Showing posts with label cyber security. Show all posts
Showing posts with label cyber security. Show all posts

Tuesday, October 04, 2016

National Cyber Security Awareness Month

.



October 3, 2016

National Cyber Security Awareness Month

Cyber Security is Everyone's Responsibility
Data breaches resulting in the compromise of personally identifiable information of thousands of Americans. Intrusions into financial, corporate, and government networks. Complex financial schemes committed by sophisticated cyber criminals against businesses and the public in general.
These are just a few examples of crimes perpetrated online over the past year or so, and part of the reason why Director James Comey, testifying before Congress last week, said that “the pervasiveness of the cyber threat is such that the FBI and other intelligence, military, homeland security, and law enforcement agencies across the government view cyber security and cyber attacks as a top priority.” The FBI, according to Comey, targets the most dangerous malicious cyber activity—high-level intrusions by state-sponsored hackers and global cyber syndicates, and the most prolific botnets. And in doing so, we work collaboratively with our domestic and international partners and the private sector.
But it’s important for individuals, businesses, and others to be involved in their own cyber security. And National Cyber Security Awareness Month—a Department of Homeland Security-administered campaign held every October—is perhaps the most appropriate time to reflect on the universe of cyber threats and on doing your part to secure your own devices, networks, and data.
What are some of the more prolific cyber threats we’re currently facing?
Ransomware is type of malware that infects computers and restricts users’ access to their files or threatens the permanent destruction of their information unless a ransom is paid. In addition to individual users, ransomware has infected entities such as schools, hospitals, and police departments. The actors behind these sophisticated schemes advise the users that if they pay the ransom, they will receive the private key needed to decrypt the files. Most recently, these cyber criminals—demonstrating some business savvy—give victims the option of decrypting one file for free to prove that they have the ability to restore the locked files. More on ransomware.
Business e-mail compromise, or BEC, scams continue to impact many businesses across the U.S. and abroad. BEC is a type of payment fraud that involves the compromise of legitimate business e-mail accounts—often belonging to either the chief executive officer or the chief financial officer—for the purpose of conducting unauthorized wire transfers. After compromising a company’s e-mail account—usually through social engineering or malware—the criminals are then able to send wire transfer instructions using the victim’s e-mail or a spoofed e-mail account. BEC scams have been reported in all 50 states and in 100 countries and have caused estimated losses of more than $3 billion worldwide. More on BEC scams.
Intellectual property theft involves robbing individuals or companies of their ideas, inventions, and creative expressions—often stolen when computers and networks are accessed by unscrupulous competitors, hackers, and other criminals. Intellectual property can include everything from trade secrets and proprietary products and parts to movies, music, and software. And the enforcement of laws protecting intellectual property rights (IPR)—which are critical to protecting the U.S. economy, our national security, and the health and safety of the American public—is an FBI criminal priority. The Bureau’s IPR focus is the theft of trade secrets and infringements on products that can impact consumers’ health and safety, including counterfeit aircraft, automotive, and electronic parts. More on intellectual property theft.
“The FBI is doing everything we possibly can, at every level, to make it harder for cyber criminals to operate,” says Associate Executive Assistant Director David Johnson, “and I believe many of them are now starting to think twice before they put fingers to keyboard. But we also ask that the public do its part by taking precautions and implementing safeguards to protect their own data.”
Check back on our website during the month of October for information on protecting your data and devices and on FBI efforts to combat the most egregious cyber criminals.
Resources:

Friday, November 21, 2014

Truth or Consequences - China Hackers Threaten USA Power Grid

.

This week we were informed that Chinese hackers could disable the United States Power Grid and paralyze the American economy.   The following extract came from The Inquisitr Online.


 
The Inquisitr   November 20, 2014
NSA Director Says Chinese Cyber Hackers Can Shut Down U.S. Power Grid

NSA Director Michael Rogers says that Chinese cyber hackers can shut down the power grid in the United States and essentially end life as we know it in America. According to the federal official, China and “one or two” other countries are capable of launching cyberattacks that terminate the ability of the power grid to function and shut down other “critical systems” nationwide.

The real possibility of massive and devastating power grid cyberattacks has long been discussed by both national security experts and the five million prepper families in the United States, but has not officially been confirmed by a “top cyber official” in the federal government until now. Former Department of Homeland Security Secretary Janet Napolitano said, not long after leaving office, that a cyberattack on the power grid was a matter of “when,” not “if.”

During a House Intelligence Committee hearing, NSA Director Michael Rogers said “adversaries” of the United States are currently engaging in “electronic reconnaissance” on a regular basis. Such activities are being conducted in order to ensure that China and other adversarial nations are “in a position to disrupt the industrial control systems” such as the power grid, which enable food and medication delivery and allow chemical facilities and water treatment plants to function.

The NSA director also said, “All of that leads me to believe it is only a matter of when, not if, we are going to see something dramatic. [In cyberspace] You can literally do almost anything you want, and there is not a price to pay for it.”


What is wrong with this picture?  On May 21, 2001, nearly four months BEFORE the tragic 9-11 terrorist attack on the World Trade Center at a News Conference at the National Press Center in Washington, D.C. a new company announced a cyber security system that could block any cyber attack on our power grid and any other critical digital operations in America.

Who was the first client of Invicta Networks,  the new company, the NSA.  So this week, 13 years later, NSA admits we have no defense for our power grid from a cyber attack.  Yet 13 years ago, they were testing a system that could protect our power grid.  What happened?


Special briefings were presented to the top cyber officials in the White House, Pentagon, and Intelligence agencies including the cyber czars like Richard A. Clarke for President Bush and President Obama.

In the time since 9-11 our government spent billions and billions of dollars on cyber security to protect the economy, banks, the power grid, classified government data bases and who knows what else.  Yet in the past year hackers have stolen over 500 million credit card, banking and phone records of our citizens.  Some protection.


The same ineffective computer security companies that dominated the Internet in 2001 dominate the Internet in 2014 except many have been acquired by giant defense contractors.  So the same companies that control the most powerful weapons systems in the world also dominate cyber security in the world.  Do you feel more secure as a result?  

Certainly the systems are not working if NSA says we are vulnerable.


Contrary to what NSA said, China is not the only threat.  There are Russian hackers, former Russian KGB and now Russian mob hackers, hackers from the Netherlands, the independent group Anonymous and of course employees and contractors for our very own intelligence agencies (remember Edward Snowden and NSA).


Congress should investigate why the White House national security advisors and USA intelligence agencies ignored solutions to our problems over the years and blocked companies like Invicta from protecting American assets.  Perhaps the true extent of our deception has not been discovered.
.

Tuesday, July 01, 2014

Watch, weep, enjoy, whatever - cyber attacks in real time - the ultimate reality show!

.

This Site Shows Who Is Hacking Whom Right Now — And The US Is Getting Hammered

By Jeremy Bender 

U.S.-based computer security firm Norse has released a real-time animated map that illustrates ongoing cyberattacks around the world. Without a doubt, the U.S. is getting constantly hammered by hackers.

In just 45 minutes, the U.S. was the victim of 5,840 cyberattacks.



[Click on this link for real time attacks]

Screenshot/map.ipviking.com

A view of the cyberattacks carried out against the U.S. within a 45-minute span.  Within that span of time, the U.S. suffered from 27 times more cyberattacks than Thailand, the second most targeted country. Thailand was the target of only 220 cyber attacks during these 45 minutes. 

The Norse map does not represent all hacking attempts in the world. Instead, according to Smithsonian Magazine, the map relies on a Norse honeypot network — a network purposefully designed to detect hacking — to provide a representative snapshot of global hacking attempts.

In actuality, there are orders of magnitude more hacking attempts on any given day than recorded by Norse. For instance, there are an estimated 20 million attacks per day against locations within Utah. There are 10 million daily hacking attempts against the Pentagon alone.


China is responsible for the vast majority of these attacks. Within the 45-minute span, China accounted for 2,513 attacks. The U.S. accounted for the second highest number of attacks, with 1,550 attacks originating within America. However, a number of American attacks targeted computers elsewhere in the United States.

It is likely that these intra-U.S. attacks are the result of "zombie computers"  — computers that have been compromised by a hacker and carry out attacks at the hacker's discretion.


Chinese cyber attacks are highly damaging to both the U.S. economy and national security. China is currently developing a new plane that is modeled after stolen plans for the U.S. F-35 fifth-generation plane.

Wednesday, October 16, 2013

Main Street Media Blows it Again - Fails to Report on Intelligence Disasters Right Under their Noses

.


 CIA FBI NSA DIA - Whose Spying on Them? 
 
Thank God for the Guardian and Telegraph of England or we Americans would have no idea what our own intelligence agencies having been doing to us and people around the world.
 
One might think our news media people are in cahoots with our intelligence (or is it unintelligence) people the way the media fails to cover and follow up on major breaking news regarding the intelligence disasters in America.
 
The following release is about a new book by a former KGB major and one of the most significant defections to America during the Cold War, Victor Sheymov.

 
More important, it is about how he was treated by the American intelligence agencies after he came here to help out.
 
The most disastrous sky scandals of the past 20 years, the Aldrich Ames CIA fiasco and the Robert Hanssen FBI fiasco both centered on Victor and the KGB interest in his activities once he defected to America.  You might say they were prepared to do all possible to infiltrate the CIA and make certain Victor had a very short stay here in the states.  Need I say more?
 
His story may help tear the gates off Hell and expose more of the surreptitious actions by our national security protectors when it comes to intelligence agencies out of control who show a total disregard for the laws of the land and our place in the world.
 
 
Terrorism, counter-intelligence and national security sound patriotic until one explores the depths of the dark side of life where the intelligence games are played out and learns of the victims of these games caught up in power struggles, egos and fanaticism that defy all principles of individual freedom and rights.
 
Whether the CIA, the FBI or the NSA, are we really safer with them on our side?  If so why are so many scandals carried out in the very offices of our own protectors?
 
 
Well once again the media has failed to not only grasp, but to find, a story that lays out the "Bare" facts about the dark side of intelligence.  Thank God for Amazon, where one can still find the truth by reading the latest books on Kindle like Victor Sheymov's incredible expose, TieBreaker - Tower of Secrets II, the sequel to his riveting book Tower of Secrets.
 
 
Here is the release our Main Street media are too busy to report on.  Once again the New York Times, Washington Post, Wall Street Journal, NBC-ABC-CBS news and all the other so called viable news media in America should be ashamed.
 
As David Ignatius, Associate Editor of The Washington Post said,  "Sheymov knew the secrets that spy services die to protect."
 
Look for the truth in the London Telegraph or Coltons Point Times.
 
 
CYBER BOOKS PUBLISHING
 
FOR IMMEDIATE RELEASE
   
October 2013                                                   contact@cyberbookspublishing.com

Cybersecurity Expert Reveals the Seismic Faults in the Spying Business

TIEBREAKER: Tower of Secrets II

By Victor Sheymov

In one of the most daring operations of the Cold War the CIA exfiltrated Victor Sheymov, his wife and young daughter, and brought them to the US.  Sheymov, as a key player of KGB cyber communications security, had extraordinary knowledge of the whole KGB organization, and the CIA awarded him the highest grade of the intelligence medal for the services he rendered to the United States. Yet for the ten years that he and his family remained under deep cover, unbeknownst to the KGB, working at the highest levels of the NSA and British Intelligence, the CIA itself turned out to be Sheymov’s most insidiously persistent, and dangerous enemy. Why?

TIEBREAKER is the fascinating story of how Victor Sheymov figured out the reason behind the campaign to destroy him and his family, and the cause of the CIA’s catastrophic intelligence failures that the public had a chance to have a glimpse at with the arrest of Aldrich Ames in 1994.

Sheymov then found himself at the center of the next intelligence crisis with the arrest in 2001 of his longtime FBI liaison, Robert Hanssen.

And now Victor Sheymov, world-class cyber security expert and inventor of a breakthrough cybersecurity technology, finds himself at the heart of the search of  the solution to the rapidly growing global threat to cyber security.

Sheymov analyzes the factual failure of the firewall technology and the basis of this breakthrough concept in his other new book,

CYBERSPACE AND SECURITY:

A Fundamentally New Approach

Cyberspace is defined, and differentiated from out physical space. New method of consummations, Variable Cyber Coordinates (VCC) that provides for superior level of security is described and detailed.
 
TOWER OF SECRETS
 
Sheymov told the story of his meteoric career in the KGB, and his disillusionment with Communism and the Soviet system that led to his decision to defect, in his first book.
 
Superlative...a breathtaking true story...a towering book, fascinating and hair-raising...far more exciting than the most exciting accomplished fiction of the spy genre. Associated Press 
 
Sheymov knew the secrets that spy services die to protect.   David Ignatius, Associate Editor of The Washington Post, author of Agents of InnocenceBody of Lies

While the story ends abruptly with Sheymov's escorted arrival in N.Y.C., it seems likely that the information he subsequently furnished hastened the Cold War's end. A top-level insider's dramatic, stranger-than-fiction disclosures in the great game of espionage.     Kirkus Reviews
.

Saturday, July 06, 2013

Obama's Maximus Mea Culpa - NSA Aftermath



Far from the maddening lights and cameras to which he is accustomed, President Obama has been forced to offer the Maximus Mea Culpa to friends, allies and major investors alike as he is the first world leader caught with his fingers in the cookie jar of cyber scandal.
 
Leave it to the National Security Agency, NSA, the most mysterious of all our intelligence agencies in America, to give a top security clearance to a private NSA contractor who within a matter of months after getting the job was blabbering all the NSA secrets to an English newspaper.
 
 
Unfortunately these were not little secrets but really big stuff like the fact NSA bugged top secret computers of our friends and foes alike.  In fact they were hacked by the US 10-15 years ago and we have been listening in ever since.
 
From Germany and Britain to Russia and China, they were all hacked long ago and we have known all along what they were up to in terms of military, monetary or any other kind of policy.
 
 
Look what happened the past decade and a half.  There was Clinton's good time government with it's focus on strategic initiatives like global warming, alternate energy, legalizing fraudulent housing  mortgage programs, and increasing the duties of White House Interns.
 
Bush brought us the 911 terrorist attack, war in Iraq and Afghanistan and pretty much a collapsed economy, while Obama brought us, well, more of the same.  How many of our decisions were made based on information we "legally stole" from everyone else?
 
 
Better yet, if NSA was tapping phones and emails all these years surely they were aware of the 911 attack in advance.  Were they aware and did they sit on the information?  Let's hope not.
 
Regardless, they did bug all those nations and leaders through phones and the Internet so President Obama is now left with a lot of explaining to do and with a need to demonstrate a sincere Mea Culpa to those friends and allies.
 
Ironically, while it is Germany who demanded the first private meeting with the president people from Britain to the European Union are in the queue wanting similar assurances we have not compromised their national security.
 

Then there is China, our Sugar Daddy yet willing to join with Russia at any time to block Obama initiatives in the United Nations.  Many times Obama has accused the Chinese of "cheating" by hacking American computers.
 
The last time the White House made a big deal of showing how the hack attack had come from a very specific building in China.  I guess we know now how the White House knew about the Chinese hacking connection since the US has been hacking everyone for a very long time.  However, the truth that we were secretly hacking China the last 15 years while protesting Chinese attacks on us is quite disingenuous.
 
 
We need China as an ally to help us in Asia and the Middle East.  That is beyond the fact they are the largest owner of our national debt in the world.  And there is a great deal in import and export trade between the US and China significantly helping both nations.
 
We also need Russia as an ally in the same places.  Yet we accuse them both of all kinds of mischievous behavior.
 
 
Let us hope our national security policy is not guided by paranoid patriotism but by logic, ethics and a respect for individual rights and freedom.  I doubt the record as the NSA mess unfolds will be good news.
.
 

Thursday, April 05, 2012

Letter from the Editor: Cyber Security - Of course you're not alone!

.

Got an autonomous email, probably from the W____ H____.  It was just one line.  "Are you out of your mind?  It was a good question so I thought about it for a while.

Then answered, "maybe just a little bit."

I'm sure that private communication between two people about rather personal matters will be sold, resold, hacked and manipulated by the dark side of the Internet world before it is even read.

The virtual world of Internet predators is alive, well and in total control of your life if you let them be.  Most times you don't even know you did.

In fact the world wide dependence on the Internet suggest it is the lifeblood of today's generation.  So we have a new generation for the first time absolutely dependent on external technology and the information embedded in that technology for the survival and evolution of our culture.

Oh my gosh, I'm starting to sound like one of those ethereal theoretical brains in the Obama academia playground called the White House.


Still, in the mysterious cyber world, we are not being told the truth.

Identity theft, hacking into personal files, stolen cell phone, credit card and social security numbers have spawned an entire new industry, cyber theft.  Billions and billions and even more billions of dollars are lost to cyber theft every year.

But don't worry.  If someone steals from one of your accounts the phone company or credit card company will not charge you if you bring it to their attention.  Of course if you don't notice it on your bill, you may be liable.

Just count on being a cyber victim.  And you might as well count on an increase in cell phone, banking or other fees to cover the cost of losses paid out.  They are not going to lose money just because they lost money when they can count on the government, federal government that is, to give them a tax credit to cover any extra cost.


The public never comes out ahead.

Right now so many government agencies have hacked into computers owned by other governments, corporations or persons of interest that they need to protect their assets by making certain the status quo remains.

In other words, cyber security systems that really do protect data have long been known to the government, both intelligence and defense agencies.

The abilities of these new and largely unknown security measures in terms of the detection of unwanted hack attacks, and the ability to make the protected information simply disappear into cyber oblivion, are among the powerful features that could protect you and your private records from preying eyes, cyber thieves and Big Brother.

But if these breakthrough technologies were allowed to be sold to the world then they would expose the secret cyber activities of all the intelligence agencies along with the financial theft, marketing and predatory activities currently underway.

As long as no one but the consumer loses through higher service fees, inflation and other techniques then the economy can continue uninterrupted.  So much is "off the balance sheet" anymore no one really understands the full implications of the validity of our financial system and it's underlying foundation.


Common sense alone should alert you to warning signs about the ability of our federal government to be benevolent, efficient, fair or even competent.  There are some things they do right, even better than the private sector.  But if there is current corruption in the cyber world those involved must be punished commensurate to the broadest impact of their crime.

If someone steals your purse they could be charged with a criminal misdemeanor because your victim is one person.  They would probably get probation.

In the cyber world one attack or hack could steal millions of people's records and generate tens of millions of dollars in consumer fraud.  It could take over a nuclear reactor or shut down the electric supply to a city.


You are not protected.  The master cyber thieves leave no trace of their raid on your life and identity.  Their goal, like the goal of intelligence agencies as well, is to plant enough undetected monitors in your system to allow them to see all email, texts, transactions, cell phone calls, current and historical Internet searches, GPS uses, and well you get the idea.

In America in the digital world you will never be alone.  In fact there may be a rather large crowd already monitoring your every transaction, movement, interests and forms of entertainment.

If you want cyber security go live with the Hopi Indians in Arizona.  But first give up all your so called "modern" conveniences.
.

Tuesday, November 23, 2010

WizArmor™Avatar - Cyber Bodyguard for Youth Internet Computer Security - Unleashed on Internet

.


Using fascinating new stealth technologies, algorithms never seen before and incredible futuristic cloning techniques, there may be hope for Internet users, especially the unsuspecting youth, from the WizArmor™Avatar cyber security techology.


Modern technology, especially the Internet, has opened a world of opportunity and wonder with incredible learning and skill development opportunities for our Youth.

At the same time, the Internet is unregulated by any government, beyond the control of any nation, cannot be censored for moral or crime prevention purposes. Children are often victimized by the most vicious and sophisticated criminals, hackers and predators in our history.

Our Youth, our Teens and Tweens, face very real but invisible Internet dangers including Predators, Pornography, Crime, Identity Theft, Child Porn, Scams, Sexting and Invasion of Privacy. In fact more and more Youth every day become victims of the "creepo" deviants seeking to entrap and victimize them.

The WizArmor™Avatar incorporates next generation computer security technology featuring unique patented techniques to create a clone of the user system and route all incoming traffic into the clone for testing, thus capturing all known and unknown malware before it can infect the user pc.

Upon identification of the invader the WizArmor™Avatar destroys the clone along with the invader and never allows the user computer to be infected. A new WizArmor™Avatar clone instantaneously replaces the destroyed clone.

The WizArmor™Avatar protects the individual user computer from all known types of malware such as viruses, worms, spyware and other techniques of invisible predators intended seek out and find potential victims without their knowledge.

WizArmor technology takes a new approach. It does not care how the potential offender “looks” – it does not depend on a database of known viruses or worms. Instead, when installed, the system builds a “clone” of your computer. All the potential offenders are directed into that “clone” and tested there. If the “clone“ is harmed – it is destroyed along with the offender and a new “clone” is immediately erected.

All computer users are painfully familiar with the first generation "legacy" security systems purportedly protecting their computers – the endless “patches” and the urgent updating for “newly discovered critical vulnerabilities”. And, of course, “scanning” – the most annoying activity of searching all your files for the known malware that has already infected and is hiding in their computers. We all know that this scanning usually comes at the worst time, ties up our computers for a long period, and usually is hopeless.

The reason for shortcomings in the first generation "legacy" computer security systems is the principle they are based on. These systems can protect only against known to the database offenders. How do these offenders become known to the database? Simple -- by infecting computers. In other words, when a new virus is released it is not known to the database, so it easily gets through all the defenses and infects computer. Then, if somebody figures out what happened, a “patch” is developed, and the virus is added to the database. But it’s too late; a lot of damage has already been done. Needless to say, maintaining the active virus database and developing “patches” is cumbersome and expensive, and the user eventually pays for it.

Is the threat real? On September 17, 2010 Congressman Chris Smith (R-N.J.) told a House subcommittee that stronger efforts need to be made to curb the scourge of child sex-trafficking, which has gained new fuel through the internet.

A 2009 National Report on Domestic Minor Sex Trafficking, America’s Prostituted Children, conducted by Shared Hope International, found an estimated 100,000 U.S. minors are victimized annually with the average age of initial exploitation between 12-13 years old.

The US State Department’s recent annual report on human trafficking estimates that the number of “adults and children in forced labor, bonded labor, and forced prostitution around the world” is 12.3 million.

Identity theft through malware and hacking results in the hijacking of bank, credit card and other personal information then used to victimize Young users and can lead to long term credit and other problems that can plague them for years.

The WizArmor™Avatar is your cyber bodyguard to protect our Youth from all such unknown attacks that infect personal computers. You can even watch the attacks in Real Time while your Avatar seeks out and destroys your enemy. For information please visit our web site at WizArmor.com and discover for yourself how the WizArmor™Avatar can protect our Youth while allowing Parents the knowledge that a powerful invisible Sentinel is always on guard defending our Children from harm.
.
Wiz Enterprises of Virginia today released the first new generation of Internet Computer Security for our Youth, called the WizArmor™Avatar, designed to provide a cyber bodyguard to protect teen and tween users from the multitude of Internet predators seeking young victims on the Internet. Go to WizArmor.com and see.

Friday, November 19, 2010

Cyber Security - Kids in the Internet Age - an Opportunity or Tragedy? Computer Security Risks

.

What a decision for parents, deciding how to let your teens and tweens use the Internet. I mean look at the pressures to give them free rein of the cyber world.

Modern technology, especially the Internet, has opened a world of opportunity and wonder with incredible learning and skill development opportunities for our Youth.


At the same time, the Internet is unregulated by any government, beyond the control of any nation, cannot be censored for moral or crime prevention purposes. Children are often victimized by the most vicious and sophisticated criminals, hackers and predators in our history.

Our Youth, our Teens and Tweens, face very real but invisible Internet dangers including Predators, Pornography, Crime, Identity Theft, Child Porn, Scams, Sexting and Invasion of Privacy. In fact more and more Youth every day become victims of the "creepo" deviants seeking to entrap and victimize them.




There are thousands of predator sites that use spam, viruses and malware to gain secret access to unsuspecting youth and they are masters at appealing to the lonely, outcast, curious, thrill seeking and just plain lack of common sense attitudes that may prevail when kids take to the cyber highways.

Most kids have no idea they have even become the victims of these cyber predators until they are too far along to face the embarrassment of admitting to their parents they no longer control their own destiny. If they have the inner strength and courage to ask for help it is there, but hundreds of thousands don't and they could get caught up in a world of darkness that may threaten their very lives.


It is estimated over 300,000 youth in America have gotten caught up in child prostitution because of the need for money for drugs or status symbols, or perhaps because of the need for personal attention. Never underestimate the ability of the professional predators to identify the weakness in kids and exploit it to their advantage.

Identity theft through bank, credit card or cell phone records that can be hacked can also cause severe financial distress and may even impact on our kids ability to get into college. And the unlimited and uncensored pornography rampant on the Internet is a big draw for those just coming of age and merely curious.


In addition to the silent and invisible threat on the Internet there is a second, almost as menacing a danger which will test the maturity of your young user, the social sites and their overpowering appeal to any kid who wants to be part of the Now generation. With texting and cell phone apps, applications to the older generation, kids can be wired into the Net 24-7.

We can ill afford to rely on the protection of current computer security systems to protect our youth and long ago the cyber thieves learned how to compromise the old security and parental controls of the current legacy security systems.


Every day there are headlines in cyber security telling of the hacking of files and security breaches in the most expensive, heavily protected systems in the world from banks and credit cards to the National Security sites of our top secret defense and intelligence agencies. If the top secret sites with the best possible security can't keep out the cyber thieves, what chance do our children have to be protected?

Internet use does open up untold wealth in the form of knowledge and learning to our youth. But there is risk involved - we must protected them from the harm on the Internet as well.


There are new generation security systems coming to the market that are designed to meet the needs of the future and the time is long overdue for security systems designed to protect us and our kids today and far into the future.

Using fascinating new technologies to enhance the stealth or invisible appearance of your records and personal information, using algorithms never before in existence and incredible cloning techniques that may only be found in the most technologically advanced intelligence and defense security systems, there is hope for Internet users, especially the unsuspecting youth who have become obsessed with the Internet.


We hope to be able to tell you about these exciting new technological breakthroughs any day now, as soon as the system is available to protect our youth. There are too many hypothetical solutions to our problems and not enough real ones. Too many are discussed in future terms when the problem is immediate.

Our children need effective help now. They need to be protected from the bad guys and their evil ways today. When we report on a breakthrough in Internet Security, we won't be reporting on some theoretical technique far into the future, we will report on something you can use now because hundreds of thousands of our youth will never get to experience their future if we don't act fast.


Stay tuned because there is a tsunami of change about to be available that is the result of some of the greatest minds with the most extensive and diverse experience in intelligence and security who have been working as part of an international team for many years to finally give us the security we deserve today to meet the demands of the future.

.