Today an article came across my desk regarding Floyd Mayweather and DJ Khaled in trouble with the SEC for promoting cryptocurrencies without disclosing their promotional relationship with the companies.
They were being paid by various cryptocurrency companies including Centra Tech. The U.S. Securities And Exchange Commission alleges that Mayweather received $300,000 from three separate cryptocurrency companies, including $100,000 from Centra Tech. DJ Khaled also received $50,000 from Centra Tech.
In a settlement with the SEC, both men agreed to pay back the payments they received to the Commission, as well as a penalty with interest. Mayweather also promised not to promote any securities for three years, and Khaled will promise the same for two years.
Centra Tech has been charged separately on fraud allegations by the SEC. Neither Khaled nor Mayweather has addressed the matter directly.
Sohrab “Sam” Sharma, Robert Farkas and Raymond Trapani, who co-founded Centra Tech Inc, were each charged with securities fraud, wire fraud and two conspiracy counts, according to an indictment filed with the U.S. District Court in Manhattan.
Prosecutors said the defendants, who live in Florida, misled investors in Centra tokens that they had formed partnerships with Visa Inc, MasterCard Inc and Delaware-based The Bancorp Inc to issue debit cards, among other allegations.
I read my news online as most people do. Online news organizations including TV stations and traditional newspapers are online and of course need to monetize their content. In some cases as with the Wall Street Journal, you can read three articles per month for free but have to buy an online subscription for full access. Totally understandable.
For other news publications, they monetize their websites with advertising. Some, like the Drudge Report are subtle. Adds appear at the top, sides and the bottom of the page. Others like the UK Daily Mail and UK Mirror, assault the viewer with multiple pop up ads, autoplay videos, redirects and the like. Sometimes there is so much load activity, you have to wait for the site to settle down before you can even read the article. I am surprised this activity does not cause seizures.
There a growing trend however, of what I call “Forward Progression Page Refreshing”. When you are on the Drudge Report, sometimes you will notice the page refreshing. This is just keeping that page updated every minute or two in case there are any new news headlines. At any point, you can hit the back button on your browser and you will go back to the site you were on before you went to Drudge.
The Seattle Times and the UK Mirror are refreshing as well(you can’t see it), however every time they do their hidden refresh, they are advancing you deeper into their website. This is done so when you are done reading the news article and hit “back” on your browser, you are not able to leave their site. Here are two examples below. I went to an article at The Seattle Times and another article from the Mirror. I clicked on links that were on the Drudge Report.
You can see by right clicking on the back button, I have been taken deep into their site with the same article.
In my opinion, the sole motivation for this process, is to keep you on their site longer to deliver more advertising to the viewer. I feel this practice is not only deceptive but is intrusive to our browsing experience.
I was in one Mirror article for 3 minutes and had to have been pushed forward at least 40 times to where hitting the back button to get back to Drudge or even right clicking the back button was futile. I had to actually kill the tab to get out of it.
And shame on you Seattle Times, my hometown newspaper. I expect this kind of thing from adwhores like the papers in the UK, but this is poor etiquette.
Update 11/12/2018: I confirmed with an insider there is no doubt the SR-72 is currently in service.
In November of 1955, a C-54 US Air Force transport plane crashed in the Spring Mountains in Southern Nevada. All 14 occupants were killed. The families of the decedents knew their family members had died but they were never told what the mission was until 1998 when an FOIA provided the accident report. Flight 9068 was transporting members of the CIA and other defense contractors to Groom lake, aka Area 51 for a test flight of the U-2 Spy-plane. The U-2 was at the highest level of secrecy, probably in the the top five of secret black budget projects ever.
This was a new technology. This was the first high-altitude reconnaissance aircraft. There was no expectation of this technology. Maybe a dream of this concept, but it had to be kept under wraps so the missions could be implemented in secrecy once the U-2 passed all testing. After the public knew of the U2, there was an expectation of the next big thing in defense aviation. The public just did not know about the A-12 project designed by Lockheed for the CIA in 1960 which eventually became the SR-71 that could fly higher and faster then any aircraft on earth. This project was started as the U-2 was flying missions.
Then we had a the “Black Triangles”. The F-117 Nighthawk was the first offensive aircraft built with stealth technology. Its maiden flight was in 1981 and started overseas operations in 1983. It was flying missions from the secret Tonapah flight facility for 5 years before the general public knew of its existence. This technology, creating stealth fighters and bombers was not an expected technology by the general public. One of my business partners actually oversaw the security and secrecy at Tonapah before he retired from the military. Oh the stories I could tell.
In 2015, Coastal Californians witnessed a missile launch offshore. There were all kinds of conspiracy theories like the US Navy was conducting a mock attack on Los Angeles. What they might not have known was that in 1946, just after WW2, President Truman, created the establishment of the Naval Air Missile Test Center at Point Mugu. The Point Mugu complex works in collaboration with its sister location at China Lake NAWCWC. Most of the public did not know advanced missile technologies were being developed right under their noses.
Lets move to the present day. On January 16th, Bloomberg Technology reported the possible existence of the replacement of the SR-71 with the SR-72 called “The Son of Blackbird”. There are all kinds of theories going around about a secret aircraft called Aurora. Some people think this aircraft is just sitting in a blueprint. I however, based upon history and my poking around, feel the SR-72 has been around for 4 years to support the RQ-180 drone. The SR-72 investigates and the drone monitors the target area. We did not replace the SR-71 without a replacement and we can all conceive of an expected advance into greater defense technologies.
It was the late 1990’s and I was hired by a San Francisco law firm to investigate a diamond ponzi scheme. A scheme that I have not been able to write about until today, almost 20 years later. The original victim is deceased. Most of the involved parties are no longer in business but I have to provide a few redactions to protect my client law firm and quite frankly, me.
A Russian individual in San Francisco offered an investment opportunity to another Russian resident for a $50,000 investment in South African diamonds. No red flags here, LOL. The victim transferred the money through a company named Nikado Corp, an Antigua corporation to an account at the Bank of New York. I was able to track a transfer from the Bank of New York to a Russian owned bank in Antigua managed by one Vladimir Ivanov. Interesting to note that my investigation took place one year before this article was published on the Russian Mob laundering money through the Bank of New York.
There was an SFO investment company involved in this transaction called Morgan Fuller. They, through a company called Pinnacle had purchased stock in a Lithuanian bank called Bankas Hermis. This turned out to be a total fraudulent shit storm as documented by the SEC here.
Based upon the listed relationships, this bank was used an an investment vehicle for Morgan Fuller and Bankas Hermis. The key was to be able to trace the Nikado account to this bank.
We had created a “chart of characters” and one name was closely associated with providing Boris Yeltson logistical support for his election. There were also two Americans on that list that had worked for the Reagan campaign.
We traced the money to Antgua which is one of the most difficult offshore havens to extract intelligence from. Even though I had a former US Treasury official well entrenched there, he hit walls wherever he went.
Based upon all the “players” we knew of, which included a major criminal organization and Russian Government officials, we reached a point where we handed the case back to the client advising them how deep they would have to go and that it was obvious our research would have to be handed to the Feds.
Richard Russell stole a Horizon Air Q400 from SeaTac airport. What looked like a joyride seemed to transition into a deathwish as the aircraft crashed on Ketron Island in Southern Puget Sound.
As reported in the press, everyone is asking how he could have done this? He is not a pilot, where did he learn to start up and fly this aircraft? I can probably come up with a pretty good possibility how he would have known to pull this off.
While Richard was speaking to the air traffic controllers he stated, “I’ve played video games before so I know what I’m doing a little bit.” I don’t think we are talking just any video game. It is my opinion the investigators will find out he spent many hours, maybe years, using any number of flight simulator programs, including but not limited to Microsoft Flight Simulator X.
MS Flight Simulator is as close as anybody can get to flying a plane without leaving the ground. There is even a flight ground school program built into the software. And in fact at one time, I believe the FAA allowed up to 10 hours of recorded flight sim experience toward their licensing requirements.
The Majestic Software Q400 is one of the aircraft that you can upload into the game. And in fact the following video even shows how to start up the Q400. Advance to 4:08 into the video to learn how to start a Q400.
Here is a short video of a takeoff and short flight of the Q400
MS Flight Simulator allows you to choose your aircraft, your airport and your staging spot. After learning how to start up and fly the aircraft in simulator program, he could have literally moved the sim aircraft to the exact place he started it up, taxi out to the runway, taken off and flown the same routes he flew Friday night.
I am speaking from experience. I have many hours invested over the past 15 years with MS Flight simulator. I have even been given the opportunity to take second seat in many of the aircraft I flew with the simulator. I know for a fact I could start up a 737 and take off. I know I could take over the controls and land it in an emergency. It’s that accurate.
Most commercial aircraft do not require a key to start. Maybe the solution is a key or an electronic card or chip based technology only available to the pilots which would unlock the initial start up procedures of commercial aircraft. And no, you cannot start up a Q400 with the flip of one switch. If you watch the video above you have to complete many tasks, in order, for the aircraft to even start.
Off subject but noteworthy, on one of my projects out at Edwards AFB, it was brought to my attention inmates from the former Boron Federal Prison Camp(FPC) would work out at the base each day. However if that inmate was a pilot, they were not allowed to take those positions and had to stay at the camp. Why do you think that was?
Yes, we need secure options in place to keep this from happening again. And yes, it is my opinion a games based flight simulator was instrumental in giving the wannabe pilot hijacker enough knowledge to take flight in a real aircraft.
I was contacted by an attorney for a real estate brokerage on the Orange County CA coast regarding a malicious attack on a luxury real estate brokerage.
The suspected individual who was an agent for this brokerage, refused to sign employment forms and that is when they parted ways…so they ended up giving him a referral fee for a deal that we closed that ended up going sideways – it was his friend/referral and they think there was some funny business going on. The attorney got involved with that and this individual signed an NDA – disparagement agreement and everything before he left so they covered their ends. Then a number of false negative reviews started the day after he signed the release.
The brokerage alleges this individual started a campaign of leaving false negative reviews to harm their online reputation. A number of negative reviews were left on Yelp. I was able to have all of these negative reviews removed as they came from newly established Yelp accounts from non-Yelpers. This means an individual signs up for a Yelp account and immediately leaves a negative review moments later only to be never heard from again.
Over this same period of time, 8 negative reviews showed up on Google from NEW Google accounts which were worded as negative personal attacks against this brokerage without describing a specific consumer experience. And in fact, a few of these reviews had some of the same sentence structure. I have flagged these reviews with Google and have an appointment in the AM to discuss. I am going to assume the investigators from Google will see these were all new accounts with no prior activity and could have possibly come from the same IP address.
When you look at all of the positive reviews on Yelp, Facebook and Zillow for this brokerage the negative reviews are inconsistent with the overall reputation of the brokerage.
I was given the name of the suspected attacker. He has 4 Zillow reviews even though the MLS shows no actual transactions for this real estate agent. I have ordered an audit from Zillow.
He tried representing himself as a “Baller” real estate agent with a publicized listing. He borrowed a car from a local luxury automotive dealer and posted a shot in front of this luxury property with he and the car. Turns out it is his parents house, where he lives.
To date, all we have is circumstantial evidence so I am not going to name him at this time. I will however when solid evidence comes in. This will be dealt with in the courts and he could lose his real estate license.
To me, he looks like a poser. Sour grapes for being an unethical Realtor. I will have a follow up post as we learn more.
I am TED. The original TED. Don’t mess with me. Don’t mess with my clients.
Always good to see my blog reaching out globally, especially reaching my new fans in Sofia, Bulgaria. Maybe when I head there next week, we could have a meetup? Maybe at Bar Road 66 or The Friendly Bear?
While the SEC’s of the world along with Interpol and other worldwide police agencies investigate fraudulent ICO’s, I am focused on the companies that support the ICO’s.
ICO’s originate a number of different ways. Some are outright scams and ponzi schemes run by cyber criminals, usually outside of what we might call western countries. Asia and Eastern Europe seem to be the strongholds of cryptofraud. These organizations operate like well oiled machines pumping out new ICO’s as their old ICOs no longer generate revenue for them.
Then you have legitimate business people that want to launch a coin/token in relationship to the products and/or services they offer. Some are really good ideas and have legs. Some are being floated by fortune 100 companies.
Once you decide to move forward with your ICO, you need to hire an experienced crypto-developer to build out the internal structure of the coin/token. This would include the back office, bounty/air drop programs, Telegram marketing, accounting systems, payment systems, establishing the token/coin with the exchanges, website, e mail system, reviews from crypto advisors, reviews in the ICO trades and more.
Most of these crypto dev partners are located in Asia and Eastern Europe. Most are experts in their field however some of these experts are more then willing to screw over their clients in a heartbeat. In addition to the two cases I have been investigating, I have heard horror stories from ICO’s that were extorted for additional payments upon completion or outright robbed by the contractor they hired to build out their ICO once the coin value got to a certain point. I will get into the details of how they rip off their clients in my next post.
If you have ever been ripped off or extorted by your ICO developer, I would ask you to fill out the form below. I am doing a number of things with this data.
1) I have been asked to write an article for a major financial publication and I need this data for my research. All data will remain confidential unless you give me permission you use the name of your ICO, partners, etc.
2) I want to create an investigative database that I will give law enforcement access to.
3) With proof that you would provide, I will consider going after the offender publicly in my blog and presenting a package to the law enforcement agency with their jurisdiction.
Again, I will hold your data confidential unless there are specific elements I can discuss publicly. Thanks for your input.
This morning, TokenGet countered in an effort to discredit Mobilink-coin. Only problem is, after all the fluff, it really holds no water. Their headline alone if true, would incriminate themselves.
I published a post earlier today with my observations on the allegations of theft by TokenGet. Please review to understand the context of what I am about to explain.
I asked to review 100% of the chats and e mails between Mobi and the TokenGet/Blockchain Mob. NEVER was there any communication between the two companies wherein TokenGet accused Mobi of being a scam. Not once.
There was a dispute over payment from the request of the extension. That was it. Then after the cloud was locked out and the millions of coin was stolen, TokenGet issued their statement accusing mobi of being a scam to cover their asses.
If Mobi was a scam, the headline on the TokenGet counter attack would place 100% of the alleged scam on the company that designed the token in the first place. TokenGet.
It’s also funny that Tokenget is asking for the staff of Mobi to identify themselves when their staff is represented by cartoon characters.
And on their sister site, BlockchainMob
Who are these folks? Viktor Petrov, Stoyan Josifov, Pavlin Genove, Veliko Minkov, Ivaylo Uzunov, Georgi Hadjiev, Maggy Ilieva, Kostadin Cherkezov, George Alexiev, Karen New, and Nashwan Khatib.
At the end of the day, I am alleging that TokenGet intentionally harmed Mobi and made up a cover story to hide the fact they chose to defraud Mobi in retaliation of the failure of their payment negotiations.
And if the contracting agreement was with TokenGet why is the Mobi logo appearing on the blockchainmob website? I see the e mails are from blockchainmob.
Also, I am looking into possible threats against, and the harassment of well known ICO advisors who had given Mobi a top rating and in the last couple of days, downgraded their opinions. hard to believe that the victim of the alleged theft of tokens would warrant this change.