Sandro Marcos says he was giving ICI 'full authority' to release the video of his testimony if they deemed it wouldn't affect the commission's probeSandro Marcos says he was giving ICI 'full authority' to release the video of his testimony if they deemed it wouldn't affect the commission's probe

Sandro Marcos says ‘nothing to hide’ but his testimony at ICI remains secret

2025/12/09 14:45

“I am not hiding anything,” said Ilocos Norte 1st District Representative and presidential son Sandro Marcos, fresh from an appearance before the Independent Commission for Infrastructure on Thursday, December 4.

But when he faced the very commission created by his own father to investigate multi-billion infrastructure corruption, Marcos requested that his testimony be held behind closed doors.

His counsel, Michelle Lazaro, explained that the congressman preferred an executive session because he supposedly wanted to speak “as candidly as possible.” She hinted that “critical information” might be revealed, details that could “jeopardize” the commission’s investigation.

Play Video Sandro Marcos says ‘nothing to hide’ but his testimony at ICI remains secret

Of course, Sandro isn’t the first to ask for an executive session. Since the guidelines were released, only two resource persons — Land Bank of the Philippines officials and Laguna 4th District Representative Danny Domingo — have allowed their hearings to be livestreamed. 

The rest, including Marcos, chose the private route. Yet Marcos said that he self-invited himself at ICI to clear his name.

inside track logo

Still, after the hush-hush session, Marcos told the media that he was giving ICI “full authority” to release the video of his testimony if they deemed it wouldn’t affect the commission’s probe.

“I am happy for them to do so if they believe that there’s no information there that will jeopardize their investigation,” Marcos said. 

The media then asked for the video the following week, Tuesday, December 9. But it appears that Marcos and ICI are not on the same page. 

“Cong. Sandro Marcos declared under oath that he was not amenable to livestreaming or public broadcasting of his testimony. Thus, until the Commission receives a written authority from Cong. Marcos allowing the release, the commission is constrained from releasing the video recording of his testimony,” ICI Chairperson Andres Reyes said.

Reyes himself has repeatedly expressed discomfort with livestreaming, a position made clear in one of ICI’s rare public sessions.

So, was Sandro’s offer to release his testimony merely lip service, just barely enough transparency to sound good?

Is there something inside that recording that could actually “jeopardize” the probe? Because if there was really nothing to hide, why push for an executive session instead of acquiesce to a livestream?

Under ICI’s livestream guidelines, the testimony of other resource persons, before the guidelines were released, should also be accessible to the public.

“For the avoidance of doubt, the ICI Live Streaming Guidelines shall retroactively apply to the testimony of witnesses and/or resource persons, who previously appeared before the ICI, gave their consent to the audio-visual recording, including the documents, reports, presentations, and evidence that they identified, disclosed, shared, provided and/or submitted in the course of and as result of their participation in the hearings or proceedings before the ICI and gave their consent to public access thereto,” Section 5.1 of the guideline reads.

Would the video and other relevant materials also be accessible to the media and public for scrutiny?

Well, there have been a lot of questions about ICI’s power and independence. The Ombudsman said that ICI’s days are numbered. But now, the President wants Congress to pass a bill that would institutionalize a commission against corruption. – Rappler.com

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Crypto whale loses $6M to sneaky phishing scheme targeting staked Ethereum

Crypto whale loses $6M to sneaky phishing scheme targeting staked Ethereum

The post Crypto whale loses $6M to sneaky phishing scheme targeting staked Ethereum appeared on BitcoinEthereumNews.com. A crypto whale lost more than $6 million in staked Ethereum (stETH) and Aave-wrapped Bitcoin (aEthWBTC) after approving malicious signatures in a phishing scheme on Sept. 18, according to blockchain security firm Scam Sniffer. According to the firm, the attackers disguised their move as a routine wallet confirmation through “Permit” signatures, which tricked the victim into authorizing fund transfers without triggering obvious red flags. Yu Xian, founder of blockchain security company SlowMist, noted that the victim did not recognize the danger because the transaction required no gas fees. He wrote: “From the victim’s perspective, he just clicked a few times to confirm the wallet’s pop-up signature requests, didn’t spend a single penny of gas, and $6.28 million was gone.” How Permit exploits work Permit approvals were originally designed to simplify token transfers. Instead of submitting an on-chain approval and paying fees, a user can sign an off-chain message authorizing a spender. That efficiency, however, has created a new attack surface for malicious players. Once a user signs such a permit, attackers can combine two functions—Permit and TransferFrom—to drain assets directly. Because the authorization takes place off-chain, wallet dashboards show no unusual activity until the funds move. As a result, the assets are gone when the approval executes on-chain, and tokens are redirected to the attacker’s wallet. This loophole has made permit exploits increasingly attractive for malicious actors, who can siphon millions without needing complex hacks or high-cost gas wars. Phishing losses The latest theft highlights a wider trend of escalating phishing campaigns. Scam Sniffer reported that in August alone, attackers stole $12.17 million from more than 15,200 victims. That figure represented a 72% jump in losses compared with July. According to the firm, the most significant share of August’s damages came from three large accounts that accounted for nearly half…
Share
BitcoinEthereumNews2025/09/19 02:31
Michigan moves ahead with strategic crypto reserve bill

Michigan moves ahead with strategic crypto reserve bill

The post Michigan moves ahead with strategic crypto reserve bill appeared on BitcoinEthereumNews.com. Michigan lawmakers are advancing a proposal that would allow the state to establish a strategic crypto reserve, as the Midwestern state joins other US jurisdictions considering digital assets for public investment.  The proposed legislation, known as House Bill 4087, moved to a second reading on Thursday and was referred to the Committee on Government Operations. It was introduced in February by Republican Representatives Bryan Posthumus and Ron Robinson, who are asking the House to amend the Michigan Management and Budget Act.  “Michigan can and should join Texas in leading on crypto policy by signing into law my bill creating the Michigan Crypto Strategic Reserve,” Posthumus wrote on X at the time of its introduction. If passed, the state treasurer’s authority will be allowed to allocate up to 10% of funds from Michigan’s countercyclical budget and economic stabilization fund into crypto. Michigan government could become crypto holders House Bill 4087 allows the state to maintain its digital assets in three possible ways: through a secure custody solution, through a qualified custodian such as a bank, trust company, or state-regulated firm, or by acquiring exchange-traded products (ETPs) from registered investment companies. House Bill 4086 and 4087. Source: Michigan legislation website. Security procedures for the crypto holdings include exclusive government control over private keys, end-to-end encryption of all data, and the prohibition of access via smartphones.  Michigan-owned digital assets’ information will be stored in secure data centers in different locations within the state. At the same time, transactions would require multiparty authorization, in addition to regular independent security audits. The bill allows the state to loan out crypto to generate additional revenue, provided that such activity does not increase exposure to financial risk.  House Bill 4086, which was also introduced during the same month by Representatives Alabas Farhat, Ron Robinson, and…
Share
BitcoinEthereumNews2025/09/19 17:49