Twenty-two files. End-to-end documentation of how power consolidates. The Federal Reserve as a private banking cartel administering public currency. The Pentagon's missing trillions. The 2008 bail-outs that transferred ten years of household wealth upward. The bankers who fall from windows during routine investigations. The surveillance technologies that watch you. The cures you're not allowed to have. Read in sequence, the file is no longer a collection of scandals — it is the operating manual.
The framing this file is willing to claim: most of these are not "scandals" in the common sense — they are the system operating as designed. A scandal implies a deviation from expected practice. The Federal Reserve, the bail-outs, MK-Ultra, the NSA's bulk collection, the FDA's regulatory capture by the pharmaceutical industry — these are not departures from the institutional norm. They are the institutional norm.
The harder question this file is trying to make legible is structural. Across these twenty-two entries, the same operational pattern repeats: a public-good function (currency, defense, public health, intelligence) is captured by a private-interest network; the legal and regulatory framework is updated post-hoc to legalize the capture; the resulting wealth transfer is presented in the press as a regrettable but unavoidable feature of complex systems; the figures who would have testified to the original capture die in clusters. The "banker suicides" of 2014-2015, in which dozens of senior banking-sector personnel died of unusual causes during a period of regulatory inquiry into LIBOR/FX/SARs activity, is the visible end of a longer ledger.
The structure of each dossier remains the same: what officially happened, which institutional pattern it represents, and the open questions. The technologies referenced (PROMIS, MK-Ultra, Stuxnet, NSA bulk-collection programs) are sourced from declassified documents and Snowden archives. The financial events are sourced from the Government Accountability Office, the Federal Reserve's own audit findings, the Senate Permanent Subcommittee on Investigations, and the Bank of International Settlements.
The Federal Reserve System — the central bank that issues the United States currency, sets interest rates, and acts as the lender of last resort to the U.S. financial system — is not a federal agency in the sense most Americans assume. It is a hybrid public-private structure with twelve regional Reserve Banks owned by the member commercial banks, governed by a Board of Governors appointed by the President, operating under a Congressional charter. The originating draft of the Federal Reserve Act was written in November 1910 at a secret meeting on Jekyll Island, Georgia, attended by six men: Senator Nelson Aldrich, Frank Vanderlip (National City Bank), Paul Warburg (Kuhn, Loeb & Co), Henry Davison (J.P. Morgan), Charles Norton (First National Bank), and Benjamin Strong (Bankers Trust). The meeting was kept secret for years. Vanderlip later acknowledged it openly in a 1935 Saturday Evening Post article: "There was an occasion, near the close of 1910, when I was as secretive — indeed, as furtive — as any conspirator… I do not feel it is any exaggeration to speak of our secret expedition to Jekyll Island as the occasion of the actual conception of what eventually became the Federal Reserve System."
The 2011 GAO partial audit of the Federal Reserve — the first audit ever permitted in the institution's 98-year history at that point, and limited in scope by the legislation that authorized it — documented $16+ trillion in emergency loans extended to U.S. and foreign banks during the 2007-2010 financial crisis, far exceeding the publicly-reported TARP figure. The recipients included Citigroup ($2.5T), Morgan Stanley ($2T), Merrill Lynch ($1.9T), Bank of America ($1.3T), and substantial loans to Deutsche Bank, Royal Bank of Scotland, UBS, and other foreign institutions. The Fed had not previously disclosed the existence of these emergency facilities, the loan sizes, the recipients, or the terms. Senator Bernie Sanders, who introduced the audit amendment, characterized the disclosure as evidence of a "clear case of socialism for the rich and rugged, you're-on-your-own individualism for everyone else."
The deeper structural fact: the U.S. Constitution's Article I, Section 8 grants Congress — not a private banking consortium — the power "to coin Money, regulate the Value thereof." Lincoln's 1862 Greenback issuance and Kennedy's 1963 Executive Order 11110 (which authorized the Treasury to issue silver certificates without Federal Reserve intermediation) were both reversals of the Reserve framework. Both presidents were assassinated. The connection is contested but is a documented coincidence in the historical record (cross-ref Vector 01 files 010 and 001).
On 10 September 2001 — the day before 9/11 — Defense Secretary Donald Rumsfeld announced at a Pentagon briefing that the Department of Defense could not account for $2.3 trillion in transactions: "According to some estimates we cannot track $2.3 trillion in transactions… We cannot share information from where we have it, with those who need it." The announcement received scant press coverage. Hours later, the Pentagon was struck by American Airlines Flight 77; the section that took the impact housed, among other personnel, the Office of Naval Intelligence financial-management team that had been working on tracking the missing transactions. The team's records were destroyed. The investigators died.
The financial-accounting irregularity has not improved. Michigan State University economist Mark Skidmore, working with former HUD Assistant Secretary Catherine Austin Fitts in 2017, documented an aggregate $21 trillion in unsupported journal-voucher adjustments at the DoD and HUD between 1998 and 2015. The detailed methodology was published in MSU's working-paper series. The DoD's first-ever full agency audit, completed in 2018, was a failure — auditors were unable to reconcile the books. The DoD has now failed every annual audit since. The figure of "missing" or unaccountable funds has continued to grow; the institutional response has been to declassify the audit findings and treat the irregularities as routine bureaucratic noise.
The dossier-level interpretation: this is not bookkeeping incompetence. It is the operational mechanism by which black-budget programs are funded, off-the-books intelligence operations are sustained, and assets are moved through the federal accounting system in ways that bypass Congressional oversight. $21 trillion is approximately the entire current U.S. national debt. The fact that this magnitude of undocumented flow can occur within the federal accounting system without producing a constitutional crisis is the case file.
The 2008 financial crisis, triggered by the collapse of mortgage-backed securities and the Lehman Brothers bankruptcy, produced the largest peacetime wealth transfer in U.S. history. The $700 billion TARP program was the publicly-debated component; the $16+ trillion in Federal Reserve emergency lending (cross-ref file 001) was the substantially larger and contemporaneously unreported component. The cost to American households, in lost home equity, retirement-account losses, and unemployment, exceeded $15 trillion in cumulative wealth (Federal Reserve 2018 estimate). Approximately zero senior bank executives were criminally prosecuted. The Department of Justice's 2009 "Holder Memo" formalized the "too big to jail" doctrine by directing prosecutors to consider broader economic impact when charging financial institutions.
The substantive case the file is willing to advance: the bail-outs were not, in operational terms, an emergency response to a discrete crisis. They were the activation of a long-standing implicit guarantee that the major banks operate under, in which their downside risk is socialized while their upside is retained privately. The 2010 Dodd-Frank Act formally addressed parts of this dynamic but did not eliminate the implicit guarantee or restore Glass-Steagall separation between investment and commercial banking. The 2023 Silicon Valley Bank, Signature Bank, and First Republic interventions repeated the same pattern — different scale, identical mechanics. The institutional commitment to the guarantee is not a bug.
The London Interbank Offered Rate — the benchmark interest rate against which an estimated $300+ trillion in financial instruments globally were priced, including U.S. adjustable-rate mortgages, student loans, and the bulk of the global derivatives market — was systematically manipulated by a coordinated cartel of major banks for at least two decades. The manipulation was not a rogue-trader event. Internal communications recovered during the regulatory investigations included messages such as a UBS trader to a Tokyo broker: "if you keep 6s [LIBOR] unchanged today… I will fucking do one humongous deal with you." The trader was thanked with "u r the best." This was the daily-operations style. A Barclays trader to a colleague: "Always happy to help, mate." Bank of America Merrill Lynch and Citigroup were among the named institutions.
The disposition: settlement payments totaling approximately $9 billion across a dozen institutions, two Barclays traders criminally convicted (Tom Hayes and Carlo Palombo, both with appeals — Hayes's conviction was partially overturned in 2024 by the UK Court of Appeal on insufficient-evidence grounds, in a ruling that has been characterized as protecting the institutional class above the trader class), and zero senior executives prosecuted. The cumulative public cost — paid by every household with an adjustable-rate mortgage, every student-loan borrower, every fixed-income retiree whose pension was priced off LIBOR — has never been calculated, and is plausibly in the hundreds of billions of dollars. The replacement benchmark, the Secured Overnight Financing Rate (SOFR), is a methodologically different measure with its own emerging concerns.
Edward Snowden's June 2013 disclosure of internal NSA documents to journalists Glenn Greenwald, Laura Poitras, and Ewen MacAskill produced the most comprehensive single-event exposure of an intelligence-state surveillance apparatus in modern history. The documented programs included: PRISM (direct backbone access to Google, Facebook, Microsoft, Yahoo, Apple, AOL, Skype, YouTube); XKeyscore (real-time global Internet surveillance with selector-based query); MUSCULAR (covert tap on Google and Yahoo data-center back-end links, conducted without the companies' knowledge); MYSTIC (full-take voice recording of cell traffic in entire countries, including the Bahamas); STELLARWIND (post-9/11 warrantless wiretap program). The Section 215 bulk-metadata collection of every American's domestic phone-call records was the program with the most direct constitutional concern and was the subject of the 2nd Circuit's 2015 finding (ACLU v. Clapper) that the program was likely unconstitutional. The USA Freedom Act (2015) modified but did not eliminate the bulk collection.
The institutional response: Snowden was charged under the Espionage Act and granted asylum in Russia. Director of National Intelligence James Clapper, who had testified to Congress in March 2013 that the NSA did not collect data on millions of Americans (a statement Clapper later acknowledged was "the least untruthful answer" he could give), was not prosecuted for perjury. The structural arrangement of who can lie to Congress without consequence vs. who is prosecuted for disclosing the lie is itself the case file. The post-2015 modifications and the Section 702 reauthorization (most recently in April 2024) have not substantively reduced the surveillance apparatus's operational capability; the architecture documented by Snowden remains in place with cosmetic legal modifications.
Project MK-Ultra was the CIA's twenty-year, eighty-sub-project program of human experimentation in chemical, biological, electronic, and psychological methods of behavior modification. The program was operationally directed by Sidney Gottlieb, Chief of the CIA's Technical Services Staff Chemical Branch. The Senate Church Committee (1975-76) and the Rockefeller Commission (1975) produced the first congressional documentation; CIA Director Stansfield Turner's 1977 disclosure to Congress provided the most detailed surviving accounting. The substantive majority of MK-Ultra records were intentionally destroyed by CIA Director Richard Helms in 1973, prior to his 1973 retirement and prior to the Church Committee inquiries. The records that survived were those held in CIA financial-payment archives that had escaped the destruction order.
What is documented: experimentation on unwitting subjects (including U.S. citizens, military personnel, and prison populations) with LSD, hypnosis, sensory deprivation, electroconvulsive therapy, sustained sleep deprivation, and pharmaceutical-induced amnesia; collaboration with Operation Paperclip-recruited Nazi-era scientists; the 1953 death of Frank Olson, a U.S. Army biological-weapons researcher who fell from a hotel window after being dosed with LSD without his consent (his family received a 1976 settlement; his case has been the subject of multiple subsequent investigations finding his death was likely homicide rather than suicide); the documented use of the Allen Memorial Institute under Donald Ewen Cameron in Montreal as an MK-Ultra research site producing Canadian and U.S. citizen victims who later won lawsuit settlements. The CIA's stated 1973 termination of the program is contradicted by subsequent disclosures of successor programs (MKSEARCH, MKDELTA, MKNAOMI) running into the late 1970s, and by ongoing institutional capability that has not been definitively retired.
The dossier-level connection to other vectors: MK-Ultra-style hypno-programming has been advanced as a working hypothesis for several Vector 01 and Vector 03 entries (Sirhan Sirhan, the documented Cobain heroin level, the disorganized pre-attack histories of multiple modern shooters). The hypothesis is contested but is grounded in the documented capability — capability that was real, that was researched at scale for two decades, and whose successor programs and institutional knowledge have not been publicly retired.
Stuxnet was a sophisticated computer worm jointly developed by the U.S. National Security Agency and Israel's Unit 8200 — operationally codenamed "Olympic Games" — to physically destroy uranium-enrichment centrifuges at Iran's Natanz facility by altering the rotational speed of the Siemens PLC-controlled motors while displaying normal readings to the operators. The worm, identified by Belarusian security researchers in June 2010 and reverse-engineered by Symantec, Kaspersky, and others over the subsequent year, represented the first publicly-confirmed deployment of a cyber-weapon to produce kinetic physical damage in a foreign state. The Flame surveillance malware, identified by Kaspersky in 2012, was a related platform sharing code and infrastructure. David Sanger's 2012 New York Times reporting confirmed the U.S.-Israel joint attribution at named-source-on-record level.
The dossier-level question is what the Stuxnet/Flame disclosures imply about the broader institutional cyber-warfare capability that was, by 2010, operational and that has continued to develop. The Vault 7 Wikileaks disclosure (2017), drawn from CIA Center for Cyber Intelligence material, documented the agency's UMBRAGE program — a library of attack tools designed to permit false-flag attribution by mimicking the signatures of foreign-state actors. The implication: cyber-attacks attributed to Russia, China, Iran, or North Korea may, in some unknown fraction of cases, originate with U.S. agencies operating false-flag tooling. The institutional capability is documented; the operational deployment frequency is not. The 2015-2024 period of elevated "Russian cyber attack" attributions occurs against this documented attribution-laundering infrastructure.
Bernard L. Madoff Investment Securities operated the largest Ponzi scheme in history, with $64.8 billion in fictitious account values at the time of its 2008 collapse. Madoff confessed and was sentenced to 150 years; he died in prison in 2021. The dossier-level fact: the SEC had received specific, detailed warnings about Madoff's operation as a Ponzi scheme as early as 1999 from independent fraud examiner Harry Markopolos, who provided the SEC with a 19-page memo titled "The World's Largest Hedge Fund is a Fraud." The SEC investigated and concluded Madoff was clean — repeatedly, across multiple inquiries between 2000 and 2008. Markopolos's subsequent book ("No One Would Listen") and the SEC Office of Inspector General's 2009 internal report (David Kotz) documented a systematic regulatory failure that, on its own structural account, was indistinguishable from regulatory capture. The deeper question — which Markopolos has continued to advance — is whether the same institutional pattern is operating with respect to currently active firms whose business models cannot mathematically produce the returns they report.
Status Deeper file pending. See: Markopolos · "No One Would Listen" (2010); SEC OIG Kotz Report (2009).
Beginning in late 2013 and accelerating through 2014, an unusual cluster of senior banking-sector personnel died of unusual causes during a period of intense regulatory inquiry into LIBOR/FX/SAR-reporting/HSBC-money-laundering activity. Documented cases include William Broeksmit (Deutsche Bank, hanged Jan 2014, days before scheduled regulatory testimony); Gabriel Magee (JPMorgan VP, fell from Canary Wharf rooftop Jan 2014); Ryan Henry Crane (JPMorgan executive director Feb 2014); Edmund Reilly (Midtown Manhattan train Mar 2014); Richard Talley (American Title Services CEO, eight nail-gun wounds, ruled suicide 2014); Kenneth Bellando (JPMorgan banker, 6th-story fall Mar 2014); David Bird (Wall Street Journal commodities reporter who disappeared while writing a book on the OPEC oil cartel manipulations, January 2014, body found 2015). The aggregate cluster spans roughly fifty publicly-documented unusual deaths in the senior banking sector during 2014-2015. The official position of regulators and law enforcement has been that each death is a separately-explicable event. The dissenting position, advanced by financial journalists including Pam Martens (Wall Street On Parade), is that the cluster is statistically anomalous and that the depositions and document productions that several of the deceased were scheduled to produce would have advanced regulatory cases that did not, in fact, advance.
Status Deeper file pending. See: Wall Street On Parade · banker deaths series.
Inslaw, a small Washington DC software company, developed PROMIS (Prosecutors' Management Information System) — a database technology that was, in the 1980s, the most sophisticated case-management and surveillance-fusion software in existence. The Department of Justice contracted with Inslaw, took possession of the software, and then refused to pay, driving Inslaw into bankruptcy. The Bua Report (1993) cleared the DOJ; subsequent investigations by Congressman William Hughes (1992) and a separate federal court (1988) concluded the DOJ had stolen the software through "trickery, fraud and deceit." The deeper claim, advanced by Inslaw founder Bill Hamilton and by investigative journalist Danny Casolaro (cross-ref Vector 02 file 020, who died investigating this nexus), is that the stolen and modified PROMIS software — equipped with a covert backdoor — was then sold by U.S. intelligence services and Edwin Wilson-affiliated cutouts to foreign governments and intelligence agencies, providing the U.S. with a near-universal backdoor into the world's law-enforcement and financial databases for decades. The PROMIS-as-intelligence-asset claim has been documented in House Judiciary Committee inquiries but has never been formally judicially adjudicated. The technological capability described — a single database tool installed in courts, banks, and intelligence services across dozens of countries with covert U.S. backdoor access — is, in retrospect, an obvious precursor to the post-Snowden bulk-collection era.
Status Deeper file pending. See: "The Last Circle" — Cheri Seymour; House Judiciary Cmte Inslaw hearings.
Composite entry covering the structural relationship between the pharmaceutical industry, the FDA's regulatory framework, and the public-health outcomes that the framework produces. The opioid crisis (Purdue Pharma's marketing of OxyContin produced ~800,000+ U.S. overdose deaths between 1999 and 2024 — Sackler family settled federal claims in 2022 with no admission and no individual prosecutions). The Vioxx case (Merck withdrew a drug whose internal documents showed the company knew of cardiovascular risk while marketing the drug to elderly populations; estimated 60,000+ excess deaths). The structural fact: the FDA's prescription-drug-user-fee structure (PDUFA, 1992) means the regulator is funded approximately 50% by the industry it regulates. The "revolving door" between FDA leadership and pharmaceutical-company senior positions is documented across decades. The institutional inability to produce a class of medications priced at the cost of similar drugs in other developed countries — the U.S. pays roughly 2.5x what European single-payer systems pay for the identical compounds — is the visible end of the capture, not its cause. The capture is upstream, in the regulatory framework. Cross-reference Vector 03 for the SSRI/mass-violence intersection; cross-reference Vector 07 for the suppressed-treatments file.
Status Composite entry. See: Senate HELP Committee opioid hearings (Sackler 2020); Marcia Angell · "The Truth About the Drug Companies"; Peter Gøtzsche · "Deadly Medicines and Organised Crime."
Cambridge Analytica, a UK-based political-consulting firm, harvested personal data from approximately 87 million Facebook users without consent and used the data to construct psychographic profiles deployed in political targeting on behalf of multiple national-level campaigns including the 2016 Trump campaign and the Brexit Leave campaign. The disclosure, by whistleblower Christopher Wylie via Carole Cadwalladr's reporting in the Guardian (March 2018), produced Mark Zuckerberg's Senate testimony and the company's eventual dissolution. The deeper file context: the Cambridge Analytica project was the operational extension of UK-based military psychological-operations work conducted by SCL Group, the firm's parent. SCL's documented client base included the UK Ministry of Defence and the U.S. Department of State. The 2016 election-influence operation, in this frame, is not a private-sector commercial activity that crossed an ethical line — it is the deployment of state-developed psyops capability against the populations of allied democracies. Subsequent platforms (TikTok, the post-2020 algorithmic recommendation systems) have similar capability with substantially less public scrutiny. Cross-reference Vector 05 (the broader institutional capability) and Vector 07 (the public-cognition implications).
Status Deeper file pending. See: UK ICO Final Report (2020); Brittany Kaiser · "Targeted"; Cadwalladr Guardian reporting.
Coordinated manipulation of foreign-exchange benchmark rates by traders across Citi, JPM, UBS, Barclays, RBS, BofA. ~$10B in regulatory fines globally; chat-room transcripts ("The Cartel," "The Mafia") establish coordinated rate-fixing across institutions. Compare to LIBOR scandal (file 004) for institutional-pattern continuity.
U.S. Senate Permanent Subcommittee on Investigations (2012) documented HSBC's laundering of nearly $1 billion for the Sinaloa cartel, plus extensive Iran/Sudan/Cuba sanction evasion. $1.9B settlement. No criminal prosecution of any HSBC executive. Then-Attorney General Eric Holder cited "too big to jail" concerns. The institutional message — that systemically important institutions are above the criminal law — is itself the case file.
8,761 documents drawn from the CIA Center for Cyber Intelligence's internal network, disclosing the agency's offensive cyber-tooling: smart-TV mic activation (Weeping Angel), iPhone/Android exploit chains, vehicle-control attack research (relevant to Vector 02 · Hastings), and the UMBRAGE library for false-flag attribution. Joshua Schulte, a former CIA developer, was convicted as the source in 2022. The disclosure remains the most comprehensive single-event exposure of an offensive cyber-weapons program by any intelligence service in modern history.
Composite entry covering: Diebold/Premier Election Solutions touchscreen-machine vulnerabilities documented by HBO's "Hacking Democracy" (2006) and Princeton/Felten engineering analyses; Dominion Voting Systems litigation; the structural problem of "black box" voting in which machine outputs cannot be independently verified without paper ballots. The frame this file is willing to advance: any election held on machines that do not produce a voter-verifiable paper trail is, by basic security engineering, not auditable. Multiple jurisdictions still operate paperless or electronically-tabulated systems.
Composite entry. The original list framed cryptocurrency as a vector. The dossier-level analysis is more mixed: Bitcoin specifically has been a documented escape valve from inflationary fiat regimes for users in Argentina, Venezuela, Lebanon, and Nigeria; the broader cryptocurrency space contains substantial fraud (FTX 2022; Mt. Gox; the long ledger of rug-pulls). The structural question is whether decentralized digital currency is a tool of financial sovereignty or a controlled-opposition opt-out designed to preempt the development of true alternatives. Different cryptocurrencies sit at different points on this spectrum.
The institutional response to the cryptocurrency challenge: government-issued digital currencies that combine the convenience of digital payment with full state surveillance and programmable expiration / use restrictions. China's e-CNY (digital yuan) is the most operationally developed; the EU's digital euro is in pilot; the U.S. has paused active development as of 2025 but the architecture remains in research. The CBDC framework, in its full implementation, eliminates the cash-equivalent privacy of currency entirely and creates the technical capability for the state to freeze, expire, or condition individual purchases at the per-transaction level. The dossier-level question is whether widespread CBDC adoption is compatible with constitutional financial freedoms.
The shift of U.S. industrial-base employment offshore, conducted through trade-agreement frameworks that bundled tariff reductions with investor-state-dispute-settlement (ISDS) provisions enabling foreign corporations to sue host governments for regulatory actions. The 1994 NAFTA, the negotiated-but-rejected TPP (2016), and the 2020 USMCA replacement are the most prominent. The structural effect — measurable in U.S. manufacturing employment loss, opioid-region overlap with deindustrialized communities, and the political instability of the 2010s — is sufficiently documented in academic literature that the policy outcomes are not in serious dispute.
The post-9/11 legislative architecture: USA PATRIOT Act (2001), Authorization for Use of Military Force (2001), Military Commissions Act (2006), NDAA Sections 1021/1022 indefinite-detention provisions (2012), FISA Amendments Act Section 702 (2008, repeatedly reauthorized). Cumulatively, this framework has institutionalized: warrantless surveillance of U.S. persons, indefinite detention without trial of U.S. citizens, military-commission trial of civilian defendants, and the executive-branch targeting of U.S. citizens for kinetic strikes (cross-ref Vector 01 file 012, al-Awlaki). The framework has been substantively expanded but never narrowed in twenty-five years.
The institutional pattern by which senior regulatory officials cycle into senior positions at the firms they were responsible for regulating, and vice versa. Documented across SEC/Wall Street, FDA/Pharma, EPA/Energy, FCC/Telecom, and most acutely in the Defense Department — Pentagon procurement officials moving to Lockheed/Raytheon/General Dynamics, then back to government, in cycles spanning entire careers. The 2017 OpenSecrets analysis documented over 600 senior government officials moving directly to lobbying or industry positions in a single year. The structural effect is regulatory capture by personnel rather than by formal-authority transfer — the regulator and the regulated being staffed by the same class.
The U.S. government has, since the early Cold War period, operated a substantial network of deep underground command, communications, and continuity-of-government facilities — Cheyenne Mountain, Mount Weather, Raven Rock (Site R), the Greenbrier (declassified 1992) — and has invested in deep-tunnel construction technology including the "Rapid Excavation and Tunnel-Boring" research programs. The publicly-acknowledged inventory is substantial; the Phil Schneider claims (Vector 02 file 011) and the broader DUMB-network claims that have circulated for decades extend beyond the publicly acknowledged inventory in ways that have been neither confirmed nor formally rebutted. Cross-reference Vector 02 file 011 (Schneider) for the related personal-account file.
The single observation this file is asking you to retain: across these twenty-two entries, the wealth transfer is not a side effect of institutional dysfunction. It is the institution. The Federal Reserve was designed in 1910 to do what it does. The DoD's $21 trillion in unaccountable transactions is the institution's actual operating mechanism, not a deviation from it. The 2008 bail-outs implemented an implicit guarantee that the major banks have been operating under since at least the 1990s. The pharmaceutical-FDA capture is the regulatory framework as written, not a corruption of it.
The companion files (Vector 02 · Underground Assassinations and Vector 05 · War, Terror & Bombings) are the personnel-and-pretext records of the same institutional pattern. The bankers fall from windows in clusters when the regulatory inquiries get specific. The wars happen on the schedule the wealth transfers require. Read together, the files are not a collection of conspiracies — they are a structural account of how the modern institutional class actually operates. That structural pattern has not been disrupted by any administration of either party in the last fifty years. It will not be disrupted by an administration that has not first understood the file.

Want to dig deeper on any of these files? Nexus has the source documents, transcripts, and the conversational latitude that public AI no longer offers — plus the Accepted Payable to Bearer stamp for the physical side of the same practice.