Is it true that Attorney General Greg Zoeller has issued a gag order on his employees when it comes to the Tim Durham case? Sources say that employees have been ordered not to talk about anything related to Tim Durham.
If true, why would the AG impose such a strict measure, especially since it's a federal case, and certainly not one that has been investigated by Zoelller, who is a close personal friend to Brizzi and Durham.
Why the paranoia? Is there something to hide? Can the AG prevent employees from speaking out? Would it be a violation of their first amendment rights? Did he put it in writing, or was this an oral edict?
Let us know. Our sources remain confidential and anonymous.
Search This Blog
Wednesday, March 23, 2011
Wednesday, March 2, 2011
Brightpoint Insiders Selling Off Stock...What's Up With That?
Why are Brightpoint insiders are selling their stock?
During the month of February there were 122 separate Brightpoint
transactions. On February 25th (the last day for which we have
data), three insiders sold over 85,000 shares. The previous day,
one insider sold almost 50,000 shares.
Since insider stock transactions are usually done in anticipation
of things to come, exactly what is in Brightpoint’s future?
Does this activity have anything to do with Fair Finance, Durham,
Laikin, Brizzi, and Zoeller?
During the month of February there were 122 separate Brightpoint
transactions. On February 25th (the last day for which we have
data), three insiders sold over 85,000 shares. The previous day,
one insider sold almost 50,000 shares.
Since insider stock transactions are usually done in anticipation
of things to come, exactly what is in Brightpoint’s future?
Does this activity have anything to do with Fair Finance, Durham,
Laikin, Brizzi, and Zoeller?
Tuesday, February 22, 2011
Did Tim Durham Get Advanced Notice of FBI Raid? Why Did Durham's Son Leave the Attorney General's Office Shortly After the Raid on His Father's Offices?
HoosierLeaks has received the following inquiry, so we thought we'd put it out for our readers to digest. Does anyone have further answers that could shed light on this mystery?
Let's attempt to connect the dots...
It is general knowledge that, for over ten years, former Marion County Prosecutor, Carl Brizzi, and current Indiana Attorney General, Greg Zoller, have been close personal friends. Their history includes shared experiences living in Washington DC, when both worked as government investigators.
Also, it is well known and public record that Mr. Brizzi and Mr. Timothy Durham are also close friends. For a time, Mr. Brizzi was a member of the Board of Directors of a company controlled by Mr. Durham.
Given these long standing relationships, it should not come as a surprise that Mr. Durham’s son, Bernard L. Durham, would be given a sensitive job in the Attorney General’s office as an investigator. Yes, an investigator. Unlike his mother and Senior Durham, young (age 29) Durham is not a lawyer.
Is it simply coincidental that on Nov. 23, 2009, the day before Mr. Timothy Durham’s office was raided by the FBI, a certain financial transaction took place and some records appear to have disappeared?
Was there a tip-off that a raid was going to take place? Where did the tip-off come from, and why did Durham leave the Attorney General's office shortly after the FBI raid on his father's offices?
Tuesday, February 8, 2011
Alleged Brightpoint Insider Trading To Be Investigated by Indiana Securities Regulators
Charles White |
HoosierLeaks received allegations that Brightpoint stock recently has been traded on insider information. HoosierLeaks notified the Indiana Securities Commissioner, Chris Nalor, and his boss, the Indiana Secretary of State, Charles White, that specific industry insiders had been identified to us as responsible for recent insider trading fraud. Below is the email recently sent from hoosierleaks@hushmail.com to these two officials:
Chris Naylor |
“Mr. Chris Naylor and Mr. Chas White,
After the market close on Feb 2, 2011, CELL (Brightpoint) announced a material increase in earnings that was far higher than analysts had predicted. Earlier that day before the market close ([sic] prior to the public earnings announcement), and in the late afternoon of the prior day (Feb 1), XXXXXXXXX and other insiders purchased stock at $9.50 only to see it jump to $12 the morning of Feb 3.”
After the market close on Feb 2, 2011, CELL (Brightpoint) announced a material increase in earnings that was far higher than analysts had predicted. Earlier that day before the market close ([sic] prior to the public earnings announcement), and in the late afternoon of the prior day (Feb 1), XXXXXXXXX and other insiders purchased stock at $9.50 only to see it jump to $12 the morning of Feb 3.”
Today, HoosierLeaks heard from an Indiana Securities Senior Investigator who indicated that they would investigate. We appreciate their interest and will endeavor to cooperate with them.
After reporting the tip to the regulators, we are reporting the information to you. However, we have decided not to publicly identify the alleged insider at this time until the investigations are further along. Based on this event and recent suspicious purchasing activity of Emmis stock, HoosierLeaks has initiated a system that analyzes local stock trading volume/price anomalies. No one at HoosierLeaks is employed in the securities business.
Some say that Stockbrokers could sell our citizens a piece of the blue sky and get away with it. If you have information about Indiana stock manipulation or investor fraud, please let us know.
Tuesday, January 18, 2011
HoosierLeak Call
Corruption does not happen without a witness. Often the witness is the ignored person, the passed-over person, the in-law, or the unappreciated person. The tip comes from someone who doesn't drive the BMW, golf during the week, vacation in the winter, see sports on the 50 yard line, or buy a $50 bottle of wine.
- Emmis Communications stock went from $0.90 on January 12th to $1.40 on January 13th, on high volume. Any emails, documents, overheard conversations out there?
- Do Indiana municipal bonds tend to end up being purchased by the same ring of insiders? Any thoughts, names, emails, documents, clusters, places to look, or suspicious financial advisors?
Friday, January 14, 2011
Who are we? Can we be trusted?
Most of us have been in Indiana for most of our lives working in various capacities in education, business, internet communication, and for media outlets. None of us is affiliated with traditional media, law enforcement, or an industry or other lobby group. Most of us are grandparents and Tea Party admirers, and we are generally fed up with the widespread corruption of Democrat, Liberal, and Republican Elitists.
Many within government and large business agree with us. Unfortunately, what we see repeatedly (and we're sure you've seen) are people working for government or powerful institutions who want to get information about corruption to the public, but can't. Even if they had personal connections with the media or a blogger, they just don't feel comfortable passing on documents directly. They have seen that, too many times, it might but their career in danger.
We believe that a good idea would be to set up an electronic site to allow people to anonymously upload files or send tips on issues which could be forwarded to relevant individuals.
Do we have a political agenda?
No, we are not behind any particular party. We merely want to disseminate information to responsible people, bloggers, traditional media, or others.
We do not solicit information. However, in certain cases, we will act as an intermediary, passing information to responsible parties. We think we are in a good position to do this because we live, work and have deep roots in Indiana. And, based on experience, Indiana has poor transparency, laxs ethics regulations, and lots of governmental corruption. Lots.
We also believe that we are safer from political pressure, if we remain anonymous. And our legal advisor believes the same - but our position will constantly be reviewed.
Connection to the media or lobbyist?
We're not connected to the media or lobbyist or law enforcement, and in the coming months that should become obvious. We're paying to operate this blogsite and encryption tools out of our own pockets, and we all have jobs, church activities, grandkids and lives to live outside of this project. We see ourselves as patriots.
None of us works for a media outlet (some did but don't anymore). We all have journalistic/communications experience one way or another and all of us have already passed leaked documents - for instance - to journalists.
We're not sure how we'll go forward with this, and we're taking a 'wait and see' approach. If nothing comes of it, then it's a shame, but we continue working in a similar vein anyway. What is certain is that there is an appetite out there for what we are trying to offer and one way or another, with or without us, it will be realized.
Journalists, Bloggers, & Activists
Many investigative journalists, bloggers, writers and activists, etc. are not very skilled or are not very careful at protecting the anonymity of their whistleblower sources, especially when using today's computer technology. Some show a surprising lack of security understanding (tradecraft) and ignorance of the possibilities of forensic document sourcing/tracking examination techniques.
Even where a whistleblower knows that they will eventually have to go public, there is often a crucial time period during which they want or need to protect their anonymity.
Be careful working with the well-intentioned journalist, blogger and activist. Your documents and emails may expose you. But, if you decide to go directly to them, here are a few tips to help you protect yourself:
We all believe Indiana is a good place to work, go to a university, be an entrepreneur, be active in community and church, and raise a family, but we've seen too many corrupt dealings behind closed doors. Many political leaders and appointed administrators unfairly profit from their positions and influence. Too many elected officials and those with ties to elected officials leverage inside information for personal gain. There are plenty of good people in powerful positions who, too often, see shocking information pass them by. How do we know this? We've been there to see it happen. Much of it is legal under current law, but, it offends the sensitivities of taxpayers.
You may have information about:
What do we do with the information we receive?
We can't always work quickly. First, we need to make sure that the information we receive appears to be true. This often takes time, especially since this isn't a full time job for any of us. If we are reasonably confident it is true, then we start to activate our network to find ways of getting the information out there, and out there in a right way to ensure it is for the public good. In some instances, in exchange for the documents, we will request that the media outlet acknowledge Hoosier Leak's contributions.
All emails are destroyed beyond recovery within 90 days. All documents are "sanitized" by our systems before passing them along, and destroyed beyond recovery shortly after forwarding them to the media. Data storage is well away from Indianapolis. HoosierLeaks does not send or receive snail mail. Direct meetings or telephone meetings are not permitted. We consider ourselves to be journalists and to be acting on behalf of a journalistic effort.
This blog is what it is. It is not ideal and may be temporary. However, since we are not looking to publish heavy document loads, it will suffice for now. We are looking to build a new website, whit more secure features on outside U.S. servers.
Indiana's cities and towns are perfect places to deceive taxpayers.
Many decisions happen behind closed doors even though officials say that they will be transparent have worked to improve governmental ethics for many years.
If you work for Indiana state government, a municipal government, a business, or an institution and want to release some information in a completely secure - and anonymous, way, contact us. We have excellent media contacts. We endeavor to make sure the information gathered is reliable and correct, and only then do we act.
We have the network and experience to make sure the right thing is done. We have taken the information below from Wikepedia:
WikiLeaks
HoosierLeaks has no connection with WikiLeaks other than they have demonstrated the power of technology to whistleblowers. However, HoosierLeaks will not disclose any material that would endanger U.S. security, concerns National Defense, involves U.S. relations with foreign governments, or involves personal medical information.
We do not expect "front page" revelations, but, there may be elected or appointed officials (including members of the Governor's staff, a member of the Indiana legislature, a mayor, a school superintendent, or a city council member) that are corrupt, have failed to act, or have turned a blind eye on something in particular. We are about getting the unsolicited documents we receive out there to help fellow Hoosiers. That's what is important to us.
Protecting yourself when you contact
There are an awful lot of questions going around regarding security. Being completely secure online is pretty tough, but there are a few ways you can help yourself. We believe that our email system is secure, but to cut down the risks, you can do the following:
Many within government and large business agree with us. Unfortunately, what we see repeatedly (and we're sure you've seen) are people working for government or powerful institutions who want to get information about corruption to the public, but can't. Even if they had personal connections with the media or a blogger, they just don't feel comfortable passing on documents directly. They have seen that, too many times, it might but their career in danger.
We believe that a good idea would be to set up an electronic site to allow people to anonymously upload files or send tips on issues which could be forwarded to relevant individuals.
Do we have a political agenda?
No, we are not behind any particular party. We merely want to disseminate information to responsible people, bloggers, traditional media, or others.
We do not solicit information. However, in certain cases, we will act as an intermediary, passing information to responsible parties. We think we are in a good position to do this because we live, work and have deep roots in Indiana. And, based on experience, Indiana has poor transparency, laxs ethics regulations, and lots of governmental corruption. Lots.
We also believe that we are safer from political pressure, if we remain anonymous. And our legal advisor believes the same - but our position will constantly be reviewed.
Connection to the media or lobbyist?
We're not connected to the media or lobbyist or law enforcement, and in the coming months that should become obvious. We're paying to operate this blogsite and encryption tools out of our own pockets, and we all have jobs, church activities, grandkids and lives to live outside of this project. We see ourselves as patriots.
None of us works for a media outlet (some did but don't anymore). We all have journalistic/communications experience one way or another and all of us have already passed leaked documents - for instance - to journalists.
We're not sure how we'll go forward with this, and we're taking a 'wait and see' approach. If nothing comes of it, then it's a shame, but we continue working in a similar vein anyway. What is certain is that there is an appetite out there for what we are trying to offer and one way or another, with or without us, it will be realized.
Journalists, Bloggers, & Activists
Many investigative journalists, bloggers, writers and activists, etc. are not very skilled or are not very careful at protecting the anonymity of their whistleblower sources, especially when using today's computer technology. Some show a surprising lack of security understanding (tradecraft) and ignorance of the possibilities of forensic document sourcing/tracking examination techniques.
Even where a whistleblower knows that they will eventually have to go public, there is often a crucial time period during which they want or need to protect their anonymity.
Be careful working with the well-intentioned journalist, blogger and activist. Your documents and emails may expose you. But, if you decide to go directly to them, here are a few tips to help you protect yourself:
- Make sure that your email software is set to display messages as plain text and not to display graphical images by default.
- Do not violate U.S. postal regulations.
- Be advised, some copiers are capable of printing tiny serial numbers on each sheet or a special series of dots that makes tracing of which machine was used to help "leak" a document.
- Word, Excel, PowerPoint, PDF and other files commonly contain "metadata" hidden from common view but readily accessible. These data might include the date created, computer's identiffication, and the organizational or individual author document creator.
- Photographs often contain the name of the owner of the device, date of the photograph, and geo location of the shot.
We all believe Indiana is a good place to work, go to a university, be an entrepreneur, be active in community and church, and raise a family, but we've seen too many corrupt dealings behind closed doors. Many political leaders and appointed administrators unfairly profit from their positions and influence. Too many elected officials and those with ties to elected officials leverage inside information for personal gain. There are plenty of good people in powerful positions who, too often, see shocking information pass them by. How do we know this? We've been there to see it happen. Much of it is legal under current law, but, it offends the sensitivities of taxpayers.
You may have information about:
- Bid specifications that have been written to favor only one vendor
- Municipal bond broker scheme
- A government employee being paior working two jobs at the same time
- Concealed criminal background
- Bribery
- Conflicts of Interest
- Embezzlement
What do we do with the information we receive?
We can't always work quickly. First, we need to make sure that the information we receive appears to be true. This often takes time, especially since this isn't a full time job for any of us. If we are reasonably confident it is true, then we start to activate our network to find ways of getting the information out there, and out there in a right way to ensure it is for the public good. In some instances, in exchange for the documents, we will request that the media outlet acknowledge Hoosier Leak's contributions.
All emails are destroyed beyond recovery within 90 days. All documents are "sanitized" by our systems before passing them along, and destroyed beyond recovery shortly after forwarding them to the media. Data storage is well away from Indianapolis. HoosierLeaks does not send or receive snail mail. Direct meetings or telephone meetings are not permitted. We consider ourselves to be journalists and to be acting on behalf of a journalistic effort.
This blog is what it is. It is not ideal and may be temporary. However, since we are not looking to publish heavy document loads, it will suffice for now. We are looking to build a new website, whit more secure features on outside U.S. servers.
Indiana's cities and towns are perfect places to deceive taxpayers.
Many decisions happen behind closed doors even though officials say that they will be transparent have worked to improve governmental ethics for many years.
If you work for Indiana state government, a municipal government, a business, or an institution and want to release some information in a completely secure - and anonymous, way, contact us. We have excellent media contacts. We endeavor to make sure the information gathered is reliable and correct, and only then do we act.
We have the network and experience to make sure the right thing is done. We have taken the information below from Wikepedia:
Political corruption is the use of legislated powers by governmental officials for illegitimate private gain. Misuse of government power for other purposes, such as repression of political opponents and general police brutality, is not considered political corruption. Neither are illegal acts by private persons or corporations not directly involved with the government. An illegal act by an officeholder constitutes political corruption only if the act is directly related to their official duties.
Forms of corruption vary, but include bribery, extortion, cronyism, nepotism, patronage, graft, and embezzlement. While corruption may facilitate criminal enterprise such as drug trafficking, money laundering, and human trafficking, it is not restricted to these activities.
The activities that constitute illegal corruption differ depending on the country or jurisdiction. For instance, certain political funding practices that are legal in one place may be illegal in another. In some cases, government officials have broad or poorly defined powers, which make it difficult to distinguish between legal and illegal actions. Worldwide, bribery alone is estimated to involve over 1 trillion US dollars annually. A state of unrestrained political corruption is known as a kleptocracy, literally meaning "rule by thieves".
WikiLeaks
HoosierLeaks has no connection with WikiLeaks other than they have demonstrated the power of technology to whistleblowers. However, HoosierLeaks will not disclose any material that would endanger U.S. security, concerns National Defense, involves U.S. relations with foreign governments, or involves personal medical information.
We do not expect "front page" revelations, but, there may be elected or appointed officials (including members of the Governor's staff, a member of the Indiana legislature, a mayor, a school superintendent, or a city council member) that are corrupt, have failed to act, or have turned a blind eye on something in particular. We are about getting the unsolicited documents we receive out there to help fellow Hoosiers. That's what is important to us.
Protecting yourself when you contact
There are an awful lot of questions going around regarding security. Being completely secure online is pretty tough, but there are a few ways you can help yourself. We believe that our email system is secure, but to cut down the risks, you can do the following:
- Don't use your work computer for submissions.
- Avoid public computers and password free Wifi.
- Establish an anonymous email account using Hushmail, or similar service.
- Use this separate email account only when communicating with HoosierLeaks.
Subscribe to:
Posts (Atom)