Canada is 100 correct is there cyber threat yearly report analysis . Canda threat assessment mirrors my Private Investigator assessment from going back to January 6 on brute Force attack on Google LLC sever. As well there evidence and this not a theory this after none stop campaign on different proxy undercover proxy accounts left with simply passwords and auth with baseline Microsoft defender to protect the assets. We have found that partner and vendor having obtain access through a vendor sso portal and was able to change the financial advisor of the account and then access the account exchange e-commerce accounts . Atom aka DMCA was a part of the project light on Europe that Akon renamed as light house without the server allowing him to and akon im assuming is working with atom to detour contribution that China and Russia has played in all economies around the world. If you see a hike in attack is most likely India being responsible for moving a assets that the DMCA sever was originally going to support.. Going silent night the owner of the server went. Not to returning to see what the unknown illegally claim . And it look like they been trying to exploit one of my Audubon initiative/ From Brazil to Canada. Opening up Mexican boarder crossing. Relieving the pressure the boarder wall and giving are neighbors same boarder rules as Canada has . Replacing boarder guard with Canadian mounties . After research we've found that Canadian police cannot be paid off and people try to stay far away from mountains police as possible. Im not sure why all i know is drug traffickers don't would rather risk going through the hills then going through the boarder if not at all if possible. So we choose this solid counter part to even out opening up the boarder and simple making boarder toll road . And having a ibm super computer for mass memory . To keep track of immigration and amount of immigrant that turn to countries after visa is expired . Where asking that Canada and Mexico help me in this ultimate solution . As well im also asking for united State Congress run a model on amount of Nazi family members that ended up in Congress and members of are government after the fall of the USSR . We want to make sure that under the underbelly of the beast there is not a proxy beast controlling the endpoint.
Im who they all fear Hacker Noon , The laptop from hell . Warith Akbar. Atom , Creative Commons return proxy server json, DMCA to me .
Canda good hunting in your report on