For some time, I've been advocating the hypothesis that the NSA's vast electronic eavesdropping is much more about finances than it is about security concerns such as terrorism. Now there is a stunning revelation that not only confirms this view, but also that it is about money manipulation, including the "adjustment of financial accounts":

Is the U.S. Government Changing the Amount In People’s Financial Accounts and Manipulating Financial Systems with Its Offensive Cyber Capabilities?

When I read this - including the allegations from Germany that the US government used its cyber-hacking capabilities to aid Mon(ster)santo hacking anti-GMO computers -  I was not surprised.

But my mind wandered back to the May 6 2010 "flash crash," when certain stocks on the US stock market took a sudden and inexplicable collapse in share prices (Proctor and Gamble), and then, just as suddenly and inexplicably, rose dramatically and recovered much of the value. In markets where now virtually everything is traded in millionths of a second, and in enormous volumes, everything from stocks, bonds, to commodities like gold, silver, oil, the ability to manipulate on this scale and basis forms a potent new weapon in the diplomatic arsenal. What remains unanswered, to this day, is why the US government or any of its agencies would risk, even momentarily, such a public demonstration of this capability. I contend that it would not... the "flash crash" came from outside, and worked, or rather, wormed its way through whatever firewalls and protections were in the system, and those would have included the NSA's considerable electronic eavesdropping ability, part of which, I here speculate publicly, would include an ongoing monitoring of such interlinked financial transaction computers and clearing centers to prevent such crashes. In other words, the flash crash of 2010 was external to the system.  It is this consideration that in my mind is ultimately behind the fact that no one seems to have a good idea(at least publicly) about what happened, much less how, though there are lots of ingenious speculations.

The Government report is therefore not alerting us to anything new, it is merely acknowledging that the high octane speculations I've been entertaining might be worth considering: it is possible to do precisely what the report avers. But what I also strongly suspect is that this document is in part the result of internal studies precisely of the 2010 flash crash, or at least bearing it in mind. If so, then a little reading between the lines cited in the article tends to support my conclusion: the 2010 event set off alarm bells in the corridors of hidden power in Washington, and the alarm bells are still ringing.


The answer would seem to be very simple: given the NSA's enormous computing power (think of that unusually trouble-plagued facility in Utah folks), to imagine an external penetration of computer trading networks on a scale that suggested it could be much larger than it was, if need be, implies someone with tremendous computing power and sophistication of their own, and the ability to penetrate networks - and probable hidden and unacknowledged NSA security measures protecting them - and that implies some sophisticated foreign players, or perhaps, some hidden and as yet unknown factor.

Joseph P. Farrell

Joseph P. Farrell has a doctorate in patristics from the University of Oxford, and pursues research in physics, alternative history and science, and "strange stuff". His book The Giza DeathStar, for which the Giza Community is named, was published in the spring of 2002, and was his first venture into "alternative history and science".


  1. Charles Smarr on January 3, 2014 at 5:42 pm

    The engineering to cool and otherwise operate the NSA Utah site should be first year physics simple, yet they got it wrong. Unless they didn’t. Perhaps they needed the facility “off line” to carry out some clandestine computer ops that for which they could not possibly be responsible. The “flash crash” could have been a theft but I think it was more likely a warning to keep factions in line, a message, but from whom and to whom is beyond my ability to even speculate.

  2. Robert Barricklow on January 3, 2014 at 4:14 pm

    Just like at those silos.

    These “jokers” make their presence known, to those in the game. Even once in awhile,
    a joker shows up, making the players aware,
    …that they don’t hold ALL the cards.

    • jedi on January 3, 2014 at 4:36 pm

      ….they are any card in the deck they “choose” too be…..that is a intellectual deviant. Totally unpredictable, and uncontrollable.

      Remember the toy, jack in the box? When something like that comes out of the box….the music stops

      for the joker, there is no win or lose….and that is his point.
      are they bitter ole grumpy men, that dont enjoy the company/ friendship of others…….who knows…..and that is one big mystery.

  3. jedi on January 3, 2014 at 3:58 pm

    Stock markets were a nobel idea, and are now a ponzi scam, fleecing the ewes. Always were, another fiat scam, ultimately the end game is buying up copyrights of invention of a certain genetic strain Henry Ford figured that out a long time ago when they demanded half of his stocks to get in the “game” and issued private…A wise guy move.

    Holywoods latest offering “runner runner” sheds some light on the problems “they” have “boxed” themselves into.

    The newest centralization plan unfolding is the liquidation of farmers with numerous larceny….but hey, lets have a chuckle, a big ole belly laugh as we look at the joker, dressed in purple as he asks…..why so serious. Time for the mob too vote ..winner winner chicken dinner.

  4. DownunderET on January 3, 2014 at 1:35 pm

    Spying is one thing, manipulation is another, notwithstanding they go together. So who are the players on the block, could those damn Nazi’s be at it again and signaling the continuation of the divorce.

    Computational power doesn’t come cheap, just ask the NSA, so who else has a whopper of a computer system with enough “punch” to bust through firewalls like a knife through butter, eh……what’s the name of that country with the big wall around it?

  5. marcos toledo on January 3, 2014 at 11:39 am

    Ramura our masters are scamming the rest of our personal bank accounts. Industrial espionage. That’s been going on for millennia remember Silk in the sixth century ACE or Porcelain sixteenth century ACE. but the West has been the lords of thievery Maize, Potatoes, Breadfruit the list goes on to what they have stolen .around the world and from the past thieves are us is their motto..

  6. Ramura on January 3, 2014 at 10:42 am

    Scary. All of it. It is bad enough just to contemplate “our own” breakaway civilization (the Anglo-American elite factor/western), let alone the “others” (Nazi’s, Europe/Germans (or is that the same thing), Russians, Yakuza, Vatican?)……such a mess…

    Just who IS zoomin’ whom?

  7. DanaThomas on January 3, 2014 at 6:10 am

    While in Europe and elsewhere politicians are squabbling about how to shore up the monetized debt system and get re-elected, there is still little public debate about the Surveillance State; but even non-tech people seem to be waking up to the fact that the web, like phone lines, is a 2-way affair and it is mere wishful thinking to imagine that active manipulation is the other side of the spying coin

Help the Community Grow

Please understand a donation is a gift and does not confer membership or license to audiobooks. To become a paid member, visit member registration.

Upcoming Events