From - Sat May 21 19:26:49 2011 X-Mozilla-Status: 0001 X-Mozilla-Status2: 00000000 Delivered-To: khijazi@unveillance.com Received: by 10.236.102.175 with SMTP id d35cs225470yhg; Sun, 26 Dec 2010 02:35:35 -0800 (PST) Received: by 10.216.23.18 with SMTP id u18mr14600804weu.92.1293359734104; Sun, 26 Dec 2010 02:35:34 -0800 (PST) Return-Path: Received: from mail-ww0-f41.google.com (mail-ww0-f41.google.com [74.125.82.41]) by mx.google.com with ESMTP id q53si10626661wep.21.2010.12.26.02.35.33; Sun, 26 Dec 2010 02:35:34 -0800 (PST) Received-SPF: neutral (google.com: 74.125.82.41 is neither permitted nor denied by best guess record for domain of kalhassani@imaratrading.com) client-ip=74.125.82.41; Authentication-Results: mx.google.com; spf=neutral (google.com: 74.125.82.41 is neither permitted nor denied by best guess record for domain of kalhassani@imaratrading.com) smtp.mail=kalhassani@imaratrading.com Received: by wwi18 with SMTP id 18so8165928wwi.4 for ; Sun, 26 Dec 2010 02:35:33 -0800 (PST) Received: by 10.227.141.209 with SMTP id n17mr6828605wbu.121.1293359733311; Sun, 26 Dec 2010 02:35:33 -0800 (PST) Return-Path: Received: from KareemPC ([41.232.207.41]) by mx.google.com with ESMTPS id f35sm7555364wbf.14.2010.12.26.02.35.31 (version=SSLv3 cipher=RC4-MD5); Sun, 26 Dec 2010 02:35:32 -0800 (PST) From: "Kareem Al-Hassani" To: "'Karim Hijazi Unveillance Email'" In-Reply-To: <4D143339.8090208@unveillance.com> Subject: Read: Enterprise pricing including Carrier Grade Date: Sun, 26 Dec 2010 11:35:36 +0100 Message-ID: <003801cba4e8$a346df90$e9d49eb0$@com> MIME-Version: 1.0 Content-Type: multipart/report; boundary="----=_NextPart_000_0039_01CBA4F1.050B4790"; report-type=disposition-notification X-Mailer: Microsoft Office Outlook 12.0 Thread-Index: AcujLaSQnsyi2rbPR4Cr295M4+5iIQButeBe This is a multi-part message in MIME format. ------=_NextPart_000_0039_01CBA4F1.050B4790 Content-Type: multipart/alternative; boundary="----=_NextPart_001_003A_01CBA4F1.050B4790" ------=_NextPart_001_003A_01CBA4F1.050B4790 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit Your message To: 'Kareem Al-Hassani'; Whitley Bruner Subject: Enterprise pricing including Carrier Grade Sent: 12/24/2010 6:44 AM was read on 12/26/2010 11:34 AM. ------=_NextPart_001_003A_01CBA4F1.050B4790 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Read: Enterprise pricing including Carrier Grade

Your message

    To:  'Kareem Al-Hassani'; Whitley Bruner
    Subject:  Enterprise pricing including Carrier = Grade
    Sent:  12/24/2010 6:44 AM

was read on 12/26/2010 11:34 AM.

------=_NextPart_001_003A_01CBA4F1.050B4790-- ------=_NextPart_000_0039_01CBA4F1.050B4790 Content-Type: message/disposition-notification Content-Transfer-Encoding: 7bit Reporting-UA: imaratrading.com; Microsoft Office Outlook 12.0 Final-Recipient: rfc822;kalhassani@imaratrading.com Original-Message-ID: <4D143339.8090208@unveillance.com> Disposition: manual-action/MDN-sent-automatically; displayed ------=_NextPart_000_0039_01CBA4F1.050B4790-- From - Sat May 21 19:26:49 2011 X-Mozilla-Status: 0001 X-Mozilla-Status2: 00000000 Delivered-To: khijazi@unveillance.com Received: by 10.236.102.175 with SMTP id d35cs230752yhg; Sun, 26 Dec 2010 07:05:37 -0800 (PST) Received: by 10.224.54.67 with SMTP id p3mr1006435qag.189.1293375936797; Sun, 26 Dec 2010 07:05:36 -0800 (PST) Return-Path: Received: from omr16.networksolutionsemail.com (omr16.networksolutionsemail.com [205.178.146.66]) by mx.google.com with ESMTP id 6si16834508qcc.193.2010.12.26.07.05.36; Sun, 26 Dec 2010 07:05:36 -0800 (PST) Received-SPF: neutral (google.com: 205.178.146.66 is neither permitted nor denied by best guess record for domain of ckestenbaum@bkinternational.net) client-ip=205.178.146.66; Authentication-Results: mx.google.com; spf=neutral (google.com: 205.178.146.66 is neither permitted nor denied by best guess record for domain of ckestenbaum@bkinternational.net) smtp.mail=ckestenbaum@bkinternational.net Received: from cm-omr3 (mail.networksolutionsemail.com [205.178.146.50]) by omr16.networksolutionsemail.com (8.13.6/8.13.6) with ESMTP id oBQF5aId029360 for ; Sun, 26 Dec 2010 10:05:36 -0500 Authentication-Results: cm-omr3 smtp.user=ckestenbaum@bkinternational.net; auth=pass (LOGIN) X-Authenticated-UID: ckestenbaum@bkinternational.net Received: from [65.113.92.179] ([65.113.92.179:41017] helo=OwnerPC) by cm-omr3 (envelope-from ) (ecelerity 2.2.2.41 r(31179/31189)) with ESMTPA id 4D/1A-05095-EB9571D4; Sun, 26 Dec 2010 10:05:36 -0500 From: "Charles Kestenbaum" To: "'Whitley Bruner'" , "'Jay Gruner'" , "'Jim Moody'" , Cc: Subject: FW: Fact or Fiction? ESPIONAGE IN THE 21ST CENTURY. Date: Sun, 26 Dec 2010 10:05:33 -0500 Message-ID: <005401cba50e$589e84e0$09db8ea0$@net> MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0055_01CBA4E4.6FC87CE0" X-Mailer: Microsoft Office Outlook 12.0 Thread-Index: AcukTtmZWRI83A1ySGy87HSschoCVQAvwvcw Content-Language: en-us This is a multi-part message in MIME format. ------=_NextPart_000_0055_01CBA4E4.6FC87CE0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Of interest. Subject: Fact or Fiction? ESPIONAGE IN THE 21ST CENTURY. The mission: Infiltrate the highly advanced, securely guarded enemy headquarters where scientists in the clutches of an evil master are secretly building a weapon that can destroy the world. Then render that weapon harmless and escape undetected. But in the 21st century, Bond doesn't get the call. Instead, the job is handled by a suave and very sophisticated secret computer worm, a jumble of code called Stuxnet, which in the last year has not only crippled Iran's nuclear program but has caused a major rethinking of computer security around the globe. Intelligence agencies, computer security companies and the nuclear industry have been trying to analyze the worm since it was discovered in June by a Belarus-based company that was doing business in Iran. And what they've all found, says Sean McGurk, the Homeland Security Department's acting director of national cyber security and communications integration, is a game changer. The construction of the worm was so advanced, it was like the arrival of an F-35 into a World War I battlefield, says Ralph Langner, the computer expert who was the first to sound the alarm about Stuxnet. Others have called it the first weaponized computer virus. Simply put, Stuxnet is an incredibly advanced, undetectable computer worm that took years to construct and was designed to jump from computer to computer until it found the specific, protected control system that it aimed to destroy: Irans nuclear enrichment program. The target was seemingly impenetrable; for security reasons, it lay several stories underground and was not connected to the World Wide Web. And that meant Stuxnet had to act as sort of a computer cruise missile: As it made its passage through a set of unconnected computers, it had to grow and adapt to security measures and other changes until it reached one that could bring it into the nuclear facility. When it ultimately found its target, it would have to secretly manipulate it until it was so compromised it ceased normal functions. And finally, after the job was done, the worm would have to destroy itself without leaving a trace. That is what we are learning happened at Iran's nuclear facilities -- both at Natanz, which houses the centrifuge arrays used for processing uranium into nuclear fuel, and, to a lesser extent, at Bushehr, Iran's nuclear power plant. At Natanz, for almost 17 months, Stuxnet quietly worked its way into the system and targeted a specific component -- the frequency converters made by the German equipment manufacturer Siemans that regulated the speed of the spinning centrifuges used to create nuclear fuel. The worm then took control of the speed at which the centrifuges spun, making them turn so fast in a quick burst that they would be damaged but not destroyed. And at the same time, the worm masked that change in speed from being discovered at the centrifuges' control panel. At Bushehr, meanwhile, a second secret set of codes, which Langner called digital warheads, targeted the Russian-built power plant's massive steam turbine. Here's how it worked, according to experts who have examined the worm: --The nuclear facility in Iran runs an air gap security system, meaning it has no connections to the Web, making it secure from outside penetration. Stuxnet was designed and sent into the area around Iran's Natanz nuclear power plant -- just how may never be known -- to infect a number of computers on the assumption that someone working in the plant would take work home on a flash drive, acquire the worm and then bring it back to the plant. --Once the worm was inside the plant, the next step was to get the computer system there to trust it and allow it into the system. That was accomplished because the worm contained a digital certificate stolen from JMicron, a large company in an industrial park in Taiwan. (When the worm was later discovered it quickly replaced the original digital certificate with another certificate, also stolen from another company, Realtek, a few doors down in the same industrial park in Taiwan.) --Once allowed entry, the worm contained four Zero Day elements in its first target, the Windows 7 operating system that controlled the overall operation of the plant. Zero Day elements are rare and extremely valuable vulnerabilities in a computer system that can be exploited only once. Two of the vulnerabilities were known, but the other two had never been discovered. Experts say no hacker would waste Zero Days in that manner. --After penetrating the Windows 7 operating system, the code then targeted the frequency converters that ran the centrifuges. To do that it used specifications from the manufacturers of the converters. One was Vacon, a Finnish Company, and the other Fararo Paya, an Iranian company. What surprises experts at this step is that the Iranian company was so secret that not even the IAEA knew about it. --The worm also knew that the complex control system that ran the centrifuges was built by Siemans, the German manufacturer, and -- remarkably -- how that system worked as well and how to mask its activities from it. --Masking itself from the plant's security and other systems, the worm then ordered the centrifuges to rotate extremely fast, and then to slow down precipitously. This damaged the converter, the centrifuges and the bearings, and it corrupted the uranium in the tubes. It also left Iranian nuclear engineers wondering what was wrong, as computer checks showed no malfunctions in the operating system. Estimates are that this went on for more than a year, leaving the Iranian program in chaos. And as it did, the worm grew and adapted throughout the system. As new worms entered the system, they would meet and adapt and become increasingly sophisticated. During this time the worms reported back to two servers that had to be run by intelligence agencies, one in Denmark and one in Malaysia. The servers monitored the worms and were shut down once the worm had infiltrated Natanz. Efforts to find those servers since then have yielded no results. This went on until June of last year, when a Belarusan company working on the Iranian power plant in Beshehr discovered it in one of its machines. It quickly put out a notice on a Web network monitored by computer security experts around the world. Ordinarily these experts would immediately begin tracing the worm and dissecting it, looking for clues about its origin and other details. But that didnt happen, because within minutes all the alert sites came under attack and were inoperative for 24 hours. I had to use e-mail to send notices but I couldnt reach everyone. Whoever made the worm had a full day to eliminate all traces of the worm that might lead us them, Eric Byers, a computer security expert who has examined the Stuxnet. No hacker could have done that. Experts, including inspectors from the International Atomic Energy Agency, say that, despite Iran's claims to the contrary, the worm was successful in its goal: causing confusion among Irans nuclear engineers and disabling their nuclear program. Because of the secrecy surrounding the Iranian program, no one can be certain of the full extent of the damage. But sources inside Iran and elsewhere say that the Iranian centrifuge program has been operating far below its capacity and that the uranium enrichment program had stagnated during the time the worm penetrated the underground facility. Only 4,000 of the 9,000 centrifuges Iran was known to have were put into use. Some suspect that is because of the critical need to replace ones that were damaged. And the limited number of those in use dwindled to an estimated 3,700 as problems engulfed their operation. IAEA inspectors say the sabotage better explains the slowness of the program, which they had earlier attributed to poor equipment manufacturing and management problems. As Iranians struggled with the setbacks, they began searching for signs of sabotage. From inside Iran there have been unconfirmed reports that the head of the plant was fired shortly after the worm wended its way into the system and began creating technical problems, and that some scientists who were suspected of espionage disappeared or were executed. And counter intelligence agents began monitoring all communications between scientists at the site, creating a climate of fear and paranoia. Iran has adamantly stated that its nuclear program has not been hit by the bug. But in doing so it has backhandedly confirmed that its nuclear facilities were compromised. When Hamid Alipour, head of the nations Information Technology Company, announced in September that 30,000 Iranian computers had been hit by the worm but the nuclear facilities were safe, he added that among those hit were the personal computers of the scientists at the nuclear facilities. Experts say that Natanz and Bushehr could not have escaped the worm if it was in their engineers computers. We brought it into our lab to study it and even with precautions it spread everywhere at incredible speed, Byres said. The worm was designed not to destroy the plants but to make them ineffective. By changing the rotation speeds, the bearings quickly wear out and the equipment has to be replaced and repaired. The speed changes also impact the quality of the uranium processed in the centrifuges creating technical problems that make the plant ineffective, he explained. In other words the worm was designed to allow the Iranian program to continue but never succeed, and never to know why. One additional impact that can be attributed to the worm, according to David Albright of the Center for Strategic and International Studies, is that the lives of the scientists working in the facility have become a living hell because of counter-intelligence agents brought into the plant to battle the breach. Ironically, even after its discovery, the worm has succeeded in slowing down Iran's reputed effort to build an atomic weapon. And Langer says that the efforts by the Iranians to cleanse Stuxnet from their system will probably take another year to complete, and during that time the plant will not be able to function anywhere normally. But as the extent of the worms capabilities is being understood, its genius and complexity has created another perplexing question: Who did it? Speculation on the worms origin initially focused on hackers or even companies trying to disrupt competitors. But as engineers tore apart the virus they learned not only the depth of the code, its complex targeting mechanism, (despite infecting more than 100,000 computers it has only done damage at Natanz,) the enormous amount of work that went into it. Microsoft estimated that it consumed 10,000 man days of labor-- and about what the worm knew, the clues narrowed the number of players that have the capabilities to create it to a handful. This is what nation-states build, if their only other option would be to go to war, Joseph Wouk, an Israeli security expert wrote. Byers is more certain. It is a military weapon, he said. And much of what the worm knew could only have come from a consortium of Western intelligence agencies, experts who have examined the code now believe. Originally, all eyes turned toward Israels intelligence agencies. Engineers examining the worm found clues that hinted at Israels involvement. In one case they found the word Myrtus embedded in the code and argued that it was a reference to Esther, the biblical figure who saved the ancient Jewish state from the Persians. But computer experts say "Myrtus" is more likely a common reference to My RTUS, or remote terminal units. Langer argues that no single Western intelligence agency had the skills to pull this off alone. The most likely answer, he says, is that a consortium of intelligence agencies worked together to build the cyber bomb. And he says the most likely confederates are the United States, because it has the technical skills to make the virus, Germany, because reverse-engineering Siemans product would have taken years without it, and Russia, because of its familiarity with both the Iranian nuclear plant and Siemans systems. There is one clue that was left in the code that may tell us all we need to know. Embedded in different section of the code is another common computer language reference, but this one is misspelled. Instead of saying DEADFOOT, a term stolen from pilots meaning a failed engine, this one reads DEADFOO7. Yes, OO7 has returned -- as a computer worm. Stuxnet. Shaken, not stirred. ------=_NextPart_000_0055_01CBA4E4.6FC87CE0 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

Of = interest…

 

Subject: Fact or = Fiction? ESPIONAGE IN THE 21ST = CENTURY.

 

The mission: Infiltrate the = highly advanced, securely guarded enemy
headquarters where scientists = in the clutches of an evil master are
secretly building a weapon = that can destroy the world. Then render
that weapon harmless and = escape undetected.

But in the 21st century, Bond = doesn't get the call. Instead, the job
is handled by a suave and = very sophisticated secret computer worm, a
jumble of code called = Stuxnet, which in the last year has not only
crippled Iran's nuclear = program but has caused a major rethinking of
computer security around the = globe.

Intelligence agencies, = computer security companies and the nuclear
industry have been trying to = analyze the worm since it was discovered
in June by a Belarus-based = company that was doing business in Iran.
And what they've all found, = says Sean McGurk, the Homeland Security
Department's acting director = of national cyber security and
communications integration, = is a game changer.

The construction of the worm = was so advanced, it was like the arrival
of an F-35 into a World War I = battlefield, says Ralph Langner, the
computer expert who was the = first to sound the alarm about Stuxnet.
Others have called it the = first weaponized computer virus.

Simply put, Stuxnet is an = incredibly advanced, undetectable computer
worm that took years to = construct and was designed to jump from
computer to computer until it = found the specific, protected control
system that it aimed to = destroy: Irans nuclear enrichment program.

The target was seemingly = impenetrable; for security reasons, it lay
several stories underground = and was not connected to the World Wide
Web. And that meant Stuxnet = had to act as sort of a computer cruise
missile: As it made its = passage through a set of unconnected
computers, it had to grow and = adapt to security measures and other
changes until it reached one = that could bring it into the nuclear
facility.

When it ultimately found its = target, it would have to secretly
manipulate it until it was so = compromised it ceased normal functions.

And finally, after the job = was done, the worm would have to destroy
itself without leaving a = trace.

That is what we are learning = happened at Iran's nuclear facilities --
both at Natanz, which houses = the centrifuge arrays used for processing
uranium into nuclear fuel, = and, to a lesser extent, at Bushehr, Iran's
nuclear power = plant.

At = Natanz, for almost 17 months, Stuxnet quietly worked its way = into
the = system and targeted a specific component -- the = frequency
converters made by the German = equipment manufacturer Siemans that
regulated the speed of the = spinning centrifuges used to create nuclear
fuel. The worm then took = control of the speed at which the centrifuges
spun, making them turn so = fast in a quick burst that they would be
damaged but not destroyed. = And at the same time, the worm masked that
change in speed from being = discovered at the centrifuges' control
panel.

At Bushehr, meanwhile, a = second secret set of codes, which Langner
called digital warheads, = targeted the Russian-built power plant's
massive steam = turbine.

Here's how it worked, = according to experts who have examined the worm:
--The nuclear facility in = Iran runs an air gap security system,
meaning it has no connections = to the Web, making it secure from
outside penetration. Stuxnet = was designed and sent into the area
around Iran's Natanz nuclear = power plant -- just how may never be
known -- to infect a number = of computers on the assumption that
someone working in the plant = would take work home on a flash drive,
acquire the worm and then = bring it back to the plant.

--Once the worm was inside = the plant, the next step was to get the
computer system there to = trust it and allow it into the system. That
was accomplished because the = worm contained a digital certificate
stolen from JMicron, a large = company in an industrial park in Taiwan.
(When the worm was later = discovered it quickly replaced the original
digital certificate with = another certificate, also stolen from another
company, Realtek, a few doors = down in the same industrial park in
Taiwan.)

--Once allowed entry, the = worm contained four Zero Day elements in its
first target, the Windows 7 = operating system that controlled the
overall operation of the = plant. Zero Day elements are rare and
extremely valuable = vulnerabilities in a computer system that can be
exploited only once. Two of = the vulnerabilities were known, but the
other two had never been = discovered. Experts say no hacker would waste
Zero Days in that = manner.

--After penetrating the = Windows 7 operating system, the code then
targeted the frequency = converters that ran the centrifuges. To do that
it used specifications from = the manufacturers of the converters. One
was Vacon, a Finnish Company, = and the other Fararo Paya, an Iranian
company. What surprises = experts at this step is that the Iranian
company was so secret that = not even the IAEA knew about it.

--The worm also knew that the = complex control system that ran the
centrifuges was built by = Siemans, the German manufacturer, and --
remarkably -- how that system = worked as well and how to mask its
activities from = it.

--Masking itself from the = plant's security and other systems, the worm
then ordered the centrifuges = to rotate extremely fast, and then to
slow down precipitously. This = damaged the converter, the centrifuges
and the bearings, and it = corrupted the uranium in the tubes. It also
left Iranian nuclear = engineers wondering what was wrong, as computer
checks showed no malfunctions = in the operating system.

Estimates are that this went = on for more than a year, leaving the
Iranian program in chaos. And = as it did, the worm grew and adapted
throughout the system. As new = worms entered the system, they would
meet and adapt and become = increasingly sophisticated.

During this time the worms = reported back to two servers that had to be
run by intelligence agencies, = one in Denmark and one in Malaysia. The
servers monitored the worms = and were shut down once the worm had
infiltrated Natanz. Efforts = to find those servers since then have
yielded no = results.


This went on until June of = last year, when a Belarusan company working
on the Iranian power plant in = Beshehr discovered it in one of its
machines. It quickly put out = a notice on a Web network monitored by
computer security experts = around the world. Ordinarily these experts
would immediately begin = tracing the worm and dissecting it, looking
for clues about its origin = and other details.

But that didnt happen, = because within minutes all the alert sites came
under attack and were = inoperative for 24 hours.

I had to use e-mail to send = notices but I couldnt reach everyone.
Whoever made the worm had a = full day to eliminate all traces of the
worm that might lead us them, = Eric Byers, a computer security expert
who has examined the Stuxnet. = No hacker could have done that.

Experts, including inspectors = from the International Atomic Energy
Agency, say that, despite = Iran's claims to the contrary, the worm was
successful in its goal: = causing confusion among Irans nuclear
engineers and disabling their = nuclear program.

Because of the secrecy = surrounding the Iranian program, no one can be
certain of the full extent of = the damage. But sources inside Iran and
elsewhere say that the = Iranian centrifuge program has been operating
far below its capacity and = that the uranium enrichment program had
stagnated during the time the = worm penetrated the underground
facility. Only 4,000 of the = 9,000 centrifuges Iran was known to have
were put into use. Some = suspect that is because of the critical need
to replace ones that were = damaged.

And the limited number of = those in use dwindled to an estimated 3,700
as problems engulfed their = operation. IAEA inspectors say the sabotage
better explains the slowness = of the program, which they had earlier
attributed to poor equipment = manufacturing and management problems. As
Iranians struggled with the = setbacks, they began searching for signs
of sabotage. From inside Iran = there have been unconfirmed reports that
the head of the plant was = fired shortly after the worm wended its way
into the system and began = creating technical problems, and that some
scientists who were suspected = of espionage disappeared or were
executed. And counter = intelligence agents began monitoring all
communications between = scientists at the site, creating a climate of
fear and = paranoia.

Iran has adamantly stated = that its nuclear program has not been hit by
the bug. But in doing so it = has backhandedly confirmed that its
nuclear facilities were = compromised. When Hamid Alipour, head of the
nations Information = Technology Company, announced in September that
30,000 Iranian computers had = been hit by the worm but the nuclear
facilities were safe, he = added that among those hit were the personal
computers of the scientists = at the nuclear facilities. Experts say
that Natanz and Bushehr could = not have escaped the worm if it was in
their engineers = computers.

We brought it into our lab to = study it and even with precautions it
spread everywhere at = incredible speed, Byres said.
The worm was designed not to = destroy the plants but to make them
ineffective. By changing the = rotation speeds, the bearings quickly
wear out and the equipment = has to be replaced and repaired. The speed
changes also impact the = quality of the uranium processed in the
centrifuges creating = technical problems that make the plant
ineffective, he = explained.

In other words the worm was = designed to allow the Iranian program to
continue but never succeed, = and never to know why.

One additional impact that = can be attributed to the worm, according to
David Albright of the Center = for Strategic and International Studies,
is that the lives of the = scientists working in the facility have
become a living hell because = of counter-intelligence agents brought
into the plant to battle the = breach. Ironically, even after its
discovery, the worm has = succeeded in slowing down Iran's reputed
effort to build an atomic = weapon. And Langer says that the efforts by
the Iranians to cleanse = Stuxnet from their system will probably take
another year to complete, and = during that time the plant will not be
able to function anywhere = normally.

But as the extent of the = worms capabilities is being understood, its
genius and complexity has = created another perplexing question: Who did
it?

Speculation on the worms = origin initially focused on hackers or even
companies trying to disrupt = competitors. But as engineers tore apart
the virus they learned not = only the depth of the code, its complex
targeting mechanism, (despite = infecting more than 100,000 computers it
has only done damage at = Natanz,) the enormous amount of work that went
into it. Microsoft estimated = that it consumed 10,000 man days of
labor-- and about what the = worm knew, the clues narrowed the number of
players that have the = capabilities to create it to a handful.
This is what nation-states = build, if their only other option would be
to go to war, Joseph Wouk, an = Israeli security expert wrote.
Byers is more certain. It is = a military weapon, he said.

And much of what the worm = knew could only have come from a consortium
of Western intelligence = agencies, experts who have examined the code
now = believe.

Originally, all eyes turned = toward Israels intelligence agencies.
Engineers examining the worm = found clues that hinted at Israels
involvement. In one case they = found the word Myrtus embedded in the
code and argued that it was a = reference to Esther, the biblical figure
who saved the ancient Jewish = state from the Persians. But computer
experts say = "Myrtus" is more likely a common reference to My RTUS, = or
remote = terminal units.

Langer argues that no single = Western intelligence agency had the
skills to pull this off = alone. The most likely answer, he says, is
that a consortium of = intelligence agencies worked together to build
the cyber bomb. And he says = the most likely confederates are the
United States, because it has = the technical skills to make the virus,
Germany, because = reverse-engineering Siemans product would have taken
years without it, and Russia, = because of its familiarity with both the
Iranian nuclear plant and = Siemans systems.

There is one clue that was = left in the code that may tell us all we
need to = know.

Embedded in different section = of the code is another common computer
language reference, but this = one is misspelled. Instead of saying
DEADFOOT, a term stolen from = pilots meaning a failed engine, this one
reads = DEADFOO7.

Yes, OO7 has returned -- as a = computer worm.

Stuxnet. Shaken, not = stirred.

 =

------=_NextPart_000_0055_01CBA4E4.6FC87CE0-- From - Sat May 21 19:26:49 2011 X-Mozilla-Status: 0001 X-Mozilla-Status2: 00000000 Return-Path: Received: from [192.168.1.101] (c-98-199-219-212.hsd1.tx.comcast.net [98.199.219.212]) by mx.google.com with ESMTPS id 37sm13055965anr.24.2010.12.23.15.45.44 (version=SSLv3 cipher=RC4-MD5); Thu, 23 Dec 2010 15:45:44 -0800 (PST) Message-ID: <4D13DF24.4040306@unveillance.com> Disposition-Notification-To: Karim Hijazi Unveillance Email Date: Thu, 23 Dec 2010 18:45:40 -0500 From: Karim Hijazi Unveillance Email Reply-To: khijazi@unveillance.com Organization: Unveillance User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.9.2.13) Gecko/20101207 Lightning/1.0b2 Thunderbird/3.1.7 MIME-Version: 1.0 To: "Upton, Ric" Subject: Pleasure speaking with you. X-Enigmail-Version: 1.1.1 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Ric, Just wanted to send you a quick thank you for your time and conversation yesterday. It sounds like there could be some great potential with General Catalyst Partners and I am very interested in exploring that further. Stay in touch and happy holidays. Take care. - -- All the best, Karim Hijazi CEO | President Unveillance O. (404) 585-7487 M. (561) 542-5704 www.unveillance.com khijazi@unveillance.com ******************************************** CONFIDENTIAL & PRIVILEGED COMMUNICATION This message is for the named person's use only. The information contained in this communication is confidential and/or privileged, proprietary information that is transmitted solely for the purpose of the intended recipient(s). No confidentiality or privilege is waived or lost by any mistransmission. If you receive this message in error, please immediately delete it and all copies of it from your system, destroy any hard copies of it and notify the sender. You must not, directly or indirectly, use, disclose, distribute, print, or copy any part of this message if you are not the intended recipient. The sender or any of its subsidiaries each reserve the right to monitor all e-mail communications through its networks. ******************************************** -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (MingW32) iQEcBAEBAgAGBQJNE98kAAoJEIk0Dw4U/G3lw2QH+gMogdwt7vMsuFWzwpY5YP6s lmzXPQVdBz8pPCC3ZvOIvViRqou2CNURKW+oa/WcZdKPvc4JSRzRK6tzFIkHBFzk I1pAlsz8/YTt30hakPCmLsodr2Do3OPGcDtkH2qVRuMIvGARIcyxWlGkzfH1Byh7 OjCxeIP9iAqg9wLUsO8ecXzm+NsARR2F40qi72/gHlPiauyDKabyKwr+kDFB5j4H BWsN6ecGSb4Id6In0wyThY4xbGUPVZLl/Qf/V2mI7Nydx/ubiMG0qqYyEFWRPBTy A8xTBC/8iXLna73wAdreCd4FsKKi2yLkBEFl5OS17UuUshtQDYHmfyRJDxhPLtU= =EeUZ -----END PGP SIGNATURE----- From - Sat May 21 19:26:49 2011 X-Mozilla-Status: 0001 X-Mozilla-Status2: 00000000 Delivered-To: khijazi@unveillance.com Received: by 10.236.102.175 with SMTP id d35cs170799yhg; Fri, 24 Dec 2010 07:25:49 -0800 (PST) Received: by 10.236.105.194 with SMTP id k42mr1822027yhg.65.1293204348723; Fri, 24 Dec 2010 07:25:48 -0800 (PST) Return-Path: Received: from omr17.networksolutionsemail.com (omr17.networksolutionsemail.com [205.178.146.67]) by mx.google.com with ESMTP id v16si7869584vbp.46.2010.12.24.07.25.48; Fri, 24 Dec 2010 07:25:48 -0800 (PST) Received-SPF: neutral (google.com: 205.178.146.67 is neither permitted nor denied by best guess record for domain of wbruner@bkinternational.net) client-ip=205.178.146.67; Authentication-Results: mx.google.com; spf=neutral (google.com: 205.178.146.67 is neither permitted nor denied by best guess record for domain of wbruner@bkinternational.net) smtp.mail=wbruner@bkinternational.net Received: from cm-omr10 (mail.networksolutionsemail.com [205.178.146.50]) by omr17.networksolutionsemail.com (8.13.6/8.13.6) with ESMTP id oBOFPlXm013995 for ; Fri, 24 Dec 2010 10:25:48 -0500 Authentication-Results: cm-omr10 smtp.user=wbruner@bkinternational.net; auth=pass (LOGIN) X-Authenticated-UID: wbruner@bkinternational.net Received: from [108.18.13.176] ([108.18.13.176:51495] helo=WhitleyPC) by cm-omr10 (envelope-from ) (ecelerity 2.2.2.41 r(31179/31189)) with ESMTPA id 6A/CF-30361-B7BB41D4; Fri, 24 Dec 2010 10:25:47 -0500 From: "Whitley Bruner" To: "'Karim Hijazi Unveillance Email'" In-Reply-To: <4D143339.8090208@unveillance.com> Subject: Read: Enterprise pricing including Carrier Grade Date: Fri, 24 Dec 2010 10:25:46 -0500 Message-ID: <000f01cba37e$d63efc90$82bcf5b0$@net> MIME-Version: 1.0 Content-Type: multipart/report; report-type=disposition-notification; boundary="----=_NextPart_000_0010_01CBA354.ED691BA0" X-Mailer: Microsoft Office Outlook 12.0 Thread-Index: AcujLaSQ30Il8VHOSqSUaaHMYksR5QAUTAFv This is a multi-part message in MIME format. ------=_NextPart_000_0010_01CBA354.ED691BA0 Content-Type: multipart/alternative; boundary="----=_NextPart_001_0011_01CBA354.ED691BA0" ------=_NextPart_001_0011_01CBA354.ED691BA0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit Your message To: 'Kareem Al-Hassani'; Whitley Bruner Subject: Enterprise pricing including Carrier Grade Sent: 12/24/2010 12:44 AM was read on 12/24/2010 10:25 AM. ------=_NextPart_001_0011_01CBA354.ED691BA0 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Read: Enterprise pricing including Carrier Grade

Your message

    To:  'Kareem Al-Hassani'; Whitley Bruner
    Subject:  Enterprise pricing including Carrier = Grade
    Sent:  12/24/2010 12:44 AM

was read on 12/24/2010 10:25 AM.

------=_NextPart_001_0011_01CBA354.ED691BA0-- ------=_NextPart_000_0010_01CBA354.ED691BA0 Content-Type: message/disposition-notification Content-Transfer-Encoding: 7bit Reporting-UA: bkinternational.net; Microsoft Office Outlook 12.0 Final-Recipient: rfc822;wbruner@bkinternational.net Original-Message-ID: <4D143339.8090208@unveillance.com> Disposition: manual-action/MDN-sent-manually; displayed ------=_NextPart_000_0010_01CBA354.ED691BA0-- From - Sat May 21 19:26:49 2011 X-Mozilla-Status: 0001 X-Mozilla-Status2: 00000000 Return-Path: Received: from [192.168.1.101] (c-98-199-219-212.hsd1.tx.comcast.net [98.199.219.212]) by mx.google.com with ESMTPS id w4sm6400478anw.16.2010.12.24.09.38.33 (version=SSLv3 cipher=RC4-MD5); Fri, 24 Dec 2010 09:38:33 -0800 (PST) Message-ID: <4D14DA99.9010904@unveillance.com> Disposition-Notification-To: Karim Hijazi Unveillance Email Date: Fri, 24 Dec 2010 12:38:33 -0500 From: Karim Hijazi Unveillance Email Reply-To: khijazi@unveillance.com Organization: Unveillance User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.9.2.13) Gecko/20101207 Lightning/1.0b2 Thunderbird/3.1.7 MIME-Version: 1.0 To: James Hunt Subject: Re: thoughts References: In-Reply-To: X-Enigmail-Version: 1.1.1 Content-Type: multipart/alternative; boundary="------------070405020500080108040708" This is a multi-part message in MIME format. --------------070405020500080108040708 Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: 8bit -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Jim, Thank you for your well organized email below and I think we are both well aligned in our thinking. I have had some further conversation with General Catalyst Partners and Ric Upton since arriving into Houston. There seems to be some viable interest on that front but as you aptly put in your email, it is just an option. Chris Davis and I have discussed in depth the plan to bring the firms together to provide a complete offering. Beyond that, nothing would be more gratifying and powerful than having Unveillance be the wholesaler of data to End Game Systems, not to mention be a more powerful retail solution as well. In order to do this, I still need to figure out the best way to do this: Get Davis to "contribute" the malware analysis software and sinkhole infrastructure to Unveillance for a decent percentage OR take on some level of funding and purchase the technology from Davis and provide him a less substantial ownership stake. He is open to both options. I have no question in my mind about your value to Unveillance for the obvious federal potential as well as the commercial application of the solution. If we had the means to replicate the same level of buzz and introductions that we did during my stop, it is clear to me that we would be tremendously successful. I would be interested in learning a bit more about your thoughts as an angel (either independently or via your group). We can speak about that as it relates to the VC interest too. I am all for build a couple of advisory boards; I have already had plans to build a scientific board. In the meantime, happy holidays Jim and lets chat shortly after Christmas and make some plans. Take care. Best regards, Karim On 12/21/2010 10:14 PM, James Hunt wrote: > Karim, > > I appreciated the obvious time you have spent thinking through the > strategy of "where Unveillance can and should go". I hope that I've > been able to stimulate some of your thinking here. And I also > appreciate your comments that perhaps I can add more firepower to > the overall Unveillance mission than just in federal. I guess they > say that "life is too short do dance with ugly girls", so I'll > suggest some perhaps provocative and arrogant things but do believe > I can add value here. > > 1.Ideally, I think you would have the most powerful statement by > pulling all of Unveillance "under one roof". That includes bringing > in the fed piece and capturing (to the extent possible) Chris Davis. > While we are behind in Federal, I think you can already see the > power of that market and how I can help there. The alignment with > Chris is obvious. It is a real trump card, particularly when we > will be compared with our friends up the street from you. So, in > summary here – a consolidated company does make sense. > > 2.I hope you can see the value I can bring in federal from your stop > here. But I believe I can also provide you some sage, experienced > advise as you grow the company – both in terms of governance as well > as money raise. > > 3.With that in mind, I'd like to be considered for a board member > for UV. A couple of points here. First, I think I can help you > puzzle through different investment options and, hopefully can also > help you with growth, management and governance questions that could > come up. I also realize that over time, I may be not appropriate for > the board and if any investors come in that suggest I be replaced, > it is no problem for me. I will add value as long as it is just > that – valuable. > > 4.For me to get actively engaged, I'd like to see my way clear to > getting 4 to 5% of the company. I just joined a board for 2% > presuming I give them 4 years of board experience. For it to be > worth my time, I would like to at least be in consideration to > purchase another couple percent. I, of course, would like that to > be founders stock and at an attractive price – certainly a discount > to any initial round. > > 5.However, once on board, I think I can add real value to you in > raising a round. Whether that be an angel round for little dilution > or a larger (EG like) round is yet to be rationalized but there is > probably a round in your future somewhere between an angel and > larger VC round. Lots of work would need to be done before we are > ready and, frankly, it could be that offers simply aren't worth the > dilution. But we do need options. > > 6.In addition to the board position, I think it might be good to > have me as the "head of a federal advisory board" to take best > advantage of the people I know, etc. > > I'd like you to consider this and then we can talk. > > Take some time off for the holidays and let's continue to dialogue. > > Regards, > > Jim > > P.S. Think about the power of your being able to "track" > permutations to the BOTS. If we could, we would know pretty much > where EG had changed a Bot and then launched it to target systems. > This would be a very, very impressive demo to show some of my > federal friend and give them a strong reason to talk to us. > - -- All the best, Karim Hijazi CEO | President Unveillance O. (404) 585-7487 M. (561) 542-5704 www.unveillance.com khijazi@unveillance.com ******************************************** CONFIDENTIAL & PRIVILEGED COMMUNICATION This message is for the named person's use only. The information contained in this communication is confidential and/or privileged, proprietary information that is transmitted solely for the purpose of the intended recipient(s). No confidentiality or privilege is waived or lost by any mistransmission. If you receive this message in error, please immediately delete it and all copies of it from your system, destroy any hard copies of it and notify the sender. You must not, directly or indirectly, use, disclose, distribute, print, or copy any part of this message if you are not the intended recipient. The sender or any of its subsidiaries each reserve the right to monitor all e-mail communications through its networks. ******************************************** -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (MingW32) iQEcBAEBAgAGBQJNFNqZAAoJEIk0Dw4U/G3lzwIIAJcRu/nts4I+du6Qw19ACrlE CXj0w7XmNCtkb4/wlNutChHiiCVHJbx+6+j9WYDCRPtZudKZXPQwUciq2AnRWHEj /GvX0EiFraRwL0Ce75HEBtkNJArcecUpohFBow7fkkJ/LePH3O0uVWfDAWdBOoSg qwwDLVBE8b3bXjDYZUMgfzn5++b2mYzCdwnPo4jID2VG9iy9/tzE3ExLVm911+F3 viDV7efqUto/vEPfbFPwl1ghttcEsekR85NOVgsaq1F4R5JJRZVH1p2sIPbwqUAS nGx0b8XzA5b4V3NZNJrtBH/qSG90EMqeZHu7zNmf5MihLNJkbFhGRSvIEbcrSAA= =qHXP -----END PGP SIGNATURE----- --------------070405020500080108040708 Content-Type: text/html; charset=windows-1252 Content-Transfer-Encoding: 8bit
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
 
Jim,

Thank you for your well organized email below and I think we are both
well aligned in our thinking.  I have had some further conversation
with General Catalyst Partners and Ric Upton since arriving into
Houston.  There seems to be some viable interest on that front but as
you aptly put in your email, it is just an option.

Chris Davis and I have discussed in depth the plan to bring the firms
together to provide a complete offering.  Beyond that, nothing would
be more gratifying and powerful than having Unveillance be the
wholesaler of data to End Game Systems, not to mention be a more
powerful retail solution as well.  In order to do this, I still need
to figure out the best way to do this:  Get Davis to "contribute" the
malware analysis software and sinkhole infrastructure to Unveillance
for a decent percentage OR take on some level of funding and purchase
the technology from Davis and provide him a less substantial ownership
stake.  He is open to both options.

I have no question in my mind about your value to Unveillance for the
obvious federal potential as well as the commercial application of the
solution.  If we had the means to replicate the same level of buzz and
introductions that we did during my stop, it is clear to me that we
would be tremendously successful.

I would be interested in learning a bit more about your thoughts as an
angel (either independently or via your group).  We can speak about
that as it relates to the VC interest too.

I am all for build a couple of advisory boards;  I have already had
plans to build a scientific board.

In the meantime, happy holidays Jim and lets chat shortly after
Christmas and make some plans.  Take care.

Best regards,

Karim



On 12/21/2010 10:14 PM, James Hunt wrote:
> Karim,
>
> I appreciated the obvious time you have spent thinking through the
> strategy of "where Unveillance can and should go". I hope that I've
> been able to stimulate some of your thinking here. And I also
> appreciate your comments that perhaps I can add more firepower to
> the overall Unveillance mission than just in federal. I guess they
> say that "life is too short do dance with ugly girls", so I'll
> suggest some perhaps provocative and arrogant things but do believe
> I can add value here.
>
> 1.Ideally, I think you would have the most powerful statement by
> pulling all of Unveillance "under one roof". That includes bringing
> in the fed piece and capturing (to the extent possible) Chris Davis.
> While we are behind in Federal, I think you can already see the
> power of that market and how I can help there. The alignment with
> Chris is obvious. It is a real trump card, particularly when we
> will be compared with our friends up the street from you. So, in
> summary here – a consolidated company does make sense.
>
> 2.I hope you can see the value I can bring in federal from your stop
> here. But I believe I can also provide you some sage, experienced
> advise as you grow the company – both in terms of governance as well
> as money raise.
>
> 3.With that in mind, I'd like to be considered for a board member
> for UV. A couple of points here. First, I think I can help you
> puzzle through different investment options and, hopefully can also
> help you with growth, management and governance questions that could
> come up. I also realize that over time, I may be not appropriate for
> the board and if any investors come in that suggest I be replaced,
> it is no problem for me. I will add value as long as it is just
> that – valuable.
>
> 4.For me to get actively engaged, I'd like to see my way clear to
> getting 4 to 5% of the company. I just joined a board for 2%
> presuming I give them 4 years of board experience. For it to be
> worth my time, I would like to at least be in consideration to
> purchase another couple percent. I, of course, would like that to
> be founders stock and at an attractive price – certainly a discount
> to any initial round.
>
> 5.However, once on board, I think I can add real value to you in
> raising a round. Whether that be an angel round for little dilution
> or a larger (EG like) round is yet to be rationalized but there is
> probably a round in your future somewhere between an angel and
> larger VC round. Lots of work would need to be done before we are
> ready and, frankly, it could be that offers simply aren't worth the
> dilution. But we do need options.
>
> 6.In addition to the board position, I think it might be good to
> have me as the "head of a federal advisory board" to take best
> advantage of the people I know, etc.
>
> I'd like you to consider this and then we can talk.
>
> Take some time off for the holidays and let's continue to dialogue.
>
> Regards,
>
> Jim
>
> P.S. Think about the power of your being able to "track"
> permutations to the BOTS. If we could, we would know pretty much
> where EG had changed a Bot and then launched it to target systems.
> This would be a very, very impressive demo to show some of my
> federal friend and give them a strong reason to talk to us.
>



- --
All the best,

Karim Hijazi
CEO | President
Unveillance
O. (404) 585-7487
M. (561) 542-5704
www.unveillance.com
khijazi@unveillance.com

********************************************
CONFIDENTIAL & PRIVILEGED COMMUNICATION This message is for the named
person's use only. The information contained in this communication is
confidential and/or privileged, proprietary information that is
transmitted solely for the purpose of the intended recipient(s). No
confidentiality or privilege is waived or lost by any
mistransmission.  If you receive this message in error, please
immediately delete it and all copies of it from your system, destroy
any hard copies of it and notify the sender. You must not, directly or
indirectly, use, disclose, distribute, print, or copy any part of this
message if you are not the intended recipient. The sender or any of
its subsidiaries each reserve the right to monitor all e-mail
communications through its networks.
********************************************
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (MingW32)
 
iQEcBAEBAgAGBQJNFNqZAAoJEIk0Dw4U/G3lzwIIAJcRu/nts4I+du6Qw19ACrlE
CXj0w7XmNCtkb4/wlNutChHiiCVHJbx+6+j9WYDCRPtZudKZXPQwUciq2AnRWHEj
/GvX0EiFraRwL0Ce75HEBtkNJArcecUpohFBow7fkkJ/LePH3O0uVWfDAWdBOoSg
qwwDLVBE8b3bXjDYZUMgfzn5++b2mYzCdwnPo4jID2VG9iy9/tzE3ExLVm911+F3
viDV7efqUto/vEPfbFPwl1ghttcEsekR85NOVgsaq1F4R5JJRZVH1p2sIPbwqUAS
nGx0b8XzA5b4V3NZNJrtBH/qSG90EMqeZHu7zNmf5MihLNJkbFhGRSvIEbcrSAA=
=qHXP
-----END PGP SIGNATURE-----

--------------070405020500080108040708-- From - Sat May 21 19:26:49 2011 X-Mozilla-Status: 0001 X-Mozilla-Status2: 00000000 Delivered-To: khijazi@unveillance.com Received: by 10.236.102.175 with SMTP id d35cs175692yhg; Fri, 24 Dec 2010 10:11:48 -0800 (PST) Received: by 10.236.109.1 with SMTP id r1mr2860534yhg.1.1293214307596; Fri, 24 Dec 2010 10:11:47 -0800 (PST) Return-Path: Received: from gateout01.mbox.net (gateout01.mbox.net [165.212.64.21]) by mx.google.com with ESMTPS id 21si19325403yhl.18.2010.12.24.10.11.47 (version=TLSv1/SSLv3 cipher=RC4-MD5); Fri, 24 Dec 2010 10:11:47 -0800 (PST) Received-SPF: neutral (google.com: 165.212.64.21 is neither permitted nor denied by best guess record for domain of jhunt@mitagroup.com) client-ip=165.212.64.21; Authentication-Results: mx.google.com; spf=neutral (google.com: 165.212.64.21 is neither permitted nor denied by best guess record for domain of jhunt@mitagroup.com) smtp.mail=jhunt@mitagroup.com Received: from gateout01.mbox.net (gateout01-lo [127.0.0.1]) by gateout01.mbox.net (Postfix) with ESMTP id 8C569CF0E2 for ; Fri, 24 Dec 2010 18:11:46 +0000 (GMT) X-USANET-Received: from gateout01.mbox.net [127.0.0.1] by gateout01.mbox.net via mtad (C8.MAIN.3.71F) with ESMTP id 554oLXsLt0624Mo1; Fri, 24 Dec 2010 18:11:45 -0000 Received: from s1hub4.EXCHPROD.USA.NET [165.212.120.254] by gateout01.mbox.net via smtad (C8.MAIN.3.68M) with ESMTPS id XID929oLXsLt3574Xo1; Fri, 24 Dec 2010 18:11:45 -0000 X-USANET-Source: 165.212.120.254 IN jhunt@mitagroup.com s1hub4.EXCHPROD.USA.NET X-USANET-MsgId: XID929oLXsLt3574Xo1 Received: from MBX6.EXCHPROD.USA.NET ([10.120.221.61]) by s1hub4.EXCHPROD.USA.NET ([10.120.220.34]) with mapi; Fri, 24 Dec 2010 18:11:19 +0000 From: James Hunt To: "khijazi@unveillance.com" Date: Fri, 24 Dec 2010 18:09:51 +0000 Subject: RE: thoughts Thread-Topic: thoughts Thread-Index: AcujkWaDD6hR2OQARgWj15MBsZsN0QABFvVO Message-ID: References: ,<4D14DA99.9010904@unveillance.com> In-Reply-To: <4D14DA99.9010904@unveillance.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: acceptlanguage: en-US Content-Type: text/plain; charset="Windows-1252" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Karim, You have a great holiday. =20 I think that one of the first steps is to really develop a business plan th= at outlines where you want to take the company. With a strategic plan in v= iew, I think we can begin to look at best options for the Davis piece and t= he raise. Puzzling through that could be a good way to figure out the path= forward. jim ________________________________________ From: Karim Hijazi Unveillance Email [khijazi@unveillance.com] Sent: Friday, December 24, 2010 5:38 PM To: James Hunt Subject: Re: thoughts -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Jim, Thank you for your well organized email below and I think we are both well aligned in our thinking. I have had some further conversation with General Catalyst Partners and Ric Upton since arriving into Houston. There seems to be some viable interest on that front but as you aptly put in your email, it is just an option. Chris Davis and I have discussed in depth the plan to bring the firms together to provide a complete offering. Beyond that, nothing would be more gratifying and powerful than having Unveillance be the wholesaler of data to End Game Systems, not to mention be a more powerful retail solution as well. In order to do this, I still need to figure out the best way to do this: Get Davis to "contribute" the malware analysis software and sinkhole infrastructure to Unveillance for a decent percentage OR take on some level of funding and purchase the technology from Davis and provide him a less substantial ownership stake. He is open to both options. I have no question in my mind about your value to Unveillance for the obvious federal potential as well as the commercial application of the solution. If we had the means to replicate the same level of buzz and introductions that we did during my stop, it is clear to me that we would be tremendously successful. I would be interested in learning a bit more about your thoughts as an angel (either independently or via your group). We can speak about that as it relates to the VC interest too. I am all for build a couple of advisory boards; I have already had plans to build a scientific board. In the meantime, happy holidays Jim and lets chat shortly after Christmas and make some plans. Take care. Best regards, Karim On 12/21/2010 10:14 PM, James Hunt wrote: > Karim, > > I appreciated the obvious time you have spent thinking through the > strategy of "where Unveillance can and should go". I hope that I've > been able to stimulate some of your thinking here. And I also > appreciate your comments that perhaps I can add more firepower to > the overall Unveillance mission than just in federal. I guess they > say that "life is too short do dance with ugly girls", so I'll > suggest some perhaps provocative and arrogant things but do believe > I can add value here. > > 1.Ideally, I think you would have the most powerful statement by > pulling all of Unveillance "under one roof". That includes bringing > in the fed piece and capturing (to the extent possible) Chris Davis. > While we are behind in Federal, I think you can already see the > power of that market and how I can help there. The alignment with > Chris is obvious. It is a real trump card, particularly when we > will be compared with our friends up the street from you. So, in > summary here =96 a consolidated company does make sense. > > 2.I hope you can see the value I can bring in federal from your stop > here. But I believe I can also provide you some sage, experienced > advise as you grow the company =96 both in terms of governance as well > as money raise. > > 3.With that in mind, I'd like to be considered for a board member > for UV. A couple of points here. First, I think I can help you > puzzle through different investment options and, hopefully can also > help you with growth, management and governance questions that could > come up. I also realize that over time, I may be not appropriate for > the board and if any investors come in that suggest I be replaced, > it is no problem for me. I will add value as long as it is just > that =96 valuable. > > 4.For me to get actively engaged, I'd like to see my way clear to > getting 4 to 5% of the company. I just joined a board for 2% > presuming I give them 4 years of board experience. For it to be > worth my time, I would like to at least be in consideration to > purchase another couple percent. I, of course, would like that to > be founders stock and at an attractive price =96 certainly a discount > to any initial round. > > 5.However, once on board, I think I can add real value to you in > raising a round. Whether that be an angel round for little dilution > or a larger (EG like) round is yet to be rationalized but there is > probably a round in your future somewhere between an angel and > larger VC round. Lots of work would need to be done before we are > ready and, frankly, it could be that offers simply aren't worth the > dilution. But we do need options. > > 6.In addition to the board position, I think it might be good to > have me as the "head of a federal advisory board" to take best > advantage of the people I know, etc. > > I'd like you to consider this and then we can talk. > > Take some time off for the holidays and let's continue to dialogue. > > Regards, > > Jim > > P.S. Think about the power of your being able to "track" > permutations to the BOTS. If we could, we would know pretty much > where EG had changed a Bot and then launched it to target systems. > This would be a very, very impressive demo to show some of my > federal friend and give them a strong reason to talk to us. > - -- All the best, Karim Hijazi CEO | President Unveillance O. (404) 585-7487 M. (561) 542-5704 www.unveillance.com khijazi@unveillance.com ******************************************** CONFIDENTIAL & PRIVILEGED COMMUNICATION This message is for the named person's use only. The information contained in this communication is confidential and/or privileged, proprietary information that is transmitted solely for the purpose of the intended recipient(s). No confidentiality or privilege is waived or lost by any mistransmission. If you receive this message in error, please immediately delete it and all copies of it from your system, destroy any hard copies of it and notify the sender. You must not, directly or indirectly, use, disclose, distribute, print, or copy any part of this message if you are not the intended recipient. The sender or any of its subsidiaries each reserve the right to monitor all e-mail communications through its networks. ******************************************** -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (MingW32) iQEcBAEBAgAGBQJNFNqZAAoJEIk0Dw4U/G3lzwIIAJcRu/nts4I+du6Qw19ACrlE CXj0w7XmNCtkb4/wlNutChHiiCVHJbx+6+j9WYDCRPtZudKZXPQwUciq2AnRWHEj /GvX0EiFraRwL0Ce75HEBtkNJArcecUpohFBow7fkkJ/LePH3O0uVWfDAWdBOoSg qwwDLVBE8b3bXjDYZUMgfzn5++b2mYzCdwnPo4jID2VG9iy9/tzE3ExLVm911+F3 viDV7efqUto/vEPfbFPwl1ghttcEsekR85NOVgsaq1F4R5JJRZVH1p2sIPbwqUAS nGx0b8XzA5b4V3NZNJrtBH/qSG90EMqeZHu7zNmf5MihLNJkbFhGRSvIEbcrSAA=3D =3DqHXP -----END PGP SIGNATURE----- From - Sat May 21 19:26:49 2011 X-Mozilla-Status: 0001 X-Mozilla-Status2: 00000000 Delivered-To: khijazi@unveillance.com Received: by 10.236.102.175 with SMTP id d35cs182192yhg; Fri, 24 Dec 2010 13:26:52 -0800 (PST) Received: by 10.151.158.7 with SMTP id k7mr14037794ybo.405.1293226012000; Fri, 24 Dec 2010 13:26:52 -0800 (PST) Return-Path: Received: from mail-yi0-f45.google.com (mail-yi0-f45.google.com [209.85.218.45]) by mx.google.com with ESMTP id e20si19619748yhc.78.2010.12.24.13.26.51; Fri, 24 Dec 2010 13:26:51 -0800 (PST) Received-SPF: neutral (google.com: 209.85.218.45 is neither permitted nor denied by best guess record for domain of jtubbs@unveillance.com) client-ip=209.85.218.45; Authentication-Results: mx.google.com; spf=neutral (google.com: 209.85.218.45 is neither permitted nor denied by best guess record for domain of jtubbs@unveillance.com) smtp.mail=jtubbs@unveillance.com Received: by yie21 with SMTP id 21so1538357yie.4 for ; Fri, 24 Dec 2010 13:26:51 -0800 (PST) Received: by 10.151.155.16 with SMTP id h16mr13948122ybo.409.1293226009859; Fri, 24 Dec 2010 13:26:49 -0800 (PST) Return-Path: Received: from [192.168.1.75] (99-1-188-105.lightspeed.tukrga.sbcglobal.net [99.1.188.105]) by mx.google.com with ESMTPS id e54sm5269850yhc.14.2010.12.24.13.26.47 (version=TLSv1/SSLv3 cipher=RC4-MD5); Fri, 24 Dec 2010 13:26:49 -0800 (PST) From: "J. Tubbs" Content-Type: multipart/alternative; boundary=Apple-Mail-1--761289525 Subject: New Trends feature Date: Fri, 24 Dec 2010 16:26:46 -0500 Message-Id: <1B77756D-5CB3-4060-A199-B05BE7E1CF85@unveillance.com> Cc: John Phillips To: Karim Hijazi Mime-Version: 1.0 (Apple Message framework v1082) X-Mailer: Apple Mail (2.1082) --Apple-Mail-1--761289525 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=us-ascii Karim/John, Just wanted to make sure you guys were aware of a new Trends feature = found under the Trends tab. I did away with the threat differential views that I had up there. They = were not inline with the changes that had been made to the system over = the past several months, and furthermore did not line up with = essentially where the platform is moving going forward. Thus, I created = a new view that makes a whole lot more sense when trying to see who is = spiking presently or just doing piss-poor over time. The new view takes = a differential based on the DLI score. It defaults to a today versus = yesterday comparison, and can be taken all the way up to a 90-day = comparison. It is labeled "DLI Increase" under the Trends tab, but is = now the default/de facto view when clicking on Trends in general. I have presently only implemented it for Organizations that are labeled = as Enterprise/Corporation entities, etc... Thus, no countries or sector = differences. With that said, I do plan to create one that encompasses = all different types of Organizations based on this differential = comparison -- just wanting to test it with this one before moving = forward. I plan to put a similar feature set offering under the threat = center for clients but without the ability to see DLI differentials = between specific enterprises. Business Sectors, regions, etc... will be = available to clients. J. Tubbs CTO Unveillance, LLC O. (404) 482-3557 www.unveillance.com jtubbs@unveillance.com ******************************************** CONFIDENTIAL & PRIVILEGED COMMUNICATION This message is for the named person's use only. The information contained in this communication is confidential and/or privileged, proprietary information that is transmitted solely for the purpose of the intended recipient(s). No confidentiality or privilege is waived or lost by any mistransmission. If you receive this message in error, please immediately delete it and all copies of it from your system, destroy any hard copies of it and notify the sender. You must not, directly or indirectly, use, disclose, distribute, print, or copy any part of this message if you are not the intended recipient. The sender or any of its subsidiaries each reserve the right to monitor all e-mail communications through its networks. ******************************************** --Apple-Mail-1--761289525 Content-Transfer-Encoding: quoted-printable Content-Type: text/html; charset=us-ascii

I have presently only = implemented it for Organizations that are labeled as = Enterprise/Corporation entities, etc...  Thus, no countries or = sector differences.  With that said, I do plan to create one that = encompasses all different types of Organizations based on this = differential comparison -- just wanting to test it with this one before = moving forward.  I plan to put a similar feature set offering under = the threat center for clients but without the ability to see DLI = differentials between specific enterprises.  Business Sectors, = regions, etc... will be available to clients.

J. = Tubbs
CTO
Unveillance, LLC
O. (404) 482-3557
www.unveillance.com
jtubbs@unveillance.com

********************************************
CONFIDENTIAL = & PRIVILEGED COMMUNICATION This message is for the named
person's = use only. The information contained in this communication = is
confidential and/or privileged, proprietary information that = is
transmitted solely for the purpose of the intended recipient(s). = No
confidentiality or privilege is waived or lost by any = mistransmission.
If you receive this message in error, please = immediately delete it and
all copies of it from your system, destroy = any hard copies of it and
notify the sender. You must not, directly = or indirectly, use, disclose,
distribute, print, or copy any part of = this message if you are not the
intended recipient. The sender or any = of its subsidiaries each reserve
the right to monitor all e-mail = communications through its = networks.
********************************************

= --Apple-Mail-1--761289525-- From - Sat May 21 19:26:50 2011 X-Mozilla-Status: 0001 X-Mozilla-Status2: 00000000 Delivered-To: khijazi@unveillance.com Received: by 10.236.102.175 with SMTP id d35cs140101yhg; Thu, 23 Dec 2010 12:00:14 -0800 (PST) Received: by 10.151.113.9 with SMTP id q9mr12991823ybm.52.1293134414044; Thu, 23 Dec 2010 12:00:14 -0800 (PST) Return-Path: Received: from mail-yw0-f45.google.com (mail-yw0-f45.google.com [209.85.213.45]) by mx.google.com with ESMTPS id p2si36407750ybe.0.2010.12.23.12.00.13 (version=TLSv1/SSLv3 cipher=RC4-MD5); Thu, 23 Dec 2010 12:00:14 -0800 (PST) Received-SPF: neutral (google.com: 209.85.213.45 is neither permitted nor denied by best guess record for domain of jtubbs@unveillance.com) client-ip=209.85.213.45; Authentication-Results: mx.google.com; spf=neutral (google.com: 209.85.213.45 is neither permitted nor denied by best guess record for domain of jtubbs@unveillance.com) smtp.mail=jtubbs@unveillance.com Received: by ywl5 with SMTP id 5so3417121ywl.4 for ; Thu, 23 Dec 2010 12:00:13 -0800 (PST) Received: by 10.236.111.17 with SMTP id v17mr990923yhg.4.1293134413523; Thu, 23 Dec 2010 12:00:13 -0800 (PST) Return-Path: Received: from [192.168.1.75] (99-1-188-105.lightspeed.tukrga.sbcglobal.net [99.1.188.105]) by mx.google.com with ESMTPS id 8sm4548849yhx.3.2010.12.23.12.00.11 (version=TLSv1/SSLv3 cipher=RC4-MD5); Thu, 23 Dec 2010 12:00:12 -0800 (PST) Subject: Re: Please add this company Mime-Version: 1.0 (Apple Message framework v1082) Content-Type: multipart/alternative; boundary=Apple-Mail-17--852885938 From: "J. Tubbs" In-Reply-To: <001501cba2db$bae57ad0$30b07070$@com> Date: Thu, 23 Dec 2010 15:00:10 -0500 Cc: "'Karim Hijazi Unveillance Email'" Message-Id: <1DA3B031-D510-4D63-B9A6-87C0D2ADC4FB@unveillance.com> References: <1552618310-1293109315-cardhu_decombobulator_blackberry.rim.net-1743733509-@bda480.bisx.prod.on.blackberry> <3618B3FC-320E-4B74-814E-ADCFF8C99B59@unveillance.com> <001501cba2db$bae57ad0$30b07070$@com> To: X-Mailer: Apple Mail (2.1082) --Apple-Mail-17--852885938 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=windows-1252 No problem. They did not appear to have a gigantic network, so we shall = see tomorrow if anything matches. As always, my approach to these = organizations that we map I expect to see spam-related problems which = are lifted via our UBL and XBL types, but am always stunned and = surprised to see anything else. -J. On Dec 23, 2010, at 2:58 PM, John Phillips wrote: > Jerry, > =20 > You are phenomenal. Thank you. It=92s about to get crazy buddy, so = let me know when I=92m overwhelming you. You would not believe the = amount of response I=92m getting from people. > =20 > =20 > John > =20 > John Phillips > Vice President, Global Sales > Unveillance > 512.6UN.VEIL > 512.686.8345 > jphillips@unveillance.com > =20 > > Unveillance | Data Leakage Intelligence & Metrics > =20 > ******************************************** > CONFIDENTIAL & PRIVILEGED COMMUNICATION This message is for the named = person's use only. The information contained in this communication is = confidential and/or privileged, proprietary information that is = transmitted solely for the purpose of the intended recipient(s). No = confidentiality or privilege is waived or lost by any mistransmission. > If you receive this message in error, please immediately delete it and = all copies of it from your system, destroy any hard copies of it and = notify the sender. You must not, directly or indirectly, use, disclose, = distribute, print, or copy any part of this message if you are not the = intended recipient. The sender or any of its subsidiaries each reserve = the right to monitor all e-mail communications through its networks. > ******************************************** > =20 > From: J. Tubbs [mailto:jtubbs@unveillance.com]=20 > Sent: Thursday, December 23, 2010 2:53 PM > To: jphillips@unveillance.com > Cc: Karim Hijazi Unveillance Email > Subject: Re: Please add this company > =20 > I mapped them into the system as Amerinet. Found as much as I could = on them, appears that they have an AS as well. > =20 > I was not 100% sure where to place them as an organization so I put = them into business services. Added them to your client watchlist. > =20 > J. Tubbs > CTO > Unveillance, LLC > O. (404) 482-3557 > www.unveillance.com > jtubbs@unveillance.com >=20 > ******************************************** > CONFIDENTIAL & PRIVILEGED COMMUNICATION This message is for the named > person's use only. The information contained in this communication is > confidential and/or privileged, proprietary information that is > transmitted solely for the purpose of the intended recipient(s). No > confidentiality or privilege is waived or lost by any mistransmission. > If you receive this message in error, please immediately delete it and > all copies of it from your system, destroy any hard copies of it and > notify the sender. You must not, directly or indirectly, use, = disclose, > distribute, print, or copy any part of this message if you are not the > intended recipient. The sender or any of its subsidiaries each reserve > the right to monitor all e-mail communications through its networks. > ******************************************** > =20 > On Dec 23, 2010, at 8:01 AM, John Phillips wrote: >=20 >=20 > His email gives the domain. Thanks.=20 >=20 > Subject: RE: Semper Fi and a Sale Pitch >=20 > Hi John: >=20 > I tell you what, give me a holler after the New Year and I will give = you my undivided attention if you have a demo or presentation to = properly gauge this solution. >=20 > Merry Christmas, Marine! >=20 > Carl Skiles >=20 > carl.skiles@amerinet-gpo.com724-772-7243On 12/22/10 6:34 PM, John = Phillips wrote: >=20 > -------------------- >=20 > Carl, >=20 > Cheap ploy but adapt and overcome right? :) >=20 > Check this out and see if you think you'd be interested in looking at = a government grade, passive 100% zero false positive APT solution: >=20 > www.unveillance.com >=20 > Seeing the tool is much more interesting, but at least you can gauge = if it's worth your time. >=20 > Merry Christmas, >=20 > John >=20 >=20 > John Phillips > Vice President, Global Sales > Unveillance > 512.6UN.VEIL > 512.686.8345 >=20 > jphillips@unveillance.com > http://www.unveillance.com > =20 --Apple-Mail-17--852885938 Content-Transfer-Encoding: quoted-printable Content-Type: text/html; charset=windows-1252 No problem.  They did not appear to have a = gigantic network, so we shall see tomorrow if anything matches.  As = always, my approach to these organizations that we map I expect to see = spam-related problems which are lifted via our UBL and XBL types, but am = always stunned and surprised to see anything = else.

-J.

On Dec 23, 2010, at 2:58 PM, John Phillips wrote:

You = are phenomenal.  Thank you.  It=92s about to get crazy buddy, = so let me know when I=92m overwhelming you.  You would not believe = the amount of response I=92m getting from = people.
Vice President, Global Sales
Unveillance512.6UN.VEIL
512.686.8345
CONFIDENTIAL & PRIVILEGED COMMUNICATION This = message is for the named person's use only. The information contained in = this communication is confidential and/or privileged, proprietary = information that is transmitted solely for the purpose of the intended = recipient(s). No confidentiality or privilege is waived or lost by any = mistransmission.
If you receive = this message in error, please immediately delete it and all copies of it = from your system, destroy any hard copies of it and notify the sender. = You must not, directly or indirectly, use, disclose, distribute, print, = or copy any part of this message if you are not the intended recipient. = The sender or any of its subsidiaries each reserve the right to monitor = all e-mail communications through its = networks.
From: J. Tubbs = [mailto:jtubbs@unveillance.com] 
Sent: Thursday, December 23, 2010 = 2:53 PM
To:  
Karim Hijazi Unveillance = Email
Subject: Re: Please add this = company
I mapped them into the system = as Amerinet.  Found as much as I could on them, appears that they = have an AS as well.
I was not 100% sure where = to place them as an organization so I put them into business services. =  Added them to your client = watchlist.
J. = Tubbs
CTO
Unveillance, LLC
O. (404) 482-3557
jtubbs@unveillance.com


********************************************
CONFIDENTIAL = & PRIVILEGED COMMUNICATION This message is for the named
person's = use only. The information contained in this communication = is
confidential and/or privileged, proprietary information that = is
transmitted solely for the purpose of the intended recipient(s). = No
confidentiality or privilege is waived or lost by any = mistransmission.
If you receive this message in error, please = immediately delete it and
all copies of it from your system, destroy = any hard copies of it and
notify the sender. You must not, directly = or indirectly, use, disclose,
distribute, print, or copy any part of = this message if you are not the
intended recipient. The sender or any = of its subsidiaries each reserve
the right to monitor all e-mail = communications through its = networks.
********************************************
On Dec 23, 2010, at 8:01 = AM, John Phillips wrote:
His email gives the = domain. Thanks. 

Subject: RE: Semper = Fi and a Sale Pitch

Hi John:

I tell you what, give me a = holler after the New Year and I will give you my undivided attention if = you have a demo or presentation to properly gauge this = solution.

Merry Christmas, Marine!

Carl Skiles

 12/22/10 6:34 PM, John = Phillips wrote:

--------------------

Carl,

Cheap = ploy but adapt and overcome right? :)

Check this out and see if = you think you'd be interested in looking at a government grade, passive = 100% zero false positive APT solution:

www.unveillance.com

Seeing the = tool is much more interesting, but at least you can gauge if it's worth = your time.

Merry Christmas,

John


John = Phillips
Vice President, Global = Sales
Unveillance
512.6UN.VEIL
512.686.8345

jphillips@unveillance.com
 

<= /div>= --Apple-Mail-17--852885938-- From - Sat May 21 19:26:50 2011 X-Mozilla-Status: 0001 X-Mozilla-Status2: 00000000 Delivered-To: khijazi@unveillance.com Received: by 10.236.102.175 with SMTP id d35cs140497yhg; Thu, 23 Dec 2010 12:11:22 -0800 (PST) Received: by 10.90.120.17 with SMTP id s17mr120745agc.193.1293135082120; Thu, 23 Dec 2010 12:11:22 -0800 (PST) Return-Path: Received: from nm4.bullet.mail.ac4.yahoo.com (nm4.bullet.mail.ac4.yahoo.com [98.139.52.201]) by mx.google.com with SMTP id v17si7230441vcf.32.2010.12.23.12.11.21; Thu, 23 Dec 2010 12:11:21 -0800 (PST) Received-SPF: neutral (google.com: 98.139.52.201 is neither permitted nor denied by best guess record for domain of johnrw@proinfomd.com) client-ip=98.139.52.201; Authentication-Results: mx.google.com; spf=neutral (google.com: 98.139.52.201 is neither permitted nor denied by best guess record for domain of johnrw@proinfomd.com) smtp.mail=johnrw@proinfomd.com Received: from [98.139.52.189] by nm4.bullet.mail.ac4.yahoo.com with NNFMP; 23 Dec 2010 20:11:21 -0000 Received: from [98.139.52.176] by tm2.bullet.mail.ac4.yahoo.com with NNFMP; 23 Dec 2010 20:11:21 -0000 Received: from [127.0.0.1] by omp1059.mail.ac4.yahoo.com with NNFMP; 23 Dec 2010 20:11:21 -0000 X-Yahoo-Newman-Id: 571085.91212.bm@omp1059.mail.ac4.yahoo.com Received: (qmail 34416 invoked from network); 23 Dec 2010 20:11:21 -0000 Received: from JohnRWPC (johnrw@74.96.186.235 with login) by smtp114.biz.mail.re2.yahoo.com with SMTP; 23 Dec 2010 12:11:21 -0800 PST X-Yahoo-SMTP: bz0iHOiswBDfyZSdu.AwRllzRATP6g3xFAXT X-YMail-OSG: S6R.MC4VM1kgPx1D8x3H1yZQuS2meFscRjpv8geOcXSwXP9 II0eUGQTwHRdRpIBGtmQVnPi3M4n2S2HCS.BkMuypfTArkjbvX4yiP8UW9Nu O2l7c_omxyx6QDNA6iuw8tysiHsH5yUvw0c2mlOMgFDNYQsd.24giw4skTn1 p9Fru5p.83dfImO0F4Sq1_hR9qSEvXNxAcRkXFHIxI7R8jvMGej.Bkgj9H.q afo5_sYxI95qLBEuGvcPJbwJClx6E8FFljikDTfJFDwJGiyxWRtGAxvoBt9r 2bb2Yd.d418xIjW8371ElRk8HkDsCHhTGpo6O99xJtS88uQcS5t7pfC4CXro V9EahciBXHMlpPfjMVpzU8lxOpSWL X-Yahoo-Newman-Property: ymail-3 Reply-To: From: "John R Williams" To: "'Karim Hijazi'" References: <010001cba1f0$0db8a9e0$2929fda0$@com> <3224948226376662675@unknownmsgid> In-Reply-To: <3224948226376662675@unknownmsgid> Subject: RE: ProInfo NDA Date: Thu, 23 Dec 2010 15:11:21 -0500 Organization: ProInfo Message-ID: <008d01cba2dd$91328370$b3978a50$@com> MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_008E_01CBA2B3.A85C7B70" X-Mailer: Microsoft Office Outlook 12.0 Content-language: en-us Thread-index: AcuiSTN35syg2UtdRaGOo/1An8f7LAAlEzNw x-bccthis-plugin-id: 9d49c041de260114cb505476ab40cd3b This is a multi-part message in MIME format. ------=_NextPart_000_008E_01CBA2B3.A85C7B70 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Karim, I am available if you want to continue our conversation. John From: Karim Hijazi [mailto:khijazi@unveillance.com] Sent: Wednesday, December 22, 2010 9:29 PM To: Subject: Re: ProInfo NDA How's tomorrow afternoon for you for a convo? Morning is a bit jumbled. Sent from my iPhone On Dec 22, 2010, at 9:51 AM, John R Williams wrote: Karim, Just so we do not get ahead of ourselves, attached is a mutual NDA. Please review and let me know if you have any questions/comments. Good call today. Let's talk sooner rather than later. John ------=_NextPart_000_008E_01CBA2B3.A85C7B70 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

Karim,

 

I am available if you want to continue our = conversation.

 

John

 

From:= = Karim Hijazi [mailto:khijazi@unveillance.com]
Sent: = Wednesday, December 22, 2010 9:29 PM
To: = <johnrw@proinfomd.com>
Subject: Re: ProInfo = NDA

 

How's = tomorrow afternoon for you for a convo? Morning is a bit = jumbled. 

Sent from my iPhone


On Dec 22, 2010, at = 9:51 AM, John R Williams <johnrw@proinfomd.com> = wrote:

Karim,<= /o:p>

 <= /o:p>

Just so we = do not get ahead of ourselves, attached is a mutual = NDA.

 <= /o:p>

Please = review and let me know if you have any = questions/comments.

 <= /o:p>

Good call = today.  Let’s talk sooner rather than later.

 <= /o:p>

John

<Mutual NDUA ProInfo - Unveillance = Review.doc>

------=_NextPart_000_008E_01CBA2B3.A85C7B70-- From - Sat May 21 19:26:50 2011 X-Mozilla-Status: 0001 X-Mozilla-Status2: 00000000 Delivered-To: khijazi@unveillance.com Received: by 10.236.102.175 with SMTP id d35cs139989yhg; Thu, 23 Dec 2010 11:57:05 -0800 (PST) Received: by 10.150.51.8 with SMTP id y8mr12945182yby.250.1293134224784; Thu, 23 Dec 2010 11:57:04 -0800 (PST) Return-Path: Received: from mail-yw0-f45.google.com (mail-yw0-f45.google.com [209.85.213.45]) by mx.google.com with ESMTPS id g48si2290488yhd.80.2010.12.23.11.57.04 (version=TLSv1/SSLv3 cipher=RC4-MD5); Thu, 23 Dec 2010 11:57:04 -0800 (PST) Received-SPF: neutral (google.com: 209.85.213.45 is neither permitted nor denied by best guess record for domain of jphillips@unveillance.com) client-ip=209.85.213.45; Authentication-Results: mx.google.com; spf=neutral (google.com: 209.85.213.45 is neither permitted nor denied by best guess record for domain of jphillips@unveillance.com) smtp.mail=jphillips@unveillance.com Received: by ywl5 with SMTP id 5so3415944ywl.4 for ; Thu, 23 Dec 2010 11:57:04 -0800 (PST) Received: by 10.151.103.6 with SMTP id f6mr12495585ybm.420.1293134224402; Thu, 23 Dec 2010 11:57:04 -0800 (PST) Return-Path: Received: from DevComp1 (h234.187.19.98.dynamic.ip.windstream.net [98.19.187.234]) by mx.google.com with ESMTPS id r41sm6756474yba.16.2010.12.23.11.57.02 (version=TLSv1/SSLv3 cipher=RC4-MD5); Thu, 23 Dec 2010 11:57:03 -0800 (PST) Reply-To: From: "John Phillips" To: , Cc: Subject: GoToMeeting Invitation - Unveillance Discussion Date: Thu, 23 Dec 2010 14:57:03 -0500 Message-ID: <000901cba2db$924a46f0$b6ded4d0$@com> MIME-Version: 1.0 Content-Type: multipart/related; boundary="----=_NextPart_000_000A_01CBA2B1.A9743EF0" X-Mailer: Microsoft Office Outlook 12.0 thread-index: Acui25FosPBipmZkRyS8pA8UQ9Td4A== Content-Language: en-us This is a multi-part message in MIME format. ------=_NextPart_000_000A_01CBA2B1.A9743EF0 Content-Type: multipart/alternative; boundary="----=_NextPart_001_000B_01CBA2B1.A9743EF0" ------=_NextPart_001_000B_01CBA2B1.A9743EF0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Gentlemen, Thank you for allowing us an opportunity to present our unique solution to you. Jody asked me to schedule a virtual meeting to speak more candidly about our insight and how it can benefit the state of Missouri. I also notice that you asked for 30 minutes, but please accommodate the whole hour as I've seen that 30 minutes is not enough time at any of my previous initial meetings. In the interim, you can visit our website at www.unveillance.com. There are some interesting case studies on the site as well as additional collateral in the www.unveillance.com/about/downloads section. Warmest Regards, John 1. Please join my meeting, Wednesday, December 29 at 2:30 PM Eastern Standard Time. https://www2.gotomeeting.com/join/332295466 2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone. Dial +1 (312) 878-3070 Access Code: 332-295-466 Audio PIN: Shown after joining the meeting Meeting ID: 332-295-466 GoToMeetingR Online Meetings Made EasyT John Phillips Vice President, Global Sales Unveillance 512.6UN.VEIL 512.686.8345 jphillips@unveillance.com http://unveillance.com/wp-content/themes/creation/images/logo.png Unveillance | Data Leakage Intelligence & Metrics ******************************************** CONFIDENTIAL & PRIVILEGED COMMUNICATION This message is for the named person's use only. The information contained in this communication is confidential and/or privileged, proprietary information that is transmitted solely for the purpose of the intended recipient(s). No confidentiality or privilege is waived or lost by any mistransmission. If you receive this message in error, please immediately delete it and all copies of it from your system, destroy any hard copies of it and notify the sender. You must not, directly or indirectly, use, disclose, distribute, print, or copy any part of this message if you are not the intended recipient. The sender or any of its subsidiaries each reserve the right to monitor all e-mail communications through its networks. ******************************************** ------=_NextPart_001_000B_01CBA2B1.A9743EF0 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

Gentlemen,=

Thank you for = allowing us an opportunity to present our unique solution to you.  = Jody asked me to schedule a virtual meeting to speak more candidly about = our insight and how it can benefit the state of Missouri.  I also = notice that you asked for 30 minutes, but please accommodate the whole = hour as I’ve seen that 30 minutes is not enough time at any of my = previous initial meetings. 

In the interim, you can = visit our website at www.unveillance.com.  There = are some interesting case studies on the site as well as additional = collateral in the www.unveillance.com/a= bout/downloads section. 

 

=

Warmest = Regards,

John

 

=

 

=

1.  Please = join my meeting, Wednesday, December 29 at 2:30 PM Eastern Standard = Time.
https://www2.gotomee= ting.com/join/332295466

2.  Use your = microphone and speakers (VoIP) - a headset is recommended.  Or, = call in using your telephone.

Dial +1 (312) = 878-3070
Access Code: = 332-295-466
Audio PIN: Shown after = joining the meeting

Meeting ID: = 332-295-466

GoToMeeting® =
Online = Meetings Made Easy™ =

 

 

=

John= Phillips

Vice President, = Global Sales

Unveillance=

512.6UN.VEIL

512.686.8345=

jphillips@u= nveillance.com

 =

3D"http://unveillance.com/wp-content/themes/creation/images/logo.png"==

Unveillance | Data Leakage Intelligence = & Metrics

 =

*************************= *******************

CONFIDENTIAL & = PRIVILEGED COMMUNICATION This message is for the named person's use = only. The information contained in this communication is confidential = and/or privileged, proprietary information that is transmitted solely = for the purpose of the intended recipient(s). No confidentiality or = privilege is waived or lost by any = mistransmission.

If you receive this = message in error, please immediately delete it and all copies of it from = your system, destroy any hard copies of it and notify the sender. You = must not, directly or indirectly, use, disclose, distribute, print, or = copy any part of this message if you are not the intended recipient. The = sender or any of its subsidiaries each reserve the right to monitor all = e-mail communications through its networks.

*************************= *******************

 

=

 

------=_NextPart_001_000B_01CBA2B1.A9743EF0-- ------=_NextPart_000_000A_01CBA2B1.A9743EF0 Content-Type: image/png; name="image001.png" Content-Transfer-Encoding: base64 Content-ID: iVBORw0KGgoAAAANSUhEUgAAASwAAACMCAYAAADGFpQvAAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJ bWFnZVJlYWR5ccllPAAAA2RpVFh0WE1MOmNvbS5hZG9iZS54bXAAAAAAADw/eHBhY2tldCBiZWdp bj0i77u/IiBpZD0iVzVNME1wQ2VoaUh6cmVTek5UY3prYzlkIj8+IDx4OnhtcG1ldGEgeG1sbnM6 eD0iYWRvYmU6bnM6bWV0YS8iIHg6eG1wdGs9IkFkb2JlIFhNUCBDb3JlIDUuMC1jMDYwIDYxLjEz NDc3NywgMjAxMC8wMi8xMi0xNzozMjowMCAgICAgICAgIj4gPHJkZjpSREYgeG1sbnM6cmRmPSJo dHRwOi8vd3d3LnczLm9yZy8xOTk5LzAyLzIyLXJkZi1zeW50YXgtbnMjIj4gPHJkZjpEZXNjcmlw dGlvbiByZGY6YWJvdXQ9IiIgeG1sbnM6eG1wTU09Imh0dHA6Ly9ucy5hZG9iZS5jb20veGFwLzEu MC9tbS8iIHhtbG5zOnN0UmVmPSJodHRwOi8vbnMuYWRvYmUuY29tL3hhcC8xLjAvc1R5cGUvUmVz b3VyY2VSZWYjIiB4bWxuczp4bXA9Imh0dHA6Ly9ucy5hZG9iZS5jb20veGFwLzEuMC8iIHhtcE1N Ok9yaWdpbmFsRG9jdW1lbnRJRD0ieG1wLmRpZDpBNDkwQTE2OUY3OTVERjExQUYxOTg5M0M1MjdF NzczQiIgeG1wTU06RG9jdW1lbnRJRD0ieG1wLmRpZDoxMTYwN0FBQ0M4RDUxMURGOUFDQTlERTJF QTM5MjAxOSIgeG1wTU06SW5zdGFuY2VJRD0ieG1wLmlpZDoxMTYwN0FBQkM4RDUxMURGOUFDQTlE RTJFQTM5MjAxOSIgeG1wOkNyZWF0b3JUb29sPSJBZG9iZSBQaG90b3Nob3AgQ1M1IFdpbmRvd3Mi PiA8eG1wTU06RGVyaXZlZEZyb20gc3RSZWY6aW5zdGFuY2VJRD0ieG1wLmlpZDozQTExOTQ3NUQw QzhERjExOEUzQjhGMzM2OEJGMjUwOSIgc3RSZWY6ZG9jdW1lbnRJRD0ieG1wLmRpZDpBNDkwQTE2 OUY3OTVERjExQUYxOTg5M0M1MjdFNzczQiIvPiA8L3JkZjpEZXNjcmlwdGlvbj4gPC9yZGY6UkRG PiA8L3g6eG1wbWV0YT4gPD94cGFja2V0IGVuZD0iciI/PruwPTQAAAqmSURBVHja7J2NbSI5FMed aBsgHRxp4CTQbgOkBCghlAAlMCVACUwJ0EBWIN0VEO4qCCVwftnnPcd4vmf4kH4/aZRdGPwxfv77 PY/H83A6nQwAwD3wyCUAAAQLAADBAgAECwAAwQIAQLAAAMECAECwAAAQLABAsAAAECwAAAQLABAs AAAECwAAwQIABAsAAMECAECwAADBAgBAsAAAECwAQLAAABAsAAAECwAQLAAABAsAAMECAAQLAADB AgAECwAAwQIAQLAAAMECAECwAAAQLABAsAAAECwAAAQLABAsAAAECwAAwQIABAsAAMECAECwAADB AgBAsAAAECwAQLAAABAsAAAECwDunm/+f1Z//zuyfzbBOc/TP/84VEl0+dc/7/ZP3/tobtNIcs6X fEf2nHmTyth0pOyjMvnac/taV7+cUs+h/c2xZv5j+2cdfLyy6U0L6r5poS0z2ykjj9x2rfObqnz/ /j2ax8+fPw/X7BS2XAv7J7Xl2Ldc15FNc94wnTMbt2kmDdIbaHrSD14zTnNlXtm8jg3atpZdv729 HW7Rw5qJ0Gmn7xzteJPgY2m0ZU2xiv12nydWcHtoR5vJwGP/3Wvbxm2a7/YY30A9P8ti/7mzxyJH rIx+L8eHCOY1y39rIaF0+rXt/GsVgK5Fa++NHo6xzXtWIznxrHwDP0YEEW5brHreoFN78Cpj4zYv OfpXqONIhWoRRBdlGWn5Nx0IerWQ8IYYq3DkhpItiVZi8xlonr9HFPvZVgWtjHclAjcI3egG4VOr oReUd5SDTjwWT6RJyFVk4zb9eUfpR70qFaoQsfPUHtswDFZvqq9epxOorXSdsuFhm+H+txs3oIWG iNL5t13qlgqOb6zi5RXOZ6nYhUaQ2t+t6P935V3NgkHLD+PSDufVFioKIlzbjusX2ulBhSczX/td qv9MNI2j/exqtn0PdwlFEDZWGJb26MQFVVGqPJ+l5VnHjAAJuCuxGmR4Hka9ivUlbNyWY9lFmJVR PxGpYRWRFE/wmmJ1L4LlkElBmZR/7Ui0xBUOXfNxwU2AZWQeYFL3LiNcjVCQwvYb6J3Di9i4zatt G59FBtVJjZDu6txySJhELvTnpKiKyLTteR5ZVqG38/35KMlvH+al81ahmM3LznsVIMJc9TfMe9Xz PmKTz+JtjwL7k9Bw74VIndq4honTpqGoemyhna6uJFYixpXtWgX25j2slRY25rKOtFPPOsh3Eoyw ZyGB3sE8c7G7vkEArYvVOCIYEvZsdb1UOPgsW76zV2jjOm/UNNw0kXDwLrnpkFA8Bnu8RETEsdC1 W6M28zTnc1ADm8eiIIRg3uq+xCq6bi5Y2BkbvFpd6iAelD1ybVzXbo1otdu/S+hERNzwVCbezfkC t88V6/a71HxdB9UoP5te6K7Lwta9jljhqNV2eEp41z2F6+ZETKxQJIE3PepiqYOGmqlMvGfZuNyt rGHj+wzvbX+Fa954WUPoYcUSqyMCXd3NEy9mmHGxxxnub9285pHrsY6FECqocD/e1SI26MQ6kwpT GvF6Bl2UzebXqo3rXFUYAr5eY9Fn6yGhjupho1WKoTV06nUVM8uktj2GFwrBilaq75s+/wgXF6tB hk3L6u1T7DDx9Vnrrjq9LN60R5s2Po94bOt7FK3YHFbs1v66zBooFavQGNKW7pyFwiUTlk+R0a/N PGKP7mSGEHDzYtXmmqquHt3xhasVG9fV6/NIWLirMjemzx++XrMNHzOEIIm4oh9yV05Xdvsi1dPP 3yNite/SE5L1TvYQ0XjJCGfbyCPJMJiEeaa7I7ZurgnjrjuwhHT2aGzjGtrGPC2ZG9upGA0iIjXW 7z7Mr7m8pT5H2L9GA37Lmr+xAnQ057fuFypSZdKWMPAiiyj1sZ1nXebQxQK/8NGdtOMlDLe6DusS 5aq1VqdoMjfj0ZvKz/FJ5zZf55FkPmvb9ZY4uiL9Oed5wFKiJWvJIsL9+0ZSyWs/UuGquvi0u3VY 2iGHNdzRgwrVy6VXfGuZs9a1NPLkPE+RR2/uLxSMPu9Z805f4Tq9joWrkY3rGrNn9bbqiOynIyJL Ma6x+PSxaA5HQy5XwVVOJeR7Eanna941C9Zute3FJYZHb+5NrPqmxec91ZM6W6enyxEuJVr+2q3a wqfCNSzo20a/l+NJhepq/fvhdDph1QBwF7CnOwAgWAAACBYAIFgAAAgWAACCBQAIFgAAggUAgGAB AIIFAIBgAQAgWACAYAEA3ARfNvD78eNHbHMw2XZCtpbI2lJlY35ttxHbW0d2KYxtrSxpPUU+lw3W Rqbc1h8fXtlCZP+jXeRz2Y4jrVAHl4773Vivz0H/H9uSw32ftV2H25tplHONY9ctyairbJ0iW6gM vbqsgnpKfq/eNS/TLnllCK9LiLOjpwy7CctstHyv5v/N8Y6aX1KyTZd63ZPAntbm60sd+lo+f6fQ 1Py/P1RV2ylrv2XKtzZfNxkMr4HJuJZZe1uttcyp1yYhro3K2ERYPve9vz1NrG3d5omubV3/SLw2 WZv4CzaGb29v+yIPSwr4YH7tg9XXBuxlNELeBmYuHbdvz1D/HxMrt0f2wJy/5qguE83PHWmNOhj9 fqMNLhf5JUOQXtVgY28Tdt/vtMEevGtxiJyfBGUv+7KLgdZlY7K3Ay7bLnXLUJWlXrPUy+tFO0Ov ZJv2NI2dib80wni23PeuwYNe/14N26liv2XKZ1S4XJ5TPXeTc/7nC1fN1+3Jx/rZOKft3XGsaBP7 4Pcrk7/19FLLtsqxI9dfHiLHvkpIeNDE+5HKu9HQjQ6bhkbrRopJxANpkubJO+rWYanlGeZ4Tu5t 0BOtxybSCdz74NwIvNORbWHOX2gwC8peZVvclbbdu2n2ooQmZajC2Btxe5rXzjP2sm2697ytmGCP Nf1w19DYW56LbKeO/RaVL8R5RyOT/3qvlZ6z0XJI/tucyMSvV9U35wyC38+0jIeCtl0F9UqC638I 0j1F2r5QsPpBCOR3vKVXeOdZ1H2t9kbTWmon63meT1ceVpU6TNUAdjmjpxOod2/ECb22rRcSulHs ycTfQdfEu3FbOj97IVAdLuVhpV5IeNS8hhnhZJHnk3he6yKSz9Gcv0R1VtM7r2O/eeWLdfax2s2+ oL1fvPrlbaGc5WGVZR94V1uTv/Op37Z+vQaBYzSM2NpZpPJYoMLvXmJHT2GXEWN+8eZKqoYDg8iF PEQMq6oHkDVKVq2DM4i55rnxznHh5DFI68mcvwpqpY3rj1IfagSTDrybg5Z7Yuq96bfu9a06mk+1 LV69czcZc5RlPZ9ppOM6Wz4EZRtE0imbT137nWYIi28bS+3wLxU866L536YeVliHXkY0kde2i+B6 riPe1SI2N8cWyQBwN7CsAQAQLAAABAsAECwAAAQLAADBAgAECwAAwQIAQLAAAMECAECwAAAQLABA sAAAECwAAAQLABAsAAAECwAAwQIABAsAAMECAECwAADBAgBAsAAAECwAQLAAABAsAAAECwAQLAAA BAsAECwuAQAgWAAACBYAIFgAAAgWAACCBQAIFgAAggUAgGABAIIFAIBgAQAgWACAYAEAIFgAAAgW ACBYAAAIFgAAggUACBYAAIIFAIBgAQCCBQBwMf4TYABnSyaseQPydAAAAABJRU5ErkJggg== ------=_NextPart_000_000A_01CBA2B1.A9743EF0--