but johnny wesley is chief executive of the consulting c global cyber risk. you're joining us from washington, d. c. jody. thank you very much. make it simple for us. how does this sting operation led by the f b? i actually work. it was very interesting. it was quite clever. they, um, they managed to get access to the bought nets infrastructure, and they diverted the traffic from the button it to the f b i. and then the f. b. i planted a and instruction from the bot net to go out to its workers, a button that is like a wedding cake at the top is the controller, the button master. then there's a 2nd layer that's a tier of prophecies that puts out commands to the lower tier of worker, but so computers infected there, about $700000.00 of them globally. so the f b, i got the proxy box in the middle layer to push out an instruction to the 700000 bots to go download this, the software which it did. but the software was designed to uninstall the malware on all those computers and to prevent the bot net from the re infecting the computer. so it was very clever. they