Silicon Valley Bank collapse beginning of Germany’s comprehensive bail-in cyberattack?

Germany informed us July 8, 2020 via its proxy, the World Economic Forum that they are planning and preparing a comprehensive cyberattack. The attack’s main target is the World’s banking system. Germany’s WWII money laundering bank, BIS, is initiating the cyberattack using Microsoft Windows’ backdoors and “zero-day” exploits. BIS is targeting the World’s banking system to facilitate Germany EU’s bail-in = theft of Canada, US, UK and World’s bank deposits/savings.

The collapse of the Silicon Valley Bank is just the beginning of Germany’s comprehensive cyberattack. It was reported that the Silicon Valley Bank collapsed after a run on deposits drove the Northern California institution into insolvency. The run on deposits was done remotely. The collapse was facilitated using remote banking – technology of banking services on the basis of the orders sent by the client remotely (i.e. without a visit to the bank), often with the use of computer and telephone networks.

There’s only one central bank in the World capable of initiating such a comprehensive cyberattack on the US, Canadian, UK, and the World’s banking system. That bank is Germany’s WWII money laundering bank, BIS. BIS is directly linked to the computers of all central banks. BIS has instantaneous access to data of the global “electronic” monetary system. BIS can trigger global banking system crashes remotely using Microsoft Windows’ backdoors and Microsoft OS security token client software. BIS is the bank that is being used to facilitate Germany EU’s bail-in/theft.

In 2016 Justin Trudeau made it possible for Germany and its bankrupt / insolvent EU to steal $billions from Canadian deposits. Mechanism buried in Justin Trudeau’s March 22, 2016 Budget under Chapter 8 in section titled “Introducing a Bank Recapitalization ‘Bail-in’ Regime.”

To protect Canadian taxpayers in the unlikely event of a large bank failure, the Government is proposing to implement a bail-in regime that would reinforce that bank shareholders and creditors are responsible for the bank’s risks—not taxpayers.

Budget 2016 – Chapter 8 – Tax Fairness and a Strong Financial Sector

When you deposit money into your bank savings or chequing account, you in effect are … a “​creditor” to the bank since the bank now owes you that money.

How Bill Gates and Microsoft Windows are involved in Germany’s cyberattack on the World’s banking system

On February, 11 2021 the Federal Reserve announced that all Federal Reserve banks’ PC that are used to access FedLine Advantage must meet Microsoft Windows OS’ hardware and software requirements.

Based on the Microsoft OS that is currently in use (10 or 8.1), the PC being used to access FedLine Advantage must meet that OS’ hardware requirements. (Hardware Requirements: 10, 8.1) as well as an additional three (3) requirements. The PC in use must also have a USB 2.0 compliant port (Can you put a thumb drive in?), this is required due to the FedLine security token mentioned above comes as a USB device. The PC must also have an Ethernet network adapter and Microsoft Windows compatible printer.

There are five (5) software requirements that must be met regardless of whether Microsoft Windows 10 or 8.1 is in use. First, (1) Adobe Acrobat or Adobe Reader 10.0 or higher must be installed. An (2) Anti-virus software and (3) personal firewall software should also be in place. As a refresher this refers to a firewall for the local computer only rather than the entire network. And finally (4) Federal Reserve Bank-supplied FedLine Advantage Connection Utility software and (5) Federal Reserve Bank-supplied USB token hardware and token client software.

Fedline Network Requirements:

In addition to these requirements, specific network access requirements also exist for FedLine Advantage users. Transmission Control Protocol (TCP)/Internet Protocol (IP) communications protocol utilizing port 80 (World Wide Web HTTP) and port 443 (HTTP protocol over Transport Layer Security/Secure Sockets Layer) (Make sure your network administrator makes these ports available for network traffic).

The last requirement “Make sure your network administrator makes these ports available for network traffic” will make it possible for BIS to remotely access/attack all Federal Reserve Banks’ computers. Making ports available for network traffic allows BIS to initiate a comprehensive run on deposits of any central bank in the US and the World.

The cyber equivalent of COVID-19 would be a self-propagating attack using one or more “zero-day” exploits, techniques for which patches and specific antivirus software signatures are not yet available. Most likely, it would attack all devices running a single, common (Microsoft Windows) operating system or application.

World Economic Forum

Germany’s EISCAT has been broadcasting electronic warfare signals since February 10

Italy’s SOS ENATTOS – E.G.O. ELF Monitoring station has been recording Germany’s EISCAT ionosphere heating transmissions since February 10. Prolong pulses of radio waves transmissions indicates a major electronic warfare attack is being orchestrated. Mass media is being used to divert blame for the upcoming attack. Mass media are claiming a major blackout can take place soon due to a massive level solar storm that began 1 day after EISCAT began broadcasting February 10. Ionosphere heaters like HAARP and EISCAT were designed and developed to cause widespread electronic blackouts in targeted area.

 

If less than total black-out of transmission is desired (e.g., scrambling by phase shifting digital signals), the density of the plasma (Ne) need only be at least about 106 per cubic centimeter for a plasma orginating at an altitude of from about 250 to about 400 km and accordingly less energy (i.e., electromagnetic radiation), e.g., 108 joules need be provided. Likewise, if the density Ne is on the order of 108, a properly positioned plume will provide a reflecting surface for VHF waves and can be used to enhance, interfere with, or otherwise modify communication transmissions. It can be seen from the foregoing that by appropriate application of various aspects of this invention at strategic locations and with adequate power sources, a means and method is provided to cause interference with or even total disruption of communications over a very large portion of the earth.” BAE HAARP Alaska ionosphere heater patent US4686605A

What is the motive for Germany orchestrating a widespread blackout using its EISCAT ionosphere heater. A bail-in. Germany intends on using the blackout it’s causing to steal $billions. Blame the Sun. However, spectrogram data will show and is showing us now that it isn’t the Sun that will cause a widespread blackout. A solar storm emits a blast of high energy containing all forms of energy: heat, magnetic energy, and ionizing radiation. The ionizing radiation released during solar flares includes x-rays and gamma rays. EISCAT transmits at a specific frequency, the high-rate (50 Hz) amplitude.

SOS ENATTOS – E.G.O. ELF Monitoring station data clearly shows us that EISCAT has been transmitting 50 Hz since February 10. It isn’t the Sun emitting bursts of 50 Hz.

The Sun emits radiation right across the electromagnetic spectrum, from extremely high-energy X-rays to ultra-long-wavelength radio waves, and everything in-between.

Germany informed us that they are planning and preparing a comprehensive cyberattack

“The cyber equivalent of COVID-19 would be a self-propagating attack using one or more “zero-day” exploits, techniques for which patches and specific antivirus software signatures are not yet available. Most likely, it would attack all devices running a single, common operating system or application.” Germany’s World Economic Forum, June 1, 2020

Germany’s World Economic Forum outright told you Germany is planning to stage the cyber attack using Bill Gates’ Microsoft Windows 10 – June 12, 2021 Microsoft confirmed 7 Windows 10 zero-days threats .

Purpose of Germany’s cyberattack is to cover up a Germany EU bail-in = theft of Canada, US, UK and World’s bank deposits/savings.

BIS, Germany’s WWII money laundering bank, is directly linked to the computers of all central banks. BIS has instantaneous access to data of the global “electronic” monetary sys. Can trigger global banking system crashes remotely using WIndows 10 back door and Microsoft OS security token client software to facilitate Germany EU’s bail-in/theft.

The US Federal Reserve will be complicit in Germany’s cyberattack. On February, 11 2021 the Federal Reserve announced that all Federal Reserve banks’ PC that are used to access FedLine Advantage must meet Microsoft Windows OS’ hardware and software requirements.

In addition to these requirements, specific network access requirements also exist for FedLine Advantage users. Transmission Control Protocol (TCP)/Internet Protocol (IP) communications protocol utilizing port 80 (World Wide Web HTTP) and port 443 (HTTP protocol over Transport Layer Security/Secure Sockets Layer) (Make sure your network administrator makes these ports available for network traffic).

This requirement “Make sure your network administrator makes these ports available for network traffic” will make it possible for BIS to remotely access/attack all Federal Reserve Banks’ computers.