InvestorsHub Logo

tutankhamuns

08/29/18 5:24 PM

#174173 RE: Nickybee #174172

None of this will save investors from the billions of shares that are going to hit the market by EOY. It’s a fairytale. The reality is that Tom and Dennis are in the share-selling business.

chiflow

08/29/18 10:34 PM

#174186 RE: Nickybee #174172

Sticky!

glenngroove

08/30/18 4:00 AM

#174188 RE: Nickybee #174172

Great Post Nicky and thank you

-NightTrain-

08/30/18 9:59 PM

#174216 RE: Nickybee #174172

You must be getting paid handsomely for this garbage. Anyone inclined to believe this, go ahead. And refer back to it when reality sinks in via RS. This is literally a share selling machine by someone with very attractive credentials. Learn the hard way if you must. Can't say you weren't warned.

glenngroove

08/30/18 10:19 PM

#174217 RE: Nickybee #174172

dont listen nicky stay strong

RN1

08/31/18 8:12 AM

#174238 RE: Nickybee #174172

Like all of the other so-called deals, anything that Tom mentions now is just a fraud

angeloh

08/31/18 1:15 PM

#174253 RE: Nickybee #174172

Good things commin for BVTK...
Thanks Nicky...

Upcoming attractions of BVTK and Dark Pulse cross-selling opportunities:
from Dark Pulse (Dennis) interview this week;

A: The relationship was created by our Co-CEO Dr. Thomas Cellucci. Tom was the first Chief Commercialization Officer in the U.S. Federal Governments Executive Branch, he was appointed the First Director of Research & Development Group at the U.S. Department of Homeland Security. He authored or co-authored over 156 articles on innovative public-private partnerships, nanotechnology, laser spectroscopy, vibration control, sales and marketing, and MEMS/MOEMS test and measurement. The agreement with Battelle for the analytical equipment/patented technologies for detecting trace amounts of explosives/ chemical warfare agents/illicit drugs—is considered the “Holy Grail” of global security.

The licensing agreement with Battelle Memorial Institute (BMI) is through the Pacific Northwest National Laboratory (PNNL), a Department of Energy (DOE) lab. DarkPulse’s licensing agreement focuses on an apparatus for detecting trace-levels of explosives, chemical warfare agents (CWAs) and illicit drugs. Low-level detection of illicit substances, including explosives, narcotics and CWAs, remains a long-standing goal of modern instrument platforms. Such systems would enable detection of vapors to identify illicit drugs in cargo containers and other concealed conveyances. Additionally, ultra-low-level detection of CWAs could also allow identification of hazardous compounds at levels well below those considered safe for the general population. This is a primary concern of the U.S. Department of Homeland Security.

Business development for years to come!

WHY SO?

from NeQter website: (Helps with understanding of BVTK)

How NIST SP 171-800 impacts your business (look it up)

Q: My company is a subcontractor. Do I have to implement all of the controls of NIST SP 800-171?
A: Yes. Being in the “spirit of compliance” is non-compliance. Until you meet all requirements in full, you are not in compliance. You must address all 110 requirements in order to be considered compliant.

Q: What are the benefits of NIST SP 800-171 compliance?
A: Minimally, NIST SP 800-171 a set of good, solid IT best-practices to ensure your company is up to the current standards of strong cybersecurity. In the near-term, proving compliance will also be a competitive advantage for new defense contract bids — especially if others are dragging their feet on the implementation of their plans.

Q: What are the consequences of non-compliance?
A: You can lose your contract, award, or PO, or simply be ineligible to win new contracts. And if you are noncompliant and have a breach, your systems will be confiscated for months.

Q: Can compliance help me win new contracts?
A: Prime contractors are seeing their supply chains drastically reduced because their suppliers are not pursuing compliance. Many of your competitive subcontractors may drop out of the bidding process — creating a larger business opportunity for you.

NIST Small Business Cybersecurity Act passed into law. BVTK!

Nickybee

08/31/18 2:27 PM

#174258 RE: Nickybee #174172

Another really BIG business opportunity for BVTK:

PHONE NUMBERS WERE NEVER MEANT AS ID. NOW WE’RE ALL AT RISK

On Thursday, T-Mobile confirmed that some of its customer data was breached in an attack the company discovered on Monday. It's a snappy disclosure timeframe, and the carrier said that no financial data or Social Security numbers were compromised in the breach. A relief, right? The problem is the customer data that was potentially exposed: name, billing zip code, email address, some hashed passwords, account number, account type, and phone number. Pay close attention to that last one.

The cumulative danger of all of these data points becoming exposed—not just by T-Mobile but across countless breaches—is that it makes it easier for attackers to impersonate you and take control of your accounts. And while the passwords are bad news, perhaps no piece of standard personal information has more value than your phone number.

That's because phone numbers have become more than just a way to contact someone. In recent years, more and more companies and services have come to rely on smartphones to confirm—or "authenticate"—users. In theory, this makes sense; an attacker might get your passwords, but it's much harder for them to get physical access to your phone. In practice, it means that a single, often publicly available, piece of information gets used both as your identity and a means to verify that identity, a skeleton key into your entire online life. Hackers have known this, and profited from it, for years. Companies don't seem interested in catching up.

'If it’s not a secret, then you can’t use it as an authenticator.'

JEREMY GRANT, BETTER IDENTITY COALITION

Identity management experts have warned for years about over-reliance on phone numbers. But the United States doesn't offer any type of universal ID, which means private institutions and even the federal government itself have had to improvise. As cell phones proliferated, and phone numbers became more reliably attached to individuals long term, it was an obvious choice to start collecting those numbers even more consistently as a type of ID. But over time, SMS messages, biometric scanners, encrypted apps, and other special functions of smartphones have evolved into forms of authentication as well.

"The bottom line is society needs identifiers," says Jeremy Grant, coordinator of the Better Identity Coalition, an industry collaboration that includes Visa, Bank of America, Aetna, and Symantec. "We just have to make sure that knowledge of an identifier can’t be used to somehow take over the authenticator. And a phone number is only an identifier; in most cases, it's public."

Think of your usernames and passwords. The former are generally public knowledge; it's how people know who you are. But you keep the latter guarded, because it's how you prove who you are.

The use of phone numbers as both lock and key has led to the rise, in recent years, of so-called SIM swapping attacks, in which an attacker steals your phone number. When you add two-factor authentication to an account and receive your codes through SMS texts, they go to the attacker instead, along with any calls and texts intended for the victim. Sometimes attackers even use inside sources at carriers who will transfer numbers for them.

"The issue being exposed with SIM swaps is that if you control the phone number you can take over the authenticator," Grant says. "A lot of it gets to the same issue we run into with Social Security numbers, which is leveraging the same number as both an identifier and authenticator. If it’s not a secret, then you can’t use it as an authenticator."

It's a tangle. But it doesn't have to be like this. Thomas Hardjono, a secure identities researcher at MIT's Trust and Data Consortium, points to credit card numbers, identifiers authenticated with a chip plus a PIN or a signature. The financial industry realized decades ago that the system wouldn't work if it wasn't relatively easy to change credit card info after it was exposed. You can get a new credit card as needed; changing your phone number can be incredibly inconvenient. As a result, they become more and more at-risk over time.

It's a tangle. But it doesn't have to be like this.

So if you're looking for an alternative to the phone number, start with something more easily replaceable. Hardjono suggests, for example, that smartphones could generate unique identifiers by combing a user's phone number and the IMEI device ID number assigned to every smartphone. That number would be valid for the life of the device, and would naturally change whenever you got a new phone. If you needed to change it for whatever reason, you could do so with relative ease. Under that system, you could continue to give out their phone number without worrying about what else it might affect.

"The people in the card payment space understood a long time ago that separating people’s accounts from static attributes is important, but this definitely hasn’t happened with mobile phone numbers," Hardjono says. "Plus SMS is a weak way to authenticate anyway, because the protocols are vulnerable. So if your phone could generate this short-term identifier that's a combination of your physical device identifier and your phone number, it would be replaceable as a safety precaution."

And that's just one possibility. The important thing is that it’s not necessarily bad for identifiers to be public; you just need a mechanism to change them if necessary, in a way that causes minimal headaches.

Numerous undertakings have explored these problems, but past projects have faced inertia in working to implement changes. Again, look to credit cards; the international community used chip and pin for decades before the US finally transitioned over in 2015. And the US still didn't adopt PINs, opting for less secure signatures instead.


Substantive change likely won't come unless the government mandates it. Managing identity schemes is a complicated; falling back on phone numbers and Social Security numbers makes life easier for companies. The Better Identity Coalition's Grant notes, though, that recent wakeup calls, like the devastating Equifax breach, have created some real motivation within private industry.

Understandably, you'll probably only believe it when you see it. Until that big change does, take all the precautions you can to protect your mobile account, and try to cut your phone number out of as many signups and logins as possible. It may not be the the ideal identifier, but it's the one you're stuck with.

Updated August 25, 9:15am EST to include reports that hashed passwords were also compromised in the T-Mobile breach.