CYVA Research is a cybersecurity innovation and strategic research and development firm. Our focus is developing game-changing privacy and security technologies and strategies for our clients.
Our mission is to provide people the capabilities to control their personal information wherever it exists and according to their terms and conditions derive value and/or benefit from the trustworthy use of their information assets.
Our information is weak, vulnerable, easy prey. Primitive data objects were never designed to be secure, to be self-protecting, self-governing.
Presently there is no end in sight to data breaches, cybercrime and the out-of-control collection and exploitation of our personal information by criminals, corrupt big-business and big-government.
Fundamental to this cybersecurity catastrophe is the fact that it is entirely man-made. We, mankind, created this mess and should own the fact that this critical high-tech fabric is fundamentally flawed at its most elemental level: the data object.
Coupled with this flawed infrastructure reality is a raging war, global data politics over who owns and controls information, especially personal information, our human-digital person, our human-digital existence.
CYVA Research argues for the re-engineering, the redesign of primitive data objects, our compute fabric at an atomic level and adoption of a set of guiding architecture principles: Human-Digital Dignity™, Human-Digital Integrity™, Human-Digital Liberty™.
Our focus has concentrated on the architecture and design of information objects and systems that embody our human being, our essence, our values, to be self-protecting, self-governing, maximizing liberty and maximizing protection against the escalating misuse and abuse of our personal information, our human-digital existence. We call this Human-Digital Liberty.
CYVA Research has designed a new class of self-protecting, self-governing mobile information objects, a Self-Determining Digital Persona™ that enforces privacy and empowers the right of people to be secure and free in their human-digital existence. These technologies are being built in accordance with our guiding architecture principles: Human-Digital Dignity™, Human-Digital Integrity™, Human-Digital Liberty™.
We all should respect Human-Digital Dignity™ - we have a human-digital existence and the right of informational self-determination - Human-Digital Liberty™, the right of people to be secure in their human-digital existence and the liberty to control and derive value and/or benefit from the trustworthy use of their digital identity and information assets according to their terms and conditions. It is a fundamental design objective to build systems that support and affirm Human-Digital Dignity and the rights-responsibilities of privacy: informational self-determination.
Human-Digital Integrity™: never separate a person’s data from their policies, and the capability for a person or authorized custodian to enforce governance over the use of their Human-Digital Identity wherever they exist.
Today we artificially separate policy from data. Our design, our architectural principle is to never separate a person’s rules, their security and privacy choices from their data; a person’s rules, their policy travels with their data.
Consumer privacy and security rules, and auditing are always on, always enforcing consumer privacy-security choices, recording the who, what, where, when, why details of data processing. This capability provides data controllers a verifiable means to prove and satisfy certain long standing data protection principles and evolving data protection regulations (e.g., General Data Protection Regulation (GDPR), OECD Privacy Guidelines, HIPAA/HITECH, ...
Additionally, encryption is valuable, but we need to go beyond encryption as once we provide the secret key to decrypt data we have no control over the ongoing use of that decrypted data. A recipient can do whatever they want with the decrypted data.
Our approach of self-protecting mobile information objects combines the ‘scramble data’ utility of encryption with an individual's ever protecting, and present rules of information access and use; you control the processing as your processing rules are always present. Note these are your rules not some unknown administrator or business/government entity that says you have to trust us.
So after an encapsulated agent-based information object is decrypted the owner-operator (you) remains in operational control (read, display, update, exchange, delete, lock down,…) of the information. An individual can change a governing policy or remotely lock-down any deployed Personal Information Agents at will (see prototype demo video). Security rules are pre-set and can operate autonomously or semi-autonomously.
We adhere to a primary security principle: trust no one. Especially do not trust those who refuse to affirm the rights-responsibilities of respecting privacy, our Human-Digital Dignity, our Human-Digital Liberty.
This disruptive innovation provides individuals and their chosen custodians the capabilities to continuously control and monetize (according to their terms) their digital identity and information assets wherever they exist, across hostile environments.
The firm’s user-controlled, user-monetized suite of identity and information asset management platforms and services are the foundation in strategically disrupting privacy hostile mobile advertising, social networking and healthcare informatics as we know them, putting people in direct authoritative control of their human-digital identity and information assets.
Currently, powerful big businesses and big government continuously capture and control our personal information, treating us and our information as their property. Control over information is a primary means to manipulate society, economies and to maintain coercive political power.
During the Transatlantic Slave Trade period (15th – 19th centuries) slave traders violently captured, chained, branded and declared black African people their property, chattel. Slave trade supporters argued the African natives were inferior, sub-human and had no unalienable right to liberty. Additionally, slavery was necessary to the success and wealth of the country and if they did not engage in slavery others would; and the abolition of slavery would ruin their economy causing a total collapse.
As depicted in the charcoal drawing the chained woman was forcibly made a slave, branded as property and put to work, involuntary servitude for life.
This industry generated vast wealth and held considerable power, fully capable of protecting itself through corrupt politicians that legislatively thwarted the abolition movement for decades. Abolitionists such as William Wilberforce in Britain and many others brought the suffering and horrors of slavery to the public attention and eventually the slave trade was outlawed in Britain.
Overwhelmingly, consumers are distrustful of corporations, who for years have callously collected and exploited personal information, raking in billions while denying our human-digital dignity: our right to control and enjoy the benefits of our human-digital existence, instituting a data slave trade.
We are being continuously kidnapped, chained and branded the property of others, who argue it's their lawful property, "if it’s on our network, we own it", and systematically refuse to acknowledge any assertion of a universal ethic that affirms human-digital dignity - human-digital liberty - informational self-determination, and the right to be safe and secure in our human-digital existence.
Like the Africans during the Transatlantic Slave Trade period, we have been declared sub-human, inferior, the property of others. And the modern data traders can do essentially whatever they want with us, our present day human-digital person. Data slave traders make billions monetizing our information in advertising schemes, obliterating privacy and keeping us all in a state of cybersecurity weakness and vulnerability.
They argue we have no right of informational privacy: informational self-determination – right to control our information. Coupled with this data slave trade is an international cyber-criminal assault upon our weak and vulnerable state of being digital. Our financial, social, and medical information is increasingly being criminally violated, costing us and business billions with no end in sight.
We are anything but safe and secure in our human-digital existence. We exist in an ever expanding anti-liberty police state that covertly and unlawfully tracks and monitors our lives, building super profiles on all of us. This always-on surveillance capability is largely the result of the out-of-control collection and profiteering conducted by powerful commercial entities.
These firms have tremendous wealth to pay lobbyists and purchase favorable legislative action from all too willing politicians who systematically undermine any efforts to forward strong citizen-centric privacy and security legislation; and systematically undermine enforcement and trustworthy oversight.
The data slave trade, as the Transatlantic slave trade in the 16th-19th centuries was extremely lucrative and wheeled great political power due to an all too corrupt political process and persons in high office.
The data slave trade (human-digital trafficking and exploitation) is prosperous and expanding. However, there is a tsunami of public fear and anger mounting given millions of affected consumers who are becoming increasingly aware of the always-on surveillance of their lives through their smartphones, computers, and emerging Internet of Things (IoT) devices - The Anti-Liberty Police State.
Identity theft victims are especially aware of just how unsafe we all are in regards to cybercrime. The continued revelations (NSA contractor Edward Snowden) and debates over government secret spy programs, Apple v. FBI and forced backdoors, and our constitutional rights being undermined by a false and misleading trade-off between privacy and security is energizing a profound need for change.
Privacy and security are essential to liberty and our safety both individually and collectively as a nation and information society and digital economy. Tyrannical, evil regimes have consistently used information and spy networks against their populations to maintain coercive power. The human right to control (privacy) and safeguard (security) personal information against abuse is essential to liberty and security. However, this human right of privacy (informational self-determination) is not an absolute right.
Information can be used for us and against us, for good and evil. Due process is essential to justice and once a person is fairly and properly tried and convicted of a crime that record is made public for the public good, for public safety. We all have information about us or in our possession that we may wish to be kept secret ‘controlled’ and only available to those we trust or have a need to know.
If you want strong national security, realize that a strong, well-armed, well equipped and trained citizenry is best. Police cannot be everywhere at any time to prevent a crime, but millions of good, decent, law abiding and well-armed citizens can be ready to help stop a crime or act of terror in its tracks.
Regarding cybersecurity, the OPM breach is a classic example of exactly why trusting a careless and obstinate government bureaucracy is foolish and reckless. 21.5 million workers who had their security clearance files hacked know the hard truth: we are all vulnerable.
Citizens need to take control of their information wherever it exists. The security of this nation is the people and the people are the security of the nation. We’ve created another plane of existence, a cyber existence and we all need to be better equipped, trained and ready to secure this digital world and ourselves.
Many realize that the dreadful patterns of history, of wicked men, can and will repeat, the horrors of slavery and tyranny can and will arise if the people are not diligent and courageous in seeking liberty and truth. Foundational to liberty is justice for all – no favoritism, no bribes accepted, respect for the sanctity of life, truth and honesty, a commitment to personal integrity, goodness - ethics and a self-sacrificing, tough and authentic love that clings to what is good, hates what is evil and is willing to fight and die for the liberty and truth that makes us free to be and do what is right and good.
If you wish to disrupt the data slave trade and the anti-liberty police state: the disrespectful, unfettered collection and exploitation of our information, and begin to take back control of your personal information please contact us, join us.
There is powerful big-business, big-government opposition to citizen-centric privacy and security. CYVA Research is one small business, one small effort to affirm and empower Human-Digital Liberty: the right of individuals to be safe and secure in their human-digital existence, to control their human-digital identity and information assets wherever they exist.
Provides the capability to establish and administer secure, trusted and privacy respectful communities.Venture
Provides the capability to establish and administer secure, trusted and privacy respectful electronic commerce and advertising communities.Venture More Info
What goes around, comes around - the good and the bad. Provides the capability to establish and administer a secure, trusted and privacy respectful reputation management service.Venture
Provides an individual the capability to control their agent-based digital identity and information assets wherever they exist.Venture
A patient-controlled emergency medical identity. Designed to securely place the right information in the hands of the right people at the right time. Provides patients and/or their chosen custodians direct, continuous control over their agent-based emergency medical information wherever it exists.Venture
This is a user-controlled, user-monetized mobile advertising service that is designed to build and enforce trusted, secure and privacy respectful relationships between merchants and consumers.Venture
The Auto-PIA is a capability to provide a PIA an itinerary of communities to visit and actions to be performed autonomously.
Capability to perform trusted interactions with other Personal Information Agents anonymously.
Capability to manage trustworthy reputation assertions. This service employs digital signature and non-repudiation capabilities.