Date post: | 14-Jan-2015 |
Category: |
Self Improvement |
Upload: | jinger-jarrett |
View: | 1,293 times |
Download: | 0 times |
The Veterans'
Guide
to Protecting Your
Privacy
and Staying Safe
Online
JINGER JARRETT
Copyright
2013, Jinger Jarrett, All rights reserved.
Apart from any fair dealing for the purposes of research or private
study, or criticism or review, as permitted under the Copyright,
Designs and Patents Act 1988, this publication may only be
reproduced, stored or transmitted, in any form or by any means,
with the prior permission in writing of the author. Inquiries
concerning reproduction outside those terms should be sent to the
author.
The use of registered names, trademarks etc. in this publication
does not imply, even in the absence of a specific statement, that
such names are exempt from the relevant laws and regulations
and therefore free for general use.
The publisher makes no representation, express or implied, with
regard to the accuracy of the information contained in this book
and cannot accept any legal responsibility or liability for any
errors or omissions that may be made.
Author Website: http://jingerjarrett.com/
Dedication
This book is dedicated to my daughters: Ashley, Danielle and
Alexandra. They are the most important people in my life and
have done more for me than anyone. You have no idea how much
I appreciate it. You are the main reason I am still here.
Gallant Few
http://gallantfew.org
Proceeds from the sale of the software with affiliate
programs that are listed in this report will be donated to help
the work and mission of this organization. (Please feel free to
distribute this as widely as possible in support of Gallant Few.
You may give it away but please do not sell it.)
INTRODUCTION
If all that cloak and dagger stuff some veterans wanted to
engage in online worked, I wouldn't have the ability to tell your
life's story in 15 minutes. The problem with lying or trying to
mask the details of your life without a really good cover story is
that eventually it catches up with you and destroys your
reputation, you get exposed, and everyone knows who you really
are, or you end up compromised and hacked. If you're a veteran
who owns a business, you don't want to risk having your business
compromised, your reputation ruined and all your money stolen
because you didn't protect yourself.
There are real ways to protect your privacy online, reduce
your chances of getting hacked and keep your information safe.
I've been on the Internet since 1995, and I was a computer tech in
the Army back in the 80s. I've learned a few things along the way,
and I want to share those things with you so you stay safe and
don't get ripped off, scammed or have your privacy compromised.
There five lessons plus the lesson on navigating the Veterans'
Affairs system to help you get your benefits. Part of the course is
in text to present the resources you need for your computer. The
rest is presented in video to show you how to get the job done
quickly and make yourself secure.
Use this information for good. It is meant to protect you and
keep you safe. This is my gift to the Veterans' community. I didn't
serve in combat, and I was never combat arms. However, I can
help protect you now if you are willing to listen. Thank you for
your service. No one left behind. Not on the battlefield. Not in
life.
Sincerely,
Jinger Jarretthttp://jingerjarrett.com/
Lesson 1 - Secure Your Computer
Starting right now let's secure your perimeter online and
offline as far as protecting yourself against intruders on your
computer and the internet. Although some of this information will
seem basic to some of you, to others it will really open your eyes
to the threats online. Use this material to your benefit and stay
safe.
One of the most important lessons I ever learned when I was
in the Army was "hide in the open." We went to the field once
when I was in Germany. The rest of the time we were working on
mission, which was handling the communications for all the bases
where we had detachments. Running communications, both
secure and unsecure. I was a crypto tech. I worked on encryption
devices like red phones.
When we went to the field, we had a refresher class on
camouflage training. Standing 20 feet in front of us was a soldier
no one saw. Why? Because he painted his face and camouflaged
his gear so well he blended right in.
The lesson is that if you blend right in, people don't generally
mess with your stuff. The most vulnerable are those who act like
they have something to hide. People will mess with you. I have
been hacked twice since I came online back in the mid 90s: once
on my Google account by someone in the Phillipines and once on
my web hosting at Hostgator. Both were in the last 2 years.
(Someone installed 100 websites on my account. Once I found
out about it, I changed hosting.)
Yep, I'm loud and I'm proud. I make a lot of noise because I'm
a marketer, and you don't make any money if you don't market.
Doesn't mean I have my stuff hanging out there for anyone to see.
The first step here is to secure your computer. The easiest way
for hackers to get into your computer is if you have Remote
Desktop enabled. Disable Remote Desktop by going to Start
(bottom left corner), Control Panel, and look for RemoteApp and
Desktop Communications or something similar and disable any
connections you have.
Next, make sure your operating system is up to date. This is
an easy one. Set automatic updates and keep it up to date. Hackers
exploit these security holes, and if your software is up to date, this
is the easiest way to be protected. This is also on the control panel
screen. Windows Update. Click on it and go to change settings
and set your system to automatically update.
Three is to make sure you have a good anti virus and firewall
on your system. Get rid of the stuff that comes with your system
because there is plenty of free stuff online that works. I use to use
Avast! and it caught a trojan on Facebook for me. I changed to
AVG because Phoenix said it was better at protecting your
computer. It is very good and will protect you online and offline. I
also use Windows Firewall. It is available through the control
panel. Open control panel and then open Windows Firewall. Turn
it on.
Install Malware Bytes or something similar and use it to scan
for viruses, adware, etc. This program is free. It is good for
finding that stuff that is slowing down your computer.
Next, you want to clean up your computer. Temporary files
clog your computer, corrupt, and cause problems. For this I use
Slim Cleaner, and I clean and defrag my computer with it about
once a week. You may not use your computer that much. Do it at
least once a month.
Make sure all the software on your system is up to date
because this is also another way hackers exploit your system.
Install a different browser than Internet Explorer. I use Google
Chrome. It's fast, lightweight and it's backed by a multi billion
dollar company run by a computer geek who loves to make tools.
Firefox is also good. (Make sure you read the advice from
Phoenix as he disagrees with me on this issue. Whatever you
choose, it is important to me you get the protction you need.)
Back up your data. If your computer crashes, you don't want
to lose your valuable stuff. I use Live Drive. It is a simple to use
program. Cost you about $8 a month. There's others. I like Live
Drive because it's so easy to use, and they make multiple backups
of your stuff so you can find stuff from up to 30 days ago.
Finally, create a separate admin account. This is an account
you will use to install software or work on your computer if
anything goes bad. Go to the Control Panel and click on Users.
Create a new user called anything but Admin. Name it something
that is not easy to guess. Use a secure password. Write it down if
you have to. Then go to whatever user you are using and remove
the admin privileges and add a password.
One word about passwords here: Semper Fi, Sua Sponte or
God are not good passwords. Never use words or identifying
information like birthdays. Never. When we start talking about
protecting yourself online, I'll show you how to handle
passwords.
That is all for today. Tomorrow we start working on the
internet.
Homework Assignment
1. Turn off Remote Desktop.
2. Update your Windows.
3. Install antivirus and firewall. http://avg.com
4. Install Malware Bytes or something similar and run a full
scan. http://www.malwarebytes.org/
4. Clean up your computer. http://slimcleaner.com/
5. Update your software.
6. Change your browser. http://www.google.com/chrome/?
7. Set up a separate admin account.
Here is a security checklist to help you. It provides further
instructions and tutorials. If you get stuck on any step, ask. Don't
minimize this step because each day we will build on this. When
we're finished, we'll have you as secure as you can possibly be.
All the tools included here are free.
http://www.selectrealsecurity.com/security-checklist
Lesson 2: Usernames, Passwords, Email and
Shopping Online
Your next step is to examine your usernames, passwords,
email and online shopping habits to see if there is a better way to
make yourself secure.
The equipment I worked on in the Army encrypted the data
before sending it across Arpanet. It is a 128 bit random cipher,
and it has never been broken by the enemy. It was compromised
on the USS Pueblo, 1968. Never broken though. I mention this
because this is the minimum strength encryption on your
browsers.
Usually when someone is compromised online, that person
has inadvertently downloaded a program that records keystrokes
on the computer. Downloads come from either your email or a
site you have visited, so make sure your browser and antivirus are
always up to date so this stuff doesn't get missed. You can look
up hacking statistics in the search engines. I won't go into big
details here. Knowing why it's done helps you protect yourself
against it.
http://www.websitedefender.com/web-security/web-
hacking-facts/
Hacking may be done by someone who knows you. That's
why it's so important to secure your information in a way that you
are not compromised on a personal level. Easy passwords are also
a problem. The longer and the more random a password, the
longer it takes to crack.
When you download something in your email, make sure you
run your antivirus. It's why I use AVG. It tells me if an
attachment is infected before I download. Also, if you receive
"official" emails, run your cursor over the links in the email to
make sure they are legitimate. Not long ago I received an email
from Yahoo telling me they were shutting down my account. Not
so. In official emails, like Pay Pal, they know your name.
The importance of usernames is in protecting your identity
and privacy. If this is your concern, then make sure you don't use
a username that connects you to who you are. I've done
background checks on people to find out if I was being scammed,
and usernames are a great way to track people down. All you
have to do is drop the person's username into Google and follow
the trail. Since I own a business and am branding, using my name
helps others find me.
Same thing with email. Never post your email on a website.
This is a great way for others to find out stuff about you and those
sites get spidered. Your email ends up on a list, and you get tons
of spam.
Don't give your email to people you don't want to have it. It's
a good idea to have at least 2 email addresses, one public and one
private. For a public email, I usually use Gmail. With billions of
dollars behind the company and a techno geek running the show,
it works pretty well. My private email, which I pay for, is at
Yahoo.
Passwords are one of the easiest ways to get compromised.
Sua Sponte, Semper Fi, God, password and any identifying
information related to who you are is the first thing people use to
try and hack into your accounts. More than one vindictive
girlfriend or boyfriend has used this information to do deadly
deeds, so make sure you use passwords that are random and
secure. Add an extra layer of security to protect yourself by
password protecting your desktop, and if you use the tools I'm
about to recommend, have a master password.
Nothing is hack proof. Everything from the Marine Corps to
the IRS has been successfully hacked. It doesn't mean you can't
protect yourself effectively and slow them down to the point they
leave you alone.
If you are banking, shopping, or doing any type of activity
online that has to do with money, use 17 digit random passwords
for those accounts. Anything you want to really protect, use 17
digit random passwords. When you pay for your purchase, make
sure it shows https:// in the browser address bar. This means that
it is secure and the site has a valid security certificate.
Limit your information. I use Pay Pal to shop online a lot,
especially with my business, and it helps me to control where my
financial information is and where it is stored. (It is also owned
by Ebay, another billion dollar company, and they take
compromises in security seriously.)
The fewer places you have that information available, the
better. Control your important information. You can also buy
American Express, Master Card, and Visa gift cards, as well as
use a prepaid debit card online instead of your regular cards to
protect yourself. This gives you an additional layer of security,
especially with prepaid debits because you can buy and recharge
those at a CVS or other store that sells prepaid debit.
Now if you're like me, I'm too lazy to remember all those 17
digit passwords, so I use tools to help me keep track, and these
have an added layer of security for you by allowing you to use a
master password. This means before the password is entered into
the form, you have to enter the master password into the software
first. Two tools you can use, and both have free and very low cost
versions and are available on multiple platforms are:
http://roboform.com
http://lastpass.com
I use Roboform because I can load it onto a flash drive and
then take it with me. Helpful when you are on public computers
and need your passwords.
One caveat here: don't put your shopping information like
addresses, phone numbers, credit card information or anything
like that into the software. Enter that manually on sites as you go.
Avoid having that information available on your computer unless
you absolutely have to.
Some additional tips here:
1. To protect your surfing habits, set your browser to clear the
history and files when you close it. Look under Settings to do
this.
2. If you have sensitive files on your computer you want to
make unrecoverable, then use Slim Cleaner to shred them.
Periodically wipe the white space on your drive too.
3. If you need to send secure email, use secure email tools or
email accounts that actually use encryption to encrypt your
information before it is sent out.
You can get many of these tools for free, and all these tools
will keep prying eyes out. Here's a good one that's been around
for years. (Make sure you read the terms and conditions on this
stuff so you understand what you are getting and what they can
legally do.)
http://www.hushmail.com/
4. Want to surf anonymously? Many of your browsers
allow you to switch to safe browsing or secure
browsing. (In Google Chrome it's incognito. Use the
box in the top right corner of your browser to access
this feature.) You can also look at websites online
without having it show up in your history.
http://hidemyass.com
Just pop the URL in and visit the site.
In the next lesson I talk about Google, and then we'll move
onto Facebook. Since so much hacking goes on with Web 2.0
sites, it's a good idea to know how to protect yourself here.
Google also has some great tools like email, Google Voice,
Google Drive and others you can use for free.
Homework Assignment
1. Download one of the tool bars and set it up on your
computer. Use it to generate your passwords. Make sure you add
a Master Password.
2. Update any passwords you need to update to secure your
accounts.
3. Remember: information control. The fewer sites where you
have sensitive information, the less opportunity for compromise.
Lesson 3 - How to Use Google to Secure Your
Privacy
Today's lesson is in video. This is so I can show you all the
cool tools Google has to offer to help you protect yourself online.
In order to access this lesson, you will need to use the private
link. I don't want everything I know to be public knowledge.
Access the link here:
https://www.youtube.com/watch?v=Gov7PtBsMQ8
I used BB Flashback Express to make the video. It is free.
http://www.bbsoftware.co.uk/BBFlashBack_FreePlayer.aspx
Homework
1. Sign up for a Google Account. It is free.
https://accounts.google.com/SignUp
2. Once you have signed up and verified your account, then
go to the Google search and search for Google Products. This
allows you to access all the Google products and set up the
measures I suggested in the video. I have included the link here.
However, Google often changes them without updating, so if you
can't find this page, then it has been moved.
http://www.google.com/about/products/
Final Note: When you set up your security questions, don't
use things that are easy to guess. Make it something you
remember. For example, Mother's maiden name: none or some
other random answer that only makes sense to you. You can also
use a backup email if you forget your password.
Lesson 4 - Protecting Yourself Against
Identity Thieves, Stalkers, and Keeping
Yourself Safe
This video shows you three different places to use to help you
identify where your information is available online and then
shows you how to erase this information to protect yourself.
Sites Used
http://mylife.com
http://spokeo.com
http://google.com/
Homework
Sign up for a free account with My Life. Use this site to help
you purge the internet of records you don't want others to have. If
you have not signed up for a Google account and are using this to
help you secure your identity, then make sure you do so.
If you plan to use the dating section of My Life, make sure
you read the online dating safety tips first.
https://www.youtube.com/watch?v=oh_x1X3YU-o
Lesson 5 - Protecting Yourself on Facebook
Facebook is one of the top sites on the internet. It's also one of
the most dangerous if you don't understand how to protect
yourself. Hackers, viruses, and other stuff can be a landmine.
This video shows you how to protect yourself on Facebook.
https://www.youtube.com/watch?v=VBnnQYTe8Ls
Lesson 6 – Google Maps: Protecting Your
Physical Location
I know where you live. I know what your house looks like.
Not really. If I wanted to find out though, then this is the tool I
would use because it uses satellite technology, along with using a
private company called Tele Atlas. The information is quite
comprehensive, and as you can see in the video, reveals a lot
more information than you think. That's why, if privacy and
security is that important to you, make sure you only use your
address as needed to do things online and always keep it secure.
One suggestion I would make is to get a post office box. Have
all your mail sent there. Now it may not work when you are using
government agencies. It will help you cover your tracks with
everything else.
https://www.youtube.com/watch?v=LYQQ7bXsBGg
Lesson 7 – Navigating the Ebenefits System
Benefits are an important part of a veterans' life.
Understanding how to get your records, find benefit information,
see what benefits are available to you is crucial to your success in
collecting those benefits. Here is how you access the Ebenefits
system, access your military records and check to see if you have
any state benefits available to you.
https://www.youtube.com/watch?v=9T8mrdY4oMc
Bonus: Additional Tips to Help You Stay
Secure
I contacted a fellow veteran who is also a security consultant
and asked him for his best advice. Here it is.
If you would like to contact the Phoenix, this visit his site:
http://warmastersapprentice.com/
1) Touching the keyboard, can give away your 'position' so a
keyscrambler is an absolute, "encrypting" every single key that is
touched, so you and those that "need to know" will get your
message, and those that should not, yet still try are going to have
one heck of challenge breaking into an "A and B conversation," to
C their way into your data. If on a budget, a free to quite pricey
version can be found here. http://www.qfxsoftware.com/
You may argue that I.E.. is lacking in many aspects, but I
have taught a legion of beginners to so-called experts and even
alleged elites--where the holes are that can be filled--with all of
the many of 'booby-traps', alarms of a sort, and downright 'nuclear
weapons' should anyone dare to even gaze at [their] servers, or
any one workstation that any [lazy/apathetic] user might take a
seat in front of. [Civilians] can never be trusted to be completely
diligent as you or I my Mistress. None. I have had to have a
"Plan Bravo to Zippo" to compensate for each that I have had to
protect from bodily harm to economic ruin. Including, having
their own mammals that worked with them, alongside them--
stealing from them--innovative ideas that could help our wounded
to those wounded in spirit.
I cannot stress the importance of having encryption within the
hardware that only a finite few would or should, have a need to
know about. Please, consider my words...
2) As far as privacy is concerned, "Big Data" is or "Big
Brother" has been alive and well, as you wrote [correctly], since
the mid-1950's. And it was 'given up', "the Arpanet," or "Ape-
Net," as it was known in my time "in the machine" (my military
service) and in a certain circle prior to that, in the prime simply
because it can never be fully secured, and hence the worst
decision was made: handing it over to public sector mammals in a
municipality near you and I.
It was "all downhill from there."
To [semi-] protect each that uses this tool, like 'the Flame that
can provide warmth and comfort'--and kill you--each, as you also
stated correctly, must never fully rely on anyone else, as even the
postal service 'sells' each of our data without our consent, and oft
times without our knowledge.
Hence physical 'junk mail' appearing in our mail-box at the
end of our driveway's. Or 'Spam' in our most secure e-mail
accounts. We are betrayed every nanosecond, every single day.
So to "cover" of tracks, or obscure the trail behind us (how
copy?), I would and have provided the following [options] to
captains of industry, to those with children they want to protect
while on any child-oriented site, a [serious] set of or multiple
layers of [armor]. Most can be found here.
http://www.cnet.com/
Besides
1) "Cookienator": Automatically removes malicious 'cookies'
that report your usage, or 'track' how, where, and what your
viewing (each "page"), and any and all "Third Party" or 'uninvited
guests' that want to walk in on your [computer] system, no matter
how big or small.
2) IObits' http://www.iobit.com/ "Advanced SystemCare"
(version 6.3 is the current), and the "IObit Malware Fighter": are
titans that few will attempt to penetrate if they try to set a "bot" of
some sort to a "Trojan" program through a provider into the
systems connected to it. 'We' got burned last year via COX, as
well as Yahoo, MSN, and Google, by some heavy hitters in
Europe last year, and though they got busted by a collaboration of
"folks with stinking badges," the 'bots' they had sent out prior to
their arrests were "timed' and retrieved user data which was sent
to another part, a separate server or servers, at another position in
another part or region of our planet.
A note regarding Advanced SystemCare: In settings, the user
must take some time, and go into the setting of the software under
"Ignore List," then remove the plethora of cookies 'they' believe
most "go to" most often. One has to look for the 'Browser
Cookies' tab, then remove what is seen from the list on the right
(Cookies to keep), to the left (Cookies to Delete), so any trace,
anything that is overt to sublime is safely removed. Each has a
scanning and defrag utility embedded that can be set up easily.
And IObit has a separate 'Defrag' software package as well--that
anyone--that takes I.T. security an 1/8th as seriously as 'our'
cadre, and I mean you and I alone, should definitely have in their
'armory'. And each can turn off the computer they are installed
on--"Off."
3) "AVG Anti-Virus Free Edition 2013," is some really
hardcore, "high-speed, low-drag" [Sierra]. If you use it, I pray
you will use it wisely and prudently. You can hurt somebody
with [that thing] and "its all funny until some loses an eye."
All are, in a way, part of a "fire and forget" 'alarm system',
wholly attached to an electronic arsenal...
4) "CCleaner": http://www.piriform.com/ccleaner (that is
not a typographical error) by these [friendlies], is quite good for
removing any 'junk files, including anything that is intention set
by the Google browser by any that chose to use it, and any logs,
or any other forensic data, that could and would be used to "sell
you," or persecute you, by any hacker of any skill level. There is
an 'enhancement tool'--aptly known as CCleaner Enhancer for a
'military' cleaning and removal of underlying 'junk' programs on
any system reach out for and take up space on anyone's system.
In the 'Settings' tab, under 'Options', you should set the option for
"Secure file deletion (Slower)" which makes a 35 pass--'Very
Secure Overwrite'--so "bad-guys cannot even find what you have
done nor where you have done it.
5) "Glary Utilities": http://www.glarysoft.com/ found here,
does much of the same as CCleaner, but there are a myriad of
'definitions' out there, none exactly the same, so it is prudent to--
in this case--"kill them all"--in a 'crossfire' of a sort. If one utility
does not, or cannot do the job completely, another Bravo-Foxtrot-
Gulf from another position probably will...
I absolutely do believe in "overkill," but I believe you already
knew that about your apprentice long ago...
6) "Spybot - Search & Destroy" http://www.safer-
networking.org/ (I just love their name), found here along with a
serious review, should and can, be set to "go green" as soon as the
user turns on their system, to just prior to connecting to the 'Net,
which, in turn--SHOULD BE BEFORE THE USER CONNECTS
THEIR ETHERNET CORD TO THEIR MODEM. It is designed
to "cover the user" as "they go in," no matter which browser each
uses, and hence, the inherent liabilities of any and all browsers--
including--Googles, which are legion (more in a minute about that
version of 'Chrome'). And after disconnecting from the 'Net, a
built-in "Search & Destroy" utility (you know me my dear Sister;
"back up, back up, back up." Did I, or can I say "back up" or
"crossfire" enough? They bring an ill-advised attack, my tripwire
(think a "Claymore Mine" attached to an I.C.B.M.) goes "BOOM"
and then some, incinerating anything and everything, that sets it
off.
7) "Malwarbytes 'Anti-Malware' software" is a very good
tool, but I 'update it no less than 3 to 7 times if I have a system
attached to the 'Net, as a new version of attack is always a threat,
and hence it is prudent to carry "rounds for any and all new
occasions" not known before "we go outside the perimeter." So
even if a 'pop-up' stating that a new definition is not shown, if you
[click] on the tab "Update," then the 'button' "Check for Updates,"
8 out of 10 times, a slightly new version and hence definition
from a wholly new threat is ready for the public should any be so
diligent in their endeavor for a secure Internet experience.
Hiding in the Open: "Stealth"; 'Phoenix' Style
Again, I strongly suggest, no matter what software program
each may be comfortable with, complacency can "leave a mark."
So "Tor," and "Jon/Do", help augment your Internet
presence/camouflage, and make any and all that might try to track
the user more difficult. It is infinitely harder to hit something that
cannot be seen in the prime...
If you really 'need' to use Google, or in any other browser;
1) Abines' 'Do Not Track Me', http://www.abine.com/
2) And 'Ghostery', http://www.ghostery.com/ found here,
does more than help "cover you as you go in," on any and all
known browsers--they have a 'plug-in' for everyone on their home
site--no matter which browser each uses or is ultimately
comfortable using.
3) 'AVG Do Not Track' though very good, disables itself
(very different than the Abine version) if you are in "InPrivate,"
mode in Internet Explorer, or "Incognito" mode in Google.
4) Within Googles 'Settings', the 'plug-in' 'Disconnect', an
extension which stops major 'third' parties and search engines
from tracking the webpages you go to and any searches you do,
should absolutely be installed. And on a side note; Google keeps
any and all search attempts you might make--forever--and worse,
every "Tweet" has been archived at the [U.S.] Library of
Congress eternally as well.
Get Additional Help
Thank you for taking the time to read my report and watch the
videos. Questions or comments? I'm always happy to help. You
can contact me as follows:
Facebook – http://www.facebook.com/jingerjarrett
Military Veterans Worldwide: Vets Serving Vets. Jobs,
Benefits and More. - This is my baby. We're here to serve
veterans. Tons of content and resources, as well as personalized
help at the individual level to help you get what you need. We're
volunteers, and this is a labor of love. Started out under a different
name. Now we serve veterans worldwide.
https://www.facebook.com/groups/usmilitaryveteransdrea
mjobs/
My Support Desk – http://jingerjarrett.com/support/ - I'm
always happy to help by asking any questions you have.
About the Author
Jinger Jarrett is a former US Army soldier (1982 - 1986). She
served with the 535th Signal Company in both Grafenwoehr and
Nuremberg West Germany from 1984 – 1986 as a 32F, Fixed
Ciphony Repair. Her secondary MOS was 71L, Administrative
Specialist.
From 1991 – 1998, she served in the Michigan Army National
Guard, 1460th Transportation Company, Midland, Michigan as a
71L. She transferred to MTC at Camp Grayling where she
completed the 46Q, Print Military Journalist course and then
worked in the Public Affairs Office. With the help of the GI Bill,
she earned a Bachelors of Applied Arts with majors in both
Journalism and English Language as Literature.
Since 2001 she has owned an online business. She teaches one
person businesses how to start a business online and then market
online for free. Her book, ”Hour of Power: When Jesus, Zen and
Quantum Physics meet the US Army” is available on Amazon, as
well as all major online digital bookstores and is designed to help
beginners to develop the right mindset for succeeding in online
business through the use of Quantum Physics and the laws of the
universe.
Website: http://jingerjarrett.com/
Amazon: http://www.amazon.com/author/jingerjarrett