Category Archives: CYBER-STASI

Heinz Gerlachs “Erben” – GoMoPa, Medard Fuchsgruber und mutmasslich Rainer von Holst & Thomas Bremer – Cui bono ?

Es hat lange gedauert, aber nun ist das Rätsel wohl gelöst: Wer profitiert von Gerlachs Tod ?

  • GoMoPa konnte die eigene Position massiv ausbauen
  • Medard Fuchsgruber übernahm die DFI-Seite
  • Rainer von Holst, Doreen Trampe (Ex-GoMoPa) und Pierre Gersöne stecken mutmasslich hinter der anonymen Webseite gerlachreport.com
  • Thomas Bremer mit seinem Blog-Netzwerk im “Tal der Ahnungslosen” (DDR-Witz) zu Leipzig

In Kürze mehr…

 

 

Advertisements

Aktuelle Morddrohung von dubiosen Figuren mit Russland-Backgound

PULCH

WIR MACHEN DICH KALT; UND SPÜLEN DEINE ASCHE IN DIE TOILETTE

Die weiteren Details sind Gegenstand forensischer Untersuchung

Halloween-Scherz: Horror- Clown gibt sich als von Holst aus

 

 

 

Sie kennen das: Ein Clown sendet Ihnen eine E- Mail.

Der Clown nennt sich oder ist Rainer von Holst. Alles ohne Beweis. Was macht man damit ?  Richtig. Man fragt Google und die User.

Die Rainer von Holst-Clown Maske mit falscher E-Mail inklusive cc an “Polizei” ohne handfeste Beweise – Ist das ein gelungener Halloween-Scherz ?  Oder sind andere Horror-Clowns noch besser ?

a Adolf Hitler

b Benito Mussolini

c Rainer von Holst

d Nero

 

Wer hat die beste Horror-Clown-Frisur ?

a Fury

b Rainer von Holst

c Flipper

d Lassie

 
You will be the Judge !

 

Exposed – Rainer von Holsts Cyberweapon – Pierre Gersoene

Image result for pierre gersöne

Pierre Gersöne

The notorious Rainer von Holst publishes many anonymous blogs in the internet to threaten, extort, diffame and lie about his critics or victims.

The anonymous webmaster behind his network of blogs was trying to hide for sure good reasons.

Pierre Gersöne from East-Berlin has been exposed now

For all fans of Rainer von Holst and him for such memorable websites like

gomopacrime, investigoo, etc. pp

here are the contact details:

Pierre Gersöne

Medienhaus Gersöne UG
Fanningerstraße 54
D-10365 Berlin-Lichtenberg

Telefon: +49 (0)30 531 674 60
Telefax: +49 (0)30 531 674 65

http://www.medienhaus-gersoene.de

Registergericht: Amtsgericht Berlin-Charlottenburg
Registernummer: HRB 160218 B
Umsatzsteuer-Identifikationsnummer gem. § 27a UStG: DE295777375

Neue charmante und geistreiche Drohung – wohl von Rainer von Holst

Rainer von Holst hat diese gefälschte Email-Adresse wohl in der Schweiz angemeldet. Damit will er weitere Enthüllungen über ihn und seine dubiosen Firmen, insbesondere Enercrox, stoppen. Das analoge Vorgehen zu Gomopa, mit denen von Holst offensichtlich nicht nur die Sekretärin, Doreen Trampe teilt.
So sicher nicht, politisch inkorrekter Sprachakrobat!

Must See – Video – Urlaub in Dambeck

“Persistent” Cyber Targeting of Police, Emergency Services

A clip from a local television station in Montana shows an emergency alert that was generated by “unknown attackers” in February 2013. The attackers used default credentials to broadcast false emergency messages stating that the “bodies of the dead are rising from their graves and attacking the living.” Similar messages aired in several other states where similar systems were compromised by the attackers.

Cyber attacks against law enforcement, fire departments and other emergency services have become increasingly common and are likely to increase according to a recent intelligence assessment prepared by the Department of Homeland Security and the Multi-State Information Sharing and Analysis Center (MS-ISAC).  The assessment, which was distributed to law enforcement in September 2015 and was obtained by Public Intelligence, reviewed a number of “cyber attacks against the [emergency services sector or ESS] between February 2012 and May 2015,” finding that “targeting of the ESS will likely increase as ESS systems and networks become more interconnected and the ESS becomes more dependent on information technology for the conduct of daily operations—creating a wider array of attack vectors for cyber targeting.”  Recent incidents involving the use of telephony-denial-of-service (TDoS) attacks, ransomware as well as the exploitation of “critical hardware and software” including call-center communications-management software, closed-circuit TV camera systems, interactive voice response systems, and emergency alert systems are detailed in the assessment.

DHS and MS-ISAC assess that the “most prominent cyber actors targeting the ESS” are “criminal hackers” who have engaged in “numerous attacks against state and local networks, particularly law enforcement, in response to perceived social and legal injustices” and are “prone to announcing attacks to increase visibility and support for their cause.”  The assessment defines “criminal hackers” as “individuals or groups that commit a crime by illegally accessing or altering systems, often in furtherance of an ideological goal.”  The use of the term “criminal hackers” marks a departure from previous law enforcement bulletins which have used the terms “hacktivists” or “hacker groups” to describe ideologically-motivated cyber actors.  The term is also used in an FBI bulletin released in May 2015 titled “Criminal Hackers Target Police to Protest Perceived Injustices.”  The assessment distinguishes between these criminal hackers and “cybercriminals” who “carry out illegal activities on computer networks, such as carding schemes, ransom and extortion, theft of personally identifiable information, and account information to facilitate fraud.”

Criminal hackers “gain support for their political agenda—or to exact retribution for perceived social or legal injustices—have shown repeated interest in targeting the ESS” as is “evidenced by the numerous attacks against state and local networks, particularly law enforcement, in response to perceived social and legal injustices.”  However, DHS and MS-ISAC assess that their capabilities are not particularly sophisticated, limiting them to “low-level cyber operations, such as [denial of service or DoS] attacks, website defacements, and doxing (publishing of personally identifiable information), often attacking targets of opportunity.”  These low-level operations have proliferated in recent years, particularly in response to increased political controversy surrounding police brutality and excessive use of force.  The assessment also discusses several examples of these operations, often involving DoS attacks or doxing, including a series of DoS attacks conducted by the hacker collective Anonymous against the City of Madison, Wisconsin in 2014 to protest an officer-involved shooting.  The attack reportedly “affected some police, fire, and medical dispatch services; as well as city government Internet and e-mail communications, and online payment services.”

Though so-called “criminal hackers” are the most prominent cyber actors in DHS and MS-ISAC’s assessment, cybercriminals working for financial gain pose a “persistent threat” and have launched attacks significantly impacting ESS operations.

  • In May 2015, a Nevada county sheriff’s department and a Wisconsin police department were victims of a ransomware attack that encrypted both departments’ shared folders.  MS-ISAC later determined that the intrusions occurred as a result of visits to a legitimate website which had been compromised.
  • A city in Southern California and several local public-safety agencies were hit by ransomware in June 2014.  The compromise affected 100 computers and 10 servers.
  • A fire department in Northern California and a law enforcement agency in Southern California were infected by ransomware resulting in the compromise of one computer and one server in each location, making vital information unavailable.
  • In 2013, telephony denial of service (TDoS) attacks affected approximately 600 critical government phone systems nationwide, including 200 public-safety answering points (PSAPs).  After several days, the attackers reportedly requested $5,000 to cease the attacks.