and clients.


Telephone:
North America: +1 (614) 655.1247
Europe: +31 611 303489


copyright 1996-2016


  







Monday, December 14, 2015

SHHH… REASONS TO BE CHEERFUL - PART II – ENCRYPTION


SHHH… REASONS TO BE CHEERFUL - PART II – ENCRYPTION
by Nick Ashton, CEO/CTO, CommSmart Global Group of Companies

Reasons for Encryption
  •   Something to Hide
  •   Something Precious
  •   A Corporate Secret
  •   Illicit or Illegal Conversation or Details
  •   State or National Spying
  •   Total Privacy Protection of Entrusted Data/Information
  •         or Just Plain, "None of Your Business"


Why should we be using encryption in the first place? It is stated that all the sensitive data on your computers be encrypted? Why? Simply read the daily headlines of the Hacker's merriment of stealing data from corporations and selling it on the Dark net!  Others want and are simply stealing your entrusted personal and financial information and you are saying and doing nothing!

Governments it seems believe that everyone is their enemy.  Cryptology has been saving lives and corporations from prying eyes for centuries.  When designing a new pair of shoes, the likes of lingerie, or a new means of transportation, the company must keep the information close their chest. Protecting their secrets, potential marketplace and shareholder's investments.
The Internet of Things, or Tragedy as we call it, has been a game changer for Hacking, Phishing and Man in the Middle Brutal Attacks.  Terrorists, Drug Lords, Gangs and Criminals have taken simple social programs and turned them into undercover methods of communications.

To stop all Encryption would be foolish and will be averted by other simple means we have in place and can be made available.

A Duck Hunter's ploy is a simple way of describing Red Tagged's ability to infiltrate those that wish to use the Internet of Things for terroristic and criminal gains.

Red Tagged has invented and created successful Decoys.  That is as far as we are going in stating how we entrap the unwanted and take them down.

Your Privacy, if not properly handled can cause your organization extreme damage. It is all about data responsibility.
Privacy is a universal issue and has become a concern for politicians, lawyers, corporations and the public alike. When working and entrusted with personal data, including financial information, one can expect to be faced with various questions regarding the processing, handling and security of all personal data.

For example, data protection authorities, government and law enforcement, will question you in regard to your compliance and security competence. They will request an overview of the data you have collected and the level of installed and monitored security and enforcement authorities will request assistance in their investigation by demanding certain personal data of your clients. 

Not knowing how to handle such situations or otherwise neglecting the privacy of your clients can lead to major privacy-scandals that can easily become very expensive. A proper privacy policy will ensure that you are optimally prepared for these situations, and more.

Compliance with national and the new European Privacy and Data Protection legislation is no longer sufficient; in order to create a competitive advantage you have to make privacy a key-value within your organization. Although privacy is often seen as a roadblock for an organization, nothing is further from the truth.

A comprehensive internal privacy policy will help you get the most out of the data you have collected; you will garner trust and distinguish yourself from your competitors. The privacy experts at Red Tagged know how to optimize privacy within your organization.

Privacy is a topic that is influenced by more than just law; stakeholders include for example citizens, media, policy makers and/or interest groups. Red Tagged’s specialized knowledge of IT, software security creation, politics, organization and change agent's policy enables you to create an internal privacy policy that takes moral, social and political concerns and desires into account. The result? An increased level of trust in your organization, an increased level of compliance and an increased competitive advantage.


Cybersecurity

Cyber terrorists/criminals take advantage of the ignorance of corporations. 

Will your company be next? 

NO, not with the integral approach of Red Tagged’s security advice on cybercrime and cyber security. These, and Red Tagged’s other in-depth Cybersecurity services will allow you to increase your defenses against (the consequences of) cybercrime.

E-Commerce
Trust is crucial for every e-commerce business or website. How do you gain and maintain customer or stakeholder trust?  The answers to these questions can be found at the same place as Red Tagged’s expertise; at the crossroads between disciplines such as compliance, technology and public affairs.

Trust and IT

Red Tagged knows that a good preparation before introducing a new technology can make a world of difference for its success. The earlier you consider the privacy and trust aspects of your new technology, and how to communicate this clearly to the public, the more defined is your chance of success. Red Tagged will support you in the entire development process, we help to identify, analyze and address the possible risks deriving from your technology.

www.redtagged.us

Email: redtagged@redtagged.us

Telephone:
North America: +1 (614) 655.1247


Europe:    +31 6 11303489 

Thursday, December 10, 2015

Locke, Stock & Barrel

Locke, Stock & Barrel

by Nick Ashton, CEO/CTO, CommSmart Global Group of Companies

"Liberty is to be free from restraint and violence from others."

John Locke 1690


"The choice is not between order and liberty. It is between liberty with order and anarchy without either."
- Robert H. Jackson 
Chief Prosecutor at the Nuremberg Trials, 
1949

Your Security is Up to YOU and Who YOU Choose To Assist YOU!

Corporate Entrusted Data and Financial Information MUST BE Protected.

Protect YOUR BRAND, Shareholders and Importantly, YOUR Clients/Customers.

Red Tagged can only inform you, the next step is all yours.



Telephone:
North America: +1 (614) 655.1247
Europe:           + 31.6 11.303489
copyright 2015

Wednesday, December 9, 2015

Are We Not One Nation?

Are We Not One Nation?
by Nick Ashton, CEO/CTO, CommSmart Group of Companies

The media and the water cooler are surrounded with discussion on who said what and why.  

Some, will never express their personal views and only think them within, agreeing on the comments, but hiding their true emotions as they feel it is not politically correct to do so.  

That is Bovine Slurry in its worst form!

As a nation, the United States must act as one.  Protection of well-being in all manners is demanded.  Security of our borders, who we let in to live among us and the protection all we do in daily lives.  That includes all information regarding us and our families, friends and importantly our business and livelihoods. 

Radical Islamic Terrorist, Hackers, Phishers and Man in Middle Brutal Attackers have overtaken burglaries, scammers and street level drugs in some cases.

The Internet of Things or Tragedy is ruining our lives.  Unprotected sex leads to STD's, pregnancy and even worse afflictions.  Unprotected Internet connections, using limited security measures or worse, none at all, is causing us all to be susceptible to harm in very personal ways.  

The more devices that are now being created to use the Internet without security measures in place, are causing the meltdown of cyber security.

Those corporations who have your personal and financial information, which you have entrusted are failing daily in cyber protection.  In fact, they are failing to notify you when they are hacked and leaving you in the dark regarding your vulnerability.

The issue of Terrorism is a major and Radical Terrorists are using private networks to communication which are encrypted with no back door to be checked by government for our safety.

I do believe in the corporate world, backdoors are not required as it is still an opening that can be undone and opened.

Our Red Tagged (E3) End2End Encryption utilizes an encrypted secure, invisible connection for all data in motion, including VoIP.  This is a military grade RSA 4096 bit encryption and way beyond the banking standards of RSA 256 bit encryption.  

A proven solution in place for the last ten years in Europe.  Now available worldwide. Acceptable by all world governments as a secure method of transmitting information and communications.

Even more acceptable, (E3) works on all platforms and devices.  You have no need to purchase special devices, Smartphones, Tablets etc.

Bring Your Own Device (BYOD) is now totally acceptable and secure.

Contact us for more details.

If we go back to John Locke and his 2nd Treatise of Government, chapter 9, it makes interesting reading and makes points regarding security in life. (read more below)

www.redtagged.us


Email: redtagged@redtagged.us
Telephone:
North America: +1 (614) 655.1247
Europe:           + 31 6.11.30.3489

copyright 1996-2015



John Locke, Second Treatise of Government, §§ 95--99

Written 1689

95. Men being, as has been said, by Nature, all free, equal and independent, no one can be put out of this Estate, and subjected to the Political Power of another, without his own Consent. The only way whereby any one devests himself of his Natural Liberty, and puts on the bonds of Civil Society is by agreeing with other Men to joyn and unite into a Community, for their comfortable, safe, and peaceable living one amongst another, in a secure Enjoyment of their Properties, and a greater Security against any that are not of it. This any number of Men may do, because it injures not the Freedom of the rest; they are left as they were in the Liberty of the State of Nature. When any number of Men have so consented to make one Community or Government, they are thereby presently incorporated, and make one Body Politick, wherein the Majority have a Right to act and conclude the rest.

96. For when any number of Men have, by the consent of every individual, made a Community, they have thereby made that Community one Body, with a Power to Act as one Body, which is only by the will and determination of the majority. For that which acts any Community, being only the consent of the individuals of it, and it being necessary to that which is one body to move one way; it is necessary the Body should move that way whither the greater force carries it, which is the consent of the majority: or else it is impossible it should act or continue one Body, one Community, which the consent of every individual that united into it, agreed that it should; and so every one is bound by that consent to be concluded by the majority. And therefore we see that in Assemblies impowered to act by positive Laws where no number is set by that positive Law which impowers them, the act of the Majority passes for the act of the whole, and of course determines, as having by the Law of Nature and Reason, the power of the whole.

97. And thus every Man, by consenting with others to make one Body Politick under one Government, puts himself under an Obligation to every one of that Society, to submit to the determination of the majority, and to be concluded by it; or else this original Compact, whereby he with others incorporates into one Society, would signifie nothing, and be no Compact, if he be left free, and under no other ties, than he was in before in the state of Nature. For what appearance would there be of any Compact? What new Engagement if he were no farther tied by any Decrees of the Society, than he himself thought fit, and did actually consent to? This would be still as great a liberty, as he himself had before his Compact, or any one else in the State of Nature hath, who may submit himself and consent to any acts of it if he thinks fit.

98. For if the consent of the majority shall not in reason, be received, as the act of the whole, and conclude every individual; nothing but the consent of every individual can make any thing to be the act of the whole: But such a consent is next impossible ever to be had, if we consider the Infirmities of Health, and Avocations of Business, which in a number, though much less than that of a Common-wealth, will necessarily keep many away from the publick Assembly. To which if we add the variety of Opinions, and contrariety of Interests, which unavoidably happen in all Collections of Men, the coming into Society upon such terms, would be only like Cato's coming into the Theatre, only to go out again. Such a Constitution as this would make the mighty Leviathan of a shorter duration, than the feeblest Creatures; and not let it outlast the day it was born in: which cannot be suppos'd till we can think, that Rational Creatures should desire and constitute Societies only to be dissolved. For where the majority cannot conclude the rest, there they cannot act as one Body, and consequently will be immediately dissolved again.

99. Whosoever therefore out of a state of Nature unite into a Community, must be understood to give up all the power, necessary to the ends for which they unite into Society, to the majority of the Community, unless they expressly agreed in any number greater than the majority. And this is done by barely agreeing to unite into one Political Society, which is all the Compact that is, or needs be, between the Individuals, that enter into, or make up a Common-wealth. And thus that, which begins and actually constitutes any Political Society, is nothing but the consent of any number of Freemen capable of a majority to unite and incorporate into such a Society. And this is that, and that only, which did, or could give beginning to any lawful Government in the World.

Tuesday, December 8, 2015

The Truth Does Not Take Sides...

The Truth Does Not Take Sides...
by Nick Ashton, CEO/CTO, CommSmart Global Group of Companies

John Locke (1632–1704)  stated:

"Let us then suppose the mind to be, as we say, white paper void of all characters, without any ideas; how comes it to be furnished? Whence comes it by that vast store, which the busy and boundless fancy of man has painted on it, with an almost endless variety? Whence has it all the materials of reason and knowledge? To this I answer, in one word, from experience: in that, all our knowledge is founded; and from that it ultimately derives itself."

We start with a blank page and delve into what we have been taught, learned and searched out for ourselves.  Only mindless people can be indoctrinated, shallow individuals without cause by someone else.  Their fluidity of reason and action is likened to that of a puppet, controlled by the Master Puppeteer.

Locke clearly believes that we are born with a variety of faculties that enable us to receive and process information (the senses, memory, our ability to use language, explored in some detail in his Book III of the Essay) and to manipulate it once we have it, but what we don’t have is innate knowledge or ideas. These have to be introduced to us and it is in the method of introduction that the issues of indoctrination fall.

But there is much more to it than that. Locke believed deeply in humanity. He was not a secular thinker, in fact he was a devout believer in God, but he thought that the God-given faculties we possess, especially the ability to reason, gave us a unique place in nature which we should take full advantage of. Locke was a political animal, intimately involved in the changes taking place in England at the time, and a great believer in individual freedom. His was a political project and his interest in the mind had a practical purpose behind it – he wanted to transform society and organise it in a rational way. His rejection of innate ideas was intimately linked to this project for it is all too easy to claim all sorts of principles as innate in order to maintain the status quo, meaning that people “might be more easily governed by, and made useful to some sort of men, who has the skill and office to principle and guide them. Nor is it a small power, it gives one man over another, to have the authority to be the dictator of principles, and teacher of unquestionable truths; and to make a man swallow that for an innate principle, which may serve his purpose, who teacheth them.”

You better understand this, as our forefathers based the whole Declaration Independence and the U.S. Constitution on John Locke's works and writings.

Truth, what is truth?  
  • Is it true that there are those that wish us all harm and want us out of the way? 
  • Is it true that there are individuals that want and will steal what is rightfully yours?
  • Is it true you believe that a government will solidly protect you from all of this?
  • Why is it you believe this?  Have you been hypnotized or indoctrination to believe and trust these statements?
But what is the truth in Locke's eyes?

Isn't the truth relative to each individual (this is a position called "epistemic relativism")? Don't I have my own truth which might be different from yours?
The short answer is, NO. Most people who propose Relativism of this type are simply confused about what the word 'truth' means. So, let's be clear about what the word means:

Definition: 'Truth' means, however the universe actually is.


Just because someone says it, it does not have to be true.

This is the case of Radicalized Religious Extremists who twist the words of Prophets for there own liking.  It is is not just Christians and Muslims that have used this through the ages.

Today the focus is on Radicalized Muslims who have a track record of killing in the most barbaric way and want we call a civilized world to support their actions. if we do not, they will kill us all.

Their actions are irrational and erratic in nature and use the Fear Factor to instill their sadistic message.

It is no good chopping the head off the snake, it must be exterminated entirely by a collective global force.

These radicals are not the only ones attacking us, a digital war which involves us all, every second of the day is being waged against us.  It is being disregarded by the corporate world and leaving us all in harm's way.

The Internet of Things as some are calling it, is actually an uncontrollable tragedy that will be responsible for the demise of people.  It does not have to be this way.

Hacking and controlling our utilities, power, gas, water, sewage and transportation are susceptible to being compromised and must be addressed now, not next week or next month, but NOW!

It is not just they have the ability to steal your financial and personal data, totally messing up your life.  It is the fact they want to do this and know that businesses are allowing it to happen!

Cyber failure is more costly that radical terrorists!

These are the facts, the truth...  YOU, not a government can only protect YOU!

The Truth Does Not Take Sides...

www.redtagged.us
Email: truth@redtagged.us

Telephone: 
North America: +1 (614) 655.1247
Europe:             + 31 6 11 30 3489

copyright 2015 

Monday, December 7, 2015

Nearly every major bank is using second-rate security to guard its website and clients.

Nearly every major bank is using second-rate 
security to guard its website.

Capital One, JPMorgan Chase, Suntrust, Wells Fargo -- none of them use what's commonly referred to as the "best practice" in the industry when it comes to Web security.

The worst offenders are HSBC and TD Bank.

We can change that right now!  (Full Whitepaper is available with NDA/LOI)

Secure online access is a true reality 

Healthcare, Banking, Insurance,Big Box, Loyalty programs, SAS...
With Red Tagged (E3) easily managed digital certificate and device recognition solution.

Our solution is a (virtual) appliance based product which seamlessly fits into your existing network infrastructure. It automatically creates, distributes, and (de)installs, short-lived X.509 user certificates with corresponding cryptographic key-pairs, for the purpose of user & device credentialing and secure access control.

X.509 is the industry standard since the 1980’s and is supported by all major network components and enterprise application solutions, making it the perfect unified access control solution.

Thus far managing X.509 certificates has been one of the greatest cost factors in high secure environments, mainly caused by the required administration efforts.

By re-using your existing authentication environment, optionally leveraging it with our trusted corporate & Bring Your Own Device (BYOD) device recognition, reducing the lifecycle of the certificate, and ultimately automating the certificate requests, creation, distribution and (de)installation; certificate management has become easy as pie with our Trusted Device solution.

It not only secures the sending of user authentication credentials and enables encrypted access to the network to the highest level to protect against harsh attack vectors such as Man-in-the-Middle and brute force, but it also helps to significantly reduce cost.

Administrators have less work in configuring networks for different kinds of authentication, but end-users can also become more productive thanks to Single Sign-On to applications and network environments.

INDUSTRY PRACTICAL APPLICATIONS

Identifying your trusted employee and partner devices to conveniently yet securely access your corporate applications is the most common use. Frequently in combination with existing HP, Palo Alto, Cisco, F5, CheckPoint, Juniper, and/ or a range of Open products.

Smartphone app builders commonly face their app data-stream and app-server getting hacked. Our API can be your security module in your app.

Secure app and machine-to-machine communication is a necessity nowadays as well: vending-machines communicating their daily sales, ATM’s communicating wirelessly with the bank, IP-camera’s securely sending their video feeds, medical devices sending privacy sensitive patient data to online patient dossiers, and much more. End2End Encryption is right.

We handle it all, for dozens up to hundreds of millions of users and devices.

Passwords are the cause of the majority of the cyber-attack issues and we still use them!

Red Tagged (E3) End2End Encryption uses a Device DNA which each device or machine has. It is the device that is authenticated and not reliant on a user password that can be taken to another device and used as the log-in.

Yes, we can still have a password, but that is not the key to entering the system. Many safeguards can be in place also, from GPS location, Geo-Fencing and many others, the key is the Device DNA which is created at the authorization stage and is extracted from the device in many ways and elements.

Desktop, laptop, tablet, Smartphone it does not matter, the days of concern for BYOD are gone! You just setup internally a SOP (Standard Operating Procedure) for usage to the corporate servers.

The connection is universal, meaning even in Wi-Fi Hotspots conferences or hotels the solution protects and serves the security factors on both sides.

Firewall & VPN Integration

For effective enterprise perimeter, internal, and Web security, integration with existing Firewalls is a must-have. All known enterprise firewall and VPN solution providers support the X.509 standard

Secure Application Access
Secure access to online applications is generally made possible through the use of HTTPS.

By simply enforcing the requirement of client side digital certificates on the target server or firewall or VPN, you effectively create a highly secure 2-way SSL authenticated encrypted tunnel over TLS.

This feature is by default supported by all major server side Operating Systems, and all major enterprise application solution suppliers. Such as: Microsoft, Cisco, Juniper, CheckPoint, Palo Alto, HP, IBM, SAP, Oracle, “open” solutions, and many others.

High Availability

Built-in high availability feature, allowing for each instance to be aware of the health status of all other End2End Encryption (E3) instances. As a result, should an appliance ever become unavailable, automatically another can take over, without you having to rely on 3rd party high availability solutions.

(E3) delivers a unified architecture for perimeter, internal and web based access control, based on the industry standard X.509 digital certificates.

Product description
End2End Encryption (E3) issues short lived certificates and has an automated registration authority module, providing comprehensive easy to use and administer secure access to your existing network and cloud infrastructure.

Product Key Features

• IPv4 and IPv6 supported

• On-board high availability support

• RFC compliant standard X.509

• Short life validity for certificates

• New unique encryption keys with each issued certificate

• 1024 - 4096 bit RSA encryption keys

• Automated certificate processing

• Use existing authentication methods

• Optional trusted hardware recognition and management

• Runs also under your existing CA

Product Benefits

• Provides advanced application and network protection for changing threats including Phishing, Man-in-the-Middle and anonymous Brute Force attacks

• Enables a wide range of secure branch and remote-access options

• Streamlines security administration and lowers management cost

• Makes federated identity a reality

• Corporate laptop & smartphone usage

• Machine to machine usage

• Internet of Things supported



Telephone:
North America: +1 (614) 655.1247
Europe: +31 6 11 30 3489

copyright 2015

10,000 Bombings and terrorism in the name of religion. 1969 - 2001

10,000 Bombings and terrorism in the name of religion. 1969 - 2001
Muslims are not the only ones, but the current assassins of the Western World.
This is a list of notable bombings related to the Northern Ireland "Troubles" and their aftermath. It includes bombings that took place in Northern Ireland, the Republic of Ireland and Great Britain since 1969. There were at least 10,000 bomb attacks during the conflict (1969–1998).[1]

1969[edit]

1971[edit]

1972[edit]

1973[edit]

1974[edit]

1975[edit]

  • 16 March Mildred Harrison (26), a Protestant, was the first RUC woman to be murdered on duty, killed by an explosion from a UVF bomb while on foot patrol passing Ormeau Arms Bar, High Street, Bangor, County Down.[16]
  • 17 July Four British soldiers were killed by a Provisional IRA bomb near ForkhillCounty Armagh. The attack was the first major breach of the February truce.
  • 5 September Two killed and 63 injured when a bomb was detonated in the lobby of London's Hilton Hotel.[17]

1976[edit]

1978[edit]

1979[edit]

1980[edit]

  • 17 January Dunmurry train explosion - a Provisional IRA bomb prematurely detonated on a passenger train near Belfast, killing three and injuring five civilians.

1982[edit]

1983[edit]

1984[edit]

1985[edit]

1987[edit]

  • 8 November Remembrance Day bombing - 11 civilians were killed and sixty-three injured by a Provisional IRA bomb during a Remembrance Day service in Enniskillen,County Fermanagh. One of those killed was Marie Wilson. In an emotional BBC interview, her father Gordon Wilson (who was injured in the attack) expressed forgiveness towards his daughter's killer, and asked Loyalists not to seek revenge. He became a leading peace campaigner and was later elected to the Irish Senate. He died in 1995.[25]

1988[edit]

1989[edit]

1990[edit]

  • 9 April Four UDR soldiers were killed when the Provisional IRA detonated a culvert bomb under their patrol vehicle in Downpatrick, County Down. The bomb contained over 1,000 lb (450 kg) of explosive and was so powerful that the vehicle was blown into a nearby field.[27][28]
  • 20 July The Provisional IRA bombed the London Stock Exchange.[29]
  • 30 July Conservative MP Ian Gow was killed by a car bomb outside his house near Eastbourne.
  • 6 September The Provisional IRA planted two bombs aboard the Royal Fleet Auxiliary replenishment ship RFA Fort Victoria. One of them exploded, disabling the ship which had been constructed in Belfast and launched some weeks before. The second bomb failed to go off and was found and defused 15 days later.
  • 24 October Proxy bomb attacks - the Provisional IRA launched three "proxy bombs" or "human bombs" at British Army checkpoints. Three men (who were working with the British Army) were tied into cars loaded with explosives and ordered to drive to each checkpoint. Each bomb was detonated by remote control. The first exploded at a checkpoint in Coshquin, killing the driver and five soldiers. The second exploded at a checkpoint in Killean; the driver narrowly escaped but one soldier was killed. The third failed to detonate.[30]

1991[edit]

  • 3 February The Provisional IRA launched a 'proxy bomb' attack on a Ulster Defence Regiment base in MagherafeltCounty Londonderry. The bomb caused major damage to the base and nearby houses, but the driver escaped before it exploded.
  • 18 February A Provisional IRA bomb detonated in a litter bin at Victoria StationLondon, killing David Corner, and injuring 38. Since that time, there have been no litter bins anywhere on the station platform.[31]
  • 31 May Glenanne barracks bombing - the Provisional IRA launched a large truck bomb attack on a UDR barracks in County Armagh. Three soldiers were killed, whilst ten soldiers and four civilians were wounded.
  • 2 November Two British soldiers were killed when the IRA detonated a bomb at Musgrave Park British Army hospital in Belfast. A two storey building was destroyed by the blast.[32]
  • 15 November A provisional IRA bomb detonated in St Albans City Centre. Two fatalities, both members of the provisional IRA (Patricia Black and Frankie Ryan), were the only casualties.[33]

1992[edit]

  • 17 January Teebane bombing - A 600 pounds (270 kg) -1,500 pounds (680 kg) per another source[34]- roadside bomb detonated by the Provisional IRA destroyed a van and killed eight construction workers (one of them a soldier) on their way back from Lisanelly British Army barracks in OmaghCounty Tyrone, where they were making repairs. Another eight were wounded.[35]
  • 10 April Baltic Exchange bombing - a van loaded with one-ton of home-made explosives went off outside the building of the Baltic Exchange company, at 30 St Mary Axe, London, killing three people and injuring other 91.[36] The Provisional IRA bomb caused £800 million worth of damage, £200 million more than the total damage caused by the 10,000 explosions that had occurred during the Troubles in Northern Ireland up to that point.[37]
  • 1 May Attack on Cloghogue checkpoint - the Provisional IRA, using a van modified to run on railway tracks, launched an unconventional bomb attack on a British Armycheckpoint in South Armagh. The checkpoint was obliterated when the 1,000 kg bomb exploded, killing one soldier and injuring 23.
  • 12 May Coalisland riots - After a small Provisional IRA bomb attack in the village of Cappagh, in which a paratrooper lost both legs, British soldiers raided two public houses and caused considerable damage in the nearby town of Coalisland. This led five days later to a fist-fight between soldiers and local inhabitants. Shortly thereafter, another group of British paratroopers arrived and fired on a crowd of civilians, injuring seven. Two soldiers were hospitalized.
  • 23 September The Provisional IRA detonated a 3,700 lb bomb[38] at the Northern Ireland forensic science laboratory in south Belfast. The laboratory was obliterated, 700 houses were damaged, and 20 people were injured.[39] 490 owner and occupiers claim for damages.[40]
  • 21 October The IRA detonated a 200-pound (91 kg) bomb, causing large amounts of damage to nearby buildings, in Main Street, Bangor, County Down.[41]

1993[edit]

  • 4 February Two IRA bombs exploded in the London area, one at a London Underground station and another on a Network Southeast train in Kent.[42]
  • 7 March The IRA detonated a 500-pound (230 kg) car bomb in Main Street, Bangor, County Down. Four Royal Ulster Constabulary (RUC) officers were injured in the explosion; the cost of the damage was later estimated at £2 million, as there was extensive damage to retail premises and Trinity Presbyterian Church, as well as minor damage to the local Church of Ireland Parish Church and First Bangor Presbyterian Church.[43]
  • 20 March Warrington bomb attacks - after a telephoned warning, the Provisional IRA detonated two bombs in CheshireEngland. Two children were killed and 56 people were wounded. There were widespread protests in Britain and the Republic of Ireland following the deaths.[44]
  • 24 April Bishopsgate bombing - after a telephoned warning, the Provisional IRA detonated a large bomb at BishopsgateLondon. It killed one civilian, wounded 30 others, and caused an estimated £350 million in damage.[45]
  • 6 July A large IRA bomb caused widespread damage to the centre of Newtownards, Co Down. The centre of the market town was devastated by a bomb which the IRA said contained 1,500 lbs of explosive. Seven people were injured, one seriously.[46]
  • 23 October Shankill Road bombing - eight civilians, one UDA member and one Provisional IRA member were killed when an IRA bomb prematurely exploded at a fish shop on Shankill RoadBelfast.

1996[edit]

  • 9 February London Docklands bombing - the Provisional IRA bombed the Docklands in London. The bomb killed two civilians, and brought to an end the ceasefire after 17 months and nine days.[47]
  • 15 June Manchester bombing - the Provisional IRA detonated a bomb in ManchesterEngland. It destroyed a large part of the city centre and injured over 200 people. To date, it is the largest bomb to be planted on the British mainland since the second world war. The devastation was so great, that several buildings were damaged beyond repair, and had to be demolished.[48]
  • 7 October The Provisional IRA detonated two car bombs at the British Army HQ in Thiepval BarracksLisburn. One soldier was killed and 31 injured.

1997[edit]

  • 16 September Markethill bombing - the dissident Continuity IRA (CIRA) planted a 400-lb van bomb in the village of Markethill, County Armagh, just outside the local RUC station, causing widespread damage but a few injures.[49] The bombing happened a day after Sinn Féin joined the political negotiations which led to the Good Friday Agreement.[50]

1998[edit]

  • 15 August Omagh bombing - a dissident republican group calling itself the Real IRA detonated a bomb in OmaghCounty Tyrone. It killed 29 civilians, making it the worst single bombing of the Troubles, in terms of civilian life lost.

1999[edit]

2001[edit]


Thanks Wikipedia