• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About
  • Donate
  • Start
    • Contact
    • We Need Your Support (Donate)
    • Newsletter Signup
      • Daily
      • Weekly
    • Into the Storm (Hosted by Justin Deschamps)
    • Follow Our Social Media
    • Best Telegram Channels & Groups
    • Discernment 101
    • Media Archive (Shows, Videos, Presentations)
    • Where’s The Hope
  • Browse
    • Editor’s Top Content (Start Here)
    • Best Categories
      • Consciousness
      • Conspiracy
      • Disclosure
      • Extraterrestrials
      • History
      • Health
      • NWO Deep State
      • Philosophy
      • Occult
      • Self Empowerment
      • Spirituality
    • By Author
      • Justin Deschamps
        • Articles
        • Into The Storm (on EdgeofWonder.TV)
        • Awarewolf Radio (Podcast)
      • Adam AstroYogi Sanchez
      • Amber Wheeler
      • Barbara H Whitfield RT and Charles L Whitfield MD
      • Chandra Loveguard
      • Conscious Optimist
      • Marko De Francis
      • Lance Schuttler
        • EMF Harmonized (Cell Phone, Wi-Fi, Radiation Protection
      • Ryan Delarme
      • Will Justice
  • Products
    • EMF Harmonized (Cell Phone, Wi-Fi, Radiation Protection
    • Earth Science & Energy
    • Free Energy
    • AI and Transhumanism
    • Space
    • Nikola Tesla
    • ET
      • Ancient Technology
      • Crop Circles
      • UFOs
    • Conspiracy
      • Anti NWO Deep State
      • Domestic Spying
      • Freemasonry
      • Law & Legal Corruption
      • Mass Mind Control
      • NWO Conspiracy
      • Police State and Censorship
      • Propaganda
      • Snowden Conspiracy
      • Social Engineering
    • Misc.
      • Council on Foreign Relations
      • Music Industry
      • Paranormal
      • Pedagate and Pedophilia
      • Q Anon
      • Secret Space Program
      • White Hat
  • Sign Up
  • Election Fraud
  • Partners
    • EMF Harmonized
    • Ascent Nutrition

Stillness in the Storm

An Agent for Consciousness Evolution

  • Our Story
  • Support Us
  • Contact
  •  Monday, February 2, 2026
  • Store
  • Our Social
    • BitChute
    • CloutHub
    • Gab
    • Gab TV
    • Gettr
    • MeWe
      • MeWe Group
    • Minds
    • Rumble
    • SubscribeStar
    • Telegram
      • Best Telegram Channels and Groups
    • Twitter (Justin Duchamps)
    • YouTube

The Fed Was Hacked More Than 50 Times Between 2011 And 2015

Sunday, June 5, 2016 By Justin Deschamps Leave a Comment

Spread the love

Source – Zero Hedge

by Tyler Durden

In the aftermath of the bizarre SWIFT hack that supposedly allowed brazen Asian hackers to steal $81 million from the account of the Bangladesh central bank held at the Fed, attention has predictably shifted to the question of whether there was just “one cockroach.” As it turns out there were at least 50. As Reuters reports, citing Fed records, “the U.S. Federal Reserve detected more than 50 cyber breaches between 2011 and 2015, with several incidents described internally as “espionage.”

The cybersecurity reports, obtained by Reuters through a Freedom of Information Act request, were heavily redacted by Fed officials to keep secret the central bank’s security procedures. Reuters notes that in all, the Fed’s national team of cybersecurity experts, which operates mostly out of New Jersey, identified 51 cases of “information disclosure” involving the Fed’s board. Separate reports showed a local team at the board registered four such incidents.

According to Reuters, the records represent only a slice of all cyber attacks on the Fed because they include only cases involving the Washington-based Board of Governors, a federal agency that is subject to public records laws. Reuters did not have access to reports by local cybersecurity teams at the central bank’s 12 privately owned regional branches. Hacking attempts were cited in 140 of the 310 reports provided by the Fed’s board. In some reports, the incidents were not classified in any way.

The central bank’s staff suspected hackers or spies in many of the incidents. Or just petty criminals, who after figuring out how the system works, figured out how to also submit SWIFT requests on others’ behalf and steal tens of millions. “Hacking is a major threat to the stability of the financial system. This data shows why,” said James Lewis, a cybersecurity expert at the Center for Strategic and International Studies, a Washington think tank. Lewis reviewed the files at the request of Reuters.

Related DDOS Attacks by Anonymous Hits New York Stock Exchange, World Bank, The Fed, & Vatican — Total Media Blackout

Curiously, in eight information breaches between 2011 and 2013 – a time when the Fed’s trading desk was buying massive amounts of bonds – Fed staff wrote that the cases involved “malicious code,” referring to software used by hackers. One wonders if the NY Fed trading desk had any malware loaded up on it while Simon Potter’s crack bond buyers were executing trillions in purchases.

Four hacking incidents in 2012 were considered acts of “espionage,” according to the records. Information was disclosed in at least two of those incidents, according to the records. In the other two incidents, the records did not indicate whether there was a breach. It was unclear if the espionage incidents involved foreign governments, as has been suspected in some hacks of federal agencies. Beginning in 2014, for instance, hackers stole more than 21 million background check records from the federal Office of Personnel Management, and U.S. officials attributed the breach to the Chinese government, an accusation denied by Beijing.

While the usual hacking suspects are foreign governments, Reuters notes that espionage might also refer to spying by private companies, or even individuals such British activist Lauri Love, who is accused of infiltrating a server at a regional Fed branch in October 2012. Love stole names, e-mail addresses, and phone numbers of Fed computer system users, according to a federal indictment. The redacted reports obtained by Reuters do not mention Love or any other hacker by name.

* * *

We have previously reported that the Fed has its own private police force; as it turns out the Fed also has its own national cybersecurity team – the National Incident Response Team, or NIRT – which created 263 of the incident reports obtained by Reuters. NIRT operates in a fortress-like building in East Rutherford, New Jersey that also processes millions of dollars in cash everyday as part of the central bank’s duty to keep the financial system running, according to the New York Fed’s website. The unit provides support to the local cybersecurity teams at the Fed’s Board and regional banks, which process more than $3 trillion in payments every day.

The NIRT handles “higher impact” cases, according to a 2013 report by the Board of Governor’s Office of Inspector General. One of the two former NIRT employees interviewed by Reuters described being on a team that once worked around the clock for five-straight days to patch software hackers had used to gain access to Fed systems in an attempt to obtain passwords. The former employee worked through several of those nights, taking naps at a desk in the office.

In that case, Fed security staff found no signs that sensitive information had been disclosed, the former employee said. Information about future interest rate policy discussions is isolated from other Fed networks and is more difficult for hackers to access, the former NIRT worker said. But the Fed was under constant assault, much like any large company, the former employee said, and was “compromised frequently.”

An internal watchdog has criticized the central bank for cybersecurity shortcomings. A 2015 audit by the Fed board’s Office of Inspector General found the board was not adequately scanning databases for vulnerabilities or putting enough restrictions on system access. “There is heightened risk of unauthorized disclosure and inappropriate use of sensitive board information,” according to the audit released in November.

The Fed cybersecurity records did not indicate whether hackers accessed sensitive information on the timing or amounts of bond purchases or used it for financial gain.

Readers can make their own conclusion if someone who hacked the Fed used the data for “financial gain.”

As for the question what is behind this ongoing onslaught by authorities to “expose” the countless hacks of both commercial and Federal Reserve banks, including the all important SWIFT, we can only assume it is to streamline the implementation of blockchain as the new architecture of global funds flow, an architecture that has been vocally espoused by both Goldman and JPMorgan.
_________________________
Stillness in the Storm Editor’s note: Did you find a spelling error or grammar mistake? Do you think this article needs a correction or update? Or do you just have some feedback? Send us an email at [email protected]. Thank you for reading.

_________


Source:

http://www.zerohedge.com/news/2016-06-01/fed-was-hacked-more-50-times-between-2011-and-2015

Filed Under: Uncategorized Tagged With: bankers, fed, federal reserve, hack, MSM, self education, zerohedge

Notices and Disclaimers

We need $2000 per month to pay our costs. Help us one time or recurring. (DONATE HERE)

To sign up for RSS updates, paste this link (https://stillnessinthestorm.com/feed/) into the search field of your preferred RSS Reader or Service (such as Feedly or gReader).

Subscribe to Stillness in the Storm Newsletter

“It is the mark of an educated mind to be able to entertain a thought without accepting it.” – Aristotle

This website is supported by readers like you.

If you find our work of value, consider making a donation. 

Stillness in the Storm DISCLAIMER: All articles, videos, statements, claims, views and opinions that appear anywhere on this site, whether stated as theories or absolute facts, are always presented by Stillness in the Storm as unverified—and should be personally fact checked and discerned by you, the reader. Any opinions or statements herein presented are not necessarily promoted, endorsed, or agreed to by Stillness, those who work with Stillness, or those who read Stillness. Any belief or conclusion gleaned from content on this site is solely the responsibility of you the reader to substantiate, fact check, and no harm comes to you or those around you. And any actions taken by those who read material on this site is solely the responsibility of the acting party. You are encouraged to think carefully and do your own research. Nothing on this site is meant to be believed without question or personal appraisal.

Content Disclaimer: All content on this site marked with “source – [enter website name and url]” is not owned by Stillness in the Storm. All content on this site that is not originally written, created, or posted as original, is owned by the original content creators, who retain exclusive jurisdiction of all intellectual property rights. Any copyrighted material on this site was shared in good faith, under fair use or creative commons. Any request to remove copyrighted material will be honored, provided proof of ownership is rendered. Send takedown requests to [email protected].

What is our mission? Why do we post what we do?

Our mission here is to curate (share) articles and information that we feel is important for the evolution of consciousness. Most of that information is written or produced by other people and organizations, which means it does not represent our views or opinions as managing staff of Stillness in the Storm. Some of the content is written by one of our writers and is clearly marked accordingly. Just because we share a CNN story that speaks badly about the President doesn’t mean we’re promoting anti-POTUS views. We’re reporting on the fact as it was reported, and that this event is important for us to know so we can better contend with the challenges of gaining freedom and prosperity. Similarly, just because we share a pro/anti-[insert issue or topic] content, such as a pro-second amendment piece or an anti-military video doesn’t mean we endorse what is said. Again, information is shared on this site for the purpose of evolving consciousness. In our opinion, consciousness evolves through the process of accumulating knowledge of the truth and contemplating that knowledge to distill wisdom and improve life by discovering and incorporating holistic values. Thus, sharing information from many different sources, with many different perspectives is the best way to maximize evolution. What’s more, the mastery of mind and discernment doesn’t occur in a vacuum, it is much like the immune system, it needs regular exposure to new things to stay healthy and strong. If you have any questions as to our mission or methods please reach out to us at [email protected].

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

Search Our Archives

FUNDRAISER!

Latest Videos

Guarding Against Bio Tech and EMF - Fix The World Project | Just In Stillness

From around the web

News “they” don’t want you to see

Newsletter

You can unsubscribe anytime. For more details, review our Privacy Policy.

Thank you!

You have successfully joined our subscriber list.

.

We Need Your Support

Support our work!

Weekly Newsletter Sign UP

Only want to see emails once a week? Sign up for the Weekly Newsletter here: SIGN UP. (Make sure you send an email to [email protected] to confirm the change or it won’t work).

Latest Videos

Footer

  • Menus
  • Internship Program
  • RSS
  • Social Media
  • Media
  • Privacy Policy

Copyright © 2026 · Privacy Policy · Log in · Built by

This website wouldn't be the same without the ethical web hosting provided by Modern Masters. Modern Masters ethically serves small businesses in metaphysical, paranormal, healing, spirituality, homesteading, acupuncture and other related fields. Get the perfect website for your sacred work at Modern Masters.