THE CHINESE $13 BILLION KLEPTO-CURRENCY HEIST REVISITED

Occasionally I do one of my little News and Views from the Nefarium with the full intention of also more-or-less repeating that audio report and analysis in written form because I think the story is important enough to warrant a second, written treatment, and this is one of those stories. In fact, in last week's News and Views (Nov 13, 2025) I actually stated that on this story I would probably do so, and this is that written version attempting to summarize my points made then, and perhaps to do so more clearly.  The original story was shared by E.E., with our thanks, and this was the article that was the basis of my commentary:

China Accuses US Of $13 Billion Bitcoin 'State-Backed Crypto Heist'

And here are the central points from that article:

China has accused the U.S. of taking $13 billion in Bitcoin (CRYPTO: BTC) linked to a 2020 hack, escalating a cross-border dispute that Washington says is simply a lawful seizure of criminal proceeds.

China's National Computer Virus Emergency Response Center (CVERC) alleged that the U.S. Department of Justice seized 127,000 Bitcoin originally stolen in a 2020 cyberattack on the LuBian mining pool.

The agency described the incident as a "state-backed crypto heist," claiming it was carried out by a "state-level hacking organization."

The Global Times, a state-run publication, reports that CVERC traced the digital trail of the 2020 hack and alleged that the seized assets were tied to Chen Zhi, chairman of Cambodia's Prince Group, who faces a U.S. indictment for a large-scale fraud scheme.
These paragraphs contain the salient points of my analysis in last week's News and Views, and the first thing to note is that this story is actually five years old, an important point that we shall return to momentarily; secondly, concerns asset seizure of Chinese crypto-currency assets (which we like to nickname "Klepto-currency" for reasons being outlined here), and thirdly, that this particular asset seizure occurs in an international geopolitical context, which is to say that it occurs in (a) a largely unregulated context, in spite of the disclaimers from American authorities referred to later in the article that "the seizure followed established legal processes targeting illicit funds;" and (b) could thus be a form of cyber-enabled economic warfare.
As I argued in the News and Views and reiterate here, the above pattern is an intriguing one, for it suggests that the template for such cyber-asset-seizure can be initiated with a mere allegation buttressed by a kind of prima facie evidence, allowing a government - in this case the American government - to step in and seize anyone's cyber assets, including a power foreign national. And this is where the "five-year-old" aspect of this case comes into play, for as I suggested in that News and Views, what we're looking at here is a variation on the old technique of banks using the float to make very short term investments and profits off of other people's money. The "float" is that period of financial limbo when funds from one demand account at a bank have not yet been cleared, or deposited, into another account. In effect, those funds - let us say represented by a cheque or some other financial instrument - are in a kind of limbo. As such, they can exist for a short period of time as funds available to the bank to invest for a short term trade before the transfer clears. It becomes, in effect, an asset of that bank to use as it will.  In this example, the float can be a matter of mere business days, and indeed, this is the real meaning behind the insistence of banks that funds deposited into your account(s) in the form of a check will be available after a certain number of business days. In the case of electronic deposits, that period of financial limbo can be as short as a few seconds. But in either case, the float is still there for the bank to use.
Thus, in this case we are in effect looking at a float of five years, in which case those seized assets are the seizer's to use (in this case, the US Government), while the  seizure is litigated (and, notably, presumably at the target's expense,  and litigated in an already grotesquely corrupted judicial system).  The implication here is obvious: facing a budget shortfall? Just seize some assets, and use them for whatever purpose one wishes during the period of the float, while the seized assets are in a limbo of litigation.
It does not take a German rocket scientist to see that such a system, on the face of it, is both inherently unstable and invites and enables a massive growth in corruption at the highest levels. Such practices as I have outlined in that News and Views and again in this written blog have - rest assured - already spread to other countries and to private groups that are large and powerful enough to maintain large cyber-security and cyber-warfare departments.
The basic core lesson here is simple, and goes beyond the observation that no cyber-system whatsoever is ever secure. The lesson here is that crypto-currencies are not secure, not a means of side-stepping the power of central banks, governments, and returning the money-power to the people, or protecting privacy, or any of the nonsense we heard in the heyday when crypto-currencies first emerged. The whole idea of digital money, where a central bank digital currency, or a "private" crypto-currency like Etherium or Bitcoin or whatever, is nothing but a platform to enable the more efficient theft of hard assets, and hence my sobriquet: klepto-currency.  The whole thing invites a response, and one can imagine, with time, that a country or corporation or cyber-hacking group might grow tired of trying to litigate the return of their cyber-assets, and simply decide to do their own "asset seizure" in response... and we're off and running.
And here's the kicker: it's difficult to see how any sort of global regulatory culture will "fix" the problem. On the contrary, look for it to exacerbate it.
See you on the flip side...

Joseph P. Farrell

Joseph P. Farrell has a doctorate in patristics from the University of Oxford, and pursues research in physics, alternative history and science, and "strange stuff". His book The Giza DeathStar, for which the Giza Community is named, was published in the spring of 2002, and was his first venture into "alternative history and science".

No Comments

  1. marcos toledo on November 19, 2025 at 4:55 pm

    This post didn’t appear on Monday. The problem is that a counterfeiter or forger has to duplicate, to the best of their ability, the real paper or coin currency. Since cryptocurrency is not real, the difference between legitimate and illegitimate disappears



Leave a Comment

Help the Community Grow

Please understand a donation is a gift and does not confer membership or license to audiobooks. To become a paid member, visit member registration.

Upcoming Events