TheDinarian
News • Business • Investing & Finance
Tis’ the Season To Be Cautious: Top Online Holiday Scams to Avoid in 2023
December 15, 2023
post photo preview

As we wrap up a year of remarkable strides in the world of decentralized finance, The Dinarian family extends warm wishes to each and every one of you! 🚀✹ Happy Holidays and Merry Christmas, dear community! 🎄🎉 May this festive season bring joy, prosperity, and the spirit of togetherness to your lives. As we look forward to a new year filled with exciting possibilities, let's continue building a future where financial empowerment knows no bounds. Thank you for being part of The Dinarian journey! 💙

Every year, hackers get a little more savvy when it comes to scamming people out of their hard-earned money. This year is no different. 

What time is better to target the public than the holiday season? It’s a time of year when people are ready and willing to part with their savings and are searching for any offers that may help them get the most bang for their buck. 

The holidays are also a time when a lot of people experience feelings of loneliness – they miss friends and family and may struggle with personal situations that could make them more susceptible to cybercriminals. The level of personal and financial vulnerability during the holidays has led to an increase in scam tactics through every possible channel. Unsurprisingly, Black Friday is historically the most popular day for fraud attempts in the U.S. 

So, how can you protect yourself and your loved ones this year? You can start by identifying some of the most popular online holiday scams. Keep reading to learn all about them. 

 

UPS Scam: AKA the parcel service scam

“This is ‘UPS.’ We’re going to need your credit card number before we’ll release your package. Just click here
”

ups holiday scam example

‍Have you received a text message or email that appears to be from UPS, USPS, or another parcel service giving you some “odd” news about a package you may or may not have ordered?

Because this is a time when scammers know people are more likely to order goods online, this con has grown in prevalence. 

People receive a message, and often it looks legit. It may be formatted like other parcel service notifications, it can include official logos, and it may even be sent from an email or contain a link that has the company’s name in it. The more legitimate the message looks, the easier it is to trick the recipient into reacting to it.

‍

What happens if you click on the link provided?

There are a few possibilities here.  

  1. Clicking the link downloads some sort of malware into the system of your mobile device or computer, allowing hackers to steal your credentials, access your accounts, and/or collect sensitive information (among other things).
  2. The link takes you to a page that LOOKS like the legitimate parcel service page. However, there will be a small difference in the URL, content, and other on-site components. Once here, the scammers may ask you for personally identifiable information, account credentials, and even financial information. Then, they have everything they need to steal your identity or gain access to your money.
  3. The link takes you to a payment page stating that the package cannot be delivered without additional payment. This can be distressing when someone is waiting on gifts for loved ones. When they enter their payment info, hackers take this and use it to fund their own scummy shopping sprees.

According to the FCC, another variation on the scam can cost you money simply by calling the phone number back. The fake delivery notice will include a callback number with an 809 area code or another 10-digit international number. Calling back can result in high connection fees and costly per-minute rates

‍

What can you do to avoid falling for this holiday scam?

The short answer is: Do NOT click through any link sent from a supposed parcel service via email or SMS. 

If you HAVE an outstanding delivery, you can always contact the post office or parcel service directly to ask any questions you may have about the validity of messages you receive.

The post office has confirmed that it will never contact you asking you to click any link, so always avoid interacting with unsubstantiated messages completely. If you do receive a suspicious parcel service message, report it to The Federal Trade Commission, and make sure that you block the sender so that you don’t accidentally click through in the future.

FACT: In the first nine months of 2023, people reportedly lost $23.6 million due to text message scams alone.

‍

Visual examples of this scam in action

‍

usps holiday scam example
fedex holiday scam example

‍

Additional resources on the UPS holiday scam

‍

Holiday Phishing Scam: The Santa Claus letter scam

“Pay us (and give us your personal info) and we’ll send a custom Santa letter to your kid. Or not
”

‍

santa gif

‍

This scam is every bit as despicable as it sounds. When the holiday season hits, parents look for ways to make it as special and memorable for their children as possible. What better way to bring magic into the Christmas season than a customized letter sent courtesy of Santa Claus?

Unless “Santa” in this case is really a scammer who’s pulling on your heartstrings to get to your wallet. 

These scammers will use several channels to try and fool people into giving them money. They may send advertising emails directly to your account, use paid advertising channels, place ads on social media, contact people via SMS, and sometimes create legitimate-looking websites to make targets feel more comfortable about putting in their payment info.

They advertise a custom “Santa letter” service that offers to send special communications to children on behalf of Mister Claus. This service will usually have a pretty reasonable cost and may offer variations like emails, texts, or even phone calls from the big man himself.

However, once parents put their payment info in for the service, the Scam Santa never delivers. 

‍

What happens if you give the Santa scammers your info?

As soon as your financial info is put into their system or shared with them, criminals take the financial info and help themselves to as many “presents” as the bank account can afford.

This can lead to several problems, including (but not limited to):

  1. Hijacking the bank account and using the money to make purchases
  2. Opening new accounts in the victim’s name
  3. Identity theft

‍

What can you do to avoid being taken advantage of by this holiday scam?

Be very cautious when considering setting up Santa letters for your children. Make sure that the company has been around for a substantial amount of time, check the activity on their social media accounts, and make sure to read reviews across multiple sources about the brand. It’s easy to fake reviews in just one place, but more difficult to do so across all channels.

If you want to simply send a customized letter to your child yourself, the postal service has some simple instructions for doing so that will make the experience just as magical.  You can find that info by clicking here.

‍

Santa Letter holiday scam example: 

‍

Santa Letter holiday scam example

‍

Additional resources on the “Santa Letter” holiday scam

‍

The “seasonal work” holiday scam

“Need a job this season for gifts? We know, and we’re going to use it to take advantage of you
”

‍

veep gif

‍

Everyone needs more money, but this is especially true during the holiday season when the pressure to provide gifts for people you care about overrides budget plans.

Scammers know this, and they’ve learned how to take advantage of it. Beware of seasonal work offers that sound way too good to be true. Criminals use false advertisements on job boards, emails, and social media to draw people who need temporary work.

These criminals have become more sophisticated today – they create professional-looking websites and run ads for seasonal work. When someone clicks through the holiday job posting, they are redirected to a website that looks legitimate. In reality, this site is just a front being used to collect sensitive personal data. 

People offer up their social security numbers, addresses, direct deposit information, and other information, all while believing that it’s required for a job application. But when it comes time for them to hear back from the company, the website will have disappeared–taking all of their personal information with it.

‍

What happens if you give the holiday scammers your private information?

If scammers are successful at collecting your personal information, they can use it for identity theft, bank fraud, credential stuffing attacks, and several other nefarious activities. Occasionally, they collect this data and sell it on the dark web to the highest bidder.

This can be a scary scenario and leaves many feeling like they’ve had the rug pulled out from under them. It’s especially damaging for those who experience financial losses at a time of year when they are trying to do holiday shopping. It can take a long time for banks and credit card companies to iron out identity theft issues, leaving many victims in a bad spot that can have a lasting impact on their credit.

‍

What can you do to avoid being taken advantage of by the “seasonal work” holiday scam?

Fortunately, there are several steps you can take to protect yourself from becoming a victim of the seasonal work scam.

  • Before providing any potential employer with personal information, check out the company’s history. Make sure that it is an established brand and is registered as a business. 
  • It’s also a good idea to check multiple sources for reviews to spot any hidden issues. 
  • When directed to the website of a familiar brand to apply for a position, make sure that the URL matches the one used by the legitimate company. 
  • When in doubt, reach out and ask questions.
  • As a rule of thumb, if it looks too good to be true and offers high pay for minimal work - proceed with extreme caution!
  • No legitimate job should require you to pay to work for them. If you are asked to send money or cash a check once “hired,” stop engaging with the “company” immediately.

‍

Visual examples of this holiday scam

‍

seasonal work holiday scam example
seasonal work holiday scam example via email

‍

More resources on seasonal work holiday scams

‍

The “website spoofing” holiday scam

“Check out great deals from trusted brands - at a slightly different URL, with blurry images and too-good-to-be-true pricing. Wait
”

‍

simpsons gif

‍

Deals can be everything this time of year. But as we’ve said before, if it’s too good to be true
it’s probably a scam. This becomes apparent when you get an email from your favorite brand, click on the link, land on a legit-looking site, give them your payment info, and then never hear from them again. Oof.

Website spoofing is a more complicated form of phishing that occurs when a scammer mimics the style of a trusted brand to create a website that looks like a legitimate part of that brand. They’ll use logos, steal content off of the site, and even place copyright claims at the bottom of the page. All to fool people into giving them personal information.

They may link to these sites from ads, emails, and/or social media posts, and their goal is to make everything look as consistent and trustworthy as possible. Oftentimes, scam artists will use a hook to draw consumers in. 

This may be something like: “Fill out this survey and get a free high-end product,” or “Click this special sale link and get everything at 75% off.” The goal is to do whatever it takes to convince the recipient to click through to the fake website.

Once there, the site may contain a survey, a product page (copied from the legit site), or some other enticing deal designed to part you and your hard-earned money. 

‍

What happens if you give the website spoofers your information?

When people follow through with a purchase, survey, or membership on one of these spoofed sites, they often provide their full names, addresses, phone numbers, email addresses, and financial information. If asked to “create an account,” the scammers may also save these credentials and use them in a future credential-stuffing attempt.

FACT: Credential stuffing involves taking a set of credentials and applying them to different accounts to try and gain access to someone’s personal information.

The info collected from spoofed websites can be used for identity theft, financial fraud, or sold on the dark web to the highest bidder. This can result in scammers passing personal info to other scammers who then incorporate it into future phishing, robocalling, or other types of cons.

Once your information is accessible, it can be very difficult to track down the original point of the data leak. 

‍

What can you do to avoid being taken advantage of by the website spoofing holiday scam?

While it can be admittedly difficult to discern a fake site from a legitimate one, there are some red flags to look out for. If you see any of these signs, don’t click through the links. Instead, navigate straight to the verified brand URL and look for the same deals there. 

If they don’t match, then it’s more than likely a scam.

 

Keep an eye out for this website spoofing tricks over the holidays: 

  • An email flier that comes via your spam box directing you to a well-known branded website
  • Any email or ad that has poor spelling, minimal content, bizarre formatting, and low-quality images
  • Ads for deals that are too good to be true or selling items that your favorite brand doesn’t usually carry
  • A website URL that doesn’t align with any of the sites associated with the real brand
  • Links on the website to content that doesn’t exist or that take you in a continual loop back to the home or sale pages
  • Offers declaring you a “winner” for something you did not sign up for
  • Sites with poor images and layouts that look rushed and unprofessional
  • Sites that ask you for excessive personal information just go “enter a contest,” or “qualify for a deal”
  • Sites claiming to be a subsidiary of a trusted brand that are “only available” over the holidays and that do not have a URL consistent with the verified one

If you’re ever in doubt about the validity of a site or deal, go straight to the source and only buy from brands and websites you know you can trust. 

‍

Example of a website spoofing a holiday sale

‍

website spoofing a holiday sale

‍

Additional resources on website spoofing scams

‍

Holiday phishing scams

Wow! This email from [email protected] promises designer brands for Wish prices! I just need to give them all of my personal information
”

gif saying it's a fake

‍

‘Tis the season for gargantuan shopping excursions. Unfortunately, scammers are out in droves to take advantage of eager holiday spenders. Consumers who are doing their shopping online are often inclined to create new accounts, sign up for discounts, and activate memberships in pursuit of the hottest gifts of the year.

With all of this happening, it’s easy for people to forget what companies they’ve shared their email addresses and phone numbers with. So, it may not feel out of the ordinary to suddenly see an inbox full of sales emails, or a few new SMS messages a day offering “special limited time” discounts.

While the spam feature on your inbox may catch the majority of these phishing emails, there are always some that find their way into your primary inbox. They may contain flashy subject lines claiming unreal discounts, free trials, contest entries, and even indicating that you’ve “won” something from their company. In some cases, these can be the beginning of a website spoofing scam. 

On the flip side, scammers also recognize that this is a time of year when many people connect with family and friends. It’s easy for a con artist to find the names and locations of your family members online and then send emails pretending to be these people. 

They may make personal-sounding email addresses or try and text from a “new number” to get you to engage with them. Oftentimes, they try to sound very personal from the very beginning in an attempt to capitalize on the rapport of an existing relationship. 

Then, they may provide a sob story about a “sudden illness,” or an inability to pay for basic necessities during the holidays. The goal of this type of holiday phishing scheme is to convince you to send them information or money in a way that exposes your financial information.

Once they have this, they’ll do their OWN holiday shopping at your expense.

‍

What happens if you give the scammers your info?

Similar to website spoofing (the two often overlap), the bad actors in this holiday phishing scam will collect personal information with the intent of using it for financial gain, identity theft, or to sell on the data black market. In some instances, they may even try to take advantage of the victims multiple times, often pretending to be family members, charities, or people in need, and asking for money on more than one occasion.

At best, people figure out what’s happening before it goes too far. At worst, they can lose their life savings by voluntarily sending money to people or companies under deceptive circumstances. 

‍

What can you do to avoid being taken advantage of by this holiday scam?

There are several things you can do to protect yourself this season:

  • Check the sender addresses of every email you receive that you don’t immediately recognize. You can perform a quick online search to check if the format of the email matches the format used by the brand it’s being associated with. If the formats don’t line up, it’s a good idea not to respond or click through any links within the text.
  • Never send money to anyone who reaches out via email, social media messengers, or through an unknown SMS number. If the sender is claiming to be someone you know, reach out to the person to verify that the communication is legitimate.
  • Avoid clicking any links contained in emails that land in the spam box.
  • Do not click on links or respond to SMS messages claiming to be from people who aren’t verified or companies you haven’t signed up with.
  • Beware of any email or text asking for personal information - especially when the amount of information feels disproportionate to the situation or unnecessary.
  • Always verify that websites and phone numbers are consistent with any brands they claim to be associated with. Reach out to companies to verify before engaging with the messages.
  • Watch out for poor grammar and spelling, low-quality images, and/or strange formatting that wouldn’t make sense coming from a well-known professional brand.

‍

Visual examples of phishing scams

Visual examples of holiday phishing scams

‍

Additional resources on holiday phishing scams

‍

Help! I already shared my personal information in a potential holiday scam. 

If you feel that you may have already shared your personal data with scammers this holiday season, it’s important to catch it as early as possible. The following resources can provide you with additional information and agencies where you can check your identity theft status and report data leaks.

 

Link

community logo
Join the TheDinarian Community
To read more articles like this, sign up and join my community today
0
What else you may like

Videos
Podcasts
Posts
Articles
All Tariffs To Remain In Place ✋

đŸ‡ș🇾 President Trump imposes 10% global tariff on all countries and says all tariffs will remain in place, despite Supreme Court ruling.

00:00:28
🚹10% GLOBAL TARIFF🚹

"Effective immediately, all National Security TARIFFS, Section 232 and existing Section 301 TARIFFS, remain in place, and in full force and effect. Today I will sign an Order to impose a 10% GLOBAL TARIFF, under Section 122, over and above our normal TARIFFS already being charged..."

  • President Donald J. Trump
00:01:30
How Our Reality Is Manifested ✚ In An Easy To Understand Clip

Filmmaker David Lynch's Diagram for Transcendental Consciousness is one of the greatest, easiest to understand explanations for how our reality is made of MIND first, MATTER second.

I promise this is genuinely worth your time.

It's fantastic. 💯

Learn to meditate free here:
https://heartfulness.org/us/

00:14:55
👉 Coinbase just launched an AI agent for Crypto Trading

Custom AI assistants that print money in your sleep? 🔜

The future of Crypto x AI is about to go crazy.

👉 Here’s what you need to know:

💠 'Based Agent' enables creation of custom AI agents
💠 Users set up personalized agents in < 3 minutes
💠 Equipped w/ crypto wallet and on-chain functions
💠 Capable of completing trades, swaps, and staking
💠 Integrates with Coinbase’s SDK, OpenAI, & Replit

👉 What this means for the future of Crypto:

1. Open Access: Democratized access to advanced trading
2. Automated Txns: Complex trades + streamlined on-chain activity
3. AI Dominance: Est ~80% of crypto 👉txns done by AI agents by 2025

🚹 I personally wouldn't bet against Brian Armstrong and Jesse Pollak.

👉 Coinbase just launched an AI agent for Crypto Trading
👀 XRP, The Simpsons, 1994 The Man Who Put It All Together 🚀

0:00​ XRP and The Simpsons Plus The Rising Phoenix

2:45​ Dr. Coleman Exposes The Entire System In 1994!

17:40​ Gematria With ISO and Ripple Plus Biblical Significance

25:17​ The Significance of The Original Ripple Logo

28:07​ Institut Montaigne Document Highlights Ripple
.
30:35​ Chatham House Significance Plus Meld Gold and The XRPL
37:32​ Carney and Georgieva of The IMF Speak On The Global Economy
41:49​ The Story of The Committee of 300 Document
44:58​ HSBC and Credit Suisse Significance Plus Otto B and Ripple
49:36​ The Significance of SIGINT Plus Jed McCaleb VAST Quant and Elon
56:09​ Closing Comments

⚠ Gold reclaims $5,100

Feb-21st Live Webinar ! How To Physically Rewrite Your Internal State Using Ultrasound

On February 21st at 11am PST, Sterling Cooley is revealing the tools the mainstream isn't ready for you to use at home. https://skool.com/vagus/feb-21st-live-webinar-how-to-physically-rewrite-your-internal-state-using-ultrasound

Most people treat the Vagus Nerve like a static biological wire. They are wrong.

It is a dynamic, vibrating gateway that can be re-tuned through Ultrasound Neuromodulation.

Your nervous system is not a machine; it is a symphony that has been played out of tune for decades.

We have been conditioned to believe that healing requires chemical intervention or talk therapy that barely scratches the surface.

What if the master key to your consciousness isn’t a pill, but a precise acoustic frequency?

We are demonstrating how to physically rewrite your internal state using ultrasound.

On February 21st at 11am PST, Sterling Cooley will demonstrate the tools for ultrasound application.
http://Skool.com/vagus

Arrive 30 minutes early for a sonic immersion of new music to ...

post photo preview
🧬VINDICATED! The Epstein Files Connect Gates, Pandemics & Censorship to a Globalist Blueprint for a Biosecurity State🧬

Every warning. Every documentary. Every article. Every post that got us banned. All of it was true. Now what? What can we do? Read on, share this Substack, help us save lives! The Light is shining! ✹

Well, well, well
 look what the cat dragged in.

Actually, scratch that. Look what the Department of Justice finally dragged out of Jeffrey Epstein’s email inbox and dumped on the world’s doorstep like a rotting corpse nobody wanted to claim. Yep, that’s right. The Epstein files. It’s hilarious how the “Democratic hoax” and “fantasy” client list we were all told didn’t exist suddenly became a very real, very unsealed document.

For years—years—they called us conspiracy theorists. They slapped “misinformation” labels on our posts faster than Pfizer could print liability waivers. They kicked us off platforms, lied about us in the media, and shadow-banned our reach. Meanwhile, the real conspiracy—the one typed out in black-and-white emails between billionaires, bankers, and a convicted pedophile—was sitting in a government vault, waiting to prove us right.

And now? Now the receipts are public.

The release of Jeffrey Epstein’s files has done far more than expose a network of elite pedophilia and blackmail—it has vindicated truth-tellers like us and countless others who were smeared, censored, de-platformed, and persecuted for warning about the sinister agendas of the globalist elite. The documents reveal shocking connections between Epstein, Bill Gates, pandemic planning, and the systematic suppression of anyone who dared to connect the dots.

We weren’t crazy. We were just early. And they hated us for it.

Epstein, Gates, and the Pandemic “Business Model” They Built Together

One of the most damning revelations from Epstein’s files is his partnership with Bill Gates. Forget the carefully crafted PR spin about “regretting” those meetings. These weren’t casual dinners. These were planning sessions.

Back in 2015, Gates and Epstein exchanged emails about “preparing for pandemics” and strategies to “involve the WHO.” Gates wrote: “I hope we can pull this off.”

How’s that for a chill down your spine?

This eerily foreshadowed the 2019 Event 201 simulation—a pandemic exercise hosted by the Gates Foundation, Johns Hopkins, and the World Economic Forum that just happened to model a global coronavirus outbreak
 just months before COVID-19 ”mysteriously” emerged in Wuhan. Funny how that works, isn’t it?

But let’s rewind even further, to the real blueprint—the financial architecture that made the pandemic response not just possible, but profitable.

The story crystallizes in a chilling 2011 email exchange. Juliet Pullis, a JPMorgan executive under then-chairman Jes Staley, emailed Jeffrey Epstein with a list of detailed questions. The source? “The JPM team that is putting together some ideas for Gates.”

The questions were precise: What are the objectives? Is anonymity key? Who directs the investments and grants? This wasn’t JPMorgan consulting an expert; it was a trillion-dollar bank asking a convicted felon to architect a billion-dollar philanthropic fund for Bill Gates.

This wasn’t JPMorgan consulting a philanthropic expert. This was a trillion-dollar bank asking a convicted felon to architect a billion-dollar philanthropic fund for one of the richest men on Earth. Let that marinate for a moment.

Epstein’s reply was fluent and commanding. He described a donor-advised fund with a “stellar board” and ties to the Gates-Buffett “Giving Pledge.” He noted the billions already pledged and identified the gap: “They all have a tax advisor, but have no real clue on how to give it away.” His solution? “JPM would be an integral part. Not advisor
 operator, compliance.“ Staley’s response: “We need to talk.”

By July 2011, the plan evolved. In an email to Staley, copying Boris Nikolic (Gates’ chief science advisor), Epstein laid out the core pitch: “A silo based proposal that will get Bill more money for vaccines.”

Not “more research for pandemics.” Not “better public health infrastructure.” “More money for vaccines.” This is the unambiguous language of capital formation, not charity. It reveals the structure’s intended output planning reached the highest levels.

In August 2011, Mary Erdoes, CEO of JPMorgan’s $2+ trillion Asset & Wealth Management division, emailed Epstein (while on vacation) with additional operational questions.

Epstein’s reply was breathtaking in scope:

  • Scale: “Billions of dollars” in two years, “tens of billions by year 4.”

  • Structure: Donors choose from “silos” like mutual funds.

  • The Kicker: “However, we should be ready with an offshore arm — especially for vaccines.”

An offshore arm. For vaccines. For a charitable vehicle. Let that sink in.

So, by the time the world was panicking in March 2020, the financial machinery was already built. The investment vehicles, the donor-advised funds, the reinsurance products at places like Swiss Re, and even the simulation playbooks were dusted off and ready to go.

The pandemic wasn’t an interruption to their business—it was the Grand Opening.

Epstein’s role extended far beyond trafficking; he was a facilitator and blackmail operative for the global elite. The same forces that orchestrated the COVID-19 power grab—the mask mandates, lockdowns, censorship, and coercive mRNA push—are the ones who silenced critics like us.

Gates, despite his documented ties to Epstein (multiple flights on the “Lolita Express” after Epstein’s 2008 conviction), walks freely. He’s on TV. He’s advising governments. He’s still funding “global health initiatives” and pushing digital IDs, vaccine passports, and climate lockdowns.

Meanwhile, people like our friend, Joby Weeks, are under house arrest without charges, and voices like ours were de-platformed, demonetized, and destroyed for saying this very thing.

We told you. You knew it in your gut. Now you have the emails.

Censorship: The Elite’s “Misinformation” Label to Cover Their Crimes

The Epstein files expose not just criminal behavior, but the playbook for the systematic suppression of truth. While Epstein’s powerful friends were being protected by the FBI, the DOJ, and the media, platforms like Facebook (Meta), YouTube (Google), and Twitter went to war against anyone talking about it.

Think about the sheer audacity.

We were banned from social media for calling COVID-19 a “fake pandemic” and exposing the vaccine injury data that’s now undeniable.

Below is a screenshot of the first Facebook post that was taken down and then used as “Exhibit A” in their “reports” about how bad we were, naming us the 3rd most dangerous people on earth after Dr Joseph Mercola and Bobby Kennedy in the digital hit list they called the “Disinformation Dozen.” They attacked us, lied about us, and pressured the media, social media, and population at large to do the same: attack, threaten, and cast us out.

We were labeled “dangerous” for sharing emails, documents, and research that the DOJ and the CDC have now confirmed.

It was never about “safety.” It was about narrative control.

The same institutions that turned a blind eye to Epstein’s crimes for decades—the same ones that let him “commit suicide” in a maximum-security prison with cameras conveniently malfunctioning—suddenly became the ruthless hall monitors of “acceptable discourse,” ensuring only their approved stories could be told.

Big Tech, Big Media, and Big Government are all part of the same protection racket. They shielded Epstein’s client list, and now they shield the architects of the pandemic debacle. Independent journalists, researchers, and health advocates like us, who connected these dots, were systematically de-platformed, demonetized, and destroyed.

Why? Because we were right, and that was the greatest threat of all.

When you’re over the target, that’s when the flak gets heaviest. And brothers and sisters, we were getting shelled.

They Lied About Us While Protecting the Real Criminals

Let’s be crystal clear about what happened here.

We have spent decades exposing the cancer industry, Big Pharma’s corruption, and the suppression of natural health solutions. We produced The Truth About Cancer docu-series, reaching millions worldwide. We warned about vaccine injuries, censorship, and the coming medical tyranny years before COVID-19.

And what did they do? They called us “Conspiracy Theorists,” “Anti-Vaxxers,” and “Killers.” Dangerous.

They said we were killing people with “misinformation.”

Facebook banned us. YouTube deleted our videos. Legacy media ran hit pieces. PayPal froze our accounts.

All while Bill Gates—a man with documented ties to Jeffrey Epstein, who flew on his plane multiple times after Epstein’s conviction, who got STDs from Russian girls Epstein provided for him for which Gates asked Epstein’s help getting him antibiotics to slip secretly to his then wife, Melinda, so that she would not know about his inexcusable and perverted escapades—yes, THAT Bill Gates—was at the same time, being platformed on every major news network as the world’s health oracle.

All while Anthony Fauci—who funded gain-of-function research in Wuhan through Peter Daszak and EcoHealth Alliance, who lied under oath to Congress, who flip-flopped on masks, lockdowns, and vaccines—was treated like a saint. Time Magazine’s “Guardian of the Year.”

All while Pfizer—a company with a $2.3 billion criminal fine for fraudulent marketing, bribery, and kickbacks—was given blanket immunity from liability and billions in taxpayer dollars to produce a vaccine in record time with no long-term safety data.

Were we the dangerous ones?

No.

We were the truthful ones. And that made us the enemy.

The Weaponized Institutions: From Epstein’s Blackmail to Your Digital ID

Epstein’s operation was never just about blackmail for perversion; it was blackmail for control. The files show his cozy ties to intelligence agencies (Mossad, CIA), financial giants like JPMorgan and Deutsche Bank, and political leaders across the globe.

This is the same cabal now pushing:

  • The Great Reset

  • Digital IDs

  • Central Bank Digital Currencies (CBDCs)

  • 15-minute cities

  • Carbon credit social scoring

  • Vaccine passports

Let’s connect the dots they desperately don’t want you to see:

Financial Control:

JPMorgan banked Epstein for years despite clear red flags—over $1 billion in suspicious transactions flagged internally and ignored. They knew. They didn’t care. They paid a $290 million fine and moved on.

Now, banks like Bank of America, Chase, and PayPal de-bank conservatives, truckers, health freedom advocates, and anyone who questions the narrative. Canadian truckers. Gun shops. Crypto entrepreneurs. The goal is the same: punish dissent and control economic life.

CBDCs are the endgame—a digital leash on every citizen. Programmable money that can be turned off, restricted, or expired. Social credit by another name.

Medical Tyranny:

The FDA, CDC, and WHO—utterly captured by Big Pharma—lied about:

  • COVID origins (Wuhan lab leak dismissed as conspiracy theory)

  • Vaccine efficacy (”95% effective” turned into “you need boosters forever”)

  • Natural immunity (ignored despite being superior)

  • Early treatments (ivermectin, hydroxychloroquine, vitamin D censored and mocked)

They attacked natural health advocates just as they’ve done for decades with cancer cures, detox protocols, and anything that threatens Big Pharma profits. They are not health agencies; they are profit-enforcement arms dressed in lab coats.

Political Corruption:

Epstein’s blackmail ensured elite immunity. His client list includes presidents, princes, CEOs, scientists, and media moguls.

Meanwhile, true dissidents—Julian Assange (tortured in prison for journalism), Edward Snowden (exiled for exposing mass surveillance), and journalists like us—face persecution, imprisonment, debanking, slanderous hit pieces, and/or constant character assassination.

Two systems of justice: one for them, one for you. One for Epstein’s friends, one for truth-tellers.

The Way Forward: They’re Exposed. Now It’s Time to Build.

The Epstein files are more than proof; they are a declaration that the system is rotten to its core. But here’s the beautiful part: they vindicate us completely.

Every warning. Every documentary. Every article. Every post that got us banned. All of it was true.

The globalists’ grip is weakening. The truth—the real, ugly, documented truth—is erupting from the very files they tried to hide. They labeled us liars, but the emails show they were the architects. They silenced us, they censored us, but that only made our voices more necessary.

Epstein did not kill himself. COVID-19 was not natural. The vaccines were not safe or effective. The censorship was not about protecting you—it was about protecting them.

And now? Now it’s time to use this vindication as fuel. Not for revenge, but for revolution. A revolution of truth, health, freedom, and justice.

They tried to bury us. They didn’t know we were seeds.

The Epstein files are a smoking gun. A paper trail. A confession written in emails, financial structures, and offshore accounts.

They prove what we’ve been saying all along:

  • The system is rigged.

  • The elites are criminals.

  • The pandemic was planned.

  • The censorship was coordinated.

And we were right. 👍

Source

🙏 Donations Accepted, Thank You For Your Support 🙏

If you find value in my content, consider showing your support via:

💳 Stripe:
1) or visit http://thedinarian.locals.com/donate

💳 PayPal: 
2) Simply scan the QR code below đŸ“Č or Click Here: 


🔗 Crypto Donations Graciously Accepted👇
XRP: r9pid4yrQgs6XSFWhMZ8NkxW3gkydWNyQX
XLM: GDMJF2OCHN3NNNX4T4F6POPBTXK23GTNSNQWUMIVKESTHMQM7XDYAIZT
XDC: xdcc2C02203C4f91375889d7AfADB09E207Edf809A6

Read full Article
post photo preview
💳Citi’s Strategy to Dominate Institutional Payments💳

Citi's Institutional Payments Strategy

Citi’s Strategy to Dominate Institutional Payments is built on a foundation of technological innovation, strategic simplification, and a laser focus on institutional clients. The bank has transitioned from a fragmented global retail bank to a streamlined provider of high-margin institutional services, with its Treasury and Trade Solutions (TTS) and Securities Services segments now considered its "crown jewel." This shift, led by CEO Jane Fraser, involved exiting 14 international consumer markets and slashing decades of "tech debt" through a multi-billion-dollar partnership with **Google Cloud**, creating a modern, unified data and cloud infrastructure.

At the core of Citi’s dominance in institutional payments is Citi Token Services, a blockchain-powered platform launched in September 2023. This service converts client deposits into digital tokens, enabling 24/7, real-time cross-border payments, automated trade finance, and just-in-time liquidity management. By using private blockchain technology managed entirely by Citi, clients avoid the need to host their own nodes. The solution has been successfully piloted with Maersk and a canal authority, demonstrating how smart contracts can reduce transaction times from days to minutes—mirroring the functions of traditional bank guarantees and letters of credit.

Citi is further strengthening its position through strategic partnerships, such as its collaboration with Coinbase to expand digital asset payment solutions for institutional clients, enabling seamless fiat-to-crypto transitions. The bank is also leveraging generative AI to automate regulatory compliance, improve cash forecasting by 50%, and reduce operational case times by 90%, directly enhancing the efficiency and reliability of its payment services.

With a global network spanning 95 countries and a focus on real-time, transparent, and programmable financial services, Citi is redefining the institutional payments landscape. Its strategy—centered on infrastructure modernization, digital asset innovation, and client-centric automation—positions it to capture market share from both traditional banks and fintechs, particularly as cross-border instant payments become the norm by 2028.

As blockchain infrastructure inches closer to the core of global finance, a consequential debate is taking shape inside banks and among institutional investors.

What form of digital money will ultimately dominate on-chain settlement?

Stablecoins have so far captured the spotlight, buoyed by rapid adoption and growing regulatory attention. But a different shift is underway inside the banking sector, where executives are increasingly confident that tokenized bank deposits, and not privately issued stablecoins, could become the preferred on-chain dollar for institutional and wholesale use.

“We don’t start with the asset,” Biswarup Chatterjee, global head of partnerships and innovation, Citi Services at Citi, told PYMNTS. “We typically start with our client need, and then we look at the pros and cons of each type of asset or financing instrument.”

For institutional money, innovation can often begin with constraint.

“When you’re dealing with money as a financial institution, you’re acting in a fiduciary capacity,” Chatterjee said, framing why safety and soundness dominate early conversations with clients.

From that perspective, the critical questions around new digital instruments are regulatory and operational before they are technological. Are these assets well-regulated? Do they operate within clearly defined legal frameworks? Can they be governed with the same rigor as traditional deposits or securities?

For institutions that manage systemic liquidity, and their clients, those questions are becoming non-negotiable. Within that context, tokenized deposits are what is emerging as a natural evolution of existing bank money.

“Within the bank’s network, tokenized deposits are an efficient way for our clients to be able to get that 24/7, always-on availability,” Chatterjee said.

The Race to Define the On-Chain Dollar for Institutional Use

By anchoring decisions in client economics and workflows, banks are positioning themselves less as promoters of specific technologies and more as integrators tasked with assembling the right mix of tools for each use case. Institutional clients are not simply looking for digital replicas of existing money; they are grappling with the friction of moving funds across use cases and jurisdictions.

“There’s this constant need to transform money across its various forms and shapes,” Chatterjee said, adding that payments, working capital and financing increasingly overlap, and inefficiencies emerge when money cannot move fluidly between those roles.

By representing deposits on distributed ledgers, banks can offer real-time movement of money across accounts, entities and geographies without leaving the regulated perimeter. For enterprises and institutions, this promises faster settlement, improved liquidity management and reduced operational friction, all without introducing new balance sheet or counterparty risks.

In this sense, tokenized deposits may turn out to be less disruptive than they appear. They modernize the plumbing of banking rather than bypassing it, extending familiar money into programmable environments.

Regulation, Interoperability and the Velocity of Money

The moment money exits a bank’s direct network, however, the strengths of tokenized deposits begin to fade. Cross-border payments, underbanked regions and counterparties outside major financial institutions can expose gaps in reach and efficiency when it comes to tokenized deposits.

This is where Chatterjee said he sees a role for stablecoins, not as competitors to banks, but as connective tissue.

“When money leaves the bank’s network and goes out into the external ecosystem, that’s where we see the role of stablecoins coming in,” he said, assuming they operate in a “very safe and sound and regulated manner.”

The result is likely to represent not a binary choice but a continuum. Just as checks, wires, cash and instant payments coexist today, digital money is likely to fragment into specialized forms optimized for different environments.

At the heart of the impact financial blockchain is having on digital money’s evolution lies a deceptively simple question: What makes money “good”?

For Chatterjee, the answer hinges on universal acceptance and trust.

“What makes a currency strong 
 has a lot to do with universal acceptance,” he said.

Assets that cannot be readily transferred or accepted risk becoming stranded, unable to circulate productively; while trust is fundamental to the value and stability of money, no matter its form. That logic applies equally to tokenized deposits and stablecoins. Without trust and transferability, neither is likely to function as a true institutional settlement asset.

Despite the focus on tokens and technology, Chatterjee was clear about where long-term value resides. It is not in the token itself, but in service.

“Client service and the client experience is what is going to drive the winning proposition,” he said.

Source 1

Source 2

🙏 Donations Accepted, Thank You For Your Support 🙏

If you find value in my content, consider showing your support via:

💳 Stripe:
1) or visit http://thedinarian.locals.com/donate

💳 PayPal: 
2) Simply scan the QR code below đŸ“Č or Click Here: https://www.paypal.com/donate/?business=8K3TZ2YFZ7SMU&no_recurring=0&item_name=Support+Crypto+Michael+%E2%9A%A1+Dinarian+on+Locals+Blog&currency_code=USD


🔗 Crypto Donations Graciously Accepted👇
XRP: r9pid4yrQgs6XSFWhMZ8NkxW3gkydWNyQX
XLM: GDMJF2OCHN3NNNX4T4F6POPBTXK23GTNSNQWUMIVKESTHMQM7XDYAIZT
XDC: xdcc2C02203C4f91375889d7AfADB09E207Edf809A6

 

Read full Article
post photo preview
New Allegations Link Former National Intelligence Leaders Clapper and O’Sullivan to UFO Shoot-Down and Retrieval Program

Written by Christopher Sharp - 24 January 2026

Multiple sources have told Liberation Times that, during the Obama administration, senior intelligence figures James Clapper and Stephanie O’Sullivan oversaw a program relating to Unidentified Anomalous Phenomena (UAP) within the Office of the Director of National Intelligence. 

The sources allege the effort involved the shootdown and recovery of exotic vehicles thought to be of non-human origin.

Three separate sources told Liberation Times that Clapper allegedly ran the program alongside O’Sullivan, dating back to his tenure as Under Secretary of Defense for Intelligence from 2007 to 2010

During that period, O’Sullivan led the CIA’s Directorate of Science and Technology before being promoted in 2009 to become the agency’s third-most senior officer.

One source alleged to Liberation Times that Clapper and O’Sullivan oversaw a program codenamed ‘Golden Domes,’ which the source claimed was jointly run by the CIA and the United States Air Force (USAF), where Clapper previously served.

The source further alleged that the program could detect and track UAP even when ‘cloaked’ and as they physically manifested.

The same source claimed the program employed a mix of electronic and laser-based capabilities intended to bring down what the source described as ‘exotic non-human vehicles.’

Sources were unable to offer Liberation Times a clear explanation for why the U.S. government would choose to engage UAP, including whether any such actions were taken routinely, in specific circumstances, or in relation to any potential understandings or rules of engagement involving other purported non-human factions.

In the recently released documentary ‘The Age of Disclosure’, James Clapper alleged that a secretive USAF program had been actively monitoring UAP, particularly over the highly classified Area 51 facility in Nevada - an epicentre of cutting-edge military development and testing.

Clapper, a former Chief of USAF Intelligence, stated:

“When I served in the Air Force, there was an active program to track anomalous activities that we couldn’t otherwise explain - many of them connected with ranges out west, notably Area 51.”

In a recent interview with journalist Megyn Kelly, former intelligence official, USAF veteran, and UAP whistleblower David Grusch claimed that James Clapper managed a UAP program, stating:

“I'm a little bit disappointed as a fellow Air Force officer
. That's all he said in the documentary: that there was a program he was aware of. 

 

“In fact, without being inappropriate, I will say that General Clapper was well aware of the crash retrieval issue, managed the crash retrieval issue, and, when he was a DNI [Director of National Intelligence], USDI [Undersecretary of Defense for Intelligence and Security], DIA [Defense Intelligence Agency], he placed people in critical roles to manage this issue, both publicly - and I'll just say not publicly as well - and I'll allow the audience to distill what I'm saying at the, at the risk of being inappropriate or going too far with my discussion. 

 

“So General Clapper, Stephanie O’Sullivan, other folks in the IC [Intelligence Community] that are well aware of this issue, that were in rooms discussing this issue, I ask you to be greater leaders on this. I should not be the only former military officer and intelligence official that is being completely candid with the information that they were exposed to.”

Grusch’s lawyer, Charles McCullough III served as the Intelligence Community Inspector General, reporting directly to then–Director of National Intelligence James Clapper.

In that role, according to his biography, McCullough ‘oversaw intelligence officers responsible for audits, inspections, and investigations. Furthermore, he was responsible for inquiries involving the Office of the Director of National Intelligence as well as the entire Intelligence Community.’

                            Above: Charles McCullough, III and James Clapper

Grusch, in that same interview, also alleged that former Vice President Dick Cheney, who has since died, was the “closest person” to a “mob boss,” exerting “central leadership” over UAP-related activities.

Notably, Dick Cheney’s wife, Lynne Cheney, served on Lockheed Corporation’s board of directors from 1994 to 2001.

Against that backdrop, in written testimony to Congress, Lue Elizondo, the former director of the Pentagon’s Advanced Aerospace Threat Identification Program, claimed that Naval Air Station Patuxent River in Maryland was among the sites prepared in connection with an alleged transfer of UAP materials to Bigelow Aerospace from Lockheed Martin - an organisation long accused of involvement in an alleged UAP reverse-engineering program.

In a 2013 Fox News interview, Dick Cheney said he first met James Clapper around 25 years earlier, when Clapper was serving as a USAF intelligence officer in Korea.

James Clapper served as the fourth Director of National Intelligence under President Obama from August 2010 to January 2017. Before that, he was Under Secretary of Defense for Intelligence from 2007 to 2010 under President George W. Bush and Vice President Dick Cheney.

Clapper also previously served as Director of the National Geospatial-Intelligence Agency and Director of the Defense Intelligence Agency. 

In his book Facts and Fears, he recounts how he was assigned as the USAF senior resident officer at the National Security Agency (NSA) to represent Air Force interests. In February 1980, then-NSA Director Vice Admiral Bobby Inman presided over Clapper’s promotion to colonel, as he assumed responsibility for all Air Force personnel stationed at the NSA.

Clapper writes in his book that he served as an intermediary for Vice Admiral Bobby Inman, whom he describes as “an icon and a legend” and who has also been alleged to be a UAP gatekeeper.

Inman was clearly aware of the link between O’Sullivan’s former office and UAP-related matters. In a now-public phone call with NASA engineer Bob Oechsler, Inman said that Everett Hineman, then Deputy Director of the CIA’s Directorate of Science and Technology, would be “the best person” to ask whether any recovered UAP vehicles might be made available for technological research outside military channels.

Notably, former NSA administrator Mike Rogers has recalled in an interview that, while serving as Director of National Intelligence, Clapper unexpectedly ordered him and his team to review the NSA’s files and provide everything relating to UFOs.

Upon being nominated as Director of National Intelligence by President Obama in 2010, Clapper was described as having developed close ties to the intelligence community during his long career and is particularly close to senior managers at the CIA.

In 2011, Clapper recommended that President Obama nominate Stephanie O’Sullivan as Principal Deputy Director of National Intelligence (PDDNI). 

Before her nomination, O’Sullivan served as the CIA’s Associate Deputy Director from December 2009 to February 2011, working alongside the Director and Deputy Director to provide overall leadership of the agency, with a particular focus on day-to-day management. 

                                                Above: Stephanie O’Sullivan

Before that, she served as the CIA’s Deputy Director of Science and Technology for 4 years. According to Liberation Times sources, the CIA’s Directorate of Science and Technology has and continues to be involved in coordinating UAP retrieval missions and safeguarding technologies derived from UAP-related research carried out by the Department of War (DoW) and its contractors.

Based on the best available open source information, previous Deputy Directors of the CIA’s Directorate of Science and Technology include:

  • Albert Wheelon 1963-1966

  • Carl Duckett 1966-1967

  • Leslie Dirks 1967-1982

  • R. Evan Hineman 1982-1989

  • James Hirsch 1989-1995

  • Ruth David 1995-1998

  • Gary Smith 1999-1999

  • Joanne Isham 1999-2001

  • Donald Kerr 2001-2005

  • Stephanie O’Sullivan 2005-2009

  • Glenn Gaffney 2009-2015

  • Dawn Meyerriecks 2015-2021

  • Todd Lowery 2021-present

In his book, ‘Facts and Fears’, Clapper writes that he knew O’Sullivan by reputation as a brilliant technical engineer, and that then-CIA Director Leon Panetta put her forward to him as his deputy - someone who could help cover his blind spots when CIA-related issues arose. 

Clapper describes the day of O’Sullivan’s confirmation to PDDNI - a title O’Sullivan jokingly referred to as ‘P-Diddy’ - as ‘an extremely happy one’. Their working relationship within the ODNI was extremely close, and Clapper has written that he learned to adopt the line “Stephanie speaks for me, even when we haven’t spoken.”

O’Sullivan entered the intelligence world after responding to a cryptic newspaper classified advert seeking an “ocean engineer”. That move led her to TRW, the defense contractor absorbed into Northrop Grumman, and later the Office of Naval Intelligence. Liberation Times sources allege that Northrop Grumman’s Tejon Ranch Radar Cross Section Facility in southern California is a site where UAPs are routinely retrieved.

Since her retirement from government in 2017, O’Sullivan now serves as a member of the Board of Trustees of the Aerospace Corporation and is on the Board of Directors of Battelle Memorial Institute. 

Battelle and The Aerospace Corporation have both been referenced publicly in connection with UAP programs. 

Sources also note that O’Sullivan sits on the board of HRL Laboratories, formerly Hughes Research Laboratories, part of the wider Hughes corporate legacy that is closely associated with the Hughes Glomar Explorer, the vessel later linked to the CIA’s effort to recover a sunken Soviet submarine.

Sources told Liberation Times that Stephanie O’Sullivan has been questioned by the Senate Select Committee on Intelligence about her alleged role in a UAP program. 

The sources further allege that she misled committee members, including then Senator Marco Rubio, now Secretary of State, by nervously claiming that she had no involvement.

Allegations of kinetic engagement have surfaced in other contexts. 

In written testimony submitted to Congress, journalist George Knapp relayed what he said he was told by figures linked to a former Russian Ministry of Defense UAP program: that Russian fighter aircraft were dispatched to intercept UAP on numerous occasions and, in a small number of cases, were ordered to fire. 

Knapp wrote that after several alleged incidents in which aircraft subsequently crashed, a standing order was issued instructing pilots to disengage and ‘leave the UFOs alone because, quote, “they could have incredible capacities for retaliation.”’ 

Source

  🙏 Donations Accepted, Thank You For Your Support 🙏

If you find value in my content, consider showing your support via:

💳 Stripe:
1) or visit http://thedinarian.locals.com/donate

💳 PayPal: 
2) Simply scan the QR code below đŸ“Č or Click Here: https://www.paypal.com/donate/?business=8K3TZ2YFZ7SMU&no_recurring=0&item_name=Support+Crypto+Michael+%E2%9A%A1+Dinarian+on+Locals+Blog&currency_code=USD


🔗 Crypto Donations Graciously Accepted👇
XRP: r9pid4yrQgs6XSFWhMZ8NkxW3gkydWNyQX
XLM: GDMJF2OCHN3NNNX4T4F6POPBTXK23GTNSNQWUMIVKESTHMQM7XDYAIZT
XDC: xdcc2C02203C4f91375889d7AfADB09E207Edf809A6

Read full Article
See More
Available on mobile and TV devices
google store google store app store app store
google store google store app tv store app tv store amazon store amazon store roku store roku store
Powered by Locals