Thursday, March 27, 2014

Unpopular People Are Now Documenting Their Work, Bailiffs, Process Servers & Public Safety “LIVE”

Unpopular people Are Now Documenting Their Work, Bailiffs, Process Servers & Public Safety “LIVE”
By Nick Ashton, Founder, CEO, Tracometry Group of Companies.

So you wake up every morning knowing you are one of the most hated people on the planet.  Even your family doesn’t trust you and do everything they can to disassociate from you.

It never use to be that way, Public Safety Officers (Law Enforcement), U.K. Bailiffs and Process Servers, who are a vital part of society.  When someone has wronged us, we turn to them.  In doing their daily work and completing their enforcement tasks, they are viewed as thugs and mistrusted.

Security in our lives is so important and insecurity has becomes so prevalent that it seems that those we turn to, suddenly, in the target’s eyes, becomes the worse enemy in the world.  Accusations fly, lies are like darts and it becomes a war of words.  In the courtroom, the reputation follows us all and many magistrates and judges have their personal opinion on those that serve the public and uphold the law.  It is not always good.

If you had cause to visit a Bailiff or Process Servers office, you might be have been in for a shock! 

You can enter through the front door at the High Court Enforcement Group, but that is as far as it goes. You are stopped right inside as there is yet another door, with a reinforced, bullet resistant glass window and a tough combination lock, barring the way. The only option is to press a well-used button, stating your business, and waiting nervously inside the chamber for attention.

Then bailiffs and process servers have learned to live with being very unpopular. They are normal people that chose their career and do it to the best of their ability.  In fact, they state, they look at everybody's situation whilst at the door, they always try and decipher between people who can pay and won't pay, and people who can't pay and want to pay.  And if they will not agree to any repayment plan they can come up with one.  If they gained access to the property they will be looking to secure the debt on any assets that are available.  If they are adamant they couldn't pay, at the end of the day, the bailiff or process server has a warrant signed by a judge saying they have to execute the warrant.

If the bailiff/process server did not carry out the orders, they would be technically in contempt of court if they did not do so.

When confronted by law enforcement, a bailiff or process server, people become chameleons and indignant that they are questioned or challenged.  Their actions turn to violence exceedingly quickly.  This is why the meeting or confrontation must be documented for the protection of both parties.

Action In Motion (AIM) is a simple and concise tool in the Public Safety toolbox.  It is not additional item to be added to the ever growing list items carried by officers.  It is their Smart Mobile Phone or Tablet, yes the answer is right in the palm of their hand.

When these events take place, they are able to capture the full event, audio/video/images and directly transmit to a central HQ and be observed in the actions.  This is also recorded on the company’s servers with date/time/originator/GPS embedded in the file, on the screen for use, if need be, in court. 

This is a direct feed and the officer has no fingers in downloading or touching the file, it has full chain of custody and untouched by the originator.

It is also a fully secured transmission as it uses KEYTALK a patented, proprietary software solution for the connection, end to end for this data in motion.  It is a secured bullet resistant tube that is anonymous to all.  That means no one sees it, including hackers and phishers.  This can also be used in a Hotspot environment totally securely.

Action In Motion (AIM) is a patented and a proprietary solution with a myriad of uses in vertical markets. Simple to use and for usage as a surveillance situation is even more unique.  Bailiffs/process servers who need to observe and collect information, there is nothing better than images/video/audio.  A picture is worth a thousand words, especially in a courtroom!

For Law Enforcement, they now have an endless multiple amount of mobile CCTV devices at their fingertips.  Sporting event, rally or protest march, they can be on the spot transmitting to central HQ and to other officers exactly what is going on.  This is the most proactive security tool to be introduced to the security industry.  All secure in the record keeping for presentation to a court.

It does not stop there, Risk Management, Assessors and Insurance Adjusters now have a tool to document all and have it in their office, filed and secure at the same time they are seeing it.  A valuable tool for all.

Public Safety, Bailiffs and Process Servers is still a paper heavy business as our courts have insisted on copies being left with all parties. It will never be totally paperless, but, we do have the ability to create your repetitive forms to be able to filled in a on a tablet or smart mobile phone. Having understood the digital requirements with the pen and paper, we have now moved to the smart mobile phone and tablet.  This enhances the daily workload, proactively and productively. Our solution regarding form filling will be introduced in thirty days.

WE are in the NOW and
KEEP YOU; in the KNOW…

Worldwide Call: +1 (317) 426.0110

Key Talk – Man-In-The-Middle, Hacking & Phishing Solutions
Straight Talking Key Talking… KEYTALK!

Galveston, Texas, Indianapolis, Indiana, London & North Wales, U.K., Netherlands, Lithuania, K.L. Malaysia
Tracometry Group of Companies – Reg. Office. Dorrington Farm, Rye Hill Road, Harlow, Essex CM18 7jF

Copyright 2014

Wednesday, March 26, 2014

Machine Wars – The Hackers Dream!

Machine Wars – The Hackers Dream!
By Nick Ashton, Founder, CEO, Tracometry Group of Companies.

In the beginning it was desktop computers as the Computer Gods took over our capabilities and daily communication processes.  Gates, Job and Sinclair were the early pioneers and then…

We were talking to machines, albeit through our fingers in the early days through the keyboard.  Today, it is machine to machine or computer to computer with limited, but necessary human intervention.  There lies the problem, humans!

The machines have to be managed, connected and allowed to talk to each other and to know they are correctly allowed to.  That is why we invented computer certificates to acknowledge they were trusted and allowed to work together, hand in hand.


These are exciting times for the wireless machine-to-machine (M2M) industry. Across the world, tens of millions of M2M connections are revolutionizing the way that companies of all kinds do business. Across a broad range of sectors, significant gains are being made thanks to the promise of M2M, enabling innovations in industries stretching from healthcare to utilities, automotive to security to interactively serve their masters, us.

However, as we move closer to a future in which M2M is no longer just part of an emerging technological marketplace but the dominant one, ensuring the security of those M2M connections will be of paramount importance. As a result, network operators need to work with dedicated security providers that can integrate with their existing network platforms and provide protection that bridges the gap between legacy ‘human-to-human’ standards of protection and those required for M2M.

There is no difference between traditional certificates and M2M certificates. Both types of certificates are intended to authenticate via a trusted third party the identity of communicating entities.

Traditional certificates were designed and implemented in an era when desktops and laptops were the predominant source of computing power and digital communications. Bandwidth issues were virtually non-existent. Smart cards, smart mobile phones, tablets and devices such as commercial and residential CCTV were on the distant horizon. Oh, we must not forget transportation, trains, boats, planes and the automobile, all have computers on-board that complete the majority of the functions and are hackable.

The fact is, traditional certificates were never designed for use in very constrained environments where computing, bandwidth, power and storage are issues of great importance.


KeyTalk protects M2M online community’s data-in-motion against Man-in-the-Middle and Phishing attacks. Based on our proprietary automated distribution for short lived Machine certificates, Machines transfer data to servers and the Cloud from their connection by KeyTalk identified trusted Machines, using state-of-the-art expiring encryption keys with a time window predefined by your administrator at virtually zero management.

KeyTalk delivers a unified architecture for perimeter, internal and web based access control, based on the industry standard X.509 digital certificates.


With KeyTalk Machines that you trust, you can securely connect to target servers over any non-secure network (including Hotspots) or Internet environment.

All it requires is your server trusting your KeyTalk instance as a trusted source and you are good to go.  That includes lines of defense, such as ultra-high level security devices, cameras, motion sensors and perimeter protection.  Yes, they all controlled by computers.

Sadly the majority of these devices have outdated or long term certificates.  Why that is a problem is simple.  Untrusted or non-existent certificates allow the hacker to gain access with absolute easy and ply their trade, criminality.  Long term certificates allow a much larger window of opportunity to break the codes and gain access.  Not what is needed in this unsociable society!


KeyTalk seamlessly integrates into your existing network Infrastructure. As a result, no data needs to be replicated making life for your administrator a lot easier. And by automating the certificate issuance and installation process no user actions are required whatsoever.

Schiphol Airport and all world airports have security cameras, which are manually updated.  This takes time and manpower and are not completed on a reliable time frame leaving a window of opportunity you can ill-afford.  

KEYTALK does all of this automatically and maintains perfect security for all.

WE are in the NOW and
KEEP YOU; in the KNOW…

Worldwide Call: +1 (317) 426.0110

Key Talk – Man-In-The-Middle, Hacking & Phishing Solutions
Straight Talking Key Talking… KEYTALK!

Galveston, Texas, Indianapolis, Indiana, London & North Wales, U.K., Netherlands, Lithuania, K.L. Malaysia
Tracometry Group of Companies – Reg. Office. Dorrington Farm, Rye Hill Road, Harlow, Essex CM18 7jF

Copyright 2014

Tuesday, March 25, 2014

So You Read it On the Internet!

So You Read it On the Internet! 
By Nick Ashton, CEO/Founder, Tracometry People

Oh my, you read it on the Internet, so it must be true!  

No, anything whatsoever can be written on the Internet, anything and even scum bucket newspapers spread vicious lies.  As you know, there is always two sides to every story.  We have all seen the National Enquirer, the retractions and the lost law suits.  

You see, today people who want to get back at someone and attack them perpetually, using the Internet or a low life rag of a newspaper who never approaches the individuals in the story. Anything placed on the Internet is there forever and ever and not always a happy ending to the anonymous writer or forwarder of the miss-information.

Sounds a bit far fetched? 

No, as there are those that are closed mind and believe what they read, which is convoluted facts and fiction, then spreading the information or take action in a manner that is open for legal action.

No, I read it on the Internet!

Responding to these individuals, former co-workers or ex-girl friend is not the way to go.  It allows them to think they have won and got one over on you

They have got under your skin and annoyed you. Never respond, as it is only going to cause you to do something you will regret.  This is the trend of the unsociable society of today!  

Unfortunately, there are those that never check the real facts and the twisted and derided muses of sick individuals who use this weapon.  They hide behind a keyboard and screen, smirking as they think they strike at your heart with each keystroke.  

Just as hackers, phishers, man in the middle brutal attackers whose minds are polluted with hatred and wanton aggressive in harming you.

It is pure HATE towards people.  Hatred for what was perceived happened and then twisting the real facts, inventive, sadistic words that they write and giggle as they think what will be your reaction.  The hacker is the same, hatred for what you own, valuables, money, information that they steal and want for themselves without working or lifting a finger for it.

Bullying, stalking and just downright disgusting lies are growing day by day and I can understand the inner feelings of those attacked and the subject of these sick individuals. 

Defending yourself in these situations becomes a extremely difficult, as the seed has been sown.  The more you defend, the more people think that those that shout loudest are guilty, not the fact!  It is inner anger that sadly comes to the surface.  You have maintained silence, not wanting to stir these individuals, which become like a hornets nest or a mound of angry ants.  It is very difficult to maintain a semblance of calmness in this situations.

Beware what you spread about people to others through emails, regarding individuals, it falls under the electronic stalking law.  

Think first of how malicious you are being in re-tweeting, posting or sending emails that you happen to find while wasting your time to dig up what you think is dirt on someone you have a disliking for. 

It happened to me and  I ignore their sordid intentions and will not stoop to their lowlife level of depravity.  I mean, what is the point?  

Anger and shutting yourself in a room is not the answer.  Nor is responding to those that do bring it to your attention, as no matter what you say, they will not believe you. 

I have met people who talk behind your back, spreading, what they believe is true or twisted, warped, anonymous statements to others.  They cannot stand it that you have a different solid value in making change and have the testicular fortitude to take it to the wall.

The unsocial side of the Internet is bubbling to the surface and will be stopped, lies, innuendo, hacked information is out there and being extracted to do harm to each of us.  

Do not think that an eight digit + password is a lock on your world!  It is NOT!

So, in business and your private social life, watch your P’s & Q’s on how you try to retaliate, there are laws against.  Those that receive such vendettas, ignore and do not add these people to your Christmas card list.

So count your blessing and remember to pay it forward each and every day!

Oh, look what they wrote about… it has to be true, I read it on the Internet!

WE are in the NOW and
KEEP YOU; in the KNOW…

Worldwide Call: +1 (317) 426.0110