These are new product announcements from my main website (Open 24/7/365). We have a life-time warranty / guarantee on all products. (Includes parts and labor). Here you will find a variety of cutting-edge Surveillance and Security-Related products and services. (Buy/Rent/Layaway) Post your own comments and concerns related to the specific products or services mentioned or on surveillance, security, privacy, etc.

Monday, May 09, 2016

Those %$#%$ Idiots At The New York Federal Reserve

Those $#%$# Idiots At The New York Federal Reserve Somehow Allow Hackers To Take $100million from An Account Held For Bangladesh

Updated 5-13-2016

Hackers Compromise Swift System

Hackers have again gained access to the world’s largest system for transferring funds among banks, a breach the network’s operator said indicates a wide-ranging effort to penetrate the financial system.

The Society for Worldwide Interbank Financial Telecommunication, a cooperative that runs the international messaging system between banks, said the attack targeted a commercial bank and managed to send Swift messages using the bank’s valid codes. It followed the theft in February of $81 million from Bangladesh’s account at the Federal Reserve Bank of New York.

The Bangladesh case provided startling evidence of the vulnerability of parts of the financial system that had been thought highly secure.

The notice by Swift said in both cases its own system wasn’t breached but that hackers accessed the fund-transfer system using the customers’ credentials and malicious software to cover their tracks.

“Forensic experts believe this new discovery evidences that the malware used in the earlier reported customer incident was not a single occurrence, but part of a wider and highly adaptive campaign targeting banks,” Swift said in a notice to banks reviewed by The Wall Street Journal but set to go out Friday.

A spokeswoman for Swift said there were a “few” additional incidents but declined to identify the other institutions involved. The Belgium-based Swift recently notified customers about a “small number of recent cases of fraud at customer firms,” it said in the notice.

The new evidence in question, Swift said, was sophisticated malware that was found by third-party forensic experts, who brought their findings to the messaging company. The attack happened before the Bangladesh theft, a person familiar with the matter said.

That malware was different than that used earlier to attack Bangladesh’s central bank, it added. In February, thieves attempted to siphon nearly $1 billion out of the Bangladesh bank’s account at the New York Fed.

The bulk of the fraudulent payment orders were stopped, but the thieves made off with $81 million that still hasn’t been traced.

The two sets of malware used in the attacks had two things in common, the Swift notice said. One, the attackers exploited the customer’s systems before messages were sent over Swift’s platform. Secondly, the malware helped the attackers cover their tracks, making it more difficult to identify the fraud.

The newer one identified by Swift attacks a type of computer software for reading files in a “portable document format,” or PDF. The malware is able to read customers’ PDF reports of payment confirmations, manipulate them and then remove traces of any fraudulent instructions, Swift said.

The Wall Street Journal reported this week that the Federal Bureau of Investigation suspected insiders may have helped the attack on Bangladesh Bank, citing people familiar with the matter. Swift similarly emphasized the risk of malicious insiders in its note to banks.

Swift, a member-owned industry cooperative, handles the bulk of world-wide cross-border payment instructions between banks. On average, the company handles 25 million messages each day.

Banks and brokerages relay information to each other through its trusted computer network, confirming the identities of senders and recipients, amounts being transferred, account numbers and intermediary banks.

The breaches raise the prospect that the system isn’t fully secure.

In the case involving Bangladesh Bank, attackers issued 35 fraudulent instructions attempting to divert funds to accounts in the Philippines and Sri Lanka.

At a conference in Miami this month, New York Fed Executive Vice President Richard Dzina said the bank acted on properly authenticated message instructions.

News of the second breach was reported earlier Thursday by the New York Times.

Updated 4-9-2016

Bankers Hours Contributes To Breach

The heist is now the focus of probes by the Federal Bureau of Investigation, officials in Bangladesh, lawmakers in the Philippines and the U.S. Congress. A spokeswoman for the FBI declined to comment.
Investigators brought in from computer-security firm FireEye Inc. said in a report that the attackers lurked in Bangladesh Bank’s systems for days, logging keystrokes to get the codes they needed. Bangladeshi investigators have said the thieves timed their attack to exploit the weekend, which falls on Friday and Saturday in Bangladesh.

The Bangladeshi central bank has questioned why the unusual transfer requests, many asking for money to be routed to personal bank accounts, didn’t ring alarm bells inside the New York Fed before the bank executed five of the 35 payment orders.
Subhankar Saha, a spokesman for Bangladesh Bank, said its investigators are looking into whether the New York Fed followed the correct procedures in releasing funds from its account.
The Fed generally approves authenticated payment orders automatically, people familiar with the matter said. Payments can be halted if they set off money-laundering or sanctions alerts, for example. Others may be reviewed after the fact and recalled if necessary, the people said.

“You’d think the Fed would be more vigilant with suspicious activity,” saidDarren Hayes, a professor who studies cybersecurity at Pace University’s Seidenberg School of Computer Science and Information Systems in New York. “People might question why, if they raised their own red flags, more wasn’t done.”
  • 1/31
  • Feb. 4, 2016
    By 5 p.m. EST: Federal Reserve Bank of New York approves five of what ultimately became 35 requests from hackers to transfer money from Bangladesh Bank’s accounts. The five approved orders, totaling $101 million, are routed to beneficiaries in Sri Lanka and the Philippines. 

    5:55 p.m.: New York Fed messages Bangladesh Bank with questions about another 12 of the 35 transfer requests. 

    11:30 p.m. (10:30 a.m. Friday Bangladesh time): Bangladesh Bank officials find the Swift interbank-messaging terminal unresponsive and can’t access the system.
  • Feb. 5, 2016
    4:09 p.m. and 4:43 p.m. EST: Fed sends new messages to Bangladesh Bank again querying the transfer requests, including four of the five it had put through and 30 it had blocked that day.
  • Feb. 6, 2016
    1:30 a.m. EST (12:30 p.m. Bangladesh time): After correcting a computer problem, Bangladesh Bank sees messages sent by the Fed. 

    2:31 a.m. to 7:03 a.m. EST: Bangladesh Bank sends three emails and one fax to the New York Fed, trying to get the payments stopped. Messages go unanswered. Bangladeshi officials also call the Fed office in New York several times, to no avail.
  • 2/7
  • Feb. 7, 2016
    7:15 a.m. EST (6:15 p.m. Bangladesh time): Bangladeshi officials start up a backup server and see dozens of messages from the Fed asking Bangladesh to reconfirm requests to transfer up to $950 million. By then, $101 million had already been wired out of the account to Sri Lanka and the Philippines.
  • Feb. 8, 2016
    6 a.m. EST (5 p.m. Bangladesh time): Bangladesh Bank sends stop-payment requests via Swift to the New York Fed and four intermediary banks. Later in the day, the Fed sends its own stop-payment requests.
  • 2/14


The thieves put the first payment orders through to the Fed using Swift on Thursday, Feb. 4, late in the Bangladeshi day, according to people familiar with those messages. The Fed approved five of the 35 payments later that day, said one person familiar with the messages, processing a total of $101 million in payments.
Fed employees then became suspicious. At 5:55 p.m., they messaged Bangladesh Bank asking for the rationale for a dozen different payment requests, the person said.

As the Fed’s concerns increased the next day, a Friday, it decided to block 30 of the 35 requests made by the thieves. Just before closing for business that afternoon, and heading out for the weekend, Fed staffers sent two more interbank messages asking Bangladesh Bank for additional details, people familiar with the messages said.

The Fed never heard back that day, when most Bangladeshi staff already were off for the weekend.
Officials who work on the Swift system at Bangladesh Bank usually come in for a couple of hours on weekend days to collect and sort messages. They were in the office for about 90 minutes Friday, but left without seeing the Fed’s messages, because they couldn’t start up the Swift terminal due to a computer failure that FireEye said was caused by the hackers.
When they got the terminal running Saturday and saw the Fed’s messages, they sent three emails and a fax asking the Fed to “stop processing all payments until further notice,” according to the Bangladeshi police report on the incident. Bangladeshi officials said they also tried to call the New York Fed multiple times that day and on Sunday, but nobody answered, according to the report.
It wasn’t until early the following Monday, just after 6 a.m. New York time, that the Fed saw the Bangladeshi messages, people familiar with the matter said. It later sent out orders to stop the payments, they said. By then, it was too late, with all but $68,305 of the $81 million sent to the Philippines gone.

Bangladesh ultimately got back the $20 million routed to the account of a nonprofit in Sri Lanka, but only because a banker there stopped the payment after noticing a misspelling in the recipient’s name. In late March, one of the junket operators in the Philippines returned $4.63 million.
The Philippines last month filed criminal complaints against the two casino-junket operators for allegedly receiving some of the stolen money.

Updated 3-17-2016
More details emerged Thursday of the brazen theft of tens of millions of dollars from Bangladesh’s account at the Federal Reserve Bank of New York, including the use of allegedly forged bank accounts in the Philippines and testimony about money being bundled into the car of a bank manager.
Cybercriminals in early February attempted to siphon close to $1 billion out of Bangladesh’s account at the New York Fed, Bangladeshi officials have said. Although the sheer volume of attempted transactions raised alarm bells, causing the Fed to block some of the transfers, the thieves managed to funnel $81 million to accounts in the Philippines and $20 million to a bank in Sri Lanka, according to the Bangladeshi officials. The heist led to the resignation of Bangladesh’s top central banker and several other senior officials.
On Thursday, senators in the Philippines heard testimony about what might have happened to money that entered bank accounts in the country’s Rizal Commercial Banking Corp.

RCBC legal counsel Macel Fernandez-Estavillo and an executive at the bank,Romualdo Agarrado, testified at the Senate hearing in Manila that on Feb. 5 around 20 million pesos ($427,000) was withdrawn from one of the four bank accounts that received the funds. Mr. Agarrado said he saw the money taken to the car of Maia Santos Deguito, Manila branch manager with the bank, by one of the bank’s messengers.
Mr. Agarrado said that when RCBC’s head office implemented a Bangladesh central-bank order to freeze the accounts on Feb. 9, the first day of the workweek, Ms. Deguito ignored it. Instead, she moved the money to a foreign-currency account opened Feb. 5 under the name of Centurytex Trading, a local brokerage firm owned by businessman William Go, Mr. Agarrado testified.
Philippines Anti-Money Laundering Council records submitted to the Senate show that $15 million of the stolen money on Feb. 5 was remitted from the account to a local money-transfer company called Philrem. Then, about another $66 million of the funds were transferred to Philrem on Feb. 9.
Philrem President Salud Bautista told the hearing that her company processed a total $80.9 million that came from the foreign-currency account of Mr. Go and Centurytex Trading, and that the requests appeared to be regular bank orders.
Ms. Bautista on Thursday said the company was offering a check for 10.47 million pesos ($223,000) to the Bangladeshi representative at the Senate hearings for the fees the company earned from processing the transactions.

Mr. Go denied that the account was his or his firm’s and authorized RCBC to disclose transactions in it to free the bank from violating the country’s bank secrecy law. An investigation carried out by the private firm Truth Verifier Systems Inc. found that the account, and another opened in July 2014 under the businessman’s name, were forgeries, Ms. Estavillo said.
Ms. Deguito has declined to comment on the allegations against her, insisting at the Senate hearings on her right not to incriminate herself. The Philippines’ Anti-Money Laundering Council has filed a criminal complaint against her with the country’s Department of Justice. She agreed to give her version of events to senators in a closed-door hearing.
The money eventually made it into at least one local casino and two gambling junket operators, the Senate hearing heard Tuesday. In previous Senate testimony, Julia Bacay-Abad, executive director of the Anti-Money Laundering Council, said the money apparently had been used to buy gambling chips. The council’s investigation ended at the casino’s doors, however. Gambling facilities aren’t covered by the Philippines’ Anti-Money Laundering Law.
Meanwhile, in Bangladesh on Wednesday, central-bank officials filed a police report in Dhaka.
The computer terminal that connected Bangladesh’s central-bank computers to the secure interbank messaging system knows as Swift was “unresponsive” on Feb. 6, the morning after the theft, a senior official working at the bank’s secure server room said in the police report seen by The Wall Street Journal.
According to the report, Zubair Bin Huda, the senior official in charge of the glass-walled server room—known as the “Dealing Room”—was concerned when a printer connected to the terminal couldn’t print out the interbank messages received during the night. Mr. Huda said he and other officials went home shortly afterward “since it was the weekend.” Bangladesh’s weekend falls on Friday and Saturday. Mr. Huda couldn’t be reached for comment on Thursday.

It wasn’t until Feb. 7, a Sunday, that the officials started a backup server and manually printed out the messages. The tranche that came out contained up to 35 messages from the New York Fed asking Bangladesh to reconfirm transfer requests of up to $950 million. By then, $101 million already had been wired to the Philippines and Sri Lanka.
The wire transfer of $20 million to Sri Lanka went to the account of a newly formed nongovernmental organization, according to the officials in Dhaka. The Sri Lankan bank handling the account reported the unusual transaction to the country’s central bank and authorities reversed the transfer.
Senior Bangladeshi officials sent urgent messages to the Philippines central bank on Feb. 8 asking it to freeze four accounts at the RCBC where $81 million had flowed, according to the police report.
Bangladesh central-bank officials close to the investigation said the criminals had used malicious code, known as malware, to penetrate its computers. The malware allowed the thieves to monitor the activity and daily routine at the Dealing Room, said one official, who spoke on condition of anonymity.
“They were counting on the likelihood that there wouldn’t be any direct communication between the banks over the weekend,” he said.
A spokeswoman for the New York Fed declined to comment, but previously said the payment instructions the U.S. bank received were “fully authenticated” and there was “no evidence the Fed’s systems were compromised.”
Atiur Rahman, who resigned as governor of Bangladesh Bank, the central bank, on Tuesday, said that the bank was slow to react to the breach because it was a “new and unexpected” challenge. “It took a while to understand what hit us,” he said.
Bangladesh has hired California-based cybersecurity firm FireEye Inc. to spearhead the investigation into the breach. Bryce Boland, FireEye’s chief technology officer for the Asia Pacific region, said: “Whatever the outcome of this investigation, we expect banks will review their security practices.”
Swift has said its core messaging services weren’t affected by the issue and it is working with Bangladesh Bank to “resolve an internal operational issue at the central bank.”

Swift’s terms of service say the customer is responsible for maintaining security on its computers.

DHAKA, Bangladesh—Someone using official codes stole $100 million from Bangladesh’s account at the New York Fed over a recent weekend. Authorities in four countries are still piecing together what happened.
The breach funneled $81 million from the country’s account at the New York Federal Reserve to personal bank accounts in the Philippines. Another $20 million was directed to a bank in Sri Lanka.
In scenes that would be right at home in Hollywood, the unknown criminals sent 35 transfer requests through the Swift interbank messaging system, a Bangladesh Bank official and an official of the Ministry of Finance have said. Whoever made the requests had the necessary codes to authorize Swift transfers and put in the payment requests on a weekend, the officials said.
The incident has led to recriminations, with Bangladesh’s finance minister accusing the Fed of irregularities, and questions being raised about the quality of security in the South Asian country. In an early sign of fallout from the breach, Bangladesh’s central-bank governor, Atiur Rahman , resigned Tuesday.
Mr. Rahman had come under fire from senior ministers who said he didn’t tell the government about the theft fast enough. Although the theft took place Feb. 5, Bangladesh Bank, the central bank, didn’t make a public announcement until last week. The country’s finance minister, Abul Maal Abdul Muhith, said he learned of the heist from news reports.

On Tuesday, Mr. Rahman, who had been the governor of Bangladesh Bank for nearly seven years, said he was taking moral responsibility for the loss of the money. Two deputy governors of Bangladesh Bank were relieved of their duties, Mr Muhith said. He didn’t clarify why they were removed. The officials couldn’t be reached for comment Tuesday.

The Fed declined to comment Tuesday. It has said it is working with Bangladesh to investigate the incident and said none of its systems were compromised.
Interviews with several officials at Bangladesh’s Finance Ministry and its central bank depict a well-planned international caper spanning at least four countries.
The breach began on a quiet Friday last month, when a series of payment instructions arrived at the New York Fed seeking the transfer of nearly $1 billion out of the Bangladeshi account.
The transfer requests, which the Fed says were fully authenticated with the correct bank codes, asked to move the money to private accounts in the Philippines and Sri Lanka and appeared to come from the Bangladeshi central bank’s servers in the capital, Dhaka.


But Friday is the weekend in Bangladesh and the central bank’s offices were closed. By the time officials at Bangladesh Bank returned to work, five requests moving about $100 million had gone through. Further transfers totaling roughly $850 million were blocked after the Fed raised a money-laundering alert, a spokesman for Bangladesh Bank said. The fact that the money was being wired to personal bank accounts in the Philippines rang alarm bells.
The $81 million that did leave the bank for the Philippines ended up in the account of a local businessman before making its way to at least two local casinos, the executive director of the country’s Anti-Money Laundering Council, a government task force, said at a hearing at the Philippine Senate on Tuesday.

Julia Bacay-Abad, executive director of the Anti-Money Laundering Council, said the money had apparently been used to buy gambling chips. The council’s investigation ended at the casino’s doors, however. Gambling facilities aren’t covered by the Philippines’ Anti-Money Laundering Law.

Wireless Camera Finder

“Manila has returned only $68,000 of the money which was left in the bank accounts,” said a Bangladesh Bank official close to the investigation. “Whoever planned it had thought well ahead.”

The $20 million transferred to Sri Lanka went to the account of a newly formed nongovernmental organization, according to the officials in Dhaka. The Sri Lankan bank handling the account reported the unusual transaction to the country’s central bank under that country’s money-laundering laws, and authorities reversed the transfer.

Swift uses a multilayered process to authenticate the financial institutions that are sending and receiving millions of messages each day between one another. A spokeswoman said the messaging system’s core services hadn’t been affected, and said Swift was working with Bangladesh Bank “to resolve an internal operational issue at the central bank.”
Cybersecurity experts say the theft of money from the New York Fed shows the vulnerability of emerging economies like Bangladesh, where the rapid growth of the banking system has outpaced regulations and security systems.


Bangladesh foreign-currency reserves touched a record $28 billion in February. Nearly a third of those are held in liquid form in bank accounts at the Fed and the Bank of England, according to Bangladesh Bank officials.

Your questions and comments are greatly appreciated.

Monty Henry, Owner


NOW, look in on your home, second home, lake house or office anytime, anywhere from any internet connected PC/Lap-top or Internet active cell phone, including iphone or PDA.

Watch your child's caregiver while sitting at a traffic light or lunch meeting, or check on your business security from the other side of the world. Our built-in hidden video features all digital transmissions providing a crystal clear image with zero interference. With the IP receiver stream your video over the internet through your router, and view on either a PC or smart phone. Designed exclusively for DPL-Surveillance-Equipment, these IP hidden wireless cameras come with multiple features to make the user's experience hassle-free.

NOW, look in on your home, second home, lake house or office anytime, anywhere from any internet connected PC/Lap-top or Internet active cell phone, including iphone or PDA: http://www.dpl-surveillance-equipment.com/wireless_hidden_cameras.html

Watch your child's caregiver while sitting at a traffic light or lunch meeting, or check on your business security from the other side of the world. Our built-in hidden video features all digital transmissions providing a crystal clear image with zero interference. With the IP receiver stream your video over the internet through your router, and view on either a PC or smart phone. Designed exclusively for DPL-Surveillance-Equipment, these IP hidden wireless cameras come with multiple features to make the user's experience hassle-free.

• Remote Video Access

• Video is Recorded Locally To An Installed SD Card (2GB SD Card included)

• Email Notifications (Motion Alerts, Camera Failure, IP Address Change, SD Card Full)

• Live Monitoring, Recording And Event Playback Via Internet

• Back-up SD Storage Up To 32GB (SD Not Included)

• Digital Wireless Transmission (No Camera Interference)

• View LIVE On Your SmartPhone!


* Nanny Cameras w/ Remote View
* Wireless IP Receiver
* Remote Control
* A/C Adaptor
* 2GB SD Card
* USB Receiver



Receiver Specs:

* Transmission Range of 500 ft Line Of Sight
* Uses 53 Channels Resulting In No Interference
* 12V Power Consumption
* RCA Output
* Supports up to 32gig SD

Camera Specs:

* 640x480 / 320x240 up to 30fps
* Image Sensor: 1/4" Micron Sensor
* Resolution: 720x480 Pixels
* S/N Ratio: 45 db
* Sensitivity: 11.5V/lux-s @ 550nm
* Video System: NTSC
* White Balance: Auto Tracking

Make Your Own Nanny Cameras:  Make Tons Of Money In A Booming, Nearly Recession-Proof Industry!

Your Primary Customers Include But Are Not Limited To Anyone In The Private Investigator, Government, Law Enforcement And/Or Intelligence Agencies Fields!

* You Buy Our DVR Boards And We'll Build Your Products! (Optional)

Our New Layaway Plan Adds Convenience For Online Shoppers

DPL-Surveillance-Equipment's layaway plan makes it easy for you to buy the products and services that you want by paying for them through manageable monthly payments that you set. Our intuitive calculator allows you to break down your order's purchase price into smaller payment amounts. Payments can be automatically deducted from your bank account or made in cash using MoneyGram® ExpressPayment® Services and you will receive your order once it's paid in full. Use it to plan and budget for holiday purchases, anniversaries, birthdays, vacations and more!

DPL-Surveillance-Equipment's Customers can now use the convenience of layaway online to help them get through these tough economic times.

We all shop now and then just to face a hard reality -- big credit card bills. However, our latest financing innovation can help you avoid that. Find out why more and more shoppers are checking out DPL-Surveillance-Equipment's e-layaway plan.

If you're drooling over a new nanny camera, longing for a GPS tracker, or wishing for that spy watch, but you're strapped for cash and can't afford to do credit, do what Jennie Kheen did. She bought her iPod docking station (hidden camera w/motion-activated DVR) online using our convenient lay-away plan.

Our online layaway plan works like the old-fashioned service stores used to offer. But, in Kheen's case, she went to DPL-Surveillance-Equipment.com, found the iPod docking station (hidden camera w/motion-activated DVR), then set up a payment plan.

"It's automatically drawn from my account," she said. "I have a budget, $208.00 a month.

In three months, Kheen had paid off the $650.00 iPod docking station. She paid another 3.9 percent service fee, which amounted to about $25.35 (plus $12.00 for shipping) for a total of $687.35.

"You pay a little bit each month," Kheen said. "It's paid off when you get it and you don't have it lingering over your head. It's great."

Flexible payment terms and automated payments make our layaway plan an affordable and fiscally responsible alternative to credit cards.

1. Register:

It's quick, easy and FREE! No credit check required!

2. Shop:

Select the items or service you want and choose "e-layaway" as your payment option. Our payment calculator makes it easy for you to set up your payment terms.

3. Make Payments:

Payments are made on the schedule YOU set. Check your order status or adjust your payments online in a secure environment.

4. Receive Products:

Receive the product shortly after your last payment. The best part, it's paid in full... NO DEBT.

More Buying Power:

* Our lay-away plan offers a safe and affordable payment alternative without tying up your credit or subjecting the purchase to high-interest credit card fees.

No Credit Checks or Special Qualifications:

* Anyone 18 years old or older can join. All you need is an active bank account.

Freedom From Credit Cards:

* If you are near or beyond your credit limit or simply want to avoid high interest credit card fees, our e-layaway is the smart choice for you.

Flexible Payment Schedules:

* Similar to traditional layaway, e-layaway lets you make regular payments towards merchandise, with delivery upon payment in full. Payments are automatically deducted from your bank account or made in cash using MoneyGram® ExpressPayment®

A Tool for Planning Ahead:

* Our e-layaway makes it easy for smart shoppers like you to plan ahead and buy items such as bug detectors, nanny cameras, audio bugs, gps trackers, and more!

No Hidden Charges or Mounting Interest:

Our e-layaway makes shopping painless by eliminating hidden charges and monthly interest fees. Our customers pay a flat transaction fee on the initial purchase price.


* You have the right to cancel any purchase and will receive a refund less a cancellation fee. See website for details.

Security and Identity Protection:

DPL-Surveillance-Equipment has partnered with trusted experts like McAfee and IDology to ensure the security and integrity of every transaction. Identity verification measures are integrated into our e-layaway system to prevent fraudulent purchases.

Note: Simply Choose e-Lay-Away as a "Payment Option" in The Shopping Cart

DPL-Surveillance-Equipment.com is a world leader in providing surveillance and security products and services to Government, Law Enforcement, Private Investigators, small and large companies worldwide. We have one of the largest varieties of state-of-the-art surveillance and counter-surveillance equipment including Personal Protection and Bug Detection Products.

Buy, rent or lease the same state-of-the-art surveillance and security equipment Detectives, PI's, the CIA and FBI use. Take back control!


Phone: (1888) 344-3742 Toll Free USA
Local: (818) 344-3742
Fax (775) 249-9320


Google+ and Gmail



AOL Instant Messenger


Yahoo Instant Messenger

Alternate Email Address

Join my Yahoo Group!

My RSS Feed

Bookmark and Share


Post a Comment

Note: Only a member of this blog may post a comment.

<< Home