Tuesday, April 22, 2014

Do Not Be As "Mad As Hell" With Bleedheart, Google Mail, It Is Not A Totally Insecure World. You Have KEYTALK US!


Do Not Be As "Mad As hell" With 
Bleedheart, google mail,
It Is not a totally insecure world. 
You Have KEYTALK US!
By Nick Ashton, Founder, CEO, Tracometry Group of Companies.

Way Ahead of the Curve! CommSmart US has been telling you about KEYTALK US's, secure connections, which includes End To End Security.  In use for over twenty years with an Encryption of 4096!  PGP is an open source end-to-end encryption used to encrypt e-mail over the Internet providing cryptographic privacy and authentication for data communication, which makes it very difficult to break.


Google is Only Now Contemplating using end to end encryption?  What!  Straight Talking... Key Talking...  DEVICE DNA is the KEYTALK WAY! 

Click for: OVERVIEW OF KEYTALK


With KeyTalk creating client certificates under its own, or your existing Certificate Authority, you can be certain no third party can potentially fake your certificate authority.

KeyTalk uses an innovative secure communication channel over any untrusted Internet connection, over which it provides your user with a short lived client side certificate in a fully automated secure manner.

The corresponding key-pair strength ranges from 2048 up to 4096 bit RSA encryption and changes with each renewed certificate.

With the client certificate being totally transparent to the end-user, a secure Man-in-the-Middle intrusion proof connection can be established using standard server configurations.

Using KeyTalk you can be certain that your sensitive data is being sent in the most secure possible manner between the client and server and vice versa. No matter if the data relates to privacy sensitive information such as: medical, financial, corporate secrets, intellectual property, and criminal proceedings.




WE are in the NOW and
KEEP YOU; in the KNOW…

Worldwide Call: +1 (317) 426.0110




Key Talk – Man-In-The-Middle, Hacking & Phishing Solutions
Straight Talking… Key Talking… Key Talk US


Galveston, Texas, Indianapolis, Indiana, London & North Wales, U.K., Netherlands, Lithuania, K.L. Malaysia
Tracometry Group of Companies – Reg. Office. Dorrington Farm, Rye Hill Road, Harlow, Essex CM18 7jF

Copyright 2014

Tuesday, April 15, 2014

The Next Event Is Still To Come... Boston One Year On...


The Next Event Is Still To Come
By Nick Ashton, Founder, CEO, Tracometry Group of Companies.

Updated One Year Later

The Boston Marathon one year ago had been coming for a long time.  You cannot give people 100% security, it is impossible and within public safety, it is not expected.  

The public, sadly demand the impossible, not seeing the overall picture of what it takes to keep us safe.  It is a world of nutcases and the single solitary loner that sneaks through and plies their awful deadly deed.

9/11 was a wake-up call for America and a relatively short period of time has passed by.  With every day that passes since the terrible event, we move into a complacent state, taking for granted that someone is watching over us.  Yes they are, but each safe day that passes, we as humans, and relax our guard.  That you cannot and must not do, we must stay on guard at all times.

Former Prime Minister, Margaret Thatcher said it best, “we have to lucky, (safe), all of the time, the terrorist only has to be lucky once.”  Somehow our ring of steel was broken, as it is a circle we can reconnect and become more vigilant once more.

I have been involved in protection from bombings since my days in the 1970’s, learning and creating the counter-terrorism techniques.  Being front line in the mass amount of Irish Republican Army’s bombing on the main land of Britain.  The days of my Metropolitan Police training at Hendon, London, with the street level experience of the inflicted violence of the bomb. The understanding of the terrorist sick mindset has kept me in contact and on the ground with the situations worldwide.

Spending time in Iraq ten years ago and the terror lessons learned with the al Qaeda factions that have been causing death and destruction worldwide. We have the experience, although distasteful, it is the knowledge and understanding that keeps us safe.  We look at events and situations with different eyes, from the dark-side, so to speak.


Right now, we must reduce the Fear Factor and Increase the Comfort Zone of the public.  That can only be achieved when you maintain your vigilance, increase your normal awareness and challenge anything out of the ordinary.  

It was with a business partner, in the development of Bomb Blast Window Film, in the early 1970’s, which is attached to the inside of the glass and holds it together in the event of an explosion.  Flying glass is the cause of most injuries and deaths in a bomb blast.  

It is the technology side of crime and terrorism that we continue in today.

It is the technology we have brought under one roof with www.commsmart.us that has made the difference. 

Our video surveillance capabilities, Action In Motion from the palm of the hand with a smart mobile phone or Tablet at street level, has revolutionized the capabilities of "live" streamed data back to an HQ or to a mobile base and every single officer in the area, tuned in to that stream with "live" video and a direct (POV) Point of View.

if you thought the video and images was effective last year, we have moved into a whole new realm of "live" capabilities.  It is the Total Recall that we must have today and we have expanded the ability to have 100% connectivity for all officers with our Secure Comms Black Box.  It is after all, a communications world!

Tracometry Group of Companies, CommSmart US works hand in hand with law enforcement to assist them to understand all the data that is generated and collected each single day.  Humans cannot cope any longer in today’s world without the analysis of information in a timely fashion.  

Public Safety has information flowing in from so many conduits and being able to be working on the information immediately, saves resources, gives intelligence information to make arrests and maintains a flow of success. 

Predictive capabilities are second to none!  Next Event Predictability is so needed today in the repetitive crimes, like, bank robbery, car thefts, rape, assault, murder and arson, to name just a few.  Real time information that can be accessed by all security cleared staff is vital to successful policing.

Our hearts still go out the families of the lost loved ones and those atrociously injured in the explosions in Boston, MA.

Public gatherings are now top of our priority list, in knowing all surrounding the events is of the most utmost importance.  They must all continue and not allow the terrorist win over, it is the reduction of the fear factor by not being complacent of the situations. 

Public Safety departments are working hard to keep everyone as safe as possible and it is with your help, this will be achieved.  Vigilance, keeping your eyes open and reporting anything strange, report it immediately.

Time is of the essence, we must use every single tool in the crime fighting tool box to succeed for us all.

WE are in the NOW and
KEEP YOU; in the KNOW… 

Call: +1 (317) 426.0110


copyright 2014






Monday, April 14, 2014

Blood Moon, BleedHeart What Do You Know Or Do You Even Care?

Blood Moon, BleedHeart
What Do You Know Or Do You Even Care?
By Nick Ashton, Founder, CEO, Tracometry Group of Companies.

It seems everyone is living in their own little world, with their problems and do not see the bigger picture.  Standard, right?

This is the most the world has been connected and yet, disconnected.  Each of us is interconnected through that World Wide Web, the Internet.  There is no more six degrees of separation, the cable coming into your home/business or the Public Wi-Fi Hotspot links us all.

What goes on in Malaysia affects you in Detroit, in fact, everywhere. 
Now let us review our responsibility, you know, the word and objectivity that is missing in most everyone’s vocabulary.  Since social or unsocial media hit the Internet, we have seen the worse come out in so many.  Anti-social behavior has never been so bad and life has not been so disjointed.

People that wish to do us harm, steal what is rightfully ours and go to any lengths are amongst us.  It is the hidden means of Hacking, Phishing, Man in the Middle Brutal Attackers that want very personal information to get into your banking and steal your money.  In a business, trade secrets and methods you use to attract to your business and the clients/customer information, they want it all.

Any SaaS application that uses a password is the most vulnerable.  This includes any program, from bank card, loyalty, email, work log-in, databases, the list is endless.  All from your personally created password and do not be naive in thinking, if you change it, it will be safe!

All computers talk to each other because a certificate is issued to allow this.  Sadly, these certificates are left open far too long.  It is like leaving your front and back door wide open or leaving your car unlocked.  For the majority, no one will mess with you, as locks are for honest people.

Some are touting a two-step sign on process for you to dance your way on the Internet or into your program.  This not needed and very unnecessary.

KEYTALK changes all that, making you secure, anonymous and invisible when you are working on the Internet.  Corporately all will be well!

Passwords are humanly created, lost, stolen and foolishly shared and we wonder why our computers get hacked!  We allow you to keep your password, which though is not the real way you are able to connect with your company data servers. 

KEYTALK uses Device DNA, the selected components that make up your devices, smart mobile phone, tablet, laptop, PC or Mac.  Once authorized, your devices are trusted and now use a bullet resistant tube to connect.  

Hardwired connections and importantly Public/Hotel Wi-Fi Hotspots.  Yes, totally secure in your connection and data in motion which you send end to end.

So what was this about a Blood Moon?
WE are in the NOW and
KEEP YOU; in the KNOW…

Worldwide Call: +1 (317) 426.0110


Key Talk – Man-In-The-Middle, Hacking & Phishing Solutions
Straight Talking... Key Talking…


Galveston, Texas, Indianapolis, Indiana, London & North Wales, U.K., Netherlands, Lithuania, K.L. Malaysia
Tracometry Group of Companies – Reg. Office. Dorrington Farm, Rye Hill Road, Harlow, Essex CM18 7jF


Copyright 2014

Thursday, April 10, 2014

HEARTBLEED, Ransom Attacks, What Is Next? Traditional PASSWORD Authentication Failed Yet Again!


HEARTBLEED, Ransom Attacks, What Is Next?
Traditional PASSWORD Authentication Failed yet Again!
By Nick Ashton, Founder, CEO, Tracometry Group of Companies.

This prove yet again that traditional PASSWORDS have FAILED!  IT managers, directors etc. are not examining their software and servers because they are too busy fighting human elements.  They are always in a reactive mode fighting the Hackers. Phishers and Man in the Middle Brutal Attackers who are preying on the frailty of humans. 

Proactivity and a cohesive understanding of what part our computers play in our day to day business is not just for the IT department, it is the Chief Executive Officer, Board and those in charge of the corporation to understand all aspects on business. 

Failure here or ignoring what you are being told is a Negation of the Duty of Care/Corporate Governance.  Meaning, you are liable as you knew, as you were told verbally or in writing, did nothing and completely left the shareholders, clients and customers vulnerable.  No insurance policy will cover you, as you failed!

Humans make mistakes and leave open their front and back doors regarding personal information. 

We reiterate, that there is a far more secure method for corporations to maintain their security as they have more end to end, data in motion between their employees, satellite, regional offices that has to be totally secure.

The basis of all communications, data, video, audio and images is security.
  Today, so many want what you have and will go to great lengths to steal it. 
With this in mind, KEYTALK Secure Computer Connections is the basis of all we do.  We start with a secure connection from the outset and are able to transit all in the knowledge it cannot be seen by anyone!  Totally invisible and anonymous in sending and receiving data. 

It is an end to end, data in motion secure connection that uses no passwordCorrect no password!  Passwords are too Human and susceptible to theft and misuse.  In fact, how does the system know it is even you?  It does not!

Device DNA is the KEYTALK Way!

When your IT department sets up the devices, which takes seconds, yes any devices, a true BYOD, (Bring Your Own Device) solution, they select components within the Smart Mobile Phone, Tablet, Laptop, PC or Mac and those become your DNA.

The human element is removed and now, when you connect, you are authorized as a trusted device and now go about your business in total security.

No matter what your business or operating system, even defunct Windows XP, we can provide security from Hackers, Phishers, Man in the Middle Brutal AttackersCyber Terrorists can see nothing you do, even in Public & Hotel Wi-Fi Hotspots

This can be overlaid on Point Sale, Vehicles, machine to machine and all that require certificates that must be updated for security purposes.  Simple virtual no maintenance required!

All affordable on a monthly or annualized commitment and is included in all our services or in a standalone operation.

In one government operation, a Federal building, the log-on and password for the Secure Wi-Fi Hotspot is displayed prominently on the cafeteria wall in large readable letters and numbers.  This is a public area! 

“The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. This compromises the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content. This allows attackers to eavesdrop communications, steal data directly from the services and users and to impersonate services and users.”

An easy-to-use exploit that is being widely traded online allows an attacker to retrieve private memory of an application that uses the vulnerable OpenSSL “libssl” library in chunks of 64kb at a time. As CERT notes, an attacker can repeatedly leverage the vulnerability to retrieve as many 64k chunks of memory as are necessary to retrieve the intended secrets.

Affected are OpenSSL versions 1.0.1 and 1.0.2-beta, which include such releases As Debian Wheezy, Ubuntu 12.04.4 LTS, Centos 6.5, Fedora 18, OpenBSD 5.3, FreeBSD 8.4, NetBSD 5.0.2 and OpenSUSE 12.2.


WE are in the NOW and
KEEP YOU; in the KNOW…

Worldwide Call: +1 (317) 426.0110
Email: info@commsmart.us



Key Talk – Man-In-The-Middle, Hacking & Phishing Solutions
Straight Talking Key Talking…


Galveston, Texas, Indianapolis, Indiana, London & North Wales, U.K., Netherlands, Lithuania, K.L. Malaysia
Tracometry Group of Companies – Reg. Office. Dorrington Farm, Rye Hill Road, Harlow, Essex CM18 7jF


Copyright 2014

Wednesday, April 9, 2014

25% of The World’s Computers Are Xpeed!

25% of The World’s Computers Are Xpeed!
By Nick Ashton, Founder, CEO, Tracometry Group of Companies.

Yesterday was not such a good day for many of the computer networks that run the nation’s electric power, oil and gas, water, chemical, and other vital systems dubbed “critical infrastructure” – it was the day Microsoft’s popular but increasingly antiquated Windows XP operating system becomes permanently vulnerable to cyber-attacks.

Really nothing has changed because most systems in these and the retail trade use the WinXP operating system as their cash register and never install the updates anyway!

It also means a new cyber-security challenges for millions of individuals and companies worldwide that still rely on the 12-year-old WinXP system to get their daily work done.  It means they have no shoulder to cry on or call up for help.

Of course XP will continue to work.  But Microsoft’s declaration means an end to free patching for XP that will make it far easier for hackers, who will no longer need to constantly develop new malicious software to penetrate more than a quarter of all the computers on the planet.

The harshest challenge is faced by critical infrastructure “enterprise asset owners” who rely on XP computers to run the industrial control systems that regulate the power grid, refineries, chemical plants, and other utilities and industries vital to the world’s economic prosperity. As it happens, many of these industrial users rarely if ever patch their WinXP work-station computers anyway – and they see no need to start now!

It seems, no it is a fact, people and business are just assisting the Hackers, Phishers and the Man in the Middle Brutal Attackers is stealing their data and supposed secure information.  Nothing like helping the cyber-terrorists!

Shutting the front and back door is important and one company can assist you in just that.  

KEYTALK is the secure connection for all your data in motion for end to end security.  BYOD (Bring Your Own Device) is no longer an issue.  Bring them all!

Computers talking to computers, which is machine to machine, is automatic with KEYTALK and it is like using a secure bullet resistant tube to connect, no one can see you are there, you are invisible and anonymous.  The Public or Hotel Wi-Fi Hotspot is secure using KEYTALK.

This is just one solution from CommSmart US, a very important one, which can stop you being so concerned about XP.


WE are in the NOW and
KEEP YOU; in the KNOW…


Worldwide Call: +1 (317) 426.0110




Key Talk – Man-In-The-Middle, Hacking & Phishing Solutions
Straight Talking Key Talking…


Galveston, Texas, Indianapolis, Indiana, London & North Wales, U.K., Netherlands, Lithuania, K.L. Malaysia
Tracometry Group of Companies – Reg. Office. Dorrington Farm, Rye Hill Road, Harlow, Essex CM18 7jF


Copyright 2014

Monday, April 7, 2014

The Four Horsemen To Stop The Cyber Apocalypse

The Four Horsemen To
Stop The Cyber Apocalypse
By Nick Ashton, Founder, CEO, Tracometry Group of Companies.

This is not just an attention grabbing headline!  The state of warfare on your privileged information is heating up and our defense mechanisms must kick in. 

Stop relying on others to do something about it! 

Computers, data, information is not in a metal fireproof filing cabinet anymore.  Never has there been so many people worldwide, been so interested in you and what information you have on your Smart Mobile Phone, Tablet, Laptop, PC, Mac or your computer servers.

It is not that they want to be your best buddy, it is what you have stored on your computers is worth billions of dollars collectively for them.  

It is worse than Charles Dickens’s Fagan from Oliver Twist, with his trained pickpockets. 

These cyber-terrorists work in groups 24/7, 365 days a year, working on how they will induce you to open an email, send corporate information on an unsecured connection.  Yes, they rely on the mistakes humans make every single moment of the day.

These can be stopped and has to be!  The mistakes you make affect us all!  After all, we all connected through the Internet!

So who are these Four Horsemen, so to speak?

CommSmart US

KEYTALK your secure, anonymous Internet connection.  Even in a Public Hotspot!  It does not rely on a password, but you can use one, even your token system for corporate connections. 

Passwords and tokens do not tell the system who is using these methods as anyone could have access to them.  KEYTALK uses Device DNA, components of the device you are using that has been initially authorized by your IT department. Totally secure and cost effective.

Action In Motion (AIM) is your means from the palm of your hand to use “live” video, audio and image transmission to your back-end servers with GPS Location, date, Time and Originator identity stamped on the file.  This is a total Chain of Evidence and already a president has been set in the U.K. Court system with the Crown Prosecution Services
  
With Action In Motion you have so many attributes in securing information from a scene or event.  A Protest Rally you can now have officers among the crowd using their Smart Mobile Phone to take pictures, just like the rest of the people.  The difference, it is transmitting “live” to your Command HQ and to other officers in the same area, who receive on their mobile phone.  Instant surveillance in the palm of your hand with a Smart Mobile Phone or Tablet.

DocUmatic – SceneDoc is the closest you will to the paperless society.  Already in use with law enforcement in the USA and Canada.

Our secure platform, SceneDoc is a smartphone/ tablet-based mobile solution that provides a variety of law enforcement personnel a highly secure, accurate and consistent means of documenting scenes and cataloging evidence.
Compatible with iOS, Android, Windows 8 and Blackberry, SceneDoc ensures unparalleled data security and integrity via cloud-based and on premise deployment models.

DocUmatic is for use with any system, including Enforcement Agents/Process Servers for all documentation.  This ensures the progress of paperwork from the courts to the final sale of goods.


Secure Comms




MOBILE MULTI-CHANNEL ROUTER SOLUTION FOR BROADBAND CONNECTIVITY

Secure Comms w24 mobile multi-channel router solution is an enabler for critical applications where broadband connectivity is a must. Where reliable connectivity and the highest possible availability is needed. Typically, such applications are:
  • Public Safety Security (Law Enforcement, Emergency Management, Fire, EMS)
  • Rail and Road Transportation
  • Industry Focused applications
  • Healthcare
Finally, making your vehicle or mobile HQ, a total connectivity super hub! 
Your communications will have never been so available, direct or productive.

As they say on those advertisements, “wait there is more”, a 1000 foot (300 m.) Wi-Fi Hotspot available for those that are trusted.  Enabling a change in devices, we now use various size tablets and smart phones and all can be in communications and on top of all that matters, with data, video, audio and images, all in the palm of your hand. 

Yes Progress… with CommSmart.  

All the four horsemen work together and separately to provide you the security and solutions your need and demand.

KEYTALK is the underlying solution for all corporate end to end, data in motion and is part of all our solutions.

These are the Four Horsemen that ride at the forefront of cyber terrorism solutions


WE are in the NOW and
KEEP YOU; in the KNOW…

Call: +1 (317) 426.0110



Key Talk – Man-In-The-Middle, Hacking & Phishing Solutions
Straight Talking Key Talking… KEYTALK!


Galveston, Texas, Indianapolis, Indiana, London & North Wales, U.K., Netherlands, Lithuania, K.L. Malaysia
Tracometry Group of Companies – Reg. Office. Dorrington Farm, Rye Hill Road, Harlow, Essex CM18 7jF

Copyright 2014