From - Sat May 21 19:27:28 2011 X-Mozilla-Status: 0001 X-Mozilla-Status2: 00000000 Delivered-To: khijazi@unveillance.com Received: by 10.236.109.34 with SMTP id r22cs13639yhg; Tue, 30 Nov 2010 08:11:05 -0800 (PST) Received: by 10.151.46.14 with SMTP id y14mr12693240ybj.383.1291133464992; Tue, 30 Nov 2010 08:11:04 -0800 (PST) Return-Path: Received: from mail-gw0-f45.google.com (mail-gw0-f45.google.com [74.125.83.45]) by mx.google.com with ESMTP id v32si4089913yba.36.2010.11.30.08.11.04; Tue, 30 Nov 2010 08:11:04 -0800 (PST) Received-SPF: neutral (google.com: 74.125.83.45 is neither permitted nor denied by best guess record for domain of jtubbs@unveillance.com) client-ip=74.125.83.45; Authentication-Results: mx.google.com; spf=neutral (google.com: 74.125.83.45 is neither permitted nor denied by best guess record for domain of jtubbs@unveillance.com) smtp.mail=jtubbs@unveillance.com Received: by gwj23 with SMTP id 23so842108gwj.4 for ; Tue, 30 Nov 2010 08:11:04 -0800 (PST) Received: by 10.90.88.20 with SMTP id l20mr11262395agb.57.1291133462120; Tue, 30 Nov 2010 08:11:02 -0800 (PST) Return-Path: Received: from [192.168.1.75] (99-1-188-105.lightspeed.tukrga.sbcglobal.net [99.1.188.105]) by mx.google.com with ESMTPS id f46sm1367568yhc.33.2010.11.30.08.11.00 (version=TLSv1/SSLv3 cipher=RC4-MD5); Tue, 30 Nov 2010 08:11:01 -0800 (PST) From: "J. Tubbs" Content-Type: multipart/alternative; boundary=Apple-Mail-1--706353063 Subject: Net connection Date: Tue, 30 Nov 2010 11:10:59 -0500 Message-Id: Cc: John Phillips To: Karim Hijazi Mime-Version: 1.0 (Apple Message framework v1082) X-Mailer: Apple Mail (2.1082) --Apple-Mail-1--706353063 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=us-ascii Hey guys, I am not sure of the cause -- perhaps the weather or something else, but = my network connection is very unstable today. Just an FYI. If ya need = me, hit me up on my mobile. J. Tubbs CTO Unveillance, LLC O. (404) 482-3557 www.unveillance.com jtubbs@unveillance.com ******************************************** CONFIDENTIAL & PRIVILEGED COMMUNICATION This message is for the named person's use only. The information contained in this communication is confidential and/or privileged, proprietary information that is transmitted solely for the purpose of the intended recipient(s). No confidentiality or privilege is waived or lost by any mistransmission. If you receive this message in error, please immediately delete it and all copies of it from your system, destroy any hard copies of it and notify the sender. You must not, directly or indirectly, use, disclose, distribute, print, or copy any part of this message if you are not the intended recipient. The sender or any of its subsidiaries each reserve the right to monitor all e-mail communications through its networks. ******************************************** --Apple-Mail-1--706353063 Content-Transfer-Encoding: quoted-printable Content-Type: text/html; charset=us-ascii Hey = guys,
I am not sure of the cause -- perhaps the weather or something = else, but my network connection is very unstable today.  Just an = FYI.  If ya need me, hit me up on my mobile.

J. = Tubbs
CTO
Unveillance, LLC
O. (404) 482-3557
www.unveillance.com
jtubbs@unveillance.com

********************************************
CONFIDENTIAL = & PRIVILEGED COMMUNICATION This message is for the named
person's = use only. The information contained in this communication = is
confidential and/or privileged, proprietary information that = is
transmitted solely for the purpose of the intended recipient(s). = No
confidentiality or privilege is waived or lost by any = mistransmission.
If you receive this message in error, please = immediately delete it and
all copies of it from your system, destroy = any hard copies of it and
notify the sender. You must not, directly = or indirectly, use, disclose,
distribute, print, or copy any part of = this message if you are not the
intended recipient. The sender or any = of its subsidiaries each reserve
the right to monitor all e-mail = communications through its = networks.
********************************************

= --Apple-Mail-1--706353063-- From - Sat May 21 19:27:28 2011 X-Mozilla-Status: 0001 X-Mozilla-Status2: 00000000 Delivered-To: khijazi@unveillance.com Received: by 10.236.109.34 with SMTP id r22cs19281yhg; Tue, 30 Nov 2010 09:42:01 -0800 (PST) Received: by 10.150.196.11 with SMTP id t11mr13185767ybf.194.1291138919876; Tue, 30 Nov 2010 09:41:59 -0800 (PST) Return-Path: Received: from p3plsmtpa01-06.prod.phx3.secureserver.net (p3plsmtpa01-06.prod.phx3.secureserver.net [72.167.82.86]) by mx.google.com with SMTP id b20si16666235ana.185.2010.11.30.09.41.59; Tue, 30 Nov 2010 09:41:59 -0800 (PST) Received-SPF: neutral (google.com: 72.167.82.86 is neither permitted nor denied by best guess record for domain of jeff@grayconsultingco.com) client-ip=72.167.82.86; Authentication-Results: mx.google.com; spf=neutral (google.com: 72.167.82.86 is neither permitted nor denied by best guess record for domain of jeff@grayconsultingco.com) smtp.mail=jeff@grayconsultingco.com Received: (qmail 12168 invoked from network); 30 Nov 2010 17:41:58 -0000 Received: from unknown (69.180.31.122) by p3plsmtpa01-06.prod.phx3.secureserver.net (72.167.82.86) with ESMTP; 30 Nov 2010 17:41:58 -0000 From: "Jeff Gray" To: "'Karim Hijazi'" References: <018d01cb86b0$87d85960$97890c20$@com> <-7107581250240661189@unknownmsgid> In-Reply-To: <-7107581250240661189@unknownmsgid> Subject: RE: Follow up Date: Tue, 30 Nov 2010 12:41:54 -0500 Message-ID: <014101cb90b5$e1ea7370$a5bf5a50$@com> MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0142_01CB908B.F9146B70" X-Mailer: Microsoft Office Outlook 12.0 Thread-Index: AcuGvvAUJql8GEMbTUapXH1lKbOrTwJ9tatA Content-Language: en-us This is a multi-part message in MIME format. ------=_NextPart_000_0142_01CB908B.F9146B70 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Digging out of a hole, but should be clear by the time I close up for the night. Want to get together tomorrow afternoon sometime? Or, grab dinner? From: Karim Hijazi [mailto:khijazi@unveillance.com] Sent: Wednesday, November 17, 2010 8:22 PM To: Jeff Gray Subject: Re: Follow up Yep, back in town my friend. Let's chat first thing tomorrow. KH Sent from my iPhone On Nov 17, 2010, at 6:38 PM, Jeff Gray wrote: Back in town? If so, let's get together soon. I could meet for a drink/dinner tomorrow, fri, mon of next week. Jeff Gray Gray Consulting Co. 400 17th Street NW Suite 2225 Atlanta, GA 30363 (404) 550-2224 ------=_NextPart_000_0142_01CB908B.F9146B70 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

Digging out of a hole, but should be clear by the time I close up for = the night.    Want to get together tomorrow afternoon = sometime? Or, grab dinner?

 

From:= = Karim Hijazi [mailto:khijazi@unveillance.com]
Sent: = Wednesday, November 17, 2010 8:22 PM
To: Jeff = Gray
Subject: Re: Follow = up

 

Yep, = back in town my friend. Let's chat first thing = tomorrow. 

 

KH

Sent from my = iPhone


On Nov 17, 2010, at 6:38 PM, Jeff = Gray <jeff@grayconsultingco.com&g= t; wrote:

Back in = town?  If so, let’s get together soon.   I could = meet for a drink/dinner tomorrow, fri, mon of next = week.

 <= /o:p>

Jeff = Gray

Gray = Consulting Co.

400 17th = Street NW

Suite = 2225

Atlanta, GA = 30363

(404) = 550-2224

 <= /o:p>

------=_NextPart_000_0142_01CB908B.F9146B70-- From - Sat May 21 19:27:28 2011 X-Mozilla-Status: 0001 X-Mozilla-Status2: 00000000 Delivered-To: khijazi@unveillance.com Received: by 10.236.109.34 with SMTP id r22cs10955yhg; Tue, 30 Nov 2010 07:20:02 -0800 (PST) Received: by 10.150.146.3 with SMTP id t3mr334484ybd.282.1291130402041; Tue, 30 Nov 2010 07:20:02 -0800 (PST) Return-Path: Received: from mail-yx0-f173.google.com (mail-yx0-f173.google.com [209.85.213.173]) by mx.google.com with ESMTP id l5si16855534ybj.13.2010.11.30.07.20.01; Tue, 30 Nov 2010 07:20:02 -0800 (PST) Received-SPF: neutral (google.com: 209.85.213.173 is neither permitted nor denied by best guess record for domain of jtubbs@unveillance.com) client-ip=209.85.213.173; Authentication-Results: mx.google.com; spf=neutral (google.com: 209.85.213.173 is neither permitted nor denied by best guess record for domain of jtubbs@unveillance.com) smtp.mail=jtubbs@unveillance.com Received: by yxl31 with SMTP id 31so2978733yxl.4 for ; Tue, 30 Nov 2010 07:20:01 -0800 (PST) Received: by 10.100.206.20 with SMTP id d20mr5344267ang.110.1291130401286; Tue, 30 Nov 2010 07:20:01 -0800 (PST) Return-Path: Received: from [192.168.1.75] (99-1-188-105.lightspeed.tukrga.sbcglobal.net [99.1.188.105]) by mx.google.com with ESMTPS id c39sm7107093anc.21.2010.11.30.07.19.58 (version=TLSv1/SSLv3 cipher=RC4-MD5); Tue, 30 Nov 2010 07:19:59 -0800 (PST) Subject: Re: Internet security predictions for 2011: Mime-Version: 1.0 (Apple Message framework v1082) Content-Type: multipart/alternative; boundary=Apple-Mail-9--709415130 From: "J. Tubbs" X-Priority: Normal In-Reply-To: <1365880044-1291129767-cardhu_decombobulator_blackberry.rim.net-1948864629-@bda480.bisx.prod.on.blackberry> Date: Tue, 30 Nov 2010 10:19:57 -0500 Cc: "Karim Hijazi Unveillance Email" Message-Id: <5EFA61EE-F176-4186-8DF1-21DCAA56E630@unveillance.com> References: <1365880044-1291129767-cardhu_decombobulator_blackberry.rim.net-1948864629-@bda480.bisx.prod.on.blackberry> To: jphillips@unveillance.com X-Mailer: Apple Mail (2.1082) --Apple-Mail-9--709415130 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=us-ascii Agreed in most part. Symantec is sensitive to Stuxnet since they were = the lead on investigating it. There are many efforts like Stuxnet out = there, plus Stuxnet is over two years old. Wonder what has been going = on in the last two years... you prolly don't wanna really know. Furthermore, you have to shed a virtual tear for Symantec (not really) = with Intel grabbing up McAfee. This will certainly give Intel a huge = opportunity to jump way ahead in the firmware virus protection movement = on mobile devices of all types -- as I do agree that the mobile market = is prime for malware manifestation as it has on the common computer = (this will certainly happen at much more virulent pace compared to what = we have seen to date per the timeline of malware evolution on the = desktop). Regardless, this is *still* a brute-force model in that the = protection from malware will be as good as the signatures or better = said, from our perspective, the intelligence driving the implanted = technology. J. Tubbs CTO Unveillance, LLC O. (404) 482-3557 www.unveillance.com jtubbs@unveillance.com ******************************************** CONFIDENTIAL & PRIVILEGED COMMUNICATION This message is for the named person's use only. The information contained in this communication is confidential and/or privileged, proprietary information that is transmitted solely for the purpose of the intended recipient(s). No confidentiality or privilege is waived or lost by any mistransmission. If you receive this message in error, please immediately delete it and all copies of it from your system, destroy any hard copies of it and notify the sender. You must not, directly or indirectly, use, disclose, distribute, print, or copy any part of this message if you are not the intended recipient. The sender or any of its subsidiaries each reserve the right to monitor all e-mail communications through its networks. ******************************************** On Nov 30, 2010, at 10:09 AM, John Phillips wrote: > Nice read. > John Phillips > Vice President, Global Sales > Unveillance > 512.6UN.VEIL > 512.686.8345 >=20 > jphillips@unveillance.com > http://www.unveillance.com >=20 > From: "Chase Dalton" > Date: Tue, 30 Nov 2010 09:44:14 -0500 > To: 'John Phillips' > Subject: FW: Internet security predictions for 2011: >=20 > Interesting. > =20 > Internet security predictions for 2011: The shape of things to come >=20 > 23 November, 2010 > By Kevin Haley >=20 > My prediction is that we are all going to become nostalgic for the = days of fame-seeking mass mailers and network worms. Think of = LoveLetter, SQL Slammer, and Melissa all crashing millions of systems = within hours of being released into the wild. Those threats seem quite = quaint these days as we enter the third significant shift in the threat = landscape. > We moved from fame to fortune (which we have dubbed "crimeware") in = the last ten years. Mass mailers were replaced by malware that steals = credit card information and sells phony antivirus products. Malware has = become a successful criminal business model with billions of dollars in = play. The goal became stealth and financial gain at the expense of = unsuspecting computer users. And Trojans and toolkits, like Zeus, are = the modern tools of the trade. > =20 > We have now entered a third stage--one of cyber-espionage and = cyber-sabotage. Cyber-espionage did not begin with Stuxnet, and = crimeware does not end with it. In fact, business is just too good for = the cybercriminals. With the tremendous growth of new mobile platforms, = bad guys will have even more new avenues to attack and unchartered = social engineering tricks to engage in to continue to steal from us. > =20 > But, Stuxnet is a marker. It a clear indication that the world is = changing and the 2011 threat landscape will be different than the years = previous. > With all this in mind, Symantec has put together our top Internet = security predictions for 2011. =46rom attacks on critical = infrastructure, to the security challenges of managing an = always-connected mobile workforce, to the race to control the digital = arms race, we cover the key trends to keep an eye on throughout the = coming year. > We would like to get your opinions on our trend predictions and also = on what you think will make headlines in 2011. We've put together a = short survey that should only take a couple of minutes to complete. Let = us know what you think by taking the survey here: http://bit.ly/9SxUiF. > =20 > Critical Infrastructure Will Come Increasingly Under Attack and = Service Providers Will Respond, but Governments Will Be Slow to React > Attackers have likely been watching the impact the Stuxnet threat had = on industries using industrial control systems and are learning from it. = We expect them to take the lessons learned from Stuxnet--the most = significant example to date of a computer virus designed expressly to = modify the behavior of hardware systems to create a physical, real-world = impact--and launch additional attacks targeting critical infrastructure = over the course of 2011. Though slower to start, expect the frequency of = these types of attacks to increase as well. > As evidence of this trend, Symantec recently conducted a study asking = critical infrastructure providers about their opinion of cyberattacks = against their industries. Forty-eight percent of respondents said they = expect to come under attack in the next year and 80 percent believe the = frequency of such attacks is increasing. > The overarching messages taken from the study's findings are that = there is a high level of awareness among critical infrastructure = providers of the threat that exists and that critical infrastructure = protection (CIP) is top of mind. Thus, expect to see these providers = move forward with cybersecurity precautions. These precautions will = focus not only on simply combating an attack, but on resiliency to = survive an attack. This will include backup and recovery, encryption, = storage, and information management initiatives. > The Symantec study also found that the majority of critical = infrastructure providers are supportive of and more than willing to = cooperate with their government in CIP initiatives. However, do not = expect to see a lot of movement in this regard from governments this = year. For example, it's unlikely that the U.S. government will pass CIP = legislation in 2011. Evidence of this is the widespread changeover that = recently happened in the U.S. Congress and the current presidential = administration's lack of indication that it will be making CIP a = priority. CIP legislation and government initiatives in other countries = face similar challenges. > =20 > Zero-Day Vulnerabilities Will Become More Common as Highly Targeted = Threats Increase in Frequency and Impact > In 2010, Hydraq, a.k.a. Aurora, provided a high-profile example of a = growing class of highly targeted threats seeking to infiltrate either = specific organizations or a particular type of computer system by = leveraging previously unknown software vulnerabilities. Attackers have = been using such security holes for many years, but as these highly = targeted threats gain momentum in 2011, plan to witness more zero-day = vulnerabilities coming to light in the next 12 months than in any = previous year. > Symantec has already seen this trend begin to develop. In all of 2009, = Symantec observed 12 zero-day vulnerabilities. As of early November = 2010, Symantec has already tracked 18 previously unknown security = vulnerabilities this year that were or are actively being used in = cyberattacks. Nearly half of these--possibly more--have been used by = targeted threats such as Stuxnet (which exploited a record four zero-day = vulnerabilities), Hydraq, Sykipot, and Pirpi (which was identified just = this month.) > The key driver behind the growing use of zero-day vulnerabilities in = targeted threats is the low-distribution nature of such malware. As = opposed to traditional widespread threats that achieve success by = attempting to infect as many computers as possible, targeted threats = focus on just a handful of organizations or individuals (perhaps even = only one) with the goal of stealing highly valuable data or otherwise = infiltrating the targeted system. In such scenarios, the challenge for = attackers is ensuring that they hit their target on the first try = without getting caught. Using one or more zero-day vulnerabilities is an = effective means to improve their odds that the targeted device(s) or = computer(s) will be largely defenseless against their attack. > =20 > There is no traditional security technology that excels at detecting = this type of threat. Traditional protections require security vendors to = capture and analyze specific strains of malware before they can protect = against them. The stealthy, low-distribution nature of targeted threats = severely decreases the likelihood that security vendors will be able to = create traditional detections to protect against them all. However, = technologies such as Symantec's SONAR, which detects threats based on = their behavior, and reputation-based security, which relies on the = context of a threat rather than the content, turn the telling behavioral = characteristics and low-distribution nature of these threats against = them and make detection possible. > =20 > The Exponential Adoption of Smart Mobile Devices that Blur the Line = Between Business and Personal Use Will Drive New IT Security Models > The use of mobile devices such as smartphones and tablets that meet = both business and personal connectivity needs is growing at an = unprecedented pace. Analyst firm IDC estimates that by year's end, new = mobile device shipments will have increased by 55 percent and Gartner = projects that in the same timeframe, 1.2 billion people will be using = mobile phones capable of rich Web connectivity. Since this proliferation = shows no sign of slowing in the coming year, enterprises will gravitate = to new security models to safeguard the sensitive data that will be on = and accessible through these devices. =20 > =20 > Increasingly, the same mobile devices are being used for personal as = well as business use. This creates complex security and management = challenges for three key groups: IT organizations, consumers, and = communication service providers. > =20 > IT organizations: Consumers are driving the innovation of mobile = devices and bringing them into the enterprise--evidence of the ongoing = consumerization of IT. This is especially true as organizations cut = costs and require employees to use their personal devices for business. = However, many enterprises lack an all-embracing solution that can keep = enterprise data and application access safe on the many mobile operating = systems in use, all the while allowing the use of personal devices. > =20 > =20 > Consumers: The "IT-ization" of consumers means that consumers today = have more technology in the home that they are using every day, but no = dedicated IT staff to manage all these devices. This means that more = often than not they lack the tools to adequately protect their personal = information from threats or their device from theft or loss. In fact, = the physical security of consumer mobile devices will be a real pain = point this coming year. This will spur the need and adoption of locate, = lock, and remote-wipe services. > =20 > Communication service providers: Carriers are seeing continued = decreases in subscriber satisfaction, which results in increased = customer turnover and costs associated with out of control mobile = bandwidth increases, network misuse, malware proliferation, and spam. = Carriers need a single solution to manage customer preferences and = security across all types of services, including voice, email, SMS, MMS, = Web, IM, and P2P. > Traditionally, cyber criminals have paid only a passing interest in = mobile devices, electing instead to focus their efforts where the = greatest return on their investment could be had: the PC. Aside from a = lack of feature-rich devices, a major barrier to creating successful = mobile threats has always been the lack of a clear market leader, = resulting in an attacker having to create multiple attacks, one for each = platform, in order to develop a high success rate. However, IDC = estimates that by year's end, Android and Apple iOS devices are expected = to own 31 percent of global market share. > As devices grow more sophisticated and while just a handful of mobile = platforms corner the market, it is inevitable that attackers will key in = on mobile devices in 2011 and that mobile devices will become a leading = source of confidential data loss. Research by mobile specialist Mocana = indicates that attacks against smart mobile devices already require or = will require by year's end the regular attention of IT staff for 65 = percent of enterprise organizations surveyed. > IDC also estimates that 1 billion workers will be mobile at least part = of the time or remote from their firm's main location by the end of = 2011. As this happens, enterprises will have to address the associated = challenges by adopting new models, such as security in the cloud, for = suitable solutions that will work seamlessly across multiple platforms = and devices. Expect IT managers to be forced by business necessity to = implement more granular and refined Web security policies as well. > =20 > Regulatory Compliance Will Drive Adoption of Encryption Technologies = More than Data Breach Mitigation > The explosion of mobile devices in the enterprise not only means = organizations will face new challenges in keeping these devices and the = sensitive data on them accessible and safe; they also must comply with = various industry data protection and privacy regulations. > Enterprises are under ever-increasing pressure to meet a veritable = alphabet soup of regulatory compliance standards. In the United States, = this past year saw the enactment of the healthcare industry regulation = (HITECH) and legislation in several states--all aimed at protecting = data. Internationally, PCI DSS was updated to 2.0. > Despite regulations, many organizations do not currently disclose when = mobile devices containing sensitive data are lost, as they do with = laptops. In fact, employees do not always report these lost devices to = their organizations. This year, we expect that regulators will start = cracking down on this issue and this will drive organizations to = increasingly implement encryption technologies, particularly for mobile = devices. > The Ponemon Institute's 2010 Annual Study: U.S. Enterprise Encryption = Trends study revealed that for the first time, regulatory compliance has = surpassed data breach mitigation as the top reason why organizations = deploy encryption technologies. Organizations are getting ahead of the = curve with their encryption strategy before the breach occurs, not = after. > In 2011, we will see organizations take a more proactive approach to = data protection with the adoption of encryption technology in order to = meet compliance standards and avoid the heavy fines and damage to their = brands a data breach can cause. > =20 > A New Frontier in Politically Motivated Attacks Will Emerge > In the Symantec CIP study, more than half of all firms said they = suspected or were pretty sure they had experienced an attack waged with = a specific political goal in mind. In the past, these politically = motivated attacks primarily fell in the realm of cyber espionage or = denial-of-service types of attacks against Web services. As a recent = example, distributed denial-of-service attacks were levied against blogs = and forums criticizing the Vietnamese Communist Party. However, with = Pandora's Box now opened due to Stuxnet, expect to see these threats = move beyond spy games and annoyances as malware is weaponized to cause = real-world damage. > A highly complex threat, Stuxnet's purpose is to reprogram industrial = control systems--computer programs used to manage industrial = environments such as power plants, oil refineries, and gas pipelines. It = is the first known malware to specifically target such systems. = Stuxnet's ultimate objective is to manipulate physical equipment = attached to specific industrial control systems, causing the equipment = to act in a manner dictated by the attacker and contrary to its intended = purpose. Such an outcome could have several underlying goals, but = sabotage--which could result in real physical harm--is the most likely. > Though the exact target of Stuxnet is still unknown to this day, = circumstantial evidence suggests Iran, or some organization or facility = within Iran, was most likely the target of whichever well-funded group = or nation state created the malware. Given these facts, it is not a = stretch to assume the threat was politically motivated, potentially = making Stuxnet the first politically charged cyberattack attempting to = accomplish real-world destruction. > In reality, Symantec thinks Stuxnet is possibly only the first highly = visible indication of attempts at what some might call cyber warfare = that have been happening for some time now. In 2011, more indications of = the ongoing pursuit to control the digital arms race will come to light. > In the coming year we will see many new cyber security developments; = however, perhaps most important is that we expect the security industry = to continue to rise to meet the challenge of a constantly evolving = threat landscape. You can be sure that new security technologies will = continue to emerge and billions of computer users will be protected from = threats that would otherwise compromise their computers and networks, = steal their sensitive information, and take them for all they're worth. = Indeed, know that the overall forecast is not one of doom and gloom; = though the battle against cybercrime will go on, security companies such = as Symantec will remain in the trenches, ready to give fight to = cybercriminals on every front. > =20 > Kevin Haley, is a Group Product Manager at Symantec > =20 --Apple-Mail-9--709415130 Content-Transfer-Encoding: quoted-printable Content-Type: text/html; charset=us-ascii Agreed in most part.  Symantec is sensitive to = Stuxnet since they were the lead on investigating it.  There are = many efforts like Stuxnet out there, plus Stuxnet is over two years old. =  Wonder what has been going on in the last two years... you prolly = don't wanna really know.

Furthermore, you have to = shed a virtual tear for Symantec (not really) with Intel grabbing up = McAfee.  This will certainly give Intel a huge opportunity to jump = way ahead in the firmware virus protection movement on mobile devices of = all types -- as I do agree that the mobile market is prime for malware = manifestation as it has on the common computer (this will certainly = happen at much more virulent pace compared to what we have seen to date = per the timeline of malware evolution on the desktop).  Regardless, = this is *still* a brute-force model in that the protection from malware = will be as good as the signatures or better said, from our perspective, = the intelligence driving the implanted technology.

J. = Tubbs
CTO
Unveillance, LLC
O. (404) 482-3557
www.unveillance.com
jtubbs@unveillance.com

********************************************
CONFIDENTIAL = & PRIVILEGED COMMUNICATION This message is for the named
person's = use only. The information contained in this communication = is
confidential and/or privileged, proprietary information that = is
transmitted solely for the purpose of the intended recipient(s). = No
confidentiality or privilege is waived or lost by any = mistransmission.
If you receive this message in error, please = immediately delete it and
all copies of it from your system, destroy = any hard copies of it and
notify the sender. You must not, directly = or indirectly, use, disclose,
distribute, print, or copy any part of = this message if you are not the
intended recipient. The sender or any = of its subsidiaries each reserve
the right to monitor all e-mail = communications through its = networks.
********************************************

On Nov 30, 2010, at 10:09 AM, John Phillips = wrote:

Nice read.

John = Phillips
Vice President, Global = Sales
Unveillance
512.6UN.VEIL
512.686.8345

jphillips@unveillance.com
 "Chase Dalton" < Tue, 30 Nov 2010 = 09:44:14 -0500



= = --Apple-Mail-9--709415130-- From - Sat May 21 19:27:28 2011 X-Mozilla-Status: 0001 X-Mozilla-Status2: 00000000 Delivered-To: khijazi@unveillance.com Received: by 10.236.109.34 with SMTP id r22cs171299yhg; Mon, 29 Nov 2010 20:48:07 -0800 (PST) Received: by 10.151.79.13 with SMTP id g13mr2628878ybl.332.1291092486955; Mon, 29 Nov 2010 20:48:06 -0800 (PST) Return-Path: Received: from mail-yx0-f173.google.com (mail-yx0-f173.google.com [209.85.213.173]) by mx.google.com with ESMTP id t5si15518166ybe.34.2010.11.29.20.48.06; Mon, 29 Nov 2010 20:48:06 -0800 (PST) Received-SPF: neutral (google.com: 209.85.213.173 is neither permitted nor denied by best guess record for domain of jtubbs@unveillance.com) client-ip=209.85.213.173; Authentication-Results: mx.google.com; spf=neutral (google.com: 209.85.213.173 is neither permitted nor denied by best guess record for domain of jtubbs@unveillance.com) smtp.mail=jtubbs@unveillance.com Received: by yxl31 with SMTP id 31so2706001yxl.4 for ; Mon, 29 Nov 2010 20:48:06 -0800 (PST) Received: by 10.150.215.10 with SMTP id n10mr11691227ybg.124.1291092486528; Mon, 29 Nov 2010 20:48:06 -0800 (PST) Return-Path: Received: from [192.168.1.75] (99-1-188-105.lightspeed.tukrga.sbcglobal.net [99.1.188.105]) by mx.google.com with ESMTPS id w19sm3777441ybe.4.2010.11.29.20.48.04 (version=TLSv1/SSLv3 cipher=RC4-MD5); Mon, 29 Nov 2010 20:48:05 -0800 (PST) Subject: Re: Security Solution Demo Mime-Version: 1.0 (Apple Message framework v1082) Content-Type: multipart/alternative; boundary=Apple-Mail-6--747329206 From: "J. Tubbs" X-Priority: Normal In-Reply-To: <927043452-1291087029-cardhu_decombobulator_blackberry.rim.net-1158659935-@bda480.bisx.prod.on.blackberry> Date: Mon, 29 Nov 2010 23:48:03 -0500 Cc: "Karim Hijazi Unveillance Email" Message-Id: <904E6382-3FDC-47E1-825D-E032746552FD@unveillance.com> References: <927043452-1291087029-cardhu_decombobulator_blackberry.rim.net-1158659935-@bda480.bisx.prod.on.blackberry> To: jwphillips80@earthlink.net X-Mailer: Apple Mail (2.1082) --Apple-Mail-6--747329206 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=us-ascii I mapped their corporate network under the Earthlink organization. J. Tubbs CTO Unveillance, LLC O. (404) 482-3557 www.unveillance.com jtubbs@unveillance.com ******************************************** CONFIDENTIAL & PRIVILEGED COMMUNICATION This message is for the named person's use only. The information contained in this communication is confidential and/or privileged, proprietary information that is transmitted solely for the purpose of the intended recipient(s). No confidentiality or privilege is waived or lost by any mistransmission. If you receive this message in error, please immediately delete it and all copies of it from your system, destroy any hard copies of it and notify the sender. You must not, directly or indirectly, use, disclose, distribute, print, or copy any part of this message if you are not the intended recipient. The sender or any of its subsidiaries each reserve the right to monitor all e-mail communications through its networks. ******************************************** On Nov 29, 2010, at 10:17 PM, jwphillips80@earthlink.net wrote: > Earthlink Corp CIDR blocks.=20 >=20 > Thanks > Sent via BlackBerry by AT&T >=20 > From: "Phillips, John" > Date: Mon, 29 Nov 2010 22:12:31 -0500 > To: John Phillips > Subject: Fwd: Security Solution Demo >=20 >=20 >=20 > John Phillips > Large Enterprise Account Manager > =20 > 770-777-7921 Direct=20 > 404-702-6364 Mobile > jphillips@consonus.com >=20 > Please excuse any typographical errors as this message was sent via my = iPhone.=20 >=20 >=20 > Begin forwarded message: >=20 >> From: Peter Chronis >> Date: November 29, 2010 3:01:17 PM EST >> To: "Phillips, John" >> Subject: RE: Security Solution Demo >>=20 >> John, >> =20 >> Can you please add these corp facing IPs? >> =20 >> Atlanta >> 207.69.172.0/24 >> 207.69.174.0/24 >> Pasadena >> 209.179.140.0/24 >> =20 >> Thanks. >>=20 >> Pete >> =20 >> -----Original Appointment----- >> From: Phillips, John [mailto:John.Phillips@consonus.com]=20 >> Sent: Tuesday, November 23, 2010 7:33 AM >> To: Phillips, John; Peter Chronis >> Subject: Security Solution Demo >> When: Monday, November 29, 2010 2:30 PM-3:00 PM (UTC-05:00) Eastern = Time (US & Canada). >> Where: Earthlink >> =20 >> =20 >> When: Monday, November 29, 2010 2:30 PM-3:30 PM (GMT-05:00) Eastern = Time (US & Canada). >> Where: Earthlink >> *~*~*~*~*~*~*~*~*~* >> Pete, >> Please let me know if this still works for you. >> Thank you, >> John >> =20 --Apple-Mail-6--747329206 Content-Transfer-Encoding: quoted-printable Content-Type: text/html; charset=us-ascii I = mapped their corporate network under the Earthlink = organization.

jtubbs@unveillance.com

********************************************
CONFIDENTIAL = & PRIVILEGED COMMUNICATION This message is for the named
person's = use only. The information contained in this communication = is
confidential and/or privileged, proprietary information that = is
transmitted solely for the purpose of the intended recipient(s). = No
confidentiality or privilege is waived or lost by any = mistransmission.
If you receive this message in error, please = immediately delete it and
all copies of it from your system, destroy = any hard copies of it and
notify the sender. You must not, directly = or indirectly, use, disclose,
distribute, print, or copy any part of = this message if you are not the
intended recipient. The sender or any = of its subsidiaries each reserve
the right to monitor all e-mail = communications through its = networks.
********************************************

On Nov 29, 2010, at 10:17 PM, jwphillips80@earthlink.net = wrote:

Earthlink Corp CIDR blocks. =

Thanks

Sent via BlackBerry by AT&T


From: = "Phillips, John" <John.Phillips@consonus.com&= gt;
Date: Mon, 29 Nov 2010 22:12:31 -0500
To: = John Phillips<jwphillips80@earthlink.net&= gt;
Subject: Fwd: Security Solution = Demo



John Phillips
Large = Enterprise Account Manager
  
770-777-7921 = Direct 
404-702-6364 Mobile

Please excuse any typographical errors as this message = was sent via my iPhone. 


Begin = forwarded message:

John,
 
Can you please add these corp facing IPs?
 
Atlanta
207.69.172.0/24
207.69.174.0/24
Pasadena
209.179.140.0/24
 
Thanks.

Pete
 
-----Original = Appointment-----
From: Phillips, John [mailto:John.Phillips@consonus.c= om]
Sent: Tuesday, November 23, 2010 7:33 AM
To: Phillips, John; Peter Chronis
Subject: Security Solution Demo
When: Monday, November 29, 2010 2:30 PM-3:00 PM (UTC-05:00) = Eastern Time (US & Canada).
Where: Earthlink
 
 
When: Monday, November 29, 2010 2:30 PM-3:30 PM (GMT-05:00) = Eastern Time (US & Canada).
Where: Earthlink
*~*~*~*~*~*~*~*~*~*
Pete,
Please let me know if this still = works for you.
Thank you,
John
 

= --Apple-Mail-6--747329206-- From - Sat May 21 19:27:28 2011 X-Mozilla-Status: 0001 X-Mozilla-Status2: 00000000 Delivered-To: khijazi@unveillance.com Received: by 10.236.109.34 with SMTP id r22cs177690yhg; Mon, 29 Nov 2010 23:24:02 -0800 (PST) Received: by 10.100.27.29 with SMTP id a29mr1483030ana.124.1291101842024; Mon, 29 Nov 2010 23:24:02 -0800 (PST) Return-Path: Received: from mta726.fedex.customprintcenter.com (mta726.fedex.customprintcenter.com [38.107.100.250]) by mx.google.com with SMTP id u6si15374080anj.56.2010.11.29.23.24.00; Mon, 29 Nov 2010 23:24:00 -0800 (PST) Received-SPF: pass (google.com: domain of em-bxk4psyb7gucrbau8y0dfqck1m640p@m.fedex.customprintcenter.com designates 38.107.100.250 as permitted sender) client-ip=38.107.100.250; DomainKey-Status: good (test mode) Authentication-Results: mx.google.com; spf=pass (google.com: domain of em-bxk4psyb7gucrbau8y0dfqck1m640p@m.fedex.customprintcenter.com designates 38.107.100.250 as permitted sender) smtp.mail=em-bxk4psyb7gucrbau8y0dfqck1m640p@m.fedex.customprintcenter.com; domainkeys=pass (test mode) header.From=fedexoffice@fedex.customprintcenter.com DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=200505; d=fedex.customprintcenter.com; b=XHOa83dMJv0ThCSWJVEC1ZFMFFTPRlNjbXFwJPHLJRc/FXb9abaerzmbC724o52xWTFQkiSoW8W7XRd+w82tTVXpH1mtuRlR2MajPPXqhMkg7/OizFFiwQyPoui2qT2M+sTJy2TLbv1TJo0sJJL8RBE9IdUK+k/Ko4wK5jBvje8=; h=Content-Type:Date:From:Message-Id:Mime-Version:Received:Reply-To:Subject:To; Content-Type: multipart/alternative; boundary="======tflMJjF1wVS2rJUDoNAH0g======" Date: Tue, 30 Nov 2010 07:24:21 -0000 From: =?utf-8?q?FedEx=5FOffice?= Message-Id: Mime-Version: 1.0 Received: (qmail 25901 invoked by uid 108); Tue, 30 Nov 2010 07:24:21 -0000 Reply-To: =?utf-8?q?FedEx_Office?= Subject: =?utf-8?q?Your_order_has_been_shipped?= To: khijazi@unveillance.com --======tflMJjF1wVS2rJUDoNAH0g====== Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset=utf-8 Shipment Confirmation Dear Karim, This message is to confirm that your FedEx Office order has shipped. Here are your order details: Order Number: PFF27-HA316-6L9 Order Date: 11/24/2010 Shipping address: Karim Hijazi 3475 Oak Valley Rd NE Atlanta, GA 30326 US Items Premium Business Cards Quantity: 250 Ship Status: Shipped Items may be shipped separately. For more detailed shipment information, click here (http://businessprinting.van.fedex.com/vp/gateway.aspx?S=6722393676&PREURL=%2fvp%2fns%2fmy_account%2forder_history.aspx) Save Big on Personalized Holiday Cards! Regularly starting at $19.99 for 20 Now Only $14.99 http://businessprinting.van.fedex.com/vp/gateway.aspx?s=8147526828&preurl=/holiday-christmas-cards.aspx? Save Big on Personalized Calendars! Regularly starting at $14.99 for 1 Now Only $11.24 http://businessprinting.van.fedex.com/vp/gateway.aspx?s=8147526828&preurl=/personalized-calendars.aspx? Save Big on Letterhead! Regularly $134.99 for 250 Now Only $101.24 http://businessprinting.van.fedex.com/vp/gateway.aspx?S=7934678765&preurl=/letterhead.aspx Offer expires 12/30/2010. This e-mail has been sent to: khijazi@unveillance.com All future FedEx e-mail communications will be sent to this address. You can unsubscribe or update (http://businessprinting.van.fedex.com/vp/gateway.aspx?S=6722393676&PREURL=%2fvp%2fns%2fmy_account%2faccount_update.aspx) your e-mail address preferences at any time. FedEx, Attn: E-mail Address Update, 3640 Hacks Cross Road, Memphis, TN 38125-7302 © 2010 FedEx. The content of this message is protected by copyright and trademark laws under U.S. and international law. Review our privacy policy. (http://www.fedex.com/us/privacypolicy.html?link=5) All rights reserved. --======tflMJjF1wVS2rJUDoNAH0g====== Content-Transfer-Encoding: quoted-printable Content-Type: text/html; charset=utf-8 =0D =0D =0D =0D =0D =0D FedEx=0D =0D =0D =0D =0D =0D =0D =0D =0D =0D =0D =0D =0D =0D =0D
=0D 3D"FedEx"=0D
=0D =0D
=0D Shipment Confirmation=0D
=0D =0D
=0D =0D
=0D =0D
Interesting.
Internet = security predictions for 2011: The shape of things to = come
<= /i>
23 November, 2010
By Kevin = Haley

My = prediction is that we are all going to become nostalgic for the days of = fame-seeking mass mailers and network worms. Think of LoveLetter, SQL = Slammer, and Melissa all crashing millions of systems within hours of = being released into the wild. Those threats seem quite quaint these days = as we enter the third significant shift in the threat = landscape.
We moved from fame to fortune = (which we have dubbed "crimeware") in the last ten years. Mass mailers = were replaced by malware that steals credit card information and sells = phony antivirus products. Malware has become a successful criminal = business model with billions of dollars in play. The goal became stealth = and financial gain at the expense of unsuspecting computer users. And = Trojans and toolkits, like Zeus, are the modern tools of the = trade.
We have now entered a third = stage--one of cyber-espionage and cyber-sabotage. Cyber-espionage did = not begin with Stuxnet, and crimeware does not end with it. In fact, = business is just too good for the cybercriminals. With the tremendous = growth of new mobile platforms, bad guys will have even more new avenues = to attack and unchartered social engineering tricks to engage in to = continue to steal from us.But, Stuxnet is a marker. It a = clear indication that the world is changing and the 2011 threat = landscape will be different than the years = previous.
With all this in mind, Symantec = has put together our top Internet security predictions for 2011. =46rom = attacks on critical infrastructure, to the security challenges of = managing an always-connected mobile workforce, to the race to control = the digital arms race, we cover the key trends to keep an eye on = throughout the coming year.
 
Critical Infrastructure Will Come Increasingly Under = Attack and Service Providers Will Respond, but Governments Will Be Slow = to React
Attackers = have likely been watching the impact the Stuxnet threat had on = industries using industrial control systems and are learning from it. We = expect them to take the lessons learned from Stuxnet--the most = significant example to date of a computer virus designed expressly to = modify the behavior of hardware systems to create a physical, real-world = impact--and launch additional attacks targeting critical infrastructure = over the course of 2011. Though slower to start, expect the frequency of = these types of attacks to increase as = well.
As evidence of this trend, = Symantec recently conducted a study asking critical infrastructure = providers about their opinion of cyberattacks against their industries. = Forty-eight percent of respondents said they expect to come under attack = in the next year and 80 percent believe the frequency of such attacks is = increasing.
The overarching messages taken = from the study's findings are that there is a high level of awareness = among critical infrastructure providers of the threat that exists and = that critical infrastructure protection (CIP) is top of mind. Thus, = expect to see these providers move forward with cybersecurity = precautions. These precautions will focus not only on simply combating = an attack, but on resiliency to survive an attack. This will include = backup and recovery, encryption, storage, and information management = initiatives.
The Symantec study also found = that the majority of critical infrastructure providers are supportive of = and more than willing to cooperate with their government in CIP = initiatives. However, do not expect to see a lot of movement in this = regard from governments this year. For example, it's unlikely that the = U.S. government will pass CIP legislation in 2011. Evidence of this is = the widespread changeover that recently happened in the U.S. Congress = and the current presidential administration's lack of indication that it = will be making CIP a priority. CIP legislation and government = initiatives in other countries face similar = challenges.
Zero-Day = Vulnerabilities Will Become More Common as Highly Targeted Threats = Increase in Frequency and ImpactIn 2010, Hydraq, a.k.a. Aurora, = provided a high-profile example of a growing class of highly targeted = threats seeking to infiltrate either specific organizations or a = particular type of computer system by leveraging previously unknown = software vulnerabilities. Attackers have been using such security holes = for many years, but as these highly targeted threats gain momentum in = 2011, plan to witness more zero-day vulnerabilities coming to light in = the next 12 months than in any previous = year.
Symantec has already seen this = trend begin to develop. In all of 2009, Symantec observed 12 zero-day = vulnerabilities. As of early November 2010, Symantec has already tracked = 18 previously unknown security vulnerabilities this year that were or = are actively being used in cyberattacks. Nearly half of these--possibly = more--have been used by targeted threats such as Stuxnet (which = exploited a record four zero-day vulnerabilities), Hydraq, Sykipot, and = Pirpi (which was identified just this = month.)
The key driver behind the = growing use of zero-day vulnerabilities in targeted threats is the = low-distribution nature of such malware. As opposed to traditional = widespread threats that achieve success by attempting to infect as many = computers as possible, targeted threats focus on just a handful of = organizations or individuals (perhaps even only one) with the goal of = stealing highly valuable data or otherwise infiltrating the targeted = system. In such scenarios, the challenge for attackers is ensuring that = they hit their target on the first try without getting caught. Using one = or more zero-day vulnerabilities is an effective means to improve their = odds that the targeted device(s) or computer(s) will be largely = defenseless against their attack.
 
 
The Exponential Adoption of Smart Mobile Devices that Blur = the Line Between Business and Personal Use Will Drive New IT Security = Models
The use of = mobile devices such as smartphones and tablets that meet both business = and personal connectivity needs is growing at an unprecedented pace. = Analyst firm IDC estimates that by year's end, new mobile device = shipments will have increased by 55 percent and Gartner projects that in = the same timeframe, 1.2 billion people will be using mobile phones = capable of rich Web connectivity. Since this proliferation shows no sign = of slowing in the coming year, enterprises will gravitate to new = security models to safeguard the sensitive data that will be on and = accessible through these devices.  
Increasingly, the same mobile = devices are being used for personal as well as business use. This = creates complex security and management challenges for three key groups: = IT organizations, consumers, and communication service = providers.
IT = organizations: Consumers are driving the = innovation of mobile devices and bringing them into the = enterprise--evidence of the ongoing consumerization of IT. This is = especially true as organizations cut costs and require employees to use = their personal devices for business. However, many enterprises lack an = all-embracing solution that can keep enterprise data and application = access safe on the many mobile operating systems in use, all the while = allowing the use of personal devices.
 
 
Consumers: The "IT-ization" of = consumers means that consumers today have more technology in the home = that they are using every day, but no dedicated IT staff to manage all = these devices. This means that more often than not they lack the tools = to adequately protect their personal information from threats or their = device from theft or loss. In fact, the physical security of consumer = mobile devices will be a real pain point this coming year. This will = spur the need and adoption of locate, lock, and remote-wipe = services.
 Carriers are seeing = continued decreases in subscriber satisfaction, which results in = increased customer turnover and costs associated with out of control = mobile bandwidth increases, network misuse, malware proliferation, and = spam. Carriers need a single solution to manage customer preferences and = security across all types of services, including voice, email, SMS, MMS, = Web, IM, and P2P.
As devices grow more = sophisticated and while just a handful of mobile platforms corner the = market, it is inevitable that attackers will key in on mobile devices in = 2011 and that mobile devices will become a leading source of = confidential data loss. Research by mobile specialist Mocana indicates = that attacks against smart mobile devices already require or will = require by year's end the regular attention of IT staff for 65 percent = of enterprise organizations surveyed.
Regulatory = Compliance Will Drive Adoption of Encryption Technologies More than Data = Breach Mitigation
Enterprises are under = ever-increasing pressure to meet a veritable alphabet soup of regulatory = compliance standards. In the United States, this past year saw the = enactment of the healthcare industry regulation (HITECH) and legislation = in several states--all aimed at protecting data. Internationally, PCI = DSS was updated to 2.0.
The Ponemon Institute's 2010 = Annual Study: U.S. Enterprise Encryption Trends study revealed that for = the first time, regulatory compliance has surpassed data breach = mitigation as the top reason why organizations deploy encryption = technologies. Organizations are getting ahead of the curve with their = encryption strategy before the breach occurs, not = after.
In 2011, we will see = organizations take a more proactive approach to data protection with the = adoption of encryption technology in order to meet compliance standards = and avoid the heavy fines and damage to their brands a data breach can = cause.
A New = Frontier in Politically Motivated Attacks Will EmergeIn the Symantec CIP study, more = than half of all firms said they suspected or were pretty sure they had = experienced an attack waged with a specific political goal in mind. In = the past, these politically motivated attacks primarily fell in the = realm of cyber espionage or denial-of-service types of attacks against = Web services. As a recent example, distributed denial-of-service attacks = were levied against blogs and forums criticizing the Vietnamese = Communist Party. However, with Pandora's Box now opened due to Stuxnet, = expect to see these threats move beyond spy games and annoyances as = malware is weaponized to cause real-world = damage.
A highly complex threat, = Stuxnet's purpose is to reprogram industrial control systems--computer = programs used to manage industrial environments such as power plants, = oil refineries, and gas pipelines. It is the first known malware to = specifically target such systems. Stuxnet's ultimate objective is to = manipulate physical equipment attached to specific industrial control = systems, causing the equipment to act in a manner dictated by the = attacker and contrary to its intended purpose. Such an outcome could = have several underlying goals, but sabotage--which could result in real = physical harm--is the most likely.
In the coming year we will see = many new cyber security developments; however, perhaps most important is = that we expect the security industry to continue to rise to meet the = challenge of a constantly evolving threat landscape. You can be sure = that new security technologies will continue to emerge and billions of = computer users will be protected from threats that would otherwise = compromise their computers and networks, steal their sensitive = information, and take them for all they're worth. Indeed, know that the = overall forecast is not one of doom and gloom; though the battle against = cybercrime will go on, security companies such as Symantec will remain = in the trenches, ready to give fight to cybercriminals on every = front.
Kevin Haley, is a Group Product = Manager at = Symantec
=
=0D =0D =0D =0D =0D
=0D =0D =0D =0D
=0D =0D
=0D =0D =0D
=0D Save Big on Personalized Holiday Cards!=0D
=0D
=0D Receive 25% off your next order.
=0D
=0D Regularly starting at $19.99 for 20=0D
Now Only $14.99=0D
=0D =0D =0D =0D =0D =0D =0D
=0D =0D =0D =0D
=0D =0D
=0D
=0D =0D
=0D
=0D =0D =0D
=0D Save Big on Letterhead!=0D
=0D
=0D Receive 25% off your next order.
=0D
=0D Regularly $134.99 for 250=0D
Now Only $101.24=0D
=0D =0D =0D =0D =0D =0D =0D
=0D
=0D Get Started=0D
=0D
=0D =0D
=0D =0D
=0D =0D
=0D =0D =0D
=0D =0D =0D
=0D =0D
=0D Dear Karim,=0D
=0D
=0D This message is to confirm that your FedEx Office order has shipped= .
=0D
=0D Here are your order details:
=0D
=0D =0D Order Number: PFF27-HA316-6L9
=0D Order Date: 11/24/2010=0D =0D

=0D Shipping address:=0D
=0D Karim Hijazi
=0D 3475 Oak Valley Rd NE
=0D Atlanta, GA 30326
=0D US
=0D
=0D =0D =0D =0D =0D =0D =0D =0D =0D =0D =0D =0D =0D =0D =0D
PreviewItems
=0D
=0D =0D = =0D
=0D =0D =0D =0D =0D
=0D
=0D Premium Business Cards=0D
=0D Quantity: : 250=0D
=0D Ship Status: Shipped =0D
=0D
=0D
=0D Items may be shipped separately. For more detailed shipment information, = click here
=0D
=0D
=0D =0D
=0D =0D =0D =0D
=0D
=0D Offer expires 12/30/2010. This e-mail has been sent to: khijazi@unveillance.com=0D

=0D All future FedEx e-mail communications will be sent to this address.=0D

=0D You can unsubs= cribe or updat= e your e-mail address preferences at any time.=0D

=0D FedEx, Attn: E-mail Address Update, 3640 Hacks Cross Road, Memphis, TN = 38125-7302=0D

=0D =C2=A9 2010 FedEx. The content of this message is protected by copyrigh= t and trademark laws under U.S. and international law. Review our privacy policy. All rights reserved.=0D
=0D =0D =0D =0D =0D =0D =0D --======tflMJjF1wVS2rJUDoNAH0g======-- From - Sat May 21 19:27:28 2011 X-Mozilla-Status: 0001 X-Mozilla-Status2: 00000000 Delivered-To: khijazi@unveillance.com Received: by 10.236.109.34 with SMTP id r22cs177693yhg; Mon, 29 Nov 2010 23:24:06 -0800 (PST) Received: by 10.151.146.11 with SMTP id y11mr11950743ybn.120.1291101845853; Mon, 29 Nov 2010 23:24:05 -0800 (PST) Return-Path: Received: from mta727.fedex.customprintcenter.com (mta727.fedex.customprintcenter.com [38.107.100.251]) by mx.google.com with SMTP id u4si15834879ybh.32.2010.11.29.23.24.04; Mon, 29 Nov 2010 23:24:04 -0800 (PST) Received-SPF: pass (google.com: domain of em-bxk4psyb7gucrhau8y0dfqck1m646f@m.fedex.customprintcenter.com designates 38.107.100.251 as permitted sender) client-ip=38.107.100.251; DomainKey-Status: good (test mode) Authentication-Results: mx.google.com; spf=pass (google.com: domain of em-bxk4psyb7gucrhau8y0dfqck1m646f@m.fedex.customprintcenter.com designates 38.107.100.251 as permitted sender) smtp.mail=em-bxk4psyb7gucrhau8y0dfqck1m646f@m.fedex.customprintcenter.com; domainkeys=pass (test mode) header.From=fedexoffice@fedex.customprintcenter.com DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=200505; d=fedex.customprintcenter.com; b=UWbXgfvgHGEmSOosVTg+NJMbLzdIUEII/zs6f92kDc4VaBYdvjX7xbJadR+eSzBx3ogy1e8EX3ObK494xGi2sDLytRYn5p3zifL7z4NvaOsAd8yWg/rW143sBYs7VeLJXx2WF82kYU+aMQ3Dj5eao/vRABP/PIWW+NvA0sb0GgA=; h=Content-Type:Date:From:Message-Id:Mime-Version:Received:Reply-To:Subject:To; Content-Type: multipart/alternative; boundary="======BQmlO2JHAU/518Tbv6M1/A======" Date: Tue, 30 Nov 2010 07:24:25 -0000 From: =?utf-8?q?FedEx=5FOffice?= Message-Id: Mime-Version: 1.0 Received: (qmail 7059 invoked by uid 108); Tue, 30 Nov 2010 07:24:25 -0000 Reply-To: =?utf-8?q?FedEx_Office?= Subject: =?utf-8?q?Your_order_has_been_shipped?= To: khijazi@unveillance.com --======BQmlO2JHAU/518Tbv6M1/A====== Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset=utf-8 Shipment Confirmation Dear Karim, This message is to confirm that your FedEx Office order has shipped. Here are your order details: Order Number: XJ027-HA615-1D1 Order Date: 11/24/2010 Shipping address: Karim Hijazi 3475 Oak Valley Rd NE Atlanta, GA 30326 US Items Premium Business Cards Quantity: 250 Ship Status: Shipped Items may be shipped separately. For more detailed shipment information, click here (http://businessprinting.van.fedex.com/vp/gateway.aspx?S=6722393676&PREURL=%2fvp%2fns%2fmy_account%2forder_history.aspx) Save Big on Personalized Holiday Cards! Regularly starting at $19.99 for 20 Now Only $14.99 http://businessprinting.van.fedex.com/vp/gateway.aspx?s=8147526828&preurl=/holiday-christmas-cards.aspx? Save Big on Personalized Calendars! Regularly starting at $14.99 for 1 Now Only $11.24 http://businessprinting.van.fedex.com/vp/gateway.aspx?s=8147526828&preurl=/personalized-calendars.aspx? Save Big on Letterhead! Regularly $134.99 for 250 Now Only $101.24 http://businessprinting.van.fedex.com/vp/gateway.aspx?S=7934678765&preurl=/letterhead.aspx Offer expires 12/30/2010. This e-mail has been sent to: khijazi@unveillance.com All future FedEx e-mail communications will be sent to this address. You can unsubscribe or update (http://businessprinting.van.fedex.com/vp/gateway.aspx?S=6722393676&PREURL=%2fvp%2fns%2fmy_account%2faccount_update.aspx) your e-mail address preferences at any time. FedEx, Attn: E-mail Address Update, 3640 Hacks Cross Road, Memphis, TN 38125-7302 © 2010 FedEx. The content of this message is protected by copyright and trademark laws under U.S. and international law. Review our privacy policy. (http://www.fedex.com/us/privacypolicy.html?link=5) All rights reserved. --======BQmlO2JHAU/518Tbv6M1/A====== Content-Transfer-Encoding: quoted-printable Content-Type: text/html; charset=utf-8 =0D =0D =0D =0D =0D =0D FedEx=0D =0D =0D =0D =0D =0D =0D =0D =0D =0D =0D =0D =0D =0D =0D
=0D 3D"FedEx"=0D
=0D =0D
=0D Shipment Confirmation=0D
=0D =0D
=0D =0D
=0D =0D =0D =0D =0D =0D =0D
=0D =0D =0D =0D
=0D =0D
=0D =0D =0D
=0D Save Big on Personalized Holiday Cards!=0D
=0D
=0D Receive 25% off your next order.
=0D
=0D Regularly starting at $19.99 for 20=0D
Now Only $14.99=0D
=0D =0D =0D =0D =0D =0D =0D
=0D =0D =0D =0D
=0D =0D
=0D
=0D =0D
=0D
=0D =0D =0D
=0D Save Big on Letterhead!=0D
=0D
=0D Receive 25% off your next order.
=0D
=0D Regularly $134.99 for 250=0D
Now Only $101.24=0D
=0D =0D =0D =0D =0D =0D =0D
=0D
=0D Get Started=0D
=0D
=0D =0D
=0D =0D
=0D =0D
=0D =0D =0D
=0D =0D =0D
=0D =0D
=0D Dear Karim,=0D
=0D
=0D This message is to confirm that your FedEx Office order has shipped= .
=0D
=0D Here are your order details:
=0D
=0D =0D Order Number: XJ027-HA615-1D1
=0D Order Date: 11/24/2010=0D =0D

=0D Shipping address:=0D
=0D Karim Hijazi
=0D 3475 Oak Valley Rd NE
=0D Atlanta, GA 30326
=0D US
=0D
=0D =0D =0D =0D =0D =0D =0D =0D =0D =0D =0D =0D =0D =0D =0D
PreviewItems
=0D
=0D =0D = =0D
=0D =0D =0D =0D =0D
=0D
=0D Premium Business Cards=0D
=0D Quantity: : 250=0D
=0D Ship Status: Shipped =0D
=0D
=0D
=0D Items may be shipped separately. For more detailed shipment information, = click here
=0D
=0D
=0D =0D
=0D =0D =0D =0D
=0D
=0D Offer expires 12/30/2010. This e-mail has been sent to:
khijazi@unveillance.com=0D

=0D All future FedEx e-mail communications will be sent to this address.=0D

=0D You can unsubs= cribe or updat= e your e-mail address preferences at any time.=0D

=0D FedEx, Attn: E-mail Address Update, 3640 Hacks Cross Road, Memphis, TN = 38125-7302=0D

=0D =C2=A9 2010 FedEx. The content of this message is protected by copyrigh= t and trademark laws under U.S. and international law. Review our privacy policy. All rights reserved.=0D
=0D =0D =0D =0D =0D =0D =0D --======BQmlO2JHAU/518Tbv6M1/A======-- From - Sat May 21 19:27:28 2011 X-Mozilla-Status: 0001 X-Mozilla-Status2: 00000000 Delivered-To: khijazi@unveillance.com Received: by 10.236.109.34 with SMTP id r22cs585yhg; Tue, 30 Nov 2010 03:23:12 -0800 (PST) Received: by 10.231.166.207 with SMTP id n15mr1430750iby.115.1291116190933; Tue, 30 Nov 2010 03:23:10 -0800 (PST) Return-Path: Received: from mail-yx0-f173.google.com (mail-yx0-f173.google.com [209.85.213.173]) by mx.google.com with ESMTP id 75si15846225yhl.160.2010.11.30.03.23.10; Tue, 30 Nov 2010 03:23:10 -0800 (PST) Received-SPF: neutral (google.com: 209.85.213.173 is neither permitted nor denied by best guess record for domain of jtubbs@unveillance.com) client-ip=209.85.213.173; Authentication-Results: mx.google.com; spf=neutral (google.com: 209.85.213.173 is neither permitted nor denied by best guess record for domain of jtubbs@unveillance.com) smtp.mail=jtubbs@unveillance.com Received: by yxl31 with SMTP id 31so2845490yxl.4 for ; Tue, 30 Nov 2010 03:23:10 -0800 (PST) Received: by 10.150.178.15 with SMTP id a15mr9476047ybf.382.1291116189946; Tue, 30 Nov 2010 03:23:09 -0800 (PST) Return-Path: Received: from [192.168.1.75] (99-1-188-105.lightspeed.tukrga.sbcglobal.net [99.1.188.105]) by mx.google.com with ESMTPS id y29sm3910964yhc.0.2010.11.30.03.23.07 (version=TLSv1/SSLv3 cipher=RC4-MD5); Tue, 30 Nov 2010 03:23:08 -0800 (PST) From: "J. Tubbs" Content-Type: multipart/alternative; boundary=Apple-Mail-8--723626829 Subject: You aware of this public partnership? Date: Tue, 30 Nov 2010 06:23:05 -0500 Message-Id: <1638AF4E-0304-413D-9F66-7010D6B54791@unveillance.com> To: Karim Hijazi Mime-Version: 1.0 (Apple Message framework v1082) X-Mailer: Apple Mail (2.1082) --Apple-Mail-8--723626829 Content-Transfer-Encoding: 7bit Content-Type: text/plain; charset=us-ascii http://www.lcmsecurity.com/botnets/?gclid=CJ32o7S2yKUCFQy87QodtVVNPQ J. Tubbs CTO Unveillance, LLC O. (404) 482-3557 www.unveillance.com jtubbs@unveillance.com ******************************************** CONFIDENTIAL & PRIVILEGED COMMUNICATION This message is for the named person's use only. The information contained in this communication is confidential and/or privileged, proprietary information that is transmitted solely for the purpose of the intended recipient(s). No confidentiality or privilege is waived or lost by any mistransmission. If you receive this message in error, please immediately delete it and all copies of it from your system, destroy any hard copies of it and notify the sender. You must not, directly or indirectly, use, disclose, distribute, print, or copy any part of this message if you are not the intended recipient. The sender or any of its subsidiaries each reserve the right to monitor all e-mail communications through its networks. ******************************************** --Apple-Mail-8--723626829 Content-Transfer-Encoding: quoted-printable Content-Type: text/html; charset=us-ascii http://www.lcmsecurity.com/botnets/?gclid=3DCJ32o7S2yKUCFQy87QodtVVN= PQ

J. = Tubbs
CTO
Unveillance, LLC
O. (404) 482-3557
www.unveillance.com
jtubbs@unveillance.com

********************************************
CONFIDENTIAL = & PRIVILEGED COMMUNICATION This message is for the named
person's = use only. The information contained in this communication = is
confidential and/or privileged, proprietary information that = is
transmitted solely for the purpose of the intended recipient(s). = No
confidentiality or privilege is waived or lost by any = mistransmission.
If you receive this message in error, please = immediately delete it and
all copies of it from your system, destroy = any hard copies of it and
notify the sender. You must not, directly = or indirectly, use, disclose,
distribute, print, or copy any part of = this message if you are not the
intended recipient. The sender or any = of its subsidiaries each reserve
the right to monitor all e-mail = communications through its = networks.
********************************************

= --Apple-Mail-8--723626829-- From - Sat May 21 19:27:28 2011 X-Mozilla-Status: 0001 X-Mozilla-Status2: 00000000 Return-Path: Received: from [192.168.0.197] (68-243-84-101.pools.spcsdns.net [68.243.84.101]) by mx.google.com with ESMTPS id e24sm6235947ana.2.2010.11.29.14.50.51 (version=SSLv3 cipher=RC4-MD5); Mon, 29 Nov 2010 14:50:53 -0800 (PST) Message-ID: <4CF42E4A.5060100@unveillance.com> Disposition-Notification-To: Karim Hijazi Unveillance Email Date: Mon, 29 Nov 2010 17:50:50 -0500 From: Karim Hijazi Unveillance Email Reply-To: khijazi@unveillance.com Organization: Unveillance User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.9.2.12) Gecko/20101027 Lightning/1.0b2 Thunderbird/3.1.6 MIME-Version: 1.0 To: "Rizk, Allison" Subject: Re: Unveillance State Applications (DOL/DOR) References: <97EA97BBD53AA14BA750C43901B0803E1A36076F80@DC2EXCVS02.ES.AD.ADP.COM> In-Reply-To: <97EA97BBD53AA14BA750C43901B0803E1A36076F80@DC2EXCVS02.ES.AD.ADP.COM> X-Enigmail-Version: 1.1.1 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi Allison, Will do, thanks! Best, Karim On 11/29/2010 5:48 PM, Rizk, Allison wrote: > Hi again, > > As promised, I've faxed in the Department of Revenue (State Withholding ID#) and Department of Labor (State Unemployment ID#) applications on your behalf and included the confirmation sheets. > > As soon as the agencies send you back a letter with your ID's on them, just send them our way and we will update our files. We will need these as we will be deducting taxes but won't have the numbers to apply them to until you update us with the assigned numbers. > > Thanks again! > > ALLISON R. RIZK > ADP - Regional Sales Executive > Ph: (770) 850-4221 > Fx: (770) 980-6880 > > Click here for an overview of ADP's NEW payroll solution, [cid:image001.png@01CB8FED.9E318E20] > https://www.adpemployertools.com/tour/index.html > > > > ---------------------------------------------------------------------- > This message and any attachments are intended only for the use of the addressee and may contain information that is privileged and confidential. If the reader of the message is not the intended recipient or an authorized representative of the intended recipient, you are hereby notified that any dissemination of this communication is strictly prohibited. If you have received this communication in error, notify the sender immediately by return email and delete the message and any attachments from your system. > - -- All the best, Karim Hijazi CEO | President Unveillance, LLC O. (404) 585-7487 M. (561) 542-5704 www.unveillance.com khijazi@unveillance.com ******************************************** CONFIDENTIAL & PRIVILEGED COMMUNICATION This message is for the named person's use only. The information contained in this communication is confidential and/or privileged, proprietary information that is transmitted solely for the purpose of the intended recipient(s). No confidentiality or privilege is waived or lost by any mistransmission. If you receive this message in error, please immediately delete it and all copies of it from your system, destroy any hard copies of it and notify the sender. You must not, directly or indirectly, use, disclose, distribute, print, or copy any part of this message if you are not the intended recipient. The sender or any of its subsidiaries each reserve the right to monitor all e-mail communications through its networks. ******************************************** -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (MingW32) iQEcBAEBAgAGBQJM9C5JAAoJEIk0Dw4U/G3lhZwH/3n9qdYe8JPmrhzjE/xv1wiW 1vhRJb0GcUnXax9zipAROA6f5zARj4rKzzTU7F/NTc8ZBc6kYNbeDN8uQT6UuFCw Yiv8rYWschSVh9pTwO3MOmzDYZWeyONThiFkvhNbWCsCDXCwJ5hQnD0UYm+C1OXL uKYEJblLiaB2lm3ar+FYmX/lzRABTcAeqPucXdxzXkNNGQHxS4Q7oulezrMTMFfa ZtiW0Wd8W3Gwio1BdDmeBoD9QS+q7d4S1IXWPBnEyoIxPpgtXTAHj1PcaennIRxk eRLfG+8gly7OAWN7QaHyljlnxYw1Ktt4SUb3+Lpt5b5aRBgzp3cFJLI4AS4CcSg= =1QSq -----END PGP SIGNATURE----- From - Sat May 21 19:27:28 2011 X-Mozilla-Status: 0001 X-Mozilla-Status2: 00000000 Return-Path: Received: from [192.168.0.197] (68-243-84-101.pools.spcsdns.net [68.243.84.101]) by mx.google.com with ESMTPS id i10sm6239932anh.12.2010.11.29.14.55.35 (version=SSLv3 cipher=RC4-MD5); Mon, 29 Nov 2010 14:55:35 -0800 (PST) Message-ID: <4CF42F65.9080405@unveillance.com> Disposition-Notification-To: Karim Hijazi Unveillance Email Date: Mon, 29 Nov 2010 17:55:33 -0500 From: Karim Hijazi Unveillance Email Reply-To: khijazi@unveillance.com Organization: Unveillance User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.9.2.12) Gecko/20101027 Lightning/1.0b2 Thunderbird/3.1.6 MIME-Version: 1.0 To: 'James Hunt' Subject: Unveillance Platform Provisioning X-Enigmail-Version: 1.1.1 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi Jim, Just making sure you are not having any issues with the provisioning of your account. I am assuming that you just haven't had the time to do so. Please let me know if you would like me to resend the invite for any reason. Thanks. - -- All the best, Karim Hijazi CEO | President Unveillance, LLC O. (404) 585-7487 M. (561) 542-5704 www.unveillance.com khijazi@unveillance.com ******************************************** CONFIDENTIAL & PRIVILEGED COMMUNICATION This message is for the named person's use only. The information contained in this communication is confidential and/or privileged, proprietary information that is transmitted solely for the purpose of the intended recipient(s). No confidentiality or privilege is waived or lost by any mistransmission. If you receive this message in error, please immediately delete it and all copies of it from your system, destroy any hard copies of it and notify the sender. You must not, directly or indirectly, use, disclose, distribute, print, or copy any part of this message if you are not the intended recipient. The sender or any of its subsidiaries each reserve the right to monitor all e-mail communications through its networks. ******************************************** -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (MingW32) iQEcBAEBAgAGBQJM9C9lAAoJEIk0Dw4U/G3l638H/RNwMwxu/7lVg+tcnTHcR3gh viX2SE9SWdr2f7Y9t7s4GfKMUs0l9Iv9rXHZSfbYM/YBNLhzvPbr4nsc3ktSLJy5 53MxXlJfn9pNsNKLzWLPL4+z3DL26XXMtgSNOI7j3ao1/M3XTus4oC7uKNR6uaJy 0wlOjaFCJn2C8aay/tvhgtJXZLYiNtKH0v+bVnYn6CQcozheTQJNlqIpntv7wVhQ U+f3VKOpPlGjbTN76VtY1TZq8iWl8WTA/3U7t0+rwPCCW8DzVj2Xqn7SuTMKaM4g PxZLyGx4RR/Ku+iHquvFOBSk+lCcubWOHnULmggRUuqx1O8fwq4RdnM62zDCcv4= =YQSg -----END PGP SIGNATURE----- From - Sat May 21 19:27:28 2011 X-Mozilla-Status: 0001 X-Mozilla-Status2: 00000000 Delivered-To: khijazi@unveillance.com Received: by 10.236.109.34 with SMTP id r22cs159148yhg; Mon, 29 Nov 2010 14:56:33 -0800 (PST) Received: by 10.150.197.1 with SMTP id u1mr11157012ybf.181.1291071393191; Mon, 29 Nov 2010 14:56:33 -0800 (PST) Return-Path: Received: from gateout02.mbox.net (gateout02.mbox.net [165.212.64.22]) by mx.google.com with ESMTPS id 12si14897762ybe.18.2010.11.29.14.56.32 (version=TLSv1/SSLv3 cipher=RC4-MD5); Mon, 29 Nov 2010 14:56:33 -0800 (PST) Received-SPF: neutral (google.com: 165.212.64.22 is neither permitted nor denied by best guess record for domain of jhunt@mitagroup.com) client-ip=165.212.64.22; Authentication-Results: mx.google.com; spf=neutral (google.com: 165.212.64.22 is neither permitted nor denied by best guess record for domain of jhunt@mitagroup.com) smtp.mail=jhunt@mitagroup.com Received: from gateout02.mbox.net (gwo2-lo [127.0.0.1]) by gateout02.mbox.net (Postfix) with ESMTP id 72C484BF5C1 for ; Mon, 29 Nov 2010 22:56:32 +0000 (GMT) X-USANET-Received: from gateout02.mbox.net [127.0.0.1] by gateout02.mbox.net via mtad (C8.MAIN.3.68Q) with ESMTP id 741okCw5E2128Mo2; Mon, 29 Nov 2010 22:56:30 -0000 Received: from s1hub4.EXCHPROD.USA.NET [165.212.120.254] by gateout02.mbox.net via smtad (C8.MAIN.3.68M) with ESMTPS id XID351okCw5E1895Xo2; Mon, 29 Nov 2010 22:56:30 -0000 X-USANET-Source: 165.212.120.254 IN jhunt@mitagroup.com s1hub4.EXCHPROD.USA.NET X-USANET-MsgId: XID351okCw5E1895Xo2 Received: from MBX6.EXCHPROD.USA.NET ([10.120.221.61]) by s1hub4.EXCHPROD.USA.NET ([10.120.220.34]) with mapi; Mon, 29 Nov 2010 22:56:19 +0000 From: James Hunt To: Karim Hijazi Unveillance Email Date: Mon, 29 Nov 2010 22:56:30 +0000 Subject: Read: Unveillance Platform Provisioning Thread-Topic: Unveillance Platform Provisioning Thread-Index: AcuQGJK+VtHSoCpASqWoTLXVNMGMUAAABaL3 Message-ID: In-Reply-To: <4CF42F65.9080405@unveillance.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-Auto-Response-Suppress: All X-MS-TNEF-Correlator: acceptlanguage: en-US Content-Type: multipart/report; boundary="_000_B41C53427D44E140AFB94BCBDEE1781A090A3F5379MBX6EXCHPRODU_"; report-type=disposition-notification MIME-Version: 1.0 --_000_B41C53427D44E140AFB94BCBDEE1781A090A3F5379MBX6EXCHPRODU_ Content-Type: multipart/alternative; boundary="_002_B41C53427D44E140AFB94BCBDEE1781A090A3F5379MBX6EXCHPRODU_" --_002_B41C53427D44E140AFB94BCBDEE1781A090A3F5379MBX6EXCHPRODU_ Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Your message was read on Monday, November 29, 2010 10:56:30 PM (GMT) Coordi= nated Universal Time. --_002_B41C53427D44E140AFB94BCBDEE1781A090A3F5379MBX6EXCHPRODU_ Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable
Your message was read on Monday, = November 29, 2010 10:56:30 PM (GMT) Coordinated Universal Time.
--_002_B41C53427D44E140AFB94BCBDEE1781A090A3F5379MBX6EXCHPRODU_-- --_000_B41C53427D44E140AFB94BCBDEE1781A090A3F5379MBX6EXCHPRODU_ Content-Type: message/disposition-notification Final-recipient: RFC822; jhunt@mitagroup.com Disposition: automatic-action/MDN-sent-automatically; displayed X-MSExch-Correlation-Key: kVoD0WKKEEuN9EXzP0Isvg== X-Display-Name: James Hunt --_000_B41C53427D44E140AFB94BCBDEE1781A090A3F5379MBX6EXCHPRODU_--