SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Pastimes : 5spl -- Ignore unavailable to you. Want to Upgrade?


To: dannobee who wrote (521)1/25/2003 12:14:20 AM
From: mmmary  Read Replies (1) | Respond to of 2534
 
Only losers want you to hold paper

I borrowed this from investment chat board thread

"Here's a portfolio of the companies who are listed as opting out of the DTC (thanks to DueDillinger on RB):I see lots of red, but I think that's probably par for the course anyhow.- Jeff

finance.yahoo.com



To: dannobee who wrote (521)1/25/2003 9:47:09 PM
From: LPS5  Read Replies (1) | Respond to of 2534
 
Terror link?

Virus Overwhelms Global Internet Systems
Sat Jan 25, 4:16 PM ET

By TED BRIDIS, AP Technology Writer

WASHINGTON - A fast-spreading, virus-like infection dramatically slowed Internet traffic Saturday, overwhelming the world's digital pipelines and interfering with Web browsing and e-mail delivery.

Monitors reported detecting at least 39,000 infected computers, which transmitted floods of spurious signals disrupting hundreds of thousands of other systems worldwide. Sites monitoring the health of the Internet reported significant slowdowns, although recovery efforts appeared to be succeeding.

"Everything is starting to come back online," said Bill Murray, a spokesman for the FBI's National Infrastructure Protection Center. "We know what the issue was and how to mitigate it, and we're just imploring systems administrators to apply the patches that will prevent this from propagating again."

Bank of America Corp., one of the nation's largest banks, said many customers could not withdraw money from its 13,000 ATM machines because of technical problems caused by the attack. A spokeswoman, Lisa Gagnon, said the bank restored service to nearly all ATMs by late Saturday afternoon and that customers' money and personal information had not been at risk.

Millions of Internet users in South Korea were stranded when computers at Korea Telecom Freetel and SK Telecom failed. Service was restored but remained slow, officials said. In Japan, NHK television reported heavy data traffic swamped some of the country's Internet connections, and Finnish phone company TeliaSonera reported some problems.

"It's not debilitating," said Howard Schmidt, President Bush's No. 2 cybersecurity adviser. "Everybody seems to be getting it under control." Schmidt said the FBI's cybersecurity unit and experts at the federally funded CERT Coordination Center were monitoring the attack and offering technical advice to computer administrators on how to protect against it.

"We as a technical group are getting better at identifying these things and putting filters in place in a timely manner," said Marty Lindner of the CERT Coordination Center.

Tiffany Olson, spokeswoman for the President's Critical Infrastructure Protection Board, said the White House may not determine the scope of damage "for at least a couple of days, and we may not know the full impact of this attack at all." She said companies often don't report such damage to the government.

The virus-like attack, which began about 12:30 a.m. EST, sought out vulnerable computers on the Internet to infect using a known flaw in popular database software from Microsoft Corp. called "SQL Server 2000." The attacking software was scanning for victim computers so randomly and so aggressively, sending out thousands of probes a second, that it saturated many Internet data pipelines.

Most home users did not need to take any protective measures.

The FBI was searching for the origin of the attack, which experts variously dubbed "sapphire," "slammer" or "SQ hell." Some security researchers noted that software unleashed in Saturday's attack bore striking resemblance to blueprints for computer code published weeks ago on a Chinese hacking Web site by a virus author known as "Lion." An FBI spokesman said he couldn't confirm that.

Tracing the attack, which appeared to strike first in the United States, might be impossible because it used a transmission method that made it unusually easy to falsify its digital trail, experts said. Mysterious scans that could have been a precursor to Saturday's attack have been detected by Internet sensors since last year, searching out vulnerable computers.

"Scanning has been going on for months and months," said Chris Wysopal of AtStake Inc., a security firm in Cambridge, Mass. "This person probably launched this attack at hundreds of machines all at once."

The attack resembled the "Code Red" virus that struck the Internet during the summer of 2001.

"This is like Code Red all over again," said Marc Maiffret, an executive with eEye Digital Security, whose engineers were among the earliest to study samples of the attack software. "The sheer number of attacks is eating up so much bandwidth that normal operations can't take place."

Schmidt said disruption within the U.S. government was minimal, partly because the attack occurred early on a weekend. The departments of State, Agriculture, Commerce and some units of the Defense Department appeared hardest hit among federal agencies, according to Matrix NetSystems Inc., a monitoring firm in Austin, Texas.

Some Associated Press news services were affected but were restored by morning.

The attack temporarily interfered with the computer network at The Atlanta Journal-Constitution, delaying publication of Sunday's first edition, normally delivered to newsstands Saturday afternoon, and delaying updates on the newspaper's Web site, ajc.com.

The world's largest Internet provider, America Online, reported no problems. "We remain on alert and continue to closely monitor this situation," spokesman Nicholas Graham said.

The attack sought to exploit a software flaw discovered by researchers in July 2002 that permits hackers to seize control of corporate database servers. Microsoft deemed the flaw to be critical and offered a free repairing patch, but it was impossible to know how many computer administrators applied the fix.

The latest attack could revive debate within the technology industry about the need for an Internet-wide monitoring center, which the Bush administration has proposed.

During the Code Red attack in July 2001, about 300,000 mostly corporate server computers were infected and programmed to launch a simultaneous attack against the Web site for the White House, which U.S. officials were able to defend successfully.

Unlike that episode, the malicious software used in this latest attack did not appear to do anything other than try to spread its own infection, experts said.

___

AP technology writers Anick Jesdanun and Frank Bajak contributed to this story from New York.



To: dannobee who wrote (521)1/27/2003 9:55:33 AM
From: LPS5  Respond to of 2534
 
This is going to get interesting. A return volley:

OTC Bulletin Board Companies Unite to Assert Issuers' Rights to Opt Out of DTC Share Transfer System and Protect Shareholders

Press Release Source: Investor Communications International, Inc.

Monday January 27, 9:04 am ET

Dow Jones Newswire Reporter Remond Misses the Point of Companies' Actions

BLAINE, Wash., Jan. 27 /PRNewswire/ -- The following is being issued by Investor Communications International, Inc.
In another installment from the flow of misinformation by Dow Jones Newswire's Carol S. Remond, the reporter has again confused investors and misled issuers about the status of the country's electronic transfer system. Operating from a shrouded source of information, Remond continues to file edicts produced apparently by an entity other than duly authorized and knowledgeable officials, about the status of the system.

Remond's newswire Friday, January 24, 2003 claims that actions of The Depository Trust & Clearing Corporation (DTCC) to move to a "paperless" electronic transfer system for securities has led to the DTC (a subsidiary of DTCC) refusing any exit by a public company seeking to remove stocks from the global electronic system in favor of the physical delivery of share certificates. Indeed, the DTC has no authority to establish such guidelines and could contravene Federal Depository rules in any attempt to block the withdrawal from its system.

According to a spokesman for the OTC Bulletin Board companies, "Our legal research indicates that DTC's reliance upon UCC Article 8 (law governing share transfers) is misplaced and provides insufficient legal authority to prevent a public company from removing its securities from the DTC system. The primary reason is that the DTC, as a branch of the Federal Reserve, is required to abide by Fed rules as a depository. One of the rules states that DTC cannot hold shares that bear any sort of restriction. Refusing to exit securities and continuing to hold them in the name of their nominee could potentially represent a violation of Federal Reserve rules, as well as perpetuating and possibly facilitating naked short selling."

There are numerous types of restrictions that an issuer can place on its securities. Some examples are "private offering not eligible for purchase by a US citizen", "shares subject to trading restrictions", "lock up agreements" and many others.

The misleading statements by Remond are nothing new. Her comments have been consistently inaccurate and inflammatory, precipitating numerous public responses by the companies she has attempted to implicate as operating outside of the system. Rather than address the underlying problem, Redmond twists facts regarding the withdrawal process and refers to the OTCBB companies as attempting to thwart "short selling", instead of "naked short selling" -- a very different and legally compelling distinction.

Short Selling is legal and routinely takes place. A short sale is a transaction where stock is pledged against stock to be sold. The seller makes the sale anticipating that the share price will decline so that a purchase or "buy-in" can be made later at a price below the sale to create a profit from the difference between the sale and purchase.

Naked Short Selling is not legal, according to US SEC rules. Naked short selling takes place where shares sold are never borrowed, never delivered by the seller, but nevertheless the seller collects money for the stock not delivered within the three days prescribed by NASD guidelines. The three-day settlement system run by the National Securities Clearing Corporation ("NSCC") does not ensure that shares that are sold in a transaction are ever delivered.

Case in point is Genemax (GMXX), which by the transfer agent's records, clearly establish total tradable shares of less than 400,000 -- with "fails to deliver" totaling in excess of a million shares. This means illegal short sellers -- primarily Canadian firms, often managing accounts of U.S. residents -- openly violate NASD and SEC guidelines requiring a short seller to obtain an "affirmative determination" before executing any short sale.

The actions of DTCC surround the move by a growing group of OTC Bulletin Board companies, led by GeneMax Corp. (OTC Bulletin Board: GMXX - News), that began exiting the system in 2002 in favor of Certificate Only holdings. Others joining the move to withdraw from the DTC include Ten Stix Inc. (OTC Bulletin Board: TNTI - News), Midas Trade (OTC Bulletin Board: MIDS - News), Hadro Resources (OTC Bulletin Board: HDRS - News), and Vega Atlantic Corporation (OTC Bulletin Board: VATL - News), among others. Other companies, including Intergold Corporation (OTC Bulletin Board: IGCO - News) have applied for or expressed their intent to withdraw. These companies are opting out of the DTC system to combat the Naked Short Selling abuses made possible by the electronic transfer system, which is flawed.

The primary reason that moving to a non-DTC eligible status works in curtailing the illegal activity of Naked Short Selling is the responsibility for the completion of the purchase transaction. A DTC eligible security clears through the NSCC (National Securities Clearing Corporation), which in turn is responsible for making sure that the seller of the shares electronically delivers the position to the buyer. In the case of a naked short sale, the NSCC does not require the seller to deliver the shares -- as is the case with the Canadian naked short sellers, who hide behind IDA Rule 100, which allows them to short shares without borrowing them first.

This electronic system, called CNS (continuous net settlement), simply does not require these Canadian and offshore firms to ever deliver the shares they illegally sell, earning the nickname among market participants, in a parody of the CNS system, as "Continuously Never Settle." This is how, in electronic form, companies like Jag Media Holdings (JGMHA) can have an estimated short position which purportedly exceeds the total outstanding by two or three times.

In physical form, the responsibility to complete the transaction (i.e. receive the shares that were purchased) falls to the purchasing broker, who, on settlement day, expects to receive the physical certificate. When this process begins, the broker can execute a "buy-in" -- buying shares from the market to complete the transaction for his customer -- who typically has no idea that the shares they paid for were never delivered.

The ongoing efforts to extol the virtues of the market makers and their clearing houses by a lapdog reporter is becoming the central focus uniting all OTC Bulletin Board companies to act against this misuse of the public trust.

According to the Transfer Agent handling the withdrawal from the DTC, Robert Stevens of Global Stock Transfer, "The overwhelming response to the concept of 'certificated trading' by public companies -- including NASDAQ stocks -- confirms that the concept is timely and correct. This clearing style is acceptable for not only OTC BB Companies but also NASDAQ small cap and NMS companies as well, provided they follow jurisdiction requirements."

In response to shortfalls of the system and focused attacks by the likes of Remond, an association has been formed by Investor Communications International (ICI) to bring the entire group of OTC Bulletin Board companies together as a common voice. The National Association Against Naked Short Selling was launched in January 2003 and has forwarded a registration and participation letter to all OTC BB companies. The letter explains that the group's mandate is to form a common interest against these illegal and unethical abuses, provide information to the Federal Authorities at all levels and begin a national scale public relations campaign for awareness amongst the responsible and independent leading media and investment industry contacts. The goal is to ensure enforcement of the existing legislation which would safeguard shareholders and the companies they invest in.

OTC Bulletin Board companies seeking to protect themselves against predatory trading and Naked Short Selling can take immediate action by registering with the National Association Against Naked Short Selling (www.nakedshortselling.com) at its website, sponsored by ICI. Companies can also find how to carry out the process of opting for Certificate Only trading by contacting ICI, toll free at 800-209-2260 or registering online at www.icihome.com.

SAFE HARBOR STATEMENT

THIS NEWS RELEASE MAY INCLUDE FORWARD-LOOKING STATEMENTS WITHIN THE MEANING OF SECTION 27A OF THE UNITED STATES SECURITIES ACT OF 1933, AS AMENDED, AND SECTION 21E OF THE UNITED STATES SECURITIES AND EXCHANGE ACT OF 1934, AS AMENDED, WITH RESPECT TO ACHIEVING CORPORATE OBJECTIVES, DEVELOPING ADDITIONAL PROJECT INTERESTS, THE COMPANY'S ANALYSIS OF OPPORTUNITIES IN THE ACQUISITION AND DEVELOPMENT OF VARIOUS PROJECT INTERESTS AND CERTAIN OTHER MATTERS. THESE STATEMENTS ARE MADE UNDER THE "SAFE HARBOR" PROVISIONS OF THE UNITED STATES PRIVATE SECURITIES LITIGATION REFORM ACT OF 1995 AND INVOLVE RISKS AND UNCERTAINTIES WHICH COULD CAUSE ACTUAL RESULTS TO DIFFER MATERIALLY FROM THOSE IN THE FORWARD-LOOKING STATEMENTS CONTAINED HEREIN."

--------------------------------------------------------------------------------
Source: Investor Communications International, Inc.

biz.yahoo.com