Saturday, May 23, 2015

Find out who is lying or hiding something

<<---------- Scroll down for news. ---------->>

Eye Talk. - They eyes show how people think.

Discover who is lying or hiding something by Eye Talk.

Asking the right questions at the right time for the right reason - get the eyes to talk.

    The 3 Key Indicators:
  • The eyes show how people think.
  • The face shows how people feel
  • The hands display how people react.

The secret is in using the MiM Questioning methods to find out the Why ? and for interrogation to find the Fear. The MiM method heightens situational awareness!

MiM is NOT only body language... it is language based ( questioning methods to comprehend the situation and clarify position)... It is used for interviewing, investigation and interrogation. The learning method 'heightens situational' awareness which has been applauded by the top security and investigative minds.

Try out the Eyes for now, so that you can see a tangible result.

You can download the Free App onto your phone. In this way, you can view the info just before meeting others in order to prime your brain and align your nervous system in order to derive the mind-set of Heightened Situational Awareness.

The app will give you a series of services including up-to-date news and a variety of social media channels sponsored by ISIO.

Go to MiM to obtain the E- Connect Course Application Tool and to purchase the Master in Mind lie-detection course. The cost is surprisingly low and you have access to the on-line lessons, which includes valuable information on cultural differences for up to one year from the date of purchase.


For the serious researcher:
ToganX.Info

Copyright©2014/Allan B. Colombo
www.alcolombo.us / al_colombo@hotmail.com
(Permission is given to republish blog posts providing
my contact information and copyright notice are included.)

Subscribe

Be sure not to miss each and every blog comment by subscribing to my email service. Every time I publish a comment or an update, you will be the first to know. To sign up, enter your email address in the email subscription box on the top right of this page. Thank you!

Where and how to follow Al Colombo via TpromoCom:

To contact Al Colombo, click here.

Sunday, May 17, 2015

How Alarm Systems Deter Crime

<<---------- Scroll down for news. ---------->>

In my early years in electronic security, as a technician and alarm company owner, I thought in terms of catching thieves rather than preventing crimes. My focus was clearly on technology for detection and not prevention, but over time I came to understand that I had it backwards. That lesson didn’t come soon enough though as I was in the business more than 16 years before I figured it out.

It was sometime in the early 1990s that this revelation took place, while I was an associate editor with Security Distributing & Marketing Magazine (SDM) in Chicago. I was doing research for a story on burglar alarm systems when I discovered that UL actually requires overt placement of security devices, such as bell boxes, the use of foil tape on windows, and more. The idea is simple. We want would-be criminals to see that there’s an alarm in place so they go elsewhere. Of course there are other things we need to do as well as additional items that the end user must have in place to assure prevention. Some of them I have covered in previous blog posts and articles throughout the years.

Yard Signs and Window Decals
Perhaps one of the most-simple actions that we take as alarm professionals is to install yard signs and decals on key windows outside the business or home. End users, if your installing alarm company fails to do this, you need to give them a call because chances are, the technicians who were there installing your system likely ran low on them or they forgot. In either case, you need to make the front office aware of the issue so they can send someone out to make it right. The fact is, yard signs and decals, although not the only solution to crime, do act to slow, minimize, even stop criminal action.

Keypad Visibility in Commercial
Having a keypad in the front foyer of a story may seem risky, given the fact that there are usually a host of buttons/keys on

them that a child might use to send a silent panic alarm, set the fire alarm into motion, or issue a distress or call for medical help. This is absolutely so in cases where the installing alarm company failed to deprogram those critical keys out of the system, but for alarm professionals who give all this serious thought, it’s not a problem. In most cases there’s a second keypad at a separate employee entrance or in an office in a non-public location of the store.

Multiple Siren Speaker Boxes
First, it’s always wise to install trumpet speakers, especially in commercial applications. Second, it’s also wise to place them in a metal box when these speakers are placed outside the store or in visible locations within. Perhaps even more important is to include tamper switches inside these boxes such that if someone removes or pries them from the wall, or they open the cover, the alarm system sounds off, summoning the police in the process. The visibility of multiple speakers and speaker boxes inside and outside is usually enough to unnerve even the best and most experienced of burglars.

In conclusion, there are things that can be done to enhance and equip alarm systems to suppress crime in a natural manner so the crimes we normally detect won't happen in the first place. Although the few items mentioned above are important elements in the crime prevention equation, there are many others that can be used to further deterrence.

Be sure to check back for part 2, and if you have a question, feel free to use my Comments and Questions form in the left column.


For the serious researcher:
ToganX.Info

Copyright©2015/Allan B. Colombo
www.alcolombo.us / al_colombo@hotmail.com
(Permission is given to republish blog posts providing
my contact information and copyright notice are included.)

Subscribe

Be sure not to miss each and every blog comment by subscribing to my email service. Every time I publish a comment or an update, you will be the first to know. To sign up, enter your email address in the email subscription box on the top right of this page. Thank you!

Where and how to follow Al Colombo via TpromoCom:

To contact Al Colombo, click here.

Wednesday, April 22, 2015

Algorithm: a full-length movie about hacking

<<---------- Scroll down for news. ---------->>

Algorithm is a full-length movie about hacking. It centers on a group of local hackers who stumble upon a covert operation that eventually gets several of them incarcerated, interrogated and killed. It serves to illustrate the extent to which hackers can go and to what ends.

One of the reasons why I believe that hackers hold an important part in free speech and the future of freedom is the fact that they seek open, free flow of information. The average hacker lives to uncover secrets and lies.

I'm not speaking of criminal hackers, but purists who's ideals are such that profiting from their skill is not in their belief system. This drive toward purity on the Internet is what I admire and support, although I have never hacked a computer myself and never will--simply because I do not have the necessary skill sets to make that happen.

Hacking, along with graffiti artistry, may one day be the only means we have to read the real news of the day as governments and corporations seek to censor what we read, hear, and watch on a daily basis, and that censorship will only increase over time.

So, without ado, I present the movie, Algorithm.


For the serious researcher:
ToganX.Info

Copyright©2014/Allan B. Colombo
www.alcolombo.us / al_colombo@hotmail.com
(Permission is given to republish blog posts providing
my contact information and copyright notice are included.)

Subscribe

Be sure not to miss each and every blog comment by subscribing to my email service. Every time I publish a comment or an update, you will be the first to know. To sign up, enter your email address in the email subscription box on the top right of this page. Thank you!

Where and how to follow Al Colombo via TpromoCom:

To contact Al Colombo, click here.

Thursday, April 9, 2015

Know Who's Knocking Before Unlocking

<<---------- Scroll down for news. ---------->>

In my last blog post I talked about keeping your family safe and I provided a 10-point list of things you can do to help in that mission. Today, I'd like to discuss the means whereby you can fulfill some of those points, specifically items 1 through 4.

There are many types of intercoms to choose from. Working our way down from the top two categories we're looking at:

  1. Professionally Installed, and
  2. Do It Yourself

First, allow me to say that professionally-installed intercoms are usually of better quality and they usually look better and work more proficiently than their do-it-yourself counterparts. For example, where the former will involve the routing of wires into the basement through the walls, the latter will usually not. In other words, unless you're a pro, it's unlikely you'll be able to hide your wires.

The next decision that you will have to make involves the following:

  1. Hardwired, or
  2. Wireless

Do-it-yourself intercoms are available that are hardwired as well as wireless, the latter using batteries for their method of power. The cost of this type of system is relatively high by comparison, but you will save on hiring a pro by installing them yourself. The drawback to this, however, relates to the on-going need to replace batteries and the eventual risk of corrosion and the destruction of the metallic elements inside the battery compartments.

Another possible choice is video, in addition to an intercom. Cameras come in all shapes and sizes and they offer you a unique service--they allow you to view the person(s) at the door without their knowledge. Obviously, if the caller is brandishing a gun, if there are several people and you don't know any of them, you might not want to answer the door at all. Instead, you may want to dial 911 in order to get ahead of an event that may still occur. Cameras can be installed anywhere on the house in order to watch from various approaches.

Cameras are available that contain infrared LEDs (Light Emitting Diodes) that light an area in front of the camera. There are cameras available that can see 30 feet ahead while there are others rated for 100 feet. The farther the distance, the more the camera will cost. If you're looking at the doorways, a 30-foot model will usually do the job quite fine.

Another choice is that of a video intercom where both intercom and camera are contained in the same system. The fact that both are contained in the same unit makes it easier for you to look and talk. It also means less muss and fuss on installation because instead of a camera mounted on the overhang, now it's in the outdoor intercom unit next to the door. Instead of two sets of cable to install, one of them through the attic, now there's only one.

The outdoor video intercom unit looks like a common intercom, with the exception that there's a large black section behind which there's a camera. Some criminals will know that there's a camera there, but many won't.

No matter which way you decide to go, having a means of communicating and viewing the caller is critical to your safety. Even having a simple through-the-door lens/viewer will give you a leg-up on who's standing on the other side BEFORE you unlock and open the door.

All products shown are made by Aiphone and Samsung


For the serious researcher:
ToganX.Info

Copyright©2014/Allan B. Colombo
www.alcolombo.us / al_colombo@hotmail.com
(Permission is given to republish blog posts providing
my contact information and copyright notice are included.)

Subscribe

Be sure not to miss each and every blog comment by subscribing to my email service. Every time I publish a comment or an update, you will be the first to know. To sign up, enter your email address in the email subscription box on the top right of this page. Thank you!

Where and how to follow Al Colombo via TpromoCom:

To contact Al Colombo, click here.

Wednesday, April 8, 2015

How to Assure the Safety of Your Family at Home

<<---------- Scroll down for news. ---------->>

As times get tougher we're going to see more and more crime occurring in the streets all around us. Those of you who live in the city will be especially vulnerable to criminals as well as others who may be out of work and in need of food to fee their families. I know this sort of thing is unpleasant to chat about, and I know that no one really wants to think about it, but this is a reality even now as I write this blog post.

Protecting yourself and your family is an important aspect of being a husband, a mother, or a father. It's frustrating when we fail to do so, and even worse, it can be devastating wen we fail to do so and something terrible happens because of our own ignorance or thoughtlessness.

A good example of this recently took place in Indianapolis, Indiana, where two women and three children were shot by three men. Police say the shooters were already inside the home when the shooting took place, which may or may not mean they were given access to the home by those inside.

The following list offers some advice on how to stay safe and sound in your own home:

  1. Never open the door to someone you don't know. Find out who it is before unlocking the door.
  2. Install some means whereby you can easily and quickly discern who it is that's knocking at the door. One suggesting is a simple battery-operated intercom.
  3. A camera will give you visual confirmation that a) the person is who he/she says they are, and b) that there's no one else with them.
  4. You also can install video intercom units that have both an intercom and a camera.
  5. Use a chain latch on the inside of the door to give you that extra margin of safety in case the person you're expecting is not the one you thought he was or he suddenly decides to do you harm.
  6. Install a quality deadbolt lock on all doors leading into the home. Be sure to use a single-cylinder lock with a thumb turn on the inside of the door to assure rapid escape in case of a fire.
  7. A wireless panic button worn around the neck will enable you to gain the help of others in the neighborhood as well as police and paramedics when ans where needed.
  8. If it's a service man and you were not aware of his coming to your home or apartment, ask for the name of his supervisor, call his company, and ask for the super to describe his man. If you are still unsure, ask him to come back when your husband or a friend is present.
  9. If your children walk to school, you need to be with them. Walk them to and from school every day.
  10. Have quality lighting installed outside of each entrance and make sure it works. Burglars and robbers do not like light and that will make them go elsewhere to burglarize.
There are many more possible things to do at home or at your apartment to reduce your crime risk. In the coming weeks I'll offer additional suggestions.

Al Colombo


For the serious researcher:
ToganX.Info

Copyright©2014/Allan B. Colombo
www.alcolombo.us / al_colombo@hotmail.com
(Permission is given to republish blog posts providing
my contact information and copyright notice are included.)

Subscribe

Be sure not to miss each and every blog comment by subscribing to my email service. Every time I publish a comment or an update, you will be the first to know. To sign up, enter your email address in the email subscription box on the top right of this page. Thank you!

Where and how to follow Al Colombo via TpromoCom:

To contact Al Colombo, click here.

Saturday, March 21, 2015

Convergence: The Inevitability Factor II

<<---------- Scroll down for news. ---------->>

The Inevitability Factor is an almost sure bet with regards to future events. Another way of looking at this is "a sure outcome," or "a planned meeting with destiny." I base my sense of inevitability on what we might now call Trending.

In my last blog post entitled Convergence: The Inevitability Factor, we briefly discussed the issue of the migration of technology into the human body.

Ask Kevin Warwick to look ahead a hundred years and predict where we are headed as a species, and he does not hesitate.

"The only future I can see," says the cybernetics professor at the University of Reading, England, "is one where there are perhaps humans as we know them today, but we also have the cyborg entity — the part human, part machine, with all different varieties." (click here)

Note: you can listen to Ari Daniel Shapiro's audio program by clicking on the previous link.

There are people who have invented chips to insert into the human body. These chips are capable of being joined to the human body, to the brain, for an assortment of reasons.

A human microchip implant is an identifying integrated circuit device or RFID transponder encased in silicate glass and implanted in the body of a human being. A subdermal implant typically contains a unique ID number that can be linked to information contained in an external database, such as personal identification, medical history, medications, allergies, and contact information. (click here)

If you've not heard of this before I'm sure it sounds preposterous. And even if you have caught wind of these coming events, it's becoming pretty plain to anyone who keeps an ear to the ground on tech trends that this is becoming more likely every day as technology moves forward at breakneck speed.

It's man's infatuation with high-tech gadgets that makes this migration inevitable and certain. We can determine that simply by observing the trend over time. We snatch up technologies that not only defy our past as well as our better sense, but we embrace it to the point of being extreme.

Cell phones are a good example:

...there’s a huge public health crisis looming from one particular threat: EMR from cellular phones—both the radiation from the handsets and from the tower-based antennas carrying the signals—which studies have linked to development of brain tumors, genetic damage, and other exposure-related conditions. Yet the government and a well-funded cell phone industry media machine continue to mislead the unwary public about the dangers of a product used by billions of people. Most recently, a Danish epidemiological study announced to great fanfare the inaccurate conclusion that cell phone use is completely safe. (click here)
We've heard these allegations before, and yet look at all the children, our children, who are using cell phones every single day! We know there's a danger deep in our hearts, and yet we choose to believe those who tell us they are not dangerous--the very people who have all the reason in the world to lie to us--MONEY!

Another example is the possible cause of so much of the violence we see around us, especially violence perpetuated by children at public schools:

Two recently published studies show that prolonged exposure to gratuitous violence in the media can escalate subsequent hostile behaviors and, among some viewers, foster greater acceptance of violence as a means of conflict resolution. (click here)
Again, even though we know there is danger in viewing violent content, we continue to watch violence and we allow our children to do so, too. What on earth is wrong with us?

And so, I submit to you that the progress of technology is constant and inevitable. Could mankind stop it even if he wanted to? The fact is, most of us feel helpless to change its course. It's almost like there's an unseen force at work, moving men and women to do the things they do, to create and engineer the wonders that we see coming forth from the bowels of inventiveness on a daily basis. (One day I'll share with you my thoughts on what this unseen force is.)

This is inevitability at its height and there's nothing on earth we can do to stop it, or is there?


For the serious researcher:
ToganX.Info

Copyright©2014/Allan B. Colombo
www.alcolombo.us / al_colombo@hotmail.com
(Permission is given to republish blog posts providing
my contact information and copyright notice are included.)

Subscribe

Be sure not to miss each and every blog comment by subscribing to my email service. Every time I publish a comment or an update, you will be the first to know. To sign up, enter your email address in the email subscription box on the top right of this page. Thank you!

Where and how to follow Al Colombo via TpromoCom:

To contact Al Colombo, click here.

Monday, February 23, 2015

Convergence: The Inevitability Factor

<<---------- Scroll down for news. ---------->>

One of my favorite things to do for fun as well as work is watch TED Talks. Although I am a YouTube junkie, I have to say that TED has had some of the most stimulating, enjoyable "talks" on a variety of extremely interesting topics that I have ever had the pleasure of experiencing.

This morning, about 3 a.m., I couldn't sleep as the cold and sore throat my wife had has finally made its way to my side of the bed. So I got up for a drink of water and a few minutes of computer time, which will end up to be hours as I'm working on a writing project for a well known national security company.

While in my office, I pulled up TED and watched an extremely interesting video presentation by Pranav Mistry (India) called The thrilling potential of SixthSense technology. I have not figured out how to stream video from TED, as I commonly do in conjunction with other video platforms, so you'll have to go to the TED website to watch it, but please allow me to have a few minutes of your time in which to share with you a little bit about this video, the man behind it, and his invention.

Pranav Mistry is an inventor, but even more, he's a visionary in every sense of the word. I would put him in the category of the late Steve Jobs who founded and propelled Apple into stardom. He was 28 at the time of his TED Talk, which was in 2009.

Mistry, who was practicing his wizardry at MIT at the time he made this video, invented a computer-based system that is mobile, will interact with the gestures and objects in the environment, as well as project and connect intent between digital and the real world. Mistry calls his invention SixthSense, "a wearable gestural interface."

According to Mistry, his intent was to bring the physical and digital worlds together in as intimate a manner as possible. Because people wear his invention, they can take it with them anywhere they want. I'd call this mobile computing at its best. But even more so, his invention solves several problems at the same time, which seems both efficient and sensible on its face.

First, it allows us to combine our laptop, camera, modem, cell phone, and any number of other items into a single, cohesive system. In a word, it lightens our load which can be extremely helpful to some. Secondly, it keeps us in contact with our email, cell phone, text messages, as well as our computer files and all the functionality inherent in a PC.

The Inevitability Factor
As a futurist myself, I see patterns in society and our technologies. Not only do I see patterns, but I see trends and I see something I like to call inevitability. Here's the inevitability where it relates to human-kind and our digital infatuation with technology:

One day in the future human kind has a rendezvous with these technologies as the various computerized gadgets we now commonly use migrate into the human body.

Where some might call this a marriage in heaven, others would call this convergence the work of the devil. I'm certain the truth lies somewhere between the two extremes. But for just a moment, let's project outward--let's use our ability to visualize a world where our cell phone, lap top, and a million and one other things have converged with human-kind. Are there patterns, trends, and an inevitability factor beyond this point?

To me, the answer to this question is a resounding yes.

For this moment, please take the time to watch Mistry's work via TED. Think about a world where convergence finally takes place and the inevitability of that marriage and what the implication on society might be.

Weigh everything you know about human-kind, about politicians, about rich men of great power, and think about the governments they pay big bucks to control... and we'll revisit this subject on my next weblog posting. I'll give you my thoughts on the matter, but in the mean time, please give me yours.

Al Colombo


For the serious researcher:
ToganX.Info

Copyright©2014/Allan B. Colombo
www.alcolombo.us / al_colombo@hotmail.com
(Permission is given to republish blog posts providing
my contact information and copyright notice are included.)

Subscribe

Be sure not to miss each and every blog comment by subscribing to my email service. Every time I publish a comment or an update, you will be the first to know. To sign up, enter your email address in the email subscription box on the top right of this page. Thank you!

Where and how to follow Al Colombo via TpromoCom:

To contact Al Colombo, click here.

Monday, February 9, 2015

Smart TV or Spy TV (Dumb TV)

<<---------- Scroll down for news. ---------->>

If George Orwell hadn't died in 1950, he'd be pretty proud of television manufacturers for inventing sets that contain cameras, speakers, and now, speech recognition with the capability of converting audio speech into digital data. I'm speaking of Samsung's smart TV that has the ability to listen in and send everything you say down the wire to others via the Internet.

As far fetched as it may sound, this is only be beginning. Read it for yourself!

The potential privacy intrusion of voice-activated services is massive. Samsung, which makes a series of Internet connected TVs, has a supplementary privacy policy covering its Smart TVs which includes the following section on voice recognition (emphasis mine):

You can control your SmartTV, and use many of its features, with voice commands. If you enable Voice Recognition, you can interact with your Smart TV using your voice. To provide you the Voice Recognition feature, some voice commands may be transmitted (along with information about your device, including device identifiers) to a third-party service that converts speech to text or to the extent necessary to provide the Voice Recognition features to you. In addition, Samsung may collect and your device may capture voice commands and associated texts so that we can provide you with Voice Recognition features and evaluate and improve the features. Please be aware that if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party through your use of Voice Recognition. (read it!)

Here's another headline, oddly enough from CNN: The camera in your TV is watching you.

I first became aware of this issue when reading a news item some years ago that told of China holding some kind of hack class among young teenagers where they were given an education on hacking. One of the projects was to hack the camera in an Internet-connected television.

Today's high-end televisions are almost all equipped with "smart" PC-like features, including Internet connectivity, apps, microphones and cameras. But a recently discovered security hole in some Samsung Smart TVs shows that many of those bells and whistles aren't ready for prime time.

The flaws in Samsung Smart TVs, which have now been patched, enabled hackers to remotely turn on the TVs' built-in cameras without leaving any trace of it on the screen. While you're watching TV, a hacker anywhere around the world could have been watching you. Hackers also could have easily rerouted an unsuspecting user to a malicious website to steal bank account information. (read it!)

Another story, published as far back as December, 2012, speaks of the same kind of vulnerability:

Smart TVs, particularly Samsung’s (005930) last few generations of flat screens, can be hacked to give attackers remote access according to a security startup called ReVuln. The company says it discovered a “zero-day exploit” that hackers could potentially use to perform malicious activities that range from stealing accounts linked through apps to using built-in webcams and microphones to spy on unsuspecting couch potatoes. Don’t panic just yet, though. In order for the exploit to be activated, a hacker needs to plug a USB drive loaded with malicious software into the actual TV to bypass the Linux-based OS/firmware on Samsung’s Smart TVs. But, if a hacker were to pull that off, every piece of data stored on a Smart TV could theoretically be retrieved.

As if the possibility of someone stealing your information and spying on you isn’t scary enough, according to ComputerWorld, “it is also possible to copy the configuration of a TV’s remote control, which would allow a hacker to copy the remote control’s settings, and remotely change the channel.” (read it)

Not sure I want a smart TV because it sounds pretty dumb to me.

Al Colombo


For the serious researcher:
ToganX.Info

Copyright©2014/Allan B. Colombo
www.alcolombo.us / al_colombo@hotmail.com
(Permission is given to republish blog posts providing
my contact information and copyright notice are included.)

Subscribe

Be sure not to miss each and every blog comment by subscribing to my email service. Every time I publish a comment or an update, you will be the first to know. To sign up, enter your email address in the email subscription box on the top right of this page. Thank you!

Where and how to follow Al Colombo via TpromoCom:

To contact Al Colombo, click here.

Sunday, December 28, 2014

Reservations: Sony's Interview Draws Top Dollar

<<---------- Scroll down for news. ---------->>

I have many thoughts on this one, and one of them is that Sony execs realized that the movie needed help, and considering the huge investment they had, they decided to sacrifice a finger for the good of the hand............ hence look at the headline....

So far as gov't operatives supporting the notion it was DPRK hackers, there are those in gov't who support corporations and I' sure that this could be arranged by some means.

Here is what I wrote about this earlier today on Facebook. This links to a story here: Click Here


For the serious researcher:
ToganX.Info

Copyright©2014/Allan B. Colombo
www.alcolombo.us / al_colombo@hotmail.com
(Permission is given to republish blog posts providing
my contact information and copyright notice are included.)

Subscribe

Be sure not to miss each and every blog comment by subscribing to my email service. Every time I publish a comment or an update, you will be the first to know. To sign up, enter your email address in the email subscription box on the top right of this page. Thank you!

Where and how to follow Al Colombo via TpromoCom:

To contact Al Colombo, click here.

Thursday, December 25, 2014

Rubinstein Offers Look at a potentially Dangerous Video Technology

<<---------- Scroll down for news. ---------->>

Michael Rubinstein, in his TED video See invisible motion, hear silent sounds, presents an extremely interesting and possibly dangerous video technology that allows the user to glean silent, invisible information about people, their health, their mood, and what they say to one another in private.

Uncle Sam will want a piece of this, and when he gets it, none of us will see mention of this innovative technology again as it will be buried with so many other Classified utilities like it. So be sure to take a gander at this TED video before it is no longer available.

Other Similar Disappearing Technologies

Another similar technology that has gone underground is that of weather control. During the 1950s and 1960s weather control was the talk of science. Then, quite suddenly, public discussion ceased. Rumors have abounded since the late 1990s that this capability is now a reality through a device commonly referred to as HARRP, also referred to as Highly Active Auroral Research Program.

For additional information on HAARP, refer to the HAARP information page on GKO.


For the serious researcher:
ToganX.Info

Copyright©2014/Allan B. Colombo
www.alcolombo.us / al_colombo@hotmail.com
(Permission is given to republish blog posts providing
my contact information and copyright notice are included.)

Subscribe

Be sure not to miss each and every blog comment by subscribing to my email service. Every time I publish a comment or an update, you will be the first to know. To sign up, enter your email address in the email subscription box on the top right of this page. Thank you!

Where and how to follow Al Colombo via TpromoCom:

To contact Al Colombo, click here.