01.fnc free seminar (public) new


Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

01.fnc free seminar (public) new

  1. 1. iForensics Prevention Program
  2. 2. In today’s presentation, you will learn things younever knew existed. Because of the internet andyour cell phone, you are the target of an increasingamount of cyber-criminals bent on stealing youridentity, your money and assets, and a variety ofother cyber-crimes we will be presenting to you.You do not need to take notes; we will provide youwith a download link to our PowerPoint presentation.We prefer that you just listen and then ask questions.Our staff will remain available at the end of thepresentation to answer any questions.Thank you for being a part of the iForensicsPrevention Program
  3. 3. In August 2006 a woman, under themoniker of Johnny B Goode, beganaccessing teen chat rooms and posing asa young male teenager.Over an 8-month period, she wasresponsible for 5-teen suicide deathscaused by cyber-bullying. LawEnforcement was unable to determine heridentity or her location. She operatedthrough a series of offshore proxies basedin China and then only through computersshe hijacked, effectively hiding her identityand location.On September 26, 2006, her and hermother accomplice were behind bars.
  4. 4. In the first quarter of 2007, a man knownas the ―honeymoon bandit‖ began preyingon women that he befriended in onlinedating sites.He would marry them, steal all of theirassets and then disappear and begin allover again.It took 10-months to track him down andapprehend him but only after he hadmarried 14-woman and had stolen theirassets.
  5. 5. In the summer of 2008, a hacker known as ―Hackman1‖ began illegallyaccessing various corporate databases and stealing personal andfinancial data in order to commit identity theft. In the course of a 6-monthinvestigation, he was responsible for over 5566 victims totaling over $15-million in damages. When he was apprehended, he was on a yacht offthe Florida Keys committing more identity theft.
  6. 6. Teen recounts horror of abduction into sex slavery Many young victims of human traffickers treated as criminals themselvesFor someone who’s only 18, Shauna Newell is remarkably composed as shedescribes being kidnapped, drugged, gang-raped and savagely beaten.It is only when she talks about seeing one of the men who sexually assaultedher — free and unafraid of being prosecuted — that she starts to break down.―I went out to the beach a few weeks ago and I saw the dude who raped me,and he just looked at me,‖ Newell told NBC News, her voice choking. ―Like,hey … you ruined my whole life. You have scarred me for the rest of my lifeand youre just sitting there going on with your life like nothing is wrong.‖Human trafficAs shocking as Newell’s story is, it is not unique, TODAY’s Natalie Moralessaid Thursday in a special report entitled ―Sex Slaves in the Suburbs.‖Advocates for girls and young women who are forced into prostitution bypeople who approach them in various ways, including on the Internet, claimthat thousands of American youths are victims of human traffickers.
  7. 7. In all three cases above, these are examples ofcyber-crimes conducted over the Worldwide Web orInternet.Not all cyber-crimes are for financial gain but in manycases bodily harm and even death occurs as a result.As large as ForensicsNation is - almost 21,000people in 22-countires - we don’t even scratch thesurface when it comes to cyber-crime.Even working with counterpart companies in othercountries such as Group-IB in Russia, where weshare information and exchange databases, cyber-crime still runs rampant worldwide and is increasing.http://group-ib.com/
  8. 8. Actually the Hacker Underground complete with their own news sites, newsnetworks and such are good things. This is where hackers BUY their informationfrom other hackers. Info such as identity theft financial records, social securitynumbers, etc.So, we pose as buyers or sellers and ―bait‖ the hackers. When they respond weplant a tracking bug into their computer systems and instantly they go into ourdatabases.Now you may ask how do hackers pay for this information without revealing theiridentities. They use Xoom.com…no questions asked, the hacker bank…buteven their systems are not that secure.
  9. 9. In one word – PREVENTION!And this where each and everyone of you comes in!!!By conducting our iForensics Prevention Programseminars, we educate the public and businessowners to the dangers of cyber-crime and the bestoffense is still a good defense!By offering our iForensics workshops, we can teachprevention and tactics to combat even the bestcyber-criminals.Today cyber-criminals are conducting illegal hacking,child predation, identity theft, denial of serviceattacks, financial fraud, online scams, phishingschemes, data theft, corporate espionage and muchmore…Are you the prey or the hunter?
  10. 10. Sooner or later truth always prevails and our job atForensicsNation is to find the truth.We have a saying, ―An investigation doesn’t enduntil someone is in handcuffs!‖ and we are wellknown for our tenacity.But as we said before, as good as we are, we needyour help to combat the ever-increasing rate ofcyber-crime. Forewarned is forearmed!So now, allow us to describe cyber crime in terms ofhow it can affect you and our programs that protectyou – Personal Protect, Corporate Protect , ChildWatch and Guardian!Please welcome our Chief of Forensics Operations,Chief Jim Vasquez
  11. 11. As the lady said, I’m Chief Jim Vasquez, Chief ofForensics Operations, and my job is to run the day-to-day operations of the company. I am also one ofthe public voices and faces of the company.Because of the nature of what we do, our forensicinvestigators are cloaked in anonymity for theirpersonal protection as well as their families. I amalso responsible for the iForensics PreventionProgram and almost all of the products that weintroduce to combat cyber-crime. I have spent thebetter part of 20-years in law enforcement prior tojoining ForensicsNation and I have a good dealexperience with youth and young adults, both ofwhich hold a special place in my heart. To me, whatmakes cyber-crime so ominous is the fact thatcyber-criminals choose to hide behind theircomputer terminals and never actually witness thedamage and harm that they do. They are not justimmoral but cowards with absolutely no empathy foranybody including themselves.
  12. 12. But it goes much further then simply being immoraland cowardly. The mindset of cyber-criminals is notalways something easy to figure out.One of the sister-divisions to ForensicsNation iscalled Applied Mind Sciences. With over a dozendoctor/scientists on staff, we rely on AMS to assistus in profiling perpetrators of cyber-crimes and theirapprehension.In the case of the mother/daughter child predatorsdescribed previously, it was an AMS staff doctor thatdiscovered that ―Johnny B Goode‖ was really awoman and not a man.So without further ado, let’s get into the programand begin with personal protection…
  13. 13. • Credit Card Fraud• Identity Theft• Financial Scams• Child Predation• Computer Hijacking• Malware, Spyware• Electronic Voyeurism• Viruses• Keystroke Logging• Phishing• User Account & Password Theft• Cell Phone Spying• Online Auction Fraud – Ebay, etc.• And much more…The above areas of personal exposure are the more prevalent forms of cyber crimes directed against individuals. It is by no means a complete list.
  14. 14. YOU are the target!Surfing the Web - On way that hackers get hold of you is when you surf theweb. They put up enticing websites and as soon as you bring one up on yourscreen they are secretly downloading spyware onto your computer.Cell Phone Spying - One of the easiest ways to become a victim of cyber-crime is by hacking into your cell phone and installing spyware. Today’s CellPhone spyware does not require that the hacker have possession of yourphone. They simply call your cell phone number and whether it is answered ornot, it takes all of about 30-seconds to marry your phone to the spyware.Spyware of this type is readily available on the open market.Did you know that with the help of a simple, inexpensive device, anyone withaccess to your phone could read your private text messages (SMS), even if youhave deleted them previously? This device can even recover contacts and agood number or previously dialed numbers. There is also a device that costs awhopping $20 that will tell you the cell phone number of any cell phone within20-feet of the device.
  15. 15. They are waiting for you!Email - Your email accounts can quiteeasily be hacked. There is softwareavailable on the open market that breaksusernames and passwords. Also, if yourcomputer is hacked, most people leavesensitive information on their computerthat can fall into a hackers hands.Hard Drive Encryption - Hacking yourhard drive and other data storage devicescan be preventing by using discencryption programs.Other Areas of Vulnerability- Firewalls,Internet Phone, Chat rooms, PORN,computer hijacking and much more…
  16. 16. Weird Stuff Electronic Voyeurism – Using a portable x-ray unit shown on the left, we caught a real ―sicko‖ checking out women in a major department store. This unit sees through clothing.Wireless Camera – this little guy is only 1‖ X 1.5‖ in sizeand can be mounted anywhere like outside your windowspying on you while you are getting dressed. It transmitsto the Internet using cell phone antennas. This unit will tell the user your cell phone number and the user only has to be within 10-yards of your cell phone like sitting at a table next to you at Starbucks.
  17. 17. The website below tracks any cell phone in the UK 24/7. And no, we will notshow you the US-based one so please don’t ask!! There is a website for justabout every country.
  18. 18. Button Camera – you only see the button and it records up to 12-hours. This unit also comes wireless and can transmit up to 300-yards. As small as it is; it can be installed just about anywhere. It even works in the dark!!!We caught one guy in his car with the monitorunit on the right using a button camera to spyon a ―Hooters‖ waitress undressing in herapartment. Some people should get a hobby! For only $19, you too can call anyone and change your voice from male to female…too weird even for me!!!
  19. 19. Who said your email was safe? This software can be installed remotely simply by sending you an email/text message and you clicking on a link This is a camera disguised as a Bluetooth ear piece used with cell phones. It also comes with a button camera and comes in a wireless mode too!.We caught a woman in Starbuckslistening in on a competitor’s cell phoneconversations and then stealing hisbusiness contacts. Simply plug it intoyour laptop and just listen in…whoa!
  20. 20. Two-Way Mirrors in Public Dressings RoomsHere is something to watch for that is more prevalentthan you think – two-way mirrors in public dressingrooms.With shoplifting increasing in exponential rates,merchants are desperate to try ANYTHING to catchshoplifters EVEN if it violates your privacy.Always check for two-way mirrors. Use a pen nib oryour fingernail. Place it against the mirror. If theimages touch it is a one-way mirror. If there is a gapbetween the images then it is a two-way mirror. Thephoto at the left shows a two-way mirror. Notice thatthe tips of the fingernail do not touch?
  21. 21. The Cyber ProblemThe main problem is that the average computer userhas no idea that they are exposed and even if they do,they have no idea how to protect themselves.As technology expands, the tools available to thehacker and cyber-criminal expands too. They keep upwith everything on the Internet where the average userdoes not.Cyber-criminals are organizing into gangs. The mostfamous is the hacking gang called Anonymous thatused ―Denial of Service‖ techniques against majorfinancial institutions that denied Wikileaks merchantaccount facilities in 2011.But in countries such as Russia and many of the old―iron curtain‖ countries too, organized cyber-crimegangs are increasing.
  22. 22. The 10-Most Notorious Cyber Gangs1-Russian Business Network2-Rock Phish Gang3-NSA4-Grey Pigeon Authors5-Stormworm Gang6-Awola Crew7-DRG Group8-South American Groups9-Oga-NigerianAs cyber-crime increases, so does theirincome and this feeds the increase of morecyber-crime.Like drugs, cyber-crime pays and it payswell.
  23. 23. The SolutionThe solution begins with consumer awareness andby understanding how cyber-criminals work. Not allcyber-criminal activities are conducted by organizedgangs. Most cyber-criminal activity is conducted byindividuals.ForensicsNation offers a product called Personal Protect. This is a 4-houronline workshop where you participate from the privacy of your home or office inour online classroom. It is taught by our Chief Forensics Investigator, Dr. LelandBenton, who is considered one of the leading cyber-forensics experts in theworld. He shows you how to protect you and your family when you surf theweb, protect your email, prevent cell phone spying, hard drive encryption, thebest firewall and antivirus programs to use, how to use secure chat rooms andmuch more. He provides you with all of the resources necessary to accomplishall of the above and most of these resources are FREE!
  24. 24. Workshop Contents Antivirus Scans, Antivirus ProgramsBackup UtilitiesDisk EncryptionEmail PrivacyGamer ModeHost-Based Intrusion Prevention System (HIPS)Internet BrowsersInternet Security TrainingPassword ManagersRemovable Media ControlSecure Hard Drive WipingSoftware FirewallsSpyware Detection and RemovalSpyware PreventionSystem Optimization and Privacy Cleaning ToolsVulnerability ScannersVulnerability and Protection Techniques for Microsoft Office , PC Technician,Networking, Security, Web Design, Graphic Design, Data Management,Programming and Accounting
  25. 25. There are areas that we address that affect your everyday computer usage.Legal and technology researchers estimate that it would take about a month forInternet users to read the privacy policies of all the Web sites they visit in a year.You know that dream where you suddenly realize you’re stark naked? You’reliving it whenever you open your browser.Your information can then be stored, analyzed, indexed and sold as a commodityto data brokers who in turn might sell it to advertisers, employers, health insurersor credit rating agencies.And while it’s possible to cloak your online activities fully, you can take steps toimplement even the smallest of privacy and security measures. Some of thesemeasures are quite easy and many are free. Of course, the more effort andmoney you expend, the more concealed you are. The trick is to find the rightbalance between cost, convenience and privacy.
  26. 26. Before you can thwart the snoopers, you have to know who they are.There are hackers hanging around Wi-Fi hot spots, to be sure. Butsecurity experts and privacy advocates said more worrisome areInternet service providers, search engine operators, e-mail suppliersand Web site administrators — particularly if a single entity acts in morethan one capacity, like Google, Yahoo, Facebook and AOL. This meansthey can easily collect and cross-reference your data, that is, matchyour e-mails with your browsing history, as well as figure out yourlocation and identify all the devices you use to connect to the Internet.If you search on Google, maybe you don’t want to use Gmail for your e-mail!If you do not want the content of your e-mail messages examined oranalyzed at all, you may want to consider lesser-known free serviceslike HushMail, RiseUp and Zoho, which promote no-snooping policies.Or register your own domain with an associated e-mail address throughservices like Hover or BlueHost, which cost $55 to $85 a year. You getnot only the company’s assurance of privacy but also an address unlikeanyone else’s, like me@myowndomain.com.
  27. 27. Another shrouding tactic is to use the search engine DuckDuckGo, whichdistinguishes itself with a ―We do not track or bubble you!‖ policy. Bubbling is thefiltering of search results based on your search history. (Bubbling also meansyou are less likely to see opposing points of view or be exposed to somethingfresh and new.)Shielding your I.P. address is possible by connecting to what is called a virtualprivate network, or V.P.N., such as those offered by WiTopia, PrivateVPN andStrongVPN. These services, whose prices price from $40 to $90 a year, routeyour data stream to what is called a proxy server, where it is stripped of your I.P.address before it is sent on to its destination. This obscures your identity notonly from Websites but also from your Internet service provider.Moreover, these services encrypt data traveling to and from their servers so itlooks like gibberish to anyone who might be monitoring wireless networks inplaces like coffee shops, airports and hotels.Also, there is Tor, a free service with 36 million users that was originallydeveloped to conceal military communications. Tor encrypts your data streamand bounces it through a series of proxy servers so no single entity knows thesource of the data or whence it came. The only drawback is that with all thatbouncing around, it is very S-L-O-W.
  28. 28. Free browser add-ons that increase privacy and yetwill not interrupt your work flow include Ghostery andDo Not Track Plus, which prevent Web sites fromrelaying information about you and your visit totracking companies. These add-ons also name thecompanies that were blocked from receiving yourdata (one social network, five advertising companiesand six data brokers on a recent visit to CNN.com),which is instructive in itself.Companies like Google are creating these enormousdatabases using your personal information. Theymay have the best of intentions now, but who knowswhat they will look like 20 years from now, and bythen it will be too late to take it all back.
  29. 29. Taking the Fight to the Cyber-CriminalsFrom denial-of-service and web page defacements, to information theft that cancost your company millions of dollars, the motives and scope of attack may varybut the solution is the same. Understand the threat and implement appropriatecountermeasures.FNC Corporate Protect is a 4-hour workshop designed to create securityawareness and give business owners the unique skills required to protect theinformation assets of their organization. In this workshop you will learn whathackers know. You will learn what they can do, how they do it, and mostimportantly, how you can minimize or eliminate your vulnerabilities to these threatsand attacks. PLUS – the workshop includes an onsite visit by one of our securityconsultants to establish areas of vulnerability.The premise of the FNC Corporate Protect is simple: you need to understand thethreats to your business; you need to know what you can do to eliminate yourvulnerabilities. As each exploit technique is taught, you will perform the taskindividually and then you will implement and test an appropriate countermeasure.
  30. 30. Areas covered in FNC Corporate Protect include: • Network footprinting, port scanning, and enumeration techniques • Specific operating system vulnerabilities • Web server vulnerabilities • Application level exploits, worms, viruses and Trojans • Network vulnerabilities, sniffing, wireless sniffing, IP spoofing, and PPTP/VPNbreakingTwo other critical areas presented in FNC Corporate Protect are IntrusionDetection and Incident Response. As the names imply, these two areas addressthe tools techniques designed to give you the advantage of being prepared todeal with hacks if and when they occur. Being able to detect a hack and having aresponse plan in place will greatly improve your security awareness and furtherreduce your vulnerability. This course is delivered by ForensicsNation’s seniorpracticing security consultants, who bring real world experience to theclassroom.
  31. 31. Workshop ContentsPart 1: The hacker subculture and approach• An overview of the risks and threats• An insight into the hacker underground• The anatomy of a hackPart 2: TCP/IP fundamentals• TCP/IP and its relevance to hacking• TCP header, flags and options• UDP, ICMP and ARP• Network traffic dump analysis• Class exercises and lab sessionsPart 3: Reconnaissance techniques• Selecting a target• Identifying target hosts and services• Network mapping techniques• Fingerprinting and OS determination• Scanning and stealth techniques• Class exercises and lab sessions
  32. 32. Part 4: Compromising networks• Vulnerability cross referencing• Code auditing and insecure code examples• Exploiting network services• Sniffers, backdoors and root kits• Trojans and session hijacking• Denial of service attacks• Trust exploitation and spoofing• Buffer overflow techniques• Web page graffiti attacks• War dialers and dial-in hacking• Manipulating audit trails and security logs• Class exercises and lab sessionsPart 5: Windows Applied Hacking• Windows components, Domains and structures• Remote information gathering• Scanning and banner checking• Selecting services to attack• Enumerating Windows information• Windows hacking techniques• Recent Windows vulnerabilities• Class exercises and lab sessions
  33. 33. Part 6: Windows effective countermeasures• User account policies and group allocations• File and directory permissions• File and print shares• Hardening the registry• Domains and trust relationships• Securing network services• Windows antivirus strategies• Windows and Internet security• Windows auditing and security logs• Windows service packs and hot fixes• Class exercises and lab sessionsPart 7: Unix applied hacking• Unix components• Unix variants• Remote and local information gathering• Scanning and fingerprinting• Selecting services to attack• Unix hacking techniques• Recent Unix vulnerabilities• Class exercises and lab sessions
  34. 34. Part 8: Unix effective countermeasures• Unix password and group files• User account and password controls• Controlling command line access• File and directory permissions• SUID and SGID controls• Crontab security• Network and trust relationships• Securing network services• Unix antivirus strategies• Unix and Internet security• Unix auditing and security logs• Unix security patches• Class exercises and lab sessionsPart 9: Network security strategies• Risk management and AS/NZS 4360• Security management and AS/NZS 7799• Developing a practical security strategy• Physical security and environmental controls• Personnel security and awareness training• Firewall risks and strategies
  35. 35. • Intrusion detection system risks and strategies• An overview of ecommerce security issues• An overview of wireless security issues• An overview of PBX security issues• An overview of intrusion analysis techniques• An overview of forensics procedures• An overview of IT contingency planning• Class exercises and lab sessionsPart 10: Advanced Security Techniques•Inventory of Authorized and Unauthorized Devices•Inventory of Authorized and Unauthorized Software•Secure Configurations for Hardware and Software on Laptops, Workstations,and Servers•Continuous Vulnerability Assessment and Remediation•Malware Defenses•Application Software Security•Wireless Device Control•Data Recovery Capability
  36. 36. •Security Skills Assessment and Appropriate Training to Fill Gaps•Secure Configurations for Network Devices such as Firewalls, Routers, andSwitches•Limitation and Control of Network Ports, Protocols, and Services•Controlled Use of Administrative Privileges•Boundary Defense•Maintenance, Monitoring, and Analysis of Security Audit Logs•Controlled Access Based on the Need to Know•Account Monitoring and Control•Data Loss Prevention•Incident Response Capability•Secure Network Engineering•Penetration Tests and Red Team ExercisesBonus: Retina® Network Security Scanner from eEye.comRecognized as the best scanner on the market in terms of speed, ease of use,non-intrusiveness and advanced scanning capabilities
  37. 37. Our children are our most valuable asset and yet very littleare done to protect them from cyber-predators andcriminal elements.Not a day goes by that ForensicsNation is not working ona child predator investigation and the trending tells us it isgetting worse.Cyber-predators truly believe that they can remaininvisible as they prey on kids and this is where they arevery WRONG! ForensicsNation has caught some of themost notorious child predators.Read ―The Confessions of a Child Predator:http://www.amazon.com/dp/B007BB97KUPinpoint Protect Child Watch combines GPS technologyalong with the prevention techniques of ForensicsNationand acts as an electronic babysitter.
  38. 38. St George is a town of 80,000 people in southernUtah on the border with Arizona and Nevada.
  39. 39. Pinpoint Protect Child WatchThere are always situations that a person findshim/herself in that they cannot control.PinpointProtect is here to assist you when youneed help. If your child become lost, attacked,abducted, injured or has suffered through adisaster, we know where they are at all times andwe can send help.We know where they are because our proprietaryGPS technology locates their exact position within10-yards. We know if they are in trouble becauseall they have to do is push the ―SOS‖ button andwe go into action.24/7 MonitoringWe monitor your child 24/7 through a state-of-the-art central control room where we scan the globewatching…ready to spring into action wheneverwe are needed.
  40. 40. It doesn’t matter where your child is in the world; it doesn’t matter how remote alocation; the weather doesn’t affect our ability to locate them; even if all servicesare down and unavailable, Pinpoint Protection is still working and still able topinpoint your child’s exact location.Password-Protected Internet InterfaceYou may not know where your children are but we do! And everybody you give ausername/password can pinpoint their exact location using our Password-Protected Internet Interface.
  41. 41. If your child is lost, you too can go on the Internet and find his/her location…andanyone else that you give permission to locate them. Again, it doesn’t matterwhere they are in the world or the weather conditions; we always know whereyour child is and so does anybody else that you give permission to know.Here is how we do it…The Problem: the biggest problem concerning GPS tracking devices is thebattery life. Most GPS tracking devices are only used for specific surveillance fora short period of time and hence; the battery life is only a few hours.The Solution: Our proprietary tracking unit works on motion and will conservebattery power when a person is not moving. The unit has a battery life of 30hours depending on the reporting rate you choose.This is important! First, our unit goes to sleep as long as you are stationary.The minute you start moving, it wakes up and reports your coordinates. Thisfeature saves the battery life and allows our unit up to 3-days usage until it needsto be recharged (the unit comes with a charger and it works just like your cellphone charger).
  42. 42. Second, our PinpointProtect proprietary software in our control roomautomatically notifies our personnel when your child has been stationary for anunusually long period of time. Our personnel check your child’s location first todetermine if there is a good reason that he/she have been stationary. Forexample, if your child resides in New York and he/she has been stationary after8 PM Eastern Time, then we can easily assume he/she is sleeping.However; if your family is camping in the remote desert of New Mexico andhave been stationary for over 8-hours, our personnel will attempt to makecontact with you. If we cannot make contact then we will call the contact peopleon your application and inquire if they have been in communication with you. Ifwe determine that no one has been in contact with you we send our people tofind you.Furthermore – there is no reason for the unit to be turned off. Even when it ischarging the unit can remain on. Our PinpointProtect proprietary software in ourcontrol room automatically notifies our personnel when any unit is turned off andwe immediately attempt to make contact. Again, if we cannot make contact thenwe will call the contact people on your application and inquire if they have beenin communication with you.
  43. 43. Note – a customer can turned the unit offat any time if they do not want theirlocation known. If the unit is attached to achild, this function can be disabled. This isyour choice. If so, we provide a phonenumber to our control room to notify ourpersonnel that you are turning off the unitso we do not react.Peace of mind – Knowing thatPinpointProtect personnel are just a phonecall away is very comforting. For whateverreason, you can always call us forassistance and our personnel will respond.You are never alonewith PinpointProtect!NOTE: In the workshop we will show you a goodmany different products to protect you and yourchildren.
  44. 44. If we lived in a perfect world, there would be noneed for Pinpoint Protect Guardian. Unfortunately,just walking outside of your house is fraught withdanger. Pinpoint Protect Guardian does manythings but most of all it offers peace of mind and theability to keep track of your loved ones 24/7.So if your spouse travels on business, you knowwhere he/she is all of the time. If you have elderlyparents, Pinpoint Protect Guardian acts as anelectronic babysitter.The uses and applications of Pinpoint ProtectGuardian are endless. Here are just a few…
  45. 45. High Profile People – people with high profiles: movie stars, sports figures,wealthy people, government figures, etc need extra protection andPinpointProtect gives them that special peace-of-mind.Lost – everybody becomes lost eventually. It doesn’t even have to besomewhere that is remote; if you are lost you can hit the SOS button or if youhave access to the Internet, you can find your exact location.Attacked – women are especially vulnerable to attack and eventually findthemselves in situations where an attack is made easier such as parking garages,elevators, dark streets, parking lots. Just hit the SOS button and we send thecavalry.Abducted – unfortunately, abduction and kidnapping has become a cottageindustry in many parts of the world, especially in Mexico, Central and SouthAmerica. If you live or travel to any parts of the world where this is common youneed PinpointProtect!
  46. 46. Injured – In any situation where you are injured, even if you cannot push theSOS button, we at least know where you are and can send help.Disaster – you can be buried under rubble and we still can locate you. You maynot be able to communicate with the outside world because all communicationfacilities are down but your family can know where you are and if you are movingby logging into the Internet Interface.Travel – no matter where you go or where you travel to, PinpointProtect goeswith you and gives your loved ones peace-of-mind knowing exactly where youare at all times. They can even know if you arrived at your destination by usingthe Internet Interface.Work – do you have a job where you work alone or in a remote location? WithPinpointProtect, you are NEVER alone! We are there with you at all times.Dating – date rape and violence against women is becoming all too common.How does a woman protect herself? Yep…PinpointProtect! Now if a lady needshelp she can push the SOS button and we send help to her exact location. Butthis doesn’t mean that a lady should not be prudent and do all she can to protectherself.
  47. 47. Banking – If you take daily deposits to the bank for your business, you needPinpointProtect! Don’t be foolish enough to think that no one is watching youand logging the times and routes you take to the bank. Plan for the worst buthope for the best!Elderly – oddly enough, most of the ―lost‖ calls we receive are for elderlypeople. With the advent of electric wheelchairs (scooters) the elderly have atendency to wander. They are easily disoriented and need help. WithPinpointProtect, it is easy to find them and bring them home. Also the SOSbutton is there in case they need help for whatever reason.Teens – the best description for teens are ―walking hormones with feet‖! Let’sface it; the world presents way too many opportunities for teens to get intotrouble. One would think that teens resent PinpointProtect. Not so; our surveysshow that they actually appreciate having the ability to communicate when theyare in trouble and know that their parents know where they are at all times.
  48. 48. College – PinpointProtect gives parents that extra peace-of-mind when theirkids go off to college. Knowing where they are and where they are supposed tobe and also knowing that when they get into trouble or a scary situation thatthey have a way to communicate is comforting to parents whose kid(s) are outof the nest for the first time.Hunting – all hunting takes place in remote locations and many times inlocations where cell phones do not work. Never go hunting withoutPinpointProtect!Driving/Commuting – no matter where you drive or how long a commutePinpointProtect goes along with you. Even if cell phone service isn’t available,PinpointProtect is always available.Pets – now you will never lose a pet. Just place the PinpointProtect unit onyour pet’s collar and you will always know where it is.The list is endless…we simply cannot list all of the scenarios thatPinpointProtect has been used. Our customers continue to amaze us on howthey employ PinpointProtect!
  49. 49. Online WorkshopsFNC Personal Protect – every man, woman and teenager on the planet should gothrough this workshop. There is nothing like it taught anywhere. Learning how toprotect yourself begins with learning what the dangers are that confront you andthat you are not aware of that exist. 4-hours $99/personFNC Corporate Protect – protecting your business is protecting your source ofincome and prosperity. This workshops includes a visit to your business from oneof our commercial security consultants to determine the areas you are mostvulnerable. 4-hours + onsite consultation $297Pinpoint Protect Child Watch – protecting your children is a primary concern. Thisworkshop alerts you to the dangers confronting children and are taken from actualcase files of ForensicsNation. 4-hours $99/personPinpoint Protect Guardian – learning how to protect your entire family – husband,wife, children, elderly parents and more is the topic of this workshop. Certainprofessions, travel, hunting, and much more are defined and solutions offered.4-hours $99/person
  50. 50. Online Workshops-continuedPinpoint Protect Trained Observation/Body Language - you look but you do notsee; you listen but you do not hear. The human mind filters out a good deal ofincoming data. If you can’t see or hear danger coming then you are what wecall a VICTIM! This workshops teaches ―trained observation‖ and how to correctthe filters in your mind. After 4-hours of intense training you won’t miss anythingwhether you see or hear it. 4-hours Cost $99 /personPinpoint Protect Body Language - One of the most needed talents in personalprotection is deciphering what somebody is going to do and body languagegives this away each and every time. Fight or flight is determined by manythings but body language gives you the advantage. This workshops is one ofthe most fascinating workshops we have ever created.4-hours Cost $99/personNOTE: All of our workshops are taught online in ForensicsNation onlineclassroom and each attendee participates from the privacy of his/her home oroffice. To see a list of available workshops and or to participate go to: http://Forensicsnation.com/events
  51. 51. ForensicsNation Protection CatalogWe have taken the guess work out ofidentifying good quality products and the bestprices by publishing our own catalog for yourconvenience.All of the products contained in our catalogare used by ForensicsNation everyday.Download your FREE catalog and beginprotecting yourself and your loved onesToday.Go here for your FREE download:
  52. 52. Corporate Mailing Address:546 South Main StreetLock Box 304Cedar City, Utah 84720435-249-5600435-867-1988 Faxsupport@neternatives.comhttp://ForensicsNation.com