TheDinarian
News • Business • Investing & Finance
The Society for Worldwide Interbank Financial Telecommunication (Swift)
What is it actually?
November 22, 2023
post photo preview

This is a great amount of information and history regarding S.W.I.F.T, and sums up why THEY are moving to the ISO standards worldwide. 

Knowledge Is Power ~D

The Society for Worldwide Interbank Financial Telecommunication (Swift), legally S.W.I.F.T. SC, is a Belgian cooperative society providing services related to the execution of financial transactions and payments between certain banks worldwide. Its principal function is to serve as the main messaging network through which international payments are initiated.[2] It also sells software and services to financial institutions, mostly for use on its proprietary "SWIFTNet", and assigns ISO 9362 Business Identifier Codes (BICs), popularly known as "Swift codes".

The Swift messaging network is a component of the global payments system.[3] Swift acts as a carrier of the "messages containing the payment instructions between financial institutions involved in a transaction".[4][5] However, the organisation does not manage accounts on behalf of individuals or financial institutions, and it does not hold funds from third parties.[6] It also does not perform clearing or settlement functions.[7][5] After a payment has been initiated, it must be settled through a payment system, such as TARGET2 in Europe.[8] In the context of cross-border transactions, this step often takes place through correspondent banking accounts that financial institutions have with each other.[4]

As of 2018, around half of all high-value cross-border payments worldwide used the Swift network,[9] and in 2015, Swift linked more than 11,000 financial institutions in over 200 countries and territories, who were exchanging an average of over 32 million messages per day (compared to an average of 2.4 million daily messages in 1995).[10]

Though widely utilised, Swift has been criticised for its inefficiency. In 2018, the London-based Financial Times noted that transfers frequently "pass through multiple banks before reaching their final destination, making them time-consuming, costly and lacking transparency on how much money will arrive at the other end".[9] Swift has since introduced an improved service called "Global Payments Innovation" (GPI), claiming it was adopted by 165 banks and was completing half its payments within 30 minutes.[9] The new standard which included Swift Go was supposed to be utilised in receiving and transferring low-value international payments. One of the significant changes was the transaction amount, which would not differ from start to the end. However, as of 2023, uptake was mixed. For instance, Alisherov Eraj, Alif Bank Treasury Department Swift Transfers & Banking Relationship Expert in the Republic of Tajikistan, describes that the leading cause for the late Swift Go adoption in Tajikistan was the Core Banking System itself. To connect to Swift Go, he adds, banking system interfaces needed to be upgraded and integrate with their software to be fully compatible, this hindered many banks from adopting the technology earlier.

As a cooperative society under Belgian law, Swift is owned by its member financial institutions. It is headquartered in La Hulpe, Belgium, near Brussels; its main building was designed by Ricardo Bofill Taller de Arquitectura and completed in 1989.[11] The chairman of Swift is Graeme Munro of United Kingdom,[12] and its CEO is Javier Pérez-Tasso of Spain.[13] Swift hosts an annual conference, called Sibos, specifically aimed at the financial services industry.[14]

History[edit]

SWIFT was founded in Brussels on 3 May 1973 under the leadership of its inaugural Swedish CEO, Carl Reuterskiöld (1973–1989), a Wallenberg-associate, and was supported by 239 banks in 15 countries.[15] Before its establishment, international financial transactions were communicated over Telex, a public system involving manual writing and reading of messages.[16] It was set up out of fear of what might happen if a single private and fully American entity controlled global financial flows – which before was First National City Bank (FNCB) of New York – later Citibank. In response to FNCB's protocol, FNCB's competitors in the US and Europe pushed an alternative "messaging system that could replace the public providers and speed up the payment process".[17] SWIFT started to establish common standards for financial transactions and a shared data processing system and worldwide communications network designed by Logica and developed by the Burroughs Corporation.[18] Fundamental operating procedures and rules for liability were established in 1975, and the first message was sent in 1977. SWIFT's first international (non-European) operations centre was inaugurated by Governor John N. Dalton of Virginia in 1979.[19]

Standards[edit]

SWIFT has become the industry standard for syntax in financial messages. Messages formatted to SWIFT standards can be read and processed by many well-known financial processing systems, whether or not the message travelled over the SWIFT network. SWIFT cooperates with international organizations for defining standards for message format and content. SWIFT is also Registration authority (RA) for the following ISO standards: [20]

  • ISO 9362: 1994 Banking – Banking telecommunication messages – Bank identifier codes
  • ISO 10383: 2003 Securities and related financial instruments – Codes for exchanges and market identification (MIC)
  • ISO 13616: 2003 IBAN Registry
  • ISO 15022: 1999 Securities – Scheme for messages (Data Field Dictionary) (replaces ISO 7775)
  • ISO 20022-1: 2004 and ISO 20022-2:2007 Financial services – Universal Financial Industry message scheme

In RFC 3615 urn:swift: was defined as Uniform Resource Names (URNs) for SWIFT FIN.[21]

Operations centres[edit]

The SWIFT secure messaging network is run from three data centres, located in the United States, the Netherlands, and Switzerland. These centres share information in near real-time. In case of a failure in one of the data centres, another is able to handle the traffic of the complete network(Sound familiar? "Nodes"). SWIFT uses submarine communications cables to transmit its data.[22]

Shortly after opening its third data centre in Switzerland in 2009,[23] SWIFT introduced new distributed architecture with two messaging zones, European and Trans-Atlantic, so data from European SWIFT members no longer mirrored the U.S. data centre.[24] European zone messages are stored in the Netherlands and in part of the Swiss operating centre; Trans-Atlantic zone messages are stored in the United States and in another part of the Swiss operating centre that is segregated from the European zone messages. Countries outside of Europe were by default allocated to the Trans-Atlantic zone, but could choose to have their messages stored in the European zone.

Data centres
SNSWIFT data centresType
1ZoeterwoudeNetherlandsOPC (Operating Centre)
2Culpeper, VirginiaUnited StatesOPC (Operating Centre)
3DiessenhofenSwitzerland[25]OPC (Operating Centre)
4Hong KongCommand and control

 

SWIFTNet network

SWIFT moved to its current IP network infrastructure, known as SWIFTNet, from 2001 to 2005,[26] providing a total replacement of the previous X.25 infrastructure. The process involved the development of new protocols that facilitate efficient messaging, using existing and new message standards. The adopted technology chosen to develop the protocols was XML, where it now provides a wrapper around all messages legacy or contemporary. The communication protocols can be broken down into:

InterAct

  • SWIFTNet InterAct Realtime
  • SWIFTNet InterAct Store and Forward

FileAct

  • SWIFTNet FileAct Realtime
  • SWIFTNet FileAct Store and Forward

Browse

  • SWIFTNet Browse

 

Architecture

SWIFT provides a centralized store-and-forward mechanism, with some transaction management. For bank A to send a message to bank B with a copy or authorization involving institution C, it formats the message according to standards and securely sends it to SWIFT. SWIFT guarantees its secure and reliable delivery to B after the appropriate action by C. SWIFT guarantees are based primarily on high redundancy of hardware, software, and people.

 

SWIFTNet Phase 2

During 2007 and 2008, the entire SWIFT network migrated its infrastructure to a new protocol called SWIFTNet Phase 2. The main difference between Phase 2 and the former arrangement is that Phase 2 requires banks connecting to the network to use a Relationship Management Application (RMA) instead of the former bilateral key exchange (BKE) system. According to SWIFT's public information database on the subject, RMA software should eventually prove more secure and easier to keep up-to-date; however, converting to the RMA system meant that thousands of banks around the world had to update their international payments systems to comply with the new standards. RMA completely replaced BKE on 1 January 2009.

 

Products and interfaces

SWIFT means several things in the financial world:

  1. secure network for transmitting messages between financial institutions;
  2. a set of syntax standards for financial messages (for transmission over SWIFTNet or any other network)
  3. a set of connection software and services allowing financial institutions to transmit messages over SWIFT network.

Under 3 above, SWIFT provides turn-key solutions for members, consisting of linkage clients to facilitate connectivity to the SWIFT network and CBTs or "computer based terminals" which members use to manage the delivery and receipt of their messages. Some of the more well-known interfaces and CBTs provided to their members are:

  • SWIFTNet Link (SNL) software which is installed on the SWIFT customer's site and opens a connection to SWIFTNet. Other applications can only communicate with SWIFTNet through the SNL.
  • Alliance Gateway (SAG) software with interfaces (e.g., RAHA = Remote Access Host Adapter), allowing other software products to use the SNL to connect to SWIFTNet
  • Alliance WebStation (SAB) desktop interface for SWIFT Alliance Gateway with several usage options:
    1. administrative access to the SAG
    2. direct connection SWIFTNet by the SAG, to administrate SWIFT Certificates
    3. so-called Browse connection to SWIFTNet (also by SAG) to use additional services, for example Target2
  • Alliance Access (SAA) and Alliance Messaging Hub (AMH) are the main messaging software applications by SWIFT, which allow message creation for FIN messages, routing and monitoring for FIN and MX messages. The main interfaces are FTA (files transfer automated, not FTP) and MQSA, a WebSphere MQ interface.
  • The Alliance Workstation (SAW) is the desktop software for administration, monitoring and FIN message creation. Since Alliance Access is not yet capable of creating MX messages, Alliance Messenger (SAM) has to be used for this purpose.
  • Alliance Web Platform (SWP) as new thin-client desktop interface provided as an alternative to existing Alliance WebStation, Alliance Workstation (soon)[when?] and Alliance Messenger.
  • Alliance Integrator built on Oracle's Java Caps which enables customer's back office applications to connect to Alliance Access or Alliance Entry.
  • Alliance Lite2 is a secure and reliable, cloud-based way to connect to the SWIFT network which is a light version of Alliance Access specifically targeting customers with low volume of traffic.

 

Services

There are four key areas that SWIFT services fall under in the financial marketplace: securitiestreasury & derivatives, trade services. and payments-and-cash management.

Securities

  • SWIFTNet FIX (obsolete)
  • SWIFTNet Data Distribution
  • SWIFTNet Funds
  • SWIFTNet Accord for Securities (end of life October 2017)[27]

Treasury and derivatives

  • SWIFTNet Accord for Treasury (end of life October 2017)[27]
  • SWIFTNet Affirmations
  • SWIFTNet CLS Third Party Service

Cash management

  • SWIFTNet Bulk Payments
  • SWIFTNet Cash Reporting
  • SWIFTNet Exceptions and Investigations

Trade services

 

SWIFTREF

Swift Ref, the global payment reference data utility, is SWIFT's unique reference data service. Swift Ref sources data direct from data originators, including central banks, code issuers and banks making it easy for issuers and originators to maintain data regularly and thoroughly. SWIFTRef constantly validates and cross-checks data across the different data sets.[28]

SWIFTNet Mail[edit]

SWIFT offers a secure person-to-person messaging service, SWIFTNet Mail, which went live on 16 May 2007.[29] SWIFT clients can configure their existing email infrastructure to pass email messages through the highly secure and reliable SWIFTNet network instead of the open Internet. SWIFTNet Mail is intended for the secure transfer of sensitive business documents, such as invoices, contracts and signatories, and is designed to replace existing telex and courier services, as well as the transmission of security-sensitive data over the open Internet. Seven financial institutions, including HSBCFirstRand BankClearstreamDnB NORNedbank, and Standard Bank of South Africa, as well as SWIFT piloted the service.[30]

 

U.S. government involvement

Terrorist Finance Tracking Program[edit]

A series of articles published on 23 June 2006 in The New York TimesThe Wall Street Journal, and the Los Angeles Times revealed a program, named the Terrorist Finance Tracking Program, which the US Treasury DepartmentCentral Intelligence Agency (CIA), and other United States governmental agencies initiated after the 11 September attacks to gain access to the SWIFT transaction database.[31]

After the publication of these articles, SWIFT quickly came under pressure for compromising the data privacy of its customers by allowing governments to gain access to sensitive personal information. In September 2006, the Belgian government declared that these SWIFT dealings with American governmental authorities were a breach of Belgian and European privacy laws.

In response, and to satisfy members' concerns about privacy, SWIFT began a process of improving its architecture by implementing a distributed architecture with a two-zone model for storing messages (see Operations centres).

Concurrently, the European Union negotiated an agreement with the United States government to permit the transfer of intra-EU SWIFT transaction information to the United States under certain circumstances. Because of concerns about its potential contents, the European Parliament adopted a position statement in September 2009, demanding to see the full text of the agreement and asking that it be fully compliant with EU privacy legislation, with oversight mechanisms emplaced to ensure that all data requests were handled appropriately.[32] An interim agreement was signed without European Parliamentary approval by the European Council on 30 November 2009,[33] the day before the Lisbon Treatywhich would have prohibited such an agreement from being signed under the terms of the codecision procedure—formally came into effect. While the interim agreement was scheduled to come into effect on 1 January 2010, the text of the agreement was classified as "EU Restricted" until translations could be provided in all EU languages and published on 25 January 2010.

On 11 February 2010, the European Parliament decided to reject the interim agreement between the EU and the US by 378 to 196 votes.[34][35] One week earlier, the parliament's civil liberties committee had already rejected the deal, citing legal reservations.[36]

In March 2011, it was reported that two mechanisms of data protection had failedEUROPOL released a report complaining that requests for information from the US had been too vague (making it impossible to make judgments on validity)[37] and that the guaranteed right for European citizens to know whether their information had been accessed by US authorities had not been put into practice.[37]

 

Monitoring by the NSA

Der Spiegel reported in September 2013 that the National Security Agency (NSA) widely monitors banking transactions via SWIFT, as well as credit card transactions.[38] The NSA intercepted and retained data from the SWIFT network used by thousands of banks to securely send transaction information. SWIFT was named as a "target", according to documents leaked by Edward Snowden. The documents revealed that the NSA spied on SWIFT using a variety of methods, including reading "SWIFT printer traffic from numerous banks".[38] In April 2017, a group known as the Shadow Brokers released files allegedly from the NSA which indicate that the agency monitored financial transactions made through SWIFT.[39][40]

 

Use in sanctions:

 

Belarus

The European Union issued the first set of sanctions against Belarus - the first was introduced on 27 February 2022, which banned certain categories of Belarusian items in the EU, including timber, steel, mineral fuels and tobacco.[41] After the Lithuanian prime minister proposed disconnecting Belarus from SWIFT,[42] the European Union, which does not recognise Lukashenko as the legitimate President of Belarus, started to plan an extension of the sanctions already issued against Russian entities and top officials to its ally.[43]

 

Iran

In January 2012, the advocacy group United Against Nuclear Iran (UANI) implemented a campaign calling on SWIFT to end all relations with Iran's banking system, including the Central Bank of Iran. UANI asserted that Iran's membership in SWIFT violated US and EU financial sanctions against Iran as well as SWIFT's own corporate rules.[44]

Consequently, in February 2012, the U.S. Senate Banking Committee unanimously approved sanctions against SWIFT aimed at pressuring it to terminate its ties with blacklisted Iranian banks. Expelling Iranian banks from SWIFT would potentially deny Iran access to billions of dollars in revenue using SWIFT but not from using IVTSMark Wallace, president of UANI, praised the Senate Banking Committee.[45]

Initially SWIFT denied that it was acting illegally,[45] but later[when?] said that "it is working with U.S. and European governments to address their concerns that its financial services are being used by Iran to avoid sanctions and conduct illicit business".[46] Targeted banks would be—amongst others—Saderat Bank of IranBank MellatPost Bank of Iran and Sepah Bank.[47] On 17 March 2012, following agreement two days earlier between all 27 member states of the Council of the European Union and the Council's subsequent ruling, SWIFT disconnected all Iranian banks that had been identified as institutions in breach of current EU sanctions from its international network and warned that even more Iranian financial institutions could be disconnected from the network.

In February 2016, most Iranian banks reconnected to the network following the lift of sanctions due to the Joint Comprehensive Plan of Action.[48]

 

Russia

Similarly, in August 2014 the UK planned to press the EU to block Russian use of SWIFT as a sanction due to Russian military intervention in Ukraine.[49] However, SWIFT refused to do so.[50] SPFS, a Russian alternative to SWIFT, was developed by the Central Bank of Russia as a backup measure.[51]

During the prelude to the 2022 Russian invasion of Ukraine, the United States developed preliminary possible sanctions against Russia, but excluded banning Russia from SWIFT.[52] Following the 2022 Russian invasion of Ukraine, the foreign ministers of the Baltic states Lithuania, Latvia, and Estonia called for Russia to be cut off from SWIFT. However, other EU member states were reluctant, both because European lenders held most of the nearly $30 billion in foreign banks' exposure to Russia and because Russia had developed the SPFS alternative.[53] The European Union, United Kingdom, Canada, and the United States finally agreed to remove few Russian banks from the SWIFT messaging system in response to the 2022 Russian invasion of Ukraine; the governments of France, Germany, Italy and Japan individually released statements alongside the EU.[54][5]

On 20 March 2023, the Russian Federation banned the use of SWIFT.[55][56]

 

Israel

In 2014, SWIFT rejected calls from pro-Palestinian activists to revoke Israeli banks' access to its network owing to the Israeli occupation of Palestinian territory.[57]

 

Competitors

Alternatives to the SWIFT system include:

  1. CIPS: sponsored by China, for RMB related deals. 1467 financial institutions in 111 countries and regions have connected to the system. The actual business covers more than 4,200 banking institutions in 182 countries and regions around the world.[58][59][60]
  2. SFMS: sponsored by India
  3. SPFS: developed by the Russian Federation[61]
  4. INSTEX: sponsored by the European Union, limited to non-USD transactions for trade with Iran, largely unused and ineffective[62][63]

 

Security

In 2016 an $81 million theft from the Bangladesh central bank via its account at the New York Federal Reserve Bank was traced to hacker penetration of SWIFT's Alliance Access software, according to a New York Times report. It was not the first such attempt, the society acknowledged, and the security of the transfer system was undergoing new examination accordingly.[64] Soon after the reports of the theft from the Bangladesh central bank, a second, apparently related, attack was reported to have occurred on a commercial bank in Vietnam.[65][66]

Both attacks involved malware written to both issue unauthorized SWIFT messages and to conceal that the messages had been sent. After the malware sent the SWIFT messages that stole the funds, it deleted the database record of the transfers then took further steps to prevent confirmation messages from revealing the theft. In the Bangladeshi case, the confirmation messages would have appeared on a paper report; the malware altered the paper reports when they were sent to the printer. In the second case, the bank used a PDF report; the malware altered the PDF viewer to hide the transfers.[65]

In May 2016, Banco del Austro (BDA) in Ecuador sued Wells Fargo after Wells Fargo honoured $12 million in fund transfer requests that had been placed by thieves.[66] In this case, the thieves sent SWIFT messages that resembled recently cancelled transfer requests from BDA, with slightly altered amounts; the reports do not detail how the thieves gained access to send the SWIFT messages. BDA asserts that Wells Fargo should have detected the suspicious SWIFT messages, which were placed outside of normal BDA working hours and were of an unusual size. Wells Fargo claims that BDA is responsible for the loss, as the thieves gained access to the legitimate SWIFT credentials of a BDA employee and sent fully authenticated SWIFT messages.[66]

In the first half of 2016, an anonymous Ukrainian bank and others—even "dozens" that are not being made public—were variously reported to have been "compromised" through the SWIFT network and to have lost money.[67]

In March 2022, Swiss newspaper Neue Zürcher Zeitung reported about the increased security precautions by the State Police of Thurgau at the SWIFT data centre in Diessenhofen. After most of the Russian banks have been excluded from the private payment system, the risk of sabotage was considered higher. Inhabitants of the town described the large complex as a "fortress" or "prison" where frequent security checks of the fenced property are conducted.[68]

Link

community logo
Join the TheDinarian Community
To read more articles like this, sign up and join my community today
0
What else you may like…
Videos
Podcasts
Posts
Articles
Denelle Dixon (Stellar CEO) On Bloomburg 🚀

'Everyone, including Mastercard and Visa, is looking at how this technology can make finance easier for their consumers and their business. I don't think there is going to be a loser, but I do think there will be shake-ups. And ultimately, the consumer is going to win.' - SDF CEO @DenelleDixon on @BloombergTV

00:05:29
We are minutes away from passing the GENIUS Act.
00:01:19
Brad Garlinghouse On Banking & The Future Of Money!
00:00:38
👉 Coinbase just launched an AI agent for Crypto Trading

Custom AI assistants that print money in your sleep? 🔜

The future of Crypto x AI is about to go crazy.

👉 Here’s what you need to know:

💠 'Based Agent' enables creation of custom AI agents
💠 Users set up personalized agents in < 3 minutes
💠 Equipped w/ crypto wallet and on-chain functions
💠 Capable of completing trades, swaps, and staking
💠 Integrates with Coinbase’s SDK, OpenAI, & Replit

👉 What this means for the future of Crypto:

1. Open Access: Democratized access to advanced trading
2. Automated Txns: Complex trades + streamlined on-chain activity
3. AI Dominance: Est ~80% of crypto 👉txns done by AI agents by 2025

🚨 I personally wouldn't bet against Brian Armstrong and Jesse Pollak.

👉 Coinbase just launched an AI agent for Crypto Trading
Nothing to see here.. 👀

Israel's Mossad spy agency was hacked just days before Netanyahu launched strikes on Iranian targets. The files uncovered? Nothing short of apocalyptic.

Among them: 👉 blueprints for cyber warfare, targeted assassinations, blackmail material, and even the unthinkable - the Samson Option - Israel's doomsday doctrine to blow up the entire world with a nuclear holocaust if their own survival is ever threatened.

Op: https://x.com/BarronTNews_/status/1935871791169159188?s=19

🚨 XRP Ledger Welcomes XAO DAO for On-Chain Governance 🚨

The XRP Ledger has integrated XAO DAO, introducing a new era of on-chain governance for the network. This move aims to enhance community-driven decision-making and transparency by allowing stakeholders to participate directly in protocol upgrades and ecosystem proposals through decentralized, blockchain-based voting mechanisms.

Key Highlights:

  • On-Chain Governance:
    XAO DAO brings a decentralized governance framework to the XRP Ledger, enabling holders and ecosystem participants to vote on proposals, upgrades, and other critical decisions in a transparent and secure manner.

  • Community Empowerment:
    The integration is designed to give the XRP community a more active role in shaping the network’s future, fostering greater collaboration and innovation among developers, validators, and users.

  • Ecosystem Growth:
    This development is expected to drive further adoption of the XRP Ledger, attract new projects, and strengthen the network’s position as a leading blockchain for ...

Persisters, Liquid Staking $XPRT is now live on Persistence DEX.

With stkXPRT built into the DEX, you can:

  • Liquid stake XPRT directly on 👉 app.persistence.one/stake

  • Superfluid LP into the stkXPRT/XPRT pool

Best part? It takes less than a minute

Here’s how you can do it 📒👇

https://x.com/PersistenceOne/status/1934954313480065426

post photo preview
🎬Proof the Deep State Planned This War for Years🎬
Nation First outlines how the Israeli attack on Iran was planned by the Deep State and the Military Industrial Complex over 15 years ago.

Prepare to have your mind blown

~Namasté 🙏 Crypto Michael ⚡ The Dinarian

Dear friend,

What just happened in Iran wasn’t a surprise attack. It wasn’t a last-minute decision. It wasn’t even Israel acting alone.

It was a war plan written years ago — by men in suits, sitting in think tanks in Washington and New York. And yesterday, that plan was finally put into action.

Here’s the truth they don’t want you to know: this war was cooked up long before Trump ever became President — and it was designed to happen exactly this way.

Let’s start with what just happened.

Israel launched a massive, unexpected strike on Iran. They hit nuclear facilities. They killed military generals. They struck deep inside Iranian territory — and now the whole region is on edge, ready to explode into full-blown war.

The media is acting shocked. But I’m not. You shouldn’t be either.

Why?

Because we have the documents. They told us this was coming. Years ago.

Exhibit A: The Brookings Institution.

The Brooking Institution is a fancy name for what’s basically a war-planning factory dressed up as a research centre. Back in 2009, Brookings published a report called Which Path to Persia?

It laid out exactly how to get the U.S. into a war with Iran — without looking like the bad guy.

Here’s the sickest part:

“The United States would encourage — and perhaps even assist — the Israelis in conducting the strikes… in the expectation that both international criticism and Iranian retaliation would be deflected away from the United States and onto Israel.”

Let that sink in.

They literally suggested using Israel to start the war, so America could stand back and say, “Wasn’t us!”

They even titled a chapter of this report: “Leave It to Bibi” — naming Netanyahu as the guy to light the match.

Exhibit B: The Council on Foreign Relations (CFR).

The Council on Foreign Relations is an another Deep State operation. Also in 2009, CFR published a “contingency memothat laid out the whole military plan for an Israeli strike on Iran — step by step.

  • What routes the jets would fly (over Jordan and Iraq).

  • What bombs they’d use (the biggest bunker-busters in the U.S. arsenal).

  • Which Iranian sites to hit (Natanz, Arak, Esfahan).

  • And how Iran might respond (missiles, drones, threats to U.S. bases).

It’s like they had a time machine. Because those exact strikes just happened following the routes, likely using the bombs and hitting the sites that the CFR outlined.

Exhibit C: The Plot to Attack Iran by Dan Kovalik.

This one really blows the lid off.

US human rights lawyer and journalist Dan Kovalik, in his book The Plot to Attack Iran: How the CIA and the Deep State Have Conspired to Vilify Iran, shows how the CIA and Israel’s Mossad have been working together for decades — not just watching Iran, but actively sabotaging it. Killing scientists. Running cyberattacks. Feeding lies to the media to make Iran look like it’s always “six months away” from building a nuke.

He even reveals how they discussed false flag attacks — faking an Iranian strike to justify going to war. That’s not a conspiracy theory. That’s documented strategy.

And here’s where President Trump comes in.

Unlike the warmongers who wrote these plans, Trump wasn’t looking to bomb Iran. He wanted to talk. Negotiate. Make a deal — like he did with North Korea.

In fact, peace talks with Iran were just days away.

But someone didn’t want peace. Someone wanted war.

So Israel went in — just like the Brookings script said — and lit the fuse.

Trump didn’t authorise it. He didn’t want it. But they gazumped him. They went around him. And now, the peace he was trying to build has been blown to bits.

This was never about Iran being a threat. It was about keeping the war machine fed.

Think tanks, defence contractors, foreign lobbies — they don’t profit from peace. They thrive on tension. On fear. On war.

And now, thanks to them, the world’s one step closer to the edge.

If you’ve never trusted the mainstream media, you’re right not to.

If you’ve ever suspected there’s a shadowy agenda behind every war, you’re not paranoid.

You’re paying attention.

Because the documents are real. The war was planned. And the bombs are falling — right on schedule.

Pray for Iran’s civilians.

Pray for the Israelis caught in the crossfire.

Pray for a President who still wants peace.

And pray that we wake up before it’s too late.

Because the war has started.

But the truth has just begun to spread.

Until next time, God bless you, your family and nation.

Take care,

George Christensen

Source:

George Christensen is a former Australian politician, a Christian, freedom lover, conservative, blogger, podcaster, journalist and theologian. He has been feted by the Epoch Times as a “champion of human rights” and his writings have been praised by Infowars’ Alex Jones as “excellent and informative”.

George believes Nation First will be an essential part of the ongoing fight for freedom:

The time is now for every proud patriot to step to the fore and fight for our freedom, sovereignty and way of life. Information is a key tool in any battle and the Nation First newsletter will be a valuable tool in the battle for the future of the West.

— George Christensen.

Find more about George at his www.georgechristensen.com.au website.

🙏 Donations Accepted 🙏

If you find value in my content, consider showing your support via:

💳 PayPal: 
1) Simply scan the QR code below 📲
2) or visit https://www.paypal.me/thedinarian

🔗 Crypto – Support via Coinbase Wallet to: [email protected]

Or Buy me a coffee: https://buymeacoffee.com/thedinarian

Your generosity keeps this mission alive, for all! Namasté 🙏 The Dinarian

 

Read full Article
post photo preview
The Possible Impact Of USDC On The XRP Ledger And RLUSD
Key Points
  • It seems likely that USDC on the XRP Ledger (XRPL) boosts liquidity, benefiting XRP, though some see it as competition for RLUSD.
  • Research suggests both stablecoins can coexist, enhancing the XRPL ecosystem.
  • The evidence leans toward increased network activity being good for XRP, despite potential competition.

The recent launch of USDC on the XRP Ledger has sparked discussions about its impact on the ecosystem, particularly in relation to RLUSD, Ripple's own stablecoin. This response explores whether this development is more about competition for RLUSD or if it enhances liquidity on the XRPL, ultimately benefiting XRP.
 

Impact on Liquidity and XRP

The introduction of USDC, a major stablecoin with a $61 billion market cap, likely increases liquidity on the XRPL by attracting more users, developers, and institutions. This boost can enhance DeFi applications and enterprise payments, potentially driving demand for XRP, the native token used for transaction fees. While some may view it as competition for RLUSD, the overall effect seems positive for the XRPL's growth.
 

Competition vs. Coexistence with RLUSD

USDC and RLUSD cater to different needs: USDC appeals to those valuing regulatory compliance, while RLUSD, backed by Ripple, may attract users preferring ecosystem integration. Research suggests both can coexist, increasing options and fostering innovation, rather than purely competing.
 

Detailed Analysis of USDC on XRPL and Its Implications

The integration of USDC on the XRP Ledger (XRPL), announced on June 12, 2025, by Circle, has significant implications for the ecosystem, particularly in relation to RLUSD, Ripple's stablecoin launched in 2024. This section provides a comprehensive analysis, exploring whether this development is more about competition for RLUSD or if it enhances liquidity on the XRPL, ultimately benefiting XRP.
 

Understanding RLUSD and Its Role

RLUSD, Ripple's stablecoin, received approval from the New York Department of Financial Services (NYDFS) in 2024 and is designed to be fully backed by cash and cash equivalents, ensuring stability. It is available on both the Ethereum and XRP Ledger blockchains, aiming to enhance liquidity, reduce volatility, and serve cross-border payments. With a current market cap of $413 million, RLUSD is smaller than USDC's $61 billion but has regulatory credibility, particularly appealing to institutions.
 

Impact of USDC on the XRPL

The launch of USDC on the XRPL is a significant development, given its status as the second-largest stablecoin by market cap.
 
Key impacts include:
  • Liquidity Boost: USDC's integration can attract more users, developers, and institutions, increasing overall liquidity. This is crucial for DeFi applications, as Circle's announcement emphasizes its use in liquidity provisioning for token pairs and FX flows.
  • Increased Utility: USDC enhances the XRPL's utility for enterprise payments, financial infrastructure, and DeFi, potentially making it more attractive for global money movement and transparent settlements.
  • Regulatory and Institutional Appeal: As a regulated stablecoin issued by Circle, USDC can bring institutional users to the XRPL, aligning with Ripple's goals for regulated financial activities.
  • Network Growth: Supporting a widely recognized stablecoin like USDC on 22 blockchains, including the XRPL, increases the network's visibility and adoption, potentially driving more activity.

Competition vs. Complementarity with RLUSD

While USDC's launch could be seen as competition for RLUSD, the evidence suggests a more nuanced relationship:
  • Competition: Both are stablecoins on the XRPL, and USDC's larger market presence ($61 billion vs. RLUSD's $413 million) might attract users and developers away from RLUSD. However, competition can drive innovation, such as lower fees or better services, benefiting the ecosystem
  • Complementarity: Different stablecoins cater to different needs. USDC appeals to users valuing regulatory compliance and widespread adoption across multiple blockchains, while RLUSD, backed by Ripple, may attract those preferring ecosystem integration and regulatory approval from NYDFS. The XRPL can benefit from having multiple options, increasing liquidity and fostering a diverse ecosystem.
  • Coexistence Benefits: Research suggests that having multiple stablecoins enhances liquidity and provides users with more choices, potentially leading to higher network activity. For example, institutions might use USDC for global payments and RLUSD for specific XRPL-integrated applications, creating a symbiotic relationships.

Impact on XRP

The introduction of USDC, alongside RLUSD, is likely beneficial for XRP, the native token of the XRPL, for several reasons:
  • Increased Liquidity and Activity: Higher liquidity on the XRPL, driven by both stablecoins, can increase transaction volumes. XRP is used for transaction fees, with some fees burned, potentially reducing supply over time and increasing demand.
  • DeFi and Enterprise Use Cases: Both USDC and RLUSD enhance DeFi and enterprise applications, such as liquidity pools and cross-border payments, which can drive demand for XRP as a settlement token.
  • Network Growth: A more liquid and active XRPL is more attractive to developers and users, potentially leading to long-term growth for XRP, as increased utility can drive its value.
Expert analyses, such as those from u.today and ledgerinsights.com, suggest the launch is a "massive boost" for liquidity and adoption, with RLUSD also playing a significant role.
 

Comparative Analysis: USDC vs. RLUSD

To further illustrate, consider the following table comparing key attributes:
 
Given the evidence, it is more accurate to view the introduction of USDC on the XRPL as beneficial for liquidity, which is ultimately good for XRP, rather than solely as competition for RLUSD. The XRPL benefits from increased options, with both stablecoins enhancing liquidity, utility, and network growth. While some competition exists, the overall impact is positive, fostering a robust ecosystem that can drive demand for XRP. This conclusion aligns with expert analyses and community discussions, acknowledging the complexity of the stablecoin market within the XRPL.
 

🙏 Donations Accepted 🙏

If you find value in my content, consider showing your support via:

💳 PayPal: 
1) Simply scan the QR code below 📲
2) or visit https://www.paypal.me/thedinarian

🔗 Crypto – Support via Coinbase Wallet to: [email protected]

Or Buy me a coffee: https://buymeacoffee.com/thedinarian

Your generosity keeps this mission alive, for all! Namasté 🙏 The Dinarian

Read full Article
post photo preview
Die Glocke: The Nazi Bell That Bent Time, Vanished, and Was Never Seen Again

In the darkest corners of the Third Reich, behind the veil of conventional warfare, Nazi scientists were racing toward something that defied explanation. They weren’t just building rockets or jet planes, they were chasing a technology that pushed the boundaries of physics itself. One of the most mysterious and controversial projects to emerge from this era was called Die Glocke, German for "The Bell." But this wasn’t a bomb. It wasn’t even a weapon in the traditional sense. It was something else entirely.

What Was Die Glocke?

Die Glocke was reportedly a bell-shaped device, approximately 9 feet in diameter and 12 to 15 feet tall, encased in a thick ceramic-like shell. Internally, it housed two counter-rotating cylinders filled with a strange, metallic, violet-colored liquid referred to as Xerum 525, a highly radioactive and unknown compound. According to Polish researcher Igor Witkowski, who first brought the story to global attention in his book "The Truth About the Wunderwaffe," Die Glocke emitted intense electromagnetic radiation and killed many of the scientists who worked on it.

But the real claim that set the world alight? That it had the potential to manipulate gravity, disrupt time, and possibly even pierce dimensional barriers. Some descriptions sound like science fiction. Others sound eerily like technologies rumored in today’s black projects or even UAP propulsion systems.

Where Was It Built?

Most reports place the Bell project deep beneath the Wenceslas Mine in Ludwikowice, Poland. There, nestled in a reinforced underground facility known as Der Riese (The Giant), the Nazis hid many of their advanced weapons programs. Adjacent to the suspected test site is a strange concrete structure referred to today as The Henge, a ring of reinforced pillars that some researchers believe was part of an anti-gravity testing rig or cooling tower for Die Glocke. To this day, its true purpose remains unexplained.

Hans Kammler: The Man Who Vanished SS General Hans Kammler oversaw Nazi Germany’s most advanced technological programs, including the V-2 rocket and rumored exotic weapons like Die Glocke. He was a man with top-tier clearance and deep ties to the Reich’s secret projects. When the war ended, Kammler disappeared. No confirmed death, no trial, or capture. He was never heard from again. Some believe he brokered his safety with U.S. forces during Operation Paperclip, offering knowledge of Die Glocke in exchange for asylum. Others suggest he escaped to South America with the Bell. Whatever the truth, the timing of his disappearance and the vanishing of Die Glocke are hard to ignore.

Did It Actually Work?

That’s the million-dollar question. Accounts claim that when operational, Die Glocke emitted powerful gravitational and temporal anomalies. Test subjects reportedly experienced cellular breakdown, time displacement, and hallucinations. Some witnesses alleged that the device caused freezing of time, or at least a distortion in how time passed in its proximity. Others suggested the Bell may have even "jumped dimensions" or teleported entirely. Skeptics say it was nothing more than a high-energy centrifuge with tragic side effects. Still, CIA documents later referenced Die Glocke, and even modern physicists admit that some of the descriptions line up with theoretical frameworks for gravity manipulation and field-based propulsion.

Connection to Modern Black Projects

If Die Glocke truly existed and worked, it would make sense that it never saw public light. Instead, it would’ve been buried, repurposed, and integrated into deep black programs. Anti-gravity research, electromagnetic propulsion, even certain descriptions of UAPs, all have eerie parallels to the Bell’s characteristics. Was Die Glocke an early testbed for what would later become known as field propulsion or even quantum mirroring? Or was it a dangerous dead-end in the pursuit of Nazi technological superiority?

Last Thoughts To Summarize

Die Glocke remains one of the most tantalizing mysteries of WWII, part weapon, part experiment, part occult machine. A device said to manipulate gravity and time. A Nazi general who vanished without a trace. A concrete ring still standing in the Polish forest. Whether it was a real breakthrough in exotic physics or an elaborate myth built on whispers, Die Glocke has become a symbol, of lost knowledge, buried technology, and the thin line between science and the supernatural. If it was real, it’s likely not lost, just... relocated!

Source

🙏 Donations Accepted 🙏

If you find value in my content, consider showing your support via:

💳 PayPal: 
1) Simply scan the QR code below 📲
2) or visit https://www.paypal.me/thedinarian

🔗 Crypto – Support via Coinbase Wallet to: [email protected]

Or Buy me a coffee: https://buymeacoffee.com/thedinarian

Your generosity keeps this mission alive, for all! Namasté 🙏 The Dinarian

Read full Article
See More
Available on mobile and TV devices
google store google store app store app store
google store google store app tv store app tv store amazon store amazon store roku store roku store
Powered by Locals