Appoint My Face Value As Your Official Ticketing & Marketing Agent

My Face Value is preparing for launch on 31st December 2017. To keep up to date with the latest news follow us on Facebook and Twitter. 

My Face Value is not just about giving face value access to the most popular or sold out events and challenging the touts, corporate resale cartels and vested interests. That is only one part of what My Face Value are doing.

All Clubs, not just those who are in the top tiers, have fans who are not locals. Visiting fans who wish to go to games because they are in town. But these fans have a number of barriers to acquiring tickets.

The Club may not offer an online option to purchase tickets for games. The Club ticket shop may only be open for specific and restrictive hours each week. But before even calling the ticket hotline or accessing the Club website the fan must acquire the relevant information.

It can often seem like just a little too much hassle and often times results in lost potential ticket sales.

Focus On Your Strengths

My Face Value are not offering Ticketing Software Solutions that Clubs need to implement or embed in their websites or require any in-house IT skills. Clubs are in the business of football not IT. But if you want us to do that too – then we can and we will.

With My Face Value you do not have to market your website – a tricky exercise and expensive – instead the Club benefits from My Face Value brand awareness and reach. Your ticketing and marketing space on My Face Value will contain all of your own Club branding.

The Go-To Location for Tickets with Killer Features

Some of the killer features that your Club will get with My Face Value Ticketing & Marketing are:

  • Support for Paper and Digital Tickets;
  • Payment Fraud Prevention and Counterfeit Detection & Prevention;
  • Fan Registrations with Opt-In Email;
  • Sell Club Merchandise;
  • Sell Gift Vouchers;
  • Notify fans of Discount Codes to Drive Ticket & Merchandise Sales;
  • Run Fundraisers, Promotions, Competitions & Giveaways;
  • Blog to your Club’s Fan Base;
  • Tracking Your Sales Performance and Benefit From Better Forecasting.

And it’s free with all of the costs picked up by the fan in the form of a small transaction charge. There are no setup fees either.

Your Official Ticketing & Marketing Agent (OTMA) 

Register your interest in appointing My Face Value as your Clubs Official Ticketing & Marketing Agent (OTMA) please email PROclubs@myfacevalue.co.uk & we will manage everything on your Clubs behalf .

ENDS

Register Your Club To Use My Face Value Free Of Charge

My Face Value is preparing for launch on 31st December 2017. To keep up to date with the latest news follow us on Facebook and Twitter

What Will My Face Value Do For Your Club?

My Face Value will make our platform available for use by your Club – free of charge – for:

  • Ticketing – Selling Tickets To Your Games
  • Posting Your Fixtures & Results
  • Promotions – Announcing Events & General News
  • Running Competitions & Fundraisers
  • Merchandising – Your Club Shop Online
  • Blogging – Allowing You To Keep Your Fans & Community Informed
  • Other – We will take suggestions for other services that Clubs would like us to consider providing

Why Are My Face Value Doing This?

The My Face Value mission is to remove touts (street level and corporate) from the ticket supply chain.

Touting and ticket price gouging will always exist in one form or another. In time, the positive disruptive activities of My Face Value will make touting far less prevalent and see far less wasted money from honest punters on counterfeit tickets or genuine fans being priced out of attending events.

We need the Clubs support to achieve our goals. Especially around a universally accepted process that governs the secondary ticket market that we want to see operate at Face Value ONLY with NO touting of any kind.

My Face Value is committed to introducing positive change. To demonstrate the My Face Value commitment to the grassroots and the development and promotion of football and fairness at all levels of the game we stated at the outset that we would allow qualifying Clubs access to our platform – free of charge.

By doing so we are giving qualifying Clubs access to world class marketing tools, technology and best practices to promote their Clubs and their Communities.

Who Can Register?

Registration is available to all clubs in England, Scotland, Wales, Northern Ireland and the Republic of Ireland who do NOT play in the following leagues:

  • English Premier League
  • English Football League Championship
  • English League One
  • English League Two
  • English National League
  • English National League North
  • English National League South
  • Scottish Premiership
  • Scottish Championship
  • Scottish League One
  • Scottish League Two
  • Welsh Premier League
  • NIFL Premiership
  • NIFL Championship
  • League of Ireland Premier Division
  • League of Ireland First Division

To register your interest please email AMAclubs@myfacevalue.co.uk

ENDS

The My Face Value “Tout Free” Guarantee

My Face Value is preparing for launch on 31st December 2017. To keep up to date with the latest news follow us on Facebook and Twitter

The My Face Value ability to tackle the problem of touts using our community is key to  earning and retaining the trust of the My Face Value community. The algorithms that My Face Value have developed to solve this problem are only one of many unique selling points in the My Face Value promise to genuine fans.

Using Innovative Technology To Beat The Touts

Similar to the auditable Random Number Generator algorithms that our Random Picking Software utilises to ensure fairness & transparency when selecting winners of our competitions & promotions, our approach to Phishing Prevention, Intercept “Man in the Middle” Attacks and our proprietary Automated Tout Detection systems use our own set of proprietary processes and algorithms to keep My Face Value secure and “tout free”.

My Face Value have developed sophisticated mechanisms that protect the data that the My Face Value community entrust us with and prevent the My Face Value community unwittingly assisting touts in their efforts to buy tickets at face value.

Protection from Trolls and Hackers 

My Face Value expects to be the target of concerted campaigns by trolls (on a simplistic level) and hackers (in a sophisticated manner) because My Face Value are dislodging and disrupting a lucrative “street level” business as well as a “respectable” corporate sector who make large amounts of money from ticket touting and price gouging tickets to events.

The first target of these hacks as we see it would be to undermine the trust in the My Face Value community by targeting our community members’ data, in all its forms. But in particular our community members credit card details. Aside from the myriad white-hat hacker tests that we have conducted, our operating systems, applications and network configurations have been comprehensively penetration tested by leaders in the field.

The Safety of Your Data – Security & Encryption 

My Face Value uses security protocols that protect the My Face Value community member from malicious interception attacks. My Face Value use a secure and encrypted connection (HTTPS/SSL) when handling My Face Value community members’ data.

The My Face Value EV SSL certificate offers the highest available levels of trust and authentication to our website. When performing transactions, the green address bar prominently displays our company name and provides highly visual assurance to customers that our site is secure – immediately giving the My Face Value community member the confidence to complete their transaction.

Sensitive Data Storage

For a further level of comfort My Face Value use an external provider with PCI Service Provider Level 1 Certification (the most stringent level of certification) to manage the process of no-hassle security and compliance that meets all PCI-DSS requirements for desktop and mobile transactions [PCI-DSS: The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organisations that handle branded credit cards from the major card schemes including Visa, MasterCard, American Express, Discover, and JCB.]

No sensitive data hits the My Face Value servers. To bolster this counter measure My Face Value have added an extra layer of security in the form of Two-Factor Authentication.

Phantom Community Members / Spam Accounts

But how do My Face Value detect touts posing as allegedly legitimate community members and avoid the scenario where the tout uses the My Face Value community as a source of leads to purchase tickets at face value and then tout.

The My Face Value community, without the measures that we have taken, would be a readily available environment with millions of community members which touts could “raid” for tickets.

The Value of Anonymity

This process is outlined in great detail on our website and on our social media pages. But in short, the answer to preventing the use of My Face Value as a ticket sourcing platform for touts is “anonymity”.

The information posted by My Face Value community members in relation to BUY/SELL/SWAP requests is not visible to the My Face Value community. Rather My Face Value store the data and identify matching BUY requests with SELL offers and SWAP requests with SWAP matches.

The relevant My Face Value Community members are then notified simultaneously by email. The email contains a link and when clicked this link will allocate the ticket on a First-Come-First-Served basis to the first My Face Value community member who secures the ticket by making the required payment.

The SELLER / SWAPPERS are then requested to send the ticket(s) to My Face Value for a counterfeit check and thereafter – assuming no issues relating to payment fraud or counterfeiting arise – My Face Value will post the ticket to the BUYER and pay the SELLER or in the case of SWAPS post the tickets to the respective My Face Value community members.

The process is managed from end-to-end by My Face Value to ensure compliance.

Detecting “Organised Touting” in the My Face Value Community

My Face Value will keep the community tout free. The BUY/SELL/SWAP Process is conducted thru a series of simple menu selections. This process is outlined in detail on our website and on our social media pages. Once completed and in order to SUBMIT the information to the My Face Value databases – the My Face Value community member is requested to LOGIN, if they have not already done so, or REGISTER – if they are not an existing My Face Value community member.

Now the science bit – the steps in the REGISTRATION process provide one level of protection against touting – but not enough. Sweat shops exist and the industry (organised crime element) are well capable of setting up hundreds of identities and email addresses using pre-paid cards in an attempt to circumvent this LOGIN or REGISTER Wall counter measure.

Tout Prevention & Community Compliance 

My Face Value have developed systems to encode expertise for detecting touts, in the form of rules. Employing Big Data Analysis / Data Mining to develop community member behaviour patterns and profiles for matching against a baseline to detect deviations and automatic responses / actions or in certain cases issue automated real time notifications to the  My Face Value Tout Prevention & Community Compliance Team for examination (See Level 1-4 below for details on this process).

The My Face Value Pattern Recognition techniques to detect clusters or patterns of suspicious behaviour are automated to ensure scaleability. Machine learning techniques automatically identify the characteristics of touting. The My Face Value algorithms learn suspicious patterns from samples which are then used later to detect breaches.

My Face Value deploy these detection algorithms on a number of levels using statistical techniques and artificial intelligence:

Level 1: Email addresses used by a community member, contact telephone number provided by a community member, frequency and time of day of logins by a community member, number and type of payment instruments used by a community member, transactions levels (numbers of transactions) by a community member, types of transactions conducted by a community member – BUY/SELL/SWAP;

Level 2: Combining source metadata, platform and device usage, IP address, browser type, geo-location (clustering), proxy spoofing and VPN detection to augment the Level 1 data My Face Value hold on behaviour patterns;

Level 3: Cross referencing My Face Value community member profiles with publicly available information on social media accounts for pattern matching and augmenting the community member risk profiling data to augment the Level 1 and Level 2 data;

Level 4: In the event that all the information points to a positive breach of the My Face Value Community Guidelines then the community member will be blocked. In circumstances where the information points to a possible breach of the My Face Value Community Guidelines then the My Face Value Tout Prevention & Community Compliance Team will request identification and documents to prove that the “member” is not a phantom account AND that the documents supplied to vouch for that assertion are genuine.

The My Face Value “Tout Free” Guarantee

By implementing Behaviour Analytics & Profiling with Context Data the My Face Value Machine-Learning Algorithms ensure a tout free environment. These processes reduce to almost zero the ability for touts to engage in the volume transactions that would make the effort commercially viable or feasible.

Whether dealing with touts as individuals or organised gangs their inability to fool the profiling algorithms and/or comply with the My Face Value escalating requests for proof of identity to determine if a suspicious account is in fact a genuine fan will keep our community tout free.

The My Face Value Tout Prevention & Community Compliance Team

 

Lyrics for a Surveillance Society – The Hacking Suite for Governmental Interception

Lyrics by Hacking Team. Music by Azerbaijan, Bahrain, Egypt, Ethiopia, Kazakhstan, Morocco, Nigeria, Oman, Saudi Arabia, Sudan, and several United States agencies including the DEA, FBI and Department of Defense.

Criminals and terrorists rely on mobile phones, tablets, lap tops and computers equipped with universal end-to-end encryption to hide their activity. Their secret communications and encrypted files can be critical to investigating, preventing and prosecuting crime. Hacking Team provides law enforcement an effective, easy-to-use solution. Law enforcement and intelligence communities worldwide rely on Hacking Team in their mission to keep citizens safe. The job has never been more challenging or more important.

You have new challenges today

Sensitive data is transmitted over encrypted channels

Often the information you want is not transmitted at all

Your target may be outside your monitoring domain

Is passive monitoring enough?

You need more ….

You want to look through your target’s eyes

You have to hack your target

While your target is …. Browsing the web, Exchanging documents, Receiving SMS, Crossing the borders

You have to hit many different platforms – Windows, OS X, Linux, Android, iOS, Blackberry, Windows Phone, Symbian

You have to overcome encryption and capture relevant data – Skype & Voice Calls, Social Media, Target Location, Messaging, Relationship, Audio & Video

Being stealth and untraceable

Immune to protection systems

Hidden collection infrastructure

Deployed all over your country

Up to hundreds of thousands of targets

All managed from a single place

Exactly what we do

Remote Control System – Galileo – The Hacking Suite for Governmental Interception

Hacking Team – Rely On Us

ENDS

Does anyone have experience of “KAYMERA MOBILE THREAT DEFENSE SUITE”

We are looking at this platform in parallel with the SaltDNA app which I previously posted about.

Kaymera has a pre-installed secured Android OS with integrated high-end security components to detect, prevent and protect against all mobile security threats without compromising on functionality or usability. A contextual, risk-based app uses a range of indicators to identify a risk in real-time and apply the right security measure so mitigation is performed only when needed and appropriate. Their Cyber Command Centre framework manages and enforces organization-specific permissions, security protocols and device policies. Monitors risk level, threat activities and security posture per device and deploys countermeasures.

Any thoughts welcome.

ENDS.

Using Stylometry DHS have id’d Bitcoin creator Nakamoto with help from NSA PRISM & MUSCULAR programs

Allegedly using word surveillance and stylometry the effort took less than a month. Apparently using encryption and complex obfuscation methods is not a defence when the “seeker” has access to trillions of writing samples from a billion or so people across the globe.

By taking Satoshi’s texts and finding the 50 most common words, the NSA was able to break down his text into 5,000 word chunks and analyse each to find the frequency of those 50 words. This would result in a unique 50-number identifier for each chunk. The NSA then placed each of these numbers into a 50-dimensional space and flatten them into a plane using principal components analysis. The result is a ‘fingerprint’ for anything written by Satoshi that could easily be compared to any other writing.

It is worth noting that the original post is littered with comments that request more details on the source of the information that informed the post or some other such proof of the veracity of the claims being made but the author declared in response:

Many readers have asked that I provide third party citations to ‘prove’ the NSA identified Satoshi using stylometry. Unfortunately, I cannot as I haven’t read this anywhere else — hence the reason I wrote this post. I’m not trying to convince the reader of anything, instead my goal is to share the information I received and make the reader aware of the possibility that the NSA can easily determine the authorship of any email through the use of their various sources, methods, and resources.

Many readers have asked who Satoshi is and I’ve made it clear that information wasn’t shared with me. Based on my conversation I got the impression (never confirmed) that he might have been more than one person. This made me think that perhaps the Obama administration was right that Bitcoin was created by a state actor. One person commented on this post that Satoshi was actually four people. Again, I have no idea.

If it is true then “The moral of the story? You can’t hide on the internet anymore. Your sentence structure and word use is MORE unique than your own fingerprint. If an organization, like the NSA, wants to find you [sic] they will.

Full story by Alexander Muse is on Medium.

ENDS

Quick Reference Resource: WikiLeaks CIA Vault7 Leak #20 – CouchPotato

CouchPotato enabled CIA agents to remotely use the tool to stealthily collect RTSP/H.264 video streams (RTSP/H.264: Real Time Streaming Protocol is a network control protocol designed for use in entertainment and communication systems and is a control mechanism for streaming media servers).

The tool provided CIA operatives with a number of options:

  • Collect the media stream as a video file (AVI);
  • Capture still images (JPG) of frames from the media stream;
    • This function was capable of being triggered only when there was change (threshold setting) in the pixel count from the previous capture;

The tool uses FFmpeg to encode and decode video and images and Real Time Streaming Protocol connectivity. The CouchPotato tool works stealthily without leaving any evidence on the attacked systems facilitated by ICE v3 “Fire and Collect” loader.

This is an in-memory code execution (ICE) technique that runs malicious code without the module code being written to the disk.

Neither Wikileaks, nor the leaked user guide explains how the agency penetrates the attacked systems, but as many CIA malware, exploits and hacking tools have already leaked in the Vault 7 publications, the agency has probably used CouchPotato in combination with other tools.” – TAD Group

The 10th August 2017 WikiLeaks release overview:

“Today, August 10th 2017, WikiLeaks publishes the the User Guide for the CoachPotato project of the CIA. CouchPotato is a remote tool for collection against RTSP/H.264 video streams. It provides the ability to collect either the stream as a video file (AVI) or capture still images (JPG) of frames from the stream that are of significant change from a previously captured frame. It utilizes ffmpeg for video and image encoding and decoding as well as RTSP connectivity. CouchPotato relies on being launched in an ICE v3 Fire and Collect compatible loader.”

One document was published alongside this release:

CouchPotato v1.0 — User Guide

Previous and subsequent Vault 7 WikiLeaks CIA document dump synopses are available via the Quick Reference Resource: WikiLeaks CIA Vault 7 Leaks

ENDS