SureTrader Nadex Advertisement PGUS
Home > Boards > US OTC > Computers - Software >

Bravatek Solutions Inc. (BVTK)

Add BVTK Price Alert      Hide Sticky   Hide Intro
Moderator: B0tt0M WaTcH3R, HPAR32
Search This Board: 
Last Post: 3/27/2017 10:09:44 AM - Followers: 110 - Board type: Free - Posts Today: 2

Excellent DD by Sterling (stervc)

~Significant Subliminal Hints…

This post will be delivered in two parts. Part 1 will indicate some key pieces from their PR released on Dec 3, 2015 that should be given some positive consideration in my opinion. Part 2 will indicate some huge support that ECRY(D) has of which would only affiliate themselves with ECRY(D) because of knowing that ECRY(D) must have some huge potential, especially allowing their names to be used in conjunction with ECRY.

Part 1:

Quietly, just recently on Dec 3, 2015 the company released a PR that never even hit the wires that was titled and indicated below:


Bravatek obtains line of secured financing up to $3M
Loan proceeds will be used for business development and to support the backlog reduction of Bravatek’s recent asset-acquisition of Viking Telecom Services

Before going any further, I think that it is important to note for those who are new to Ecrypt Technologies, Inc. (ECRYD) that on November 10, 2015, the company announced that it has changed its name to Bravatek Solutions, Inc.

Now let’s discuss some key points that were quietly indicated within the PR above. Then following I will explain why I greatly believe that ECRY(D) is preparing to turn the corner in a very big way in Part 2.

1~ECRY(D) has negotiated a $3-million line of secured financing from TCA’s Global Credit Master Fund to finance continued business development and execute on existing telecom services contracts Bravatek recently acquired from Viking Telecom Services.

2~ECRY(D) has received an initial tranche of funding of $350,000.

3~ECRY(D), in a relatively short period, has developed a suite of top-tier cyber products under the brand ECRYPT ONE.

4~ECRY(D) executed an acquisition providing eight, lucrative IDIQ (Indefinite Delivery Indefinite Quantity) contracts representing millions in potential purchase orders.

5~ECRY(D) line of credit for $3 million is secured by Bravatek’s assets, and the lender has a right to convert all or a portion of the principal into an equity position in Bravatek if it is not paid back as agreed. Bravatek anticipates repaying the loan in full by February of 2017. This is important because this means that no dilution if the company executes their business objectives for growth. Even as a worst case scenario, no more dilution until Feb 2017.

6~ECRY(D) will use the loan proceeds to support the support Bravatek’s recently acquired Viking Telecom Services operations to reduce its ever-increasing order backlog.

7~ECRY(D) has announced that some investors are buying out current convertible notes.

The key points above are reasons why I greatly believe that ECRY is preparing to turn the corner in a very big way. The company released an amendment within their 10Q/A below indicating that it’s Outstanding Shares (OS) was 677,234,730 shares before the execution of their recent 1-10 reverse split:

This means that after the recent 1-10 reverse split, the OS is in the area of 67,723,473 shares rounded up. I'm guessing that they could be positioning the company for some acquisitions/mergers as they previously hinted so the OS could increase as shares are used for leverage, but I'm sure that those shares will be restricted.

Part 2:

ECRYD is currently trading under the OTCQB status:

This means that ECRYD is a fully reporting stock that files ”audited financials” with the SEC. This also means that we will see 8-Ks filed with the SEC for any material events.

Below is what the company PR-ed regarding its $10 Million project with a major carrier:
Bravatek in Line for $10M Major Carrier Decommissioning Telecom Project

AUSTIN, TX--(Marketwired - November 20, 2015) - Bravatek Solutions, Inc. (OTCQB: ECRY) announced today that its Telecom Services Division, which it acquired from Viking in June, has signed a Letter of Intent with construction company YKTG, LLC, for a $10-million plus decommissioning project with a major cell phone carrier.

Work is expected to begin later this month and continue through January 2017.

I think it is important to note the importance of YKTG, LLC and their connections. Pay particular attention to what YKTG, LLC has achieved in 2015:

This is huge considering that YKTG, LLC currently have established strategic relationships with BAE Systems and ConCor Networks since ConCor Networks is a subsidiary and network infrastructure organization for EMCOR. EMCOR is the nation’s largest electrical contractor. EMCOR is a Fortune 500 company based in Norwalk, Connecticut that is generating over $6.4 Billion in Revenues and trades at over $50.00+ per share on the NYSE under the ticker of EME while having over 23,000 Employees:

Also important to note is YKTG, LLC having an established strategic relationships with BAE Systems which trades equivalent to over $500.00+ per share on the London Stock Exchange under the ticker of BA while generating over $17 Billion in Revenues. To further understand the magnitude of this company…
BAE Systems plc is a British multinational defense, security and aerospace company headquartered in London in the United Kingdom and with operations worldwide. It is among the world's largest defense contractors; it ranked as the second-largest based on applicable 2012 revenues. Its largest operations are in the United Kingdom and United States, where its BAE Systems Inc. subsidiary is one of the six largest suppliers to the US Department of Defense. Other major markets include Australia, India and Saudi Arabia. The company was formed on 30 November 1999 by the £7.7 billion merger of two British companies; Marconi Electronic Systems (MES) – the defense electronics and naval shipbuilding subsidiary of the General Electric Company plc (GEC) – and British Aerospace (BAe) – an aircraft, munitions and naval systems manufacturer:

ECRYD having business relations or ties to these companies directly and indirectly is huge in my opinion. Something bigger is going on to be revealed in the near future to benefit us shareholders in my opinion that justifies their backlog of orders to be filled. Let me further explain why.

On June 3, 2015, ECRYD announced news of having a deal with Kaspersky Government Security Solutions (KGSS) to be the exclusive provider of its products and services to multiple United States federal government agencies via Ecrypt’s Marketing Alliance Program (MAP):
KGSS is located in Arlington, VA and is a wholly-owned subsidiary of Kaspersky Lab, Inc. (KL North America), which is headquartered in Woburn, MA. Kaspersky Lab, Inc. is a wholly-owned subsidiary of Kaspersky Lab, Ltd., registered in the United Kingdom.

KGSS designs, implements and delivers holistic, world-class cybersecurity intelligence products, services and solutions. KGSS technology empowers advanced protection for the US government, its contractors and US national critical infrastructure sectors.

Kaspersky Lab is the world’s largest privately held vendor of endpoint protection solutions and is registered in the United Kingdom. Since its inception, Kaspersky Lab has followed a global vision and focused on international markets. This strategy helped the company’s business grow into a globally focused corporation.
Kaspersky Lab is an international software security group operating in almost 200 countries and territories worldwide. The company is headquartered in Moscow, Russia, with its holding company registered in the United Kingdom. Kaspersky Lab currently employs over 2,850 qualified specialists. It has 31 representative territory offices in 30 countries and its products and technologies provide service for over 300 million users and over 250,000 corporate clients worldwide. The company is specially focused on large enterprises, and small and medium-sized businesses.

As you can see from below, Kaspersky Lab has over 3,000 employees and generates over $711 Million in Revenues:

Something else important to note was the appointing of former CIA Cyber Expert Hans Holmer as a new Director for ECRYD on September 3, 2015:
Mr. Holmer is a recently retired CIA officer with extensive experience in strategic cyber issues. His experience in nation-state intelligence collection and corporate defense goes back nearly 20 years and his engagement with the interface of humans and technology goes back to 1973.

“I am pleased to join the board of Ecrypt. The combination of thorough yet simple security is sorely needed in the market and I look forward to working with the Ecrypt team to continue developing and deploying realistic and effective solutions in this sector,” commented Hans Holmer. …

Also instrumental towards the growth of the company was the appointing of Deborah King as their Interim Chief Financial Officer:
King possesses extensive experience in financial, operational, and business management. In addition to over 25 years of experience in the private sector, Ms. King possesses an in-depth understanding of financial, legal, and business tax regulations. Her vast background brings a unique set of skills to enable Ecrypt to rapidly move forward in its profitable sales growth.

Ms. King commented: “I am excited to be appointed to this critical role on the Ecrypt team and look forward to making an active contribution to the vision and future of Ecrypt Technologies, Inc. I am committed to leveraging my talents and experience to work in the continued growth and expansion of Ecrypt’s business.”


$188,000 Viking Telecom sales in JUNE 2015

Under the agreement, Ecrypt will be the exclusive worldwide provider of KGSS’s cyber threat products and services to mutually-agreed upon US government agencies. Products include KGSS’s Malware Indicators Database and Analysis System (MIDAS), Advanced Persistent Threat Analysis & Reporting platform, and various Intelligence Support Products.  As of June 4th

eCrypt Technologies, Inc. (ECRY) is an emerging provider of military-strength data security solutions for enterprise, government, and military. The company empowers organizations with the freedom to communicate and collaborate without risk of liability, reputation damage, competitive threat, and other negative outcomes. ECRY is the trusted first choice for those looking to keep their communications confidential.

Today’s businesses struggle to guard against the increasing number of dangers as a result of complicated networks built with many different components. These components are often individually patched to address new threats, while neglecting to close security gaps in traditional solutions. On average, data breaches and subsequent fines and litigation cost a U.S. business $534 million every year, the highest in the world according to the Ponemon Institute.

The flagship ECRY solution is an integrated email and encryption server that can be quickly deployed to fortify the security of corporate communication, including attachments and mobile devices, against data breaches while eliminating phishing threats, malware infections, and spam. By using ECRY’s paradigm-shifting technology, companies alleviate the need for separate encryption servers with their associated bloated administration and multiple points of weakness.

ECRY is well-positioned to benefit from the increasing demands of data confidentiality regulations such as the Health Insurance Portability and Accountability Act (HIPAA), the Federal Information Security Management Act (FISMA), and Gramm-Leach-Bliley Act (GLBA). As a result of extensive market research and multi-billion dollar industry input, the company fully understands the business community’s need to maintain confidentiality, prevent data breaches, comply with government regulations, and mitigate litigation risks.



Investment Highlights

  • Positioned to Benefit from increasing Federal Confidentiality Regulations
    Specializing in 5 Key Markets
    Providing Comprehensive Support with Strategic Multi-Phase Approach
    Highly Knowledgeable and Experienced Management Team
    Backed by Diverse Team of Seasoned Directors


The eCyrpt One Solution

Simplicity of system design ensures administrators, compliance officers, and end-users are able to work efficiently and effectively. Networks typically are secured by many disparate technologies piled on top of each other. This approach is costly, an administrative burden, and creates unnecessary complexity. It results in systems plagued by interoperability issues and security gaps. Moreover, because of patchwork, the networks are inherently vulnerable.

Ecrypt One is an information relay system built on a foundation of security. In essence, Ecrypt One is a secure email server. It is a direct replacement for a legacy email server like Microsoft Exchange, with integrated encryption and other email security tools.

Ecrypt One is an information relay system built on a foundation of security. In essence, Ecrypt One is a secure email server. It is a direct replacement for a legacy email server like Microsoft Exchange, with integrated encryption and other email security tools.

Everything is encrypted at all times in the closed Ecrypt One system. Built-in virus and malware detection protects against email borne threats and Ecrypt One is impervious to spam and phishing.

Ecrypt One treats anyone external to the organization as a visitor. This discrimination enables it to restrict visitor access to information. It also enables the organization to validate external recipients before information is exchanged.

Security policies are enforced automatically by Ecrypt One, to ensure employee compliance, and circumvent threats.

  • Optimizes enterprise securities by removing human vulnerabilities
    Fortifies against data leaks, device theft, and e-mail-born threats
    Provides granular role-based access controls for system administrators
    Secures communications with third parties such as vendors and clients

Solution Benefits:

  • Regulatory Compliance
    "Always On" Encryption
    Role Based Access Controls
    Security Rules
  • Secure Collaboration
    Multi-factor Authentication
    Security Awareness
    Highly Integratable


Security Consultation

ECRY’s consulting services are designed to help organizations overcome security and compliance challenges. It’s estimated 49% of an organization’s worth is derived from the information it stores.

The compromise of this information can be catastrophic to an organization. Loss of trust, reduced stock price, non-compliance fines, all these hit the bottom line hard.

No matter the need, the size or the industry, ECRY’s expert consultants work with its clients to optimize the security of their information system by:

  • Reviewing existing security practices and technologies and providing recommendations for improvement.
    Identifying technical security risks and threats then translating them into the context of business risks and threats.
    Determining the areas of greatest concern and offering recommendations for improvement.
    Planning security initiatives such as qualifying and deploying a new technology, or implementing new policies.
    Educating staff on security procedures, policies and, best practices.


Five Key Markets

Ecrypt One in Healthcare

Ecrypt One ensures that organizations not only meet but also exceed today’s HIPAA compliance obligations to remain ahead of the regulatory curve. This mitigates the risk of data breaches and subsequent litigation while allowing organizations to be competitive.

Failure to follow policies and procedures are mistakes that come at a very high price, especially in an industry so stringently regulated. Ecrypt One is designed to protect the information system despite its users.

  • Reinforces Security Policies
    Enables Compliance
    Secures Business Associates
    Optimized Administration
    Unencumbered Productivity


Ecrypt One in Government and Military

Designed to the highest national security and military specification standards.

Ecrypt One is a military strength email and encryption system. It assures the security, integrity and auditability of email and attachment communications in transit and at rest. Ecrypt One is an effective fortress that safeguards the exchange, storage, and audit integrity of email and attachments sent inter-agency, intra-agency and cross-border.

  • Secure Intra-agency and Inter-agency Collaboration
    Secure Cross-border collaboration
    Seamless Integration
    Access Controls
    Productivity and Mobility


Ecrypt One in Legal Services

Ecrypt One directly addresses issues of trust and confidentiality, protecting the cornerstone of the attorney-client relationship. The inherently secure nature of the solution provides familiar platforms to existing workflows and enables lawyers to maintain agility and mobility while operating securely.

It’s imperative to communicate freely, be productive, and still maintain security in such an important and confidential relationship.

  • Secure Productivity
    Mobile and BYOD Security
    Protecting Client Information


Ecrypt One in Law Enforcement

Balancing timeliness and collaboration with security is a challenge. Conventional methods can impede investigations and security failures compromise intelligence. ECRY views security in the context of the environment to secure operations from the inside and out.

There’s no margin for error when the safety and lives of people are at stake.

Public safety is dependent on the men and women of law enforcement. The necessity for secure collaboration with other agencies, in the homeland and abroad, is a crucial part of this important public service role. The inability to share intelligence securely can be crippling to investigations and the everyday value of public protection is compromised.

Conventional patchwork systems of security add-ons have proved cumbersome and ineffective. These patchworks impede duties and restrict operations rather than facilitate them. Addressing security as a strictly technological problem is in direct conflict with the agility law enforcement efforts necessitate.

ECRY creates new solutions vs. adapting old solutions to new problems. This approach helps solve security challenges within the context of the agency’s greater purpose. This promotes holistic solutions that protect entire information networks while facilitating maneuverability.


Ecrytpt One in Financial Services

Financial institutions by their very nature are a lucrative target for criminals. Notwithstanding, the market demands the convenience of virtual access. This is in conflict with the critical and enforced requirement for security. Viewing security as a business challenge rather than a technical one, results in solutions that support success in a highly competitive space.

The best option is to trade ineffective conventional systems for optimized and inherently secure information networks.

Modern financial institutions are facing a dilemma. On one side clients are demanding the convenience of more virtual access, but that’s a huge threat to security. In addition, security regulators are tightening the belt.

Total cost of operating a conventional patchwork system of security add-ons often hit the bottom line harder than the threats it’s supposed to defend against. Conventional information security impedes business development and makes it difficult to maintain compliance.

The effects of a breach can be devastating. Not only can an organization be harmed financially, but reputation and trust can be compromised.

ECRY’s approach is to optimize the system, placing people at the heart of its solutions and making technology work harder. By considering each challenge as a part of a complete business problem, the company solves the dilemma in a cost effective and efficient way. Smart solutions lower the total cost of ownership and expedite a return on security investment.


Five Phase Approach

Discovery Phase

The initial phase requires gathering extensive information and gaining a comprehensive understanding of an enterprise’s current system infrastructure. By exploring both technology and operations avenues, ECRY develops an absolute working knowledge of the business and the purposes for the security deployment. ECRY then defines system requirements and outlines what needs to be added, removed or changed in the existing technical infrastructure.

Customization Phase

The entire system is tailored and customized to meet all of the enterprise’s needs in a single comprehensive solution. This includes designing the system, branding all user interfaces, and other necessary code monkey criteria.

Implementation Phase

ECRY assists the enterprise’s IT with installation, configuration, and integration into existing infrastructure. This phase includes full orientation of IT staff and relevant employees, plus preparation of recommendations and best practices documentation across all necessary departments.


Unlimited access to help desk assistance as well, as product updates are included for every ECRY client.

Added Benefit Options

ECRY offers complimentary technologies, through trusted partnerships, to optimize each system for mobile device management, document integrity assurance and two-factor authentication. ECRY can also integrate with existing solutions already in place.


Management Team

eCrypt Technology’s management has the industry knowledge and entrepreneurial innovation to advance the company’s strong market position. They’re backed by a highly experienced, diverse and respected team of directors.


Brad Lever – Co-founder, CEO, Director

Brad Lever is a highly motivated entrepreneur with nearly 20 years of experience working in technology. His professional career spans a variety of sales and leadership roles with some of the industry’s most prominent companies, including Xerox, Sophos and Bell. Brad is also a member of the International Association of Privacy Professionals (IAPP).

Educated in business marketing and sales, Lever draws on his experience working as liaison to Fortune 100 and 500 companies in the USA and around the world to attract and engage potential customers and partners. He is instrumental in securing multiple product placement opportunities for ECRY.

Mr. Lever is a prudent business executive known for “squeezing six cents out of every nickel”. Under Brad’s leadership, ECRY has maintained operational and financial efficiency, persevering through one of the worst financial crises since the Great Depression.

Lever is a passionate businessman and the leading visionary behind ECRY technologies. His core goals at ECRY are to harness the team’s strengths while moderating its weaknesses. He maximizes present opportunities while anticipating and mitigating potential risks. He has lead eCrypt from research and development, to commercialization and into profitability.


Zasia Zukowska – Co-founder, Operations Manager

Kasia Zukowska’s primary focus is managing ECRY’s operations and maintaining good standing. She also works closely with the development team to ensure that ECRY creates and produces the most responsive and effective products possible.

Over the years Zukowska acquired diverse experience in account management and a variety of administrative capacities. Her career spans the technology sector, where she worked with North America’s leading telecommunications providers. There she gained broad experience as liaison to small, medium and enterprise level customers.

Zukowska has over 12 years of experience in the information security industry, which included operating an information security consulting firm.


Gabe Ruso – Co-founder, CTO

Gabe Ruso is an expert in software design and development. Trained internationally as a Java architect, his core proficiencies are service-oriented applications and encryption frameworks.

In addition to extensive experience abroad, Ruso held leadership roles at some of North America’s largest telecommunications and consulting firms. He now uses his vision and programming acumen to translate complex concepts into simple and effective products.

Gabe is also responsible for overseeing ECRY’s internal network.


Curt Weldon – Chairman

Curt Weldon served 20 years in the US Congress and retired as Vice Chairman of both, the Armed Services Committee and the Homeland Security Committee.

In 2007, Weldon formed Jenkins Hill International, and now provides national and international consulting services drawing on his experiences as a public official and leader of 60 Bi-Partisan Congressional Delegations to over 125 countries, including Libya and North Korea.

Weldon has received over 100 national and international awards and 7 Honorary Doctorate Degrees for his work. He is also an elected Member of the Russian Federation Academy of Sciences.


Jay Cohen – Director

The Honorable Jay Cohen is a retired Rear Admiral of the United States Navy. He is also the former Under Secretary of Homeland Security for Science and Technology of the United States Department of Homeland Security.

Rear Admiral Cohen received his commission as an ensign in 1968 after graduating from the United States Naval Academy. He holds a degree in Ocean Engineering from the Massachusetts Institute of Technology and the Woods Hole Oceanographic Institution and a Master of Science in Marine Engineering and Naval Architecture from MIT.

Early in his naval career he mastered Nuclear Power Training and later commanded a nuclear submarine. He followed that with stints as a senior member of the Nuclear Propulsion Examining Board for the U.S. Atlantic Fleet; command of a major surface ship, Director of the Navy Y2K Project Office; and Chief of Naval Research. At DHS, Rear Admiral Cohen assumed responsibility for evaluating, procuring and coordinating the department’s science and technology assets as well as responsibility across the 22 components of DHS for test and evaluation.

Starting in 2000, as Chief of Naval Research, Rear Admiral Cohen was the Department of the Navy’s Chief Technology Officer in wartime, responsible for the Navy and Marine Corps Science and Technology Program to rapidly meet combat technology needs.

Rear Admiral Cohen now serves as principal in The Chertoff Group. Additionally, he serves on numerous corporate boards and is the CEO of JayMCohen LLC. JayMCohen LLC is an independent consultant for science and technology in support of domestic and international defense, homeland security, and energy issues and solutions.


Dr. Erik Mettala – Director

Dr. Erik G. Mettala serves as the Cyber Chief Scientist at Battelle Memorial Institute’s National Security Global Business. Prior to joining Battelle, he was the Chief Scientist in SPARTA’s National Security Systems Sector in Columbia, MD. There he was responsible for the strategic technology planning and research for SPARTA’s intelligence, computer network operations, and information assurance business areas.

Prior to that, Dr. Mettala served as Vice President and Director of McAfee Research. At McAfee Research, he managed strategic technology research, including R&D business development and laboratory efforts. Under his direction, McAfee Research focused on high-risk research addressing the needs of McAfee product lines, including anti-virus, anti-spam, and host-based and network-based intrusion prevention.

A retired U.S. Army officer, Dr. Mettala served in a succession of positions of increasing complexity and responsibility in the United States Army. His roles included Deputy Director and then Director of the Software and Intelligence Systems Technology Office (SISTO) at the Defense Advanced Research Projects Agency (DARPA), and Deputy Director in the Information Science and Technology Office (ISTO).

In June of 2012 Dr. Mettala was inducted into the Information Systems Security Association (ISSA) International Hall of Fame.


Thomas Trkla – Director

Dr. Erik G. Mettala serves as the Cyber Chief Scientist at Battelle Memorial Institute’s National Security Global Business. Prior to joining Battelle, he was the Chief Scientist in SPARTA’s National Security Systems Sector in Columbia, MD. There he was responsible for the strategic technology planning and research for SPARTA’s intelligence, computer network operations, and information assurance business areas.

Prior to that, Dr. Mettala served as Vice President and Director of McAfee Research. At McAfee Research, he managed strategic technology research, including R&D business development and laboratory efforts. Under his direction, McAfee Research focused on high-risk research addressing the needs of McAfee product lines, including anti-virus, anti-spam, and host-based and network-based intrusion prevention.

A retired U.S. Army officer, Dr. Mettala served in a succession of positions of increasing complexity and responsibility in the United States Army. His roles included Deputy Director and then Director of the Software and Intelligence Systems Technology Office (SISTO) at the Defense Advanced Research Projects Agency (DARPA), and Deputy Director in the Information Science and Technology Office (ISTO).

In June of 2012 Dr. Mettala was inducted into the Information Systems Security Association (ISSA) International Hall of Fame.


Matthew Johnson – Director

Matthew Johnson brings 15 years of experience to eCrypt, working for the Department of Defense (DoD) and Intelligence Community. He is a recognized Subject Matter Expert (SME) in the areas of Computer Network Attack, Computer Network Defense, Mission Assurance, Secure-Computing, Cryptoanalysis Reverse-Engineering, and related-accreditation and testing.

Johnson provides Mission Assurance recommendations for some of the nation’s most critical advanced technology programs, advising and supporting DoD efforts to represent system investments to Congress and other government agencies, while extensively working with various government agencies to foster symbiotic relationships and cooperative development and investment.

Johnson’s support to a number of cyber-threat related government advisory panels and technical review boards is important to eCrypt’s acceptance into federal markets. His work extends to several technical investment review boards for the Federally Funded Research and Development Center(s) and University Applied Research Centers (UARCs). In these efforts, Johnson advises on technology investments, development timelines, and fielding Concepts of Operation to the intended user communities.

Johnson is a distinguished 16-year veteran of the United States Air Force Office of Special Investigations (AFOSI) supporting both cyber and technical surveillance operations. In this role, he was assigned exclusively to support advanced technology development and platform fielding efforts for the USAF.

Johnson holds a B.S. in Statistical Sciences from the Air Force Academy in Colorado Springs, CO. and a M.S. in Information Assurance from Norwich University in Northfield, VT. He also holds numerous cyber-related certifications and has held a TS/SCI clearance with Counterintelligence polygraph since 1998.


eCrypt Technologies, Inc.
4750 Table Mesa Dr.
Boulder, CO 80305
Phone: (866) 204-6703




  • 1D
  • 1M
  • 2M
  • 3M
  • 6M
  • 1Y
  • 2Y
  • 3Y
  • 5Y
Current Price
Bid Ask Day's Range
#9009  Sticky Note BVTK - very active on Twitter daily HPAR32 01/10/17 05:30:07 PM
#9329   To put into perspective how big of a Pennystockplayer 03/27/17 10:09:44 AM
#9328   He's said that before. But make sure you Pennystockplayer 03/27/17 07:55:42 AM
#9327   CEO is working hard selling and expanding awareness. HPAR32 03/26/17 09:24:06 PM
#9326   Always "Negotiating" and never closing. Tom is either Pennystockplayer 03/24/17 10:21:40 AM
#9325   And the ask just keeps on growing... Pennystockplayer 03/24/17 09:31:46 AM
#9324   Just relaying Twitter news philobuyer 03/24/17 07:56:28 AM
#9323   And we'll keep waiting and waiting until the Pennystockplayer 03/23/17 04:45:23 PM
#9322   I've had this stock for a long time! GoingStock 03/23/17 02:32:36 PM
#9321   Ha! Thx. That's about all the FYIs you Pennystockplayer 03/23/17 09:35:21 AM
#9320   FYI... philobuyer 03/23/17 07:47:43 AM
#9319   Meanwhile he posts on twitter almost two months Pennystockplayer 03/22/17 08:52:03 PM
#9318   He said he was working an equity deal...I armour1955 03/22/17 08:50:50 PM
#9317   He said in an email that he's expecting Pennystockplayer 03/22/17 10:10:02 AM
#9316   Penny...i am with you... armour1955 03/22/17 09:27:42 AM
#9315   Still nothing..... You bulls still bullish? Pennystockplayer 03/21/17 11:07:05 PM
#9314   Gotcha Peddler22 03/20/17 02:13:59 PM
#9313   I don't believe that one bit... I'm just Pennystockplayer 03/19/17 10:56:05 PM
#9312   So you must believe this has the ability Peddler22 03/19/17 10:53:15 PM
#9311   Of course if you can't find a Peddler22 03/19/17 10:36:46 PM
#9310   So pump the stock to get what I want? Pennystockplayer 03/19/17 10:19:57 PM
#9309   Change your tune then Common sense Peddler22 03/19/17 10:19:13 PM
#9308   I am in peddler, good luck with penny. tundra1 03/19/17 07:19:42 PM
#9307   BTW .004 is still a loss.. But an Pennystockplayer 03/18/17 08:21:34 PM
#9306   My sell order is at .004. Anything below Pennystockplayer 03/18/17 07:23:14 PM
#9305   Cmon penny. I need a follower lol. Peddler22 03/18/17 07:19:45 PM
#9304   Ha Pennystockplayer 03/18/17 07:12:50 PM
#9303   Definitely accumulating by a few players here. I Peddler22 03/18/17 07:09:37 PM
#9302   How is that! armour1955 03/18/17 11:33:48 AM
#9301   Very strong directional trend here. Easy breakout with poorguy1 03/18/17 11:32:47 AM
#9300   Just realized why the d-bag Cellucci is using Pennystockplayer 03/17/17 07:22:52 AM
#9299   It's the same old cliche on Twitter. AJ331 03/17/17 12:10:24 AM
#9298   lol why waste time on $pumpers ready to freebies 03/16/17 11:19:02 PM
#9297   Show me what selling looks like at this price... Pennystockplayer 03/16/17 05:11:06 PM
#9296   The trading appears to be accumulation the last tundra1 03/16/17 04:08:00 PM
#9295   How about now?? Pennystockplayer 03/16/17 09:22:36 AM
#9294   Still thinking that??? Pennystockplayer 03/15/17 09:39:30 AM
#9286   Thinking up date this week. tundra1 03/12/17 03:49:14 PM
#9284   nice! crook liar CEO has another 8 billion freebies 03/11/17 01:07:55 PM
#9283   Almost mid may through March and not so Pennystockplayer 03/11/17 08:26:59 AM
#9275   Tundra, I bet he had a bunch of Pennystockplayer 03/06/17 08:04:05 AM
#9274   Agreed armour1955 03/06/17 07:58:36 AM
#9273   He's very good at manipulation. Makes anything he Pennystockplayer 03/05/17 11:48:59 PM
#9272   Yes..thx Tundra...he has diluted the crap out of armour1955 03/05/17 08:02:08 PM
#9271   Thx Tundra Pennystockplayer 03/05/17 06:19:31 PM
#9270   The share structure update on OTC is March tundra1 03/05/17 11:08:04 AM
#9269   I was told this last week, by Tom tundra1 03/05/17 10:44:55 AM
#9268   Oh geez! I guess you are right! armour1955 03/04/17 08:11:31 PM
#9267   Was almost 2 months ago since he posted Pennystockplayer 03/04/17 08:10:41 PM
#9266   So do you think we will get some armour1955 03/04/17 08:10:03 PM
#9265   It was on twitter Pennystockplayer 03/04/17 08:09:13 PM