Mr. Holston is a career Technical Operations Officer and has worked throughout the Intelligence Community, Department of Defense, and defense industry for more than 40 years. He has served as a U.S. Navy Explosive Ordnance Disposal Operator, a collections officer and senior manager in the Central Intelligence Agency, and a Subject Matte
Mr. Holston is a career Technical Operations Officer and has worked throughout the Intelligence Community, Department of Defense, and defense industry for more than 40 years. He has served as a U.S. Navy Explosive Ordnance Disposal Operator, a collections officer and senior manager in the Central Intelligence Agency, and a Subject Matter Expert and Program Manager for tracking and locating operations in the Department of Defense U.S. Special Operations Command, and a senior executive in the national security industry. Mr. Holston has managed and conducted counterterrorism, covert action, and technical collection operations worldwide and has been recognized as having contributed significantly to the national security of the United States of America.
Mr. Williams is an information technology executive with over 30 years of experience managing command control communications (C3) networks and intelligence information (C4I) systems deployed globally. While in the U.S. Air Force, Mr. Williams served as Chief, Database Administration Section and Superintendent of the Network Operations an
Mr. Williams is an information technology executive with over 30 years of experience managing command control communications (C3) networks and intelligence information (C4I) systems deployed globally. While in the U.S. Air Force, Mr. Williams served as Chief, Database Administration Section and Superintendent of the Network Operations and Security Center at the U.S. Special Operations Command. As a senior executive working in the national security industry, he has managed multiple technology platforms deployed globally, supporting critical missions including security, tracking, intelligence, communication, cyber, and virtual operations. Mr. Williams holds an MBA, MS-Cybersecurity, Project Management Professional (PMP) certification, National Association of Corporate Directors (NACD) certification, and Master Certification in IS/IT Project Management from Villanova University.
Mr. Beckett has over 30 years of hands-on experience creating and implementing technology-based systems for commercial and government customers. He has been a founder of five technology companies and led the creation of over 50 software products. He has worked on data analytics, workflow, communication, and intelligence systems across mul
Mr. Beckett has over 30 years of hands-on experience creating and implementing technology-based systems for commercial and government customers. He has been a founder of five technology companies and led the creation of over 50 software products. He has worked on data analytics, workflow, communication, and intelligence systems across multiple industries and government agencies. Mr. Beckett worked in a field intelligence element in the National Nuclear Security Agency within the Department of Energy, leading the development and implementation of a software platform for real-time sensor data fusion, command-and-control, and common operating picture, with multiple mission critical deployments around the world. Over his two decades working in the national security industry, he has created and deployed technology solutions to government agencies spanning intelligence, defense, law enforcement, and incident response missions.
The AXE55 founding team first worked together on a global technology initiative for DOD in 2005 where they led the development, implementation, and deployment of a highly successful sensor data aggregation and tracking system that continues to operate to this day. The core team came together again a few years later in another technology venture, launching a cutting-edge situational awareness and threat actor profiling capability that fused open-source, proprietary, and internal data streams in real-time. This product has been operating globally since 2013 and is in use today by over 40 government groups across intelligence, defense, and law enforcement. Now, the team has assembled once again to bring next-generation technical and tradecraft solutions to the national security mission.
Ambassador Cofer Black has had a distinguished 30 year career in the U.S. Government. He served 28 years in the Directorate of Operations at the Central Intelligence Agency. As Director of the CIA Counterterrorist Center over the 9/11 period he conceived, planned, and lead the CIA projection into Afghanistan and the Presidentially mandate
Ambassador Cofer Black has had a distinguished 30 year career in the U.S. Government. He served 28 years in the Directorate of Operations at the Central Intelligence Agency. As Director of the CIA Counterterrorist Center over the 9/11 period he conceived, planned, and lead the CIA projection into Afghanistan and the Presidentially mandated worldwide engagement against Al- Qaeda . In this capacity he also served as the Director’s Special Assistant for Counterterrorism and National Intelligence Officer. Subsequently, he was appointed to the Department of State at the Assistant Secretary level as Coordinator for Counterterrorism with the rank of Ambassador at Large. In addition to numerous exceptional performance awards and meritorious citations, Ambassador Black received the Distinguished Intelligence Medal, Career Distinguished Intelligence Medal, the Donovan Award, annual Exceptional Collector Award, and George H. Bush Medal for Excellence. He serves on the boards of Northwest Biotherapuetics and Diloretio Holdings.
URSA Mobile's research and development of privacy and security technology includes substantial improvements to sandboxing, exploit mitigations and the permission model. It deploys technologies to mitigate whole classes of vulnerabilities and makes exploiting the most common sources of vulnerabilities substantially more difficult. It improves the security of both the OS and the apps running on it.
•Non-Attributed
•Ubiquitous Technology
•Secure Voice, Video, Messaging & File Sharing
•Zero AdTech Collection or Geo-Location
•Protection from Cellular and ISP data collection
•Verified Boot
In the digital world, YOU are the weakest link. Our programs will help you understand how to protect yourself, your family and business from criminal predators, corporate intrusion, and State-sponsored spying. Whether you are a corporate or government executive, a high-net-worth individual, or someone simply concerned about identity theft and personal safety, you should be aware of the vulnerabilities to your personal data and predatory attacks against your assets and relationships. YOUR personal security habits effect the security of your family and friends.
Protect yourself, your employees, your family and friends with secure human behaviors.
https://www.bewarethepredator.com
Play XOR Go is a technology company that creates innovative, next-generation intelligence and security products. We build cool technology tools that are designed to operate in the real world and address complex challenges for sophisticated missions. Our solutions focus on empowering users with actionable intelligence that can drive a wide range of security operations. Play XOR Go is proud to be a strategic partner with AXE55 to bring our technical capabilities to U.S. national security missions and critical infrastructure protection.