Wednesday, December 30, 2015

Spying, Profiling, Intelligence Gathering or Market Research, Which Is It?

Spying, Profiling, Intelligence 
Gathering or Market Research, 
Which Is It?

No matter who we are, what our station in life is, we are all inquisitive.  It is the voracious appetite for information and the methods we use to attain these facts and the methods we use to satisfy our hunger.

CommSmart Global,  are the conduit for the gathering of facts.  We start right at the beginning, the street, among the people of the world.  

It is the Atmospheric Noise Collection or the Chatter of the Streets where harmless conversation, insider trading information to government anarchists plotting an overthrow of their politicians by violent means takes place. It is just plain down to earth talk, words with different meanings and outcomes.

It is our ability to collect, analyze and report through our proprietary analytic capabilities, which include Next Event Predictability, that have assisted in many differing ways.

From stemming or stopping violent events before they start, to finding out the concerns of the shop floor workers, so management can address the situation before it becomes a major issue that will affect the bottom line.  We work with all, from world governments to corporations on gathering the true facts and reporting.

When you have invented a product or a manufacturing technique, you will protect it via a patent or just by holding the processes as secret information. The inventor has every right to protect their interest.  Others see it as an opportunity to find out more and glean more information regarding your secrets and take a shortcut to their own success.  Yes, attempting to steal your information by any means they can.  It is human nature, just like a dog is never satisfied with its own bone when among a pack, it wants other's bones and will steal, any which way it can.

What rights do we have for information?  Is not what we know, ours and private?  Not according to what is going on in the world today. 

The BBC are reporting the reports of actions by the good old USA have gone beyond down to earth information gathering, spying!

The BBC stated last year:

France, Greece and Italy have been the "targets" of US spying operations, according to the latest files leaked to Britain's Guardian newspaper.

Citing a document by the National Security Agency, it says America's non-European allies were also targeted.

The claim follows a report by Germany's Der Spiegel magazine saying EU offices had been bugged. EU leaders have demanded an explanation from the US.

Fugitive ex-CIA analyst Edward Snowden is said to have leaked the documents.

Mr. Snowden - a former contractor for the CIA and the NSA - has since requested asylum from Ecuador. He is currently in Russia, marooned at Moscow's airport after US authorities cancelled his passport.

In response to the allegations in Der Spiegel, senior EU officials, France and Germany have warned warning that relation with America could suffer.

The NSA said the US government would respond through diplomatic channels and discussions with the countries involved.



A little hypocritical don’t you think?  I am not justifying the actions of the USA, but every nation in the world is in on the spying actions, even so called neutral Switzerland.  Nudge, nudge, say no more, a nod is as good as a wink to blind man

Yes, it is true every human being has listened to other people’s information, most do nothing about it, but some, well, they will attempt to either sell off to the highest bidder or use for their own gain.

Throughout history, everyone has spied on everyone and it is not going to stop!  When Great Britain was building its new embassy in Moscow, the construction workers, Russians, planted more spying and listening bugs in the building during the construction that everyone thought was possible, the Brits never moved in!

France, stop it, during the French Revolution and World War II you had more spies in more countries than imaginable.  In fact, the French Resistance Movement completed some of the most incredible feats during that war and the outcome would have been so different if it had not happened.

The European Union is shocked at what the American NSA has been doing on spying on the organization.  How naive can you get?  

Mind you, it is an organization comprising of some 28 countries who have mistrusted each other for hundreds of years and now trade with each other.  Has the inter-country spying stopped by them as individual countries?  I think not!

Information is King and will continue on and on…  

Thank goodness it does, keeping us in business!


Without Listening to the Chatter on the Streets This Can Happen:



WE are in the NOW and
KEEP YOU; in the KNOW…

CommSmart Global Group of Companies has the solutions and will discuss how we can assist in all facets of your information security.

Be Smart, with CommSmart Global…

WE ARE IN THE NOW AND 
KEEP YOU; IN THE KNOW…




Telephone: 
North America: +1 (614) 655-1247
Europe: +31 611 303489

www.redtagged.us


Copyright 2015





Tuesday, December 15, 2015

If The U.S. Military Is Not Ready for Cyber Warfare, What About You?

If The U.S. Military Is Not 
Ready for Cyber Warfare, 
What About You?
By Nick Ashton, www.redtagged.us

The Armies of Kings and Queens, all powerful, commanding and a privilege to join.  They are the power source for protection of our shores, family and the value of a nation.

Not anymore!

The weapons used included fist and feet, knives, guns, grenades, mines, bombs, missiles, satellites, sex, MRE’s and importantly military tacticians. The military keep their abilities close to their chest and you trust them implicitly. 

So what the H E 2 x Hockey Sticks happened?

Quote for the top military man:

The U.S. military is ill-prepared for waging cyber warfare and needs to bolster defenses against the growing threat of cyber-attacks against both military systems and private infrastructure, the commander of U.S. Cyber Command told Congress on Thursday.

“Those attacks are coming and I think those are near term and we’re not ready for them,” said Army Gen. Keith Alexander, head of Cyber Command and also outgoing director of the National Security Agency.

Alexander, in prepared testimony to the Senate Armed Services Committee, sounded the alarm on the need for better cyber-attack and defense capabilities. He said the command’s priorities include setting up a secure “defensible” telecommunications architecture, training cyber warfare personnel, increasing intelligence data on global cyber threats, and clarifying lines of authority for conducting cyber-attacks and defending government and private networks.”

Excuse me?  The attacks are not coming, they are here and getting worse, ignored, not reported immediately and swept under the carpet!  That is why I cannot understand why they call it Cyber Command, as they are not in command!

Trusted Remedy is more in command for “Shutting the Front Door” than the American Government.  Fact, not fiction…

The failure of cyber security is not knowing your password and importantly remembering it or where you wrote it down.  Passwords are not the answer as they are so easy to hack, after all, we humans take the easy way out, as we cannot remember birthdays, anniversary or the name of the guy behind the lunch counter you see every day.

So who is this RED TAGGED?  

A company, who, for the last twenty years has protected more computer data, both personal and corporate from the new cyber terrorists who steal the information directly from the files on your Desktop PC/Mac, Laptop, Tablet and Smart Mobile Phone.  They get so close you can smell their hardware.  They do not spill blood, they spill the inner most secrets of your life, both business and pleasure.  Some and most should never see the light of day.

RED TAGGED END2END ENCRYPTION (E3) Trusted Remedy was created because there was nothing out there in the computer security world that protected data, was easy to manage and worked!  Hence, the Secure Connection Solution for Data in Motion or In-Transit of today.  

Passwords are useless, so to speak, on an education campus they get passed around, households all use the same one and most are so easy and connected to birthdays, anniversaries or so ridiculous you forget them or keep them on a torn piece of paper in your clutch or wallet.

The human element lets us down every time and that is why we have created a hallway or corridor that is totally secure.  It not only Shuts the Front Door, It Shuts the Back Door Too!  It allows your device to speak!

It is all about connections, secure connections without a human element.  It is your device, Desktop PC/Mac, Laptop, Tablet and Smart Mobile Phone, they are your token, it negates the password, so to speak.

It is the ability to know that your Data in Motion is a mere blip in transference and all is transparent in it actions.  It is not some elongated action that takes forever or lives on the Internet way after you are gone. 

Trusted Remedy is short lived certificate solution based on your device’s DNA, sorry to be technical for the first time.

Trusted Remedy turns your device into a token with no need of a password if you like. Secondly, it is not the server side that causes the problem, but the Man in the Middle and Phishing attacks

Only with Trusted Remedy you can use 123456 as a password because without the device, even using the right log-in and password, the connection is blocked! 

Even in a consumer environment Trusted Remedy will secure your desktop PC/Mac, laptop, tablet, smart mobile phone to have fully secure transactions with your bank, your website, corporate data servers, secure your bank card transaction at Target, the gas pump or the local restaurant, even your Linked In page!

The Hacker, Phisher or Man in the Middle Brutal Attacker will do anything to steal your information and never even meet you.  Whilst you swipe your bankcard, they swipe/steal your inner most personal information.  You are violated in a way that is difficult to explain. 

When it happens to you, and it will, you will understand the turmoil they will put you through and will kick yourself that you did not take notice of what you can do to protect all your information, computer based devices, your business and importantly your clients/customers.

So what about you?  Ready to corporately and personally understand what has to happen to protect Data in Motion or In-Transit? 

Then we must talk. 

This is a commercial solution that will Shut Both the Front and Back Doors with a secure connection.

WE are in the NOW and
KEEP YOU; in the KNOW…

Worldwide Call: +1 (614) 655.1247



Copyright 2015

Tuesday, December 8, 2015

The Truth Does Not Take Sides...

The Truth Does Not Take Sides...
by Nick Ashton, CEO/CTO, CommSmart Global Group of Companies

John Locke (1632–1704)  stated:

"Let us then suppose the mind to be, as we say, white paper void of all characters, without any ideas; how comes it to be furnished? Whence comes it by that vast store, which the busy and boundless fancy of man has painted on it, with an almost endless variety? Whence has it all the materials of reason and knowledge? To this I answer, in one word, from experience: in that, all our knowledge is founded; and from that it ultimately derives itself."

We start with a blank page and delve into what we have been taught, learned and searched out for ourselves.  Only mindless people can be indoctrinated, shallow individuals without cause by someone else.  Their fluidity of reason and action is likened to that of a puppet, controlled by the Master Puppeteer.

Locke clearly believes that we are born with a variety of faculties that enable us to receive and process information (the senses, memory, our ability to use language, explored in some detail in his Book III of the Essay) and to manipulate it once we have it, but what we don’t have is innate knowledge or ideas. These have to be introduced to us and it is in the method of introduction that the issues of indoctrination fall.

But there is much more to it than that. Locke believed deeply in humanity. He was not a secular thinker, in fact he was a devout believer in God, but he thought that the God-given faculties we possess, especially the ability to reason, gave us a unique place in nature which we should take full advantage of. Locke was a political animal, intimately involved in the changes taking place in England at the time, and a great believer in individual freedom. His was a political project and his interest in the mind had a practical purpose behind it – he wanted to transform society and organise it in a rational way. His rejection of innate ideas was intimately linked to this project for it is all too easy to claim all sorts of principles as innate in order to maintain the status quo, meaning that people “might be more easily governed by, and made useful to some sort of men, who has the skill and office to principle and guide them. Nor is it a small power, it gives one man over another, to have the authority to be the dictator of principles, and teacher of unquestionable truths; and to make a man swallow that for an innate principle, which may serve his purpose, who teacheth them.”

You better understand this, as our forefathers based the whole Declaration Independence and the U.S. Constitution on John Locke's works and writings.

Truth, what is truth?  
  • Is it true that there are those that wish us all harm and want us out of the way? 
  • Is it true that there are individuals that want and will steal what is rightfully yours?
  • Is it true you believe that a government will solidly protect you from all of this?
  • Why is it you believe this?  Have you been hypnotized or indoctrination to believe and trust these statements?
But what is the truth in Locke's eyes?

Isn't the truth relative to each individual (this is a position called "epistemic relativism")? Don't I have my own truth which might be different from yours?
The short answer is, NO. Most people who propose Relativism of this type are simply confused about what the word 'truth' means. So, let's be clear about what the word means:

Definition: 'Truth' means, however the universe actually is.

Just because someone says it, it does not have to be true.

This is the case of Radicalized Religious Extremists who twist the words of Prophets for there own liking.  It is is not just Christians and Muslims that have used this through the ages.

Today the focus is on Radicalized Muslims who have a track record of killing in the most barbaric way and want we call a civilized world to support their actions. if we do not, they will kill us all.

Their actions are irrational and erratic in nature and use the Fear Factor to instill their sadistic message.

It is no good chopping the head off the snake, it must be exterminated entirely by a collective global force.

These radicals are not the only ones attacking us, a digital war which involves us all, every second of the day is being waged against us.  It is being disregarded by the corporate world and leaving us all in harm's way.

The Internet of Things as some are calling it, is actually an uncontrollable tragedy that will be responsible for the demise of people.  It does not have to be this way.

Hacking and controlling our utilities, power, gas, water, sewage and transportation are susceptible to being compromised and must be addressed now, not next week or next month, but NOW!

It is not just they have the ability to steal your financial and personal data, totally messing up your life.  It is the fact they want to do this and know that businesses are allowing it to happen!

Cyber failure is more costly that radical terrorists!

These are the facts, the truth...  YOU, not a government can only protect YOU!

The Truth Does Not Take Sides...

www.redtagged.us
Email: truth@redtagged.us

Telephone: 
North America: +1 (614) 655.1247
Europe:             + 31 6 11 30 3489

copyright 2015 





Monday, December 7, 2015

Nearly every major bank is using second-rate security to guard its website.

Nearly every major bank is using second-rate 
security to guard its website.

Capital One, JPMorgan Chase, Suntrust, Wells Fargo -- none of them use what's commonly referred to as the "best practice" in the industry when it comes to Web security.

The worst offenders are HSBC and TD Bank.

We can change that right now!  (Full Whitepaper is available with NDA/LOI)

Secure online access is a true reality 

Healthcare, Banking, Insurance,Big Box, Loyalty programs, SAS...
With Red Tagged (E3) easily managed digital certificate and device recognition solution.


Our solution is a (virtual) appliance based product which seamlessly fits into your existing network infrastructure. It automatically creates, distributes, and (de)installs, short-lived X.509 user certificates with corresponding cryptographic key-pairs, for the purpose of user & device credentialing and secure access control.

X.509 is the industry standard since the 1980’s and is supported by all major network components and enterprise application solutions, making it the perfect unified access control solution.


Thus far managing X.509 certificates has been one of the greatest cost factors in high secure environments, mainly caused by the required administration efforts.

By re-using your existing authentication environment, optionally leveraging it with our trusted corporate & Bring Your Own Device (BYOD) device recognition, reducing the lifecycle of the certificate, and ultimately automating the certificate requests, creation, distribution and (de)installation; certificate management has become easy as pie with our Trusted Device solution.

It not only secures the sending of user authentication credentials and enables encrypted access to the network to the highest level to protect against harsh attack vectors such as Man-in-the-Middle and brute force, but it also helps to significantly reduce cost.

Administrators have less work in configuring networks for different kinds of authentication, but end-users can also become more productive thanks to Single Sign-On to applications and network environments.

INDUSTRY PRACTICAL APPLICATIONS 

Identifying your trusted employee and partner devices to conveniently yet securely access your corporate applications is the most common use. Frequently in combination with existing HP, Palo Alto, Cisco, F5, CheckPoint, Juniper, and/ or a range of Open products.

Smartphone app builders commonly face their app data-stream and app-server getting hacked. Our API can be your security module in your app.

Secure app and machine-to-machine communication is a necessity nowadays as well: vending-machines communicating their daily sales, ATM’s communicating wirelessly with the bank, IP-camera’s securely sending their video feeds, medical devices sending privacy sensitive patient data to online patient dossiers, and much more. End2End Encryption is right.

We handle it all, for dozens up to hundreds of millions of users and devices.

Passwords are the cause of the majority of the cyber-attack issues and we still use them!

Red Tagged (E3) End2End Encryption uses a Device DNA which each device or machine has. It is the device that is authenticated and not reliant on a user password that can be taken to another device and used as the log-in.

Yes, we can still have a password, but that is not the key to entering the system. Many safeguards can be in place also, from GPS location, Geo-Fencing and many others, the key is the Device DNA which is created at the authorization stage and is extracted from the device in many ways and elements.

Desktop, laptop, tablet, Smartphone it does not matter, the days of concern for BYOD are gone! You just setup internally a SOP (Standard Operating Procedure) for usage to the corporate servers.

The connection is universal, meaning even in Wi-Fi Hotspots conferences or hotels the solution protects and serves the security factors on both sides.

Firewall & VPN Integration 

For effective enterprise perimeter, internal, and Web security, integration with existing Firewalls is a must-have. All known enterprise firewall and VPN solution providers support the X.509 standard

Secure Application Access 
Secure access to online applications is generally made possible through the use of HTTPS.

By simply enforcing the requirement of client side digital certificates on the target server or firewall or VPN, you effectively create a highly secure 2-way SSL authenticated encrypted tunnel over TLS.

This feature is by default supported by all major server side Operating Systems, and all major enterprise application solution suppliers. Such as: Microsoft, Cisco, Juniper, CheckPoint, Palo Alto, HP, IBM, SAP, Oracle, “open” solutions, and many others.

High Availability 

Built-in high availability feature, allowing for each instance to be aware of the health status of all other End2End Encryption (E3) instances. As a result, should an appliance ever become unavailable, automatically another can take over, without you having to rely on 3rd party high availability solutions.


(E3) delivers a unified architecture for perimeter, internal and web based access control, based on the industry standard X.509 digital certificates.

Product description
End2End Encryption (E3) issues short lived certificates and has an automated registration authority module, providing comprehensive easy to use and administer secure access to your existing network and cloud infrastructure.

Product Key Features

• IPv4 and IPv6 supported

• On-board high availability support

• RFC compliant standard X.509

• Short life validity for certificates

• New unique encryption keys with each issued certificate

• 1024 - 4096 bit RSA encryption keys

• Automated certificate processing

• Use existing authentication methods

• Optional trusted hardware recognition and management

• Runs also under your existing CA

Product Benefits

• Provides advanced application and network protection for changing threats including Phishing, Man-in-the-Middle and anonymous Brute Force attacks

• Enables a wide range of secure branch and remote-access options

• Streamlines security administration and lowers management cost

• Makes federated identity a reality

• Corporate laptop & smartphone usage

• Machine to machine usage

• Internet of Things supported



Telephone:
North America: +1 (614) 655.1247
Europe: +31 6 11 30 3489

copyright 2015

Radical Islamic Terrorists, Hackers, Phishers and Man in the Middle Brutal Attackers

Radical Islamic Terrorists, Hackers, Phishers and Man in the Middle Brutal Attackers
by Nick Ashton, CEO/CTO, CommSmart Global Group of Companies

Terrorist Are Attacking & Killing, Instilling Fear Worldwide. Cyber Criminals/Terrorists Are Stealing Digital Information & Using What is Rightfully Yours.  Ruining Your Life and Instilling Fear Of A Normal Life.

Having been involved in physical and cyber terrorism since the 1970's, the statement by the American president to the nation, is more than concerning.

It has taken him seven years to admit that there are terrorist who are using Islam to terrorizing the world?  Religion has been used in a radical form since they were introduced, as a controlling community tool.  Organized religion has been with us since the concerns of the Emperors of Rome and the emergence of Christ.  Mohammed came 600 years later.

The world's oldest religion still being practiced today is Hinduism (known to adherents as 'Sanatan Dharma', Eternal Order) but, in what is considered 'the west', the first records of religious practice come from Egypt around 4000 BCE. 

Organized religion encompasses them all, Catholic, Baptist, Church of England, Methodists, Presbyterian, Muslim, Judaism, Assembly of God  and any other denomination that is out there practicing their organized beliefs.

Hackers, Phishers and Man in the Middle Brutal Attackers are also organized and use the Dark Web to practice their digital terror and thievery.  In fact these miscreants do more damage that all of radical terrorism put together.  No, they are not using the bomb or bullet, they are using the fact that our digital cyber world is unprotected.  

Cyber security is the responsibility of us all!

Corporate cyber security is a Duty of Care and a Corporate Governance.  Failure at this level is shameful and makes the BRAND, shareholders and more importantly, the customers and clients extremely vulnerable.

Stop the procrastination on what to do, just take action to have the finest protection and solutions.

Logical proactive solutions are here with Red Tagged and our worldwide team can assist those that wish to do the right thing.

www.redtagged.us


Email: redtagged@redtagged.us

Telephone: 
North America: + 1 (614) 655.1247
Europe:             + 31 6.11.30.3489

copyright 2015




Friday, December 4, 2015

Come On, It Is A Humping Duck!


Come On, It Is A Humping Duck!
by Nick Ashton, CEO/CTO, CommSmart Global Group of Companies

Update


SoCal jihadist wife reportedly pledged allegiance to ISIS before massacre

San Bernardino shooting: Policeman speaks of carnage at scene - BBC

Investigators probe whether wife radicalized husband before San Bernardino massacre


Having law enforcement doing the background on this heinous crime, it is evident it was terror related.  For Goodness sake Mr. President, it walks and talks like a DUCK!  Radicals are among us and you seem to have a different agenda, WHY?

It is no good telling Pork Pies (lies) regarding this major concern for us all.  It is no good cutting off the head of the snake, we must annihilate this deadly group worldwide.    

It is a Humping Duck!

Corporately and individually you must be aware of those of around you! 

See Something, say Something...

Having been involved in counterterrorism since 1976, especially with terroristic groups worldwide. United Kingdom, Liberia, Germany, Italy, the Netherlands, Iraq and Afghanistan are all physical locations I have worked and been involved first hand.  Which has allowed us to have a street level understanding of the progression of terrorism, both physical and cyber.

Our team is worldwide, in all interconnected fields of both physical and cyber counterterrorism.

There is never the possibility of 100% security.  When a government states "there are no credible threats that they know of", is correct.  It is impossible to know everything, no matter how sophisticated the technology is, that they are using.

I can state we have gone beyond the norm of protection and have the ability to have real time knowledge, which is available and capable to enhance the developing situations we are facing daily.

Today, it is a combination of older solid techniques, mixed with newer and cutting edge proven solutions.  It really comes down to Atmosphericschatter on the street, in the social media world and telephonic and data communications.  

There are not enough people in the world to track known or suspected physical and cyber terrorists.  The U.K. have 1,500 possible terrorist under their watchful eye, the U.S.A, only 48.

Listening, watching and getting into the heads of these people is not like you see in the movies.  The legwork is much deeper and takes much longer and law enforcement cannot work alone.  They need the public's assistance, hence "See Something, Say Something" program.




We are connected with law enforcement and have excellent dialogue with full logical understanding of the daily issues being faced.  

Our Fusion Center based in Europe is a 24/7 operation with the greatest minds and a work ethic, second to none.  We have a presence in the Midwest of America and have boots on the ground with effective communications.

Our expertise in cyber and physical terrorism, viewed from today's perspective, only works when you have a complete understanding of the transformation of communications and information dissemination which continues to revolve. 

The mindset of both forms of terrorism change daily as we live and breath.  The incident in San Bernardino of December 2nd, 2015 is a prime example of events that have, can and will unfold again and again.  America is the center of violent workplace attacks over one per day nationwide.  Is it that the public is blind to the issues and want to keep themselves to themselves?  The NIMBY effect which is so deadly and must change!

It does not matter if it was a domestic or international terrorism act, it happened and people died.  If proven it was a Daesh connected act as a Lone Wolf operation, then we can and will address in the strongest and direct terms.

The Internet has made a radical change to life in more ways than one. Connected is an understatement!  There are no degrees of separation whatsoever and whilst it is allowing for terrorist groups to roam the world, out of control, it will continue, escalate and whilst unchecked and change our lives once more, forever more.

CommSmart Global Group of Companies, which includes Red Tagged, the leading team of understanding and implementing security methods, both physical and cyber is making it known that they collectively are available for consultation with full solutions on all levels of communications and information protection.

Governments must allow private enterprise to work hand in hand with them. Corporations, who are the lifeblood of employment must also protect the third party data they have been entrusted with.  

Cyber crime/terrorism is more devastating globally than the bomb or the bullet.  
Nothing must stand in the way of securing us all.  Do not just be informed

www.redtagged.us                 www.commsmart-global.com


redtagged@redtagged.us

copyright 2015

Thursday, December 3, 2015

San Bernardino Deadly Attack Sadly is a Training Video for Both Terrorists & Law Enforcement

San Bernardino Deadly Attack Sadly is a 
Training Video for Both Terrorists & Law Enforcement
by Nick Ashton, CEO/CTO, CommSmart Global Group of Companies

Having been involved in counterterrorism since 1976, especially with terroristic groups worldwide. United Kingdom, Liberia, Germany, Italy, the Netherlands, Iraq and Afghanistan are all physical locations I have worked and been involved first hand.  Which has allowed us to have a street level understanding of the progression of terrorism, both physical and cyber.

Our team is worldwide, in all interconnected fields of both physical and cyber counterterrorism.

There is never the possibility of 100% security.  When a government states "there are no credible threats that they know of", is correct.  It is impossible to know everything, no matter how sophisticated the technology is, that they are using.

I can state we have gone beyond the norm of protection and have the ability to have real time knowledge, which is available and capable to enhance the developing situations we are facing daily.

Today, it is a combination of older solid techniques, mixed with newer and cutting edge proven solutions.  It really comes down to Atmospherics, chatter on the street, in the social media world and telephonic and data communications.  

There are not enough people in the world to track known or suspected physical and cyber terrorists.  The U.K. have 1,500 possible terrorist under their watchful eye, the U.S.A, only 48.

Listening, watching and getting into the heads of these people is not like you see in the movies.  The legwork is much deeper and takes much longer and law enforcement cannot work alone.  They need the public's assistance, hence "See Something, Say Something" program.



We are connected with law enforcement and have excellent dialogue with full logical understanding of the daily issues being faced.  

Our Fusion Center based in Europe is a 24/7 operation with the greatest minds and a work ethic, second to none.  We have a presence in the Midwest of America and have boots on the ground with effective communications.

Our expertise in cyber and physical terrorism, viewed from today's perspective, only works when you have a complete understanding of the transformation of communications and information dissemination which continues to revolve. 

The mindset of both forms of terrorism change daily as we live and breath.  The incident in San Bernardino of December 2nd, 2015 is a prime example of events that have, can and will unfold again and again.  America is the center of violent workplace attacks over one per day nationwide.  Is it that the public is blind to the issues and want to keep themselves to themselves?  The NIMBY effect which is so deadly and must change!

It does not matter if it was a domestic or international terrorism act, it happened and people died.  If proven it was a Daesh connected act as a Lone Wolf operation, then we can and will address in the strongest and direct terms.

The Internet has made a radical change to life in more ways than one. Connected is an understatement!  There are no degrees of separation whatsoever and whilst it is allowing for terrorist groups to roam the world, out of control, it will continue, escalate and whilst unchecked and change our lives once more, forever more.

CommSmart Global Group of Companies, which includes Red Tagged, the leading team of understanding and implementing security methods, both physical and cyber is making it known that they collectively are available for consultation with full solutions on all levels of communications and information protection.

Governments must allow private enterprise to work hand in hand with them. Corporations, who are the lifeblood of employment must also protect the third party data they have been entrusted with.  

Cyber crime/terrorism is more devastating globally than the bomb or the bullet.  
Nothing must stand in the way of securing us all.  Do not just be informed

www.redtagged.us                 www.commsmart-global.com



copyright 2015

Tuesday, December 1, 2015

Once More Unto the Cyber Breach Dear Friends, Once More...


Once More Unto the Cyber Breach Dear Friends, Once More...

By Nick Ashton and Will S., RedTagged.us

Once more unto the Cyber Breach, dear friends, once more;
Or close the firewall up with our Hacked & Phished dead.
In peace there's nothing so becomes a man
As modest stillness, humility
of personal information when safe and private:
But when the blast of Cyber war blows in our ears, eyes and wallets,
Then imitate the action of the tiger;
Stiffen the sinews, summon up the blood,
Disguise fair nature with hard-favour'd rage;
Then lend the eye a terrible aspect of Financial and Brand ruination;
Let pry through the portage of the Hacker’s head
Like the brass cannon; let the brow o'erwhelm it
As fearfully as doth a galled rock
O'erhang and jutty his confounded Cyber stolen base,
Swill'd with the wild and wasteful actions of his mind and fingers.
Now set the teeth and stretch the nostril wide,
Hold hard the breath and bend up every true trusted Cyber spirit
To its full height. On, on, you noblest Internet People.
Whose blood is fet from fathers of Cyber war-proof!
Fathers that, like so many Alexanders,
Have in these parts from morn till even fought
And sheathed their swords for lack of argument:
Dishonour not your mothers; now attest
That those whom you call'd fathers (corporations) did beget you.
Be copy now to men of grosser blood,
And teach them how to war. Proactive Cyber Security is for now
And you, good yeoman,
Whose limbs were made by those you trusted and respected, show us here
The mettle of your pasture; let us swear, WTF…
That you are worth your breeding; which I doubt not;
For there is none of you so mean and base,
That hath not noble security lustre in your eyes.
I see you stand like greyhounds in the slips,
Straining upon the start. The game's afoot:
Follow your spirit, and upon this Cyber security charge
Cry 'God for Sanity, Worldwide Web, and Information Security!'

Let your keyboards roar take charge of your Privacy…


Monday, November 30, 2015

The Battle Cry Of Cyber Monday

The Battle Cry Of This Day, 

The Feast of Cyber Hackers & Phishers
by Nick Ashton, redtagged.us


This day is call’d the Feast of Hackers, Phishers

& Man in the Middle Brutal Attackers.

St. Expedite, their patron saint and allout slime bucket.

He or She that outlives this day, and comes safe home,
Will stand a tip-toe when this day is nam’d,
And rouse them at the name of Cyber Monday.


They that shall live this day, and see old age
with their financial information intact and money 
at their disposal and their identity safe.

Will yearly on the vigil feast his neighbours,
And say “Today was Saint Expedite's Day.”


Then they will strip their sleeves, wallets and 

bank/credit/debit card statements and show the scars,
And say “These financial wounds I had on Cyber Monday's Day.”


Old men forget; yet all shall not be forgot,
But they’ll remember, with dis-advantages,
What feats that did that day. Of Hackers preying on their addiction

and their own lack of Cyber Security,
which they had entrusted to fools.

Then shall the names of whence they shopped on-line,
Familiar in his mouth as household words—
Amazon, Target and Walmart, Best Buy,
JCP and Macy's, EBay and Google


Be in their flowing annoying cups freshly rememb’red.
This story shall the good man teach his son and daughter;
And Cyber Monday shall ne’er go by.


From this day to the ending of the world,
But we in it shall be remember'd-


We few, we happy few, we band of brothers;
For he to-day that sheds his blood and spends cash with me.


Purchasing face to face, eye to eye and transporteth themselves

Shall be my brother; be he ne’er so vile.

This day shall act gentle on his or her shopping condition;
And gentlemen and ladies in the world now a-bed
Shall think themselves accurs’d they were not here,
And hold their manhoods cheap whiles any speaks.

That fought with us upon Cyber Monday.



copyright 2015