Friday, December 4, 2015

Come On, It Is A Humping Duck!


Come On, It Is A Humping Duck!
by Nick Ashton, CEO/CTO, CommSmart Global Group of Companies

Update


SoCal jihadist wife reportedly pledged allegiance to ISIS before massacre

San Bernardino shooting: Policeman speaks of carnage at scene - BBC

Investigators probe whether wife radicalized husband before San Bernardino massacre


Having law enforcement doing the background on this heinous crime, it is evident it was terror related.  For Goodness sake Mr. President, it walks and talks like a DUCK!  Radicals are among us and you seem to have a different agenda, WHY?

It is no good telling Pork Pies (lies) regarding this major concern for us all.  It is no good cutting off the head of the snake, we must annihilate this deadly group worldwide.    

It is a Humping Duck!

Corporately and individually you must be aware of those of around you! 

See Something, say Something...

Having been involved in counterterrorism since 1976, especially with terroristic groups worldwide. United Kingdom, Liberia, Germany, Italy, the Netherlands, Iraq and Afghanistan are all physical locations I have worked and been involved first hand.  Which has allowed us to have a street level understanding of the progression of terrorism, both physical and cyber.

Our team is worldwide, in all interconnected fields of both physical and cyber counterterrorism.

There is never the possibility of 100% security.  When a government states "there are no credible threats that they know of", is correct.  It is impossible to know everything, no matter how sophisticated the technology is, that they are using.

I can state we have gone beyond the norm of protection and have the ability to have real time knowledge, which is available and capable to enhance the developing situations we are facing daily.

Today, it is a combination of older solid techniques, mixed with newer and cutting edge proven solutions.  It really comes down to Atmosphericschatter on the street, in the social media world and telephonic and data communications.  

There are not enough people in the world to track known or suspected physical and cyber terrorists.  The U.K. have 1,500 possible terrorist under their watchful eye, the U.S.A, only 48.

Listening, watching and getting into the heads of these people is not like you see in the movies.  The legwork is much deeper and takes much longer and law enforcement cannot work alone.  They need the public's assistance, hence "See Something, Say Something" program.




We are connected with law enforcement and have excellent dialogue with full logical understanding of the daily issues being faced.  

Our Fusion Center based in Europe is a 24/7 operation with the greatest minds and a work ethic, second to none.  We have a presence in the Midwest of America and have boots on the ground with effective communications.

Our expertise in cyber and physical terrorism, viewed from today's perspective, only works when you have a complete understanding of the transformation of communications and information dissemination which continues to revolve. 

The mindset of both forms of terrorism change daily as we live and breath.  The incident in San Bernardino of December 2nd, 2015 is a prime example of events that have, can and will unfold again and again.  America is the center of violent workplace attacks over one per day nationwide.  Is it that the public is blind to the issues and want to keep themselves to themselves?  The NIMBY effect which is so deadly and must change!

It does not matter if it was a domestic or international terrorism act, it happened and people died.  If proven it was a Daesh connected act as a Lone Wolf operation, then we can and will address in the strongest and direct terms.

The Internet has made a radical change to life in more ways than one. Connected is an understatement!  There are no degrees of separation whatsoever and whilst it is allowing for terrorist groups to roam the world, out of control, it will continue, escalate and whilst unchecked and change our lives once more, forever more.

CommSmart Global Group of Companies, which includes Red Tagged, the leading team of understanding and implementing security methods, both physical and cyber is making it known that they collectively are available for consultation with full solutions on all levels of communications and information protection.

Governments must allow private enterprise to work hand in hand with them. Corporations, who are the lifeblood of employment must also protect the third party data they have been entrusted with.  

Cyber crime/terrorism is more devastating globally than the bomb or the bullet.  
Nothing must stand in the way of securing us all.  Do not just be informed

www.redtagged.us                 www.commsmart-global.com


redtagged@redtagged.us

copyright 2015

Thursday, December 3, 2015

San Bernardino Deadly Attack Sadly is a Training Video for Both Terrorists & Law Enforcement

San Bernardino Deadly Attack Sadly is a 
Training Video for Both Terrorists & Law Enforcement
by Nick Ashton, CEO/CTO, CommSmart Global Group of Companies

Having been involved in counterterrorism since 1976, especially with terroristic groups worldwide. United Kingdom, Liberia, Germany, Italy, the Netherlands, Iraq and Afghanistan are all physical locations I have worked and been involved first hand.  Which has allowed us to have a street level understanding of the progression of terrorism, both physical and cyber.

Our team is worldwide, in all interconnected fields of both physical and cyber counterterrorism.

There is never the possibility of 100% security.  When a government states "there are no credible threats that they know of", is correct.  It is impossible to know everything, no matter how sophisticated the technology is, that they are using.

I can state we have gone beyond the norm of protection and have the ability to have real time knowledge, which is available and capable to enhance the developing situations we are facing daily.

Today, it is a combination of older solid techniques, mixed with newer and cutting edge proven solutions.  It really comes down to Atmospherics, chatter on the street, in the social media world and telephonic and data communications.  

There are not enough people in the world to track known or suspected physical and cyber terrorists.  The U.K. have 1,500 possible terrorist under their watchful eye, the U.S.A, only 48.

Listening, watching and getting into the heads of these people is not like you see in the movies.  The legwork is much deeper and takes much longer and law enforcement cannot work alone.  They need the public's assistance, hence "See Something, Say Something" program.



We are connected with law enforcement and have excellent dialogue with full logical understanding of the daily issues being faced.  

Our Fusion Center based in Europe is a 24/7 operation with the greatest minds and a work ethic, second to none.  We have a presence in the Midwest of America and have boots on the ground with effective communications.

Our expertise in cyber and physical terrorism, viewed from today's perspective, only works when you have a complete understanding of the transformation of communications and information dissemination which continues to revolve. 

The mindset of both forms of terrorism change daily as we live and breath.  The incident in San Bernardino of December 2nd, 2015 is a prime example of events that have, can and will unfold again and again.  America is the center of violent workplace attacks over one per day nationwide.  Is it that the public is blind to the issues and want to keep themselves to themselves?  The NIMBY effect which is so deadly and must change!

It does not matter if it was a domestic or international terrorism act, it happened and people died.  If proven it was a Daesh connected act as a Lone Wolf operation, then we can and will address in the strongest and direct terms.

The Internet has made a radical change to life in more ways than one. Connected is an understatement!  There are no degrees of separation whatsoever and whilst it is allowing for terrorist groups to roam the world, out of control, it will continue, escalate and whilst unchecked and change our lives once more, forever more.

CommSmart Global Group of Companies, which includes Red Tagged, the leading team of understanding and implementing security methods, both physical and cyber is making it known that they collectively are available for consultation with full solutions on all levels of communications and information protection.

Governments must allow private enterprise to work hand in hand with them. Corporations, who are the lifeblood of employment must also protect the third party data they have been entrusted with.  

Cyber crime/terrorism is more devastating globally than the bomb or the bullet.  
Nothing must stand in the way of securing us all.  Do not just be informed

www.redtagged.us                 www.commsmart-global.com



copyright 2015

Wednesday, December 2, 2015

STOLEN DATA & INFORMATION - It Is Not A Blame Game, It Is YOU!

STOLEN DATA & INFORMATION
It Is Not A Blame Game, It Is YOU!
By Nick Ashton, www.redtagged.us 

The "Blame Someone Else Syndrome" is alive and sick, living within you. 

Please give up on the idea that others care, will protect you and telling you the truth, when it comes to most things in life.  

They are NOT!

Government is a perfect example, especially the leadership or those that wish to be your new leader.  They will tell you what they think and expect you want to hear.  Sadly, YOU, in the majority, believe them.

The Internet of Tragedy is the same way.  You have heard so many times, "it has to be true, I read it on the Internet".  Ask Al Gore and his Global Warming Cosy Buddies, oh, their answer will be a lie also!  Just listen to the group of misguided politicians in Paris on what they are saying about Global Warming.

The Internet is a Sewer and so are the Apps you continue to download onto your Smartphones and tablets.

It is stated that "the way to a man's heart is through his stomach".  The way to financial success is to steal other people's information by the billions and live a great life, whilst those you stole from, suffer.  

Why is it so easy to do to this? 

Simple, Humans have traits, which mean they fail more than they succeed.

Wanting to have the latest gadget, smartest mobile phone and be ahead of the curve is utter nonsense.  Security above all is the key and will make you far more happier in life.  It use to be that way prior to the invention of the Internet!

We use to talk, discuss, think, daydream, read books, listen to music as a collective group, went to the movies and we were happier in the way we communicated.

Then IT came along!  Yes, Information Technology and placed people in charge that had no earthly idea of the boundaries we were crossing.  No, I am not blaming them, it is us all that failed to grasp and understand, that we have released our grip at the wrong time.  

A climber does not uncouple himself before he knows that he has secured his next move.

Parents who purchased Vtech computer toys thought they had found the perfect babysitter, until a couple days ago, when Vtech was hacked and over 5 million users information was stolen.

The Internet of Things sounds all well and good, until you realize that each day, some geek with a half brain idea, which he shares with a marketing guru, is launched without full cyber security of the information of the users and the connection.

Simple solution, we take YOU out of the picture, hold your hand and control how you enter the Internet of Things securely.  Allowing you to play at your heart's content, securely and not affecting anyone else in the room, street or a corporation.  

We isolate the security issues, shutting down the screens and cutting-off the fingers of the Hackers, Phishers and Man in the Middle Brutal Attackers.

You have failed so far and it is affecting us all.  Fear no more, we have created a comfort zone for us all.

No, we do not want to be your friends, we want to protect ourselves and enjoy life as it should be.

Yes, this is reality, available and implementation is straightforward.  Is it new? No, we have been successful for decades with "like-minded" people and now, we must expand.

Those corporately who have extremely large client databases, access via a password to services, like:
  • ISP's 
  • Cable Entertainment
  • Loyalty Programs 
  • Medical Records
  • Big Box Stores
  • Online Shopping
In fact anyone worldwide that uses the Internet corporately!

The Password is DEAD!  It is all about Device DNA...

Come join us...






copyright 2015

Tuesday, December 1, 2015

Once More Unto the Cyber Breach Dear Friends, Once More...


Once More Unto the Cyber Breach Dear Friends, Once More...

By Nick Ashton and Will S., RedTagged.us

Once more unto the Cyber Breach, dear friends, once more;
Or close the firewall up with our Hacked & Phished dead.
In peace there's nothing so becomes a man
As modest stillness, humility
of personal information when safe and private:
But when the blast of Cyber war blows in our ears, eyes and wallets,
Then imitate the action of the tiger;
Stiffen the sinews, summon up the blood,
Disguise fair nature with hard-favour'd rage;
Then lend the eye a terrible aspect of Financial and Brand ruination;
Let pry through the portage of the Hacker’s head
Like the brass cannon; let the brow o'erwhelm it
As fearfully as doth a galled rock
O'erhang and jutty his confounded Cyber stolen base,
Swill'd with the wild and wasteful actions of his mind and fingers.
Now set the teeth and stretch the nostril wide,
Hold hard the breath and bend up every true trusted Cyber spirit
To its full height. On, on, you noblest Internet People.
Whose blood is fet from fathers of Cyber war-proof!
Fathers that, like so many Alexanders,
Have in these parts from morn till even fought
And sheathed their swords for lack of argument:
Dishonour not your mothers; now attest
That those whom you call'd fathers (corporations) did beget you.
Be copy now to men of grosser blood,
And teach them how to war. Proactive Cyber Security is for now
And you, good yeoman,
Whose limbs were made by those you trusted and respected, show us here
The mettle of your pasture; let us swear, WTF…
That you are worth your breeding; which I doubt not;
For there is none of you so mean and base,
That hath not noble security lustre in your eyes.
I see you stand like greyhounds in the slips,
Straining upon the start. The game's afoot:
Follow your spirit, and upon this Cyber security charge
Cry 'God for Sanity, Worldwide Web, and Information Security!'

Let your keyboards roar take charge of your Privacy…


Monday, November 30, 2015

The Battle Cry Of Cyber Monday

The Battle Cry Of This Day, 

The Feast of Cyber Hackers & Phishers
by Nick Ashton, redtagged.us


This day is call’d the Feast of Hackers, Phishers

& Man in the Middle Brutal Attackers.

St. Expedite, their patron saint and allout slime bucket.

He or She that outlives this day, and comes safe home,
Will stand a tip-toe when this day is nam’d,
And rouse them at the name of Cyber Monday.


They that shall live this day, and see old age
with their financial information intact and money 
at their disposal and their identity safe.

Will yearly on the vigil feast his neighbours,
And say “Today was Saint Expedite's Day.”


Then they will strip their sleeves, wallets and 

bank/credit/debit card statements and show the scars,
And say “These financial wounds I had on Cyber Monday's Day.”


Old men forget; yet all shall not be forgot,
But they’ll remember, with dis-advantages,
What feats that did that day. Of Hackers preying on their addiction

and their own lack of Cyber Security,
which they had entrusted to fools.

Then shall the names of whence they shopped on-line,
Familiar in his mouth as household words—
Amazon, Target and Walmart, Best Buy,
JCP and Macy's, EBay and Google


Be in their flowing annoying cups freshly rememb’red.
This story shall the good man teach his son and daughter;
And Cyber Monday shall ne’er go by.


From this day to the ending of the world,
But we in it shall be remember'd-


We few, we happy few, we band of brothers;
For he to-day that sheds his blood and spends cash with me.


Purchasing face to face, eye to eye and transporteth themselves

Shall be my brother; be he ne’er so vile.

This day shall act gentle on his or her shopping condition;
And gentlemen and ladies in the world now a-bed
Shall think themselves accurs’d they were not here,
And hold their manhoods cheap whiles any speaks.

That fought with us upon Cyber Monday.



copyright 2015

Sunday, November 29, 2015

Saints & Cyber Sinners

Saints & Cyber Sinners
by Nick Ashton, RedTagged.us

Forget about who has been naughty or nice!

From Thanksgiving on, you should be aware of who is preying on your gluttony and greedish stupidity!

Isidoro de Sevilla (José Alcoverro) 02
Oh where for art is St. Isidore of Seville – Patron Saint of the Internet?

Yes, the man of knowledge who invented encyclopedias. Britannic rules and Wikipedia is so truthful!

The Order of St. Isidore of Seville is a chivalric order formed on January 1, 2000. An international organisation, the order aims to honour Saint Isidore as patron saint of the Internet, alongside promoting Christian chivalry online.

Wait a cotton picking nano-second! 

Chivalry online? Then who is the patron saint of Hackers and Phisher?

St. Expedite -- the unofficial patron saint of Hackers & Phishers.

Unofficial, because the Roman Catholic Church doesn't know what to do about St. Expedite. He's too pagan to be a proper saint, and too popular for his statues to be simply tossed out the door.

Statues of St. Expedite seem to appear at some churches, a puzzling phenomenon. Where do the statues come from? Who sends them? No one really seems to know who St. Expedite was in life or even if he ever existed.

But whatever St. Expedite may or may not be, geeks, hackers, phishers, man in the middle brutal attackers, repentant slackers, folks who run e-commerce sites and those who rely on brains and sheer luck to survive have all claimed the saint as their own.

So as you go about your Cyber shopping, you are being watched over by those that fail to protect your financial information they have amassed on you and digitally pray they do not suffer from "Target Syndrome" by allowing the Hackers to steal what is rightfully yours.

On the other hand, Hackers & Phishers are preying with their Saint Expedite on your foolishly clicking of websites, with offers that are so not real, stealing all of your financial information and identity, sending you to that never ending circle of failed customer service and banking nightmare.  They hoovering over Wi-Fi Hotspots, who the Internet Service Providers tell you are safe.  They are tell telling "Pork Pies", little lies as any cockney will tell you.

So next time you hear the words at the supermarket checkout, "Paper Or Plastic", go for paper, with real money and the goods in front of you.

Happy Cyber Sunday, Monday and the rest of the buying and hacking days 'til Christmas.  

From Jolly Old St. Nick



copyright 2015