....ahh the price of empire!  Bullying Europe, Asia, and just about everyone else, can be expensive. So expensive, in fact, that the USSA's nuclear arsenal is (supposedly) being coordinated by floppy disks...

Posted in

Joseph P. Farrell

Joseph P. Farrell has a doctorate in patristics from the University of Oxford, and pursues research in physics, alternative history and science, and "strange stuff". His book The Giza DeathStar, for which the Giza Community is named, was published in the spring of 2002, and was his first venture into "alternative history and science".


  1. 8thdegreeofj on May 30, 2016 at 12:45 am

    Hi Dr Farrell,

    I have a nugget of information that you may find of value and is in regards to your recent interview with the Dark Journalist. Regarding your understanding of “WTC building(s) availability to be rigged with conventional explosives?”; I’m sure that you are aware of the 9/11 group known as Architects & Engineers for 9/11 Truth. During Richard Gage’s speech at the Vancouver library in around 2008 he made strong note that in reference to WTC 1 & 2 that the removal of dog-assisted patrols at the buildings beginning a week before 9/11 was done without just reasoning. And we must not forget the unexpected appointment of a new security chief (President Bush’s cousin) for the entire WTC complex in the weeks leading up to 9/11.

    So, while there doesn’t appear to be any evidence of crazy Saudi terrorists wiring up the building, the arrival of another Bush traitor to aid in the setup, opens up the possibility for it to be rigged. Mr. Gage would argue that somebody planted a lot of the nano-thermite charges as the air & physical samples that have been analyzed seem to have this stuff in it on a statistically interesting percentage level. Personally I think a scalar weapon platform ultimately took both buildings down and could only be your Level 3 entity. IMHO I think Level 2 would have access to the nano-thermite and obviously any other conventional explosive.

    • zendogbreath on June 2, 2016 at 11:31 pm

      odd to see here 8thdegree

      apparently you haven’t dug into the israeli artists who rented a few of the highest floors for months doing art work that involved removing glass from windows and building wooden scaffolds that got them outside the building. their pictures of the floors show pallets of boxes of some of the highest tech most expensive fuses and switches.

      and other witnesses who were closed off to service vators and stairways hearing huge weights being moved around from these floors. the engineering needed apparently lasted weeks if not months. these artists never did produce much in the way of art that anyone knows of. unless of course one includes disappearing buildings via scalar AND nano therm demo techs.

      there’s plenty out there. might as well start with rense

  2. jplatt39 on May 27, 2016 at 9:23 am

    Thank Jon for providing some perspective to this debate. To call this defensible is not the same thing at all as calling it right. At the same time building security from combinations of small modular devices and/or actions is both very Old School and one way to deal with it. Two years ago there was an article about that very issue:

    Yes you should be able to swap new modules in and presumably that would be cheaper, but the new modules (say Flash Drives) are not always a good idea. How much “innovation” is chaff? Aren’t you the guy who said “The only canonical versions of my books are the printed text”? (Of course it is true). Why give the military different rules?

    Of course I haven’t mentioned your point, which is “where is the money?” But you’re following the media in making this more cut-and-dried than it has to be. I first had reliable internet at college in 1990-91. I remember gopher and Usenet and going through various hobbyists’ BBSes to access
    college databases for research. I’ve always been awed by the flexibility of technology, but part of it I like to express as “We don’t store books, artwork or movies on-line. We just store information we pretend is books, artworks or movies.” I believe that we are doing too much upgrading. I’m sure you are carrying around in your pocket a computer system more complicated than the network which got us to the moon – and you say that rockets are not sufficient but I’m talking about the INFORMATION here not the propulsion. Our electronics can probably be described at this point as decadent (though actually it’s very good for spying on us).

    This is not up to your usual standards.

  3. BetelgeuseT-1 on May 27, 2016 at 3:52 am

    The story being on CNN, indicates to me that this is a cry for more money.
    Make your military machine look like the laughing stock of the world’s nuclear powers, and the people will DEMAND that more money is spend on it.
    We have to defend ourselves against these pesky terrorists after all, isn’t it?
    Not to mention against those nasty Ruskies…

    And following on from Jon’s excellent comment earlier, upgrading these systems may not even be desirable or needed.
    Using floppies to transfer data from one system to another is what was commonly referred to as “sneaker net” back in the seventies and eighties. It may look archaic now with the advanced computer networks in place today, but the huge advantage of such a system is the difficulty in trying to break into it.
    If you can only upload/download data to one of these systems via a floppy, then to compromise it requires physical access to the device. In a military setting, this would be a challenge to say the least.
    Computer networks can be wire-tapped, eaves-dropped, dDOS’ed, take your pick.
    No such luck with the good old floppy. The worst that could happen is that the armoured security van that transports it gets stuck in traffic. Now that would be a dDOS, floppy-style. Trying to think of a name…a dDOF?

    • goshawks on May 27, 2016 at 4:14 pm

      BetelgeuseT-1, we must be of roughly the same age. I used ‘sneaker net’ in my early USAF engineering days. It had all the advantages that you mention. The only ‘disadvantage’ was that they tended to go corrupt while just sitting on a shelf. (grin) But for security, they were far more safe than today’s networked computers…

      (I think I worked using the original DARPAnet. We used to get ‘online’ to Wright-Patterson AFB, where a central computer was, and upload/download data at some painfully-slow rate. It was a bitch when the connection failed halfway through…)

    • goshawks on May 27, 2016 at 4:15 pm

      “Your comment is awaiting moderation.” Just reminiscing. goshawks – May 27, 2016 at 4:14 pm

  4. mesolad on May 27, 2016 at 3:29 am

    Jon’s comments are interesting, but then, I am wondering how they deal with spare parts, replacement floppies, after all this time ? spare parts and floppies which nobody manufactures anymore. We are talking of systems which must not fail. And as this is about defense systems, I assume that there should be redundancy to prevent failure – thus more spare parts : as far as I remember, when Nasa built the shuttles, relying on old microprocessors, they had to scour the whole USA to find out enough old microprocessors of that models.

    This article is interesting :

    Why The Floppy Disk Is Still Used Today | Digital Trends

    but on this site, mentioned in the article :
    Floppy disks – 3.5 and 5.25 diskettes, discs

    which sells to a niche market, they don’t provide 8-inch floppies … 8-inch floppies were fragile, sensible to dust abrasion, failing often – relying on such fragile information support for missile operations after all these decades ? and I doubt there have ever been military-grade 8-inch floppies … building them out of quartz maybe ? or did they buy, 60 years ago, spare parts in order to last a century ?

    • BetelgeuseT-1 on May 27, 2016 at 4:01 am

      mesolad. We’re talking about the military/security/industrial complex here.
      Not your local Radio Shack or Stationary Warehouse.
      They can make ANYTHING they want, including the upkeep of 50-year old equipment and a steady supply of 8.5″ floppy disks, in dust-free containers if need be.
      2.3 trillion dollars is a LOT of money, for it to go “missing” that is.

      • Robert Barricklow on June 3, 2016 at 8:59 pm

        including a wrong map of the Belgrade Chinese Embassy.

    • goshawks on May 27, 2016 at 4:01 pm

      mesolad, back when I was a USAF engineer, we would just kick-up a request for an outdated part to the logistics side. They would put out a request for, say, 500 of the item to manufacturing firms with the required expertise. Back would come outrageous prices, but someone would step forward to manufacture the required item. The logistics side would store 499 of the item and finally get the requested item back to us…

  5. zendogbreath on May 26, 2016 at 11:43 pm

  6. goshawks on May 26, 2016 at 9:53 pm

    In addition to Jon’s perceptive comments, half the upgrade problem is the albatross of nuclear certification. This aspect alone makes ANYTHING ten times more expensive than equivalent conventional military hardware/software. So, whatever it is, it is never upgraded – only ultimately replaced when the whole system is again built-from-scratch…

  7. Aridzonan_13 on May 26, 2016 at 7:34 pm

    Uncle Sam has been running critcial proprietary systems on ancient tech for decades. Which begs the question, where does all the money go? So, it appears, we might be in for some NE Navy disclosure. How, better to CYA themselves if not by screaming National Security against an Off World threat? Forgiveness might follow in the Blue Pill sects. But, the Red Pill types will scream bloody murder long and hard.

    • Robert Barricklow on May 27, 2016 at 10:26 am

      When I read ancient tech…
      I read Ancient Alien Tech…

      I’m so conditioned to this perspective.

  8. Robert Barricklow on May 26, 2016 at 5:36 pm

    Illusions and masquerades are expensive like a very rich lady…
    High Maintenance. The Statue of Liberty, for example, her democracy façade is extremely expensive. Keeping up the illusion of her public power, via a democracy, doesn’t come on the cheap.
    The Treasury Department, must keep it’s hidden wizard from any ray of exposure to sunshine, lest the vampire parasite withers to a mere mortal status.
    Rocket fuel versus anti-gravity technology is but part of this song and dance of 3rd world infrastucture being brought to by outrageously expensive fake news.
    The corruption chain is busy construction a private power kill-chain to strangle the life of o any public power accountability.
    Unelected, unaccountable private power is where the public money is siphoned – bone dry.

    • Nathan on May 26, 2016 at 6:13 pm

      I agree robert

      • BetelgeuseT-1 on May 27, 2016 at 2:56 am


  9. hellbound on May 26, 2016 at 5:16 pm


  10. Nathan on May 26, 2016 at 5:13 pm

    I agree with not as merely much new technology as we are told, or if their is new technology it is either kept hidden or spun in a way where it seems ridiculous

  11. DownunderET on May 26, 2016 at 5:04 pm

    $2.3 trillion missing.
    The US road system, the rail system, electricity and water systems, bridges are all in bad need of upgrade and repair, BUT, we have to have a modern army, jet fighters, tanks, navy ships and any other things that kill people.
    I just hope Trump puts a stop to this insane military credit card spending before America becomes a banana republic.

    • zendogbreath on May 26, 2016 at 11:39 pm


    • BetelgeuseT-1 on May 27, 2016 at 2:53 am

      I wouldn’t hold my breath on Trump to fix this if I were you Downunder.
      The Trump campaign is nothing but the Obama-2008 “Campaign of Change” on steroids.
      And we all know what didn’t happen, do we.
      It’s the same old, same old song.
      Trump is the Trojan Horse, so perhaps he should be called Trojan Trump.

      I would be happy to be proven wrong though,

  12. hellbound on May 26, 2016 at 3:12 pm

    I wanted to ask, did anyone happen to see the declaration of war against the NWO?

    Please read it through, then at the bottom you will notice another 4 posts with similar theme.

    one of which is:

    • Robert Barricklow on May 26, 2016 at 5:46 pm

      Thanks for the post Elaine O.

  13. hellbound on May 26, 2016 at 3:10 pm

    That was actually in a ( I think History Channel ) episode on our nuclear bunkers gosh, maybe a year ago I saw it on TV..

    I was surprised anyone was making a big deal out of it.

  14. Jon on May 26, 2016 at 2:09 pm

    First off, assembly language is neither primitive nor obsolete. ALL computers, including those in use today, use assembly language. It is the layer of programming just above the actual electronics. Today’s “modern” languages simply insert more layers of interpretation to make it easier for humans to program.

    As a programming language, it is extremely compact and efficient, and requires skills most of today’s “programmers,” who like things like Java, don’t have. Hence, it would be more difficult for any but the most hardcore programmers to understand – security by obscurity.

    It may partly help the “security by obscurity” stance in that 8 inch floppy drives are extremely rare these days, making it difficult for someone to physically access the data even if they could steal the discs.

    I note that the articles were quite vague in terms of how all this is actually used day to day. You might be surprised at some of the applications which still use computer technology from the 80s. If it ain’t broke, don’t fix it.

    I would wager that the parts of the systems we are talking about may be tied to the actual weapons systems, which are also that old, in which case it is the contractors who created the systems who would have to update it, and they may prefer to profit from systems whose costs have long since been recovered.

    I would venture to guess that we are not talking about data gathering and satellite monitoring, or anything like that. I’ll bet we are talking about machine control and very basic systems monitoring, which is going to be 60s technology on these missiles. Those 70s computer systems may actually be perfect matches and the best choice for the task.

    Enterprise level software in particular is a spectacular con game, using the extremely high cost of change to hold organizations hostage for decades. In my state, we are still using enterprise software in key functions for the state which still use software navigation techniques that also date from the 70s. This is far more common than you imagine.

    I would remind you that most of the technology in use today, baring some materials and electronics, are hundreds of years old – cars, trains, wood buildings, radio, the wheel, etc. There have been far fewer actual advances in technology than we are led to believe. Refinements and polish on the outside, certainly, but less substantive progress than is commonly represented.

    That whole “it has to be brand new to be good” meme is a marketing psyop, and not a wise one to apply to functional technology. Simpler is almost always better. The more complex a system is, the more prone to failure.

    • Pellevoisin on May 26, 2016 at 2:28 pm

      Well said, Jon.

    • hellbound on May 26, 2016 at 3:52 pm

      I agree about the whole ‘brand new” issue you bring up, and as someone whose field this is, Assembly language is alive, well and kicking, although not used for security. At least not any I’ve seen.

      All our military items are programmed in either unix (rockets etc) and ADA the proprietary military systems programming language.

      The floppy disks would be in ADA with regards to the time frame it was developed.
      Read more about ADA here:
      (embedded language with parts public, so contractors can use it too.)

      The reasons our systems are being hacked so much is that CISCO in their rush to get into the African market sold ( illegally) sold the technology to a company who happened to be a front for the chinese government. We found out about this in Oct. 2012.
      read more about that here:

      • hellbound on May 26, 2016 at 3:54 pm

        sorry about that, here’s the other link for the CISCO issue:

      • jplatt39 on May 27, 2016 at 9:42 am

        Um. Ada was created for the Military. I remember an interview where Bjarne Stroustrup, the father of C++ was told he shouldn’t have cut off his beard because it seemed like the designers of all the great programming languages had beards and he said “Grace Hopper didn’t”. She was of course ultimately responsible for Ada.

        But proprietary is a word I have to question. As gnat it is one of the core front-end languages in the GNU Compiler Collection (GCC) which is the prototype for Free and Open Software. I know fifteen years ago it was still being used – at some good schools – to teach elementary programming.

        Oh, Unix is of course an Operating System which evolved with C. Over time it became a family of Operating Systems which spawned among other things the GNU/Linux sub-family. You don’t program in Unix. You program in Fortran or C or Ada or C++ in Unix but you don’t just program in Unix.

        • hellbound on June 3, 2016 at 6:46 pm

          Well, that’s not entirely true is it. Because you use Unix as your operating system for yes, other languages but you do program features of Unix itself for your use. Security/files/directories/preferences and lets not forget your bat files which can be of a number of different languages but which mostly (or should access OS features). I.E. I think you’re splitting hairs here, the point was: Our Military systems use ADA and UNIX as their systems. At least the ones I worked on did.

    • jplatt39 on May 27, 2016 at 9:31 am

      You are so right.

  15. Lisa Wade on May 26, 2016 at 1:58 pm

    I’m inclined to agree with the comments of Marcos and Arkitekt. I think there is a very good reason they’re still using 1970’s IT. It’s more reliable. Just like when 9/11 happened; I was in Harrisburg, PA on vacation for a seminar on full-time RVing called Life on Wheels. We couldn’t go back to the city because the bridges and tunnels were all closed, and digital cell service wouldn’t work, but my old analog cell phone was still able to ping the towers to make calls. I was was able to contact the Bridge and Tunnel Authority to find out when they would open them so we could get back to our apartment in NYC, and check on our friends and neighbors. It’s similar to listening to music on vinyl. It’s a far richer sound than music from a digital source IMHO…

  16. cursichella on May 26, 2016 at 1:44 pm

    Ridiculously aged computers controlling our defensive nuclear weapons? That sounds like a very convenient excuse for a large false flag event.

    It ISN’T irony that unlike our offensive weapons, the Dept of “Defense” spends the least amount of (known) $ on the ONE area that is actually used for “defense”.

    • jplatt39 on May 28, 2016 at 9:17 am

      The argument is “We are in a race against the bad guys” vs. “If it ain’t broke don’t fix it.” The truth is the whole debate is so compromised by the idea of “planned obsolescence” that whether we can out think the bad guys this way probably has not and won’t get an objective consideration.

      An argument – I’m not even saying a good one – for this arrangement goes like this. 8″ disks are too bulky to just carry around and almost nobody has drives for them – so if you want to read one people will KNOW. At the same time, that they hold so LITTLE data (less than a megabyte) means that if one gets taken only PART of a sensible verification system is compromised. If you move all this to Flash Drives, access to the computers becomes easier and the amount of data you can store – means that the system is even more compromised. And it’s so easy to carry around we’ve been hearing reports for years of compromising data being forgotten in Taxis when one fell out of some idiot’s pocket.

      Finally there is the issue of how “planned obsolescence” has affected our thinking. My oldest sister got her Masters in Appl. Math from Brown (and we lived on what was then the edge of the campus) in 1967. That gave me then a good view of what was going on in the real world with them. I could tell you a funny story about nuns taking punch cards and decoding them into a ledger rather than wait for a report to be printed out, but the point is we were doing some really incredible things with our machines. What are we doing with our Terabyte Hard Drives and other modifications? Putting up with “spell check” which censors your ideas, telling advertisers things so they can divert your browsers to ad pages which add 20 minutes to your load time – even when we don’t give them permission.

      In the Unix world they say, many small programs which each do one thing very well will run better than one complex program which will develop bugs. In other words we do not have the full story but “Ridiculously aged computers…sounds like a very convenient excuse for a large false flag event” is simplistic (granted much of what I’m saying is too). Just updating this particular tech – especially with off-the-shelf parts – is a recipe for making the country more obsolete than it already is. ANYTHING can be an EXCUSE for a false flag event, though.

      • hellbound on June 3, 2016 at 6:57 pm

        Simplicity is the ultimate sophistication. – DaVinci

  17. basta on May 26, 2016 at 12:52 pm

    FWIW, NAZA claims it went to the moon with the computing power of an abacus or a couple of strings of periwinkle shells, so we should all rest easy about the integrity of the USSA’s nuclear arsenal — btw, those ICBMs date pretty much from the same era, folks.

    This is actualy brilliant strategy; who on earth could possibly hack such neolithic technology?

    • basta on May 26, 2016 at 1:00 pm

      “Under moderation” — Giza Death Star’s very own TSA.

  18. marcos toledo on May 26, 2016 at 12:19 pm

    How about good old paper ledger it lest if your literate you can read them. Sometimes old tech is better and safer it like money and credit-debit cards if they rob you of the first you only lose the money you had if they rob you of the second you lose your whole bank accounts and god knows what else.

  19. Arkitekt on May 26, 2016 at 11:54 am

    Regards the Floppy disc story, actually I found that rather reassuring. At least the stuff works could you imagine what will happen when they “upgrade” to windows 10 ?

    • Robert Barricklow on May 26, 2016 at 5:15 pm

      Loved it!

    • jplatt39 on May 27, 2016 at 8:36 am

      Um. I’m not reassured because these are 8″ Floppies. I dealt with them and the ones I dealt with were never as reliable as the 5 1/4″.

Help the Community Grow

Please understand a donation is a gift and does not confer membership or license to audiobooks. To become a paid member, visit member registration.

Upcoming Events