Hampton Fillingame |
Hampton Fillingame , Graphic Design, Sales, Adobe, Apple, Security, Relationships, Logic - Atlanta, Georgia |
27th of Jan, 2011 by |
WARNING! HF is a CAT * Creative Analytical Talent. Make sure your a good "fit" before working with him. He is sensitive.
But, his keen awareness boarding ESP may have resulted in a great deal of wasted energy spend by a Government - maybe :) HF was told he should write a book about his experience with the gov. ten 12 years ago (Traffic Court).
HF is not doing any organization, Gov., Agency, family member, friend or American right, if he keeps his "secrets".
This man also goes by the name Bill Friendly. HF should have to write out in detail the story such that NO one can alter it or modify it before the public can read it.
I've done my homework, and HF does not work for the state or feds now; Money was accepted, but this was not reported to the IRS (IRS is a scary group!).
HF was last seen with Photoshop and an iMAC, he may be dangerous with design. HF attacks the unknown with "Intelligence" and sees cyber-threat as the primary hurdle for business in the near future.
HF aka. Bill Friendly my ask questions in "Think Tanks" in order to ensure better decision making for all considerations. TubeTanks may be where he is hiding. Warning! You can't trust this man, if you invade his network (ie. iMAC running on At&T Level 3 hosted services at one point). HF's is now running on a complex architecture. Apple, Adobe, At&T and others can not even figure it out.
This is what is hurting production of past more than anything!
A few people and businesses have not gotten their money's worth because of security issues involving some power or Government agencies. HF is cetainly a CAT, but he loves his country- USA.
But, HF is guilty of making light of serious matters costing our country. He vents with design parodies, research, audio.
HF even will do design work (ex. TopicTanks) for money. |
|
|
A Fuzzy System Mess
Relationship: *UPDATE by author
Report: To clarify the intent of the "no-so funny" report, I predicted certain things nearly 2-3 years ago about a developing fuzzy line between Internet reality and information assurance. My main complaint was seeing more powerful knowledgeable types but not really bad people using serious resources to create false realities to take advantage of less powerful workers and creatives in ways most would not accept nor even understand.
A recent log file slid into my iMac recently. I don't quite know how I get in this enlightening situation. I feel next to no one gets this kind of experience in America. I've may apologies for much ignorance and fear reactive actions, but this file found in my computer continues to remind me that there is still something at work out there messing with a graphic designers head.
Quote"Xtreme Security
Company, a unique business focusing on maximizing the elimination or reduction of threat to non-friendly forces. We don’t spend your dollars doing assessment and risk analyses; Instead, your framework as a business gets immediate action on any and all fronts. Your business or situation doesn’t stand a chance without a 100% commitment and total trust by you too. We become one with your challenges, risk our very beings ultimately to become our solution!
Company may work hourly, project based, or extend creative term on a case by base bases. For smaller entities and individuals, you may want to consider a private investigator or similar solution firm.These services are for the most serious cases of Cyber threat. When you fear you business or economic survival is on the line, do you homework with the more public solutions. We are not the GeekSquad.
The record will speak for it’s self, but don’t ask for a reference. If you don’t have one, we would not be here. We dislike most every aspect of the crap good people are being sold in the “security space”. With convergence of hardware systems, LANs, WANs, hardware options and countless soft platforms, there should be an open mind to understanding how complex and difficult things are to isolate and extract without destroying potential for finding other targets.
Call company for urgent attention. Our passion may be confused with over aggression on our initial meeting. Once we begin our work, you will not see a thing, but the finest team of associates working in incognito. We are not scared to battle other organizations nor government agencies not playing by the book. Maybe your fears that a powerful lobbyist has triggered misappropriation of agency resources ultimately unfairly causing your opportunity to shrink or disappear completely. It has happened.
Who works with Company?
Sorry. For obvious reasons for protecting you and ourselves, this information is not disclosed. We can tell you areas any associate may have the highest awards and experience with a proven track record of being the best.
• Technology, Networks, WANs, LANs, Software, Programming/Coding, Cyber Challenges on an International scope.
• Hardware, Security Systems, Tracking, Installations, Repairs, Maintenance, Surveillance, and Related Connectivity & Reliance issues.
• Strategy, Intelligence, Counterintelligence, Evidence, Legal & Justice Defenses v. Offensive Tactics.
• Physical Safety. I a rare case of a “postal” development, we already know it’s coming. Self-Defense is something we take seriously for all parties involved. If you knew the whole story, you would probably not be calling us.
• Public Relations Repair and Offense Prevention Tactics with potentials to utilize every resource available.
Only one case study will be discussed. We are not car sales types.
Why should we work together?
Please do not request initiating a person visit unless you are at you wits end.
We research a great deal before we will meet you. If you have concern about our consortium, fear not. Instead be happy we are on your side, the good fight. We don’t play fair with hackers, threats, potential terrorist, or any dirt bags. We are Americans and have a chip on our shoulder. Our actions are tempered with wisdom, but our goal consumes us once contracted to demonstrate various skill sets for you mission.
If you need or desire ongoing assistance, we typically turn down such offers. Bill’s associates are not centralized to one area of the nation. Some are overseas, active duty, local enforcement, corporate superstars, and even x-cons. Per request, we take the challenge of orchestrating a smooth deployment of our human capital and systems into place for effective elimination of threat to your business.
We are no cheap. Sorry, this has become the most serious issue American businesses will soon face over the next year. It won’t be a nuclear bomb that gets you before “logic” bombs and intra and inter business corruption using respective technologies will cripple you slowly by surely. WE’RE NOT GOING THE SWALLOW THAT PILL! WE SUGGEST YOU DON’T EITHER.
Wow, this just seems a little too sneaky.
Until you have personal warded off four separate Federal Agencies, State Agencies, Multiple County Investigators and two of the most powerful families in America ALL at the same time, there is really nothing to discuss regarding out practices. Your money hires company to follow the law while solving your most serious security issues. Our process is not proprietary; It is simply not open for conversation. Period.
Fees: Case by Case with flexible terms an no contracts.
We don’t worry about not getting paid, if the client is happy. Unhappy clients means something went wrong. We take a non-refundable engagement fee once the need assessment has been completed. Because many people may be in a tight situation, we understand terms on the balance may be beneficial to all parties. Make us a believer!"
For all I know, this company is on my side for a battle with unknowns on about every front. Do I fear conspiracy, serious incorrect charges, and a shortened life expectancy from a lot of miscommunication, ego, and personal behaviors? I don't fear it, it seems to be very logical at this point, death threats, family privacy invasion, etc. No one went up against these agencies that I know of, yet this kind of log file and EXTREME SECURITY failure for years now has grown into something pretty "Wired". Agreed.
I make anyone a believer, if I could get anyone to have a formal discussion.
I would recommend ExtremeSecurity, but I can't even tell you what part they played in my security government horror story. Hollywood couldn't have written this story.
ps. There are no "Associates with Bill". It is a domain name. I started using the name out of fear for many things, but not my life. Moral Turpitude >>> Moral Fortitude.
Anyone wants the "Good for ALL" version. Just Ask. Hopefully, I'll still be around to tell the story.
Regards,
CCHF. |
|
|
Post your Comment
|
|
|