
Electronic Engineer, Computer Programmer, Spy Hunter, Forensics, Cyber Security and Subject Matter Expert - Greater Boston Area
The industry leader in Bug Sweeps, Wiretap Detection, Detection of Covert Video Cameras, Detection of Covert Microphones, and related inspections, TSCM, TEMPEST, NONSTOP, Emissions Security (EMSEC), Signals Intelligence and related fields.
Over forty years of hands-on experience on a wide range of computer systems, involving multiple generations of technology including huge, highly secure, and highly classified mainframe systems, to modern desktop, laptop, and handheld computers.
Well experienced in the design and development, prototyping, and production of specialized electronic devices and instrumentation.
Expert technical, analytical and research for the detection, nullification, and isolation of eavesdropping devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. Research and development of technical systems, devices, and tradecraft utilized by the U.S. counter-intelligence community.
Development of software device drivers and related software to operate and integrate high-performance test equipment used for signals analysis, SIGINT, TEMPEST, NONSTOP, HIJACK, and TSCM.
Intelligence Analysis and activities to determine the existence and capability of surveillance equipment being used against the governments, corporations, establishments, or persons.
Forensic services and skills to include computer forensics, network forensics, hard drive forensics, WiFi forensics, WAN forensics, cell phone forensics.
Hard-core, long-term Apple Macintosh Developer in hardware and software. Skilled in the leading edge of Mac networking and communications, to include iPads, iPhones, iPhones, and other Apple-related devices and technology. Author of high-security cryptographic software which covertly runs on Apple made devices which exceed the standards used to encrypt Top Secret information.
Considered to be the Leonardo da Vinci of Bug Sweeps.
Specialties: Technical Counterintelligence Operations
(200 symbols max)
(256 symbols max)