Interactive Brokers Advertisement
Home > Boards > US OTC > Computers - Software >

Bravatek Solutions Inc. (BVTK)

Add BVTK Price Alert      Hide Sticky   Hide Intro
Moderator: VEGASREAL8TOR, pennypauly, cjstocksup, B0tt0M WaTcH3R, HPAR32, Diego1235
Search This Board: 
Last Post: 6/26/2017 8:06:10 AM - Followers: 812 - Board type: Free - Posts Today: 110

Excellent DD by Sterling (stervc)

~Significant Subliminal Hints…

This post will be delivered in two parts. Part 1 will indicate some key pieces from their PR released on Dec 3, 2015 that should be given some positive consideration in my opinion. Part 2 will indicate some huge support that ECRY(D) has of which would only affiliate themselves with ECRY(D) because of knowing that ECRY(D) must have some huge potential, especially allowing their names to be used in conjunction with ECRY.

Part 1:

Quietly, just recently on Dec 3, 2015 the company released a PR that never even hit the wires that was titled and indicated below:


Bravatek obtains line of secured financing up to $3M
Loan proceeds will be used for business development and to support the backlog reduction of Bravatek’s recent asset-acquisition of Viking Telecom Services

Before going any further, I think that it is important to note for those who are new to Ecrypt Technologies, Inc. (ECRYD) that on November 10, 2015, the company announced that it has changed its name to Bravatek Solutions, Inc.

Now let’s discuss some key points that were quietly indicated within the PR above. Then following I will explain why I greatly believe that ECRY(D) is preparing to turn the corner in a very big way in Part 2.

1~ECRY(D) has negotiated a $3-million line of secured financing from TCA’s Global Credit Master Fund to finance continued business development and execute on existing telecom services contracts Bravatek recently acquired from Viking Telecom Services.

2~ECRY(D) has received an initial tranche of funding of $350,000.

3~ECRY(D), in a relatively short period, has developed a suite of top-tier cyber products under the brand ECRYPT ONE.

4~ECRY(D) executed an acquisition providing eight, lucrative IDIQ (Indefinite Delivery Indefinite Quantity) contracts representing millions in potential purchase orders.

5~ECRY(D) line of credit for $3 million is secured by Bravatek’s assets, and the lender has a right to convert all or a portion of the principal into an equity position in Bravatek if it is not paid back as agreed. Bravatek anticipates repaying the loan in full by February of 2017. This is important because this means that no dilution if the company executes their business objectives for growth. Even as a worst case scenario, no more dilution until Feb 2017.

6~ECRY(D) will use the loan proceeds to support the support Bravatek’s recently acquired Viking Telecom Services operations to reduce its ever-increasing order backlog.

7~ECRY(D) has announced that some investors are buying out current convertible notes.

The key points above are reasons why I greatly believe that ECRY is preparing to turn the corner in a very big way. The company released an amendment within their 10Q/A below indicating that it’s Outstanding Shares (OS) was 677,234,730 shares before the execution of their recent 1-10 reverse split:

This means that after the recent 1-10 reverse split, the OS is in the area of 67,723,473 shares rounded up. I'm guessing that they could be positioning the company for some acquisitions/mergers as they previously hinted so the OS could increase as shares are used for leverage, but I'm sure that those shares will be restricted.

Part 2:

ECRYD is currently trading under the OTCQB status:

This means that ECRYD is a fully reporting stock that files ”audited financials” with the SEC. This also means that we will see 8-Ks filed with the SEC for any material events.

Below is what the company PR-ed regarding its $10 Million project with a major carrier:
Bravatek in Line for $10M Major Carrier Decommissioning Telecom Project

AUSTIN, TX--(Marketwired - November 20, 2015) - Bravatek Solutions, Inc. (OTCQB: ECRY) announced today that its Telecom Services Division, which it acquired from Viking in June, has signed a Letter of Intent with construction company YKTG, LLC, for a $10-million plus decommissioning project with a major cell phone carrier.

Work is expected to begin later this month and continue through January 2017.

I think it is important to note the importance of YKTG, LLC and their connections. Pay particular attention to what YKTG, LLC has achieved in 2015:

This is huge considering that YKTG, LLC currently have established strategic relationships with BAE Systems and ConCor Networks since ConCor Networks is a subsidiary and network infrastructure organization for EMCOR. EMCOR is the nation’s largest electrical contractor. EMCOR is a Fortune 500 company based in Norwalk, Connecticut that is generating over $6.4 Billion in Revenues and trades at over $50.00+ per share on the NYSE under the ticker of EME while having over 23,000 Employees:

Also important to note is YKTG, LLC having an established strategic relationships with BAE Systems which trades equivalent to over $500.00+ per share on the London Stock Exchange under the ticker of BA while generating over $17 Billion in Revenues. To further understand the magnitude of this company…
BAE Systems plc is a British multinational defense, security and aerospace company headquartered in London in the United Kingdom and with operations worldwide. It is among the world's largest defense contractors; it ranked as the second-largest based on applicable 2012 revenues. Its largest operations are in the United Kingdom and United States, where its BAE Systems Inc. subsidiary is one of the six largest suppliers to the US Department of Defense. Other major markets include Australia, India and Saudi Arabia. The company was formed on 30 November 1999 by the £7.7 billion merger of two British companies; Marconi Electronic Systems (MES) – the defense electronics and naval shipbuilding subsidiary of the General Electric Company plc (GEC) – and British Aerospace (BAe) – an aircraft, munitions and naval systems manufacturer:

ECRYD having business relations or ties to these companies directly and indirectly is huge in my opinion. Something bigger is going on to be revealed in the near future to benefit us shareholders in my opinion that justifies their backlog of orders to be filled. Let me further explain why.

On June 3, 2015, ECRYD announced news of having a deal with Kaspersky Government Security Solutions (KGSS) to be the exclusive provider of its products and services to multiple United States federal government agencies via Ecrypt’s Marketing Alliance Program (MAP):
KGSS is located in Arlington, VA and is a wholly-owned subsidiary of Kaspersky Lab, Inc. (KL North America), which is headquartered in Woburn, MA. Kaspersky Lab, Inc. is a wholly-owned subsidiary of Kaspersky Lab, Ltd., registered in the United Kingdom.

KGSS designs, implements and delivers holistic, world-class cybersecurity intelligence products, services and solutions. KGSS technology empowers advanced protection for the US government, its contractors and US national critical infrastructure sectors.

Kaspersky Lab is the world’s largest privately held vendor of endpoint protection solutions and is registered in the United Kingdom. Since its inception, Kaspersky Lab has followed a global vision and focused on international markets. This strategy helped the company’s business grow into a globally focused corporation.
Kaspersky Lab is an international software security group operating in almost 200 countries and territories worldwide. The company is headquartered in Moscow, Russia, with its holding company registered in the United Kingdom. Kaspersky Lab currently employs over 2,850 qualified specialists. It has 31 representative territory offices in 30 countries and its products and technologies provide service for over 300 million users and over 250,000 corporate clients worldwide. The company is specially focused on large enterprises, and small and medium-sized businesses.

As you can see from below, Kaspersky Lab has over 3,000 employees and generates over $711 Million in Revenues:

Something else important to note was the appointing of former CIA Cyber Expert Hans Holmer as a new Director for ECRYD on September 3, 2015:
Mr. Holmer is a recently retired CIA officer with extensive experience in strategic cyber issues. His experience in nation-state intelligence collection and corporate defense goes back nearly 20 years and his engagement with the interface of humans and technology goes back to 1973.

“I am pleased to join the board of Ecrypt. The combination of thorough yet simple security is sorely needed in the market and I look forward to working with the Ecrypt team to continue developing and deploying realistic and effective solutions in this sector,” commented Hans Holmer. …

Also instrumental towards the growth of the company was the appointing of Deborah King as their Interim Chief Financial Officer:
King possesses extensive experience in financial, operational, and business management. In addition to over 25 years of experience in the private sector, Ms. King possesses an in-depth understanding of financial, legal, and business tax regulations. Her vast background brings a unique set of skills to enable Ecrypt to rapidly move forward in its profitable sales growth.

Ms. King commented: “I am excited to be appointed to this critical role on the Ecrypt team and look forward to making an active contribution to the vision and future of Ecrypt Technologies, Inc. I am committed to leveraging my talents and experience to work in the continued growth and expansion of Ecrypt’s business.”


$188,000 Viking Telecom sales in JUNE 2015

Under the agreement, Ecrypt will be the exclusive worldwide provider of KGSS’s cyber threat products and services to mutually-agreed upon US government agencies. Products include KGSS’s Malware Indicators Database and Analysis System (MIDAS), Advanced Persistent Threat Analysis & Reporting platform, and various Intelligence Support Products.  As of June 4th

eCrypt Technologies, Inc. (ECRY) is an emerging provider of military-strength data security solutions for enterprise, government, and military. The company empowers organizations with the freedom to communicate and collaborate without risk of liability, reputation damage, competitive threat, and other negative outcomes. ECRY is the trusted first choice for those looking to keep their communications confidential.

Today’s businesses struggle to guard against the increasing number of dangers as a result of complicated networks built with many different components. These components are often individually patched to address new threats, while neglecting to close security gaps in traditional solutions. On average, data breaches and subsequent fines and litigation cost a U.S. business $534 million every year, the highest in the world according to the Ponemon Institute.

The flagship ECRY solution is an integrated email and encryption server that can be quickly deployed to fortify the security of corporate communication, including attachments and mobile devices, against data breaches while eliminating phishing threats, malware infections, and spam. By using ECRY’s paradigm-shifting technology, companies alleviate the need for separate encryption servers with their associated bloated administration and multiple points of weakness.

ECRY is well-positioned to benefit from the increasing demands of data confidentiality regulations such as the Health Insurance Portability and Accountability Act (HIPAA), the Federal Information Security Management Act (FISMA), and Gramm-Leach-Bliley Act (GLBA). As a result of extensive market research and multi-billion dollar industry input, the company fully understands the business community’s need to maintain confidentiality, prevent data breaches, comply with government regulations, and mitigate litigation risks.



Investment Highlights

  • Positioned to Benefit from increasing Federal Confidentiality Regulations
    Specializing in 5 Key Markets
    Providing Comprehensive Support with Strategic Multi-Phase Approach
    Highly Knowledgeable and Experienced Management Team
    Backed by Diverse Team of Seasoned Directors


The eCyrpt One Solution

Simplicity of system design ensures administrators, compliance officers, and end-users are able to work efficiently and effectively. Networks typically are secured by many disparate technologies piled on top of each other. This approach is costly, an administrative burden, and creates unnecessary complexity. It results in systems plagued by interoperability issues and security gaps. Moreover, because of patchwork, the networks are inherently vulnerable.

Ecrypt One is an information relay system built on a foundation of security. In essence, Ecrypt One is a secure email server. It is a direct replacement for a legacy email server like Microsoft Exchange, with integrated encryption and other email security tools.

Ecrypt One is an information relay system built on a foundation of security. In essence, Ecrypt One is a secure email server. It is a direct replacement for a legacy email server like Microsoft Exchange, with integrated encryption and other email security tools.

Everything is encrypted at all times in the closed Ecrypt One system. Built-in virus and malware detection protects against email borne threats and Ecrypt One is impervious to spam and phishing.

Ecrypt One treats anyone external to the organization as a visitor. This discrimination enables it to restrict visitor access to information. It also enables the organization to validate external recipients before information is exchanged.

Security policies are enforced automatically by Ecrypt One, to ensure employee compliance, and circumvent threats.

  • Optimizes enterprise securities by removing human vulnerabilities
    Fortifies against data leaks, device theft, and e-mail-born threats
    Provides granular role-based access controls for system administrators
    Secures communications with third parties such as vendors and clients

Solution Benefits:

  • Regulatory Compliance
    "Always On" Encryption
    Role Based Access Controls
    Security Rules
  • Secure Collaboration
    Multi-factor Authentication
    Security Awareness
    Highly Integratable


Security Consultation

ECRY’s consulting services are designed to help organizations overcome security and compliance challenges. It’s estimated 49% of an organization’s worth is derived from the information it stores.

The compromise of this information can be catastrophic to an organization. Loss of trust, reduced stock price, non-compliance fines, all these hit the bottom line hard.

No matter the need, the size or the industry, ECRY’s expert consultants work with its clients to optimize the security of their information system by:

  • Reviewing existing security practices and technologies and providing recommendations for improvement.
    Identifying technical security risks and threats then translating them into the context of business risks and threats.
    Determining the areas of greatest concern and offering recommendations for improvement.
    Planning security initiatives such as qualifying and deploying a new technology, or implementing new policies.
    Educating staff on security procedures, policies and, best practices.


Five Key Markets

Ecrypt One in Healthcare

Ecrypt One ensures that organizations not only meet but also exceed today’s HIPAA compliance obligations to remain ahead of the regulatory curve. This mitigates the risk of data breaches and subsequent litigation while allowing organizations to be competitive.

Failure to follow policies and procedures are mistakes that come at a very high price, especially in an industry so stringently regulated. Ecrypt One is designed to protect the information system despite its users.

  • Reinforces Security Policies
    Enables Compliance
    Secures Business Associates
    Optimized Administration
    Unencumbered Productivity


Ecrypt One in Government and Military

Designed to the highest national security and military specification standards.

Ecrypt One is a military strength email and encryption system. It assures the security, integrity and auditability of email and attachment communications in transit and at rest. Ecrypt One is an effective fortress that safeguards the exchange, storage, and audit integrity of email and attachments sent inter-agency, intra-agency and cross-border.

  • Secure Intra-agency and Inter-agency Collaboration
    Secure Cross-border collaboration
    Seamless Integration
    Access Controls
    Productivity and Mobility


Ecrypt One in Legal Services

Ecrypt One directly addresses issues of trust and confidentiality, protecting the cornerstone of the attorney-client relationship. The inherently secure nature of the solution provides familiar platforms to existing workflows and enables lawyers to maintain agility and mobility while operating securely.

It’s imperative to communicate freely, be productive, and still maintain security in such an important and confidential relationship.

  • Secure Productivity
    Mobile and BYOD Security
    Protecting Client Information


Ecrypt One in Law Enforcement

Balancing timeliness and collaboration with security is a challenge. Conventional methods can impede investigations and security failures compromise intelligence. ECRY views security in the context of the environment to secure operations from the inside and out.

There’s no margin for error when the safety and lives of people are at stake.

Public safety is dependent on the men and women of law enforcement. The necessity for secure collaboration with other agencies, in the homeland and abroad, is a crucial part of this important public service role. The inability to share intelligence securely can be crippling to investigations and the everyday value of public protection is compromised.

Conventional patchwork systems of security add-ons have proved cumbersome and ineffective. These patchworks impede duties and restrict operations rather than facilitate them. Addressing security as a strictly technological problem is in direct conflict with the agility law enforcement efforts necessitate.

ECRY creates new solutions vs. adapting old solutions to new problems. This approach helps solve security challenges within the context of the agency’s greater purpose. This promotes holistic solutions that protect entire information networks while facilitating maneuverability.


Ecrytpt One in Financial Services

Financial institutions by their very nature are a lucrative target for criminals. Notwithstanding, the market demands the convenience of virtual access. This is in conflict with the critical and enforced requirement for security. Viewing security as a business challenge rather than a technical one, results in solutions that support success in a highly competitive space.

The best option is to trade ineffective conventional systems for optimized and inherently secure information networks.

Modern financial institutions are facing a dilemma. On one side clients are demanding the convenience of more virtual access, but that’s a huge threat to security. In addition, security regulators are tightening the belt.

Total cost of operating a conventional patchwork system of security add-ons often hit the bottom line harder than the threats it’s supposed to defend against. Conventional information security impedes business development and makes it difficult to maintain compliance.

The effects of a breach can be devastating. Not only can an organization be harmed financially, but reputation and trust can be compromised.

ECRY’s approach is to optimize the system, placing people at the heart of its solutions and making technology work harder. By considering each challenge as a part of a complete business problem, the company solves the dilemma in a cost effective and efficient way. Smart solutions lower the total cost of ownership and expedite a return on security investment.


Five Phase Approach

Discovery Phase

The initial phase requires gathering extensive information and gaining a comprehensive understanding of an enterprise’s current system infrastructure. By exploring both technology and operations avenues, ECRY develops an absolute working knowledge of the business and the purposes for the security deployment. ECRY then defines system requirements and outlines what needs to be added, removed or changed in the existing technical infrastructure.

Customization Phase

The entire system is tailored and customized to meet all of the enterprise’s needs in a single comprehensive solution. This includes designing the system, branding all user interfaces, and other necessary code monkey criteria.

Implementation Phase

ECRY assists the enterprise’s IT with installation, configuration, and integration into existing infrastructure. This phase includes full orientation of IT staff and relevant employees, plus preparation of recommendations and best practices documentation across all necessary departments.


Unlimited access to help desk assistance as well, as product updates are included for every ECRY client.

Added Benefit Options

ECRY offers complimentary technologies, through trusted partnerships, to optimize each system for mobile device management, document integrity assurance and two-factor authentication. ECRY can also integrate with existing solutions already in place.


Management Team

eCrypt Technology’s management has the industry knowledge and entrepreneurial innovation to advance the company’s strong market position. They’re backed by a highly experienced, diverse and respected team of directors.


Brad Lever – Co-founder, CEO, Director

Brad Lever is a highly motivated entrepreneur with nearly 20 years of experience working in technology. His professional career spans a variety of sales and leadership roles with some of the industry’s most prominent companies, including Xerox, Sophos and Bell. Brad is also a member of the International Association of Privacy Professionals (IAPP).

Educated in business marketing and sales, Lever draws on his experience working as liaison to Fortune 100 and 500 companies in the USA and around the world to attract and engage potential customers and partners. He is instrumental in securing multiple product placement opportunities for ECRY.

Mr. Lever is a prudent business executive known for “squeezing six cents out of every nickel”. Under Brad’s leadership, ECRY has maintained operational and financial efficiency, persevering through one of the worst financial crises since the Great Depression.

Lever is a passionate businessman and the leading visionary behind ECRY technologies. His core goals at ECRY are to harness the team’s strengths while moderating its weaknesses. He maximizes present opportunities while anticipating and mitigating potential risks. He has lead eCrypt from research and development, to commercialization and into profitability.


Zasia Zukowska – Co-founder, Operations Manager

Kasia Zukowska’s primary focus is managing ECRY’s operations and maintaining good standing. She also works closely with the development team to ensure that ECRY creates and produces the most responsive and effective products possible.

Over the years Zukowska acquired diverse experience in account management and a variety of administrative capacities. Her career spans the technology sector, where she worked with North America’s leading telecommunications providers. There she gained broad experience as liaison to small, medium and enterprise level customers.

Zukowska has over 12 years of experience in the information security industry, which included operating an information security consulting firm.


Gabe Ruso – Co-founder, CTO

Gabe Ruso is an expert in software design and development. Trained internationally as a Java architect, his core proficiencies are service-oriented applications and encryption frameworks.

In addition to extensive experience abroad, Ruso held leadership roles at some of North America’s largest telecommunications and consulting firms. He now uses his vision and programming acumen to translate complex concepts into simple and effective products.

Gabe is also responsible for overseeing ECRY’s internal network.


Curt Weldon – Chairman

Curt Weldon served 20 years in the US Congress and retired as Vice Chairman of both, the Armed Services Committee and the Homeland Security Committee.

In 2007, Weldon formed Jenkins Hill International, and now provides national and international consulting services drawing on his experiences as a public official and leader of 60 Bi-Partisan Congressional Delegations to over 125 countries, including Libya and North Korea.

Weldon has received over 100 national and international awards and 7 Honorary Doctorate Degrees for his work. He is also an elected Member of the Russian Federation Academy of Sciences.


Jay Cohen – Director

The Honorable Jay Cohen is a retired Rear Admiral of the United States Navy. He is also the former Under Secretary of Homeland Security for Science and Technology of the United States Department of Homeland Security.

Rear Admiral Cohen received his commission as an ensign in 1968 after graduating from the United States Naval Academy. He holds a degree in Ocean Engineering from the Massachusetts Institute of Technology and the Woods Hole Oceanographic Institution and a Master of Science in Marine Engineering and Naval Architecture from MIT.

Early in his naval career he mastered Nuclear Power Training and later commanded a nuclear submarine. He followed that with stints as a senior member of the Nuclear Propulsion Examining Board for the U.S. Atlantic Fleet; command of a major surface ship, Director of the Navy Y2K Project Office; and Chief of Naval Research. At DHS, Rear Admiral Cohen assumed responsibility for evaluating, procuring and coordinating the department’s science and technology assets as well as responsibility across the 22 components of DHS for test and evaluation.

Starting in 2000, as Chief of Naval Research, Rear Admiral Cohen was the Department of the Navy’s Chief Technology Officer in wartime, responsible for the Navy and Marine Corps Science and Technology Program to rapidly meet combat technology needs.

Rear Admiral Cohen now serves as principal in The Chertoff Group. Additionally, he serves on numerous corporate boards and is the CEO of JayMCohen LLC. JayMCohen LLC is an independent consultant for science and technology in support of domestic and international defense, homeland security, and energy issues and solutions.


Dr. Erik Mettala – Director

Dr. Erik G. Mettala serves as the Cyber Chief Scientist at Battelle Memorial Institute’s National Security Global Business. Prior to joining Battelle, he was the Chief Scientist in SPARTA’s National Security Systems Sector in Columbia, MD. There he was responsible for the strategic technology planning and research for SPARTA’s intelligence, computer network operations, and information assurance business areas.

Prior to that, Dr. Mettala served as Vice President and Director of McAfee Research. At McAfee Research, he managed strategic technology research, including R&D business development and laboratory efforts. Under his direction, McAfee Research focused on high-risk research addressing the needs of McAfee product lines, including anti-virus, anti-spam, and host-based and network-based intrusion prevention.

A retired U.S. Army officer, Dr. Mettala served in a succession of positions of increasing complexity and responsibility in the United States Army. His roles included Deputy Director and then Director of the Software and Intelligence Systems Technology Office (SISTO) at the Defense Advanced Research Projects Agency (DARPA), and Deputy Director in the Information Science and Technology Office (ISTO).

In June of 2012 Dr. Mettala was inducted into the Information Systems Security Association (ISSA) International Hall of Fame.


Thomas Trkla – Director

Dr. Erik G. Mettala serves as the Cyber Chief Scientist at Battelle Memorial Institute’s National Security Global Business. Prior to joining Battelle, he was the Chief Scientist in SPARTA’s National Security Systems Sector in Columbia, MD. There he was responsible for the strategic technology planning and research for SPARTA’s intelligence, computer network operations, and information assurance business areas.

Prior to that, Dr. Mettala served as Vice President and Director of McAfee Research. At McAfee Research, he managed strategic technology research, including R&D business development and laboratory efforts. Under his direction, McAfee Research focused on high-risk research addressing the needs of McAfee product lines, including anti-virus, anti-spam, and host-based and network-based intrusion prevention.

A retired U.S. Army officer, Dr. Mettala served in a succession of positions of increasing complexity and responsibility in the United States Army. His roles included Deputy Director and then Director of the Software and Intelligence Systems Technology Office (SISTO) at the Defense Advanced Research Projects Agency (DARPA), and Deputy Director in the Information Science and Technology Office (ISTO).

In June of 2012 Dr. Mettala was inducted into the Information Systems Security Association (ISSA) International Hall of Fame.


Matthew Johnson – Director

Matthew Johnson brings 15 years of experience to eCrypt, working for the Department of Defense (DoD) and Intelligence Community. He is a recognized Subject Matter Expert (SME) in the areas of Computer Network Attack, Computer Network Defense, Mission Assurance, Secure-Computing, Cryptoanalysis Reverse-Engineering, and related-accreditation and testing.

Johnson provides Mission Assurance recommendations for some of the nation’s most critical advanced technology programs, advising and supporting DoD efforts to represent system investments to Congress and other government agencies, while extensively working with various government agencies to foster symbiotic relationships and cooperative development and investment.

Johnson’s support to a number of cyber-threat related government advisory panels and technical review boards is important to eCrypt’s acceptance into federal markets. His work extends to several technical investment review boards for the Federally Funded Research and Development Center(s) and University Applied Research Centers (UARCs). In these efforts, Johnson advises on technology investments, development timelines, and fielding Concepts of Operation to the intended user communities.

Johnson is a distinguished 16-year veteran of the United States Air Force Office of Special Investigations (AFOSI) supporting both cyber and technical surveillance operations. In this role, he was assigned exclusively to support advanced technology development and platform fielding efforts for the USAF.

Johnson holds a B.S. in Statistical Sciences from the Air Force Academy in Colorado Springs, CO. and a M.S. in Information Assurance from Norwich University in Northfield, VT. He also holds numerous cyber-related certifications and has held a TS/SCI clearance with Counterintelligence polygraph since 1998.

eCrypt Technologies, Inc.
4750 Table Mesa Dr.
Boulder, CO 80305
Phone: (866) 204-6703




Current Price
Bid Ask Day's Range
  • 1D
  • 1M
  • 2M
  • 3M
  • 6M
  • 1Y
  • 2Y
  • 3Y
  • 5Y
News News Alert: New Colombia Resources, Inc. (OTC Pink: NEWC), Successfully Treats Prostate Cancer with its Pure Cannabis Extracts 06/26/2017 06:30:00 AM
#65507  Sticky Note Patent Application: in-process and going AS IT SHOULD. MoneyForNuthin 06/24/17 03:37:34 AM
#62383  Sticky Note A company is not required to announce a thelawless 06/20/17 10:50:22 PM
#61711  Sticky Note BVTK ADDED TO CONTRACTORS ON http://NASA.GOV OFFICIALLY HAVE cjstocksup 06/20/17 10:04:13 AM
#59172  Sticky Note TOM SAYS HE MAY HAVE A SHARE BUY VEGASREAL8TOR 06/16/17 04:19:15 PM
#56249  Sticky Note Tom mentions BVTK going to Nasdaq "Sooner than STARSTOCKS 06/11/17 07:28:04 PM
#30255  Sticky Note A few takeaways from my phone call with STARSTOCKS 05/02/17 07:18:38 AM
#66394   Oh I see that problem... am51 06/26/17 08:15:31 AM
#66393   Alternative forums to IHub? If so, let's leave RN1 06/26/17 08:15:18 AM
#66392   About what? What is so egregious that has drog68 06/26/17 08:15:13 AM
#66391   ALSO E-MAILED TOM!!! I SUGGEST ALL DO Thunderstruck 06/26/17 08:13:44 AM
#66390   You knew that was coming a? Interesting JLHammer 06/26/17 08:13:21 AM
#66389   Not Seeing it, can someone post, thx Porterhouse10 06/26/17 08:13:18 AM
#66388   REGISTERED A COMPLAINT!!! Thunderstruck 06/26/17 08:13:00 AM
#66387   Very Encouraging! The Lengths! STRONG BUY!! BVTK PINKPASTE 06/26/17 08:12:55 AM
#66385 Thunderstruck 06/26/17 08:12:23 AM
#66384   $$$BVTK$$$ Imokhopeur 06/26/17 08:10:37 AM
#66383   Why are they pumping NEWC on this board The Devils Advocate 06/26/17 08:10:25 AM
#66382   30s today ? newlonginvest 06/26/17 08:09:15 AM
#66380   I somewhat agree but don't push another position Imokhopeur 06/26/17 08:08:06 AM
#66379   Exactly JLHammer 06/26/17 08:07:50 AM
#66378   BVTK RUN UP will not be STOPPED!! Kingsolomonspoolz 06/26/17 08:07:34 AM
#66375   jc, calm down, who cares. know what u colmar 06/26/17 08:06:10 AM
#66374   Advertising we are softening??? Then pushing another position! Imokhopeur 06/26/17 08:05:54 AM
#66373   Awesome. It's amazing what IHUB gets away with JLHammer 06/26/17 08:05:41 AM
#66371   So iHub suggests you look at another stock kilch 06/26/17 08:04:07 AM
#66370   Do it by holding and getting paid!! Thats Truetexan254 06/26/17 08:04:07 AM
#66369   911 FAKE IHUB News Alert: like CNN Vipimage1 06/26/17 08:03:25 AM
#66368   SEC to start since it's innacurate information by JLHammer 06/26/17 08:03:06 AM
#66367   Ihub is part of the problem!!! The ring 714 06/26/17 08:02:48 AM
#66366   Of what who did??? What are u Kingsolomonspoolz 06/26/17 08:01:24 AM
#66365   I don't see anything either. LTinsley 06/26/17 08:01:11 AM
#66364   we need to FUCK up IHUB and there Vipimage1 06/26/17 08:00:46 AM
#66363   Haha where did I state there was a 714 06/26/17 08:00:40 AM
#66361   PLEASE!!! ALL LONGS E-MAIL TOM!!! LET HIM BE Thunderstruck 06/26/17 08:00:03 AM
#66360   keep post it all day how bad that was Vipimage1 06/26/17 07:59:44 AM
#66359   What are you all talking about I don't eur06 06/26/17 07:59:32 AM
#66358   100.00 for that horsesh... $BVTK PINKPASTE 06/26/17 07:59:05 AM
#66357   I-HUB!!!!!! TAKE THE ANNOUNCEMENT OFF OF OUR BOARD!!!!! Vipimage1 06/26/17 07:58:53 AM
#66356   THIS CANNOT BE TOLERATED BY US!!!!! ALL Thunderstruck 06/26/17 07:58:49 AM
#66355   I-HUB!!!!!! TAKE THE ANNOUNCEMENT OFF OF OUR Thunderstruck 06/26/17 07:57:31 AM
#66354   we need to star bashing ihub for what Vipimage1 06/26/17 07:57:29 AM
#66352   like now Vipimage1 06/26/17 07:56:35 AM
#66351   I-HUB!!!!!! TAKE THAT ANNOUNCEMENT OFF OF BVTK'S Thunderstruck 06/26/17 07:56:22 AM
#66350   IHUB!!!!!! TAKE THAT ANNOUNCEMENT OFF BVTK'S BOARD!!!!!! Thunderstruck 06/26/17 07:55:15 AM
#66349   Exactly, they're advertising "NEWC" on $BVTK board. That's Digging For Pennies 06/26/17 07:55:13 AM
#66348   911 paid BASHER here let all keep posting Vipimage1 06/26/17 07:55:07 AM
#66347   nice do it ty Vipimage1 06/26/17 07:54:16 AM
#66346   any drop here will be aggressively purchased. we colmar 06/26/17 07:53:58 AM
#66344   I HUB ARTICLE ISN'T NEWS FROM THE COMPANY Digging For Pennies 06/26/17 07:52:14 AM
#66343   NOT ACCEPTABLE AT ALL!!!! IM GOING FOWARD Thunderstruck 06/26/17 07:52:12 AM
#66342   Buy "SS" problem you mean "sh!t stain" from am51 06/26/17 07:52:03 AM
#66341   look bvtk has zip to do with pot Vipimage1 06/26/17 07:51:58 AM
#66340   hell yes that was sad try to make Vipimage1 06/26/17 07:51:12 AM
#66339   ALL LONGS!!!! SEND TOM AN E-MAIL!!!! Thunderstruck 06/26/17 07:50:59 AM
#66338   new bee's you can tell a basher by Vipimage1 06/26/17 07:50:14 AM
#66336   Why not CO? goldendiva 06/26/17 07:41:25 AM