Of course it is being manipulated. The sole issue here is that we are waiting for the "break" to occur and when it does a number of people are committed to going after the manipulators legally. The intriguing thing is that many of them have developed a false sense of invulnerability and security because people have not spent the significant $$ needed to track them down. I have always found that such individuals have inevitably been careless about hiding their tracks because they believe in their anonymity and that no one is going to spend what is required to get them. In this situation that is a mistake.
It is impossible to conceal what they are doing when using electronic communication systems. I and others can go three or four levels down into hard drives and other storage systems and reconstruct what has been done and we already know some of the people who are doing it. There will be a "judgment day" and it would be best not to get caught in the "sights" when that occurs.