OUR MOTIVATION
Summary: Motivation For This Data Security Content.
------------------------------------------------------------------------------------------
OUR MOTIVATION
In May of 2012, Niel Karlinksky on ABC News Nightline interviewed a young lady who had her identity and other financial information stolen. The summary of the article was that she had been attacked via cyber crime and had no idea how it occurred. This is typically how assaults occur. But, we don't reference this episode to pick on her, humiliate, embarass her, or anything else. We point this out to empathize with her because our Founder too, has had data stolen. But unlike most people, he tends to notice things that seem out of place, and he too, during this time was going through the experience of cyber assaults by a landlord. The difference is that the landlord was at the time in law enforcement(with Texas DPS and carried a gun and badge, though he was in "logistics"), and could still be. But this is not an attack on law enforcement. Its a defensive measure against cyber criminals, including some law enforcement that think they're above the law, and until now, those attackers(most times incorrectly defined as hackers) have been successful.
For many years, our Founder experienced various attacks on his computers, but because of the way he was using them, he was successful at avoiding any financial or identity losses. Since 2011 he's been researching a solution, in spare time and when assaults occurred and presented themselves for analysis. The contents of these tutorials, articles, and videos are the successful results of this research. We're now here to show you how to use "free" WiFi, your personal hotspot, even your personal computer in ways that will help minimize, if not eliminate, your financial, identity, and data losses. However, we can only show you how to use your computer, how to set it up and configure, what sample security applications you can use, and how to configure them or alternatives(which would be a better idea, which we'll explain in the tutorials). And though we show you this knowledge, it is solely up to you to configure and execute this Data Security Boot Camp process, outside what our application suite provides.
And whats even more significant about this topic is that in 2012, the annual financial and identity theft losses were touted to be in the range of $400 MILLION per year. As of the Fall of 2017, the numbers being described were around $16 BILLION annually(and since then, the numbers have grown into the 100's of Billions, not including the Trillions range expected for ransomware losses alone). We're not going to quote specific sources simply because we think this issue is fairly prevalent and we're here to help people with their future, not commiserate about the past.
Another aspect about this process, is that its NOT just a checklist of things to install, configure, etc. Its a combination of these, but the most significant aspect is that we teach you how to analyze, investigate, research, and hopefully resolve problems for potential future issues with your system. The analogy is that you don't just plant a garden and expect the weeds to pull themselves or the plants to water themselves. There is an investment of time required by you to maintain it after the initial deployment. And we have implemented and used this process in some of the most vicious locations you can imagine, including temporary-stay hotels and RV parks. The best case scenario is that you'll experience a short-term denial of service attack on your cellphone or router hotspot, until the attackers get tired and realize they're just wasting time. Worst case you can imagine in the event you don't maintain the solutions you've been taught to implement.
So this is what we're about. We encourage you to read and view most, if not all, of the content on this site, simply to get a feel for where we're going with this and where we've been. And to understand some of our motivation, an extra encouragement to read the Attacks section in Our History material, Chapter A1, to learn how our Founders' relatives avoided paying Federal Taxes on his mothers' multi-million dollar inheritance, stole his fathers' property, and assaulted him at his mothers' funeral in order to completely embezzle her money and try and cover up their deceits. Oh yeah, one's a lawyer as well as an ordained minister and another with a career in law enforcement currently is a Police Chief, formerly of Texas DPS in SWAT, Dive Team, and DPS Training Academy. These stories will also help you understand the kind of deceit that can happen if you're not paying attention(or might even happen if you are paying attention), and our history and focus on where we can and can't help. But most important of all, you need to determine if you can be detail oriented and can stick to the learning and execution of the process, otherwise working through these tutorials, articles, and videos will be wasted time for you.
Again, welcome to the Data Security Boot Camp.
Attackers are NOT Hackers! See the ABOUT section for our definition.
References:
- None