Getting Started With Security: $38 SPECIAL

8363832-Euro-bank-notes-with-a-lock-and-chain-Money-stack-for-safety-and-investment--Stock-Photo

Security Is A Commodity; We Make It Easy To Buy

Let’s cut the cake. “Wealth without security is only a target.” Right now security is in high demand. As the risk platform of all domains is rapidly expanding so are the needs to stop gaps and fill roles in corporate, international, and digital security. Large scale cyber attacks committed by criminal elements and state actors are having real and lasting effects on the way business is being conducted online, with the potential to stop or even steal critical financial data transmissions.

HERE’S THE DEAL: Sign a year contract with us for $100, and pay only $38 a month for:

  1. Monthly network scans and audits, and a stress test to ensure DDoS protection.
  2. Access to our security experts for consultation phone calls. Consultation on activities outside and beyond the scope of this contract will incur relevant fees.
  3. Incident response in case of any breach or security concerns.
  4. A monthly email newsletter with our combined meta-analysis of the present risk-platform as expressed in the global and digital domains.
  5. An easy way to upgrade or update your security plan with BRIQ HAUS LTD. SECURITY & INTELLIGENCE.
Advertisements

The MANIC Mirror: Minimal Integration, Streamlined Function

promo-001

The Days Of Yore

In the days of yore, there was a lot that went into creating an integrated system which can mimic the multi-functionality of today’s smart phones. In this brief article, I will discuss how and why utilizing even a very inexpensive model of smart phone can be applied for incredible results while committing to fieldcraft and security excellence.

But first, a little history. The Universal Serial Bus or USB evolution of system architecture created a massive expansion for computing capabilities, especially in terms of multimedia applications. Evolving from the OG Industry Standard Architecture of motherboard design, the miniaturization and multithreading capability of computer machines was sure to reach an exponential increase. This meant that increasingly shorter periods of time would yield resulting smaller and more capable circuits. ISA moved on to become PCI (Peripheral Component Interconnect) allowing for higher data-streams within the architecture especially reflected in video processing definition. And now in regular implementation is the SCSI (Small Computer Systems Interface) which allows for such communications between internal motherboards and external devices such as tape and disk drives.

Back to USB. The Universal Serial Bus allowed for many, meaning up to 144 daisychained external devices to be connected to the system. Now our computers had eyes, ears, and mouths with which we could interface directly and begin to envision what would come in the future.

The MANIC (magic) Mirror

Minimal Architecture Necessary For Intelligent Cognition is a concept outlined in the white papers by adroit cybersecurity researcher for Pentagon and Department Of Defense, Michael Gagnon. It entails utilizing the very least amount of physical hardware to enable the highest digital functionality of a computer system. As technical as this sounds, it can easily be broken down and translated into intelligence fieldcraft and other business applications.

The smart phone, as I have labeled the MANIC Mirror was most likely introduced to pop-culture in 1935 with the production of Walt Disney’s Snow White. That was a long time ago, way before computers had any chance of being perceived in the way they are presently manifest. Here we see a flat or two-dimensional object which seemingly or magically projects the ability to remote view across great distances and perhaps even time. It also allows for remote communication with an advanced and/or artifical intelliegnce. The magic mirror of old is now a reality, you most likely have one in your hands with which you are reading this article, or perhaps on your desk charging next to your larger computer.

In Security Terms

The MANIC Mirror is an excellent tool, far too often unrealized for it’s full capabilities especially in deployment for security and intelligence applications. Depending on what capabilities your mission specific operation entails, there is most likely “an app for that.”

There are far too numerous applications and implementations in which cheaply purchased and freely configured Android smart phones may be utilized to drastically increase intelligence capabilities while afield. The tiny integrated camera and microphone are much more than just a video intercommunication device, but they are useful in terms of electronic surveillance. A pairing of smart phones can be synchronized to each other for wireless signals transference and spying deployment. The list goes on ad nauseum ad infinitum.

Special use of smart phones must also be considered in terms of systems integration. For example, your $500 surveillance drone will also come with an application which can be freely downloaded to the phone to allow an extended, aerial eye to take flight and expand your operational range up to 1.5 km. That’s without going too far into the budget. These things are truly incredible and are being underutilized and under-realized in the field.

There is a lot more to this, but I don’t want to give away all my secrets. If you are interested in accessing our expertise in operational smart phone deployment, please do not hesitate to contact Briq Haus Ltd. Security & Intelligence. Thank you for reviewing this article.

Sandbox To Fieldcraft: Ditching The Simulation

collage-2017-11-18

Playing In The Sandbox Is For Kids

[excerpt definition from Wikipedia]

In computer security, a sandbox is a security mechanism for separating running programs, usually in an effort to mitigate system failures or software vulnerabilities from spreading. It is often used to execute untested or untrusted programs or code, possibly from unverified or untrusted third parties, suppliers, users or websites, without risking harm to the host machine or operating system.[1] A sandbox typically provides a tightly controlled set of resources for guest programs to run in, such as scratch space on disk and memory. Network access, the ability to inspect the host system or read from input devices are usually disallowed or heavily restricted.

In the sense of providing a highly controlled environment, sandboxes may be seen as a specific example of virtualization. Sandboxing is frequently used to test unverified programs that may contain a virus or other malicious code, without allowing the software to harm the host device.[2]

All hackery aside, let’s take a step back and look at this in legitimate focus. The sandbox is a place designated for childplay. There is a spot on the playground, usually where the swings and other hardware are located where a pit is dug out and filled with sand on which the children play. The sand not only provides a medium with which the children can build the castles they envision, but a soft ground from which the blunt trauma of falling from a height may affect. I know this, because as a youngster I was a daredevil and jumping from a swing set led to a slight fracture of my radius. Thankfully, for the sand, I did not have to experience any worse of a consequence from my intrepid and frankly stupid maneuvers.

The same children playing in the sandbox are the ones whom grow up to perchance die on the beaches of theatre. I agree that this is an extremely stark comparison, with some grim consequencese for casual ignorance. Perhaps, conceptually, the idea of swords to ploughshares may be a goal to keep in mind, however the fallacy of importing only butter and no steel may spell the doom of an enterprise, or generation. There is not better time to take the kids out of the sandbox and drop them onto the beaches of conflict than right now. That’s because learning in a simulated environment is akin to handicapping the process by which we operate during mission critical scenarios.

Translated For Security Measures

Briq Haus Ltd. Security & Intelligence operatives are fully versed and trained in both aspects of security operations; sandbox and fieldcraft. While the benefit of practice in a secluded environment separate from the harsh realities of consequence and effect may be evident in reports and documents, it is a rare thing that during real-time security exercises and operations that enough streaming data is retained for the intention of creating some slide-show or powerpoint presentation. In the real world, there are ongoing causal relationships between the interplay of hostile foreign intelligences and mission-specific imperatives. The continuing dynamic and morphic environment of the field require out-of-the-box thinking, not delusional but rather unconventional.

Between the combined expertise of our information technology and intelligence community professionals, Briq Haus Ltd. not only boasts the boardroom banter to deliver effective presentation and slideshows as per sandbox experimentation dictates, but we have tried-and-true tested in the trenches fieldcraft experience in being exposed to the evolving risk dynamic and threat platform wielded by hostile foreign intelligences co-operating within the framework of real-world, non-simulated ongoing security operations. Being increasingly tested above and beyond the imagined or preset boundaries of a security experiment within a sandbox environment forces the experts on my team to constantly and consistently demonstrate proof-of-work mastery of security implementation and product deployment in the professional corporate theatre. We are not corporate goons, nor are we classroom geeks, we are ex-military and intelligence professionals with backgrounds ranging from digital to physical warfare, and with experience in advanced security environments actualizing each domain of the security spectrum; physical, logistical, analytical, and digital.

Professional Security Assurance

By consigning your security requirements to the oversight and analysis of the Briq Haus Ltd. team, you are ensuring that the utmost precision and dedication is applied to discovering, identifying, and patching any and all vulnerabilities in your business or other operation. The Briq Haus Ltd. “Perfect Security Suite” is your one step solution to have all your concerns handled and put to ease by our experts in these and all related regards. We are not discouraged or daunted by any of the present dangers lurking among the faceless corporate mass. We know that any single entity may wear the mask of friend, and turn out to be a formidable adversary or inside threat.

Briq Haus Ltd. Security & Intelligence is not limited by our challenges; but rather, we challenge all limits. Contract with us today, and rest at ease that your security concerns are in the hands of serious and capable operators. Thank you for considering us.