If a Crypto Developer has ever Extorted Your ICO, Talk to me

While the SEC’s of the world along with Interpol and other worldwide police agencies investigate fraudulent ICO’s, I am focused on the companies that support the ICO’s.

ICO’s originate a number of different ways. Some are outright scams and ponzi schemes run by cyber criminals, usually outside of what we might call western countries. Asia and Eastern Europe seem to be the strongholds of cryptofraud. These organizations operate like well oiled machines pumping out new ICO’s as their old ICOs no longer generate revenue for them.

Then you have legitimate business people that want to launch a coin/token in relationship to the products and/or services they offer. Some are really good ideas and have legs. Some are being floated by fortune 100 companies.

Once you decide to move forward with your ICO, you need to hire an experienced crypto-developer to build out the internal structure of the coin/token. This would include the back office, bounty/air drop programs, Telegram marketing, accounting systems, payment systems, establishing the token/coin with the exchanges, website, e mail system, reviews from crypto advisors, reviews in the ICO trades and more.

Most of these crypto dev partners are located in Asia and Eastern Europe. Most are experts in their field however some of these experts are more then willing to screw over their clients in a heartbeat. In addition to the two cases I have been investigating, I have heard horror stories from ICO’s that were extorted for additional payments upon completion or outright robbed by the contractor they hired to build out their ICO once the coin value got to a certain point. I will get into the details of how they rip off their clients in my next post.

If you have ever been ripped off or extorted by your ICO developer, I would ask you to fill out the form below. I am doing a number of things with this data.

1) I have been asked to write an article for a major financial publication and I need this data for my research. All data will remain confidential unless you give me permission you use the name of your ICO, partners, etc.

2) I want to create an investigative database that I will give law enforcement access to.

3) With proof that you would provide, I will consider going after the offender publicly in my blog and presenting a package to the law enforcement agency with their jurisdiction.

Again, I will hold your data confidential unless there are specific elements I can discuss publicly. Thanks for your input.

ICO Dev Complaints

  • Please write in as much detail as possible. The overview, names of people and companies. When this happened. The resolution if any to the issue. And what you would authorize me to do with this information.

TokenGet responds to the allegations by Mobilink-Coin

TokenGet

This morning, TokenGet countered in an effort to discredit Mobilink-coin. Only problem is, after all the fluff, it really holds no water. Their headline alone if true, would incriminate themselves.

I published a post earlier today with my observations on the allegations of theft by TokenGet. Please review to understand the context of what I am about to explain.

I asked to review 100% of the chats and e mails between Mobi and the TokenGet/Blockchain Mob. NEVER was there any communication between the two companies wherein TokenGet accused Mobi of being a scam. Not once.

There was a dispute over payment from the request of the extension. That was it. Then after the cloud was locked out and the millions of coin was stolen, TokenGet issued their statement accusing mobi of being a scam to cover their asses.

If Mobi was a scam, the headline on the TokenGet counter attack would place 100% of the alleged scam on the company that designed the token in the first place. TokenGet.

It’s also funny that Tokenget is asking for the staff of Mobi to identify themselves when their staff is represented by cartoon characters.

TokenGet

And on their sister site, BlockchainMob

BlockchainMob

Who are these folks? Viktor Petrov, Stoyan Josifov, Pavlin Genove, Veliko Minkov, Ivaylo Uzunov, Georgi Hadjiev, Maggy Ilieva, Kostadin Cherkezov, George Alexiev, Karen New, and Nashwan Khatib.

At the end of the day, I am alleging that TokenGet intentionally harmed Mobi and made up a cover story to hide the fact they chose to defraud Mobi in retaliation of the failure of their payment negotiations.

And if the contracting agreement was with TokenGet why is the Mobi logo appearing on the blockchainmob website? I see the e mails are from blockchainmob.

Also, I am looking into possible threats against, and the harassment of well known ICO advisors who had given Mobi a top rating and in the last couple of days, downgraded their opinions. hard to believe that the victim of the alleged theft of tokens would warrant this change.

 

Did TokenGet steal tokens from Mobilink Coin?

GetTokens Blockchainmob

Late last night an ICO called Mobilink-Coin made allegations against TokenGet, a company they contracted with to develop the backend of their system and facilitate the launch of their ICO. The allegations look credible especially if you understand the potential motivation that would support the allegations.

The ICO industry is actually quite horrible which is why the SEC’s of many countries are having to step in to protect the consumer. Most of the ICO’s in play right now will never make it. Many are frauds and ponzi schemes. While I was focused on individual ICO’s, I learned there was a whole new circus in town that I had never considered. The developer companies behind the scenes who either intentionally rip off their ICO clients or the ones that seek to destroy their clients if they don’t get their way. We saw that with Shehar Yar and Blocksims. Proven beyond a reasonable doubt.

So back to this case. Very simple timeline. April 15th was the original launch date for Mobilink-Coin. Mobi needed to extend until May 10th. TokenGet wanted all of their money before doing the extension. Both parties were not able to negotiate and Mobi received communication both in chat and via e mail from Viktor Petrove and Nashwan Khatib threatening to take drastic measures. The last communication was on April 19th.

What does it mean to “take drastic measures”? In a civil business world that might mean legal action.  Even with the threat, Mobi was still wanting to move forward with TokenGet which is why Mobi did not lock them out of the system. The events that followed had to have been the drastic measures.

Over a period of a week, as stated by Mobilink-Coin:

Somebody with permissions signed into MOBILINK-COIN’s Google-cloud and changed passwords and all credentials, which, in addition to other information, stole the company’s payment data.

Somebody moved the back end platform from their Google-cloud account and stole the mobi investor database.

Somebody misappropriated tokens to four separate wallets without  the authorization or knowledge of Mobilink. There was a possible theft, or at a minimum, misappropriation of at least 900 million tokens. Those four transactions occurred just days before the extended ICO end date which equates to 15 times more than the entire ICO sold.

tokenget blockchainmob

Even though somebody went in to cover their tracks, it is interesting to note the transfers took place while Mobilink was locked out of the dashboard and the dashboard was not able to conduct transfers during this period.

And somebody has gone in and deleted the transactions in question but I have the original transaction links:

https://etherscan.io/tx/0xf45bf5369a24a2ce1efcecbe713bed213a66e2210af96a678243abde08b76a04

https://etherscan.io/tx/0x4583e3b362cd808a8a210745bc5722af30d52de384d3bacacb4311069ac713b9

https://etherscan.io/tx/0x4892478f85b5a8b00d2e78f915e31ddf41dfb8e4cd90671b57f47d0fc506a627

https://etherscan.io/tx/0x078324d3046393e0cf971f2c549cebc3e4783eba8f39863be9504ec9d13c9503

TokenGet attempted to extort MOBILINK-COIN by refusing to give back Mobi’s database and platform in which the company already paid all fees in advance of TokenGet doing any work.

So I have to ask the reasonable reader of this post….is it a safe assumption to think that the contractor, TokenGet and it’s sister company Blockchain Mob conducted the fraudulent actions listed above? Stealing tokens? Stealing client’s financial records? Stealing a client’s investor database? All of which is the property of Mobilink. Who does that? Who locks somebody out of their own cloud? Who transfers proprietary and confidential data off of a client’s cloud. What is the intent? Revenge? Extortion? Secretly seizing assets? Or just to be assholes and harm a company.

No matter the events that led up to this moment. I am focused on the “drastic measures” that were taken by the contractor. Seems to have crossed the line and no matter the relationship between the two, should serve as a warning to other ICO’s when doing business with any ICO developers.

And full disclosure…I do not work for Mobi. Mobi does not own this blog, as they stated in their counter. Mobi does not compensate me. I came upon Mobi late last year. I saw the potential of this ICO. I met the principals of the company. I saw proof of concept of their product and I became a fan. Then when I see companies and individuals trying to rip off companies I am a fan of, as a former investigator, i sort through the details and express my opinion of allegations I investigate.

 

 

 

 

Crypto Cartels in Sofia, Bulgaria. ICO and ICO Developer Fraud

Bulgaria ICO Fraud

I am Ted the original Ted, as you know I am former secret squirrel.
It has been very rewarding to be part of and experience the Changes in Eastern Europe over the Last decade.

I have been in contact with my personal friends in the intelligence community in Bulgaria and there is an interesting development in Sofia, Bulgaria regarding what I like to refer to as a network of Crypto-Cons.

While investigating Sheyhar Yar a proven cyrpto fraud and Con man, I uncovered evidence that he was part of a organization named Jokers 20.

I and others have been following this trail which has led to Sofia, Bulgaria.

In January of this year, ONECOIN was raided in Sofia as a ponzi scheme and its servers were shut down though the fraudulent coin remains operational.

 

Along with fraudulent ICO’s in Bulgaria, there have been complaints regarding ICO developers that provide services to ICO’s worldwide. They are based in Sofia, Bulgaria. They build out your back office. They structure your token system. Then at the point you are about to go live, they try to lock out the ICO and steal your money. Or they threaten to trash you on the internet if you do not pay them cash.

One of these companies has come up on my radar. They tried to extort their client after a failed attempt to steal the millions of real dollars that was raised just prior to going live on some of the largest crypto exchanges in the world.

The suspect participants in this company happen to be tied to a prominent software developer.

This fraud is bigger then the fraud attempted by Shehar Yar, a lowly goat herder who tried to defraud many companies as an ICO developer.

Bulgaria was the wrong place to conduct fraud within my sphere of influence there at the highest levels of government. This investigation will be much more interesting. Stay tuned…

Did Mobilink-coin get screwed over by a dev in Bulgaria or was it incompetency?

Tokenget

Tonight an e mail went out from Mobilink-coin to its investors:

Dear MOBILINK-COIN Investor,

We have very important information to share with all our investors. This affects all Token holders.

The MOBL Token was created by a company in Sophia, Bulgaria, who provided our turnkey ICO Backend Solution. Unfortunately, there was a misstep in that the Token was unverified, unaudited, and MOBILINK-COIN was not aware of this to resolve it in time.

The MOBL coin will be listed on a minimum of four (4) exchanges in May 2018. To be in compliance with the major Exchanges, we needed to restructure and re-issue the Token. This is required for MOBILINK-COIN to have full control over its audit and verification. We know you will support us in ensuring compliance is in order and that your investment is kept safe. The current Token Contract will be abandoned, and a NEW Contract has already been created.

At this time, investors are unable to log into their back office on the platform. We have record of all investors’ Tokens and will be providing what is due each investor directly into their own wallet. We will provide you with further information and instructions as soon as possible.

Thank you for your understanding.

This is so sad. I personally know the principals of Mobilink-Coin. Based upon a positive endorsement, they hired a company in Sophia, Bulgaria to build the back office for Mobilink-Coin. I don’t have all the details yet but allegations have been made to me about this ICO programming team that I am not at liberty to share at this time.

My only question is whether this was incompetence on the part of this dev, a oversight that did not audit the MobL or a powerplay to extort Mobilink-coin.

Maybe it was just an honest mistake and has nothing to do with Shehar Yar and his efforts to try to destroy one of the most legit ICO’s on the market. I do know however, if there was any alleged fraudulent intent whatsoever, I will devote my time to turn over all the rocks and find and identify all the snakes, clowns and jokers.

Blocksims ICO still conducting fraudulent business practices

I published a post on February 11th regarding the use of false identities and the false images of the players of the Blocksims ICO. I want to give you an update.

I called out Blocksims ICO for using the image of Janet Cowell for their bounty manager, Maxine.

Janet Cowell

Maxine Layare Blocksims

I called them out and I am sure Janet’s representatives called them out as well for fraudulently using her image.

Now, Maxine has a new image that was pulled from a dating website.

Blocksims ICO maxine

maxine blocksims

You don’t have to be Sherlock Holmes to see the fraud. It just continues on and on.

I have investigated some of the largest scams in the world. Ponzi schemes. Money laundering by the Bank of New York. DoD fraud. Most of my adversaries were very intelligent. They knew how to work a scam. With that said, this Shehar Yar guy who is one of the top ICO scammers in the world is a real idiot. I am almost bored with him. There is no real challenge. I equate him with the schoolboy who steals a candy bar at a local grocer. And his delusions of grandeur, selling himself as a CEO when he lives behind his mom’s house with the goats as a $20 per hour dev hack amazes me.

As the original website developer for the very legit Mobilink.io, who was fired for being a fraud last December, who has systematically tried to crap on the Mobilink-coin after stealing their business model, he has the balls to infiltrate the Mobilink-Coin Telegram group to stir up the pot under the handle of Abidhussain Syed.

Blocksims ICO

I tweaked the photo and there he is:

Shehar Yar Blocksims

Lastly, as I was monitoring the Blocksims Telegram room, I observed an individual asking if Blocksims.io was going to be approved by the Securities and Exchange Commission in the United States and their answer was yes.

Blocksims ICO

This is a complete lie. I would know this because I am a US citizen who made contact with the SEC. Of course, based upon the deceitful practices of the principals of the Blocksims ICO, I already knew this, I reported Blocksims to the authorities, once again.

As I expand on this investigation and the authorities get closer to kicking in the doors of the fraudulent players, please feel free to communicate directly with me if you have additional information. All communication will be held in the strictest of confidence. Ted@tedlancer.com

Lastly, did you know the Blocksims ICO is associated with a Russian serial killer?

 

Blocksims using the identities of real people as a scam

Shehar Yar Blocksims

Just a few more facts on the fraudulent efforts of the criminal, Shehar Yar of Blocksims, who is trying to justify his stolen ICO. I will be showing you how they have chosen the photograph of a prominent business person as their Bounty Manager and the photo of a Russian serial killer to troll the Mobilink-coin Telegram group. I would like to give a shout out to FaceFirst, my personal favorite when it comes to facial recognition software.

Blocksims.io created a false identity on their Telegram account named “Maxine Layare”. This user is Blocksims Bounty Manager.

Maxine Layare Blocksims

Blocksimstelegram

However I identified the image associated with this fraudulent Telegram Blocksims identity with a very respected business person named Janet Cowell.

Janet Cowell

We reached out to Janet and she is aware of her photographic identity being stolen by Blocksims.

Next we have a man named “Henry Layman” with an image of a bald guy who has been trolling the Mobilink-Coin Telegram page.

Aslan Gagiev Djako Blocksims

Aslan Gagiev Djako Shehar Yar

As it turns out, Henry is actually Russian serial killer, Aslan Gagiev, also known as Djako. Djako has killed over 60 people.

Shehar Yar Serial Killer

If it weren’t so sad, I would have to laugh at the felonious comedy team known as Blocksims, led by criminal ringleader Shehar Yar. Are they just pulling images and identities out of their ass? Or was there a specific strategy to use an image of a respectable business person for their own company and the image of a Russian serial killer to troll Mobilink-coin? Time will tell of their failing fraudulent efforts as my investigative team and I uncover every rock looking for fraud.

 

Blocksims ICO Fraud – Name calling vs investigative facts

blocksims alepy

Consider this post Part 3 in a series of my investigation of Blocksims.io and Shehar Yar, the mastermind of this deception and many more. My first post more then proved Blocksims was a fraud. My second post called out the “actors” used in a promotional video to add Anglo credibility to their ICO. Today I will focus on the counter-attacks the suspects have been using and some additional data I have received from many parties.

The players with Blocksims are Shehar Yar, Gopinath Krishnamoorthy, Kugan Ausuvalingam, Tarmaraja Padrasono, Muhammad Younas, Elias Rodriguez, Uri Valles, David Martial, J. Ricardo Pala. The other linked projects (where team is also interested with the Blocksims.io): mivolink.com, ico.krytobonds.io (KBS), weigrate.io, alepy.io.

As I have been writing this post I was notified of the results of an independent investigation here. And, this article has already been syndicated to Coin5s.

The responses from the accused play out like a comedy. In a discussion at Bitcointalk the user named Alepy, which is actually Shehar Yar or one of his associates blew a fuse. Started talking all “Gangsta” and threatened me with “F’ing me up if Mobilink Coin did not close up shop.” First, I don’t work for Mobilink and second, the moderator should have removed the user for making threats.

Then they created a personality on YouTube doing a negative video on Mobilink.io as if they were a genuine investigator like me. They seem to be getting all upset when factual evidence through documents, screenshots and other sources gets posted online. Their only response is to counter-attack with angry emotion, name calling and fake news.

I was cruising around Facebook looking for other businesses that are run by Shehar Yar and found this meme on one of the sites:

Blocksims Shehar Yar

The good news is that Blocksims.io is showing up all over the internet as a fraud. The ICO news sites like FoundICO have removed Blocksims from their database. Foxico has marked them as a scam. They are on Ripoff Report. The fraud is also taking social media by storm.

I have yet to even invest in Mobilink, however I really hate fraud which was my motivation to keep this investigation going. In the long run I hope this information on Shehar Yar, Gopinath Krishnamoorthy, Kugan Ausuvalingam, Tarmaraja Padrasono, Muhammad Younas, Elias Rodriguez, Uri Valles, David Martial, J. Ricardo Pala protects consumers and ICO investors worldwide from trusting their money with these folks.