There's another story of large scale financial malfeasance out there, according to this article shared by Mr. V.T., and that appeared on the Zero Hedge website. Here's the story, and it's almost too difficult to believe:

Mystery Man Behind $100 Million Central Bank Heist Revealed As Bangladesh Moves To Sue Fed

Now, as one might imagine, this provokes all sorts of high octane speculations. For one thing, we have the ever-dutiful New York Federal Reserve once again at the center of a controversy over banking proprieties. After all, Germany (Germany no less!) has been trying to get its gold back from the N.Y. Fed for a few years now, with something amounting to less than stellar success on that score, leaving many people to question whether or not the NY Fed even has any of Germany's physical gold. As readers here know, it wouldn't be the first time the NY Fed misplaced Germany's gold, for in 1928, then Reichsbank president Hjalmar Schacht - a dubious man if there ever was one - paid a visit to the bank and asked to see the Reichsbank's gold. To the considerable embarassment of the then chief of the NY Fed, Ben Strong, Schacht was informed that the staff could not locate it. Schacht, never one to let a moment for leverage escape his grasp, smiled and simply told Strong, that it was all "ok" and that he new that the bank was "good for it."

Nothing amiss here. Move along. Nothing to see.

Well, I disagree, and there's a profound clue in this article that maybe something huge is amiss, something that might, just might, connect to all those mysterious banker deaths of the past few years. Remember those? When bankers suddenly decide to talk a walk off the rooftops of bankers in London, Paris, and Hong Kong? That "huge something" is hinted at here:

The CCTV cameras at the bank weren’t functioning during the questionable transfers but branch manager Maia Santos Deguito stands accused of ignoring a stop order from the central bank and from her superiors. Meanwhile William Go claims he had nothing to do with it, Bangladesh's finance minister AMA Muhith thinks his country’s central bank was in on the scam, and the NY Fed says it followed proper protocol. This evening, WSJ reported that according to people familiar with Bangladesh central bank's operations, its SWIFT terminal for interbank messaging might have been left logged on on the night of February 4, creating a hole via which more than $100 million was stolen.(Emphasis in the original)

So it was an "open SWIFT" terminal that was left on that caused the whole thing?

Well, call me overly suspicious here, but I highly doubt it, even in a case like Bangladesh. But the hint nonetheless remains, that perhaps the entire international clearing system of the West is vulnerable to cyber-hacking in a way that recalls the infamous PROMIS software scandals that continue to reverberate since its first surfaced during the Reagan administration.

If you don't know the PROMIS scandal, this was a software created by former NSA insider Bill Hamilton and his Inslaw software company. The goal of the software was to create a multi-lingual software program able to read any government database compiled in any (then existing) computer language, and to be able to execute sophisticated searches. According to the story, the software was stolen by the Justice Department of Ed Meese, and then subsequently and secretly modified by the military-intelligence complex with various backdoors, and then sold, or "allowed to be stolen", giving the USA unprecendented access to the databases of foreign nations.

However I cannot help but wonder if this software, via some modification, also became the basis for the CHIPS and SWIFT systems of financial clearing. After all, its capabilities would render it easily adaptible to the purpose of financial clearing, and if one followed the PROMIS story closely, it was conceived in its modifications also as a means of tracking financial flows.

All of this raises the possibilities that those very backdoors functioned in two directions, allowing not only US intelligence access to foreign databases, but vice versa, including a backdoor into the entire international financial clearing system.

And that would allow, over time, any such entity possessing that crucial key to siphon off vast funds and additionally to "cover the tracks" of where it went. Such a scheme would only be detectable by people invarious banks, brokerage houses, insurance companies and so on, with high level access to daily ledgers, to see what was happening.

High octane speculation?

To be sure, but I am not the only one who suspects the PROMIS connection to that hidden system of finance. What's new here may be that the activity has now involved a country's central bank, and it has blown the whistle.

And that means in turn this may be a story to watch carefully.

See you on the flip side...

Joseph P. Farrell

Joseph P. Farrell has a doctorate in patristics from the University of Oxford, and pursues research in physics, alternative history and science, and "strange stuff". His book The Giza DeathStar, for which the Giza Community is named, was published in the spring of 2002, and was his first venture into "alternative history and science".


  1. goshawks on March 30, 2016 at 5:56 pm

    “…according to people familiar with Bangladesh central bank’s operations, its SWIFT terminal for interbank messaging might have been left logged on on the night of February 4, creating a hole via which more than $100 million was stolen.”

    While software provides ‘undocumented’ backdoors, that capability is useless if your computer is powered down. That problem was ‘taken care of’ some years ago:

    news dot softpedia dot com/news/Secret-3G-Radio-in-Every-Intel-vPro-CPU-Could-Steal-Your-Ideas-at-Any-Time-385194.shtml

    “Basically, all Intel vPro CPUs (which include new mobile Core i5 and Core i7 chips) have an undocumented 3G chip inside. That chip is visible to the 3G network, even when the PC is not powered on. …
    In other words, the secret 3G chip can act as a backdoor, complete with wake-on-LAN and wake-on-mobile. Which is to say, the computer can be turned on remotely through this undocumented 3G radio.”

    Think about this capability, in terms of “might have been left logged on.” Of course, this gaping hole will not be discussed in the investigation…

    • goshawks on March 31, 2016 at 10:22 pm

      I thought this would be self-evident in view of my Comment, but I should remind readers to physically remove their power cord or battery from their computers when not in use…

      • zendogbreath on April 3, 2016 at 9:46 pm

        yep thenk you gosh,
        any help on a macbookpro? or any of the phones with batteries sealed in?

        • goshawks on April 4, 2016 at 1:37 am

          ZDB, I would presume that any electronic device with inaccessible batteries would need to be stored in a ‘container’ (soft- or hard-sided) that blocked the relevant frequencies.

          I dimly remember that cellphones once had ‘baggies’ manufactured that you could put on them. This came about when users discovered that they could be tracked through cellphone tower triangulation – even with the cellphones ‘off’. (Remember that the ‘cover’ has to be tuned for that device’s particular communications-chip/antenna.)

          If you or other readers would like to research and publish available ‘sources’ here, I would be grateful.

          (If one wished to get really paranoid, remember that passports, drivers’ licenses, and even some credit cards now have passive RFID chips/antennas embedded in them. If one gets ‘pinged’ by relevant frequencies, the chip will absorb that energy and send-out a short-range ID response. Enjoy your privacy…)

  2. WalkingDead on March 30, 2016 at 1:29 pm

    If you steal a few hundred dollars, they toss the book at you and put you in jail. If you steal 100 million dollars, you’re too big to jail and too big to fail. So now they have decided to stop penny pinching us and just start taking it in extremely large amounts.
    The US gold was used as part of the bankruptcy settlement along with everything else including its’ citizens. No doubt, the Fed is holding Germany’s gold against a similar claim, eventually. No doubt just one of the reasons for flooding Germany with all those “refugees”.
    Money may not buy you love, but it will buy you investigators, judges, governments, and have anyone you want killed to cover your tracks. You need to look no further than Mena, Arkansas and the Clintons to understand that.
    The push for a cashless society is nothing more than preparation for the theft of everyone’s money to cover the elite bankers and governments when they bring it all crashing down around us. It’s not a matter of if, but when. It doesn’t look like the collaterization of space is going to pay off in time to prevent it; and that’s assuming there actually are secret space craft mining the solar system. A rather large assumption.

  3. marcos toledo on March 30, 2016 at 10:44 am

    And these scoundrels want to bring on a cashless society. For the security money transactions what a joke just another way to relieve fools of their money. Small time swindlers must be looking at this green with envy.

  4. Robert Barricklow on March 30, 2016 at 10:23 am

    Again symbolic of their nature: trust us.
    We Promise.

  5. jplatt39 on March 30, 2016 at 5:22 am

    There is really no question that business an finance have been responsible for a lot of the world’s vulnerability to hacking. Look at the adoption of Windows, which OS probably single-handedly enabled the malware industry to bootstrap itself into a multi-trillion monster and if you haven’t read William Gibson yet do – it’s like since Neuromancer came out there has been a race to accomplish everything he said we do wrong.

    • jplatt39 on March 30, 2016 at 6:40 am

      I didn’t want to say it but I might as well. It is in cybernetics and in particular cyber crime I have issues with you.

      There have been a number of stories over the past twenty years about crimes involving threats and yes, kidnappings, such as allegedly occurred to Ms. Deguito in Eastern Europe and Russia. Even local companies(who I won’t name but look up the one America claims is too close to the Russian Government) have noted Putin and his party seem uninterested in cooperating with ANY investigation at all. While it doesn’t seem to me these are Russian actors, the pattern is similar enough so I believe other gangs are paying attention.

      Also my time studying UNIX, which computer science evolved on, taught me that the idea of a trusted source is an illusion. Trusted sources of course are behind Windows, the modern commercial internet, and much modern jurisprudence (Apple). In cyber space any source can be counterfeited. Authentication is handled by a finite number of editable bytes. After the first worms UNIX adopted trusted actions as a security matter, and Gates’s insistence on trusted sources is irresponsible.

      The American Public Media radio show Marketplace recently did a story on how low the cost of doing a terrorist attack, such as Belgium, has fallen over the past five years (my computer is giving me too many problems to call up the link right now. Sorry). I do believe this and while I certainly have respect for a lot of what you say I still believe you underestimate the scale of some of the effects you say are going on and of the controllability of many of these actions. Satan is sometimes a better metaphor than the Illuminati.

      • Robert Barricklow on March 30, 2016 at 10:21 am

        Wouldn’t trust the closed system; so symbolic of the worldwide enclosure game that’s been afoot for too *&^* long.
        Open Source for everything!

        • jplatt39 on April 1, 2016 at 6:28 am

          Since you bring it up, evangelism time. Believe it or not that what Open Source means is modular programs which are changeable by the user (with a programmer) so these can be MORE secure than any proprietary one. Some OSes worth checking out:

          Recently hacked but still more secure than Ubuntu. I’m serious about that.

          One of the oldest and most commercially successful. No contradiction there. They ASK you to tell them when you have problems, because this is the testing version-about as stable as Windows. They give the stable version away with multi-thousand dollar consulting contracts, or if you don’t need support get it here:

          I’m trying to keep this simple and I have issues with recent versions of ubuntu but:

          is like Linux Mint a very good Ubuntu derivative, though in this case it’s rather technical.
          Another simple and overlooked distribution is:

          It’s not very good for games but it’s a good Mandriva derivative – which means it’s a simple, business-oriented desktop.
          Last but not least is something which isn’t Linux at all:

          After the Mac OSX 10 Dragonfly BSD is the easiest to use version of UNIX out there (yes Mac OSes are BSD Unixes – free software with proprietary extensions running on top of them). These are modular operating systems – you can swap in and out any part of it you want and each part is distributed by someone who will talk to you – often – if you have a question. I don’t even use the install media for Debian or Slackware (my home distro) any more, though I install both most often. I do believe that Mint was specifically targeted because of its focus on security, but I don’t believe it was state-sponsored. I honestly believe the number of bad actors out there is humoungous in part because the corporate back-doors Windows – and Gates – championed made it so affordable to write malware.

Help the Community Grow

Please understand a donation is a gift and does not confer membership or license to audiobooks. To become a paid member, visit member registration.

Upcoming Events