Why Was Hunter Paying Joe Biden $50k Per Month To Rent House Where Classified Documents Found?
January 15, 2023 2:12 pm
Tags: $50k, biden, classified, Documents, found, house, Hunter, joe, joshwho, Media, month, News, paying, per, rent, was, where, why, ZeroHedge
Categories: JoshWho News news media US News ZeroHedge
A Thursday tweet from the NY Post‘s Miranda Devine containing a background check for Hunter Biden has people asking questions.
“The now-52-year-old began listing the Wilmington home as his address following his 2017 divorce from ex-wife Kathleen Buhle — even falsely claiming he owned the property on a July 2018 background check form as part of a rental application,” the Post reported.
Of note, this is the same house where classified documents were found.
Yet, upon closer inspection, Hunter lists the “Monthly Rent” as $49,910 – or roughly $550,000 for the 11 months he indicated he lived there?
— Miranda Devine (@mirandadevine) January 12, 2023
A Zillow search reveals that the most expensive home currently for rent in Wilmington, Delaware is going for $6,000 per month.
According to Town & Country magazine, Biden’s home is worth around $2 million.
Could Hunter, a crackhead, have accidentally listed the annual rent payment to his father for the house which contained classified documents? Sure. But why was his wealthy ex-VP dad charging him rent in the first place, when Hunter was allegedly broke?
Trending Politics asks the quiet part out loud; was this Hunter’s way of funneling money to his father?
After Hunter’s divorce was finalized in May of 2017, he was included in an email from his business partner James Gilliar about a venture with Chinese state-funded energy company CEFC China Energy. The email stated that Hunter and his partners would receive 20% of the shares in the new business, with 10% going to Hunter’s uncle James Biden and the other 10% being “held by H for the big guy.”
Tony Bobulinski, another one of Hunter’s former business partners, claims that he had a meeting with Joe Biden regarding the CEFC venture on May 2, 2017, and that the president was the individual referred to as the “big guy” in Gilliar’s email. Additionally, Gilliar himself confirmed that Joe Biden was the “big guy” mentioned in a message found on the laptop.
And as the NY Post reports, “The following year, federal investigators began looking into whether Hunter and his business associates violated tax and money laundering laws during their dealings in China and other countries. Emails and other records related to the deals were found on the laptop, which Hunter dropped off at a Delaware repair shop in 2019 and never reclaimed.“
“I hope you all can do what I did and pay for everything for this entire family for 30 years,” Hunter told his daughter Naomi in January, 2019. “It’s really hard. But don’t worry, unlike pop, I won’t make you give me half your salary.”
Of course, Hunter paid his daddy $50k a month in rent.
Here’s a text message Hunter sent his daughter in 2019 saying he gives JOE BIDEN “half” his salary.
— kanekoa.substack.com (@KanekoaTheGreat) January 14, 2023
As the Post continues:
The laptop doesn’t contain any direct evidence of such money transfers but shows Hunter was routinely on the hook for household expenses — including repairs to the Wilmington home.
In December 2020, weeks after his father was elected president, Hunter Biden announced that his “tax affairs” were being investigated by federal authorities in Delaware, and said he was “confident that a professional and objective review of these matters will demonstrate that I handled my affairs legally and appropriately.”
Recent reports have indicated investigators believe they have enough evidence to charge the first son with tax crimes — as well as with lying about his drug abuse on a federal form so he could buy a gun in 2018.
So, was the $49,910 ‘monthly’ rent a simple crackhead mistake when that was in fact the annual payment amount, or did Hunter create “Exhibit A” for any honest prosecutors to pursue? We aren’t holding our breath on the latter.
- Seattle Reverses Course, Makes Public Drug Use Arrestable Crime September 21, 2023
- US Wants Saudi Defense Pact Modeled After South Korea, Japan Deals September 21, 2023
- America’s First ‘Shroom Clinic’ Opens In Oregon September 21, 2023
- On The Idiotic Notion That It’s Brave To Support Nuclear Brinkmanship In Ukraine September 21, 2023
- Eric Clapton Helps RFK Jr. Raise $2.2 Million At Los Angeles Fundraiser September 21, 2023
- Olive Garden Owner Warns: “Decline In Fine Dining” As Wealthy Americans Trade Down To Cheap Booze September 21, 2023
- Musk’s SpaceX Countersues DOJ, Says Case Over Refusal To Hire Refugees Is Unconstitutional September 21, 2023
- “Large Number Of Issues Settled”: Strikes At Australian LNG Plants Might End As Early As Friday September 21, 2023
- Bitcoin Vs Ethereum: A Culture War Rooted In First Principles September 21, 2023
- Hollywood Writers Strike Could Be Over As Soon As Today September 21, 2023
- BOE Surprises Markets By Keeping Rates Unchanged For The First Time In Two Years September 21, 2023
- This Is The Worst Global Food Crisis In Modern History, And It Is About To Go To An Entirely New Level September 21, 2023
- Rebooted Clinton Global Initiative Licks Chops Over Ukraine ‘Humanitarian’ Aid September 21, 2023
- Negotiations Break Down Between Chevron And Australian LNG Workers September 21, 2023
- Backfire: World’s Fourth Largest Iron Ore Producer Stops Purchasing Carbon Offsets September 21, 2023
- Syria On The Verge Of Collapse? September 21, 2023
- Escobar: Russia, North Korea Stage ‘Strategic Coup’ Against Western Hegemony September 20, 2023
- Subtropical Storm Might Swamp Northeast This Weekend September 20, 2023
- Trump Autographs Woman’s Shirt in Iowa Bar September 20, 2023
- Rand Paul: ‘I Will Not Consent’ to Stopgap Spending Bill that Includes Aid to Ukraine September 20, 2023
- ApexSMS - 23,246,481 breached accounts September 21, 2023In May 2019, news broke of a massive SMS spam operation known as "ApexSMS" which was discovered after a MongoDB instance of the same name was found exposed without a password. The incident leaked over 80M records with 23M unique email addresses alongside names, phone numbers and carriers, geographic locations (state and country), genders and […]
- dBforums - 363,468 breached accounts September 20, 2023In July 2016, a data breach of the now defunct database forum "dBforums" appeared for sale alongside several others hacked from the parent company, Penton. The breach of the vBulletin based forum contained 363k unique email addresses alongside usernames, IP addresses, dates of birth and salted MD5 password hashes.
- MalindoAir - 4,328,232 breached accounts September 14, 2023In early 2019, the Malaysian airline Malindo Air suffered a data breach that exposed tens of millions of customer records. Containing 4.3M unique email addresses, the breach also exposed extensive personal information including names, dates of birth, genders, physical addresses, phone numbers and passport details. The data was later extensively shared on popular hacking forums.
- Viva Air - 932,232 breached accounts September 11, 2023In March 2022, the now defunct Columbian airline Viva Air suffered a data breach and subsequent ransomware attack. Among a trove of other ransomed data, the incident exposed a log of 2.6M transactions with 932k unique email addresses, physical and IP addresses, names, phone numbers and partial credit card data (last 4 digits).
- Dymocks - 836,120 breached accounts September 8, 2023In September 2023, the Australian book retailer Dymocks announced a data breach. The data dated back to June 2023 and contained 1.2M records with 836k unique email addresses. The breach also exposed names, dates of birth, genders, phone numbers and physical addresses.
- Phished Data via CERT Poland - 67,943 breached accounts August 31, 2023In August 2023, CERT Poland observed a phishing campaign that collected credentials from 68k victims. The campaign collected email addresses and passwords via a phishing email masquerading as a purchase order confirmation. CERT Poland identified a further 202 other phishing campaigns operating on the same C2 server, which has now been dismantled.
- Pampling - 383,468 breached accounts August 31, 2023In January 2020, the online clothing retailer Pampling suffered a data breach that exposed 383k unique customer email addresses. The data was later shared on a popular hacking forum and also included names, usernames and unsalted MD5 password hashes.
- PlayCyberGames - 3,681,753 breached accounts August 31, 2023In August 2023, PlayCyberGames which "allows users to play any games with LAN function or games using IP address" suffered a data breach which exposed 3.7M customer records. The data included email addresses, usernames and MD5 password hashes with a constant value in the "salt" field. PlayCyberGames did not respond to multiple attempts to disclose […]
- SevenRooms - 1,205,385 breached accounts August 24, 2023In December 2022, over 400GB of data belonging to restaurant customer management platform SevenRooms was posted for sale to a popular hacking forum. The data included 1.2M unique email addresses alongside names and purchases. SevenRooms advised that the breach was due to unauthorised access of "a file transfer interface of a third-party vendor".
- Duolingo - 2,676,696 breached accounts August 23, 2023In August 2023, 2.6M records of data scraped from Duolingo were broadly distributed on a popular hacking forum. Obtained by enumerating a vulnerable API, the data had earlier appeared for sale in January 2023 and contained email addresses, names, the languages being learned, XP (experience points), and other data related to learning progress on Duolingo. […]