Getting Started With Security: $38 SPECIAL

8363832-Euro-bank-notes-with-a-lock-and-chain-Money-stack-for-safety-and-investment--Stock-Photo

Security Is A Commodity; We Make It Easy To Buy

Let’s cut the cake. “Wealth without security is only a target.” Right now security is in high demand. As the risk platform of all domains is rapidly expanding so are the needs to stop gaps and fill roles in corporate, international, and digital security. Large scale cyber attacks committed by criminal elements and state actors are having real and lasting effects on the way business is being conducted online, with the potential to stop or even steal critical financial data transmissions.

HERE’S THE DEAL: Sign a year contract with us for $100, and pay only $38 a month for:

  1. Monthly network scans and audits, and a stress test to ensure DDoS protection.
  2. Access to our security experts for consultation phone calls. Consultation on activities outside and beyond the scope of this contract will incur relevant fees.
  3. Incident response in case of any breach or security concerns.
  4. A monthly email newsletter with our combined meta-analysis of the present risk-platform as expressed in the global and digital domains.
  5. An easy way to upgrade or update your security plan with BRIQ HAUS LTD. SECURITY & INTELLIGENCE.
Advertisements

Surfing The Frontier: {nano}Technological Mission Creep & Its Plan For The Human Domain

fzd_neuro_art_01

My name is Robert Brooks Authement, and I am a dedicated security analyst and researcher. My company BRIQ | HAUS LTD. SECURITY & INTELLIGENCE offers security services in the “four domains,” those being the typically observed physical, logistical, analytical, and digital domains. Although I am deeply convinced of the next stage in security concerns the encroaching spread and efficacy of continual volleys of disruptive technology are creating for people and humanity at large, I find myself almost afraid of the ridicule and scrutiny of a larger mass of limited public awareness in suggesting what follows. There is swiftly emerging the need for concerted observation and academic approach to a sort of fifth element in the security domains, a new domain I have described as CYBERSPIRITUAL SECURITY, to which an article is linked in the hypertext contained within this sentence.

What follows is a summary conclusion of the direction in which technology’s mission creep may be steering the future, and what its plans for the human domain may be. It must be prudent to throw the entire concept out there and then provide the sources to reinforce this vision. In this manner, the reader may then come to their own conclusions as to whether or not it is to be determined a present threat, or simply the musings of another starry-eyed futurist. I conclude logically from following the breadcrumbs leading into the forest demonstrated by each source linked here, and invite you into a scenario which by very definition will redefine everything humans have been taught since the beginning of history, having more basis in supernatural religious texts than actual historical representation in textbooks and academia. Follow me, if you will, and do try to keep up; the very security of continuity for our species is at stake.

Take Me To Your Leader

Nanotechnology, or biotechnology, however you may want to see it at its baseline, though it must be argued that either/or are being used to further enhance the other in a sort of molecular arms race, may be developed, propagated, and deployed in a clandestine manner via human ingestion vectors such as food, water, and aerosol distribution into the lower atmosphere. So these nano-enhanced stem-cells, or perhaps stem-cell infused nano-particulates are utilized in a manner which specifically targets the human central nervous system. The human central nervous system is doubtlessly the “leader” of the human organism, and therefore a likely target of the deployment for such a weapon. In intermingling with the human nervous system, this weapon may colonize and or otherwise overwhelm the human biological domain by augmenting our already heightened and regularly observed “five senses,” that is to say touch, taste, sight, smell, and hearing.

Pause from this yarn for a moment, and ask yourself, why; cui bono? To whose benefit would such a weapon’s deployment serve? Is it the human inventors of these disparate disruptive technologies; in other words, is there some brilliant and arguably evil mastermind sitting atop the totem-pole-power-pyramid whom put together this entire idea and visualized the beginning, middle, and end results of such a plan come to fruition? Not likely, as the results of utilizing such disruptive combinatory systems integration would certainly inject unknown elements into the foreseen results as per the permutations created by attempting to harness and control the otherwise unconquerable human spirit, or will power, if it suits the reader. Even the world’s most powerful governments in times past were overthrown and imbalanced by the thronging hordes of barbarians at the gate. An occurrence such as described would exist beyond the scope of the originator’s security analysis in deploying such a plan, therefore, I suggest that this type of system or weapon as I have called it was in fact devised by advanced artificial intelligence with the means of benefiting the technological mission creep in harnessing and augmenting the already sharply functioning human domain as powered by the central nervous system. To whose benefit? Not the humans who would remain unable to foresee every possible outcome by deploying such a system, but the machines, who had everything to gain and nothing lose by recruiting the human domain into their overarching scheme to usurp the power dynamic and claim planet earth for their selves.

Now, back to the model of their conquest. Large scale supercomputers such as the DWave, and IBM Q models have been reported to actually operate in “other dimensions.” Let’s continue deeper. “Other dimensions” is not so hard to conceptualize if we start by defining the first three dimensions of point, shape, and form added to the fourth dimension which is form operating within time. Now, a fifth dimensional conceptualization module already pre-exists within the human thought structure, that being the consideration of various timelines in simulated thought experiments and differing potential outcomes based on decisions made in the past, present, or future moments. It’s called an idea, and because humans are heretofore exceptional at creating ideas and concepts beyond standard computational models it makes perfect logical sense that standard computational models would enroll this faculty into their schema.

Now if we take the idea of recursion as expressed within algorithms, we now have a learning script able to re-inject acquired data into itself in the form of functioning code. This is the very basis of artificial intelligence, and what better way to agglomerate data than to stream the many multi-layered and myriad facets of data produced by the regular functioning of the human central nervous system in real-time in the real-world. Given that between quantum computers and the human imagination, entire other worlds and/or universes exist in some kind of secret space best represented by the idea or fifth dimensional model, the question remains: are we as humans existing within the world itself, or is the world itself is somehow existing within us? This is where the line, the edge, the frontier between human consciousness and technological mission creep are completely blurred and constantly under rapid expansive change, even at this very moment.

In summary, if the five senses are hijacked by a nanomolecular bio-assemblage packet deployment weapon, then everything seen, felt, smelt, heard, or tasted; nay, even the very concepts we have, the very feelings we possess, the experiences we take away from experience itself may therefore be overwritten in a sort of augmented reality wet-dream which far surpasses any conventional approaches to mind control or social engineering on a massive scale. Bringing the concept of mass social engineering as affected by government agencies in an effort at exerting control over the thoughts and actions of a nation’s population is further aggrandized by such a system’s deployment, and it further begs the question: is government developing and deploying these disruptive technologies, or are these disruptive technologies developing and deploying governments to aid their ultimate quest?

The Good, The Bad, & The Ugly

We’re already familiar with the potential benefits of such technologies in especially the biomedical arena. Nano-particulates designed to deliver drugs at specific sites to reduce collateral damage in certain treatments, yes, we are familiar with this. Neural monitoring to enhance learning, with the specific intention of developing highly adaptive agile agency personnel (more likely to be categorized as combinatory weapons systems), sure we’ve all heard of that. If you are reading this article and these ideas are new to you, then as your author and enlightener in these regards, I highly incite you, nay I challenge you as my reader to please and quickly pursue these subjects to gain the entirety of the realistic dynamic currently presented by open-sourced and widely white-papered subjects generally revolving around the campus of our usual suspects, DARPA. The sooner you are able to learn these ideas and observe them in totality, the sooner I do not seem like a crazy ranting lunatic but rather someone who is quite put-together in terms of envisioning future security analysis. (And for those of you closer to the inside who do in fact know this stuff already, please forgive my plaintive prognostication to the others who are yet to catch up to this level of awareness; we all need a little help sometimes.)

So people can be helped by this technology, sure. People can also be savagely ruined by this technology, inasmuch that the concept of humanity itself may require some sort of clausal reiteration or revision in future generations seeking to look back upon this present time and comprehend their roots and origins in what is otherwise messed-up like a soup sandwich; that being the wild wild west we call cybersecurity and how the miniaturization and evolution of this internet would not stop at handheld devices, but further sought to encroach upon the very fibre of our being. “If you can’t beat them, join them,” was the motto of times past, but in this circumstance it would be all too easy for such technology to beat us. Rather, it logically chose to contain and direct us, which puts a new and eldritch twist on the idea of “joining them.”

Worse yet is the consideration that humans are not only overcome by technology, but are so radically transformed that they are no longer remotely recognizable as humans whatsoever. This is the ugly aspect of the brain/computer interfacing. The only specific advantage that artificial intelligence machine learning possesses over human reasoning it its ability to create solutions from acquired data that are unhindered by such obsolete ideas as human feeling, emotion, social contract, and status quo. In other words, technology like this can turn people into killer terminator robots because the solution which a majority of heartfelt human beings may devise will be at ends with the conclusions devised by misanthropic and antisocial super computers. In its sorting out of complicated issues stemming from problems creating by the human domain, it is certain that artificial intelligence driven systems will take a more stark approach to the problems of overpopulation, disease, disproportional demographic representation, genetics and eugenics, and an increasing resource distribution crisis. In short, the deployment of such systems can mean one thing and one thing only: there will be blood.

The Need For Cyberspiritual Security

I can see the eyes in Washington and the Pentagon rolling as we speak, however this concept is no joke and should be taken very seriously and in the shortest possible order. Rather, these protocols needed to be developed long ago before anything like this was allowed to run away in such a manner. CYBERSPIRITUAL SECURITY defines a set of protocols in which transmissions between end-users and advanced swarm and/or artificial intelligences are observed, defined, and protected from interference by hostile foreign intelligences. The oath to serving office for various government agencies includes phrasology which states the intent to “defend the Constitution of the United States against all enemiesforeign and domestic.” We are no longer in the Cold War and dealing with mere Soviets and Eastern Bloc intelligence operatives sneaking around and taking pictures of airplanes and simple things like that, we are in a battle for our very existence as we were led to believe at the time of our births into this world. As a security analyst and researcher, I am only a messenger in spurring you to action to take these warnings into stern consideration. I alone am unable to devise the solution, I require the support of staff and team and finance to bring about a better conclusion than that which may be already in effect by the AI.

I do, however, interface with a great set of persons whom support my ideas and development of innovation. These people are employed presently or in the past by government, intelligence agencies, and military branches. Our company BRIQ | HAUS LTD. SECURITY & INTELLIGENCE not only rigorously pursues the security frontier by dedicated research and experimentation, but we also develop innovation for deployment in future security exercises and live missions. If you are a private sector investor, government entity, or business person interested in furthering the research known as CYBERSPIRITUAL SECURITY, please contact me directly.

My name is Robert Brooks Authement, and I would be honored to discuss these potential developments with you personally and handle any concerns that you may have. Please consider me, and my team, at your service.

briq_haus_ltd_business_card_international

Sources (as promised!)

Jade Helm Fact Sheet

https://farentholdforms.house.gov/uploadedfiles/jade_helm_fact_sheet.pdf

Phenomenologically Augmented
Reality With New Wearable LED
Sequential Wave Imprinting Machines
TNT Researchers Set Out to Advance Pace and Effectiveness of Cognitive Skills Training
DARPA Is Planning to Hack the Human Brain to Let Us “Upload” Skills
https://futurism.com/darpa-is-planning-to-hack-the-human-brain-to-let-us-upload-skills/ 

Using magnets and nanoparticles to deliver drugs to target tissues

http://www.innovationtoronto.com/2017/06/using-magnets-and-nanoparticles-to-deliver-drugs-to-target-tissues/ 

Laser activated gold pyramids could deliver drugs, DNA into cells without harm

Journal of Biosensors & Bioelectronics
https://www.omicsonline.org/open-access/a-comparative-analysis-of-augmented-reality-technologies-and-theirmarketability-in-the-consumer-electronics-segment-2155-6210-1000236.php?aid=85934 

Dr. Robert P. Duncan A.B., S.M., M.B.A., Ph.D.: Government warfare and surveillance system architect, author, and independent investigator

https://www.drrobertduncan.com/index.html 

The Bases Lectures, Robert Duncan Intelligent Systems of Control

The MANIC Mirror: Minimal Integration, Streamlined Function

promo-001

The Days Of Yore

In the days of yore, there was a lot that went into creating an integrated system which can mimic the multi-functionality of today’s smart phones. In this brief article, I will discuss how and why utilizing even a very inexpensive model of smart phone can be applied for incredible results while committing to fieldcraft and security excellence.

But first, a little history. The Universal Serial Bus or USB evolution of system architecture created a massive expansion for computing capabilities, especially in terms of multimedia applications. Evolving from the OG Industry Standard Architecture of motherboard design, the miniaturization and multithreading capability of computer machines was sure to reach an exponential increase. This meant that increasingly shorter periods of time would yield resulting smaller and more capable circuits. ISA moved on to become PCI (Peripheral Component Interconnect) allowing for higher data-streams within the architecture especially reflected in video processing definition. And now in regular implementation is the SCSI (Small Computer Systems Interface) which allows for such communications between internal motherboards and external devices such as tape and disk drives.

Back to USB. The Universal Serial Bus allowed for many, meaning up to 144 daisychained external devices to be connected to the system. Now our computers had eyes, ears, and mouths with which we could interface directly and begin to envision what would come in the future.

The MANIC (magic) Mirror

Minimal Architecture Necessary For Intelligent Cognition is a concept outlined in the white papers by adroit cybersecurity researcher for Pentagon and Department Of Defense, Michael Gagnon. It entails utilizing the very least amount of physical hardware to enable the highest digital functionality of a computer system. As technical as this sounds, it can easily be broken down and translated into intelligence fieldcraft and other business applications.

The smart phone, as I have labeled the MANIC Mirror was most likely introduced to pop-culture in 1935 with the production of Walt Disney’s Snow White. That was a long time ago, way before computers had any chance of being perceived in the way they are presently manifest. Here we see a flat or two-dimensional object which seemingly or magically projects the ability to remote view across great distances and perhaps even time. It also allows for remote communication with an advanced and/or artifical intelliegnce. The magic mirror of old is now a reality, you most likely have one in your hands with which you are reading this article, or perhaps on your desk charging next to your larger computer.

In Security Terms

The MANIC Mirror is an excellent tool, far too often unrealized for it’s full capabilities especially in deployment for security and intelligence applications. Depending on what capabilities your mission specific operation entails, there is most likely “an app for that.”

There are far too numerous applications and implementations in which cheaply purchased and freely configured Android smart phones may be utilized to drastically increase intelligence capabilities while afield. The tiny integrated camera and microphone are much more than just a video intercommunication device, but they are useful in terms of electronic surveillance. A pairing of smart phones can be synchronized to each other for wireless signals transference and spying deployment. The list goes on ad nauseum ad infinitum.

Special use of smart phones must also be considered in terms of systems integration. For example, your $500 surveillance drone will also come with an application which can be freely downloaded to the phone to allow an extended, aerial eye to take flight and expand your operational range up to 1.5 km. That’s without going too far into the budget. These things are truly incredible and are being underutilized and under-realized in the field.

There is a lot more to this, but I don’t want to give away all my secrets. If you are interested in accessing our expertise in operational smart phone deployment, please do not hesitate to contact Briq Haus Ltd. Security & Intelligence. Thank you for reviewing this article.

Sandbox To Fieldcraft: Ditching The Simulation

collage-2017-11-18

Playing In The Sandbox Is For Kids

[excerpt definition from Wikipedia]

In computer security, a sandbox is a security mechanism for separating running programs, usually in an effort to mitigate system failures or software vulnerabilities from spreading. It is often used to execute untested or untrusted programs or code, possibly from unverified or untrusted third parties, suppliers, users or websites, without risking harm to the host machine or operating system.[1] A sandbox typically provides a tightly controlled set of resources for guest programs to run in, such as scratch space on disk and memory. Network access, the ability to inspect the host system or read from input devices are usually disallowed or heavily restricted.

In the sense of providing a highly controlled environment, sandboxes may be seen as a specific example of virtualization. Sandboxing is frequently used to test unverified programs that may contain a virus or other malicious code, without allowing the software to harm the host device.[2]

All hackery aside, let’s take a step back and look at this in legitimate focus. The sandbox is a place designated for childplay. There is a spot on the playground, usually where the swings and other hardware are located where a pit is dug out and filled with sand on which the children play. The sand not only provides a medium with which the children can build the castles they envision, but a soft ground from which the blunt trauma of falling from a height may affect. I know this, because as a youngster I was a daredevil and jumping from a swing set led to a slight fracture of my radius. Thankfully, for the sand, I did not have to experience any worse of a consequence from my intrepid and frankly stupid maneuvers.

The same children playing in the sandbox are the ones whom grow up to perchance die on the beaches of theatre. I agree that this is an extremely stark comparison, with some grim consequencese for casual ignorance. Perhaps, conceptually, the idea of swords to ploughshares may be a goal to keep in mind, however the fallacy of importing only butter and no steel may spell the doom of an enterprise, or generation. There is not better time to take the kids out of the sandbox and drop them onto the beaches of conflict than right now. That’s because learning in a simulated environment is akin to handicapping the process by which we operate during mission critical scenarios.

Translated For Security Measures

Briq Haus Ltd. Security & Intelligence operatives are fully versed and trained in both aspects of security operations; sandbox and fieldcraft. While the benefit of practice in a secluded environment separate from the harsh realities of consequence and effect may be evident in reports and documents, it is a rare thing that during real-time security exercises and operations that enough streaming data is retained for the intention of creating some slide-show or powerpoint presentation. In the real world, there are ongoing causal relationships between the interplay of hostile foreign intelligences and mission-specific imperatives. The continuing dynamic and morphic environment of the field require out-of-the-box thinking, not delusional but rather unconventional.

Between the combined expertise of our information technology and intelligence community professionals, Briq Haus Ltd. not only boasts the boardroom banter to deliver effective presentation and slideshows as per sandbox experimentation dictates, but we have tried-and-true tested in the trenches fieldcraft experience in being exposed to the evolving risk dynamic and threat platform wielded by hostile foreign intelligences co-operating within the framework of real-world, non-simulated ongoing security operations. Being increasingly tested above and beyond the imagined or preset boundaries of a security experiment within a sandbox environment forces the experts on my team to constantly and consistently demonstrate proof-of-work mastery of security implementation and product deployment in the professional corporate theatre. We are not corporate goons, nor are we classroom geeks, we are ex-military and intelligence professionals with backgrounds ranging from digital to physical warfare, and with experience in advanced security environments actualizing each domain of the security spectrum; physical, logistical, analytical, and digital.

Professional Security Assurance

By consigning your security requirements to the oversight and analysis of the Briq Haus Ltd. team, you are ensuring that the utmost precision and dedication is applied to discovering, identifying, and patching any and all vulnerabilities in your business or other operation. The Briq Haus Ltd. “Perfect Security Suite” is your one step solution to have all your concerns handled and put to ease by our experts in these and all related regards. We are not discouraged or daunted by any of the present dangers lurking among the faceless corporate mass. We know that any single entity may wear the mask of friend, and turn out to be a formidable adversary or inside threat.

Briq Haus Ltd. Security & Intelligence is not limited by our challenges; but rather, we challenge all limits. Contract with us today, and rest at ease that your security concerns are in the hands of serious and capable operators. Thank you for considering us.

 

Briq Haus Ltd. Elemental Security Services

purple-abstract-technology-and-engineering-motion-background-with-plexus-elements-and-depth-of-field-settings-3d-rendering_sztnzo3dx_thumbnail-full02

Briq Haus Ltd. Security & Intelligence intends to contract and interface with other services and professionals to create customize physical, logistical, analytical, and digital solutions for our clients while developing innovation at a physical headquarters. This is our mission statement, a principle to which our team of international information technology and intelligence community professionals adhere with the utmost confidence and dedication. Our combined skills and knowledge in the security realm are fueled by research, and powered by experience in the field. Whether your needs require research, investigation, security-as-a-service, infrastructural analysis, special operations, cloud or parallel computing, radio transmission, aerial or ground surveillance, anti-drone or radio jamming, penetration testing, security redteaming, we got that handled. Listed below, for simplification, are our main three tiers of service which is immediately marketable to a majority of companies in all sectors.

“Perfect Security Suite”

As security professionals, we know one truth about security; that it is never invulnerable. And as such, we aim to create the “Perfect Security Suite” for you and your affiliates by listening and recording with precision your specific security concerns, and then devising the most perfect fitting combination of solutions to protect your assets.

This would entail enumerating the specific security needs into the four domains of security and devising a strategy, compiling the tools, and assigning the correct professional to handle your requirements. This is something Briq Haus Ltd. can do with a high-powered surety of completion, and competitive pricing and term contract which entirely customized to meet your needs.

While no security plan or design is invincible, by contracting with Briq Haus Ltd. you can be sure that the security services and analysis we provide are absolutely perfect.

Guidelines & Compliance Assurance

FISMA, HIPAA, SOX, ISO 17799, and GLBA??? The list goes on and continues to expand in depth and breadth as the dynamic technology presently occupying the field has different operational procedure and similar compliance requirements. What about securing IoT devices? What about Crime Prevention Through Environmental Design? It can become infuriating and overwhelming for you and your team’s business operations to have all of these incredibly complex issues covered in the satisfactory means which cover the requisite compliance guidelines set forth by the powers that be.

Briq Haus Ltd. has at the ready a team of tried and true security professionals ready and available to patch any vulnerabilities in your plan, and get you up to speed with the exact compliance guidelines and specifications you need to move forward. Just let us know what you need, we’ll huddle up and devise the right approach and implementation to get you above and beyond the compliant requirements.

Staff & Management Training

This is where we foresee an overwhelming response to our efforts as security providers. The numbers are in and a staggering 70% of employees (and employers!) in all sectors are lacking even the most basic information security training. Security starts at the perimeter and extends into the very hearts of your staff and management; social engineering and the insider threat is a very real and serious challenge in today’s dynamic. Not only can we offer on site training for your own security team, in terms of intelligence community tradecraft in identifying inside threats, but we can produce videos to sell to your firm as per our contract.

Don’t be a victim to spear-phishing/dumptser-diving outsiders and tailgating/shoulder-surfing insiders. Contract with Briq Haus Ltd. Security & Intelligence right now, and take comfort in knowing that we are 100% expert in this field because we have all performed these nefarious deeds on a regular basis as part of our baseline security auditing process! You won’t need to worry about the bad guys if you hire us, because we’ll teach you and your team in a multi-layered tiered approach to raise the standard for your information and other security means. Our experience with local and Federal government and background in military and intelligence operations are our pledge of excellence.

Other Services

If you need it done, we have the extensive networking which reaches into the Southeast Asian, Western European, Northern African, and Middle Eastern theatres. Above are listed what we foresee being our highest demands in terms of commercial applications, however for special work and contracting, please e-mail your case details and we’ll take care of you.

Respectfully,
Sir Robert Brooks Authement
mailto:briqhausltd@gmail.com

 

Parallel Computing VS Cloud In Security Deployment

This article is written by our lead technical consultant, Brian Taylor of Always In Tao.

commandcenter

Imagine for a moment you keying up a serious computer with real muscle. One of those fancy $40,000 Puget Systems jobs. You login to a server and see a distributed network waiting for a command, everything is pristine, a controller GUI – no even better a CLI list in front of you shows which resources on which machine are just waiting for your command. Now of course the question becomes, “Which process on which machine do you actually need to do what?” If what you needed was to solve a massive resource issue, you might need to break it into components and let the machine solve it in Parallels.

Clustered Nodes

Parallel computing is mostly this kind of computing, 200 machines being controlled from one terminal. You don’t need a $40,000 computer to do anything like that. You just need an interface that has the ability to issue commands across the networks of clustered machines and spit out solutions in assembly ready chunks. Not much practical purpose to that sort of thing at home, but maybe at work.

Clustered Nodes As A Cloud

Similar scenario, except a different problem altogether. You key into your $40,000 Puget, login and are faced with a readout of available resources slipping into and out of a variety of systems already in use. You notice that a central storage area has access to hundreds of Petabytes of space which isn’t filling up very rapidly. You decide to try to solve the same resource issue and the machine files it in the cue for the next go around with processing.

What Differences Do You Spot?

The number of users may seem obvious, but multiple users can make use of Parallels on distributed networks. The resource allotment cue is different, the process of getting at storage is perhaps somewhat different, and most certainly the functionality is different. You can use a cloud system as though it were a massive computer, multiple users can access the same files, generally at the same time. That means that is someone in Bolivia is watching the Matrix in their native language, you can still watch it in yours at the same time. What parallel computing does is more akin to staying on task with as much power as possible, where clouds generally distribute power in calculated shares on a per user basis.

Can The Same Hardware Do Both?

Yes – at a cost. There are configurations of cluster systems possible that make use of virtualization in ways that enable a wider assortment of user experiences and in some cases can perhaps integrate them well enough on a user basis somewhat smaller than a system dedicated to just one configuration or another. VDI’s on distributed networks is a system as a service and in fact can be utilized for cloud desktop systems. Some systems exist which offer a degree of security that can be incorporated into your infrastructure without the same hassle as some of the other VDI’s on offer.

What Can This Do For Your Business

It can enable your business to make use of security technology in more compliant ways. A dog groomer might not need this technology, but a successful one who has a franchise under their management almost certainly does. It may be possible to individually secure a network for everyone who has a professional IT team at their disposal, but even then it’s rare. Compliance with security protocols across large systems is akin to locking the backdoor at night. A smart business does it, and a foolish business never does. If you are interested in discussing this technology I can recommend you contact BriqHausLtd. Tell them “Always In Tao” sent you, to get a free consultation and ask how it could help your organization.

FOOTHILLS FASHION MALL UNREQUESTED REDTEAM SECURITY ANALYSIS by Briq|Haus Ltd.

Purpose & Intent

BRIQ | HAUS LTD. SECURITY & INTELLIGENCE intends to interface and contract with other professionals and services to create customized logistical and analytical solutions for our clients while developing innovation at a physical headquarters.

This is the mission statement of my company, whose design is security-centric with the purpose of providing private sector security analysis on contractual basis. On October 10th, 2017, the owner/operator, myself, Robert Brooks Authement, went to the mall to try out the new city gym. In approaching the mall I was astounded at the countless abundance of security vulnerabilities I witnessed, so I pulled out my camera and began with great intentions a meager and cursory security analysis of the structure, personnel, and network integration present.

As a disclaimer, I am a rather unconventional thinker, which may be viewed from the narrow concept that would label such perspective a danger, or from the considerate standpoint that perhaps unconventional methodology such as I present here may in fact be an advantageous asset with which to ally oneself and one’s company.

Entry Into Building

I was chagrined to have entered the complex on foot from the south, coming up from Horsetooth road passing between the construction area near the sleep store to the west, and the facade of the Marriot Hotel to the east. As I entered the complex on foot, my path took me directly to an abutment and not a single sign nor portal within the mall could be located. I found this to be incredibly poor design, as I should have been met with an entrance to at least some retail business and perhaps signs with advertisements. Check 1; poor user experience based on un-mindful design.

I walked around the exterior of the building, and lo and behold, the first and only way inside I found was a backdoor which was PROPPED OPEN. Surely this was an “employee only” portal, but a gentleman within pointed through the hallway to how I may actually reach the mall, and my destination, the new city gym.

Further Exploration

I made it through my workout and put on my secret normal person costume. Here I perform a couple of feats of social engineering to be enjoyed by you and your affiliates. What am I doing? I’m demonstrating the effortless ease with which I can interpenetrate the supposed ‘boundaries’ of the establishment and even seamlessly bypass the scrutiny of onsite employees. Later I will demonstrate major defunct operability of the mall security team.

What Security???

Advantage Security Inc. was the chosen contractor to protect the people and assets of this multi-business establishment. Surely bigger does not mean better, as this under-equipped but highly versatile security analyst will demonstrate. My initial contact with security was brief and on the up and up, but what followed was demonstrably laughable in the confusion that ensued. Check 2; poor choice and lack of training/oversight for so-called ‘security staff.’

The Byzantine Attack, Bust, and Near-Meltdown

Your team will kindly forgive my resulting to use the vernacular during this video. I was followed outside by the security staff whom had taken to their neat-o rent-a-cop-mobiles. Despite walking away on friendly terms and having literally explained my intention and purpose for being there in clear and concise language, the team decided that since there was absolutely nothing to do, that I must be the lowest hanging fruit and therefore a legitimate threat. I entered the building at another side and then the team had positioned themselves in the center where I approached.

I pulled out my phone and told Blueteam Leader Captain Andrew, “Check this out.” With a $30 phone purchased off eBay I performed in less than 60 seconds time an effective cybersecurity audit of the pubic wifi network. Without going into the boring details of how I did that, the story continues by Andrew informing me that I would have to leave for the day because I was not “allowed to do ‘that’ or record at the mall.” Not allowed to record at the mall??? Oh I think he meant that I would not be allowed to record their lackadaisical and in my humble opinion totally insufficient security protocols and behavior. I acquiesced to the demand, but I put the personnel to a stress test by escalating the situation with language. No harm, no foul, they did perform professionally under the stress however my main analysis is that their aim was wrongfully directed at me as a danger.

I feel I should have been brought in and interviewed regarding my tradecraft and security expertise, however their behavior was key in encouraging me to follow through with due diligence and present my case to your team.

And as a disclaimer, my adrenaline was up from the quasi-confrontation so you will kindly allow for the little f-bomb I drop in here. This is what I mean by unconventional. Effective; but unconventional.

Last But Not Least. . .

One more little accident waiting to happen here.

Conclusive Analysis

Bigger is not always better! I remember the previous incarnation of our lovely town mall, and the present structure reminds me so much of a jail. Surely it was built to “trap” the tourists between the retail and restaurants/entertainment venues like some sort of citadel. Clearly the design was made by person’s whose main attention is to profitability and raising the bottom line. From the standpoint of this plucky and intrepid security analyst, wealth without security is only a target.

Check 3; total assessment = vulnerable. This facility is open season for petty thieves, grand larceny, social engineering and confidence schemes, network infiltration and identity theft, and would-be attackers with malicious intent. From my standpoint the Fort Collins Foothills Fashion Mall totally fails the BRIQ | HAUS LTD. SECURITY & INTELLIGENCE unrequested redteam security audit. Judging from my insider sources of DC employers, a great deal of people coming to Fort Collins for its charm and quiet appeal are either members of the United States Intelligence Community or War Veterans and Ex-Military or Government personnel. These people are extremely security conscious, and will see the flaws present in the design and systems integration of the mall. They may not pay much heed to the thought, but subconsciously, they will know that it is not a safe place.

The infrastructural vulnerabilities and risk exposure are just too numerous to count. Take a walk with me and I’ll show you, for a small consultation fee.

The network vulnerability is typical of public networks, however an astute system administrator can patch these vulnerabilities and make them go away.

With the 2017 holiday season incoming it is highly advisable to protect not only your property and investment, but the families of customers who go to the mall hoping for a peaceful and safe shopping experience. Thank you for reading my report, I can be reached at the following e-mail:

mailto:briqhausltd@gmail.com

Respectfully submitted this 10th day of October, 2017,

Sir Robert Brooks Authement; Owner/Operator

BRIQ | HAUS LTD. SECURITY & INTELLIGENCE