Friday, February 24, 2017

Sit Ye Down and Mardle...

It Is Time For Some Serious
Conflabs At The Mardling Seat.
by Nick Ashton, CEO/CIO, CommSmart Global Group

When was the last time you sat down and had a good old serious discussion? No holding back, laying it all on the table on how you feel, when was it?  

Really it is that long!

You need a good old Mardle!  I lived in Norfolk, England some many moons ago and one village, had a Mardling Seat, I think it was Ludham or Mundesley, where locals would go, sit and when joined by others, discussed the problems of the world.  It was like getting it off your chest and expressing how you really felt.  The way people are morons or governments were a donkey's rear ends.  The real down to earth things that need to be talked about.  The whole silly problems of the world have been argued, discussed and solved on the now many Mardling Seats of Norfolk, England.

You need a Mardling Seat in your city, where you can go and share with a small group of four or five, the daily rigmarole of life and why we have to change now, or all be swallowed up by the insanity of deception.

Tell you what, I will start and you can follow.  

So Sit Ye Down and Mardle...

To the point, this city, any city is going to hell in a hand basket!  Once upon a time, the inner city problems were just that, in the center of the city and only a few blocks of problems.  It was contained and dealt with according.  Now, it stretches for tens, if not hundreds of miles and never seems to end.  The problems are more than a blight, they are a deep penetrating stain on all of us alike.

Sweeping the issues under the carpet only causes a lump in the carpet and we are all tripping over it, basically ignoring the impending doom.  City leaders, politicians, business leaders and down to earth citizens have tripped and done nothing for too long!

Where is the PrideRespect, and Trust in us all?  
  • Can it be clawed back?  
  • Can we pick up the pieces and change for the better?  
  • Do we just keep kicking the can down the road to another neighborhood and make it their problem?
Passing law after law, making, even more, laws regarding the laws already on the books, it is insanity extraordinaire!

PreachersPoliticians, and Ego-Centered Businessmen are not what is needed or required.  It is common folks who CareConsider and Challenge the broken social system that are the only ones who, as a cohesive team, can and will make the difference.  Importantly they can organize in a spirited way.  

I suppose my thoughts go back to World War II and the bombing of London and how from the Royals down, everyone fought for the pride from within, to overcome the adversity and be able to lift themselves from the rubble of tragedy.

Folks, this is worse than the days of bombs and bullets from an outside enemy, it is attacking us all from within.  The ignorance is standing on the horizon looking down on the commotion, confusion and sheer desperation that is crying from within our hearts and souls.  

Who in their right mind thought that Detroit would fall?

The leadership is broken on all sides and like Lemmings, we are being lead to fall or be pushed over a cliff, committing social suicide.  

Hope left decades ago and with heaviness we drag our sorry arses through the day, lying to ourselves that it will be sorted out in the end.  People pop pills to sleep, wake up, work and be happy.  Trying to forget that outside their four walls they call home if they are lucky to have a home, is a battlefield of despair.  Dead, dying and confused people who really have nowhere to go.  A mindless spiral of dead-end democracy.

Which side of the insanity are you and I really on?  

There is a path out of this diabolical mess and it will take a simple yes or no.

Which is?

It is not religion, unions or some cult or sect, it is the pure heartfelt act of doing something for yourself, others and a possible future of prosperity.  

It is about caring...

I simply repeat an earlier statement:

Where is the PrideRespect, and Trust in us all?  
  • Can it be clawed back?  
  • Can we pick up the pieces and change for the better?  
  • Do we just keep kicking the can down the road to another neighborhood and make it their problem?

Your Turn!

So Sit Ye Down and Mardle...

Copyright 2017

Privacy - The Hitchhikers Guide To The Viral Galaxy Or Who Is Stealing My Data And Why…

The Hitchhikers Guide To The Viral Galaxy
Or Who Is Stealing My data And Why…
By Nick Ashton, CEO/CTO, CommSmart Global Group 

All of our lives are surrounded by digital devices, you cannot miss or avoid them.  Each of us carries some form of smart device or computer every moment of the day, they have encircled us in an electronic cage and control us in ways we believe is them, not us.

I personally go back to the Middle Ages of computers, 1976, it was then we had Computer-Mart in England and were the first to bring the micro-computer to the business masses who saw the light and had the money to invest in this extremely new technology.  All software had to be written, there were no off the shelf programming or an app for that!  It was a different time and a different pace that we all walked back then.

In 1982/84 I was President, Commercial Data Banks, the first ever, what we call today as an email company.  Yes, the first and a very slow system that served Washington D.C. and the politicians.  We used Texas Instrument dumb terminals and a 300 baud telephone line.  Think where we have come today!
To think, thirty plus years ago since I was introduced to computers, programming and the manufacture of the Oriel 2000 which was our first and a great success in microcomputer creation.  No one had concerns about people wanting to do harm or steal your data or personal information.

Every single device is an access portal, an open gate for a hacker to enter and just like life, it is vulnerable because of humans and their insatiable desires for information.  Yes, you, you leave the door unlocked and allow these morons to steal your data and enter any other connection you make thereafter. 

The whole ability of access that the consumer requests and requires is causing the issues and access for the criminals to steal from us all.  Just like we leave doors ajar, water boiling in a pot on stove, take our eye off our children for a mire second or leave the keys in the car with the engine running, whilst you run inside, we are at fault and it is the human factor that is causing the meltdown in criminality on the Internet.

This can be stopped dead in its tracks and we shall guide you in the right direction and no, this is not some hair brain idea, it is a fact and working worldwide successfully.  Before we go further, let us examine the issues in the corporate and retail world.

Trusted Remedy protects your online community’s data-in-motion against Man-in-the-Middle and Phishing attacks. Based on our patented automated distribution for short-lived client certificates, your users transfer data to your servers and the Cloud from their Trusted Remedy identified trusted devices using state-of-the-art daily changing encryption keys. All without significant administrative overhead for your Administration.  

In fact, it is BYOD (Bring Your Own Devices), yes the majority of devices will work with Trusted Remedy.

Man-in-the-Middle intrusions, and highly sensitive data transmission requirements:

Trusted Remedy is designed from the ground up to protect against Man-in-the-Middle intrusions without becoming a tough nut to crack in regard to client usage or management.   We have made it easy for top management down to understand the precise operation without having to have a degree in computer science or the IT department to explain in their technical terms.

Man-in-the-Middle is considered one of or even the toughest intrusions to defend against. It is frequently used by technologically advanced malicious parties such as black-hat hackers and rogue states to obtain digitally transmitted sensitive information. As in the retail intrusions just experienced by millions of US shoppers.

With Trusted Remedy creating client certificates on its own, or your existing Certificate Authority, you can be certain no third party can potentially fake your certificate authority.

Trusted Remedy uses an innovative secure communication channel over any untrusted Internet connection, over which it provides your user with a short lived client side certificate in a fully automated secure manner. The corresponding key-pair strength ranges from 2048 up to 4096 bit RSA encryption and changes with each renewed certificate.

With the client certificate being totally transparent to the end-user, a secure Man-in-the-Middle intrusion proof connection can be established using standard server configurations.

Using Trusted Remedy you can be certain that your sensitive data is being sent in the most secure possible manner between the client and server and vice versa. No matter if the data relates to privacy sensitive information such as medical, financial, corporate secrets, intellectual property, and criminal proceedings.

Phishing intrusions, and Multi-Factor Authentication issues

Trusted Remedy is capable of using any form of authentication as embraced by the company, your company using Trusted Remedy, and leveraging that authentication with trusted client device recognition. You can even choose to simply identify a device based on its name and hardware characteristics allowing trusted devices to connect to your network or cloud environment.

As a result, your users can only authenticate from devices set as 'trusted' based on their hardware characteristics. Trusted Remedy can be used with at least 17 different hardware identifiers, making each device truly unique. KeyTalk allows for up to 10 different 'trusted' devices per user, per authentication source and allows for unlimited authentication sources to be connected.

Phishing is, of course, social engineering and very hard to protect against. Authentication details obtained through Phishing can be protected against abuse by malicious third parties using Trusted Remedy's optional Multi-Factor Authentication layer based on our trusted client device identification.

Are interoperability and federated access a pain?

Do you need multiple geographically located departments to securely access the same information resources? Would you require multiple companies or agencies to securely share sensitive information?

Simply setup Trusted Remedy to securely connect to an authentication source trusted by the target department, company or agency you wish to collaborate with. Next, have Trusted Remedy issue them with a short-lived client certificate for highly secure access purposes to target a network or cloud source.

Authorization rights can be set on most servers and server-applications based on the credentials in the 'issued' client certificate. Trusted Remedy allows you to seamlessly map certificate fields to a database field or LDAP/AD attribute, making the addition of authorization rules very easy.

Is network integration hard?

Companies who are dealing with mergers and acquisitions know this pain. After the deal is done, you end up with 2 or more network environments using different, frequently incompatible network components and different authentication mechanisms. IT & Operations generally end up with a big configuration puzzle to solve which usually takes months while the business waits to be able to access the resources in both network environments which can negatively impacting the state of 'business as usual'.

Trusted Remedy provides end-users seamlessly with X.509v3 client certificates. This is the standard since 1988 and understood by all network components.

Configure Trusted Remedy to connect as the central hub between different authentication sources of the networks. Your users will continue to use their known authentication solution (optionally leveraged with our trusted hardware recognition) and based on the obtained client certificate granting them access to the different network environments.

Some of our testimonial customers managed to reduce network integration times after mergers and acquisitions from 6-9 months to less than a week.

My existing PKI is a pain to manage!

Companies who choose a Public Key Infrastructure usually do so for security reasons.

A full blown PKI is simply a bridge too far for some companies. The level of security is still required.

Trusted Remedy fills this gap between full blown PKI and regular multi-factor authentication by providing short lived certificates. Its similar technology compared to PKI, but without the huge overhead created by user certificate issuance, management and revocation lists.

Trusted Remedy's certificates are obtained based on any form of authentication without the user even needing to know that they use client certificates.

As a result there is no administration needed to keep track of revocation lists. With Trusted Remedy being automated, working with your existing authentication solution such as LDAP/AD or RADIUS based tokens, there is no requirement for management on Trusted Remedy since it doesn't create new data other than log files.

My payment wall is being circumvented and account sharing is getting out of hand

Businesses who use payment walls all know this problem: The vendor's offer of their valuable content behind the payment wall gets maliciously accessed through users simply sharing their paid accounts with others.

Most of these businesses put up some defenses by including browser-based device recognition or a simple MAC or IP address based pinning. These are unfortunately all relatively easy to circumvent.

Trusted Remedy allows for the binding of up to 10 unique devices based on many more hardware characteristics with the user account. As such, sharing becomes nearly impossible. This allows for the payment wall to become optimally effective and resulting in more revenue.

This should give some insight on why Trusted Remedy is your only solution in this unsociable world.  

CEO’s, Presidents, Chairman, protect what you have built, you and your customers deserve Trusted Remedy!  

If not... it will cost you more than you know...

WE are in the NOW and KEEP YOU; in the KNOW…

Telephone: +1 (330) 366.6860
copyright 2017

Thursday, February 23, 2017

Let Us Show the Continuum of Missed Communications or (Fake News) Since the 1700's & Why We Are Worse Off Today!

Let Us Show the Continuum of
Missed Communications or 
(Fake News) Since the 1700's
& Why We Are Worse Off Today!
by Nicholas Ashton, CEO/CIO, CommSmart Global Group - Virtual Crime Center

You know that our passion is law and law enforcement and how we must stabilize the downward spiral of events that are fueled by misinformation, rumors, and downright lies spread innocently and maliciously.

The words 'Fake News' are now front and center!  

They always have been!

Today it is manipulation, for whatever the diabolical personal gain it entails. Simply it is lies and more lies, changed stories for an advantage and particular by those that wish to undermine authority.

Back in the 1700's, the reasoning was simple, there were no technological abilities, no wristwatch, so the time was called out every hour and that 'all's well', we called it out, no written word, such as a regular newspaper.  

Even in 1860, the election of Lincoln took months for the whole country to know he was the next Present of the United States.  Communications were so antiquated, it was unreal.

The Industrial Revolution opened so many doors that we have sadly closed today and are suffering because of that action of slamming the door and lazily utilizing technology only.

So why today do we still have terrible communications?  Simple, hiding behind technology, 140 characters and human traits of undermining or bullying have increased exponentially.

We like to explain why communications from the 1800's and specifically Sir Robert Peel and his Nine Peelian Principles is more important than ever.

We know the 10th Peelian Principle, Technology & Digital Policing is so important and why when used with the other nine, it makes absolute sense to save our society from this depressed path we are on.

Stay tuned and see how we can bring back Trust & Respect to our communities, which police officers are an integral part of.

The tide can and will be turned and importantly, you are a major part of that energy to make this happen!

Telephone: +1 (330) 366.6860

copyright 2016

Monday, February 20, 2017

Data Storage – Secure or a Lost Cause? - Swamp, Lake, Landfill, or Communication Nightmare? - Example: National Incident-Based Reporting System (NIBRS)

Data Storage – Secure or a Lost Cause?
Swamp, Lake, Landfill, or Communication Nightmare?
Example: National Incident-Based Reporting System (NIBRS)

Today’s data flow is so massive and fast, that most of the data is a lost cause.  Why would you not fully understand the information contained as it passes before your eyes?

No company can continue in this manner placing billions of pieces of physical information/data in storage which has not been sorted, examined and collated upon receipt.  Statistics that are created from this silo stored information is always so out of date, it is next to useless, especially crime data ‘live’ from the streets.

A perfect example of this problem of collection and what to do with it is the National Incident-Based Reporting System (NIBRS), an incident-based reporting system for crimes known to the police. For each crime incident coming to the attention of law enforcement, a variety of data is collected about the incident.

Here lies the crux of the issue it is what is actually collected or failed to be collected, such as GPS location or even a physical address.

The data includes the nature and types of specific offenses in the incident, characteristics of the victim(s) and offender(s), types and value of property stolen and recovered, and characteristics of persons arrested in connection with a crime incident.

Phenomenal, if it was being used immediately and not placed in a data silo or a digital landfill, only to be accessed at year end, analyzed and a statistical report then created after months and months, then released to the agencies. 

Too late, wasted expense and the crime, criminal and opportunities have long gone.  No crime is ever solved with digital data never exposed or immediately available for crime analysts or street level officers, that is where we make the difference!

I know we sound like we are against NIBRS, we are not! We have an opportunity to enhance.

CommSmart Global Group, a LexisNexis Risk Solutions Partner, know more about data than you can imagine, it is our business, our daily bread!

Conversing with CommSmart Global Group, either face to face or electronically will demonstration in one fell swoop, our proven capabilities and success. What is so important is, we do not know it all and nor do you, we have something in common already, concerns.  

Together, we will achieve the targets, goals, and aspirations to succeed for the betterment of the agency and importantly, the community.

LexisNexis, our Risk Solutions Partner is no small company, part of the RELX Group which is a world-leading provider of information and analytics for professional and business customers across industries.

Helping scientists make new discoveries, lawyers win cases, doctors save lives and insurance companies offer customers lower prices. We save taxpayers and consumers money by preventing fraud and help executives forge commercial relationships with their clients.

Our goal is to help our customers make better decisions, get better results and be more productive. We do this by leveraging a deep understanding of our customers to create innovative solutions which combine content and data with analytics and technology in global platforms. These solutions often account for about 1% of our customers’ total cost base but can have a significant and positive impact on the economics of the remaining 99%.

The Group serves customers in more than 180 countries and has offices in about 40 countries. It employs approximately 30,000 people of whom half are in North America.

CommSmart Global Group was chosen as a partner to serve law enforcement globally because of our full understanding of world events and street smart law enforcement procedures, failures and demanded changes in a major transformational time.

The ability to collect information by all states is a picture of both success and failure. Some, like Iowa, are excellent in the collection, but where does it go and how are you using in the NOW?  NOW, immediacy is the priority and that is we can assist you with the growth of the NIBRS objective, creating extreme immediate value for the overall grant investments being offered by NIBRS.

We just need to simply communicate and converse on level terms, which is all we ask.


For more information, please converse with us via telephone or an email. 

Contact Us
Located Globally in Europe, U.K. & USA
U.S. Offices:
Ohio:  +1 (330) 366.6860
Iowa: +1 (515) 518.0190
U.K.:   +44 702 405 9420
Twitter: “posiqr”


Sunday, February 19, 2017

Societal Security Starts at the Grassroots with Pure Logic.

Societal Security Starts at 
the Grassroots with Pure Logic.
By Nick Ashton, CEO/CIO, CommSmart Global Group 

Society is under attack, not just with guns, knives, bombs, including radicals, even our own people, neighbors, co-workers, but from Cyber Terrorists.  That title, though, glorifies what they do.  They are nothing more than low-life who prey on you, your company and information that is rightfully yours.

Let me put in perspective some technical stuff, that you should at least scan before we get to the heart of the message.

At the base of all we do is TRUSTED DEVICE, the replacement of your ability to sign-on or log-in to your personal or business data.  It uses your Device DNA, that is simple and manageable to the point of only a few hours a year. 

TRUSTED DEVICE is an anonymous bullet resistant tube that connects end to end for your data in motion.  Total Corporate and Personal Security!

Paperless has always been a dream and was promised many decades ago, well, we have it!  All your repetitive forms on your tablet/Smart Mobile Phone/Laptop.  Truly a great move to save the trees!  Oh, saves you time and money as well!

I believe we have taken a gigantic step with an opportunity to change how you fill-in forms, repetitive information and disseminating it throughout your databases and departments.  The Tablet and Smart Mobile Phone have given us that opportunity and our knowledge of the ubiquity of pen and paper, which we were one of the first to embrace the digital pen and design applications has allowed us to be more than one step ahead in this field.  Now, we can use a mobile screen to collect the information.

The ability to have “live” information has now come to reality, not only for Police Officers working a crime scene, it is now available to a myriad of focused applications, including Bailiffs and Process Servers who have major changes effective from April 2014.  If you are repeatedly filling out forms, having to then re-type, then we can simplify and accelerate the information in your company.  Some information will still stay on paper, as courts want a copy left with the individual.

Connectivity is as important as all of our solutions and is as significant as all the rest. Our Black-Box - Secure Motion installed in the vehicle gives you full connectivity from your Police Car, Ambulance, Fire Truck, Incident Mobile Control Unit or Emergency Management Command HQ.  I mean full connectivity and fully affordable.

It does not stop there, we create a 1000 foot (300 meters) Wi-Fi Hotspot for use with the Tablet or Smart Mobile Phone.  Fully secure and those that are authorized to use are anonymous to all, no one can see what is being sent down the bullet resistant tube for an end to end data in motion delivery via TRUSTED DEVICE.

Each device you use to communicate, control your environment, access information controlled through one connected Dashboard on all your devices, securely going about your business with no fear of the Hacker, Phisher, and Man in the Middle Brutal Attacker.  A secure Hive to protect all.

How we make the telephone call, send texts, emails and review documents on our Smartphone, all without the Internet!  The Internet is the major security issue to us all and we must separate cell phone activity and the Internet to survive.

This is just the tip of the iceberg of what we have created and sourced.


Regarding Societal Security and Risk, Commsmart Global Group of Companies (Commsmart People), seeks to enhance knowledge about threats, hazards and vulnerability, prevent undesirable events and strengthen crisis management, while at the same time safeguarding fundamental rights and the protection of the vulnerable.  Our research has stretched far, leaving no stone unturned, thanks to all. 

That is why our Pied Piper Project works!  It is about changing the TRAP society is wrapped in.  The Pied Piper Project has a far better TRAP:


Not just for the community, but those that are there to assist, from housing departments, Public Safety, and Parents!

To be able to communicate with all, we must have a core value of Team Leadership and Communications that is connected to all.

We must promote the development of new knowledge, build networks and qualify research groups to participate in community cooperation, including all intercity leaders, inter-faith groups, public safety departments and importantly the community of all ages. Societal security entails the ability of society to maintain critical societal functions and safeguard the life, health and basic needs of its citizens during normal life and events that pose various types of stressors. The point of departure for societal security efforts is that crises can and must be prevented. This implies understanding their causes and preventing threats or hazards from manifesting themselves.

Street level understanding means going into the trenches and using our senses to fully understand the problems.  This is not an exercise for the media, government or those social groups who think they are do-gooders.  It is about being listeners and proactive action based groups and individuals.  Those that act on the gleaned information and get their hands into the problems and mold the change. 

Doers to the core!

This is Atmospheric Noise Collection, Chatter on the Streets, people talking to people.  Over hearing chatter that has a meaning, it what the people are talking about, planning and annoyed about.

Does a political party just meet in a room and hammer out what they want as their platform or agenda for the next election?  Sure they, they believe they can hand the voting public their mission for the country and it will be accepted via advertising and speak loudly.  No, the public has opinions and not the one the market researcher gathers.  It is the street and cafĂ© talk that is important and would be much easier to adapt and implement.

In the event that crises nonetheless arise, they must be dealt with in the best possible manner.

Focusing on several thematic priority areas, including technologies in interaction with society, organizations and individuals; patterns and magnitude of risks and threats, vulnerability and society’s risk tolerance; policies, controls and regulation; and crisis management and risk communication.

Generating knowledge about the new and emerging security issues arising at the interface of national and individual security – between law, order and traditional national defense on the one hand and public safety, preparedness, rescue services, emergency relief and crisis management on the other.

It can be viewed like this, as I am British and enjoy my tea, it can be compared to the whistle of the kettle when it boils, letting you know it is time to fill the pot, letting the tea have time to steep.  Like the kettle, the pressure finally became so great that the solutions burst onto the scene. It is a fact that we live in a world that is increasingly exposed to many types of risk, and we profoundly need more insight into how we can create a more lasting resilient society.

Naturally, it is concluded that we should do more to reduce vulnerability. Collective developments today are making society ever more advanced and complex, but this also results in a greater impact if an incident occurs. Thus, it is no longer controversial to say that we need greater insight into how we can create a more hardy society.

Society is exposed to a multitude of types of risks and that we need more insight into on how we can improve resilience. We must focus on the information technology infrastructure that is ever changing in today’s fast paced world. Technology is far from perfect and failures occur, online banks and mobile phone networks breaking down, and thousands of attacks by computer hackers each day. We also face many challenges related to natural disasters, terrorism, aviation security and the like. We cannot cover all the areas of societal security, so we have focused on public safety and the crumbling of communities, education, families, and teens.

It is the miss-trust, lack of respect and failed pride in the communities and among teens, resulting in gang and drug violence, murder, domestic violence and flash gang incidents at malls, shopping centers, and social gathering points.

Sure, we have been lucky! We also have many skilled, talented and dedicated people who do a good job, and these organizations have a great deal of valuable experience. Nonetheless, it is clear that there have not been adequate systematic efforts to ensure societal security at the base levels. Missing the festering core at street level, this must be stopped and remedial action is taken immediately.

It was stated, “If it is not controversial to say we know too little about societal security, why have we not made more progress in this area?”

Politicians are not given the freedom to take sound decisions since the decisions must be built on a foundation of public opinion. Putting it another way: The concerns of most people are not so great that it will give rise to political pressure to focus more on a baser societal security. And we face a difficult educational task if we want to tell people there is cause for concern but that they should not be worried! It is not just about law enforcement, it is about neighbors too!

It is accurate to describe the United States of America as a high-risk country to live in, but we can make the USA a safer country if we acquire more street level knowledge and work more systematically with societal security.

All risk management activities go through two phases. First, comes the actual analysis, in which scenarios are identified and risk is expressed. In this phase, the professionals try to look into the future and say something meaningful about what could happen. It might be the intelligence service and terrorism experts who are assessing whether there will be a terrorist attack and what the ramifications of this would be.

Most analyses have a tendency to “camouflage” key uncertainty factors. Traditionally, risk analysts have often focused on probabilities and expected values, but have forgotten to include vital uncertainty factors that lie more or less hidden in the background knowledge. The analyses are based on many assumptions, but these may prove wrong. More attention must be paid to these uncertainty factors.  In fact, it is Commsmart Global Group of Companies and our analytical capabilities completely address this point.  The collection, on a street level basis of occurring information that is filtered, reviewed and analysed created, to afford the public safety departments to have at their fingertips “real time” information and importantly our Next Event Predictability Advantage

Yes, it is great to know what has occurred, but what about what is about to occur? We use a great phrase in the company, WE are In the NOW and KEEP YOU; in the KNOW…

It was explained, “Today many risk analysts only see “white swans”, The potential “black swans” must be included if we are to enhance the quality of the analyses. We must think in broader terms than doctors, engineers and economists often do.”

It is the ability to look at life and the streets from the dark side and empathetically use this technique to go further than ever before, CommSmart Global Group does that on a daily basis, assessing the threats and the scenarios that have emerged from the analysis with both eyes open from all angles.

How serious is the risk to society and what should be done about it? What is an acceptable level of risk?  Some claim that there are purely rational answers to these questions, but they involve value judgments that cannot be obtained just mechanically.  The task is to weigh the uncertainties, and a technical-scientific approach by itself is not enough unless you have the infrastructure and solid proven techniques. That is exactly what CommSmart Global Group offer and deliver, for our worldwide clients.

It is thinking in broader terms, we are not saying you do not had wonderful ideas, implemented changes, seeing new problems that are arising every day, far from that, you are facing an ever increasing social foe in your midst, that is in your face.  

The Good Old Days of the Beat Cop, with his limited ability to communicate, effectively track his beat and his biggest ally, his social mind and knowledge of his turf.  That street knowledge was and is power to the ‘enth degree.  Now add our technology as an overlay to his street methods of today and we have the ability to make a radical difference.  It is the passion, the deep passion we have, to use the tools developed for our military and public safety departments by our team of analyst, over 65% with law enforcement backgrounds.  It is the street level knowledge meshed with futuristic abilities, which are here today that can make this society far more secure.

WE are in the NOW and
KEEP YOU; in the KNOW…

Call: +1 (515) 528.5082

copyright 2017