Money Laundering, Boris Yeltson, Nikado and Fraud Investigation

MOney Laundering

It was the late 1990’s and I was hired by a San Francisco law firm to investigate a diamond ponzi scheme. A scheme that I have not been able to write about until today, almost 20 years later. The original victim is deceased. Most of the involved parties are no longer in business but I have to provide a few redactions to protect my client law firm and quite frankly, me.

A Russian individual in San Francisco offered an investment opportunity to another Russian resident for a $50,000 investment in South African diamonds. No red flags here, LOL. The victim transferred the money through a company named Nikado Corp, an Antigua corporation to an account at the Bank of New York. I was able to track a transfer from the Bank of New York to a Russian owned bank in Antigua managed by one Vladimir Ivanov. Interesting to note that my investigation took place one year before this article was published on the Russian Mob laundering money through the Bank of New York.

There was an SFO investment company involved in this transaction called Morgan Fuller. They, through a company called Pinnacle had purchased stock in a Lithuanian bank called Bankas Hermis. This turned out to be a total fraudulent shit storm as documented by the SEC here.

Based upon the listed relationships, this bank was used an an investment vehicle for Morgan Fuller and Bankas Hermis. The key was to be able to trace the Nikado account to this bank.

We had created a “chart of characters” and one name was closely associated with providing Boris Yeltson logistical support for his election. There were also two Americans on that list that had worked for the Reagan campaign.

We traced the money to Antgua which is one of the most difficult offshore havens to extract intelligence from. Even though I had a former US Treasury official well entrenched there, he hit walls wherever he went.

Based upon all the “players” we knew of, which included a major criminal organization and Russian Government officials, we reached a point where we handed the case back to the client advising them how deep they would have to go and that it was obvious our research would have to be handed to the Feds.

 

 

Richard Russell Horizon Air Q400 HiJack and Microsoft Flight Simulator

Q400 Microsoft Flight Simlulator Seattle Hijack Richard Russell

(Image Credit Denis Kabelev / Shutterstock)

 

Richard Russell stole a Horizon Air Q400 from SeaTac airport. What looked like a joyride seemed to transition into a deathwish as the aircraft crashed on Ketron Island in Southern Puget Sound.

As reported in the press, everyone is asking how he could have done this? He is not a pilot, where did he learn to start up and fly this aircraft? I can probably come up with a pretty good possibility how he would have known to pull this off.

While Richard was speaking to the air traffic controllers he stated, “I’ve played video games before so I know what I’m doing a little bit.” I don’t think we are talking just any video game. It is my opinion the investigators will find out he spent many hours, maybe years, using any number of flight simulator programs, including but not limited to Microsoft Flight Simulator X.

MS Flight Simulator is as close as anybody can get to flying a plane without leaving the ground. There is even a flight ground school program built into the software. And in fact at one time, I believe the FAA allowed up to 10 hours of recorded flight sim experience toward their licensing requirements.

The Majestic Software Q400 is one of the aircraft that you can upload into the game. And in fact the following video even shows how to start up the Q400. Advance to 4:08 into the video to learn how to start a Q400.

Here is a short video of a takeoff and short flight of the Q400

MS Flight Simulator allows you to choose your aircraft, your airport and your staging spot. After learning how to start up and fly the aircraft in simulator program, he could have literally moved the sim aircraft to the exact place he started it up, taxi out to the runway, taken off and flown the same routes he flew Friday night.

I am speaking from experience. I have many hours invested over the past 15 years with MS Flight simulator. I have even been given the opportunity to take second seat in many of the aircraft I flew with the simulator. I know for a fact I could start up a 737 and take off. I know I could take over the controls and land it in an emergency. It’s that accurate.

Most commercial aircraft do not require a key to start. Maybe the solution is a key or an electronic card or chip based technology only available to the pilots which would unlock the initial start up procedures of commercial aircraft. And no, you cannot start up a Q400 with the flip of one switch. If you watch the video above you have to complete many tasks, in order, for the aircraft to even start.

Off subject but noteworthy, on one of my projects out at Edwards AFB, it was brought to my attention inmates from the former Boron Federal Prison Camp(FPC) would work out at the base each day. However if that inmate was a pilot, they were not allowed to take those positions and had to stay at the camp. Why do you think that was?

Yes, we need secure options in place to keep this from happening again. And yes, it is my opinion a games based flight simulator was instrumental in giving the wannabe pilot hijacker enough knowledge to take flight in a real aircraft.

 

Orange County CA Realtor Leaving Fake Reviews On Google And Yelp

Negative online reviews

I was contacted by an attorney for a real estate brokerage on the Orange County CA coast regarding a malicious attack on a luxury real estate brokerage.

The suspected individual who was an agent for this brokerage, refused to sign employment forms and that is when they parted ways…so they ended up giving him a referral fee for a deal that we closed that ended up going sideways – it was his friend/referral and they think there was some funny business going on. The attorney got involved with that and this individual signed an NDA – disparagement agreement and everything before he left so they covered their ends. Then a number of false negative reviews started the day after he signed the release.

The brokerage alleges this individual started a campaign of leaving false negative reviews to harm their online reputation. A number of negative reviews were left on Yelp. I was able to have all of these negative reviews removed as they came from newly established Yelp accounts from non-Yelpers. This means an individual signs up for a Yelp account and immediately leaves a negative review moments later only to be never heard from again.

Over this same period of time, 8 negative reviews showed up on Google from NEW Google accounts which were worded as negative personal attacks against this brokerage without describing a specific consumer experience. And in fact, a few of these reviews had some of the same sentence structure. I have flagged these reviews with Google and have an appointment in the AM to discuss. I am going to assume the investigators from Google will see these were all new accounts with no prior activity and could have possibly come from the same IP address.

When you look at all of the positive reviews on Yelp, Facebook and Zillow for this brokerage the negative reviews are inconsistent with the overall reputation of the brokerage.

I was given the name of the suspected attacker. He has 4 Zillow reviews even though the MLS shows no actual transactions for this real estate agent. I have ordered an audit from Zillow.

He tried representing himself as a “Baller” real estate agent with a publicized listing. He borrowed a car from a local luxury automotive dealer and posted a shot in front of this luxury property with he and the car. Turns out it is his parents house, where he lives.

To date, all we have is circumstantial evidence so I am not going to name him at this time.  I will however when solid evidence comes in. This will be dealt with in the courts and he could lose his real estate license.

To me, he looks like a poser. Sour grapes for being an unethical Realtor. I will have a follow up post as we learn more.

I am TED. The original TED. Don’t mess with me. Don’t mess with my clients.

 

If a Crypto Developer has ever Extorted Your ICO, Talk to me

While the SEC’s of the world along with Interpol and other worldwide police agencies investigate fraudulent ICO’s, I am focused on the companies that support the ICO’s.

ICO’s originate a number of different ways. Some are outright scams and ponzi schemes run by cyber criminals, usually outside of what we might call western countries. Asia and Eastern Europe seem to be the strongholds of cryptofraud. These organizations operate like well oiled machines pumping out new ICO’s as their old ICOs no longer generate revenue for them.

Then you have legitimate business people that want to launch a coin/token in relationship to the products and/or services they offer. Some are really good ideas and have legs. Some are being floated by fortune 100 companies.

Once you decide to move forward with your ICO, you need to hire an experienced crypto-developer to build out the internal structure of the coin/token. This would include the back office, bounty/air drop programs, Telegram marketing, accounting systems, payment systems, establishing the token/coin with the exchanges, website, e mail system, reviews from crypto advisors, reviews in the ICO trades and more.

Most of these crypto dev partners are located in Asia and Eastern Europe. Most are experts in their field however some of these experts are more then willing to screw over their clients in a heartbeat. In addition to the two cases I have been investigating, I have heard horror stories from ICO’s that were extorted for additional payments upon completion or outright robbed by the contractor they hired to build out their ICO once the coin value got to a certain point. I will get into the details of how they rip off their clients in my next post.

If you have ever been ripped off or extorted by your ICO developer, I would ask you to fill out the form below. I am doing a number of things with this data.

1) I have been asked to write an article for a major financial publication and I need this data for my research. All data will remain confidential unless you give me permission you use the name of your ICO, partners, etc.

2) I want to create an investigative database that I will give law enforcement access to.

3) With proof that you would provide, I will consider going after the offender publicly in my blog and presenting a package to the law enforcement agency with their jurisdiction.

Again, I will hold your data confidential unless there are specific elements I can discuss publicly. Thanks for your input.

ICO Dev Complaints

  • Please write in as much detail as possible. The overview, names of people and companies. When this happened. The resolution if any to the issue. And what you would authorize me to do with this information.

TokenGet responds to the allegations by Mobilink-Coin

TokenGet

This morning, TokenGet countered in an effort to discredit Mobilink-coin. Only problem is, after all the fluff, it really holds no water. Their headline alone if true, would incriminate themselves.

I published a post earlier today with my observations on the allegations of theft by TokenGet. Please review to understand the context of what I am about to explain.

I asked to review 100% of the chats and e mails between Mobi and the TokenGet/Blockchain Mob. NEVER was there any communication between the two companies wherein TokenGet accused Mobi of being a scam. Not once.

There was a dispute over payment from the request of the extension. That was it. Then after the cloud was locked out and the millions of coin was stolen, TokenGet issued their statement accusing mobi of being a scam to cover their asses.

If Mobi was a scam, the headline on the TokenGet counter attack would place 100% of the alleged scam on the company that designed the token in the first place. TokenGet.

It’s also funny that Tokenget is asking for the staff of Mobi to identify themselves when their staff is represented by cartoon characters.

TokenGet

And on their sister site, BlockchainMob

BlockchainMob

Who are these folks? Viktor Petrov, Stoyan Josifov, Pavlin Genove, Veliko Minkov, Ivaylo Uzunov, Georgi Hadjiev, Maggy Ilieva, Kostadin Cherkezov, George Alexiev, Karen New, and Nashwan Khatib.

At the end of the day, I am alleging that TokenGet intentionally harmed Mobi and made up a cover story to hide the fact they chose to defraud Mobi in retaliation of the failure of their payment negotiations.

And if the contracting agreement was with TokenGet why is the Mobi logo appearing on the blockchainmob website? I see the e mails are from blockchainmob.

Also, I am looking into possible threats against, and the harassment of well known ICO advisors who had given Mobi a top rating and in the last couple of days, downgraded their opinions. hard to believe that the victim of the alleged theft of tokens would warrant this change.

 

Did TokenGet steal tokens from Mobilink Coin?

GetTokens Blockchainmob

Late last night an ICO called Mobilink-Coin made allegations against TokenGet, a company they contracted with to develop the backend of their system and facilitate the launch of their ICO. The allegations look credible especially if you understand the potential motivation that would support the allegations.

The ICO industry is actually quite horrible which is why the SEC’s of many countries are having to step in to protect the consumer. Most of the ICO’s in play right now will never make it. Many are frauds and ponzi schemes. While I was focused on individual ICO’s, I learned there was a whole new circus in town that I had never considered. The developer companies behind the scenes who either intentionally rip off their ICO clients or the ones that seek to destroy their clients if they don’t get their way. We saw that with Shehar Yar and Blocksims. Proven beyond a reasonable doubt.

So back to this case. Very simple timeline. April 15th was the original launch date for Mobilink-Coin. Mobi needed to extend until May 10th. TokenGet wanted all of their money before doing the extension. Both parties were not able to negotiate and Mobi received communication both in chat and via e mail from Viktor Petrove and Nashwan Khatib threatening to take drastic measures. The last communication was on April 19th.

What does it mean to “take drastic measures”? In a civil business world that might mean legal action.  Even with the threat, Mobi was still wanting to move forward with TokenGet which is why Mobi did not lock them out of the system. The events that followed had to have been the drastic measures.

Over a period of a week, as stated by Mobilink-Coin:

Somebody with permissions signed into MOBILINK-COIN’s Google-cloud and changed passwords and all credentials, which, in addition to other information, stole the company’s payment data.

Somebody moved the back end platform from their Google-cloud account and stole the mobi investor database.

Somebody misappropriated tokens to four separate wallets without  the authorization or knowledge of Mobilink. There was a possible theft, or at a minimum, misappropriation of at least 900 million tokens. Those four transactions occurred just days before the extended ICO end date which equates to 15 times more than the entire ICO sold.

tokenget blockchainmob

Even though somebody went in to cover their tracks, it is interesting to note the transfers took place while Mobilink was locked out of the dashboard and the dashboard was not able to conduct transfers during this period.

And somebody has gone in and deleted the transactions in question but I have the original transaction links:

https://etherscan.io/tx/0xf45bf5369a24a2ce1efcecbe713bed213a66e2210af96a678243abde08b76a04

https://etherscan.io/tx/0x4583e3b362cd808a8a210745bc5722af30d52de384d3bacacb4311069ac713b9

https://etherscan.io/tx/0x4892478f85b5a8b00d2e78f915e31ddf41dfb8e4cd90671b57f47d0fc506a627

https://etherscan.io/tx/0x078324d3046393e0cf971f2c549cebc3e4783eba8f39863be9504ec9d13c9503

TokenGet attempted to extort MOBILINK-COIN by refusing to give back Mobi’s database and platform in which the company already paid all fees in advance of TokenGet doing any work.

So I have to ask the reasonable reader of this post….is it a safe assumption to think that the contractor, TokenGet and it’s sister company Blockchain Mob conducted the fraudulent actions listed above? Stealing tokens? Stealing client’s financial records? Stealing a client’s investor database? All of which is the property of Mobilink. Who does that? Who locks somebody out of their own cloud? Who transfers proprietary and confidential data off of a client’s cloud. What is the intent? Revenge? Extortion? Secretly seizing assets? Or just to be assholes and harm a company.

No matter the events that led up to this moment. I am focused on the “drastic measures” that were taken by the contractor. Seems to have crossed the line and no matter the relationship between the two, should serve as a warning to other ICO’s when doing business with any ICO developers.

And full disclosure…I do not work for Mobi. Mobi does not own this blog, as they stated in their counter. Mobi does not compensate me. I came upon Mobi late last year. I saw the potential of this ICO. I met the principals of the company. I saw proof of concept of their product and I became a fan. Then when I see companies and individuals trying to rip off companies I am a fan of, as a former investigator, i sort through the details and express my opinion of allegations I investigate.

 

 

 

 

Crypto Cartels in Sofia, Bulgaria. ICO and ICO Developer Fraud

Bulgaria ICO Fraud

I am Ted the original Ted, as you know I am former secret squirrel.
It has been very rewarding to be part of and experience the Changes in Eastern Europe over the Last decade.

I have been in contact with my personal friends in the intelligence community in Bulgaria and there is an interesting development in Sofia, Bulgaria regarding what I like to refer to as a network of Crypto-Cons.

While investigating Sheyhar Yar a proven cyrpto fraud and Con man, I uncovered evidence that he was part of a organization named Jokers 20.

I and others have been following this trail which has led to Sofia, Bulgaria.

In January of this year, ONECOIN was raided in Sofia as a ponzi scheme and its servers were shut down though the fraudulent coin remains operational.

 

Along with fraudulent ICO’s in Bulgaria, there have been complaints regarding ICO developers that provide services to ICO’s worldwide. They are based in Sofia, Bulgaria. They build out your back office. They structure your token system. Then at the point you are about to go live, they try to lock out the ICO and steal your money. Or they threaten to trash you on the internet if you do not pay them cash.

One of these companies has come up on my radar. They tried to extort their client after a failed attempt to steal the millions of real dollars that was raised just prior to going live on some of the largest crypto exchanges in the world.

The suspect participants in this company happen to be tied to a prominent software developer.

This fraud is bigger then the fraud attempted by Shehar Yar, a lowly goat herder who tried to defraud many companies as an ICO developer.

Bulgaria was the wrong place to conduct fraud within my sphere of influence there at the highest levels of government. This investigation will be much more interesting. Stay tuned…

Did Mobilink-coin get screwed over by a dev in Bulgaria or was it incompetency?

Tokenget

Tonight an e mail went out from Mobilink-coin to its investors:

Dear MOBILINK-COIN Investor,

We have very important information to share with all our investors. This affects all Token holders.

The MOBL Token was created by a company in Sophia, Bulgaria, who provided our turnkey ICO Backend Solution. Unfortunately, there was a misstep in that the Token was unverified, unaudited, and MOBILINK-COIN was not aware of this to resolve it in time.

The MOBL coin will be listed on a minimum of four (4) exchanges in May 2018. To be in compliance with the major Exchanges, we needed to restructure and re-issue the Token. This is required for MOBILINK-COIN to have full control over its audit and verification. We know you will support us in ensuring compliance is in order and that your investment is kept safe. The current Token Contract will be abandoned, and a NEW Contract has already been created.

At this time, investors are unable to log into their back office on the platform. We have record of all investors’ Tokens and will be providing what is due each investor directly into their own wallet. We will provide you with further information and instructions as soon as possible.

Thank you for your understanding.

This is so sad. I personally know the principals of Mobilink-Coin. Based upon a positive endorsement, they hired a company in Sophia, Bulgaria to build the back office for Mobilink-Coin. I don’t have all the details yet but allegations have been made to me about this ICO programming team that I am not at liberty to share at this time.

My only question is whether this was incompetence on the part of this dev, a oversight that did not audit the MobL or a powerplay to extort Mobilink-coin.

Maybe it was just an honest mistake and has nothing to do with Shehar Yar and his efforts to try to destroy one of the most legit ICO’s on the market. I do know however, if there was any alleged fraudulent intent whatsoever, I will devote my time to turn over all the rocks and find and identify all the snakes, clowns and jokers.