CyberCriminal.com

Royston G King

We are investigating Royston G King for allegedly attempting to conceal critical reviews and adverse news from Google by improperly submitting copyright takedown notices. This includes potential violations such as impersonation, fraud, and perjury.

PARTIES INVOLVED : Royston G King

ALLEGATIONS : Perjury, Fraud, Impersonation

INCIDENT DATE : Dec 02 2024

INVESTIGATED BY : Ethan Katz

TOOLS USED : Lumen, FakeDMCA, SecurityTrails

CASE NO : 0629/A/2024

CRIME TYPE : Intellectual Property Scam

PUBLISHED ON : 23 Nov 2024

Royston G King
Due Diligence
Get everything we know about Royston G King in one downloadable PDF document
Is This About You?
We encourage you to share details of the actual perpetrators and get your story straight.

What We Are Investigating?

Our firm is launching a comprehensive investigation into Royston G King over allegations that it has been suppressing critical reviews and unfavorable Google search results by fraudulently misusing DMCA takedown notices. These actions, if proven, could constitute serious legal violations—including impersonation, fraud, and perjury.

We conducted comprehensive analyses of fraudulent copyright takedown requests, meritless legal complaints, and other unlawful efforts to suppress public access to critical information. Our reporting sheds light on the prevalence and modus operandi of a structured censorship network, often funded and used by criminal enterprises, oligarchs and criminal entities seeking to manipulate public perception and bypass AML checks conducted by financial organisations.

The fake DMCA notices in this investigation appears to have been strategically deployed to remove negative content from Google search results illegally. Based on this pattern, we have reasonable grounds to infer that Royston G King - or an entity acting at its behest - is directly or indirectly complicit in this cyber crime.

In most such cases, such ops are executed by rogue, fly-by-night 'Online Reputation Management' agencies acting on behalf of their clients. If evidence establishes that the subject knowingly benefited from or facilitated this scam, it may be deemed an 'accomplice' or an 'accessory' to the crime.

What are they trying to censor

Royston G. King, the architect behind the “Trillion Dollar Growth” program, has been the subject of mounting scrutiny due to several concerning aspects of his business practices.

Allegations and Red Flags
1.Opaque Pricing Strategies: Potential clients are prompted to schedule a 15-minute demo call to uncover the program’s cost—a tactic often employed to obscure high fees.

2.Incomplete Educational Content: Reports indicate that the program’s training materials are riddled with missing documents and modules, leaving participants without crucial information.

3.Unsubstantiated Success Claims: King touts significant personal achievements in e-commerce, yet there’s a conspicuous absence of independent reviews or third-party validations to back these assertions.

4.Dubious Marketing Techniques: The program leans heavily on TikTok organic marketing as a primary traffic source—a method criticized for its unpredictability and inconsistency.

5.Negative Community Feedback: Discussions on platforms like Reddit advise caution, highlighting concerns about the legitimacy of King’s offerings and suggesting that his primary income may stem from selling courses rather than actual e-commerce success.

Potential Motivations for Information Suppression:

Given these allegations, it’s plausible that Royston G. King would seek to expunge negative information to preserve his reputation and maintain the program’s profitability. In the digital age, where online perception can make or break a business, unfavorable reviews and critiques can deter potential clients. The desire to uphold a facade of success might drive individuals to extreme measures, including unethical or illegal activities, to silence dissent.

While there’s no direct evidence linking King to cybercrimes, the pressure to protect one’s brand can lead some to consider hacking, data breaches, or other cyber offenses to remove adverse content. Such actions not only undermine the integrity of the digital information ecosystem but also pose significant legal risks.

In conclusion, the controversies surrounding Royston G. King’s “Trillion Dollar Growth” program underscore the importance of due diligence. Prospective participants should thoroughly research and critically assess such programs before committing, ensuring they make informed decisions in an environment rife with potential pitfalls.

  • https://lumendatabase.org/notices/37853025
  • https://lumendatabase.org/notices/37563655
  • https://lumendatabase.org/notices/37521794
  • https://lumendatabase.org/notices/37498511
  • Dec 02, 2023
  • Nov 20, 2023
  • Nov 18, 2023
  • Nov 17, 2023
  • Maria Watson Lawfirm LLC
  • Rich Media Corporation
  • Wells Media Corporation
  • Arms Media Group
  • https://www.garyhamel.com/sites/default/files/uploads/three-trillion-dollars.pdf
  • https://baytalkers.com/2023/11/11/royston-g-kings-trillion-dollar-growth-review-is-he-credible/
  • http://ippei.com/trillion-dollar-growth

Evidence Box

Evidence and relevant screenshots related to our investigation

Targeted Content and Red Flags

vocal.media

Avoiding Online Business Coaching Scams: Red Flags and Reliable Choices

  • Red Flag
Visit Link

financescam.com

Royston G King’s Trillion Dollar Growth: A Risky Ecommerce Scheme You Should Avoid

  • Red Flag
Visit Link

ippei.com

Royston G King’s Trillion Dollar Growth Review: Is He Credible?

  • Removed
Visit Link

About the Author

The author is affiliated with TU Dresden and analyzes public databases such as Lumen Database and FakeDMCA.com to identify and expose online censorship. In his personal capacity, he and his team have been actively investigating and reporting on organized crime related to fraudulent copyright takedown schemes.

Additionally, his team provides advisory services to major law firms and is frequently consulted on matters pertaining to intellectual property law.

He can be reached at [email protected] directly.

Escalate This Case
Please enable JavaScript in your browser to complete this form.
Checkboxes

Learn All About Fake Copyright Takedown Scam

Or go directly to the feedback section and share your thoughts

How This Was Done

The fake DMCA notices we found always use the 'back-dated article' technique. With this technique, the wrongful notice sender (or copier) creates a copy of a 'true original' article and back-dates it, creating a 'fake original' article (a copy of the true original) that, at first glance, appears to have been published before the true original

What Happens Next?

Based on the feedback, information, and requests received from all relevant parties, our team will formally notify the affected party of the alleged infringement. Following a thorough review, we will submit a counter-notice to reinstate any link that has been removed by Google, in accordance with applicable legal provisions. Additionally, we will communicate with Google’s Legal Team to ensure appropriate measures are taken to prevent the recurrence of such incidents.

You are Never Alone in Your Fight.

Generate public support against the ones who wronged you!

Domain Check

Stop fraud before it happens with unbeatable speed, scale, depth, and breadth.

Recent Checks

Cyber Investigation

Uncover hidden digital threats and secure your assets with our expert cyber investigation services.

Recent Investigation

Our Community

Your trusted source for breaking news and insights on cybercrime and digital security trends.

Visit Forum

Threads Alert

Stay ahead of cyber threats with our daily list of the latest alerts and vulnerabilities.

Threads Alert