I examine your tech stack for vulnerabilities,
data leaks, and surveillance risks.
Together we make a safer internet.
Campaign technology assessment Evaluating data handling
Ensure client dignity, protect vulnerable populations, honor community trust
Your business tools:
the CRM, email, cloud storage, communication platforms, aren't just utilities;
They're surveillance endpoints, Data extraction points & Vendor lock-in mechanisms.
I don't just run scanners. I think like an attacker, finding logic flaws that automated tools miss.
When I find vulnerabilities, I demonstrate impact safely. Like my government site account takeover discovery.
I explain risks in terms of business impact: lost revenue, reputation damage, legal liability.
FINDING: Authentication Tokens in Browser History
LOCATION: Government benefits portal
IMPACT: Complete account takeover
PROOF: Captured token from history →
Accessed account → Changed password
CVSS: 9.1 (Critical)
This is the level of rigor I bring to every assessment.
Every digital interaction in your business creates data flows. Customer information, visitor behavior, internal communications,
much of it flows to platforms you don't control, serving interests that may not align with yours.
CLIENT: Statewide Political Campaign
ISSUE: Volunteer verification process
MAPPING DISCOVERY: Sensitive documents shared
via unencrypted channels, downloadable
by multiple staff members
CONTROL ASSESSMENT: Volunteer PII 95% exposed,
no retention policies, no access logs
SOLUTION: Encrypted portal + role-based access
+ automatic document expiration
RESULT: Volunteer trust protected,
campaign integrity secured,
legal liability eliminated
CLIENT: Racial Justice Advocacy Group
ISSUE: Donor/activist data protection
MAPPING DISCOVERY: Activist contact lists
on US surveillance platforms,
donor data in 3rd-party CRMs
CONTROL ASSESSMENT: Activist data 80% vendor-
controlled, opposition research risk: HIGH
SOLUTION: Sovereign CRM migration,
encrypted communications,
data minimization implementation
RESULT: Activist safety ensured,
donor confidence increased,
opposition vulnerability closed
I specialize in protecting mission-driven organizations where data sovereignty isn't just about compliance, but about protecting people and democracy.
Three levels of clarity and control, each including detailed mapping and actionable guidance.
For understanding one critical data pathway
Common use cases:
Campaign volunteer systems: $1,800
Social service client intake: $1,800
Donor management review: $2,500
Complete mapping of your digital ecosystem
Organization sizing:
Small teams (1-10): $4,800
Growing organizations (11-50): $7,200
Complex operations (50+): $9,600+
Continuous sovereignty guidance as you grow
Recommended for:
After completing Digital Sovereignty Mapping
6-month minimum commitment
10% discount with annual payment
For mission-driven organizations,
data sovereignty isn't about compliance, it's about:
Begin with a Mission Alignment Call
A 45-minute conversation to explore how sovereignty mapping can protect your people and your mission.
Schedule Complimentary Mission Alignment CallEach quarter, I provide two complete Digital Sovereignty Mappings to organizations serving marginalized communities or protecting democracy.
All engagements begin with a Complimentary Mission Alignment Call.
End-to-end encrypted. No metadata retention.
Signal QR Code
1. Install Signal 2. Add contact 3. Send encrypted message
For mission-sensitive information:
Use Signal for initial contact. I prioritize protection for mission-driven work.
Founded by a Veteran & Community Organizer,
turned Sovereignty Protector.
I understand mission-driven work because I've done it.
Your protection is my purpose.