Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
GREAT stuff today (I am soo psyched right now!!), but I think that's all for today. Maybe more on Thursday!
AND w/o reverse split!!!!
To just be uttering anything about a scam at this point is just pure ridiculousness!
Ok memory is fading a bit, but I'm pretty sure TS is good for 10 yrs. You are right, it would go into an inactive period, but it could easily be "switched on".
Not bashing, but depends if individuals are "fast tracked" or ever previously held a clearance, especially at least a Secret clearance. My initial Secret clearance took a year and half!! However, my bump up to TS & CNWIDI (Critical Nuclear Weapon Design Info) happened VERY quickly!
Just guessing here. Could that be why Dr. TC is sole employee? He might be only one with TC clearance and it might be easier for company to have TS clearance if ALL its employees are TS cleared.
We just got a bunch of new Tweets today! Here ya go:
ALL THE NEW TWEETS:
"CrucialTrak's IT integration services now on SEWP contract vehicle through BVTK..."
"FYI...The Imperative of Critical Infrastructure Protection - Cyber and Physical by Chuck Brooks https://www.linkedin.com/pulse/imperative-critical-infrastructure-protection-cyber-chuck-brooks … by @ChuckDBrooks"
"BVTK's telecom alliance partners bringing "home the bacon" in short order because of BVTK's involvement..."
"FINS--as usually--were worked on all weekend...Look for 8-K earlier, rather than later, this week..."
"FYI. BVTK's new alliance with CrucialTrak, its knowledge of critical infrastructure protection and its Ecrypt One product positions it well."
"How likely is a ‘digital Pearl Harbor’ attack on critical infrastructure?
Taylor Armerding
3 days ago
It’s coming on two decades now since the first warnings that US critical infrastructure is vulnerable to a catastrophic cyberattack. According to some experts, it is perhaps more vulnerable now than ever – the threats are worse and the security is no better.
But how likely is such an attack? There is still plenty of debate about that.
Richard A Clarke, who in 2000 was the US’s top counter-terrorism and cybersecurity chief, gets credit for coining the term “digital Pearl Harbor”. He said at the time that it was “improbable,” but added that “statistically improbable events can occur”.
There have been similar warnings since from top government officials – former defense secretary Leon Panetta paraphrased Clarke in 2012, warning of a “cyber Pearl Harbor” – a major cyberattack on industrial control systems (ICS) that could disable the nation’s power grid, transportation system, financial industry and government for months or longer.
Of course, nothing even close to that catastrophic level has happened – yet. And there are a number of experts who say such doomsday language is gross hyperbole, peddling nothing but FUD (fear, uncertainty and doubt). Marcus Sachs, CSO of the North American Electric Reliability Corporation (NERC), said at the 2015 RSA conference that squirrels and natural disasters were a more realistic threat of taking down the grid than a cyber attack.
But a couple of experts in ICS – the equipment used to operate the grid and other critical infrastructure – say they are increasingly troubled that security has not really improved since the warnings began.
Sophos Home
Stop ransomware with our free personal security software
Learn More
Galina Antova, co-founder and chief business development officer at Claroty, recently referred in a blog to “The Lost Decade of Information Security”, saying:
“We are no better off today in terms of cybersecurity readiness than we were 10 years ago. The threat landscape is clearly growing more active and dangerous by the day. The theoretical is becoming reality and, unfortunately, we aren’t prepared to counter the threat just over the horizon.
She has some company in the person of Joe Weiss, managing partner at Applied Control Solutions, who has said for years that ICS security is dangerously lax. Writing on his “Unfettered” blog last week, Weiss said there is essentially no security in ICS process sensors, the tools to detect anomalies in the operation of ICSs – which means an attacker could get control of them relatively easily and create major physical damage."
"FYI...WHAT ARE THE NEW CYBERSECURITY STAKES – WHAT ARE THE VULNERABILITIES AND RISKS?
We live in world of algorithms; x’s and o’s. Our digital world is ripe for access and compromise by those who want do harm from just a laptop and server. A myriad of recent breaches have demonstrated that as consumers we are becoming more and more dependent upon digital commerce. Our banking accounts, credit cards, and financial daily activities are interconnected. We are all increasingly vulnerable from hackers, phishers, and malware proliferating across all commercial verticals.
In the past year, the employment of ransomware has become a method of cyber-attack choice by hackers. This is because many networks (especially hospitals, utilities, universities, and small businesses) are comprised of different systems, devices and often lack required patching and updating necessary to thwart attacks. The recent Wannacry, and Petya attacks were certainly wake up calls to the disruptive implications of ransomware. We can expect to see more such attacks because of the ease of infection and because the vulnerabilities to networks still remain.
Ransomware is not a new threat, it has been around for at least 15 years, but it has become a trending one. Experts estimate that there are now 124 separate families of ransomware and hackers have become very adept at hiding malicious code. Success for hackers does not always depend on using the newest and most sophisticated malware. It is relatively easy for a hacker to do. In most cases, they rely on the most opportune target of vulnerability, especially with the ease of online attacks.
More ominous are the Distributed Denial of Service attacks (DDoS). Tech Target provides a succinct definition of A distributed denial-of-service (DDoS) attack is an attack in which multiple compromised computer systems attack a target, such as a server, website or other network resource, and cause a denial of service for users of the targeted resource. The flood of incoming messages, connection requests or malformed packets to the target system forces it to slow down or even crash and shut down, thereby denying service to legitimate users or systems. The connectivity of the Internet of Things (IoT) and its billions of connected devices is conducive for DDoS activities. In 2016 a DDoS attacks were launched against a Domain Name System (DNS) called Dyn. The attack directed a variety of IoT connected devices to overload and take out internet platforms and services.
Consider the dire and eye opening facts: Hackers attack every 39 seconds and around one billion accounts and records were compromised worldwide last year. There are estimates that global Cybercrime damage costs will reach $6 trillion annually by 2021. Cybercrime is growing exponentially and so are the risks.
WHAT ARE THE CYBERSECURITY CHALLENGES AND HOW DO WE PROTECT OURSELVES?
McKinsey & Company and the World Economic Forum published a joint paper a couple of years back projecting that ineffective cybersecurity will result in a cost to the global economy of three trillion dollars by 2020. That estimate may be even greater now that IoT has expanded so rapidly along with the attack surfaces constituted by so many billions of connected devices to the internet. A Gartner report predicts more than 20 billion connected things to the internet by 2020 that can be hacked or compromised. Clearly, it is almost an insurmountable task to monitor and protect IoT. It is also very difficult challenge to keep up with the increasing sophistication of the socially engineered threats and threat actors.
A security strategy to meet these growing cyber-threat challenges needs to be both comprehensive and adaptive. It involves people, processes, and technologies. Defined by the most basic elements in informed risk management, cybersecurity is composed of:
Layered vigilance (intelligence, surveillance);
Readiness (operational capabilities, visual command center, interdiction technologies);
Resilience (coordinated response, mitigation and recovery).
The specifics of a security approach may vary according to circumstances, but the mesh that connects the elements is situational awareness combined with systematic abilities for critical communications in cases of emergency. These guidelines are represented in the NIST mantra: “Identify, Protect, Detect, Respond, Recover”."
"FYI:White House Issues New Memo on R&D Budget Priorities for Fiscal 2019
Jane Edwards August 21, 2017 Civilian Agencies, Latest News 404 Views
The White House has released a new memorandum to provide federal agencies information on the administration’s priority areas in research and development and guide them as they create and submit their fiscal 2019 budget requests to the Office of Management and Budget.
The memo published Thursday directs agencies to invest in R&D efforts that seek to advance U.S. military superiority such as the development of missile defense platforms, hypersonic weapons, strategic deterrent and computing capabilities as well as space-based and autonomous systems.
OMB Director Mick Mulvaney co-wrote the document with Michael Kratsios, deputy assistant to the president at the Office of Science and Technology Policy.
The memo asks agencies to support R&D work on cybersecurity platforms that aim to protect the country’s critical infrastructure from cyber attacks as well as law enforcement and border surveillance systems designed to facilitate detection of illegal activities.
Agencies should continue to advance research in biometrics, machine learning, autonomous systems, quantum computing and other emerging technologies that would help advance the economy, according to the memo.
The document also states R&D practices the Trump administration wants agencies to prioritize such as increasing government accountability, supporting early-stage applied research and advancing interagency coordination programs.
The administration also wants agencies to integrate science, technology, engineering and math education into their workforce training initiatives and support the modernization of the country’s research infrastructure."
Sure seems that way. We're having Zippo for volume!
Well, it looks like time to BUY! BUY! BUY!
I know that advice can not be given, but I am really on the line whether or not to dump the rest of my shares and cut my losses. That 55% plummet was heartbreaking!
Is ANYONE thinking of a bounce???
Looks like Tues!!
ALL THE NEW TWEETS:
"CrucialTrak's IT integration services now on SEWP contract vehicle through BVTK..."
"FYI...The Imperative of Critical Infrastructure Protection - Cyber and Physical by Chuck Brooks https://www.linkedin.com/pulse/imperative-critical-infrastructure-protection-cyber-chuck-brooks … by @ChuckDBrooks"
"BVTK's telecom alliance partners bringing "home the bacon" in short order because of BVTK's involvement..."
"FINS--as usually--were worked on all weekend...Look for 8-K earlier, rather than later, this week..."
"FYI. BVTK's new alliance with CrucialTrak, its knowledge of critical infrastructure protection and its Ecrypt One product positions it well."
"How likely is a ‘digital Pearl Harbor’ attack on critical infrastructure?
Taylor Armerding
3 days ago
It’s coming on two decades now since the first warnings that US critical infrastructure is vulnerable to a catastrophic cyberattack. According to some experts, it is perhaps more vulnerable now than ever – the threats are worse and the security is no better.
But how likely is such an attack? There is still plenty of debate about that.
Richard A Clarke, who in 2000 was the US’s top counter-terrorism and cybersecurity chief, gets credit for coining the term “digital Pearl Harbor”. He said at the time that it was “improbable,” but added that “statistically improbable events can occur”.
There have been similar warnings since from top government officials – former defense secretary Leon Panetta paraphrased Clarke in 2012, warning of a “cyber Pearl Harbor” – a major cyberattack on industrial control systems (ICS) that could disable the nation’s power grid, transportation system, financial industry and government for months or longer.
Of course, nothing even close to that catastrophic level has happened – yet. And there are a number of experts who say such doomsday language is gross hyperbole, peddling nothing but FUD (fear, uncertainty and doubt). Marcus Sachs, CSO of the North American Electric Reliability Corporation (NERC), said at the 2015 RSA conference that squirrels and natural disasters were a more realistic threat of taking down the grid than a cyber attack.
But a couple of experts in ICS – the equipment used to operate the grid and other critical infrastructure – say they are increasingly troubled that security has not really improved since the warnings began.
Sophos Home
Stop ransomware with our free personal security software
Learn More
Galina Antova, co-founder and chief business development officer at Claroty, recently referred in a blog to “The Lost Decade of Information Security”, saying:
“We are no better off today in terms of cybersecurity readiness than we were 10 years ago. The threat landscape is clearly growing more active and dangerous by the day. The theoretical is becoming reality and, unfortunately, we aren’t prepared to counter the threat just over the horizon.
She has some company in the person of Joe Weiss, managing partner at Applied Control Solutions, who has said for years that ICS security is dangerously lax. Writing on his “Unfettered” blog last week, Weiss said there is essentially no security in ICS process sensors, the tools to detect anomalies in the operation of ICSs – which means an attacker could get control of them relatively easily and create major physical damage."
"FYI...WHAT ARE THE NEW CYBERSECURITY STAKES – WHAT ARE THE VULNERABILITIES AND RISKS?
We live in world of algorithms; x’s and o’s. Our digital world is ripe for access and compromise by those who want do harm from just a laptop and server. A myriad of recent breaches have demonstrated that as consumers we are becoming more and more dependent upon digital commerce. Our banking accounts, credit cards, and financial daily activities are interconnected. We are all increasingly vulnerable from hackers, phishers, and malware proliferating across all commercial verticals.
In the past year, the employment of ransomware has become a method of cyber-attack choice by hackers. This is because many networks (especially hospitals, utilities, universities, and small businesses) are comprised of different systems, devices and often lack required patching and updating necessary to thwart attacks. The recent Wannacry, and Petya attacks were certainly wake up calls to the disruptive implications of ransomware. We can expect to see more such attacks because of the ease of infection and because the vulnerabilities to networks still remain.
Ransomware is not a new threat, it has been around for at least 15 years, but it has become a trending one. Experts estimate that there are now 124 separate families of ransomware and hackers have become very adept at hiding malicious code. Success for hackers does not always depend on using the newest and most sophisticated malware. It is relatively easy for a hacker to do. In most cases, they rely on the most opportune target of vulnerability, especially with the ease of online attacks.
More ominous are the Distributed Denial of Service attacks (DDoS). Tech Target provides a succinct definition of A distributed denial-of-service (DDoS) attack is an attack in which multiple compromised computer systems attack a target, such as a server, website or other network resource, and cause a denial of service for users of the targeted resource. The flood of incoming messages, connection requests or malformed packets to the target system forces it to slow down or even crash and shut down, thereby denying service to legitimate users or systems. The connectivity of the Internet of Things (IoT) and its billions of connected devices is conducive for DDoS activities. In 2016 a DDoS attacks were launched against a Domain Name System (DNS) called Dyn. The attack directed a variety of IoT connected devices to overload and take out internet platforms and services.
Consider the dire and eye opening facts: Hackers attack every 39 seconds and around one billion accounts and records were compromised worldwide last year. There are estimates that global Cybercrime damage costs will reach $6 trillion annually by 2021. Cybercrime is growing exponentially and so are the risks.
WHAT ARE THE CYBERSECURITY CHALLENGES AND HOW DO WE PROTECT OURSELVES?
McKinsey & Company and the World Economic Forum published a joint paper a couple of years back projecting that ineffective cybersecurity will result in a cost to the global economy of three trillion dollars by 2020. That estimate may be even greater now that IoT has expanded so rapidly along with the attack surfaces constituted by so many billions of connected devices to the internet. A Gartner report predicts more than 20 billion connected things to the internet by 2020 that can be hacked or compromised. Clearly, it is almost an insurmountable task to monitor and protect IoT. It is also very difficult challenge to keep up with the increasing sophistication of the socially engineered threats and threat actors.
A security strategy to meet these growing cyber-threat challenges needs to be both comprehensive and adaptive. It involves people, processes, and technologies. Defined by the most basic elements in informed risk management, cybersecurity is composed of:
Layered vigilance (intelligence, surveillance);
Readiness (operational capabilities, visual command center, interdiction technologies);
Resilience (coordinated response, mitigation and recovery).
The specifics of a security approach may vary according to circumstances, but the mesh that connects the elements is situational awareness combined with systematic abilities for critical communications in cases of emergency. These guidelines are represented in the NIST mantra: “Identify, Protect, Detect, Respond, Recover”."
"FYI:White House Issues New Memo on R&D Budget Priorities for Fiscal 2019
Jane Edwards August 21, 2017 Civilian Agencies, Latest News 404 Views
The White House has released a new memorandum to provide federal agencies information on the administration’s priority areas in research and development and guide them as they create and submit their fiscal 2019 budget requests to the Office of Management and Budget.
The memo published Thursday directs agencies to invest in R&D efforts that seek to advance U.S. military superiority such as the development of missile defense platforms, hypersonic weapons, strategic deterrent and computing capabilities as well as space-based and autonomous systems.
OMB Director Mick Mulvaney co-wrote the document with Michael Kratsios, deputy assistant to the president at the Office of Science and Technology Policy.
The memo asks agencies to support R&D work on cybersecurity platforms that aim to protect the country’s critical infrastructure from cyber attacks as well as law enforcement and border surveillance systems designed to facilitate detection of illegal activities.
Agencies should continue to advance research in biometrics, machine learning, autonomous systems, quantum computing and other emerging technologies that would help advance the economy, according to the memo.
The document also states R&D practices the Trump administration wants agencies to prioritize such as increasing government accountability, supporting early-stage applied research and advancing interagency coordination programs.
The administration also wants agencies to integrate science, technology, engineering and math education into their workforce training initiatives and support the modernization of the country’s research infrastructure."
Thanks!!
Smart play. Wish I had the experience and knowledge to do so.
Total guesswork here. I am thinking that since it was .0082 on July 31st, that .01 is extremely obtainable now that we have a little more substance. I think once the stop sign comes down (+30 days after the last of the fins are completed) the interest of a ton more investors will happen. Also once we get the PRs of all these mega-deals, .10 seems like a reasonable goal. With time + cash flow, going beyond .10 seems very likely!
Wow! You had some cash to spare to invest 14K in a super Sub-penny!! What a payout!!
Twitter account was NOT hacked. A fake account was made and "inc" was added to the end of Bravatek.
Surely, Tom isn't stomping around N. Korea! Speaking of which, I'm sure hoping N. Korea stops this Nuke Weapon pursuit. We have so many Nuke Weapons we could blow earth to bits! And Russia has twice as much as us!!! I'm on last year of my TS clearance and CNWDI (Critical Nuclear Weapon Design Info) clearance. Not revealing anything that hasn't been made public.
Etrade shows .01 a lot of times for some weird reason. Happens to some of my other stocks as well.
Still debating it. I've lost about $900. That might be peanuts to some of you, but for me that's a decent chunck of cash. Either I'm gonna cut my losses, or see how my remaining $600 plays out.
But I'm thinking EOD Mon. might be too late to sell....at least to recover some of my money. Thank you for responding!
WTF!? Opinions PLEASE!! So anyone still holding just get screwed?????
Interesting! Picked this up somewhere else. This was said by another individual: "I would definitely load up soon. Just got a thumbs up from tommy boy asking him about speed gates and Biometrics in airports:) "
Sometimes I wish he did, but Tom has publicly stated he does read these boards. Just passing info.
Aren't the results conflicting? Maybe I'd read things wrong.
I am right w/ ya Pat. I have the Anti-Midas touch. Every I touch turns to shit. Either it immediately goes straight down or slowly crumbles. I really didn't expect this one!
No chart by Clay Trader today??
Damn! Wish I was 19 yrs old and finding out about this. It's taken me 50 yrs to stumble across something like this. Really, I am a Newbie to the individual stock investment world, but in my opinion, hitting 1 penny is a given!! I also believe that hitting a dime is a reasonable assumption if you look at all the pieces plus the type of man Dr. Tom Celluci is. A dollar and beyond?? Hmmm. Something fun to think about!!!
Equity investors w/ NDAs!
don't forget that their dabbling in e-currency as well!!
So glad I bought an extra 380k at .005. Now my average is .0057. My initial buy-in was at .0082. Almost embarassing to admit it, but I am a Newbie! I certainly haven't mastered timing! haha
$1/share too much to dream for!!??
Just looked up to be sure. Samsung and LG both have corporate offices in Seoul!
Question: Would that mean that we, the shareholder, would get a piece of that buyout per share that we hold?
Now I am pretty much 100% certain we will see a penny and now a dime seems like a VERY reasonable expectation!!!
Yes! And more Equity investors. The Tweets that just came out are great!!! https://twitter.com/bravatek
Completely false!
Are you serious????
I gotta agree w/ ya about this even though I am BVTK shareholder. Something has gotta get done w/ that!!! Dr. Cellucci might be a brilliant guy, but making Bravatek into a 40 BILLION dollar company seems a little too far fetched. Share reduction HAS to take place!!!