Germany informed us July 8, 2020 via its proxy, the World Economic Forum that they are planning and preparing a comprehensive cyberattack. The attack’s main target is the World’s banking system. Germany’s WWII money laundering bank, BIS, is initiating the cyberattack using Microsoft Windows’ backdoors and “zero-day” exploits. BIS is targeting the World’s banking system to facilitate Germany EU’s bail-in = theft of Canada, US, UK and World’s bank deposits/savings.
The collapse of the Silicon Valley Bank is just the beginning of Germany’s comprehensive cyberattack. It was reported that the Silicon Valley Bank collapsed after a run on deposits drove the Northern California institution into insolvency. The run on deposits was done remotely. The collapse was facilitated using remote banking – technology of banking services on the basis of the orders sent by the client remotely (i.e. without a visit to the bank), often with the use of computer and telephone networks.
There’s only one central bank in the World capable of initiating such a comprehensive cyberattack on the US, Canadian, UK, and the World’s banking system. That bank is Germany’s WWII money laundering bank, BIS. BIS is directly linked to the computers of all central banks. BIS has instantaneous access to data of the global “electronic” monetary system. BIS can trigger global banking system crashes remotely using Microsoft Windows’ backdoors and Microsoft OS security token client software. BIS is the bank that is being used to facilitate Germany EU’s bail-in/theft.
In 2016 Justin Trudeau made it possible for Germany and its bankrupt / insolvent EU to steal $billions from Canadian deposits. Mechanism buried in Justin Trudeau’s March 22, 2016 Budget under Chapter 8 in section titled “Introducing a Bank Recapitalization ‘Bail-in’ Regime.”
To protect Canadian taxpayers in the unlikely event of a large bank failure, the Government is proposing to implement a bail-in regime that would reinforce that bank shareholders and creditors are responsible for the bank’s risks—not taxpayers.
Budget 2016 – Chapter 8 – Tax Fairness and a Strong Financial Sector
When you deposit money into your bank savings or chequing account, you in effect are … a “creditor” to the bank since the bank now owes you that money.
How Bill Gates and Microsoft Windows are involved in Germany’s cyberattack on the World’s banking system
On February, 11 2021 the Federal Reserve announced that all Federal Reserve banks’ PC that are used to access FedLine Advantage must meet Microsoft Windows OS’ hardware and software requirements.
Based on the Microsoft OS that is currently in use (10 or 8.1), the PC being used to access FedLine Advantage must meet that OS’ hardware requirements. (Hardware Requirements: 10, 8.1) as well as an additional three (3) requirements. The PC in use must also have a USB 2.0 compliant port (Can you put a thumb drive in?), this is required due to the FedLine security token mentioned above comes as a USB device. The PC must also have an Ethernet network adapter and Microsoft Windows compatible printer.
There are five (5) software requirements that must be met regardless of whether Microsoft Windows 10 or 8.1 is in use. First, (1) Adobe Acrobat or Adobe Reader 10.0 or higher must be installed. An (2) Anti-virus software and (3) personal firewall software should also be in place. As a refresher this refers to a firewall for the local computer only rather than the entire network. And finally (4) Federal Reserve Bank-supplied FedLine Advantage Connection Utility software and (5) Federal Reserve Bank-supplied USB token hardware and token client software.
Fedline Network Requirements:
In addition to these requirements, specific network access requirements also exist for FedLine Advantage users. Transmission Control Protocol (TCP)/Internet Protocol (IP) communications protocol utilizing port 80 (World Wide Web HTTP) and port 443 (HTTP protocol over Transport Layer Security/Secure Sockets Layer) (Make sure your network administrator makes these ports available for network traffic).
The last requirement “Make sure your network administrator makes these ports available for network traffic” will make it possible for BIS to remotely access/attack all Federal Reserve Banks’ computers. Making ports available for network traffic allows BIS to initiate a comprehensive run on deposits of any central bank in the US and the World.
The cyber equivalent of COVID-19 would be a self-propagating attack using one or more “zero-day” exploits, techniques for which patches and specific antivirus software signatures are not yet available. Most likely, it would attack all devices running a single, common (Microsoft Windows) operating system or application.