Security Researcher
For over 25 years I have been fascinated with security, with my primary interests revolving around wireless communications; specifically cellular network function and operations. My early interests began with CB and Ham radios and then I was given the rare opportunity between 95' and 2000 to work with some Sr. Engineers who were recently laid off from Motorola. These people laid a foundation for my life that I could not have predicted; to those individuals I thank you from the bottom of my heart.
Since then I have developed a vast knowledge and because of the gift I was given I must (as we all should) pass along my knowledge on various topics onto you. Do I know everything there is to know? Absolutely not; only a fool would suggest they know everything. The information I will present is presented in plain English so we can all understand it and is based off of years of research. I believe you will find it valuable.
patreon.com/SecurityResearcher

Massive Data Breach: Your SSN Is on the Dark Web

Insider Threat Expert

UAVs and Drones: What They’re Not Telling You

AI Voice Scams Are Exploding — Don’t Be the Next Victim

FBI Warning: $25M Deepfake Scam Just Hit — Here’s How to Stay Safe

Cellphone Spyware - How People Spy on You Through Your Phone

FBI Warns: Deepfake Scams Are Spreading Fast — Protect Yourself Now

The Story of AI: From Invention to Takeover?

AI, Quantum, and Robots Are Converging — What Happens Next?

The Secret History of the Internet

How Corporations Spy - "Ad-Tech"

Stop Using QR Codes in 2025 - Plain English, in 2 minutes.

Working From Home? - How to Protect Your Data

Technology Law Expert - Robert Kost

'#Hacked2' with Cyber Security Expert and Author Albert Whale.

Silent SMS & OTA - Tracking Your Phone Without You Knowing

Juice Jacking: How Public Charging Ports Can Hack Your Phone & The Simple Solution

Creating Your Personal Security Plan: A Simple Guide to Staying Safe Online

Keyless Cars Are Easy to Steal

Unlock Any Phone with the UFED Tool by Cellebrite – Apple and Android Devices

Cellphone Surveillance Explained - Stingray/IMSI Catchers

How Cell Networks Track Your Location with GPS-Like Accuracy 📱

Biometric Fingerprint Locks: What You Should Know About Privacy and Security

Top 3 Questions Answered: Top 3 Questions About Cell Phone Surveillance, Spying, Hacking & Tracking

The Safest Way to Store Your Passwords: Why a Physical "Little Black Book" Is Still Secure

Are You at Risk of Juice Jacking? How to Stay Safe at Public Charging Stations

How Home Cell Signal Boosters (Femtocells) Can Be Hacked: Protect Your Data

How to Protect Your Cell Phone from Tracking, Spying, Stalking, Hacking, and Eavesdropping