Sign Up Free Consultation
  • 62 Central, West Boylston
    MA. - 01583 USA
  • Call Us Today
    1-508-835-1123
  • Working Hours
    Mon - Fri 08:00AM to 5:00PM

Insurgents Hack into Video Feeds…Who’s Hacking Into Your Feeds?

The Wall Street Journal reported last week that insurgents in Afghanistan and  Iraq are using off the shelf commercial software programs such as “SkyGrabber” (which is a satellite internet software down-loader program that can capture free to air (FTA) transmissions of video, music, and pictures.) This product is available only on the internet for the ridiculously low price of $29.95. Utilizing SkyGrabber, the insurgents are able to tap into the live video feeds of the U.S. Predator drones and get the exact same video intelligence that our military is getting!

The intelligence community has compared this problem to street criminals and cat burglars listening to police scanners, in the alleys, back in the day. The Pentagon has known about this flaw since Bosnia in the 1990s.

U.S. Predators…
The Predators can fly, unmanned, for hours by remote control…while the pilots – who are sitting in comfortable chairs and sipping a coffee or Dr. Pepper on some remote U.S. military base thousands of miles away – canSecurity Marketing Guru - Predator Drone capture video and watch “hot-spots” in troubled areas around the world, unnoticed.  The Predators can fly armed or unarmed and is increasingly becoming the weapon of choice in hunting down al-Qaida and other militants in Afghanistan, Pakistan, Somalia and other areas around the world.

Intercepting Predator Video…
The Predators systems weren’t “hacked” — the insurgents can’t control the planes because they are encrypted, but because the video downlink is unencrypted, the insurgents can tap into it and watch the same video feeds as the coalition forces down on the ground.  The primary fear of this is that militants watching the video, notice that their compound is under surveillance and can flee the scene before a “HELL FIRE” missile sends them to Allah and their 72 virgins.  Or another case scenario is that the insurgents watching the video will notice a team of Special Forces walking through a recognizable area and attack them.

The KeyCode…
The command and control channels of the Predator have always been encrypted — because that’s more important and easier to manage the keycodes at the base level. The video feeds are a little different.  The video needs to be available to multiple military units, multiple nationalities and various levels of security clearance.  So keycoding would be much more difficult to implement.

Internal & External Security Marketing…
If we look at our security marketing efforts as it pertains to being encrypted vs. unencrypted, I would like you to look, first off, at your external security marketing efforts (i.e. billboards, Yellow Pages ad’s, website, vans) as unencrypted marketing messages – meaning that they are messages that are wide open for your competition to see, and copy-cat, and hack into at will.

Your internal security marketing efforts are the “top-secret” communications you have with your  house list of current clients, past clients and potential clients (which are encrypted.) Examples of these efforts are: your client newsletter, your direct mail pieces, referral programs, client appreciation events, niched industry lead-generation reports (such as, retail theft report, high end residential security report), client gifting system, client birthday cards, etc…

You obviously need a good mix of encrypted and unencrypted marketing strategies to withstand any threats to your electronic security business.

You really have no control over the unencrypted security marketing messages that you put out…your competition can “hack into” your messages and steal any ideas.  But your encrypted marketing message are yours…and should be good.  They will distinguish you from the rest and make you lots of hay, if done right!

Happy New Year!!!
I wish you and your families the very best in 2010, and let’s make it a productive and profitable year!

P.S. This will be your last chance this month to get your hands on another power packed issue of the Smokin’ Security Newsletter!

In the  December issue of the Smokin’ Security Newsletter here’s what you’ll find:

  • Discover how to create your own security video library that can attract up to 80,000 visitors per day.
  • How to produce a stream of content (blog, podcast, videos) to educate your target audience and prospects will flock to you.
  • Marvelous new insight on using your “personality” and creating a “brand” from it.
  • The real reason why you have a blog for your security business.
  • Learn how to turn your business card into a powerful selling tool.
  • Why guaranteeing your security installs will attract more A-level clients.
  • How to use testimonials on a business card.
  • Uncover a secret on how to use your business card as frequent buyer program.
  • Dumb mistakes your competition is doing right now that you can use it to an unfair advantage against them.
  • The two (2) skill sets that you need to master in 2010 to be a Smokin’ success.

Plus I have two (2) very timely Special Reports only for Smokin’ Newsletter subscribers.

Special Report #1

  • “7 Simple & Easy Steps to Doubling Your Security Installations, and Getting Paid Lickety Split in 2010.
  • Best way to delay paying your vendors.
  • Best way to reduce day to day expenses.
  • Power of collecting your money like Tony Soprano.

Special Report # 2

  • “Five (5) Security Marketing Skills To Master in 2010 and Beyond”
  • Very first thing you should do when you get to your hotel room when your on vacation
  • How to get out of the apples to apples comparison.
  • How to play prospect on your competition.
  • How to overcome skepticism.

…..I’m still not done with you. There are more Christmas gifts coming from me because we way OVER deliver.

Decembers Audio Success CD
A World Famous copy writer joins me on the call, he routinely charges upwards of $60,000 to create custom marketing plans and consult with clients. Here are some of the talking a points from the call…

  • Why should communicating more with your client base
  • A brain dead strategy for creating a referral system with everybody in town.
  • Should you or shouldn’t you, use fear in your marketing. (You have GOT to hear what he says about this one!)

What your competition wouldn’t even think about doing or guaranteeing.

Go to the Smokin’ Security Newsletter page now!

P.P.S There are only two days left until the New Year!

Post a comment