I don't sell security testing.
I provide privacy risk reduction and regulatory compliance.
MY OFFER:
Third-party tracking audit – Legal risk identification (GDPR, CCPA, HIPAA)
Data flow mapping – Visibility into where customer data actually goes
Privacy compliance assessment – Avoid fines, class actions, reputation damage
Remediation guidance – Practical steps to remove unnecessary tracking
Expert witness – Technical evidence for litigation
Campaign technology assessment Evaluating data handling
Ensure client dignity, protect vulnerable populations, honor community trust
Your business tools:
the CRM, email, cloud storage, communication platforms, aren't just utilities;
They're surveillance endpoints, Data extraction points & Vendor lock-in mechanisms.
I don't just run scanners. I think like an attacker, finding logic flaws that automated tools miss.
When I find vulnerabilities, I demonstrate impact safely. Like my government site account takeover discovery.
I explain risks in terms of business impact: lost revenue, reputation damage, legal liability.
FINDING: Authentication Tokens in Browser History
LOCATION: Government benefits portal
IMPACT: Complete account takeover
PROOF: Captured token from history →
Accessed account → Changed password
CVSS: 9.1 (Critical)
This is the level of rigor I bring to every assessment.
Every digital interaction in your business creates data flows. Customer information, visitor behavior, internal communications,
much of it flows to platforms you don't control, serving interests that may not align with yours.
CLIENT: Statewide Political Campaign
ISSUE: Volunteer verification process
MAPPING DISCOVERY: Sensitive documents shared
via unencrypted channels, downloadable
by multiple staff members
CONTROL ASSESSMENT: Volunteer PII 95% exposed,
no retention policies, no access logs
SOLUTION: Encrypted portal + role-based access
+ automatic document expiration
RESULT: Volunteer trust protected,
campaign integrity secured,
legal liability eliminated
CLIENT: Racial Justice Advocacy Group
ISSUE: Donor/activist data protection
MAPPING DISCOVERY: Activist contact lists
on US surveillance platforms,
donor data in 3rd-party CRMs
CONTROL ASSESSMENT: Activist data 80% vendor-
controlled, opposition research risk: HIGH
SOLUTION: Sovereign CRM migration,
encrypted communications,
data minimization implementation
RESULT: Activist safety ensured,
donor confidence increased,
opposition vulnerability closed
I specialize in protecting mission-driven organizations where data sovereignty isn't just about compliance, but about protecting people and democracy.
Four levels of clarity, plus ongoing monitoring to catch what changes.
For small businesses, non-profits, and Masjids
Best for: Sites under 25 pages, non-profits, community organizations
For growing businesses and e-commerce
Best for: Sites under 100 pages, e-commerce, lead generation
For large organizations, healthcare, finance
Best for: Healthcare portals, financial services, government sites
For sites in development
Why pre-launch? 10x cheaper to fix tracking before launch than after. No data leaked yet. No compliance violations yet.
Add-on for any package
12-month term. Billing options: monthly ($1,500), quarterly ($4,200, 7% discount), annual upfront ($15,300, 15% discount).
Available with any base package: Essential, Professional, Enterprise, or Pre-Launch.
For mission-driven organizations,
data sovereignty isn't about compliance, it's about:
Each quarter, I provide two complete Digital Sovereignty Mappings to organizations serving marginalized communities or protecting democracy.
All engagements begin with a
complimentary 15-minute consultation.
End-to-end encrypted. No metadata retention. This is how to reach me.
Signal QR Code
1. Install Signal | 2. Scan QR or add username | 3. Send encrypted message
Founded by a Veteran & Community Organizer,
turned Sovereignty Protector.
I understand mission-driven work because I've done it.
Your protection is my purpose.
Substack: Articles, investigations, and live demo announcements.
GitHub: Open-source tools, scripts, and findings.