Company Interview Excerpt

GREGORY EVANS - CYBER GROUP NETWORK CORPORATION (CGPN)

Full article published: 09/24/2001

http://www.twst.com/notes/articles/nab634.html

TWST: Could you give us an introduction by way of an overview and summary of Cyber Group Network?

Mr. Evans: The Cyber Group Network has three main goals; one, computer security products and services; two, public Internet access and kiosk devices; three, acquisitions. We are currently trading on the Over The Counter Bulletin Board, but we plan to file to trade on NASDAQ within the next year. That is also one of our goals. One of the biggest products that we are developing right now is a patented security device called the Electronic Snitching Device, also known as E-Snitch. This is a device that can track a missing or stolen computer anywhere, to within five feet of its location. In most locations, E-Snitch is able to retrieve the information from the computer and delete the information that is stored on the computer, even while the computer is turned off. It can also destroy certain parts of a computer, leaving the perpetrator with nothing but a high-tech paperweight. This is one of our leading products, and we are looking to team up with some major manufacturers to help our product become standard in all computer systems sold.

Evans is obsessed with being part of a publicly traded company.

Claims of software or devices being able to track missing/stolen computers "anywhere" are ludicrous. They rely on a person not formatting the hard drive, connecting to the internet, law enforcement contacting the ISP to get a physical address and a judge to issue a warrant. Unless there is a physical device attached with a highly accurate GPS signal, Evans' software cannot track a computer within 500 yards, let alone 5 feet. The best part, claims that E-Snitch can retrieve the information or delete it, even while the computer is turned off. If that isn't enough, that this product can then destroy the hardware. I am not sure why someone would opt for destruction over retrieval.

TWST: Is that an interactive device where the owner can signal the destruct button, or is it something that if left unattended or outside of a certain geography it signals itself?

Mr. Evans: No, what happens is this: if your computer is stolen, for example, you're standing at the airport; you walk up to the ticket counter and set your laptop bag down. Someone walks past, picks it up and runs off with it. You notice that your computer is stolen. You whip out your cell phone, dial a toll-free number, and say: 'My computer was stolen, here's the ID number.' Within 60 seconds we're tracking your computer live. Now, when I say tracking it, I mean that we can tell you the exact location down to the street address where the computer actually is, in real time.

The only way this could happen is a physical GPS-based tracking device attached to the laptop and has a power source. If so, not sure how Evans plans to patent this as it has been done before for years.

main page ATTRITION feedback