Friday, July 14, 2017

HOW TO NAVIGATE THROUGH THE UNDERGROUND INTERNET / TOR


We live in an era of free-flowing data, where any person with an Internet connection has seemingly all the information in the world at their fingertips. Yet, while the Internet has greatly expanded the ability to share knowledge, it has also made issues of privacy more complicated, with many worrying their own personal information, including their activity on the Internet, may be observed without their permission. Not only are government agencies able to track an individual’s online movements, but so too are corporations, who have only become bolder in using that information to target users with ads. Unseen eyes are everywhere.
In this climate of data gathering and privacy concerns, a browser called Tor has become the subject of discussion and notoriety. Like many underground phenomena on the Internet, it is poorly understood, shrouded in the sort of technological mysticism that people often ascribe to things like hacking or bitcoins.
Tor is software that allows users to browse the Web anonymously. Developed by the Tor Project, a nonprofit organization that advocates for anonymity on the internet, Tor was originally called The Onion Router because it uses a technique called onion routing to conceal information about user activity. Perhaps ironically, the organization receives the bulk of its funding from the United States government, which views Tor as a tool for fostering democracy in authoritarian states.

Why the Internet isn’t secure

To understand how Tor is able to protect a user’s identity as they browse the Internet, it seems prudent to discuss exactly how the Internet works. The Internet is, at its most basic, the series of connections between computers across great distance. In the beginning, computers were isolated, unable to communicate with each other. As the tech got more advanced, engineers were able to physically link computers together, creating early networks. These networks still required the computers to be relatively near each other, however. Eventually, advances in fiber optics enabled networks to connect across continents, allowing for the Internet to be born.
Some computers house the data stored on the Internet, including web pages like Google. These computers are known as “servers.” A device used to access this information, such as a smartphone or PC, is known as a client. The transmission lines that connect clients to servers come in a variety of forms, whether fiber optic cables or wireless signals, but they are all connections.
Although clients initiate connections to get information from servers, the flow goes both ways. Data is exchanged across the Internet in packets. These packets contain information about the sender and the destination, and certain individuals and organizations can use this data to monitor who is doing certain things or accessing certain information on the Web.
It is not just the server that can see this data. Traffic analysis is big business, and many organizations, both private and governmental, can monitor the messages flowing between clients and servers. How, then, does Tor keep the user’s information secret?

How Tor has the answer

There are two key aspects to onion routing. First, the Tor network is composed of volunteers who use their computers as “nodes.” As mentioned earlier, during normal browsing, information travels across the Internet in packets. When a Tor user visits a website, however, their packets do not simply travel to that server. Instead, Tor creates a path through randomly assigned nodes on that the packet will follow before reaching the server.
The other important aspect of onion routing is how the packets are constructed. Normally, a packet will include the sender’s address and the destination, not unlike a letter. When using Tor, the packet is wrapped in successive layers of packets, like a nesting doll.
When the user sends the packet, the top layer tells it to go to Router A, the first stop on the circuit. When it is there, Router A takes off the first layer. The next layer tells Router A to send the packet onward to Router B. Router A does not know the ultimate destination, only that the packet came from the user and went to B. Router B peels off the next layer, seeing that the next stop is Router C. The process continues until the message reaches its destination. At each stop, the node only knows the available information: the last place the packet was, and the next place it will be. No node knows the complete path, and neither would anyone who observes the message being sent from a node.

How to get Tor

In keeping with the ideological aims of the Tor Project, Tor is free to use. Simply download and install the browser, which is a modified version of Firefox available for Windows, Mac OS X, and Linux. For mobile browsing, there is also an Android app called Orbot. Note that while the Tor browser is already configured to work properly, users on networks with firewalls or other security systems may experience difficulties. Moreover, careless Internet usage can still compromise one’s anonymity. Tor’s website has a comprehensive list of things to avoid doing while using the browser, as well as fixes for any problems that arise.

The Deep Web and Tor’s hidden services

Tor is valuable as a tool to protect the user’s privacy, but that is not its only function. The other, more infamous use for Tor is as a gateway into the Deep Web, the massive portion of the Web that is not indexed by search engines. The term “Deep Web” is thrown around in popular discourse, often in tones reserved for bogeymen. There are good reasons for this, but most of the Deep Web is fairly mundane. It is merely all the information that cannot be easily accessed through a Web search, which is a lot of data, actually.
The Internet, to use an old but apt cliche, is like the ocean. Like the surface of the world’s oceans, the surface of the Internet is mapped out, easily found via Google search. The bulk of the world’s oceans lie beneath the surface, however. The bulk of the Internet (around 80 percent) comprises pages unknown to most people, locked behind passwords and protocols.
*TOR Browser is advanced, you'll need to grasp Linux and don't trust most download sites. Just a thought.

WikiLeaks: The CIA is using popular TVs, smartphones and cars to spy on their owners

This isn't even news anymore but, you know...

The latest revelations about the U.S. government’s powerful hacking tools potentially takes surveillance right into the homes and hip pockets of billions of users worldwide, showing how a remarkable variety of everyday devices can be turned to spy on their owners.
Televisions, smartphones and even anti-virus software are all vulnerable to CIA hacking, according to the WikiLeaks documents released Tuesday. The capabilities described include recording the sounds, images and the private text messages of users, even when they resort to encrypted apps to communicate.
While many of the attack technologies had been previously discussed at cybersecurity conferences, experts were startled to see evidence that the CIA had turned so many theoretical vulnerabilities into functioning attack tools against staples of modern life. These include widely used Internet routers, smartphones, and Mac and Windows computers.
In the case of a tool called “Weeping Angel” for attacking Samsung SmartTVs, WikiLeaks wrote, “After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on, In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.”
The CIA reportedly also has studied whether it could infect vehicle control systems for cars and trucks, which WikiLeaks alleged could be used to conduct “nearly undetectable assassinations.”
And a specialized CIA unit called the Mobile Devices Branch produced malware to control and steal information from iPhones, which according to WikiLeaks were a particular focus because of the smartphone’s popularity “among social, political diplomatic and business elites.” The agency also targeted popular phones running Google’s Android, the world’s leading mobile operating system.
Wikileaks said it redacted lists of CIA surveillance targets, though it said they included targets and machines in Latin America, Europe and the United States. The anti-secrecy group also said that by developing such intrusive technology — rather than helping tech companies patch flaws in their products — the CIA was undermining efforts to protect the cybersecurity of Americans.
“The argument that there is some terrorist using a Samsung TV somewhere — as a reason to not disclose that vulnerability to the company, when it puts thousands of Americans at risk — I fundamentally disagree with it, “ said Alex Rice, chief technology officer for Hacker One, a start-up that enlists hackers to report security gaps to companies and organizations in exchange for cash.
The trove released Tuesday, which The Washington Post could not independently verify and the CIA has declined to confirm, included 8,761 documents that were the first batch of a series of releases that WikiLeaks plans, it said.
This first group, at least, shows important differences from the 2013 revelations by the National Security Agency’s former contractor Edward Snowden. His trove of documents largely described mass surveillance of Internet-based communications systems, while the WikiLeaks release more often describes attacks on individual devices.
By targeting devices, the CIA reportedly gains access to even well-encrypted communications, on such popular apps as Signal and WhatsApp, without having to crack the encryption itself. The WikiLeaks reports acknowledged that difference by saying the CIA had found ways to “bypass,” as opposed to defeat, encryption technologies.
“The idea that the CIA and NSA can hack into devices is kind of old news,” said Johns Hopkins cryptography expert Matthew D. Green. “Anyone who thought they couldn’t was living in a fantasy world.”
Snowden’s revelations and the backlash made strong encryption a major, well-funded cause for both privacy advocates and, perhaps more importantly, technology companies that had the engineering expertise and budgets to protect data as it flowed across the world.
Google, Microsoft, Facebook, Yahoo and many other companies announced major new initiatives, in part to protect their brands against accusations by some users that they had made it too easy for the NSA to collect information from their systems. Many websites, meanwhile, began encrypting their data flows to users to prevent snooping. Encryption tools such as Tor were strengthened.
Encrypting apps for private messaging, such as Signal, Telegram and WhatsApp exploded in popularity, especially among users around the world who were fearful of government intrusion. In the days following the U.S. presidential election, Signal was among the most downloaded in Apple’s app store, and downloads grew by more than 300 percent.
Open Whispers Systems, which developed Signal, released a statement Tuesday, saying, “The CIA/WikiLeaks story today is about getting malware onto phones, none of the exploits are in Signal or break Signal Protocol encryption.”

66 Ways to Protect Your Privacy Right Now

6 New Spy Technologies You Literally Can't Hide From

Top 17 Security predictions for 2017'

6 network and security trends you can expect in 2017

Top 3 emerging innovations to look for in 2017'

Donald Trump Wants “American Energy Dominance.” What Is That?



This story was originally published on the Conversation and has been republished here with permission.

In recent weeks, a new energy buzzword has taken flight from Washington, making stops in Alaska, North Dakota, Texas, Utah, and more: American energy dominance. Taking a cue from a 2016 speech by then-candidate Donald Trump, top federal officials including Energy Secretary Rick Perry and Interior Secretary Ryan Zinke have begun to trumpet the notion of energy “dominance.”
Although no Cabinet official has offered a precise definition, it’s a recurring theme in a set of administration events organized around energy policy, including a planned speech by Trump emphasizing exports of coal, natural gas, and oil.

For decades, U.S. politicians have trumpeted the notion of energy “independence,” focused primarily on the need to eliminate oil imports from OPEC nations and other countries that may not share U.S. interests. But as other energy policy experts have observed, “independence” was never a smart energy goal. Isolating the U.S. from global energy markets is neither in the interest of domestic consumers nor newly resurgent oil and gas producers in the U.S.
For consumers, access to international markets ensures energy supplies at more stable prices. For instance, consider what would happen if a hurricane shut down production and refining along the Gulf Coast, the hub of the U.S. oil and gas industry. Without access to global markets, prices for motor fuels, home heating fuels, and other products would be far more volatile.
As for producers, they have argued strongly for opening up, rather than sealing off, access to international energy markets. They’ve lobbied to lift restrictions on crude oil exports and encouraged exports of natural gas via new pipelines and liquefied natural gas, or LNG, terminals.
Spurred by increased oil and gas production as a result of the shale revolution, these policy changes have resulted in dramatic growth in U.S. energy exports. In fact, net energy exports (energy exports minus energy imports) have risen to their highest level in decades.* The United States could even be a net energy exporter by 2020 under one optimistic scenario.

This is a historic change, and administration officials are right to point out that the boom in energy production has benefited local economiesboosted tax revenues, and increased U.S. leverage in diplomatic matters with countries like Russia and Iran. It has also raised important environmental and social concerns in impacted communities, such as soil and water contamination from oil and gas wastewater spills, increased traffic accidents, and more.
But does a strengthened oil and gas industry put the United States on track to energy dominance? In a word, no.

Thursday, July 13, 2017

"Religion"? I'm so much more than an engineer

*I'm not going to share the author or a link. I have supplied plenty of fish yet with the touchy subject of religion, I'll only supply you the bait and the hooks.


To realise fully how much of our present daily life consists in symbols is to find the answer to the old, old question, What is Truth? and in the degree in which we begin to recognise this we begin to approach Truth. The realisation of Truth consists in the ability to translate symbols, whether natural or conventional, into their equivalents; and the root of all the errors of mankind consists in the inability to do this, and in maintaining that the symbol has nothing behind it. The great duty incumbent on all who have attained to this knowledge is to impress upon their fellow men that there is an inner side to things, and that until this inner side is known, the things themselves are not known.


There is an inner and an outer side to everything; and the quality of the superficial mind which causes it to fail in the attainment of Truth is its willingness to rest content with the outside only. So long as this is the case it is impossible for a man to grasp the import of his own relation to the universal, and it is this relation which constitutes all that is signified by the word "Truth." So long as a man fixes his attention only on the superficial it is impossible for him to make any progress in knowledge. He is denying that principle of "Growth" which is the root of all life, whether spiritual intellectual, or material, for he does not stop to reflect that all which he sees as the outer side of things can result only from some germinal principle hidden deep in the centre of their being.


Expansion from the centre by growth according to a necessary order of sequence, this is the Law of Life of which the whole universe is the outcome, alike in the one great solidarity of cosmic being, as in the separate individualities of its minutest organisms. This great principle is the key to the whole riddle of Life, upon whatever plane we contemplate it; and without this key the door from the outer to the inner side of things can never be opened. It is therefore the duty of all to whom this door has, at least in some measure, been opened, to endeavour to acquaint others with the fact that there is an inner side to things, and that life becomes truer and fuller in proportion as we penetrate to it and make our estimates of all things according to what becomes visible from this interior point of view.

*That's just the first three paragraphs of one book of a series of works. Don't get a Snickers, invest in the company.

Try Googling, "Why do we need poppy plants to produce synthetic heroin"? Good luck

*The best I could do without a hack.

PAINKILLERS: A SHORT HISTORY


Opiates, originally derived from the opium poppy, have been used for thousands of years for both recreational and medicinal purposes. The most active substance in opium is morphine—named after Morpheus, the Greek god of dreams. Morphine is a very powerful painkiller, but it is also very addictive.

In the sixteenth century, laudanum, opium prepared in an alcoholic solution, was used as a painkiller.

 Photo credit: AP Wideworld

Photo credit: AP Wideworld
Morphine was first extracted from opium in a pure form in the early nineteenth century. It was used widely as a painkiller during the American Civil War, and many soldiers became addicted.

Codeine, a less powerful drug that is found in opium but can be synthesized (man-made), was first isolated in 1830 in France by Jean-Pierre Robiquet, to replace raw opium for medical purposes. It is used mainly as a cough remedy.

Morphine, the most active substance in opium, is a very powerful painkiller that hooked many US Civil War soldiers. Photo credit: AP Wideworld
Morphine, the most active substance in opium, is a very powerful painkiller that hooked many US Civil War soldiers.
Photo credit: AP Wideworld

Throughout the early nineteenth century, the recreational use of opium grew and by 1830, the British dependence on the drug reached an all-time high. The British sent warships to the coast of China in 1839 in response to China’s attempt to suppress the opium traffic, beginning the “First Opium War.”

In 1874, chemists trying to find a less addictive form of morphine made heroin. But heroin had twice the potency of morphine, and heroin addiction soon became a serious problem.

A bottle of codeine tablets—all opiates temporarily relieve pain but are highly addictive.
A bottle of codeine tablets—all opiates temporarily relieve pain but are highly addictive.
The US Congress banned opium in 1905 and the next year passed the Pure Food and Drug Act requiring contents labeling on all medicines.

Methadone was first synthesized in 1937 by German scientists Max Bockmühl and Gustav Ehrhart at the IG Farben company. They were searching for a painkiller that would be easier to use during surgery, with less addiction potential than morphine or heroin.

Yet methadone is believed by many to be even more addictive than heroin.

Meanwhile, the illegal opium trade boomed. By 1995, Southeast Asia was producing 2,500 tons annually.

New painkillers came on the market with approval from the Food and Drug Administration: Vicodin in 1984, OxyContin in 1995 and Percocet in 1999.

These are all synthetic (man-made) opiates which mimic (imitate) the body’s own painkillers.



INTERNATIONAL STATISTICS

Among those using illicit drugs for the first time in 2007, the most popular substances were marijuana and prescription painkillers—each used by roughly the same number of Americans aged 12 and older. Non-medical use of painkillers rose 12%.

One in ten high school seniors in the US admits to abusing prescription painkillers.

Misuse of painkillers represents three-fourths of the overall problem of prescription drug abuse. The painkiller hydrocodone is the most commonly diverted and abused controlled pharmaceutical in the US.

Methadone, once used in addiction treatment centers and now used by doctors as a painkiller, was found as the cause of 785 deaths in one state alone, Florida, in 2007.

Prescription drug abuse is also climbing in older Americans, particularly involving anti-anxiety drugs such as Xanax and painkillers such as OxyContin.

In the UK, tens of thousands of people are said to be dependent on painkillers such as Solpadeine and Neurofen Plus.

Doctors and rehabilitation therapists report that prescription painkiller abuse is one of the most difficult addictions to treat.

How to Reset Your Entire Network in Windows 10 and Start From Scratch



If you’re suffering network problems in Windows 10 that you just can’t seem to fix, the Windows 10 Anniversary Update now includes a feature that lets you reset your network back to how it was when you first installed Windows.

Resetting your network really should be used as a last resort in your troubleshooting process. Before trying it, you should try some basic fixes first. Running the built-in network troubleshooter can often solve your problems, or at least point you toward steps you can take that might help. Windows also includes some good command line utilities that can help you figure out where your problem lies. But if all else fails, or you’d just like to take your network back to the beginning, resetting your network might help.

When you reset your network, Windows will forget your Ethernet network, along with all your Wi-Fi networks and passwords. It will also forget additional connections, such as VPN connections or virtual switches, that you’ve created. Resetting will disable and then reinstall all your network adapters and set other networking components back to their original settings. You’ll even have to run through the questions you saw when you first installed Windows where you select whether you want your PC to be discoverable on the network.
Once you’ve exhausted your other troubleshooting efforts, resetting the network is easy. Open Windows Settings by pressing Start and clicking the Settings button (or just by pressing Windows+I on your keyboard). On the Windows Settings screen, click “Network & Internet.”

On the “Network & Internet” page, select the “Status” tab on the left and then, on the right, scroll down and click the “Network reset” link.

The “Network reset” screen warns you about what will happen when your network is reset and also lets you know that a restart will be necessary. Click the “Reset now” button to reset the network and restart your PC.

When asked to confirm the network reset, click the “Yes” button.

And that’s all there is to it. After restarting your PC, Windows will walk you through setting up your network. Again, resetting your network should really be a last resort kind of thing. But if all your other troubleshooting efforts have failed, a full reset might be just the answer.
If you screw it up, give us a call.


How to Choose the Fastest, Cheapest, and Most Reliable Mobile Hotspot


Mobile hotspots are awesome. They pack fast internet access into tiny, pocketable devices so you can stay connected wherever you go, but they vary in cost, speed, and reliability. With so many options in devices and carriers, you might end up paying for more than you need or getting too little and ending up with overages. What's the best way for you to get a affordable and reliable mobile hotspot? We decided to find out.

With the proliferation of 4G mobile technologies and the reduced cost of 3G data, mobile hotspots are no longer luxuries for business people and the wealthy. Anyone can pick up a portable device for under $100 and get service at a low cost, or even for free. You can even turn your smartphone into a Wi-Fi hotspot, negating the need for a separate device. It's a really great time to take advantage of mobile data, but there are so many options to make sense of and chances are you're not even aware of a few of them. In this post we're going to take a look at the best options for getting a mobile hotspot based on your needs.

For Casual Use or Backup Internet Access

Mobile hotspots have low data caps, so even if their speeds can match your hardwired connection, you won't be able to download hundreds of gigabytes without incurring serious overages. For people who live to download, a mobile hotspot won't be more than a supplemental device or something for casual use with, say, a tablet or laptop when away from home. Chances are you don't want to pay much (or anything) for a device you're only going to use a few times a month or in the event of an emergency. In the past you'd be out of luck, but now you have mobile broadband options that'll hardly cost you anything at all.

Freedompop

Freedompop offers 512MB of mobile broadband per month for absolutely nothing. You'll have to put down a refundable deposit of about $100 for a device, but if you send it back before the year is up in the condition you received it you'll get that money back (though you'll have to pay shipping). Freedompop also allows you to earn additional data by completing offers like signing up for car insurance information or answering a survey. You can also earn 500MB of data through referrals. If you'd rather pay, plans start at $10 per month for 1GB and work their way up to $60 per month for 10GB. Casual users will likely prefer the $18 per month plan, which will get you 2GB of data (plus any extra you earn).


Freedom Spot Photon 4G Mobile Hotspot (Black)
From Amazon
656 purchased by readersGizmodo Media Group may get a commission
Buy now
Freedompop offers a delightfully tiny little hotspot as its flagship device, but you can also get little USB modems for your laptop and a data sleeve for your iPod touch (to effectively turn your iPod touch into an iPhone). Data is provided over Sprint's aging WiMax network, which offers speeds around 5-7mbps with coverage quality that highly depends on your area. (You can check coverage here.) Because the device only uses WiMax and can't fall back on 3G data, it may be completely useless to those in poor reception areas. If you get good coverage, however, it's a wonderfully free/cheap way to get online in a pinch.

Karma


Karma offers a very similar product to Freedompop. The hotspot hardware is essentially identical, but white in color, and data is provided via Sprint's WiMax network as well. The cost difference? Karma charges $79 for their hotspot and $14 for a 1GB of data. This may seem like a considerably worse deal, but it's not because of one interesting aspect: your data never expires. You don't pay $14 per month, but rather $14 for every gigabyte of data you use whenever you happen to use it. If you're not planning to use the service frequently, this is a great deal. Additionally, you can earn 100MB of free data by simply sharing your connection with others.

 
Karma suffers from the same network issues as Freedompop, as Sprint's WiMax coverage is inconsistent across the United States. Before you buy, make sure you're covered so you don't end up with a $79 pocketable brick.

Your Smartphone


If you already have a smartphone, you already have a (potentially free) mobile hotspot at your disposal. Modern Android and iPhones come with a built-in option to turn your cellular data connection into Wi-Fi for up to five other devices. On many plans this can cost up to $25 extra per month. While this nets you a fair amount of extra data, it's a hefty price to pay for using the limited data you've already purchased. Fortunately, you have a few workarounds.

PdaNet for Android and iPhone allows you to tether for the one-time cost of the app ($0-29), rather than a monthly fee. iPhone users will need to jailbreak, but Android owners just need to install the app. Some carriers pay attention to unauthorized tethering and may warn you to stop, but we've only seen this happen to people who still have unlimited data grandfathered into their plans. PdaNet can attempt to hide your tethering activity by serving up mobile sites instead of desktop ones, but that isn't necessarily ideal if you're tethering your phone to your laptop.

If you don't want to risk incurring the wrath of your carrier, some carriers actually offer free hotspot access if you have a shared data plan. To sign up for a shared data plan, you need more than one device (or it won't be cost-effective). If you don't share a plan with your family or significant other, find some friends and sign up with them. The more devices on your account, the cheaper each month will be for everyone. You'll have to do a little extra work to collect payments each month, but webapps like WePay help solve that problem.

Of course, with a shared data plan you'll need to actually share data. Most plans cap out at 20GB total, so you'll need to make sure that's going to be enough for all involved. If it is, check out what your carrier has to offer. AT&T provides a wonderful mobile share data plan calculator. Verizon has a similar offering. Multi-person plans at Sprint and T-Mobile offer unlimited data already, so sharing it is kind of irrelevant. Either way, you have options if you use a major carrier. Third-party carriers like Virgin Mobile, who resell Sprint's network, generally charge extra for a hotspot ($15/month in the case of Virgin), but not always. Ting, for example, offers free hotspot access on all supported phones regardless of your plan.

What it comes down to is this: if you're a casual user or just need mobile data for emergencies, you'll want to utilize a carrier that offers hotspots for free or via mobile share. If you're not, consider a tethering app instead.

For Moderate or Frequent Internet Access

When casual data usage won't cut it and you need as many gigabytes as you can get (or, at least, a lot of them), smaller carriers often won't do the trick. This makes picking the right one pretty difficult because you have many options and even more variables. When you're planning to use a lot of cellular data you want to know where you can get the most comprehensive coverage, the fastest speeds, and the most data for the cheapest price. (Fortunately, you don't have to figure out the best hardware because each carrier will stick you with their flagship mobile hotspot and call it a day). To figure out your best option, we're going to answer those questions.

I didn't have time to this article justice.

I need to catch a short flight, follow me on Twitter

Making money legally, fast & easy revisited

*Purchase at least one laptop.
- Think of a service, product or talent that you can provide.
- Google free website builder.
- Build it.
- Google CPA in your zip code / call and tell him / her you're going to need to file for an "S-corp".
- Create an email account with Google and use their free blogging system.
- Build a blog of your lifestyle or for what you enjoy doing.
- Your reader base will come.
- Back link your blog to your website.
- Use free SEO tools and free baclinkers to advertise both blog and site.
- Don't spend a dime with your CPA until you get a payment over $9999.
- Base your business in bartering and chose trade over currency.
- Did I miss something?


 I travel all over the world and trade my skill set for accommodations, food, smokes, access to weight lifting rooms, high end transportation, free entry to all sorts of venues, items, I even trade for making someone peach cobbler or apple pies.

 How hard can your life be?

 Here's a hint: Your World Bank, Central Bank, the IMF etc. has not figured out a way to tax this "yet".

*If you can't master any of these tasks, pay someone (No more than $500) to do it for you.
This is not a promotion for me, this is a way out for you. Get any kid to help you but do it.

Update:

Great question.


Puerto Rico, Florida, Nicaragua & Cambodia 
   321-258-8081 
+505-7718-8957
+855-9852-9432
   

Objective - I complete contracts selectively. Seeking more arduous tasks. 
 Experience 
I have successfully had a great deal of lateral training and experience within the electrical industry. 

2014 - Current 
Systems Nicaragua 
Complete ownership and responsibility to assume high, medium and low voltage contracts. Asses conflicts and convey the results directly to the owner. Fix, repair and or replace standing equipment. All installs are designed with 80% future expansion in mind. Build redundancy within systems vis NEC / TIA codes & better means and practices. Create as built prints. Build websites setting new email accounts with associated blog. All endeavors are turn key. 

Sep 2013 - 2014 
General Contractor 
Complete restoration of a 1941 48' Chris Craft Flush Deck - electrical, fiberglass, hull, decks, navigation & electronics, diesel engine rebuild, install solar power, revamp bilge system, fabricate mechanical parts, create as built prints via Visio,etc. 

 Jan 2014 - Sep 14' Dental Gallery Prosthetics Lab Titusville . FL 
Dental Lab Equipment Technician 
Assess and repair dental lab equipment - Alvacor, compressors, wring harnesses, low voltage applications, vehicles (replace front end on one), repair master dental tech's boat, create advertising tools, too much to list. 

 06’ - 07’ IBM via Grubb & Ellis Gaithersburg,  MD 
Stationary Electrical Engineer Class III 
Monitor and maintain - High voltage room from 69K KV field - Sub station - Paralleling switch gear - UPS & battery rooms - PDU’s / CACU’s - CDU’s - Liebert cooling system (CRAC’s) -DDC system (monitor only) - Generators - create liquid tight circuits within the NOC using pin sleeve devices / HVAC monitor & maintain - Chillers - Condensers - Cooling towers (belt driven) - Pumps - Control wire / line power - Air Handlers -ADR / ADS - VAV’s / FPVAV’s - Boilers and all associated devices. Working knowledge of PLC and its software environment & interfaces. 

Dec 03 - 06' & Current NTECH Solutions Various 
Project Manager 
Complete ownership & responsibility to drive projects to conclusion - Translate project requirements into project objectives - Manage task assignments to project resources - Develop detailed project schedules, resource plans & status reports - Conduct project meetings, safety meetings, and mange client and GC expectations - Manage all interactions among end users, vendors and, services - Review project deliverables & set appointments with local inspectors by section or time line - Ensure satisfactory transfer of product upon completion - create documentation to be shared as learning tools for the next project. 

July03’ - Feb04' CDI Braggs Electrical Little Rock,  AR 
Electrician/Telecommunication Installer 
Build switchgear QA-QC all circuits and pilec connections - set and monitor ATS for a smooth transition at all times report directly to GC of all changes in electrical environment - Phone - Data - EMS - Fire Alarm - Controls - Sound Sys. - AV - CCTV - Satellite - RTAC,s - Dips -  Locknetics  -  Electrician/IT21 

Jun02’- Nov02’ PROSOFT Various 
Senior Telecom Tech 
Senior Telecom Tech -NMCI Installs-OSP/ISP Walk Troughs-Team Leader (Get it done correctly; on time; and under budget).  Lead man for all of Prosoft’s construction of PDS’s on all NMCI contracts (cable tray-conduit-fabrications penetrations-fire stop-tech support-cert-etc).  List of completed contracts upon request. Complete knowledge of PDS Quality Assurance Checklist as set forth by General Dynamics. 

May01’ - Nov02’ CBC Norfolk,  VA 
Fiber Optic Technician/electrician 
Conduit bending, emt- ridged, core drilling, wire devices-panels-breakers-ATS-Complete rough-ins etc. Certified ST/SC connector termination, fusion splicing. OTDR Testing. Fiber optic organizing trays. Certified by Lord & Bayer. Data punch down (Cat.5-Cat.5e-Cat.3) (RG6-8-11) Telephone Main Frame-skeleton & enclosed rack construction, IDC connection blocks. Wavetek Testing, Fire Alarm Install.  Strobe+ Pull boxes, 

May98’ - May01' Milcom Systems Corp VA Bch Va 
Mechanic 
Primary Company Category-Assembler 1, IT21 Division-Assemble MBTs, ABTs, Transformers, Power panels, MDVO boxes and RJ45 connectors, Fiber Optics, Multi-pin connectors, Marine and commercial power, Radar Domes, Dry Air management systems. Read blueprints, (structural-electrical-welding-Telecom backbone-run sheets-mapping) 

Education 
US  Coast Guard 84’ - 86’ - Snipe  
1981-Buffalo State College, Buffalo, NY 
Liberal Arts, 3.0-4.0 GPA 
1986-NTS Welding/ Electrical 
1990-Genesee Community College, Olean, NY 
Liberal Arts, 3.8-4.0 GPA 
86’ -91’  Master Electrician - William Anderson 
Apprenticeship -  Anderson  Marine -  Buffalo,  NY. 

Current 
FEMA Independent Study - Emergency Preparedness, NIMS 
Linux Ubuntu basics 

Featured Posts

Beautiful American Bully Pups for Sale

 

Popular Posts