Mr. Holston is a career Technical Operations Officer and has worked throughout the Intelligence Community, Department of Defense, and defense industry for more than 40 years. He has served as a U.S. Navy Explosive Ordnance Disposal Operator, a collections officer and senior manager in the Central Intelligence Agency, and a Subject Matte
Mr. Holston is a career Technical Operations Officer and has worked throughout the Intelligence Community, Department of Defense, and defense industry for more than 40 years. He has served as a U.S. Navy Explosive Ordnance Disposal Operator, a collections officer and senior manager in the Central Intelligence Agency, and a Subject Matter Expert and Program Manager for tracking and locating operations in the Department of Defense U.S. Special Operations Command, and a senior executive in the national security industry. Mr. Holston has managed and conducted counterterrorism, covert action, and technical collection operations worldwide and has been recognized as having contributed significantly to the national security of the United States of America.
Mr. Williams is an information technology executive with over 30 years of experience managing command control communications (C3) networks and intelligence information (C4I) systems deployed globally. While in the U.S. Air Force, Mr. Williams served as Chief, Database Administration Section and Superintendent of the Network Operations an
Mr. Williams is an information technology executive with over 30 years of experience managing command control communications (C3) networks and intelligence information (C4I) systems deployed globally. While in the U.S. Air Force, Mr. Williams served as Chief, Database Administration Section and Superintendent of the Network Operations and Security Center at the U.S. Special Operations Command. As a senior executive working in the national security industry, he has managed multiple technology platforms deployed globally, supporting critical missions including security, tracking, intelligence, communication, cyber, and virtual operations. Mr. Williams holds an MBA, MS-Cybersecurity, Project Management Professional (PMP) certification, National Association of Corporate Directors (NACD) certification, and Master Certification in IS/IT Project Management from Villanova University.
Mr. Beckett has over 30 years of hands-on experience creating and implementing technology-based systems for commercial and government customers. He has been a founder of five technology companies and led the creation of over 50 software products. He has worked on data analytics, workflow, communication, and intelligence systems across mul
Mr. Beckett has over 30 years of hands-on experience creating and implementing technology-based systems for commercial and government customers. He has been a founder of five technology companies and led the creation of over 50 software products. He has worked on data analytics, workflow, communication, and intelligence systems across multiple industries and government agencies. Mr. Beckett worked in a field intelligence element in the National Nuclear Security Agency within the Department of Energy, leading the development and implementation of a software platform for real-time sensor data fusion, command-and-control, and common operating picture, with multiple mission critical deployments around the world. Over his two decades working in the national security industry, he has created and deployed technology solutions to government agencies spanning intelligence, defense, law enforcement, and incident response missions.
The AXE55 founding team first worked together on a global technology initiative for DOD in 2005 where they led the development, implementation, and deployment of a highly successful sensor data aggregation and tracking system that continues to operate to this day. The core team came together again a few years later in another technology venture, launching a cutting-edge situational awareness and threat actor profiling capability that fused open-source, proprietary, and internal data streams in real-time. This product has been operating globally since 2013 and is in use today by over 40 government groups across intelligence, defense, and law enforcement. Now, the team has assembled once again to bring next-generation technical and tradecraft solutions to the national security mission.
Ambassador Cofer Black has had a distinguished 30 year career in the U.S. Government. He served 28 years in the Directorate of Operations at the Central Intelligence Agency. As Director of the CIA Counterterrorist Center over the 9/11 period he conceived, planned, and lead the CIA projection into Afghanistan and the Presidentially mandated worldwide engagement against Al- Qaeda . In this capacity he also served as the Director’s Special Assistant for Counterterrorism and National Intelligence Officer. Subsequently, he was appointed to the Department of State at the Assistant Secretary level as Coordinator for Counterterrorism with the rank of Ambassador at Large. In addition to numerous exceptional performance awards and meritorious citations, Ambassador Black received the Distinguished Intelligence Medal, Career Distinguished Intelligence Medal, the Donovan Award, annual Exceptional Collector Award, and George H. Bush Medal for Excellence. He serves on the boards of Northwest Biotherapuetics and Diloretio Holdings.
Rob is a former law enforcement senior executive who retired as the Special Agent in Charge of the Dignitary Protective Division after more than 24 years of service with the United States Secret Service. In this role, he oversaw protective operations for National Special Security Events, and the physical protection of all foreign heads of state while in the United States. In previous leadership roles, Rob served as the Special Agent in Charge/ Attaché of the Ottawa Field Office leading the investigative and protective mission throughout Canada; Deputy Special Agent in Charge of the Miami Field Office with oversight of five offices operating in West Palm Beach, Puerto Rico, Peru, Colombia, and Brazil; Supervisory Special Agent of the Protective Intelligence Division tasked with the management of threat/ behavior based investigations, preparation of threat assessments, and open-source intelligence initiatives supporting operations globally. Earlier assignments included, the New York Field Office, the Clinton Protective Division, the Paris Field Office, and the Recruitment Division.
Mike, founder of a successful cybersecurity company, is a retired CIA Operations Officer and Air Force NCO with over 35 years of government service. During his CIA tenure, he held leadership roles, including Chief of Virtual Operations, Chief of Base (COB) in multiple Middle Eastern, North African, and South Asian countries, and Chief of Counterterrorism operations in a Station in the Middle East. Mike also served in senior positions at CIA Headquarters. In the Air Force, he worked in the DIA Defense Attaché System, supported a Tier 1 SMU, and contributed to operational planning during Operation Just Cause. He later served in SOUTHCOM’s J3 Special Operations Division and J2X in Panama, as well as in intelligence roles with the 388th TFW and 1st Special Operations Wing. Mike’s private sector roles include VP at Creative Radicals, Director of Innovation at Engility, and Virtual Operations SME at Black Horse Solutions.
URSA Mobile's research and development of privacy and security technology includes substantial improvements to sandboxing, exploit mitigations and the permission model. It deploys technologies to mitigate whole classes of vulnerabilities and makes exploiting the most common sources of vulnerabilities substantially more difficult. It improves the security of both the OS and the apps running on it.
•Non-Attributed
•Ubiquitous Technology
•Secure Voice, Video, Messaging & File Sharing
•Zero AdTech Collection or Geo-Location
•Protection from Cellular and ISP data collection
•Verified Boot
In the digital world, YOU are the weakest link. Our programs will help you understand how to protect yourself, your family and business from criminal predators, corporate intrusion, and State-sponsored spying. Whether you are a corporate or government executive, a high-net-worth individual, or someone simply concerned about identity theft and personal safety, you should be aware of the vulnerabilities to your personal data and predatory attacks against your assets and relationships. YOUR personal security habits effect the security of your family and friends.
Protect yourself, your employees, your family and friends with secure human behaviors.
https://www.bewarethepredator.com
Play XOR Go is a technology company that creates innovative, next-generation intelligence and security products. We build cool technology tools that are designed to operate in the real world and address complex challenges for sophisticated missions. Our solutions focus on empowering users with actionable intelligence that can drive a wide range of security operations. Play XOR Go is proud to be a strategic partner with AXE55 to bring our technical capabilities to U.S. national security missions and critical infrastructure protection.