Welcome My New Sofia Bulgaria Site Visitors

Always good to see my blog reaching out globally, especially reaching my new fans in Sofia, Bulgaria. Maybe when I head there next week, we could have a meetup? Maybe at Bar Road 66 or The Friendly Bear?

Sofia Bulgaria Crypto

If a Crypto Developer has ever Extorted Your ICO, Talk to me

While the SEC’s of the world along with Interpol and other worldwide police agencies investigate fraudulent ICO’s, I am focused on the companies that support the ICO’s.

ICO’s originate a number of different ways. Some are outright scams and ponzi schemes run by cyber criminals, usually outside of what we might call western countries. Asia and Eastern Europe seem to be the strongholds of cryptofraud. These organizations operate like well oiled machines pumping out new ICO’s as their old ICOs no longer generate revenue for them.

Then you have legitimate business people that want to launch a coin/token in relationship to the products and/or services they offer. Some are really good ideas and have legs. Some are being floated by fortune 100 companies.

Once you decide to move forward with your ICO, you need to hire an experienced crypto-developer to build out the internal structure of the coin/token. This would include the back office, bounty/air drop programs, Telegram marketing, accounting systems, payment systems, establishing the token/coin with the exchanges, website, e mail system, reviews from crypto advisors, reviews in the ICO trades and more.

Most of these crypto dev partners are located in Asia and Eastern Europe. Most are experts in their field however some of these experts are more then willing to screw over their clients in a heartbeat. In addition to the two cases I have been investigating, I have heard horror stories from ICO’s that were extorted for additional payments upon completion or outright robbed by the contractor they hired to build out their ICO once the coin value got to a certain point. I will get into the details of how they rip off their clients in my next post.

If you have ever been ripped off or extorted by your ICO developer, I would ask you to fill out the form below. I am doing a number of things with this data.

1) I have been asked to write an article for a major financial publication and I need this data for my research. All data will remain confidential unless you give me permission you use the name of your ICO, partners, etc.

2) I want to create an investigative database that I will give law enforcement access to.

3) With proof that you would provide, I will consider going after the offender publicly in my blog and presenting a package to the law enforcement agency with their jurisdiction.

Again, I will hold your data confidential unless there are specific elements I can discuss publicly. Thanks for your input.

ICO Dev Complaints

  • Please write in as much detail as possible. The overview, names of people and companies. When this happened. The resolution if any to the issue. And what you would authorize me to do with this information.

TokenGet responds to the allegations by Mobilink-Coin

TokenGet

This morning, TokenGet countered in an effort to discredit Mobilink-coin. Only problem is, after all the fluff, it really holds no water. Their headline alone if true, would incriminate themselves.

I published a post earlier today with my observations on the allegations of theft by TokenGet. Please review to understand the context of what I am about to explain.

I asked to review 100% of the chats and e mails between Mobi and the TokenGet/Blockchain Mob. NEVER was there any communication between the two companies wherein TokenGet accused Mobi of being a scam. Not once.

There was a dispute over payment from the request of the extension. That was it. Then after the cloud was locked out and the millions of coin was stolen, TokenGet issued their statement accusing mobi of being a scam to cover their asses.

If Mobi was a scam, the headline on the TokenGet counter attack would place 100% of the alleged scam on the company that designed the token in the first place. TokenGet.

It’s also funny that Tokenget is asking for the staff of Mobi to identify themselves when their staff is represented by cartoon characters.

TokenGet

And on their sister site, BlockchainMob

BlockchainMob

Who are these folks? Viktor Petrov, Stoyan Josifov, Pavlin Genove, Veliko Minkov, Ivaylo Uzunov, Georgi Hadjiev, Maggy Ilieva, Kostadin Cherkezov, George Alexiev, Karen New, and Nashwan Khatib.

At the end of the day, I am alleging that TokenGet intentionally harmed Mobi and made up a cover story to hide the fact they chose to defraud Mobi in retaliation of the failure of their payment negotiations.

And if the contracting agreement was with TokenGet why is the Mobi logo appearing on the blockchainmob website? I see the e mails are from blockchainmob.

Also, I am looking into possible threats against, and the harassment of well known ICO advisors who had given Mobi a top rating and in the last couple of days, downgraded their opinions. hard to believe that the victim of the alleged theft of tokens would warrant this change.

 

Did TokenGet steal tokens from Mobilink Coin?

GetTokens Blockchainmob

Late last night an ICO called Mobilink-Coin made allegations against TokenGet, a company they contracted with to develop the backend of their system and facilitate the launch of their ICO. The allegations look credible especially if you understand the potential motivation that would support the allegations.

The ICO industry is actually quite horrible which is why the SEC’s of many countries are having to step in to protect the consumer. Most of the ICO’s in play right now will never make it. Many are frauds and ponzi schemes. While I was focused on individual ICO’s, I learned there was a whole new circus in town that I had never considered. The developer companies behind the scenes who either intentionally rip off their ICO clients or the ones that seek to destroy their clients if they don’t get their way. We saw that with Shehar Yar and Blocksims. Proven beyond a reasonable doubt.

So back to this case. Very simple timeline. April 15th was the original launch date for Mobilink-Coin. Mobi needed to extend until May 10th. TokenGet wanted all of their money before doing the extension. Both parties were not able to negotiate and Mobi received communication both in chat and via e mail from Viktor Petrove and Nashwan Khatib threatening to take drastic measures. The last communication was on April 19th.

What does it mean to “take drastic measures”? In a civil business world that might mean legal action.¬† Even with the threat, Mobi was still wanting to move forward with TokenGet which is why Mobi did not lock them out of the system. The events that followed had to have been the drastic measures.

Over a period of a week, as stated by Mobilink-Coin:

Somebody with permissions signed into MOBILINK-COIN’s Google-cloud and changed passwords and all credentials, which, in addition to other information, stole the company’s payment data.

Somebody moved the back end platform from their Google-cloud account and stole the mobi investor database.

Somebody misappropriated tokens to four separate wallets without  the authorization or knowledge of Mobilink. There was a possible theft, or at a minimum, misappropriation of at least 900 million tokens. Those four transactions occurred just days before the extended ICO end date which equates to 15 times more than the entire ICO sold.

tokenget blockchainmob

Even though somebody went in to cover their tracks, it is interesting to note the transfers took place while Mobilink was locked out of the dashboard and the dashboard was not able to conduct transfers during this period.

And somebody has gone in and deleted the transactions in question but I have the original transaction links:

https://etherscan.io/tx/0xf45bf5369a24a2ce1efcecbe713bed213a66e2210af96a678243abde08b76a04

https://etherscan.io/tx/0x4583e3b362cd808a8a210745bc5722af30d52de384d3bacacb4311069ac713b9

https://etherscan.io/tx/0x4892478f85b5a8b00d2e78f915e31ddf41dfb8e4cd90671b57f47d0fc506a627

https://etherscan.io/tx/0x078324d3046393e0cf971f2c549cebc3e4783eba8f39863be9504ec9d13c9503

TokenGet attempted to extort MOBILINK-COIN by refusing to give back Mobi’s database and platform in which the company already paid all fees in advance of TokenGet doing any work.

So I have to ask the reasonable reader of this post….is it a safe assumption to think that the contractor, TokenGet and it’s sister company Blockchain Mob conducted the fraudulent actions listed above? Stealing tokens? Stealing client’s financial records? Stealing a client’s investor database? All of which is the property of Mobilink. Who does that? Who locks somebody out of their own cloud? Who transfers proprietary and confidential data off of a client’s cloud. What is the intent? Revenge? Extortion? Secretly seizing assets? Or just to be assholes and harm a company.

No matter the events that led up to this moment. I am focused on the “drastic measures” that were taken by the contractor. Seems to have crossed the line and no matter the relationship between the two, should serve as a warning to other ICO’s when doing business with any ICO developers.

And full disclosure…I do not work for Mobi. Mobi does not own this blog, as they stated in their counter. Mobi does not compensate me. I came upon Mobi late last year. I saw the potential of this ICO. I met the principals of the company. I saw proof of concept of their product and I became a fan. Then when I see companies and individuals trying to rip off companies I am a fan of, as a former investigator, i sort through the details and express my opinion of allegations I investigate.

 

 

 

 

Crypto Cartels in Sofia, Bulgaria. ICO and ICO Developer Fraud

Bulgaria ICO Fraud

I am Ted the original Ted, as you know I am former secret squirrel.
It has been very rewarding to be part of and experience the Changes in Eastern Europe over the Last decade.

I have been in contact with my personal friends in the intelligence community in Bulgaria and there is an interesting development in Sofia, Bulgaria regarding what I like to refer to as a network of Crypto-Cons.

While investigating Sheyhar Yar a proven cyrpto fraud and Con man, I uncovered evidence that he was part of a organization named Jokers 20.

I and others have been following this trail which has led to Sofia, Bulgaria.

In January of this year, ONECOIN was raided in Sofia as a ponzi scheme and its servers were shut down though the fraudulent coin remains operational.

 

Along with fraudulent ICO’s in Bulgaria, there have been complaints regarding ICO developers that provide services to ICO’s worldwide. They are based in Sofia, Bulgaria. They build out your back office. They structure your token system. Then at the point you are about to go live, they try to lock out the ICO and steal your money. Or they threaten to trash you on the internet if you do not pay them cash.

One of these companies has come up on my radar. They tried to extort their client after a failed attempt to steal the millions of real dollars that was raised just prior to going live on some of the largest crypto exchanges in the world.

The suspect participants in this company happen to be tied to a prominent software developer.

This fraud is bigger then the fraud attempted by Shehar Yar, a lowly goat herder who tried to defraud many companies as an ICO developer.

Bulgaria was the wrong place to conduct fraud within my sphere of influence there at the highest levels of government. This investigation will be much more interesting. Stay tuned…