Welcome To Wolverine
Wolverine Exploration Inc. A Nevada Corporation, symbol WOLV on the OTC:QB
Wolverine also holds The Eureka Project Claims in the prolific area of the Cariboo in British Columbia Canada. A total area of 3,910.67 hectares (9,663.5 acres), are located immediately adjacent to the Wingdam Project in the Cariboo gold field area. The property is located along the north and south banks of Lightning Creek, spanning south to Sovereign Creek at its confluence with Atis Creek. Highway 26 runs along the northeastern boundary and the Swift River forest service road runs through the property. All areas of the property are accessible by forest service roads. The property is located 30 km east of Quesnel in Central British Columbia. Access is via the all-weather Barkerville Highway No. 26, then by logging and mining roads through the property. The Cariboo Mining District in south-central British Columbia has a history as a world-class producer of gold.
Wolverine Exploration Inc. has entered into a Letter of Intent ("LOI") with the cyber security corporation ENIGMAMobil Inc.("Enigma") Wolverine will acquire a 25% interest in Enigma for a purchase price of USD $5,000,000 of which USD $3,000,000 is to be paid in shares of common stock of Wolverine at a deemed price of USD$0.01 per share and USD $2,000,000 in cash.
Mr. Lee Costerd has acted as Wolverine's sole Director and Officer since its inception on February 23, 2006. Mr. Costerd has been involved in the mining industry for the past 20 years. Mr Costerd was the mine manager for a placer mining operation in British Columbia and a supervisor at a hard rock mining operation also in British Columbia.
Texada Consulting Inc. assists in fund raising and will provide administrative services to Wolverine through its representative Mr. Bruce Costerd. Mr. Costerd was President, Chief Executive Officer and a director of Gallery Resources Limited between 1990-2006.
Geophysical services will be coordinated by Mr. Stephen Balch. Mr. Balch graduated in 1985 with a B.Sc. (honours), Applied Geophysics, from the University of Western Ontario. Mr. Balch is currently President of Canadian Mining Geophysics Ltd. Mr. Balch was President of Aeroquest International Limited between 2004-2007. Mr. Balch was a senior geophysicist with Inco Limited between 1995 to 2001. Mr. Balch is currently a director of a number of Canadian public companies.
Bill Macdonald is legal counsel for Wolverine. Mr. Macdonald is a founder and principal of Macdonald Tuskey, Corporate and Securities Lawyers, a boutique securities and corporate finance firm located in Vancouver, British Columbia established in April 2008. From February 1998 to April 2008, Mr. Macdonald was with Clark Wilson LLP and a member of the firm's Corporate Finance / Securities Practice Group where he was a partner. Mr. Macdonald is the President and a director of Blackbird Investments Inc., an oil and gas company listed on the TSX Venture Exchange.
Mr. Macdonald has a varied legal practice, focusing on cross-border and international corporate finance, securities and transactional matters. Mr. Macdonald has experience serving companies listed on the Toronto Stock Exchange, TSX Venture Exchange, CNSX and OTCBB. He has advised a variety of public and private companies on legal matters related to acquisitions, mergers, takeovers, initial public offerings, secondary financings, cross-border financings, cross-border mergers and acquisitions, public company disclosure requirements and stock exchange listings.
Mr. Macdonald's general corporate and securities practice has been focused on Canadian, U.S., Asian and cross-border public offerings, private and institutional financings (including U.S. private investment in public equity, or PIPE transactions), stock exchange listings, reverse takeovers and mergers and acquisitions. He advises numerous private and public companies on corporate governance, including compliance with the Sarbanes-Oxley Act, regulatory filings, including registration statements and periodic reports filed with the United States Securities and Exchange Commission, and corporate transactions.
Mr. Macdonald has been a member of the Law Society of British Columbia since February 1999 and a member of the New York State Bar since February 2002.
Regulatory filings will also be completed by Mr. Macdonald with the assistance of Mr. Richard Haderer. Since 1996 Mr. Haderer has provided regulatory filing services to Canadian public companies. Mr. Haderer was a Listings Officer with the Alberta Stock Exchange Between 1989-1996.
Cariboo Eureka Thrust Lightning Creek property
Cariboo property facts
The company has acquired over 3,400 hectors in the prolific Cariboo gold region of British Columbia. Lee Costerd CEO of Wolverine Exploration has been a mine superintendent, prospector / explorer in the Cariboo Quesnel region of British Columbia for over 20 years and brings to Wolverine the Eureka / Lightning Creek property nestled between the famous Wingdam mine (which is under contract to be sold for over $16,000,000) and in close proximity to Barkersville Gold which claimed in a press release to have found the richest gold deposit in North America (about 10% of its Caribou project in central British Columbia is estimated to host as much as 65-90 million ounces of gold).
The new Wolverine Exploration Cariboo area Eureka / Lightning creek property shares the Bonanza Thrust and the Eureka Thrust with these other two companies and the placer gold found at the Wingdam and the Lightning Creek property so far is believed by geologists and other mining professionals to have come from a hard rock lode source somewhere in the immediate area rather than a glacier till source. The property Wolverine has acquired is a hardrock section of the region and encompasses approximately half of the mountain abutting the Wingdam mine property.
Enigma Mobile is currently in possession of the world’s only patented technology with the capability to protect against unauthorized computer intrusion and fraud.The technology having been developed over a 12-year period is completed and operational and has been substantiated by IBM’s Research Labs.Enigma now has the only ability to protect with certainty the wireless marketplace worldwide currently in excess of 6 billion devices and growing at a rate of 50% annually. Every mobile smart device in use across the globe is fully at risk of being penetrated and manipulated by unauthorized intruders, and the lack of reliable security for mobile devices is now the single greatest threat challenging the wireless device market. This document presents information regarding the current development of the ENIGMA™ App, and how it has solved and removed the underlying barrier that has prevented the development of effective Mobile Security. ENIGMA™ is the only technology capable of universally protecting any application installed on any mobile device and ensures with absolute certainty it cannot be penetrated and manipulated. The technology powering ENIGMA™ is fully patented under law ensuring there is no possibility of competing technology.
THE MOBILE SECURITY RISK
Currently more than 4 billion mobile smart devices are in use and growing exponentially as sales of smart mobile devices now outpace that of PC's worldwide. With 87% of the technology growth in this rapidly expanding mobile market (based on Amazon statistics), it is projected that by 2014 mobile internet usage will surpass that of desktop usage and more than 150 billion Mobile Apps will be downloaded in that same year. Apple alone expects to add over 500,000 new Apps to the market in 2013 and will continue to grow at a rate of 50% annually.
With this rapid growth of the mobile market, issues of security are the most cited barrier, specifically in the realm of Identity Theft. By 2015, 1 billion mobile smart device users will have the ability to tap into personal and corporate confidential data and every one of these devices will be at 100% risk.
Users of mobile devices do not often think of the consequences of their vulnerability. Simple hacking instructions can be found online and once implemented can have your every movement and location tracked. Where you go, what you do, along with your phone calls and text messages can be recorded. Manipulation of Apps can have your device working against you; your personal data can be erased or stolen, your bank account accessed and your online assets deleted. There is nothing you can do to stop a dedicated attempt to steal your information or identity. In addition to this constant threat, there is currently no technology that can stop an unauthorized intruder (otherwise known as hackers) accessing your wireless smart device; no matter the type of device or protection you may use. With cyber-crime on the rise, individuals face increased risk of financial loss and Identity Theft, as no computer system or mobile device is safe from hacking or fraud.
To illustrate the magnitude of this gap in cyber security
US Lieutenant General John Hyten, Vice Commander of Air Force Space Command, recently stated that cyber-attacks have now surpassed terrorism as the top threat to the US and the global community.
The Enigma Mobile Security App Overview
The Enigma Mobile Security App is designed to prevent unauthorized user access to various mobile devices, their operating systems and other third party apps installed on those devices.All online security systems use an Authentication Process to insure that input data is compliant and “friendly” to devices, networks, applications and enterprise business logic.
The Enigma Mobile Security App uses 3 Stages during its Authentication Process while all other solutions use only Stage 1 and 2.
Network segments, addresses, ports, and other network attributes are authenticated by routers, bridges and firewalls.
User IDs, passwords, biometrics and other user attributes are authenticated by the application or enterprise sign-on servers.
In stage three the Enigma Mobile Security App uses enterprise business logic or the application business logic to authenticate the business transactions or user request actions.
Stage 3 is Crucial
The Stage 1 and Stage 2 authentication process is very easy to by-pass, and as result, unauthorized user access to mobile devices has becomes trivial and common. The mobile device owner is unaware that unauthorized users have full access to their device.
The Enigma Mobile Security App provides the crucial Stage 3 authentication process where ALL unauthorized users are blocked from accessing the owner’s mobile device.
The Enigma Mobile Security App utilizes patented technology we call the “Causal Inference Engine” to authenticate unlimited business logic steps or states. All results are integrated with a simple and easy to use dashboard which reports the attempted access by unauthorized users.
San Jose CA
211,563,333 (Ap 14 2014)
DISCLAIMER Nothing in the contents transmitted on this board should be construed as an investment advisory, nor should it be used to make investment decisions. There is no express or implied solicitation to buy or sell securities. The author(s) may have positions in the stocks discussed and may trade in the stocks mentioned. Readers are advised to conduct their own due diligence prior to considering buying or selling any stock. All information should be considered for information purposes only. No stock exchange has approved or disapproved of the information.