Author Archive

Known as the communicator, Kristin Gabriel not only exudes a bubbly personality but she also is an excellent writer that has branded and put people, companies and products on the map for years. Gabriel writes both professionally and on a personal level. She has been writing poetry since she was a child, culminating in a collection of love poems and poems about nature, animals and life. Her work has been published in a variety of magazines through the years including New Woman, ID World, and The Digital Alley magazines, and on countless blogs and article websites. Her fiction includes short stories on a variety of topics including ghosts, relationships and pets. Professionally, Gabriel started her writing career freelancing as a beauty editor for Ambiance magazine in New York City. After a short time in advertising and public relations there, she moved to Los Angeles and became a copywriter and technical writer for three years before starting her own marketing consulting firm in 1998, now known as MarCom New Media, a division of MarCom Associates. Gabriel's writing capabilities have been honed into professional work ranging from technical manuals and training video scripts for companies like The Office Depot to ghostwriting blogs, publishing optimized online articles, email newsletters, and writing electronic press releases. She also writes website and ad copy, business plans, training manuals, white papers and industrial video scripts. Corporate writing projects have included clients including Trend Micro, Modern Postcard,, The Interface Financial Group (IFG), the Amgen in-house newsletter, The Wiley Protocol Bio-identical Hormone Therapy, Nissan, Enron Oil Company, HSC Software, Panda U.S. antivirus software, The Orange County Sanitation Department, Shell Oil Company, Maidstone Wines and Spirits (Kahlua brand), HomeClub and Personal Finance Company. A native of Albuquerque, New Mexico, Gabriel spent high school years in Santa Barbara, California, then college plus ten years in New York City, and now lives in West Hollywood, California. A graduate of Mills College, California, Kristin received her B.A. degree in communications with a minor in art history. She has been a member of the Independent Writers of Southern California (IWOSC), and was a founding member of the Marketing Club of Los Angeles (MCLA). Gabriel's writing samples can be read at

Kristin Gabriel Biography and Photo

Writer Kristin Gabriel

Kristin D. Gabriel

Kristin Gabriel is a highly accomplished marketing communications practitioner with a solid track record of delivering outstanding revenue-driven results for corporations, agencies and small business clients. For the last fifteen years, she has been focused on strategic branding, integrated marketing and public relations for emerging high technology companies and consumer brands.

Gabriel possesses strong written and verbal communications skills and she has finely honed skills as an integrated marketing and PR strategist for B2B and B2C companies. Over the years she has placed thousands of consumer, trade and business stories in targeted print and electronic media. Her most recent knowledge includes cutting edge search marketing, SEO and social media practices.

In 2012 worked on strategy and branding for start-up encryption technology company SoftKrypt and its data protection software EasyKrypt, integrating IR, PR and product marketing strategies telling the company’s story; wrote all communications materials including: press kit, sales literature, executive PPTs , demos, speeches, and business plan leading to purchase offers for EasyKrypt.

Her skills managing an SEO reputation management and campaign for Fortune 500 global anti-virus company Trend Micro Incorporated was highly successful for the company’s 2010 Titanium™ product family roll-out.

Prior, Gabriel managed public relations positioning for iolo technologies as a leading provider of Windows-based utility software for home, business and enterprise-level PCs, garnering over $1.2 million worth of media exposure in one year.

Kristin’s corporate branding, marketing communications and PR strategy for publicly-held biotech company, Applied DNA Sciences (OTCBB: APDN), a provider of embedded DNA biotechnology anti-counterfeit solutions, led to significant trade/consumer press for the company, and a higher market-entry valuation upon going public.

Working full-time as a director of corporate communications, Kristin managed IR/PR working directly under the board for CyberMedia Corporation, helping double the valuation of company leading to acquisition by Network Associates in 1998.

Kristin’s creative skills were exceptional when she conceived and launched the Symantec Antivirus Research Center (SARC). Results from one consumer campaign for Virus Awareness Month at SARC achieved a total of 55,282,791 million audience impressions within print and broadcast media.

She also managed consumer PR for digital imaging software company MetaCreations, now Viewpoint Corporation, achieving outstanding press results during pre-IPO PR campaign just prior to going public -opened at $27 per share, $9 above initial IPO price.

Other projects included: reputation branding for CyberDefender Corporation, early detection security, managing PR for Webalo enterprise mobile application; View Systems, Inc.’s weapons detection technology, online marketing for Spain-based Panda Software U.S, and PR for India-based MicroWorld Technologies.

Kristin holds a B.A. from Mills College, California, and she is based in Los Angeles, California, where she works as an n integrated marketing and communications consultant.

Post to Twitter Tweet This Post

EasyKrypt Branding – Web Copy

November 21st, 2012 No comments

EasyKrypt ( Home Page Copy
Compliance Solutions
Support Center
Log In Log In

Previous Next

What Is It?
Why You Need It?
How Do You Use It?
Who Is It For?
How to Buy It

What is it?

EasyKrypt™ is the answer. It’s an easy-to-use, affordable data protection and compliance solution.
Protect Your Small Business

Your company’s data is its most valuable asset. Losing data is no longer a matter of “if” but “when.” Today the question is can a business or professional survive the data loss? Whether accidental or criminal, you need to be protected.

EasyKrypt is next-generation data encryption that protects data even after it has been lost or stolen. Combining desktop encryption with secure cloud-based storage, EasyKrypt allows companies with up to 50 employees to easily share protected files.
EasyKrypt is always on the job, protecting your files.

Even if your company isn’t covered by federal or industry data protection rules, data loss can be expensive. Why face huge liability when EasyKrypt can protect your data simply and affordably?

Learn More ▶
EasyKrypt prevents data theft.

Access using a password, fingerprint scanner, smartphone, or a combination
EasyKrypt’s key cloud-based server keeps locked files separated from their keys
Prevents access at unauthorized times or from unauthorized locations
Uses AES 256-bit encryption (FIPS 140-2 AES-256)

Learn More ▶
Powerful encryption protection.

Protects against data theft and tampering
Secure data sharing
Access notifications
Geo-fencing – protection against file access from unauthorized locations
Robust audit functionality

Learn More ▶

VAR Register
Privacy / Legal
Contact Us
About Us

Copyright © 2012 EasyKrypt LLC. All rights reserved. All mentions of software other then EasyKrypt are copyright of their respected publishers.

Post to Twitter Tweet This Post

Categories: Web Page Copy Tags:

Business Plan – SoftKrypt

October 22nd, 2012 No comments

Contact Information

Dr. Jon Haass, Chief Executive Officer

Dr. Paul M. Hriljac, Chief Technical Officer, Chief Scientist

(928) 717-9800

3029 Dollar Mark Way, Suite A
Prescott AZ 86305

SoftKrypt At-a-Glance

• SoftKrypt is a security research and development company focused on encryption, application security and related technologies. We have applied for four patents and expect to file additional applications in 2013.

• The company was founded by two MIT mathematics PhDs who have gathered a talented team of developers, marketing professionals and advisors.

• The company’s mission is to protect data, applications and communications from theft, piracy and misuse.

• Today, global losses due to software piracy are more than $100 billion annually. Online commerce losses caused by breaches of transaction security estimates range from $25 to $100 billion annually, but those estimates seem very low and many losses go unreported.

• SoftKrypt’s primary focus is CodeBlackening™ a breakthrough digital security technology with the potential to end software piracy, protecting games, entertainment content and other applications. With CodeBlackening, hardware dongles are no longer needed to protect high-value applications.

• SoftKrypt’s competitive advantage is that Blackening is a much more rigorous method of protecting source code than others currently in use. Blackening prevents static analysis, which is the standard method of analyzing source code. Blackening is obfuscation, not encryption. We can demonstrate that Blackening works, but additional development is necessary to prove its potential and create implementations for specialized markets.

• Used with CodeBlackening, our implementation of Fully Homomorphic Encryption (FHE) can secure online transactions and mobile applications (at least). The goal: Fully encrypted transactions using programs and data that are never decrypted.

• CodeBlackening and FHE are potential game-changers and could create a $50 million to $100 million business if the ability of prevent piracy is valued against the losses now being sustained. The size of the potential market and service to the industry is much larger. The timing of this revenue is, however, difficult to estimate because of the disruptive nature of these technologies.

• Our desktop compliance and encryption application, EasyKrypt™ was created to generate revenue to support the development of Blackening and FHE. We have not had the resources to fully develop and market EasyKrypt and the current demonstration only hints at capabilities for which code is already complete.

• CodeBlackening/FHE revenue will come from development services, licensing, technology partnerships and government contracts. EasyKrypt revenue is based on product sales (subscription license on a per seat basis).

• Given funding, we would use the EasyKrypt foundation to follow the original vision of building multi-user and enterprise applications for regulated industries and government. Alternately, EasyKrypt could be sold or spun-off.

Table of Contents
SoftKrypt At-a-Glance 2
Introduction 5
The Problem 5
Market and Industry Analysis 6
SoftKrypt Solutions 7
Blackening and Fully Homomorphic Encryption 8
Target Market and Strategy Summary 9
Market Validation 10
Blackening Competitors 11
Blackening/FHE Competitive Advantage 11
Blackening/FHE Go-to-Market Plan 12
EasyKrypt 13
Intellectual Property 14
Management Team 15
Paul Hriljac, Ph.D., Founder and Chief Technology Officer 15
Jon Haass, Ph. D., President and Chief Executive Officer 16
Ira Kharasch, Director, Investor Representative 17
Other Management and Staff 17
Corporate Advisor 19
Corporate Videos 19
Addenda 20


SoftKrypt’s mission is to create a world where every credit card transaction is guaranteed safe, where software piracy is no longer possible, and where data is intelligent enough to request authorization before it is used. The company’s patent-pending technologies make this possible.

Founded by two MIT mathematics Ph.D.’s, SoftKrypt has invented technology that can stop software piracy and end a large percentage of today’s cybercrime, without requiring significant changes to the Internet or software development techniques.

The company can today demonstrate these patent-pending technologies and has published technical descriptions of how they work. The US Air Force and other strategic partners have validated SoftKrypt technology.

We are seeking funding necessary to commercialize our inventions, create new ones, and take these technologies to market.
The Problem

Information is at risk of being stolen, applications and games are being pirated, revenue is being lost and people and companies are damaged, sometimes beyond repair.

General Keith Alexander, Head of Cyber Command and Director of the National Security Agency (NSA) calls this the “greatest theft in history” with a price tag approaching $1 trillion per year globally. Information Security has become National Security. The economies of the world are at risk in cyber space.

SoftKrypt fights crime and protects sensitive data. Our primary mission is stopping software piracy, protecting confidential information, and securing online transactions. We believe our technology can achieve these goals.

Everyone who creates or uses packaged or custom-developed software is a potential user of our CodeBlackening™ technology. Likewise, everyone who does business or runs applications online is a potential user of our implementation of Fully Homomorphic Encryption (FHE). Companies and individuals with privacy concerns or compliance requirements can turn to our EasyKrypt™ application to protect sensitive information.

We estimate the total global losses due to software piracy that can be addressed with CodeBlackening technology to be more than $100 billion annually. $59 billion in software was illegally used in 2010 with the average revenue from software per use continuing to slide. (Source: Forrester Research)

Fully Homomorphic Encryption (FHE) can be used alone or in concert with Blackening to provide end-to-end security for online transactions. Estimates for global losses in online commerce due to breaches of transaction security range from $25 to more than $100 billion annually. SoftKrypt technologies can be used to minimize these losses and in many cases eliminate them.
Credit and debit card fraud is the No. 1 fear of Americans in the midst of the global financial crisis. Concern about fraud supersedes that of terrorism, computer and health viruses and personal safety. (Source: Unisys Security Index: United States, March 2009)
The explosive growth of e-commerce has given rise to security concerns from every part of the payment transaction. Cardholders worry about the safety of online transactions and the privacy of their personal information.

Card issuers are concerned about the risks of payment fraud and the high-cost of managing payments.

U.S. online shopping is set to grow 10 percent each year to reach 8 percent of total retail sales by 2014. European e-commerce will grow about 11 percent during the same time period (Source: Forrester Research)
The size of the potential market for SoftKrypt technologies is difficult to estimate but is certainly very large and global in scale.
Market and Industry Analysis

Global losses due to software piracy are today more than $100 billion annually. Estimates of online commerce losses caused by breaches of transaction security range from $25 to $100 billion annually. Application software and data protection is a global problem representing an approximate $63.4 billion annual loss to software publishers in 2011 alone.

The global theft rate for PC software hovers at 42 percent, while PC gaming has a 93-95 percent loss rate, according to Ubisoft CEO Yves Guillemot. The online and mobile social gaming industry segments are experiencing double-digit growth year-over-year. Combined they are projected to reach $28 billion by 2015, while the entire game market is projected to top $74 billion in 2012. (Source: Gartner.) The total global losses due to software piracy that can be addressed with CodeBlackening technology exceed $100 billion annually

SoftKrypt Solutions

Our patent-pending CodeBlackening process will end piracy by securing application code against theft, tampering and reverse engineering, while our patent-pending implementation of Fully Homomorphic Encryption (FHE) provides end-to-end protection for mobile applications and online transactions

SoftKrypt has also created EasyKrypt the easiest way to secure and encrypt confidential information on the desktop, server, in the cloud or in email. Scalable from personal to enterprise customers, EasyKrypt is an information protection and security tool primarily intended for businesses needing to securely share confidential information and meet privacy compliance requirements. It also supports email distribution of private information to clients.

One of the company’s challenges has been managing two businesses that seem related to the team but appear unrelated on the outside. EasyKrypt began life as a testbed for Blackening-related technologies but was quickly realized as a commercial opportunity as well.

The original vision for EasyKrypt as a product was for a compliance and encryption tool allowing groups and enterprises to easily share encrypted files. Cloud features and automatic backup were later added to the design.

Regulations (HIPAA, FINRA, SOX, et al) will soon require encryption for sensitive files growing the ready market for endpoint data protection. Gartner says the growth of this market segment is faster than the 13 percent growth for the $38 billion cyber security market as a whole. The company initially focuses on the underserved $2 billion+ SMB market of legal, accounting, medical and others. With the mobile and cloud offerings, this could become viral and open an untapped consumer market (over $2 billion) for privacy and protection in 2014 and beyond.

Blackening and Fully Homomorphic Encryption

CodeBlackening is a powerful new form of software application security that prevents analysis of computer programs and provides protection against tampering, piracy, and reverse engineering. Provisional patents have been filed for two other innovative technologies.

The diagram above describes the process of Blackening application code.

Blackening is a mathematical algorithm that rewrites the source code of a computer program in a way that intertwines all of the variables of the program in a way that prevents reverse engineering or analysis. It also prevents the alteration or removal of a variable.

Variables can be added to the program, which enforce the situations allowing their use. For example, one of the variables that can be added to a program prior to Blackening is a call to an auxiliary function that calculates a check sum or hash value of the programs executable.

If the check sum is incorrect, the program will not run properly. Blackening prevents the program from functioning correctly if the program has been modified in any way.

SoftKrypt has two patents pending on its CodeBlackening technology and several trade secrets that are unique to its application.

We are in the process of selecting partners for our first Blackening of third-party commercial software, necessary to prove the usability and value of our solution. Once these projects are complete, we intend to offer Blackening as a service and eventually, as a toolkit for software developers.

Pending funding, we will have the first partner projects completed in early 2013, expect to begin offering Blackening as a service in mid-2013 and complete the toolkit in 2014.

Fully Homomorphic Encryption (FHE) technology supports processing data without the need to decrypt the data. This enables secure cloud computing. SoftKrypt has developed a practical scheme, faster than any other, to implement FHE, sometimes considered the “Holy Grail” of encryption technology.

FHE allows a CodeBlackened application to use encrypted data without the need for decryption at any stage in its execution. FHE can protect applications, data and communications to provide a secure computing environment for mobile, on-line or cloud centric transactions. Our implementation is many times faster than others that exist in labs today.

SoftKryptFHE™ will be productized for enterprise, commercial, government and military use in early 2014.

Technology validation is evidenced by the selection of CodeBlackening in winning a competitive contract from the United States Air Force Office of Scientific Research (AFOSR). Companies writing letters of endorsement included Smartronix and General Dynamics. Companies evaluating the technology include Intel, Johns Hopkins Applied Physics Lab and L3-Stratis.
Target Market and Strategy Summary

SoftKrypt’s target market includes companies worldwide that are suffering losses due to software piracy and online transaction-related theft. The NSA estimates cybercrime costs more than $1 trillion annually.

Piracy alone is a global problem representing an approximate $63.4 billion annual loss to software publishers alone in 2011.The global piracy rate for PC software hovers at 42 percent, while PC gaming has a 93-95 percent piracy rate.

Research shows that more Americans than ever – 72 percent of U.S. households – play computer or video games. The online and mobile social gaming industry segments are growing double digits year-over-year, combined they are projected to be $28 billion by 2015 while the entire game market is projected to top $74 billion in 2012. (Source: Gartner.)

“Online piracy is inhibiting the video game industry’s innovation and throttling its job creation capability in the U.S. Export sales are critically important to U.S. video game publishers, but are disrupted in markets that are already flooded with unauthorized copies,” said Michael D. Gallagher, CEO of the Entertainment Software Association (ESA), which represents U.S. computer and video game publishers.

Anything that can turn pirates into paying customers will dramatically improve profits for gaming companies, who are forced to frequently update their products solely to stay ahead of piracy. If piracy could be lessened, release cycles could be lengthened, giving versions longer lives and reducing development costs.

Business applications are also subject to piracy, including high-dollar industry specific programs and software.

Market Validation

SoftKrypt technologies have been chosen by the United States Air Force as a valid and effective response to the nation’s growing cybersecurity threat.

The company was selected, through a competitive bidding process, to develop prototype solutions to protect applications deployed in “AppStore” type distribution environments.

SoftKrypt’s technologies have already been reviewed by the Air Force Office of Scientific Research (AFOSR) after the company submitted its Phase I Small Business Technology Transfer Research (STTR) Final Report, which was accepted without the need for revisions. This program funds the transfer of concepts, technology from academia into commercial world with the objective to benefit the DOD.

The Blackening technology and in particular the prototype for the Blackening toolkit was outlined and submitted in response to a second contract request. It is anticipated that these solutions will be widely adopted for future military, government and commercial computer; cloud and mobile software/data secure delivery.

In our subsequent proposals to the government for additional funding, we received letters of endorsements that anticipate the testing, use and fielding of a pilot version of the CodeBlackening toolkit.

Companies writing letters of recommendation included Smartronix, General Dynamics. In addition, the CTO of L3 Stratis, a major defense technology contractor, has reviewed and endorsed our technologies.

An overview of Blackening was presented at the conference “New Aspects of Mathematics,” organized by Embry-Riddle Aeronautical University and Mary Washington University.

Blackening Competitors

In the CodeBlackening arena, the company has identified two primary competitors; others may also exist though we have not met them in bids or deals.

Semantic Design offers program obfuscation. This is a technique which makes programs harder to reverse engineer, it can include methods such as removing comments, renaming variables, encoding constants in hard to read form, etc. Their approach can still be exploited using static analysis.

Arxan offers tamper resistance based on the introduction of silent guards throughout a piece of source code. These guards calculate checksums on code blocks and interfere with the normal course of the code if the checksums are incorrect. However, the guards themselves are ultimately only protected by simple obfuscation techniques.

SoftKrypt’s Fully Homomorphic Encryption has no competitors other than companies and research institutions who also are attempting to develop this capability to secure online transactions. In the news recently are researchers at Stanford University and IBM Research with lab solutions that they report are able to perform millions of times too slow for practical use today.

Blackening is a much more rigorous method of protecting source code. For example the nature of Blackening prevents static analysis, which is the standard method of analyzing source code that has been obfuscated.

Arxan offers tamper resistance based on the introduction of silent guards throughout a piece of source code. These guards calculate checksums on code blocks and interfere with the normal course of the code if the checksums are incorrect. However, the guards themselves are ultimately only protected by simple obfuscation techniques. Thus the system can be attacked by methods that perform deobfuscation. Blackening is a much more powerful method that resists such techniques.

Blackening/FHE Competitive Advantage

SoftKrypt’s competitive advantage is that Blackening is a much more rigorous method of protecting source code than others currently in use. Blackening prevents static analysis,
which is the standard method of analyzing source code. Blackening is obfuscation, not encryption. We can demonstrate that Blackening works, but additional development is necessary to prove its potential and create implementations for specialized markets.

Used with CodeBlackening, our implementation of Fully Homomorphic Encryption (FHE) can secure online transactions and mobile applications (at least). The goal: Fully encrypted transactions using programs and data that are never decrypted.

CodeBlackening and FHE are potential game-changers and could create a business $50-$100 million that could grow if the technology is valued based upon the piracy it prevents. The timing of this revenue is, however, difficult to estimate because of the disruptive nature of these technologies.
Blackening/FHE Go-to-Market Plan

The company is now demonstrating the feasibility and ROI of CodeBlackening and FHE technologies through pilot and outside analysis of our techniques. In early 2013, we will work with several reference client/partners to Blacken their applications and gain key customer testimonials.

In late 2013, we will be offering CodeBlackening as a service to large customers and commercialize FHE to protect mobile applications and transactions. CodeBlackening and FHE will be licensed to software developers, system integrators, and large commercial organizations, both as a service and an SDK (Software Developers Toolkit). Hosted CodeBlackening/FHE could also be offered, especially for mobile applications and those requiring tight end-to-end security.

The market potential for CodeBlackening and FHE is huge and the challenge will be to identify and focus on the segments that need and value the security offered by these two novel approaches to security. 


EasyKrypt is the company’s proof-of-concept product, which implements both Blackening another of the patent pending technologies (Cloud Based Key Management). EasyKrypt provides affordable, easy-to-use data protection for the small to medium-sized businesses, focused on medical, legal, accounting, financial, insurance and other industries that must meet regulatory compliance standards.

EasyKrypt secures sensitive, valuable information stored on laptops, desktops, network storage or in the cloud.

EasyKrypt delivers protection against all forms of data theft with advanced features including secure data sharing, notifications and geo-fencing, which protects against malicious access from unauthorized locations, while providing robust audit functionality.

Upon release in 2014, EasyKrypt Enterprise™ will support more than 40,000 users and provides transparent encryption for customers with advanced cloud-based key management features.

Mac and Mobile products are planned as well.

EasyKrypt was imagined as a multi-user, cloud-enabled compliance and encryption/privacy application for business and government. Much of the foundation has been completed. The current product demonstration is a single-user encryption product with an improved user interface developed for the Freemium/paid-upgrade market, but never released. With additional funding, we plan to release this version and resume development of multi-user, Mac, mobile and enterprise products based on the existing EasyKrypt foundation.

Intellectual Property

Patent pending for CodeBlackening. CodeBlackening is a mathematical algorithm that rewrites computer source code in such a way that it makes it impossible to analyze or reverse engineer. The algorithm performs nonlinear algebraic transformations to the instructions of a computer program resulting in new source code with all the variables interrelated in a way that prevents any of them from being isolated. This eliminates the possibility of static analysis or any other method of deconstruction. The patent was applied for late 2010.

Patent pending for Fully Homomorphic Encryption (FHE). Based on CodeBlackening Technology, SoftKrypt has applied for a patent that implements Fully Homomorphic Encryption. This technology allows for the alteration of data and programs that process that data so as to make them cryptographically secure. The result is that the data is encrypted and the altered program can process that data without the need to ever decrypt the data. The result would be the creation of data processing facilities that take full advantage of cloud-based methods, which are very economical, without sacrificing any security considerations.

Patent pending for Data Base Key Management. SoftKrypt has developed an innovative way to perform key sharing and management. This system is based on a new type of data base design that facilitates user authentication and file sharing. This design facilitates cloud based security protocols.

Patent application in process for software tamper proofing. Based on its CodeBlackening, SoftKrypt has devised a new algorithm that makes software impervious to tampering by unauthorized third parties. This process makes programs that run in application space as difficult to hack as kernel level programs.

Patent application in process for a web based key sharing protocol. This new system of key sharing performs novel identity management capabilities and is based on our key data base architecture. Additional patent applications in preparation.

Management Team

Paul Hriljac, Ph.D., Founder and Chief Technology Officer

Professor Hriljac is a mathematician and inventor of SoftKrypt’s patent-pending CodeBlackening™ and Fully Homomorphic Encryption (FHE) technologies.

As Chief Technology Officer, Dr. Hriljac (pronounced “rill-jack”) is responsible for all SoftKrypt research and development activities.

Dr. Hriljac is an MIT-trained mathematician with a special interest in the mathematical aspects of computation, number theory, encryption, cybersecurity and algorithm development.

Since 2009, he has been a Professor and Chairman of the Department of Mathematics and Computer Science at Embry-Riddle Aeronautical University (ERAU) in Prescott, AZ. Dr. Hriljac joined the university in 1995.

For the past 12 years, U.S. News & World Report has ranked ERAU as America’s top college for aviation and aerospace education.

Earlier, Dr. Hriljac was a scientist at MITRE Corporation, creating signal-processing solutions for data algorithms and information systems. He was also previously lead mathematics analyst at Pacific-Sierra Research Services, Inc.

He has also been an Assistant Professor of Mathematics Columbia University and at New Mexico State University.

The author of more than twenty published research papers, he received a B.S. in Mathematics from the University of Illinois, and a Ph.D. in Mathematics from MIT. His dissertation was titled: “The Neron-Tate Height and Intersection Theory on an Arithmetic Surface.”

Jon Haass, Ph. D., President and Chief Executive Officer

Dr. Haass is in charge of overall operations for SoftKrypt with responsibility for the day-to-day operations driving funding, partnerships and contracts with government and corporate organizations.

His role is key to the company’s mission of delivering value and opportunity in digital rights management and private property control in the next generation of Internet commerce and communications.

Immediately prior to joining SoftKrypt, Dr. Haass worked as a consultant, providing strategies, executive and team management, and coaching to major technology companies including Accept Software, Siebel Systems, Silicon Image, Intel, Big Band Networks and Sun Microsystems.

In 1998, as a founding member of Sendmail Inc., the Internet’s leading email server software, Dr. Haass was vice president of business development and secured more than $30M in funding/revenue from Intel, IBM, Red Hat, Adobe and others. The Sendmail utility continues to ship with every Linux / UNIX operating system under Open Source license.

He was also vice president of marketing and product management at Open TV, Inc., a leader in the digital television industry and led multimedia product development at Sun Microsystems, Inc.

In 1984, Dr. Haass also co-founded a company to create an innovative navigational product based on CD-ROM and geographical information system (GIS) technology. Initial market was large marine vessels.

The holder of three patents and more than 396 forward patent citations since 1996, Dr. Haass received his BS in mathematics and a BS in physics from the University of Wyoming and a Ph.D. in mathematics from MIT, where he was the CLE Moore Instructor and Senior Lecturer.

Ira Kharasch, Director, Investor Representative

Mr. Kharasch is a senior partner at Pachulski, Stang, Ziehl & Jones, a prominent national business and workout law firm.
He has negotiated and spearheaded business reorganizations and workouts of many significant companies including Pacific Energy Resources, Plainwell and Telogy.

Mr. Kharasch is a graduate of the University of Illinois and received his J.D. from UCLA. He holds an AV Preeminent Peer Rating, Martindale-Hubbell’s highest recognition for ethical standards and legal ability, and has been named a “Super Lawyer” in the field of Bankruptcy and Creditor/Debtor Rights in a peer survey conducted by Law & Politics and the publisher of Los Angeles Magazine.

He is admitted to practice in California, New York and Alaska and is a resident of Los Angeles.
Other Management and Staff

Tim Lewis, Director, Product Development
Mr. Lewis is responsible for product management and development. He has 11 years of experience as a technologist for Microsoft combined with another nine years of running his own private technology company, providing him with the product knowledge and customer insight to design and productize very complex technology to businesses and consumers so that it is comprehensible and intuitive.

Besides paid staff (executives and developers), SoftKrypt has assembled a team of contractors who provide their expertise to the company on an as-needed basis.

Kristin Gabriel, Senior Vice President Marketing – Ms. Gabriel is charged with marketing, search, advertising and public relations, with her primary efforts directed to branding the company and driving sales and revenues. During her career, Gabriel has managed national corporate communications campaigns for global clients such as Applied DNA Sciences, CyberMedia Corporation, Honda Motorcycles, Panda U.S., Symantec, Trend Micro Incorporated, and Union Carbide’s Eveready Batteries. Her specialty is early stage technology and security companies managing the investor relations and marketing process towards an IPO.

Mike Coop, Vice President, Government Affairs
Mr. Coop is responsible for business development and marketing in the government sector and has been responsible for the success in establishing credibility, gaining access to decision makers and influencers in various branches of the government. Mike was instrumental in obtaining Booz Allen endorsements for the Air Force OSR STTR contract. He is also working to establish with DISA, a STIG for application security, and using concepts from SoftKrypt’s Blackening approach. He has worked with Cranite Systems, Microsoft, Cisco, Smartronix, and General Dynamics.

Elizabeth Magliana, Vice President of Sales – Offers extensive experience in business development and operations, both domestically and internationally. She has demonstrated the ability lead a highly effective sales and marketing team in startup and expansion company environments for companies such as Peter Norton Computing, and Symantec Corporation.

David Coursey, Technology Strategist – Mr. Coursey helps develop marketing strategy, works with the development team on product and user experience issues, hosts corporate events and is part of the corporate editorial team. A 25-year technology veteran, he is a blogger for and other industry publications. Coursey has previously written for PC World, InfoWorld, ZDNet, Computerworld, and many other publications. The author of two books published by Peachpit Press, he is also a former CNET Radio and television commentator and radio talk show host.

Mike Keesling, Director of Online Marketing Strategy — Mr. Keesling handles the online marketing strategies in support of the overall the marketing and advertising efforts for SoftKrypt. He has been doing search engine optimization (SEO) and marketing since 1996, and prior worked at Chiat\Day, a Los Angeles-based advertising agency. He has spent most of his career launching, branding and marketing small business and startup ventures with occasional forays into the corporate world.

Robert La Folette, Creative Director – Mr. La Follette is responsible for directing creative work including audience promotions and advertising, overseeing print production, graphic art, web and social media design, software design and development, user interface, and corporate identification. La Follette has worked for Apple Computer Corporation, and he spent seven years as creative director at Sunbelt Software.

Harry Magnan, Director of Technology Communications – Mr. Magnan facilitates business process writing, technology and marketing communications. He has extensive experience in enterprise level applications and developing and implementing processes and procedures for business, manufacturing, engineering, development, quality assurance and human resources environments. He has worked for companies including Nexant, Cisco, Amgen, Blue Shield of California, Oracle, Medtronics, IBM, CyberDefender, Siebel, Acta Technology, Quintus Corporation, Symantec Corporation, and MetaCreations Software.

(Ms. Gabriel and Messrs. Coursey, Keesling, La Follette and Magnan are part of MarCom New Media, Inc., a West Hollywood, CA-based digital marketing and corporate communications firm).

Corporate Advisor

Ronald S. Posner – has been a leader in the consolidation of the high technology, Internet and software industries for more than 30 years. His record of accomplishment as a CEO, investor and board member shows improved market values and liquidity results for companies in record time frames.
Corporate Videos

About SoftKrypt Investor Video (
Blackening Technology (
Paul Hriljac on Blackening (

SoftKrypt™, EasyKrypt™, SmartKrypt™ and Blackening™ are trademarks of Advanced Cryptographic Methods and Engineering (ACM\E).


These additional documents are provided to expand on topics discussed here.

CodeBlackening White Paper

EasyKrypt Datasheet

Local newspaper story about SoftKrypt

Ponemon Institute, March 2012: 2011 Global Cost of Data Breach Study

SHADOW MARKET: 2011 Business Software Alliance study of global software piracy

Post to Twitter Tweet This Post

Categories: Business Plans Tags:

EasyKrypt Data Sheet

October 16th, 2012 No comments

EasyKrypt is affordable, easy-to-use data protection software. Review the EasyKrypt product data sheet.

Post to Twitter Tweet This Post

Engaging in Mobile Marketing

December 24th, 2010 No comments

The future of technology and marketing is about mobile smart phone apps, their multiple layers, and engagement. Morgan Stanley forecasts more consumers will access the Internet by mobile devices than PC’s in five years, while analysts are predicting that people will use their phones for mobile money transfers; location-based services; search and browsing; health monitoring; bill payment; Near Field Communication (NFC) services; advertising;  music, and instant messaging.

The CTIA Wireless Association states that 250+ million Americans carry mobile phones – over 80 percent of the population in the United States. But China and India are leading the world with the most mobile subscriptions. In October 2010 the International Telecommunication Union (ITU) said these two countries added 300 million new mobile subscriptions in 2010 alone.

According to ABI research, the market for mobile marketing and advertising would reach $19 billion by 2011. Now on the cusp of exploding, the global opportunity is huge, and marketers need to be thinking about mobile apps and strategic search marketing for their customers. Online companies like and is doing a terrific job in this area.

Google’s Chairman and CEO Eric Schmidt recently talked about the new Near Field Communication (NFC) chips at the San Francisco Web 2.0 Summit. Schmidt believes, “mobile first” is our future. The chips are embedded in smart phones which are location specific and network aware, in addition to knowing more about users. These are turning the cell phone into a security devise with more power than a desktop computer — creating mobile devices that are payment systems, eventually replacing credit cards.

What’s more search marketing is likely to morph again very soon, as smart phone technology will track where you are, what you need, and all the stores nearby where you can purchase the items. Access will be by applications. There are already more than a half-million apps. Imagine all the tie-ins for mobile marketing, social media marketing and advertising. Currently the most used mobile apps in the US include news; games; maps; social networking and music. (Facebook, Google Maps and The Weather Channel (TWC). By the year 2013, the demand for mobile apps downloads is expected to peak. This trend is being tapped as “M-marketing,”

As apps continue to grow, search engine marketing will get exponentially bigger as a rapidly growing global mobile audience will be ripe for everything from edutainment, lifestyle, and medical advice apps. You Tube is currently receiving 35 hours of uploaded videos a minute. As a strategic customer relationship management (CRM) tool this new engagement vehicle will drive customers to retail outlets and point of purchase through mobile loyalty programs, promotions, contests and trackable, measurable mobile advertising.  And the good news is that is’s all about increased revenues.

If you are in business, then you need to prepare now, for dealing with customers in an entirely new way in the future. MarCom New Media is already deeply involved with guiding our clients towards developing mobile apps, permission-based search marketing, social media and new media PR. Check out our work in MarCom’s new social media press room. We also have the inroads for partnering with the companies and platforms behind the scenes that are making all of these exciting new socially engineered technologies happen to reach customers today in a better way.  And just a word to the wise, it is way too hard for you to try to go it alone. Call MarCom New Meida at 323.650.2838 or go to 

To watch the hour long interview, “A Conversation with Eric Schmidt” with John Battelle (Federated Media Publishing), and Tim O’Reilly (O’Reilly Media, Inc.).

Post to Twitter Tweet This Post

IFG Financial Newsletters

November 17th, 2010 No comments

At MarCom New Media Kristin writes monthly newsletters for client the Interface Financial Group (IFG) focusing on small business finance and factoring. Visit the following links: 

Post to Twitter Tweet This Post

My favourite thing is to go where I’ve never been. – Diane Arbus

September 20th, 2010 No comments

You like a sailor
With a wondering heart
Have been hiking out
On the sea of life
Riding winds and the tide
Suspending your mind.

Like a cautious bird
Frightened by
A shift in the wind,
Are the white gull fleeting
Up into the troubled sky
To a slight clearing
Almost disappearing.

Like the crest in a wave
On life’s enduring sea
Are often turbulent
And searching
To find the sandy shore
Nothing more.

Post to Twitter Tweet This Post

NSL’s 2010 Sleep in America Poll: Asians Get a Better Night’s Sleep

September 10th, 2010 No comments

A recent Sleep in America poll sponsored by the National Sleep Foundation’s (NSL) 2010 found that Asians are the most likely ethnic group to say that they had a good night’s sleep at least a few nights or more a week.

T.S. Wiley, who wrote Lights Out: Sleep, Sugar, and Survival talks about how the light bulb put us out of sync with nature. In days gone by, people spent the summer sleeping less and eating heavily in preparation for winter because light triggers the hunger for carbohydrates. Now, with light available 24 hours a day, we gulp down food all year long, and we spend more time indoors, in light.

It seems as if Asians are about half as likely to discuss their sleep issues with a healthcare professional. They are also half as likely to report having been diagnosed with a sleep disorder. The least likely to report using sleep medication at least a few nights a week (5 percent versus 13 percent Whites, 9 percent Blacks/African-Americans and 8 percent Hispanics), Asians are also the least likely (9 percent) to say that they “rarely” or “never” have a good night’s sleep. This is compared with 20 percent whites, 18 percent of Blacks/African-Americans, and 14 percent Hispanics.

The poll also shows that Asians are more than twice as likely to use the Internet every night in comparison to any other group (51 percent versus 22 percent Whites, 20 percent Blacks/African-Americans, 20 percent Hispanics)

In addition, Asians are also the least likely to watch TV an hour before sleep 52 percent versus 64 percent Whites, 72 percent Hispanics and 75 percent Blacks/African-Americans)

Asians report the use of herbal and alternative therapies at rates similar to Hispanics (2 percent each), but less than Whites (4 percent).

Asians report the lowest rates of losing sleep due to personal financial concerns at least a few nights a week (9 percent versus 22 percent Hispanics, 20 percent Whites and 19 percent Blacks/African-Americans).

We have all heard about some of the things we can do to improve our chances of getting better quality sleep. Here are some of the tips:

-The bed and bedroom is for sleep and sex only.
-You need to establish a regular bedtime routine and a regular sleep-wake schedule.
-Never eat or drink too much close to bedtime.
-Try to create a sleep-promoting environment that is dark, cool and comfortable.
-Always avoid disturbing noises – consider a bed-side fan or white-noise machine to block out disturbing sounds.
-Learn more about how you can get a good night’s sleep with these tips, or check out this sleep boxset with a helpful book.

For more information go to

« Medical Pracitioners Love T.S. Wiley’s “Two Days Back on Earth” Environmental Endocrinology Seminar Bioidentical Hormone Replacement Therapy and Progesterone »

Post to Twitter Tweet This Post


September 9th, 2010 No comments

Miles and miles …
Of dust and tumbleweeds
Traveling along bumpy roads
Daylight headlights
In the distance
Where purple mountains’ majesty
Loom in the glorious sky
Where Nevada winds blow

They know no different …
Desert rats in a maze
Junkyards of life’s memories
That might bring someone a day’s pay
Old rusty carcasses of cars, flat tires
Naugahyde and beer bottles
Tell a tale, like the stench
Of a depressing Casino
Where people play day after day

And the RVs keep on moving …
And the smiles survive
They watch curiously and wait
Placing their bets on whether
It’s a ’60’s Bentley or Rolls.
Cautiously, yet with ease
They speak to foreigners
Too curious not to find out
Yet friendly enough
To wave hello

You say you love the desert …
The cactus and old Santa Fe tracks
With the centipede-like train
Winding its way through the hills
In the distance, cotton ball clouds
In the rear view sunset
Make their way for the moon
To hover above
And light the way in the night

Near the border …
You tell me you’re ready
For a scotch and me.
And have been all day
You drink in life’s pleasures
Caress and excite
Give and take me
Then we sleep ’till dawn
And I love to be

Around noon …
Just like you said
In the middle of nowhere
By a railroad crossing
Stands the now deserted gas station
Your quest quenched like your thirst
You wonder who took the old gas pumps
“And Chuck…he’s dead,” said the old man

Later that night at home …
Reflecting over fine red wine
You remind yourself and me
One should never go back to old times
And I think it’s so sad but true
As I look at your photograph
On the calendar
From four years before

Kristin DeAnn Gabriel, February 1989

Post to Twitter Tweet This Post

The Desert of Love

September 5th, 2010 No comments

You’re a desert flower
that blooms late at night
The fragrance lingers
into the morning light

You’re like water in the desert
To a hard working boy
Badly in need
Badly in need
of romance
Ohh…give love a chance

Let me fall into your mind
then quench my desire
Just touching you
sets my heart on fire

Let me drink in life’s pleasures
it’s not wrong or right
You know how passion
is so hard to fight

I can smell love coming
The heat is really on
Uhhh, ohh, uhhh ohh
When I’m think’n of you
I get so turned on

Look into my soul
and tell me what you see
Put out those flames
and set my spirit free

Like water in the desert
love is so hard to find
The chance for romance
is all in the mind

Like flames in a fire
to a sad lonely girl
Badly in need
Badly in need
of romance
Ohh…give love a chance

Post to Twitter Tweet This Post

Categories: Poetry Tags: