Thursday, April 25, 2019

The Threat Isn’t Coming, It’s Here: Security Dangers Imminent If China Controls 5G So what do we do now.

https://www.dailysignal.com/2019/04/24/the-threat-isnt-coming-its-here-security-dangers-imminent-if-china-controls-5g/?utm_source=TDS_Email&utm_medium=email&utm_campaign=CapitolBell%22&mkt_tok=eyJpIjoiT1RWak5URTFNemd3TW1NeiIsInQiOiJRVTBpZGpGOWpkVHRrVmpZeHlOY2xMNlZicW9GUXpTMWdISHdjMzNnNzJDYWlZVkdxNXpIekJCR2lHbHp0NmtHSmFJem43cmY3UjlKbWtIZDhlTU5kanRIc01YRlk4TGJBSlNzUEVSelJHNlp6NUVBY204RmdOWmpuVkpzcmJmYyJ9


Anyone concerned with protecting our wireless communications systems from state-sponsored Chinese surveillance should take note of several important, and troubling, developments.
Last year, China’s state-sponsored Huawei Technologies, which a 2012 bipartisan congressional report labeled a national security risk, surpassed Sweden’s Ericsson to become the world’s largest telecom equipment provider.
Both Huawei and the Chinese government are working furiously to integrate Huawei’s proprietary technology into emerging 5G networks throughout the world.
China has a plan on how to become the worlds HUB for all 5G cellular links, and it started with them low bidding 4G cellular equipment, equipment that it turns out with only work with Huawei and the Chinese government 5G equipment.  Trying to force the market to Huawei and the Chinese government proprietary equipment.  The more this happens the more control over the 5G market China will hold.
Considering how many links this equipment has to Chinese Espionage, it now shows the Espionage plans the Chinese have for 5G all over the world

Friday, January 25, 2019

Is Big Tech Merging With Big Brother? Kinda Looks Like It | WIRED

Is Big Tech Merging With Big Brother? Kinda Looks Like It | WIRED



This is a real threat, and as the article states, very few Americans are worried about it. Yes, if our Government is doing something like China is doing that is considered bad by Americans at almost every level, yet Big Tech is going far further in invading your privacy than even the Chinese Government is, and we all seem to be okay with it. Lest I speak on too high a soap box, I too have fallen into the Google, Facebook, and Microsoft privacy trap far to much. Once that Google number is attached to your device or Google browser it is very hard to keep anything private. The Google number rounds up all your devices into a, for lack of a better term, file on you, one that expands every time you log onto another web site, or even do a google search. Lest you try and shun Google for this, Apple uses the same technology to track their users, as does Microsoft , Facebook, even your Health Care Providers. We are giving up our privacy at an every increasing speed. And unlike the US Government, these tech giants, sell this data in one form or another to the highest bidder. China is a pretty high bidder, and they use allowing access to their Citizens as one form of payment. Google and the rest of the tech giants actually will sell data to China before they would think of selling it, to our USA Government. Europe has tried to limit some of the privacy concerns, but all in all are pretty ineffective. Try this scenario out. You buy an android operated phone, to activate the phone you have to have a Google email account. This can start the tracking and gathering right there. So you make up another Google email address, this helps for a while, but while google tracks you they see you are emailing and or visiting the same web sites as your other gmail accounts do, so now they using AI only, no people involved, start to link these all together. At some point they are all merged into the same file on you. Now you buy and Apple phone, who also assigns a tracking number to you, but thankfully you are off the Google tracking system, but if you start to use the Google Chrome browser, you are assigned a Google number, and pretty soon both Google and Apple have expanded their files on you. For the most part these firms can not even stop doing it, it is embedded into their data systems, and grows and collects things on its own. And on and on it goes and grows. So back to the beginning of this, big tech, to get into the China market has to share a lot of information on their collection capability with them, which then leaves a lot open to hackers, and some of the best are in China, but that is a whole other story. 

Tuesday, July 17, 2018

Report: Texas saw increase in student arrests for threats | State | themonitor.com

Report: Texas saw increase in student arrests for threats | State | themonitor.com



This is a problem that is looking for a solution, how to decide when it is time to act against a Student before they cause a dangerous event.  I am not sure this is the solution for everyone. But it is well worth the look  http://www.aggressionmanagement.com/lets-prevent-the-next-school-shooting.html  It allows for easy documentation of precursor acts that have historically led up to dangerous acts.  Mr. Byrnes has developed a web based solution that can be used by folks with an app on a smart phone to report suspicious events and acts that may lead to a dangerous situation.  With the app teachers, school security, or anyone authorized can report the event it goes into a database to be analysed and can point to levels of reports of suspensions that should or could require a formal evaluation of the students actions.  This same reporting structure can be used by manufactures, or any group of people that may face workplace violence and or active shooter incidents.   If gives the users a documented method to constantly evaluate threats or other suspect actions.

Top Voting Machine Vendor Admits It Installed Remote-Access Software on Systems Sold to States - Motherboard

Top Voting Machine Vendor Admits It Installed Remote-Access Software on Systems Sold to States - Motherboard



PC Anywhere is the most visible of the remote software applications that can inserted into other operating programs, and the largest.  Many other remote software applicaitons are very small, and much harder to detect. Rumor has it that most of the voting software vendors have some sort of remote access capability.  By the way the majority of specialty programs sold, have some sort of back door remote access software embedded into it.  They do it to be able to check on their software and on their fixes to the software.

Russian prosecutors want to question US intel agents - ABC News

Russian prosecutors want to question US intel agents - ABC News



This is the part our Press do not want to know, that others like Russia think, and sometimes with good reason or at least some reason, that we the USA are meddling in their business.  And they want us to admit it and stop it, sort of like our wishes on their meddling.

Pathway to Violence Video | Homeland Security

Pathway to Violence Video | Homeland Security



This is a great video for getting a pathway to understanding where violence is coming from, it is very similar to the planning stages of Terrorist events, but starts one step forward from it, the Grievance step.  IE the stepping off point, for a terrorist it could be the perceived slight against Islam, or for a work place violence issue it could be, that other person getting the promotion.  It maybe hard to pickup on prior to the event, but it should always be there when investigated. 








Thursday, April 12, 2018

IAVM

Just finished addressing 80 members of the International Association of Venue Managers, Dist. 6 on Event Security. These are event managers from arenas, stadiums and campuses in a 4 state area. With the evolving threats Special Events are facing keeping up with the newest techniques is critical. Most questions in the end dealt with active shooter situations in large arenas. Like everything, it requires planning.