News Focus
News Focus
icon url

easymoney101

06/23/06 11:46 AM

#40575 RE: F6 #40567

June 17, 2006 (UPDATED) -- What's behind all the personal data thefts? Populating the surveillance databases specified by John Poindexter's Total Information Awareness (TIA) system. WMR has learned that the thefts of personal data from corporations and government agencies, most of which were accomplished by stealing computer hard drive devices, is more than coincidental. Intelligence sources report that many of the large scale thefts are part of a well-planned covert intelligence operation to obtain data on hundreds of millions of people in order to accomplish what former Defense Advanced Research Projects Agency (DARPA) official John Poindexter was not able to bring about through his defunct (but secretly restored) Total Information Awareness (TIA) system -- the population of intelligence and surveillance databases with files on the financial, medical, employment, telecommunications, and other sensitive data of Americans and foreigners. Much of the new TIA work is being conducted under the umbrella of the National Security Agency and Department of Homeland Security Advanced Research Projects Agency.

A number of computer security experts have said the recent rash of data thefts is unprecedented in scope, method, and frequency. Some claim that the thefts appear to be coordinated and targeted at specific data types.



physical theft of personal data is unprecedented in the history of computer security in the United States. Intelligence sources reveal massive data theft is part of a plan to populate U.S. surveillance databases.

The following is a compilation of the recent reported data thefts (not all may be related to the data gathering operation):

Target Date Number of persons affected Type of data Method
ING Bank June 2006 13,000 SSNs, financial data Physical theft
University of Alabama - Birmingham June 2005 9,800 SSNs, medical data Physical theft
VISA USA June 2005 possibly millions financial data Leak
Denver Election Commission June 2006 150,000 Voter's records Physical theft
Oregon Dept. of Revenue June 2006 2,200 Tax records Trojan horse
Union Pacific Railroad June 2006 30,000 SSNs, DOBs Physical theft
KDDI Telco, Japan June 2006 4,000,000 Phone numbers, DOBs Leaked
Minnesota State Auditor June 2006 493 state employees SSNs, DOBs Physical theft
Humana Medicare Program June 2006 17,000 SSNs, DOBs,Medical info Poss. compromise
Hanford Nuclear Reservation June 2006 4,000 SSNs, DOBs Physical theft
Royal Ahold (Giant, Tops, Stop & Shop supermarkets)
June 2006 Unknown number SSNs, DOBs Physical theft
Buckeye Community Health Plan (Ohio) June 2006 72,000 SSNs, medical data Physical theft
Internal Revenue Service June 2006 291 IRS employees SSNs, fingerprints, DOBs Physical theft
YMCA Rhode Island May 2006 65,000 SSNs, DOBs Physical theft
Equifax May 2006 2,500 SSNs, DOBs Physical theft
University of Delaware May 2006 1,076 SSNs, DOBs Hacking
Sacred Heart University May 2006 unknown SSNs, DOBs Hacking
Mercantile Potomac Bank May 2006 48,000 SSNs, account data Physical theft
Florida International University May 2006 thousands SSNs, DOBs Hacking
University of Kentucky May 2006 6,500 SSNs, DOBs Physical theft
Miami University of Ohio May 2006 851 SSNs, DOBs Loss of hardware
American Institute of CPAs May 2006 330,000 SSNs, DOBs Loss of hardware
Texas Guaranteed Student Loan Corp. May 2006 1,300,000 SSNs, DOBs Loss of hardware
University of Ohio Hudson Health Center
May 2006 60,000 SSNs, medical data Hacking
Humana Medicare Program May 2006 250 Medicare applicants Paper applications Physical theft
Wells Fargo Bank May 2006 unknown SSNs, account data Physical theft
Dept. of Veterans Affairs May 2006 28,700,000 SSNs, medical information Physical theft
Columbus Bank & Trust May 2006 2,000 Credit card data Physical theft
University of Ohio Apr 2006 137,000 SSNs, DOBs Hacking
Purdue Engineering School Apr 2006 1,351 SSNs, DOBs Hacking
Department of Defense Apr 2006 14,000 SSNs, DOBs Hacking
Aetna Apr 2006 38,000 SSNs, other data Physical theft
Morgan Stanley, Clydesdale Bank (UK), Master Card
Apr 2006 2,000 Credit card data Hacking
University of Texas McCombs Business School
Apr 2006 197,000 SSNs, DOBs Hacking
Fraser Health Authority, Br. Columbia
Apr 2006 thousands SINs, DOBs Physical theft
University of Alaska Fairbanks Apr 2006 38,941 SSNs, DOBs Hacking
Ohio Secretary of State Apr 2006 7,700,000 voters SSNs "Leak" on CDs
Iron Mountain, Inc. Apr 2006 17,000 Long Island Railroad employees and retirees, Bronx VA Hospital SSNs, other data Physical theft
American Red Cross Mar 2006 8,000 SSNs, DOBs Physical theft
American International Group (AIG)
Mar 2006 930,000 SSNs, medical information Physical theft
U.S. Marine Corps Mar 2006 207,000 SSNs, DOBs Physical theft
Georgia Technology Authority Mar 2006 570,000 SSNs, DOBs Hacking
Vermont State Colleges Mar 2006 14,000 SSNs, credit data Physical theft
Verizon Mar 2006 significant number SSNs, other data Physical theft
Hewlett-Packard/Fidelity Investments
Mar 2006 196,000 SSNs, other data Physical theft
Ernst & Young Mar 2006 thousands of records on IBM employees SSNs, DOBs Physical theft
Medco Health Solutions Mar 2006 4600 SSNs, DOBs Physical theft
Hotels.com Feb 2006 243,000 Credit card information Physical theft
Choice Point Feb 2006 150,000 Subscriber data Leak
Georgetown University Feb 2006 41,000 elderly DC residents SSNs, DOBs Hacking
Metropolitan College (Denver) Feb 2006 93,000 SSNs, DOBs Physical theft
Olympic Funding Chicago Feb. 2006 unknown SSNs, financial data Physical theft
Ernst & Young Feb. 2006 unknown SSNs, financial data Physical theft
Deloitte & Touche Feb. 2006 9,000 McAfee employees SSNs, financial data Physical theft
PriceWaterhouseCoopers Feb. 2006 4,000 SSNs, health data Physical theft
Mount St. Mary's Hospital (NY) Feb. 2006 unknown SSNs, health data Physical theft
US Department of Agriculture Feb. 2006 350,000 SSNs, DOBs Leak
Providence Home Services Jan. 2006 365,000 SSNs, medical data Physical theft
Ameriprise Financial, Inc. Jan. 2006 226,000 SSNs, financial data Physical theft
People's Bank Jan. 2006 90,000 SSNs, financial data Physical theft
Atlantis Resorts (Bahamas) Jan. 2006 55,000 SSNs, credit data Physical theft
California National Guard Jan. 2006 hundreds of Guardsmen SSNs, other data Physical theft
University of Washington Medical Ctr.
Jan. 2006 1,600 SSNs, medical data Physical theft
Marriott Dec. 2005 206,000 SSNs, credit data Physical theft
Ford Motors
Dec. 2005 70,000 SSNs, DOBs Physical theft
LaSalle Bank/ABN Amro Mortgage
Dec.2005 2,000,000 SSNs, financial data Lost/recovered
First Trust Bank Dec.2005 thousands SSNs, financial data Physical theft
ING Bank Dec. 2005 8,500 SSNs, financial data Physical theft
TransUnion Nov. 2005 3,623 credit data Physical theft
Safeway Nov. 2005 1,400 SSNs, DOBs Physical theft
Keck School of Medicine (USC) Nov. 2005 50,000 SSNs, DOBs Physical theft
Univ. of Tennessee Medical Center Oct. 2005 3,800 SSNs, medical data Physical theft
Wilcox Memorial Hospital Oct. 2005 130,000 SSNs, DOBs Physical theft
National Nuclear Safety Administration Sep 2005 1,500 SSNs, DOBs Hacking
Children's Health Council (Palo Alto) Sep. 2005 6,000 SSNs, medical data Physical theft
North Fork Bank Sep. 2005 9,000 SSNs, financial data Physical theft
Kent State University Sep. 2005 100,000 SSNs, DOBs Physical theft
J. P Morgan Chase Aug.2005 unknown SSNs, financial data Physical theft
Arizona Biodyne (Blue Cross/Blue Shield) Jul 2005 57,000 SSNs, medical data Physical theft
City National Bank (LA) Jul 2005 unknown SSNs, financial data Physical theft
Federal Deposit Insurance Corp. Jun 2005 6,000 SSNs, DOBs Physical theft
Motorola Jun 2005 unknown financial, call data Physical theft
U.S. Department of Justice/Omega Travel Jun 2005 80,000 travel, credit data Physical theft
Cleveland State University Jun 2005 44,000 SSNs, DOBs Physical theft
California Dept. of Health Services May 2005 21,600 SSNs, medical data Physical theft
Colorado State Health Department May 2005 1,600 families SSNs, medical data Physical theft
Lexis-Nexis May 2005 310,000 Phone records Hacking
Bank of America, Wachovia, Commerce Bancorp, PNC Bank NA
May 2005 676,000 Bank account information Hacking
Valdosta State May 2005 40,000 SSNs, DOBs Hacking
MCI April 2005 16,500 SSNs, employment data Physical theft
Georgia Southern Univ. April 2005 thousands SSNs, credit card Hacking
San Jose Medical Group April 2005 185,000 SSNs, medical data Physical theft
Iron Mountain, Inc. Mar 2005 600,000 Time Warner employees SSNs, financial data Physical theft
University of California, Berkeley Mar 2005 100,000 SSNs, DOBs Physical theft
Ameritrade Feb. 2005 200,000 SSNs, financial data Physical theft
Bank of America Feb. 2005 1,200,000 Federal employees SSNs, credit data Physical theft

Amid all the above personal data thefts, WMR has learned from a U.S. intelligence source that these data thefts pale in comparison to the largest, and as yet, largely unreported, personal data theft in history. Some 30 million Americans were affected and they included customers of Citigroup, Bank of America, and SunTrust. The thefts were conducted between March and April of this year.


icon url

easymoney101

06/28/06 7:24 PM

#40632 RE: F6 #40567

Complaint filed in 32 countries against U.S. bank data mining
Civil liberties group Privacy International demands half to 'unacceptable' monitoring

The Associated Press (apwire)
Published 2006-06-29 01:23 (KST)


LONDON

A civil liberties group on Wednesday asked 32 national governments to block the release of confidential financial records to U.S. authorities as part of American anti-terrorist probes.

London-based watchdog Privacy International demanded a halt to the "completely unacceptable" monitoring of millions of transactions as part of a CIA-U.S. Treasury program.

The Treasury has acknowledged that since the Sept. 11, 2001, terrorist attacks it has tracked millions of financial transactions handled by the Belgium-based Society for Worldwide Interbank Financial Telecommunication, or SWIFT.

Both SWIFT and the U.S. authorities say records were subpoenaed as part of targeted investigations into suspected terrorist activity.

The Belgian government said Wednesday that Washington had only subpoenaed data from SWIFT's U.S. office -- but not its global headquarters outside Brussels.

However, in its complaint, Privacy International said "the scale of the operation, involving millions of records, places this disclosure in the realm of a fishing exercise rather than legally authorized investigation." The complaint, sent to regulators in all 25 European Union nations as well as Canada, Australia, Iceland, New Zealand, Liechtenstein, Switzerland, Norway and the semiautonomous Chinese territory of Hong Kong, asks authorities to “intervene to seek the immediate suspension of the disclosure program pending legal review.'"'All of these countries have the potential to suspend, disrupt, paralyze the system," said the group's director, Simon Davies.

An industry-owned cooperative, SWIFT oversees about 11 million financial transactions a day among banks and financial institutions worldwide, recording customers' names, account numbers and other identifying information.

In a statement, SWIFT said it had responded to subpoenas from the U.S. Treasury for "limited sets of data" and had received assurances about "the purpose, confidentiality, oversight and control" of the information.

A spokeswoman would not say how many transactions had been disclosed to U.S. authorities, but said "access to and usage of the data is limited and targeted to terrorist investigations." "SWIFT has complied with the laws in the countries in which we operate," she said on condition of anonymity in line company policy.

Davies, however, said the subpoenas issued by the Treasury had no standing in European law.

He said the notion that SWIFT and U.S. authorities could agree to share data "and cut national regulators out of the loop is completely unacceptable." U.S. President George W. Bush has condemned newspapers that broke the story of the program last week, saying the reports made it "harder to win the war on terror." Loretta Napoleoni, an Italian expert on terrorist financing, said U.S. authorities already had significant powers to monitor U.S. financial transactions under the 2001 Patriot Act.

"The U.S. does not need SWIFT to spy on its own citizens' finances," she said.

"The reason they are using SWIFT is that they are not looking at dollar transactions. They are looking at other currency transactions. The U.S. can't look at euro transactions, or Swiss franc transactions. That is something that only the monetary authorities of the countries involved can do.

"The Europeans should say 'no,'" she said.

The European Union's executive branch, the European Commission, has said it has no powers to investigate whether privacy laws had been violated in the transfer of the records.It said it was for individual national authorities to decide whether the searches were legal.

Belgian Justice Minister Laurette Onkelinx has ordered an investigation into the U.S. use of data, and Canada's privacy commissioner also said it was investigating.

A spokeswoman for the Information Commissioner's Office in Britain said Wednesday it had not yet received the Privacy International complaint, but would look into it once it had arrived.

Privacy International is a non-governmental organization grouping more than a 100 legal and other experts and human rights organizations from dozens of countries. The group, founded in 1990, monitors violations of privacy and data protection laws by governments and corporations, according to its Web site.
http://english.ohmynews.com/ArticleView/article_view.asp?no=301908&rel_no=1


icon url

F6

07/08/06 10:57 PM

#40807 RE: F6 #40567

Ally Told Bush Spying Projects Might Be Illegal


Representative Peter Hoekstra and Representative Jane Harman appearing on a news program in January.
Linda Spillers/ABC News, via Associated Press



Representative Heather A. Wilson, whom President Bush praised in June, has said she has "deep concerns" about intelligence reforms.
Marla Brose/The Albuquerque Journal, via Associated Press


By ERIC LICHTBLAU and SCOTT SHANE
Published: July 9, 2006

WASHINGTON, July 8 — In a sharply worded letter to President Bush in May, an important Congressional ally charged that the administration might have violated the law by failing to inform Congress of some secret intelligence programs and risked losing Republican support on national security matters.

The letter from Representative Peter Hoekstra of Michigan, the Republican chairman of the House Intelligence Committee, did not specify the intelligence activities that he believed had been hidden from Congress.

But Mr. Hoekstra, who was briefed on and supported the National Security Agency's [ http://topics.nytimes.com/top/reference/timestopics/organizations/n/national_security_agency/index.h... ] domestic surveillance program and the Treasury Department's tracking of international banking transactions, clearly was referring to programs that have not been publicly revealed.

Recently, after the harsh criticism from Mr. Hoekstra, intelligence officials have appeared at two closed committee briefings to answer questions from the chairman and other members. The briefings appear to have eased but not erased the concerns of Mr. Hoekstra and other lawmakers about whether the administration is sharing information on all of its intelligence operations.

A copy of the four-page letter dated May 18 [F6 note -- at http://www.nytimes.com/packages/pdf/national/20060709hoekstra.pdf ], which has not been previously disclosed, was obtained by The New York Times.

"I have learned of some alleged intelligence community activities about which our committee has not been briefed," Mr. Hoesktra wrote. "If these allegations are true, they may represent a breach of responsibility by the administration, a violation of the law, and, just as importantly, a direct affront to me and the members of this committee who have so ardently supported efforts to collect information on our enemies."

He added: "The U.S. Congress [ http://topics.nytimes.com/top/reference/timestopics/organizations/c/congress/index.html?inline=nyt-o... ] simply should not have to play Twenty Questions to get the information that it deserves under our Constitution."

Frederick Jones, a White House spokesman, declined to comment on the concerns raised by Mr. Hoekstra but said that "we will continue to work closely with the chairman and other Congressional leaders on important national security issues."

A spokesman for Mr. Hoekstra, Jamal D. Ware, said he could not discuss the activities allegedly withheld from Congress. But he said that Mr. Hoekstra remained adamant that no intelligence programs could be hidden from oversight committees.

"Chairman Hoekstra has raised these issues with the administration to ensure that the Intelligence Committee is able to conduct its job of oversight," Mr. Ware said. "Intelligence officials have committed to being forthcoming with Congress, and Chairman Hoekstra is going to hold them to their word."

Mr. Hoekstra's blunt letter is evidence of a rift between the White House and House Republican leaders over the administration's perceived indifference to Congressional oversight and input on intelligence matters. Mr. Hoekstra wrote that he had shared his complaints with House Speaker J. Dennis Hastert [ http://topics.nytimes.com/top/reference/timestopics/people/h/j_dennis_hastert/index.html?inline=nyt-... ], Republican of Illinois, and that the speaker "concurs with my concerns."

A spokesman for Mr. Hastert declined to comment.

The letter appears to have resulted at least in part from the White House's decision, made early in May, to name Gen. Michael V. Hayden [ http://topics.nytimes.com/top/reference/timestopics/people/h/michael_v_hayden/index.html?inline=nyt-... ] to lead the Central Intelligence Agency [ http://topics.nytimes.com/top/reference/timestopics/organizations/c/central_intelligence_agency/inde... ], with Stephen R. Kappes as his deputy. The letter was sent the day of General Hayden's confirmation hearing before the Senate Intelligence Committee.

Mr. Hoekstra (pronounced HOOK-stra) complained publicly about the choices when they were announced, but his private letter to Mr. Bush was much harsher. He warned that the choice of Mr. Kappes, who he said was part of a group at the C.I.A. that "intentionally undermined the administration," sends "a clear signal that the days of collaborative reform between the White House and this committee may be over."

Mr. Hoekstra also expressed concern about the intelligence reorganization under John D. Negroponte [ http://topics.nytimes.com/top/reference/timestopics/people/n/john_d_negroponte/index.html?inline=nyt... ], the first director of national intelligence, who he said was creating "a large, bureaucratic and hierarchical structure that will be less flexible and agile than our adversaries."

Mr. Hoekstra's views on oversight appear to be shared by some other Intelligence Committee members.

"I think the executive branch has been insufficiently forthcoming on a number of important programs," Representative Heather A. Wilson, Republican of New Mexico, said in an interview. She would not discuss any programs on which the committee had not been briefed, but she said that in the Bush administration, "there's a presumption that if they don't tell anybody, a problem may get better or it will solve itself."

Ms. Wilson said she shared "deep concerns" about the pace and direction of intelligence reforms overseen by Mr. Negroponte's office. "We have some troubled programs," she said.

American intelligence agencies routinely conduct many secret programs, but under the National Security Act, the agencies are required to keep the Congressional intelligence committees "fully and currently informed of all intelligence activities." Even in the case of especially sensitive covert actions, the law requires briefings for at least the leaders from both parties of the committees and the House and Senate.

As the administration has asserted broad presidential authority to fight terrorism, concerns about Congressional oversight and checks and balances between the branches of government have become increasingly heated. Democrats [ http://topics.nytimes.com/top/reference/timestopics/organizations/d/democratic_party/index.html?inli... ] complained that the administration's failure to brief the full Intelligence Committees on the N.S.A. warrantless eavesdropping, which focuses on the international communications of Americans and others inside the United States, was a violation of the National Security law. Some members of Congress said they had been briefed on the Treasury Department's bank monitoring program, which examines international money transfers through a Brussels-based consortium, only after The New York Times began making inquiries in recent months.

But the assertion that other intelligence activities had been hidden from Congress is particularly surprising coming from Mr. Hoekstra, who defended the administration's limited briefings on the N.S.A. program against Democratic criticism.

An official familiar with recent exchanges between the intelligence agencies and the House committee said Friday that General Hayden had twice briefed the full committee and had addressed Mr. Hoekstra's questions about the intelligence activities referred to in the letter. The C.I.A. director promised "a free flow of information," and Mr. Hoekstra, who initially objected to placing a military officer in charge of the C.I.A., said he would work closely with the agency's new leadership.

The official, who spoke of the briefings only when granted anonymity because they were classified, declined to say anything about what the activities were or which agencies they involved.

Officials with both Mr. Negroponte's office and the C.I.A. declined to comment specifically on Mr. Hoekstra's letter. But Carl Kropf, a spokesman for Mr. Negroponte, said that over the past year his office had "engaged in hundreds of briefings, meetings and discussions with Congressional committees."

He added, "We value this dialogue with Congress, and we will continue to provide the committee with the information they need to fulfill their responsibilities."

Jennifer Millerwise Dyck, a spokeswoman for General Hayden, said that "the director believes in the important oversight role Congress plays, and he will continue regular and transparent interactions with members."

Since his appointment as committee chairman in August 2004, Mr. Hoekstra has been a critical ally of the White House on intelligence matters. He has supported the administration's most controversial policies, including its treatment of terrorist suspects, and he has balked at Democratic demands for an investigation of pre-war intelligence on Iraq. He has defended the legality and necessity of the N.S.A. program and the bank monitoring.

Mr. Hoekstra has been one of the strongest advocates in Congress for a crackdown on leaks of classified information to the media, a cause championed by both Mr. Bush and Vice President Dick Cheney [ http://topics.nytimes.com/top/reference/timestopics/people/c/dick_cheney/index.html?inline=nyt-per ].

But in recent months, Mr. Hoekstra has begun to express some disaffection. In March, he joined the top Democrat on the Intelligence Committee, Representative Jane Harman of California, in a public critique of Mr. Negroponte's performance. He criticized intelligence officials for initially resisting his demand that thousands of captured Iraqi documents be posted on the Web. Like other House Republicans, he bristled when Porter J. Goss [ http://topics.nytimes.com/top/reference/timestopics/people/g/porter_j_goss/index.html?inline=nyt-per ], a former House colleague, was forced out as C.I.A. director in early May.

Most recently, Mr. Hoekstra strongly criticized a news briefing arranged by Mr. Negroponte's office on an Army report that 500 pre-Gulf War chemical shells had been found scattered around Iraq. On June 29, Mr. Hoekstra, who had said the finding established that there were weapons of mass destruction in Iraq, made public an angry letter to Mr. Negroponte calling the briefing "inaccurate, incomplete and occasionally misleading" and asserting that "attempts were made to downplay the significance of relevant facts."

A spokesman for Mr. Negroponte's office said he had not yet replied to the complaint.

- - -

Related

Rep. Hoekstra's Letter to President Bush (pdf) [ http://www.nytimes.com/packages/pdf/national/20060709hoekstra.pdf ]

- - -

Copyright 2006 The New York Times Company (emphasis added)

http://www.nytimes.com/2006/07/09/washington/09hoekstra.html

[F6 note -- in addition to (items linked in) the post to which this post is a reply and preceding and (other) following, see also (items linked in):
http://www.investorshub.com/boards/read_msg.asp?Message_id=11339314 and preceding and following;
http://www.investorshub.com/boards/read_msg.asp?message_id=11207880 and following (including in particular the replies to http://www.investorshub.com/boards/read_msg.asp?message_id=11208888 );
http://www.investorshub.com/boards/read_msg.asp?Message_id=10683905 and preceding;
http://www.investorshub.com/boards/read_msg.asp?message_id=9839894 and preceding and following;
http://www.investorshub.com/boards/read_msg.asp?Message_id=9839605 and (the many) preceding;
http://www.investorshub.com/boards/read_msg.asp?Message_id=9279146 and preceding and following;
http://www.investorshub.com/boards/read_msg.asp?message_id=6703936 and preceding and following;
http://www.investorshub.com/boards/read_msg.asp?message_id=6675135 and preceding and following;
http://www.investorshub.com/boards/read_msg.asp?message_id=6645910 and preceding and following;
http://www.investorshub.com/boards/read_msg.asp?message_id=6617904 and preceding;
http://www.investorshub.com/boards/read_msg.asp?message_id=6607193 and preceding and following;
http://www.investorshub.com/boards/read_msg.asp?message_id=6575988 and preceding and following;
http://www.investorshub.com/boards/read_msg.asp?message_id=4929796 and preceding and following;
http://www.investorshub.com/boards/read_msg.asp?message_id=4531093 and preceding and following;
http://www.investorshub.com/boards/read_msg.asp?message_id=4505026 and preceding and following;
http://www.investorshub.com/boards/read_msg.asp?message_id=4165282 and preceding and following;
http://www.investorshub.com/boards/read_msg.asp?message_id=4164578 and preceding and following;
http://www.investorshub.com/boards/read_msg.asp?message_id=3967329 and preceding;
http://www.investorshub.com/boards/read_msg.asp?message_id=3881759 ;
http://www.investorshub.com/boards/read_msg.asp?message_id=3519807 and preceding and following;
http://www.investorshub.com/boards/read_msg.asp?message_id=3415233 ;
http://www.investorshub.com/boards/read_msg.asp?message_id=3361335 ;
http://www.investorshub.com/boards/read_msg.asp?message_id=2827125 ; and
http://www.investorshub.com/boards/read_msg.asp?message_id=2769237 and preceding and following]


[F6 note -- of course, per the bolded second last paragraph of the article, this post also answers:
http://www.investorshub.com/boards/read_msg.asp?message_id=11711642 ;
http://www.investorshub.com/boards/read_msg.asp?message_id=11710737 ; and
http://www.investorshub.com/boards/read_msg.asp?message_id=11710729 ]