I design systems for a living. Automation platforms, AI workflows, observability infrastructure — the kind of architecture where every component has a purpose and the order of operations matters. When I look at a system, I ask the same questions every time: what are the inputs, what are the outputs, what are the dependencies, and what happens when the monitoring goes dark?
I've been asking those questions about the United States government for the past year. And the answers are terrifying.
Because what I'm looking at is a system. A deliberately architected system designed to generate profit from geopolitical events while ensuring that no enforcement mechanism exists to investigate it. And like any well-designed system, the components were deployed in a specific order, each one enabling the next.
I'm going to walk through this the way I'd walk through any architecture review. Component by component. Dependency by dependency. If you're an engineer, you'll recognize the pattern. If you're not, you'll recognize it anyway, because it's the same pattern every corrupt organization follows: disable the monitoring before you deploy the exploit.
Layer 1: Remove the Enforcement Stack
Every production system has monitoring. Logging, alerting, observability — the infrastructure that tells you when something is wrong and who did it. In government, that monitoring layer is the enforcement apparatus: the DOJ's Public Integrity Section, the CFTC, the SEC's Enforcement Division.
In my last role, I built observability infrastructure for an automation platform. I watched what happened when the organization decided it didn't want visibility into its own failures — suppressed customer communications, manipulated status pages, buried a 60TB database problem rather than face it. I know what it looks like when an organization deliberately blinds itself. It looks exactly like what happened at the DOJ in 2025.
The Public Integrity Section — the unit created after Watergate specifically to prosecute corrupt officials — was reduced from 36 career lawyers to two. Not gradually. Not through attrition. The acting head refused to drop corruption charges against a political ally and was forced out. Four others resigned in protest. The rest were detailed to other offices. The section's authority to file new cases was stripped. Its consultation requirement for investigations involving members of Congress was suspended.
That's not a budget cut. That's someone running rm -rf /var/log before deploying malicious code.
Then the CFTC — the agency that regulates futures markets and prediction platforms — dropped its active investigation into Polymarket. The same Polymarket where Donald Trump Jr. sits on the advisory board. The same Polymarket where his venture capital firm 1789 Capital invested tens of millions of dollars. The investigation was closed in July 2025, and by August, Trump Jr. was formally announced as an advisor.
Then the SEC. Margaret Ryan, the Director of the Enforcement Division, resigned on March 16, 2026 after just over six months on the job. Reuters reported she wanted to be more aggressive in pursuing fraud cases, including cases that touched the president's circle — specifically crypto entrepreneur Justin Sun, a major backer of the Trump family's World Liberty Financial venture, and Elon Musk. She was blocked by SEC Chair Paul Atkins and other Republican political appointees.
Three enforcement bodies. Three layers of monitoring. All disabled or compromised before the first trade was placed.
If I submitted an architecture diagram showing a production system with all monitoring removed, every observability endpoint disabled, and every alerting mechanism silenced — and then showed a deployment of new untested code immediately after — any engineer in any review would ask the same question: "Why would you disable monitoring unless you didn't want anyone to see what you were about to do?"
Layer 2: Clear the Corporate Enforcement Pipeline
While the anti-corruption monitoring was being dismantled, the broader corporate enforcement apparatus was being systematically stood down. Public Citizen's January 2026 report documented 159 canceled or halted enforcement actions against 166 corporations. This wasn't targeted. This was DROP TABLE enforcement_actions; — a wholesale removal of accountability infrastructure.
Of those 166 corporations, 31 had made donations to Trump's inauguration or White House ballroom. The pharmaceutical giant and previous employer of the Attorney General had three enforcement actions canceled. Polymarket had two.
This is the dependency layer. You can't run an insider trading operation on prediction markets if the prediction markets are under active investigation. You can't profit from advance knowledge of military operations if the agencies responsible for investigating market manipulation are actively pursuing cases. The enforcement pipeline had to be cleared first. And it was. Democratic lawmakers have explicitly connected these dots, noting that the DOJ and CFTC investigations into Polymarket were dropped after Trump took office while his son sat on the platform's advisory board.
Layer 3: Execute
On February 28, 2026, the United States and Israel launched strikes on Iran.
A CNN analysis found that a single trader had made nearly $1 million since 2024 from dozens of well-timed Polymarket bets that correctly predicted US and Israeli military actions against Iran, winning a staggering 93% of five-figure wagers about Iran — even though the events they predicted were unannounced military operations.
Within hours, six brand-new Polymarket wallets — all funded within the previous 24 hours, all betting specifically on a February 28 strike date — cashed out approximately $1.2 million. The analytics firm Bubblemaps flagged all six as suspected insiders.
One account, "Magamyman," placed an $87,000 bet when the probability of a strike was listed at 17%. Seventy-one minutes later, the news broke. The position was worth $553,000. Other accounts — Planktonbet, Dicedicedice, nothingeverhappens911 — followed the same pattern. New accounts, no history, single-thesis bets placed hours before a classified military operation.
Then on Monday, March 23, at exactly 6:49 AM New York time, approximately 6,200 Brent crude and West Texas Intermediate oil futures contracts traded in a single minute. The notional value: $580 million. The average volume for that same time slot over the previous five trading days was about 700 contracts. S&P 500 E-mini futures surged simultaneously. Senator Chris Murphy cited $1.5 billion in S&P 500 futures purchased minutes before the announcement.
Fifteen minutes later, at 7:04 AM, Donald Trump posted on Truth Social about "productive conversations" with Tehran. Oil prices collapsed. Equities surged. Whoever placed those trades at 6:49 made a staggering amount of money in under twenty minutes. Iran's foreign ministry denied any negotiations were taking place, and a CBS News analysis confirmed the trading volume was far above normal for that time of day.
Senator Chris Murphy called it "mind-blowing corruption." Nobel laureate Paul Krugman called it treason. The White House called it baseless.
The Architecture Diagram
Let me draw this the way I'd draw any system:
[Layer 0: Preparation] ├── Gut DOJ Public Integrity Section (36 → 2 lawyers) ├── Strip authority to file new cases ├── Suspend congressional investigation consultation requirement ├── Drop CFTC investigation into Polymarket ├── Drop DOJ criminal investigation into Polymarket ├── Install Trump Jr. on Polymarket advisory board ├── Cancel 159 corporate enforcement actions (166 companies) └── SEC Enforcement Director blocked from pursuing Trump-adjacent cases → resigns [Layer 1: Position] ├── Fund fresh Polymarket wallets (24 hours before strike) ├── Place directional bets on classified military operations └── Load oil futures and S&P E-mini positions (15 minutes before announcement) [Layer 2: Execute] ├── Launch strikes on Iran (February 28, 2026) └── Post "productive conversations" on Truth Social (March 23, 6:49 AM + 15 min) [Layer 3: Collect] ├── Polymarket wallets cash out $1.2M ├── Oil futures positions profit on price collapse ├── S&P positions profit on equity surge └── No enforcement body exists with authority or staffing to investigate
Every lock on the enforcement door — DOJ Public Integrity, CFTC oversight, SEC enforcement — was removed before the first bomb dropped. Before the first bet was placed. Before anyone with a badge could ask a single question.
That's not a coincidence. That's architecture.
Why I Recognize This Pattern
I've seen this before. Smaller scale, lower stakes, but the same structural pattern.
At a previous employer, I discovered a database that had grown to over 60TB — hitting the RDS limit of 64TB, and a problem that should have been caught by monitoring, escalated through incident management, and communicated to customers. Instead, the monitoring was suppressed. Customer communications were blocked during outages. The status page was manipulated to show green when the system was failing. "Long-term" solutions were introduced like the reduction of logging from a year to 30 days, then 21 days.
The organization didn't want visibility into its own failures, because visibility would have required accountability. So the monitoring was disabled first. Then the failures were allowed to accumulate. Then, when the failures became undeniable, the people who had been sounding the alarm were the ones who got pushed out.
Scale that pattern up from a startup to the federal government. Replace a database problem with a war. Replace suppressed customer communications with dismantled enforcement agencies. Replace status page manipulation with "baseless and irresponsible reporting." The architecture is identical.
I know what it looks like when a system is designed to avoid accountability. I've traced the dependencies. I've read the logs. And I've been the person who got pushed out for pointing at the dashboard and saying "this is broken and someone is hiding it."
What a Systems Thinker Sees
Most people are looking at individual events. A suspicious Polymarket trade here. An unusual oil futures spike there. A resignation at the SEC. A staffing cut at the DOJ.
A systems thinker doesn't look at individual events. A systems thinker looks at dependencies, sequencing, and architecture. And when you look at the sequencing — enforcement dismantled first, then positions established, then events executed, then profits collected, with no remaining mechanism for investigation — you're not looking at a series of coincidences. You're looking at a system that was designed to produce exactly this output.
The question isn't whether this is corruption. The question is whether this is the most sophisticated corruption architecture in modern American history.
I build systems. I analyze systems. I break systems down into their component parts and trace the data flow from input to output. And this system — from the gutting of Public Integrity to the $580 million oil trade at 6:49 AM on a Monday morning — is the cleanest, most deliberately architected corruption infrastructure I've ever seen.
The monitoring was removed before the exploit was deployed. That's not a coincidence. That's engineering.