Crime and Intelligence Analyst, Security Researcher & Technologist, and Specialist in Anti-Terrorism and Protective Intelligence. Board Certified Forensic Examiner, Certified Forensic Consultant, and Fellow of the American College of Forensic Examiners. Diplomate of the American Board of Forensic Examiners and the American Board of Law Enforcement Experts.
Graduate of the Federal Law Enforcement Training Center and the F.B.I. Citizens' Academy. Professionally certified as a Protection Officer (CPO) and Security Supervisor (CSS) by the International Foundation for Protection Officers, Certified In Homeland Security (CHS-III), Intelligence Analysis (IAC) and Sensitive Security Information (SSI-Certified) by the American Board for Certification in Homeland Security, certified as an Anti-Terrorism Specialist (CAS) by the Anti-Terrorism Accreditation Board, certified as a Crime and Intelligence Analyst (CCIA) by the California Department of Justice and the California State University at Sacramento, and certified as a Cyber-Intelligence Professional (CCIP) by the McAfee Institute.
Amateur Radio Operator - KD7KLA Federal Firearms License Holder (C&R) NRA Expert - Rifle, Pistol, & Shotgun Black Belt - Hakko Ryu Jujutsu
Education: Trinity Theological Seminary - Doctor of Philosophy (Ph.D.) Northcentral University - Doctoral Studies concentrating in Homeland Security American Military University - Security Management | Competitive Intelligence | Intelligence Studies Columbia Southern University - Criminal Justice Administration St. John's University - Security Management Kaplan College - Paralegal Studies Ashworth College - Forensic Science | Paralegal Studies | Locksmithing American Institute of Applied Science - Forensic Science Pierce College - Emergency Medical Technician Defense Language Institute - German | Dutch
Specialized Training: Accurint for Law Enforcement | Bachelor, Master & Doctorate of Accurint - LexisNexis University, School of Law Enforcement Anti-Terrorism, Level II - US Army Forces Command - Anti-Terrorism Officer Level II Refresher (40 hours) - US Army Military Police School - Anti-Terrorism Officer Level II Refresher (40 hours) - USAF Air Education & Training Command Anti-Terrorism Instructor Qualification - US Army Special Operations Command Anti-Terrorism Officer Program - S2 Safety & Intelligence Institute Basic Criminal Investigation - Texas A&M University through the Texas Forensic Science Academy Basic Open Source Geographic Information Systems (GIS) - Western Region Counterdrug Training Center Certified Ethical Hacker (v.6 & v.7) - Federal Virtual Training Environment (US-CERT) Computer Security Techniques - Cleveland Institute of Technology Counter-Drug Analysis Course - Joint Military Intelligence Training Center Crime Analysis with Mapping - International Association of Crime Analysts Cyber Security Awareness Training - Texas Engineering Extension Service *General / Non-Technical Track - Information Security for Everyone (AWR-175-W) - Cyber Ethics (AWR-174-W) - Cyber Law and White Collar Crime (AWR-168-W) *Technical / IT Professional Track - Information Security Basics (AWR-173-W) - Secure Software (AWR-178-W) - Network Assurance (AWR-138-W) - Digital Forensics Basics (AWR-139-W) *Managers and Business Professionals Track - Business Information Continuity (AWR-176-W) - Information Risk Management (AWR-177-W) - Cyber Incident Analysis & Response (AWR-169-W) Digital Data Protection - Defense Cyber Investigations Training Academy Essentials of Information Systems Security - Villanova University Force Protection Level II - USAF Special Operations School Foundations of Intelligence Analysis Training - NW3C GAIC Information Security Fundamentals - FBI Virtual Academy Human Intelligence for Law Enforcement - S2 Safety & Intelligence Institute Information Assurance Security Officer Certification - US Army Signal Center Installation Law Enforcement Curriculum - US Marine Corps Intermediate Level Analytical Training - Western States Information Network (WSIN/RISS) Introduction to Criminal Intelligence - Canadian Police Knowledge Network Introduction to Criminal Intelligence Analysis - Canadian Police Knowledge Network Introduction to Human Sources - Canadian Police Knowledge Network Legal Investigations - Texas A&M University Texarkana Operations Security (OPSEC) Officer Level II - US Army OPSEC Support Element Penetration Testing - Federal Virtual Training Environment (US-CERT) Physical Security Course - US Army Military Police School Police Intelligence - Multijurisdictional Counterdrug Task Force Training (MCTFT) / St. Petersburg College Professional Locksmithing - Foley Belsaw Institute Surveillance Operations - Multijurisdictional Counterdrug Task Force Training (MCTFT) / St. Petersburg College USAF Security Forces Flight Nuclear Certification - Defense Nuclear Weapons School US Army Security Manager - Installation Security Office, Fort Lewis, WA
Military Service: US Army 1980-2001 - Counterintelligence Special Agent - Advanced Foreign Counterintelligence Training Course - Counterintelligence Force Protection Source Operations Course ASI S7 Foreign Counterintelligence SQI S Special Operations Support Personnel - US Army Airborne - US Army Air Assault - Canadian Parachutist Badge - Royal Thai Army Parachutist Badge
Member of: American Cryptogram Association American Society for Industrial Security Armed Forces Communications and Electronics Association Association for Intelligence Officers Association of Old Crows InfraGard - Federal Bureau of Investigation (FBI) Public Partnership International Association of Crime Analysts International Association of Law Enforcement Intelligence Analysts International Society of Explosives Engineers National Sheriffs' Association Washington Association of Sheriffs and Police Chiefs
Books Authored: Communications For Survival And Self-reliance Complete Guide To E-Security: Using The Internet And E-Mail Without Losing Your Privacy Digital Defense: A Guide to Personal Security in Cyberspace Don't Be A Victim!: How to Protect Yourself from Hoaxes, Scams, and Frauds Freeware Encryption And Security Programs: Protecting Your Computer And Your Privacy Privacy For Sale: How Big Brother And Others Are Selling Your Private Secrets For Profit Privacy Handbook: Proven Countermeasures for Combating Threats to Privacy, Security, and Personal Freedom Save Your Identity: ID Theft Awareness, Prevention, And Recovery Wilderness Evasion: A Guide To Hiding Out and Eluding Pursuit in Remote Areas
Practical Codes, Ciphers, & Secret Writing in - The Paladin Book of Dangerously Fun Stuff: For Boys Who Never Really Grew Up
Clandestine Communication Methods in - Intelligence and Private Investigation: Developing Sophisticated Methods for Conducting Inquiries
Honors & Awards: Delta Epsilon Tau - International Honor Society Omicron Sigma Sigma (Order of the Sword & Shield) Pi Gamma Mu - International Honor Society Kentucky Colonel ( http://www.sos.ky.gov/executive/kentuckycolonels.htm )
AxCrypt (http://www.axantum.com/axcrypt/) AxCrypt is free and easy to use open source strong file encryption for Windows 2000/2003/XP/Vista/2008/7, integrated with Windows Explorer. Encrypt, compress, decrypt, wipe, view and edit with a few mouse clicks. Cryptographic primitives are AES-128 and SHA-1.
CloudFogger (http://www.cloudfogger.com/en/) With Cloudfogger, you can also easily encrypt and decrypt single files via the Windows Explorer context menu. Handy when you only want to encrypt a few files because you want to take them with you on your USB pen drive. Encrypted files and protected folders can be shared easily and securely with others without providing them your Cloudfogger credentials. This allows for example a secure usage of a shared Dropbox Folder. Cloudfogger automatically detects cloud storage providers that are installed on your system. Additionally you can select any other folder on your computer that you want to protect. All files in protected folders will now be securely encrypted on your hard drive - and will only be uploaded to your Dropbox fully protected.
Encryption Wizard (http://www.spi.dod.mil/ewizard.htm) EW is an SPC implementation of the Advanced Encryption Standard (AES)(Rijndael) augmented with a file manager Graphical User Interface (GUI) for ease of use. The 128-bit encryption/decryption algorithm used by Encryption Wizard is considered cryptographically strong and is routinely used in National Security Agency (NSA) and National Institute of Standards and Technology (NIST) certified products. Encryption Wizard is designed to protect data at rest and in transit (such as email attachments).
FreeOTFE (http://www.freeotfe.org/) FreeOTFE is a free, open source, "on-the-fly" transparent disk encryption program for PCs and PDAs. With this software, you can create one or more "virtual disks" on your PC/PDA. These disks operate exactly like a normal disk, with the exception that anything written to one of them is transparently, and securely, encrypted before being stored on your computer's hard drive.
Gmail (Safe Gmail Extension) Safe Gmail (http://safegmail.com/) is an extension for the Google Chrome browser that adds an encryption option to Gmail. Once the Safe Gmail extension has been added to Google Chrome, an “Encrypt” check box appears on the compose page of Gmail. Selecting the check box causes a question and secret answer box to appear. After composing an e-mail, enter a question and answer in these boxes and click the “Send + Encrypt” button. Your e-mail will be encrypted and sent to your selected recipients.
GNU Privacy Guard (http://www.gnupg.org/) GnuPG is the GNU project's complete and free implementation of the OpenPGP standard as defined by RFC4880 . GnuPG allows to encrypt and sign your data and communication, features a versatile key management system as well as access modules for all kinds of public key directories. GnuPG, also known as GPG, is a command line tool with features for easy integration with other applications. A wealth of frontend applications and libraries are available. Version 2 of GnuPG also provides support for S/MIME.
KeePass Password Safe (http://keepass.info/) KeePass is a free open source password manager, which helps you to manage your passwords in a secure way. You can put all your passwords in one database, which is locked with one master key or a key file. So you only have to remember one single master password or select the key file to unlock the whole database. The databases are encrypted using the best and most secure encryption algorithms currently known (AES and Twofish).
Master Lock Vault (https://www.masterlockvault.com/) With Master Lock Vault's industry leading 256-bit SSL data encryption, strong authentication controls, redundant firewall protection, and intrusion detection monitoring, your most valuable information is organized and protected in your digital safe deposit box for quick and easy access anytime, anywhere.
Password Safe (http://www.schneier.com/passsafe.html) Many computer users today have to keep track of dozens of passwords: for network accounts, online services, premium web sites. Some write their passwords on a piece of paper, leaving their accounts vulnerable to thieves or in-house snoops. Others choose the same password for different applications, which makes life easy for intruders of all kinds. With Password Safe, a free utility designed by Bruce Schneier, users can keep their passwords securely encrypted on their computers. A single Safe Combination--just one thing to remember--unlocks them all. Password Safe protects passwords with the Twofish encryption algorithm, a fast, free alternative to DES.
Pretty Good Privacy (PGP) (http://www.pgpi.org/products/pgp/versions/freeware/) Pretty Good Privacy or PGP is an encryption program developed by Phil Zimmermann and published in 1991. It was one of the first public-key encryption programs available to the general public, and has today become the "unofficial standard" for encryption of e-mail and personal communication on the Internet. PGP uses public key encryption. It has one key (a public key) for encryption and a second key (a private key) for decryption. With PGP installed on your computer you can encrypt a message to any person whose public key you possess. However, the only way to then decrypt that message is to possess the associated private key. Thus when using PGP you give your public key to everyone, add it to key servers, and maybe even publish it on the Internet, but you keep your private key secret and secure, thereby ensuring that while anyone can encrypt a message and send it to you, only you can decrypt and read that message.
Rohos Mini Drive (http://www.rohos.com/) Rohos Mini Drive creates hidden and encrypted partition on the USB flash drive memory. If you have many private files on the USB drive and want to keep them in secret, you can protect them by a password and strong encryption with Rohos Mini Drive.
Sophos Free Encryption Tool (http://www.sophos.com/en-us/products/free-tools/sophos-free-encryption.aspx) Our Sophos Free Encryption is easy to use and fast. We designed it to work in any situation, for businesses and individuals. You choose which files you want to encrypt and email safely. - You can create password-protected archives with a simple right-click - It works with most email programs and automatically adds selected archives to new email messages for you - When you encrypt, files are automatically compressed, saving on email bandwidth costs - Encrypted files can be self-extracting so recipients don’t need special software to open the file — just the password - We use a password vault, scripting and self-extraction to make things easy
True Crypt (http://www.truecrypt.org/) TrueCrypt is software for establishing and maintaining an on-the-fly-encrypted volume (data storage device). On-the-fly encryption means that data is automatically encrypted right before it is saved and decrypted right after it is loaded, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password/keyfile(s) or correct encryption keys. Entire file system is encrypted (e.g., file names, folder names, contents of every file, free space, meta data, etc). Files can be copied to and from a mounted TrueCrypt volume just like they are copied to/from any normal disk (for example, by simple drag-and-drop operations). Files are automatically being decrypted on the fly (in memory/RAM) while they are being read or copied from an encrypted TrueCrypt volume. Similarly, files that are being written or copied to the TrueCrypt volume are automatically being encrypted on the fly (right before they are written to the disk) in RAM. Note that this does not mean that the whole file that is to be encrypted/decrypted must be stored in RAM before it can be encrypted/decrypted. There are no extra memory (RAM) requirements for TrueCrypt.
USB Safeguard (http://usbsafeguard.altervista.org/) USB Safeguard is a portable software program to encrypt and protect data with a password on your removable pen drive using the AES 256 bits encryption.
7-Zip (http://www.7-zip.org/) 7-Zip is open source software. Most of the source code is under the GNU LGPL license. 7-Zip supports encryption with AES-256 algorithm. This algorithm uses cipher key with length of 256 bits. To create that key 7-Zip uses derivation function based on SHA-256 hash algorithm. A key derivation function produces a derived key from text password defined by user. For increasing the cost of exhaustive search for passwords 7-Zip uses big number of iterations to produce cipher key from text password.
My Top-40 Reading List for Hackers, Penetration Testers, and Security Specialists (or what I’ve been reading)... with links to Amazon.Com
When you come face-to-face with an armed violent criminal intent on killing you, your only real option for survival is to be armed yourself and trained to use your firearm to defend yourself and those around you.