Wednesday, December 9, 2015

Are We Not One Nation?

Are We Not One Nation?
by Nick Ashton, CEO/CTO, CommSmart Group of Companies

The media and the water cooler are surrounded with discussion on who said what and why.  

Some, will never express their personal views and only think them within, agreeing on the comments, but hiding their true emotions as they feel it is not politically correct to do so.  

That is Bovine Slurry in its worst form!

As a nation, the United States must act as one.  Protection of well-being in all manners is demanded.  Security of our borders, who we let in to live among us and the protection all we do in daily lives.  That includes all information regarding us and our families, friends and importantly our business and livelihoods. 

Radical Islamic Terrorist, Hackers, Phishers and Man in Middle Brutal Attackers have overtaken burglaries, scammers and street level drugs in some cases.

The Internet of Things or Tragedy is ruining our lives.  Unprotected sex leads to STD's, pregnancy and even worse afflictions.  Unprotected Internet connections, using limited security measures or worse, none at all, is causing us all to be susceptible to harm in very personal ways.  

The more devices that are now being created to use the Internet without security measures in place, are causing the meltdown of cyber security.

Those corporations who have your personal and financial information, which you have entrusted are failing daily in cyber protection.  In fact, they are failing to notify you when they are hacked and leaving you in the dark regarding your vulnerability.

The issue of Terrorism is a major and Radical Terrorists are using private networks to communication which are encrypted with no back door to be checked by government for our safety.

I do believe in the corporate world, backdoors are not required as it is still an opening that can be undone and opened.

Our Red Tagged (E3) End2End Encryption utilizes an encrypted secure, invisible connection for all data in motion, including VoIP.  This is a military grade RSA 4096 bit encryption and way beyond the banking standards of RSA 256 bit encryption.  

A proven solution in place for the last ten years in Europe.  Now available worldwide. Acceptable by all world governments as a secure method of transmitting information and communications.

Even more acceptable, (E3) works on all platforms and devices.  You have no need to purchase special devices, Smartphones, Tablets etc.

Bring Your Own Device (BYOD) is now totally acceptable and secure.

Contact us for more details.

If we go back to John Locke and his 2nd Treatise of Government, chapter 9, it makes interesting reading and makes points regarding security in life. (read more below)


www.redtagged.us


Email: redtagged@redtagged.us
Telephone:
North America: +1 (614) 655.1247
Europe:           + 31 6.11.30.3489

copyright 1996-2015



John Locke, Second Treatise of Government, §§ 95--99

Written 1689

95. Men being, as has been said, by Nature, all free, equal and independent, no one can be put out of this Estate, and subjected to the Political Power of another, without his own Consent. The only way whereby any one devests himself of his Natural Liberty, and puts on the bonds of Civil Society is by agreeing with other Men to joyn and unite into a Community, for their comfortable, safe, and peaceable living one amongst another, in a secure Enjoyment of their Properties, and a greater Security against any that are not of it. This any number of Men may do, because it injures not the Freedom of the rest; they are left as they were in the Liberty of the State of Nature. When any number of Men have so consented to make one Community or Government, they are thereby presently incorporated, and make one Body Politick, wherein the Majority have a Right to act and conclude the rest.

96. For when any number of Men have, by the consent of every individual, made a Community, they have thereby made that Community one Body, with a Power to Act as one Body, which is only by the will and determination of the majority. For that which acts any Community, being only the consent of the individuals of it, and it being necessary to that which is one body to move one way; it is necessary the Body should move that way whither the greater force carries it, which is the consent of the majority: or else it is impossible it should act or continue one Body, one Community, which the consent of every individual that united into it, agreed that it should; and so every one is bound by that consent to be concluded by the majority. And therefore we see that in Assemblies impowered to act by positive Laws where no number is set by that positive Law which impowers them, the act of the Majority passes for the act of the whole, and of course determines, as having by the Law of Nature and Reason, the power of the whole.

97. And thus every Man, by consenting with others to make one Body Politick under one Government, puts himself under an Obligation to every one of that Society, to submit to the determination of the majority, and to be concluded by it; or else this original Compact, whereby he with others incorporates into one Society, would signifie nothing, and be no Compact, if he be left free, and under no other ties, than he was in before in the state of Nature. For what appearance would there be of any Compact? What new Engagement if he were no farther tied by any Decrees of the Society, than he himself thought fit, and did actually consent to? This would be still as great a liberty, as he himself had before his Compact, or any one else in the State of Nature hath, who may submit himself and consent to any acts of it if he thinks fit.

98. For if the consent of the majority shall not in reason, be received, as the act of the whole, and conclude every individual; nothing but the consent of every individual can make any thing to be the act of the whole: But such a consent is next impossible ever to be had, if we consider the Infirmities of Health, and Avocations of Business, which in a number, though much less than that of a Common-wealth, will necessarily keep many away from the publick Assembly. To which if we add the variety of Opinions, and contrariety of Interests, which unavoidably happen in all Collections of Men, the coming into Society upon such terms, would be only like Cato's coming into the Theatre, only to go out again. Such a Constitution as this would make the mighty Leviathan of a shorter duration, than the feeblest Creatures; and not let it outlast the day it was born in: which cannot be suppos'd till we can think, that Rational Creatures should desire and constitute Societies only to be dissolved. For where the majority cannot conclude the rest, there they cannot act as one Body, and consequently will be immediately dissolved again.

99. Whosoever therefore out of a state of Nature unite into a Community, must be understood to give up all the power, necessary to the ends for which they unite into Society, to the majority of the Community, unless they expressly agreed in any number greater than the majority. And this is done by barely agreeing to unite into one Political Society, which is all the Compact that is, or needs be, between the Individuals, that enter into, or make up a Common-wealth. And thus that, which begins and actually constitutes any Political Society, is nothing but the consent of any number of Freemen capable of a majority to unite and incorporate into such a Society. And this is that, and that only, which did, or could give beginning to any lawful Government in the World.

Tuesday, December 8, 2015

The Truth Does Not Take Sides...

The Truth Does Not Take Sides...
by Nick Ashton, CEO/CTO, CommSmart Global Group of Companies

John Locke (1632–1704)  stated:

"Let us then suppose the mind to be, as we say, white paper void of all characters, without any ideas; how comes it to be furnished? Whence comes it by that vast store, which the busy and boundless fancy of man has painted on it, with an almost endless variety? Whence has it all the materials of reason and knowledge? To this I answer, in one word, from experience: in that, all our knowledge is founded; and from that it ultimately derives itself."

We start with a blank page and delve into what we have been taught, learned and searched out for ourselves.  Only mindless people can be indoctrinated, shallow individuals without cause by someone else.  Their fluidity of reason and action is likened to that of a puppet, controlled by the Master Puppeteer.

Locke clearly believes that we are born with a variety of faculties that enable us to receive and process information (the senses, memory, our ability to use language, explored in some detail in his Book III of the Essay) and to manipulate it once we have it, but what we don’t have is innate knowledge or ideas. These have to be introduced to us and it is in the method of introduction that the issues of indoctrination fall.

But there is much more to it than that. Locke believed deeply in humanity. He was not a secular thinker, in fact he was a devout believer in God, but he thought that the God-given faculties we possess, especially the ability to reason, gave us a unique place in nature which we should take full advantage of. Locke was a political animal, intimately involved in the changes taking place in England at the time, and a great believer in individual freedom. His was a political project and his interest in the mind had a practical purpose behind it – he wanted to transform society and organise it in a rational way. His rejection of innate ideas was intimately linked to this project for it is all too easy to claim all sorts of principles as innate in order to maintain the status quo, meaning that people “might be more easily governed by, and made useful to some sort of men, who has the skill and office to principle and guide them. Nor is it a small power, it gives one man over another, to have the authority to be the dictator of principles, and teacher of unquestionable truths; and to make a man swallow that for an innate principle, which may serve his purpose, who teacheth them.”

You better understand this, as our forefathers based the whole Declaration Independence and the U.S. Constitution on John Locke's works and writings.

Truth, what is truth?  
  • Is it true that there are those that wish us all harm and want us out of the way? 
  • Is it true that there are individuals that want and will steal what is rightfully yours?
  • Is it true you believe that a government will solidly protect you from all of this?
  • Why is it you believe this?  Have you been hypnotized or indoctrination to believe and trust these statements?
But what is the truth in Locke's eyes?

Isn't the truth relative to each individual (this is a position called "epistemic relativism")? Don't I have my own truth which might be different from yours?
The short answer is, NO. Most people who propose Relativism of this type are simply confused about what the word 'truth' means. So, let's be clear about what the word means:

Definition: 'Truth' means, however the universe actually is.

Just because someone says it, it does not have to be true.

This is the case of Radicalized Religious Extremists who twist the words of Prophets for there own liking.  It is is not just Christians and Muslims that have used this through the ages.

Today the focus is on Radicalized Muslims who have a track record of killing in the most barbaric way and want we call a civilized world to support their actions. if we do not, they will kill us all.

Their actions are irrational and erratic in nature and use the Fear Factor to instill their sadistic message.

It is no good chopping the head off the snake, it must be exterminated entirely by a collective global force.

These radicals are not the only ones attacking us, a digital war which involves us all, every second of the day is being waged against us.  It is being disregarded by the corporate world and leaving us all in harm's way.

The Internet of Things as some are calling it, is actually an uncontrollable tragedy that will be responsible for the demise of people.  It does not have to be this way.

Hacking and controlling our utilities, power, gas, water, sewage and transportation are susceptible to being compromised and must be addressed now, not next week or next month, but NOW!

It is not just they have the ability to steal your financial and personal data, totally messing up your life.  It is the fact they want to do this and know that businesses are allowing it to happen!

Cyber failure is more costly that radical terrorists!

These are the facts, the truth...  YOU, not a government can only protect YOU!

The Truth Does Not Take Sides...

www.redtagged.us
Email: truth@redtagged.us

Telephone: 
North America: +1 (614) 655.1247
Europe:             + 31 6 11 30 3489

copyright 2015 





Monday, December 7, 2015

Nearly every major bank is using second-rate security to guard its website.

Nearly every major bank is using second-rate 
security to guard its website.

Capital One, JPMorgan Chase, Suntrust, Wells Fargo -- none of them use what's commonly referred to as the "best practice" in the industry when it comes to Web security.

The worst offenders are HSBC and TD Bank.

We can change that right now!  (Full Whitepaper is available with NDA/LOI)

Secure online access is a true reality 

Healthcare, Banking, Insurance,Big Box, Loyalty programs, SAS...
With Red Tagged (E3) easily managed digital certificate and device recognition solution.


Our solution is a (virtual) appliance based product which seamlessly fits into your existing network infrastructure. It automatically creates, distributes, and (de)installs, short-lived X.509 user certificates with corresponding cryptographic key-pairs, for the purpose of user & device credentialing and secure access control.

X.509 is the industry standard since the 1980’s and is supported by all major network components and enterprise application solutions, making it the perfect unified access control solution.


Thus far managing X.509 certificates has been one of the greatest cost factors in high secure environments, mainly caused by the required administration efforts.

By re-using your existing authentication environment, optionally leveraging it with our trusted corporate & Bring Your Own Device (BYOD) device recognition, reducing the lifecycle of the certificate, and ultimately automating the certificate requests, creation, distribution and (de)installation; certificate management has become easy as pie with our Trusted Device solution.

It not only secures the sending of user authentication credentials and enables encrypted access to the network to the highest level to protect against harsh attack vectors such as Man-in-the-Middle and brute force, but it also helps to significantly reduce cost.

Administrators have less work in configuring networks for different kinds of authentication, but end-users can also become more productive thanks to Single Sign-On to applications and network environments.

INDUSTRY PRACTICAL APPLICATIONS 

Identifying your trusted employee and partner devices to conveniently yet securely access your corporate applications is the most common use. Frequently in combination with existing HP, Palo Alto, Cisco, F5, CheckPoint, Juniper, and/ or a range of Open products.

Smartphone app builders commonly face their app data-stream and app-server getting hacked. Our API can be your security module in your app.

Secure app and machine-to-machine communication is a necessity nowadays as well: vending-machines communicating their daily sales, ATM’s communicating wirelessly with the bank, IP-camera’s securely sending their video feeds, medical devices sending privacy sensitive patient data to online patient dossiers, and much more. End2End Encryption is right.

We handle it all, for dozens up to hundreds of millions of users and devices.

Passwords are the cause of the majority of the cyber-attack issues and we still use them!

Red Tagged (E3) End2End Encryption uses a Device DNA which each device or machine has. It is the device that is authenticated and not reliant on a user password that can be taken to another device and used as the log-in.

Yes, we can still have a password, but that is not the key to entering the system. Many safeguards can be in place also, from GPS location, Geo-Fencing and many others, the key is the Device DNA which is created at the authorization stage and is extracted from the device in many ways and elements.

Desktop, laptop, tablet, Smartphone it does not matter, the days of concern for BYOD are gone! You just setup internally a SOP (Standard Operating Procedure) for usage to the corporate servers.

The connection is universal, meaning even in Wi-Fi Hotspots conferences or hotels the solution protects and serves the security factors on both sides.

Firewall & VPN Integration 

For effective enterprise perimeter, internal, and Web security, integration with existing Firewalls is a must-have. All known enterprise firewall and VPN solution providers support the X.509 standard

Secure Application Access 
Secure access to online applications is generally made possible through the use of HTTPS.

By simply enforcing the requirement of client side digital certificates on the target server or firewall or VPN, you effectively create a highly secure 2-way SSL authenticated encrypted tunnel over TLS.

This feature is by default supported by all major server side Operating Systems, and all major enterprise application solution suppliers. Such as: Microsoft, Cisco, Juniper, CheckPoint, Palo Alto, HP, IBM, SAP, Oracle, “open” solutions, and many others.

High Availability 

Built-in high availability feature, allowing for each instance to be aware of the health status of all other End2End Encryption (E3) instances. As a result, should an appliance ever become unavailable, automatically another can take over, without you having to rely on 3rd party high availability solutions.


(E3) delivers a unified architecture for perimeter, internal and web based access control, based on the industry standard X.509 digital certificates.

Product description
End2End Encryption (E3) issues short lived certificates and has an automated registration authority module, providing comprehensive easy to use and administer secure access to your existing network and cloud infrastructure.

Product Key Features

• IPv4 and IPv6 supported

• On-board high availability support

• RFC compliant standard X.509

• Short life validity for certificates

• New unique encryption keys with each issued certificate

• 1024 - 4096 bit RSA encryption keys

• Automated certificate processing

• Use existing authentication methods

• Optional trusted hardware recognition and management

• Runs also under your existing CA

Product Benefits

• Provides advanced application and network protection for changing threats including Phishing, Man-in-the-Middle and anonymous Brute Force attacks

• Enables a wide range of secure branch and remote-access options

• Streamlines security administration and lowers management cost

• Makes federated identity a reality

• Corporate laptop & smartphone usage

• Machine to machine usage

• Internet of Things supported



Telephone:
North America: +1 (614) 655.1247
Europe: +31 6 11 30 3489

copyright 2015

Radical Islamic Terrorists, Hackers, Phishers and Man in the Middle Brutal Attackers

Radical Islamic Terrorists, Hackers, Phishers and Man in the Middle Brutal Attackers
by Nick Ashton, CEO/CTO, CommSmart Global Group of Companies

Terrorist Are Attacking & Killing, Instilling Fear Worldwide. Cyber Criminals/Terrorists Are Stealing Digital Information & Using What is Rightfully Yours.  Ruining Your Life and Instilling Fear Of A Normal Life.

Having been involved in physical and cyber terrorism since the 1970's, the statement by the American president to the nation, is more than concerning.

It has taken him seven years to admit that there are terrorist who are using Islam to terrorizing the world?  Religion has been used in a radical form since they were introduced, as a controlling community tool.  Organized religion has been with us since the concerns of the Emperors of Rome and the emergence of Christ.  Mohammed came 600 years later.

The world's oldest religion still being practiced today is Hinduism (known to adherents as 'Sanatan Dharma', Eternal Order) but, in what is considered 'the west', the first records of religious practice come from Egypt around 4000 BCE. 

Organized religion encompasses them all, Catholic, Baptist, Church of England, Methodists, Presbyterian, Muslim, Judaism, Assembly of God  and any other denomination that is out there practicing their organized beliefs.

Hackers, Phishers and Man in the Middle Brutal Attackers are also organized and use the Dark Web to practice their digital terror and thievery.  In fact these miscreants do more damage that all of radical terrorism put together.  No, they are not using the bomb or bullet, they are using the fact that our digital cyber world is unprotected.  

Cyber security is the responsibility of us all!

Corporate cyber security is a Duty of Care and a Corporate Governance.  Failure at this level is shameful and makes the BRAND, shareholders and more importantly, the customers and clients extremely vulnerable.

Stop the procrastination on what to do, just take action to have the finest protection and solutions.

Logical proactive solutions are here with Red Tagged and our worldwide team can assist those that wish to do the right thing.

www.redtagged.us


Email: redtagged@redtagged.us

Telephone: 
North America: + 1 (614) 655.1247
Europe:             + 31 6.11.30.3489

copyright 2015