To: Jim Bishop who wrote (1038 ) 8/30/1999 10:33:00 AM From: Jim Bishop Read Replies (1) | Respond to of 1174
heCopperWire TCW currently has CHES as it's only long term holding. Outstanding share roughly 90 million. Float roughly 40 million. CHES not too long ago was a shell company with little or no debt. Then CHES announced that intended to become active once more, with it's checkered past behind it. CHES has since then acquired 2 companies: PharmaOnline and the latest edition, Probity International. O'Shea also expressed his desire and goal to take CHES to a Nasdaq listing. Keep in mind that CHES is currently in the DD process with Growth Fund Partnership (GFP). GFP currently holds $3.79 Billion in assets. (yes that is a B and not a mistype). TCW feels that the potential for CHES dramaticaly outweighs the risk. We continue to accumulate. TCW also expects to hear of SEC compliance shortly from CHES, along with news of GFP and Probity International and possibly PharmaOnline. The latest PR resulted in what seemed, under-excitement. Possibly due to the lack of knowledge about the latest acquisition Probity International. Though as news filtered around and more and more research was done, investors may have started to realize the value of what Probity International adds to CHES. Probity International becomes a tremendous asset of CHES. Below is a description of Probity International. Take note that the technology is cutting edge and will be the future of internet and intranet security. And is now just busting into the commercial sector, as it was mainly used by DOD due to expense. Now advancements in technology are making it more cost effective. --------------------------------------------------------------------- DCS Licenses Probity Gradient(TM) for DoD Information Security Applications DCS has become the Department of Defense licensee of the Probity Gradient(TM) methodology for analyzing, measuring and managing Network Security and Integrity. The Probity Gradient(TM) methodology identifies and measures network vulnerabilities and risks and aids in the development of practical security policies and secure network architectures. Based on this new capability, the company is adding a comprehensive Trusted Network Security practice to its Integrated Information Technology Capability Center. Probity International of Reston, VA is a Network Security/Risk Management consulting company serving Fortune 1000 Corporations, Government Agencies and Institutions. Creators of the Probity Gradient(TM) methodology, the company provides security training and assessments and develops policies, procedures and architectures that protect companies that process highly sensitive information or conduct business transactions over the Internet and through corporate LANs and Intranets. DCS Corporation, located in Alexandria, VA, has been successfully serving the Defense and Aerospace Community for over 20 years. The company addresses Mission Critical Technologies for Airborne, Ground Mobile and Naval Applications. DCS Corporation is a competitive leader in Navigation and Avionics Systems and Integration, Electro-Optics Development, Engineering, Acquisition, Logistics, Test and Evaluation Management, and Integrated Information Technology Systems. Probity members are recognized for managing the development of NSA evaluated Trusted Network products and accredited Classified Network Systems, used in over 25 DOD and NATO applications. Managed the development of the first B2 evaluated network product - VSLAN (1990/95) Designed and implemented a Trusted Network to secure the new trading system at The Philadelphia Stock Exchange Probity Laboratories The Incubator for new methods, processes and seminars Evaluation facility for "Trusted" solutions Custom solution design and Tools development The Probity Methodology Trusted Networks were developed by the Defense Department for classified data. They offer tamper-proof security to protect against inside and outside information attacks. They were too costly, too complex and too restrictive for commercial use...until now! Probity has re-applied Trusted technology to a practical methodology that addresses the two fundamental requirements for containing Network Computer Crime. Know your system's vulnerabilities Only use Classified-StrengthTM Solutions. Integration is executed with scrupulous objectivity and without vested interest in any component.