Unveiled – As done by “GoMoPa” – Cyber Bulletin: Korean Malware Potentially Used in Sony Pictures Attack

Become a Patron!
True Information is the most valuable resource and we ask you to give back.


The following bulletin was posted on the document sharing website Scribd by Politico Cybersecurity Editor Shaun Waterman.  The bulletin refers to Korean malware used by “unknown computer network exploitation (CNE) operators” that is believed to have been used in the recent attack on Sony Pictures Entertainment.  These actions ressemble to the “GoMoPa” cyber-attacks. The bulletin was first reported by Reuters on December 1, 2014.


FBI Liaison Alert System #A-000044-mw

  • 5 pages
  • December 1, 2014


The FBI is providing the following information with HIGH confidence:

Destructive malware used by unknown computer network exploitation (CNE) operators has been identified. This malware has the capability to overwrite a victim host’s master boot record (MBR) and all data files. The overwriting of the data files will make it extremely difficult and costly, if not impossible, to recover the data using standard forensic methods. Analysis of this malware is presented to provide the computer network defense (CND) community with indicators of this malware.


The FBI is providing the following information with HIGH confidence:

This group uses some custom tools that should be immediately flagged if detected, reported to FBI CYWATCH, and given highest priority for enhanced mitigation.
The aforementioned actors have used identified domains names and IP addresses as both source and/or destination IPs. The FBI is distributing the indicators associated with this attack to enable network defense activities and reduce the risk of similar attacks in the future. The FBI has high confidence that these indicators are being used by CNE operators for further network exploitation. The FBI recommends that your organization help victims identify and remove the malicious code.

Below are descriptions of malware and associated malware signatures:

The malware has the following characteristics:

File: d1c27ee7ce18675974edf42d4eea25c6.bin
Size: 268579 bytes (262.3 KB)
MD5: D1C27EE7CE18675974EDF42D4EEA25C6
PE Compile Time: 2014-11-22 00:06:54
Language pack of resource section: Korean

The original filename of this file is unknown, but it was likely “diskpartmg16.exe”. This file serves as a dropper. It drops destructive malware, “igfxtrayex.exe”. When the dropper file was executed, it started a second instance of itself with “-i” as an argument, then terminated.

The second instance of the dropper file installed itself as the “WinsSchMgmt” service with “-k” as a command line argument, started the service, then terminated.

The “WinsSchMgmt” service executed the file with “-k” as an argument, which started another instance of the file using “-s” as an argument.

The “-s” instance dropped and executed “igfxtrayex.exe”, created “net_ver.dat”, and began generating network traffic over TCP ports 445 and 139 to victim IP addresses.

The following files were added:
C:\Documents and Settings\User\Desktop\igfxtrayex.exe

The following strings of interest were in this dropper file:

– – – BEGIN STRINGS – – –
cmd.exe /q /c net share shared$ /delete
cmd.exe /q /c net share shared$=%SystemRoot%
cmd.exe /q /c net share shared$=%SystemRoot% /GRANT:everyone, FULL
cmd.exe /c wmic.exe /node: ”%s” /password: “%s” PROCESS CALL CREATE “%s” >
Windows Schedule Management Service
– – -END STRINGS – – –

File: net_ver.dat
Size: 4572 bytes (4.5 KB)
MD5: 93BC819011B2B3DA8487F964F29EB934

This is a configuration file containing what appear to be hostnames, IP addresses, and the number 2. Entries in the file have the structure “HOSTNAME | IP Address | 2”. The victim IP addresses in this file correspond with the victim IP addresses listed under the file with MD5 hash D1C27EE7CE18675974EDF42D4EEA25C6 (noted above).

File: igfxtrayex.exe
Size: 249856 bytes (244.0 KB)
MD5: 760c35a80d758f032d02cf4db12d3e55
PE Compile Time: 2014-11-24 04:11:08
Language pack of resource section: Korean

This file is destructive malware: a disk wiper with network beacon capabilities. If “igfxtrayex.exe” is run with no parameters, it creates and starts a copy of itself with the “–i” argument. After 10 minutes, the “igfxtrayex.exe” makes three copies of itself and places them in the same directory it was executed from. These copies are named according to the format “taskhostXX.exe” (where X is a randomly generated ASCII character). These copies are then executed, each with a different argument (one being “-m”, one being “-d” and the other “-w”). Network connection attempts are made to one of three hard-coded IP addresses in a random order to either port 8080 or 8000. If a connection to the IP address cannot be made, it attempts to connect to another of the three IP addresses, until connections to all three IP addresses have been attempted. The following command-line string is then executed: “cmd.exe /c net stop MSExchangeIS /y”. A 120 minute (2 hour) sleep command is issued after which the computer is shutdown and rebooted.

File: iissvr.exe
Size: 114688 bytes (112.0 KB)
MD5: e1864a55d5ccb76af4bf7a0ae16279ba
PE Compile Time: 2014-11-13 02:05:35
Language pack of resource section: Korean

This file when executed starts a listener on localhost port 80. It has 3 files contained in the resource section, all xor’d with 0x63.

File: usbdrv3_32bit.sys
Size: 24280 bytes (23.7 KB)
MD5: 6AEAC618E29980B69721158044C2E544
PE Compile Time: 2009-08-21 06:05:32

This SYS file is a commercially available tool that allows read/write access to files and raw disk sectors for user mode applications in Windows 2000, XP, 2003, Vista, 2008 (32-bit). It is dropped from resource ID 0x81 of “igfxtrayex.exe”.

File usbdrv3_64bit.sys
Size: 28120 bytes (27.5 KB)
MD5: 86E212B7FC20FC406C692400294073FF
PE Compile Time: 2009-08-21 06:05:35

This SYS file is a also a commercially available tool that allows read/write access to files and raw disk sectors for user mode applications in Windows 2000, XP, 2003, Vista, 2008 (64-bit). It is dropped from resource ID 0x83 of “igfxtrayex.exe”.


The following Snort signature can be used to detect the beacon traffic, though by the time the beacons occur, the destructive process of wiping the files has begun:

Alert tcp any any – > [,,] [8080, 8000] (msg: “wiper_callout”; dsize:42; content: “|ff ff ff ff|”; offset: 26; depth: 4; sid: 314;)

The following YARA signatures will detect this malware on the host:

rule unknown_wiper_str{

meta: unique string in wiper malware


$STR1 = “#99E2428CCA4309C68AAF8C616EF3306582A64513E55C786A864BC83DAFE0C78585B692047273B0E55275102C66” fullword nocase

$MZ = “MZ”


$MZ at 0 and $STR1


rule unknown_wiper_IPs{

meta: unique IPs in wiper malware


$IP1 = “” fullword nocase
$IP2 = “” fullword nocase
$IP3 = “” fullword nocase
$MZ = “MZ”


$MZ at 0 and all of them


rule unknown_wiper_error_strings{

meta: unique custom error debug strings discovered in the wiper malware


$ERR1 = “$MFT Record read failed.” fullword nocase
$ERR2 = “Drive Boot Sector read failed.” fullword nocase
$ERR3 = “SetFilePointer failed.” fullword nocase
$MZ = “MZ”


$MZ at 0 and all of them


Reporting Notice

The FBI encourages recipients who identify the use of tool(s) or techniques discussed in this document to report information to their local FBI field office or the FBI’s 24/7 Cyber Watch (CyWatch). Field office contacts can be identified at http://www.fbi.gov/contact-us/field. CyWatch can be contacted by phone at 855-292-3937 or by e-mail at CyWatch@ic.fbi.gov. When available, each report submitted should include the date, time, location, type of activity, number of people, and type of equipment used for the activity, the name of the submitting company or organization, and a designated point of contact.

Korean Malware, North Korea Malware, South Korea Malware Attack, South Korea Malware Attack, North Korea Malware, South Korea Malware Attack,


Video – OIL COLLAPSE: Putin to Go Nuclear on U.S. Sanctions

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Putin Wife,Putin News,Putin Net Worth,Putin Height,Putin Bay,Putin Memes,Putin Trump,Putin On The Ritz,Putin Age,Putin Trump Meeting,Putin And Trump,Putin Age,Putin And Trump Meeting,Putin Approval Rating,Putin And Obama,Putin Ally Crossword,Putin Assad,Putin And North Korea,Putin And Reagan,Putin As A Child,Putin Bay,Putin Bear,Putin Birthday,Putin Biography,Putin Bay Hotels,Putin Badass,Putin Bay Weather,Putin Blueberry Hill,Putin Bay Ferry,Putin Black Belt,Putin Children,Putin Calendar,Putin Clown,Putin Cartoon,Putin Chechnya,Putin Crying,Putin Canada,Putin Crimea,Putin Corruption,Putin Clinton,Putin Daughters,Putin Dog,Putin Documentary,Putin Dead,Putin Dog Merkel,Putin Definition,Putin Dancing,Putin Dolphins,Putin Drawing,Putin Dancing Gif,Putin Election,Putin Eating Popcorn,Putin English,Putin Election Results,Putin Erdogan,Putin Education,Putin Economy,Putin Eyes,Putin Exxon Deal,Putin Eye Color,Putin Family,Putin Food,Putin Funny,Putin Face,Putin Facts,Putin French,Putin Fishing,Poutine Fries,Putin Fascist,Putin Funny Face,Putin Gif,Putin Genocide,Putin Global Warming,Putin Gymnast,Putin Wife,Putin Gun,Putin Glasses,Putin Gangster,Putin Government,Putin Gorbachev,Putin Height,Putin Horse,Putin House,Putin Horseback,Putin Hockey,Putin History,Putin Hunting,Putin Hillary,Putin Human Rights,Putin Home,Putin Interview,Putin Images,Putin Israel,Putin Iq,Putin Isis,Putin In French,Putin Island,Putin Inauguration,Putin In Power,Putin Instagram,Putin Judo,Putin Jill Stein,Putin Journalists,Putin John Oliver,Putin Jehovah,Putin Jw,Putin Judo Gif,Putin Jesus,Putin James Bond,Putin Jehovah Witness,Putin Kgb,Putin Korea,Putin Karate,Putin Kremlin,Putin Kleptocracy,Putin Kim Jong Un,Putin Kraft Ring,Putin Kabaeva,Putin Khuilo,Putin Kid,Putin Laughing,Putin Laughing Gif,Putin Le Pen,Putin Languages,Putin Latest News,Putin Loves Trump,Putin Lollipop,Putin Likes Trump,Putin Limo,Putin Leadership,Putin Memes,Putin Merkel Dog,Putin Married,Putin Merkel,Putin Makeup,Putin Mask,Putin Martial Arts,Putin Meaning,Putin Macron,Putin Mansion,Putin News,Putin Net Worth,Putin North Korea,Putin New Wife,Putin Netanyahu,Putin Nato,Putin Net Worth Wiki,Putin Name Meaning,Putin Nickname,Putin Nuclear War,Putin On The Ritz,Putin On A Horse,Putin On Trump,Putin On North Korea,Putin Obama,Putin On The Ritz Gif,Putin On Syria,Putin Opposition,Putin On Snl,Putin On The Ritz Meme,Putin President,Putin Piano,Putin Palace,Putin Political Party,Putin Picture,Putin Poison,Putin Propaganda,Putin Puns,Putin Pop Song,Putin Popularity,Putin Quotes,Putin Quotes On Obama,Putin Queen Elizabeth,Putin Quotes Funny,Putin Quizlet,Putin Queen Elizabeth Stairs,Putin Quotes On Trump,Putin Quora,Putin Quote Immigrants,Putin Quebec,Putin Russia,Putin Reagan,Putin Riding Trump,Putin Rise To Power,Putin Reelection,Putin Richest Man In The World,Putin Riding A Ritz Cracker,Putin Response,Putin Ritz,Putin Rainbow,Putin Snl,Putin Syria,Putin Song,Putin Smiling,Putin Speech,Putin Shirt,Putin Speaking English,Putin Singing,Putin Salary,Putin Super Bowl Ring,Putin Trump,Putin Trump Meeting,Putin Twitter,Putin Trump Meme,Putin Trump Horse,Putin Trump Kiss,Putin Term Limit,Putin Trump Gif,Putin Term,Putin Today,Putin Ukraine,Putin Ussr,Putin Us Visit,Putin Unicorn,Putin Us Elections,Putin Un,Putin Undercover,Putin Urban Dictionary,Putin United Nations,Putin Us Relations,Putin Vs Trump,Putin Vs Obama,Putin Vladimir,Putin Video,Putin Vodka,Putin Vs Stalin,Putin Visits Trump,Putin Visit To White House,Putin Vampire,Putin Vs Obama Meme,Putin Wife,Putin Wiki,Putin Wealth,Putin Wink,Putin War,Putin Ww3,Putin Watch,Putin Winking Gif,Putin With Animals,Putin Walking,Putin Xi Jinping,Putin X Obama,Putin X Reader,Putin Xi,Putin And Trump,Putin And Obama,Putin And Assad,Putin And North Korea,Putin And Reagan,Putin And The Ritz,Putin Young,Putin Youtube,Putin Yacht,Putin Youth,Putin Yeltsin,Putin Yume,Putin Years As President,Putin Young Pictures,Putin Youth Army,Putin Yarmulke,Putin Zodiac Sign,Putin Zakaria,Putin Zassal,Putin Zassal Lyrics,Putin Zero Hedge,Putin Zeman,Putin Zil Limousine,Putin Zuma,Putin Za Makedonija,Putin Zapretio Albancima,

Revealed – NSA Snowden Releases Tally Update – *2,694 Pages

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

8 December 2014


4 December 2014. Add 63 pages to The Intercept. Tally now *2,627 pages of The Guardian first reported 58,000 files; caveat: Janine Gibson, The Guardian NY, said on 30 January 2014 “much more than 58,000 files in first part, two more parts” (no numbers) (tally now less than ~4.3%). DoD claims 1,700,000 files (~.015% of that released). ACLU lists 525 pages released by the press. However, if as The Washington Post reported, a minimum of 250,000 pages are in the Snowden files, then less than 1% have been released. Note Greenwald claim on 13 September 2014 of having “hundreds of thousands” of documents.

25 November 2014. Add 72 pages to Süddeutsche Zeitung.

17 November 2014, charts by Cryptome:


6 November 2014. At current rate of release it will take 31 to 908 years for full disclosure.

10 October 2014. Add 69 pages to The Intercept.

17 September 2014. Add 2 pages to The Intercept.

14 September 2014. Add 68 pages to Der Spiegel.

13 September 2014. In video Glenn Greenwald claims to have “hundreds of thousands” of documents (at 9:06 min)


Audio excerpt: http://youtu.be/xnfIp38AAhM

5 September 2014. Add 32 pages to The Intercept. Tally now *2,293 pages of The Guardian first reported 58,000 files; caveat: Janine Gibson, The Guardian NY, said on 30 January 2014 “much more than 58,000 files in first part, two more parts” (no numbers) (tally now less than ~3.5%). DoD claims 1,700,000 files (~.012% of that released). ACLU lists 525 pages released by the press. However, if as The Washington Post reported, a minimum of 250,000 pages are in the Snowden files, then less than 1% have been released.

31 August 2014. Add 34 pages to Der Spiegel.

25 August 2014. Add 55 pages to The Intercept.

16 August 2014. Add 26 pages to Heise.

12 August 2014. Add 6 pages to The Intercept.

5 August 2014. Add 12 pages to The Intercept.

4 August 2014. Add 23 pages to The Intercept.

25 July 2014. Add 4 pages to The Intercept.

14 July 2014. Add 8 pages to The Intercept.

14 July 2014. “I’m as mad as hell and I’m not going to take this anymore!”


Cryptome has sent a demand for accounting and public release specifics to holders of the Snowden documents: New York Times, Washington Post, The Guardian, Barton Gellman, Laura Poitrias, Glenn Greenwald, ACLU, EFF and John and Jane Does, US Citizens:


11 July 2014. See related essay, Open the Snowden Files, Krystian Woznicki, 11July 2014:

English: http://berlinergazette.de/wp-content/uploads/Open-the-Snowden-Files_KW_E.pdf
German: http://berlinergazette.de/open-the-snowden-files/

11 July 2014. @PaulMD notes this claim in the Washington Post, 11 July 2014:

We did not have an official NSA list of targets. We had to find them in the pile ourselves. Soltani, an independent researcher, did most of the heavy lifting on that. Because the information was not laid out in rows and columns, the way it might be in a spreadsheet, Soltani wrote computer code to extract what we were looking for from something like a quarter-million pages of unstructured text.

If a minimum of 250,000 pages are in the Snowden files, then less than 1% have been released.

9 July 2014. Add 8 pages to The Intercept.

9 July 2014. Add 1 page to Washington Post.

23 June 2014. Add 9 pages to Der Spiegel.

22 June 2014. Add 41 pages to Information-The Intercept.

Revised. This is included in entry above. 18 June 2014. Add 20 pages to The Intercept.

18 June 2014. Add 200 pages to Der Spiegel.

16 June 2014. Add 4 pages to Der Spiegel.

1 June 2014. Add 4 pages to New York Times.

23 May 2014. Cryptome placed online No Place to Hide, 310 pages, to compensate for failure to release Snowden documents:


http://cryptome.org/2014/05/npth.7z (27MB)

19 May 2014. The Intercept released 12 pages.

13 May 2014. Glenn Greenwald released 107 pages, some new, some previously published, some full pages, some page fragments.


5 May 2014. Related tally of redactions of Snowden releases:


30 April 2014. Add 19 pages to The Intercept.

30 April 2014. Add 2 pages to Dagbladet belatedly.

5 April 2014. Add 21 pages to The Intercept.

4 April 2014. ACLU offers NSA documents search: https://www.aclu.org/nsa-documents-search






If more lists please send: cryptome[at]earthlink.net

2 April 2014.

29 March 2014. Add 1 page to Der Spiegel.

22 March 2014. Add 3 pages to Der Spiegel.

22 March 2014. Add 2 pages to New York Times.

21 March 2014. Add 7 pages to Le Monde.

20 March 2014. Add 6 pages to The Intercept.

18 March 2014. Add 4 pages to Washington Post.

13 March 2014. Add 1 page to The Intercept.

12 March 2014. Add 35 pages to The Intercept.

12 March 2014. Add 62 pages to New York Times. Add 2 pages to NRC Handelsblad.

7 March 2014. Add 8 pages to The Intercept.

27 February 2014. Add 3 pages to Guardian.

25 February 2014. Add 11 pages to NBC News.

24 February 2014. Add 4 pages to The Intercept.

24 February 2014. Add *50 pages to The Intercept (7 pages are duplicates of GCHQ Psychology).

18 February 2014. Add *45 pages to The Intercept (37 pages are duplicates of release by NBC News).

Note: Between 10-17 February 2014, The Intercept disclosed fragments of Snowden pages and the New York Times referenced some but as far as known did not release them in full. If available please send link.

10 February 2014. Add 1 page to NRC Handelsblad (via Electrospaces.blogspot.com).

7 February 2014. Add 15 pages NBC News.

5 February 2014. Add 14 pages NBC News.

31 January 2014. Add 27 pages to CBC News.

27 January 2014. Add 47 pages to NBC News.

27 January 2014. Add 18 pages to Anonymous via New York Times.

16 January 2014. Add 8 pages to The Guardian.

* 14 January 2014. Add 21 pages to Information.dk (duplicate).

* 13 January 2014. Add 4 pages to Information.dk (duplicate).

Related Snowden Document and Page Count Assessment:


* 5 January 2014. Add 16 pages to Der Spiegel (30 December 2013. No source given for NSA docs). Tally now *962 pages (~1.7%) of reported 58,000. NSA head claims 200,000 (~.50% of that released).

4 January 2014. The source was not identified for *133  pages published by Der Spiegel and Jacob Appelbaum in late December 2013. They are included here but have not been confirmed as provided by Edward Snowden. Thanks to post by Techdirt.

Glenn Greenwald tweeted:

Glenn Greenwald @ggreenwald, 8:05 AM – 29 Dec 13@Cryptomeorg @ioerror I had no involvement in that Spiegel article, ask them – and they don’t say those are Snowden docs.

Matt Blaze tweeted, 11:24 AM – 2 Jan 14

matt blaze @mattblazeIf there are other sources besides Snowden, I hope journalists getting docs are careful to authenticate them (& disclose uncertainty).

3 January 2014. Add 13 pages to Washington Post.

3 January 2014. See also EFF, ACLU and LeakSource accounts:




2 January 2014. Add 1 page to Washington Post published 10 July 2013.

* 31 December 2013. Add 16 pages to Der Spiegel.

* 30 December 2013. Add 50 pages of NSA ANT Catalog by Jacob Appelbaum (no source given for NSA docs).

* 30 December 2013. Add 21 pages from 30C3 video by Jacob Appelbaum (no source given for NSA docs).

* 30 December 2013. Add 42 pages (8 duplicates) to Der Spiegel (no source given for NSA docs).

* 29 December 2013. Add 4 pages to Der Spiegel (no source given for NSA docs).

24 December 2013. Add 2 pages to Washington Post.

23 December 2013


We’ve yet to see the full impact of former National Security Agency contractor Edward Snowden’s unauthorized downloading of highly classified intelligence documents.

Among the roughly 1.7 million documents he walked away with — the vast majority of which have not been made public — are highly sensitive, specific intelligence reports, as well as current and historic requirements the White House has given the agency to guide its collection activities, according to a senior government official with knowledge of the situation.

The latter category involves about 2,000 unique taskings that can run to 20 pages each and give reasons for selective targeting to NSA collectors and analysts. These orders alone may run 31,500 pages.

13 December 2013. Add 26 pages to Trojkan (SVT). Tally now 797 pages (~1.4%) of reported 58,000. NSA head claims 200,000 (~.40% of that released). Australia press reports “up to 20,000 Aussie files.”

Rate of release over 6 months, 132.8 pages per month, equals 436 months to release 58,000, or 36.3 years. Thus the period of release has decreased in the past month from 42 years.

12 December 2013. Belatedly add 27 pages to Guardian and 18 pages to Washington Post.

21 November 2013. See also EFF and ACLU accounts:



3 November 2013

47 42 Years to Release Snowden Documents

Out of reported 50,000 pages (or files, not clear which), about 446 514 pages (>1% 1%) have been released over 5 months beginning June 5, 2012. At this rate, 89 100 pages per month, it will take 47 42 years for full release. Snowden will be 77 72 years old, his reporters hoarding secrets all dead.

NY Times, 3 November 2013:

Whatever reforms may come, Bobby R. Inman, who weathered his own turbulent period as N.S.A. director from 1977 to 1981, offers his hyper-secret former agency a radical suggestion for right now. “My advice would be to take everything you think Snowden has and get it out yourself,” he said. “It would certainly be a shock to the agency. But bad news doesn’t get better with age. The sooner they get it out and put it behind them, the faster they can begin to rebuild.”

Timeline of releases:

[See tabulation below for full timeline.]

5 October 2013

26 Years to Release Snowden Docs by The Guardian

Out of reported 15,000 pages, The Guardian has published 192 pages in fourteen releases over four months, an average of 48 pages per month, or 1.28% of the total. At this rate it will take 26 years for full release.

Edward Snowden will be 56 years old.
Glenn Greenwald will be 72.
Laura Poitras will be 75.
Alan Rusbridger will be 86.
Barton Gellman will be 78.
Julian Assange will be 68.
Chelsea Manning will be 52.
Keith Alexander will be 88.
Barack Obama will be 78.
Daniel Ellsberg will be 108.
This author will be 103.

Number Date Title Pages

  The Guardian   276
  27 February 2014 GCHQ Optic Nerve 3
21 16 January 2014 SMS Text Messages Exploit 8
20 9 December 2013 Spying on Games 2
18 18 November 2013 DSD-3G 6
19 1 November 2013 PRISM, SSO
SSO1 Slide
SSO2 Slide
18 4 October 2013 Types of IAT Tor 9
17 4 October 2013 Egotistical Giraffe 20*
16 4 October 2013 Tor Stinks 23
15 11 September 2013 NSA-Israel Spy 5
14 5 September 2013 BULLRUN 6*
13 5 September 2013 SIGINT Enabling 3*
12 5 September 2013 NSA classification guide 3
11 31 July 2013 XKeyscore 32
10 27 June 2013 DoJ Memo on NSA 16
9 27 June 2013 Stellar Wind 51
8 21 June 2013 FISA Certification 25
7 20 June 2013 Minimization Exhibit A 9
6 20 June 2013 Minimization Exhibit B 9
5 16 June 2013 GCHQ G-20 Spying 4
4 8 June 2013 Boundless Informant FAQ 3
3 8 June 2013 Boundless Informant Slides 4
2 7 June 2013 PPD-20 18
1 5 June 2013 Verizon 4

  Washington Post   297
  9 July 2014 NSA Emails 1
  18 March 2014 NSA SCALAWAG 2
  18 March 2014 NSA MYSTIC 2
  2 January 2014 Quantum Computer 2 10
  2 January 2014 Quantum Computer 3
  23 December 2013 NSA/CSS Mission 2
  11 December 2013 Excessive Collection 9
  11 December 2013 SCISSORS 2 7
  11 December 2013 SCISSORS 1 4
  11 December 2013 Yahoo-Google Exploit 6
  11 December 2013 Cable Spying Types 7
  11 December 2013 WINDSTOP 1
  11 December 2013 Co-Traveler 24
  11 December 2013 GSM Tracking 2
  11 December 2013 SIGINT Successes 4
  11 December 2013 GHOSTMACHINE 4
  5 December 2013 Target Location 1
  4 December 2013 FASCIA 2
  4 December 2013 CHALKFUN 1
  26 November 2013 Microsoft a Target? 4
  4 November 2013 WINDSTOP, SSO, Yahoo-Google 14
  30 October 2013 MUSCULAR-INCENSOR Google and Yahoo 4
  14 October 2013 SSO Overview 4
  14 October 2013 SSO Slides 7
  14 October 2013 SSO Content Slides 9
  4 October 2013 Tor 49
  4 October 2013 EgotisticalGiraffe 20*
  4 October 2013 GCHQ MULLENIZE 2
  4 October 2013 Roger Dingledine 2
  30 August 2013 Budget 17
  10 July 2013 PRISM Slide 1
  29 June 2013 PRISM 8
  20 June 2013 Warrantless Surveillance 25*
  7 June 2013 PPD-20 18*
  6 June 2013 PRISM 1

  Der Spiegel   * 413
  14 September 2014 GCHQ STELLAR 26
  14 September 2014 NSA Treasure Map 38
  14 September 2014 NSA Treasure Map New 4
  31 August 2014 NSA GCHQ Spy Turkey 34
  23 June 2014 NSA German SIGADs 9
  18 June 2014 NSA German Spying-2 200
  16 June 2014 NSA German Spying 4
  29 March 2014 NSA Spy Chiefs of State 1
  31 December 2013 QFIRE * 16
  30 December 2013 TAO Introduction * 16
  30 Deceber 2013 QUANTUM Tasking (8 duplicates of QUANTUMTHEORY) 28*
  30 December 2013 QUANTUMTHEORY 14
  29 December 2013 TAO ANT COTTONMOUTH (images)
(DE article)
  29 October 2013 NSA-CIA SCS 3
  27 October 2013 NSA-CIA SCS 2
  20 October 2013 Mexico President 1
  20 September 2013 Belgacom 3
  16 September 2013 SWIFT 3
  9 September 2013 Smartphones 5
  1 September 2013 French Foreign Ministry 0
  31 August 2013 Al Jazeera 0

  O Globo Fantastico   ~87
  7 October 2013 CSE Brazil Ministry 7
  8 September 2013 Petrobas ~60
  3 September 2013 Brazil and Mexico 20

  New York Times   124
  1 June 2014 NSA Identity Spying 4
  22 March 2014 NSA Huawei SHOTGIANT 2
  12 March 2014 NSA Stellarwind Classification
NSA FISA FAA Classification
AG Dissemination
NSA Cryptanalyist FISA Database
NSA Spying Timeline
  9 December 2013 Spying on Games 82*
  23 November 2013 SIGINT Strategy 2012-2016 5
  3 November 2013 SIGINT Mission 2013SIGINT Mission 2017 22
  28 September 2013 Contact Chaining Social Networks 1
  28 September 2013 SYANPSE 1
  5 September 2013 BULLRUN 4*
  5 September 2013 SIGINT Enabling 3*

  ProPublica   89
  9 December 2013 Spying on Games 82*
  5 September 2013 BULLRUN 4*
  5 September 2103 SIGINT Enabling 3*

  Le Monde   20
  21 March 2014 CSE SNOWGLOBE 7
  25 October 2013 NSA Hosts FR Spies 4
  22 October 2013 Wanadoo-Alcatel 1
  22 October 2013 Close Access Sigads 2
  22 October 2013 Boundless Informant 2
  22 October 2013 PRISM 11

  Dagbladet   15
  April 2014
December 2013
Norway Assistance 2
  19 November 2013 BOUNDLESSINFORMANT 13

  NRC Handelsblad   7
  12 March 2014 NSA Aids Dutch Anti-Piracy 2
  8 February 2014 MIVD BoundlessInformant
Cryptome mirror
  30 November 2013 Dutch SIGINT 3
  23 November 2013 SIGINT Cryptologic Platform 1

  Huffington Post   3
  27 November 2013 Muslim Porn Viewing 3

  CBC   36
  30 January 2014 CESC IP Profiling 27
  10 December 2013 NSA-CSEC Partnership 1
  10 December 2013 G8-G20 Spying 4*
  2 December 2013 G8-G20 Spying 3
  29 November 2013 G8-G20 Spying 1

  The Globe and Mail   18
  30 November 2013 CSEC Brazil Spying 18*

  SVT (Swedish TV)   2
  5 December 2013 Sweden Spied Russia for NSA 2

  L’Espresso   3
  6 December 2013 NSA Spies Italy 3

  Trojkan (SVT)   29
  11 December 2013 NSA Sweden FRA Relationship 1*
  11 December 2013 NSA 5 Eyes Partners 1
  11 December 2013 NSA Sweden FRA Agenda 8
  11 December 2013 NSA Sweden FRA RU Baltic 1
  11 December 2013 NSA GCHQ Sweden FRA COMINT 1
  11 December 2013 NSA Sweden FRA  XKeyscore Plan 5
  11 December 2013 NSA Sweden FRA XKeyscore Sources 1
  11 December 2013 NSA Sweden FRA XKeyscore Tor et al 3
  11 December 2013 NSA Sweden FRA XKeyscore Slide 1
  11 December 2013 NSA Sweden FRA Quantum 1 1
  11 December 2013 GCHQ Sweden FRA Quantum 1
  11 December 2013 NSA Sweden FRA Quantum Accomplishments 2
  9 December 2013 NSA and Sweden Pact 3*

  Jacob Appelbaum   * 71
  30 December 2013 NSA Catalog * 50
  30 December 2013 NSA Catalog Video Clips * 21

  Information.dk   63*
  19 June 2014 NSA Partners 41*
  14 January 2014 SSO (duplicate) 7*
  14 January 2014 PRISM (duplicate) 11*
  13 January 2014 5-Eyes Spy G8-G20 (duplicate) 4*

New York Times
  27 January 2014 NSA Smartphones Analysis 14
  27 January 2014 GCHQ Mobile Theme 4

  NBC News   87
  25 February 2014 GCHQ Cyber Effects 11
  7 February 2014 GCHQ Cyber Attack 15
  5 February 2014 GCHQ Anonymous 14
  27 January 2014 GCHQ Squeaky Dolphin 47

  The Intercept   522*
  4 December 2014 NSA AURORA GOLD et al 63
  10 October 2014 10 NSA Releases
Computer Network Exploitation Declass
National Initiative Task Security 2
National Initiative Task Security 1
Exceptionally Controlled Info Compartments
Exceptionally Controlled Info Pawleys
Exceptionally Controlled Information
Sentry Eagle 2
Sentry Eagle 1
Tarex Classification Guide
Whipgenie Classification Guide
  17 September 2014 NSA Visit by NZ Spy 2
  5 September 2014 Masterspy Quadrennial Report 2009 32
  25 August 2014 NSA ICREACH 55
  12 August 2014 GCHQ Covert Mobile Phones Policy 6
  5 August 2014 NCTC Terrorist Identifies 12
  4 August 2014 US-NSA Pays Israel $500,000 2
  4 August 2014 NSA-Israel Spying Pact 2013 3
  4 August 2014 Israel-US Spying Pact 1999 16
  25 July 2014 NSA Saudi Arabia 4
  14 July 2014 NSA JTRIG Tools-Techniques 8
  9 July 2014 NSA FISA Accounts 8
  19 June 2014 NSA Partners 41*
  19 May 2014 12 Various Pages 12
NSA Visit by GCHQ Lobban
PRISM with Olympics
  4 April 2014 GCHQ Full Spectrum Cyber
NSA 5-Eyes SIGDEV Conference
  20 March 2014 NSA Hunt Sysadmins 6
  13 March 2014 NSA Third Party 1
  12 March 2014 NSA HammerchantNSA UK on Mikey and Ibake


NSA Turbine and Turmoil

NSA Thousands of Implants

NSA More Than One Way

NSA GCHQ Quantumtheory

NSA Selector Types

NSA Quantum Insert

NSA Analysis of Converged Data

NSA Phishing and MTM Attacks

NSA Menwith Hill xKeyscore

NSA Industry Exploit

NSA 5 Eyes Hacking














  7 March 2014 NSA Ask Zelda 8
  24 February 2014 GCHQ Disruption 4
  24 February 2014 GCHQ Online Deception
(7 pages duplicates of GCHQ Psychology)
  18 February 2014 GCHQ Psychology37 Duplicates of NBC News *44
  18 February 2014 NSA-GCHQ Discovery 1
  Glenn Greenwald    
  13 May 2014 A variety of documents 107
  Cryptome   310
  23 May 2014 No Place to Hide (27MB) 310
  Heise   26
  16 August 2014 NSA GCHQ CSEC HACIENDA 26
  Süddeutsche Zeitung   7
  25 November 2014 Vodafone GCHQ Cables List and Slides 72


Edward Snowden Wife, Edward Snowden Movie, Edward Snowden Twitter, Edward Snowden Dead, Edward Snowden Quotes, Edward Snowden Interview, Edward Snowden Wiki, Edward Snowden Russia, Edward Snowden Net Worth, Edward Snowden 2017, Edward Snowden Age, Edward Snowden Antarctica, Edward Snowden Articles, Edward Snowden Actor, Edward Snowden And Trump, Edward Snowden And Julian Assange, Edward Snowden And Wikileaks, Edward Snowden Apush, Edward Snowden Ama, Edward Snowden And Lindsay Mills, Edward Snowden Biography, Edward Snowden Book, Edward Snowden Bin Laden, Edward Snowden Booz Allen, Edward Snowden Birthday, Edward Snowden Bbc, Edward Snowden Blog, Edward Snowden Birth Chart, Edward Snowden Bernie Sanders, Edward Snowden Bitcoin, Edward Snowden Cia, Edward Snowden Cnn, Edward Snowden Cast, Edward Snowden Chelsea Manning, Edward Snowden Current News, Edward Snowden Citizen 4, Edward Snowden Conservative, Edward Snowden China, Edward Snowden Chemtrails, Edward Snowden Contact, Edward Snowden Dead, Edward Snowden Documentary, Edward Snowden Definition, Edward Snowden Documentary Netflix, Edward Snowden Doc, Edward Snowden Donald Trump, Edward Snowden Dell, Edward Snowden Documentary Hbo, Edward Snowden Date, Edward Snowden David Hoffman, Edward Snowden Essay, Edward Snowden Email, Edward Snowden Ethics, Edward Snowden Ethics Essay, Edward Snowden Early Life, Edward Snowden Effect, Edward Snowden Ecuador, Edward Snowden Education, Edward Snowden Everything About Donald Trump, Edward Snowden Event, Edward Snowden Facts, Edward Snowden Family, Edward Snowden Film, Edward Snowden First Interview, Edward Snowden Facebook, Edward Snowden Father, Edward Snowden Full Movie, Edward Snowden Flat Earth, Edward Snowden First Tweet, Edward Snowden Fox News, Edward Snowden Guardian, Edward Snowden Glenn Greenwald, Edward Snowden Glasses, Edward Snowden Global Warming, Edward Snowden Gif, Edward Snowden Google, Edward Snowden Girlfriend Movie, Edward Snowden Good, Edward Snowden Grandfather, Edward Snowden Genius, Edward Snowden Hero, Edward Snowden Height, Edward Snowden House, Edward Snowden Hawaii, Edward Snowden High School, Edward Snowden Hong Kong, Edward Snowden History, Edward Snowden Heartbeat, Edward Snowden Haarp, Edward Snowden Hbo, Edward Snowden Interview, Edward Snowden Iq, Edward Snowden Instagram, Edward Snowden Interview 2013, Edward Snowden Imdb, Edward Snowden Interview 2017, Edward Snowden Images, Edward Snowden Interview 2016, Edward Snowden Income, Edward Snowden Iphone, Edward Snowden Job, Edward Snowden Journalist, Edward Snowden Japan, Edward Snowden Julian Assange Bradley Manning, Edward Snowden Java, Edward Snowden Journalism, Edward Snowden Joseph Gordon-levitt, Edward Snowden Julian Assange, Edward Snowden John Oliver Passwords, Edward Snowden Jean Michel Jarre, Edward Snowden Kunia, Edward Snowden Kimdir, Edward Snowden Katie Couric Interview, Edward Snowden Katie Couric, Edward Snowden Kaskus, Edward Snowden Kim, Edward Snowden Kasus, Edward Snowden Kfc, Edward Snowden Kim Jest, Edward Snowden Koenig, Edward Snowden Location, Edward Snowden Lindsay Mills Moscow, Edward Snowden Laptop, Edward Snowden Lindsay Mills, Edward Snowden Living, Edward Snowden Lawyer, Edward Snowden Life, Edward Snowden Latest News, Edward Snowden Latest, Edward Snowden Live Stream, Edward Snowden Movie, Edward Snowden Movie Netflix, Edward Snowden Movie Cast, Edward Snowden Military, Edward Snowden Movie Online, Edward Snowden Memes, Edward Snowden Middlebury College, Edward Snowden Married, Edward Snowden Moscow, Edward Snowden Medical Condition, Edward Snowden Net Worth, Edward Snowden Now, Edward Snowden News, Edward Snowden New York Times, Edward Snowden Netflix, Edward Snowden Natal Chart, Edward Snowden Nobel Prize, Edward Snowden Nsa Salary, Edward Snowden Npr, Edward Snowden Nationality, Edward Snowden On Trump, Edward Snowden Osama Bin Laden, Edward Snowden Obama, Edward Snowden Oscar, Edward Snowden On Movie, Edward Snowden On Twitter, Edward Snowden Openstack, Edward Snowden On Antarctica, Edward Snowden Os, Edward Snowden Original Interview, Edward Snowden Parents, Edward Snowden Political Views, Edward Snowden Privacy Tips, Edward Snowden Political Party, Edward Snowden Patriot Act, Edward Snowden Pictures, Edward Snowden Podcast, Edward Snowden Phone Case, Edward Snowden Poll, Edward Snowden Putin, Edward Snowden Quotes, Edward Snowden Quizlet, Edward Snowden Questions, Edward Snowden Quien Es, Edward Snowden Quote About Privacy, Edward Snowden Quotes Citizenfour, Edward Snowden Quick Facts, Edward Snowden Qualifications, Edward Snowden Russia, Edward Snowden Reddit, Edward Snowden Research Paper, Edward Snowden Real Name, Edward Snowden Residence, Edward Snowden Resume, Edward Snowden Robot, Edward Snowden Recommended Apps, Edward Snowden Reporter, Edward Snowden Russian, Edward Snowden Story, Edward Snowden Salary, Edward Snowden Status, Edward Snowden Signal, Edward Snowden Speech, Edward Snowden Security Tips, Edward Snowden Shirt, Edward Snowden Siblings, Edward Snowden Special Forces, Edward Snowden Still Alive, Edward Snowden Twitter, Edward Snowden Today, Edward Snowden Trump, Edward Snowden Timeline, Edward Snowden Ted Talk, Edward Snowden The Guardian, Edward Snowden Trailer, Edward Snowden The Movie, Edward Snowden T Shirt, Edward Snowden Tor, Edward Snowden Update, Edward Snowden Ufo, Edward Snowden Us Army, Edward Snowden University Of Michigan, Edward Snowden Used Tails, Edward Snowden Umich, Edward Snowden University Of Maryland, Edward Snowden Ufo Wikileaks, Edward Snowden Ufo Video, Edward Snowden Urban Dictionary, Edward Snowden Video, Edward Snowden Vpn, Edward Snowden Vice, Edward Snowden And Julian Assange, Edward Snowden Voice, Edward Snowden And Bradley Manning, Edward Snowden Vault 7, Edward Snowden Visa, Edward Snowden And Wikileaks, Edward Snowden Vanity Fair, Edward Snowden Wife, Edward Snowden Wiki, Edward Snowden Wired, Edward Snowden William And Mary, Edward Snowden Washington Post, Edward Snowden Who Is He, Edward Snowden Website, Edward Snowden Worth, Edward Snowden Wikileak, Edward Snowden Washington Post 2013, Edward Snowden Youtube, Edward Snowden Young, Edward Snowden Yahoo Answers, Edward Snowden Youtube Channel, Edward Snowden Youtube Documentary, Edward Snowden Yokota, Edward Snowden And Lindsay Mills, Edward Snowden Yify, Edward Snowden Zodiac Sign, Edward Snowden Zcash, Edward Snowden Zuckerberg, Edward Snowden Zoho, Edward Snowden Zizek, Edward Snowden Zimbabwe, Edward Snowden Zitate, Edward Snowden Zusammenfassung, Edward Snowden Zivilisation, Edward Snowden Zvi\u017eda\u010d,


Enthüllt – Stasi-Akte IM Melanie Im Bett mit Erich Mielke

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Prostitution in der DDR: Wie „IM Melanie“ dem MfS Informationen beschaffte


Wo Ausländer in der DDR Frauenkontakte suchten, lag am Ende meist das MfS mit im Bett.


Das älteste Gewerbe der Welt war in der DDR auf ganz andere Weise lukrativ als im Westen. Und die Stasi lag fast immer mit unter der Decke. In DDR-Bars jagten junge Frauen im Auftrag des MfS nach westlichen Gästen.


Das Mädchen wird an einem Sommerabend aufgegriffen, mitten in der Innenstadt von Halle. Zwei Polizisten bemerken ein Pärchen in einem Auto, routinemäßig werden die Papiere kontrolliert. Das Mädchen, gerade 18 Jahre alt, stammt aus Halle. Der Mann, mit dem sie zusammen ist, hat einen jugoslawischen Pass.

Nichts Kriminelles, keine Straftat weit und breit. Doch die Staatssicherheit, die die eingehenden Meldungen der Polizei routinemäßig prüft, sieht hier das, was sie einen „Ansatzpunkt“ nennt. Die 18-Jährige ist bereits zweimal zuvor in Gesellschaft von Personen angetroffen worden, die in der sogenannten Reisedatenbank der Abteilung VI des Ministeriums für Staatssicherheit erfasst sind. „Sie ist westlich eingestellt und verherrlicht die westliche Lebensweise“, vermerkt die Akte. Keine Kritik, sondern ein Grund mehr für Leutnant Horst Frauendorf, die junge Frau an ihrem Arbeitsplatz in einem großen Kaufhaus zu kontaktieren. Das Ziel ist, so steht es in der Akte, das lebensfrohe Mädchen als Inoffizielle Mitarbeiterin zu gewinnen, um ihre Verbindungen ins „Jugomilieu“ (MfS) zur Überwachung der in der DDR beschäftigten Arbeiter aus dem wegen seiner Alleingänge misstrauisch beäugten Bruderland zu nutzen.

Menschen weichkochen

Die Frau lehne „kategorisch ab“, notiert Frauendorf nach dem ersten Treff. Aber das MfS hat Methoden, Menschen weichzukochen. Allein die Angst, immer wieder kontaktiert zu werden, ändert die Ansicht der Hallenserin. Aus „politischer Überzeugung“, so steht es in der Akte, die das MfS unter dem Namen „IM Melanie“ führen wird, willige sie ein, Ausländer aus dem nicht-sozialistischen Ausland und Jugoslawien im Auge zu behalten.

IM Melanie ist nicht allein. Gerade die wenigen Ausländer, die sich zumeist aus beruflichen Gründen in der DDR aufhalten, gelten der Staatssicherheit als Gefahrenquelle. Nicht von ungefähr, wie die Unterlagen zeigen, die jetzt in der Außenstelle der Jahn-Behörde in Halle aufgetaucht sind: Mal singen bundesdeutsche Monteure „nach 22.20 Uhr faschistische Lieder“ wie ein IM Rose aus der Clubgaststätte in Halle-Süd berichtet. Mal versuchen harmlos wirkende Bauarbeiter in Schkopau die „Infiltration mit dem Gedankengut staatsmonopolistischer Herrschaftskreise“. Mal schmuggeln Ungarn hochwertige Konsumgüter ein, mal werden bei Jugoslawen „westliche Drogen in größerer Menge“ entdeckt.

Neben Kellnern, Kneipern und Hotelmitarbeitern, die für die Stasi versuchen, „den wahren Grund des Aufenthaltes“ von Bauarbeitern, Handlungsreisenden oder Wissenschaftlern aus dem Westen festzustellen, sind es vor allem junge Frauen wie Melanie, die gleichaltrige Anna und die etwas ältere Lisa, die für die Staatssicherheit interessant sind. Sie alle verkehren Mitte der 80er Jahre in einem sinnenfrohen Milieu aus Nachtbars und Kneipen in der Chemiearbeiterstadt Halle, immer auf der Suche nach dem schnellen Spaß, aber auch nach der großen Liebe. Es ist keine Prostitution im landläufigen Sinne, was die Mädchen betreiben. Zwar fahren sie normalerweise trotzdem zweimal im Jahr zur Leipziger Messe hinüber, wo ausländische Besucher 200 Westmark für „einmal GV“ zahlen, wie es in den Stasi-Akten heißt. Aber auch zwischen heimischen Adressen wie dem „Tusculum“, dem „Scirocco“ und der Panorama-Bar gibt es Westgeld-Präsente von Holländern, Bulgaren und Libyern.

Weg in den Westen

Wer richtig Glück hat, findet sogar einen Jugoslawen, der ihn heiratet. Das ist, zum Leidwesen des inzwischen zum Hauptmann beförderten Frauendorf, ein unwiderstehlicher Weg in den Westen. Dorthin dürfen jugoslawische Staatsbürger frei reisen. Heiraten sie eine DDR-Bürgerin, darf die mit rüber – und ist sie erst im Westen, wird sie zur Bundesbürgerin. Was ihrem jugoslawischen Mann automatisch ein Aufenthaltsrecht in der Bundesrepublik verschafft. Eine Win-Win-Aktion für beide Seiten, gegen die die Stasi vergebens nach einem Mittel sucht. Zehntausend Mark zahlen jugoslawische Männer für eine solche Scheinehe. Zwei Schachteln Zigaretten zu acht Mark gibt es pro Treff mit dem Führungsoffizier für die Frauen, die rechtzeitig vorwarnen sollen, wenn Bekannte aus dem Bereich „operativ bedeutsame NSW-Einreisende“ verdächtige Bemerkungen machen.

Die Akten sind ein Abgrund an Lügen, Schmeichelei und Notwehr, aufgeschrieben in konspirativen Wohnungen, die „Peter“ heißen. Hier sitzen MfS-Offiziere wie Frauendorf oder sein Kollege Hoffmann aller zwei Wochen mit ihren „Jugonutten“ (MfS-Akte) zusammen, um Ausländer in der DDR gemäß einer zentralen Planungsvorgabe von Minister Erich Mielke „unter operativer Kontrolle“ zu halten und „operativ zu bearbeiten“. Aufgeschrieben wird alles, was IM Melanie nur einfällt: Mal geht es um geschmuggelte Autoteile, mal um mutmaßlich demnächst einlaufende Ausreiseanträge, mal um Gerüchte über Aids-Fälle im Bezirk Halle und mal um den Wunsch, das MfS möge bei der Suche nach einem neuen Arbeitsplatz in der Gastronomie helfen. Tut es, gern sogar, denn Bars und bestimmte Kneipen gelten nicht nur den jungen Frauen als bestes Jagdgebiet, sondern auch ihren Führungsoffizieren. Hier treffen die einsamen Monteursherzen die keinem Abenteuer abgeneigten Mädchen, die sich nach Parfüm, Jeans und Quarzuhren aus dem Intershop sehnen.

Realität holt gelogene Dementi ein

Stasi-Chef Erich Mielke liegt meist mit im Bett, wie die Akten verraten. Mehrfach äußern Anna und Melanie den Verdacht, andere Stammbesucherinnen der einschlägigen Treffs arbeiteten für das MfS. Eine schwierige Situation für Frauendorf und Hoffmann, die es ja genau wissen, nun aber glaubwürdig dementieren müssen.

Im Fall von IM Melanie, die nach mehreren Lektionen mit „fachlich-tschekistischen Grundkenntnissen“ (MfS) ausgestattet ist und eine „positiv-operative Entwicklung“ nimmt, holt die Realität das gelogene Dementi ein. Schon im Frühjahr 1987 äußert die 20-Jährige, sie habe eine „allgemeine Unlust an der Zusammenarbeit“ mit dem MfS. Hoffmann greift noch einmal in die Kasse und spendiert für 54,10 Mark ein Geburtstagsgeschenk – Kosmetikartikel aus der Jugendmode. IM Melanie aber ist verloren. Noch im Sommer schließt die Staatssicherheit ihre Akte.

Revealed – Brazil Truth Commission Releases Report

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Truth commissioners giving the report to Brazilian President Dilma Rousseff this morning. Photo Credit: National Truth Commission website.

Almost thirty years after the end of Brazil’s military dictatorship, the Comissao Nacional da Verdade [National Truth Commission] today released its long awaited report on human rights violations by the security forces between 1964 and 1985. The report, which took two-and-a-half years to complete and totals over 1000 pages, represents the first formal attempt by Brazil as a nation to record its repressive past and provide a detailed accounting of the system of repression, the victims of human rights violations, as well as the identities of those who committed those crimes.

In contrast to the U.S. Senate report on torture released yesterday in Washington which redacted even the pseudonyms of CIA personnel who engaged in torture, the Brazilian report identified over 375 perpetrators of atrocities by name.

The report contains detailed chapters on the structure and methods of the repression during the military era, including targeted violence against women and children. The commission identified over 400 individuals killed by the military, many of them “disappeared” as the military sought to hide its abuses. During its investigation, the Commission located and identified the remains of 33 of the disappeared; some 200 other victims remain missing.

The report also sheds significant light on Brazil’s role in the cross-border regional repression known as Operation Condor. In a chapter titled “International Connections: From Repressive Alliances in the Southern Cone to Operation Condor,” the Commission report details Brazil’s military ties to the coup in Chile, and support for the Pinochet regime, as well as identifies Argentine citizens captured and killed in Brazil as part of a Condor collaboration between the Southern Cone military regimes.

This report opens a Pandora’s box of historical and legal accountability for Brazilians. For now it provides a verdict of history, but eventually the evidence compiled by the commission’s investigation could lead to a judicial accounting. “The Truth Commission’s final report is a major step for human rights in Brazil,” according to Brown University scholar, James Green,  “and the pursuit of justice for the victims of the state’s terror.”

In its recommendations, the Commission took the bold step of calling for a repeal of Brazil’s 1979 amnesty law which has, to date, shielded military officers from human rights prosecutions.

Those prosecutions could be aided by evidence from declassified U.S. documentation. In support of the Commission’s work, the Obama administration agreed to a special declassification project on Brazil, identifying, centralizing and reviewing hundreds of still secret CIA, Defense and State Department records from the 1960s, 1970s and 1980s. Last June, Vice President Biden personally delivered 42 documents into President Dilma Rousseff’s hands; more recently the U.S. Embassy passed another tranche of over 100 records, many of them from the CIA, to the Brazilian government. As part of a commitment Biden made to open U.S. archives, the administration is continuing to review hundreds of additional records to declassify and provide to the Brazilian government next year.

The Commissioners presented their report to President Rousseff on International Human Rights Day. Rousseff, herself a victim of torture by electric shock during the military dictatorship, was “moved to tears” as she received the report and received a standing ovation from the crowd that had gathered for the ceremony, according to the Washington Post. In her speech accepting the report, the President stated that “We hope this report prevents ghosts from a painful and sorrowful past from seeking refuge in the shadows of silence and omission.”


Read the three-volume Report

Brazil Truth Commission Report Website

Volume I: Part I – III

Volume I: Part IV-V

Volume II

Volume III: Introduction


Read Key Documents Provided by the United States

Document l: Department of State, “Widespread Arrests and Psychophysical Interrogation of Suspected Subversives,” Confidential, April 18, 1973

This intelligence cable, sent by the U.S. Consul General in Rio de Janeiro, provides detailed reporting on a “sophisticated and elaborate psychophysical” method of torture being employed by the Brazilian military against suspected militants. In response to growing international condemnation of human rights violations, the cable suggests, the Brazilian torturers have adopted more modern interrogation methods that leave less visible evidence of abuses. In cases where detainees are “eliminated,” the military is also deceiving the press by claiming they were killed in a “shoot-out” while trying to escape.

The cable was declassified on June 5, 2014, only eleven days before Biden’s trip to Brazil in order for him to provide it to President Rousseff as a diplomatic gesture. But key sections of the document are redacted, presumably at the request of the CIA, that identify the military units responsible for these atrocities — information that would be of critical use to the Brazilian Truth Commission as it attempts to hold the military accountable for the atrocities of the past.


Document 2: Department of State, “Political Arrests and Torture in São Paulo,” Confidential, May 8, 1973

The Consul General in Sao Paulo, Frederic Chapin, reports on a source described as “a professional informer and interrogator working for the military intelligence center in Osasco,” an industrial suburb of Sao Paulo. The source has provided graphic details on methods of abuse, including a Brazilian form of “waterboarding” that involved putting prisoners in vats of water that forced them to stand on their tiptoes for prolonged periods of time to be able to breath. The informant also provides a description of methods of executing prisoners so that their bodies could not be identified. Prisoners would be machine gunned from head to toe — a method referred to as “sewing” the suspect up.

This document was declassified in 2005, and initially provided to the Truth Commission by National Security Archive Brazil project director Peter Kornbluh. It played a key role in enabling researchers to identify the April 18, 1973, cable on psychophysical abuses, which is cited as a reference telegram. A memorandum of conversation with the informant/torturer, however, is also cited in this document and would be of exceptional value to the Truth Commission in obtaining additional information about the torture center in Osasco.


Document 3: Department of State, “Allegation of Torture in Brazil,” Secret, July 1, 1972

U.S. Ambassador William Rountree advises the State Department that openly protesting human rights “excesses” by the Brazilian military government will be counterproductive and “damage our general relations.” Ambassador Rountree encourages the State Department to oppose a piece of human rights legislation known as the “Tunney Amendment” which would link U.S. aid to Brazil to a U.S. government certification that the Brazilian regime was not engaged in human rights violations.


Document 4: Department of State, “The Esquadrão da Morte (Death Squad),” Limited Official Use, June 8, 1971

Ambassador Rountree submits an 11-page report on death squad activity in Brazil. He advises that there has been an “upsurge” of victims of unofficial operations in recent months, believed to be the work of off-duty policemen. In Sao Paulo, the death squads are reportedly led by Sergio Fleury, who has now been charged in at least one murder. Some of the victims are common prisoners, others political figures and militant opponents of the regime. Much of the information in the report is gleaned from newspaper articles; the report appears to contain almost no intelligence information.


Document 5: Department of State, “Conditions in DEOPS Prison as told by Detained American Citizen,” Confidential, October 7, 1970

This memorandum of conversation contains a report by a U.S. businessman, Robert Horth, who was detained by the military police in an apparent case of mistaken identity. Horth relates hearing from fellow Brazilian prisoners about torture at the prison where he is held in downtown Sao Paulo. The torture techniques include the Parrot Perch — known in Portuguese as “pau de arara” — and electrical shock to all parts of the body, as well as the “telephone technique” where an interrogator stands behind the seated prisoner and smacks both sides of his/her head repeatedly, almost destroying their eardrums.




Confidential – The Fall of the Berlin Wall, 25th Anniversary

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

The Fall of the Berlin Wall, 25th Anniversary

Documents show accident and contingency, anxiety in world capitals

East German crowds led the way, with help from Communist fumbles, self-fulfilling TV coverage, Hungarian reformers, Czechoslovak pressure, and Gorbachev’s non-violence

“Masterpieces of History:” The Peaceful End of the Cold War in Europe, 1989, a National Security Archive Cold War Reader (Malcolm Byrne, series editor), By Svetlana Savranskaya, Thomas Blanton and Vladislav Zubok