Creepy Porn Lawyer Arrested for Extortion and Fraud – Full Criminal Complaint(s)…


The Southern District of New York (SDNY) has announced criminal charges against attorney Michael Avenatti (full complaint pdf below) for attempting to extract more than $20 million in payments from Nike Corp, a publicly traded company, by threatening to use his ability to garner publicity to inflict substantial financial and reputational harm on the company if his demands were not met.

The SDNY counts against Avenatti include conspiracy to transmit interstate communications with intent to extort, conspiracy to commit extortion and more.  In the SDNY case, attorney Mark Geragos is a co-conspirator.

Additionally and simultaneously, the U.S. attorney’s office in Los Angeles alleged in a separate criminal complaint that Mr. Avenatti embezzled a client’s money to pay his own expenses and cover debts—including for his law firm and coffee business—and defrauded a bank using phony tax returns.

Here’s the SDNY criminal complaint:

https://www.scribd.com/embeds/403095480/content?start_page=1&view_mode=&access_key=key-GNU4PerAKv5uYG2WXk3j

UPDATE: Below is a video of the SDNY Press Conference:

.

(Via Wall Street Journal) […] According to the complaint filed in New York, Mr. Avenatti and Mr. Geragos, the alleged co-conspirator, met with lawyers for Nike in New York on March 19 and threatened to release damaging information unless the company agreed to pay the two lawyers millions of dollars and another $1.5 million to the client Avenatti claimed to represent.

Boies Schiller agreed to federal prosecutors’ request to record another conversation with Mr. Avenatti and did so, this person said.

On a March 20 phone call, Mr. Avenatti said he expected to get $1.5 million for his client and wanted a multi-million-dollar retainer from Nike to conduct an “internal investigation,” according to the complaint. During the call—which was on the eve of the company’s quarterly earnings call—Mr. Avenatti said that if his demands weren’t met, “I’ll go take ten billion dollars off your client’s market cap. … I’m not fucking around.” (link)

Here’s the criminal complaint from California:

https://www.scribd.com/embeds/403107937/content?start_page=1&view_mode=&access_key=key-ghFQ5lajMpNH5Y5MLqwt

Advertisements

The Cultural Trends of Women in Politics during the Roman Empire


 

QUESTION: Mr. Armstrong; I assume you would know the answer. Is it true that the women in ancient times were more like Hillary seeking power compared to modern times?

JF

ANSWER: Yes, I have heard this assertion before. It is only partially true. Unquestionably, the first woman of Eastern culture to act politically was none other than Cleopatra VII. She loved Julius Caesar and bore his son in hopes of taking over Rome. When Caesar was assassinated, she fled Rome back to Egypt. She then seduced Marc Antony. That did not end well and Octavian defeated them as it was portraryed as one of the epic love stories which was probably more for political advantages as is the case with Hillary and Bill who now live separately.

However, it was not appropriate for Octavian to boast a victory over a Roman such as Marc Antony, and yet it was also inappropriate to drag a woman through the streets as being conquered. It was not out of the question that that Octavian had Cleopatra killed for this difficulty. The coinage he issued avoided proclaiming victory over Antony and Cleopatra personally and simply claimed he defeated Egypt.

There appears to be a cultural difference in history between the Eastern area of the Roman Empire and that of the West. The women in the East historically appear to be much more dominant in politics than in the West, where perhaps the saying originated, “Behind every great man stands a great woman supporting him.” I recommend an old BBC series to watch called “I Claudius.” It was a fantastic series that revolved around the Julio-Claudian family that was really driven by the intrigue of Augustus‘ wife- Liva. The series shows how she killed off the heir of her husband, Augustus, so her son, Tiberius, would become emperor. She was said to have more bodies than Hillary is alleged to have orchestrated. The difference was that Liva did not seek to be emperor, where Hillary stuck with Bill to make a run for president.

There was also Agrippina, Jr., who most likely orchestrated the assassination of Britannicus, the son of Emperor Claudius, so her son would become Emperor Nero. Where Livia’s portrait appears on coinage, it is always in the form of a goddess rather than in her own name. In the case of Agrippina, Jr, she is the first woman to be pictured on Roman coinage in her own name. Here she is pictured with her son Nero facing him as she ruled the empire. Eventually, she was so manipulative that Nero was blamed by the people for the murder of Britannicus. Nero eventually turned against her and had her killed.

Women seem to have remained behind the throne following Agrippina Jr. certainly in advising but also acting more like a first lady would. The next woman in the middle of a scandal was the wife of Emperor Trajan – Plotina. A letter Trajan was said to have composed on his deathbed appeared in Rome with Plotina’s signature on it, in which he adopted Hadrian naming him successor to the Empire. This raised suspicion that it was crafted by Plotina who was fond of Hadrian.

We do not really encounter the outright politically dominant women until the late 2nd century and they are from the East. It is not just one woman, but a number of them that began to manipulate politics and take more of an open role. The first is Julia Domna who was the wife of Septimus Severus and the mother of Caracalla.

It was the women of Julia Domna’s family that really dominated politics under 235 AD. Julia Maesawas the sister of Julia Domna and sister-in-law of the Emperor Septimus Severus. Julia Maesa bore two daughters, Julia Soaemias and Julia Mamaea, the mothers of the Emperors Elagabalus and Severus Alexander respectively. Julia lived in Rome with her sister during the reign of Caracalla. Following Caracalla’s assassination and Macrinus’ rise to the throne, Julia was permitted to retire to her home at Emesa in 217 AD. This act of mercy on the part of Macrinus would later prove to be a fatal mistake. Once back in Syria, Julia Maesa masterminded the conspiracy in the provinces that led to the fall of Macrinus and the elevation of her grandson Elagabalus to the throne of the Roman Empire in 218 AD. When Elagabalus was murdered, his mother went with him and they dragged their bodies through the streets of Rome in celebration. Julia Mamaea was the mother of Severus Alexander. She was murdered when her son was assassinated. She was the last of this line of Eastern women to rule.

There was Zenobia, also of the East located in Syria. She led a rebellion and split off the Eastern provinces from Rome. She raised her son to the rank of emperor, but she was the dominant political figure and issued coins proclaiming she was effectively the Empress. Because she was a woman, when she was conquered by Aurelian she was allowed to retire. There was a cultural issue that it did not appear to be appropriate for a man to conquer a woman and execute her.

 

In 479 AD, the emperor Zeno’s mother-in-law, the meddlesome dowager empress Verina, the wife of Leo I, managed to convince her other son-in-law Marcian, son of the late western emperor Anthemius, to a raise a revolt. It collapsed due to the quick reaction of Zeno’s Isaurian general Illus, and Verina’s complicity in both it and in an attempted assassination of Illus was quite plain. She was then given to Illus to be imprisoned in Dalisandus in Isauria. By 484 AD, however, the situation had changed: Illus was reported to be intriguing against the emperor, and not only refused the empress Ariadne’s request that her mother be released, but had the audacity (in Ariadne’s opinion) to avoid being assassinated by her agents (who seem to have been as incompetent as her mother’s had been five years earlier).

Illus withdrew to his native Isauria, and Zenothen sent the patrician Leontius with orders to obtain Verina’s release. The unexpected result of this was that Leontius made peace between Verina and Illus, and after Illusbrought her in full regalia to Tarsus, she crowned Leontius emperor on July 19th, 484 AD. She attempted to convince the provincial forces to go over to him by stressing her legitimate right as empress to crown an emperor, but after a very short occupation of Antioch the rebels were tossed out again, and in September were heavily defeated by Zeno’s army under John the Scythian. The survivors fled to the virtually impregnable fortress of Cherris in Isauria where they remained bottled up until their capture and execution in 488 AD (Verina herself had already died in late 484 AD).

Whenever possible, rebels like Leontius and Illus would have wanted their own coinage, both to underscore their legitimacy as rulers, as well as to pay the troops they so desperately needed. The capture of Antioch provided them with a mint, though one which was not accustomed to gold coinage, and they must have immediately begun turning all available gold into coins bearing the name and titles of Leontius as emperor. The fact that the obverse legend is in the dative case, rather than the expected nominative, shows that it was meant to be seen as an acclimation issue.

The dies for Leontius’ solidi were cut with great rapidity by relatively unskilled craftsmen (the legends can be slightly garbled, Greek U’s are used rather than Latin, etc.). Traditionally, Leontius is thought to have only held Antioch for 12 days but it has been suggested by others that the coronation of Leontius took place in March and that his occupation of Antioch lasted two months.

In any event, thanks to Verina, Leontius’ gold coinage is among the rarest of Roman issues. Few coins have survived simply due to the collapse of the rebellion and the demonetization of any usurper’s coinage. It was tradition to recall all the coinage of a usurper and melt them down. There are in fact only four known examples with each struck from a different pair of dies makes the original abundance of the coinage fairly clear. With this number of dies, it implies that the coinage issue could have easily produced 400 lbs of gold coins to pay the troops. The discovery of these coins confirms both the location and the fact that they were culled out of circulation. The coin illustrated here is from a 19th century Levantine hoard of several hundred solidi of Zeno and Leo I, suggesting that the hoarder did not notice the image of the usurper.

 

USA Happiness Falls in Latest Report: Finland and Nordics Lead the World


Published on Mar 22, 2019

SUBSCRIBED 122K

The latest World Happiness Report shows Finland and four other Nordics lead the world in happiness, while the USA falls from 14th to 19th. Is this just a byproduct of capitalism and vigorous immigration, or a curable condition caused by too much government and politics? Bill Whittle Now is production of the Members at http://BillWhittle.com

3-in-5 Millennials Can’t Sleep, Stressed Over Smartphone Anxiety


Published on Mar 22, 2019

SUBSCRIBED 122K

Roughly 3-in-5 millennials can’t sleep because they’re stressed out over their smartphones. Student loans, paying bills and job security ranked much lower on the list. Stephen Green, Scott Ott and Bill Whittle take the measure of Millennial stress from smartphones and helicopter parents. Right Angle is a production of the Members at http://BillWhittle.com

Mueller’s Report Confirms there was No Russian Hack to Begin With


Mueller’s Report is what was expected. The report does conclude that the Trump campaign did not conspire with Russia during the 2016 election, according to the letter from Barr to Congress. It notes that Mueller’s investigation found the campaign was given “multiple offers from Russian-affiliated individuals to assist the Trump campaign” but no one within the campaign or “anyone associated with it” conspired with Russia.

Essentially, Mueller’s report marked the end of an investigation that was launched in secret months before Trump was even elected by the Democrats. The FBI began gathering clues that made them suspicious of aides to Trump’s campaign under the direction of the Obama Administration which even calls into question Comey’s entire integrity given his white-wash of Hillary’s emails and selling influence via the now-defunct Clinton Foundation.

The FBI probe fueled by Hillary’s dossier she paid to go after Trump mushroomed to include allegations that began with Hillary whether the campaign coordinated with Russian efforts to interfere in the 2016 election. She furthered the idea that Trump himself attempted to obstruct her victory. There was bad blood between Hillary and Putin, to begin with. Putin accused Hillary of inciting a political protest in Russia back in 2011.

Interestingly enough, how do we know the server was hacked since the Democrats refused to turn it over to the FBI? Where is it now? The Democrats seem to have refused to cooperate with the FBI on Russia’s Supposed hacking, and intentionally destroyed the physical evidence of Russian Hacking if it ever existed. Where are the servers, and shouldn’t some Democrats be charged with Obstruction of Justice and aiding espionage for not cooperating in the investigation and destroying evidence? The Democrats (DNC) claimed to have been hacked by Russians ahead of the 2016 presidential election.

However, the timeline rarely is ever looked at in detail and the fact that there was no professional hacking of anyone’s computers. The entire access was simply gained by a fake email saying reset your password known as a phishing email. John Podesta simply did what the fake email said. We all get these and they are not something unique to high-level Russian intelligence, CIA, NSA or any government agency. Teenage kids in their basement try this sort of thing.

The New York Times reported in detail, the FBI discovered that a hacking group linked to the Russian government had gained access to at least one computer at the DNC. However, when the FBI contacted the DNC in September 2015 to let them know, the organization’s tech-support contractor didn’t do much with the information beyond performing “a cursory search of the DNC computer system logs to look for hints of such a cyberintrusion.”

If we assume that there was a professional hack underway, the DNC was notified and did nothing. Indeed, it actually took nine months before DNC officials even held a formal meeting with the FBI about the alleged hack. By that time, it was too little, too late if there was a professional hack, to begin with. The hackers, whoever they were, ultimately had access to the DNC’s network for seven months before top DNC officials ever knew about the attack or hired anyone to combat it. During that time, the hackers stole countless emails and documents, later releasing them to the public.

TIMELINE:

  1. September 2015 – The FBI contacts the DNC’s IT department warning that at least one computer has been compromised by Russian hackers. A technician scans the system and does not find anything suspicious.
  2. November 2015 – The FBI reaches out again to the DNC this time warning them that one of their computers is transmitting information back to Russia. DNC later admitted that IT technicians failed to pass along the message that the system had been breached in typical government worker fashion.
  3. March 19, 2016 – Clinton campaign chairman John Podesta received a phishing email masked as an alert from Google that another user had tried to access his account. This is not a high-level hack but a very common way to get into anyone’s computer. It contains a link to a page where Podesta can change his password and he shared the email with a staffer from the campaign’s help desk. The staffer replies with a typo – instead of typing “This is an illegitimate email,” the staffer types “This is a legitimate email.” Podesta follows the instructions and types a new password, allowing hackers to access all his emails. This was clearly NOT a major sophisticated hack that one would associate with Russia, CIA, or NSA tactic with unlimited resources.
  4. June 12, 2016 – In an interview on British television, WikiLeaks founder Julian Assange says that the website has obtained and will publish a batch of Clinton emails.
  5. June 14, 2016 – The Washington Post reports hackers working for the Russian government accessed the DNC’s computer system. They stated that oppositional research on Donald Trump was taken along with staffers’ emails and chat exchanges. The Kremlin came out and denied that the Russian government was linked to the hack. A US official then told CNN that investigators did not yet conclude that there was a cyberattack directed by the Russian government. This was clearly just a phishing email and not even a high-level cyberattack, which we all get from time to time by people trying to into our accounts.
  6. June 15, 2016 – A cybersecurity firm hired by the DNC posts a public notice on its website describing an attack on the political committee’s computer network by two groups associated with Russian intelligence. According to the post, two Russian-backed groups called “Cozy Bear” and “Fancy Bear” tunneled into the committee’s computer system. In response, a blogger called Guccifer 2.0 claims that he alone conducted the hack, not the Russians. As proof, he posts internal DNC memos and opposition research on Trump. Furthermore, Guccifer 2.0 claims to have passed along thousands of files to WikiLeaks. This was by no means a real hack to even begin with just a low-level phishing email that even a teenager often does and got lucky. Guccifer 2.0 claims were certainly far more credible than the pretend claims by the DNC that this linked back to Russia to start with.
  7. July 22, 2016 – A few days before the DNC convention, WikiLeaks published nearly 20,000 emails hacked from the DNC server. The documents include notes in which DNC chair Debbie Wasserman Schultz insults staffers from the Bernie Sanders campaign and messages that infer the DNC wants Hillary and not Bernie. Wasserman Schultz resigns in the aftermath of that leak.
  8. July 25, 2016 – The FBI announced it was launching an investigation into the DNC “hack” when it was clearly just a phishing email, to begin with, and not a cyberattack at all. Although the statement doesn’t indicate that the agency had a particular suspect in mind, the FBI was pointing the finger at Russia.
  9. July 27, 2016 – During a press conference, Trump talks about Clinton’s use of a private email server while she was secretary of state and calls on hackers to find the 30,000 deleted emails as a joke.
  10. August 12, 2016 – Hackers publish cell phone numbers and personal email addresses for Nancy Pelosi and other members of the Democratic Congressional Campaign Committee.
  11. September 1, 2016 – Putin in an interview with Bloomberg News, said that he and the Russian government have no ties to the hackers. He said that the identity of the culprit or culprits is not as important as the content of the leaks, and ultimately the hackers revealed important information for voters. That much I would have to agree since nothing was fake or altered.
  12. September 22, 2016 – Then Dianne Feinstein and Adam Schiff, the ranking Democratic members of the Senate and House Intelligence Committees, issued a joint statement declaring that based on information they received during congressional briefings, they believe that Russian intelligence agencies carried out a plan to interfere with the election without any hard evidence whatsoever.
  13. September 26, 2016 – During a presidential debate with Clinton, Trump questions whether the DNC cyberattack was carried out by a state-sponsored group or a lone hacker. “It could be Russia, but it could also be China. It could also be lots of other people. It also could be somebody sitting on their bed that weighs 400 pounds.” Indeed, there simply was NO sophisticated cyberattack – just a childish phishing email.
  14. October-November 2016 – Over the course of a month, WikiLeaks published more than 58,000 messages simply taken from the account of John Podesta, Clinton’s campaign chairman because he gave them the password.
  15. October 6, 2016 – DCLeaks, a self-described collective of “hacktivists” seeking to expose the influence of special interests on elected officials, published a batch of documents stolen from Clinton ally Capricia Marshall. DCLeaks is later also claimed to have links to the Russian military intelligence.
  16. October 7, 2016 – The Department of Homeland Security and the Office of National Intelligence on Election Security issued a joint statement declaring that the intelligence community is “confident that the Russian Government directed the recent compromises of emails from US persons and institutions.” According to their statement which is not genuine, they claimed that the document releases on websites WikiLeaks and DCLeaks mirror the methods and motivations of past Russian-directed cyberattacks. But this was not even a cyberattack. It was a low-level phishing email that would not identify a high-level national-level intelligence hacking operation.
  17. November 29, 2016 – Then, after the election, a group of Democratic senators sent a letter to President Obama demanding he declassifies information about “the Russian Government and the US election” intelligence hacking. The Obama Administration then said publicly that they shared with lawmakers that intelligence claiming Russia’s purpose for meddling in the election was to sway voters towards Trump, rather than broadly undermining confidence in the system.

Phishing Email (Fake Email to Get you to Put in Your Password)

What’s less clear is that there was no sophisticated hacking of the DNC servers. This was simply a low-level phishing email that we all get. This is NOT the hallmark of Russian Intelligence, CIA, NSA or any other major government with all their sophistication. It is truly amazing how people have called this “hacking” which means in the computer world someone breaks into your system – not that you give them your password.

Computer hacking refers to the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside of the creator’s original objective. Those individuals who engage in computer hacking activities are typically referred to as “hackers.”

The official definition of Hacking – Cyber-Laws.COM

This simple phishing email has produced a cascade of other criminal investigations targeting people around Trump. The investigation led to the indictment of 34 people and three companies on scores of charges that were never related to the subject matter, to begin with. Dozens of Russian nationals were charged with hacking Democratic computers and spreading disinformation during the campaign. Several Trump aides were convicted of lying to Congress or investigators, or for campaign-finance violations or for tax and bank fraud. All of this for something that was NEVER an actual hack of anyone’s computers.

Geezer Candidate Cage Match: Are Biden, Sanders, Trump & Warren Too Old?


Published on Mar 21, 2019

SUBSCRIBED 122K
With at least four leading presidential hopefuls over age 70 — Biden, Sanders, Warren and Trump — the 2020 presidential race shapes up as a geezer candidate cage match. Does that mean an abundance of wisdom? Bill Whittle Now is a production of the Members at http://BillWhittle.com

Fox News Publishes Set of Andrew McCabe Texts With Lisa Page – Notes Main Justice Concerns With FBI FISA Source/Motive…


Fox News has published a small set of text messages between FBI Deputy Andrew McCabe and his DOJ Attorney Lisa Page.  The set of messages released come from the device(s) of Lisa Page and outlines that she must have shared with investigators the totality of her texting and not just messages between herself and FBI Special Agent Peter Strzok.

The aspect covered within the release speaks to a concern from Main Justice toward the FBI application of the FISA warrant used against Carter Page.  Specifically, concerns held by Stuart Evans, then the DOJ’s National Security Division deputy assistant attorney general, about the bias held by the FBI source, Christopher Steele.

FOX NEWS – Just nine days before the FBI applied for a Foreign Intelligence Surveillance Act (FISA) warrant to surveil a top Trump campaign aide, bureau officials were battling with a senior Justice Department official who had “continued concerns” about the “possible bias” of a source pivotal to the application, according to internal text messages obtained by Fox News.

The 2016 messages, sent between former FBI lawyer Lisa Page and then-FBI Deputy Director Andrew McCabe, also reveal that bureau brass circulated at least two anti-Trump blog articles, including a Lawfare blog post sent shortly after Election Day that called Trump possibly “among the major threats to the security of the country.”  (read more)

https://www.scribd.com/embeds/402770650/content?start_page=1&view_mode=&access_key=key-RaMPG0LpUkktez2di2d2

.

.

The issues presented within the Fox article are well known and have been widely discussed.  Essentially further evidence of some people within Main Justice having concerns with the FBI’s aggressive approach toward gaining a sketchy FISA warrant.

However, the revelation that Lisa Page shared text messages beyond those previously outlined in communication with Peter Strzok now leads to a possibility that investigators have much more internal communication that previously understood.  It would appear Ms. Page was considerably more forthcoming than other members of the small group.

Additionally, the leaking of this information to Fox News might indicate the investigation by Inspector General Michael Horowitz could be approaching completion.

Sketchy Cesar Sayoc Pleads Guilty to Federal Charges of Mailing “pipe bombs”…


Everything about last year’s headline story just two-weeks before the mid-term election was weird; including the refusal of the FBI to state what ‘specifically’ was the material suspect Cesar Sayoc was accused of using to create his Acme looking pipe bombs.

[Full Indictment Here]

You might remember: FBI Director Christopher Wray outlined during his remarks that the devices consisted of PVC pipe, clocks, batteries, wiring and “energetic material that can become combustible when subjected to heat or friction”.

The FBI director went out of his way to state: “these were not hoax devices.”  The DOJ then moved to seal all court filings and the case against the nut continued behind the curtain of ‘national security’.  Suspect Cesar Sayoc was scheduled to go on trial this summer on charges relating to the pipe bombs.  However, today he entered a guilty plea before a federal judge in New York.

(Via Washington Post) Cesar Sayoc, the Florida man accused of mailing explosive devices to more than a dozen politicians and media figures who have been critical of President Trump, pleaded guilty Thursday in federal court.

Sayoc, 57, was arrested and charged in October after a series of possible explosive devices were sent to former president Barack Obama, former secretary of state Hillary Clinton and the news network CNN, among others. Officials said he sent a total of 16 devices to 13 people across the country.

On Thursday, he appeared in a Manhattan court room and read from a brief written statement in a quiet, raspy voice. Sayoc acknowledging that he created the devices and sent them in the mail.

“I knew these actions were wrong. I’m extremely sorry,” Sayoc said. He briefly lost his composure at one point while speaking, prompting his attorneys to rub his back.

Responding to a question from U.S. District Judge Jed S. Rakoff, Sayoc said: “I was aware of the risk that they would explode.”

Sayoc’s guilty plea had been anticipated since his court docket showed last week that a pretrial conference scheduled for Thursday had been changed to a “plea” hearing. He had previously pleaded not guilty. (read more)

 

Thoroughly-Modern Bernie: Sanders Campaign Hires Women…in 2019!


Published on Mar 21, 2019

SUBSCRIBED 122K

Bernie Sanders’ presidential campaign crowed this week about hiring women for 10 of 15 newly-announced staff positions. You recall that presidential candidate Mitt Romney got roasted in the Left-wing media when he said his staff had received “binders full of women” as candidates to staff the executive office when he was governor in Massachusetts. Why would Democrats even need to brag about this in 2019? Shouldn’t they have been doing this since they aligned with feminists in the 1970s? Right Angle is a production of the Members at http://BillWhittle.com

 

How All-Powerful Captain Marvel Disempowers Women for Feminism


Published on Mar 21, 2019

SUBSCRIBED 122K

An all-powerful female character, Captain Marvel, actually disempowers women when the writers were hoping to strike a blow for feminism. Bill Whittle, Scott Ott and Stephen Green, explore the importance of weakness and struggle in the hero’s journey. Having a “Mary Sue” character — like Capt. Marvel or Rey in Star Wars — provides precisely the wrong inspiration for young women. Right Angle is a production of the Members at http://BillWhittle.com