Category Archives: BERND PULCH

MUMU 2 – Nigerian Cinema – Full Movie – Nollywood


A young man who has been on the reds hits a jackpot but prefers to be the playboy in Town. This triggers a series of events that led him back to square one.


SECRET – Federal Communications Commission Report on Google WiFi Spying

The following report is a less redacted version of the FCC’s findings on Google’s widespread collection of data from wireless networks in the United States and around the world.  The version released by the FCC contained a number of redactions that concealed key portions of the report.  The full version of the report was first published by the Los Angeles Times.


1. Between May 2007 and May 2010, as part of its Street View project, Google Inc. (Google or Company) collected data from Wi-Fi networks throughout the United States and around the world. The purpose of Google’s Wi-Fi data collection initiative was to capture information about Wi-Fi networks that the Company could use to help establish users’ locations and provide location-based services. But Google also collected “payload” data–the content of Internet communications–that was not needed for its location database project. This payload data included e-mail and text messages, passwords, Internet usage history, and other highly sensitive personal information.

10. Through counsel, Google retained Stroz Friedberg to evaluate the source code used in Google’s global Wi-Fi data collection effort. In an update posted on Google’s official blog on June 9, 2010, Google stated that the Stroz Friedberg report had been completed and, “[i]n short, it confirms that Google did indeed collect and store payload data from unencrypted WiFi networks, but not from networks that were encrypted.” The update included a link to the report.

11. Stroz Friedberg prepared its report based on a review of the code alone. The report explains that, to facilitate the mapping of Wi-Fi networks, the source code, known as “gslite,” used an open-source ”packet sniffing” program called Kismet to capture, parse, and store MAC addresses, SSIDs, and other information about Wi-Fi networks. According to the report, “All of this parsed header information is written to disk for frames transmitted over both encrypted and unencrypted wireless networks.” The report further explained, “The default behavior of gslite is to record all wireless frame data, with the exception of the bodies of encrypted 802.11 Data frames.” To determine whether a Wi-Fi network was encrypted, the gslite program searched for an “encryption flag.” “If the encryption flag identifie[d] the wireless frame as encrypted, the payload of the frame [was] cleared from memory and permanently discarded. If the frame’s encryption flag identifie[d] the frame as not encrypted, the payload … [was] written to disk in a serialized format …. ‘, The report noted that if a user of an unencrypted network engaged in a password-protected Internet session, such as an online banking transaction, gslite would store any information captured from the session because the encryption flag would indicate that the network was unencrypted. The information gathered would, however, be encrypted. In short, the software appears to have discarded data from encrypted networks, but not encrypted data transmitted over open networks. Stroz Friedberg never field tested the gslite program or examined any of the payload data that Google collected.

21. As Street View testing progressed, Google engineers decided that the Company should also use the Street View cars for “wardriving,” which is the practice of driving streets and using equipment to locate wireless LANs using Wi-Fi, such as wireless hotspots at coffee shops and home wireless networks. By collecting information about Wi-Fi networks (such as the MAC address, SSID, and strength of signal received from the wireless access point) and associating it with global positioning system (GPS) information, companies can develop maps of wireless access points for use in locationbased services. To design the Company’s program, Google tapped Engineer Doe, who was not a fulltime member of the Street View project team. As described further below, Engineer Doe developed WiFi data collection software code that, in addition to collecting Wi-Fi network data for Google’s location-based services, would collect payload data that Engineer Doe thought might prove useful for other Google services. In response to the LOI, Google made clear for the first time that Engineer Doe’s software was deliberately written to capture payload data.





Horror of The Zombies (The Ghost Galleon) – Full Movie – Zombies who like beautiful Models


Two models are stranded in a motor cruiser in the middle of the ocean. It’s only meant to be a publicity stunt, a way of stirring up interest in the boat itself; but they soon prove to be in real trouble. They’re set upon by a 16th century galleon enshrouded by a fog. They each board the ghost ship, and each one disappears. Soon, the sporting goods magnate who hired the two girls sets out to find them. He is joined by his conniving right-hand man; the head of the modeling agency; a third model who is a lover to one of the missing girls; and a scientist from the weather bureau who is convinced something supernatural is going on. They all end up on the galleon, where they discover its crew are the undead Satan-worshiping Knights Templar.


Unveiled – NYPD Occupy Wall Street May Day Advisory Bulletin



Occupy Wall Street (OWS) protesters are calling for a “General Strike” on Tuesday, May 1, urging workers not to go to work and students to boycott classes in protest of what organizers characterize as society’s economic inequality. No unions are expected to participate in the strike, and some have talked to reporters about the fact that they weren’t consulted in OWS’s decision to announce a General Strike. Nonetheless, some elements of organized labor are expected to participate in their own customary May Day rally (which has occurred since 2004), marching from Union Square to Foley Square to Bowling Green, with speeches at either end beginning at about 4:00pm and ending by 7:00pm. The union organizers involved in that march have sought a permit for it. Details are being worked out.

The “General Strike” was initially proposed by the Los Angeles node of OWS in November 2011, endorsed by Occupy Oakland at the end of January 2012, and subsequently endorsed by the OWS New York General Assembly on
February 14.

There are fissures within OWS, but a “respect for diversity of tactics,” which includes everything from peaceful protests to the kind of vandalism directed at Starbucks in April, when demonstrators tried to smash the windows at the Starbucks location at Astor Place, has been embraced by the movement.

Below is a list of events that are scheduled to be held on May 1. Although the list is comprehensive, various OWS postings have called for autonomous actions, splinter demonstrations, and flash mobs.

Event Assessment

The General Strike is the first of several major global demonstrations that the OWS movement has played a role in planning, including demonstrations scheduled for May 12, May 15, and May 17-21.3 As such, it should be expected that organizers have emphasized the importance of turnout and will be seeking maximum media coverage.

Political fissures that are present within the OWS movement may impact the strategies of demonstrators during individual protest actions; in particular, the Wildcat March is not an officially sanctioned OWS march and may attract militant elements from inside and outside the OWS movement that may seek to directly confront law enforcement officials using barricades, riot shields, and possibly weapons such as pipes and rocks.

Although OWS organizers have publicized a large number of the marches, demonstrations, and activities that will take place throughout the day, it should be expected that “pop-up” demonstrations, splinter demonstrations, and flash mobs may occur at any time, especially during “evening actions” that are planned for 7:00pm and later.

In their planning, the OWS NYCGA has endorsed solidarity based on a “respect for a diversity of tactics,” which suggests that autonomous actions of demonstrators using Black Bloc tactics may occur at any time.

The Beautiful Truth – Full Movie

Raised on a wildlife reserve in Alaska, 15-year-old Garrett was interested in the dietary habits of the farm animals. After the tragic death of his mother, Garrett’s father decided to home-school his son and assigned a book written by Dr. Max Gerson that proposed a direct link between diet and a cure for cancer.

Fascinated, Garrett embarks in this documentary on a cross-country road trip to investigate The Gerson Therapy. He meets with scientists, doctors and cancer survivors who reveal how it is in the best interest of the multi-billion dollar medical industry to dismiss the notion of alternative and natural cures

TOP-SECRET – Chicago Investment Advisor Indicted for Allegedly Causing Clients to Lose $1.5 Million in Fraud Scheme

CHICAGO—A Chicago investment advisor allegedly engaged in an investment fraud scheme that swindled clients, causing them to lose approximately $1.5 million, federal law enforcement officials announced today. The defendant, Dimitry Vishnevetsky, was charged with eight counts of mail or wire fraud and one count of bank fraud in a nine-count indictment returned yesterday by a federal grand jury. Vishnevetsky allegedly raised approximately $1.7 million from investors and misappropriated at least $1.5 million for his own purposes, including to pay for such business and personal expenses as mortgage and car payments, travel and vacations, restaurant bills, athletic club dues, and to make trades for his own benefit, while using additional investor funds to make Ponzi-type payments to clients.

Vishnevetsky, 33, of Chicago, will be arraigned at a later date in U.S. District Court. The charges were announced by Patrick J. Fitzgerald, United States Attorney for the Northern District of Illinois, and Robert D. Grant, Special Agent in Charge of the Chicago Office of the Federal Bureau of Investigation. Also yesterday, the Commodity Futures Trading Commission filed a civil enforcement lawsuit against Vishnevetsky and his companies in federal court in Chicago.

According to the indictment, Vishnevetsky offered and sold investments, including commodities and promissory notes, primarily through Hodges Trading, LLC, and Oxford Capital, LLC, which purported to be in the business of providing brokerage/management services to investors and of managing commodities funds, including the Oxford Global Macro Fund, the Oxford Global Arbitrage Fund, and the Quantum Global Fund, which existed in name only. He also offered and sold promissory notes, described as London Interbank Offered Rate (LIBOR) adjusted notes, through Hodges Trading, which also existed in name only.

The indictment alleges that between September 2006 and March 2012, Vishnevetsky schemed to defraud investors and potential investors by making false representations about the profitability of his prior and current trading, the use of the invested funds, the risks involved, the expected and actual returns on investments and trading, and false representations about Hodges Trading, Oxford Capital and the commodities funds. For example, Vishnevetsky created and provided some investors fraudulent trading results showing profits as high as 36 percent per year, the indictment alleges. “In fact, to the extent that Vishnevetsky engaged in trading, the trading consistently resulted in net losses, not profits,” the indictment states.

The bank fraud count alleges that between 2007 and 2010, Vishnevetsky made false statements to Merrill Lynch Bank & Trust concerning his income and assets to cause the bank to issue, and later modify, two loans totaling approximately $519,500 to purchase a condominium in Chicago. Vishnevetsky subsequently stopped making payments on the loans, the charges allege.

The government is being represented by Assistant U.S. Attorney Jacqueline Stern.

Each count of mail or wire fraud carries a maximum penalty of 20 years in prison and a $250,000 fine, while bank fraud carries a maximum penalty of 30 years in prison and a $1 million fine, and restitution is mandatory. The court may also impose a fine totaling twice the loss to any victim or twice the gain to the defendant, whichever is greater. If convicted, the court must impose a reasonable sentence under federal sentencing statutes and the advisory United States Sentencing Guidelines.

The investigation falls under the umbrella of the Financial Fraud Enforcement Task Force, which includes representatives from a broad range of federal agencies, regulatory authorities, inspectors general, and state and local law enforcement who, working together, bring to bear a powerful array of criminal and civil enforcement resources. The task force is working to improve efforts across the federal executive branch, and with state and local partners, to investigate and prosecute significant financial crimes, ensure just and effective punishment for those who perpetrate financial crimes, combat discrimination in the lending and financial markets, and recover proceeds for victims of financial crimes. For more information on the task force, visit:

An indictment contains only charges and is not evidence of guilt. The defendant is presumed innocent and is entitled to a fair trial at which the government has the burden of proving guilt beyond a reasonable doubt.