Instead of trying to defeat the onslaught of technological exploitations with technology, we use traditional and practical security tradecraft techniques to reduce your exposure and enhance your security posture in both the physical and digital world.
Understand how the complexities of your everyday behavior influences what you look like online. Learn practical concepts — for the “Average Joe” and seasoned professionals alike — to better manage your online identity in an ever challenging digital world.
Gain new insights into the Deep and Dark Webs, explore managed attribution (hidden) networks, and learn how bad behavior in the Dark Web can result in being compromised on the surface web. Discover how you can use the Dark Web to operate in anonymity.
Learn how to use the concept of deception to enhance your security even when you have limited resources. Gain insights in how to use bias as an advantage when developing a security plan. Explore the application of deception techniques in your virtual world to protect your identity.
Cell phones and computers carry so much of your life that losing them or having them compromised exposes you to significant risks. It’s crucial to understand how others can track and exploit your devices. From the first day your phone is set up, it is forever identified with you and your account. Every time you turn on your phone, it contacts the nearest cell tower, registering on the network and allowing your location to be identified within a mile or so. Keeping Location Services off can make it harder to track your phone, but this also means recovery apps might not locate it if lost or stolen.
Turning on Location Services activates the GPS and allows the phone to use nearby cell towers and Wi-Fi networks to pinpoint your location quickly. This convenience also makes you more vulnerable to tracking and exploitation. To reduce risks, turn off your phone or remove the battery if possible, as even when off, the network registers where the phone was last turned on or off.
Avoid using work computers or company-supplied phones for personal business, as companies often monitor these devices. Many companies have a “Bring Your Own Device” (BYOD) policy, which can compromise your privacy since company-installed email clients can collect extensive information about your device. Understand your company’s policies on employee monitoring and regularly review them for changes.
Be cautious with your devices by using strong passwords, changing them regularly, and avoiding apps from non-U.S. developers for storing personal information. Conduct online searches for reviews of encryption applications or storage services to ensure their security. By staying informed and vigilant, you can better protect your personal data.
Proper conduct on social media is crucial, as it can significantly impact your life and career. Employers often review applicants' social media activity during the hiring process, which can reveal more about a person's character and history than traditional background checks. Therefore, it's essential to be aware of the risks associated with social media use. The internet has made the world more dangerous and unforgiving, with social media providing opportunities for crowd-sourced violence, aggression, and theft.
Your online persona is an extension of your reputation, which you must manage carefully. To maintain a reputation for honesty and integrity, avoid posting negative comments, focus on issues rather than personalities, and review your posts before sending them. Adhering to the "Red Wine Effect" (RWE) principle—avoiding social media after drinking—can help prevent regrettable posts.
Social media platforms like Facebook allow "tagging" in photos, linking you to activities and people across accounts. Social media scraping, a technique used by marketers, predators, and law enforcement, collects data you publicly expose, making it crucial to lock down privacy settings. However, this information is still stored by the host site and can become public with a change in privacy policy.
Anonymous accounts on platforms like Instagram and Reddit may feel secure, but many apps request access to contacts and phone information, which can be exploited. To communicate privately, use a clean device without stored contacts or personal accounts. Always consider the potential public exposure of anything you post.
Reading and understanding privacy policies when downloading apps or using online services is important, as they often involve sharing personal information. Recognize what you are giving away and think carefully before agreeing to these terms.
"Twenty-first Century technology, along with its many benefits, demands that we protect our personal security so it’s working for us - not against us. The most effective approach is a systematic one, increasingly common in many fields, a checklist - a good one. Beware the Predator contains an excellent approach – as clear as I’ve seen – to creating your own. Try it." Peter Earnest Executive Director International Spy Museum
"Beware the Predator is a comprehensive collection of practical techniques essential to a solid foundation in personal security awareness. It has simplified complex tradecraft techniques in a way that gives the reader a significant and sustainable advantage over any predator whether virtual or physical. From senior executive to high school student, these conepts are for you." Matt Addington Retired Senior Executive, Drug Enforcement Agency and Former Director of the El Paso Intelligence Center, (EPIC)
"If more people took the time to understand the what, when and why’s of how the American people need to protect themselves from bad actors then these concepts are a must learn. During my career, I too often experienced Americans falling victim to financial crime, cybercrime, identity theft and fraud schemes. I have seen how Americans were constantly exploited by the ever present security threats that exist in today’s complex technical environments. It is a pleasure to endorse this for everyone who is interested in a good documented resource that will help them with their own personal security." Larry D Johnson CEO –Castleworth Global Former Special Agent in Charge, US Secret Service Criminal Investigative Division and Chief Security Officer at a Fortune 500 financial sector company
Tampa, Florida, United States
Copyright © 2024 Beware The Predator - All Rights Reserved.
Powered by GoDaddy Website Builder