Cannabis Stocks News
Interactive Brokers Advertisement
Home > Boards > US OTC > Computers - Software >

Bravatek Solutions Inc. (BVTK)

Add BVTK Price Alert      Hide Sticky   Hide Intro
Moderator: artmaniac, pennypauly, cjstocksup, BottomWatcher , TenKay, HPAR32
Search This Board: 
Last Post: 8/21/2017 5:49:47 AM - Followers: 987 - Board type: Free - Posts Today: 15

Excellent DD by Sterling (stervc)

~Significant Subliminal Hints…

This post will be delivered in two parts. Part 1 will indicate some key pieces from their PR released on Dec 3, 2015 that should be given some positive consideration in my opinion. Part 2 will indicate some huge support that ECRY(D) has of which would only affiliate themselves with ECRY(D) because of knowing that ECRY(D) must have some huge potential, especially allowing their names to be used in conjunction with ECRY.

Part 1:

Quietly, just recently on Dec 3, 2015 the company released a PR that never even hit the wires that was titled and indicated below:


Bravatek obtains line of secured financing up to $3M
Loan proceeds will be used for business development and to support the backlog reduction of Bravatek’s recent asset-acquisition of Viking Telecom Services

Before going any further, I think that it is important to note for those who are new to Ecrypt Technologies, Inc. (ECRYD) that on November 10, 2015, the company announced that it has changed its name to Bravatek Solutions, Inc.

Now let’s discuss some key points that were quietly indicated within the PR above. Then following I will explain why I greatly believe that ECRY(D) is preparing to turn the corner in a very big way in Part 2.

1~ECRY(D) has negotiated a $3-million line of secured financing from TCA’s Global Credit Master Fund to finance continued business development and execute on existing telecom services contracts Bravatek recently acquired from Viking Telecom Services.

2~ECRY(D) has received an initial tranche of funding of $350,000.

3~ECRY(D), in a relatively short period, has developed a suite of top-tier cyber products under the brand ECRYPT ONE.

4~ECRY(D) executed an acquisition providing eight, lucrative IDIQ (Indefinite Delivery Indefinite Quantity) contracts representing millions in potential purchase orders.

5~ECRY(D) line of credit for $3 million is secured by Bravatek’s assets, and the lender has a right to convert all or a portion of the principal into an equity position in Bravatek if it is not paid back as agreed. Bravatek anticipates repaying the loan in full by February of 2017. This is important because this means that no dilution if the company executes their business objectives for growth. Even as a worst case scenario, no more dilution until Feb 2017.

6~ECRY(D) will use the loan proceeds to support the support Bravatek’s recently acquired Viking Telecom Services operations to reduce its ever-increasing order backlog.

7~ECRY(D) has announced that some investors are buying out current convertible notes.

The key points above are reasons why I greatly believe that ECRY is preparing to turn the corner in a very big way. The company released an amendment within their 10Q/A below indicating that it’s Outstanding Shares (OS) was 677,234,730 shares before the execution of their recent 1-10 reverse split:

This means that after the recent 1-10 reverse split, the OS is in the area of 67,723,473 shares rounded up. I'm guessing that they could be positioning the company for some acquisitions/mergers as they previously hinted so the OS could increase as shares are used for leverage, but I'm sure that those shares will be restricted.

Part 2:

ECRYD is currently trading under the OTCQB status:

This means that ECRYD is a fully reporting stock that files ”audited financials” with the SEC. This also means that we will see 8-Ks filed with the SEC for any material events.

Below is what the company PR-ed regarding its $10 Million project with a major carrier:
Bravatek in Line for $10M Major Carrier Decommissioning Telecom Project

AUSTIN, TX--(Marketwired - November 20, 2015) - Bravatek Solutions, Inc. (OTCQB: ECRY) announced today that its Telecom Services Division, which it acquired from Viking in June, has signed a Letter of Intent with construction company YKTG, LLC, for a $10-million plus decommissioning project with a major cell phone carrier.

Work is expected to begin later this month and continue through January 2017.

I think it is important to note the importance of YKTG, LLC and their connections. Pay particular attention to what YKTG, LLC has achieved in 2015:

This is huge considering that YKTG, LLC currently have established strategic relationships with BAE Systems and ConCor Networks since ConCor Networks is a subsidiary and network infrastructure organization for EMCOR. EMCOR is the nation’s largest electrical contractor. EMCOR is a Fortune 500 company based in Norwalk, Connecticut that is generating over $6.4 Billion in Revenues and trades at over $50.00+ per share on the NYSE under the ticker of EME while having over 23,000 Employees:

Also important to note is YKTG, LLC having an established strategic relationships with BAE Systems which trades equivalent to over $500.00+ per share on the London Stock Exchange under the ticker of BA while generating over $17 Billion in Revenues. To further understand the magnitude of this company…
BAE Systems plc is a British multinational defense, security and aerospace company headquartered in London in the United Kingdom and with operations worldwide. It is among the world's largest defense contractors; it ranked as the second-largest based on applicable 2012 revenues. Its largest operations are in the United Kingdom and United States, where its BAE Systems Inc. subsidiary is one of the six largest suppliers to the US Department of Defense. Other major markets include Australia, India and Saudi Arabia. The company was formed on 30 November 1999 by the £7.7 billion merger of two British companies; Marconi Electronic Systems (MES) – the defense electronics and naval shipbuilding subsidiary of the General Electric Company plc (GEC) – and British Aerospace (BAe) – an aircraft, munitions and naval systems manufacturer:

ECRYD having business relations or ties to these companies directly and indirectly is huge in my opinion. Something bigger is going on to be revealed in the near future to benefit us shareholders in my opinion that justifies their backlog of orders to be filled. Let me further explain why.

On June 3, 2015, ECRYD announced news of having a deal with Kaspersky Government Security Solutions (KGSS) to be the exclusive provider of its products and services to multiple United States federal government agencies via Ecrypt’s Marketing Alliance Program (MAP):

Something else important to note was the appointing of former CIA Cyber Expert Hans Holmer as a new Director for ECRYD on September 3, 2015:
Mr. Holmer is a recently retired CIA officer with extensive experience in strategic cyber issues. His experience in nation-state intelligence collection and corporate defense goes back nearly 20 years and his engagement with the interface of humans and technology goes back to 1973.

“I am pleased to join the board of Ecrypt. The combination of thorough yet simple security is sorely needed in the market and I look forward to working with the Ecrypt team to continue developing and deploying realistic and effective solutions in this sector,” commented Hans Holmer. …

Also instrumental towards the growth of the company was the appointing of Deborah King as their Interim Chief Financial Officer:
King possesses extensive experience in financial, operational, and business management. In addition to over 25 years of experience in the private sector, Ms. King possesses an in-depth understanding of financial, legal, and business tax regulations. Her vast background brings a unique set of skills to enable Ecrypt to rapidly move forward in its profitable sales growth.

Ms. King commented: “I am excited to be appointed to this critical role on the Ecrypt team and look forward to making an active contribution to the vision and future of Ecrypt Technologies, Inc. I am committed to leveraging my talents and experience to work in the continued growth and expansion of Ecrypt’s business.”


$188,000 Viking Telecom sales in JUNE 2015

Under the agreement, Ecrypt will be the exclusive worldwide provider of KGSS’s cyber threat products and services to mutually-agreed upon US government agencies. Products include KGSS’s Malware Indicators Database and Analysis System (MIDAS), Advanced Persistent Threat Analysis & Reporting platform, and various Intelligence Support Products.  As of June 4th

eCrypt Technologies, Inc. (ECRY) is an emerging provider of military-strength data security solutions for enterprise, government, and military. The company empowers organizations with the freedom to communicate and collaborate without risk of liability, reputation damage, competitive threat, and other negative outcomes. ECRY is the trusted first choice for those looking to keep their communications confidential.

Today’s businesses struggle to guard against the increasing number of dangers as a result of complicated networks built with many different components. These components are often individually patched to address new threats, while neglecting to close security gaps in traditional solutions. On average, data breaches and subsequent fines and litigation cost a U.S. business $534 million every year, the highest in the world according to the Ponemon Institute.

The flagship ECRY solution is an integrated email and encryption server that can be quickly deployed to fortify the security of corporate communication, including attachments and mobile devices, against data breaches while eliminating phishing threats, malware infections, and spam. By using ECRY’s paradigm-shifting technology, companies alleviate the need for separate encryption servers with their associated bloated administration and multiple points of weakness.

ECRY is well-positioned to benefit from the increasing demands of data confidentiality regulations such as the Health Insurance Portability and Accountability Act (HIPAA), the Federal Information Security Management Act (FISMA), and Gramm-Leach-Bliley Act (GLBA). As a result of extensive market research and multi-billion dollar industry input, the company fully understands the business community’s need to maintain confidentiality, prevent data breaches, comply with government regulations, and mitigate litigation risks.



Investment Highlights

  • Positioned to Benefit from increasing Federal Confidentiality Regulations
    Specializing in 5 Key Markets
    Providing Comprehensive Support with Strategic Multi-Phase Approach
    Highly Knowledgeable and Experienced Management Team
    Backed by Diverse Team of Seasoned Directors


The eCyrpt One Solution

Simplicity of system design ensures administrators, compliance officers, and end-users are able to work efficiently and effectively. Networks typically are secured by many disparate technologies piled on top of each other. This approach is costly, an administrative burden, and creates unnecessary complexity. It results in systems plagued by interoperability issues and security gaps. Moreover, because of patchwork, the networks are inherently vulnerable.

Ecrypt One is an information relay system built on a foundation of security. In essence, Ecrypt One is a secure email server. It is a direct replacement for a legacy email server like Microsoft Exchange, with integrated encryption and other email security tools.

Ecrypt One is an information relay system built on a foundation of security. In essence, Ecrypt One is a secure email server. It is a direct replacement for a legacy email server like Microsoft Exchange, with integrated encryption and other email security tools.

Everything is encrypted at all times in the closed Ecrypt One system. Built-in virus and malware detection protects against email borne threats and Ecrypt One is impervious to spam and phishing.

Ecrypt One treats anyone external to the organization as a visitor. This discrimination enables it to restrict visitor access to information. It also enables the organization to validate external recipients before information is exchanged.

Security policies are enforced automatically by Ecrypt One, to ensure employee compliance, and circumvent threats.

  • Optimizes enterprise securities by removing human vulnerabilities
    Fortifies against data leaks, device theft, and e-mail-born threats
    Provides granular role-based access controls for system administrators
    Secures communications with third parties such as vendors and clients

Solution Benefits:

  • Regulatory Compliance
    "Always On" Encryption
    Role Based Access Controls
    Security Rules
  • Secure Collaboration
    Multi-factor Authentication
    Security Awareness
    Highly Integratable


Security Consultation

ECRY’s consulting services are designed to help organizations overcome security and compliance challenges. It’s estimated 49% of an organization’s worth is derived from the information it stores.

The compromise of this information can be catastrophic to an organization. Loss of trust, reduced stock price, non-compliance fines, all these hit the bottom line hard.

No matter the need, the size or the industry, ECRY’s expert consultants work with its clients to optimize the security of their information system by:

  • Reviewing existing security practices and technologies and providing recommendations for improvement.
    Identifying technical security risks and threats then translating them into the context of business risks and threats.
    Determining the areas of greatest concern and offering recommendations for improvement.
    Planning security initiatives such as qualifying and deploying a new technology, or implementing new policies.
    Educating staff on security procedures, policies and, best practices.


Five Key Markets

Ecrypt One in Healthcare

Ecrypt One ensures that organizations not only meet but also exceed today’s HIPAA compliance obligations to remain ahead of the regulatory curve. This mitigates the risk of data breaches and subsequent litigation while allowing organizations to be competitive.

Failure to follow policies and procedures are mistakes that come at a very high price, especially in an industry so stringently regulated. Ecrypt One is designed to protect the information system despite its users.

  • Reinforces Security Policies
    Enables Compliance
    Secures Business Associates
    Optimized Administration
    Unencumbered Productivity


Ecrypt One in Government and Military

Designed to the highest national security and military specification standards.

Ecrypt One is a military strength email and encryption system. It assures the security, integrity and auditability of email and attachment communications in transit and at rest. Ecrypt One is an effective fortress that safeguards the exchange, storage, and audit integrity of email and attachments sent inter-agency, intra-agency and cross-border.

  • Secure Intra-agency and Inter-agency Collaboration
    Secure Cross-border collaboration
    Seamless Integration
    Access Controls
    Productivity and Mobility


Ecrypt One in Legal Services

Ecrypt One directly addresses issues of trust and confidentiality, protecting the cornerstone of the attorney-client relationship. The inherently secure nature of the solution provides familiar platforms to existing workflows and enables lawyers to maintain agility and mobility while operating securely.

It’s imperative to communicate freely, be productive, and still maintain security in such an important and confidential relationship.

  • Secure Productivity
    Mobile and BYOD Security
    Protecting Client Information


Ecrypt One in Law Enforcement

Balancing timeliness and collaboration with security is a challenge. Conventional methods can impede investigations and security failures compromise intelligence. ECRY views security in the context of the environment to secure operations from the inside and out.

There’s no margin for error when the safety and lives of people are at stake.

Public safety is dependent on the men and women of law enforcement. The necessity for secure collaboration with other agencies, in the homeland and abroad, is a crucial part of this important public service role. The inability to share intelligence securely can be crippling to investigations and the everyday value of public protection is compromised.

Conventional patchwork systems of security add-ons have proved cumbersome and ineffective. These patchworks impede duties and restrict operations rather than facilitate them. Addressing security as a strictly technological problem is in direct conflict with the agility law enforcement efforts necessitate.

ECRY creates new solutions vs. adapting old solutions to new problems. This approach helps solve security challenges within the context of the agency’s greater purpose. This promotes holistic solutions that protect entire information networks while facilitating maneuverability.


Ecrytpt One in Financial Services

Financial institutions by their very nature are a lucrative target for criminals. Notwithstanding, the market demands the convenience of virtual access. This is in conflict with the critical and enforced requirement for security. Viewing security as a business challenge rather than a technical one, results in solutions that support success in a highly competitive space.

The best option is to trade ineffective conventional systems for optimized and inherently secure information networks.

Modern financial institutions are facing a dilemma. On one side clients are demanding the convenience of more virtual access, but that’s a huge threat to security. In addition, security regulators are tightening the belt.

Total cost of operating a conventional patchwork system of security add-ons often hit the bottom line harder than the threats it’s supposed to defend against. Conventional information security impedes business development and makes it difficult to maintain compliance.

The effects of a breach can be devastating. Not only can an organization be harmed financially, but reputation and trust can be compromised.

ECRY’s approach is to optimize the system, placing people at the heart of its solutions and making technology work harder. By considering each challenge as a part of a complete business problem, the company solves the dilemma in a cost effective and efficient way. Smart solutions lower the total cost of ownership and expedite a return on security investment.


Five Phase Approach

Discovery Phase

The initial phase requires gathering extensive information and gaining a comprehensive understanding of an enterprise’s current system infrastructure. By exploring both technology and operations avenues, ECRY develops an absolute working knowledge of the business and the purposes for the security deployment. ECRY then defines system requirements and outlines what needs to be added, removed or changed in the existing technical infrastructure.

Customization Phase

The entire system is tailored and customized to meet all of the enterprise’s needs in a single comprehensive solution. This includes designing the system, branding all user interfaces, and other necessary code monkey criteria.

Implementation Phase

ECRY assists the enterprise’s IT with installation, configuration, and integration into existing infrastructure. This phase includes full orientation of IT staff and relevant employees, plus preparation of recommendations and best practices documentation across all necessary departments.


Unlimited access to help desk assistance as well, as product updates are included for every ECRY client.

Added Benefit Options

ECRY offers complimentary technologies, through trusted partnerships, to optimize each system for mobile device management, document integrity assurance and two-factor authentication. ECRY can also integrate with existing solutions already in place.


Management Team

eCrypt Technology’s management has the industry knowledge and entrepreneurial innovation to advance the company’s strong market position. They’re backed by a highly experienced, diverse and respected team of directors.


Brad Lever – Co-founder, CEO, Director

Brad Lever is a highly motivated entrepreneur with nearly 20 years of experience working in technology. His professional career spans a variety of sales and leadership roles with some of the industry’s most prominent companies, including Xerox, Sophos and Bell. Brad is also a member of the International Association of Privacy Professionals (IAPP).

Educated in business marketing and sales, Lever draws on his experience working as liaison to Fortune 100 and 500 companies in the USA and around the world to attract and engage potential customers and partners. He is instrumental in securing multiple product placement opportunities for ECRY.

Mr. Lever is a prudent business executive known for “squeezing six cents out of every nickel”. Under Brad’s leadership, ECRY has maintained operational and financial efficiency, persevering through one of the worst financial crises since the Great Depression.

Lever is a passionate businessman and the leading visionary behind ECRY technologies. His core goals at ECRY are to harness the team’s strengths while moderating its weaknesses. He maximizes present opportunities while anticipating and mitigating potential risks. He has lead eCrypt from research and development, to commercialization and into profitability.


Zasia Zukowska – Co-founder, Operations Manager

Kasia Zukowska’s primary focus is managing ECRY’s operations and maintaining good standing. She also works closely with the development team to ensure that ECRY creates and produces the most responsive and effective products possible.

Over the years Zukowska acquired diverse experience in account management and a variety of administrative capacities. Her career spans the technology sector, where she worked with North America’s leading telecommunications providers. There she gained broad experience as liaison to small, medium and enterprise level customers.

Zukowska has over 12 years of experience in the information security industry, which included operating an information security consulting firm.


Gabe Ruso – Co-founder, CTO

Gabe Ruso is an expert in software design and development. Trained internationally as a Java architect, his core proficiencies are service-oriented applications and encryption frameworks.

In addition to extensive experience abroad, Ruso held leadership roles at some of North America’s largest telecommunications and consulting firms. He now uses his vision and programming acumen to translate complex concepts into simple and effective products.

Gabe is also responsible for overseeing ECRY’s internal network.


Curt Weldon – Chairman

Curt Weldon served 20 years in the US Congress and retired as Vice Chairman of both, the Armed Services Committee and the Homeland Security Committee.

In 2007, Weldon formed Jenkins Hill International, and now provides national and international consulting services drawing on his experiences as a public official and leader of 60 Bi-Partisan Congressional Delegations to over 125 countries, including Libya and North Korea.

Weldon has received over 100 national and international awards and 7 Honorary Doctorate Degrees for his work. He is also an elected Member of the Russian Federation Academy of Sciences.


Jay Cohen – Director

The Honorable Jay Cohen is a retired Rear Admiral of the United States Navy. He is also the former Under Secretary of Homeland Security for Science and Technology of the United States Department of Homeland Security.

Rear Admiral Cohen received his commission as an ensign in 1968 after graduating from the United States Naval Academy. He holds a degree in Ocean Engineering from the Massachusetts Institute of Technology and the Woods Hole Oceanographic Institution and a Master of Science in Marine Engineering and Naval Architecture from MIT.

Early in his naval career he mastered Nuclear Power Training and later commanded a nuclear submarine. He followed that with stints as a senior member of the Nuclear Propulsion Examining Board for the U.S. Atlantic Fleet; command of a major surface ship, Director of the Navy Y2K Project Office; and Chief of Naval Research. At DHS, Rear Admiral Cohen assumed responsibility for evaluating, procuring and coordinating the department’s science and technology assets as well as responsibility across the 22 components of DHS for test and evaluation.

Starting in 2000, as Chief of Naval Research, Rear Admiral Cohen was the Department of the Navy’s Chief Technology Officer in wartime, responsible for the Navy and Marine Corps Science and Technology Program to rapidly meet combat technology needs.

Rear Admiral Cohen now serves as principal in The Chertoff Group. Additionally, he serves on numerous corporate boards and is the CEO of JayMCohen LLC. JayMCohen LLC is an independent consultant for science and technology in support of domestic and international defense, homeland security, and energy issues and solutions.


Dr. Erik Mettala – Director

Dr. Erik G. Mettala serves as the Cyber Chief Scientist at Battelle Memorial Institute’s National Security Global Business. Prior to joining Battelle, he was the Chief Scientist in SPARTA’s National Security Systems Sector in Columbia, MD. There he was responsible for the strategic technology planning and research for SPARTA’s intelligence, computer network operations, and information assurance business areas.

Prior to that, Dr. Mettala served as Vice President and Director of McAfee Research. At McAfee Research, he managed strategic technology research, including R&D business development and laboratory efforts. Under his direction, McAfee Research focused on high-risk research addressing the needs of McAfee product lines, including anti-virus, anti-spam, and host-based and network-based intrusion prevention.

A retired U.S. Army officer, Dr. Mettala served in a succession of positions of increasing complexity and responsibility in the United States Army. His roles included Deputy Director and then Director of the Software and Intelligence Systems Technology Office (SISTO) at the Defense Advanced Research Projects Agency (DARPA), and Deputy Director in the Information Science and Technology Office (ISTO).

In June of 2012 Dr. Mettala was inducted into the Information Systems Security Association (ISSA) International Hall of Fame.


Thomas Trkla – Director

Dr. Erik G. Mettala serves as the Cyber Chief Scientist at Battelle Memorial Institute’s National Security Global Business. Prior to joining Battelle, he was the Chief Scientist in SPARTA’s National Security Systems Sector in Columbia, MD. There he was responsible for the strategic technology planning and research for SPARTA’s intelligence, computer network operations, and information assurance business areas.

Prior to that, Dr. Mettala served as Vice President and Director of McAfee Research. At McAfee Research, he managed strategic technology research, including R&D business development and laboratory efforts. Under his direction, McAfee Research focused on high-risk research addressing the needs of McAfee product lines, including anti-virus, anti-spam, and host-based and network-based intrusion prevention.

A retired U.S. Army officer, Dr. Mettala served in a succession of positions of increasing complexity and responsibility in the United States Army. His roles included Deputy Director and then Director of the Software and Intelligence Systems Technology Office (SISTO) at the Defense Advanced Research Projects Agency (DARPA), and Deputy Director in the Information Science and Technology Office (ISTO).

In June of 2012 Dr. Mettala was inducted into the Information Systems Security Association (ISSA) International Hall of Fame.


Matthew Johnson – Director

Matthew Johnson brings 15 years of experience to eCrypt, working for the Department of Defense (DoD) and Intelligence Community. He is a recognized Subject Matter Expert (SME) in the areas of Computer Network Attack, Computer Network Defense, Mission Assurance, Secure-Computing, Cryptoanalysis Reverse-Engineering, and related-accreditation and testing.

Johnson provides Mission Assurance recommendations for some of the nation’s most critical advanced technology programs, advising and supporting DoD efforts to represent system investments to Congress and other government agencies, while extensively working with various government agencies to foster symbiotic relationships and cooperative development and investment.

Johnson’s support to a number of cyber-threat related government advisory panels and technical review boards is important to eCrypt’s acceptance into federal markets. His work extends to several technical investment review boards for the Federally Funded Research and Development Center(s) and University Applied Research Centers (UARCs). In these efforts, Johnson advises on technology investments, development timelines, and fielding Concepts of Operation to the intended user communities.

Johnson is a distinguished 16-year veteran of the United States Air Force Office of Special Investigations (AFOSI) supporting both cyber and technical surveillance operations. In this role, he was assigned exclusively to support advanced technology development and platform fielding efforts for the USAF.

Johnson holds a B.S. in Statistical Sciences from the Air Force Academy in Colorado Springs, CO. and a M.S. in Information Assurance from Norwich University in Northfield, VT. He also holds numerous cyber-related certifications and has held a TS/SCI clearance with Counterintelligence polygraph since 1998.

eCrypt Technologies, Inc.
4750 Table Mesa Dr.
Boulder, CO 80305
Phone: (866) 204-6703




Current Price
Bid Ask Day's Range
  • 1D
  • 1M
  • 2M
  • 3M
  • 6M
  • 1Y
  • 2Y
  • 3Y
  • 5Y
#100861  Sticky Note Folks, this board is under a "Board Warning" IH Admin [Shelly] 08/14/17 02:29:25 PM
#100680  Sticky Note Amazing telephone updates from Tom Cellucci! reader3 08/14/17 09:57:59 AM
#99730  Sticky Note 2017 Award Winners pennypauly 08/11/17 01:25:27 PM
#96509  Sticky Note Had another incredible chat w Tom this morning. mrcarnita 08/05/17 01:57:27 PM
#94025  Sticky Note All, the Facebook link people are trying to IH Admin [Macy] 08/02/17 01:41:16 PM
#91930  Sticky Note PLEASE TAKE THE TIME TO READ IF YOU mattwasson351 08/01/17 01:25:34 PM
#73172  Sticky Note BOARD WARNING: Everyone, the board is to talk IH Admin [Macy] 07/05/17 12:50:23 PM
#30255  Sticky Note A few takeaways from my phone call with STARSTOCKS 05/02/17 07:18:38 AM
#103194   Worked FINS all weekend. Check for releases this week... Charliebee 08/21/17 05:49:47 AM
#103193   South Korea updates comin.... Charliebee 08/21/17 04:14:32 AM
#103192   It's going to be a good Christmas in hydr0gen1 08/21/17 03:24:09 AM
#103191   mrcarnita: And that is EXACTLY why this chart lesnshawn 08/21/17 02:13:05 AM
#103190   Love to see this STICKY. It is happening. jmmatthews67 08/21/17 01:42:29 AM
#103189   What a ride. Bvtk!!$$ Peddler22 08/21/17 01:33:08 AM
#103188   I wonder how far we can go if Fashers 08/21/17 01:22:11 AM
#103187   That's it exactly, LNS. Love the charts btw jmmatthews67 08/21/17 01:13:30 AM
#103186   Excellent! reader3 08/21/17 01:10:11 AM
#103185   Way to sum it all up and package Richkat 08/21/17 01:00:00 AM
#103184   Beautiful! You got me thinking of what I'm hydr0gen1 08/21/17 12:49:17 AM
#103183   I definitely agree. Just one huge deal will Titanium 08/21/17 12:27:12 AM
#103182   Below is a high level equation for what mrcarnita 08/21/17 12:20:17 AM
#103181   I have never bashed this or any other shotsky 08/21/17 12:04:52 AM
#103180   I've seen many replies from him since I sampson one 08/21/17 12:02:30 AM
#103179   And judging by how inactive BMIC and VNDM absintheminded90210 08/20/17 11:54:39 PM
#103178   I feel lucky to able to buy more AD2000 08/20/17 11:51:17 PM
#103177   The last Q has the most recent OS. absintheminded90210 08/20/17 11:51:04 PM
#103176   Momentum Can Drive it to a Dime....settle back TIWARIG 08/20/17 11:49:00 PM
#103175   Amen :) coach70 08/20/17 11:39:08 PM
#103174   How high do you think the market cap technicolor turncoat 08/20/17 11:30:35 PM
#103173   Of course. The big deals will not get mrcarnita 08/20/17 11:12:16 PM
#103172   I do but the stop sign has gotta gameofloans 08/20/17 11:10:48 PM
#103170   LOL...I would think Sirpeter 08/20/17 11:04:14 PM
#103169   No it's not. Not based on the current Titanium 08/20/17 11:03:42 PM
#103167   Lol you are conducting yourself ,if you have hawkshaw812 08/20/17 11:01:57 PM
#103166   Who here thinks a single 100m deal is mrcarnita 08/20/17 11:01:10 PM
#103165   Chart shows full blown up trend channel with Chartmaster 08/20/17 10:59:53 PM
#103164   The 10-bagger DD is not always the same. shotsky 08/20/17 10:59:49 PM
#103162   Have A Great Trading Weeek$$$$$ BVTK IS READY TIWARIG 08/20/17 10:39:12 PM
#103161   If I may ask, what's your criteria for hydr0gen1 08/20/17 10:38:02 PM
#103160   Don't believe you...1st you've only been at IHUB Sirpeter 08/20/17 10:36:03 PM
#103159   Thanks!! USMCMAC8808 08/20/17 10:34:01 PM
#103158   This is the week for reality!!! We will pennypauly 08/20/17 10:31:53 PM
#103157   Good week coming. I know it! badguy3101 08/20/17 10:18:15 PM
#103156   It starts with a lot of DD. I shotsky 08/20/17 10:14:20 PM
#103155   Smart play. Wish I had the experience and USMCMAC8808 08/20/17 09:31:30 PM
#103154   Just remember, all, do your own DD. There educatedinvestor1991 08/20/17 09:29:18 PM
#103153   Very Nice... I'm pulling for ya!! and me:) sampson one 08/20/17 09:18:43 PM
#103151   Yeah, that was part of my OWC* lotto Bionic Man 08/20/17 08:59:26 PM
#103148   Thanks Shotsky and good advice. I've only sampson one 08/20/17 08:41:13 PM
#103146   NO R/S! NO R/S!! NO R/S!!! FACTS OF lesnshawn 08/20/17 08:39:46 PM
#103145   UPDATED Bravatek DD: Why BVTK May Be Worth pennypauly 08/20/17 08:38:31 PM
#103144   My UPDATED Bravatek DD: Why BVTK May Be reader3 08/20/17 08:38:24 PM
#103143   Amazing telephone updates from Tom Cellucci! pennypauly 08/20/17 08:37:47 PM
#103142   SHOCK AND AWE!!!!!!!!!! pennypauly 08/20/17 08:36:30 PM
#103141   Bravatek ST LLC. There was a pr reader3 08/20/17 08:17:55 PM
#103140   Total guesswork here. I am thinking that since USMCMAC8808 08/20/17 08:17:44 PM
#103139   I keep about 12 companies, all of which shotsky 08/20/17 08:15:23 PM