Germany’s proxy informed us in 2020 that they are planning and preparing a comprehensive cyberattack on the World’s banking system

Germany’s proxy, the World Economic Forum (WEF) poses a significant threat to Canada, the US, the UK and non-EU states and their banking systems. The German founded and lead WEF serves our WWI and WWII enemy’s strategic interests. The WEF uses it’s yearly forums to recruit national leaders to further Germany’s strategic interests. It hosts its recruitment forums in Switzerland to utilize Switzerland’s money laundering Swiss numbered accounts.

Germany knows that national government officials aren’t going to volunteer to betray their own country, commit treason, by furthering Germany’s strategic interests. Bribe money is deposited in Switzerland’s numbered accounts for traitors like Chrystia Freeland, to buy their loyalty and collaboration. Germany used Credit Suisse to bribe/pay off COVID-19 bioterrorism attack collaborators. When Germany and the WHO’s COVID-19 plandemic ended the national government officials who collaborated with Germany and the WHO withdrew their bribe money from Credit Suisse –  causing its collapse.

Germany knew that the COVID-19 plandemic would only be a temporary source of new income for the perpetually insolvent Fourth Reich EU and the UN so it devised a plan during COVID-19 to launch a comprehensive cyber attack against non-EU bank to steal $billions.

“The cyber equivalent of COVID-19 would be a self-propagating attack using one or more “zero-day” exploits, techniques for which patches and specific antivirus software signatures are not yet available. Most likely, it would attack all devices running a single, common operating system or application.” World Economic Forum, June 1, 2020

Germany’s World Economic Forum outright told you that Germany is planning to stage the cyber attack using Bill Gates’ Microsoft Windows’ zero day exploits – June 12, 2021 Microsoft confirmed 7 Windows 10 zero-days threats .

Purpose of Germany’s cyberattack is to cover up a Germany EU bail-in – the theft of Canada, US, UK and World’s bank deposits/savings.

BIS, Germany’s WWII money laundering bank, is directly linked to the computers of all central banks. BIS has instantaneous access to data of the global “electronic” monetary sys. BIS can trigger global banking system crashes remotely using Microsoft WIndows’ back door and Microsoft OS security token client software to facilitate a Germany EU bail-in/theft.

The US Federal Reserve will be complicit in Germany’s cyber attack. On February, 11 2021 the Federal Reserve announced that all Federal Reserve banks’ PC that are used to access FedLine Advantage must meet Microsoft Windows OS’ hardware and software requirements.

In addition to these requirements, specific network access requirements also exist for FedLine Advantage users. Transmission Control Protocol (TCP)/Internet Protocol (IP) communications protocol utilizing port 80 (World Wide Web HTTP) and port 443 (HTTP protocol over Transport Layer Security/Secure Sockets Layer) (Make sure your network administrator makes these ports available for network traffic).

This requirement “Make sure your network administrator makes these ports available for network traffic” will make it possible for BIS to remotely access/attack all Federal Reserve Banks’ computers.

Germany is planning on orchestrating a comprehensive cyberattack during communication blackouts that will be caused by Germany’s EISCAT ionosphere heaters.

“If less than total black-out of transmission is desired (e.g., scrambling by phase shifting digital signals), the density of the plasma (Ne) need only be at least about 106 per cubic centimeter for a plasma originating at an altitude of from about 250 to about 400 km and accordingly less energy (i.e., electromagnetic radiation), e.g., 108 joules need be provided. Likewise, if the density Ne is on the order of 108, a properly positioned plume will provide a reflecting surface for VHF waves and can be used to enhance, interfere with, or otherwise modify communication transmissions. It can be seen from the foregoing that by appropriate application of various aspects of this invention at strategic locations and with adequate power sources, a means and method is provided to cause interference with or even total disruption of communications over a very large portion of the earth.” BAE HAARP Alaska ionosphere heater patent US4686605A

The US Navy’s SBX-1 ionosphere heater being redeployed in March 2023 informs us US President Joe Biden has committed the US electronic warfare assets to assisting Germany fabricate climate change and/or facilitate a comprehensive attack against the US, Canada and World’s banking system.

Germany is intent on using the ionosphere heater(s) to cause communications blackouts and assist Germany steal $billion from the US, the UK, Canadian and non-EU banks. Blame a comprehensive cyber attack for the loss of $billions in uninsured bank deposits.

In 2016 Justin Trudeau made it possible for Germany and its bankrupt/insolvent Fourth Reich EU to steal $billions from Canadian deposits. Mechanism buried in Justin Trudeau’s March 22, 2016 Budget under Chapter 8 in section titled “Introducing a Bank Recapitalization ‘Bail-in’ Regime.”

“To protect Canadian taxpayers in the unlikely event of a large bank failure, the Government is proposing to implement a bail-in regime that would reinforce that bank shareholders and creditors are responsible for the bank’s risks—not taxpayers.” Budget 2016 – Chapter 8 – Tax Fairness and a Strong Financial Sector

When you deposit money into your bank savings or chequing account, you in effect are … a “creditor” to the bank since the bank now owes you that money.

Silicon Valley Bank collapse beginning of Germany’s comprehensive bail-in cyberattack?

Germany informed us July 8, 2020 via its proxy, the World Economic Forum that they are planning and preparing a comprehensive cyberattack. The attack’s main target is the World’s banking system. Germany’s WWII money laundering bank, BIS, is initiating the cyberattack using Microsoft Windows’ backdoors and “zero-day” exploits. BIS is targeting the World’s banking system to facilitate Germany EU’s bail-in = theft of Canada, US, UK and World’s bank deposits/savings.

The collapse of the Silicon Valley Bank is just the beginning of Germany’s comprehensive cyberattack. It was reported that the Silicon Valley Bank collapsed after a run on deposits drove the Northern California institution into insolvency. The run on deposits was done remotely. The collapse was facilitated using remote banking – technology of banking services on the basis of the orders sent by the client remotely (i.e. without a visit to the bank), often with the use of computer and telephone networks.

There’s only one central bank in the World capable of initiating such a comprehensive cyberattack on the US, Canadian, UK, and the World’s banking system. That bank is Germany’s WWII money laundering bank, BIS. BIS is directly linked to the computers of all central banks. BIS has instantaneous access to data of the global “electronic” monetary system. BIS can trigger global banking system crashes remotely using Microsoft Windows’ backdoors and Microsoft OS security token client software. BIS is the bank that is being used to facilitate Germany EU’s bail-in/theft.

In 2016 Justin Trudeau made it possible for Germany and its bankrupt / insolvent EU to steal $billions from Canadian deposits. Mechanism buried in Justin Trudeau’s March 22, 2016 Budget under Chapter 8 in section titled “Introducing a Bank Recapitalization ‘Bail-in’ Regime.”

To protect Canadian taxpayers in the unlikely event of a large bank failure, the Government is proposing to implement a bail-in regime that would reinforce that bank shareholders and creditors are responsible for the bank’s risks—not taxpayers.

Budget 2016 – Chapter 8 – Tax Fairness and a Strong Financial Sector

When you deposit money into your bank savings or chequing account, you in effect are … a “​creditor” to the bank since the bank now owes you that money.

How Bill Gates and Microsoft Windows are involved in Germany’s cyberattack on the World’s banking system

On February, 11 2021 the Federal Reserve announced that all Federal Reserve banks’ PC that are used to access FedLine Advantage must meet Microsoft Windows OS’ hardware and software requirements.

Based on the Microsoft OS that is currently in use (10 or 8.1), the PC being used to access FedLine Advantage must meet that OS’ hardware requirements. (Hardware Requirements: 10, 8.1) as well as an additional three (3) requirements. The PC in use must also have a USB 2.0 compliant port (Can you put a thumb drive in?), this is required due to the FedLine security token mentioned above comes as a USB device. The PC must also have an Ethernet network adapter and Microsoft Windows compatible printer.

There are five (5) software requirements that must be met regardless of whether Microsoft Windows 10 or 8.1 is in use. First, (1) Adobe Acrobat or Adobe Reader 10.0 or higher must be installed. An (2) Anti-virus software and (3) personal firewall software should also be in place. As a refresher this refers to a firewall for the local computer only rather than the entire network. And finally (4) Federal Reserve Bank-supplied FedLine Advantage Connection Utility software and (5) Federal Reserve Bank-supplied USB token hardware and token client software.

Fedline Network Requirements:

In addition to these requirements, specific network access requirements also exist for FedLine Advantage users. Transmission Control Protocol (TCP)/Internet Protocol (IP) communications protocol utilizing port 80 (World Wide Web HTTP) and port 443 (HTTP protocol over Transport Layer Security/Secure Sockets Layer) (Make sure your network administrator makes these ports available for network traffic).

The last requirement “Make sure your network administrator makes these ports available for network traffic” will make it possible for BIS to remotely access/attack all Federal Reserve Banks’ computers. Making ports available for network traffic allows BIS to initiate a comprehensive run on deposits of any central bank in the US and the World.

The cyber equivalent of COVID-19 would be a self-propagating attack using one or more “zero-day” exploits, techniques for which patches and specific antivirus software signatures are not yet available. Most likely, it would attack all devices running a single, common (Microsoft Windows) operating system or application.

World Economic Forum