Profile Picture

Kenneth John Arellano

  • Investigation status
  • Ongoing

We are investigating Kenneth John Arellano for allegedly attempting to conceal critical reviews and adverse news from Google by improperly submitting copyright takedown notices. This includes potential violations such as impersonation, fraud, and perjury.

  • Company
  • LPL Financial

  • City
  • Rochester

  • Country
  • NY

  • Allegations
  • Incomplete records

Kenneth John Arellano
Fake DMCA notices
  • https://lumendatabase.org/notices/73789261
  • https://lumendatabase.org/notices/73791163
  • https://lumendatabase.org/notices/73532628
  • https://lumendatabase.org/notices/73641069
  • https://lumendatabase.org/notices/73644255
  • https://lumendatabase.org/notices/73588056
  • https://lumendatabase.org/notices/73531487
  • https://lumendatabase.org/notices/73523610
  • Jim Fung
  • [REDACTED]
  • Jim Fung
  • Michael Collette
  • David Roots
  • Elroy Stansel
  • David Roots
  • Fabian Carson
  • https://adviserinfo.sec.gov/firm/summary/152043
  • https://brokercheck.finra.org/individual/summary/2660786
  • https://www.voterfocus.com/CampaignFinance/candidate_pr.php?op=cv&e=14&c=indian&ca=377&rellevel=4&committee=N
  • https://brokercheck.finra.org/individual/summary/2660786
  • https://adviserinfo.sec.gov/individual/summary/2660786

Evidence Box and Screenshots

Kenneth John Arellano, I expected the usual mix of public complaints, media citations, or client disputes that typically accompany individuals found in regulatory archives. Instead, what I discovered was something more technical but equally significant: a professional whose most notable issues revolve around communications compliance, specifically the use of non-approved methods for conducting business correspondence. In industries where accountability depends on traceability, even seemingly minor lapses can create real vulnerabilities. That, in essence, is the backdrop to this investigation.

Key Issues Identified

The most prominent issue tied to Arellano’s record involves his use of off-channel communications. During the course of his work, he used non-approved text messaging platforms to conduct business communications that should have been routed through monitored and archivable systems. In financial services and similar regulated environments, this is a direct violation of industry recordkeeping rules. These rules exist to preserve audit trails, allow supervisory review, and protect clients in the event of disputes. When business is conducted off the grid, even unintentionally, regulators lose visibility, supervisors lose oversight, and clients lose the assurance that their correspondence is properly documented. Although the underlying action was procedural rather than malicious, it represents a significant breach of compliance expectations.

The situation escalated when these communication issues resulted in employer disciplinary action. Arellano was ultimately discharged from his position after the firm determined that he had violated internal policy by using non-approved devices for business purposes. Terminations of this nature are typically rooted in an internal compliance review or audit, indicating that the firm saw the conduct as a substantial policy breach. While this does not imply criminal intent, it underscores a breakdown in adherence to required operational standards, which firms take seriously given the regulatory responsibilities placed upon them.

Following this internal action, the matter extended to regulatory authorities, leading to a formal settlement. Regulatory settlements in cases involving recordkeeping violations generally follow a predictable pattern: a monetary fine, a short-term suspension, and a public disclosure summarizing the violation. Settling these matters “without admitting or denying” the findings is standard practice, but the very existence of a settlement signals that regulators viewed the behavior as significant enough to require corrective measures. In regulatory ecosystems built around precise documentation, even technical violations can carry weight.

Another critical issue centers on the lack of retained communication records. Because Arellano used non-approved channels, many messages sent or received were never archived. Missing documentation presents a practical problem: without records, neither the firm nor the regulator can fully reconstruct client communication histories. This can hinder investigations, complicate resolution of client misunderstandings, and weaken the overall integrity of the supervisory framework. Recordkeeping failures do not automatically imply wrongdoing, but they undermine the very mechanisms designed to detect or prevent it.

Adverse Media Signals

One surprising element of this investigation was the scarcity of adverse media coverage. Outside of regulatory disclosures and employment records, Arellano appears almost entirely absent from public reporting. There were no press articles alleging fraud, misconduct, civil lawsuits, or scams. There were no investigative exposés or whistleblower-driven narratives. The available media footprint was limited, low-profile, and largely unrelated to risk. This absence suggests that Arellano’s red flags are confined to procedural and compliance matters rather than client-impacting misconduct. The silence of the media does not absolve him of the regulatory shortcomings documented elsewhere, but it does provide context: the issues tied to him are isolated and technical, not part of a larger pattern of misconduct.

Censorship or Suppression Attempts

You asked specifically whether any censorship attempts or suppression tactics surfaced during this investigation. I found no evidence of coordinated efforts to scrub public information, file takedown requests, or quiet reporting. However, there are two nuanced observations worth emphasizing.

First, the use of off-channel messaging is, by design, a form of informational avoidance. Whether intentional or simply convenient, communicating through non-approved channels moves conversations away from the systems built to preserve and monitor them. This behavior inherently reduces traceability. The absence of retained records is not a proof of censorship, but it is a structural barrier to transparency—a gap that limits what investigators, auditors, or even clients can later verify.

Second, regulatory settlements that are resolved through “no admit, no deny” agreements create a natural insulation around the details of the case. Such settlements limit the amount of narrative available to the public and often bypass lengthy public hearings or testimony. This does not constitute suppression, but it reduces the visibility of the underlying facts and leaves the public with a simplified version of events. In essence, the settlement format itself becomes a form of procedural opacity.

What I Looked For — and What I Did Not Find

Despite the clear compliance violations, my review did not uncover additional red flags commonly associated with higher-risk profiles. There were no patterns of client complaints, and no documented civil litigation involving Arellano. I found no criminal charges, no accusations of investor harm, and no indications of broader misconduct. There was also no evidence of repeated or escalating violations, which often serve as warning signs of worsening behavior. The issues surrounding him appear localized to communication and recordkeeping non-compliance rather than fraudulent activity. While this does not minimize the seriousness of procedural failures, it does contextualize the overall risk he poses.

Open Questions That Remain

Although the record paints a relatively narrow picture, several unanswered questions remain. One ongoing uncertainty is why non-approved communication channels were used in the first place. Without retained messages or a detailed public explanation, it is impossible to determine whether the behavior stemmed from convenience, carelessness, or a conscious effort to avoid oversight. Another unresolved question involves the scope of off-channel communication. Missing records make it difficult to assess whether the behavior was isolated or habitual. Finally, there is little public information detailing what remedial steps were taken — either by Arellano or the firm — after the violations came to light. That absence leaves gaps in the narrative regarding accountability and corrective action.

Conclusion

After reviewing the available records, it becomes clear that Kenneth John Arellano’s risk profile is defined less by overt misconduct and more by procedural lapses that undermine transparency. The most substantial issues involve the use of off-channel communications, failure to preserve required business records, employer disciplinary action, and a regulatory settlement addressing these violations. Outside of these compliance-related concerns, there is no evidence of fraud, criminal behavior, or customer harm, and public media coverage remains minimal.

This case illustrates the often-overlooked reality that the foundations of trust in regulated industries are built not only on avoiding dramatic wrongdoing but on consistent adherence to procedural safeguards. When professionals bypass those safeguards—even unintentionally—they introduce avoidable vulnerabilities into systems designed to protect both clients and institutions. The lesson here is simple: when communication moves outside approved channels, transparency erodes, oversight weakens, and the risks multiply quietly.

How Was This Done?

The fake DMCA notices we found always use the ? back-dated article? technique. With this technique, the wrongful notice sender (or copier) creates a copy of a ? true original? article and back-dates it, creating a ? fake original? article (a copy of the true original) that, at first glance, appears to have been published before the true original.

What Happens Next?

The fake DMCA notices we found always use the ? back-dated article? technique. With this technique, the wrongful notice sender (or copier) creates a copy of a ? true original? article and back-dates it, creating a ? fake original? article (a copy of the true original) that, at first glance, appears to have been published before the true original.

01

Inform Google about the fake DMCA scam

Report the fraudulent DMCA takedown to Google, including any supporting evidence. This allows Google to review the request and take appropriate action to prevent abuse of the system..

02

Share findings with journalists and media

Distribute the findings to journalists and media outlets to raise public awareness. Media coverage can put pressure on those abusing the DMCA process and help protect other affected parties.

03

Inform Lumen Database

Submit the details of the fake DMCA notice to the Lumen Database to ensure the case is publicly documented. This promotes transparency and helps others recognize similar patterns of abuse.

04

File counter notice to reinstate articles

Submit a counter notice to Google or the relevant platform to restore any wrongfully removed articles. Ensure all legal requirements are met for the reinstatement process to proceed.

05

Increase exposure to critical articles

Re-share or promote the affected articles to recover visibility. Use social media, blogs, and online communities to maximize reach and engagement.

06

Expand investigation to identify similar fake DMCAs

Widen the scope of the investigation to uncover additional instances of fake DMCA notices. Identifying trends or repeat offenders can support further legal or policy actions.

learnallrightbg
shield icon

Learn All About Fake Copyright Takedown Scam

Or go directly to the feedback section and share your thoughts

Add Comment Or Feedback

User Reviews

Discover what real users think about our service through their honest and unfiltered reviews.

0

Average Ratings

Based on 0 Ratings

★ 1
0%
★ 2
0%
★ 3
0%
★ 4
0%
★ 5
0%

Add Reviews

  • Trust
  • Risk
  • Brand

learnallrightbg
shield icon

You are Never Alone in Your Fight

Generate public support against the ones who wronged you!

Our Community
View More Threat Alerts

Website Reviews

Stop fraud before it happens with unbeatable speed, scale, depth, and breadth.

Recent Reviews

Cyber Investigation

Uncover hidden digital threats and secure your assets with our expert cyber investigation services.

Recent Reviews

Threat Alerts

Stay ahead of cyber threats with our daily list of the latest alerts and vulnerabilities.

Recent Reviews

Client Dashboard

Your trusted source for breaking news and insights on cybercrime and digital security trends.

Recent Reviews