Allegations of Cryptocurrency Fraud for Floyd Mayweather and DJ Khaled

Floyd Mayweather And DJ Khaled Allegedly In Legal Trouble For Cryptocurrency Fraud

Today an article came across my desk regarding Floyd Mayweather and DJ Khaled in trouble with the SEC for promoting cryptocurrencies without disclosing their promotional relationship with the companies.

They were being paid by various cryptocurrency companies including Centra Tech. The U.S. Securities And Exchange Commission alleges that Mayweather received $300,000 from three separate cryptocurrency companies, including $100,000 from Centra Tech. DJ Khaled also received $50,000 from Centra Tech.

In a settlement with the SEC, both men agreed to pay back the payments they received to the Commission, as well as a penalty with interest. Mayweather also promised not to promote any securities for three years, and Khaled will promise the same for two years.

Centra Tech has been charged separately on fraud allegations by the SEC. Neither Khaled nor Mayweather has addressed the matter directly.

Sohrab “Sam” Sharma, Robert Farkas and Raymond Trapani, who co-founded Centra Tech Inc, were each charged with securities fraud, wire fraud and two conspiracy counts, according to an indictment filed with the U.S. District Court in Manhattan.

Prosecutors said the defendants, who live in Florida, misled investors in Centra tokens that they had formed partnerships with Visa Inc, MasterCard Inc and Delaware-based The Bancorp Inc to issue debit cards, among other allegations.

Browser hijacking motivated by online advertising from online news organizations

I read my news online as most people do. Online news organizations including TV stations and traditional newspapers are online and of course need to monetize their content. In some cases as with the Wall Street Journal, you can read three articles per month for free but have to buy an online subscription for full access. Totally understandable.

For other news publications, they monetize their websites with advertising. Some, like the Drudge Report are subtle. Adds appear at the top, sides and the bottom of the page. Others like the UK Daily Mail and UK Mirror, assault the viewer with multiple pop up ads, autoplay videos, redirects and the like. Sometimes there is so much load activity, you have to wait for the site to settle down before you can even read the article. I am surprised this activity does not cause seizures.

There a growing trend however, of what I call “Forward Progression Page Refreshing”.  When you are on the Drudge Report, sometimes you will notice the page refreshing. This is just keeping that page updated every minute or two in case there are any new news headlines. At any point, you can hit the back button on your browser and you will go back to the site you were on before you went to Drudge.

The Seattle Times and the UK Mirror are refreshing as well(you can’t see it), however every time they do their hidden refresh, they are advancing you deeper into their website. This is done so when you are done reading the news article and hit “back” on your browser, you are not able to leave their site. Here are two examples below. I went to an article at The Seattle Times and another article from the Mirror. I clicked on links that were on the Drudge Report.

You can see by right clicking on the back button, I have been taken deep into their site with the same article.

Seattle Times Website Advertising

UK Mirror Website Advertising

In my opinion, the sole motivation for this process, is to keep you on their site longer to deliver more advertising to the viewer. I feel this practice is not only deceptive but is intrusive to our browsing experience.

I was in one Mirror article for 3 minutes and had to have been pushed forward at least 40 times to where hitting the back button to get back to Drudge or even right clicking the back button was futile. I had to actually kill the tab to get out of it.

And shame on you Seattle Times, my hometown newspaper. I expect this kind of thing from adwhores like the papers in the UK, but this is poor etiquette.

The Expectation of Advanced Defense Aviation Technologies


Update 11/12/2018: I confirmed with an insider there is no doubt the SR-72 is currently in service.

In November of 1955, a C-54 US Air Force transport plane crashed in the Spring Mountains in Southern Nevada. All 14 occupants were killed. The families of the decedents knew their family members had died but they were never told what the mission was until 1998 when an FOIA provided the accident report.  Flight 9068 was transporting members of the CIA and other defense contractors to Groom lake, aka Area 51 for a test flight of the U-2 Spy-plane. The U-2 was at the highest level of secrecy, probably in the the top five of secret black budget projects ever.

This was a new technology. This was the first high-altitude reconnaissance aircraft. There was no expectation of this technology. Maybe a dream of this concept, but it had to be kept under wraps so the missions could be implemented in secrecy once the U-2 passed all testing. After the public knew of the U2, there was an expectation of the next big thing in defense aviation. The public just did not know about the A-12 project designed by Lockheed for the CIA in 1960 which eventually became the SR-71 that could fly higher and faster then any aircraft on earth. This project was started as the U-2 was flying missions.

Then we had a the “Black Triangles”. The F-117 Nighthawk was the first offensive aircraft built with stealth technology. Its maiden flight was in 1981 and started overseas operations in 1983. It was flying missions from the secret Tonapah flight facility for 5 years before the general public knew of its existence.  This technology, creating stealth fighters and bombers was not an expected technology by the general public. One of my business partners actually oversaw the security and secrecy at Tonapah before he retired from the military. Oh the stories I could tell.

In 2015, Coastal Californians witnessed a missile launch offshore. There were all kinds of conspiracy theories like the US Navy was conducting a mock attack on Los Angeles. What they might not have known was that in 1946, just after WW2, President Truman, created the establishment of the Naval Air Missile Test Center at Point Mugu. The Point Mugu complex works in collaboration with its sister location at China Lake NAWCWC. Most of the public did not know advanced missile technologies were being developed right under their noses.

Lets move to the present day. On January 16th, Bloomberg Technology reported the possible existence of the replacement of the SR-71 with the SR-72 called “The Son of Blackbird”. There are all kinds of theories going around about a secret aircraft called Aurora. Some people think this aircraft is just sitting in a blueprint. I however, based upon history and my poking around,  feel the SR-72 has been around for 4 years to support the RQ-180 drone. The SR-72 investigates and the drone monitors the target area. We did not replace the SR-71 without a replacement and we can all conceive of an expected advance into greater defense technologies.



Richard Russell Horizon Air Q400 HiJack and Microsoft Flight Simulator

Q400 Microsoft Flight Simlulator Seattle Hijack Richard Russell

(Image Credit Denis Kabelev / Shutterstock)


Richard Russell stole a Horizon Air Q400 from SeaTac airport. What looked like a joyride seemed to transition into a deathwish as the aircraft crashed on Ketron Island in Southern Puget Sound.

As reported in the press, everyone is asking how he could have done this? He is not a pilot, where did he learn to start up and fly this aircraft? I can probably come up with a pretty good possibility how he would have known to pull this off.

While Richard was speaking to the air traffic controllers he stated, “I’ve played video games before so I know what I’m doing a little bit.” I don’t think we are talking just any video game. It is my opinion the investigators will find out he spent many hours, maybe years, using any number of flight simulator programs, including but not limited to Microsoft Flight Simulator X.

MS Flight Simulator is as close as anybody can get to flying a plane without leaving the ground. There is even a flight ground school program built into the software. And in fact at one time, I believe the FAA allowed up to 10 hours of recorded flight sim experience toward their licensing requirements.

The Majestic Software Q400 is one of the aircraft that you can upload into the game. And in fact the following video even shows how to start up the Q400. Advance to 4:08 into the video to learn how to start a Q400.

Here is a short video of a takeoff and short flight of the Q400

MS Flight Simulator allows you to choose your aircraft, your airport and your staging spot. After learning how to start up and fly the aircraft in simulator program, he could have literally moved the sim aircraft to the exact place he started it up, taxi out to the runway, taken off and flown the same routes he flew Friday night.

I am speaking from experience. I have many hours invested over the past 15 years with MS Flight simulator. I have even been given the opportunity to take second seat in many of the aircraft I flew with the simulator. I know for a fact I could start up a 737 and take off. I know I could take over the controls and land it in an emergency. It’s that accurate.

Most commercial aircraft do not require a key to start. Maybe the solution is a key or an electronic card or chip based technology only available to the pilots which would unlock the initial start up procedures of commercial aircraft. And no, you cannot start up a Q400 with the flip of one switch. If you watch the video above you have to complete many tasks, in order, for the aircraft to even start.

Off subject but noteworthy, on one of my projects out at Edwards AFB, it was brought to my attention inmates from the former Boron Federal Prison Camp(FPC) would work out at the base each day. However if that inmate was a pilot, they were not allowed to take those positions and had to stay at the camp. Why do you think that was?

Yes, we need secure options in place to keep this from happening again. And yes, it is my opinion a games based flight simulator was instrumental in giving the wannabe pilot hijacker enough knowledge to take flight in a real aircraft.


Orange County CA Realtor Leaving Fake Reviews On Google And Yelp

Negative online reviews

I was contacted by an attorney for a real estate brokerage on the Orange County CA coast regarding a malicious attack on a luxury real estate brokerage.

The suspected individual who was an agent for this brokerage, refused to sign employment forms and that is when they parted ways…so they ended up giving him a referral fee for a deal that we closed that ended up going sideways – it was his friend/referral and they think there was some funny business going on. The attorney got involved with that and this individual signed an NDA – disparagement agreement and everything before he left so they covered their ends. Then a number of false negative reviews started the day after he signed the release.

The brokerage alleges this individual started a campaign of leaving false negative reviews to harm their online reputation. A number of negative reviews were left on Yelp. I was able to have all of these negative reviews removed as they came from newly established Yelp accounts from non-Yelpers. This means an individual signs up for a Yelp account and immediately leaves a negative review moments later only to be never heard from again.

Over this same period of time, 8 negative reviews showed up on Google from NEW Google accounts which were worded as negative personal attacks against this brokerage without describing a specific consumer experience. And in fact, a few of these reviews had some of the same sentence structure. I have flagged these reviews with Google and have an appointment in the AM to discuss. I am going to assume the investigators from Google will see these were all new accounts with no prior activity and could have possibly come from the same IP address.

When you look at all of the positive reviews on Yelp, Facebook and Zillow for this brokerage the negative reviews are inconsistent with the overall reputation of the brokerage.

I was given the name of the suspected attacker. He has 4 Zillow reviews even though the MLS shows no actual transactions for this real estate agent. I have ordered an audit from Zillow.

He tried representing himself as a “Baller” real estate agent with a publicized listing. He borrowed a car from a local luxury automotive dealer and posted a shot in front of this luxury property with he and the car. Turns out it is his parents house, where he lives.

To date, all we have is circumstantial evidence so I am not going to name him at this time.  I will however when solid evidence comes in. This will be dealt with in the courts and he could lose his real estate license.

To me, he looks like a poser. Sour grapes for being an unethical Realtor. I will have a follow up post as we learn more.

I am TED. The original TED. Don’t mess with me. Don’t mess with my clients.


If a Crypto Developer has ever Extorted Your ICO, Talk to me

While the SEC’s of the world along with Interpol and other worldwide police agencies investigate fraudulent ICO’s, I am focused on the companies that support the ICO’s.

ICO’s originate a number of different ways. Some are outright scams and ponzi schemes run by cyber criminals, usually outside of what we might call western countries. Asia and Eastern Europe seem to be the strongholds of cryptofraud. These organizations operate like well oiled machines pumping out new ICO’s as their old ICOs no longer generate revenue for them.

Then you have legitimate business people that want to launch a coin/token in relationship to the products and/or services they offer. Some are really good ideas and have legs. Some are being floated by fortune 100 companies.

Once you decide to move forward with your ICO, you need to hire an experienced crypto-developer to build out the internal structure of the coin/token. This would include the back office, bounty/air drop programs, Telegram marketing, accounting systems, payment systems, establishing the token/coin with the exchanges, website, e mail system, reviews from crypto advisors, reviews in the ICO trades and more.

Most of these crypto dev partners are located in Asia and Eastern Europe. Most are experts in their field however some of these experts are more then willing to screw over their clients in a heartbeat. In addition to the two cases I have been investigating, I have heard horror stories from ICO’s that were extorted for additional payments upon completion or outright robbed by the contractor they hired to build out their ICO once the coin value got to a certain point. I will get into the details of how they rip off their clients in my next post.

If you have ever been ripped off or extorted by your ICO developer, I would ask you to fill out the form below. I am doing a number of things with this data.

1) I have been asked to write an article for a major financial publication and I need this data for my research. All data will remain confidential unless you give me permission you use the name of your ICO, partners, etc.

2) I want to create an investigative database that I will give law enforcement access to.

3) With proof that you would provide, I will consider going after the offender publicly in my blog and presenting a package to the law enforcement agency with their jurisdiction.

Again, I will hold your data confidential unless there are specific elements I can discuss publicly. Thanks for your input.

ICO Dev Complaints

  • Please write in as much detail as possible. The overview, names of people and companies. When this happened. The resolution if any to the issue. And what you would authorize me to do with this information.

TokenGet responds to the allegations by Mobilink-Coin


This morning, TokenGet countered in an effort to discredit Mobilink-coin. Only problem is, after all the fluff, it really holds no water. Their headline alone if true, would incriminate themselves.

I published a post earlier today with my observations on the allegations of theft by TokenGet. Please review to understand the context of what I am about to explain.

I asked to review 100% of the chats and e mails between Mobi and the TokenGet/Blockchain Mob. NEVER was there any communication between the two companies wherein TokenGet accused Mobi of being a scam. Not once.

There was a dispute over payment from the request of the extension. That was it. Then after the cloud was locked out and the millions of coin was stolen, TokenGet issued their statement accusing mobi of being a scam to cover their asses.

If Mobi was a scam, the headline on the TokenGet counter attack would place 100% of the alleged scam on the company that designed the token in the first place. TokenGet.

It’s also funny that Tokenget is asking for the staff of Mobi to identify themselves when their staff is represented by cartoon characters.


And on their sister site, BlockchainMob


Who are these folks? Viktor Petrov, Stoyan Josifov, Pavlin Genove, Veliko Minkov, Ivaylo Uzunov, Georgi Hadjiev, Maggy Ilieva, Kostadin Cherkezov, George Alexiev, Karen New, and Nashwan Khatib.

At the end of the day, I am alleging that TokenGet intentionally harmed Mobi and made up a cover story to hide the fact they chose to defraud Mobi in retaliation of the failure of their payment negotiations.

And if the contracting agreement was with TokenGet why is the Mobi logo appearing on the blockchainmob website? I see the e mails are from blockchainmob.

Also, I am looking into possible threats against, and the harassment of well known ICO advisors who had given Mobi a top rating and in the last couple of days, downgraded their opinions. hard to believe that the victim of the alleged theft of tokens would warrant this change.


Did TokenGet steal tokens from Mobilink Coin?

GetTokens Blockchainmob

Late last night an ICO called Mobilink-Coin made allegations against TokenGet, a company they contracted with to develop the backend of their system and facilitate the launch of their ICO. The allegations look credible especially if you understand the potential motivation that would support the allegations.

The ICO industry is actually quite horrible which is why the SEC’s of many countries are having to step in to protect the consumer. Most of the ICO’s in play right now will never make it. Many are frauds and ponzi schemes. While I was focused on individual ICO’s, I learned there was a whole new circus in town that I had never considered. The developer companies behind the scenes who either intentionally rip off their ICO clients or the ones that seek to destroy their clients if they don’t get their way. We saw that with Shehar Yar and Blocksims. Proven beyond a reasonable doubt.

So back to this case. Very simple timeline. April 15th was the original launch date for Mobilink-Coin. Mobi needed to extend until May 10th. TokenGet wanted all of their money before doing the extension. Both parties were not able to negotiate and Mobi received communication both in chat and via e mail from Viktor Petrove and Nashwan Khatib threatening to take drastic measures. The last communication was on April 19th.

What does it mean to “take drastic measures”? In a civil business world that might mean legal action.  Even with the threat, Mobi was still wanting to move forward with TokenGet which is why Mobi did not lock them out of the system. The events that followed had to have been the drastic measures.

Over a period of a week, as stated by Mobilink-Coin:

Somebody with permissions signed into MOBILINK-COIN’s Google-cloud and changed passwords and all credentials, which, in addition to other information, stole the company’s payment data.

Somebody moved the back end platform from their Google-cloud account and stole the mobi investor database.

Somebody misappropriated tokens to four separate wallets without  the authorization or knowledge of Mobilink. There was a possible theft, or at a minimum, misappropriation of at least 900 million tokens. Those four transactions occurred just days before the extended ICO end date which equates to 15 times more than the entire ICO sold.

tokenget blockchainmob

Even though somebody went in to cover their tracks, it is interesting to note the transfers took place while Mobilink was locked out of the dashboard and the dashboard was not able to conduct transfers during this period.

And somebody has gone in and deleted the transactions in question but I have the original transaction links:

TokenGet attempted to extort MOBILINK-COIN by refusing to give back Mobi’s database and platform in which the company already paid all fees in advance of TokenGet doing any work.

So I have to ask the reasonable reader of this post….is it a safe assumption to think that the contractor, TokenGet and it’s sister company Blockchain Mob conducted the fraudulent actions listed above? Stealing tokens? Stealing client’s financial records? Stealing a client’s investor database? All of which is the property of Mobilink. Who does that? Who locks somebody out of their own cloud? Who transfers proprietary and confidential data off of a client’s cloud. What is the intent? Revenge? Extortion? Secretly seizing assets? Or just to be assholes and harm a company.

No matter the events that led up to this moment. I am focused on the “drastic measures” that were taken by the contractor. Seems to have crossed the line and no matter the relationship between the two, should serve as a warning to other ICO’s when doing business with any ICO developers.

And full disclosure…I do not work for Mobi. Mobi does not own this blog, as they stated in their counter. Mobi does not compensate me. I came upon Mobi late last year. I saw the potential of this ICO. I met the principals of the company. I saw proof of concept of their product and I became a fan. Then when I see companies and individuals trying to rip off companies I am a fan of, as a former investigator, i sort through the details and express my opinion of allegations I investigate.





Crypto Cartels in Sofia, Bulgaria. ICO and ICO Developer Fraud

Bulgaria ICO Fraud

I am Ted the original Ted, as you know I am former secret squirrel.
It has been very rewarding to be part of and experience the Changes in Eastern Europe over the Last decade.

I have been in contact with my personal friends in the intelligence community in Bulgaria and there is an interesting development in Sofia, Bulgaria regarding what I like to refer to as a network of Crypto-Cons.

While investigating Sheyhar Yar a proven cyrpto fraud and Con man, I uncovered evidence that he was part of a organization named Jokers 20.

I and others have been following this trail which has led to Sofia, Bulgaria.

In January of this year, ONECOIN was raided in Sofia as a ponzi scheme and its servers were shut down though the fraudulent coin remains operational.


Along with fraudulent ICO’s in Bulgaria, there have been complaints regarding ICO developers that provide services to ICO’s worldwide. They are based in Sofia, Bulgaria. They build out your back office. They structure your token system. Then at the point you are about to go live, they try to lock out the ICO and steal your money. Or they threaten to trash you on the internet if you do not pay them cash.

One of these companies has come up on my radar. They tried to extort their client after a failed attempt to steal the millions of real dollars that was raised just prior to going live on some of the largest crypto exchanges in the world.

The suspect participants in this company happen to be tied to a prominent software developer.

This fraud is bigger then the fraud attempted by Shehar Yar, a lowly goat herder who tried to defraud many companies as an ICO developer.

Bulgaria was the wrong place to conduct fraud within my sphere of influence there at the highest levels of government. This investigation will be much more interesting. Stay tuned…