<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=Content-Type content="text/html; charset=iso-8859-1">
<META content="MSHTML 6.00.6000.16735" name=GENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=#ffffff>
<DIV><FONT face=Arial size=2>
<DIV>FMA posted the following on the Ezonemag website:</DIV>
<DIV> </DIV>
<DIV>"For purposes of clarification, FMA is contacting customers by every means
possible to notify them of the potential fraud involving credit card purchases.
Posting on the forums is only one means we are using. A statement was sent in a
mass e-mail last night, we have posted a statement on the FMA Direct website and
a mass mailing will be distributed as soon as possible. <BR><BR>In addition to
increased security measures already taken by our web host company, FMA is moving
as rapidly as possible to establish Paypal as a means of purchase. This incident
is most upsetting to FMA and we want to assure our customers that every step is
being taken to rectify the situation. We appreciate all the calls and e-mails
today from people who understand and who expressed appreciation for the way in
which FMA has handled this unfortunate incident. Thanks also for a number of
excellent suggestions from people who have been through this before and offered
advice.<BR><BR>I know that many of our customers and friends are taking time to
cancel credit cards and check accounts which takes time and effort. Even if you
know that your card has not been compromised, we suggest you take the step of
cancelling and having a new card issed. We apologize for the inconvenience and
the worry. Believe me, we share your pain more than you can
imagine.<BR><BR><BR>Jamie Marks<BR>FMA Direct<BR>V.P., General Manager"</DIV><!-- / message --></FONT></DIV>
<BLOCKQUOTE
style="PADDING-RIGHT: 0px; PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #000000 2px solid; MARGIN-RIGHT: 0px">
<DIV style="FONT: 10pt arial">----- Original Message ----- </DIV>
<DIV
style="BACKGROUND: #e4e4e4; FONT: 10pt arial; font-color: black"><B>From:</B>
<A title=mups1953@yahoo.com href="mailto:mups1953@yahoo.com">mike mueller</A>
</DIV>
<DIV style="FONT: 10pt arial"><B>To:</B> <A
title=nsrca-discussion@lists.nsrca.org
href="mailto:nsrca-discussion@lists.nsrca.org">nsrca-discussion@lists.nsrca.org</A>
</DIV>
<DIV style="FONT: 10pt arial"><B>Sent:</B> Thursday, November 20, 2008 7:22
AM</DIV>
<DIV style="FONT: 10pt arial"><B>Subject:</B> [NSRCA-discussion] Statement
from FMA</DIV>
<DIV><BR></DIV>
<TABLE cellSpacing=0 cellPadding=0 border=0>
<TBODY>
<TR>
<TD vAlign=top><FONT face=Verdana>Statement from FMA Direct Management
in response to posts on leading RC Online Forums. <BR><BR></FONT>
<P style="MARGIN: 0in 0in 0pt"><SPAN
style="FONT-SIZE: 10pt; COLOR: black; FONT-FAMILY: verdana"></SPAN>
<DIV></DIV>
<P style="MARGIN: 0in 0in 0pt"><SPAN
style="FONT-SIZE: 10pt; COLOR: black; FONT-FAMILY: verdana">During the
last week of October, FMA received two inquiries within a matter of days
about possible compromised credit cards. In both cases the customer
informed us that they had used their card at multiple online sites and
could not confirm which site(s) could have been compromised. We promptly
notified the company who hosts our website about the possible compromise
of our database. After extensive research on their end, our website host
notified FMA that no breach could be detected. Nevertheless, as of
November 1, 2008 the additional precautionary measures were implemented
by FMA?s host:<BR><BR>1) Hardened all login passwords that could have
presented an opportunity for such theft.<BR>2) Added stronger encryption
algorithms to any credit card transactions received on our partner's web
hosting company?s servers.<BR>3) Added additional security measures to
further ensure credit card information is secure at our web hosting
service. </SPAN>
<DIV></DIV></TD></TR></TBODY></TABLE><BR>
<P>
<HR>
<P></P>_______________________________________________<BR>NSRCA-discussion
mailing
list<BR>NSRCA-discussion@lists.nsrca.org<BR>http://lists.nsrca.org/mailman/listinfo/nsrca-discussion</BLOCKQUOTE></BODY></HTML>