Thursday, March 27, 2014

Unpopular People Are Now Documenting Their Work, Bailiffs, Process Servers & Public Safety “LIVE”

Unpopular people Are Now Documenting Their Work, Bailiffs, Process Servers & Public Safety “LIVE”
By Nick Ashton, Founder, CEO, Tracometry Group of Companies.

So you wake up every morning knowing you are one of the most hated people on the planet.  Even your family doesn’t trust you and do everything they can to disassociate from you.

It never use to be that way, Public Safety Officers (Law Enforcement), U.K. Bailiffs and Process Servers, who are a vital part of society.  When someone has wronged us, we turn to them.  In doing their daily work and completing their enforcement tasks, they are viewed as thugs and mistrusted.

Security in our lives is so important and insecurity has becomes so prevalent that it seems that those we turn to, suddenly, in the target’s eyes, becomes the worse enemy in the world.  Accusations fly, lies are like darts and it becomes a war of words.  In the courtroom, the reputation follows us all and many magistrates and judges have their personal opinion on those that serve the public and uphold the law.  It is not always good.

If you had cause to visit a Bailiff or Process Servers office, you might be have been in for a shock! 

You can enter through the front door at the High Court Enforcement Group, but that is as far as it goes. You are stopped right inside as there is yet another door, with a reinforced, bullet resistant glass window and a tough combination lock, barring the way. The only option is to press a well-used button, stating your business, and waiting nervously inside the chamber for attention.

Then bailiffs and process servers have learned to live with being very unpopular. They are normal people that chose their career and do it to the best of their ability.  In fact, they state, they look at everybody's situation whilst at the door, they always try and decipher between people who can pay and won't pay, and people who can't pay and want to pay.  And if they will not agree to any repayment plan they can come up with one.  If they gained access to the property they will be looking to secure the debt on any assets that are available.  If they are adamant they couldn't pay, at the end of the day, the bailiff or process server has a warrant signed by a judge saying they have to execute the warrant.

If the bailiff/process server did not carry out the orders, they would be technically in contempt of court if they did not do so.

When confronted by law enforcement, a bailiff or process server, people become chameleons and indignant that they are questioned or challenged.  Their actions turn to violence exceedingly quickly.  This is why the meeting or confrontation must be documented for the protection of both parties.

Action In Motion (AIM) is a simple and concise tool in the Public Safety toolbox.  It is not additional item to be added to the ever growing list items carried by officers.  It is their Smart Mobile Phone or Tablet, yes the answer is right in the palm of their hand.

When these events take place, they are able to capture the full event, audio/video/images and directly transmit to a central HQ and be observed in the actions.  This is also recorded on the company’s servers with date/time/originator/GPS embedded in the file, on the screen for use, if need be, in court. 

This is a direct feed and the officer has no fingers in downloading or touching the file, it has full chain of custody and untouched by the originator.

It is also a fully secured transmission as it uses KEYTALK a patented, proprietary software solution for the connection, end to end for this data in motion.  It is a secured bullet resistant tube that is anonymous to all.  That means no one sees it, including hackers and phishers.  This can also be used in a Hotspot environment totally securely.

Action In Motion (AIM) is a patented and a proprietary solution with a myriad of uses in vertical markets. Simple to use and for usage as a surveillance situation is even more unique.  Bailiffs/process servers who need to observe and collect information, there is nothing better than images/video/audio.  A picture is worth a thousand words, especially in a courtroom!

For Law Enforcement, they now have an endless multiple amount of mobile CCTV devices at their fingertips.  Sporting event, rally or protest march, they can be on the spot transmitting to central HQ and to other officers exactly what is going on.  This is the most proactive security tool to be introduced to the security industry.  All secure in the record keeping for presentation to a court.

It does not stop there, Risk Management, Assessors and Insurance Adjusters now have a tool to document all and have it in their office, filed and secure at the same time they are seeing it.  A valuable tool for all.

Public Safety, Bailiffs and Process Servers is still a paper heavy business as our courts have insisted on copies being left with all parties. It will never be totally paperless, but, we do have the ability to create your repetitive forms to be able to filled in a on a tablet or smart mobile phone. Having understood the digital requirements with the pen and paper, we have now moved to the smart mobile phone and tablet.  This enhances the daily workload, proactively and productively. Our solution regarding form filling will be introduced in thirty days.



WE are in the NOW and
KEEP YOU; in the KNOW…


Worldwide Call: +1 (317) 426.0110



Key Talk – Man-In-The-Middle, Hacking & Phishing Solutions
Straight Talking Key Talking… KEYTALK!


Galveston, Texas, Indianapolis, Indiana, London & North Wales, U.K., Netherlands, Lithuania, K.L. Malaysia
Tracometry Group of Companies – Reg. Office. Dorrington Farm, Rye Hill Road, Harlow, Essex CM18 7jF


Copyright 2014

Wednesday, March 26, 2014

Machine Wars – The Hackers Dream!

Machine Wars – The Hackers Dream!
By Nick Ashton, Founder, CEO, Tracometry Group of Companies.

In the beginning it was desktop computers as the Computer Gods took over our capabilities and daily communication processes.  Gates, Job and Sinclair were the early pioneers and then…

We were talking to machines, albeit through our fingers in the early days through the keyboard.  Today, it is machine to machine or computer to computer with limited, but necessary human intervention.  There lies the problem, humans!

The machines have to be managed, connected and allowed to talk to each other and to know they are correctly allowed to.  That is why we invented computer certificates to acknowledge they were trusted and allowed to work together, hand in hand.

KEYTALK SECURES SOLIDLY, MACHINE TO MACHINE COMMUNICATION

These are exciting times for the wireless machine-to-machine (M2M) industry. Across the world, tens of millions of M2M connections are revolutionizing the way that companies of all kinds do business. Across a broad range of sectors, significant gains are being made thanks to the promise of M2M, enabling innovations in industries stretching from healthcare to utilities, automotive to security to interactively serve their masters, us.

However, as we move closer to a future in which M2M is no longer just part of an emerging technological marketplace but the dominant one, ensuring the security of those M2M connections will be of paramount importance. As a result, network operators need to work with dedicated security providers that can integrate with their existing network platforms and provide protection that bridges the gap between legacy ‘human-to-human’ standards of protection and those required for M2M.

There is no difference between traditional certificates and M2M certificates. Both types of certificates are intended to authenticate via a trusted third party the identity of communicating entities.

Traditional certificates were designed and implemented in an era when desktops and laptops were the predominant source of computing power and digital communications. Bandwidth issues were virtually non-existent. Smart cards, smart mobile phones, tablets and devices such as commercial and residential CCTV were on the distant horizon. Oh, we must not forget transportation, trains, boats, planes and the automobile, all have computers on-board that complete the majority of the functions and are hackable.

The fact is, traditional certificates were never designed for use in very constrained environments where computing, bandwidth, power and storage are issues of great importance.

YOUR MACHINE BECOMES A TOKEN

KeyTalk protects M2M online community’s data-in-motion against Man-in-the-Middle and Phishing attacks. Based on our proprietary automated distribution for short lived Machine certificates, Machines transfer data to servers and the Cloud from their connection by KeyTalk identified trusted Machines, using state-of-the-art expiring encryption keys with a time window predefined by your administrator at virtually zero management.

KeyTalk delivers a unified architecture for perimeter, internal and web based access control, based on the industry standard X.509 digital certificates.

SECURING SENSITIVE DATA IN MOTION

With KeyTalk Machines that you trust, you can securely connect to target servers over any non-secure network (including Hotspots) or Internet environment.

All it requires is your server trusting your KeyTalk instance as a trusted source and you are good to go.  That includes lines of defense, such as ultra-high level security devices, cameras, motion sensors and perimeter protection.  Yes, they all controlled by computers.

Sadly the majority of these devices have outdated or long term certificates.  Why that is a problem is simple.  Untrusted or non-existent certificates allow the hacker to gain access with absolute easy and ply their trade, criminality.  Long term certificates allow a much larger window of opportunity to break the codes and gain access.  Not what is needed in this unsociable society!

SEAMLESS INTEGRATION & ZERO MANAGEMENT

KeyTalk seamlessly integrates into your existing network Infrastructure. As a result, no data needs to be replicated making life for your administrator a lot easier. And by automating the certificate issuance and installation process no user actions are required whatsoever.

Schiphol Airport and all world airports have security cameras, which are manually updated.  This takes time and manpower and are not completed on a reliable time frame leaving a window of opportunity you can ill-afford.  

KEYTALK does all of this automatically and maintains perfect security for all.


WE are in the NOW and
KEEP YOU; in the KNOW…


Worldwide Call: +1 (317) 426.0110


Key Talk – Man-In-The-Middle, Hacking & Phishing Solutions
Straight Talking Key Talking… KEYTALK!


Galveston, Texas, Indianapolis, Indiana, London & North Wales, U.K., Netherlands, Lithuania, K.L. Malaysia
Tracometry Group of Companies – Reg. Office. Dorrington Farm, Rye Hill Road, Harlow, Essex CM18 7jF


Copyright 2014

Saturday, March 22, 2014

Duh! Learning Centers Are Learning That Students & Faculty’s Social Security #’s & Personal Data Are More Important Than Their Minds…

Duh!  Learning Centers Are Learning That Students & Faculty’s Social Security #’s & personal Data Are More Important Than Their Minds…  
By Nick Ashton, Founder, CEO, Tracometry Group of Companies.

Centers of Learning are also epicenters for the theft of personal data.

It is stated that online thieves have increasingly sought sensitive and valuable data from educational institutions. Last year, security breaches included possible exposure of over 2.5 million Social Security and bank account numbers associated with an Arizona community college system, 74,000 Social Security numbers of University of Delaware students and staff, 145,000 applications to Virginia Tech, and hundreds of thousands of records from Indiana University.

In the two weeks between recent revelations that hackers stole data on students, alumni and faculty from the University of Maryland-College Park and the Johns Hopkins University, nearly 360,000 records were swiped in similar attacks at schools in Pennsylvania, Indiana and North Dakota, contact has been made to these educational behemoths to advise and inform of how they can stop dead in their tracks, Hackers, Phishers and Man in the Middle Brutal Attackers.  

Results, very disappointing and D grade for communication skills.

When someone who is knowledgeable reaches out to assist, albeit they are the developer of the finest patented proprietary end to end data in motion security and you ignore and fail to even return the telephone call, would you send your child to such a place of learning?  

Isn't about having an open mind and absorb all you can from those that know more than you?

Colleges and universities are attractive targets for hackers because there are many access points into their networks, especially Hotspots, which contain not just financial and personal data but also valuable intellectual property. That threat is forcing academics to reassess the way they keep and protect vast collections of information, often held in decentralized computer networks accessible to thousands of students, professors and researchers.

All that they do for everyone to enter their networks is to issue a PASSWORD!  

There lies the problem!  A password is typed in, that then lets the individual enter the treasure trove of information. 

Who is it typing the password?  

Is it the owner or the cyber terrorist?  The system has no earthly idea! Then they merrily go about their sordid trade of thievery, causing havoc for those that will now suffer through the theft of information.

Since January 2013, more than 50 colleges, universities and school systems across the country have been the targets of attacks that may have compromised personal information, according to the Privacy Rights Clearinghouse, a California-based consumer-advocacy group.

"It's been a long-standing concern that our culture of collaboration and trust kind of flies in the face of the need for security to be more closed, more alert and more skeptical and cynical," said Rodney Petersen, senior policy adviser for SecuriCORE, a higher-education information security project at Indiana University. Just as campuses have added gates, guards and surveillance cameras on in recent decades, they may have to end the era of open access to online resources, he said.

The University of Maryland and other institutions reeling from major data thefts are redoubling efforts to confine and protect sensitive data spread across networks - sometimes so scattered that it's a complicated task simply to learn where the data might be hiding and vulnerable. The growing security risks may also require new barriers around networks that have been traditionally open in the name of academic discourse and unfettered access.
But unlike retailers, banks and other companies that guard sensitive data, universities can't mandate what devices or software are used to access their networks. And they must accommodate students and researchers spread across the globe, making it more difficult to prevent and detect security breaches.

Bring Your Own Device (BYOD) is not really the issue.  

It is understanding BYOD is NOT an ISSUE!

KEYTALK has resolved this for over twenty years and has been protecting governments and enterprise in Europe against such issues.

Since a breach compromised names, Social Security numbers and birth dates of 287,580 students, faculty and staff at the University of Maryland on Feb. 18, officials said they have purged more than three-fourths of the sensitive records, some of which dated back to 1992. But they are also hastening to learn how vulnerable the university's data remains, and how to prevent future attacks.

A cyber-security task force that university President Wallace Loh called together within 24 hours of the attack is set to consider whether information technology systems on campus should be centralized to keep sensitive data in one place, rather than scattered across various colleges and departments. The group, which met for the first time last week, also is launching an effort to scan all university databases for personal information that could be at risk.
Similar actions have taken place at Johns Hopkins, where officials on March 6 announced an attack that occurred late last year compromising names and email addresses of 848 bio-medical engineering students, as well as confidential evaluations of classmates. In response to attacks and at the urging of auditors, the university has moved to prioritize what data needs the highest levels of protection, said Darren Lacey, the university's chief information security officer.

It is not about where you store the information, it is about how you allow access.

There is an even simpler method which is more cost effective, virtually zero management and productive, KEYTALK!

Understand, that by using your log-in human credentials, (password), you are the total opposite of being secure! Your data, transactions and or your Identity is at major risk to be stolen by hackers, phishers and man in the middle brutal attackers.

KEYTALK, not only it secures the connection end to end but KEYTALK also distributes short lived device DNA related keys for access. DNA is pulled out the device based on a combination of 12 to 17 device components.

This means you are hidden in the KEYTALK bullet resistant end to end data in motion tube, totally anonymous to all!  This works to a major advantage, especially in the education campus environment.  The device is their secure connection and once the transaction of information is finished, there is nothing on the device to even show there was a connection.

We ask you to become more educated and take a leaf out of the Book of Learning, research, call and let us explain in simple terms on how and why KEYTALK is the Answer.  This will give you A+ grade to all, including the parents who fund your establishments.


WE are in the NOW and
KEEP YOU; in the KNOW…



Worldwide Call: +1 (317) 426.0110


Key Talk – Man-In-The-Middle, Hacking & Phishing Solutions
Straight Talking Key Talking… KEYTALK!

Galveston, Texas, Indianapolis, Indiana, London & North Wales, U.K., Netherlands, Lithuania, K.L. Malaysia
Tracometry Group of Companies – Reg. Office. Dorrington Farm, Rye Hill Road, Harlow, Essex CM18 7jF


Copyright 2014

Thursday, March 20, 2014

Action In Motion – Asset Information Management with Full Chain of Custody!

 Action In Motion – Asset Information Management


This is a unique web/cloud based 
Asset Information Management Solution Platform

Real Time Incident/Event Management Visual Information
  • Fresh Eyes
  • Real Time – Any Time – Anywhere
  • Directly To Your Server
  • Date/Time/GPS Location
  • Secure Evidence Chain

Using a range of devices (mobile phones, tablets and laptops) the AIM Solution is a comprehensive, but simple to operate, completely automated software system for uploading captured Data (audio/video clips and images), which automatically incorporates details of date, time, GPS location and originator of the Data – essentially turning mobile devices into a “live” stream to your server, creating a Chain of Evidence.

The AIM Solution, sits on a windows Internet based server, with a secure password log-in requirement.  

It also has KEYTALK, the Secure DNA Connection. 

AIM was developed, by a team of retired police officers and computer security specialists. 

It enables Authorized and Trusted Users to have real time access to transmitted Data, to view, monitor and manage incidents and events throughout their duration.

Utilizing sophisticated search tools, the AIM Solution enables the transmitted Data (Videos/Images) stored on your servers, to be searched under the same parameters (date, time, GPS location and originator) and for that Data (Videos/Images) to be shared with all Authorized/Trusted Users and, where applicable, clients as well.

Imagine the possibilities of having the equivalent of multiple hand held mobile cameras at a location of an event or incident, whereby “live” Data of (audio/video/images) can be streamed to and from those at the scene to a central control center and other devices at the event.  Even link into existing CCTV and record on law enforcement’ servers

The Data can assist with the co-ordination of responses commensurate to deal with the event or incident; provide “live” recording and playback facilities; sharing the Data “live” across a range of ‘authorized/trusted’ users and provide irrefutable evidence (with full chain of command) of the circumstances of the event or incident so as to ensure its admissibility in any subsequent criminal and or civil court proceedings.

Imagine a paramedic at the scene of an accident can now transmit advance photographs/video of the injured person’s injuries direct to the hospital, as on-site treatment is being carried out and before the injured party is moved.  The ER Department or Doctors surgery/hospital consultant can guide from afar as to appropriate treatment.

A wide spectrum of organizations, including, facilities management, insurance industry and the construction industries, where “live” Data (audio/video /images) can be transmitted to a PC ‘back at the office’, stored on your servers with date/time/GPS location, where it can be used for a wide range of day to day functions such as carrying out and recording risk assessments, documentation of work schedules and contract compliance, monitoring the delivery and handling of materials, monitoring of Health and Safety compliance etc. Or, for the management of a sporting event to have an on-site temporary event management communications system.

The transmitted Data (images/audio/video) can be forwarded to another organizations' FTP server, thus enabling them to use their own (API) to integrate the Data into their own platform.

This is the most secure transmission of data, (video/audio/images).  KEYTALK is your secure connection.

You can still use the password, but what is really allowing you to enter the system is your devices DNA, this authorizes you and knows you are a trusted device.

You are then transmitting in a secure bullet resistant connection, even in Hotspots, you are anonymous and secure.

Real Time Solutions for Industry
  • Accident Investigation
  • Paramedics
  • Police Officers
  • District Nurses
  • Security Officers
  • Loss Prevention
  • Construction Work
  • Fire Department
  • Health and Safety
  • Insurance Risk Assessors



For Your Fresh Recorded Eyes Contact Us:

Aim@tracometry.com or call +1 (317) 426.0110

Wednesday, March 19, 2014

How Real Is The Threat To Your Corporate & Personal Information?

How Real Is The Threat To
Your Corporate & Personal Information?
By Nick Ashton, Founder, CEO, Tracometry Group of Companies.

Unless you have been in a cave in the depths of Utah or a member of a Pot Club in Colorado, you should have been very aware that Hackers, Phishers and Man in the Middle Brutal Attackers have been extremely busy and very successful in accessing and stealing data.

You though must be securing your own computers, including your Smart Mobile Phones.  Malware protection is available and the best free product is from Microsoft.

Cyber-Terrorism, hacking, has been going on for decades and suddenly the increase was felt on a vast personal basis when the retail chain, Target suffered, as their customers the brunt of a full force cyber terror attack.  It is stated that 70-140 million records were stolen from their database.  One is too many and Target believe they were secure, they relied on their IT department be their frontline protection.  Obviously, they did not do enough and think that they can handle internally.

Universities and our youth is under attack and the Duke University was HACKED and then announced they had taken precautions and all was well.  It was not, the next day HACKED AGAIN!

I can assure you that for all commerce, education facilities and the protection of clients and customers, KEYTALK has a solid answer and solution.

After all, KEYTALK has been protecting data on the move for over twenty years plus, so someone had to know!

You notice, we are not stating that this what happened.  Is it possible, yes, feasible, yes!

The door is wide open on any computer system for compromise and serious consequences.  Not just the hacking of Target, who were the bull’s-eye for being the center of customer data and information theft of up to 140 million records of their customers.

Can this be rectified quickly, effectively and not cost prohibitive?
YES!

It is all about a secure connection.  We are using passwords for this, passwords for that, pin numbers and they are all created by humans.  Created by humans and stolen by lowlife humans!

Our philosophy is simple, make the device (Server, Desktop PC/Mac, Laptop, Tablet or Smart Mobile Phone) the access point.  The devices DNA is the Key, hence KEYTALK.

We create a bomb-proof tube that is the connection, all data in motion that travels is 100% secure.  The log on is a short lived certificate, which is encrypted beyond the normal encryption level used in government or banking.  Once verified, it becomes a direct connection to do its business.  Nothing of this connection, once completed, is left on the originators device whatsoever.

Corporations can use this for BYOD (Bring Your Own Device) with the security that pleases even the IT Department.  In fact, you can use this connection via a hotel or public hotspot without being seen whatsoever.  Anonymously sending information and the hacker has no idea that you are doing so.

So, today we talking with our client to expand his usage and you, can also call us and please understand, we have the answer.


WE are in the NOW and
KEEP YOU; in the KNOW…



Worldwide Call: +1 (317) 426.0110


Key Talk – Man-In-The-Middle, Hacking & Phishing Solutions
Straight Talking, Key Talking… KEYTALK!


Galveston, Texas, Indianapolis, Indiana, London & North Wales, U.K., Netherlands, Lithuania, K.L. Malaysia
Tracometry Group of Companies – Office. Dorrington Farm, Rye Hill Road, Harlow, Essex CM18 7jF


Copyright 2014