<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Bill C-11</title>
	<atom:link href="https://axisofeasy.com/tag/bill-c-11/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Sat, 18 Apr 2026 12:12:34 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>Bill C-11</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#AxisOfEasy 446: Internet Content Regulation Is Coming To Canada</title>
		<link>https://axisofeasy.com/podcast/axisofeasy-446-internet-content-regulation-is-coming-to-canada/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-446-internet-content-regulation-is-coming-to-canada</link>
					<comments>https://axisofeasy.com/podcast/axisofeasy-446-internet-content-regulation-is-coming-to-canada/#respond</comments>
		
		<dc:creator><![CDATA[Joey Tweets]]></dc:creator>
		<pubDate>Fri, 17 Apr 2026 22:00:34 +0000</pubDate>
				<category><![CDATA[Bill C-11]]></category>
		<category><![CDATA[Bill C-63]]></category>
		<category><![CDATA[Bill C-9]]></category>
		<category><![CDATA[Canada censorship]]></category>
		<category><![CDATA[Canada censorship exposed]]></category>
		<category><![CDATA[Canada censorship law]]></category>
		<category><![CDATA[Canada free speech]]></category>
		<category><![CDATA[Canada internet censorship]]></category>
		<category><![CDATA[Canada internet control 2026]]></category>
		<category><![CDATA[Canadian content regulation]]></category>
		<category><![CDATA[content moderation]]></category>
		<category><![CDATA[CRTC]]></category>
		<category><![CDATA[CRTC online content]]></category>
		<category><![CDATA[digital censorship]]></category>
		<category><![CDATA[digital rights]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[government internet control]]></category>
		<category><![CDATA[Internet freedom]]></category>
		<category><![CDATA[internet regulation Canada]]></category>
		<category><![CDATA[Mark Carney]]></category>
		<category><![CDATA[Mark Carney censorship]]></category>
		<category><![CDATA[online censorship]]></category>
		<category><![CDATA[online censorship Canada]]></category>
		<category><![CDATA[online harms act]]></category>
		<category><![CDATA[Trudeau censorship]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?post_type=podcast&#038;p=33754</guid>

					<description><![CDATA[In this issue: Internet Content Regulation is Coming To Canada Court Orders OpenAI to Block User in ChatGPT Case Raising Free Speech Concerns Fake Claude “Pro” Site Spreads PlugX Malware via DLL Sideloading n8n Abuse Turns Workflow Automation Tool into Phishing and Malware Delivery Channel AI Agents in GitHub Actions Bypassed via Prompt Injection Fake [&#8230;]<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Fpodcast%2Faxisofeasy-446-internet-content-regulation-is-coming-to-canada%2F&amp;action_name=%23AxisOfEasy%20446%3A%20Internet%20Content%20Regulation%20Is%20Coming%20To%20Canada&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/podcast/axisofeasy-446-internet-content-regulation-is-coming-to-canada/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 415: PromptLock Signals The Arrival Of AI Powered Ransomware</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware/?pk_campaign=feed&#038;pk_kwd=axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware/?pk_campaign=feed&#038;pk_kwd=axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 29 Aug 2025 22:00:33 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[4Chan]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI crimewave]]></category>
		<category><![CDATA[AI enhancements]]></category>
		<category><![CDATA[algorithmic mediation]]></category>
		<category><![CDATA[Android Trojan]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[authenticity]]></category>
		<category><![CDATA[automation]]></category>
		<category><![CDATA[Banks]]></category>
		<category><![CDATA[Base64]]></category>
		<category><![CDATA[Bill C-11]]></category>
		<category><![CDATA[Bill C-13]]></category>
		<category><![CDATA[bitcoin ransom]]></category>
		<category><![CDATA[Broadcasting Act]]></category>
		<category><![CDATA[C2]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Claude Code]]></category>
		<category><![CDATA[court case]]></category>
		<category><![CDATA[creator backlash]]></category>
		<category><![CDATA[CRTC]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[defense contractors]]></category>
		<category><![CDATA[EDR evasion]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[ESET]]></category>
		<category><![CDATA[exfiltration]]></category>
		<category><![CDATA[extraterritoriality]]></category>
		<category><![CDATA[Farmers Insurance]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[filename parsing]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[GoLang]]></category>
		<category><![CDATA[Google Pixel]]></category>
		<category><![CDATA[GPT-OSS]]></category>
		<category><![CDATA[guardrails]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[hospitals]]></category>
		<category><![CDATA[hybrid cloud]]></category>
		<category><![CDATA[io_uring]]></category>
		<category><![CDATA[Kiwi Farms]]></category>
		<category><![CDATA[legislative error]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[machine learning]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Netflix]]></category>
		<category><![CDATA[Ofcom]]></category>
		<category><![CDATA[Ollama]]></category>
		<category><![CDATA[Online Safety Act]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[PromptLock]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[RingReaper]]></category>
		<category><![CDATA[Salesforce]]></category>
		<category><![CDATA[Salt Typhoon]]></category>
		<category><![CDATA[Samsung]]></category>
		<category><![CDATA[Scattered Spider]]></category>
		<category><![CDATA[shell injection]]></category>
		<category><![CDATA[ShinyHunters]]></category>
		<category><![CDATA[Shorts]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[Storm-0501]]></category>
		<category><![CDATA[trust]]></category>
		<category><![CDATA[U.S. Constitution]]></category>
		<category><![CDATA[UNC5174]]></category>
		<category><![CDATA[VShell]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Youtube]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32136</guid>

					<description><![CDATA[PromptLock Signals the Arrival of AI Powered Ransomware,
Phishing Campaign Exploits Linux Filename Parsing to Deliver VShell Backdoor,
Government Error Erases Privacy Rights from Broadcasting Act ...this and more in AofE  #415<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware&amp;action_name=%23AxisOfEasy%20415%3A%20PromptLock%20Signals%20The%20Arrival%20Of%20AI%20Powered%20Ransomware&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware/?pk_campaign=feed&#038;pk_kwd=axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware/feed/</wfw:commentRss>
			<slash:comments>6</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 284: Canada&#8217;s &#8216;Cybersecurity&#8217; Bill Is A Dangerous Overreach</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-284-canadas-cybersecurity-bill-is-a-dangerous-overreach/?pk_campaign=feed&#038;pk_kwd=axisofeasy-284-canadas-cybersecurity-bill-is-a-dangerous-overreach&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-284-canadas-cybersecurity-bill-is-a-dangerous-overreach</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-284-canadas-cybersecurity-bill-is-a-dangerous-overreach/?pk_campaign=feed&#038;pk_kwd=axisofeasy-284-canadas-cybersecurity-bill-is-a-dangerous-overreach#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Tue, 07 Feb 2023 23:00:09 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[Apigee Edge]]></category>
		<category><![CDATA[Atlassian]]></category>
		<category><![CDATA[Bill C-11]]></category>
		<category><![CDATA[Bill C-26]]></category>
		<category><![CDATA[Bill C-36]]></category>
		<category><![CDATA[CJS]]></category>
		<category><![CDATA[Columbia Journalism School]]></category>
		<category><![CDATA[Dr. Ilia Kolochenko]]></category>
		<category><![CDATA[ImmuniWeb]]></category>
		<category><![CDATA[Jira]]></category>
		<category><![CDATA[Marco Mendichino]]></category>
		<category><![CDATA[Rostelecom]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Shishir Singh]]></category>
		<category><![CDATA[T-Mobile]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=27226</guid>

					<description><![CDATA[Canada's 'cybersecurity' bill is a dangerous overreach,
IT Pros Sound Alarm: ChatGPT Threat Looms Over Cybersecurity,
Latest of 8 Cyberattacks on T-Mobile Wireless Carrier Exposes Customers’ Personal and Account Information ... this and more in AofE  #284<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-284-canadas-cybersecurity-bill-is-a-dangerous-overreach%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-284-canadas-cybersecurity-bill-is-a-dangerous-overreach&amp;action_name=%23AxisOfEasy%20284%3A%20Canada%26%238217%3Bs%20%26%238216%3BCybersecurity%26%238217%3B%20Bill%20Is%20A%20Dangerous%20Overreach&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-284-canadas-cybersecurity-bill-is-a-dangerous-overreach/?pk_campaign=feed&#038;pk_kwd=axisofeasy-284-canadas-cybersecurity-bill-is-a-dangerous-overreach/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 255: CRTC Chair Ian Scott Confirms Bill C-11 Can Be Used To Pressure Internet Platforms To Manipulate Algorithms</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-255-crtc-chair-ian-scott-confirms-bill-c-11-can-be-used-to-pressure-internet-platforms-to-manipulate-algorithms/?pk_campaign=feed&#038;pk_kwd=axisofeasy-255-crtc-chair-ian-scott-confirms-bill-c-11-can-be-used-to-pressure-internet-platforms-to-manipulate-algorithms&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-255-crtc-chair-ian-scott-confirms-bill-c-11-can-be-used-to-pressure-internet-platforms-to-manipulate-algorithms</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-255-crtc-chair-ian-scott-confirms-bill-c-11-can-be-used-to-pressure-internet-platforms-to-manipulate-algorithms/?pk_campaign=feed&#038;pk_kwd=axisofeasy-255-crtc-chair-ian-scott-confirms-bill-c-11-can-be-used-to-pressure-internet-platforms-to-manipulate-algorithms#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Tue, 19 Jul 2022 22:00:41 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[APT]]></category>
		<category><![CDATA[Ashutosh Rana]]></category>
		<category><![CDATA[Bill C-11]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[CRTC]]></category>
		<category><![CDATA[freedom]]></category>
		<category><![CDATA[GitHub]]></category>
		<category><![CDATA[H0lyGh0st]]></category>
		<category><![CDATA[Ian Scott]]></category>
		<category><![CDATA[MSTIC]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[open source]]></category>
		<category><![CDATA[open-source apps]]></category>
		<category><![CDATA[PayPal]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[state surveillance]]></category>
		<category><![CDATA[VCU]]></category>
		<category><![CDATA[whistleblower]]></category>
		<category><![CDATA[wikileaks]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=26166</guid>

					<description><![CDATA[CRTC Chair Ian Scott Confirms Bill C-11 Can Be Used To Pressure Internet Platforms to Manipulate Algorithms,
The Chinese surveillance state encounters resistance from the public,
Federal agencies warned healthcare organisations about North Korean ransomware attacks ... this and more in AofE  #255<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-255-crtc-chair-ian-scott-confirms-bill-c-11-can-be-used-to-pressure-internet-platforms-to-manipulate-algorithms%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-255-crtc-chair-ian-scott-confirms-bill-c-11-can-be-used-to-pressure-internet-platforms-to-manipulate-algorithms&amp;action_name=%23AxisOfEasy%20255%3A%20CRTC%20Chair%20Ian%20Scott%20Confirms%20Bill%20C-11%20Can%20Be%20Used%20To%20Pressure%20Internet%20Platforms%20To%20Manipulate%20Algorithms&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-255-crtc-chair-ian-scott-confirms-bill-c-11-can-be-used-to-pressure-internet-platforms-to-manipulate-algorithms/?pk_campaign=feed&#038;pk_kwd=axisofeasy-255-crtc-chair-ian-scott-confirms-bill-c-11-can-be-used-to-pressure-internet-platforms-to-manipulate-algorithms/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 254: Apple Debuts Lockdown Mode to Prevent State-Sponsored Spying</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-254-apple-debuts-lockdown-mode-to-prevent-state-sponsored-spying/?pk_campaign=feed&#038;pk_kwd=axisofeasy-254-apple-debuts-lockdown-mode-to-prevent-state-sponsored-spying&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-254-apple-debuts-lockdown-mode-to-prevent-state-sponsored-spying</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-254-apple-debuts-lockdown-mode-to-prevent-state-sponsored-spying/?pk_campaign=feed&#038;pk_kwd=axisofeasy-254-apple-debuts-lockdown-mode-to-prevent-state-sponsored-spying#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Tue, 12 Jul 2022 22:00:41 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[APT]]></category>
		<category><![CDATA[Bill C-11]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Cruise]]></category>
		<category><![CDATA[EDF]]></category>
		<category><![CDATA[Elon Musk]]></category>
		<category><![CDATA[lockdown]]></category>
		<category><![CDATA[Outage]]></category>
		<category><![CDATA[pandemic]]></category>
		<category><![CDATA[ransomeware]]></category>
		<category><![CDATA[Rogers]]></category>
		<category><![CDATA[Rogers outage]]></category>
		<category><![CDATA[Rolls Royce]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=26132</guid>

					<description><![CDATA[Apple Debuts Lockdown Mode to Prevent State-Sponsored Spying,
Canada wide Rogers outage,
Canada is censoring us and bill c-11 will make it worse ... this and more in AofE  #254<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-254-apple-debuts-lockdown-mode-to-prevent-state-sponsored-spying%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-254-apple-debuts-lockdown-mode-to-prevent-state-sponsored-spying&amp;action_name=%23AxisOfEasy%20254%3A%20Apple%20Debuts%20Lockdown%20Mode%20to%20Prevent%20State-Sponsored%20Spying&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-254-apple-debuts-lockdown-mode-to-prevent-state-sponsored-spying/?pk_campaign=feed&#038;pk_kwd=axisofeasy-254-apple-debuts-lockdown-mode-to-prevent-state-sponsored-spying/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 246: DEA Law Enforcement Data Breach Under Investigation</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-246-dea-law-enforcement-data-breach-under-investigation/?pk_campaign=feed&#038;pk_kwd=axisofeasy-246-dea-law-enforcement-data-breach-under-investigation&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-246-dea-law-enforcement-data-breach-under-investigation</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-246-dea-law-enforcement-data-breach-under-investigation/?pk_campaign=feed&#038;pk_kwd=axisofeasy-246-dea-law-enforcement-data-breach-under-investigation#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Tue, 17 May 2022 22:00:38 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[Bill C-11]]></category>
		<category><![CDATA[British]]></category>
		<category><![CDATA[cryptocurency]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[DEA]]></category>
		<category><![CDATA[EPIC]]></category>
		<category><![CDATA[ESP]]></category>
		<category><![CDATA[Germany]]></category>
		<category><![CDATA[Jordan]]></category>
		<category><![CDATA[KrebsOnSecurity]]></category>
		<category><![CDATA[LEIA]]></category>
		<category><![CDATA[Nerbian RAT]]></category>
		<category><![CDATA[New York]]></category>
		<category><![CDATA[NPM. APT34]]></category>
		<category><![CDATA[NSS]]></category>
		<category><![CDATA[RuTube]]></category>
		<category><![CDATA[Saitama]]></category>
		<category><![CDATA[Trudeau]]></category>
		<category><![CDATA[UN]]></category>
		<category><![CDATA[WEF]]></category>
		<category><![CDATA[Whyy]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=25746</guid>

					<description><![CDATA[DEA law enforcement data breach under investigation,
Ransomware attack to close US college after 157 years,
Malicious NPM packages are attacking German companies ...  this and more in AofE #246<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-246-dea-law-enforcement-data-breach-under-investigation%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-246-dea-law-enforcement-data-breach-under-investigation&amp;action_name=%23AxisOfEasy%20246%3A%20DEA%20Law%20Enforcement%20Data%20Breach%20Under%20Investigation&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-246-dea-law-enforcement-data-breach-under-investigation/?pk_campaign=feed&#038;pk_kwd=axisofeasy-246-dea-law-enforcement-data-breach-under-investigation/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
	</channel>
</rss>
