And Another Thing: Chase Was Hit Before July 4th Too…


Source: GizaDeathStar.com
Dr. Joseph P. Farrell Ph.D.
July 14, 2017

Yesterday, I blogged about the silver “flash crash” of July 7, and earlier this week, about the NASDAQ flash crash, but, just in case you might have thought these were nothing but accidental “glitches” from the “coincidence” side of the glitch family, rather from the esteemed branch of the family of deliberately planned glitches, it looks as if things might be leaning definitely to the “deliberate action” side of the equation, according to this article shared, once again, by Mr. G.B.:

Nationwide outage hits Chase bank customers before 4th of July

Chase’s system went down coast to coast, but what’s very intriguing here is the suggestion that Chase might have been dealing with its own glitches, which it was calling “improvements”:

A message on the Chase website explained to customers that the outages were due to the bank “making a few improvements”according to the Cleveland Plain Dealer.

The bank said customers would not be able to access their information or schedule bill payments or transfers.

However, customers reported that entire branches had been shut down Monday, while others complained they were unable to pay their rent and bills, withdraw money from ATM’s, or even access their information over the phone or in person.

Now, as you might have guessed, I have all sorts of wild and crazy high octane speculations running through my head reading this, not the least of which is the thought that “two is coincidence, three is a conspiracy.” On my view that these types of events are the results of some systematic probing of financial cyber-architecture vulnerabilities, then targeting the NASDAQ, a commodities market, and Chase Manhattan, a large international bank, makes a lot of sense.

But that’s not the only thing running through my head, so let’s speculate on the very end of the twig, where the weight of speculation far exceeds the amount of evidence to prop it up.

Let’s posit a hypothetical bank, say, Deutsche-Manhattan-Cheese Banco dei Flaschi di Cesspool, and let’s say that, just before the beginning of August, when the entire country of France goes on vacation holiday, Deutsche-Manhattan-Cheese Banco dei Flaschi di Cesspool announces in the Toulouse Daily Whistle, that it is going to shut down its systems to make improvements just before the next holiday, stranding thousands of Frenchmen at their ATMs and keeping Paris unusually populated for the month of August. That’s quite an improvement, for during this period of being “down,” one might – just as a kind of hypothetical high octane speculation – be able to access the funds that its depositors could not access, and via a variety of cutouts, fronts, and so on, be able to place gobs of trades, make huge amounts of money, keep it all off the books (remember, the system is down – just before the holidays – to make “improvements”), trigger various flash crashes in various markets, and perhaps even target specific equities to be re-evaluated because of the reset when the circuit breakers kick in and halt all the trading.

But of course, nothing like that could ever happen, because we all know that big international mega-banks like Deutsche-Manhattan-Cheese Banco dei Flaschi di Cesspool are cleaner than a Wall Street toilet.

And thank goodness too, because I was beginning to lose my faith in crony finance crapitalism.

See you on the slip side…

Read More At: GizaDeathStar.com
________________________________________________

About Dr. Joseph P. Farrell

Joseph P. Farrell has a doctorate in patristics from the University of Oxford, and pursues research in physics, alternative history and science, and “strange stuff”. His book The Giza DeathStar, for which the Giza Community is named, was published in the spring of 2002, and was his first venture into “alternative history and science”.

Crypto-currency, Financial Clearing, & Rogue Hacking Groups


Source: GizaDeathStar.com
Dr. Joseph P. Farrell Ph.D.
June 7, 2017

Color me crazy, but I’ve never been on the cashless society bandwagon for a variety of reasons, not the least being that anything Mr. Globaloney is for, is probably ab initio et in principio a bad idea. Crypto-currencies, in this light, always struck me as being “too good to be true” and their principal selling point – security and privacy – a little too convenient. They struck me then, and strike me now, as being taylor-made to press Mr. Globaloney’s desire to move everyone to cashlessness.

Which brings me to my second reason for skepticism: the integrity of cyber systems in general. Why anyone would trust such a system is beyond me, especially when, if one wants to turn the clock back a bit to the 1980s, there were already stories circulating about computers being sold with “clipper chips” that allowed your local not-so-friendly three-letter-agencies access to every electronic communication. Then, of course, came the Inslaw-PROMIS scandals of the late 1980s, and we were off and running.

Now, in that context, consider the following article by Rich Haridy – a very intriguing article from several points of view – that was shared by Mr. J.K.:

Shadow Brokers hacking group reveals bizarre data dump subscription plan

Several things caught my eye in this article, and we’d be here for days if I were to blog about all of them, but I want to draw attention to the first thing that really leaped off the page:

The Shadow Brokers first appeared in August 2016, announcing an auction to sell off a set of security exploits the group purportedly stole from the NSA. After the auction failed to reach the absurd asking price of one million bitcoins, the group publicly released four sets of exploits over the following months. One of those exploits contained the now infamous EternalBlue vulnerability that underpinned the recent WannaCry attack.

Since the WannaCry outbreak, the Shadow Brokers have been threatening to release more NSA hacking tools, and in early May the group published a blog post in broken English ominously announcing a bizarre subscription model offering members a monthly haul of data.

The group described it as a, “new monthly subscription model. Is being like wine of month club. Each month peoples can be paying membership fee, then getting members only data dump each month. What members doing with data after is up to members.”

In a follow-up post published more recently, the group explained the process in greater detail. Subscribers can pay 100 Zcash coins (equivalent to over US$20,000) to access the data dump, which will be revealed in the first two weeks of July.

Zcash is a relatively new cryptocurrency launched in October 2016. Purportedly more secure than Bitcoin, the Shadow Brokers’ use of Zcash seems to be less about using a safer cryptocurrency and more about revealing to the public the US government’s connection to its development.

The Shadow Brokers’ blog post explicitly points out that the development of Zcash is allegedly linked to the Department of Defense, DARPA and Israel. It also claims the new cryptocurrency, which was recently accepted as a legitimate currency on iOS and Android platforms, could be a trojan horse with a cryptographic flaw monitored by the NSA or used by the government to send money to deep cover assets outside of banking systems. (Italicized emphasis added)

Now, before we get to my high octane speculation de jour, note the following things:

(1) The hacking group “Anonymous” seems to have dropped off the radar, to be replaced now with “The Shadow Brokers” which raises the interesting questions: (a) has the former group simply rebranded itself and reemerged under a new name? Or did the former simply cease operations? Or are they two discrete groups? One may never know, but as we’ll see in a moment, the question of who and what this new group – the Shadow Brokers – is, is an important component of any speculation regarding what it going on.

(2) The new group is exposing the alleged links of the new cyber-currency to the US Department of Defense, DARPA, and Israel; and,

(3) that said cyber-currency has a “back door” built in, which, of course, raises the entire philosophical objection I have to the whole idea: what is to prevent any cyber-currency, state-sponsored or otherwise, from having a similar “flaw”? Answer: nothing.

Given that flaw, however, note that The Shadow Brokers have tapped into it, which raises the question of just who they are. Here Mr. Haridy explores the options at opposite ends of the spectrum:

This odd series of actions, which seem to be constantly iterating information with a strong anti-government bent, has caused many to question who The Shadows Brokers actually are, and whether their motives are simply mercenary.

Much speculation has floated around the possibility that the group could be a foreign nation state working to embarrass or disrupt the US government’s cyber-spying efforts. A former NSA employee tells Ars Technica that they, “are foreign intelligence, and the continued requests for money are all geared towards plausible deniability that they are intel.”

Edward Snowden tweeted suspicions that the group were Russian hackers back in August 2016, when the original auction was revealed. Over a series of 15 tweets he laid out a compelling case for the original NSA hacks coming from a foreign intelligence, in particular, Russia.

Security specialist Bruce Schneier also published a more recent, and exhaustive, investigation into the source of the mysterious hacking group. He concludes, quite reasonably, that while they are seemingly not just random hackers or cybercriminals, it also looks unlikely they are a cyber-intelligence sector of a nation state due to their erratic and anarchic activities.

All of this brings me to my high octane speculation of the day. Assuming the first hypothesis, that the group is a state-sponsored group, then the effect of their action seems to be to expose the extent of NSA electronic eavesdropping, and the lack of integrity of cyber systems. If, on the other hand, it is a private group, the effect would be the same. But it is the effect itself that seems to be being ignored by analysts hypothesizing on who they are and what they’re up to, for regardless of whether or not they are state-sponsored (and that means, even a group or faction within the American military-intelligence complex), or not, the group is (1) Calling into question the integrity of cyber systems in general and (2) crypto-cyber currencies in particular. And hence it strikes me as being entirely possible that the real ultimate and deepest motivation of these types of attacks is to call into question the whole agenda of cashless society, all firmly under the control of Mr. Globaloney. In support of this high octane speculation, recall that even Darth Soros was recently hacked, and some of his financial dealings exposed to scrutiny.

If my hypothesis is true, expect more such hacks, and more such exposure of the global super-elite.

See you on the flip side…

Read More At: GizaDeathStar.com
________________________________________________

About Dr. Joseph P. Farrell

Joseph P. Farrell has a doctorate in patristics from the University of Oxford, and pursues research in physics, alternative history and science, and “strange stuff”. His book The Giza DeathStar, for which the Giza Community is named, was published in the spring of 2002, and was his first venture into “alternative history and science”.

Russia Launched Anti-Hacking Center One Day Prior To US Elections

Source: GizaDeathStar.com
Dr. Joseph P. Farrell
November  15, 2016

Over the past couple of days I’ve been blogging about some very strange goings-on that were taking place during the run-up to the American elections, and immediately thereafter. This has included strange trips of US Secretary of State John “Ketchup” Kerry, cyber-attacks on Russian banks that occurred just as polls were opening in the USA, and an all-too-convenient explosion of a Russian powerplant at the Arctic city of Murmansk, with a population of over 300,000, and in a key region of Russia’s defensive system for its naval forces, including the all-important naval and submarine base at nearby Polyarny. In my high octane speculations about these events, I suggested that they were not coincidental, but perhaps either cyber-attacks being staged either to aid Mrs. Clinton, to warn off the Russians, or to prepare a softening up of Russia in conjunction with current NATO deployments against that country in anticipation of a Clinton victory. Howsoever one parsed the motivations and players behind these events, however, I argued that they pointed to coordination and deliberate attack.

There was another story that appeared during the election hoopla and broohaha that tends to confirm these views, and it appeared on Russia’s RT news site, and was shared by Ms. S.:

Russia launches dedicated anti-hacking center for defense industry

The timing here is significant in my opinion, for this story appeared on Nov 7 on RT’s site, one day before the US elections. Obviously, launching such a center means that this center was in the planning and development stage for some time, and the Kaspersky announcement of cyber attacks a few days later seems to indicate that the center was up and running, coordinating with the world-famous Russian cyber-security firm, in defeating those attacks.

In my high octane speculation of the day, however, the timing of the announcement suggests that the Russians might have been sending a message to the West, namely, that they were expecting something to happen, given all the hysteria in the USA about potential Russian attempts to manipulate the computerized voting machines and attempt to swing the election for Mr. Trump. Personally, I was always quite suspicious of these stories, for Russia’s own polling probably showed them what the internal polling for Mr. Trump and Mrs. Clinton were showing them, namely, that she was going to lose, making any such Russian effort not only superfluous, but risky. This was never a real possibility, though we now hear Frau Merkel echoing the Clinton campaign on this score in Germany. The massive amount of voter and election fraud being reported in the USA prior to and during election day suggests that this was mostly coming from inside the USA, and largely from Mrs. Clinton’s covert supporters, rather than from Russia.

If the Russians were sending messages, then I suspect that this adds a bit of strength to the argument I’ve been advancing in the past couple of days, namely, that the Murmansk explosion and the cyber attacks on major Russian banks were part of one operation, a kind of “double whammy,” attacking a sensitive military area’s infrastructure while simultaneously attacking their banking system. If one had limited countermeasure resources, which…

Continue Reading At: GizaDeathStar.com
______________________________________________________________

Profile photo of Joseph P. Farrell

About Joseph P. Farrell

Joseph P. Farrell has a doctorate in patristics from the University of Oxford, and pursues research in physics, alternative history and science, and “strange stuff”. His book The Giza DeathStar, for which the Giza Community is named, was published in the spring of 2002, and was his first venture into “alternative history and science”.