Journalism TM P I H S R O S N E E C L IB UR !
iPad
iPod Touch
iMac
Mac Mini
ENVIS
MacBook Pro
MacBook Air
Windows 7
YO
L O O T N O I T N CIRCUMVE
investigative reporting
iPhone
PRESENTS
!
!
“With digital information so vulnerable to theft, it’s imperative for journalists to be proactive in protecting confidential sources and data. But too few people are taking the threat seriously”. - American Journalism Review, Aug/Sep, 2012
R PROTECTING YOUS FROM ERTIE IB L IL IV C L A IT IG D EXPLOITATION
X
X
Spies
Criminals
X
X
Terrorists
Rogue Govern ment
ILLS K Y C N E C A L P M O C ICTIM V A E M O C E B ’T N DO
N O I T I D E M S I L A N R U JO N Vol. 1, Issue
iPhone
o. 2
Windows 7
E R A W T F TM CLANDESTINE SO BLE ISIBLETM/
iPad
iPod Touch
iMac
Mac Mini
MacBook Pro
MacBook Air
ENVISI
V
OM/EN .C N W O D T C O .L W • WW Y L L A B O L G E L B A AVAIL • D A O L N W O D D E AN ENCRYPT 2012 Copyright LoctDown Inc. All Rights Reserved.
enVisibleTM by Loct Down Inc
!
47 JOURNALISTS KILLED IN 2011 / MOTIVE CONFIRMED Source: Committee to Protect Journalists http://www.cpj.org/killed/2011/
“Digital stalkers can intercept electronic tools journalists routinely use -- mobile phone conversations, e-mails, text messages, and satellite communications are prime targets. They can track information and pinpoint locations. The Committee to Protect Journalists sees the threat increasing ‘at an alarming rate’”. - American Journalism Review, Aug/Sep, 2012
enVisibleTM by THE NEED FOR WHICH HAS RARELY BEEN CLEARER!
WORLDVIEW: HERE’S WHO’S KEEPING FREE SPEECH ON “ICE” . . .
MACHIAVELLIAN MEGA-CORPORATIONS
POLITICAL & “GANGSTER” OVERLORDS OF THE PRESS NARCO-TERRORISTS
CORRUPTION
ENCRYPT YOUR IP TRAFFIC • CONCEAL YOUR INTERNET ACTIVITIES • REMAIN ANONYMOUS • PREVENT CYBER ATTACKS enVisibleTM [en-viz-uh-buhl]: 1. a downloadable software by Loct Down Inc; a state-of-the-art technology that provides the end user with anonymity, protection, and privacy while utilizing the Internet. 2. the state of being truly invisible while on the internet; whereas, nothing that you do is capable of being logged, recorded, shared, intercepted, or readily identifiable as yours. In affect, you’re simply NOT there! iPhone
iPad
iPod Touch
iMac
Mac Mini
MacBook Pro
MacBook Air
Windows 7
AVOID CYBER TRACKING • ANONYMIZE YOUR LOCATION • NO DIGITAL FORENSICS • NO TRACEBACK & ULTIMATELY . . .
. . . THE UNCENSORED STORY THAT COUNTS . . . YOUR STORY.
Dissident
enVisibleTM by Loct Down Inc
2012 Copyright LoctDown Inc. All Rights Reserved.
Political Activists
Human Rights Activists
Journalist
enVisibleTM by Loct Down Inc
LoctCase No. 1
THE REALITY OF THE INTERNET
Do you get the picture? “OVERLORDS OF THE PRESS” INTERNET TRAFFIC INTERCEPTION SYSTEMS RESTAURANT WIFI HOTEL WIFI
INTERNET SERVICE PROVIDER
MOBILE OPERATOR
THE WIFI FROM YOUR
THE SUPPOSEDLY
BGAN 700 SATELLITE
SECURE WIFI
TERMINAL
EMPLOYER’S WIFI FAVORITE CAFE WIFI
FRIEND’S HOUSE WIFI
“BAD ACTORS” . . . AKA CRIMINALS . . . INTERCEPTION/MONITORING GEAR
They are collecting your information and watching you The Internet Experience with enVisibleTM
LoctMethod
|
On Demand, Anytime, Anywhere!
For changing IP address, encrypting all IP (Internet) traffic & remaining anonymous
Your new IP address and enVisibleTM profile indicate that your internet activities are secure and originate/ terminate in the Netherlands, vice your actual physical location in Tunisia!
iPad or iPod Touch Interface on iPhone
IP Information: 41.224.0.0 (Tunis, Tunisia)
On assignment in Tunis, Tunisia, you make a conscious decision to establish an aggressive cyber security posture. In doing so, you utilize enVisibleTM to virtually transport yourself from Tunis, to a more secure location within your enVisibleTM profile.
IP Information: 94.209.246.152 (Amsterdam, Netherlands)
While utilizing enVisibleTM, your Internet activities are now anonymous, untraceable, and encrypted!
enVisibleTM by Loct Down Inc
2012 Copyright LoctDown Inc. All Rights Reserved.
enVisibleTM by Loct Down Inc
LoctCase No. 2
THE TYPICAL “WIFI” SCENARIO
You’re Getting Robbed! Your mobile device or computer uses WiFi to access the Internet
The wifi router is accessible by Staff and/or “Bad Actors”
The Wifi Experience with enVisibleTM
LoctMethod
Bad Actors can use a USB drive or hack into network to collect your sensitive information
|
Staff or “Bad Actor” sells your sensitive information
“Tunneling Through” the WiFi Router
For mitigating the perils of WiFi Networks & Maintaining Anonymity
Your Situation
Protective action/countermeasure Airplane Mode: “on” | bluetooth: “off” | cellular data: “off”
You’re on assignment in an international location. You have been advised to take precautionary measures as it pertains to your physical security and internet communications. The assumption is that all forms of internet communication are monitored. Upon connecting to any WiFi on your iPad, select your enVisibleTM location and turn “on” the VPN. Once connected, you can start utilizing the Internet and all IP based applications.
upon connecting to envisibleTM, here’s what happens behind the scenes . . . IP address changed from: 200.107.192.0 (International Location)
Nothing registers in the router, not even the envisible IP address . . .
To your envisible location:
-----> encrypted tunnel ----->
220.255.1.217 (Singapore)
<----- encrypted tunnel <-----
Your IP address has been changed (not masked) from your physical location to your new location in Singapore
enVisibleTM by Loct Down Inc
All of your IP (internet) traffic is encrypted and “tunnels through” the WiFi router. Your internet activity and geographic location cannot be seen. 2012 Copyright LoctDown Inc. All Rights Reserved.
All of your IP (internet) traffic originates and terminates in singapore.
enVisibleTM by Loct Down Inc
AN ENVISIBLETM ALTERNATIVE TO THE “CELL PHONE” CALL
M AN O B YO D I L UR MA E C I N I N T AR R FO A IE RM I N R AT ALL S LO IO O G N! F
? IP ADDRESS
HIC RAP G O GE N ATIO LOC
CALL LOGS
WEB BROWSING
enVisibleTM Your Hedge Against The Mobile Carrier
TEXTS
Escaping the Mobile Carrier & Cell Tower Triangulation, While Remaining Anonymous on the Internet
LoctMethod
For avoiding detection and subsequent monitoring by the mobile carrier
LoctCase No. 3
step 1
step 2
step 3
step 4
step 5
TM enVisible Obtain an
Turn “off”
Download,
Utilize any
Turn “on”
iPod touch
location
install &
voip app on
Airplane mode
or wifi only
services before
Activate
iPod touch/
and then Initiate
ipad
connecting to
enVisibleTM on
wifi only
VOIP calls, surf
wifi.
iPod touch/
ipad
internet, check
wifi only ipad
(NOT an iPhone)
or
Obtain anonymous
web based email, social media, etc. . . .
voip account
from enVisibleTM
from
location of your
loctdown (Fees Apply)
choice.
enVisibleTM | LoctFact: The Internet is like a “Big City”. The WiFi Router is like a “Dark Alley” leading to the Internet. Most people avoid the proverbial “Dark Alley”. People get ROBBED, RAPED, & KILLED in “Dark Alleys”. enVisibleTM, places you on a secure subway, bypasses the “dark alleys”, and transports you to/from your location!
enVisibleTM by Loct Down Inc
2012 Copyright LoctDown Inc. All Rights Reserved.
enVisibleTM by Loct Down Inc
TM enVisible
BUY NOW!
PURCHASE OPTIONS
MacBook Air
FAQ
LoctDown
Desktop
Laptop
$495 Per Year Per Device
Windows 7
MacBook Pro
$495 Per Year Per Device
iMac/Mac Mini
iPod Touch
iPhone
iPad
$295 Per Year Per Device
Contact
Find answers to your questions.
For complex cyber security issues that require analysis.
For general questions about enVisibleTM
View FAQs
Expert Consultation
Contact Us
2012 Copyright LoctDown Inc. All Rights Reserved.