enVisible | Journalism Edition | Vol. 1, Iss. 2

Page 1

Journalism TM P I H S R O S N E E C L IB UR !

iPad

iPod Touch

iMac

Mac Mini

ENVIS

MacBook Pro

MacBook Air

Windows 7

YO

L O O T N O I T N CIRCUMVE

investigative reporting

iPhone

PRESENTS

!

!

“With digital information so vulnerable to theft, it’s imperative for journalists to be proactive in protecting confidential sources and data. But too few people are taking the threat seriously”. - American Journalism Review, Aug/Sep, 2012

R PROTECTING YOUS FROM ERTIE IB L IL IV C L A IT IG D EXPLOITATION

X

X

Spies

Criminals

X

X

Terrorists

Rogue Govern ment

ILLS K Y C N E C A L P M O C ICTIM V A E M O C E B ’T N DO

N O I T I D E M S I L A N R U JO N Vol. 1, Issue

iPhone

o. 2

Windows 7

E R A W T F TM CLANDESTINE SO BLE ISIBLETM/

iPad

iPod Touch

iMac

Mac Mini

MacBook Pro

MacBook Air

ENVISI

V

OM/EN .C N W O D T C O .L W • WW Y L L A B O L G E L B A AVAIL • D A O L N W O D D E AN ENCRYPT 2012 Copyright LoctDown Inc. All Rights Reserved.


enVisibleTM by Loct Down Inc

!

47 JOURNALISTS KILLED IN 2011 / MOTIVE CONFIRMED Source: Committee to Protect Journalists http://www.cpj.org/killed/2011/

“Digital stalkers can intercept electronic tools journalists routinely use -- mobile phone conversations, e-mails, text messages, and satellite communications are prime targets. They can track information and pinpoint locations. The Committee to Protect Journalists sees the threat increasing ‘at an alarming rate’”. - American Journalism Review, Aug/Sep, 2012

enVisibleTM by THE NEED FOR WHICH HAS RARELY BEEN CLEARER!

WORLDVIEW: HERE’S WHO’S KEEPING FREE SPEECH ON “ICE” . . .

MACHIAVELLIAN MEGA-CORPORATIONS

POLITICAL & “GANGSTER” OVERLORDS OF THE PRESS NARCO-TERRORISTS

CORRUPTION

ENCRYPT YOUR IP TRAFFIC • CONCEAL YOUR INTERNET ACTIVITIES • REMAIN ANONYMOUS • PREVENT CYBER ATTACKS enVisibleTM [en-viz-uh-buhl]: 1. a downloadable software by Loct Down Inc; a state-of-the-art technology that provides the end user with anonymity, protection, and privacy while utilizing the Internet. 2. the state of being truly invisible while on the internet; whereas, nothing that you do is capable of being logged, recorded, shared, intercepted, or readily identifiable as yours. In affect, you’re simply NOT there! iPhone

iPad

iPod Touch

iMac

Mac Mini

MacBook Pro

MacBook Air

Windows 7

AVOID CYBER TRACKING • ANONYMIZE YOUR LOCATION • NO DIGITAL FORENSICS • NO TRACEBACK & ULTIMATELY . . .

. . . THE UNCENSORED STORY THAT COUNTS . . . YOUR STORY.

Dissident

enVisibleTM by Loct Down Inc

2012 Copyright LoctDown Inc. All Rights Reserved.

Political Activists

Human Rights Activists

Journalist


enVisibleTM by Loct Down Inc

LoctCase No. 1

THE REALITY OF THE INTERNET

Do you get the picture? “OVERLORDS OF THE PRESS” INTERNET TRAFFIC INTERCEPTION SYSTEMS RESTAURANT WIFI HOTEL WIFI

INTERNET SERVICE PROVIDER

MOBILE OPERATOR

THE WIFI FROM YOUR

THE SUPPOSEDLY

BGAN 700 SATELLITE

SECURE WIFI

TERMINAL

EMPLOYER’S WIFI FAVORITE CAFE WIFI

FRIEND’S HOUSE WIFI

“BAD ACTORS” . . . AKA CRIMINALS . . . INTERCEPTION/MONITORING GEAR

They are collecting your information and watching you The Internet Experience with enVisibleTM

LoctMethod

|

On Demand, Anytime, Anywhere!

For changing IP address, encrypting all IP (Internet) traffic & remaining anonymous

Your new IP address and enVisibleTM profile indicate that your internet activities are secure and originate/ terminate in the Netherlands, vice your actual physical location in Tunisia!

iPad or iPod Touch Interface on iPhone

IP Information: 41.224.0.0 (Tunis, Tunisia)

On assignment in Tunis, Tunisia, you make a conscious decision to establish an aggressive cyber security posture. In doing so, you utilize enVisibleTM to virtually transport yourself from Tunis, to a more secure location within your enVisibleTM profile.

IP Information: 94.209.246.152 (Amsterdam, Netherlands)

While utilizing enVisibleTM, your Internet activities are now anonymous, untraceable, and encrypted!

enVisibleTM by Loct Down Inc

2012 Copyright LoctDown Inc. All Rights Reserved.


enVisibleTM by Loct Down Inc

LoctCase No. 2

THE TYPICAL “WIFI” SCENARIO

You’re Getting Robbed! Your mobile device or computer uses WiFi to access the Internet

The wifi router is accessible by Staff and/or “Bad Actors”

The Wifi Experience with enVisibleTM

LoctMethod

Bad Actors can use a USB drive or hack into network to collect your sensitive information

|

Staff or “Bad Actor” sells your sensitive information

“Tunneling Through” the WiFi Router

For mitigating the perils of WiFi Networks & Maintaining Anonymity

Your Situation

Protective action/countermeasure Airplane Mode: “on” | bluetooth: “off” | cellular data: “off”

You’re on assignment in an international location. You have been advised to take precautionary measures as it pertains to your physical security and internet communications. The assumption is that all forms of internet communication are monitored. Upon connecting to any WiFi on your iPad, select your enVisibleTM location and turn “on” the VPN. Once connected, you can start utilizing the Internet and all IP based applications.

upon connecting to envisibleTM, here’s what happens behind the scenes . . . IP address changed from: 200.107.192.0 (International Location)

Nothing registers in the router, not even the envisible IP address . . .

To your envisible location:

-----> encrypted tunnel ----->

220.255.1.217 (Singapore)

<----- encrypted tunnel <-----

Your IP address has been changed (not masked) from your physical location to your new location in Singapore

enVisibleTM by Loct Down Inc

All of your IP (internet) traffic is encrypted and “tunnels through” the WiFi router. Your internet activity and geographic location cannot be seen. 2012 Copyright LoctDown Inc. All Rights Reserved.

All of your IP (internet) traffic originates and terminates in singapore.


enVisibleTM by Loct Down Inc

AN ENVISIBLETM ALTERNATIVE TO THE “CELL PHONE” CALL

M AN O B YO D I L UR MA E C I N I N T AR R FO A IE RM I N R AT ALL S LO IO O G N! F

? IP ADDRESS

HIC RAP G O GE N ATIO LOC

CALL LOGS

WEB BROWSING

enVisibleTM Your Hedge Against The Mobile Carrier

TEXTS

Escaping the Mobile Carrier & Cell Tower Triangulation, While Remaining Anonymous on the Internet

LoctMethod

For avoiding detection and subsequent monitoring by the mobile carrier

LoctCase No. 3

step 1

step 2

step 3

step 4

step 5

TM enVisible Obtain an

Turn “off”

Download,

Utilize any

Turn “on”

iPod touch

location

install &

voip app on

Airplane mode

or wifi only

services before

Activate

iPod touch/

and then Initiate

ipad

connecting to

enVisibleTM on

wifi only

VOIP calls, surf

wifi.

iPod touch/

ipad

internet, check

wifi only ipad

(NOT an iPhone)

or

Obtain anonymous

web based email, social media, etc. . . .

voip account

from enVisibleTM

from

location of your

loctdown (Fees Apply)

choice.

enVisibleTM | LoctFact: The Internet is like a “Big City”. The WiFi Router is like a “Dark Alley” leading to the Internet. Most people avoid the proverbial “Dark Alley”. People get ROBBED, RAPED, & KILLED in “Dark Alleys”. enVisibleTM, places you on a secure subway, bypasses the “dark alleys”, and transports you to/from your location!

enVisibleTM by Loct Down Inc

2012 Copyright LoctDown Inc. All Rights Reserved.


enVisibleTM by Loct Down Inc

TM enVisible

BUY NOW!

PURCHASE OPTIONS

MacBook Air

FAQ

LoctDown

Desktop

Laptop

$495 Per Year Per Device

Windows 7

MacBook Pro

$495 Per Year Per Device

iMac/Mac Mini

iPod Touch

iPhone

iPad

$295 Per Year Per Device

Contact

Find answers to your questions.

For complex cyber security issues that require analysis.

For general questions about enVisibleTM

View FAQs

Expert Consultation

Contact Us

2012 Copyright LoctDown Inc. All Rights Reserved.


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.