U




OMB APPROVAL

OMB Number: 3235-0420

Expires: December 31, 2006

Estimated average burden hours per response:  1646


UNITED STATES

SECURITIES AND EXCHANGE COMMISSION

Washington, D.C. 20549


FORM 10-KSB/A

AMENDMENT NO. 2


[X] ANNUAL REPORT UNDER SECTION 13 OR 15 (d) OF THE SECURITIES EXCHANGE ACT OF 1934

                   

FOR THE FISCAL YEAR ENDED DECEMBER 31, 2004


[  ] TRANSITION REPORT UNDER SECTION 13 OR 15 (d) OF THE SECURITIES EXCHANGE ACT OF 1934

             

FROM                          TO                               



VALIDIAN CORPORATION

(Name of small business issuer in its charter)


NEVADA

000-28423

58-2541997

(State or other jurisdiction of incorporation or organization)

Commission File No.

(I.R.S. Employer Identification Number)


30 Metcalfe St., Suite 620, Ottawa, Ontario, Canada

 

K1P 5L4

(Address of principal executive offices)

 

(Zip Code)


Issuer’s telephone number:  613-230-7211


Securities registered under Section 12(b) of the Exchange Act:   none

Securities registered under Section 12(g) of the Exchange Act: Common Stock, par value $.001 per share


Check whether the issuer (1) filed all reports required to be filed by Section 13 or 15(d) of the Exchange Act during the past 12 months (or for such shorter period that the registrant was required to file such reports), and (2) has been subject to such filing requirements for the past 90 days.   YES [X]  NO [   ]


Check if there is no disclosure of delinquent filers in response to Item 405 of Regulation S-B contained in this form, and no disclosure will be contained, to the best of the registrant’s knowledge, in definitive proxy or information statements incorporated by reference in Part III of this Form 10-KSB or any amendment to this Form 10-KSB.  [ X ]   


State issuer’s revenues for its most recent fiscal year.  $

NIL


The aggregate market value of the voting and non-voting common equity held by non-affiliates computed by reference to the average between the closing bid ($0.45) and asked ($0.45) price of the issuer’s Common Stock as of March 11, 2005, was $10,751,737, based upon the average between the closing bid and asked price ($0.45) multiplied by the 23,892,749 shares of the issuer’s Common Stock held by non-affiliates. (In computing this number, issuer has assumed all record holders of greater than 5% of the common equity and all directors and officers are affiliates of the issuer.)


The number of shares outstanding of each of the issuer’s classes of common equity as of March 11, 2005: 31,434,537.


DOCUMENTS INCORPORATED BY REFERENCE:  See Index to Exhibits, page 66.


Transitional Small Business Disclosure Format: Yes [   ]  No [ X ]


SEC 2337 (8-04)

Persons who potentially are to respond to the collection of information contained in this form are not required to respond unless the form displays a currently valid OMB control number.




1






Explanatory Note


This Amendment No. 2 to Form 10-KSB/A amends (1) Part I, Item 1 – Description of Business and (2) Part II, Item 8A – Controls and Procedures of the Amendment No. 1 to the Annual Report on Form 10-KSB/A filed by Validian Corporation on April 22, 2005.



2






PART I


Item 1.  Description of Business.

Summary

Validian Corporation provides software products to assist public and private enterprises address the increasingly complex issues surrounding application security.  Validian ASITM is an application-security software system that protects the exchange of information at the application layer, where the majority of breaches occur, and protects mission-critical applications against hack attacks and unauthorized access, which often occur at the hardware and software perimeter.  Validian ASI makes secure data exchange among applications, including distributed applications, straightforward and affordable for any organization, regardless of size and resources.  Validian ASI facilitates security audit compliance and assurance, whether mandated by government, industry or internal policy; prevents impersonation through application authentication and authorization; delivers confidentiality through application authentication and authorization; and delivers confidentiality through end-to-end encryption of all exchanges, so that data never travels “in the clear”.  Incorporated in the United States, Validian has offices in the United States and Canada.

Our Technology

Our technology is based upon our intellectual property and was used to develop our products.


Our Intellectual Property

Our intellectual property includes an addressing scheme, an authentication process and a key exchange process for all parties to a communication, thus offering an authentication model for secure data exchanges. It also includes an encryption function using standard algorithms that encrypts data from within an originating application and decrypts the data within the receiving application.


Our technology provides benefits, by enabling users:


*

to integrate security and transport in all communication and document exchanges through an integrated approach; and

*

to develop and use existing interactive, distributed applications (like e-commerce, e-banking, e-health and e-loyalty) with an integrated security model.


Based on this technology, we have developed the products described below.

Target Market

Our business strategy is to license our technology either directly or through distribution channels to medium to large organizations that develop, market, sell, distribute or use software products where interaction with a distributed customer, employee and/or partner base is essential.  This includes:


*

corporate IT departments that serve their corporation with a variety of applications and implementation environments, according to the needs of the various internal departments. This implies writing applications to ensure the security of communication between applications and over distributed networks; and


*

independent software vendors and developers serving a relatively large group of customers, on a regional or national basis and who must respond to a variety of conditions and platforms, as imposed by their customers in specific industrial sectors and secure the exchanges between their customers’ partners, suppliers and other participants.



3






Potential customer industrial sectors include, among others:


*

manufacturers in supply management chains;

*

health care providers and suppliers;

*

governments;

*

financial institutions and insurance companies; and

*

software distribution services.


Marketing Strategy and Distribution Channels


We have initiated a marketing program in North America to bring our products to the marketplace. This program has two components: direct and channel sales.


Direct Sales

The direct sales approach entails making high-level contacts within the organizations of target customers to present the benefits and competitive advantages of our products.  Leads to such presentations are generated through existing contacts of management and sales representatives, and through attendance at and participation in specialized e-commerce and computer security trade shows, and the presentation of the benefits of our products in technical seminars attended by personnel with a mandate for application security.  


Channel Sales

In order to penetrate the market for our products, we are attempting to partner with value-added resellers ("VARs"), independent marketing representatives (“IMRs”), system integrators (“SIs”), independent software vendors (“ISVs”) and application service providers (“ASPs”).  Potential partners are being identified based upon their ability to penetrate specific markets more easily than we can. We believe major customers also will act as VARs in their sector.  


Sales representatives and sales agents are promoting our products within these two channels.  The representatives are responding to queries and expressions of interest from those interested in becoming early adopters of our working models.  These early customers and distributors may have an impact on the product development schedule, as we will develop interfaces with users’ existing systems in response to their feedback and individual requirements.


Currently, we have agreements with distribution partners in the U.S., Canada and Mexico.


Marketing Analysis

During the year ended December 31, 2004, we utilized the services of industry specialists in the health care, government and  supply chain management sectors. Their mandate was to identify specific areas and a limited number of corporations where our products would facilitate secure communication and the implementation of a strong security infrastructure with ease of deployment and management.


To support our sales force and these specialists, we have developed technical literature on the following topics:


*

security;

*

features and benefits;

*

integration into current systems;

*

openness of the architecture;

*

future developments; and

*

implementation procedures.



4






Estimated Sales Cycles

We expect that individual sales cycles will be from four to eight months in duration.  The territory where most potential clients reside is expected to be in North America, Europe and Asia Pacific.  We retained two sales representatives in the third quarter of 2002 and two sales agents in the fourth quarter of 2002.  We added one sales representative and three sales agents during the second quarter of 2004.  At March 11, 2005 we had a vice president of sales, two sales representatives, one sales agent and one sales support engineer.  


Marketing Expenses

The main expense factors for our marketing campaign are for:


*

personnel, both internal and outside specialists;

*

buying or renting lists of potential customers for direct marketing campaigns;

*

direct marketing to potential customers;

*

banner advertising on vertical industry websites;

*

participation in trade shows;

*

travel and living expenses;

*

Web site development and maintenance; and

*

literature preparation and distribution.


For more information, please see "Part II. Item 6. Management's Discussion and Analysis or Plan of Operation; Plan of Operations.”


Our Products

Currently, we are offering three main products on a commercial basis.


Our Application Security Infrastructure (ASI)

Our ASI is an application security framework for securing data transport between distributed applications and Web services. ASI is specifically designed to secure communication between distributed applications and distributed networks. It automatically manages all critical security functions for any application, including authentication, encryption, key generation, key distribution, addressing and data transport. ASI delivers messages and files to, and only to, the target destination, and data never travels “in the clear” at any time between applications.


Our Flash Communicator (FC)


Our Flash Communicator (FC) product provides a strong level of security for instant communication and file exchange between authenticated parties.  FC creates “gated communities” of authenticated users.  It offers real-time tools for collaboration between individuals and groups. FC performs encryption of both messages and attachments within its own operation, so that data never travels in the clear at any point in time. Within an FC exchange, all participants are authenticated and messages and large files of most types, including video and audio files, can be transferred encrypted.  We believe that FC is currently the only secure instant messenger residing entirely on USB flash memory devices: the Validian “Flash CommunicatorTM”. FC operates over Validian's Application Security Infrastructure (ASI) and benefits from all the security features of ASI.  





5






Our Software Development Kit (SDK)

We provide an SDK, for rapidly and simply securing data transport between applications through ASI. The SDK includes a complete, integrated and built-in set of control, transport and security features, which are automatically inherited by any applications linked to ASI through the SDK.  Application developers who use the Validian SDK do not have to learn and master any of the various transport and security products or mechanisms to implement security on their applications.  Our SDK establishes low-level IP addresses and ports, and implements complex security features automatically.  This provides the application with a complete communication security chain, as the ASI protection initiates from within the originating application and transports data to within the destination application.  The SDK is offered free of charge to qualified developers and system integrators.


Competition

Competitors for the ASI market are different from competitors for the FC market.


ASI competition

Our ASI product competes primarily with the products described below.


VPN

Virtual Private Networks (VPN) is a technology that ensures a secure communication link between two devices linked to the Internet or any communication network. This type of network security ensures that between those two hardware devices, the data cannot be intercepted and tampered with.


The main supplier of VPN is Check Point Software Technologies Ltd., but a number of suppliers are also offering competing products.


PKI

Public Key Infrastructure (“PKI”) is a sophisticated method of authenticating communicating parties by providing each party with a set of two uniquely linked keys, one private key that is kept by the party and one public key that is published for every one to see. When communicating, messages are encrypted with the private key of the sender and decrypted by the receiver using the public key of the sender. Since both keys are mathematically linked, the receiver is assured that the message is coming from that sender and nobody else.


This exchange mechanism has been extended to protect more applications but we believe that its implementation on a large scale for distributed environment proves difficult and costly.  Main suppliers of PKI include Entrust, Baltimore Technology and Verisign.


SSL

Secure Socket Layer (“SSL”) is a browser level protection offered by Netscape and Microsoft and incorporated in most browsers. SSL establishes a secure connection from a server to a browser requesting access to an application on this server. SSL is a standard widely used across a large number of platforms and systems. However, it relies on a rather weak authentication model, since the browser is not authenticated by the server. This brings a risk of impersonation.


FC Competition

Our FC competes primarily with the following products:





6







Free Instant Messaging (“IM”)

The major suppliers of individual-class, free and unsecure IM systems are Yahoo!, Microsoft and AOL.


Enterprise-class Secure IM

The enterprise-class secure IM industry is in its infancy. Some suppliers offer products but the installed base is still limited. Suppliers include WireRed, Jabber, Bantu, Sigaba, Yahoo, FaceTime and IBM. AOL and Microsoft also have announced products which are in different states of development.  We believe that we have significant technical competitive advantages over those suppliers and we are positioning to be able to take a portion of this market.


Research and Development


We spent the following amounts during the periods mentioned on research and development activities:


Year ended December 31,

2004

2003

  

$1,234,042

$997,822


For more information, see: "Part II. Item 6. Management's Discussion and Analysis or Plan of Operation - Plan of Operations.”


Intellectual Property Protection

We rely on common law and statutory protection of trade secrets and confidentiality agreements. We claim copyright in specific software products and various elements of our core technology. We have registered trademarks in North America and in Europe to cover the Flash Communicator product and the generic term of “FlashWare”, as well as some graphic identification and the Validian name itself.  


Our intellectual property includes an addressing scheme, an authentication process and a key exchange process for all parties to a communication, thus offering a strong trust model for secure exchanges. It also includes an encryption function using standard algorithms that encrypts data from within an originating application and decrypts within the receiving application.


We believe, but we cannot assure, that our technology and its implementation may be patentable.  We have filed two patent applications covering certain aspects of our products.  The initial patent applications  cover the U.S. and Canada.  These may be expanded to other countries as and when we penetrate new markets.  We have defined migration paths for the various products and developed schedules for that migration.  This defines the requirement for additional patent, trademarks and copyright protection, which we plan to apply for as required in order to prevent unauthorized use of our technology.


We cannot assure that we will be able to obtain or to maintain the foregoing intellectual property protection.  We also cannot assure that our technology does not infringe upon the intellectual property rights of others.  In the event that we are unable to obtain the foregoing protection or our technology infringes intellectual property rights of others, our business and results of operations could be materially and adversely affected.  For more information please see “Risk Factors - We may not be able to protect and enforce our intellectual property rights which could result in the loss of our right, loss of business or increase our costs.” below.




7






Employees


As at December 31, 2004, we had thirteen full-time employees and contractual personnel, including three executive officers, six sales and marketing staff, two product development personnel, and two in administration.  Eleven are located in Ottawa, Canada, one is located in Washington, DC, one is located in Memphis, Tennessee. In addition, we contract with an independent software development group in Europe, who had twenty-seven individuals deployed to our contract on a full-time basis as at December 31, 2004. We also regularly engage technical consultants and independent contractors to provide specific advice or to perform certain marketing or technical tasks.


Risk Factors


Our business operations and our securities are subject to a number of substantial risks, including those described below. If any of these or other risks actually occur, our business, financial condition and operating results, as well as the trading price or value of our securities could be materially adversely affected.


We are a development stage company, and our limited operating history makes evaluating our business and prospects difficult.


We are a development stage company, and our limited operating history makes it difficult to evaluate our current business and prospects or to accurately predict our future revenues or results of operations. The commercial acceptance of our products is unproven and therefore we may not be able to generate a sufficient number of revenue-paying customers to sustain operations.  Our revenue and income potential are unproven, and our business plan is constantly evolving. The Internet is constantly changing and software technology is constantly improving, therefore we may need to continue to modify our business plan to adapt to these changes. As a result of our being in the early stages of development, particularly in the emerging technology industry, we are more vulnerable to risks, uncertainties, expenses and difficulties than more established companies.  As a result, we may never achieve profitability and we may not be able to continue operations if we cannot successfully address the risks associated with early stage development companies in emerging technologies.


We have a history of operating losses and we anticipate losses and negative cash flow for the foreseeable future.  Unless we are able to generate profits and positive cash flow we may not be able to continue operations.  


We incurred an operating loss of $5,709,516 and negative cash flow from operations of $4,323,111 during the year ended December 31, 2004.  During the year ended December 31, 2003, we incurred an operating loss of $2,929,255 and negative cash flow from operations of $955,256.  We expect operating losses and negative cash flow from operations to continue for the foreseeable future.


We will need to generate significant revenues to achieve profitability. Consequently, we may never achieve profitability.  Even if we do achieve profitability, we may not sustain or increase profitability on a quarterly or annual basis in the future. If we are unable to achieve or sustain profitability in the future, we may be unable to continue our operations.




8






Our auditors have drawn readers’ attention to the uncertainty of our ability to continue as a going concern.


Our independent certified public accountants have added an explanatory paragraph to their audit opinion issued in connection with our consolidated financial statements.  It states that our ability to continue as a going concern is uncertain due to our history of operating losses and difficulty in generating operating cash flows.  Our consolidated financial statements do not include any adjustments that might result from the outcome of this uncertainty.  These adjustments might include changes in the possible future recoverability and classification of assets or the amounts and classification of liabilities that might result from the outcome of this uncertainty.


We will require additional capital to proceed with our business plan.  If we are unable to obtain such capital we will be unable to proceed with our business plan and we will be forced to limit or curtail our operations.


We will require additional working capital to proceed with our business plan. For a discussion of our capital requirements, see the disclosure in "Part II. Item 6. Management's Discussion and Analysis or Plan of Operation; Plan of Operations.”  We do not currently have a commitment from any third party to provide financing and may be unable to obtain financing on reasonable terms or at all.  Furthermore, if we raise additional working capital through equity, our shareholders will experience dilution.  If we are unable to raise additional financing as required, we will be unable to grow or maintain our current level of business operations and, in fact, we will be forced to limit or curtail our operations.


The loss of any of our key personnel would likely have an adverse effect on our business.


Our future success depends, to a significant extent, on the continued services of our key personnel.  Our loss of any of these key persons most likely would have an adverse effect on our business.  Competition for personnel throughout the industry is intense and we may be unable to retain our current personnel or attract, integrate or retain other highly qualified personnel in the future.  If we do not succeed in retaining our current personnel or in attracting and motivating new personnel, our business could be materially adversely affected.


The business environment is highly competitive and, if we do not compete effectively, we may experience material adverse effects on our operations.


The market for Internet security products and services is intensely competitive and we expect competition to increase in the future.  We compete with large and small companies that provide products and services that are similar to some aspects of our security services.  Our competitors may develop new technologies in the future that are perceived as being more secure, effective or cost efficient than the technology underlying our security services.  In particular, the Internet security market has historically been characterized by low financial entry barriers.


Some of our competitors have longer operating histories, greater name recognition, access to larger customer bases and significantly greater financial, technical and marketing resources than we do.  As a result, they may be able to adapt more quickly to new or emerging technologies and changes in customer requirements or to devote greater resources to the promotion and sale of their products than we will.  We believe that there may be increasing consolidation in the Internet security market and this consolidation may materially adversely affect our competitive position.  In addition, our competitors may have established or may establish financial or strategic relationships among themselves, with existing or potential customers, resellers or other third parties and rapidly acquire significant market share.  If we cannot compete effectively, we may experience future price reductions, reduced gross margins and loss of market share, any of which will materially adversely affect our business, operating results and financial condition.



9






If we are unable to develop market recognition, we may be unable to generate significant revenues and our results of operations may be materially adversely affected.


To attract customers we may have to develop a market identity and increase public awareness of our technology and products. To increase market awareness of our technology and our products, we will continue to make significant expenditures for marketing initiatives. However, these activities may not result in significant revenue and, even if they do, any revenue may not offset the expenses incurred in building market recognition. Moreover, despite these efforts, we may not be able to increase public awareness of our technology and our products, which would have a material adverse effect on our results of operations.


We must establish and maintain strategic and other relationships.


One of our significant business strategies has been to enter into strategic or other similar collaborative relationships in order to reach a larger customer base than we could reach through our direct sales and marketing efforts.  We may need to enter into additional relationships to execute our business plan.  We may not be able to enter into additional, or maintain our existing, strategic relationships on commercially reasonable terms.  If we fail to enter into additional relationships, or maintain our existing relationships, we would have to devote substantially more resources to the distribution, sale and marketing of our security services and communications services than we would otherwise.


Our success in obtaining results from these relationships will depend both on the ultimate success of the other parties to these relationships and on the ability of these parties to market our products successfully.


Furthermore, our ability to achieve future growth will also depend on our ability to continue to establish direct seller channels and to develop multiple distribution channels.  Failure of one or more of our strategic relationships to result in the development and maintenance of a market for our services could harm our business.  If we are unable to maintain our relationships or to enter into additional relationships, this could harm our business.


If we are unable to respond to rapid technological change and improve our products and services, our business could be materially adversely affected.


The Internet security industry is characterized by rapid technological advances, changes in customer requirements, frequent new product introductions and enhancements and evolving industry standards in computer hardware and software technology.  As a result, we must continually change and improve our products in response to changes in operating systems, application software, computer and communications hardware, networking software, programming tools and computer language technology.  The introduction of products embodying new technologies and the emergence of new industry standards may render existing products obsolete or unmarketable.  In particular, the market for Internet and intranet applications is relatively new and is rapidly evolving.  Our future operating results will depend upon our ability to enhance our current products and to develop and introduce new products on a timely basis that address the increasingly sophisticated needs of our end-users and that keep pace with technological developments, new competitive product offerings and emerging industry standards.  If we do not respond adequately to the need to develop and introduce new products or enhancements of existing products in a timely manner in response to changing market conditions or customer requirements, our operating results may be materially diminished.




10






New products and services developed or introduced by us may not result in any significant revenues.


We must commit significant resources to develop new products and services before knowing whether our investments will result in products and services the market will accept.  The success of new products and services depends on several factors, including proper new definition and timely completion, introduction and market acceptance.  There can be no assurance that we will successfully identify new product and service opportunities, develop and bring new products and services to market in a timely manner, or achieve market acceptance of our products and services, or that products, services and technologies developed by others will not render our products, services or technologies obsolete or non-competitive.  Our inability to successfully market new products and services may harm our business.


We may not be able to protect and enforce our intellectual property rights, which could result in the loss of our rights, loss of business or increased costs.


Our success depends to a significant degree upon the protection of our software and other proprietary technology.  The unauthorized reproduction or other misappropriation of our proprietary technology would enable third parties to benefit from our technology without paying us for it.  We rely on a combination of patent, trademark, trade secret and copyright laws, license agreements and non-disclosure and other contractual provisions to protect proprietary and distribution rights of our products.  We have registered trademarks in the United States, Canada and Europe and have filed two patent applications, one in Canada and the other in the U.S., for our technology.  Although we have taken steps to protect our proprietary technology, they may be inadequate and the unauthorized use thereof could have a material adverse effect on our business, results of operations and financial condition.  Existing trade secret, copyright and trademark laws offer only limited protection.  Moreover, the laws of other countries in which we market our products may afford little or no effective protection of our intellectual property.  If we resort to legal proceedings to enforce our intellectual property rights, the proceedings could be burdensome and expensive, even if we were to prevail.


Claims by third parties that we infringe upon their proprietary technology could hurt our financial condition.


If we discover that any of our products or technology we license from third parties violates third party proprietary rights, we may not be able to reengineer our product or obtain a license on commercially reasonable terms to continue offering the product without substantial reengineering.    In addition, product development is inherently uncertain in a rapidly evolving technology environment in which there may be numerous patent applications pending for similar technologies, many of which are confidential when filed.  Although we sometimes may be indemnified by third parties against claims that licensed third party technology infringes proprietary rights of others, this indemnity may be limited, unavailable or, where the third party lacks sufficient assets or insurance, ineffective.  We currently do not have liability insurance to protect against the risk that our technology or future licensed third party technology infringes the proprietary rights of others.  Any claim of infringement, even if invalid, could cause us to incur substantial costs defending against the claim and could distract our management from our business.  Furthermore, a party making such a claim could secure a judgment that requires us to pay substantial damages.  A judgment could also include an injunction or other court order that could prevent us from selling our products.  Any of these events could have a material adverse effect on our business, operating results and financial condition.




11






If our electronic security technology were breached, our business would be materially adversely affected.


A key element of our technology and products is our Internet security feature.  If anyone is able to circumvent our security measures, they could misappropriate proprietary information or cause interruptions or problems with hardware and software of customers using our products.  Any such security breaches could significantly damage our reputation.  In addition, we could be liable to our customers for the damages caused by such breaches or we could incur substantial costs as a result of defending claims for those damages. We may need to expend significant capital and other resources to protect against such security breaches or to address problems caused by such breaches. Security measures taken by us may not prevent disruptions or security breaches.    In the event that future events or developments result in a compromise or breach of the technology we use to protect a customer's personal information, our financial condition and business could be materially adversely affected.  


We face restrictions on the exportation of our encryption technology, which could limit our ability to market our products outside of the United States, Canada and Europe.


Some of our Internet security products utilize and incorporate encryption technology.  Exports of software products utilizing encryption technology are generally restricted by the United States and various non-United States governments, particularly in response to the terrorist acts of September 11, 2001.  If we do not obtain the required approvals, we may not be able to sell some of our products in international markets, which could materially adversely affect our results of operations.


Our operating results may prove unpredictable, and may fluctuate significantly.


Our operating results are likely to fluctuate significantly in the future due to a variety of factors, many of which are outside of our control.  Factors which may cause operating results to fluctuate significantly include the following:


*

new technology or products introduced by us or by our competitors;

*

the timing and uncertainty of sales cycles and seasonal declines in sales;

*

our success in marketing and market acceptance of our products and services by our existing customers and by new customers;

*

a decrease in the level of spending for information technology-related products and services by our existing and potential customers; and

*

general economic conditions, as well as economic conditions specific to users of our products and technology.


Our operating results may be volatile and difficult to predict.  As such, future operating results may fall below the expectations of securities analysts and investors.  In this event, the trading price of our common stock may fall significantly.  


We expect to generate some revenues and incur some operating expenses outside of the United States.  If applicable currency exchange rates fluctuate our revenues and results of operations may be materially and adversely affected.


We expect that some portion of our revenues will be based on sales provided outside of the United States.  In addition, we expect that a significant portion of our operating expenses will be incurred outside of the United States.  As a result, our financial performance will be affected by fluctuations in the value of the U.S. dollar to foreign currency. At the present time, we have no plan or policy to utilize forward contracts or currency options to minimize this exposure, and even if these measures are implemented there can be no assurance that such arrangements will be available, be cost effective or be able to fully offset such future currency risks.



12






Other risks associated with international operations could adversely affect our business operations and our results of operations.


There are certain risks inherent in doing business on an international level, such as:


*

unexpected changes in regulatory requirements, export and import restrictions;

*

controls relating to encryption technology that may limit sales sometime in the future;

*

legal uncertainty regarding liability and compliance with foreign laws;

*

competition with foreign companies or other domestic companies entering into the foreign markets in which we operate;

*

tariffs and other trade barriers and restrictions;

*

difficulties in staffing and managing foreign operations;

*

longer sales and payment cycles;

*

problems in collecting accounts receivable;

*

political instability;

*

fluctuations in currency exchange rates;

*

software piracy;

*

seasonal reductions in business activity during the summer months in Europe and elsewhere; and

*

potentially adverse tax consequences.


Any of these factors could adversely impact the success of our international operations. One or more of such factors may impair our future international operations and our overall financial condition and business prospects.


Our common stock price may be volatile.


The market prices of securities of Internet and technology companies are extremely volatile and sometimes reach unsustainable levels that bear no relationship to the past or present operating performance of such companies. Factors that may contribute to the volatility of the trading price of our common stock include, among others:


*

our quarterly results of operations;

*

the variance between our actual quarterly results of operations and predictions by stock analysts;

*

financial predictions and recommendations by stock analysts concerning Internet companies and companies competing in our market in general, and concerning us in particular;

*

public announcements of technical innovations relating to our business, new products or technology by us or our competitors, or acquisitions or strategic alliances by us or our competitors;

*

public reports concerning our products or technology or those of our competitors; and

*

the operating and stock price performance of other companies that investors or stock analysts may deem comparable to us.


In addition to the foregoing factors, the trading prices for equity securities in the stock market in general, and of Internet-related companies in particular, have been subject to wide fluctuations that may be unrelated to the operating performance of the particular company affected by such fluctuations.  Consequently, broad market fluctuations may have an adverse effect on the trading price of our common stock, regardless of our results of operations.




13






There is a limited market for our common stock.  If a substantial and sustained market for our common stock does not develop, our shareholders' ability to sell their shares may be materially and adversely affected.


Our common stock is tradable in the over-the-counter market and is quoted on the OTC Bulletin Board. Many institutional and other investors refuse to invest in stocks that are traded at levels below the Nasdaq Small Cap Market which could make our efforts to raise capital more difficult.  In addition, the firms that make a market for our common stock could discontinue that role.  OTC Bulletin Board stocks are often lightly traded or not traded at all on any given day.  We cannot predict whether a more active market for our common stock will develop in the future.  In the absence of an active trading market:


*

investors may have difficulty buying and selling or obtaining market quotations;

*

market visibility for our common stock may be limited; and

*

a lack of visibility for our common stock may have a depressive effect on the market price for our common stock.


Shares issuable upon the exercise of options, warrants and convertible debentures or under anti-dilution provisions in certain agreements could dilute stock holdings and adversely affect our stock price.


We have issued options and warrants to acquire common stock to our employees and certain other persons at various prices, some of which are, or may in the future have, exercise prices at or below the market price of our stock.  As of March 11, 2005 we have outstanding options and warrants, to purchase a total of 17,054,135 shares of our common stock.  Of these options and warrants, 10,986,833 have exercise prices above the recent market price of $0.45 per share (as of March 11, 2004), and 6,067,302 have exercise prices at or below this recent market price.  If exercised, these options and warrants will cause immediate and possibly substantial dilution to our stockholders.


We have two existing stock option plans, one of which has no shares remaining for issuance as of March 11, 2005, the second of which has 2,637,698 shares remaining for issuance as of March 11, 2005.  Future options issued under the plan may have further dilutive effects.


The holders of our convertible debentures have the option of converting outstanding principal plus interest thereon into shares of our common stock at a ratio of one common share for every $0.50 of debt converted.  Any such conversion would have a dilutive effect on stockholders.


Issuance of shares pursuant to the exercise of options, warrants, anti-dilution provisions, or the conversion of debentures, could lead to subsequent sales of the shares in the public market, which could depress the market price of our stock by creating an excess in supply of shares for sale.  Issuance of these shares and sale of these shares in the public market could also impair our ability to raise capital by selling equity securities.


A large number of shares will be eligible for future sale and may depress our stock price.


As of March 11, 2005, we had outstanding 31,434,537 shares of common stock of which approximately 11,310,512 shares were "restricted securities" as that term is defined under Rule 144 promulgated under the Securities Act of 1933.  These restricted shares are eligible for sale under Rule 144 at various times, including 3,963,512 shares which will become free trading effective June 1, 2005.  No prediction can be made as to the effect, if any, that sales of shares of common stock or the availability of such shares for sale will have on the market prices prevailing from time to time.  Nevertheless, the possibility that substantial amounts of our common stock may be sold in the public market may adversely affect prevailing market prices for the common stock and could impair our ability to raise capital through the sale of our equity securities.



14






We do not intend to pay dividends in the near future.


Our board of directors determines whether to pay dividends on our issued and outstanding shares.  The declaration of dividends will depend upon our future earnings, our capital requirements, our financial condition and other relevant factors.  Our board does not intend to declare any dividends on our shares for the foreseeable future.


Our common stock may be deemed to be a "penny stock."  As a result, trading of our shares may be subject to special requirements that could impede our shareholders' ability to resell their shares.


Our common stock may be deemed to be a "penny stock" as that term is defined in Rule 3a51-1 of the Securities and Exchange Commission.  Penny stocks include stocks:


*

that are not traded on a national securities exchange that has been continuously registered since April 20, 1992 and has maintained quantitative initial and continued listing standards that are substantially similar to or stricter than the listing standards in place at January 8, 2004;

*

that are not traded on a securities exchange, a “junior tier” of an exchange or an automated quotation system sponsored by a registered national securities association that has established initial listing standards that meet or exceed specified criteria and maintains similar quantitative continued listing standards; or

*

of issuers with net tangible assets less than:


*

$2,000,000 if the issuer has been in continuous operation for at least three years; or

*

$5,000,000 if in continuous operation for less than three years, or

*

of issuers with average revenues of less than $6,000,000 for the last three years.


Section 15(g) of the Exchange Act, and Rule 15g-2 of the Securities and Exchange Commission, require broker-dealers dealing in penny stocks to provide potential investors with a document disclosing the risks of penny stocks not less than two business days before a transaction is effected and to obtain a manually signed and dated written receipt of the document before effecting any transaction in a penny stock for the investor's account.  Moreover, Rule 15g-9 of the Securities and Exchange Commission requires broker-dealers in penny stocks to approve the account of any investor for transactions in such stocks before selling any penny stock to that investor.  This procedure requires the broker-dealer:


*

to obtain from the investor information concerning his or her financial situation, investment experience and investment objectives;

*

to determine reasonably, based on that information, that transactions in penny stocks are suitable for the investor and that the investor has sufficient knowledge and experience as to be reasonably capable of evaluating the risks of penny stock transactions;

*

to provide, not less than two business days before a transaction is effected, the investor with a written statement setting forth the basis on which the broker-dealer made the determination in the second bullet above; and

*

to receive a signed and dated copy of such statement from the investor, confirming that it accurately reflects the investor's financial situation, investment experience and investment objectives.  


Compliance with these requirements may make it more difficult for holders of our common stock to resell their shares to third parties or to otherwise dispose of them.





15






Our current executive officers, directors and major shareholders own a significant percentage of our voting stock. As a result, they exercise significant control over our business affairs and policy.


As of March 11, 2005, our current executive officers, directors and holders of 5% or more of our outstanding common stock together beneficially owned approximately 35% of the outstanding common stock if they exercised all of the options and warrants held by them.  These shareholders are able to significantly influence all matters requiring approval by shareholders, including the election of directors and the approval of significant corporate transactions. This concentration of ownership may also have the effect of delaying, deterring or preventing a change in control and may make some transactions more difficult or impossible to complete without the support of these shareholders.


Our restated articles of incorporation contain provisions that could discourage an acquisition or change of control of our company.


Our restated articles of incorporation authorize our board of directors to issue preferred stock without stockholder approval.  Provisions of our certificate of incorporation, such as the provision allowing our board of directors to issue preferred stock with rights more favorable than our common stock, could make it more difficult for a third party to acquire control of us, even if that change of control might benefit our stockholders.


We currently do not have an effective system of internal controls, and therefore we may not be able to detect fraud or report our financial results accurately, which could harm our business.


Effective internal controls are necessary for us to provide reliable financial reports and to detect and prevent fraud.  We periodically assess our system of internal controls to review their effectiveness and identify potential areas of improvement.  These assessments may conclude that enhancements, modifications or changes to our system of internal controls are necessary.  Performing assessments of internal controls, implementing necessary changes, and maintaining an effective internal controls process is expensive and requires considerable management attention.  Internal control systems are designed in part upon assumptions about the likelihood of future events, and all such systems, however well designed and operated, can provide only reasonable, and not absolute, assurance that the objectives of the system are met. A consequence of these and other inherent limitations of control systems is that there can be no assurance that any design will succeed in achieving its stated goals under all potential future conditions, regardless of how remote.  If we fail to implement and maintain an effective system of internal controls or prevent fraud, we could suffer losses, could be subject to costly litigation, investors could lose confidence in our reported financial information, and our image and operating results could be could be harmed, which could have a negative effect on the trading price of our common stock.


In connection with the audit of our consolidated financial statements for the year ended December 31, 2004, our independent registered public accounting firm advised the Board of Directors and management of certain significant internal control deficiencies that they considered to be, in the aggregate, a material weakness.  In particular, our independent registered public accounting firm identified the following weaknesses in our internal control system:  (1) a lack of segregation of duties; (2) a lack of formal procedures relating to all areas of financial reporting; (3) the failure to timely record on our books one conversion of our 4% convertible debentures; (4) the lack of timely preparation of certain back up schedules; and (5) the failure to sufficiently review financial statements and disclosures in this report prior to delivering a draft to our independent registered public accounting firm for review.  Because of the size and resources of our company, we may not be able to remediate in the foreseeable future all of the deficiencies identified.  If we are unable to remediate the identified material weakness, there is a more than remote likelihood that a material misstatement to our SEC reports will not be prevented or detected, in which case investors could lose confidence in the accuracy and completeness of our financial reports,



16






which could have an adverse effect on our ability to raise additional capital and could also have an adverse effect on our stock price.  See “Item 8A.  Controls and Procedures.”


We may have difficulty implementing in a timely manner the internal controls procedures necessary to allow our management to report on the effectiveness of our internal controls, and we may incur substantial costs in order to comply with the requirements of the Sarbanes-Oxley Act of 2002.


The Sarbanes-Oxley Act of 2002 has introduced many new requirements applicable to us regarding corporate governance and financial reporting.  Among many other requirements is the requirement under Section 404 of the Act for management to report on our internal controls over financial reporting and for our registered public accountant to attest to this report.  We are required to comply with Section 404 effective the fiscal year ending December 31, 2007.  Although our management has begun the necessary processes and procedures for issuing its report on our internal controls, we cannot be certain that we will be successful in complying with Section 404.  We expect to devote substantial time and incur costs during fiscal 2005, 2006 and 2007 to implement appropriate controls and procedures to ensure compliance.  If we are not able to timely comply with the requirements set forth in Section 404, we might be subject to sanctions or investigations by regulatory authorities.  Any such action could adversely affect our business and financial results.


Our Corporate History


We were incorporated in Nevada on April 12, 1989 as CCC Funding Corp. to seek out one or more potential business ventures.  On January 28, 2003, we changed our name from Sochrys.com Inc. to Validian Corporation.


Item 8A.  Controls and Procedures.

The term “disclosure controls and procedures” is defined in Rules 13a-15(e) and 15d-15(e) of the Securities Exchange Act of 1934, or the Exchange Act.  This term refers to the controls and procedures of a company that are designed to ensure that information required to be disclosed by a company in the reports that it files or submits under the Exchange Act is recorded, processed, summarized and reported within the time periods specified by the Securities and Exchange Commission.  

In connection with the audit of our consolidated financial statements for the year ended December 31, 2004, our independent registered public accounting firm advised the Board of Directors and management of certain significant internal control deficiencies that they considered to be, in the aggregate, a material weakness.  In particular, our independent registered public accounting firm identified the following weaknesses in our internal control system:  (1) a lack of segregation of duties; (2) a lack of formal procedures relating to all areas of financial reporting; (3) the failure to timely record on our books one conversion of our 4% convertible debentures; (4) the lack of timely preparation of certain back up schedules; and (5) the failure to sufficiently review financial statements and disclosures in this report prior to delivering a draft to our independent registered public accounting firm for review.  The independent registered public accounting firm indicated that they considered these deficiencies to be reportable conditions as that term is defined under standards established by the American Institute of Certified Public Accountants.  A material weakness is a significant deficiency in one or more of the internal control components that alone or in the aggregate precludes our internal controls from reducing to an appropriately low level of risk that material misstatements in our financial statements will not be prevented or detected on a timely basis.  We considered these matters in connection with the period-end closing of accounts and preparation of the related consolidated financial statements and determined that no prior period financial statements were materially affected by such matters.  Notwithstanding the material weakness identified by our independent registered public accountants, we believe that the financial statements, and other financial



17






information included in this report, fairly present in all material respects the financial condition, results of operation and cash flows of the Company as of, and for, the periods represented in this report.

We were unable to implement improvements in all areas of concern with respect to the period covered by this report.  However, we began to implement some of the steps identified below to remediate the material weakness, to the extent that our size and resources allowed us, commencing during the second quarter of 2004.

Lack of segregation of duties.  Since commencing the development phase of our operations in August 1999, our size has prevented us from being able to employ sufficient resources to enable us to have an adequate level of supervision and segregation of duties within our internal control system.  We currently have only three people involved with the processing of accounting entries:  the Office Administrator, the Controller and the Chief Financial Officer.  Therefore, it is difficult to effectively segregate accounting duties.  While we strive to segregate duties as much as practicable, there is insufficient volume of transactions to justify additional full time staff.  We are currently seeking, but cannot be assured that we will be able to find, a qualified part time person to perform routine, month end accounting procedures.  As a result, this significant internal control deficiency had not been remediated as of the end of the period covered by this report, nor do we know if we will be able to remediate this weakness in the foreseeable future.  However, we will continue to monitor and assess the costs and benefits of additional staffing

Lack of formal procedures during part of the year.  During the first part of 2004, the only person directly involved in the accounting process was the Controller.  The then Chief Financial Officer (who was also the Chief Executive Officer) reviewed the quarterly financial information prior to its release.  With the addition of the current Chief Financial Officer during the first quarter of 2004, more formal month end procedures were introduced, the primary objective of which was to produce more timely internal and external financial reports.  An Office Administrator was hired during the third quarter of 2004, and some accounting procedures became part of her regular duties.  As of the end of the period covered by this report, we believe that this significant internal control deficiency had been remediated.

Lack of timely accounting for transactions entered into during the year.  During the course of the audit work in respect of our December 31, 2004 financial statements, our independent registered public accountants identified a failure to timely record the accounting entries related to a conversion notice which we received in July 2004 from one of the holders of our 4% convertible debentures.  Immediately after this failure was identified during the first quarter of 2005, we instituted a requirement that all conversion notices be “signed off” by the Chief Financial Officer and one of either the Chief Executive Officer or the Executive Vice President.  Since that date, we have received two sets of conversion notices, the new control has been followed and we have not had a subsequent failure to timely record the accounting entries related to a conversion notice.  We believe that this significant internal control deficiency existed as of the end of the period covered by this report.  However, we believe that it was remediated during the fiscal quarter immediately following the period covered by this report.

Lack of timely preparation of back up schedules.  During the third and fourth quarters of 2004, we expanded our accounting system in order to facilitate the more timely preparation of financial reports, and we involved the Office Administrator in some of the data entry functions of the accounting department.  Notwithstanding these measures and the more formal month end procedures implemented by us commencing in the second quarter of 2004, we continued to experience challenges in preparing our periodic external reports on a timely basis, primarily as a result of an increase in our internal and external reporting requirements due to the expansion of our operations.

When our independent registered public accountants’ audit staff arrived to start their field work of our 2004 financial statements, not all of the back up schedules had been prepared.  Some of the back up schedules that we prepare to support the information in the financial statements and Form 10-KSB were not



18






completed by us until the later stages of the field work.  As we completed the back up schedules, we identified some adjusting entries that were required to provide complete, accurate disclosure.  Our failure to timely prepare all of the relevant back-up schedules resulted in a delay in the process which contributed to our not being able to file our Form 10-KSB for the year ended December 31, 2004 until April 15, 2005.  In fact, our inability to be prepared on time for our independent registered public accountants’ periodic scheduled field work caused us difficulty in meeting our filing deadlines throughout 2004.

While we did not file our Form 10-QSB for the quarter ended March 31, 2005 until May 20, 2005, we were able to complete most of our back up schedules prior to the arrival of our independent registered public accountants’ staff for the review of our June 30, 2005 financial reporting, and we were able to file our Form 10-QSB for the quarter then ended on August 15, 2005.  As such, we believe that this significant internal control deficiency had not been remediated as of the end of the period covered by this report, nor during the immediately following fiscal quarter.  However, we believe significant progress was made in the remediation of this significant internal control deficiency during the second fiscal quarter of 2005.  One of our objectives in seeking a qualified part time person to perform routine, month end accounting procedures, is to improve the timeliness of preparation of back up schedules and thus permit us to complete our financial reporting on a more timely basis.

Lack of timely review of financial statements and disclosures.  One of the consequences of our lack of timely preparation of back up schedules in time for start of the 2004 audit field work, and subsequent identification of adjusting entries, was the lack of timely review of the financial statements and Form 10-KSB.  In effect, we were performing our internal review of the disclosures at the same time as our independent registered public accountants, in order to meet the filing deadline.  As such, errors were not identified prior to providing our independent registered public accountants with the draft document for their review.  We believe this significant internal control deficiency existed throughout 2004.  Due to timing, we were not able to institute any procedures to remediate this concern with respect to the year ended December 31, 2004, therefore we believe this significant internal control deficiency existed as of the end of the period covered by this report.  As a result of improving our readiness prior to the arrival of our independent registered public accountants’ staff, beginning in the second quarter of 2005, we have instituted procedures for a more complete review of all drafts of the financial statements and related disclosure documents prior to releasing them to our independent registered public accountants for their review.  As such, we believe this significant internal control deficiency was remediated as of the end of the second quarter of 2005.

If we are unable to remediate the identified material weakness, there is a more than remote likelihood that a material misstatement to our SEC reports will not be prevented or detected, in which case investors could lose confidence in the accuracy and completeness of our financial reports, which could have an adverse effect on our ability to raise additional capital and could also have an adverse effect on our stock price.

As required by the SEC rules, we have evaluated the effectiveness of the design and operation of our disclosure controls and procedures as of the end of the period covered by this Report.  This evaluation was performed under the supervision and with the participation of our management, including the President and Chief Executive Officer and Chief Financial Officer and Treasurer.  Based upon that evaluation, our President and Chief Executive Officer and Chief Financial Officer and Treasurer have concluded that our controls and procedures were not effective as of the end of the period covered by this Report due to the existence of the significant internal control deficiencies described above.


None of the new procedures discussed above were implemented during the quarter ended December 31, 2004, and no change in our internal control over financial reporting occurred during the quarter ended December 31, 2004 that has materially affected, or is reasonably likely to materially affect, our internal controls over financial reporting.



19







Item 13.

  Exhibits


Exhibit No.

 

Document Description

3.1

 

Restated Articles of Incorporation (1)

3.2

 

Amendment to Articles of Incorporation (5)

3.3

 

By-Laws (2)

3.4

 

Amendment to By-Laws (1)

4.1

 

Form of Class B Warrants (2)

4.2

 

Form of Class E Warrants (1)

4.3

 

Form of Class F Warrants (1)

4.4

 

Form of Class G Warrants (1)

4.5

 

Form of Class H Warrants (1)

4.6

 

Form of Class I Warrants (3)

4.7

 

Form of 12% Promissory Note (1)

4.8

 

Form of 4% Convertible Debenture (1)

10.1

 

Registration Rights Agreement, dated as of March 8, 2004 by and among the Company and each entity named on the signature page thereto (3)

10.2

 

Securities Purchase Agreement, dated as of March 8, 2004 by and among the Company and each entity named on the signature page thereto (3)

10.3

 

Securities Purchase Agreement in respect of the 4% Convertible Debenture, dated as of December 30, 2003 by and between Validian Corporation and each individual or entity named on a signature page thereto (1)

10.4

 

Registration Rights Agreement, dated as of December 30, 2004 by and between the Company and each entity named on the signature page thereto (1)

10.5

 

Amended and Restated Incentive Equity Plan (4)

10.6

 

Validian Corporation 2004 Incentive Equity Plan (4)

10.7

 

Commercial Lease dated April 15, 2004 between Validian Corporation and National Capital Commission (5)

10.8

21.1

 

Employment Agreement with Andre Maisonneuve * (5)

List of Subsidiaries (5)

31.1

 

Certification of Chief Executive Officer Pursuant to Section 302

31.2

 

Certification of Chief Financial Officer Pursuant to Section 302

___________________________________________

*

Denotes management contract


(1)

Previously filed as an exhibit to our Annual Report on Form 10-KSB, SEC File No. 0-28423, filed with the Commission on March 30, 2004 and incorporated herein by reference.


 (2)

Previously filed as an Exhibit to our Registration Statement on Form 10-SB, SEC File No. 0-28423, filed with the Commission on December 9, 1999 and incorporated herein by reference.


 (3)

Previously filed as an Exhibit to our Current Report on Form 8-K, SEC File No. 0-28423, filed with the Commission on March 8, 2004 and incorporated herein by reference.


 (4)

Previously filed as an Exhibit to our Amended Proxy Statement, filed with the Commission on January 12, 2005 and incorporated herein by reference.


 (5)

Previously filed as an Exhibit to our Annual Report on Form 10-KSB for the year ended December 31, 2004, filed with the Commission on April 14, 2005 and incorporated herein by reference.


Statements contained in this Form 10-KSB as to the contents of any agreement or other document referred to are not complete, and where such agreement or other document is an exhibit to this Report or is included in any forms indicated above, each such statement is deemed to be qualified and amplified in all respects by such provisions.




20






SIGNATURES


In accordance with Section 13 or 15(d) of the Securities Exchange Act of 1934, the small business issuer has duly caused this report to be signed on its behalf by the undersigned, thereunto duly authorized.


VALIDIAN CORPORATION


By:

/s/  Bruce Benn

Bruce Benn


President and Chief Executive Officer

(principal executive officer)


Dated:  October 2 6, 2005






By:

/s/  Ronald Benn

Ronald Benn


Chief Financial Officer and Treasurer

(principal financial officer)


Dated:  October 2 6, 2005



21






Exhibits.



Exhibit No.

 

Document Description

   

3.1

 

Restated Articles of Incorporation (1)

3.2

 

Amendment to Articles of Incorporation (5)

3.3

 

By-Laws (2)

3.4

 

Amendment to By-Laws (1)

4.1

 

Form of Class B Warrants (2)

4.2

 

Form of Class E Warrants (1)

4.3

 

Form of Class F Warrants (1)

4.4

 

Form of Class G Warrants (1)

4.5

 

Form of Class H Warrants (1)

4.6

 

Form of Class I Warrants (3)

4.7

 

Form of 12% Promissory Note (1)

4.8

 

Form of 4% Convertible Debenture (1)

10.1

 

Registration Rights Agreement, dated as of March 8, 2004 by and among the Company and each entity named on the signature page thereto (3)

10.2

 

Securities Purchase Agreement, dated as of March 8, 2004 by and among the Company and each entity named on the signature page thereto (3)

10.3

 

Securities Purchase Agreement in respect of the 4% Convertible Debenture, dated as of December 30, 2003 by and between Validian Corporation and each individual or entity named on a signature page thereto (1)

10.4

 

Registration Rights Agreement, dated as of December 30, 2004 by and between the Company and each entity named on the signature page thereto (1)

10.5

 

Amended and Restated Incentive Equity Plan (4)

10.6

 

Validian Corporation 2004 Incentive Equity Plan (4)

10.7

 

Commercial Lease dated April 15, 2004 between Validian Corporation and National Capital Commission (5)

10.8

21.1

 

Employment Agreement with Andre Maisonneuve * (5)

List of Subsidiaries (5)

31.1

 

Certification of Chief Executive Officer Pursuant to Section 302

31.2

 

Certification of Chief Financial Officer Pursuant to Section 302


 



 


_______________________________

*      Denotes management contract


(1)

Previously filed as an exhibit to our Annual Report on Form 10-KSB, SEC File No. 0-28423, filed with the Commission on March 30, 2004 and incorporated herein by reference.


(2)

Previously filed as an Exhibit to our Registration Statement on Form 10-SB, SEC File No. 0-28423, filed with the Commission on December 9, 1999 and incorporated herein by reference.


(3)

Previously filed as an Exhibit to our Current Report on Form 8-K, SEC File No. 0-28423, filed with the Commission on March 8, 2004 and incorporated herein by reference.


(4)

Previously filed as an Exhibit to our Amended Proxy Statement, filed with the Commission on January 12, 2005 and incorporated herein by reference.


(5)

Previously filed as an Exhibit to our Annual Report on Form 10-KSB for the year ended December 31, 2004, filed with the Commission on April 14, 2005 and incorporated herein by reference.



22