BERND PULCH.ORG – THE HARDER THEY COME THE HARDER THEY FALL -THE INDEPENDENT VOICE OF FREEDOM – NO MORE FAIRY TALES – NO GATES OR SOROS FUNDING – NO PROJECT SYNDICATE – SCHLUSS MIT MÄRCHENSTUNDE – Kein Relotius – Keine Hitler-Tagebücher – Keine Peanuts – Great Reset, Build Back Better, TOXDAT, STASI Liste, STASI Schläfer Liste, KGB Liste, BDVP Liste, DDR POLIZEI Liste, GOMOPA4KIDS-Pädophilen-Netzwerk, GOMOPA Opfer Liste, GOMOPA Täter, NO FAIRY TALES – No Relotius – No Hitler Diaries – No Peanuts – Great Reset – Build Back Better – TOXDAT, STASI List, STASI SLEEPER List, KGB List, BDVP List, STASI Names A-Z, DDR-EAST GERMAN POLICE List, Offshore List, WEF Lists, Leaks Lists, GOMOPA4KIDS-Pedophiles-Network, GOMOPA Victims List, GOMOPA Offender Names, Stalin, Berija, Mao, Xi, Kim, Pol Pot, Putin, Erich Mielke, Ehrenfried Stelzer, Monika Mucha, Michèle Mucha, Jochen Resch, Alexander Schalck-Golodkowski, Kim Philby, Wolfgang Schnur, IM Erika, Gregor Gysi, Gerhard Schroeder, Matthias Warnig, Friedhelm Laschütza, Angela Merkel, William Borm, Udo Albrecht, Gerhard Baumann, Gert Caden, Andreas Lorch, Anette Lorch, Britta Lorch, Catrin Lorch, Hermann Simm, Mischa Wolf, Peter Ehlers, Axel Hilpert, Thomas Promny, Jan Mucha, Klaus Croissant, Isabell Colonius, Sven Schmidt / Eagle IT, Gerd Löffler, Detlev K. Manthey, Dieter Feuerstein, Klaus-Dieter Maururg, Beate & Thomas Porten, Sonja Lüneburg, Rainer Rupp, Christel & Günter Guillaume – The One And Only Website With The License To Spy !
Become a Patron! True Information is the most valuable resource and we ask you to give back.
The following indictment of the Swiss bank Wegelin & Co. and several affiliated persons for conspiring to aid wealthy U.S. clients evade taxes is noteworthy for its detailed description of some of the complex methods used by tax evaders. For more information, see: Swiss Bank Indictment Details Tax Evasion Methods.
UNITED STATES OF AMERICA -v. – WEGELIN & CO., MICHAEL BERLINKA, URS FREI, and ROGER KELLER
Become a Patron! True Information is the most valuable resource and we ask you to give back.
von Marc-Oliver Rehrmann, NDR.de
Im Alter von 37 Jahren hat Udo Lindenberg bei einer FDJ-Veranstaltung für den Weltfrieden gesungen.
Jahrelang hat Udo Lindenberg sich um ein Konzert in der DDR bemüht, dann ist es so weit: Am 25. Oktober 1983 tritt der Sänger bei einer FDJ-Veranstaltung für den Weltfrieden im Palast der Republik in Ost-Berlin auf. Für Udo Lindenberg sollte sein etwa 20-minütiger Auftritt das einzige Konzert in der DDR vor dem Mauerfall bleiben. Dem Ministerium für Staatssicherheit (Stasi) beschert das Gastspiel einen Großeinsatz. Hunderte Mitarbeiter sollen für einen reibungslosen Ablauf sorgen. Viele aufschlussreiche Stasi-Akten zu dem Lindenberg-Konzert sind im Internet einzusehen – in der kürzlich gestarteten Online-Mediathek der Stasi-Unterlagen-Behörde.
00:00:00 / 00:04:44
Tagesthemen: Udo Lindenberg in Ost-Berlin
25.10.1983 22:00 Uhr
Die Tagesthemen mit Moderator Rüdiger Hoffmann berichten über den ersten Auftritt von Udo Lindenberg in der DDR – mit Ausschnitten aus dem Konzert im Palast der Republik.
4,25 bei 8 Bewertungen
“So grotesk, so abartig, so komisch”
Lindenberg kennt alle Stasi-Papiere über ihn. “Als ich kurz nach der Wende zum ersten Mal meine Stasiakte las, musste ich wegen all der Tragik dieses Spitzeltums erst mal’n Schock überwinden und kräftig durchatmen, weinenden Auges – später dann aber auch lachenden Auges, so grotesk, so abartig, so komisch war es gleichzeitig.” Der Hamburger Rocksänger las die Unterlagen sehr genau: “In meiner Akte steht zum Beispiel über meine Person: ‘Seine Erscheinung ist geprägt durch eine typische, fast standardisierte Kleidung (Filzhut, Röhrenhosen aus Gummi, Halbstiefel und T-Shirts meist schwarzfarben) und durch eine bewusst fläzige und lässige Gestik.’ Da sieht man mal, wie bescheuert die Stasi-Kontrollettis waren: Gummi? – Mensch, Jungs, das war Leder!”
Spitzel horcht Lindenberg backstage aus
Am 25. Oktober 1983 reist Udo Lindenberg gegen 12 Uhr über den Übergang Invalidenstraße in die DDR ein. “Ich war extrem nervös”, sagt Udo Lindenberg in der NDR Dokumentation “Die Akte Lindenberg – Udo und die DDR”. “Ich wusste, die ganze Nation schaut zu, wie ich das mache.” Was Lindenberg und seine Band nicht ahnen: Auch die Stasi schaut genau zu, was der Künstler und seine Musiker machen, ein “IM” (Inoffizieller Mitarbeiter) berichtet sogar direkt aus dem Umfeld des Sängers.
Reinhold Beckmann und Udo Lindenberg auf dem Weg zum Konzert im Palast der Republik in Ostberlin.
Der erste Stasi-Vermerk über Lindenberg stammt bereits aus dem Jahr 1976. Darin heißt es, der BRD-Musiker sei ein “mittelmäßiger Schlagersänger”, der “betont anarchistisch” auftrete. Und: “Der Begriff Panik wurde von ihm ständig verwandt.” Der Stasi war auch nicht entgangen, dass Lindenberg seit 1974 “Interesse an Auftrittsmöglichkeiten in der DDR” zeigt. “Ich würd’ so gerne bei euch mal singen, meine Freunde in der DDR, ne Panik-Tournee, die würd’s echt bringen, ich träume oft davon, wie super das doch wär'”, singt Lindenberg im Jahr 1976.
“Sonderzug nach Pankow” – Haftstrafen für DDR-DJs
Aber der Rocker, der in der DDR viele jugendliche Fans hat, wartet jahrelang vergeblich auf eine Einladung. Anfang 1983 legt Lindenberg dann mit dem Lied “Sonderzug nach Pankow” nach. Darin grüßt er den Staatsratsvorsitzenden und SED-Generalsekretär Erich Honecker und fordert “Honni” auf, nicht so ein “sturer Schrat” zu sein und ihn endlich im Arbeiter- und Bauernstaat singen zu lassen. Bei der DDR-Führung kommt der Song nicht gut an. Die Stasi urteilt am 31. Januar 1983 über das “Schmählied”: Der Text stellt “eine gemeine Diffamierung des Generalsekretärs unserer Partei als auch der gesellschaftlichen Verhältnisse und der Kulturpolitik der DDR dar”. Eine Verbreitung des Liedtextes in der Öffentlichkeit stelle objektiv eine Straftat der Beleidigung dar. Dem Geheimdienst ist es also ein Dorn im Auge, dass das Lied trotzdem im ganzem Land in Diskotheken gespielt wird. Nach einer Diskoveranstaltung im Bezirk Cottbus werden zwei 26- und 27-jährige “Schallplattenunterhalter” sogar zu je fünf Monaten Haftstrafe verurteilt.
“Honecker war nicht eingeschnappt”
FDJ-Funktionär Egon Krenz hat zusammen mit Udo Lindenberg auf der Bühne im Palast der Republik gestanden. (Archivbild)
Honecker selbst ist über das Lied wohl nicht sonderlich erbost. Sein langjähriger Weggefährte Egon Krenz berichtet nach der Wende von einem Gespräch mit Honecker über Lindenberg und den “Sonderzug nach Pankow”: “Ich konnte nicht erkennen, dass er eingeschnappt war wegen des Liedes”, sagte Krenz in einem NDR Interview.
Lindenberg bemüht sich um einen direkten Draht zu Honecker und schreibt ihm im August 1983 einen versöhnlichen Brief: “Mein Wunsch in diesem Lied, im Palast der Republik aufzutreten, ist ernstgemeint,” schreibt Lindenberg. “Auf jeden Fall lag es mir fern, Herr Staatsratsvorsitzender, Sie mit diesem Liedchen zu diskreditieren. Im Gegenteil.” Lindenberg schreibt weiter, er würde auch auf sein Honorar verzichten. “Und über das, was ich singen würde, läßt sich auch reden.” Der Brief endet mit: “Herzlichst Ihr Udo Lindenberg”.
Der Palast der Republik in Ost-Berlin: Hier trat Lindenberg im Herbst 1983 auf.
Und tatsächlich lädt die FDJ einige Wochen später Lindenberg ein. Er soll auf einer großen Friedensveranstaltung im Palast der Republik auftreten. Sie soll den “Höhepunkt im Kampf der Mitglieder der FDJ gegen die geplante Stationierung amerikanischer Mittelstreckenraketen in Westeuropa” darstellen. Es ist die Zeit der hitzigen Diskussionen über den NATO-Doppelbeschluss. Die US-Amerikaner wollen neue Raketen mit Atomsprengköpfen in Westeuropa aufstellen und die Sowjetunion zu Abrüstungsverhandlungen bringen.
Hunderttausende Menschen gehen in der Bundesrepublik auf die Straße. Auch Udo Lindenberg engagiert sich in der Friedensbewegung. Der Bundestag zur Zeit von Bundeskanzler Helmut Kohl sollte dann Ende November 1983 der Aufstellung der Raketen zustimmen.
1983: Das Lindenberg-Konzert im Stasi-Blick
Udo Lindenberg gibt am 25. Oktober 1983 in Ost-Berlin sein einziges DDR-Konzert vor dem Mauerfall. Wenige Stunden vor seinem Auftritt im Palast der Republik nimmt er an einer internationalen Pressekonferenz teil – typischerweise mit Hut. Vor den mehr als 100 Journalisten betont er, wie sehr er sich auf die geplante DDR-Tournee 1984 freue. Aus der Rundreise wird am Ende nichts.
Die Stasi verfolgt Udo Lindenberg am Tag seines Konzerts von seiner Einreise am Mittag bis zur Ausreise um Mitternacht. Diese Stasi-Akte aus dem Jahr 1976 zeigt, dass der DDR-Geheimdienst den Sänger schon länger im Blick hat. Lindenberg sei ein professioneller BRD-Musiker, der sich “als gleichgültiger, pessimistischer Mensch” gibt und betont anarchistisch auftrete.
Der Stasi entgeht nicht, dass “seit 1977 die von Lindenberg dargebotene Rock-Musik zunehmend politisch motiviert” ist. Sein Lied “Sonderzug nach Pankow” stellt nach Einschätzung des Geheimdienstes “eine Diffamierung des Generalsekretärs der SED” dar – also eine Beleidigung Honeckers.
Udo Lindenberg hofft, seine Chance auf einen Auftritt in Ost-Berlin mithilfe eines Briefs an Erich Honecker zu erhöhen. In dem Schreiben vom 23. August 1983 stellt der Musiker über sein Lied “Sonderzug nach Pankow” klar: “Mein Wunsch in diesem Lied, im Palast der Republik auftreten zu wollen, ist ernstgemeint.” Er habe nicht beabsichtigt, ihn “mit diesem Lied zu diskreditieren”.
Dann ist klar, dass Udo Lindenberg bei einer FDJ-Friedensveranstaltung im Palast der Republik auftreten wird. Aus dieser Stasi-Akte vom 17. Oktober 1983 geht hervor, dass die FDJ die Eintrittskarten nur “an bewährte Jugendliche” ausgeben will. An öffentlichen Kassen gibt es keine Karten zu kaufen. Lindenberg-Fans bieten offenbar bis zu 100 DM für eine Karte.
Viele nehmen Udo Lindenberg den geplanten Auftritt auf einer FDJ-Veranstaltung übel. “Es wird als skuril empfunden, daß die, die ihn verboten haben, ihn nunmehr für sich und abgesichert konsumieren wollen”, berichtet IM “Ernst” am 19. Oktober 1983 aus westdeutschen Künstler- und Journalisten-Kreisen.
Kurz darauf ist der Tag des Konzerts gekommen. Am Grenzübergang Invalidenstraße in West-Berlin warten am Mittag des 25. Oktober 1983 viele Journalisten auf Udo Lindenberg. Auch die Stasi ist vor Ort und macht dieses Foto.
Dann kommt der Wagen mit Udo Lindenberg an.
Lindenberg – unverkennbar mit Hut – gibt bei seiner Ankunft am Grenzübergang Interviews. Gleich links neben ihm steht Reinhold Beckmann, der damals als Kamera-Assistent für die ARD arbeitet. Später lässt Beckmann seine Eindrücke von diesem Tag in seinen NDR Dokumentarfilm “Die Akte Lindenberg – Udo und die DDR” einfließen.
Dieser Zeitplan – hier “Aktivitätenplan” genannt – offenbart, was Lindenberg an diesem Tag vorhat. Für 14 Uhr ist die Tonprobe im Palast der Republik vorgesehen. Aber zunächst geht es vom Grenzübergang zum Flughafen Schönefeld, wo …
… Udo Lindenberg auf FDJ-Funktionär Egon Krenz (3.v.l.) und US-Sänger Harry Belafonte (2.v.l.) trifft. Auch Belafonte wird am Abend bei der FDJ-Friedensveranstaltung auftreten.
Bei der Internationalen Pressekonferenz am Nachmittag mit Harry Belafonte und Udo Lindenberg hört die Stasi genau zu. Laut dieser Akte sind aus dem NSA (steht für “nichtsozialistisches Ausland”) 83 Journalisten anwesend. Das DDR-Fernsehen fragt offenbar nach der Rolle Lindenbergs in der westdeutschen Friedensbewegung.
In den Stasi-Akten findet sich auch diese Orignal-Einfahrtsgenehmigung für den Palast der Republik am Tag des Udo-Lindenberg-Konzerts.
Am Abend versammeln sich Hunderte Lindenberg-Fans am Palast der Republik. Sie haben keine Karten erhalten und feiern ihr Idol mit “Udo, Udo”-Sprechchören. Der Rocksänger beobachtet das Treiben von seinem Garderoben-Fenster aus.
Im Palast der Republik ist der große Saal gefüllt mit FDJ-Mitgliedern. “Für den Frieden der Welt” lautet ein Motto des Abends.
Dann betritt Udo Lindenberg die Bühne. “Ich singe heute Abend für den Frieden und alle Menschen in der DDR – zum ersten Mal hier in der Halle und für euch zu Hause an der Glotze,” sagt er zur Begrüßung.
“Von deutschem Boden darf nie wieder ein Krieg ausgehen. Weg mit allem Raketenschrott in der Bundesrepublik und in der DDR!”, sagt Lindenberg. Das DDR-Fernsehen überträgt die Veranstaltung am selben Abend in voller Länge.
Die Stimmung im Saal ist gedämpft. Wohl für die meisten anwesenden FDJ-Mitglieder in ihren blauen Hemden ist Udo Lindenberg kein Held, sondern ein ungeliebter Kritiker der SED-Führung.
Udo Lindenberg singt während seines rund 20-minütigen Auftritts auch das Lied “Wozu sind Kriege da?”.
In einer Stasi-Akte – datiert auf den 4. November 1983 – ist ein Bericht über ein Zusammentreffen des IM “Ernst” mit Udo Lindenberg vermerkt. Der Inoffizielle Mitarbeiter hat offenbar den Sänger hinter der Bühne getroffen. Laut Akte hat Lindenberg gesagt, dass sein Auftritt “prima gelaufen” sei – und ein Erfolg für die Friedensbewegung.
Udo Lindenberg sagt, er habe von den Festnahmen seiner Fans am Abend des Konzerts erst später erfahren.
In der DDR gibt es heftige Kritik etlicher SED-Mitglieder und von FDJ-Funktionären an dem Lindenberg-Konzert. In dieser Stasi-Akte heißt es dazu: “Sie verwiesen insbesondere darauf, daß die während des Auftritts von Lindenberg getätigten Äußerungen (Abschaffung der Raketen in Ost und West), seine vulgäre Sprache und sein dekadentes Äußeres nicht dem Grundanliegen dieser bedeutsamen Friedensmanifestation entsprochen haben.”
Im Stasi-Abschlussbericht vom 26. Oktober 1983 “zur politischen-operativen Sicherung” der FDJ-Veranstaltung im Palast der Republik heißt es: “Die Veranstaltung verlief ohne Vorkommnisse und das politische Ziel dieser Friedensveranstaltung wurde erreicht.” Es seien zudem “keine verstärkten Anreisen von negativ-dekadenter Jugendlicher” erfolgt. Gemeint sind offenbar Udo-Lindenberg-Fans.
1/23
Im Doppelpack mit Harry Belafonte
Das Lindenberg-Gastspiel fädelt sein Konzert-Manager Fritz Rau ein. Zu dem großen Friedensfest der FDJ im Palast der Republik sollen auch internationale Künstler auftreten. Der US-Sänger Harry Belafonte, Vietnamkriegs-Gegner und Friedenskämpfer, steht bereit. Für dieses verlockende Angebot schlucken die DDR-Oberen sogar eine Kröte, die ihnen Fritz Rau serviert: Belafonte tritt nur auf, wenn Udo Lindenberg singen darf. Und der westdeutsche Rocksänger lässt sich auf den Deal ein, weil er im Gegenzug die Zusage für eine große DDR-Tournee im Sommer 1984 erhält.
Westdeutsche Medien sind irritiert
Udo Lindenberg, hier 1977 vor der “Neuen Wache” in Ost-Berlin, ist privat öfter in der DDR gewesen.
Der Auftritt in Ost-Berlin sorgt schon im Vorfeld für viel Gesprächsstoff – nicht nur in der DDR. In westdeutschen Zeitungen werfen Kommentatoren ihm vor, sich vor den Karren der DDR spannen zu lassen. Lindenberg weist den Vorwurf zurück. “Ich lasse mich nicht kastrieren”, sagt Lindenberg Journalisten am Tag des Konzerts. Am Grenzübergang nach Ost-Berlin kündigt der Musiker zudem an: “Den Sonderzug werde ich nicht singen, weil der Text nicht mehr aktuell ist.” Honecker sei nicht mehr der “sture Schrat”. “Er lässt mich ja nun singen”, meint Lindenberg. Die Stasi verfolgt die Einreise genau, notiert in ihren Akten: Von 12.10 Uhr bis 12.23 Uhr gibt er dem ZDF ein Interview.
Ein Prost mit Buttermilch
Auf Ost-Berliner Seite wird Lindenberg dann von FDJ-Mitgliedern abgeholt. Zunächst geht es zum Flughafen Berlin-Schönefeld, wo kurz zuvor Harry Belafonte gelandet ist. Am Flughafen kommt es zu einem Treffen von Lindenberg mit dem US-Star und Egon Krenz, dem Ersten Sekretär des Zentralrats der FDJ. Für 14 Uhr ist dann die Tonprobe im Palast der Republik angesetzt. Dort kommt es zu einem weiteren Treffen mit Krenz, bei dem sie am Esstisch mit Buttermilch anstoßen. Das Lindenberg-Management hat darum gebeten, keinen Alkohol einzuschenken.
Stasi-Panne: Udo trifft seine DDR-Fans
Nach der Tonprobe kommt es zu einer Situation, die die Stasi unbedingt verhindern wollte. Udo Lindenberg verlässt den Palast der Republik nicht wie vorgesehen über den Haupteingang – wo die Journalisten warten -, sondern über den Bühneneingang am Marstall. Dort warten etwa 150 Jugendliche auf ihren Helden. Sie umringen ihn und nehmen ihn auf die Schultern. Die Stasi vermerkt später in ihren Akten, dass Lindenberg versucht habe, beruhigend auf die Jugendlichen einzuwirken.
Ein ARD-Kamerateam hält die Situation fest: “Es ist wichtig, dass wir über alle Grenzen hinweg und in allen Ländern singen und demonstrieren und fordern: Weg mit all dem Raketenschrott!”, ruft Lindenberg seinen Fans zu – immer noch auf den Schultern sitzend. “Und Schluss mit der Kamikaze-Rüstung! Wir wollen nicht eine Rakete sehen, nicht in der BRD und nicht in der DDR.”
Die Stasi-Unterlagen-Behörde hat eine Auswahl der Akten über das Lindenberg-Konzert am 25.10.1983 in Ost-Berlin zusammengestellt. Hier finden Sie diese Akten als PDF-Datei. extern
128 Journalisten bei der Pressekonferenz
Aus Stasi-Sicht ist dieses Zusammentreffen mit den Jugendlichen eine große Panne. In den Akten ist Unverständnis herauszulesen, warum Lindenberg über den Bühneneingang das Gebäude verlassen konnte. Lindenberg meint später über das Stasi-Malheur: “Sie dachten, sie könnten den kleinen Udo an die Kette legen. Das hat ja bekanntlich nicht geklappt, und mit einem kleinen Trick konnte ich dann zu den wahren Fans nach draußen.”
Als Udo Lindenberg dann in sein Auto einsteigt, um zu einer internationalen Pressekonferenz abzufahren, wird die Situation brenzlig. “Ich hatte das Gefühl, dass die Fans uns erdrücken”, erzählt Lindenberg viele Jahre später. Bei der Pressekonferenz betont Lindenberg seine Vorfreude auf die geplante DDR-Tournee im folgenden Jahr. Stasi-Mitarbeiter zählen genau, wie viele Journalisten vor Ort sind: 83 Journalisten aus dem “nichtsozialistischen Ausland” und 45 DDR-Journalisten. Die Geheimdienstler notieren auch genau, wer welche Frage stellt.
Keine Karten für Udo-Fans
Jugendliche, die keinen Einlass zum Lindenberg-Konzert gefunden haben, versuchen vor dem Palast der Republik die Absperrung der Volkspolizei zu durchbrechen.
Um 19 Uhr soll das Friedenskonzert beginnen. Der Palast der Republik ist für ungebetene Gäste abgesperrt. Mehrere Hundert Fans stehen hinter den Absperrgittern. Sie rufen immer wieder “Wir wollen Udo” und “Wir wollen rein”. Vergeblich. Denn die rund 4.200 Karten sind an treue FDJ-Mitglieder vergeben worden. In den Stasi-Akten heißt es, dass nur “bewährte Jugendliche” ausgewählt wurden, die “durch hohe persönliche Aktivität besondere Leistungen zur Stärkung unserer Republik vollbracht” haben. Alle Konzertbesucher sollten “im Blauhemd” kommen, zudem wurden sie auf den Abend vorbereitet – inklusive “Hinweise zum aktiven Mitgestalten der Atmosphäre der Veranstaltung”. Offenbar wurden die Teilnehmer zu “verhaltenem Applaus” aufgefordert. An den öffentlichen Kassen gab es keine Eintrittskarten zu verkaufen. Die treuen Udo-Fans müssen also draußen blieben. Die Stasi zählt rund 500 Jugendliche.
Überall nur “Blauhemden”
Drinnen ist der Saal gut gefüllt. Egon Krenz gibt die Marschroute für den Abend vor: “Wir sind hier, um zu bekunden: Wir wollen leben und nicht in einem vom USA-Imperialismus angezettelten Atomkrieg untergehen! Wir wollen Frieden, Frieden und nochmals Frieden!” Um 20.40 Uhr betritt Udo Lindenberg mit seiner Band die Bühne. Beim Blick ins Publikum wird ihnen schlagartig klar: Da sitzen nur FDJler in ihren Blauhemden, keine echten Fans. “Drinnen saßen ja nur linientreue Steiftiere unter Valium, die echten Paniker forderten draußen ihren Udo”, erinnert sich Lindenberg später. ARD-Korrespondent Peter Merseburger formuliert es in seinem Tagesthemen-Bericht so: “Das Publikum im Palast der Republik war so brav und diszipliniert, wie es ein Udo sonst nicht kennt.”
Der “Panik”-Rocker singt vier Lieder. Zwischen den Songs sagt er ans Publikum gewandt: “Von deutschem Boden darf nie wieder ein Krieg ausgehen!” Und fordert dann, dass auch die sowjetischen Raketen aus der DDR verschwinden. Das DDR-Fernsehen überträgt ab 20 Uhr das Konzert zeitversetzt – und in voller Länge. Auch die Tagesschau um 20 Uhr berichtet am selben Abend über das “Friedenskonzert”.
1983 durfte Udo Lindenberg in Ostberlin vor ausgewähltem Publikum singen. Erst sieben Jahre später ging für ihn ein Traum in Erfüllung: Er startete eine Tournee durch die DDR. mehr
Udo-Fans verhaftet und geschlagen
Draußen ist die Stasi weiter im Großeinsatz. An den Absperrungen kommt es zu Tumulten. Die Volkspolizei zieht viele Jugendliche aus der Menge, es gibt etwa 50 Festnahmen. Auf den Wachen werden viele Jugendliche misshandelt. “Später habe ich dann erfahren, dass die VoPos viele von ihnen zusammengeschlagen und eingeknastet hatten. Nur, weil sie Fans von diesem Sänger mit Hut waren. Krank und pervers”, urteilt Lindenberg. Er reist gegen Mitternacht wieder über die Invalidenstraße nach Westberlin aus. Die Ansammlung am Palast der Republik wird laut Stasi-Akten gegen 0.30 Uhr “komplett aufgelöst”.
DDR-Tournee 1984 fällt aus
Bei seiner DDR-Tournee Anfang 1990 tritt Udo Lindenberg auch in Schwerin auf.
Aus der eigentlich fest zugesagten DDR-Tournee mit dem “Panik”-Orchester wird am Ende doch nichts. Obwohl bereits ein schriftlicher Vertrag vorliegt. Die DDR-Oberen bekommen offenbar kalte Füße. Im Januar 1984 teilt die FDJ der zuständigen Stasi-Hauptabteilung XX mit: “Die vorgesehene Tournee des Udo Lindenberg in der DDR wird nicht stattfinden.” Ohne Gründe zu nennen. Das Risiko Lindenberg schien wohl nicht kalkulierbar.
Erst im Januar 1990 – knapp zwei Monate nach dem Mauerfall – kann Udo Lindenberg seine lang ersehnte DDR-Tournee antreten. Am 6. Januar 1990 trifft er in Suhl endlich auf seine Fans in Ostdeutschland. Rund 3.000 sind zur Konzerthalle gepilgert, um ihren Star zum ersten Mal live zu sehen. “Das ist ein großer Tag auch für mich als Privatmensch, nach all den Klemmigkeiten mit eurem Oberfuzzi Honecker”, sagt Lindenberg auf der Bühne. Beim Auftaktkonzert spielt der damals 43-Jährige den “Sonderzug nach Pankow” gleich zweimal, im Original und in einer neuen Version. In der heißt es: “Der Whisky, der ist sehr lecker, den trinken wir jetzt ohne den Erich Honecker.”
Die Tagesschau berichtet am selben Abend über das Konzert von Udo Lindenberg in Ost-Berlin.
Stasi Officer Uniform, Stasi Officer, Stasi Officer Interview, Stasi Officer Definition, Stasi Officer Ranks, Stasi Officer Movie, Former Stasi Officers, Ex Stasi Officers, Female Stasi Officers, Stasi Officer Definition, German Stasi Officer, Stasi Officer Interview, Stasi Officer Movie, Stasi Officer Ranks, Stasi Officer Uniform, Stasi Spitzel Beleidigung, Stasi Spitzel Liste, Stasi Spitzel Wikipedia, Stasi Spitzel Erfurt, Stasi Spitzel, Stasi-spitzel Im Erika, Stasi Spitzel System, Stasi Spitzel Namen, Stasi Spitzel In Dresden, Stasi Spitzel Heute, Stasi Spitzel Anderson, Stasi Spitzel Beleidigung, Stasi Spitzel Brd, Stasi Spitzel Bundeskanzler, Bekannte Stasi Spitzel, Stasi Spitzel Prenzlauer Berg, Stasi Spitzel Dynamo Dresden, Stasi Spitzel Dresden, Spitzel Der Stasi, Stasi Spitzel In Der Brd, Ddr Stasi Spitzel, Stasi Spitzel Erfurt, Stasi Spitzel Enttarnt, Stasi-spitzel Im Erika, Ehemalige Stasi Spitzel, Stasi Spitzel Film, Stasi Spitzel Gauck, Gysi Stasi Spitzel, Stasi Spitzel Heute, Stasi Spitzel Halle Saale, Stasi-spitzel Im Erika, Stasi Spitzel In Dresden, Stasi Spitzel In Der Brd, Stasi Spitzel Im, Stasi Spitzel Jena, Stasi Spitzel Kirche, Stasi Spitzel Liste, Stasi Spitzel Merkel, Stasi Spitzel Methoden, Stasi Spitzel Namen, Stasi Spitzel Namensliste, Stasi Spitzel Prenzlauer Berg, Prominente Stasi-spitzel, Stasi Spitzel Halle Saale, Stasi Spitzel Wikipedia, Stasi Spitzel Westen, Stasi Brothers, Stasi Definition, Stasi Eldredge, Stasi Museum, Stasi Movie, Stasi Bgc, Stasi Files, Stasi Uniform, Stasi Report, Stasi Prison, Stasi Agent, Stasi Archives, Stasi Ap Euro, Stasi Asphalt, Stasi Akten, Stasi Archives Berlin, Stasi Agents Today, Stassi Amazing Race, Stasi Article, Stasi And Gestapo, Stasi Brothers, Stasi Bgc, Stasi Berlin, Stasi Brothers Reviews, Stasi Brand, Stasi Bakery, Stasi Book, Stasi Brothers Paving, Stasi Berlin Wall, Stasi Bernard New Orleans, Stasi Commission, Stasi Cernadas, Stasi Cold War, Stasi Construction, Stasi Child, Stasi Crimes, Stasi City, Stasi Cake, Stasi Captain Gerd Wiesler, Stasi Commission Report, Stasi Definition, Stasi Documentary, Stasi Documents, Stasi Disguises, Stasi Define, Stasi Depue, Stasi Decomposition, Stasi Dallas Electrical Contracting, Stasi Death Squad, Stasi Deutsch, Stasi Eldredge, Stasi Eldredge Books, Stasi East Germany, Stasi Eldredge Quotes, Stasi Eldredge Becoming Myself, Stasi Esper, Stasi East Germany’s Secret Police, Stasi Eldredge Podcast, Stasi Eldredge Instagram, Stasi Eldredge Age, Stasi Files, Stasi Facts, Stasi From Bgc, Stasi Film, Stasi Files Online, Stasi Flag, Stasi From Bad Girl Club, Stabo Fargo, Stasi From Vanderpump Rules, Stassi From Vanderpump Rules, Stasi Germany, Stasi General Contracting, Stasi Grove Funeral Home, Stasi Gestapo, Stasi Glenn, Stasi Gang Stalking, Stasi German Shepherds, Stasi Grove Funeral Home In Olney, Stasi Grove Obituaries, Stasi Greek Meaning, Stasi Headquarters, Stasi Hand Signals, Stasi Headquarters Berlin, Stasi Head, Stasi Hitler, Stasi Headquarters Museum, Stasi Hva, Stasi History, Stasi Hartwick, Stasi Hair Salon, Stasi In Germany, Stasi Industries, Stasi Interrogation Techniques, Stasi Im, Stasi Images, Stasi In America, Stasi International Loss Adjusters, Stasi Informer, Stasi Interview, Stassi Instagram, Stasi Jokes, Stasi Jacket, Stasi Jail, Stasi Junction Road, Stasi Jalan Salib, Stasi Jail Museum, Stassi Jewelry, Stasi John Eldredge, Stasi Jean, Stasi Johnson Park Nicollet, Stasi Kennel, Stasi Kennel Belarus, Stasi Keramidis, Stasi Kountis Photography, Stasi Kara, Stasi Kgb, Stasi Koutali, Stasi Knight, Stasi Kranggan, Stasi Koehler, Stasi Logo, Stasi Longo, Stasi Landscaping, Stasiland, Stasi Lashes, Stasi Law, Stasi Lozada, Stasi Lubansky Np Ny, Stasi Leader, Stasi Leipzig, Stasi Museum, Stasi Movie, Stasi Methods, Stasi Meaning, Stasi Museum Leipzig, Stasi Merkel, Stasi Masonry, Stassi Memes, Stasi Movie East Germany, Stasi Museum Dresden, Stasi Nazi, Stasi Name, Stasi Novel, Stasi Nedir, Stasi Numbers Station, Stasi Numbers, Stasi News, Stasi Namen Alphabetisch, Stasi Officer, Stasi Organization, Stasi Omicidio, Stasi Oppression, Stasi Opfer, Stasi Officer Uniform, Stasi And Gestapo, Stassi Vanderpump Rules, Stasi Offizier, Liste Stasi Offizier, Stasi Police, Stasi Prison, Stasi Prison Berlin, Stasi Paving, Stasi Prison Berlin Tour, Stassi Phillies, Stasi Photos, Stasi Prison Museum, Stasi Primary Sources, Stassi Podcast, Stasi Quinn, Stasi Quizlet, Stasi Quotes, Stasi Quinn Ham, Stasi Quinn Ham Lyrics, Stasi Q, Stasi Quinn Twitter, Stasi Quinn Ham Mp3 Download, Stasi Quinn Ustream, Stasi Quinn Birthday, Stasi Report, Stasi Records, Stasi Ranks, Stasi Romeos, Stasi Russia, Stasi Records Act, Stasi Raus, Stasi Reddit, Stasi Rowe Instagram, Stasi Revel, Stasi Surveillance, Stasi State, Stasi Sprach Machine, Stasi Symbol, Stasi Stories, Stasis Synonym, Stasi Stussy, Stasi Safari, Stasi Spitzel, Stassi Schroeder Age, Stasi Tactics, Stasi The Brand, Stasi Torture, Stasi Techniques, Stasi Torture Methods, Stasi Training, Stasi The Untold Story, Stasi Townsend, Stasi T Shirt, Stasi Training Manual, Stasi Uniform, Stasi Ukraine, Stasi Usa, Stasi Ussr, Stasi Urban Dictionary, Stasi Uniform For Sale, Stasi Unterlagen, Stasi Unterlagen Gesetz, Stasi Vs Shelly, Stasi Vs Kgb, Stassi Vanderpump Rules, Stasi Vs Erika, Stasi Vs Natalie, Stasi Vs Nazi, Stassi Vanderpump Age, Stassi Vanderpump Rules Birthday, Stassi Vanderpump Instagram, Stassi Vanderpump Rules Snapchat, Stasi Wiki, Stasi Weapons, Stasi Ww2, Stasi Waleski Chase, Stasi Westbury, Stasi Water Cell, Stasi War Crimes, Stasi Wolf, Stasi Wolf Amazon, Stasi Wolf By David Young, Stasi X-ray, Stasi Xios, Stasi Xalandri, Stasi Cafe Xios, Stasi Ha Xxii, Stasi Metro Xalandri, Stasi Metro Xolargos, Stasi Abteilung Xii, Stasi Abteilung Xv, Stasi Abteilung X, Stasi Youtube, Stasi Yakobus, Stasi York, Stasi Y Kgb, \U03c3\u03c4\u03b1\u03c3\u03b7 \U03c5\u03c0\u03bd\u03bf\u03c5, Youtube Stasi Eldredge, Yasmin Stasi, Stasi New York Daily News, Stasi New York Times, Stasi Museum Yelp, Stasi Zersetzung, Stasa Zajovic, Stasa Zlatar, Stasa Zujovic, Stasa Znacenje Imena, Stasa Zajovic Biografija, Stasi Zentrale, Sta\u0161a Zurovac, Stasi Zentrale Dresden, Stasi Zentrale Leipzig, Stasi Listening Devices, Stasi Liste, Stasi Liste Alphabetisch, Stasi Liste Mitarbeiter, Stasi Liste Pdf, Stasi Liste Download, Stasi Listen, Lisa Stasi, Stasi Liste Im, Stasi Liste Der Dienststelle, Stasi Agents List, Stasi Informants List, Liste Stasi Mitarbeiter, List Of Stasi Agents, Stasi Salons Price List, Stasi Im Liste, Stasi Im Westen, Stasi Im Erika, Stasi Im Ausland, Stasi Im Unterricht, Stasi Im Victoria, Stasi Im Alltag, Stasi Im Liste Download, Stasi Im Ausland, Stasi Im Alltag, Stasi Im Alltag Der Ddr, Stasi Im Anzahl, Stasi Im Bundestag, Stasi Im Bezahlung, Stasi Im Brandenburg Landtag, Stasi Im Bezirk Halle, Stasi Im Bezirk Cottbus, Stasi Im Brandenburger Tor, Im Stasi Bedeutung, Stasiboom Im Herzogtum, Stasi Offiziere Im Besonderen Einsatz, Stasi Im Liste Berlin, Stasi Im Liste Cottbus, Stasi Im Bezirk Cottbus, Im Stasi Liste Chemnitz, Stasi Im Decknamen, Stasi Im Ddr, Stasi Im Dresden, Stasi Im Ddr-sport, Stasi*dresden*im Liste, Stasi Im Liste Download, Stasi Im Erika, Stasi Im Eichsfeld, Stasi Im Einsatz, Stasi In Erfurt, Stasi-spitzel Im Erika, Stasi Offiziere Im Besonderen Einsatz, Stasi Im Film, Stasi Im Freitag, Im Filius Stasi, Stasi Im Geschichtsunterricht, Stasi Im Harz, Stasi In Halle, Stasi Im Liste Halle Saale, Stasiboom Im Herzogtum, Im Hardy Stasi, Stasi Im Bezirk Halle, Im Helene Stasi, Stasi Akten Im Internet, Stasi Liste Im Internet, Aufgaben Der Stasi Im Inland, Im Jump Stasi, Stasi Im Klarnamen, Stasi Im Kalten Krieg, Schweizer Im Stasi Knast, Die Stasi Kam Im Morgengrauen, Stasi Im Liste, Stasi Im Liste Download, Stasi Im Larve, Stasi Im Liste Berlin, Stasi Im Liste Dresden, Stasi Im Liste Halle Saale, Stasi Im Listen, Stasi Im Liste Leipzig, Stasi Im Mitarbeiter, Stasi I.m, Im Stasi Mitarbeiter Liste, Stasi Mitarbeiter Im Westen, Im Stasi Merkel, Stasi Museum I Berlin, Stasi Museet I Berlin, Stasi Im Namen, Stasi Im Namensliste, Stasi-mitarbeiter Im Netz, Im Notar Stasi, 100.000 Stasi-mitarbeiter Im Netz (Update), 100.000 Stasi-mitarbeiter Im Netz, Stasi Im Om, Stasi Im Osten, Stasi Offiziere Im Besonderen Einsatz, Stasi Im Parlament, Stasi Im Raw Zwickau, Stasi Im Radler, Stasi Im Westen Die Unterwanderte Republik, Stasi Im Sport, Stasi-spitzel Im Erika, Stasi Staat Im Staat, Stasi Spione Im Westen, Stasi Im Liste Halle Saale, Stasi Spitzel Im, Stasi Im Ddr-sport, Stasi Im Unterricht, Stasi Im Untergrund, Stasi Und Im, Die Stasi Im Unterricht, Stasi Im Westen Die Unterwanderte Republik, Stasi Im Victoria, Stasi Im Viktoria, Stasi Im Vorlauf, Stasi Im Vogtland, Stasi Im Volksmund, Gestapo Und Stasi Im Vergleich, Stasi Im Westen, Stasi Im Westen Die Unterwanderte Republik, Im Stasi Wiki, Im Stasi Wikipedia, Stasi Mitarbeiter Im Westen, Stasi Spione Im Westen, Stasi Agenten Im Westen, Stasi Morde Im Westen, Stasi Im Raw Zwickau, Stasi Agents, Stasi Agents In Norway, Stasi Agents Today, Stasi Agents In West Germany, Stasi Agents List, Stasi Agent Movie, Stasi Agents In Britain, Stasi Agent Film, Stasi Agent Facebook, Stasi Agenten, Stasi Agents In Britain, Define Stasi Agent, Agent Stasi Oscar To Donald Tusk, Stasi Agent Film, Stasi Agent Facebook, Agent Stasi W Srodowisku Gda\u0144skiej Opozycji, Gauck Stasi Agent, Stasi Agents List, Stasi Agent Movie, Tusk Agent Stasi Macierewicz, Merkel Stasi Agent, Stasi Agents In Norway, Stasi Agent Oscar, Agent Stasi Oscar To Donald Tusk, Agent Stasi Ps. Oscar, Tusk Agent Stasi Oscar, Agent Stasi O Pseudonimie Oscar, Agent Stasi Tw Oskar, Agent Stasi W Otoczeniu Tuska, Tusk To Agent Stasi Ps. Oskar, Agent Stasi Ps. Oscar, Agent Stasi O Pseudonimie Oscar, Agent Stasi O Pseudonimie Oskar, Agent Stasi O Pseudonimie \U201eoscar, Stasi Romeo Agents, Stasi Agent Stiller, Agent Stasi W Srodowisku Gda\u0144skiej Opozycji, Stasi Agent Topaz, Stasi Agents Today, Agent Stasi Tw \U201eoscar, Agent Stasi Tusk, Agent Stasi Oscar To Donald Tusk, Agent Stasi Tw \U201eoskar, Agent Stasi W Otoczeniu Tuska, Agent Stasi Tw Oskar, Stasi Agents In West Germany, Stasi Agent Wiki, Agent Stasi W Srodowisku Gda\u0144skiej Opozycji, Agent Stasi W Otoczeniu Tuska, Inoffizielle Mitarbeiter Stasi, Inoffizielle Mitarbeiter Ddr, Inoffizielle Mitarbeiter Liste, Inoffizielle Mitarbeiter Namensliste, Inoffizielle Mitarbeiter Des Mfs, Inoffizielle Mitarbeiter, Inoffizielle Mitarbeiter Definition, Inoffizielle Mitarbeiter Der Staatssicherheit, Inoffizielle Mitarbeiter Mfs Liste, Inoffizielle Mitarbeiter Stasi Akten, Inoffizielle Mitarbeiter Stasi Akten, Anzahl Inoffizielle Mitarbeiter Stasi, Inoffizieller Mitarbeiter Bnd, Stasi Inoffizielle Mitarbeiter Berlin, Inoffizielle Mitarbeiter Stasi Bezahlung, Bekannte Inoffizielle Mitarbeiter, Inoffizieller Mitarbeiter Bezahlung, Inoffizielle Mitarbeiter In Der Brd, Bekannte Inoffizielle Mitarbeiter Stasi, Inoffizielle Mitarbeiter Ddr, Inoffizieller Mitarbeiter Erika, Inoffizieller Mitarbeiter Englisch, Inoffizieller Mitarbeiter Gehalt, Hauptamtliche Inoffizielle Mitarbeiter Stasi, Hauptamtliche Inoffizielle Mitarbeiter, Inoffizielle Mitarbeiter In Der Brd, Ims Inoffizielle Mitarbeiter, Inoffizieller Mitarbeiter (Im), Inoffizieller Mitarbeiter Im Besonderen Einsatz, Inoffizielle Kriminalpolizeiliche Mitarbeiter, Inoffizielle Mitarbeiter Liste, Inoffizielle Mitarbeiter Liste Stasi, Inoffizielle Mitarbeiter Liste Dresden, Inoffizielle Mitarbeiter Der Stasi Liste, Liste Inoffizielle Mitarbeiter Staatssicherheit, Inoffizielle Mitarbeiter Mfs Liste, Inoffizielle Mitarbeiter Mfs, Inoffizielle Mitarbeiter Mfs Liste, Inoffizielle Mitarbeiter Namensliste, Inoffizielle Mitarbeiter Namen, Namensliste Inoffizielle Mitarbeiter Stasi, Stasi Inoffizielle Mitarbeiter Namen, Prominente Inoffizielle Mitarbeiter, Inoffizielle Mitarbeiter Stasi, Inoffizielle Mitarbeiter Stasi Liste, Inoffizielle Mitarbeiter Stasi Bezahlung, Inoffizielle Mitarbeiter Stasi Akten, Inoffizielle Mitarbeiter Shenja, Inoffizielle Mitarbeiter Der Stasi, Inoffizielle Mitarbeiter Der Stasi Liste, Liste Inoffizielle Mitarbeiter Staatssicherheit, Namensliste Inoffizielle Mitarbeiter Stasi, Hauptamtliche Inoffizielle Mitarbeiter Stasi, Udo Lindenberg Tour 2017, Udo Lindenberg Sonderzug Nach Pankow, Udo Lindenberg Cello, Udo Lindenberg Wiki, Udo Lindenberg Albums, Udo Lindenberg Youtube, Udo Lindenberg Net Worth, Udo Lindenberg Tour, Udo Lindenberg Horizont, Udo Lindenberg Discography, Udo Lindenberg Albums, Udo Lindenberg Atlantic, Udo Lindenberg Andrea Doria, Udo Lindenberg Alben, Udo Lindenberg Alter, Udo Lindenberg Airport, Udo Lindenberg Album 2016, Udo Lindenberg Amazon, Udo Lindenberg Atlantic Kosten, Udo Lindenberg Adlon, Udo Lindenberg Bilder, Udo Lindenberg Berlin, Udo Lindenberg Band, Udo Lindenberg Best Of, Udo Lindenberg Biografie, Udo Lindenberg Bunte Republik Deutschland, Udo Lindenberg Berlin 2015, Udo Lindenberg Berlin Olympiastadion, Udo Lindenberg Bilder Kaufen, Udo Lindenberg Brandenburger Tor, Udo Lindenberg Cello, Udo Lindenberg Cello Lyrics, Udo Lindenberg Concert, Udo Lindenberg Cello Original, Udo Lindenberg Cello Lyrics English, Udo Lindenberg Chemnitz, Udo Lindenberg Commerzbank Arena, Udo Lindenberg Cd, Udo Lindenberg Discography, Udo Lindenberg Discogs, Udo Lindenberg Deutsch, Udo Lindenberg Diskografie, Udo Lindenberg Desperado, Udo Lindenberg Dortmund, Udo Lindenberg Durch Die Schweren Zeiten, Udo Lindenberg Durch Die Schweren Zeiten Lyrics, Udo Lindenberg Das Leben, Udo Lindenberg Erfurt, Udo Lindenberg Ein Herz Kann Man Nicht Reparieren Lyrics, Udo Lindenberg Freundin, Udo Lindenberg Freiburg, Udo Lindenberg Fanshop, Udo Lindenberg Frankfurt, Udo Lindenberg Frankfurt 2015, Udo Lindenberg Facebook, Udo Lindenberg Familie, Udo Lindenberg Frankfurt 2016, Udo Lindenberg Fotos, Udo Lindenberg Fanclub, Udo Lindenberg Horizont, Udo Lindenberg Hotel, Udo Lindenberg Hamburg, Udo Lindenberg Hits, Udo Lindenberg Hinterm Horizont, Udo Lindenberg Hotel Atlantic Miete, Udo Lindenberg Hotel Atlantic Kosten, Udo Lindenberg Hinterm Horizont Gehts Weiter, Udo Lindenberg Hannover, Udo Lindenberg Hannover 2015, Udo Lindenberg Ich Mach Mein Ding, Udo Lindenberg Interview, Udo Lindenberg Jung, Udo Lindenberg Johnny Controletti Text, Udo Lindenberg Jan Delay, Udo Lindenberg Jennifer Rostock, Udo Lindenberg Jack, Udo Lindenberg Jamaika, Udo Lindenberg Jessy Schmidt, Johnny Boxer Udo Lindenberg, Udo Lindenberg Jan Delay Reeperbahn, Udo Lindenberg Jan Delay Ganz Anders, Udo Lindenberg Konzert 2017, Udo Lindenberg Kinder, Udo Lindenberg Live, Udo Lindenberg Lieder, Udo Lindenberg Lyrics, Udo Lindenberg Leipzig, Udo Lindenberg Live 2017, Udo Lindenberg Musical, Udo Lindenberg Mein Ding, Udo Lindenberg Mtv Unplugged, Udo Lindenberg Net Worth, Udo Lindenberg Oberhausen, Udo Lindenberg Odyssee, Udo Lindenberg Odyssey, Udo Lindenberg Olympiastadion, Udo Lindenberg Olympiastadion Berlin, Udo Lindenberg Olympiastadion 2015, Udo Lindenberg Outfit, Udo Lindenberg Otto Waalkes, Udo Lindenberg Olga Von Der Wolga, Udo Lindenberg Ost Berlin, Udo Lindenberg Pankow, Udo Lindenberg Paintings, Udo Lindenberg Plan B, Udo Lindenberg Plan B Lyrics, Udo Lindenberg Panikorchester, Udo Lindenberg Poster, Udo Lindenberg Panik Panther, Udo Lindenberg Partnerin, Udo Lindenberg Palast Der Republik, Udo Lindenberg Porsche Museum, Udo Lindenberg Quotes, Udo Lindenberg Quiz, Udo Lindenberg Queen Mary 2, Udo Lindenberg Reeperbahn, Udo Lindenberg Reeperbahn Original, Udo Lindenberg Riesa, Udo Lindenberg Rudi Ratlos, Udo Lindenberg Rockliner 2016, Udo Lindenberg Rockliner, Udo Lindenberg Ricky Maserati, Udo Lindenberg Reeperbahn Songtext, Udo Lindenberg Rockliner 2015, Udo Lindenberg Reeperbahn Chords, Udo Lindenberg Sonderzug Nach Pankow, Udo Lindenberg Songs, Udo Lindenberg Tour 2017, Udo Lindenberg Tour, Udo Lindenberg Tickets, Udo Lindenberg Tour Berlin, Udo Lindenberg Tot, Udo Lindenberg Timmendorfer Strand, Udo Lindenberg Texte, Udo Lindenberg Tournee 2015, Udo Lindenberg Tournee 2016, Udo Lindenberg T-shirt, Udo Lindenberg Unplugged, Udo Lindenberg Und Jan Delay, Udo Lindenberg Und Clueso, Udo Lindenberg Und Ich Mach Mein Ding, Udo Lindenberg Udopia, Udo Lindenberg Und Jennifer Rostock, Udo Lindenberg Unicef Weihnachtskarte, Udo Lindenberg Und Das Panikorchester, Udo Lindenberg Und Helge Schneider, Udo Lindenberg Unplugged Tracklist, Udo Lindenberg Wiki, Udo Lindenberg Wikipedia Deutsch, Udo Lindenberg Wohnort, Udo Lindenberg Wozu Sind Kriege Da, Udo Lindenberg Shirt Xl, Udo Lindenberg Der Tag X, Udo Lindenberg Youtube, Udo Lindenberg Youtube Sonderzug, Udo Lindenberg Youtube Cello, Udo Lindenberg Youtube 2015, Udo Lindenberg Youtube Stark Wie Zwei, Udo Lindenberg You Can’t Run Away, Udo Lindenberg Youtube Mein Ding, Udo Lindenberg Yvonne Catterfeld, Udo Lindenberg Yvonne Catterfeld Horizont, Udo Lindenberg Youtube Unplugged, Udo Lindenberg Zitate, Udo Lindenberg Zug Nach Pankow, Udo Lindenberg Zeichnungen, Udo Lindenberg Zwei Wie Wir,
Become a Patron! True Information is the most valuable resource and we ask you to give back.
IPN BU 698/620 DJAKONOW WIKOTOR
IPN BU 0806/3202 DLOUHY MIROSŁAWA
IPN BU 0772/1015 DMITRIEWA HALINA
IPN BU 0993/488 DMITRUK ARIANNA
IPN BU 0218/1165 DMITRUK ELIASZ
IPN BU 01000/884 DMITRUK MIKOŁAJ
IPN BU 0193/401 DMITRYJEW ALEKSANDER DRYTMI
IPN BU 082/608 DMITRZAK RYSZARD
IPN BU 0193/6403 DMITRZUK JAN
IPN BU 0218/2246 DMOCH (JAWORSKA) ZOFIA
IPN BU 00244/177 DMOCH BOGDAN
IPN BU 00230 P. 81 DMOCH BOGDAN
IPN BU 01000/2139 DMOCH EDMUND
IPN BU 00945/152 DMOCH EDMUND
IPN BU 0958/621 DMOCH EUGENIUSZ
IPN BU 001052/992 DMOCH EWA IDALIA
IPN BU 093/84 DMOCH GRAŻYNA
IPN BU 0806/2396 DMOCH HALINA
IPN BU 001043/2488 DMOCH IRENEUSZ
IPN BU 01000/2211 DMOCH JAN
IPN BU 0855/2493 DMOCH JERZY
IPN BU 52/188 DMOCH PAWEŁ
IPN BU 01013/377 DMOCH WŁADYSŁAW
IPN BU 01000/2141 DMOCH ZDZISŁAW
IPN BU 0806/2078 DMOCHOWSKA HELENA
IPN BU 698/621 DMOCHOWSKA JANINA
IPN BU 0901/1831 DMOCHOWSKA JOLANTA
IPN BU 00200/916 DMOCHOWSKA MARIA
IPN BU 001102/467 DMOCHOWSKA MARIA
IPN BU 001065/82 DMOCHOWSKA TERESA
IPN BU 0806/3121 DMOCHOWSKA WACŁAWA
IPN BU 01013/391 DMOCHOWSKI ANTONI
IPN BU 0958/838 DMOCHOWSKI EDMUND
IPN BU 0193/4988 DMOCHOWSKI HENRYK
IPN BU 00448/167 DMOCHOWSKI KRZYSZTOF
IPN BU 001134/5130 DMOCHOWSKI KRZYSZTOF
IPN BU PF 299/130 DMOCHOWSKI LECH
IPN BU 00334/535 DMOCHOWSKI STANISŁAW
IPN BU 001134/3421 DMOCHOWSKI STANISŁAW
IPN BU 001043/1228 DMOCHOWSKI WŁODZIMIERZ
IPN BU 00244/59 DMOCHOWSKI ZDZISŁAW
IPN BU 0866/1397 DMOWSKA ALICJA
IPN BU 01250/120 DMOWSKA HELENA
IPN BU 0193/1677 DMOWSKA IRENA
IPN BU 093/78 DMOWSKA JADWIGA
IPN BU 002086/1925 DMOWSKA KRYSTYNA
IPN BU 0218/3167 DMOWSKA PONIAK DANUTA JANINA
IPN BU 52/174 DMOWSKI ANDRZEJ
IPN BU 001052/617 DMOWSKI ANDRZEJ
IPN BU 00966/231 DMOWSKI ANTONI
IPN BU 002082/463 DMOWSKI ANTONI FRANCISZEK
IPN BU 002086/1306 DMOWSKI ANTONI FRANCISZEK
IPN BU 0864/293 DMOWSKI FELIKS
IPN BU 001198/1726 DMOWSKI HENRYK
IPN BU 01250/121 DMOWSKI HIERONIM
IPN BU 0912/395 DMOWSKI IRENEUSZ
IPN BU 0194/2856 DMOWSKI JÓZEF
IPN BU 0866/147 DMOWSKI JÓZEF
IPN BU 00328/382 DMOWSKI KAZIMIERZ
IPN BU 001134/1126 DMOWSKI KAZIMIERZ
IPN BU 00966/849 DMOWSKI KAZIMIERZ ANTONI
IPN BU 00277/1307 DMOWSKI LUCJAN
IPN BU 001121/3458 DMOWSKI LUCJAN
IPN BU 00277/771 DMOWSKI PIOTR
IPN BU 001121/2968 DMOWSKI PIOTR
IPN BU 001102/2053 DMOWSKI ROMAN
IPN BU 00945/216 DMOWSKI ROMAN
IPN BU 001065/10 DMOWSKI RYSZARD STANISŁAW
IPN BU 00966/1375 DMOWSKI SŁAWOMIR
IPN BU 001075/205 DMOWSKI WALDEMAR
IPN BU 001134/3862 DMOWSKI ZBIGNIEW
IPN BU 00249/532 DMOWSKI ZYGMUNT
IPN BU 001121/1166 DMOWSKI ZYGMUNT DIONIZY
IPN BU 001043/3586 DMUCH GRAŻYNA
IPN BU 683/254 DMUCH WALERIA
IPN BU PF 71/11 DMYTROW ANTONI
IPN BU 001102/1296 DMYTRUK JAN
IPN BU 00257/229 DMYTRUK ZDZISŁAW JAN
IPN BU 00200/833 DMYTRYK KRZYSZTOF
IPN BU 001102/356 DMYTRYK KRZYSZTOF
IPN BU 710/389 DMYTRZAK CZESŁAW
Kgb Meaning, Kgb Bar, Kgb Putin, Kgb Radio, Kgb Cold War, Kgb The Office, Kgb Vs Cia, Kgb Boston, Kgb Gang, Kgb Training, Kgb Agent, Kgb Archiver, Kgb Assassinations, Kgb Animal Farm, Kgb Alien, Kgb Archer, Kgb Ap Euro, Kgb Alaska, Kgb Arms, Kgb Application, Kgb Bar, Kgb Boston, Kgb Band, Kgb Badge, Kgb Burger, Kgb Beer, Kgb Bar East Village, Kgb Building, Kgb Ballistic Knife, Kgb Bar Events, Kgb Cold War, Kgb Call Center, Kgb Chicken, Kgb Conduit, Kgb Customs, Kgb Construction, Kgb Car, Kgb Company, Kgb Careers, Kgb Cold War Definition, Kgb Definition, Kgb Deals, Kgb Department 12, Kgb Documentary, Kgb Directorate S, Kgb Defector, Kgb Drink, Kgb Def, Kgb During The Cold War, Kgb Donut, Kgb Established, Kgb Emblem, Kgb Events, Kgb East Village, Kgb Espionage, Kgb Executions, Kgb Enterprises, Kgb Escape Room Tips, Kgb Execution Methods, Kgb Ended, Kgb Fm, Kgb Food Truck, Kgb Fsb, Kgb Flag, Kgb Facts, Kgb Foam, Kgb Files, Kgb Football, Kgb Fantastic Fiction, Kgb Full Form, Kgb Gang, Kgb Glass, Kgb Game, Kgb Group, Kgb Glass Donut, Kgb Gru, Kgb Glass For Sale, Kgb Gourmet Food Truck, Kgb Gun, Kgb Gif, Kgb History, Kgb Headquarters, Kgb Hat, Kgb Headphones, Kgb Hair, Kgb Head, Kgb Homegrown Albums, Kgb Homes, Kgb Homegrown Greatest Hits, Kgb Handler, Kgb In Russian, Kgb Illegals, Kgb In America, Kgb In Animal Farm, Kgb In Usa, Kgb Interrogation, Kgb Inc, Kgb Images, Kgb In The Cold War, Kgb Ilm, Kgb Jokes, Kgb Jfk Assassination, Kgb Jobs, Kgb Joke Office, Kgb Jack Barsky, Kgb Jfk, Kgb Jacket, Kgb Jfk Assassination Files, Kgb Jewelry, Kgb Jimmy Carter Campaign, Kgb Kiteboarding, Kgb Kfc, Kgb Killed Jfk, Kgb Keylogger, Kgb Kgb, Kgb Knife, Kgb Kiss, Kgb Kfc Meme, Kgb Killers, Kgb Kostikov, Kgb Logo, Kgb Lee, Kgb Leaders, Kgb Lansing, Kbg Logistics, Kgb Las Vegas, Kgb Law, Kgb Leafly, Kgb Lubbock, Kgb Law Firm, Kgb Meaning, Kgb Museum Prague, Kgb Meme, Kgb Movies, Kgb Motto, Kgb Mafia, Kgb Music, Kgb Martial Arts, Kgb Museum Moscow, Kgb Marvel, Kgb New Name, Kgb Nyc, Kgb News, Kgb New York, Kgb Now, Kgb Number, Kbg New Brunswick, Kgb Now Called, Kbg New Brunswick Nj, Kgb Name, Kgb Officer, Kgb Office Joke, Kgb Operations, Kgb Outfit, Kgbi Omaha, Kgb Osnaz, Kgb Oracle, Kgb Og Strain, Kgb Operations During The Cold War, Kgb Outpost, Kgb Putin, Kgb Packers, Kgb Predecessor, Kgb Productions, Kgb Paris, Kgb Police, Kgb Propaganda, Kgb Prison, Kgb Pen, Kgb Pin, Kgb Questions, Kgb Quizlet, Kgb Quotes, Kgb Quora, Kgb Question Service, Kgb Questions And Answers, Kgb Quotes Rounders, Kgb Que Es, Kgb Quarter Report, Kgb Russia, Kgb Radio, Kgb Rounders, Kgb Ranks, Kgb Red Room, Kgb Russian Revolution, Kgb Reading Series, Kgb Restaurant, Kgb Resident, Kgb Ricin, Kgb Spies, Kgb Successor, Kgb San Diego, Kgb Sky Show 2017, Kgb Symbol, Kgb San Antonio, Kgb Stalin, Kbg Syndrome, Kgb Swimbaits, Kgb Strain, Kgb The Office, Kgb Training, Kgb Texas, Kgb Today, Kgb Text, Kgb Torture, Kgb Translation, Kgb Tactics, Kgb Three Bears, Kgb Training Manual, Kgb Uniform, Kgb Usa, Kgb Ussr, Kgb University, Kgb Umbrella, Kgb Usa Inc, Kgb Urban, Kgb Usa San Antonio, Kgb Ushanka, Kgb Useful Idiots, Kgb Vs Cia, Kgb Vs Fsb, Kgb Vest Persona 5, Kgb Vs Gru, Kgb Vodka, Kgb Vs Cia Cold War, Kgb Vs Cia Deadliest Warrior, Kgb Vs Fbi, Kgb Video Game, Kgb Vodka Lemon, Kgb Wiki, Kgb Wilmington, Kgb Weapons, Kgb Watch, Kgb Website, Kgb Waits For No One, Kgb Weed, Kgb We Will Ask The Questions, Kgb Wolf, Kgb Wallpaper, Kgb X Ray, Ex Kgb, Kgb X Files, Kgb X Line, Kgbx Radio, Ktb Xd, Kgb X Cia, Kgb Xredirect, Kgb Archiver X64, Kgb Line X Stringer, Kgb Youtube, Kgb Yuri, Kgb Yelp, Kgb Yahoo, Kgb York, Kgb Yerevan, Kgb Yahoo Answers, Kgb Yoga Bag, Kgb Years, Kgb Yra, Kgb Zippo, Kgb Zip, Kgb Znacenje, Kgb Zomato, Kgb Zenekar, Kgb Zipper, Kgb Zenith Group, Kgb Zip Download, Kgb Zhukov, Kgb Znachenie, Kgb Agent Putin, Kgb Agent Meaning, Kgb Agent Fomin, Kgb Agent Book, Kgb Agent Definition, Kgb Agent Salary, Kgb Agent Interview, Kgb Agent Killed In London, Kgb Agent Jack Barsky, Kgb Agent In Usa, Kgb Agent Assassinated, Kgb Agent Alien, Kgb Agent Aragon, Kgb Agent Alexander, Soviet Agent Abel, Vostok Kgb Agent Automatic, Vostok Kgb Agent Automatic Watch, Kgb Agent In America, Kgb Agent Record Of Alien Races, Kgb Agent With Frightening Psychic Abilities, Kgb Agent Book, Kgb Agent Bezmenov, Kgb Agent Blacklist, Kgb Agent Jack Barsky, Kgb Agent In Bond Movie, Kgb Agent Killed By Radiation, Ex Kgb Agent Book, Kgb Home Based Agent, Former Kgb Agent Explains Brainwashing America, Best Kgb Agent, Kgb Agent Costume, Kgb Agent Cuban Missile Crisis, Kgb Agent Caught, Kgb Agent Careers, Kgb Special Agent Challenge, Kgb Agent In Cia, Kgb Agent Halloween Costume, Kgb Agent Explains Current Events In Usa, Kgb Agent Leaves Canada, Ex Kgb Agent Leaves Canada, Kgb Agent Definition, Kgb Agent Defector, Kgb Agent Demoralization, Kgb Agent Dies, Kgb Double Agent, Soviet Double Agent, Cia Kgb Double Agent, Define Kgb Agent, Kgb Special Agent Job Description, Agent Du Kgb, Kgb Agent Explains Current Events In Usa, Former Kgb Agent Explains Brainwashing America, Kgb Agent Killed In England, Ex Kgb Agent Interview, Ex Kgb Agent, Ex-kgb Agent On Indoctrination & Demoralization, Ex Kgb Agent Leaves Canada, Ex Kgb Agent Killed, Ex Kgb Agent Yuri, Ex Kgb Agent Youtube, Kgb Agent Fomin, Kgb Agent Found Dead, Kgb Agents Foe Crossword Clue, Kgb Agents Found In New Jersey, Kgb Famous Agents, Kgb Agent With Frightening Psychic Abilities, Former Kgb Agent Poisoned, Former Kgb Agent Explains Brainwashing America, Former Kgb Agent, Former Kgb Agent Killed In London, Kgb Agent Guillou, Soviet Gru Agent, Genscher Kgb Agent, Kgb Agent Halloween Costume, Hot Kgb Agent, Kgb Agent Interview, Kgb Agent In Usa, Kgb Agent In India, Kgb Agent In Mi6, Kgb Agent In Cia, Kgb Agent In Bond Movie, Kgb Agent In America, Kgb Agent In Vancouver, Kgb Agent Killed In London, Former Kgb Agent Interview, Kgb Agent Jack Barsky, Kgb Agent Job, Kgb Agent James Bond, Kgb Special Agent Job Description, Kgb Special Agent Job, Kgb Agent Killed In London, Kgb Agent Kidnapped, Kgb Agent Killed In England, Khamenei Kgb Agent, Kirill Kgb Agent, Kekkonen Kgb Agent, Kgb Agent Litvinenko, Kgb Agent Login, Kgb Agent London, Kgb Agent Leaves Canada, Soviet Agent Lucy, Russian Kgb Agent Lisa, Ex Kgb Agent Leaves Canada, Kgb Agent Meaning, Kgb Agent Murdered, Kgb Agent Movies, Kgb Agent 60 Minutes, Kgb Agent In Mi6, Kgb Agent In Bond Movie, Merkel Kgb Agent, Kgb Agent Names, Soviet News Agency, Kgb Agents In New Jersey, A Former Kgb Agent Needs Your Help, Nyiso Kgb Agent, Kgb Agent On 60 Minutes, Kgb Agent Online, Kgb Agent Record Of Alien Races, Ex-kgb Agent On Indoctrination & Demoralization, Obama Kgb Agent, Oswald Kgb Agent, Agent_of_kgb, By\u0142y Agent Kgb Opowiada, Kgb Agent Putin, Kgb Agent Poisoned, Kgb Agent Polonium, Kgb Agent Pay, Kgb Agent Philippines, Kgb Special Agent Philippines Salary, Kgb Agent With Frightening Psychic Abilities, Putin Kgb Agent Reagan, Palme Kgb Agent, Prodi Kgb Agent, Kgb Agent Ranks, Kgb Agent Record Of Alien Races, Kgb Agent Russia, Kgb Agent Requirements, Kgb Agent Radiation Poisoning, Kgb Agent Rudolf Abel, Soviet Agent Rudolf Abel, Putin Kgb Agent Reagan, Kgb Special Agent Review, Russian Kgb Agent Alexander Litvinenko, Kgb Agent Salary, Kgb Agent Subversion, Kgb Special Agent, Kgb Special Agent Salary, Kgb Special Agent Training, Kgb Special Agent Philippines, Kgb Sleeper Agent, Kgb Special Agent Review, Kgb Secret Agent, Kgb Special Agent Philippines Salary, Kgb Agent Training, Kgb Agent Tells You What The Illusion Is, Kgb Agent Test, Kgb Agent Tv Show, Kgb Special Agent Training, Kgb Secret Agent Test, Kgb Agents In The Us, Top Kgb Agent, Kgb Agent Uniform, Kgb Agent Usa, Kgb Undercover Agents, Kgb Agent Vladimir Putin, Kgb Agent Vergiftet, Kgb Agent In Vancouver, Vostok Kgb Agent Automatic, Vostok Kgb Agent Automatic Watch, Kgb Agent Wiki, Kgb Agent With Frightening Psychic Abilities, Kgb Agent Weapons, Kgb Agent Watches, Kgb Agent Warns, Kgb Agents Who Defected, Kgb Woman Agent, Soviet Agent Winter Soldier, Soyuz Kgb Agent Watches, Kgb Agent Tells You What The Illusion Is, Kgb Agent Yuri Bezmenov, Kgb Agent Youtube, Kgb Agent Tells You What The Illusion Is, Ex Kgb Agent Yuri, Ex Kgb Agent Youtube, Yuri Kgb Agent, Youngest Kgb Agent, Putin Wife,Putin News,Putin Net Worth,Putin Height,Putin Bay,Putin Memes,Putin Trump,Putin On The Ritz,Putin Age,Putin Trump Meeting,Putin And Trump,Putin Age,Putin And Trump Meeting,Putin Approval Rating,Putin And Obama,Putin Ally Crossword,Putin Assad,Putin And North Korea,Putin And Reagan,Putin As A Child,Putin Bay,Putin Bear,Putin Birthday,Putin Biography,Putin Bay Hotels,Putin Badass,Putin Bay Weather,Putin Blueberry Hill,Putin Bay Ferry,Putin Black Belt,Putin Children,Putin Calendar,Putin Clown,Putin Cartoon,Putin Chechnya,Putin Crying,Putin Canada,Putin Crimea,Putin Corruption,Putin Clinton,Putin Daughters,Putin Dog,Putin Documentary,Putin Dead,Putin Dog Merkel,Putin Definition,Putin Dancing,Putin Dolphins,Putin Drawing,Putin Dancing Gif,Putin Election,Putin Eating Popcorn,Putin English,Putin Election Results,Putin Erdogan,Putin Education,Putin Economy,Putin Eyes,Putin Exxon Deal,Putin Eye Color,Putin Family,Putin Food,Putin Funny,Putin Face,Putin Facts,Putin French,Putin Fishing,Poutine Fries,Putin Fascist,Putin Funny Face,Putin Gif,Putin Genocide,Putin Global Warming,Putin Gymnast,Putin Wife,Putin Gun,Putin Glasses,Putin Gangster,Putin Government,Putin Gorbachev,Putin Height,Putin Horse,Putin House,Putin Horseback,Putin Hockey,Putin History,Putin Hunting,Putin Hillary,Putin Human Rights,Putin Home,Putin Interview,Putin Images,Putin Israel,Putin Iq,Putin Isis,Putin In French,Putin Island,Putin Inauguration,Putin In Power,Putin Instagram,Putin Judo,Putin Jill Stein,Putin Journalists,Putin John Oliver,Putin Jehovah,Putin Jw,Putin Judo Gif,Putin Jesus,Putin James Bond,Putin Jehovah Witness,Putin Kgb,Putin Korea,Putin Karate,Putin Kremlin,Putin Kleptocracy,Putin Kim Jong Un,Putin Kraft Ring,Putin Kabaeva,Putin Khuilo,Putin Kid,Putin Laughing,Putin Laughing Gif,Putin Le Pen,Putin Languages,Putin Latest News,Putin Loves Trump,Putin Lollipop,Putin Likes Trump,Putin Limo,Putin Leadership,Putin Memes,Putin Merkel Dog,Putin Married,Putin Merkel,Putin Makeup,Putin Mask,Putin Martial Arts,Putin Meaning,Putin Macron,Putin Mansion,Putin News,Putin Net Worth,Putin North Korea,Putin New Wife,Putin Netanyahu,Putin Nato,Putin Net Worth Wiki,Putin Name Meaning,Putin Nickname,Putin Nuclear War,Putin On The Ritz,Putin On A Horse,Putin On Trump,Putin On North Korea,Putin Obama,Putin On The Ritz Gif,Putin On Syria,Putin Opposition,Putin On Snl,Putin On The Ritz Meme,Putin President,Putin Piano,Putin Palace,Putin Political Party,Putin Picture,Putin Poison,Putin Propaganda,Putin Puns,Putin Pop Song,Putin Popularity,Putin Quotes,Putin Quotes On Obama,Putin Queen Elizabeth,Putin Quotes Funny,Putin Quizlet,Putin Queen Elizabeth Stairs,Putin Quotes On Trump,Putin Quora,Putin Quote Immigrants,Putin Quebec,Putin Russia,Putin Reagan,Putin Riding Trump,Putin Rise To Power,Putin Reelection,Putin Richest Man In The World,Putin Riding A Ritz Cracker,Putin Response,Putin Ritz,Putin Rainbow,Putin Snl,Putin Syria,Putin Song,Putin Smiling,Putin Speech,Putin Shirt,Putin Speaking English,Putin Singing,Putin Salary,Putin Super Bowl Ring,Putin Trump,Putin Trump Meeting,Putin Twitter,Putin Trump Meme,Putin Trump Horse,Putin Trump Kiss,Putin Term Limit,Putin Trump Gif,Putin Term,Putin Today,Putin Ukraine,Putin Ussr,Putin Us Visit,Putin Unicorn,Putin Us Elections,Putin Un,Putin Undercover,Putin Urban Dictionary,Putin United Nations,Putin Us Relations,Putin Vs Trump,Putin Vs Obama,Putin Vladimir,Putin Video,Putin Vodka,Putin Vs Stalin,Putin Visits Trump,Putin Visit To White House,Putin Vampire,Putin Vs Obama Meme,Putin Wife,Putin Wiki,Putin Wealth,Putin Wink,Putin War,Putin Ww3,Putin Watch,Putin Winking Gif,Putin With Animals,Putin Walking,Putin Xi Jinping,Putin X Obama,Putin X Reader,Putin Xi,Putin And Trump,Putin And Obama,Putin And Assad,Putin And North Korea,Putin And Reagan,Putin And The Ritz,Putin Young,Putin Youtube,Putin Yacht,Putin Youth,Putin Yeltsin,Putin Yume,Putin Years As President,Putin Young Pictures,Putin Youth Army,Putin Yarmulke,Putin Zodiac Sign,Putin Zakaria,Putin Zassal,Putin Zassal Lyrics,Putin Zero Hedge,Putin Zeman,Putin Zil Limousine,Putin Zuma,Putin Za Makedonija,Putin Zapretio Albancima,
Become a Patron! True Information is the most valuable resource and we ask you to give back.
Vladimir Putin Es Gay, Putin Kills Gay Lover, Gayklubb Putin, Putin Is Gay Marriage, Is Vladimir Putin Gay, Putin Zabranio Gay Paradu, Putin Wife,Putin News,Putin Net Worth,Putin Height,Putin Bay,Putin Memes,Putin Trump,Putin On The Ritz,Putin Age,Putin Trump Meeting,Putin And Trump,Putin Age,Putin And Trump Meeting,Putin Approval Rating,Putin And Obama,Putin Ally Crossword,Putin Assad,Putin And North Korea,Putin And Reagan,Putin As A Child,Putin Bay,Putin Bear,Putin Birthday,Putin Biography,Putin Bay Hotels,Putin Badass,Putin Bay Weather,Putin Blueberry Hill,Putin Bay Ferry,Putin Black Belt,Putin Children,Putin Calendar,Putin Clown,Putin Cartoon,Putin Chechnya,Putin Crying,Putin Canada,Putin Crimea,Putin Corruption,Putin Clinton,Putin Daughters,Putin Dog,Putin Documentary,Putin Dead,Putin Dog Merkel,Putin Definition,Putin Dancing,Putin Dolphins,Putin Drawing,Putin Dancing Gif,Putin Election,Putin Eating Popcorn,Putin English,Putin Election Results,Putin Erdogan,Putin Education,Putin Economy,Putin Eyes,Putin Exxon Deal,Putin Eye Color,Putin Family,Putin Food,Putin Funny,Putin Face,Putin Facts,Putin French,Putin Fishing,Poutine Fries,Putin Fascist,Putin Funny Face,Putin Gif,Putin Genocide,Putin Global Warming,Putin Gymnast,Putin Wife,Putin Gun,Putin Glasses,Putin Gangster,Putin Government,Putin Gorbachev,Putin Height,Putin Horse,Putin House,Putin Horseback,Putin Hockey,Putin History,Putin Hunting,Putin Hillary,Putin Human Rights,Putin Home,Putin Interview,Putin Images,Putin Israel,Putin Iq,Putin Isis,Putin In French,Putin Island,Putin Inauguration,Putin In Power,Putin Instagram,Putin Judo,Putin Jill Stein,Putin Journalists,Putin John Oliver,Putin Jehovah,Putin Jw,Putin Judo Gif,Putin Jesus,Putin James Bond,Putin Jehovah Witness,Putin Kgb,Putin Korea,Putin Karate,Putin Kremlin,Putin Kleptocracy,Putin Kim Jong Un,Putin Kraft Ring,Putin Kabaeva,Putin Khuilo,Putin Kid,Putin Laughing,Putin Laughing Gif,Putin Le Pen,Putin Languages,Putin Latest News,Putin Loves Trump,Putin Lollipop,Putin Likes Trump,Putin Limo,Putin Leadership,Putin Memes,Putin Merkel Dog,Putin Married,Putin Merkel,Putin Makeup,Putin Mask,Putin Martial Arts,Putin Meaning,Putin Macron,Putin Mansion,Putin News,Putin Net Worth,Putin North Korea,Putin New Wife,Putin Netanyahu,Putin Nato,Putin Net Worth Wiki,Putin Name Meaning,Putin Nickname,Putin Nuclear War,Putin On The Ritz,Putin On A Horse,Putin On Trump,Putin On North Korea,Putin Obama,Putin On The Ritz Gif,Putin On Syria,Putin Opposition,Putin On Snl,Putin On The Ritz Meme,Putin President,Putin Piano,Putin Palace,Putin Political Party,Putin Picture,Putin Poison,Putin Propaganda,Putin Puns,Putin Pop Song,Putin Popularity,Putin Quotes,Putin Quotes On Obama,Putin Queen Elizabeth,Putin Quotes Funny,Putin Quizlet,Putin Queen Elizabeth Stairs,Putin Quotes On Trump,Putin Quora,Putin Quote Immigrants,Putin Quebec,Putin Russia,Putin Reagan,Putin Riding Trump,Putin Rise To Power,Putin Reelection,Putin Richest Man In The World,Putin Riding A Ritz Cracker,Putin Response,Putin Ritz,Putin Rainbow,Putin Snl,Putin Syria,Putin Song,Putin Smiling,Putin Speech,Putin Shirt,Putin Speaking English,Putin Singing,Putin Salary,Putin Super Bowl Ring,Putin Trump,Putin Trump Meeting,Putin Twitter,Putin Trump Meme,Putin Trump Horse,Putin Trump Kiss,Putin Term Limit,Putin Trump Gif,Putin Term,Putin Today,Putin Ukraine,Putin Ussr,Putin Us Visit,Putin Unicorn,Putin Us Elections,Putin Un,Putin Undercover,Putin Urban Dictionary,Putin United Nations,Putin Us Relations,Putin Vs Trump,Putin Vs Obama,Putin Vladimir,Putin Video,Putin Vodka,Putin Vs Stalin,Putin Visits Trump,Putin Visit To White House,Putin Vampire,Putin Vs Obama Meme,Putin Wife,Putin Wiki,Putin Wealth,Putin Wink,Putin War,Putin Ww3,Putin Watch,Putin Winking Gif,Putin With Animals,Putin Walking,Putin Xi Jinping,Putin X Obama,Putin X Reader,Putin Xi,Putin And Trump,Putin And Obama,Putin And Assad,Putin And North Korea,Putin And Reagan,Putin And The Ritz,Putin Young,Putin Youtube,Putin Yacht,Putin Youth,Putin Yeltsin,Putin Yume,Putin Years As President,Putin Young Pictures,Putin Youth Army,Putin Yarmulke,Putin Zodiac Sign,Putin Zakaria,Putin Zassal,Putin Zassal Lyrics,Putin Zero Hedge,Putin Zeman,Putin Zil Limousine,Putin Zuma,Putin Za Makedonija,Putin Zapretio Albancima,
Become a Patron! True Information is the most valuable resource and we ask you to give back.
The CIA officer credited with saving Hamid Karzai’s life during the U.S. invasion of Afghanistan in 2001 has been named director of the National Clandestine Service, the agency’s spying arm.
The officer, a former Marine who is under cover and whose first name is Greg, was recently the head of the Special Activities Division, the CIA’s elite paramilitary force. He has twice been station chief in Afghanistan, where in December 2001 he jumped to shield Karzai when the U.S. military accidentally bombed the position of the man who would become Afghanistan’s president.
A sends:
Yes, it’s Vogel. Another head of the Special Activities Division: Rodney Guy Smith. His name is under a few redactions in the torture report.
13 February 2012
CIA Kabul Chief of Station Named
A sends:
I recently sorted out the identity of the CIA Kabul chief of station (all through open sources, of course). Apparently no one has reported it on the web yet.
“In the chaos of battle in December 2001, a U.S. military officer accidentally ordered a bomb drop on a meeting between Mr. Karzai and other tribal leaders. The chief leapt on Mr. Karzai to shield him”. It also says that “In 2004 he began his first stint as station chief in Kabul”.
A second source to make the link, DCI George Tenet’s memoirs At the Center of the Storm. Tenet call that guy “Greg V.”
On p. 71 you find a list of Kabul embassy officials, including an officer for Regional Affairs named Gregory Vogel who arrived there in September 2004.
What are the chances to have two “Greg V.”s arriving at an upper post in this embassy in 2004? Especially when you know until June 2004 the CIA chief of station was first-named Peter:
By the way, that guy has been given a lot of surnames:
– in Gary Berntsen Jawbreaker (2005), he is called “Craig.”
– in Sean Naylor Not a Good Day to Die (2004), it is said that he used the noms de guerre “Spider” and “the Wolf”, and was the senior CIA officer in Gardez during operation Anaconda.
– in Eric Blehm, The Only Thing Worth Dying For (2011), he is called “Casper.”
and as said above, George Tenet said almost all when he called him “Greg V.” (as with “Rich B.”)
Cia World Factbook, Cia Jobs, Cia Director, Cia Definition, Cia Headquarters, Cia Careers, Cia Salary, Cia Agent, Cia Agent Salary, Cia Internship, Cia Agent, Cia Agent Salary, Cia Analyst, Cia Application, Cia Airport, Cia Apush, Cia Address, Cia Auctions, Cia Alexa, Cia Assassinations, Cia Badge, Cia Black Sites, Cia Budget, Cia Bounce, Cia Building, Cia Black Ops, Ciao Bella, Cia Berg, Cia Books, Cia Brennan, Cia Careers, Cia Certification, Cia Cold War, Cia Culinary, Cia Copia, Cia Chief, Cia Crack, Cia Contractor, Cia Created Isis, Cia Cold War Definition, Cia Director, Cia Definition, Cia Director Salary, Cia Declassified Documents, Cia Definition Cold War, Cia Drug Trafficking, Cia Database, Cia Documentary, Cia Declassified, Cia During The Cold War, Cia Exam, Cia Employment, Cia Experiments, Cia Established, Cia Emblem, Cia Email, Cia Employees, Cia El Salvador, Cia Enhanced Interrogation Techniques, Cia Exam Fees, Cia Factbook, Cia Factbook Us, Cia Field Agent, Cia Factbook China, Cia Files, Cia Farm, Cia Factbook Russia, Cia Factbook North Korea, Cia Files 3ds, Cia Factbook India, Cia Gov, Cia Grs, Cia Greystone, Cia Ground Branch, Cia Glassdoor, Cia Guy, Cia Guatemala, Cia Games, Cia General Counsel, Cia Germany, Cia Headquarters, Cia Hyde Park, Cia Hacking Tools, Cia Hacking, Cia History, Cia Hyrule Warriors, Cia Heart Attack Gun, Cia Head, Cia Hacking Notepad++, Cia Headquarters Address, Cia Internship, Cia Insurance, Cia Iran, Cia Intelligence Analyst, Cia In Guatemala, Cia Intelligence, Cia Interview Questions, Cia Isis, Cia Interrogation, Cia India, Cia Jobs, Cia Jfk, Cia Job Openings, Cia Jfk Assassination, Cia Job Description, Cia Jurisdiction, Cia Japan, Cia Job Application, Cia Jobs Nyc, Cia Job Requirements, Cia Killed Jfk, Cia Kevin Hart, Cia Kryptos, Cia K9, Cia Kenya, Cia Kill List, Cia Kennedy Assassination, Cia Knife, Cia Killed Mlk, Cia Korea, Cia Logo, Cia Leaks, Cia Langley, Cia Login, Cia Library, Cia Locations, Cia Leader, Cia License, Cia Leadership, Cia Los Angeles, Cia Meaning, Cia Movies, Cia Most Wanted, Cia Meme, Cia Main Menu, Cia Museum, Cia Mind Control, Cia Malayalam Movie, Cia Music, Cia Maritima, Cia Napa, Cia New York, Cia News, Cia North Korea, Cia Number, Cia Noc, Cia Notepad++, Cia North Hollywood, Cia Nicaragua, Cia Napa Copia, Cia Operative, Cia Operations Officer, Cia Officer, Cia Officer Salary, Cia Office Locations, Cia Org Chart, Cia Operation Mockingbird, Cia Or Fbi, Cia Osama Bin Laden, Cia Origins, Cia Phone Number, Cia Police, Cia Paramilitary, Cia Protective Agent, Cia Purpose, Cia Pay Scale, Cia Positions, Cia Polygraph, Cia Programs, Cia Pompeo, Cia Quizlet, Cia Qualifications, Cia Quotes, Cia Quiz, Cia Questions, Cia Qr Codes, Cia Qatar, Cia Question Alexa, Cia Quantico Va, Cia Quizlet Apush, Cia Requirements, Cia Restaurants, Cia Recruitment, Cia Russia, Cia Reading List, Cia Ranks, Cia Remote Viewing, Cia Released Documents, Cia Responsibilities, Cia Report, Cia Salary, Cia Sad, Cia Stands For, Cia Services, Cia Spy, Cia Special Agent, Cia Scholarship, Cia Secrets, Cia San Antonio, Cia School, Cia Triad, Cia Training, Cia Trump, Cia Twitter, Cia Torture, Cia The World Factbook, Cia To 3ds Converter, Cia The Farm, Cia Tv Shows, Cia Torture Report, Cia University, Cia Ufo Files, Cia Uniform, Cia Usa, Cia Umbrage, Cia Ultra, Cia Undercover, Cia Ukraine, Cis Utah, Cia Uganda, Cia Vs Fbi, Cia Vault 7, Cia Vs Nsa, Cia Volleyball, Cia Vs Kgb, Cia Venezuela, Cia Vietnam, Cia Vault, Cia Virginia, Cia Video, Cia World Factbook, Cia Website, Cia World Factbook Us, Cia Wikileaks, Cia Wiki, Cia World Factbook China, Cia World Factbook India, Cia World Factbook Japan, Cia World Factbook Mexico, Cia World Factbook Russia, Cia X Link, Cia X Files, Cia X Link Lemon, Cia X Link Fanfic, Cia X Link Fanfiction, Cia Xbox, Cia X Male Reader, Xia Xia, Cia X Zelda, Cia X Bane, Cia Youtube, Cia Yuma Az, Cia Yemen, Cia Yearly Salary, Cia Year Founded, Cia Yearly Budget, Cia York Pa, Cia Year Established, Cia Youth Leadership Program, Cia Year Zero, Cia Zimbabwe, Cia Zip Code, Cia Zero Day Exploits, Cia Zambia, Cia Zero Day, Cia Zack Dela Rocha, Cia Zero Dark Thirty, Cia Zombie Apocalypse, Cia Zippo Lighter, Cia Zero,
Become a Patron! True Information is the most valuable resource and we ask you to give back.
Putin Wife,Putin News,Putin Net Worth,Putin Height,Putin Bay,Putin Memes,Putin Trump,Putin On The Ritz,Putin Age,Putin Trump Meeting,Putin And Trump,Putin Age,Putin And Trump Meeting,Putin Approval Rating,Putin And Obama,Putin Ally Crossword,Putin Assad,Putin And North Korea,Putin And Reagan,Putin As A Child,Putin Bay,Putin Bear,Putin Birthday,Putin Biography,Putin Bay Hotels,Putin Badass,Putin Bay Weather,Putin Blueberry Hill,Putin Bay Ferry,Putin Black Belt,Putin Children,Putin Calendar,Putin Clown,Putin Cartoon,Putin Chechnya,Putin Crying,Putin Canada,Putin Crimea,Putin Corruption,Putin Clinton,Putin Daughters,Putin Dog,Putin Documentary,Putin Dead,Putin Dog Merkel,Putin Definition,Putin Dancing,Putin Dolphins,Putin Drawing,Putin Dancing Gif,Putin Election,Putin Eating Popcorn,Putin English,Putin Election Results,Putin Erdogan,Putin Education,Putin Economy,Putin Eyes,Putin Exxon Deal,Putin Eye Color,Putin Family,Putin Food,Putin Funny,Putin Face,Putin Facts,Putin French,Putin Fishing,Poutine Fries,Putin Fascist,Putin Funny Face,Putin Gif,Putin Genocide,Putin Global Warming,Putin Gymnast,Putin Wife,Putin Gun,Putin Glasses,Putin Gangster,Putin Government,Putin Gorbachev,Putin Height,Putin Horse,Putin House,Putin Horseback,Putin Hockey,Putin History,Putin Hunting,Putin Hillary,Putin Human Rights,Putin Home,Putin Interview,Putin Images,Putin Israel,Putin Iq,Putin Isis,Putin In French,Putin Island,Putin Inauguration,Putin In Power,Putin Instagram,Putin Judo,Putin Jill Stein,Putin Journalists,Putin John Oliver,Putin Jehovah,Putin Jw,Putin Judo Gif,Putin Jesus,Putin James Bond,Putin Jehovah Witness,Putin Kgb,Putin Korea,Putin Karate,Putin Kremlin,Putin Kleptocracy,Putin Kim Jong Un,Putin Kraft Ring,Putin Kabaeva,Putin Khuilo,Putin Kid,Putin Laughing,Putin Laughing Gif,Putin Le Pen,Putin Languages,Putin Latest News,Putin Loves Trump,Putin Lollipop,Putin Likes Trump,Putin Limo,Putin Leadership,Putin Memes,Putin Merkel Dog,Putin Married,Putin Merkel,Putin Makeup,Putin Mask,Putin Martial Arts,Putin Meaning,Putin Macron,Putin Mansion,Putin News,Putin Net Worth,Putin North Korea,Putin New Wife,Putin Netanyahu,Putin Nato,Putin Net Worth Wiki,Putin Name Meaning,Putin Nickname,Putin Nuclear War,Putin On The Ritz,Putin On A Horse,Putin On Trump,Putin On North Korea,Putin Obama,Putin On The Ritz Gif,Putin On Syria,Putin Opposition,Putin On Snl,Putin On The Ritz Meme,Putin President,Putin Piano,Putin Palace,Putin Political Party,Putin Picture,Putin Poison,Putin Propaganda,Putin Puns,Putin Pop Song,Putin Popularity,Putin Quotes,Putin Quotes On Obama,Putin Queen Elizabeth,Putin Quotes Funny,Putin Quizlet,Putin Queen Elizabeth Stairs,Putin Quotes On Trump,Putin Quora,Putin Quote Immigrants,Putin Quebec,Putin Russia,Putin Reagan,Putin Riding Trump,Putin Rise To Power,Putin Reelection,Putin Richest Man In The World,Putin Riding A Ritz Cracker,Putin Response,Putin Ritz,Putin Rainbow,Putin Snl,Putin Syria,Putin Song,Putin Smiling,Putin Speech,Putin Shirt,Putin Speaking English,Putin Singing,Putin Salary,Putin Super Bowl Ring,Putin Trump,Putin Trump Meeting,Putin Twitter,Putin Trump Meme,Putin Trump Horse,Putin Trump Kiss,Putin Term Limit,Putin Trump Gif,Putin Term,Putin Today,Putin Ukraine,Putin Ussr,Putin Us Visit,Putin Unicorn,Putin Us Elections,Putin Un,Putin Undercover,Putin Urban Dictionary,Putin United Nations,Putin Us Relations,Putin Vs Trump,Putin Vs Obama,Putin Vladimir,Putin Video,Putin Vodka,Putin Vs Stalin,Putin Visits Trump,Putin Visit To White House,Putin Vampire,Putin Vs Obama Meme,Putin Wife,Putin Wiki,Putin Wealth,Putin Wink,Putin War,Putin Ww3,Putin Watch,Putin Winking Gif,Putin With Animals,Putin Walking,Putin Xi Jinping,Putin X Obama,Putin X Reader,Putin Xi,Putin And Trump,Putin And Obama,Putin And Assad,Putin And North Korea,Putin And Reagan,Putin And The Ritz,Putin Young,Putin Youtube,Putin Yacht,Putin Youth,Putin Yeltsin,Putin Yume,Putin Years As President,Putin Young Pictures,Putin Youth Army,Putin Yarmulke,Putin Zodiac Sign,Putin Zakaria,Putin Zassal,Putin Zassal Lyrics,Putin Zero Hedge,Putin Zeman,Putin Zil Limousine,Putin Zuma,Putin Za Makedonija,Putin Zapretio Albancima,
Become a Patron! True Information is the most valuable resource and we ask you to give back.
Im Sommer 1967 erschoss der Polizist Karl-Heinz Kurras bei einer Demonstration in West-Berlin den Studenten Benno Ohnesorg. Die Tat gilt als Mitauslöser der 68er-Revolte. Kurras blieb ein freier Mann – auch, als viele Jahre später seine Stasi-Tätigkeit herauskam. Nun wurde bekannt, dass er bereits vor Weihnachten gestorben ist. Ein Mann, der immer noch viele Rätsel aufgibt. Von Sabrina Wendling
Karl-Heinz Kurras hatte zwei Identitäten. Einmal Karl-Heinz Kurras, der West-Berliner Polizist, der im Juni 1967 am Rande einer Demonstration den Studenten Benno Ohnesorg erschoss. Und einmal Otto Bohl, wie sich Kurras als Inoffizieller Mitarbeiter der DDR-Staatssicherheit nannte. Ein Doppelleben, das viel aussagt über einen zerrissenen und auch rätselhaften Mann, über den bis heute in der Öffentlichkeit nur wenig bekannt ist. Denn über seine Stasi-Vergangenheit wollte er nicht sprechen.
Ein komplizierter Mensch
Vor allem eines weiß man über ihn: Dass er Waffen liebte. Bei einer Polizeidurchsuchung 2009 wurden in seiner Wohnung ein Trommelrevolver, ein Totschläger und eine Menge Munition gefunden. Spiegel-Journalist Peter Wensierski hat sich bei seinen Recherchen zum getöteten Studenten Benno Ohnesorg auch ausführlich mit Karl-Heinz Kurras befasst. Er berichtet von einem komplizierten Menschen, der als junger Mann in den Krieg zog: “Kurras war mit 17, 18 an der Ostfront. Er hat eine Begeisterung für das Schießen aus dem Krieg mitgebracht.” Auch nach dem Krieg ging er jeden fast jeden Sonntag auf den Schießplatz. Ein Waffennarr, sagt Wensierski: “Er hat seinen Agentenlohn der Stasi – 400 oder 500 Mark monatlich, viel Geld damals – für das Schießen ausgegeben.”
KURRAS IST TOT
Karl-Heinz Kurras ist tot. Der frühere Berliner Polizist, der 1967 den Studenten Benno Ohnesorg erschoss, starb bereits Mitte Dezember und wurde laut Tagesspiegel anonym bestattet. Seine Bluttat gilt als einer der Auslöser der 68er-Bewegung.
Kurras sei ein Mann gewesen, so Wensierski, der seine Kriegserlebnisse nicht aufgearbeitet habe, der stets bemüht gewesen sei, eine Fassade aufrecht zu erhalten – besonders schwierig angesichts seiner Doppelfunktion als Polizist und Stasi-Agent. “Nichts stimmte eigentlich an ihm, aber die Fassade musste stimmen. Alles, was das durcheinander brachte, diese chaotischen Studenten – er war wie alle anderen Polizisten an diesem Tag voller Hass, denke ich.” Kurras habe gesagt, dass er auf alles “scheiße”, was sich ihm in den Weg stelle. Laut Wensierski eine Person, die die Gewalt des Krieges, die Nichtaufarbeitung der Erlebnisse mit diesem Schuss auf Ohnesorg weitergegeben hat.
Diese Unberechenbarkeit und seine Affinität zu Waffen waren der Grund, dass der Stasi-Wissenschaftler Helmut Müller-Enbergs Kurras nie persönlich aufsuchte. Müller-Enbergs arbeitet für die Stasi-Unterlagenbehörde in Berlin. Er deckte 2009 gemeinsam mit einer Kollegin auf, dass Kurras für die Stasi spioniert hatte. Ein Fund, der ihm den Boden unter den Füßen wegzog. “Ich bin vom Stuhl gefallen. So etwas hatte ich noch nie auf meinem Schreibtisch liegen.”
Ausgeprochen eifrig im Dienst der Stasi
Aus den Akten ging hervor, dass Kurras sich bereits 1955 als Stasi-Mitarbeiter verpflichtet hatte. In Eigeninitiative. Helmut Müller-Enbergs fand heraus, dass Kurras ausgesprochen diensteifrig war. Er habe über alles berichtet, was ihm unterkam – eine Spitzenquelle, vergleichbar mit “Topas” (alias Rainer Rupp) in der Nato, mit “Gisela” (Gabriele Gast) oder “Paul” (Heinz Felfe) beim BND, so Müller-Enbergs.
Für die Staatssicherheit war Kurras wertvoll, weil er zuverlässig interne Informationen der West-Berliner Polizei weitergab. Nach dem Tod Benno Ohnesorgs fürchtete die Stasi, die Aufklärung des Todesfalls in den späten sechziger Jahren könne Kurras als Spitzel enttarnen. Das geschah jedoch nicht bis zum Jahr 2009, als Helmut Müller-Enbergs und seine Kollegin zufällig auf die Akte des Inoffiziellen Mitarbeiters Otto Bohl stießen.
Kurras wurde nie der fahrlässigen Tötung oder gar des Mordes schuldig gesprochen – 1971 wurde er vor Gericht freigesprochen, 2011 wurde ein neues Verfahren gegen ihn eingestellt. Aus Mangel an Beweisen.
Spion Kop, Spion Meaning, Spio Vest, Spion Kop Montana, Spion 20x-140×70 Zoom Binoculars, Spion Pokemon, Spion Kop Wind Farm Montana, Spion Zap, Spion German, Spion Mri, Spion Avanza, Spion Aerox 155, Spion Agya, Spion Aerox, Spion Ayla, Spion Avanza 2008, Spion Ayla Tipe X, Spion Alphard, Spion Avanza 2009, Spion Aspira, Spion Binoculars, Spion Binoculars 20x-140×70, Spion Binoculars 20x-140×70 Reviews, Spion Binoculars 20x-140×70 Zoom, Spion Bar End, Spion Bulat, Spion Bar End Vespa, Spion Beat, Spion Brio, Spion Bar End Nmax, Spion Kop, Spion Kop Montana, Spion Kop Wind Farm Montana, Spion Kop Twitter, Spion Kop Anfield, Spion Kop Meaning, Spion Kop Idaho, Spion Cafe Racer, Spion Cb150r, Spion Calya, Spion Drug Delivery, Spion Definition, Spion Daytona, Spion Di Stang, Spion Dalam Mobil, Spion Dalam, Spion D’tracker, Spion Depan Fortuner, Spion Datsun Go, Spion Dalam Grand Livina, Spion Elektrik, Spion Elektrik Tidak Berfungsi, Spion English, Spion Ertiga, Spion Excel, Spion Elektrik Xenia, Spion Euro Vespa, Spion Emgi, Spion Etios Valco Type G, Spion Espass, Spion Ford Fiesta, Spion Fortuner, Spion Film, Spion Fino, Spion F1, Spion Fast Bikes, Spion French, Spion Variasi, Spion Futura, Spoon Flower, Spion German, Spion Grand Livina, Spion Gojek, Spion Grand Max, Spion Gsx R150, Spion Gran Max, Spion Glas, Spion Grand Vitara, Spion Gma, Spion Grand Livina Bekas, Spion Honda Beat, Spion Honda Jazz, Spion Honda, Spion Hrv, Spion Harrier, Spion Honda Brio, Spion Honda Mobilio, Spion Honda Click, Spion Harley Davidson, Spion Hyundai Avega, Spion In English, Spion Innova, Spion Innova 2005, Spion Innova 2016, Spion Ignis, Spion Innova 2013, Spion Innova 2010, Spion Innova 2014, Spion Innova Bekas, Spion Innova V, Spion Jalu, Spion Jalu Nmax, Spion Jalu Bulat, Spion Japstyle, Spion Jalu Vespa, Spion Jepit Vespa, Spion Jalu Ride It, Spion Jalu Stang, Spion Jupiter Mx, Spion Jepit, Spion Kop, Spion Kop Montana, Spion Kop Wind Farm Montana, Spion Kop Twitter, Spion Kop Anfield, Spion Kop Meaning, Spion Kop Idaho, Spion Kopje, Spion Kamera, Spion Kop Trails, Spion Lipat, Spion Lipat Nmax, Spion Lodge Leixlip, Spion Livina, Spion Luxio, Spion Lodge, Spion Lightech, Spion Lipat Variasi, Spion Lipat Otomatis, Spion Led, Spion Meaning, Spion Mri, Spion Military Zoom Binoculars, Spion Motor, Spion Mobil, Spion Motor Variasi, Spion Mt25, Spion Mazda 2, Spion Motor Keren, Spion Mobil Bekas, Spio Nanoparticles, Spion Nmax, Spion Nmax R25, Spion Ninja, Spion Ninja 250, Spion Nissan March, Spion Nmax Modif, Spion Nanoparticle, Spion Ninja Fi, Spion Nmax Modifikasi, Spion Otomatis, Spion Opel Blazer, Spion Otomatis Grand Livina, Spion Ori Yamaha, Spion Outlander, Spion Ori Vario, Spion Ori Pcx, Spion Online, Spion Otomatis Rusak, Spion Odnoklassniki, Spion Pokemon, Spion Pe Cont Propriu, Spion Pcx, Spion Pulsar Nmax, Spion Pulsar, Spion Panther, Spion Pulsar 135, Spion Particles, Spion Patah, Spion Pcx 150, Spion Qui Est, Spion Question Pour Un Champion, Spion Quand Maman N’est Pas La, Spion Quotes, Spion Quicksilver, Spion Quest Aion, Spi0n Quand Une Mascotte, Spion Quatar, Spion Quake Oscilloscope, Spion Quiz Vragen, Spoon Rest, Spoon Rings, Spoon River Anthology, Spoon River, Spoon River College, Spoon Restaurant Pittsburgh, Spoon Roast, Spoon Rack, Spoon Racing, Spoon River Anthology Pdf, Spion Stang, Spion Sepeda, Spion Scoopy, Spion Satria Fu, Spion Sigra, Spion Supermoto, Spion Supra X 125, Spion Sein, Spionspiegel, Spion Shogun Sp, Spion Tomok, Spion Tanduk, Spion Tengah Mobil, Spion Tengah Livina Patah, Spion Tomok Cb150r, Spion Terios, Spion Tengah, Spion Tomok Rizoma, Spion Tanduk Motor, Spion Tomok Cnc, Spion Untuk Nmax, Spion Udstyr, Spion Under Mirror, Spion Utstyr, Spion Und Sein Bruder, Spion Und Spion, Spion Ujung Stang, Spion Untuk Cbr150r, Spion Untuk Sepeda, Spion Ur, Spion Variasi, Spion Vespa, Spion Variasi Nmax, Spion Variasi Matic, Spion Vario, Spion Vespa Sprint, Spion Vixion, Spion Variasi Vixion, Spion Vespa Matic, Spion Variasi Cb150r, Spion Wider Willen, Spion Wikipedia, Spion Worden, Spion Werden, Spion Wilwood, Spion Whatsapp, Spion Watch, Spion W202, Spion Wiki, Spion Wider Willen Stream, Spion Xenia, Spion Xenia Manual, Spion X Ride, Spion Xabre, Spion Xeon, Spion Nmax, Spion Xenia 2010, Spion Xenia 2016, Spion Xenia 2008, Spion Youtube, Spion Yaris, Spion Yamaha, Spion Yamaha Nmax, Spion Yamaha R25, Spion Yamaha R1, Spion Yamaha X1, Spion Yamaha 125z, Spion Yamaha Fino, Spion Yamaha X Ride, Spion Zap, Spion Zx10r, Spion Z250, Spion Zelioni, Spion Z250sl, Spion Zwischen Zwei Fronten, Spion Zap Youtube, Spion Zwischen Zwei Fronten Stream, Spion Zwischen Zwei Fronten Online Stream, Spion Zap 51
Become a Patron! True Information is the most valuable resource and we ask you to give back.
IPN BU 00612/2419 DGAWIN LECH
IPN BU 002081/305 DIAKIEWICZ TOMASZ
IPN BU 002085/371 DIAKIEWICZ TOMASZ
IPN BU 645/1688 DIAKOWSKA HELENA
IPN BU 00328/784 DIAKOWSKI RYSZARD
IPN BU 001134/1629 DIAKOWSKI RYSZARD MICHAŁ
IPN BU 00611/708 DIAMENT BOGDAN
IPN BU 001198/1134 DIAMENT BOGDAN
IPN BU 0193/7399 DIATŁOWICKI TADEUSZ DAWID
IPN BU 0993/253 DICHOWSKA DANUTA
IPN BU 00225/119 DIESENDORF – PPRZYBYLSKI MARCELI
IPN BU PF 2/66 DIETRICH BOLESŁAWA
IPN BU 00249/1613 DIETRICH EDWARD
IPN BU 0193/1676 DIETRICH ZDZISŁAW
IPN BU 00612/2365 DIJAK HENRYK
IPN BU 00612/1906 DIJAS WIESŁAW
IPN BU 00191/711 DIJK – BORKOWSKA EWA BARBARA
IPN BU 00257/391 DIJK-BORKOWSKA LANZI EWA BARBARA
IPN BU 001102/1458 DIJK-BORKOWSKA-LANZI EWA BARBARA
IPN BU 0193/4843 DIKIJ KRYSTYNA
IPN BU PF 71/21 DIKS DARIUSZ
IPN BU 698/619 DIKSZTEIN MAŁGORZATA
IPN BU 980/24 DIKUNOW WIESŁAWA
IPN BU 0951/1406 DILIS WOJCIECH
IPN BU 00328/1545 DIMMICH CARMELINA
IPN BU 001134/2527 DIMMICH CARMELINA MARIA
IPN BU 00277/11 DIMMICH FELIKS
IPN BU 00945/2121 DINDORF WOJCIECH – ALFRED
IPN BU 00170/131 DINDORF WOJCIECH ALFRED
IPN BU 00612/4204 DINIEJKO ANDRZEJ
IPN BU 644/1082 DINTER MICHAŁ
IPN BU 0902/152 DIOMIN EMILIA
IPN BU 644/1083 DIOMIN TEODOR
IPN BU 0193/395 DIOMIN TEODOR FEODOR
IPN BU 0772/74 DIONIZIAK STEFAN JAKUB
IPN BU 002086/1846 DIRKSEN-KAMIERCZAK HALINA JOANNA
IPN BU 095/13 DITKOWSKI MIROSŁAW
IPN BU 0870/323 DITRYCH MAREK
IPN BU 52/194 DITRYCH MARIUSZ
IPN BU 0772/2513 DITTRYCH JADWIGA
IPN BU 0591/108 DIUFER JAN
IPN BU 0193/396 DIUPERO CZESŁAW
IPN BU 706/123 DIUPERO JÓZEF
IPN BU 0193/397 DIUSZKO WASYL
IPN BU 001052/41 DIXON REGINALD WALTER
Kgb Meaning, Kgb Bar, Kgb Putin, Kgb Radio, Kgb Cold War, Kgb The Office, Kgb Vs Cia, Kgb Boston, Kgb Gang, Kgb Training, Kgb Agent, Kgb Archiver, Kgb Assassinations, Kgb Animal Farm, Kgb Alien, Kgb Archer, Kgb Ap Euro, Kgb Alaska, Kgb Arms, Kgb Application, Kgb Bar, Kgb Boston, Kgb Band, Kgb Badge, Kgb Burger, Kgb Beer, Kgb Bar East Village, Kgb Building, Kgb Ballistic Knife, Kgb Bar Events, Kgb Cold War, Kgb Call Center, Kgb Chicken, Kgb Conduit, Kgb Customs, Kgb Construction, Kgb Car, Kgb Company, Kgb Careers, Kgb Cold War Definition, Kgb Definition, Kgb Deals, Kgb Department 12, Kgb Documentary, Kgb Directorate S, Kgb Defector, Kgb Drink, Kgb Def, Kgb During The Cold War, Kgb Donut, Kgb Established, Kgb Emblem, Kgb Events, Kgb East Village, Kgb Espionage, Kgb Executions, Kgb Enterprises, Kgb Escape Room Tips, Kgb Execution Methods, Kgb Ended, Kgb Fm, Kgb Food Truck, Kgb Fsb, Kgb Flag, Kgb Facts, Kgb Foam, Kgb Files, Kgb Football, Kgb Fantastic Fiction, Kgb Full Form, Kgb Gang, Kgb Glass, Kgb Game, Kgb Group, Kgb Glass Donut, Kgb Gru, Kgb Glass For Sale, Kgb Gourmet Food Truck, Kgb Gun, Kgb Gif, Kgb History, Kgb Headquarters, Kgb Hat, Kgb Headphones, Kgb Hair, Kgb Head, Kgb Homegrown Albums, Kgb Homes, Kgb Homegrown Greatest Hits, Kgb Handler, Kgb In Russian, Kgb Illegals, Kgb In America, Kgb In Animal Farm, Kgb In Usa, Kgb Interrogation, Kgb Inc, Kgb Images, Kgb In The Cold War, Kgb Ilm, Kgb Jokes, Kgb Jfk Assassination, Kgb Jobs, Kgb Joke Office, Kgb Jack Barsky, Kgb Jfk, Kgb Jacket, Kgb Jfk Assassination Files, Kgb Jewelry, Kgb Jimmy Carter Campaign, Kgb Kiteboarding, Kgb Kfc, Kgb Killed Jfk, Kgb Keylogger, Kgb Kgb, Kgb Knife, Kgb Kiss, Kgb Kfc Meme, Kgb Killers, Kgb Kostikov, Kgb Logo, Kgb Lee, Kgb Leaders, Kgb Lansing, Kbg Logistics, Kgb Las Vegas, Kgb Law, Kgb Leafly, Kgb Lubbock, Kgb Law Firm, Kgb Meaning, Kgb Museum Prague, Kgb Meme, Kgb Movies, Kgb Motto, Kgb Mafia, Kgb Music, Kgb Martial Arts, Kgb Museum Moscow, Kgb Marvel, Kgb New Name, Kgb Nyc, Kgb News, Kgb New York, Kgb Now, Kgb Number, Kbg New Brunswick, Kgb Now Called, Kbg New Brunswick Nj, Kgb Name, Kgb Officer, Kgb Office Joke, Kgb Operations, Kgb Outfit, Kgbi Omaha, Kgb Osnaz, Kgb Oracle, Kgb Og Strain, Kgb Operations During The Cold War, Kgb Outpost, Kgb Putin, Kgb Packers, Kgb Predecessor, Kgb Productions, Kgb Paris, Kgb Police, Kgb Propaganda, Kgb Prison, Kgb Pen, Kgb Pin, Kgb Questions, Kgb Quizlet, Kgb Quotes, Kgb Quora, Kgb Question Service, Kgb Questions And Answers, Kgb Quotes Rounders, Kgb Que Es, Kgb Quarter Report, Kgb Russia, Kgb Radio, Kgb Rounders, Kgb Ranks, Kgb Red Room, Kgb Russian Revolution, Kgb Reading Series, Kgb Restaurant, Kgb Resident, Kgb Ricin, Kgb Spies, Kgb Successor, Kgb San Diego, Kgb Sky Show 2017, Kgb Symbol, Kgb San Antonio, Kgb Stalin, Kbg Syndrome, Kgb Swimbaits, Kgb Strain, Kgb The Office, Kgb Training, Kgb Texas, Kgb Today, Kgb Text, Kgb Torture, Kgb Translation, Kgb Tactics, Kgb Three Bears, Kgb Training Manual, Kgb Uniform, Kgb Usa, Kgb Ussr, Kgb University, Kgb Umbrella, Kgb Usa Inc, Kgb Urban, Kgb Usa San Antonio, Kgb Ushanka, Kgb Useful Idiots, Kgb Vs Cia, Kgb Vs Fsb, Kgb Vest Persona 5, Kgb Vs Gru, Kgb Vodka, Kgb Vs Cia Cold War, Kgb Vs Cia Deadliest Warrior, Kgb Vs Fbi, Kgb Video Game, Kgb Vodka Lemon, Kgb Wiki, Kgb Wilmington, Kgb Weapons, Kgb Watch, Kgb Website, Kgb Waits For No One, Kgb Weed, Kgb We Will Ask The Questions, Kgb Wolf, Kgb Wallpaper, Kgb X Ray, Ex Kgb, Kgb X Files, Kgb X Line, Kgbx Radio, Ktb Xd, Kgb X Cia, Kgb Xredirect, Kgb Archiver X64, Kgb Line X Stringer, Kgb Youtube, Kgb Yuri, Kgb Yelp, Kgb Yahoo, Kgb York, Kgb Yerevan, Kgb Yahoo Answers, Kgb Yoga Bag, Kgb Years, Kgb Yra, Kgb Zippo, Kgb Zip, Kgb Znacenje, Kgb Zomato, Kgb Zenekar, Kgb Zipper, Kgb Zenith Group, Kgb Zip Download, Kgb Zhukov, Kgb Znachenie, Kgb Agent Putin, Kgb Agent Meaning, Kgb Agent Fomin, Kgb Agent Book, Kgb Agent Definition, Kgb Agent Salary, Kgb Agent Interview, Kgb Agent Killed In London, Kgb Agent Jack Barsky, Kgb Agent In Usa, Kgb Agent Assassinated, Kgb Agent Alien, Kgb Agent Aragon, Kgb Agent Alexander, Soviet Agent Abel, Vostok Kgb Agent Automatic, Vostok Kgb Agent Automatic Watch, Kgb Agent In America, Kgb Agent Record Of Alien Races, Kgb Agent With Frightening Psychic Abilities, Kgb Agent Book, Kgb Agent Bezmenov, Kgb Agent Blacklist, Kgb Agent Jack Barsky, Kgb Agent In Bond Movie, Kgb Agent Killed By Radiation, Ex Kgb Agent Book, Kgb Home Based Agent, Former Kgb Agent Explains Brainwashing America, Best Kgb Agent, Kgb Agent Costume, Kgb Agent Cuban Missile Crisis, Kgb Agent Caught, Kgb Agent Careers, Kgb Special Agent Challenge, Kgb Agent In Cia, Kgb Agent Halloween Costume, Kgb Agent Explains Current Events In Usa, Kgb Agent Leaves Canada, Ex Kgb Agent Leaves Canada, Kgb Agent Definition, Kgb Agent Defector, Kgb Agent Demoralization, Kgb Agent Dies, Kgb Double Agent, Soviet Double Agent, Cia Kgb Double Agent, Define Kgb Agent, Kgb Special Agent Job Description, Agent Du Kgb, Kgb Agent Explains Current Events In Usa, Former Kgb Agent Explains Brainwashing America, Kgb Agent Killed In England, Ex Kgb Agent Interview, Ex Kgb Agent, Ex-kgb Agent On Indoctrination & Demoralization, Ex Kgb Agent Leaves Canada, Ex Kgb Agent Killed, Ex Kgb Agent Yuri, Ex Kgb Agent Youtube, Kgb Agent Fomin, Kgb Agent Found Dead, Kgb Agents Foe Crossword Clue, Kgb Agents Found In New Jersey, Kgb Famous Agents, Kgb Agent With Frightening Psychic Abilities, Former Kgb Agent Poisoned, Former Kgb Agent Explains Brainwashing America, Former Kgb Agent, Former Kgb Agent Killed In London, Kgb Agent Guillou, Soviet Gru Agent, Genscher Kgb Agent, Kgb Agent Halloween Costume, Hot Kgb Agent, Kgb Agent Interview, Kgb Agent In Usa, Kgb Agent In India, Kgb Agent In Mi6, Kgb Agent In Cia, Kgb Agent In Bond Movie, Kgb Agent In America, Kgb Agent In Vancouver, Kgb Agent Killed In London, Former Kgb Agent Interview, Kgb Agent Jack Barsky, Kgb Agent Job, Kgb Agent James Bond, Kgb Special Agent Job Description, Kgb Special Agent Job, Kgb Agent Killed In London, Kgb Agent Kidnapped, Kgb Agent Killed In England, Khamenei Kgb Agent, Kirill Kgb Agent, Kekkonen Kgb Agent, Kgb Agent Litvinenko, Kgb Agent Login, Kgb Agent London, Kgb Agent Leaves Canada, Soviet Agent Lucy, Russian Kgb Agent Lisa, Ex Kgb Agent Leaves Canada, Kgb Agent Meaning, Kgb Agent Murdered, Kgb Agent Movies, Kgb Agent 60 Minutes, Kgb Agent In Mi6, Kgb Agent In Bond Movie, Merkel Kgb Agent, Kgb Agent Names, Soviet News Agency, Kgb Agents In New Jersey, A Former Kgb Agent Needs Your Help, Nyiso Kgb Agent, Kgb Agent On 60 Minutes, Kgb Agent Online, Kgb Agent Record Of Alien Races, Ex-kgb Agent On Indoctrination & Demoralization, Obama Kgb Agent, Oswald Kgb Agent, Agent_of_kgb, By\u0142y Agent Kgb Opowiada, Kgb Agent Putin, Kgb Agent Poisoned, Kgb Agent Polonium, Kgb Agent Pay, Kgb Agent Philippines, Kgb Special Agent Philippines Salary, Kgb Agent With Frightening Psychic Abilities, Putin Kgb Agent Reagan, Palme Kgb Agent, Prodi Kgb Agent, Kgb Agent Ranks, Kgb Agent Record Of Alien Races, Kgb Agent Russia, Kgb Agent Requirements, Kgb Agent Radiation Poisoning, Kgb Agent Rudolf Abel, Soviet Agent Rudolf Abel, Putin Kgb Agent Reagan, Kgb Special Agent Review, Russian Kgb Agent Alexander Litvinenko, Kgb Agent Salary, Kgb Agent Subversion, Kgb Special Agent, Kgb Special Agent Salary, Kgb Special Agent Training, Kgb Special Agent Philippines, Kgb Sleeper Agent, Kgb Special Agent Review, Kgb Secret Agent, Kgb Special Agent Philippines Salary, Kgb Agent Training, Kgb Agent Tells You What The Illusion Is, Kgb Agent Test, Kgb Agent Tv Show, Kgb Special Agent Training, Kgb Secret Agent Test, Kgb Agents In The Us, Top Kgb Agent, Kgb Agent Uniform, Kgb Agent Usa, Kgb Undercover Agents, Kgb Agent Vladimir Putin, Kgb Agent Vergiftet, Kgb Agent In Vancouver, Vostok Kgb Agent Automatic, Vostok Kgb Agent Automatic Watch, Kgb Agent Wiki, Kgb Agent With Frightening Psychic Abilities, Kgb Agent Weapons, Kgb Agent Watches, Kgb Agent Warns, Kgb Agents Who Defected, Kgb Woman Agent, Soviet Agent Winter Soldier, Soyuz Kgb Agent Watches, Kgb Agent Tells You What The Illusion Is, Kgb Agent Yuri Bezmenov, Kgb Agent Youtube, Kgb Agent Tells You What The Illusion Is, Ex Kgb Agent Yuri, Ex Kgb Agent Youtube, Yuri Kgb Agent, Youngest Kgb Agent, Putin Wife,Putin News,Putin Net Worth,Putin Height,Putin Bay,Putin Memes,Putin Trump,Putin On The Ritz,Putin Age,Putin Trump Meeting,Putin And Trump,Putin Age,Putin And Trump Meeting,Putin Approval Rating,Putin And Obama,Putin Ally Crossword,Putin Assad,Putin And North Korea,Putin And Reagan,Putin As A Child,Putin Bay,Putin Bear,Putin Birthday,Putin Biography,Putin Bay Hotels,Putin Badass,Putin Bay Weather,Putin Blueberry Hill,Putin Bay Ferry,Putin Black Belt,Putin Children,Putin Calendar,Putin Clown,Putin Cartoon,Putin Chechnya,Putin Crying,Putin Canada,Putin Crimea,Putin Corruption,Putin Clinton,Putin Daughters,Putin Dog,Putin Documentary,Putin Dead,Putin Dog Merkel,Putin Definition,Putin Dancing,Putin Dolphins,Putin Drawing,Putin Dancing Gif,Putin Election,Putin Eating Popcorn,Putin English,Putin Election Results,Putin Erdogan,Putin Education,Putin Economy,Putin Eyes,Putin Exxon Deal,Putin Eye Color,Putin Family,Putin Food,Putin Funny,Putin Face,Putin Facts,Putin French,Putin Fishing,Poutine Fries,Putin Fascist,Putin Funny Face,Putin Gif,Putin Genocide,Putin Global Warming,Putin Gymnast,Putin Wife,Putin Gun,Putin Glasses,Putin Gangster,Putin Government,Putin Gorbachev,Putin Height,Putin Horse,Putin House,Putin Horseback,Putin Hockey,Putin History,Putin Hunting,Putin Hillary,Putin Human Rights,Putin Home,Putin Interview,Putin Images,Putin Israel,Putin Iq,Putin Isis,Putin In French,Putin Island,Putin Inauguration,Putin In Power,Putin Instagram,Putin Judo,Putin Jill Stein,Putin Journalists,Putin John Oliver,Putin Jehovah,Putin Jw,Putin Judo Gif,Putin Jesus,Putin James Bond,Putin Jehovah Witness,Putin Kgb,Putin Korea,Putin Karate,Putin Kremlin,Putin Kleptocracy,Putin Kim Jong Un,Putin Kraft Ring,Putin Kabaeva,Putin Khuilo,Putin Kid,Putin Laughing,Putin Laughing Gif,Putin Le Pen,Putin Languages,Putin Latest News,Putin Loves Trump,Putin Lollipop,Putin Likes Trump,Putin Limo,Putin Leadership,Putin Memes,Putin Merkel Dog,Putin Married,Putin Merkel,Putin Makeup,Putin Mask,Putin Martial Arts,Putin Meaning,Putin Macron,Putin Mansion,Putin News,Putin Net Worth,Putin North Korea,Putin New Wife,Putin Netanyahu,Putin Nato,Putin Net Worth Wiki,Putin Name Meaning,Putin Nickname,Putin Nuclear War,Putin On The Ritz,Putin On A Horse,Putin On Trump,Putin On North Korea,Putin Obama,Putin On The Ritz Gif,Putin On Syria,Putin Opposition,Putin On Snl,Putin On The Ritz Meme,Putin President,Putin Piano,Putin Palace,Putin Political Party,Putin Picture,Putin Poison,Putin Propaganda,Putin Puns,Putin Pop Song,Putin Popularity,Putin Quotes,Putin Quotes On Obama,Putin Queen Elizabeth,Putin Quotes Funny,Putin Quizlet,Putin Queen Elizabeth Stairs,Putin Quotes On Trump,Putin Quora,Putin Quote Immigrants,Putin Quebec,Putin Russia,Putin Reagan,Putin Riding Trump,Putin Rise To Power,Putin Reelection,Putin Richest Man In The World,Putin Riding A Ritz Cracker,Putin Response,Putin Ritz,Putin Rainbow,Putin Snl,Putin Syria,Putin Song,Putin Smiling,Putin Speech,Putin Shirt,Putin Speaking English,Putin Singing,Putin Salary,Putin Super Bowl Ring,Putin Trump,Putin Trump Meeting,Putin Twitter,Putin Trump Meme,Putin Trump Horse,Putin Trump Kiss,Putin Term Limit,Putin Trump Gif,Putin Term,Putin Today,Putin Ukraine,Putin Ussr,Putin Us Visit,Putin Unicorn,Putin Us Elections,Putin Un,Putin Undercover,Putin Urban Dictionary,Putin United Nations,Putin Us Relations,Putin Vs Trump,Putin Vs Obama,Putin Vladimir,Putin Video,Putin Vodka,Putin Vs Stalin,Putin Visits Trump,Putin Visit To White House,Putin Vampire,Putin Vs Obama Meme,Putin Wife,Putin Wiki,Putin Wealth,Putin Wink,Putin War,Putin Ww3,Putin Watch,Putin Winking Gif,Putin With Animals,Putin Walking,Putin Xi Jinping,Putin X Obama,Putin X Reader,Putin Xi,Putin And Trump,Putin And Obama,Putin And Assad,Putin And North Korea,Putin And Reagan,Putin And The Ritz,Putin Young,Putin Youtube,Putin Yacht,Putin Youth,Putin Yeltsin,Putin Yume,Putin Years As President,Putin Young Pictures,Putin Youth Army,Putin Yarmulke,Putin Zodiac Sign,Putin Zakaria,Putin Zassal,Putin Zassal Lyrics,Putin Zero Hedge,Putin Zeman,Putin Zil Limousine,Putin Zuma,Putin Za Makedonija,Putin Zapretio Albancima,
Become a Patron! True Information is the most valuable resource and we ask you to give back.
Putin Wife,Putin News,Putin Net Worth,Putin Height,Putin Bay,Putin Memes,Putin Trump,Putin On The Ritz,Putin Age,Putin Trump Meeting,Putin And Trump,Putin Age,Putin And Trump Meeting,Putin Approval Rating,Putin And Obama,Putin Ally Crossword,Putin Assad,Putin And North Korea,Putin And Reagan,Putin As A Child,Putin Bay,Putin Bear,Putin Birthday,Putin Biography,Putin Bay Hotels,Putin Badass,Putin Bay Weather,Putin Blueberry Hill,Putin Bay Ferry,Putin Black Belt,Putin Children,Putin Calendar,Putin Clown,Putin Cartoon,Putin Chechnya,Putin Crying,Putin Canada,Putin Crimea,Putin Corruption,Putin Clinton,Putin Daughters,Putin Dog,Putin Documentary,Putin Dead,Putin Dog Merkel,Putin Definition,Putin Dancing,Putin Dolphins,Putin Drawing,Putin Dancing Gif,Putin Election,Putin Eating Popcorn,Putin English,Putin Election Results,Putin Erdogan,Putin Education,Putin Economy,Putin Eyes,Putin Exxon Deal,Putin Eye Color,Putin Family,Putin Food,Putin Funny,Putin Face,Putin Facts,Putin French,Putin Fishing,Poutine Fries,Putin Fascist,Putin Funny Face,Putin Gif,Putin Genocide,Putin Global Warming,Putin Gymnast,Putin Wife,Putin Gun,Putin Glasses,Putin Gangster,Putin Government,Putin Gorbachev,Putin Height,Putin Horse,Putin House,Putin Horseback,Putin Hockey,Putin History,Putin Hunting,Putin Hillary,Putin Human Rights,Putin Home,Putin Interview,Putin Images,Putin Israel,Putin Iq,Putin Isis,Putin In French,Putin Island,Putin Inauguration,Putin In Power,Putin Instagram,Putin Judo,Putin Jill Stein,Putin Journalists,Putin John Oliver,Putin Jehovah,Putin Jw,Putin Judo Gif,Putin Jesus,Putin James Bond,Putin Jehovah Witness,Putin Kgb,Putin Korea,Putin Karate,Putin Kremlin,Putin Kleptocracy,Putin Kim Jong Un,Putin Kraft Ring,Putin Kabaeva,Putin Khuilo,Putin Kid,Putin Laughing,Putin Laughing Gif,Putin Le Pen,Putin Languages,Putin Latest News,Putin Loves Trump,Putin Lollipop,Putin Likes Trump,Putin Limo,Putin Leadership,Putin Memes,Putin Merkel Dog,Putin Married,Putin Merkel,Putin Makeup,Putin Mask,Putin Martial Arts,Putin Meaning,Putin Macron,Putin Mansion,Putin News,Putin Net Worth,Putin North Korea,Putin New Wife,Putin Netanyahu,Putin Nato,Putin Net Worth Wiki,Putin Name Meaning,Putin Nickname,Putin Nuclear War,Putin On The Ritz,Putin On A Horse,Putin On Trump,Putin On North Korea,Putin Obama,Putin On The Ritz Gif,Putin On Syria,Putin Opposition,Putin On Snl,Putin On The Ritz Meme,Putin President,Putin Piano,Putin Palace,Putin Political Party,Putin Picture,Putin Poison,Putin Propaganda,Putin Puns,Putin Pop Song,Putin Popularity,Putin Quotes,Putin Quotes On Obama,Putin Queen Elizabeth,Putin Quotes Funny,Putin Quizlet,Putin Queen Elizabeth Stairs,Putin Quotes On Trump,Putin Quora,Putin Quote Immigrants,Putin Quebec,Putin Russia,Putin Reagan,Putin Riding Trump,Putin Rise To Power,Putin Reelection,Putin Richest Man In The World,Putin Riding A Ritz Cracker,Putin Response,Putin Ritz,Putin Rainbow,Putin Snl,Putin Syria,Putin Song,Putin Smiling,Putin Speech,Putin Shirt,Putin Speaking English,Putin Singing,Putin Salary,Putin Super Bowl Ring,Putin Trump,Putin Trump Meeting,Putin Twitter,Putin Trump Meme,Putin Trump Horse,Putin Trump Kiss,Putin Term Limit,Putin Trump Gif,Putin Term,Putin Today,Putin Ukraine,Putin Ussr,Putin Us Visit,Putin Unicorn,Putin Us Elections,Putin Un,Putin Undercover,Putin Urban Dictionary,Putin United Nations,Putin Us Relations,Putin Vs Trump,Putin Vs Obama,Putin Vladimir,Putin Video,Putin Vodka,Putin Vs Stalin,Putin Visits Trump,Putin Visit To White House,Putin Vampire,Putin Vs Obama Meme,Putin Wife,Putin Wiki,Putin Wealth,Putin Wink,Putin War,Putin Ww3,Putin Watch,Putin Winking Gif,Putin With Animals,Putin Walking,Putin Xi Jinping,Putin X Obama,Putin X Reader,Putin Xi,Putin And Trump,Putin And Obama,Putin And Assad,Putin And North Korea,Putin And Reagan,Putin And The Ritz,Putin Young,Putin Youtube,Putin Yacht,Putin Youth,Putin Yeltsin,Putin Yume,Putin Years As President,Putin Young Pictures,Putin Youth Army,Putin Yarmulke,Putin Zodiac Sign,Putin Zakaria,Putin Zassal,Putin Zassal Lyrics,Putin Zero Hedge,Putin Zeman,Putin Zil Limousine,Putin Zuma,Putin Za Makedonija,Putin Zapretio Albancima,
Become a Patron! True Information is the most valuable resource and we ask you to give back.
IPN BU PF
1021/54 DĘBACKA ZOFIA
IPN BU 698/617
DĘBCZAK-DĘBSKI KAZIMIERZ
IPN BU 001134/2537
DĘBCZYŃSKA JOLANTA
IPN BU 0833/809
DĘBECKA HALINA
IPN BU 0870/197
DĘBECKI BRONISŁAW
IPN BU 00612/1600
DĘBECKI HENRYK
IPN BU 001198/4748
DĘBECKI HENRYK
IPN BU 0870/198
DĘBECKI MARIAN
IPN BU 0866/141
DĘBECKI ZDZISŁAW
IPN BU 684/3
DĘBEK ANDRZEJ
IPN BU 710/4
DĘBEK CZESŁAW
IPN BU 0607/58
DĘBEK HONORATA
IPN BU 00744/62
DĘBEK JANUSZ
IPN BU 001121/3696
DĘBEK JANUSZ
IPN BU 0242/1731
DĘBEK JÓZEF
IPN BU 00277/769
DĘBEK MARIAN
IPN BU 001121/2966
DĘBEK MARIAN
IPN BU 0218/251
DĘBEK STANISŁAW
IPN BU 0958/1384
DĘBEK STEFAN
IPN BU 01256/39
DĘBEK STEFAN
IPN BU 00277/642
DĘBEK WIESŁAW
IPN BU 001121/2846
DĘBEK WIESŁAW
IPN BU 0902/151
DĘBICKA (ESSIG) LIDIA
IPN BU 0242/2988
DĘBICKA ELŻBIETA
IPN BU 001121/1474
DĘBICKA KOZIERADZKA ZOFIA
IPN BU 0901/2360
DĘBICKA MAJA
IPN BU 01133/848
DĘBICKA MARIANNA
IPN BU 00200/1085
DĘBICKI ANDRZEJ
IPN BU 001102/673
DĘBICKI ANDRZEJ
IPN BU 00273/164
DĘBICKI EDWARD
IPN BU 00234
p.247 DĘBICKI EDWARD
IPN BU 0891/124
DĘBICKI FRANCISZEK
IPN BU 00611/610
DĘBICKI FRANCISZEK
IPN BU 001198/974
DĘBICKI FRANCISZEK
IPN BU 002082/145
DĘBICKI KAZIMIERZ
IPN BU 002086/372
DĘBICKI KAZIMIERZ
IPN BU 0806/1096
DĘBICKI KRZYSZTOF
IPN BU 0193/8168
DĘBICKI MIECZYSŁAW
IPN BU 0242/2989
DĘBICKI ROMAN
IPN BU 00612/4602
DĘBICKI ROMAN
IPN BU 001198/7233
DĘBICKI ROMAN
IPN BU 01000/633
DĘBICKI STANISŁAW
IPN BU 001043/3861
DĘBICKI STANISŁAW
IPN BU 01000/1495
DĘBICKI STEFAN
IPN BU 0891/1417
DĘBICKI TADEUSZ
IPN BU 0218/3554
DĘBICKI TEODOR
IPN BU 00230
P. 139 DĘBICKI WALDEMAR
IPN BU 00399/237
DĘBICKI WITOLD
IPN BU 001134/4459
DĘBICKI WITOLD JERZY
IPN BU 0891/385
DĘBICKI ZYGMUNT
IPN BU 00249/839
DĘBIDZKA-KOZEIRADZKA ZOFIA
IPN BU 02063/7
DĘBIEC ADAM
IPN BU 001052/1672
DĘBIEC BOGUSŁAWA HANNA
IPN BU 0854/1014
DĘBIEC JÓZEF
IPN BU 0193/8012
DĘBIEC WŁADYSŁAW
IPN BU 0772/2507
DĘBIŃSKA (PIETRZAK) MARIA
IPN BU 0901/1832
DĘBIŃSKA ANNA
IPN BU 0193/394
DĘBIŃSKA DANUTA
IPN BU 00162/4
DĘBIŃSKA ELŻBIETA
IPN BU 0855/3071
DĘBIŃSKA MARIA
IPN BU 0855/2322
DĘBIŃSKA WERONIKA
IPN BU 001134/4523
DĘBIŃSKI GRZEGORZ
IPN BU 0855/3365
DĘBIŃSKI JAN
IPN BU 0902/148
DĘBIŃSKI MARIAN
IPN BU 00612/4730
DĘBIŃSKI MIECZYSŁAW
IPN BU 00966/848
DĘBIŃSKI RYSZARD
IPN BU 0772/2508
DĘBIŃSKI TADEUSZ
IPN BU 0218/2540
DĘBIŃSKI ZBIGNIEW
IPN BU 0901/642
DĘBKOWSKA PIETRZAK KRYSTYNAEUGENIA
IPN BU 0242/2660
DĘBKOWSKI DARIUSZ
IPN BU 0218/287
DĘBKOWSKI KAZIMIERZ
IPN BU 0912/394
DĘBKOWSKI RYSZARD
IPN BU 0193/1673
DĘBNIAK STEFAN
IPN BU 00168/59
DĘBNICKI KAZIMIERZ
IPN BU 00945/1405
DĘBNICKI KAZIMIERZ
IPN BU 00328/1143
DĘBNICKI KRZYSZTOF
IPN BU 001134/2023
DĘBNICKI KRZYSZTOF
IPN BU 00168/267
DĘBORSKI TADEUSZ
IPN BU 001102/2181
DĘBORSKI TADEUSZ
IPN BU 00168/280
DĘBOSZ OTMAR
IPN BU 001102/2137
DĘBOSZ OTMAR
IPN BU 00945/1785
DĘBOSZ OTMAR
IPN BU 636/1824
DĘBOWIECKA HENRYKA
IPN BU 0993/1472
DĘBOWSKA FRANCISZKA
IPN BU 00200/660
DĘBOWSKA FRANCISZKA
IPN BU 001102/106
DĘBOWSKA FRANCISZKA
IPN BU 748/29
DĘBOWSKA HALINA
IPN BU 0855/1873
DĘBOWSKA JANINA
IPN BU 0806/3032
DĘBOWSKA MARIA
IPN BU 01013/385
DĘBOWSKA MARIA
IPN BU 0901/1902
DĘBOWSKA MARIANNA
IPN BU 0772/2509
DĘBOWSKA STANISŁAWA
IPN BU 0243/193
DĘBOWSKI BOGDAN
IPN BU 001198/244
DĘBOWSKI BOGUSŁAW
IPN BU 01137/12
DĘBOWSKI CZESŁAW
IPN BU 0194/3548
DĘBOWSKI CZESŁAW
IPN BU 0218/1070
DĘBOWSKI FELIKS
IPN BU 645/199
DĘBOWSKI FRANCISZEK
IPN BU 01133/849
DĘBOWSKI HENRYK
IPN BU 52/199
DĘBOWSKI IRENEUSZ
IPN BU 00399/262
DĘBOWSKI JERZY
IPN BU 001134/4551
DĘBOWSKI JERZY
IPN BU 00945/2603
DĘBOWSKI JERZY
IPN BU 002082/661
DĘBOWSKI JERZY MARIAN
IPN BU 002086/2000
DĘBOWSKI JERZY MARIAN
IPN BU 00611/1779
DĘBOWSKI JÓZEF
IPN BU 001198/3117
DĘBOWSKI JÓZEF
IPN BU 0911/14
DĘBOWSKI JUCJAN
IPN BU 0194/3759
DĘBOWSKI LECH
IPN BU 00283/585
DĘBOWSKI MAREK
IPN BU 00283/1505
DĘBOWSKI MIROSŁAW
IPN BU 00399/610
DĘBOWSKI MIROSŁAW
IPN BU 001134/4950
DĘBOWSKI MIROSŁAW
IPN BU 00768/842
DĘBOWSKI MIROSŁAW
IPN BU 00170/2
DĘBOWSKI RYSZARD
IPN BU 00945/2101
DĘBOWSKI RYSZARD
IPN BU 001198/2875
DĘBOWSKI STANISŁAW
IPN BU 01013/386
DĘBOWSKI STEFAN
IPN BU 0855/2432
DĘBOWSKI WACŁAW
IPN BU 00283/202
DĘBOWSKI WŁADTSŁAW
IPN BU 01013/344
DĘBOWSKI WŁADYSŁAW
IPN BU 00768/147
DĘBOWSKI WŁADYSŁAW
IPN BU 00334/173
DĘBOWSKI ZDZISŁAW
IPN BU 001134/2902
Dębowski Zdzisław
IPN BU 001052/1068
DĘBRSKI MIROSŁAW
IPN BU 0951/582
DĘBSKA (DUBSKA) JÓZEFA
IPN BU 0772/998
DĘBSKA ALINA
IPN BU 1159/24
DĘBSKA ANNA
IPN BU 001198/171
DĘBSKA BARBARA
IPN BU 00200/1070
DĘBSKA BOŻENA JANINA
IPN BU 001102/655
DĘBSKA BOŻENA JANINA
IPN BU 00249/1230
DĘBSKA EWA
IPN BU 001121/1843
DĘBSKA EWA JOANNA
IPN BU 0855/3366
DĘBSKA FABISIAK ALEKSANDRA
IPN BU 0901/2369
DĘBSKA FIRMINA
IPN BU 0806/2868
DĘBSKA HALINA
IPN BU 0772/2510
DĘBSKA HELENA
IPN BU 093/79
DĘBSKA HELENA
IPN BU 0942/260
DĘBSKA HENRYKA
IPN BU 685/28
DĘBSKA JANINA
IPN BU 698/618
DĘBSKA JANINA
IPN BU 0901/1657
DĘBSKA KRYSTYNA
IPN BU 0242/870
DĘBSKA MARIA
IPN BU 0866/143
DĘBSKA MARIA
IPN BU 0993/1443
DĘBSKA MARIA
IPN BU 0901/2030
DĘBSKA MARZENA
IPN BU 0958/828
DĘBSKA STANISŁAWA
IPN BU 0218/2446
DĘBSKA STEFANIA
IPN BU 0901/521
DĘBSKA SZCZEPAŃSKA TERESA
IPN BU PF
970/98 DĘBSKA TELIMENA
IPN BU 0287/192
DĘBSKA URSZULA
IPN BU 0604/636
DĘBSKA WÓJCIK JÓZEFA
IPN BU 0901/1649
DĘBSKA ZOFIA
IPN BU 00275/511
DĘBSKA-URBAŃCZYK IRENA
IPN BU 001134/418
DĘBSKA-URBAŃCZYK IRENA
IPN BU 0951/1817
DĘBSKI WIESŁAW
IPN BU 00328/1009
DĘBSKI ADAM
IPN BU 001134/1870
DĘBSKI ADAM
IPN BU 00283/1937
DĘBSKI ANDRZEJ
IPN BU 0872/169
DĘBSKI ANTONI
IPN BU 0193/1674
DĘBSKI ANTONI
IPN BU 01000/272
DĘBSKI CZESŁAW
IPN BU 0967/20
DĘBSKI CZESŁAW
IPN BU 0967/20
DĘBSKI CZESŁAW
IPN BU 00249/986
DĘBSKI DANIEL
IPN BU 001121/1612
DĘBSKI DANIEL
IPN BU 02042/177
DĘBSKI DARIUSZ
IPN BU 0901/320
DĘBSKI EDWARD
IPN BU 698/747
DĘBSKI EUGENIUSZ
IPN BU 01133/950
DĘBSKI FRANCISZEK
IPN BU 00744/948
DĘBSKI FRYDERYK
IPN BU 001134/958
DĘBSKI FRYDERYK
IPN BU 0891/382
DĘBSKI HENRYK
IPN BU 01013/387
DĘBSKI HENRYK
IPN BU 002081/241
DĘBSKI HENRYK
IPN BU 002085/307
DĘBSKI HENRYK
IPN BU 0993/1459
DĘBSKI HIPOLIT
IPN BU 0218/3607
DĘBSKI JACEK STANISŁAW
IPN BU 0911/15
DĘBSKI JAN
IPN BU 0866/144
DĘBSKI JAN
IPN BU 00629/3
DĘBSKI JAN
IPN BU 00688/7
DĘBSKI JAN
IPN BU 0591/106
DĘBSKI JAN
IPN BU 00249/390
DĘBSKI JAN
IPN BU 00966/918
DĘBSKI JAN
IPN BU 001121/1015
DĘBSKI JAN
IPN BU 00200/1100
DĘBSKI JAROSLAW
IPN BU 001102/696
DĘBSKI JAROSŁAW
IPN BU 0911/725
DĘBSKI JERZY
IPN BU 0193/1675
DĘBSKI JERZY
IPN BU 001043/347
DĘBSKI JERZY JAN
IPN BU 01000/2083
DĘBSKI JÓZEF
IPN BU 0243/298
DĘBSKI KRZYSZTOF
IPN BU 00966/1190
DĘBSKI KRZYSZTOF KAZIMIERZ
IPN BU 0912/37
DĘBSKI MARIAN
IPN BU 0194/1846
DĘBSKI MARIAN
IPN BU 0194/1973
DĘBSKI MARIAN
IPN BU 00244/176
DĘBSKI MIECZYSŁAW
IPN BU 01133/850
DĘBSKI MIECZYSŁAW
IPN BU 00200/305
DĘBSKI MIROSŁAW
IPN BU 0193/9090
DĘBSKI PIOTR
IPN BU 00328/1100
DĘBSKI PIOTR
IPN BU 001134/1974
DĘBSKI PIOTR
IPN BU 0951/322
DĘBSKI RYSZARD
IPN BU 0870/43
DĘBSKI STANISŁAW
IPN BU 0911/709
DĘBSKI STANISŁAW
IPN BU 0604/1136
DĘBSKI STANISŁAW
IPN BU 01079/208
DĘBSKI STANISŁAW
IPN BU 01133/951
DĘBSKI STANISŁAW
IPN BU 01250/119
DĘBSKI STANISŁAW
IPN BU 002081/256
DĘBSKI STANISŁAW
IPN BU 002085/322
DĘBSKI STANISŁAW
IPN BU 0218/3307
DĘBSKI TADEUSZ
IPN BU 0772/2511
DĘBSKI TADEUSZ
IPN BU 01013/169
DĘBSKI TADEUSZ
IPN BU 644/1072
DĘBSKI TADEUSZ
IPN BU 710/92
DĘBSKI TADEUSZ
IPN BU 01000/247
DĘBSKI WŁADYSŁAW
IPN BU 01133/52
DĘBSKI WŁADYSŁAW
IPN BU 00966/37
DĘBSKI WOJCIECH
IPN BU 001134/3975
DĘBSKI WOJCIECH
IPN BU 00688/85
DĘBSKI ZBIGNIEW
IPN BU 0591/107
DĘBSKI ZBIGNIEW
IPN BU 00744/583
DĘBSKI ZBIGNIEW
IPN BU 001121/4307
DĘBSKI ZBIGNIEW
IPN BU 01013/351
DĘBSKI ZDZISŁAW
IPN BU 00200/1366
DĘBSKI ZDZISŁAW
IPN BU 001102/967
DĘBSKI ZDZISŁAW
IPN BU 0604/864
DĘBSKI ZYGMUNT
IPN BU 001102/1752
DĘBSKI ZYGMUNT
IPN BU 636/1802
DĘDYNOWSKA WŁADYSŁAWA
IPN BU 00244/87
DĘGA CZESŁAW
IPN BU 00312
DĘGA CZESŁAW
IPN BU 00312/61
DĘGA CZESŁAW
Kgb Meaning, Kgb Bar, Kgb Putin, Kgb Radio, Kgb Cold War, Kgb The Office, Kgb Vs Cia, Kgb Boston, Kgb Gang, Kgb Training, Kgb Agent, Kgb Archiver, Kgb Assassinations, Kgb Animal Farm, Kgb Alien, Kgb Archer, Kgb Ap Euro, Kgb Alaska, Kgb Arms, Kgb Application, Kgb Bar, Kgb Boston, Kgb Band, Kgb Badge, Kgb Burger, Kgb Beer, Kgb Bar East Village, Kgb Building, Kgb Ballistic Knife, Kgb Bar Events, Kgb Cold War, Kgb Call Center, Kgb Chicken, Kgb Conduit, Kgb Customs, Kgb Construction, Kgb Car, Kgb Company, Kgb Careers, Kgb Cold War Definition, Kgb Definition, Kgb Deals, Kgb Department 12, Kgb Documentary, Kgb Directorate S, Kgb Defector, Kgb Drink, Kgb Def, Kgb During The Cold War, Kgb Donut, Kgb Established, Kgb Emblem, Kgb Events, Kgb East Village, Kgb Espionage, Kgb Executions, Kgb Enterprises, Kgb Escape Room Tips, Kgb Execution Methods, Kgb Ended, Kgb Fm, Kgb Food Truck, Kgb Fsb, Kgb Flag, Kgb Facts, Kgb Foam, Kgb Files, Kgb Football, Kgb Fantastic Fiction, Kgb Full Form, Kgb Gang, Kgb Glass, Kgb Game, Kgb Group, Kgb Glass Donut, Kgb Gru, Kgb Glass For Sale, Kgb Gourmet Food Truck, Kgb Gun, Kgb Gif, Kgb History, Kgb Headquarters, Kgb Hat, Kgb Headphones, Kgb Hair, Kgb Head, Kgb Homegrown Albums, Kgb Homes, Kgb Homegrown Greatest Hits, Kgb Handler, Kgb In Russian, Kgb Illegals, Kgb In America, Kgb In Animal Farm, Kgb In Usa, Kgb Interrogation, Kgb Inc, Kgb Images, Kgb In The Cold War, Kgb Ilm, Kgb Jokes, Kgb Jfk Assassination, Kgb Jobs, Kgb Joke Office, Kgb Jack Barsky, Kgb Jfk, Kgb Jacket, Kgb Jfk Assassination Files, Kgb Jewelry, Kgb Jimmy Carter Campaign, Kgb Kiteboarding, Kgb Kfc, Kgb Killed Jfk, Kgb Keylogger, Kgb Kgb, Kgb Knife, Kgb Kiss, Kgb Kfc Meme, Kgb Killers, Kgb Kostikov, Kgb Logo, Kgb Lee, Kgb Leaders, Kgb Lansing, Kbg Logistics, Kgb Las Vegas, Kgb Law, Kgb Leafly, Kgb Lubbock, Kgb Law Firm, Kgb Meaning, Kgb Museum Prague, Kgb Meme, Kgb Movies, Kgb Motto, Kgb Mafia, Kgb Music, Kgb Martial Arts, Kgb Museum Moscow, Kgb Marvel, Kgb New Name, Kgb Nyc, Kgb News, Kgb New York, Kgb Now, Kgb Number, Kbg New Brunswick, Kgb Now Called, Kbg New Brunswick Nj, Kgb Name, Kgb Officer, Kgb Office Joke, Kgb Operations, Kgb Outfit, Kgbi Omaha, Kgb Osnaz, Kgb Oracle, Kgb Og Strain, Kgb Operations During The Cold War, Kgb Outpost, Kgb Putin, Kgb Packers, Kgb Predecessor, Kgb Productions, Kgb Paris, Kgb Police, Kgb Propaganda, Kgb Prison, Kgb Pen, Kgb Pin, Kgb Questions, Kgb Quizlet, Kgb Quotes, Kgb Quora, Kgb Question Service, Kgb Questions And Answers, Kgb Quotes Rounders, Kgb Que Es, Kgb Quarter Report, Kgb Russia, Kgb Radio, Kgb Rounders, Kgb Ranks, Kgb Red Room, Kgb Russian Revolution, Kgb Reading Series, Kgb Restaurant, Kgb Resident, Kgb Ricin, Kgb Spies, Kgb Successor, Kgb San Diego, Kgb Sky Show 2017, Kgb Symbol, Kgb San Antonio, Kgb Stalin, Kbg Syndrome, Kgb Swimbaits, Kgb Strain, Kgb The Office, Kgb Training, Kgb Texas, Kgb Today, Kgb Text, Kgb Torture, Kgb Translation, Kgb Tactics, Kgb Three Bears, Kgb Training Manual, Kgb Uniform, Kgb Usa, Kgb Ussr, Kgb University, Kgb Umbrella, Kgb Usa Inc, Kgb Urban, Kgb Usa San Antonio, Kgb Ushanka, Kgb Useful Idiots, Kgb Vs Cia, Kgb Vs Fsb, Kgb Vest Persona 5, Kgb Vs Gru, Kgb Vodka, Kgb Vs Cia Cold War, Kgb Vs Cia Deadliest Warrior, Kgb Vs Fbi, Kgb Video Game, Kgb Vodka Lemon, Kgb Wiki, Kgb Wilmington, Kgb Weapons, Kgb Watch, Kgb Website, Kgb Waits For No One, Kgb Weed, Kgb We Will Ask The Questions, Kgb Wolf, Kgb Wallpaper, Kgb X Ray, Ex Kgb, Kgb X Files, Kgb X Line, Kgbx Radio, Ktb Xd, Kgb X Cia, Kgb Xredirect, Kgb Archiver X64, Kgb Line X Stringer, Kgb Youtube, Kgb Yuri, Kgb Yelp, Kgb Yahoo, Kgb York, Kgb Yerevan, Kgb Yahoo Answers, Kgb Yoga Bag, Kgb Years, Kgb Yra, Kgb Zippo, Kgb Zip, Kgb Znacenje, Kgb Zomato, Kgb Zenekar, Kgb Zipper, Kgb Zenith Group, Kgb Zip Download, Kgb Zhukov, Kgb Znachenie, Kgb Agent Putin, Kgb Agent Meaning, Kgb Agent Fomin, Kgb Agent Book, Kgb Agent Definition, Kgb Agent Salary, Kgb Agent Interview, Kgb Agent Killed In London, Kgb Agent Jack Barsky, Kgb Agent In Usa, Kgb Agent Assassinated, Kgb Agent Alien, Kgb Agent Aragon, Kgb Agent Alexander, Soviet Agent Abel, Vostok Kgb Agent Automatic, Vostok Kgb Agent Automatic Watch, Kgb Agent In America, Kgb Agent Record Of Alien Races, Kgb Agent With Frightening Psychic Abilities, Kgb Agent Book, Kgb Agent Bezmenov, Kgb Agent Blacklist, Kgb Agent Jack Barsky, Kgb Agent In Bond Movie, Kgb Agent Killed By Radiation, Ex Kgb Agent Book, Kgb Home Based Agent, Former Kgb Agent Explains Brainwashing America, Best Kgb Agent, Kgb Agent Costume, Kgb Agent Cuban Missile Crisis, Kgb Agent Caught, Kgb Agent Careers, Kgb Special Agent Challenge, Kgb Agent In Cia, Kgb Agent Halloween Costume, Kgb Agent Explains Current Events In Usa, Kgb Agent Leaves Canada, Ex Kgb Agent Leaves Canada, Kgb Agent Definition, Kgb Agent Defector, Kgb Agent Demoralization, Kgb Agent Dies, Kgb Double Agent, Soviet Double Agent, Cia Kgb Double Agent, Define Kgb Agent, Kgb Special Agent Job Description, Agent Du Kgb, Kgb Agent Explains Current Events In Usa, Former Kgb Agent Explains Brainwashing America, Kgb Agent Killed In England, Ex Kgb Agent Interview, Ex Kgb Agent, Ex-kgb Agent On Indoctrination & Demoralization, Ex Kgb Agent Leaves Canada, Ex Kgb Agent Killed, Ex Kgb Agent Yuri, Ex Kgb Agent Youtube, Kgb Agent Fomin, Kgb Agent Found Dead, Kgb Agents Foe Crossword Clue, Kgb Agents Found In New Jersey, Kgb Famous Agents, Kgb Agent With Frightening Psychic Abilities, Former Kgb Agent Poisoned, Former Kgb Agent Explains Brainwashing America, Former Kgb Agent, Former Kgb Agent Killed In London, Kgb Agent Guillou, Soviet Gru Agent, Genscher Kgb Agent, Kgb Agent Halloween Costume, Hot Kgb Agent, Kgb Agent Interview, Kgb Agent In Usa, Kgb Agent In India, Kgb Agent In Mi6, Kgb Agent In Cia, Kgb Agent In Bond Movie, Kgb Agent In America, Kgb Agent In Vancouver, Kgb Agent Killed In London, Former Kgb Agent Interview, Kgb Agent Jack Barsky, Kgb Agent Job, Kgb Agent James Bond, Kgb Special Agent Job Description, Kgb Special Agent Job, Kgb Agent Killed In London, Kgb Agent Kidnapped, Kgb Agent Killed In England, Khamenei Kgb Agent, Kirill Kgb Agent, Kekkonen Kgb Agent, Kgb Agent Litvinenko, Kgb Agent Login, Kgb Agent London, Kgb Agent Leaves Canada, Soviet Agent Lucy, Russian Kgb Agent Lisa, Ex Kgb Agent Leaves Canada, Kgb Agent Meaning, Kgb Agent Murdered, Kgb Agent Movies, Kgb Agent 60 Minutes, Kgb Agent In Mi6, Kgb Agent In Bond Movie, Merkel Kgb Agent, Kgb Agent Names, Soviet News Agency, Kgb Agents In New Jersey, A Former Kgb Agent Needs Your Help, Nyiso Kgb Agent, Kgb Agent On 60 Minutes, Kgb Agent Online, Kgb Agent Record Of Alien Races, Ex-kgb Agent On Indoctrination & Demoralization, Obama Kgb Agent, Oswald Kgb Agent, Agent_of_kgb, By\u0142y Agent Kgb Opowiada, Kgb Agent Putin, Kgb Agent Poisoned, Kgb Agent Polonium, Kgb Agent Pay, Kgb Agent Philippines, Kgb Special Agent Philippines Salary, Kgb Agent With Frightening Psychic Abilities, Putin Kgb Agent Reagan, Palme Kgb Agent, Prodi Kgb Agent, Kgb Agent Ranks, Kgb Agent Record Of Alien Races, Kgb Agent Russia, Kgb Agent Requirements, Kgb Agent Radiation Poisoning, Kgb Agent Rudolf Abel, Soviet Agent Rudolf Abel, Putin Kgb Agent Reagan, Kgb Special Agent Review, Russian Kgb Agent Alexander Litvinenko, Kgb Agent Salary, Kgb Agent Subversion, Kgb Special Agent, Kgb Special Agent Salary, Kgb Special Agent Training, Kgb Special Agent Philippines, Kgb Sleeper Agent, Kgb Special Agent Review, Kgb Secret Agent, Kgb Special Agent Philippines Salary, Kgb Agent Training, Kgb Agent Tells You What The Illusion Is, Kgb Agent Test, Kgb Agent Tv Show, Kgb Special Agent Training, Kgb Secret Agent Test, Kgb Agents In The Us, Top Kgb Agent, Kgb Agent Uniform, Kgb Agent Usa, Kgb Undercover Agents, Kgb Agent Vladimir Putin, Kgb Agent Vergiftet, Kgb Agent In Vancouver, Vostok Kgb Agent Automatic, Vostok Kgb Agent Automatic Watch, Kgb Agent Wiki, Kgb Agent With Frightening Psychic Abilities, Kgb Agent Weapons, Kgb Agent Watches, Kgb Agent Warns, Kgb Agents Who Defected, Kgb Woman Agent, Soviet Agent Winter Soldier, Soyuz Kgb Agent Watches, Kgb Agent Tells You What The Illusion Is, Kgb Agent Yuri Bezmenov, Kgb Agent Youtube, Kgb Agent Tells You What The Illusion Is, Ex Kgb Agent Yuri, Ex Kgb Agent Youtube, Yuri Kgb Agent, Youngest Kgb Agent, Putin Wife,Putin News,Putin Net Worth,Putin Height,Putin Bay,Putin Memes,Putin Trump,Putin On The Ritz,Putin Age,Putin Trump Meeting,Putin And Trump,Putin Age,Putin And Trump Meeting,Putin Approval Rating,Putin And Obama,Putin Ally Crossword,Putin Assad,Putin And North Korea,Putin And Reagan,Putin As A Child,Putin Bay,Putin Bear,Putin Birthday,Putin Biography,Putin Bay Hotels,Putin Badass,Putin Bay Weather,Putin Blueberry Hill,Putin Bay Ferry,Putin Black Belt,Putin Children,Putin Calendar,Putin Clown,Putin Cartoon,Putin Chechnya,Putin Crying,Putin Canada,Putin Crimea,Putin Corruption,Putin Clinton,Putin Daughters,Putin Dog,Putin Documentary,Putin Dead,Putin Dog Merkel,Putin Definition,Putin Dancing,Putin Dolphins,Putin Drawing,Putin Dancing Gif,Putin Election,Putin Eating Popcorn,Putin English,Putin Election Results,Putin Erdogan,Putin Education,Putin Economy,Putin Eyes,Putin Exxon Deal,Putin Eye Color,Putin Family,Putin Food,Putin Funny,Putin Face,Putin Facts,Putin French,Putin Fishing,Poutine Fries,Putin Fascist,Putin Funny Face,Putin Gif,Putin Genocide,Putin Global Warming,Putin Gymnast,Putin Wife,Putin Gun,Putin Glasses,Putin Gangster,Putin Government,Putin Gorbachev,Putin Height,Putin Horse,Putin House,Putin Horseback,Putin Hockey,Putin History,Putin Hunting,Putin Hillary,Putin Human Rights,Putin Home,Putin Interview,Putin Images,Putin Israel,Putin Iq,Putin Isis,Putin In French,Putin Island,Putin Inauguration,Putin In Power,Putin Instagram,Putin Judo,Putin Jill Stein,Putin Journalists,Putin John Oliver,Putin Jehovah,Putin Jw,Putin Judo Gif,Putin Jesus,Putin James Bond,Putin Jehovah Witness,Putin Kgb,Putin Korea,Putin Karate,Putin Kremlin,Putin Kleptocracy,Putin Kim Jong Un,Putin Kraft Ring,Putin Kabaeva,Putin Khuilo,Putin Kid,Putin Laughing,Putin Laughing Gif,Putin Le Pen,Putin Languages,Putin Latest News,Putin Loves Trump,Putin Lollipop,Putin Likes Trump,Putin Limo,Putin Leadership,Putin Memes,Putin Merkel Dog,Putin Married,Putin Merkel,Putin Makeup,Putin Mask,Putin Martial Arts,Putin Meaning,Putin Macron,Putin Mansion,Putin News,Putin Net Worth,Putin North Korea,Putin New Wife,Putin Netanyahu,Putin Nato,Putin Net Worth Wiki,Putin Name Meaning,Putin Nickname,Putin Nuclear War,Putin On The Ritz,Putin On A Horse,Putin On Trump,Putin On North Korea,Putin Obama,Putin On The Ritz Gif,Putin On Syria,Putin Opposition,Putin On Snl,Putin On The Ritz Meme,Putin President,Putin Piano,Putin Palace,Putin Political Party,Putin Picture,Putin Poison,Putin Propaganda,Putin Puns,Putin Pop Song,Putin Popularity,Putin Quotes,Putin Quotes On Obama,Putin Queen Elizabeth,Putin Quotes Funny,Putin Quizlet,Putin Queen Elizabeth Stairs,Putin Quotes On Trump,Putin Quora,Putin Quote Immigrants,Putin Quebec,Putin Russia,Putin Reagan,Putin Riding Trump,Putin Rise To Power,Putin Reelection,Putin Richest Man In The World,Putin Riding A Ritz Cracker,Putin Response,Putin Ritz,Putin Rainbow,Putin Snl,Putin Syria,Putin Song,Putin Smiling,Putin Speech,Putin Shirt,Putin Speaking English,Putin Singing,Putin Salary,Putin Super Bowl Ring,Putin Trump,Putin Trump Meeting,Putin Twitter,Putin Trump Meme,Putin Trump Horse,Putin Trump Kiss,Putin Term Limit,Putin Trump Gif,Putin Term,Putin Today,Putin Ukraine,Putin Ussr,Putin Us Visit,Putin Unicorn,Putin Us Elections,Putin Un,Putin Undercover,Putin Urban Dictionary,Putin United Nations,Putin Us Relations,Putin Vs Trump,Putin Vs Obama,Putin Vladimir,Putin Video,Putin Vodka,Putin Vs Stalin,Putin Visits Trump,Putin Visit To White House,Putin Vampire,Putin Vs Obama Meme,Putin Wife,Putin Wiki,Putin Wealth,Putin Wink,Putin War,Putin Ww3,Putin Watch,Putin Winking Gif,Putin With Animals,Putin Walking,Putin Xi Jinping,Putin X Obama,Putin X Reader,Putin Xi,Putin And Trump,Putin And Obama,Putin And Assad,Putin And North Korea,Putin And Reagan,Putin And The Ritz,Putin Young,Putin Youtube,Putin Yacht,Putin Youth,Putin Yeltsin,Putin Yume,Putin Years As President,Putin Young Pictures,Putin Youth Army,Putin Yarmulke,Putin Zodiac Sign,Putin Zakaria,Putin Zassal,Putin Zassal Lyrics,Putin Zero Hedge,Putin Zeman,Putin Zil Limousine,Putin Zuma,Putin Za Makedonija,Putin Zapretio Albancima,
Become a Patron! True Information is the most valuable resource and we ask you to give back.
This is part III about the German parliamentary committee which investigates NSA spying activities and the cooperation between NSA and the German foreign intelligence service BND.
The hearings of a number of BND employees which are summarized below, provided many interesting details about BND cable and satellite collection and how these data are selected and filtered and how privacy rights are implemented. This was especially of concern for the cooperation between NSA and BND in the Joint SIGINT Activity (JSA).
The witnesses also stated that contrary to the initial press report, under the joint operation Eikonal not a single German communication was passed on to NSA.
These summaries are based upon transcripts of a live blog, kept by volunteers of the German digital civil rights website Netzpolitik.org, who attended the hearings. The employees of the BND are designated by initials, not of their real names, but of those of the cover names they are using when at work(!).
– Hearing of the witness Mr. T. B. (BND, head of the JSA unit from 2003-2007):
In Bad Aibling, the BND has dishes to intercept satellite communications. When satellite links are intercepted, the following things have to be done: first a specific frequency has to be selected, and as one frequency often contains multiple channels, these have to be broken down (de-multiplexed) into single data streams. Based upon metadata it can be decided that certain types of communications are not of interest for BND.
The next step is to separate the various content encodings, like for IP-traffic, telephony, fax, etc. This also needs error correction, which sometimes is a bit more difficult because some communication systems use proprietary methods. This results in data in a readable or audible format (like an e-mail or a phone call), which can be used to prepare an intelligence report. The witness estimates that BND produces around 20 reports a day.
For processing, filtering and selecting commercial computer systems were used, as wel as systems that were custom made by NSA. The Americans were ahead of BND in this, not necessarily better, but often just in doing more, or faster, like in analysing signals.
Compare: the data flow at NSA, according to a presentation from the NSA’s European Cryptologic Center (ECC) (Click to enlarge)
Mass surveillance?
The witness stated that there was and is no mass surveillance by BND. Mass surveillance is even more difficult for fiber optic cables than for satellite links. If there would be any mass surveillance for the latter, then this should involve some 300 communications satellites, for which there should be ground stations at at least three places around the world.
There you would need 250 satellite dishes of 10 million euros each to receive the up to 500 frequencies per satellite. For each frequency two modems and converters were needed, and with the necessary processing capacity, this would require a nuclear power plant for electricity.
Mass surveillance on cable traffic could probably only be done with the capacity of the American, Russian and Chinese intelligence agencies combined. For BND, mass surveillance would drown the agency in data. The witness had never witnessed any kind of economical espionage by NSA in Germany. But he had to admit that not everything was talked about.
Joint SIGINT Activity (JSA)
NSA’s Bad Aibling Station was scheduled for closure in 2002, but after 9/11 this was postponed to 2004, and maybe this led to the creation of the JSA. In the Joint SIGINT Activity, NSA and BND cooperated in collecting both satellite and cable communications.
The JSA was located at the Mangfall Barracks in Bad Aibling. In 2002, this military complex still had a compound of the Bundeswehr, where you had to go through to reach the BND section. The Bundeswehr left these barracks by the end of 2002, and NSA went to a new building nicknamed the Tin Can (Blechdose).
The compound had three sections: one for Germans only, one for US persons only and one common section. The collection of data took place in the common section, and the exits were strictly monitored, so NSA had no access to German sources on its own, although there weren’t every day checks on people carrying thumb drives.
BND personnel had no access to NSA databases and vice versa, but both had access to joint databases. NSA had also some contractors working there. JSA was connected to NSANet, just like NSA’s European Security Operations Center (ESOC) near Darmstadt.
Until 2007 only cable traffic from Frankfurt was passed on to JSA, not from other internet cables. Satellite traffic intercepted by the BND antennas in Bad Aibling was probably also transferred to JSA, where it was processed and analysed in the interest of both NSA and BND.
After the Joint SIGINT Activity (JSA) was closed in 2012, the logical path over the physical cables between BND headquarters and Bad Aibling was probably cut off. After 2012, BND continued to cooperate with NSA in the field of satellite interception and operations in Afghanistan.
Google Maps view of the Mangfall Barracks in Bad Aibling, Germany. The building in the upper left corner could be the BND facility, and the one with the white roof the NSA’s “Tin Can”.
Protection of German data
BND did everything to prevent that communications of German citizens or corporations were collected and/or passed on to NSA. Initially, 4 out of 5 selectors came from the Americans, the rest were German. The witness did not know the total number of selectors. These selectors were checked before they were fed into the collection system, and what came out was again checked whether it contained German communications.
The selectors from NSA were first checked by the Americans in the Tin Can at the Mangfall Barracks and then passed on to a unit of the technical division (which included lawyers) of BND at its then headquarters in Pullach. A final check was conducted by BND personnel in Bad Aibling. Only about one permille of the selectors were rejected because they were related to Germans or contrary to German interests.
Filtering out German data
This filtering works fine, but experience in Bad Aibling has learned that it is not possible to do this fully automated. Therefore, there was no automatic forwarding to NSA. A 100% accurate filtering was only possible with a final selection by hand. As far as the witness was aware of, not a single German communication was passed on to NSA.
In the press report about operation Eikonal it was said that the filter system could only filter out 95% of German communications, but according to the witness, this was only during the test period. When the system went live, this percentage rose to 99% with a second stage that could filter out even more than 99%. When necessary, a final check was conducted by hand.
Especially e-mail addresses have to be checked by hand, because nowadays it’s much more difficult to attribute such internet communications to specific countries. During the test period, about 3000 communications had to be checked by hand, 300 of which were e-mails. BND didn’t collect data from US citizens or passed these on to NSA, so NSA did not use BND to get data that it wasn’t allowed to collect by itself (Ringtausch).
The witness suggested that Süddeutsche Zeitung (the media that claimed that the BND filters wouldn’t work and German data was forwarded to the NSA) had documents of conversations between BND and NSA, in which maybe BND made “political statements” about the efficiency of the filters.
(This could explain the discrepancy between the press reports and the BND witnesses, who all assured that the filter worked, and with additionally manual checks not a single German data was forwarded to NSA)
The witness clearly stated that German G-10 Act only protects Germans and people living in Germany. The privacy of foreigners living abroad is not protected by German law.
Operations center room in the former BND headquarters in Pullach (Screenshot from ARD television – Click to enlarge)
– Hearing of Ms. G. L. (BND, head of IT development and operations at JSA from 2007-2008):
This witness is responsible for databases that store data after having been collected and filtered. These databases are at various locations. Currently, between 8.000 and 10.000 pieces of content with some additional information (Meldungen) come in each month, often but not always accompanied by metadata.
Joint SIGINT Activity (JSA)
Each unit of BND’s analysis division (Auswertung) could request intelligence information from the JSA. They could suggest specific selectors to be tasked or articulate what their information needs were. Ultimate goal was to present relevant information for the federal government. BND sees itself as a service provider for customers in the government.
In 2005/2006 the selection process was fully automated. The witness couldn’t remember how many selectors were used in her period at JSA. These numbers were also not registered. NSA was not able to get any German communications before these were thoroughly filtered and checked by BND. An e-mail that was selected, could be forwarded to NSA through a secured gateway. There was only access to local databases, not to those of NSA.
NSA employees working for JSA were not recognizable as such, they just had ID cards for the compound, issued by the security unit that was responsible for access control of the premises. The Tin Can building also housed SUSLAG (Special US Liaison Activity, Germany), which was a separate unit, different from JSA.
Header of a newsletter from the Joint SIGINT Activity (JSA) (Click for a JSA newsletter (pdf) from 2007)
Operation Eikonal
The witness confirmed that in Frankfurt fiber optic cables were intercepted (operation Eikonal), although without mentioning whether this was at DE-CIX or somewhere else. She wouldn’t answer the question whether BND is still doing this.
The data collected in Frankfurt were first sent to BND headquarters and then to Bad Aibling, where they were filtered by selectors from both NSA and BND. After the cooperation with NSA was ended, the transmission to Bad Aibling was cut off.
Legal issues
The witness was responsible for the implementation of the Federal Intelligence Service Act (BND Gesetz), which governs the activities of this agency. As such, she had the opinion that satellite interception conducted in Bad Aibling also took place under this act, but the Director of BND overruled her, saying this was not the case.
The BND management said: this kind of collection takes place in outer space, and therefore German law doesn’t apply. But apart from that, employees should always apply with law and order. Once data collected from satellite links had been stored in BND databases, they fall under the German Data Protection Act (Bundesdatenschutzgesetz) though.
(In general, most of these witnesses didn’t knew much about topics that are not related to their own duties. They also showed very little interest in the Snowden-revelations. This might be from a common attitude in the intelligence world: the less you know, the less you can (accidently) give away)
– Hearing of the witness Mr. W. K. (BND, sub-division manager in the Signals Intelligence division):
The witness stated that BND is definitely not comparable with the former East German Stasi and that BND only collects what is necessary for fulfilling the information need of the federal government.
Today, mainly fiber optic cables are intercepted, but not everything that flows through, only specific data channels are selected, or in case of satellite links: specific frequencies. Asked about the Snowden-revelations, the witness said that he was surprised by how close the Five Eyes partners are cooperating.
Tapping internet cables
There are search profiles and criteria according to which specific data flows are selected in a very focussed way. The first selection is of a route between two places (like from Afghanistan to Pakistan), then a specific fiber optic cable is chosen.
These are human decisions, based upon where a cable is located, by which company it is operated and where it’s most useful to tap it. Picking a specific cable is also discussed with the provider, with some of them this is easier than with others.
Because internet traffic travels over many different routes, picking specific cables, means that a lot of communications cannot be collected. This is taken for granted as BND doesn’t want to collect everything. Sometimes multiple routes are selected for interception, but not always.
According to the witness, BND doesn’t provide foreign intelligence agencies access to cables. No raw data are transferred to foreign agencies, only end reports.
In some cases, internet data have to be converted into a readable format. This sometimes means cracking encryption, consisting either of complex algorithms or proprietary methods. This can be done on the traffic as it flows past, or with data after having been stored in databases.
Filtering
The next step is filtering the data through selectors. This is done by a computer system, for which the data stream may be buffered for a few milliseconds. The amount of data flowing through these filter systems isn’t counted by BND. Filtering by selectors is done as close to the actual tapping point as possible.
The selectors are chosen based upon the information needs and a set of criteria, which in combination prevent that communications of innocent people are touched. The results went to the (then) BND headquarters in Pullach over leased cables. The number of data forwarded to Pullach is not registered, it depends upon the costs of the capacity for transmission.
The constitutionally guaranteed Privacy of Correspondence can have effect on each of these selection stages: for example no cables are chosen that start and end in Germany, and no selectors belonging to Germans are used.
Data of Germans are currently filtered out by a system called DAFIS, which succeeded a BSI-certified filter system that was used since the 1990s. Data from German citizens and German companies (Grundrechtsträgern) are deleted.
After data have been selected, they are pulled out based upon their relevance and finally analysts can use them at a certain moment to write an intelligence report, of which approximately 20 a day are produced.
Operation Eikonal
Regarding the joint NSA-BND operation Eikonal, the witness said that there was no massive scale surveillance of German citizens with data forwarded to NSA. Under Eikonal, which was a one of a kind operation, there was targeted collection from traffic that transited Germany from one foreign country to another.
This was focussed on Afghanistan and anti-terrorism. Selected data were collected and forwarded to NSA. The witness would give more details only behind closed doors, because BND is still using these methods. The internal codename for Eikonal was Karat, but that name wasn’t shared with NSA. There was even a third codename. Eikonal was tested during a few months (early 2006?), during which period no data were shared with NSA.
For Germany, Eikonal was useful because it provided foreign intelligence for protecting German troops and countering terrorism. The NSA provided better technical equipment that BND didn’t had. In return, BND provided NSA with data collected from transit traffic using search profiles about Afghanistan and anti-terrorism. BND was asked to cooperate because NSA isn’t able to do everything themselves.
What was collected under Eikonal was far less than the 500 million metadata a month as shown in the German BOUNDLESSINFORMANT chart. Actual collection only led to a few hundred selected contents (in German: Daten, like phone calls or e-mails) a year, which was a huge disappointment for NSA. Nothing that was worth while came out anymore, contrary to the expectations when the operation was set up.
This, combined with the fact that it proved to be impossible to 100% guarantee that no German data were collected and forwarded, led BND to terminate the program. As a “compensation” for NSA, a joint project in a country outside Europe was planned. In crisis regions, the BND is still cooperating with NSA, which provides “huge benefits” for the Germans, according to the witness.
The witness wouldn’t say anything about whether BND was tapping into the Frankfurt internet exchange DE-CIX, but later on he said that operation Eikonal involved just one telecommunications provider.
(These kind of indications by some of the witnesses eventually led the Committee to conclude that operation Eikonal was actually about tapping one single cable of Deutsche Telekom, instead of the DE-CIX exchange as a whole, as the initial report by Süddeutsche Zeitung said. More about this later)
Things the BND learned from the Eikonal-cooperation were:
1. How the technique worked, which is now used for own operations outside, and collection efforts inside Germany 2. It is not possible to conduct 100% automated filtering. This wouldn’t be done anymore.
Filtering through selectors
For Eikonal, the cable traffic was filtered by using selectors provided by both NSA and BND. A BND unit which included lawyers checked for every selector from the NSA whether it was legal and according to the goals of the cooperation. Besides German interests, also the interests of friendly countries were taken into account. Only a few selectors were rejected, but it wasn’t told to NSA which ones. They were just not entered into the filtering system.
Selectors include not just phone numbers and e-mail addresses, but also MAC addresses, which have no country identifier. Although there may have been up to several hundred thoused selectors, BND was still able to check whether every single one was appropriate, this by using special criteria. Only selectors that can be checked are used.
Besides Eikonal, BND also taps into cables of multiple other communication providers, but this is within the proper legal framework, approved by the G-10 Committee. For this, there is dedicated hardware equipment in the building of the provider, in accordance with the regulations of the federal communications authority (Bundesnetzagentur). This hardware is installed at the point where the cable is tapped.
Screenshot from NSA’s BOUNDLESSINFORMANT tool, showing the number of foreign metadata that BND collected in crisis regions and shared with NSA (Click to enlarge)
Telephony metadata
According to the witness, one phone call creates between 30 and 50 metadata, which includes not only time and number but also a lot more technical data. With the given number of users in a crisis zone, this easily adds up to billions of metadata. But not all these have to be collected (erfasst); less than one percent can actually be pulled in. This is no mass surveillance without a reasonable ground (anlasslose Massenüberwachung). The witness assumes that NSA and GCHQ operate in a similar way as the BND.
The over 500 million metadata records from the Germen BOUNDLESSINFORMANT chart were most certainly from Afghanistan, more precisely from satellite communication links between two foreign countries in crisis regions. According to the witness this huge number of metadata for a single month is quite normal.
It could be that these numbers are collected up to today, although he isn’t sure about that. BND isn’t counting every single part of metadata, as NSA is apparently doing and which leads to those huge numbers.
XKeyscore
BND got the XKeyscore program from NSA, which is only used to analyse data that are already collected. BND didn’t had such a tool before. Unlike NSA, which uses Xkeyscore as federated query system, BND uses it as a stand-alone system for analysis. The actual collection systems of BND are antennas and outposts (Aussenstellen).
The witness doesn’t know how many servers BND purchased for XKeyscore. Presently, BND uses XKeyscore only for traffic that is intercepted from satellite links, apparently because the system isn’t (yet) certified for filtering out communications of German citizens. BND got no software programs from NSA for profiling or for decrypting data.
Legality
Personal data are only those data that can be related to specific persons. For German data it is easy to retrieve the identity behind certain metadata, but for foreign metadata this is much more difficult and hence those metadata are not seen as personal data.
The witness said multiple times that he isn’t a lawyer and he therefore had no opinion of his own about the legality of certain decisions. He also didn’t knew whether data collected in foreign countries had been acquired with or without the consent of the provider. He just assumed that the data collection takes place in a legal way. Foreign partner agencies don’t provide BND with data they are not allowed to collect themselves.
– Because of time shortage, the BND employees L. and W. P. couldn’t be heard in this meeting.
> Next time: More hearings of BND employees
UPDATE: Meanwhile, the following numbers about government eavesdropping operations in 2013 have been made public. These numbers are only about the interception of communcations with at least one-end-German, so traffic with both-ends-foreign are not included:
– The G10 Committee approved 212 eavesdropping operations, most of them were conducted by the domestic security service BfV (up from 157 in 2012). This involved some 350 people, most of them suspected of islam fundamentalism.
– In 26 cases, the domestic security service BfV used an IMSI-catcher to trace or intercept the mobile phone of 29 persons (more as twice as often as in 2012)
– BND is allowed to filter communications by using selectors. If Germans could be involved, it is not allowed to use selectors that identify specific targets (like phone numbers and e-mail adresses), so in that case, only generic search terms (keywords) may be used.
– The official report (pdf) provided the following numbers of approved search terms, of what was filtered out and of what was marked as relevant for foreign intelligence purposes:
Become a Patron! True Information is the most valuable resource and we ask you to give back.
How the CIA made Google
Inside the secret network behind mass surveillance, endless war, and Skynet—
part 1
By Nafeez Ahmed
INSURGE INTELLIGENCE, a new crowd-funded investigative journalism project, breaks the exclusive story of how the United States intelligence community funded, nurtured and incubated Google as part of a drive to dominate the world through control of information. Seed-funded by the NSA and CIA, Google was merely the first among a plethora of private sector start-ups co-opted by US intelligence to retain ‘information superiority.’
The origins of this ingenious strategy trace back to a secret Pentagon-sponsored group, that for the last two decades has functioned as a bridge between the US government and elites across the business, industry, finance, corporate, and media sectors. The group has allowed some of the most powerful special interests in corporate America to systematically circumvent democratic accountability and the rule of law to influence government policies, as well as public opinion in the US and around the world. The results have been catastrophic: NSA mass surveillance, a permanent state of global war, and a new initiative to transform the US military into Skynet.
This exclusive is being released for free in the public interest, and was enabled by crowdfunding. I’d like to thank my amazing community of patrons for their support, which gave me the opportunity to work on this in-depth investigation. Please support independent, investigative journalism for the global commons.
In the wake of the Charlie Hebdo attacks in Paris, western governments are moving fast to legitimize expanded powers of mass surveillance and controls on the internet, all in the name of fighting terrorism.
US and European politicians have called to protect NSA-style snooping, and to advance the capacity to intrude on internet privacy by outlawing encryption. One idea is to establish a telecoms partnership that would unilaterally delete content deemed to “fuel hatred and violence” in situations considered “appropriate.” Heated discussions are going on at government and parliamentary level to explore cracking down on lawyer-client confidentiality.
What any of this would have done to prevent the Charlie Hebdo attacks remains a mystery, especially given that we already know the terrorists were on the radar of French intelligence for up to a decade.
There is little new in this story. The 9/11 atrocity was the first of many terrorist attacks, each succeeded by the dramatic extension of draconian state powers at the expense of civil liberties, backed up with the projection of military force in regions identified as hotspots harbouring terrorists. Yet there is little indication that this tried and tested formula has done anything to reduce the danger. If anything, we appear to be locked into a deepening cycle of violence with no clear end in sight.
As our governments push to increase their powers, INSURGE INTELLIGENCE can now reveal the vast extent to which the US intelligence community is implicated in nurturing the web platforms we know today, for the precise purpose of utilizing the technology as a mechanism to fight global ‘information war’ — a war to legitimize the power of the few over the rest of us. The lynchpin of this story is the corporation that in many ways defines the 21st century with its unobtrusive omnipresence: Google.
Google styles itself as a friendly, funky, user-friendly tech firm that rose to prominence through a combination of skill, luck, and genuine innovation. This is true. But it is a mere fragment of the story. In reality, Google is a smokescreen behind which lurks the US military-industrial complex.
The inside story of Google’s rise, revealed here for the first time, opens a can of worms that goes far beyond Google, unexpectedly shining a light on the existence of a parasitical network driving the evolution of the US national security apparatus, and profiting obscenely from its operation.
The shadow network
For the last two decades, US foreign and intelligence strategies have resulted in a global ‘war on terror’ consisting of prolonged military invasions in the Muslim world and comprehensive surveillance of civilian populations. These strategies have been incubated, if not dictated, by a secret network inside and beyond the Pentagon.
Established under the Clinton administration, consolidated under Bush, and firmly entrenched under Obama, this bipartisan network of mostly neoconservative ideologues sealed its dominion inside the US Department of Defense (DoD) by the dawn of 2015, through the operation of an obscure corporate entity outside the Pentagon, but run by the Pentagon.
In 1999, the CIA created its own venture capital investment firm, In-Q-Tel, to fund promising start-ups that might create technologies useful for intelligence agencies. But the inspiration for In-Q-Tel came earlier, when the Pentagon set up its own private sector outfit.
Known as the ‘Highlands Forum,’ this private network has operated as a bridge between the Pentagon and powerful American elites outside the military since the mid-1990s. Despite changes in civilian administrations, the network around the Highlands Forum has become increasingly successful in dominating US defense policy.
Giant defense contractors like Booz Allen Hamilton and Science Applications International Corporation are sometimes referred to as the ‘shadow intelligence community’ due to the revolving doors between them and government, and their capacity to simultaneously influence and profit from defense policy. But while these contractors compete for power and money, they also collaborate where it counts. The Highlands Forum has for 20 years provided an off the record space for some of the most prominent members of the shadow intelligence community to convene with senior US government officials, alongside other leaders in relevant industries.
I first stumbled upon the existence of this network in November 2014, when I reported for VICE’s Motherboard that US defense secretary Chuck Hagel’s newly announced ‘Defense Innovation Initiative’ was really about building Skynet — or something like it, essentially to dominate an emerging era of automated robotic warfare.
That story was based on a little-known Pentagon-funded ‘white paper’ published two months earlier by the National Defense University (NDU) in Washington DC, a leading US military-run institution that, among other things, generates research to develop US defense policy at the highest levels. The white paper clarified the thinking behind the new initiative, and the revolutionary scientific and technological developments it hoped to capitalize on.
The Highlands Forum
The co-author of that NDU white paper is Linton Wells, a 51-year veteran US defense official who served in the Bush administration as the Pentagon’s chief information officer, overseeing the National Security Agency (NSA) and other spy agencies. He still holds active top-secret security clearances, and according to a report by Government Executive magazine in 2006 he chaired the ‘Highlands Forum’, founded by the Pentagon in 1994.
Linton Wells II (right) former Pentagon chief information officer and assistant secretary of defense for networks, at a recent Pentagon Highlands Forum session. Rosemary Wenchel, a senior official in the US Department of Homeland Security, is sitting next to him
New Scientist magazine (paywall) has compared the Highlands Forum to elite meetings like “Davos, Ditchley and Aspen,” describing it as “far less well known, yet… arguably just as influential a talking shop.” Regular Forum meetings bring together “innovative people to consider interactions between policy and technology. Its biggest successes have been in the development of high-tech network-based warfare.”
Given Wells’ role in such a Forum, perhaps it was not surprising that his defense transformation white paper was able to have such a profound impact on actual Pentagon policy. But if that was the case, why had no one noticed?
Despite being sponsored by the Pentagon, I could find no official page on the DoD website about the Forum. Active and former US military and intelligence sources had never heard of it, and neither did national security journalists. I was baffled.
The Pentagon’s intellectual capital venture firm
In the prologue to his 2007 book, A Crowd of One: The Future of Individual Identity, John Clippinger, an MIT scientist of the Media Lab Human Dynamics Group, described how he participated in a “Highlands Forum” gathering, an “invitation-only meeting funded by the Department of Defense and chaired by the assistant for networks and information integration.” This was a senior DoD post overseeing operations and policies for the Pentagon’s most powerful spy agencies including the NSA, the Defense Intelligence Agency (DIA), among others. Starting from 2003, the position was transitioned into what is now the undersecretary of defense for intelligence. The Highlands Forum, Clippinger wrote, was founded by a retired US Navy captain named Dick O’Neill. Delegates include senior US military officials across numerous agencies and divisions — “captains, rear admirals, generals, colonels, majors and commanders” as well as “members of the DoD leadership.”
What at first appeared to be the Forum’s main website describes Highlands as “an informal cross-disciplinary network sponsored by Federal Government,” focusing on “information, science and technology.” Explanation is sparse, beyond a single ‘Department of Defense’ logo.
But Highlands also has another website describing itself as an “intellectual capital venture firm” with “extensive experience assisting corporations, organizations, and government leaders.” The firm provides a “wide range of services, including: strategic planning, scenario creation and gaming for expanding global markets,” as well as “working with clients to build strategies for execution.” ‘The Highlands Group Inc.,’ the website says, organizes a whole range of Forums on these issue.
For instance, in addition to the Highlands Forum, since 9/11 the Group runs the ‘Island Forum,’ an international event held in association with Singapore’s Ministry of Defense, which O’Neill oversees as “lead consultant.” The Singapore Ministry of Defense website describes the Island Forum as “patterned after the Highlands Forum organized for the US Department of Defense.” Documents leaked by NSA whistleblower Edward Snowden confirmed that Singapore played a key role in permitting the US and Australia to tap undersea cables to spy on Asian powers like Indonesia and Malaysia.
The Highlands Group website also reveals that Highlands is partnered with one of the most powerful defense contractors in the United States. Highlands is “supported by a network of companies and independent researchers,” including “our Highlands Forum partners for the past ten years at SAIC; and the vast Highlands network of participants in the Highlands Forum.”
SAIC stands for the US defense firm, Science Applications International Corporation, which changed its name to Leidos in 2013, operating SAIC as a subsidiary. SAIC/Leidos is among the top 10 largest defense contractors in the US, and works closely with the US intelligence community, especially the NSA. According to investigative journalist Tim Shorrock, the first to disclose the vast extent of the privatization of US intelligence with his seminal book Spies for Hire, SAIC has a “symbiotic relationship with the NSA: the agency is the company’s largest single customer and SAIC is the NSA’s largest contractor.”
Richard ‘Dick’ Patrick O’Neill, founding president of the Pentagon’s Highlands Forum
The full name of Captain “Dick” O’Neill, the founding president of the Highlands Forum, is Richard Patrick O’Neill, who after his work in the Navy joined the DoD. He served his last post as deputy for strategy and policy in the Office of the Assistant Secretary for Defense for Command, Control, Communications and Intelligence, before setting up Highlands.
The Club of Yoda
But Clippinger also referred to another mysterious individual revered by Forum attendees:
“He sat at the back of the room, expressionless behind thick, black-rimmed glasses. I never heard him utter a word… Andrew (Andy) Marshall is an icon within DoD. Some call him Yoda, indicative of his mythical inscrutable status… He had served many administrations and was widely regarded as above partisan politics. He was a supporter of the Highlands Forum and a regular fixture from its beginning.”
Since 1973, Marshall has headed up one of the Pentagon’s most powerful agencies, the Office of Net Assessment (ONA), the US defense secretary’s internal ‘think tank’ which conducts highly classified research on future planning for defense policy across the US military and intelligence community. The ONA has played a key role in major Pentagon strategy initiatives, including Maritime Strategy, the Strategic Defense Initiative, the Competitive Strategies Initiative, and the Revolution in Military Affairs.
Andrew ‘Yoda’ Marshall, head of the Pentagon’s Office of Net Assessment (ONA) and co-chair of the Highlands Forum, at an early Highlands event in 1996 at the Santa Fe Institute. Marshall is retiring as of January 2015
In a rare 2002 profile in Wired, reporter Douglas McGray described Andrew Marshall, now 93 years old, as “the DoD’s most elusive” but “one of its most influential” officials. McGray added that “Vice President Dick Cheney, Defense Secretary Donald Rumsfeld, and Deputy Secretary Paul Wolfowitz” — widely considered the hawks of the neoconservative movement in American politics — were among Marshall’s “star protégés.”
Speaking at a low-key Harvard University seminar a few months after 9/11, Highlands Forum founding president Richard O’Neill said that Marshall was much more than a “regular fixture” at the Forum. “Andy Marshall is our co-chair, so indirectly everything that we do goes back into Andy’s system,” he told the audience. “Directly, people who are in the Forum meetings may be going back to give briefings to Andy on a variety of topics and to synthesize things.” He also said that the Forum had a third co-chair: the director of the Defense Advanced Research and Projects Agency (DARPA), which at that time was a Rumsfeld appointee, Anthony J. Tether. Before joining DARPA, Tether was vice president of SAIC’s Advanced Technology Sector.
Anthony J. Tether, director of DARPA and co-chair of the Pentagon’s Highlands Forum from June 2001 to February 2009
The Highlands Forum’s influence on US defense policy has thus operated through three main channels: its sponsorship by the Office of the Secretary of Defense (around the middle of last decade this was transitioned specifically to the Office of the Undersecretary of Defense for Intelligence, which is in charge of the main surveillance agencies); its direct link to Andrew ‘Yoda’ Marshall’s ONA; and its direct link to DARPA.
A slide from Richard O’Neill’s presentation at Harvard University in 2001
According to Clippinger in A Crowd of One, “what happens at informal gatherings such as the Highlands Forum could, over time and through unforeseen curious paths of influence, have enormous impact, not just within the DoD but throughout the world.” He wrote that the Forum’s ideas have “moved from being heretical to mainstream. Ideas that were anathema in 1999 had been adopted as policy just three years later.”
Although the Forum does not produce “consensus recommendations,” its impact is deeper than a traditional government advisory committee. “The ideas that emerge from meetings are available for use by decision-makers as well as by people from the think tanks,” according to O’Neill:
“We’ll include people from Booz, SAIC, RAND, or others at our meetings… We welcome that kind of cooperation, because, truthfully, they have the gravitas. They are there for the long haul and are able to influence government policies with real scholarly work… We produce ideas and interaction and networks for these people to take and use as they need them.”
My repeated requests to O’Neill for information on his work at the Highlands Forum were ignored. The Department of Defense also did not respond to multiple requests for information and comment on the Forum.
Information warfare
The Highlands Forum has served as a two-way ‘influence bridge’: on the one hand, for the shadow network of private contractors to influence the formulation of information operations policy across US military intelligence; and on the other, for the Pentagon to influence what is going on in the private sector. There is no clearer evidence of this than the truly instrumental role of the Forum in incubating the idea of mass surveillance as a mechanism to dominate information on a global scale.
In 1989, Richard O’Neill, then a US Navy cryptologist, wrote a paper for the US Naval War College, ‘Toward a methodology for perception management.’ In his book, Future Wars, Col. John Alexander, then a senior officer in the US Army’s Intelligence and Security Command (INSCOM), records that O’Neill’s paper for the first time outlined a strategy for “perception management” as part of information warfare (IW). O’Neill’s proposed strategy identified three categories of targets for IW: adversaries, so they believe they are vulnerable; potential partners, “so they perceive the cause [of war] as just”; and finally, civilian populations and the political leadership so they “perceive the cost as worth the effort.” A secret briefing based on O’Neill’s work “made its way to the top leadership” at DoD. “They acknowledged that O’Neill was right and told him to bury it.
Except the DoD didn’t bury it. Around 1994, the Highlands Group was founded by O’Neill as an official Pentagon project at the appointment of Bill Clinton’s then defense secretary William Perry — who went on to join SAIC’s board of directors after retiring from government in 2003.
In O’Neill’s own words, the group would function as the Pentagon’s ‘ideas lab’. According to Government Executive, military and information technology experts gathered at the first Forum meeting “to consider the impacts of IT and globalization on the United States and on warfare. How would the Internet and other emerging technologies change the world?” The meeting helped plant the idea of “network-centric warfare” in the minds of “the nation’s top military thinkers.”
Excluding the public
Official Pentagon records confirm that the Highlands Forum’s primary goal was to support DoD policies on O’Neill’s specialism: information warfare. According to the Pentagon’s 1997 Annual Report to the President and the Congress under a section titled ‘Information Operations,’ (IO) the Office of the Secretary of Defense (OSD) had authorized the “establishment of the Highlands Group of key DoD, industry, and academic IO experts” to coordinate IO across federal military intelligence agencies.
The following year’s DoD annual report reiterated the Forum’s centrality to information operations: “To examine IO issues, DoD sponsors the Highlands Forum, which brings together government, industry, and academic professionals from various fields.”
Notice that in 1998, the Highlands ‘Group’ became a ‘Forum.’ According to O’Neill, this was to avoid subjecting Highlands Forums meetings to “bureaucratic restrictions.” What he was alluding to was the Federal Advisory Committee Act (FACA), which regulates the way the US government can formally solicit the advice of special interests.
Known as the ‘open government’ law, FACA requires that US government officials cannot hold closed-door or secret consultations with people outside government to develop policy. All such consultations should take place via federal advisory committees that permit public scrutiny. FACA requires that meetings be held in public, announced via the Federal Register, that advisory groups are registered with an office at the General Services Administration, among other requirements intended to maintain accountability to the public interest.
But Government Executive reported that “O’Neill and others believed” such regulatory issues “would quell the free flow of ideas and no-holds-barred discussions they sought.” Pentagon lawyers had warned that the word ‘group’ might necessitate certain obligations and advised running the whole thing privately: “So O’Neill renamed it the Highlands Forum and moved into the private sector to manage it as a consultant to the Pentagon.” The Pentagon Highlands Forum thus runs under the mantle of O’Neill’s ‘intellectual capital venture firm,’ ‘Highlands Group Inc.’
In 1995, a year after William Perry appointed O’Neill to head up the Highlands Forum, SAIC — the Forum’s “partner” organization — launched a new Center for Information Strategy and Policy under the direction of “Jeffrey Cooper, a member of the Highlands Group who advises senior Defense Department officials on information warfare issues.” The Center had precisely the same objective as the Forum, to function as “a clearinghouse to bring together the best and brightest minds in information warfare by sponsoring a continuing series of seminars, papers and symposia which explore the implications of information warfare in depth.” The aim was to “enable leaders and policymakers from government, industry, and academia to address key issues surrounding information warfare to ensure that the United States retains its edge over any and all potential enemies.”
Despite FACA regulations, federal advisory committees are already heavily influenced, if not captured, by corporate power. So in bypassing FACA, the Pentagon overrode even the loose restrictions of FACA, by permanently excluding any possibility of public engagement.
O’Neill’s claim that there are no reports or recommendations is disingenuous. By his own admission, the secret Pentagon consultations with industry that have taken place through the Highlands Forum since 1994 have been accompanied by regular presentations of academic and policy papers, recordings and notes of meetings, and other forms of documentation that are locked behind a login only accessible by Forum delegates. This violates the spirit, if not the letter, of FACA — in a way that is patently intended to circumvent democratic accountability and the rule of law.
The Highlands Forum doesn’t need to produce consensus recommendations. Its purpose is to provide the Pentagon a shadow social networking mechanism to cement lasting relationships with corporate power, and to identify new talent, that can be used to fine-tune information warfare strategies in absolute secrecy.
Total participants in the DoD’s Highlands Forum number over a thousand, although sessions largely consist of small closed workshop style gatherings of maximum 25–30 people, bringing together experts and officials depending on the subject. Delegates have included senior personnel from SAIC and Booz Allen Hamilton, RAND Corp., Cisco, Human Genome Sciences, eBay, PayPal, IBM, Google, Microsoft, AT&T, the BBC, Disney, General Electric, Enron, among innumerable others; Democrat and Republican members of Congress and the Senate; senior executives from the US energy industry such as Daniel Yergin of IHS Cambridge Energy Research Associates; and key people involved in both sides of presidential campaigns.
Other participants have included senior media professionals: David Ignatius, associate editor of the Washington Post and at the time the executive editor of the International Herald Tribune; Thomas Friedman, long-time New York Times columnist; Arnaud de Borchgrave, an editor at Washington Times and United Press International; Steven Levy, a former Newsweek editor, senior writer for Wired and now chief tech editor at Medium; Lawrence Wright, staff writer at the New Yorker; Noah Shachtmann, executive editor at the Daily Beast; Rebecca McKinnon, co-founder of Global Voices Online; Nik Gowing of the BBC; and John Markoff of the New York Times.
Due to its current sponsorship by the OSD’s undersecretary of defense for intelligence, the Forum has inside access to the chiefs of the main US surveillance and reconnaissance agencies, as well as the directors and their assistants at DoD research agencies, from DARPA, to the ONA. This also means that the Forum is deeply plugged into the Pentagon’s policy research task forces.
Google: seeded by the Pentagon
In 1994 — the same year the Highlands Forum was founded under the stewardship of the Office of the Secretary of Defense, the ONA, and DARPA — two young PhD students at Stanford University, Sergey Brin and Larry Page, made their breakthrough on the first automated web crawling and page ranking application. That application remains the core component of what eventually became Google’s search service. Brin and Page had performed their work with funding from the Digital Library Initiative (DLI), a multi-agency programme of the National Science Foundation (NSF), NASA and DARPA.
But that’s just one side of the story.
Throughout the development of the search engine, Sergey Brin reported regularly and directly to two people who were not Stanford faculty at all: Dr. Bhavani Thuraisingham and Dr. Rick Steinheiser. Both were representatives of a sensitive US intelligence community research programme on information security and data-mining.
Thuraisingham is currently the Louis A. Beecherl distinguished professor and executive director of the Cyber Security Research Institute at the University of Texas, Dallas, and a sought-after expert on data-mining, data management and information security issues. But in the 1990s, she worked for the MITRE Corp., a leading US defense contractor, where she managed the Massive Digital Data Systems initiative, a project sponsored by the NSA, CIA, and the Director of Central Intelligence, to foster innovative research in information technology.
“We funded Stanford University through the computer scientist Jeffrey Ullman, who had several promising graduate students working on many exciting areas,” Prof. Thuraisingham told me. “One of them was Sergey Brin, the founder of Google. The intelligence community’s MDDS program essentially provided Brin seed-funding, which was supplemented by many other sources, including the private sector.”
This sort of funding is certainly not unusual, and Sergey Brin’s being able to receive it by being a graduate student at Stanford appears to have been incidental. The Pentagon was all over computer science research at this time. But it illustrates how deeply entrenched the culture of Silicon Valley is in the values of the US intelligence community.
In an extraordinary document hosted by the website of the University of Texas, Thuraisingham recounts that from 1993 to 1999, “the Intelligence Community [IC] started a program called Massive Digital Data Systems (MDDS) that I was managing for the Intelligence Community when I was at the MITRE Corporation.” The program funded 15 research efforts at various universities, including Stanford. Its goal was developing “data management technologies to manage several terabytes to petabytes of data,” including for “query processing, transaction management, metadata management, storage management, and data integration.”
At the time, Thuraisingham was chief scientist for data and information management at MITRE, where she led team research and development efforts for the NSA, CIA, US Air Force Research Laboratory, as well as the US Army’s Space and Naval Warfare Systems Command (SPAWAR) and Communications and Electronic Command (CECOM). She went on to teach courses for US government officials and defense contractors on data-mining in counter-terrorism.
In her University of Texas article, she attaches the copy of an abstract of the US intelligence community’s MDDS program that had been presented to the “Annual Intelligence Community Symposium” in 1995. The abstract reveals that the primary sponsors of the MDDS programme were three agencies: the NSA, the CIA’s Office of Research & Development, and the intelligence community’s Community Management Staff (CMS) which operates under the Director of Central Intelligence. Administrators of the program, which provided funding of around 3–4 million dollars per year for 3–4 years, were identified as Hal Curran (NSA), Robert Kluttz (CMS), Dr. Claudia Pierce (NSA), Dr. Rick Steinheiser (ORD — standing for the CIA’s Office of Research and Devepment), and Dr. Thuraisingham herself.
Thuraisingham goes on in her article to reiterate that this joint CIA-NSA program partly funded Sergey Brin to develop the core of Google, through a grant to Stanford managed by Brin’s supervisor Prof. Jeffrey D. Ullman:
“In fact, the Google founder Mr. Sergey Brin was partly funded by this program while he was a PhD student at Stanford. He together with his advisor Prof. Jeffrey Ullman and my colleague at MITRE, Dr. Chris Clifton [Mitre’s chief scientist in IT], developed the Query Flocks System which produced solutions for mining large amounts of data stored in databases. I remember visiting Stanford with Dr. Rick Steinheiser from the Intelligence Community and Mr. Brin would rush in on roller blades, give his presentation and rush out. In fact the last time we met in September 1998, Mr. Brin demonstrated to us his search engine which became Google soon after.”
Brin and Page officially incorporated Google as a company in September 1998, the very month they last reported to Thuraisingham and Steinheiser. ‘Query Flocks’ was also part of Google’s patented ‘PageRank’ search system, which Brin developed at Stanford under the CIA-NSA-MDDS programme, as well as with funding from the NSF, IBM and Hitachi. That year, MITRE’s Dr. Chris Clifton, who worked under Thuraisingham to develop the ‘Query Flocks’ system, co-authored a paper with Brin’s superviser, Prof. Ullman, and the CIA’s Rick Steinheiser. Titled ‘Knowledge Discovery in Text,’ the paper was presented at an academic conference.
“The MDDS funding that supported Brin was significant as far as seed-funding goes, but it was probably outweighed by the other funding streams,” said Thuraisingham. “The duration of Brin’s funding was around two years or so. In that period, I and my colleagues from the MDDS would visit Stanford to see Brin and monitor his progress every three months or so. We didn’t supervise exactly, but we did want to check progress, point out potential problems and suggest ideas. In those briefings, Brin did present to us on the query flocks research, and also demonstrated to us versions of the Google search engine.”
Brin thus reported to Thuraisingham and Steinheiser regularly about his work developing Google.
==
UPDATE 2.05PM GMT [2nd Feb 2015]:
Since publication of this article, Prof. Thuraisingham has amended her article referenced above. The amended version includes a new modified statement, followed by a copy of the original version of her account of the MDDS. In this amended version, Thuraisingham rejects the idea that CIA funded Google, and says instead:
“In fact Prof. Jeffrey Ullman (at Stanford) and my colleague at MITRE Dr. Chris Clifton together with some others developed the Query Flocks System, as part of MDDS, which produced solutions for mining large amounts of data stored in databases. Also, Mr. Sergey Brin, the cofounder of Google, was part of Prof. Ullman’s research group at that time. I remember visiting Stanford with Dr. Rick Steinheiser from the Intelligence Community periodically and Mr. Brin would rush in on roller blades, give his presentation and rush out. During our last visit to Stanford in September 1998, Mr. Brin demonstrated to us his search engine which I believe became Google soon after…
There are also several inaccuracies in Dr. Ahmed’s article (dated January 22, 2015). For example, the MDDS program was not a ‘sensitive’ program as stated by Dr. Ahmed; it was an Unclassified program that funded universities in the US. Furthermore, Sergey Brin never reported to me or to Dr. Rick Steinheiser; he only gave presentations to us during our visits to the Department of Computer Science at Stanford during the 1990s. Also, MDDS never funded Google; it funded Stanford University.”
Here, there is no substantive factual difference in Thuraisingham’s accounts, other than to assert that her statement associating Sergey Brin with the development of ‘query flocks’ is mistaken. Notably, this acknowledgement is derived not from her own knowledge, but from this very article quoting a comment from a Google spokesperson.
However, the bizarre attempt to disassociate Google from the MDDS program misses the mark. Firstly, the MDDS never funded Google, because during the development of the core components of the Google search engine, there was no company incorporated with that name. The grant was instead provided to Stanford University through Prof. Ullman, through whom some MDDS funding was used to support Brin who was co-developing Google at the time. Secondly, Thuraisingham then adds that Brin never “reported” to her or the CIA’s Steinheiser, but admits he “gave presentations to us during our visits to the Department of Computer Science at Stanford during the 1990s.” It is unclear, though, what the distinction is here between reporting, and delivering a detailed presentation — either way, Thuraisingham confirms that she and the CIA had taken a keen interest in Brin’s development of Google. Thirdly, Thuraisingham describes the MDDS program as “unclassified,” but this does not contradict its “sensitive” nature. As someone who has worked for decades as an intelligence contractor and advisor, Thuraisingham is surely aware that there are many ways of categorizing intelligence, including ‘sensitive but unclassified.’ A number of former US intelligence officials I spoke to said that the almost total lack of public information on the CIA and NSA’s MDDS initiative suggests that although the progam was not classified, it is likely instead that its contents was considered sensitive, which would explain efforts to minimise transparency about the program and the way it fed back into developing tools for the US intelligence community. Fourthly, and finally, it is important to point out that the MDDS abstract which Thuraisingham includes in her University of Texas document states clearly not only that the Director of Central Intelligence’s CMS, CIA and NSA were the overseers of the MDDS initiative, but that the intended customers of the project were “DoD, IC, and other government organizations”: the Pentagon, the US intelligence community, and other relevant US government agencies.
In other words, the provision of MDDS funding to Brin through Ullman, under the oversight of Thuraisingham and Steinheiser, was fundamentally because they recognized the potential utility of Brin’s work developing Google to the Pentagon, intelligence community, and the federal government at large.
==
The MDDS programme is actually referenced in several papers co-authored by Brin and Page while at Stanford, specifically highlighting its role in financially sponsoring Brin in the development of Google. In their 1998 paper published in the Bulletin of the IEEE Computer Society Technical Committeee on Data Engineering, they describe the automation of methods to extract information from the web via “Dual Iterative Pattern Relation Extraction,” the development of “a global ranking of Web pages called PageRank,” and the use of PageRank “to develop a novel search engine called Google.” Through an opening footnote, Sergey Brin confirms he was “Partially supported by the Community Management Staff’s Massive Digital Data Systems Program, NSF grant IRI-96–31952” — confirming that Brin’s work developing Google was indeed partly-funded by the CIA-NSA-MDDS program.
This NSF grant identified alongside the MDDS, whose project report lists Brin among the students supported (without mentioning the MDDS), was different to the NSF grant to Larry Page that included funding from DARPA and NASA. The project report, authored by Brin’s supervisor Prof. Ullman, goes on to say under the section ‘Indications of Success’ that “there are some new stories of startups based on NSF-supported research.” Under ‘Project Impact,’ the report remarks: “Finally, the google project has also gone commercial as Google.com.”
Thuraisingham’s account, including her new amended version, therefore demonstrates that the CIA-NSA-MDDS program was not only partly funding Brin throughout his work with Larry Page developing Google, but that senior US intelligence representatives including a CIA official oversaw the evolution of Google in this pre-launch phase, all the way until the company was ready to be officially founded. Google, then, had been enabled with a “significant” amount of seed-funding and oversight from the Pentagon: namely, the CIA, NSA, and DARPA.
The DoD could not be reached for comment.
When I asked Prof. Ullman to confirm whether or not Brin was partly funded under the intelligence community’s MDDS program, and whether Ullman was aware that Brin was regularly briefing the CIA’s Rick Steinheiser on his progress in developing the Google search engine, Ullman’s responses were evasive: “May I know whom you represent and why you are interested in these issues? Who are your ‘sources’?” He also denied that Brin played a significant role in developing the ‘query flocks’ system, although it is clear from Brin’s papers that he did draw on that work in co-developing the PageRank system with Page.
When I asked Ullman whether he was denying the US intelligence community’s role in supporting Brin during the development of Google, he said: “I am not going to dignify this nonsense with a denial. If you won’t explain what your theory is, and what point you are trying to make, I am not going to help you in the slightest.”
The MDDS abstract published online at the University of Texas confirms that the rationale for the CIA-NSA project was to “provide seed money to develop data management technologies which are of high-risk and high-pay-off,” including techniques for “querying, browsing, and filtering; transaction processing; accesses methods and indexing; metadata management and data modelling; and integrating heterogeneous databases; as well as developing appropriate architectures.” The ultimate vision of the program was to “provide for the seamless access and fusion of massive amounts of data, information and knowledge in a heterogeneous, real-time environment” for use by the Pentagon, intelligence community and potentially across government.
These revelations corroborate the claims of Robert Steele, former senior CIA officer and a founding civilian deputy director of the Marine Corps Intelligence Activity, whom I interviewed for The Guardian last year on open source intelligence. Citing sources at the CIA, Steele had said in 2006 that Steinheiser, an old colleague of his, was the CIA’s main liaison at Google and had arranged early funding for the pioneering IT firm. At the time, Wired founder John Batelle managed to get this official denial from a Google spokesperson in response to Steele’s assertions:
“The statements related to Google are completely untrue.”
This time round, despite multiple requests and conversations, a Google spokesperson declined to comment.
UPDATE: As of 5.41PM GMT [22nd Jan 2015], Google’s director of corporate communication got in touch and asked me to include the following statement:
“Sergey Brin was not part of the Query Flocks Program at Stanford, nor were any of his projects funded by US Intelligence bodies.”
This is what I wrote back:
My response to that statement would be as follows: Brin himself in his own paper acknowledges funding from the Community Management Staff of the Massive Digital Data Systems (MDDS) initiative, which was supplied through the NSF. The MDDS was an intelligence community program set up by the CIA and NSA. I also have it on record, as noted in the piece, from Prof. Thuraisingham of University of Texas that she managed the MDDS program on behalf of the US intelligence community, and that her and the CIA’s Rick Steinheiser met Brin every three months or so for two years to be briefed on his progress developing Google and PageRank. Whether Brin worked on query flocks or not is neither here nor there.
In that context, you might want to consider the following questions:
1) Does Google deny that Brin’s work was part-funded by the MDDS via an NSF grant?
2) Does Google deny that Brin reported regularly to Thuraisingham and Steinheiser from around 1996 to 1998 until September that year when he presented the Google search engine to them?
Total Information Awareness
A call for papers for the MDDS was sent out via email list on November 3rd 1993 from senior US intelligence official David Charvonia, director of the research and development coordination office of the intelligence community’s CMS. The reaction from Tatu Ylonen (celebrated inventor of the widely used secure shell [SSH] data protection protocol) to his colleagues on the email list is telling: “Crypto relevance? Makes you think whether you should protect your data.” The email also confirms that defense contractor and Highlands Forum partner, SAIC, was managing the MDDS submission process, with abstracts to be sent to Jackie Booth of the CIA’s Office of Research and Development via a SAIC email address.
By 1997, Thuraisingham reveals, shortly before Google became incorporated and while she was still overseeing the development of its search engine software at Stanford, her thoughts turned to the national security applications of the MDDS program. In the acknowledgements to her book, Web Data Mining and Applications in Business Intelligence and Counter-Terrorism (2003), Thuraisingham writes that she and “Dr. Rick Steinheiser of the CIA, began discussions with Defense Advanced Research Projects Agency on applying data-mining for counter-terrorism,” an idea that resulted directly from the MDDS program which partly funded Google. “These discussions eventually developed into the current EELD (Evidence Extraction and Link Detection) program at DARPA.”
So the very same senior CIA official and CIA-NSA contractor involved in providing the seed-funding for Google were simultaneously contemplating the role of data-mining for counter-terrorism purposes, and were developing ideas for tools actually advanced by DARPA.
Today, as illustrated by her recent oped in the New York Times, Thuraisingham remains a staunch advocate of data-mining for counter-terrorism purposes, but also insists that these methods must be developed by government in cooperation with civil liberties lawyers and privacy advocates to ensure that robust procedures are in place to prevent potential abuse. She points out, damningly, that with the quantity of information being collected, there is a high risk of false positives.
In 1993, when the MDDS program was launched and managed by MITRE Corp. on behalf of the US intelligence community, University of Virginia computer scientist Dr. Anita K. Jones — a MITRE trustee — landed the job of DARPA director and head of research and engineering across the Pentagon. She had been on the board of MITRE since 1988. From 1987 to 1993, Jones simultaneously served on SAIC’s board of directors. As the new head of DARPA from 1993 to 1997, she also co-chaired the Pentagon’s Highlands Forum during the period of Google’s pre-launch development at Stanford under the MDSS.
Thus, when Thuraisingham and Steinheiser were talking to DARPA about the counter-terrorism applications of MDDS research, Jones was DARPA director and Highlands Forum co-chair. That year, Jones left DARPA to return to her post at the University of Virgina. The following year, she joined the board of the National Science Foundation, which of course had also just funded Brin and Page, and also returned to the board of SAIC. When she left DoD, Senator Chuck Robb paid Jones the following tribute : “She brought the technology and operational military communities together to design detailed plans to sustain US dominance on the battlefield into the next century.”
Dr. Anita Jones, head of DARPA from 1993–1997, and co-chair of the Pentagon Highlands Forum from 1995–1997, during which officials in charge of the CIA-NSA-MDSS program were funding Google, and in communication with DARPA about data-mining for counterterrorism
On the board of the National Science Foundation from 1992 to 1998 (including a stint as chairman from 1996) was Richard N. Zare. This was the period in which the NSF sponsored Sergey Brin and Larry Page in association with DARPA. In June 1994, Prof. Zare, a chemist at Stanford, participated with Prof. Jeffrey Ullman (who supervised Sergey Brin’s research), on a panel sponsored by Stanford and the National Research Council discussing the need for scientists to show how their work “ties to national needs.” The panel brought together scientists and policymakers, including “Washington insiders.”
DARPA’s EELD program, inspired by the work of Thuraisingham and Steinheiser under Jones’ watch, was rapidly adapted and integrated with a suite of tools to conduct comprehensive surveillance under the Bush administration.
According to DARPA official Ted Senator, who led the EELD program for the agency’s short-lived Information Awareness Office, EELD was among a range of “promising techniques” being prepared for integration “into the prototype TIA system.” TIA stood for Total Information Awareness, and was the main global electronic eavesdropping and data-mining program deployed by the Bush administration after 9/11. TIA had been set up by Iran-Contra conspirator Admiral John Poindexter, who was appointed in 2002 by Bush to lead DARPA’s new Information Awareness Office.
The Xerox Palo Alto Research Center (PARC) was another contractor among 26 companies (also including SAIC) that received million dollar contracts from DARPA (the specific quantities remained classified) under Poindexter, to push forward the TIA surveillance program in 2002 onwards. The research included “behaviour-based profiling,” “automated detection, identification and tracking” of terrorist activity, among other data-analyzing projects. At this time, PARC’s director and chief scientist was John Seely Brown. Both Brown and Poindexter were Pentagon Highlands Forum participants — Brown on a regular basis until recently.
TIA was purportedly shut down in 2003 due to public opposition after the program was exposed in the media, but the following year Poindexter participated in a Pentagon Highlands Group session in Singapore, alongside defense and security officials from around the world. Meanwhile, Ted Senator continued to manage the EELD program among other data-mining and analysis projects at DARPA until 2006, when he left to become a vice president at SAIC. He is now a SAIC/Leidos technical fellow.
Google, DARPA and the money trail
Long before the appearance of Sergey Brin and Larry Page, Stanford University’s computer science department had a close working relationship with US military intelligence. A letter dated November 5th 1984 from the office of renowned artificial intelligence (AI) expert, Prof Edward Feigenbaum, addressed to Rick Steinheiser, gives the latter directions to Stanford’s Heuristic Programming Project, addressing Steinheiser as a member of the “AI Steering Committee.” A list of attendees at a contractor conference around that time, sponsored by the Pentagon’s Office of Naval Research (ONR), includes Steinheiser as a delegate under the designation “OPNAV Op-115” — which refers to the Office of the Chief of Naval Operations’ program on operational readiness, which played a major role in advancing digital systems for the military.
From the 1970s, Prof. Feigenbaum and his colleagues had been running Stanford’s Heuristic Programming Project under contract with DARPA, continuing through to the 1990s. Feigenbaum alone had received around over $7 million in this period for his work from DARPA, along with other funding from the NSF, NASA, and ONR.
Brin’s supervisor at Stanford, Prof. Jeffrey Ullman, was in 1996 part of a joint funding project of DARPA’s Intelligent Integration of Information program. That year, Ullman co-chaired DARPA-sponsored meetings on data exchange between multiple systems.
In September 1998, the same month that Sergey Brin briefed US intelligence representatives Steinheiser and Thuraisingham, tech entrepreneurs Andreas Bechtolsheim and David Cheriton invested $100,000 each in Google. Both investors were connected to DARPA.
As a Stanford PhD student in electrical engineering in the 1980s, Bechtolsheim’s pioneering SUN workstation project had been funded by DARPA and the Stanford computer science department — this research was the foundation of Bechtolsheim’s establishment of Sun Microsystems, which he co-founded with William Joy.
As for Bechtolsheim’s co-investor in Google, David Cheriton, the latter is a long-time Stanford computer science professor who has an even more entrenched relationship with DARPA. His bio at the University of Alberta, which in November 2014 awarded him an honorary science doctorate, says that Cheriton’s “research has received the support of the US Defense Advanced Research Projects Agency (DARPA) for over 20 years.”
In the meantime, Bechtolsheim left Sun Microsystems in 1995, co-founding Granite Systems with his fellow Google investor Cheriton as a partner. They sold Granite to Cisco Systems in 1996, retaining significant ownership of Granite, and becoming senior Cisco executives.
An email obtained from the Enron Corpus (a database of 600,000 emails acquired by the Federal Energy Regulatory Commission and later released to the public) from Richard O’Neill, inviting Enron executives to participate in the Highlands Forum, shows that Cisco and Granite executives are intimately connected to the Pentagon. The email reveals that in May 2000, Bechtolsheim’s partner and Sun Microsystems co-founder, William Joy — who was then chief scientist and corporate executive officer there — had attended the Forum to discuss nanotechnology and molecular computing.
In 1999, Joy had also co-chaired the President’s Information Technology Advisory Committee, overseeing a report acknowledging that DARPA had:
“… revised its priorities in the 90’s so that all information technology funding was judged in terms of its benefit to the warfighter.”
Throughout the 1990s, then, DARPA’s funding to Stanford, including Google, was explicitly about developing technologies that could augment the Pentagon’s military intelligence operations in war theatres.
The Joy report recommended more federal government funding from the Pentagon, NASA, and other agencies to the IT sector. Greg Papadopoulos, another of Bechtolsheim’s colleagues as then Sun Microsystems chief technology officer, also attended a Pentagon Highlands’ Forum meeting in September 2000.
In November, the Pentagon Highlands Forum hosted Sue Bostrom, who was vice president for the internet at Cisco, sitting on the company’s board alongside Google co-investors Bechtolsheim and Cheriton. The Forum also hosted Lawrence Zuriff, then a managing partner of Granite, which Bechtolsheim and Cheriton had sold to Cisco. Zuriff had previously been an SAIC contractor from 1993 to 1994, working with the Pentagon on national security issues, specifically for Marshall’s Office of Net Assessment. In 1994, both the SAIC and the ONA were, of course, involved in co-establishing the Pentagon Highlands Forum. Among Zuriff’s output during his SAIC tenure was a paper titled ‘Understanding Information War’, delivered at a SAIC-sponsored US Army Roundtable on the Revolution in Military Affairs.
After Google’s incorporation, the company received $25 million in equity funding in 1999 led by Sequoia Capital and Kleiner Perkins Caufield & Byers. According to Homeland Security Today, “A number of Sequoia-bankrolled start-ups have contracted with the Department of Defense, especially after 9/11 when Sequoia’s Mark Kvamme met with Defense Secretary Donald Rumsfeld to discuss the application of emerging technologies to warfighting and intelligence collection.” Similarly, Kleiner Perkins had developed “a close relationship” with In-Q-Tel, the CIA venture capitalist firm that funds start-ups “to advance ‘priority’ technologies of value” to the intelligence community.
John Doerr, who led the Kleiner Perkins investment in Google obtaining a board position, was a major early investor in Becholshtein’s Sun Microsystems at its launch. He and his wife Anne are the main funders behind Rice University’s Center for Engineering Leadership (RCEL), which in 2009 received $16 million from DARPA for its platform-aware-compilation-environment (PACE) ubiquitous computing R&D program. Doerr also has a close relationship with the Obama administration, which he advised shortly after it took power to ramp up Pentagon funding to the tech industry. In 2013, at the Fortune Brainstorm TECH conference, Doerr applauded “how the DoD’s DARPA funded GPS, CAD, most of the major computer science departments, and of course, the Internet.”
From inception, in other words, Google was incubated, nurtured and financed by interests that were directly affiliated or closely aligned with the US military intelligence community: many of whom were embedded in the Pentagon Highlands Forum.
Google captures the Pentagon
In 2003, Google began customizing its search engine under special contract with the CIA for its Intelink Management Office, “overseeing top-secret, secret and sensitive but unclassified intranets for CIA and other IC agencies,” according to Homeland Security Today. That year, CIA funding was also being “quietly” funneled through the National Science Foundation to projects that might help create “new capabilities to combat terrorism through advanced technology.”
The following year, Google bought the firm Keyhole, which had originally been funded by In-Q-Tel. Using Keyhole, Google began developing the advanced satellite mapping software behind Google Earth. Former DARPA director and Highlands Forum co-chair Anita Jones had been on the board of In-Q-Tel at this time, and remains so today.
Then in November 2005, In-Q-Tel issued notices to sell $2.2 million of Google stocks. Google’s relationship with US intelligence was further brought to light when an IT contractor told a closed Washington DC conference of intelligence professionals on a not-for-attribution basis that at least one US intelligence agency was working to “leverage Google’s [user] data monitoring” capability as part of an effort to acquire data of “national security intelligence interest.”
A photo on Flickr dated March 2007 reveals that Google research director and AI expert Peter Norvig attended a Pentagon Highlands Forum meeting that year in Carmel, California. Norvig’s intimate connection to the Forum as of that year is also corroborated by his role in guest editing the 2007 Forum reading list.
The photo below shows Norvig in conversation with Lewis Shepherd, who at that time was senior technology officer at the Defense Intelligence Agency, responsible for investigating, approving, and architecting “all new hardware/software systems and acquisitions for the Global Defense Intelligence IT Enterprise,” including “big data technologies.” Shepherd now works at Microsoft. Norvig was a computer research scientist at Stanford University in 1991 before joining Bechtolsheim’s Sun Microsystems as senior scientist until 1994, and going on to head up NASA’s computer science division.
Lewis Shepherd (left), then a senior technology officer at the Pentagon’s Defense Intelligence Agency, talking to Peter Norvig (right), renowned expert in artificial intelligence expert and director of research at Google. This photo is from a Highlands Forum meeting in 2007.
Norvig shows up on O’Neill’s Google Plus profile as one of his close connections. Scoping the rest of O’Neill’s Google Plus connections illustrates that he is directly connected not just to a wide range of Google executives, but also to some of the biggest names in the US tech community.
Those connections include Michele Weslander Quaid, an ex-CIA contractor and former senior Pentagon intelligence official who is now Google’s chief technology officer where she is developing programs to “best fit government agencies’ needs”; Elizabeth Churchill, Google director of user experience; James Kuffner, a humanoid robotics expert who now heads up Google’s robotics division and who introduced the term ‘cloud robotics’; Mark Drapeau, director of innovation engagement for Microsoft’s public sector business; Lili Cheng, general manager of Microsoft’s Future Social Experiences (FUSE) Labs; Jon Udell, Microsoft ‘evangelist’; Cory Ondrejka, vice president of engineering at Facebook; to name just a few.
In 2010, Google signed a multi-billion dollar no-bid contract with the NSA’s sister agency, the National Geospatial-Intelligence Agency (NGA). The contract was to use Google Earth for visualization services for the NGA. Google had developed the software behind Google Earth by purchasing Keyhole from the CIA venture firm In-Q-Tel.
Then a year after, in 2011, another of O’Neill’s Google Plus connections, Michele Quaid — who had served in executive positions at the NGA, National Reconnaissance Office and the Office of the Director of National Intelligence — left her government role to become Google ‘innovation evangelist’ and the point-person for seeking government contracts. Quaid’s last role before her move to Google was as a senior representative of the Director of National Intelligence to the Intelligence, Surveillance, and Reconnaissance Task Force, and a senior advisor to the undersecretary of defense for intelligence’s director of Joint and Coalition Warfighter Support (J&CWS). Both roles involved information operations at their core. Before her Google move, in other words, Quaid worked closely with the Office of the Undersecretary of Defense for Intelligence, to which the Pentagon’s Highlands Forum is subordinate. Quaid has herself attended the Forum, though precisely when and how often I could not confirm.
In March 2012, then DARPA director Regina Dugan — who in that capacity was also co-chair of the Pentagon Highlands Forum — followed her colleague Quaid into Google to lead the company’s new Advanced Technology and Projects Group. During her Pentagon tenure, Dugan led on strategic cyber security and social media, among other initiatives. She was responsible for focusing “an increasing portion” of DARPA’s work “on the investigation of offensive capabilities to address military-specific needs,” securing $500 million of government funding for DARPA cyber research from 2012 to 2017.
Regina Dugan, former head of DARPA and Highlands Forum co-chair, now a senior Google executive — trying her best to look the part
By November 2014, Google’s chief AI and robotics expert James Kuffner was a delegate alongside O’Neill at the Highlands Island Forum 2014 in Singapore, to explore ‘Advancement in Robotics and Artificial Intelligence: Implications for Society, Security and Conflict.’ The event included 26 delegates from Austria, Israel, Japan, Singapore, Sweden, Britain and the US, from both industry and government. Kuffner’s association with the Pentagon, however, began much earlier. In 1997, Kuffner was a researcher during his Stanford PhD for a Pentagon-funded project on networked autonomous mobile robots, sponsored by DARPA and the US Navy.
Rumsfeld and persistent surveillance
In sum, many of Google’s most senior executives are affiliated with the Pentagon Highlands Forum, which throughout the period of Google’s growth over the last decade, has surfaced repeatedly as a connecting and convening force. The US intelligence community’s incubation of Google from inception occurred through a combination of direct sponsorship and informal networks of financial influence, themselves closely aligned with Pentagon interests.
The Highlands Forum itself has used the informal relationship building of such private networks to bring together defense and industry sectors, enabling the fusion of corporate and military interests in expanding the covert surveillance apparatus in the name of national security. The power wielded by the shadow network represented in the Forum can, however, be gauged most clearly from its impact during the Bush administration, when it played a direct role in literally writing the strategies and doctrines behind US efforts to achieve ‘information superiority.’
In December 2001, O’Neill confirmed that strategic discussions at the Highlands Forum were feeding directly into Andrew Marshall’s DoD-wide strategic review ordered by President Bush and Donald Rumsfeld to upgrade the military, including the Quadrennial Defense Review — and that some of the earliest Forum meetings “resulted in the writing of a group of DoD policies, strategies, and doctrine for the services on information warfare.” That process of “writing” the Pentagon’s information warfare policies “was done in conjunction with people who understood the environment differently — not only US citizens, but also foreign citizens, and people who were developing corporate IT.”
The Pentagon’s post-9/11 information warfare doctrines were, then, written not just by national security officials from the US and abroad: but also by powerful corporate entities in the defense and technology sectors.
In April that year, Gen. James McCarthy had completed his defense transformation review ordered by Rumsfeld. His report repeatedly highlighted mass surveillance as integral to DoD transformation. As for Marshall, his follow-up report for Rumsfeld was going to develop a blueprint determining the Pentagon’s future in the ‘information age.’
O’Neill also affirmed that to develop information warfare doctrine, the Forum had held extensive discussions on electronic surveillance and “what constitutes an act of war in an information environment.” Papers feeding into US defense policy written through the late 1990s by RAND consultants John Arquilla and David Rondfeldt, both longstanding Highlands Forum members, were produced “as a result of those meetings,” exploring policy dilemmas on how far to take the goal of ‘Information Superiority.’ “One of the things that was shocking to the American public was that we weren’t pilfering Milosevic’s accounts electronically when we in fact could,” commented O’Neill.
Although the R&D process around the Pentagon transformation strategy remains classified, a hint at the DoD discussions going on in this period can be gleaned from a 2005 US Army School of Advanced Military Studies research monograph in the DoD journal, Military Review, authored by an active Army intelligence officer.
“The idea of Persistent Surveillance as a transformational capability has circulated within the national Intelligence Community (IC) and the Department of Defense (DoD) for at least three years,” the paper said, referencing the Rumsfeld-commissioned transformation study.
The Army paper went on to review a range of high-level official military documents, including one from the Office of the Chairman of the Joint Chiefs of Staff, showing that “Persistent Surveillance” was a fundamental theme of the information-centric vision for defense policy across the Pentagon.
We now know that just two months before O’Neill’s address at Harvard in 2001, under the TIA program, President Bush had secretly authorized the NSA’s domestic surveillance of Americans without court-approved warrants, in what appears to have been an illegal modification of the ThinThread data-mining project — as later exposed by NSA whistleblowers William Binney and Thomas Drake.
The surveillance-startup nexus
From here on, Highlands Forum partner SAIC played a key role in the NSA roll out from inception. Shortly after 9/11, Brian Sharkey, chief technology officer of SAIC’s ELS3 Sector (focusing on IT systems for emergency responders), teamed up with John Poindexter to propose the TIA surveillance program. SAIC’s Sharkey had previously been deputy director of the Information Systems Office at DARPA through the 1990s.
Meanwhile, around the same time, SAIC vice president for corporate development, Samuel Visner, became head of the NSA’s signals-intelligence programs. SAIC was then among a consortium receiving a $280 million contract to develop one of the NSA’s secret eavesdropping systems. By 2003, Visner returned to SAIC to become director of strategic planning and business development of the firm’s intelligence group.
That year, the NSA consolidated its TIA programme of warrantless electronic surveillance, to keep “track of individuals” and understand “how they fit into models” through risk profiles of American citizens and foreigners. TIA was doing this by integrating databases on finance, travel, medical, educational and other records into a “virtual, centralized grand database.”
This was also the year that the Bush administration drew up its notorious Information Operations Roadmap. Describing the internet as a “vulnerable weapons system,” Rumsfeld’s IO roadmap had advocated that Pentagon strategy “should be based on the premise that the Department [of Defense] will ‘fight the net’ as it would an enemy weapons system.” The US should seek “maximum control” of the “full spectrum of globally emerging communications systems, sensors, and weapons systems,” advocated the document.
The following year, John Poindexter, who had proposed and run the TIA surveillance program via his post at DARPA, was in Singapore participating in the Highlands 2004 Island Forum. Other delegates included then Highlands Forum co-chair and Pentagon CIO Linton Wells; president of notorious Pentagon information warfare contractor, John Rendon; Karl Lowe, director of the Joint Forces Command (JFCOM) Joint Advanced Warfighting Division; Air Vice Marshall Stephen Dalton, capability manager for information superiority at the UK Ministry of Defense; Lt. Gen. Johan Kihl, Swedish army Supreme Commander HQ’s chief of staff; among others.
As of 2006, SAIC had been awarded a multi-million dollar NSA contract to develop a big data-mining project called ExecuteLocus, despite the colossal $1 billion failure of its preceding contract, known as ‘Trailblazer.’ Core components of TIA were being “quietly continued” under “new code names,” according to Foreign Policy’s Shane Harris, but had been concealed “behind the veil of the classified intelligence budget.” The new surveillance program had by then been fully transitioned from DARPA’s jurisdiction to the NSA.
This was also the year of yet another Singapore Island Forum led by Richard O’Neill on behalf of the Pentagon, which included senior defense and industry officials from the US, UK, Australia, France, India and Israel. Participants also included senior technologists from Microsoft, IBM, as well as Gilman Louie, partner at technology investment firm Alsop Louie Partners.
Gilman Louie is a former CEO of In-Q-Tel — the CIA firm investing especially in start-ups developing data mining technology. In-Q-Tel was founded in 1999 by the CIA’s Directorate of Science and Technology, under which the Office of Research and Development (ORD) — which was part of the Google-funding MDSS program — had operated. The idea was to essentially replace the functions once performed by the ORD, by mobilizing the private sector to develop information technology solutions for the entire intelligence community.
Louie had led In-Q-Tel from 1999 until January 2006 — including when Google bought Keyhole, the In-Q-Tel-funded satellite mapping software. Among his colleagues on In-Q-Tel’s board in this period were former DARPA director and Highlands Forum co-chair Anita Jones (who is still there), as well as founding board member William Perry: the man who had appointed O’Neill to set-up the Highlands Forum in the first place. Joining Perry as a founding In-Q-Tel board member was John Seely Brown, then chief scientist at Xerox Corp and director of its Palo Alto Research Center (PARC) from 1990 to 2002, who is also a long-time senior Highlands Forum member since inception.
In addition to the CIA, In-Q-Tel has also been backed by the FBI, NGA, and Defense Intelligence Agency, among other agencies. More than 60 percent of In-Q-Tel’s investments under Louie’s watch were “in companies that specialize in automatically collecting, sifting through and understanding oceans of information,” according to Medill School of Journalism’s News21, which also noted that Louie himself had acknowledged it was not clear “whether privacy and civil liberties will be protected” by government’s use of these technologies “for national security.”
The transcript of Richard O’Neill’s late 2001 seminar at Harvard shows that the Pentagon Highlands Forum had first engaged Gilman Louie long before the Island Forum, in fact, shortly after 9/11 to explore “what’s going on with In-Q-Tel.” That Forum session focused on how to “take advantage of the speed of the commercial market that wasn’t present inside the science and technology community of Washington” and to understand “the implications for the DoD in terms of the strategic review, the QDR, Hill action, and the stakeholders.” Participants of the meeting included “senior military people,” combatant commanders, “several of the senior flag officers,” some “defense industry people” and various US representatives including Republican Congressman William Mac Thornberry and Democrat Senator Joseph Lieberman.
Both Thornberry and Lieberman are staunch supporters of NSA surveillance, and have consistently acted to rally support for pro-war, pro-surveillance legislation. O’Neill’s comments indicate that the Forum’s role is not just to enable corporate contractors to write Pentagon policy, but to rally political support for government policies adopted through the Forum’s informal brand of shadow networking.
Repeatedly, O’Neill told his Harvard audience that his job as Forum president was to scope case studies from real companies across the private sector, like eBay and Human Genome Sciences, to figure out the basis of US ‘Information Superiority’ — “how to dominate” the information market — and leverage this for “what the president and the secretary of defense wanted to do with regard to transformation of the DoD and the strategic review.”
By 2007, a year after the Island Forum meeting that included Gilman Louie, Facebook received its second round of $12.7 million worth of funding from Accel Partners. Accel was headed up by James Breyer, former chair of the National Venture Capital Association (NVCA) where Louie also served on the board while still CEO of In-Q-Tel. Both Louie and Breyer had previously served together on the board of BBN Technologies — which had recruited ex-DARPA chief and In-Q-Tel trustee Anita Jones.
Facebook’s 2008 round of funding was led by Greylock Venture Capital, which invested $27.5 million. The firm’s senior partners include Howard Cox, another former NVCA chair who also sits on the board of In-Q-Tel. Apart from Breyer and Zuckerberg, Facebook’s only other board member is Peter Thiel, co-founder of defense contractor Palantir which provides all sorts of data-mining and visualization technologies to US government, military and intelligence agencies, including the NSA and FBI, and which itself was nurtured to financial viability by Highlands Forum members.
Palantir co-founders Thiel and Alex Karp met with John Poindexter in 2004, according to Wired, the same year Poindexter had attended the Highlands Island Forum in Singapore. They met at the home of Richard Perle, another Andrew Marshall acolyte. Poindexter helped Palantir open doors, and to assemble “a legion of advocates from the most influential strata of government.” Thiel had also met with Gilman Louie of In-Q-Tel, securing the backing of the CIA in this early phase.
And so we come full circle. Data-mining programs like ExecuteLocus and projects linked to it, which were developed throughout this period, apparently laid the groundwork for the new NSA programmes eventually disclosed by Edward Snowden. By 2008, as Facebook received its next funding round from Greylock Venture Capital, documents and whistleblower testimony confirmed that the NSA was effectively resurrecting the TIA project with a focus on Internet data-mining via comprehensive monitoring of e-mail, text messages, and Web browsing.
We also now know thanks to Snowden that the NSA’s XKeyscore ‘Digital Network Intelligence’ exploitation system was designed to allow analysts to search not just Internet databases like emails, online chats and browsing history, but also telephone services, mobile phone audio, financial transactions and global air transport communications — essentially the entire global telecommunications grid. Highlands Forum partner SAIC played a key role, among other contractors, in producing and administering the NSA’s XKeyscore, and was recently implicated in NSA hacking of the privacy network Tor.
The Pentagon Highlands Forum was therefore intimately involved in all this as a convening network—but also quite directly. Confirming his pivotal role in the expansion of the US-led global surveillance apparatus, then Forum co-chair, Pentagon CIO Linton Wells, told FedTech magazine in 2009 that he had overseen the NSA’s roll out of “an impressive long-term architecture last summer that will provide increasingly sophisticated security until 2015 or so.”
The Goldman Sachs connection
When I asked Wells about the Forum’s role in influencing US mass surveillance, he responded only to say he would prefer not to comment and that he no longer leads the group.
As Wells is no longer in government, this is to be expected — but he is still connected to Highlands. As of September 2014, after delivering his influential white paper on Pentagon transformation, he joined the Monterey Institute for International Studies (MIIS) Cyber Security Initiative (CySec) as a distinguished senior fellow.
Sadly, this was not a form of trying to keep busy in retirement. Wells’ move underscored that the Pentagon’s conception of information warfare is not just about surveillance, but about the exploitation of surveillance to influence both government and public opinion.
The MIIS CySec initiative is now formally partnered with the Pentagon Highlands Forum through a Memorandum of Understanding signed with MIIS provost Dr Amy Sands, who sits on the Secretary of State’s International Security Advisory Board. The MIIS CySec website states that the MoU signed with Richard O’Neill:
“… paves the way for future joint MIIS CySec-Highlands Group sessions that will explore the impact of technology on security, peace and information engagement. For nearly 20 years the Highlands Group has engaged private sector and government leaders, including the Director of National Intelligence, DARPA, Office of the Secretary of Defense, Office of the Secretary of Homeland Security and the Singaporean Minister of Defence, in creative conversations to frame policy and technology research areas.”
Who is the financial benefactor of the new Pentagon Highlands-partnered MIIS CySec initiative? According to the MIIS CySec site, the initiative was launched “through a generous donation of seed funding from George Lee.” George C. Lee is a senior partner at Goldman Sachs, where he is chief information officer of the investment banking division, and chairman of the Global Technology, Media and Telecom (TMT) Group.
But here’s the kicker. In 2011, it was Lee who engineered Facebook’s $50 billion valuation, and previously handled deals for other Highlands-connected tech giants like Google, Microsoft and eBay. Lee’s then boss, Stephen Friedman, a former CEO and chairman of Goldman Sachs, and later senior partner on the firm’s executive board, was a also founding board member of In-Q-Tel alongside Highlands Forum overlord William Perry and Forum member John Seely Brown.
In 2001, Bush appointed Stephen Friedman to the President’s Intelligence Advisory Board, and then to chair that board from 2005 to 2009. Friedman previously served alongside Paul Wolfowitz and others on the 1995–6 presidential commission of inquiry into US intelligence capabilities, and in 1996 on the Jeremiah Panel that produced a report to the Director of the National Reconnaisance Office (NRO) — one of the surveillance agencies plugged into the Highlands Forum. Friedman was on the Jeremiah Panel with Martin Faga, then senior vice president and general manager of MITRE Corp’s Center for Integrated Intelligence Systems — where Thuraisingham, who managed the CIA-NSA-MDDS program that inspired DARPA counter-terrorist data-mining, was also a lead engineer.
In the footnotes to a chapter for the book, Cyberspace and National Security (Georgetown University Press), SAIC/Leidos executive Jeff Cooper reveals that another Goldman Sachs senior partner Philip J. Venables — who as chief information risk officer leads the firm’s programs on information security — delivered a Highlands Forum presentation in 2008 at what was called an ‘Enrichment Session on Deterrence.’ Cooper’s chapter draws on Venables’ presentation at Highlands “with permission.” In 2010, Venables participated with his then boss Friedman at an Aspen Institute meeting on the world economy. For the last few years, Venables has also sat on various NSA cybersecurity award review boards.
In sum, the investment firm responsible for creating the billion dollar fortunes of the tech sensations of the 21st century, from Google to Facebook, is intimately linked to the US military intelligence community; with Venables, Lee and Friedman either directly connected to the Pentagon Highlands Forum, or to senior members of the Forum.
Fighting terror with terror
The convergence of these powerful financial and military interests around the Highlands Forum, through George Lee’s sponsorship of the Forum’s new partner, the MIIS Cysec initiative, is revealing in itself.
MIIS Cysec’s director, Dr, Itamara Lochard, has long been embedded in Highlands. She regularly “presents current research on non-state groups, governance, technology and conflict to the US Office of the Secretary of Defense Highlands Forum,” according to her Tufts University bio. She also, “regularly advises US combatant commanders” and specializes in studying the use of information technology by “violent and non-violent sub-state groups.”
Dr Itamara Lochard is a senior Highlands Forum member and Pentagon information operations expert. She directs the MIIS CyberSec initiative that now supports the Pentagon Highlands Forum with funding from Goldman Sachs partner George Lee, who led the valuations of Facebook and Google.
Dr Lochard maintains a comprehensive database of 1,700 non-state groups including “insurgents, militias, terrorists, complex criminal organizations, organized gangs, malicious cyber actors and strategic non-violent actors,” to analyze their “organizational patterns, areas of cooperation, strategies and tactics.” Notice, here, the mention of “strategic non-violent actors” — which perhaps covers NGOs and other groups or organizations engaged in social political activity or campaigning, judging by the focus of other DoD research programs.
As of 2008, Lochard has been an adjunct professor at the US Joint Special Operations University where she teaches a top secret advanced course in ‘Irregular Warfare’ that she designed for senior US special forces officers. She has previously taught courses on ‘Internal War’ for senior “political-military officers” of various Gulf regimes.
Her views thus disclose much about what the Highlands Forum has been advocating all these years. In 2004, Lochard was co-author of a study for the US Air Force’s Institute for National Security Studies on US strategy toward ‘non-state armed groups.’ The study on the one hand argued that non-state armed groups should be urgently recognized as a ‘tier one security priority,’ and on the other that the proliferation of armed groups “provide strategic opportunities that can be exploited to help achieve policy goals. There have and will be instances where the United States may find collaborating with armed group is in its strategic interests.” But “sophisticated tools” must be developed to differentiate between different groups and understand their dynamics, to determine which groups should be countered, and which could be exploited for US interests. “Armed group profiles can likewise be employed to identify ways in which the United States may assist certain armed groups whose success will be advantageous to US foreign policy objectives.”
In 2008, Wikileaks published a leaked restricted US Army Special Operations field manual, which demonstrated that the sort of thinking advocated by the likes of Highlands expert Lochard had been explicitly adopted by US special forces.
Lochard’s work thus demonstrates that the Highlands Forum sat at the intersection of advanced Pentagon strategy on surveillance, covert operations and irregular warfare: mobilizing mass surveillance to develop detailed information on violent and non-violent groups perceived as potentially threatening to US interests, or offering opportunities for exploitation, thus feeding directly into US covert operations.
That, ultimately, is why the CIA, the NSA, the Pentagon, spawned Google. So they could run their secret dirty wars with even greater efficiency than ever before.
Dr Nafeez Ahmed is an investigative journalist, bestselling author and international security scholar. A former Guardian writer, he writes the ‘System Shift’ column for VICE’s Motherboard, and is also a columnist for Middle East Eye. He is the winner of a 2015 Project Censored Award for Outstanding Investigative Journalism for his Guardian work.
Nafeez has also written for The Independent, Sydney Morning Herald, The Age, The Scotsman, Foreign Policy, The Atlantic, Quartz, Prospect, New Statesman, Le Monde diplomatique, New Internationalist, Counterpunch, Truthout, among others. He is the author of A User’s Guide to the Crisis of Civilization: And How to Save It (2010), and the scifi thriller novel ZERO POINT, among other books. His work on the root causes and covert operations linked to international terrorism officially contributed to the 9/11 Commission and the 7/7 Coroner’s Inquest.
This exclusive is being released for free in the public interest, and was enabled by crowdfunding. I’d like to thank my amazing community of patrons for their support, which gave me the opportunity to work on this in-depth investigation. Please support independent, investigative journalism for the global commons.
Nsa Jobs, Nsa Director, Nsa Softball, Nsa Meaning, Nsa Careers, Nsa Definition, Nsa Headquarters, Nsa Surveillance, Nsa Spying, Nsa Internships, Nsa Acronym, Nsa Address, Nsa Advisor, Nsa Agent, Nsa Alabama, Nsa Annapolis, Nsa Agent Salary, Nsa Arc, Nsa Approved Shredders, Nsa Agreement, Nsa Building, Nsa Bahrain, Nsa Budget, Nsa Bethesda, Nsa Baseball, Nsa Badge, Nsa Benefits, Nsa Building Nyc, Nsa Budget 2016, Nsa Backdoor, Nsa Careers, Nsa Chief, Nsa Colorado, Nsa Crane, Nsa Cyber Security, Nsa Conference, Nsa Csfc, Nsa Cae, Nsa Crypto Challenge, Nsa Css, Nsa Director, Nsa Definition, Nsa Data Center, Nsa Day Of Cyber, Nsa Director Salary, Nsa Data Collection, Nsa Domestic Surveillance, Nsa Datasheet, Nsa Deputy Director, Nsa Datasheet Is Called, Nsa Employment, Nsa Edward Snowden, Nsa Exploits, Nsa Employees, Nsa Email, Nsa Evaluated Products List, Nsa Echelon, Nsa Emblem, Nsa Encryption, Nsa Eternal Blue, Nsa Fastpitch, Nsa Florida Youth, Nsa Fort Meade, Nsa Flynn, Nsa Florida, Nsa Friend, Nsa Facebook, Nsa Fort Gordon, Nsa Foia, Nsa Facts, Nsa Georgia, Nsa Glassdoor, Nsa Government, Nsa Grindr, Nsa Github, Nsa Gift Shop, Nsa Game, Nsa Grants, Nsa Gif, Nsa Guy, Nsa Headquarters, Nsa Head, Nsa Hacking Tools, Nsa Hawaii, Nsa Hampton Roads, Nsa Hacked, Nsa History, Nsa Hiring Process, Nsa Hacking Tools Leaked, Nsa Headquarters Address, Nsa Internships, Nsa Industries, Nsa Intelligence Analyst, Nsa Indiana, Nsa Influence 2017, Nsa Iad, Nsa Ias 2017, Nsa India, Nsa Illinois, Nsa Insurance, Nsa Jobs, Nsa Juice Plus, Nsa Job Openings, Nsa Jobs Utah, Nsa Jobs Salary, Nsa Jokes, Nsa Job Requirements, Nsa Jurisdiction, Nsa Jobs In Md, Nsa Japan, Nsa Keywords, Nsa Kunia, Nsa Kc, Nsa Key, Nsa Kentucky, Nsa Kmi, Nsa Kankakee, Nsa Korea, Nsa Kaspersky, Nsa Keith Alexander, Nsa Leaker, Nsa Logo, Nsa Leak, Nsa Locations, Nsa Listening, Nsa Leader, Nsa Login, Nsa Leadership, Nsa Language Analyst, Nsa Leaked Tools, Nsa Meaning, Nsa Meme, Nsa Media, Nsa Meet, Nsa Mid South, Nsa Mike Rogers, Nsa Museum, Nsa Mcmaster, Nsa Maryland, Nsa Mission Statement, Nsa News, Nsa Naples, Nsa Name Generator, Nsa North, Nsa Number, Nsa Norfolk, Nsa Nyc, Nsa Nashville, Nsa Nursing, Nsa New Orleans, Nsa Orlando, Nsa Opm Test, Nsa Online Test, Nsa Offices, Nsa Obama, Nsa Organization, Nsa Operational Interview, Nsa Only, Nsa Org Chart, Nsa Of 1947, Nsa Prism, Nsa Police, Nsa Panama City, Nsa Police Officer, Nsa Phone Number, Nsa Philadelphia, Nsa Pay Scale, Nsa Play, Nsa Polygraph, Nsa Purpose, Nsa Quantum Computer, Nsa Quotes, Nsa Qualifications, Nsa Quantum, Nsa Quizlet, Nsa Questions, Nsa Qualifier, Nsa Quantum Computer Farm, Nsa Quartet, Nsa Quiz, Nsa Rogers, Nsa Requirements, Nsa Rules, Nsa Recruiting, Nsa Relationship, Nsa Rule Book, Nsa Ransomware, Nsa Russia, Nsa Responsibilities, Nsa Reno, Nsa Softball, Nsa Surveillance, Nsa Spying, Nsa Slang, Nsa Salary, Nsa Stands For, Nsa Soccer, Nsa Softball Rules, Nsa Scholarship, Nsa Scandal, Nsa Texas, Nsa Tournaments, Nsa Tools, Nsa Trump, Nsa Tao, Nsa Tools Leaked, Nsa Twitter, Nsa Tinder, Nsa Test, Nsa Training, Nsa Utah, Nsa Urban, Nsa Usa, Nsa Utah Facility, Nsa Unmasking, Nsa Utah Jobs, Nsa Unconstitutional, Nsa Umpire, Nsa Under Obama, Nsa Uniform, Nsa Vs Cia, Nsa Visitor Center, Nsa Virginia, Nsa Vs Fbi, Nsa Vs Cia Vs Fbi, Nsa Virus, Nsa Visitor Control Center, Nsa Vpn, Nsa Vanilla, Nsa Violation Of Privacy, Nsa Wiki, Nsa Whistleblower, Nsa Washington, Nsa Wiretapping, Nsa Website, Nsa Water Filter, Nsa Watchlist, Nsa World Series, Nsa Wikileaks, Nsa Wannacry, Nsa Xkeyscore, Nsa Xbox One, Nsa Xeno World Qualifier, Nsa Xkeyscore Download, Nsa Xcode, Nsa Xbox Live, Nsa Xeno Tournament, Nsa Xkeyscore Presentation, Nsa X, Nsa X Files, Nsa Youtube, Nsa Yogurt, Nsa Young Investigator Grant, Nsa Youth Florida, Nsa Yearly Budget, Nsa Yottabyte, Nsa Youth Program, Nsa Youth, Nsa Yellow Dots, Nsa Yakima, Nsa Zero Day, Nsa Zip Code, Nsa Zeus, Nsa Zimmermann Telegram, Nsa Zimbabwe, Nsa Za, Nsa Zero Day Exploit, Nsa Zyxel, Nsa Zero Division, Nsa Zone Store, Google Maps, Google Translate, Google Docs, Google Classroom, Google Drive, Google Flights, Google Earth, Google Slides, Google Scholar, Google Play, Google Analytics, Google Account, Google Alerts, Google Adwords, Google Apps, Google Assistant, Google Adsense, Google Activity, Google App Store, Google Authenticator, Google Books, Google Business, Google Backgrounds, Google Backup, Google Bg, Google Bookmarks, Google Basketball, Google Breakout, Google Business Email, Google Barrel Roll, Google Classroom, Google Calendar, Google Chrome, Google Cps, Google Contacts, Google Careers, Google Chromecast, Google Chrome Store, Google Cloud, Google Class, Google Docs, Google Drive, Google Drawings, Google Directions, Google Diversity Memo, Google Doodle, Google Domains, Google Diversity, Google Dns, Google Dashboard, Google Earth, Google Express, Google Employee Memo, Google Email, Google Earth View, Google Earth Pro, Google Engineer Fired, Google Extensions, Google Excel, Google Easter Eggs, Google Flights, Google Finance, Google Feud, Google Forms, Google Fiber, Google Fonts, Google Fi, Google Fiber Chicago, Google Find My Phone, Google Fit, Google Gravity, Google Games, Google Gmail, Google Groups, Google Glass, Google Goggles, Google Guitar, Google Google, Google Gps, Google Gmail Cps, Google Hangouts, Google Home, Google History, Google Home App, Google Hotels, Google Headquarters, Google Help, Google Home Review, Google Homepage, Google Hire, Google Images, Google Image Finder, Google In 1998, Google Internet, Google India, Google Inbox, Google Images Reverse, Google Incognito, Google India News, Google Internships, Google Jobs, Google Jobs Chicago, Google Japan, Google Jamboard, Google James D’amore, Google Junior, Google Journal, Google Jquery, Google Job Search Tool, Google Jerseys, Google Keep, Google Keyword Planner, Google Keyboard, Google Kids, Google Keep Chrome, Google Korea, Google Keep Extension, Google Knowledge Graph, Google Keep App, Google Keep Desktop, Google Login, Google Logo, Google Location History, Google Lt, Google Letter, Google Lens, Google Link Shortener, Google Classroom, Google Location, Google Local Guides, Google Maps, Google Memo, Google Music, Google Mail, Google My Business, Google Movies, Google Maps Directions, Google Maps App, Google My Maps, Google Maps Api, Google News, Google Now, Google News India, Google Number, Google Notes, Google Nexus, Google Net Worth, Google News Us, Google Maps, Google Nexus 6p, Google Docs, Google Office Chicago, Google Okay Google, Google Opinion Rewards, Google Office, Google Onhub, Google O, Google Orbit, Google Ocean, Google Drive, Google Play, Google Photos, Google Play Music, Google Pixel, Google Plus, Google Pacman, Google Pixel 2, Google Phone, Google Play Movies, Google Phone Number, Google Quick Draw, Google Quiz, Google Questions, Google Qr Code Generator, Google Qibla, Google Quantum Computer, Google Quotes, Google Questionnaire, Google Qr Scanner, Google Quizzes, Google Reverse Image Search, Google Reviews, Google Remote Desktop, Google Recovery, Google Radio, Google Drive, Google Router, Google Ru, Google Reader, Google Rewards, Google Slides, Google Scholar, Google Sheets, Google Sign In, Google Store, Google Stock, Google Sites, Google Street View, Google Space, Google Shopping, Google Translate, Google Trends, Google Travel, Google Themes, Google Timer, Google Take Me Home, Google Talk, Google Takeout, Google Transit, Google Traffic, Google Url Shortener, Google Underwater, Google Usa, Google Uk, Google Update, Google Url Builder, Google Unblocked Games, Google Music, Google Ultron, Google University, Google Voice, Google Video, Google Vertejas, Google Voice Login, Google Voice App, Google Vr, Google View, Google Video Chat, Google Vault, Google Voicemail, Google Wallet, Google Weather, Google Wifi, Google Web Store, Google World, Google Webmaster Tools, Google Where Am I, Google Word, Google Watch, Google Wifi Review, Google X, Google Classroom, Google Xl, Google Xfinity, Google X Jobs, Google Xom, Google Chrome, Google Calendar, Google Drive, Google X Prize, Google Youtube, Google Translate, Google You Suck, Google Yahoo, Google Youtube Red, Google You’re Stupid, Google You’re Dumb, Google Yourself, Google You’re The Best, Google Your Connection Is Not Private, Google Zerg Rush, Google Zero Gravity, Google Zipper, Google Zoom, Google Zeitgeist, Google Zillow, Google Zip Code, Google Zero, Google Zone, Google Z,
Become a Patron! True Information is the most valuable resource and we ask you to give back.
In early December 2006, the Monaco Intelligence Service delivered a report to Prince Albert of Monaco on the identities of fanatical Moslems in and around the Principality of Monaco. Most of these Islamic extremists were in France, within striking distance of Monaco. We were concerned that many such fanatical Moslems had taken jobs centering on Monaco’s Port Hercules. Our report was compiled partly from Monaco police files and partly from intelligence provided to us by the foreign intelligence services with which we liaised. Monaco Police Captain Yves Subraud, who investigated Islamic extremism in and around Monaco, estimated that 30 percent of the Moslems in Cap d’Ail and Beausoleil, on opposite ends of Monaco, were fanatics. The French converts, he added, were more fanatical than ethnic Arabs. “I don’t know where my reports go,” Subraud told me. “No action is ever taken.”
Monaco Finance Jobs, Monaco Finance Group, Monaco Finance Inc, Monaco Finance Minister, Monaco Finance Conference, Monaco Finance, Monaco Financeira, Monaco Fc Finances, Monaco Internship Finance, Tag Monaco Finance, Monaco Ministry Of Finance And Economy, Monaco Department Of Finance And Economy, Monaco Banking And Finance, As Monaco Finance, Monaco Banking & Finance, Monaco Finance Conference, Finance Companies Monaco, Finance Controller Monaco, Finance Director Monaco, Monaco Emploi Finance, Monaco Fc Finance, Monaco For Finance, Monaco Finance Group, Monaco Finance Inc, Monaco Internship Finance, Monaco Masters In Finance, Finance In Monaco, Monaco Finance Jobs, Tag Heuer Monaco Ls Finance, Green Finance Monaco Ltd, Monaco Finance Minister, Monaco Master Finance, Finance Manager Monaco, Monaco Ministry Of Finance, Monaco Ministry Of Finance And Economy, Monaco Department Of Finance And Economy, Monaco University Master Of Finance, Monaco Recrutement Finance, Monaco Stage Finance, Monaco Scandale Finance, Sbm Monaco Finance, Citco Finance Monaco Sam, Salaire Monaco Finance, Tag Monaco Finance,
Become a Patron! True Information is the most valuable resource and we ask you to give back.
Consistent with 50 U.S.C. 3306(a), the Director of National Intelligence is disclosing to the public the aggregate amount of appropriations requested for Fiscal Year 2016. The aggregate amount of appropriations requested for the FY 2016 National Intelligence Program (NIP) is $53.9 billion, which includes funding requested to support Overseas Contingency Operations (OCO). In FY 2015, OCO funding was not included in the initial disclosure, but was included in disclosures that were updated after the submission of budget amendments.
Any and all subsidiary information concerning the NIP budget, whether the information concerns particular intelligence agencies or particular intelligence programs, will not be disclosed.
Beyond the disclosure of the NIP top-line figure, there will be no other disclosures of currently classified NIP budget information because such disclosures could harm national security. The only exceptions to the foregoing are for unclassified appropriations, such as for the Intelligence Community Management Account.
# # #
Fact Sheet
National Intelligence Program
The National Intelligence Program (NIP) funds the Intelligence Community (IC) activities in six Federal Departments, the Central Intelligence Agency, and the Office of the Director of National Intelligence. The IC provides intelligence collection, analysis, and the dissemination of that intelligence to inform decision making at all levels of the U.S. Government, including the President, the heads of Executive Departments, military forces, and law enforcement agencies. IC efforts play a critical role in protecting American citizens and infrastructure, safeguarding the U.S economy, and furthering the national security agenda.
World events of the past year reflect the number and complexity of national security challenges facing our nation and its vital interests around the globe. The Fiscal Year (FY) 2016 NIP budget request supports U.S. national security goals, and positions the IC to meet the demands of the future. It reflects a coordinated effort to identify the most pressing national intelligence needs as well as areas to make informed reductions to mission capabilities. The FY 2016 budget request will begin adapting and reshaping the intelligence enterprise, repositioning the IC to meet new strategic challenges and opportunities for years to come.
Reflecting the Administration’s commitment to transparency and open government, the Budget continues the practice begun in the 2012 Budget of disclosing the President’s aggregate funding request for the NIP. However, the details regarding the NIP budget remain classified, so the Budget highlights key NIP-funded activities, but does not publicly disclose detailed funding requests for intelligence activities.
Funding Highlights:
Provides $53.9 billion in discretionary funding for the National Intelligence Program to support national security goals and reflect a deliberative process to focus funding on the most critical capabilities. This includes:
o Sustaining key investments to strengthen intelligence collection and critical operational capabilities supporting counterterrorism, counterintelligence, and counterproliferation.o Protecting the IC’s core mission areas and maintaining global coverage to remain vigilant against emerging threats.
o Promoting increased intelligence sharing and advancing IC integration through continued investment in enterprise-wide capabilities and use of cloud technology to facilitate greater efficiency and improve the safeguarding of information across the intelligence information environment.
o Identifying resources for strategic priorities, including advanced technology to improve strategic warning, evolved collection and exploitation capabilities, and increased resiliency.
o Supporting ongoing Overseas Contingency Operations while adjusting to the changing defense force posture as directed by the President.
Reforms:
Achieves savings by reducing lower-priority programs.
Sustains key investments to strengthen intelligence collection and critical operational capabilities supporting counterterrorism, counterintelligence, and counterproliferation. The IC continues to strengthen collection and lead operations to defeat al-Qa¡¦ida and other violent extremists; identify and disrupt counterintelligence threats; prevent the proliferation of weapons of mass destruction; and provide strategic warning to policymakers on issues of geopolitical and economic concern.
Protects the IC’s core mission areas and maintains global coverage to remain vigilant against emerging threats. The IC continues to lead operations to penetrate and analyze the most high-interest and difficult targets around the world. Beyond those efforts, it has also continued to provide global coverage to keep watch for new threats — whether political, economic, or military — and guard against intelligence surprise.
Promotes increased intelligence sharing and advances IC integration through continued investment in enterprise-wide capabilities and use of cloud technology to facilitate greater efficiency and improve the safeguarding of information across the intelligence information environment. IC investments will improve integration to more efficiently and effectively harness the strengths of programs that are spread across the 17 IC elements. The Budget expands the use of common, secure, shared IT capabilities and services in the IC by re-hosting more data and applications on the integrated cloud environment and increasing the number of common IC desktop users. The Budget continues to support the protection of the critical networks that facilitate IC information-sharing and operational requirements and places emphasis on accelerating various information protection and access-control mechanisms. The IC is working to ensure that intelligence information flows anywhere and anytime it is required by any authorized user, from the President to our troops on the ground.
Identifies resources for strategic priorities, including advanced technology to improve strategic warning, evolved collection and exploitation capabilities, and increased resiliency. The IC worked collaboratively to identify resources to focus against strategic priorities. Such investments will enable the IC to advance technology and evolve collection capabilities to exploit existing and future opportunities — from improved warning to next-generation technology applications and services. The Administration also remains committed to measuring performance to evaluate progress, ensure key intelligence gaps are closed, and create accountability for results across the entire NIP.
Supports ongoing Overseas Contingency Operations while adjusting to the changing defense force posture as directed by the President. The Budget supports the ability of the IC to play a key role in informing military decision-makers at the strategic level, as well as those on the ground. The IC provides situational awareness, particularly as needed for force protection, targeting support, and other timely and actionable intelligence. Planners look to the IC for adversary plans, intentions, and capabilities. The Budget balances its focus between current, immediate needs for U.S. military forces engaged in operations with enduring intelligence requirements for potential future military and security needs.
Achieves savings by reducing lower-priority programs. Recognizing the challenges of this fiscal environment, the IC continues to review its operational, investment, and infrastructure programs to identify areas for savings. The NIP budget reflects a deliberative process to ensure that the IC focuses on those programs that have the most significant return on investment and terminates or reduces those considered lower priority or not performing.
Us Spy Plane, Us Spy Agencies, Us Spy Ships, Us Spy Satellites, Us Spy Plane Shot Down, Us Spy In Russia, Us Spy Plane China, Us Spy Museum, Us Spy Plane Incident, Us Spy Program, Us Spy Agencies, Us Spy Aircraft, Us Spy Agency (Abbr.), Us Spy Arrested, Us Spy Agency Tool, Us Spy Agency Crossword, Us Spy Agency Name, Us Spy Ames, Us Spy Agency Initials, Us Spy Arrested In Russia, Us Spy Body Crossword Clue, Us Spy Boat Captured By North Korea, Us Spy Bases In Australia, Us Spy Base Yorkshire, Us Spy Blimp, Us Spy Brazil, Us Spy Boss, Us Spy Bureau Crossword Clue, Us Spy Bureau, Us Spy Bill, Us Spy Caught, Us Spy Caught In Russia, Us Spy China, Us Spy Chief, Us Spy Cuba, Us Spy Cat, Us Spy Cases, Us Spy Crucified In Yemen, Us Spy Captured In Russia, Us Spy Chief James Clapper, Us Spy Drones, Us Spy Drama, Us Spy Drama H, Us Spy Drone Captured By Iran, Us Spy Drama Beginning With H, Us Spy Drones Wikipedia, Us Spy Drone Mosquito, Us Spy Drama 8 Letters, Us Spy Drones Youtube, Us Diplomat Spy, Us Spy Execution, Us Spy Equipment, Us Spy Etf, Us Spy Europe, Spy Us Equity, Spy Us Equity Yahoo, Spy Us Equity Options, Spy Us Equity Fact Sheet, Spy Us Equity Dividend, Us Russia Spy Exchange, Us Spy For Russia, Us Spy France, Us Spy For Israel, Us Spy Fish, Us Spy Films, Us S&p Futures, Us Spy French, Us Spy Flights Over Russia, Us Spy For Cuba, Us Spy Flight China, Us Spy Group, Us Spy Group Called, Us Spy Gadgets, Us Spy Germany, Us Spy Gear, Us Spy Guns, Us Government Spy Agencies, Us Government Spy, Us Government Spy On Citizens, Us Government Spy Drones, Us Spy Hansen, Us Spy History, Us Spy Hiding In Russia, Us Hypersonic Spy Plane, Us Spy Planes History, Us Spy Drama H, Us Spy Plane Hainan, Us Spy Leaks How Intelligence Is Gathered, Us Spy In Havana, Toys R Us Spy Gear, Us Spy In Russia, Us Spy Incident, Us Spy In China, Us Spy In North Korea, Us Spy Israel, Us Spy In Cuba, Us Spy In India, Us Spy In Germany, Us Spy In Pakistan, Us Spy In Cuba Released, Us Spy Jet, Us Spy Jobs, Us Spy Japan, Us Spy James, Us Spy Chief James Clapper, Us Spy Plane Chinese Jet Collide, Us Spy Plane Russian Jet, Us Spy Plane Evades Russian Jet, Us Spy Plane Crashes Chinese Jet, Wikileaks Us Spy On Japan, Us Spy Killed In China, Us Spy Killed, Us Spy Killed In Yemen, Us Spy North Korea, Toys R Us Spy Kit, Us Spy Ship North Korea, Us Spy Plane North Korea, Kaspersky Us Spy, Us Spy Living In Russia, Us Spy Leaks How Intelligence Is Gathered, Us Spy List, Us Spy Law, Us Spy Living In Russian, Us Latest Spy Plane, Us Spy Plane Lands In China, Us Spy Ship Liberty, Us Spy Plane Landing, Us Spy Satellite Launch, Us Spy Museum, Us Spy Movie, Us Spy Marries Isis, Us Spy Museum Washington Dc, Us Spy Mosquito, Us Spy Moscow, Us Spy Merkel, Us Spy Missions, Us Military Spy Planes, Us Military Spy, Us Spy Network, Us Spy North Korea, Us Spy Network In China, Us Spy Net, Us Spy News, Us Spy Netanyahu, Us Spy Names, Us Navy Spy Fish, Us Navy Spy, Us Navy Spy Ships, Us Spy Outed, Us Spy Organisation Crossword Clue, Us Spy Organization, Us Spy Operations In China Crippled, Us Spy On Germany, Us Spy Office Crossword Clue, Us Spy On Israel, Us Spy On France, Us Spy Organization Abbreviation, Us Spy On Japan, Us Spy Plane, Us Spy Plane Shot Down, Us Spy Planes Spot Missiles In Cuba, Us Spy Plane China, Us Spy Plane Incident, Us Spy Program, Us Spy Plane In Russia, Us Spy Plane Over North Korea, Us Spy Plane South Korea, Us Spy Program Today, Spy Us Quote, Us Spy Robert, Us Spy Ring In China, Us Spy Released From Cuba, Us Spy Released, Us Spy Ring, Us Spy Revolutionary War, Us Spy Russia Wig, Us Spy Richard, Spy Us Release Date, Us Russia Spy Swap, Us Spy Ships, Us Spy Satellites, Us Spy Submarines, Us Spy School, Us Spy Stories, Us Spy Subs, Us Spy Satellite Names, Us Spy Shuttle, Us Spy Space Plane, Us Spy Satellite Image Resolution, Us Spy Training, Us Spy Traitors, Us Spy Tv Series, Us Spy Thriller Series, Us Spy Treason, Us Spy Technology, Us Spy Trials, Spy Us Ticker, Us Top Spy, Us Tv Spy, Us U2 Spy Plane, Us U2 Spy Plane Shot Down, Us Uk Spy Israel, Us Uk Spy, Us Spy Plane U 2 Incident, Us Spy Plane Never Used, Us And Uk Spy Agencies Defeat Privacy, Toys R Us Uk Spy Gear, Spy Us Version, Us Spy Plane Vs China, Us Spy In Venezuela, Us Spy Plane Venezuela, Us Spy Crucified Video, Us Spy Arrested In Venezuela, Vice Us Spy Plane, Us Spy Walker, Us Spy Whistleblower, Us Spy Weapons, Wikihow Spy On The Us, Us Worst Spy, Us Woman Spy, Us Spy Swap With Russia, Us Spy Net Wsj, Us Spy Agencies Wiki, Us Spy Plane Warned, Spy Us Yahoo, Spy Us Yahoo Finance, Us Spy Base Yorkshire, Us Spy Drones Youtube, Us Spy Crucified In Yemen, Spy Us Equity Yahoo, Us Spy Killed In Yemen, Us Spy Base New Zealand,
The disclosure of controversial mass surveillance programmes by intelligence and national security agencies has evoked an international debate on the right of citizens to be protected from illegitimate or warrantless collection and analysis of their data and meta-data. This report aims at identifying what are the risks of data breaches for users of publicly available Internet services such as web browsing, email, social networks, cloud computing, or voice communications, via personal computers or mobile devices, and what are the possible impacts for the citizens and the European Information Society. In this context a clear distinction has to be made between data and meta-data. Also it must be differentiated between mass unwarranted and indiscriminate interception, and targeted lawful interception of Internet and telephony data for the purpose of law enforcement and crime investigation. While targeted lawful interception constitutes a necessary and legitimate instrument of intelligence and law enforcement agencies, mass surveillance is considered a threat to civil liberties such as the right to freedom of opinion and expression. These civil liberties are essential human rights in democratic societies and of particular importance for safeguarding independent journalism and political opposition.
Meta-data is data that is produced when electronic communication channels, like Internet or telephony are used and that provides information about the time, the origin the destination, the location, the duration and the frequency of communications carried out. Meta-data does, however, not contain the content of communications. Two types of meta-data exist, meta-data that provides data on the content (e.g. read/write/modify attributes of the file, author of the document, GPS location of a picture, etc.), and meta-data of the communication (e.g. sender, receiver, communication duration, communication starting date and time, communication channel, communication protocol used, etc.). In the context of this study, the cardinal interest lies on communication meta-data.
Communication meta-data is routinely gathered by telecom providers and Internet service providers as part of their business operations. Different laws and regulations exist in Europe and other countries that define the retention period of this data. The lawful interception of meta-data is targeted surveillance required by law enforcement authorities and is not considered as mass surveillance. The analysis of meta-data, despite the fact that it does not contain content, can reveal very detailed information about the person who has generated it.
Another potential source of information containing private data are Cookies. Cookies are text files that visited websites store on a user’s local disk. Cookies allow for smarter and faster navigation, and are commonly used for personalizing website content, as well as ads and features by associated third parties. No evidence has been found that government agencies are leveraging the information that can be inferred from the data contained in Cookies through collaboration with commercial tracking companies.
The structured nature of meta-data is ideally suited for analysis using data mining techniques such as pattern recognition, machine learning, and information or data fusion. Meta-data analysis can reveal an extraordinary amount of information about people’s habits and associations that when aggregated – data over time, or linked with other datasets – can expose even richer personal information and associational details. Unless special precautions are taken, few personal secrets of everyday life would withstand close analysis of meta-data.
Government agencies are intercepting meta-data either through their own technical capabilities, or accessing it through service providers on the basis of lawful requests, or under threat of fines. They also possess powerful capabilities to break system protections and to infiltrate systems and networks by applying advanced hard and software technology.
Commercial surveillance technology vendors are selling software applications and tools for surveillance purposes as advanced solutions for lawful communications data (including both metadata and content) interception, collection, processing and/or analysis. Clients are governments, intelligence organizations, national security and law enforcement agencies which use these intelligence platforms and tools for collecting, processing and analysing both, mass and targeted communications data.
The legal context for commercial surveillance technology vendors is defined in different national and international laws, agreements and regulations. The Wassenaar Agreement, a comprehensive international treaty on export controls, including surveillance technology and undersigned by 42 states, has been extended in 2013 to law enforcement/intelligence gathering tools and IP network surveillance systems or equipment. Notwithstanding, the report of the UN OHCHR of June 2014 states that in most states, legal standards are either non-existent or inadequate to deal with the modern communications surveillance environment.
But also national security agencies themselves have developed a number of highly sophisticated hard and software interception tools that enable them to penetrate networking equipment, monitor mobile phones and computers and divert or even modify data without being noticed.
A special focus in the endeavour of mass surveillance is on breaking encryption that may prevent access to relevant data for intelligence and law enforcement agencies. Software flaws in the implementation of encryption algorithms can lead to vulnerabilities which may be easily exploitable, regardless of the complexity, the theoretical strength or quality of the applied encryption technique. Security agencies have managed to exploit such vulnerabilities, allegedly by introducing backdoors in encryption standards, but have had only limited success with traditional cryptanalytic attacks. The new generation of encryption technology is proficient enough to avoid deterministic brute force attacks and provides the most reliable protection against unauthorized data access if its implementation and configuration parameters are well set up. Major attacks occur when implementations of current encryption technologies do not faithfully comply with their specifications, or when bugs and flaws – sometimes deliberately – are injected at code level. This is the reason for calling for a policy action that guarantees European citizens access to certified, resilient and open source implementations of different encryption specifications.
For an end user it is practically impossible to detect whether meta-data generated while navigating through the web, sending mails, or establishing other communications through Internet is being analysed or used by third parties and even less, if a system is subject to a complex attack orchestrated by powerful opponents like government agencies. Citizens can protect their privacy by applying safety conscious practices and using special software tools and services that help hiding their digital traces. Firewalls, anti-virus software, Virtual Private Networks, anonymizing proxies and networks and, most importantly, cryptography are technical means accessible to end users. But even though it is possible to hinder unauthorized access to private data or meta-data by applying a mix of different protection mechanisms, there is no means for guaranteeing total immunity against such attacks. Policy options that are considered of help in reducing the risk of privacy intrusion by mass surveillance in a short to mid-term timeframe are: a) the promotion of open source operating systems and applications that allow for constant inspection and scrutiny by a large community of experts and verification and validation bodies and b) investing in and stimulating the integration of user friendly, utility-like software solutions.
The threat posed by mass surveillance practices can however not be solved on a technical terrain. Intelligence and security agencies will always have a competitive advantage in winning a race for technological supremacy in Internet security due to the resources at their command. The problem needs to be addressed on a political level. An adequate balance between civil liberties and legitimate national security interests needs to be established, based on a public discussion that empowers citizens to decide upon their civil rights affected and the societal values at stake.
…
mass Mass Surveillance In The Us, Mass Surveillance Definition, Mass Surveillance Nsa, Mass Surveillance Programs, Mass Surveillance Pros, Mass Surveillance In America, Mass Surveillance Benefits, Mass Surveillance Debate, Mass Surveillance In Russia, Mass Surveillance Terrorism, Mass Surveillance And Terrorism, Mass Surveillance Articles, Mass Surveillance And Human Rights, Mass Surveillance After 9\/11, Mass Surveillance Australia, Mass Surveillance And Crime Prevention, Mass Surveillance And Privacy, Mass Surveillance And State Control, Mass Surveillance And Targeted Surveillance, Mass Surveillance And International Law, Mass Surveillance Benefits, Mass Surveillance Bbc, Mass Surveillance Bae, Mass Surveillance By Remote Control, Mass Surveillance By Country, Mass Surveillance Bad, Mass Surveillance Book, Mass Surveillance By Nsa, Mass Surveillance Bangladesh, Mass Blanket Surveillance, Mass Surveillance Cons, Mass Surveillance Companies, Mass Surveillance Countries, Mass Surveillance China, Mass Surveillance Canada, Mass Surveillance Conspiracy, Mass Surveillance Council Of Europe, Mass Surveillance Cases, Mass Surveillance Controversy, Mass Surveillance Chilling Effect, Mass Surveillance Definition, Mass Surveillance Debate, Mass Surveillance Does Not Work, Mass Surveillance Doesn’t Work, Mass Surveillance Disclosures, Mass Surveillance Documentary, Mass Surveillance Disadvantages, Mass Surveillance Democracy, Mass Surveillance Denmark, Mass Surveillance Data Retention Laws, Mass Surveillance Essay, Mass Surveillance Effectiveness, Mass Surveillance Ethics, Mass Surveillance Equipment, Mass Surveillance Examples, Mass Surveillance Echr, Mass Surveillance Europe, Mass Surveillance Eu, Mass Surveillance Evidence, Mass Surveillance Expropriation, Mass Surveillance Facts, Mass Surveillance France, Mass Surveillance Freedom Of Expression, Mass Surveillance Future, Mass Surveillance Facebook, Mass Surveillance Failure, Mass Surveillance Facial Recognition, Mass Surveillance Francais, Mass Surveillance Is Fundamental Threat To Human Rights, Mass Surveillance In Fiction, Mass Surveillance Good, Mass Surveillance Game, Mass Surveillance Good Or Bad, Mass Surveillance Guardian, Mass Surveillance Government, Mass Surveillance Germany, Mass Surveillance Google, Mass Surveillance Great Britain, Mass Surveillance Globally, Mass Surveillance Gone Too Far, Mass Surveillance History, Mass Surveillance Human Rights, Mass Surveillance Violates Human Rights, Mass Surveillance Against Human Rights, Mass Surveillance Threatens Human Rights, Mass Surveillance Nothing To Hide, Hacker News Mass Surveillance, Human Mass Surveillance, Mass Surveillance In The Us, Mass Surveillance In America, Mass Surveillance In Russia, Mass Surveillance In China, Mass Surveillance In North Korea, Mass Surveillance Is Good, Mass Surveillance In 1984, Mass Surveillance In The Uk, Mass Surveillance Isn’t The Answer To Fighting Terrorism, Mass Surveillance In India, Mass Surveillance Japan, Mass Surveillance Justified, Mass Surveillance Justification, Mass Surveillance Jokes, Mass Surveillance Journalists, Mass Surveillance Data Journalism, Mass Surveillance Is Not Justified, Mass Surveillance Kickstarter, Mass Surveillance North Korea, Mass Surveillance In The United Kingdom, Mass Surveillance In The Dark Knight, Mass Surveillance Laws, Mass Surveillance Leak, Mass Surveillance Legal, Mass Surveillance London, Mass Surveillance Legal Definition, Mass Surveillance Law France, Mass Surveillance Legal Framework, Mass Surveillance Laws Australia, Mass Surveillance Law Essay, Mass Surveillance International Law, Mass Surveillance Meaning, Mass Surveillance Method, Mass Surveillance Metadata, Mass Media Surveillance, Mass Mortality Surveillance, Mass Surveillance Silences Minority Opinions, Mass Surveillance In Malaysia, Mass Surveillance In Mexico, What Does Mass Surveillance Mean, Mozilla Mass Surveillance, Mass Surveillance Nsa, Mass Surveillance North Korea, Mass Surveillance New Zealand, Mass Surveillance Nz, Mass Surveillance News, Mass Surveillance Necessary, Mass Surveillance Necessity, Mass Surveillance Netherlands, Mass Surveillance Nothing To Hide, Mass Surveillance New York Times, Mass Surveillance Obama, Mass Surveillance Of Eu Citizens, Mass Surveillance On The Internet, Mass Surveillance Opinions, Mass Surveillance Online, Electronic Mass Surveillance Of Eu Citizens, Mass Surveillance Council Of Europe, Mass Surveillance Freedom Of Expression, Mass Surveillance Good Or Bad, Nsa Mass Surveillance Over, Mass Surveillance Programs, Mass Surveillance Pros, Mass Surveillance Pros And Cons, Mass Surveillance Privacy, Mass Surveillance Privacy International, Mass Surveillance Pdf, Mass Surveillance Programs International Law, Mass Surveillance Prism, Mass Surveillance Problems, Mass Surveillance Petition, Mass Surveillance Quotes, Mass Surveillance Questions, Mass Surveillance Reddit, Mass Surveillance Russia, Mass Surveillance Research, Mass Surveillance Right To Privacy, Mass Surveillance Report, Mass Surveillance Reasons, Mass Surveillance Ruled Illegal, Mass Surveillance Revelations, Mass Surveillance Resolution, Mass Surveillance Research Topics, Mass Surveillance Statistics, Mass Surveillance Synonym, Mass Surveillance Stops Terrorism, Mass Surveillance System, Mass Surveillance Solutions, Mass Surveillance Snowden, Mass Surveillance Software, Mass Surveillance Society, Mass Surveillance Sweden, Mass Surveillance Silencing Dissenting Opinions, Mass Surveillance Terrorism, Mass Surveillance Technology, Mass Surveillance Tools, Mass Surveillance Thesis, Mass Surveillance The Guardian, Mass Surveillance Timeline, Mass Surveillance Threatens Human Rights, Mass Surveillance Treaties, Mass Surveillance Transparency, Mass Surveillance In The Us, Mass Surveillance Usa, Mass Surveillance Uk, Mass Surveillance Uae, Mass Surveillance Un, Mass Surveillance Under International Law, End Mass Surveillance Under The Patriot Act, Mass Surveillance Statistics Uk, Uk Mass Surveillance Ruled Unlawful, Uk Mass Surveillance Plan, Uk Mass Surveillance Bill, Mass Surveillance Vs Targeted Surveillance, Mass Surveillance Violates Human Rights, Mass Surveillance Violates Privacy, Mass Surveillance Violation, Mass Surveillance Video Game, Mass Surveillance Vertaling, Mass Surveillance Vocabulary, Mass Video Surveillance Laws, Why Mass Surveillance Violates International Law, Vertaal Mass Surveillance, Mass Surveillance Works, Mass Surveillance Wiki, Mass Surveillance Worldwide, Does Mass Surveillance Work, Mass Surveillance Doesn’t Work, Mass Surveillance Is Wrong, Mass Surveillance In The World, Mass Surveillance Around The World, Why Mass Surveillance Is Bad, Why Mass Surveillance Is Good, Mass Surveillance Youtube, Mass Surveillance New York Times, Mass Surveillance New Zealand,
Become a Patron! True Information is the most valuable resource and we ask you to give back.
Malicious Cyber Actors Target US Universities and Colleges
5 pages
For Official Use Only
January 16, 2015
(U//FOUO) We assess that the primary cyber threat to US university and college networks is cybercrime and unwitting hosting of malicious activity, likely because the regular turnover of student network users and requirements for accessibility to the networks make the networks difficult to monitor and secure.
(U//FOUO) We assess malicious cyber actors targeting intellectual property and research are the emerging cyber threat facing university and college networks. Cutting-edge research and sensitive US government and cleared defense contractor projects are appealing targets for cyber actors looking to gain access to sensitive research programs and information.
(U//FOUO) University Networks Face Common Cyber Threats
(U//FOUO) Malicious cyber actors have targeted US universities and colleges with typical cybercrime activities, such as spear phishing students and faculty with university-themed messages, creating fake university websites, and infecting computers with malicious software, likely in an attempt to gain access to student and faculty e-mail and bank accounts. We have no indication that cybercriminals target university systems and users more than any other cybercrime victims.
» (U//FOUO) According to sensitive DHS reporting, several different types of malware designed to gather personally identifiable information (PII) and exploit computer systems for financial gain—ransomware, clickfraud malware, and credential-harvesting malware—were found on computer systems of an identified US university in late August 2014. We do not know if PII was compromised or exfiltrated as a result of these infections.
» (U//FOUO) In February 2014, unknown cyber actors targeted departments at an identified US university with phishing messages containing malicious links, according to FBI reporting. Computers of recipients that responded were infected with ransomware requiring victims to pay between $50 and $500 to decrypt their computers, according to FBI reporting.
» (U//FOUO) In early 2014, malicious cyber actors successfully executed an e-mail phishing attack against 166 employees at an identified US university. The phishing message was embedded with a malicious link to a fraudulent university website that, when accessed, prompted employees to provide PII associated with their financial accounts. The actors successfully compromised the financial accounts of two employees, changing their direct deposit information so that money was delivered to an unspecified US bank, resulting in financial losses for the employees, according to an FBI contact with excellent access.
(U//FOUO) US universities and colleges have extensive computer networks and infrastructure making them ideal targets for unwitting hosting of malicious cyber operations, including denial-of-service (DoS) attacks and undetected storage of malware. As with cybercrime, we have no indication that malicious cyber actors target university and college networks for these activities any more than other networks.
» (U//FOUO) In early 2014, an unidentified cyber actor leveraged a supercomputer at an identified US university to initiate a DoS attack against the servers of several identified US businesses that host servers for gaming activities, according to an FBI source with indirect access. The attack used about 98 percent of the university’s bandwidth.
» (U//FOUO) Unidentified cyber actors used a named US university’s web server as a file repository for distributing malicious tools, according to sensitive DHS reporting. Analysis of the web server confirmed that a number of malicious tools had been uploaded to the system, as of mid-2014.
(U//FOUO) University Networks May Be Target for Cyberespionage
(U//FOUO) While malicious cyber actors looking to exploit university and college networks for PII remain a consistent threat, we assess that the emerging cyber threat facing US university and college networks is cyberespionage actors seeking information and intellectual property. In addition to in-house, cutting-edge research, numerous US universities and colleges are involved in sensitive US government and cleared defense contractor research projects. These associations are very appealing to cyberespionage actors looking to gain access to sensitive research programs to exfiltrate information. University networks, which often have multiple levels of connectivity and accessibility to fuel collaboration, may present an easier target for cyberespionage actors than sensitive government or private industry networks. We have only a few examples of data exfiltration from university networks, but those we have lead us to judge that this activity does target research information and intellectual property.
» (U) According to reporting from a US cybersecurity firm, likely Iranian cyber actors, as part of a global espionage campaign, targeted universities in the United States, India, Israel, and South Korea from 2012 to late 2014. The cyber actors targeted research efforts, student information, student housing, and financial aid systems. According to the security firm, the cyber actors reportedly harvested confidential critical infrastructure documents from major educational institutions around the world.
» (U) A late-2013 review of the infrastructure associated with a probable foreign cyberespionage campaign indicated broad targeting of university computer systems, including those in the United States, the United Kingdom, and Israel, according to DHS reporting. The unknown actors successfully exfiltrated sensitive research information associated with university-affiliated medical organizations, including passwords and passport images.
Become a Patron! True Information is the most valuable resource and we ask you to give back.
IPN BU 001134/1435
DE FANTI SILVANO
IPN BU 00328/609
DE FANTI SILVIANO
IPN BU 0604/940
DE FLEURY BOGDAN
IPN BU 00448/569
DE KORCZAK-KESZCZYŃSKA BARBARA
IPN BU 01024/1020
DE LAMPERT WACŁAW
IPN BU 001043/101
DE OJEDA STERLING BUTTNER TOPEL BLANCA
IPN BU 0193/390
DEBCZYK EMIL STANISŁAW
IPN BU 0902/146
DEBERT WŁADYSŁAW
IPN BU 01000/4
DEBKIEWICZ WŁADYSŁAW
IPN BU 00945/1797
DEBORSKI TADEUSZ – WITOLD
IPN BU PF
252/35 DEBOWSKI – MARZEC CAROLINE
IPN BU 00768/437
DEBOWSKI MAREK
IPN BU 698/606
DEBUS ALEKSANDER
IPN BU 0957/516
DEC CZESŁAW
IPN BU 0193/1663
DEC FRANCISZEK
IPN BU 644/107
DEC JAN
IPN BU 683/522
DEC JAN
IPN BU 00249/1209
DEC LESZEK
IPN BU 001121/1822
DEC LESZEK ALEKSANDER
IPN BU 00415/299
DEC MIROSŁAWA
IPN BU 00399/400
DEC PAWEŁ
IPN BU 001134/4746
DEC PAWEŁ
IPN BU 00283/934
DEC STEFAN
IPN BU 0242/2548
DECHNIK JADWIGA
IPN BU 0218/2781
DECHNIK JAN
IPN BU 698/607
DECHNIK JAN
IPN BU 00611/394
DECKA TADEUSZ
IPN BU 001198/748
DECKA TADEUSZ
IPN BU 645/193
DECKOWSKA DANUTA
IPN BU 002081/227
DECOWSKI BOGUSŁAW
IPN BU 002085/293
DECOWSKI BOGUSŁAW STANISŁAW
IPN BU 644/1073
DECOWSKI BRONISŁAW
IPN BU 0993/273
DECYK (KANIA) ZOFIA
IPN BU 0951/431
DECYK (MAŁCHA / MOŁCHA) ALICJA
IPN BU 0870/181
DECYK ALEKSANDER
IPN BU 1108/14
DECZKOWSI JAROSŁAW
IPN BU 0242/939
DECZKOWSKA WIOLETTA
IPN BU 001134/4625
DECZKOWSKI KRZYSZTOF
IPN BU 01013/339
DECZKOWSKI TADEUSZ
IPN BU 0855/3078
DECZKOWSKI WACŁAW
IPN BU 002086/1005
DECZYK JANINA
IPN BU 00277/283
DECZYK WANDA
IPN BU 00283/557
DECZYŃSKI KRZYSZTOF
IPN BU 00768/417
DECZYŃSKI KRZYSZTOF
IPN BU 01000/1542
DEĆ STANISŁAW
IPN BU 00249/1247
DEĆKOWSKA KAZIMIERA
IPN BU 0193/8834
DEDA (ZYRO) ZOFIA
IPN BU 645/202
DEDA ZOFIA
IPN BU 00257/226
DEDEK ANDRZEJ
IPN BU 001102/1293
DEDEK ANDRZEJ
IPN BU 00399/193
DEDEK TOMASZ
IPN BU 001134/4340
DEDEK TOMASZ MICHAŁ
IPN BU 644/1074
DEDEL WITOLD
IPN BU 002086/854
DEDERKO LESZEK WŁADYSŁAW
IPN BU 698/608
DEDERKO MARIAN
IPN BU 00744/602
DEDERKO SZYMON
IPN BU 001121/4326
DEDERKO SZYMON
IPN BU 00612/1576
DEDYK JERZY
IPN BU 001198/4739
DEDYK JERZY
IPN BU 0872/166
DEFIŃSKI JÓZEF
IPN BU 00283/1447
DEFIŃSKI MARIAN
IPN BU 00768/787
DEFIŃSKI MARIAN
IPN BU 00612/1480
DEFRATYKA LUCJAN
IPN BU 00234
p.250 DEGA CZESŁAW
IPN BU 00200/3
DEGLER KATARZYNA
IPN BU 001052/240
DEGLER KATARZYNA
IPN BU 001043/289
DEGLER WŁADYSŁAW
IPN BU 00170/597
DEGLER WŁADYSŁAW I INNI
IPN BU 00249/1399
DEGUTIS JÓZEF
IPN BU 002085/93
DEGUTIS JÓZEF
IPN BU 00312
DEHMEL H. (DONAT)
IPN BU 00312/149
DEHMEL H. (DONAT)
IPN BU 01137/100
DEHMEL LUDWIK
IPN BU 698/609
DEINDL EDWARD
IPN BU 001102/1883
DEJ JÓZEF
IPN BU 0872/168
DEJ KAZIMIERZ
IPN BU 01000/686
DEJ STANISŁAW
IPN BU 00611/1277
DEJ SZCZEPAN
IPN BU 001121/79
DEJA ALEKSANDER
IPN BU 00283/933
DEJA BOGDAN
IPN BU 00249/610
DEJA ELŻBIETA
IPN BU 001121/1252
DEJA ELŻBIETA
IPN BU 00612/509
DEJA HENRYK
IPN BU 001198/4294
DEJA HENRYK
IPN BU 0772/2495
DEJA REGINA
IPN BU 001198/2224
DEJA SZCZEPAN
IPN BU 0902/147
DEJA TADEUSZ
IPN BU 01133/842
DEJDA EDWARD
IPN BU 644/1076
DEJEWSKI ZBIGNIEW
IPN BU 698/610
DEJEWSKI ZBIGNIEW
IPN BU 0193/1664
DEJKA DIONIZY
IPN BU 001043/958
DEJKAŁO DZIEJKAŁO PAWEŁ
IPN BU 01133/358
DEJNAROWICZ NATALIA
IPN BU 00945/1482
DEJNAROWICZ WŁADYSŁAWA
IPN BU 0218/1196
DEJNECKA KRYSTYNA
IPN BU 0772/997
DEJNEKA REGINA
IPN BU 0772/2496
DEJNEKA STEFAN
IPN BU 0290/120
DEJNEKA ZOFIA
IPN BU 00456/31
DEJNEKO WŁADYSŁAW
IPN BU 0242/438
DEJTROWSKI JANUSZ
IPN BU 0218/844
DEJWOREK BARBARA
IPN BU 001065/147
DEK WALENTYNA
IPN BU 0855/2360
DEKA ( KSIĄŻEK) ALICJA
IPN BU 0988/70
DEKA JÓZEF
IPN BU 00612/1469
DEKA ZBIGNIEW
IPN BU 644/1075
DEKERT ANTONI
IPN BU 698/611
DEKIERT HALINA
IPN BU 644/1077
DEKOWSKI BERNARD
IPN BU 00283/1424
DEKUNDY ARTUR
IPN BU 00768/767
DEKUNDY ARTUR
IPN BU 00945/14
DEL SETTE ELDA
IPN BU 001040/292
DELACH JERZY
IPN BU 0967/183
DELAKOWICZ SŁAWOMIR
IPN BU 0806/1820
DELALICZ DE LAVAL HELENA
IPN BU 001198/5450
DELATOUR RYSZARD
IPN BU 01133/957
DELĄG JULIA
IPN BU 00611/390
DELĄG WŁADYSŁAW
IPN BU 001198/744
DELĄG WŁADYSŁAW
IPN BU 00966/1174
DELĄG ZBIGNIEW
IPN BU 0833/799
DELĄG ZDZISŁAW
IPN BU 00966/1499
DELCZYŃSKI ANDRZEJ
IPN BU 0855/3066
DELEGACZ HELENA
IPN BU 0911/291
DELEJ ROMAN
IPN BU 0855/3364
DELESKA (WÓJTERA) JOANNA JANINA
IPN BU 748/28
DELESKA STEFAN
IPN BU 698/612
DELEŻUCH ALEKSANDER
IPN BU 00399/527
DELIKAT EUGENIUSZ
IPN BU 001134/4868
DELIKAT EUGENIUSZ STANISŁAW
IPN BU 644/1078
DELIMAT EDWARD
IPN BU 0993/77
DELIMAT LESZEK
IPN BU 0604/1591
DELIS MARIAN
IPN BU 01133/843
DELIS ZOFIA
IPN BU 01013/340
DELKIEWICZ WŁADYSŁAW
IPN BU 01050/1345
DELTOW ZYGMUNT
IPN BU 0218/2404
DELUBA JANINA
IPN BU 0171/9
DELUGA JANINA
IPN BU 0218/3506
DELUGA KAROL
IPN BU 0958/258
DELUGA STANISŁAW
IPN BU 0958/829
DELUGA WACŁAW
IPN BU 0912/44
DELURA JAN
IPN BU 0193/6710
DEŁBAKOWSKI TADEUSZ
IPN BU 00966/234
DEMAŃCZUK ANTONI
IPN BU 0866/138
DEMBA ANTONINA
IPN BU 0988/71
DEMBA GRACJAN
IPN BU 0193/6492
DEMBICKA DĘBICKA HIZIAK (SYTA) HENRYKA
IPN BU 00267/557
DEMBICKI VEL TENENBAUM ADAM
IPN BU 0988/1545
DEMBICZ RYSZARD
IPN BU 00945/1589
DEMBINSKI WOJCIECH
IPN BU 00170/92
DEMBIŃSKA – GORZKOWSKA ANNA
IPN BU 00945/2022
DEMBIŃSKA – GORZKOWSKA ANNA
IPN BU 0772/2497
DEMBIŃSKA ANNA
IPN BU 0855/3465
DEMBIŃSKA STANISŁAWA
IPN BU 0193/1665
DEMBIŃSKI (ADAM) ABRAM
IPN BU 00945/1923
DEMBIŃSKI ADAM – JAN
IPN BU 00168/362
DEMBIŃSKI ADAM JAN
IPN BU 001043/2976
DEMBIŃSKI HENRYK
IPN BU 002086/1180
DEMBIŃSKI JACEK ADAM
IPN BU 001134/3650
DEMBIŃSKI JAN
IPN BU 0866/142
DEMBIŃSKI KAZIMIERZ
IPN BU 002082/739
DEMBIŃSKI MAREK
IPN BU 002086/2089
DEMBIŃSKI MAREK
IPN BU 645/214
DEMBIŃSKI STEFAN
IPN BU 685/27
DEMBIŃSKI TOMASZ
IPN BU 0912/906
DEMBIŃSKI WŁADYSŁAW
IPN BU 00945/318
DEMBIŃSKI ZDZISŁAW – TOMASZ
IPN BU 0942/213
DEMBOWSKA JÓZEFA
IPN BU 0806/855
DEMBOWSKA JULIA BARBARA
IPN BU 0855/2342
DEMBOWSKA MICHALINA
IPN BU 0772/2499
DEMBOWSKA MIROSŁAWA
IPN BU 01753/301
DEMBOWSKA RENATA
IPN BU 683/253
DEMBOWSKA URSZULA
IPN BU 00249/1114
DEMBOWSKA-BAGIŃSKA BOŻENA
IPN BU 001121/1730
DEMBOWSKA-BAGIŃSKA BOŻENA
IPN BU 0833/147
DEMBOWSKI EUGENIUSZ
IPN BU 0194/2549
DEMBOWSKI JAN
IPN BU 0242/2629
DEMBOWSKI JANUSZ MIECZYSŁAW
IPN BU 00234
p.202 DEMBOWSKI MIROSŁAW
IPN BU 0604/128
DEMBOWSKI SŁAWOMIR
IPN BU 001043/1167
DEMBOWSKI STANISŁAW
IPN BU 001134/249
DEMBRAŁ ANDRZEJ
IPN BU 01133/844
DEMBRAŁ HENRYKA
IPN BU 00966/233
DEMBSKI TADEUSZ
IPN BU 00168/109
DEMBSKI WOJCIECH
IPN BU 0988/885
DEMCZUK ALEKSANDER
IPN BU 0193/7322
DEMCZUK TADEUSZ
IPN BU 0193/1666
DEMECKI JERZY
IPN BU 683/1726
DEMECKI MICHAŁ
IPN BU 001043/1493
DEMEL KOWALSKA WIĘCH WANDA
IPN BU 00334/552
DEMENDECKI STEFAN
IPN BU 001134/3437
DEMENDECKI STEFAN
IPN BU 001043/1241
DEMETS KRZYŻANIAK MAŁGORZATA EWA AGNIESZKA
IPN BU 00232/16
DEMIANIUK HENRYK
IPN BU 001164/26
Demianiuk Henryk Antoni
IPN BU 0242/2270
DEMIANIUK STANISŁAW
IPN BU 001043/956
DEMIANOW BARBARA
IPN BU 01000/1196
DEMIANOWICZ WŁADYSŁAW
IPN BU 0242/2716
DEMIANOWSKI JAN
IPN BU 00966/1419
DEMIAŃCZYK ARKADIUSZ
IPN BU PF
97/6 DEMIDOWICZ JACEK
IPN BU 0607/88
DEMIDOWICZ ZBIGNIEW
IPN BU 0290/129
DEMIDOWICZ ZOFIA
IPN BU 00945/189
DEMINET ANDRZEJ
IPN BU 0772/2531
DEMINIAK EDWARD ALFRED
IPN BU 002082/535
DEMIRER MEHMET-HALUK
IPN BU 00277/250
DEMIRSKA EWA
IPN BU 001121/2476
DEMIRSKA EWA
IPN BU 0902/149
DEMISIAK WŁADYSŁAW
IPN BU 0912/391
DEMKO SZCZEPAN
IPN BU 081/4
DEMKOWSKA STEFANIA
IPN BU 001134/3241
DEMOLIN STANISŁAW
IPN BU 02042/561
DEMSKA ELŻBIETA
IPN BU 00335/21
DEMSKI JAN
IPN BU 0951/1369
DEMSKI JAROSŁAW
IPN BU 00629/3
DEMSKI ZBIGNIEW
IPN BU 00689/3
DEMSKI ZBIGNIEW
IPN BU 0591/105
DEMSKI ZBIGNIEW
IPN BU 0901/2184
DEMUS GRZEGORZ
IPN BU 00249/164
DEMUSCHEWSKI HILMAR
IPN BU 002085/37
DEMUSCHEWSKI HILMAR
IPN BU 00328/624
DENASIEWICZ JOANNA
IPN BU 001134/1449
DENASIEWICZ JOANNA
IPN BU 00234
p.257 DENDURA STANISŁAW
IPN BU 01079/71
DENEMAN EDMUND
IPN BU 00275/33
DENGEL TOMASZ
IPN BU 00966/614
DENIS (DANIS) EUGENIUSZ
IPN BU 0242/2289
DENIS JERZY
IPN BU 0993/487
DENIS LEOKADIA
IPN BU 0806/2756
DENIS LIDIA
IPN BU 0833/576
DENIS MIECZYSŁAW
IPN BU 00744/438
DENIS MIROSŁAW
IPN BU 001121/4074
DENIS MIROSŁAW
IPN BU 001121/291
DENISIENKO GRZEGORZ
IPN BU 01000/1622
DENISIUK ANTONI
IPN BU 0287/190
DENISIUK GRAŻYNA
IPN BU 0218/906
DENISIUK PAŃTA JANINA
IPN BU 01079/209
DENISIUK RYSZARD
IPN BU 0193/389
DENISOW BORYS
IPN BU 644/108
DENISOW JAN
IPN BU 00966/168
DENISZCZUK JERZY
IPN BU 002086/694
DENISZCZUK MACIEJ PROSPER
IPN BU 0806/2444
DENISZEWSKA ALFREDA
IPN BU 00966/230
DENISZEWSKI – DUPCIA STEFAN
IPN BU 01175/20
DENKA EDWARD
IPN BU 001198/7084
DENKIEWICZ BOGUSŁAW
IPN BU 00612/4382
DENKIEWICZ BOGUSŁW
IPN BU 0902/150
DENKIEWICZ CZESŁAW
IPN BU 0806/776
DENKIEWICZ DARIUSZ
IPN BU 001052/932
DENKIEWICZ DARIUSZ MIECZYSŁAW
IPN BU 645/216
DENKIEWICZ DOMINIK
IPN BU 0218/1472
DENKIEWICZ KAZIMIERZ
IPN BU 696/1343
DENKIEWICZ MICHALINA
IPN BU 001043/2325
DENKIEWICZ WOJCIECH
IPN BU 0951/1100
DENKIEWICZ WOJCIECH JERZY
IPN BU 00750/262
DENNADUI / CHAOUKAT
IPN BU 0194/1069
DENOCH CZESŁAW
IPN BU 0218/422
DENUSZEK MARIAN
IPN BU 00277/913
DEŃCA WŁADYSŁAW
IPN BU 001121/3099
DEŃCA WŁADYSŁAW
IPN BU 00612/301
DEPAK TADEUSZ
IPN BU 0993/1483
DEPCIK JADWIGA
IPN BU 0912/905
DEPCZYŃSKA HELENA
IPN BU 02042/729
DEPERAS DANUTA
IPN BU 001089/116
DEPERASIŃSKA ANNA
IPN BU 00244/59
DEPERASIŃSKI RYSZARD
IPN BU 01000/710
DEPKOWSKI ZYGMUNT
IPN BU 644/1079
DEPNER RYSZARD
IPN BU 00704/203
DEPO DANUTA
IPN BU 00323/54
DEPO JERZY
IPN BU 00704/203
DEPO JUSTYN
IPN BU 644/3323
DEPO MAREK
IPN BU 00283/382
DEPO STANISŁAW
IPN BU 00768/261
DEPO STANISŁAW
IPN BU 0193/1668
DEPOWSKA JANINA
IPN BU 0962/24
DEPTA HANNA MARIANNA
IPN BU 01248/1
DEPTA LEON
IPN BU PF
1021/52 DEPTAŁA ANNA
IPN BU 02042/129
DEPTAŁA DARIUSZ
IPN BU 0806/2364
DEPTA-PRĄDZIŃSKA URSZULA
IPN BU 0242/1229
DEPTUCH ANDRZEJ
IPN BU 001052/900
DEPTUCH ANNA EWA
IPN BU 01013/341
DEPTUCH ZYGMUNT
IPN BU 01133/129
DEPTUŁA HENRYK
IPN BU 01133/845
DEPTUŁA HENRYK
IPN BU 00232/97
DEPTUŁA HENRYK
IPN BU 001164/127
Deptuła Henryk
IPN BU 0958/827
DEPTUŁA IRENA
IPN BU 0912/1497
DEPTUŁA JÓZEF
IPN BU 0958/830
DEPTUŁA KAZIMIERZ
IPN BU 0866/139
DEPTUŁA KAZIMIERZ
IPN BU 645/238
DEPTUŁA LUCYNA
IPN BU 0242/1261
DEPTUŁA MAREK
IPN BU 0772/2500
DEPTUŁA MARIAN
IPN BU 0958/826
DEPTUŁA STANISŁAW
IPN BU 645/1462
DEPTUŁA STANISŁAW
IPN BU 00945/2714
DEPTUŁA STANISŁAW – FRANCISZEK
IPN BU 0806/3072
DEPTUŁA STANISŁAWA
IPN BU 0958/286
DEPTUŁA STEFAN
IPN BU 0242/2081
DEPTUŁA TOMASZ
IPN BU 0911/13
DEPTUŁA WACŁAW
IPN BU 0958/831
DEPTUŁA WŁADYSŁAW
IPN BU 0911/106
DEPTUŁA ZBIGNIEW
IPN BU 0243/400
DEPTUŁA ZBIGNIEW
IPN BU 00945/70
DEPTUSZEWSKI STEFAN
IPN BU 0901/2141
DERA DANUTA
IPN BU 0193/1669
DERA JÓZEF
IPN BU 0193/391
DERBICH ALEKSANDER
IPN BU 52/181
DERBICH EDWARD
IPN BU PF
144/86 DERBICH EDWARD
IPN BU 0193/4632
DERBICH HANNA
IPN BU 0193/4856
DERBICH JÓZEF
IPN BU 0242/920
DERBICH MAREK
IPN BU 0218/3666
DERBICH TERESA
IPN BU 095/16
DERBIN JAN
IPN BU 01013/342
DERBIN JÓZEF
IPN BU 0911/107
DERBIN STANISŁAW
IPN BU 0242/2127
DERBIN TADEUSZ
IPN BU 00277/334
DERC EUGENIUSZ
IPN BU 001121/2556
DERC EUGENIUSZ
IPN BU 0806/2528
DERDA DANUTA
IPN BU 0772/2503
DERDA GENOWEFA
IPN BU 0806/845
DERDA KAZIMIERZ
IPN BU 645/244
DERDA KRYSTYNA
IPN BU 0193/25
DERDA TADEUSZ
IPN BU 01269/1
DERDA ANDRZEJ
IPN BU 1161/183
DERDOŃ ZDZISŁAW
IPN BU 0242/703
DERECKA HANNA
IPN BU 0866/1396
DERECKA STANISŁAWA
IPN BU 001121/1081
DERECKI FELIKS
IPN BU 0951/84
DERECKI JAN
IPN BU 0194/2863
DERECKI JANUSZ
IPN BU 00244/62
DERECKI JAROSŁAW
IPN BU 0193/392
DERECKI JAROSŁAW STANISŁAW
IPN BU 0942/566
DERECKI LUCJAN
IPN BU 002082/709
DERECKI MICHAŁ
IPN BU 002086/2058
DERECKI MICHAŁ
IPN BU 00277/650
DERECKI ZYGMUNT
IPN BU 001121/2854
DERECKI ZYGMUNT
IPN BU 980/181
DERECZYŃSKA MARIANNA
IPN BU 0891/122
DEREDAS JÓZEF
IPN BU 0901/2429
DEREJ ELŻBIETA LIDIA
IPN BU 0604/593
DEREJ WIESŁAW
IPN BU 644/109
DEREJ WŁODZIMIERZ
IPN BU 685/239
Derejczyk Hanna
IPN BU 00612/4072
DEREJSKI MAREK
IPN BU 00612/3155
DEREK STEFAN
IPN BU 0772/4522
DERELA MARIAN
IPN BU 698/614
DERENGOWSKA MARIA
IPN BU 0218/1638
DERENGOWSKI JERZY
IPN BU 0243/50
DERENGOWSKI STEFAN
IPN BU 698/613
DEREŃ BOLESŁAW
IPN BU 0242/421
DEREŃ CZESŁAW
IPN BU 00415/343
DEREŃ HENRYK
IPN BU 00612/367
DEREŃ JAN
IPN BU 001198/4230
DEREŃ JAN
IPN BU 0942/394
DEREŃ JANINA
IPN BU 0242/1629
DEREŃ STANISŁAW
IPN BU 0218/1980
DEREŃ WŁADYSŁAW
IPN BU 0604/189
DEREŃKO HALINA
IPN BU 0604/204
DEREŃKO HENRYK
IPN BU 0958/1013
DERES MARIA
IPN BU 698/615
DERES MICHAŁ
IPN BU 002086/435
DERESIEWICZ PIOTR
IPN BU 01133/949
DERESZ MARIA
IPN BU 00191/27
DERESZ PAWEŁ JAN
IPN BU 001043/1848
DERESZ PAWEŁ JAN
IPN BU 01133/846
DERESZ STEFAN
IPN BU 001102/1210
DERESZKIEWICZ ZANON BERNARD
IPN BU 00257/143
DERESZKIEWICZ ZENON BERNARD
IPN BU 00200/1361
DERESZNIAK GUSTAW
IPN BU 001102/962
DERESZNIAK GUSTAW
IPN BU 0866/140
DERESZYŃSKI WŁADYSŁAW
IPN BU 00612/4313
DEREZIŃSKI KRZYSZTOF
IPN BU 001198/7044
DEREZIŃSKI KRZYSZTOF
IPN BU 0772/2501
DERĘGOWSKA DANUTA
IPN BU 0912/401
DERĘGOWSKI CZESŁAW
IPN BU 0242/1467
DERĘGOWSKI EDWARD
IPN BU 0772/2502
DERĘGOWSKI LEON
IPN BU 0833/148
DERĘGOWSKI WIKTOR
IPN BU 001065/64
DERKACZ ALICJA
IPN BU 0806/2698
DERKACZ MIROSŁAWA
IPN BU 0194/1233
DERKACZ TADEUSZ
IPN BU 01250/118
DERKOWSKI TADEUSZ
IPN BU 001121/1882
DERKUCZEWSKA BARANCEWICZ MARYLA
IPN BU 00249/1271
DERKUCZEWSKA-BARANCEWICZ MARYLA
IPN BU PF
1021/53 DERLACIŃSKA IRENA
IPN BU 00249/1328
DERLACKA BARBARA
IPN BU 001121/1940
DERLACKA BARBARA
IPN BU 0806/1965
DERLACKA BEATA
IPN BU 01000/1471
DERLACZ JÓZEF
IPN BU 0993/263
DERLACZ MAGDALENA
IPN BU 0193/1670
DERLAGA MICHAŁ
IPN BU 00283/470
DERLAK JACEK
IPN BU 00768/347
DERLAK JACEK
IPN BU 00283/1805
DERLATKA CZESŁAW
IPN BU 0242/1684
DERLATKA JANUSZ
IPN BU 00611/1877
DERLATKA JERZY
IPN BU 001198/3326
DERLATKA JERZY
IPN BU 001198/2735
DERLATKA JÓZEF
IPN BU 00611/1091
DERLATKA JULIAN
IPN BU 00334/264
DERLATKA KRYSTYNA
IPN BU 001134/3062
Derlatka Krystyna
IPN BU 00612/1333
DERLATKA MARIAN
IPN BU 001198/2149
DERLATKA MARIAN
IPN BU 01318/3
DERLATKA MARZENA
IPN BU 0242/1213
DERLATKA PAWEŁ
IPN BU 001198/4030
DERLATKA PAWEŁ
IPN BU 00612/3556
DERLATKA ROMAN
IPN BU 001198/6532
DERLATKA ROMAN
IPN BU 00611/1655
DERLATKA STEFAN
IPN BU 001198/3021
DERLATKA STEFAN
IPN BU 00249/635
DERLATKA WITOLD
IPN BU 001052/1765
DERLATKA WITOLD
IPN BU 001121/1280
DERLATKA WITOLD
IPN BU 001198/1759
DERLATKA ZDZISŁAW
IPN BU 0912/392
DERLATKO ALICJA
IPN BU 01079/103
DERLATKO ZYGMUNT
IPN BU PF
498/30 DERLECKI JAN
IPN BU 00283/1351
DERLETA EDWARD
IPN BU 00768/741
DERLETA EDWARD
IPN BU 002086/1179
DERLIKOWSKA CZESŁAWA
IPN BU 01133/847
DERM EUGENIA
IPN BU 698/746
DERM ZBIGNIEW
IPN BU 0772/2504
DERMA HELENA
IPN BU 00249/1643
DERMAŃSKI BOGDAN
IPN BU 001121/2241
DERMAŃSKI BOGDAN
IPN BU 644/1080
DERON HENRYK
IPN BU 0242/514
DEROŃ BEATA
IPN BU 00165/14
Derpiński Edward
IPN BU 001198/5291
DERPIŃSKI WALDEMAR
IPN BU 00612/2281
DERSZNIAK ANDRZEJ
IPN BU 001198/5408
DERSZNIAK ANDRZEJ
IPN BU 001043/2403
DERSZNIAK ANNA
IPN BU 980/182
DERWICZ JÓZEF
IPN BU 980/182
DERWICZ STANISŁAW
IPN BU PF
299/107 DERWIŃSKI STANISŁAW
IPN BU 0772/2505
DERWIŃSKI TADEUSZ
IPN BU 0806/1576
DERWISZ LEOKADIA
IPN BU 001043/300
DERWISZ MAREK ANTONI
IPN BU 980/181
DERYŁO JAN
IPN BU 0872/167
DERYNG CZESŁAW
IPN BU 644/1081
DERYNIOWSKI JAN
IPN BU 001198/3221
DERYSZ MIROSŁAWA
IPN BU 0855/2699
DERZAKOWSKA HELENA
IPN BU 0855/2567
DERZAKOWSKI IGNACY
IPN BU 001043/963
DESCOURS PIOTR MAREK
IPN BU 698/616
DESKA BOGDAN
IPN BU 01434/81
DESLER JERZY
IPN BU 0833/810
DESSAUER RYSZARD
IPN BU 0864/295
DESZCZ EUGENIUSZ
IPN BU 01000/709
DESZCZ WŁADYSŁAW
IPN BU 0901/177
DESZCZKA GENOWEFA SERAFIN
IPN BU 00283/628
DESZCZYŃSKA ELŻBIETA
IPN BU 0287/191
DESZCZYŃSKA KRYSTYNA
IPN BU 0901/446
DESZCZYŃSKA SZROT EWA GRAŻYNA
IPN BU 0193/1671
DESZCZYŃSKI (DESKA) ZDZISŁAW
IPN BU 00234
p.241 DESZCZYŃSKI EUGENIUSZ
IPN BU 00611/1567
DESZCZYŃSKI HENRYK
IPN BU 001198/2941
DESZCZYŃSKI HENRYK
IPN BU 0772/2506
DESZCZYŃSKI STEFAN
IPN BU 0193/393
DETIUK TEODOR
IPN BU 00612/3252
DETKA BOGDAN
IPN BU 00612/2193
DETKA LESZEK
IPN BU 001198/5289
DETKA LESZEK
IPN BU 00612/1415
DETKA PIOTR
IPN BU 001198/4624
DETKA PIOTR
IPN BU 001198/1217
DETKA TADEUSZ
IPN BU 00612/992
DETKA WITOLD
IPN BU 0854/1260
DETKO BOGDAN
IPN BU 00611/1031
DETKO FRANCISZEK
IPN BU 001198/1437
DETKO FRANCISZEK
IPN BU 001198/3793
DETKO RYSZARD
IPN BU 0806/2660
DETKO-ZAŁUCKA KRYSTYNA
IPN BU 0911/616
DETNERSKI BRONISŁAW
IPN BU 0194/296
DETNERSKI EUGENIUSZ
IPN BU 0218/2916
DETRYCH MIECZYSŁAW
IPN BU 0891/479
DETRYCH WŁODZIMIERZ
IPN BU 00328/1317
DETTOLFF MARIA
IPN BU 0242/1746
DETYNIECKI RAFAŁ JAN
IPN BU 0993/1479
DEUAR KAZIMIERA
IPN BU 00277/857
DEUTSCH JAN
IPN BU 001121/3046
DEUTSCH JAN
IPN BU 001134/3724
DEUTSCHMANN JULIAN
IPN BU 00768/753
DE-VITTE BOGDAN
IPN BU 00283/1381
DEVITTE BOHDAN
IPN BU 00200/434
DEVOS JOSEF
IPN BU 001052/1408
DEVOS JOSEF
IPN BU 00448/522
DEWAR JACEK
IPN BU 001134/5498
DEWAR JACEK
IPN BU 001198/74
DEWILLE WITOLD
IPN BU 645/235
DEZUR MARIA
IPN BU 00200/353
DEŻAKOWSKI MAREK
IPN BU 001052/1184
DEŻAKOWSKI MAREK
Kgb Meaning, Kgb Bar, Kgb Putin, Kgb Radio, Kgb Cold War, Kgb The Office, Kgb Vs Cia, Kgb Boston, Kgb Gang, Kgb Training, Kgb Agent, Kgb Archiver, Kgb Assassinations, Kgb Animal Farm, Kgb Alien, Kgb Archer, Kgb Ap Euro, Kgb Alaska, Kgb Arms, Kgb Application, Kgb Bar, Kgb Boston, Kgb Band, Kgb Badge, Kgb Burger, Kgb Beer, Kgb Bar East Village, Kgb Building, Kgb Ballistic Knife, Kgb Bar Events, Kgb Cold War, Kgb Call Center, Kgb Chicken, Kgb Conduit, Kgb Customs, Kgb Construction, Kgb Car, Kgb Company, Kgb Careers, Kgb Cold War Definition, Kgb Definition, Kgb Deals, Kgb Department 12, Kgb Documentary, Kgb Directorate S, Kgb Defector, Kgb Drink, Kgb Def, Kgb During The Cold War, Kgb Donut, Kgb Established, Kgb Emblem, Kgb Events, Kgb East Village, Kgb Espionage, Kgb Executions, Kgb Enterprises, Kgb Escape Room Tips, Kgb Execution Methods, Kgb Ended, Kgb Fm, Kgb Food Truck, Kgb Fsb, Kgb Flag, Kgb Facts, Kgb Foam, Kgb Files, Kgb Football, Kgb Fantastic Fiction, Kgb Full Form, Kgb Gang, Kgb Glass, Kgb Game, Kgb Group, Kgb Glass Donut, Kgb Gru, Kgb Glass For Sale, Kgb Gourmet Food Truck, Kgb Gun, Kgb Gif, Kgb History, Kgb Headquarters, Kgb Hat, Kgb Headphones, Kgb Hair, Kgb Head, Kgb Homegrown Albums, Kgb Homes, Kgb Homegrown Greatest Hits, Kgb Handler, Kgb In Russian, Kgb Illegals, Kgb In America, Kgb In Animal Farm, Kgb In Usa, Kgb Interrogation, Kgb Inc, Kgb Images, Kgb In The Cold War, Kgb Ilm, Kgb Jokes, Kgb Jfk Assassination, Kgb Jobs, Kgb Joke Office, Kgb Jack Barsky, Kgb Jfk, Kgb Jacket, Kgb Jfk Assassination Files, Kgb Jewelry, Kgb Jimmy Carter Campaign, Kgb Kiteboarding, Kgb Kfc, Kgb Killed Jfk, Kgb Keylogger, Kgb Kgb, Kgb Knife, Kgb Kiss, Kgb Kfc Meme, Kgb Killers, Kgb Kostikov, Kgb Logo, Kgb Lee, Kgb Leaders, Kgb Lansing, Kbg Logistics, Kgb Las Vegas, Kgb Law, Kgb Leafly, Kgb Lubbock, Kgb Law Firm, Kgb Meaning, Kgb Museum Prague, Kgb Meme, Kgb Movies, Kgb Motto, Kgb Mafia, Kgb Music, Kgb Martial Arts, Kgb Museum Moscow, Kgb Marvel, Kgb New Name, Kgb Nyc, Kgb News, Kgb New York, Kgb Now, Kgb Number, Kbg New Brunswick, Kgb Now Called, Kbg New Brunswick Nj, Kgb Name, Kgb Officer, Kgb Office Joke, Kgb Operations, Kgb Outfit, Kgbi Omaha, Kgb Osnaz, Kgb Oracle, Kgb Og Strain, Kgb Operations During The Cold War, Kgb Outpost, Kgb Putin, Kgb Packers, Kgb Predecessor, Kgb Productions, Kgb Paris, Kgb Police, Kgb Propaganda, Kgb Prison, Kgb Pen, Kgb Pin, Kgb Questions, Kgb Quizlet, Kgb Quotes, Kgb Quora, Kgb Question Service, Kgb Questions And Answers, Kgb Quotes Rounders, Kgb Que Es, Kgb Quarter Report, Kgb Russia, Kgb Radio, Kgb Rounders, Kgb Ranks, Kgb Red Room, Kgb Russian Revolution, Kgb Reading Series, Kgb Restaurant, Kgb Resident, Kgb Ricin, Kgb Spies, Kgb Successor, Kgb San Diego, Kgb Sky Show 2017, Kgb Symbol, Kgb San Antonio, Kgb Stalin, Kbg Syndrome, Kgb Swimbaits, Kgb Strain, Kgb The Office, Kgb Training, Kgb Texas, Kgb Today, Kgb Text, Kgb Torture, Kgb Translation, Kgb Tactics, Kgb Three Bears, Kgb Training Manual, Kgb Uniform, Kgb Usa, Kgb Ussr, Kgb University, Kgb Umbrella, Kgb Usa Inc, Kgb Urban, Kgb Usa San Antonio, Kgb Ushanka, Kgb Useful Idiots, Kgb Vs Cia, Kgb Vs Fsb, Kgb Vest Persona 5, Kgb Vs Gru, Kgb Vodka, Kgb Vs Cia Cold War, Kgb Vs Cia Deadliest Warrior, Kgb Vs Fbi, Kgb Video Game, Kgb Vodka Lemon, Kgb Wiki, Kgb Wilmington, Kgb Weapons, Kgb Watch, Kgb Website, Kgb Waits For No One, Kgb Weed, Kgb We Will Ask The Questions, Kgb Wolf, Kgb Wallpaper, Kgb X Ray, Ex Kgb, Kgb X Files, Kgb X Line, Kgbx Radio, Ktb Xd, Kgb X Cia, Kgb Xredirect, Kgb Archiver X64, Kgb Line X Stringer, Kgb Youtube, Kgb Yuri, Kgb Yelp, Kgb Yahoo, Kgb York, Kgb Yerevan, Kgb Yahoo Answers, Kgb Yoga Bag, Kgb Years, Kgb Yra, Kgb Zippo, Kgb Zip, Kgb Znacenje, Kgb Zomato, Kgb Zenekar, Kgb Zipper, Kgb Zenith Group, Kgb Zip Download, Kgb Zhukov, Kgb Znachenie, Kgb Agent Putin, Kgb Agent Meaning, Kgb Agent Fomin, Kgb Agent Book, Kgb Agent Definition, Kgb Agent Salary, Kgb Agent Interview, Kgb Agent Killed In London, Kgb Agent Jack Barsky, Kgb Agent In Usa, Kgb Agent Assassinated, Kgb Agent Alien, Kgb Agent Aragon, Kgb Agent Alexander, Soviet Agent Abel, Vostok Kgb Agent Automatic, Vostok Kgb Agent Automatic Watch, Kgb Agent In America, Kgb Agent Record Of Alien Races, Kgb Agent With Frightening Psychic Abilities, Kgb Agent Book, Kgb Agent Bezmenov, Kgb Agent Blacklist, Kgb Agent Jack Barsky, Kgb Agent In Bond Movie, Kgb Agent Killed By Radiation, Ex Kgb Agent Book, Kgb Home Based Agent, Former Kgb Agent Explains Brainwashing America, Best Kgb Agent, Kgb Agent Costume, Kgb Agent Cuban Missile Crisis, Kgb Agent Caught, Kgb Agent Careers, Kgb Special Agent Challenge, Kgb Agent In Cia, Kgb Agent Halloween Costume, Kgb Agent Explains Current Events In Usa, Kgb Agent Leaves Canada, Ex Kgb Agent Leaves Canada, Kgb Agent Definition, Kgb Agent Defector, Kgb Agent Demoralization, Kgb Agent Dies, Kgb Double Agent, Soviet Double Agent, Cia Kgb Double Agent, Define Kgb Agent, Kgb Special Agent Job Description, Agent Du Kgb, Kgb Agent Explains Current Events In Usa, Former Kgb Agent Explains Brainwashing America, Kgb Agent Killed In England, Ex Kgb Agent Interview, Ex Kgb Agent, Ex-kgb Agent On Indoctrination & Demoralization, Ex Kgb Agent Leaves Canada, Ex Kgb Agent Killed, Ex Kgb Agent Yuri, Ex Kgb Agent Youtube, Kgb Agent Fomin, Kgb Agent Found Dead, Kgb Agents Foe Crossword Clue, Kgb Agents Found In New Jersey, Kgb Famous Agents, Kgb Agent With Frightening Psychic Abilities, Former Kgb Agent Poisoned, Former Kgb Agent Explains Brainwashing America, Former Kgb Agent, Former Kgb Agent Killed In London, Kgb Agent Guillou, Soviet Gru Agent, Genscher Kgb Agent, Kgb Agent Halloween Costume, Hot Kgb Agent, Kgb Agent Interview, Kgb Agent In Usa, Kgb Agent In India, Kgb Agent In Mi6, Kgb Agent In Cia, Kgb Agent In Bond Movie, Kgb Agent In America, Kgb Agent In Vancouver, Kgb Agent Killed In London, Former Kgb Agent Interview, Kgb Agent Jack Barsky, Kgb Agent Job, Kgb Agent James Bond, Kgb Special Agent Job Description, Kgb Special Agent Job, Kgb Agent Killed In London, Kgb Agent Kidnapped, Kgb Agent Killed In England, Khamenei Kgb Agent, Kirill Kgb Agent, Kekkonen Kgb Agent, Kgb Agent Litvinenko, Kgb Agent Login, Kgb Agent London, Kgb Agent Leaves Canada, Soviet Agent Lucy, Russian Kgb Agent Lisa, Ex Kgb Agent Leaves Canada, Kgb Agent Meaning, Kgb Agent Murdered, Kgb Agent Movies, Kgb Agent 60 Minutes, Kgb Agent In Mi6, Kgb Agent In Bond Movie, Merkel Kgb Agent, Kgb Agent Names, Soviet News Agency, Kgb Agents In New Jersey, A Former Kgb Agent Needs Your Help, Nyiso Kgb Agent, Kgb Agent On 60 Minutes, Kgb Agent Online, Kgb Agent Record Of Alien Races, Ex-kgb Agent On Indoctrination & Demoralization, Obama Kgb Agent, Oswald Kgb Agent, Agent_of_kgb, By\u0142y Agent Kgb Opowiada, Kgb Agent Putin, Kgb Agent Poisoned, Kgb Agent Polonium, Kgb Agent Pay, Kgb Agent Philippines, Kgb Special Agent Philippines Salary, Kgb Agent With Frightening Psychic Abilities, Putin Kgb Agent Reagan, Palme Kgb Agent, Prodi Kgb Agent, Kgb Agent Ranks, Kgb Agent Record Of Alien Races, Kgb Agent Russia, Kgb Agent Requirements, Kgb Agent Radiation Poisoning, Kgb Agent Rudolf Abel, Soviet Agent Rudolf Abel, Putin Kgb Agent Reagan, Kgb Special Agent Review, Russian Kgb Agent Alexander Litvinenko, Kgb Agent Salary, Kgb Agent Subversion, Kgb Special Agent, Kgb Special Agent Salary, Kgb Special Agent Training, Kgb Special Agent Philippines, Kgb Sleeper Agent, Kgb Special Agent Review, Kgb Secret Agent, Kgb Special Agent Philippines Salary, Kgb Agent Training, Kgb Agent Tells You What The Illusion Is, Kgb Agent Test, Kgb Agent Tv Show, Kgb Special Agent Training, Kgb Secret Agent Test, Kgb Agents In The Us, Top Kgb Agent, Kgb Agent Uniform, Kgb Agent Usa, Kgb Undercover Agents, Kgb Agent Vladimir Putin, Kgb Agent Vergiftet, Kgb Agent In Vancouver, Vostok Kgb Agent Automatic, Vostok Kgb Agent Automatic Watch, Kgb Agent Wiki, Kgb Agent With Frightening Psychic Abilities, Kgb Agent Weapons, Kgb Agent Watches, Kgb Agent Warns, Kgb Agents Who Defected, Kgb Woman Agent, Soviet Agent Winter Soldier, Soyuz Kgb Agent Watches, Kgb Agent Tells You What The Illusion Is, Kgb Agent Yuri Bezmenov, Kgb Agent Youtube, Kgb Agent Tells You What The Illusion Is, Ex Kgb Agent Yuri, Ex Kgb Agent Youtube, Yuri Kgb Agent, Youngest Kgb Agent, Putin Wife,Putin News,Putin Net Worth,Putin Height,Putin Bay,Putin Memes,Putin Trump,Putin On The Ritz,Putin Age,Putin Trump Meeting,Putin And Trump,Putin Age,Putin And Trump Meeting,Putin Approval Rating,Putin And Obama,Putin Ally Crossword,Putin Assad,Putin And North Korea,Putin And Reagan,Putin As A Child,Putin Bay,Putin Bear,Putin Birthday,Putin Biography,Putin Bay Hotels,Putin Badass,Putin Bay Weather,Putin Blueberry Hill,Putin Bay Ferry,Putin Black Belt,Putin Children,Putin Calendar,Putin Clown,Putin Cartoon,Putin Chechnya,Putin Crying,Putin Canada,Putin Crimea,Putin Corruption,Putin Clinton,Putin Daughters,Putin Dog,Putin Documentary,Putin Dead,Putin Dog Merkel,Putin Definition,Putin Dancing,Putin Dolphins,Putin Drawing,Putin Dancing Gif,Putin Election,Putin Eating Popcorn,Putin English,Putin Election Results,Putin Erdogan,Putin Education,Putin Economy,Putin Eyes,Putin Exxon Deal,Putin Eye Color,Putin Family,Putin Food,Putin Funny,Putin Face,Putin Facts,Putin French,Putin Fishing,Poutine Fries,Putin Fascist,Putin Funny Face,Putin Gif,Putin Genocide,Putin Global Warming,Putin Gymnast,Putin Wife,Putin Gun,Putin Glasses,Putin Gangster,Putin Government,Putin Gorbachev,Putin Height,Putin Horse,Putin House,Putin Horseback,Putin Hockey,Putin History,Putin Hunting,Putin Hillary,Putin Human Rights,Putin Home,Putin Interview,Putin Images,Putin Israel,Putin Iq,Putin Isis,Putin In French,Putin Island,Putin Inauguration,Putin In Power,Putin Instagram,Putin Judo,Putin Jill Stein,Putin Journalists,Putin John Oliver,Putin Jehovah,Putin Jw,Putin Judo Gif,Putin Jesus,Putin James Bond,Putin Jehovah Witness,Putin Kgb,Putin Korea,Putin Karate,Putin Kremlin,Putin Kleptocracy,Putin Kim Jong Un,Putin Kraft Ring,Putin Kabaeva,Putin Khuilo,Putin Kid,Putin Laughing,Putin Laughing Gif,Putin Le Pen,Putin Languages,Putin Latest News,Putin Loves Trump,Putin Lollipop,Putin Likes Trump,Putin Limo,Putin Leadership,Putin Memes,Putin Merkel Dog,Putin Married,Putin Merkel,Putin Makeup,Putin Mask,Putin Martial Arts,Putin Meaning,Putin Macron,Putin Mansion,Putin News,Putin Net Worth,Putin North Korea,Putin New Wife,Putin Netanyahu,Putin Nato,Putin Net Worth Wiki,Putin Name Meaning,Putin Nickname,Putin Nuclear War,Putin On The Ritz,Putin On A Horse,Putin On Trump,Putin On North Korea,Putin Obama,Putin On The Ritz Gif,Putin On Syria,Putin Opposition,Putin On Snl,Putin On The Ritz Meme,Putin President,Putin Piano,Putin Palace,Putin Political Party,Putin Picture,Putin Poison,Putin Propaganda,Putin Puns,Putin Pop Song,Putin Popularity,Putin Quotes,Putin Quotes On Obama,Putin Queen Elizabeth,Putin Quotes Funny,Putin Quizlet,Putin Queen Elizabeth Stairs,Putin Quotes On Trump,Putin Quora,Putin Quote Immigrants,Putin Quebec,Putin Russia,Putin Reagan,Putin Riding Trump,Putin Rise To Power,Putin Reelection,Putin Richest Man In The World,Putin Riding A Ritz Cracker,Putin Response,Putin Ritz,Putin Rainbow,Putin Snl,Putin Syria,Putin Song,Putin Smiling,Putin Speech,Putin Shirt,Putin Speaking English,Putin Singing,Putin Salary,Putin Super Bowl Ring,Putin Trump,Putin Trump Meeting,Putin Twitter,Putin Trump Meme,Putin Trump Horse,Putin Trump Kiss,Putin Term Limit,Putin Trump Gif,Putin Term,Putin Today,Putin Ukraine,Putin Ussr,Putin Us Visit,Putin Unicorn,Putin Us Elections,Putin Un,Putin Undercover,Putin Urban Dictionary,Putin United Nations,Putin Us Relations,Putin Vs Trump,Putin Vs Obama,Putin Vladimir,Putin Video,Putin Vodka,Putin Vs Stalin,Putin Visits Trump,Putin Visit To White House,Putin Vampire,Putin Vs Obama Meme,Putin Wife,Putin Wiki,Putin Wealth,Putin Wink,Putin War,Putin Ww3,Putin Watch,Putin Winking Gif,Putin With Animals,Putin Walking,Putin Xi Jinping,Putin X Obama,Putin X Reader,Putin Xi,Putin And Trump,Putin And Obama,Putin And Assad,Putin And North Korea,Putin And Reagan,Putin And The Ritz,Putin Young,Putin Youtube,Putin Yacht,Putin Youth,Putin Yeltsin,Putin Yume,Putin Years As President,Putin Young Pictures,Putin Youth Army,Putin Yarmulke,Putin Zodiac Sign,Putin Zakaria,Putin Zassal,Putin Zassal Lyrics,Putin Zero Hedge,Putin Zeman,Putin Zil Limousine,Putin Zuma,Putin Za Makedonija,Putin Zapretio Albancima,
Become a Patron! True Information is the most valuable resource and we ask you to give back.
Goldman, Morgenstern und Partner, Gomopa Gmbh, Gomopa Crime, Gomopa Wikipedia, Gomopa Erpressung, Gomopa Wirecard, Gomopa Berlin, Gomopa Ndr, Gomopa Die Zeit, Gomopa S&k, Gomopa Control Inc, Gomopa Autark, Gomopa Ard, Gomopa Account, Gomopa Alexander Stephan, Gomopa Ascent, Anti Gomopa, Gomopa Ogi Ag, Eev Ag Gomopa, Die Akte Gomopa, Gomopacrime, Gomopa Control Inc, Gomopa Cosma, Gomopa Creditsafe, Gomopa Captura, Gomopa Care Energy, Gomopa Curatio, Gomopa Consortis, Gomopa Carsten Simon, Gomopa Die Zeit, Gomopa Diebewertung, Gamepad Dolphin, Gomopa Deutschland, Gomopa Dr. Schulte, Gomopa Erfahrungen, Gomopa Erpressung, Gomopa Eev, Gomopa Eci, Gomopa Elbfonds, Gomopa Erfahrungsbericht, Gomopa Care Energy, Gomopa Facebook, Gomopa Forum, Gomopa Finanznachrichtendienst, Gomopa Fonds Finanz, Gomopa Fuchsgruber, Gomopa Fidentum, Gomopa Faz, Gomopa Foren, Gomopa Gmbh, Gomopa Gmbh Berlin, Gomopa Gmbh Hamburg, Gomopa Hamburg, Gomopa Haz, Gomopa Handelsregister, Gomopa Mega Holdings, Handelsblatt Gomopa, Gomopa Gmbh Hamburg, Gomopa Von Holst, Gomopa Invensys, Gomopa Insolvent, Gomopa Impressum, Gomopa Control Inc, Was Ist Gomopa, Gomopa Junginger, Gomopa Juwi, Gomopa Kreditkarte, Gomopa Klaus Maurischat, Gomopa Kritik, Gomopa Lopoca, Gomopa Login, Thomas Lloyd Gomopa, Gomopa Mastercard, Gomopa Maurischat, Gomopa Mega Holdings, Gomopa Massat, Gomopa Mafia, Gomopa Klaus Maurischat, Mega Holdings Gomopa, Frank Maiwald Gomopa, Erfahrungen Mit Gomopa, Gomopa Net, Gomopa Ndr, Gomopa Net Warnliste, Gomopa News, Gomopa Nachrichten, Gomopa New York, Gomopa Net Pressemitteilung, Gomopa Net Finanzforum, Gomopa Offline, Gomopa Ogi Ag, Gomopa Opfer, Onecoin Gomopa, Gomopa Zeit Online, Michael Oehme Gomopa, Gomopa Pressemitteilungen, Gomopa Pim, Gomopa Pleite, Gomopa Pro Ventus, Gomopa Profi User, Gomopa Probleme, Gomopa Patio, Gomopa Publity, Pulch Gomopa, Gomopa Net Pressemitteilung, Gomopa Queensgold, Gomopa Resch, Gomopa Relom, Gomopa Rwb, Renew Gomopa Profi User, Peter Reski Gomopa, Gomopa Tagesschau, Gomopa Twitter, Gomopa Verklagen, Gomopa Vnr, Gomopa Volz, Gomopa Von Holst, Klaus Maurischat, Klaus Maurischat Gomopa, Klaus Dieter Maurischat, Klaus Maurischat Stasi, Klaus Maurischat Facebook, Klaus Maurischat Berlin, Klaus Maurischat Verden, Klaus Maurischat Mark Vornkahl, Klaus Maurischat Berlin, Klaus Dieter Maurischat, Klaus Maurischat Facebook, Klaus Maurischat Gomopa, Klaus Maurischat Mark Vornkahl, Klaus Maurischat Stasi, Klaus Maurischat Verden, Klaus Maurischat Mark Vornkahl, Gregor Schulmeister, ehrenfried stelzer, Klaus Maurischat, Klaus-Dieter Maurischat,Peter Ehlers, Gerd Bennewirtz, Wolfgang Zimmermann, Johann Sternberg, Sven Schmidt, Frank Maiwald, Aline Kleinwaechter, Mark Vornkahl, Gomopa Verbrecher, Gomopa Pro Ventus, Mark Vornkahl Gomopa, Gomopa Warnliste, Gomopa Wikipedia, Gomopa Wirecard, Gomopa Wellstar, Gomopa Wiki, Gomopa Net Warnliste, Robert Wallis Gomopa, Www.gomopa.net Forum, Wallis Gomopa, Andreas Wohlers Gomopa, Gomopa New York, Gomopa Zapp, Gomopa Zeit, Gomopa Zeit Online, Gomopa Die Zeit, Klaus Maurischat, Klaus Maurischat Gomopa, Klaus Dieter Maurischat, Klaus Maurischat Stasi, Klaus Maurischat Facebook, Klaus Maurischat Berlin, Klaus Maurischat Verden, Klaus Maurischat Mark Vornkahl, Klaus Maurischat Berlin, Klaus Dieter Maurischat, Klaus Maurischat Facebook, Klaus Maurischat Gomopa, Klaus Maurischat Mark Vornkahl, Klaus Maurischat Stasi, Klaus Maurischat Verden, Klaus Maurischat Mark Vornkahl, Betrug In English, Betrug Englisch, Betrug Stgb, Betrug Schema, Betrug Meaning, Betrug Ebay Kleinanzeigen, Betrug Definition, Betrug Duden, Betrug Synonym, Betrug Melden, Betrug Auf Englisch, Betrug Airbnb, Betrug Anzeigen, Betrug Antragsdelikt, Betrug Amazon, Betrug Autokauf, Betrug Aufbau, Betrug Auf Ebay Kleinanzeigen, Betrug Autoverkauf, Betrug Anzeige, Betrug Bgb, Betrug Bei Ebay, Betrug Bei Ebay Kleinanzeigen, Betrug Beim Autokauf, Betrug Beim Autoverkauf, Betrug Bei Amazon, Betrug Bei Paypal, Betrug Bei Ebay Kleinanzeigen Was Tun, Betrug Bei Kleiderkreisel, Betrug Bei Ebay Melden, Betrug Curling, Betrug Definition, Betrug Duden, Betrug Dict, Betrug Durch Unterlassen, Betrug Durch Unterlassen Schema, Betrug Dsds 2015, Betrug Diebstahl, Betrug Durch Unterlassen Fall, Betrug Deutschland, Betrug Dsds, Betrug English, Betrug Englisch, Betrug Ebay Kleinanzeigen, Betrug Ebay, Betrug Gesetz, Betrug Geringwertig, Betrug Gewinnspiel, Betrug Haftstrafe, Betrug Hausarbeit, Betrug Hartz 4, Betrug Handyvertrag, Betrug Hauskauf, Betrug Heinrich, Betrug Handynummer, Betrug Handwerker, Betrug In English, Betrug Im Internet, Betrug Im Weissen Kittel, Betrug In Englisch, Betrug Immobilienscout, Betrug In Der Ehe, Betrug Im Internet Was Tun, Betrug Immobilienscout24, Betrug Jura, Betrug Jobcenter, Betrug Juristisch, Betrug Jusline, Betrug Juristische Person, Betrug Ja Sagen, Betrug Juraschema, Betrug Juracademy, Betrug Jura Online, Betrug Juris, Betrug Kleinanzeigen, Betrug Kreditkarte, Betrug Kleiderkreisel, Betrug Krankenkasse, Betrug Latein, Betrug Liebe, Betrug Leoni, Betrug Lebensversicherung, Betrug Lotto, Betrug Lastschrift, Betrug Meaning, Betrug Melden, Betrug Mit Paypal, Betrug Mehrzahl, Betrug Microsoft Anruf, Betrug Mit Western Union, Betrug Mobile.de, Betrug Mit Handynummer, Betrug Mit Whatsapp, Betrug Mit Paysafecard, Betrug Nachweisen, Betrug Nummer, Betrug Nebenkostenabrechnung Strafanzeige, Betrug Nigeria, Betrug Nach Stgb, Betrug Nebenkostenabrechnung, Betrug Nachsendeauftrag, Betrug Ne Demek, Betrug Nebenklage, Betrugsnummer Melden, Betrug Online Melden, Betrug Online, Betrug Onecoin, Betrug Obersatz, Betrug Ohne Schaden, Betrug Ohne Vorsatz, Betrug Online Banking, Betrug Objektiver Tatbestand, Betrug Oder Unterschlagung, Betrug Online Casino, Betrug Plural, Betrug Paypal Kleinanzeigen, Betrug Paypal, Betrug Quoka, Betrug Qualifikation, Betrug Quoka Polizei, Betrug Quizduell, Betrug Qualifikationen, Betrug Quotes, Betrug Quizsendung Schweiz, Betrug Questico, Betrug Quotenschaden, Betrug Quizsendung, Betrug Rentenversicherung, Betrug Russisch, Betrug Ris, Betrug Russische Frauen, Betrug Rechtsanwalt, Betrug Reisekostenabrechnung, Betrug Stgb, Betrug Schema, Betrug Synonym, Betrug Strafe, Betrug Schweiz, Betrug Strafantrag, Betrug Stoffgleichheit, Betrug Tatbestand, Betrug Translation, Betrug Traumdeutung, Betrug Tatbestandsmerkmale, Betrug Thermomix, Betrug Telekom Rechnung, Betrug Telekom, Betrug Tatbestandsvoraussetzungen, Betrug Trotz Paypal, Betrug Teppichreinigung, Betrug Unterschlagung, Betrug Vorsatz, Betrug Verzeihen, Betrug Wucher, Betrug Wiki, Betrug Willhaben, Betrug Was Tun, Betrug Whatsapp, Betrug Western Union, Betrug Wieder Gut Machen, Betrug Web.de, Betrug Wohnwagen Verkauf, Betrug Warenbestellung, Xtrasize Betrug, Xing Betrug, Sgb Xii Betrug, Fg Xpress Betrug, Garten Xxl Betrug, Xango Betrug, Xmile Betrug, Xcite Betrug, Xtb Betrug, Xbox Betrug, Betrug Yourfone, Betrug Youtube, Betrug Yahoo, Yotta Betrug, Yelp Betrug, Yoox Betrug, Youtradefx Betrug, Youtailor Betrug, Yokebe Betrug, Yoga Betrug, Betrug Zitate, Betrug Zermatt, Betrug Zweckverfehlung, Betrug Zum Nachteil Von Versicherungen, Betrug Zjs, Betrug Zum Nachteil, Betrug Zugunsten Dritter, Betrug Zahnarzt, Betrug Zweifel Irrtum, Betrug Zahnarzt Dessau, Cybercrime Definition, Cybercrime Statistics, Cybercrime Prevention, Cybercrime Articles, Cybercrime Jobs, Cybercrime Law, Cybercrime Statistics 2017, Cyber Crime Cases, Cyber Crime News, Cybercrime Topics, Cybercrime Articles, Cybercrime And Security, Cybercrime As A Service, Cybercrime And Digital Forensics An Introduction, Cybercrime And Digital Forensics, Cybercrime And Society, Cybercrime And Terrorism, Cybercrime Attacks, Cybercrime Act, Cybercrime Against Businesses, Cyber Crime Batman, Cyber Crime Book, Cybercrime Blog, Cybercrime Bill, Cybercrime Banks, Cybercrime Background, Cyber Crime By Country, Cybercrime Bangalore, Cybercrime Billion Dollar Industry, Cybercrime Background Information, Cyber Crime Cases, Cybercrime Certification, Cybercrime Convention, Cybercrime Careers, Cybercrime Cost, Cybercrime Cafe, Cybercrime Cost 2016, Cybercrime China, Cybercrime Conference, Cybercrime Conclusion, Cybercrime Definition, Cybercrime Definition Computer, Cybercrime Definition Fbi, Cyber Crime Data, Cybercrime Degrees, Cybercrime Definition Pdf, Cybercrime Database, Cyber Crime Detective, Cyber Crime Documentary, Cyber Crime Department, Cybercrime Example, Cyber Crime Essay, Cybercrime Effects, Cybercrime Events, Cybercrime Enforcement, Cybercrime Economy, Cyber Crime Ethics, Cybercrime Effects On Business, Cybercrime Ecosystem, Cybercrime Enforcement Training Assistance Act, Cybercrime Facts, Cybercrime Fbi, Cybercrime Forensics, Cybercrime Forum, Cybercrime Forensics Training Center, Cybercrime Federal Laws, Cyber Crime Fiction, Cybercrime Financial Services, Cybercrime Future Trends, Cybercrime Fiji, Cybercrime Gets Personal Money Magazine, Cybercrime Gets Personal, Cybercrime Growth, Cyber Crime Graph, Cybercrime Groups, Cybercrime Government, Cybercrime Global Statistics, Cyber Crime Gov, Cyber Crime Games, Cybercrime Gif, Cybercrime Hacking, Cyber Crime History, Cybercrime Help, Cybercrime Healthcare, Cybercrime Hyderabad, Cybercrime How To Report, Cyber Crime Hotline, Cybercrime Hacking News, Cyber Crime Head Office India, Cybercrime Hacking And Cracking, Cybercrime Identity Theft, Cybercrime In The Us, Cyber Crime Investigation, Cybercrime Images, Cyber Crime Insurance, Cybercrime Is Also Known As, Cybercrime Investigating High-technology Computer Crime, Cybercrime Infographic, Cybercrime Information, Cyber Crime In Russia, Cybercrime Jobs, Cybercrime Jurisdiction, Cybercrime Journal Articles, Cybercrime Job Description, Cybercrime Jobs Salary, Cybercrime Job Openings, Cybercrime Jobs In Chennai, Cybercrime Job Qualification, Cybercrime Journal Articles Pdf, Cyber Crime Jamaica, Cybercrime Kenya, Cybercrime Key Issues And Debates, Cybercrime Kuwait, Cybercrime Ki Dhara, Cybercrime Key Issues And Debates Pdf, Cybercrime Kasus, Cyber Crime Karnataka, Cybercrime Kartu Kredit, Cybercrime Kolkata, Cyber Crime Karachi, Cybercrime Law, Cybercrime Laws In Usa, Cybercrime Law Enforcement, Cybercrime Laws Of The United States, Cybercrime List, Cybercrime Legislation Us, Cybercrime Laws In Florida, Cybercrime Legal Issues, Cybercrime Law Outline, Cyber Crime Lesson Plans, Cybercrime Meaning, Cyber Crime Movies, Cybercrime Methods, Cybercrime Methodology, Cyber Crime Money, Cybercrime Markets, Cyber Crime Magazine, Cyber Crime Most Wanted, Cybercrime Meaning In Tamil, Cybercrime Masters Degree, Cyber Crime News, Cyber Crime News Articles, Cyber Crime News Articles 2017, Cyber Crime Netflix, Cybercrime Nigeria, Cyber Crime Novels, Cybercrime Number, Cybercrime Nhs, Cyber Crime News Philippines, Cybercrime Nbi, Cybercrime Or Cyber Crime, Cybercrime Organizations, Cybercrime On The Rise, Cybercrime On The High Seas, Cybercrime Offenses, Cyber Crime Outline, Cybercrime Office, Cybercrime Office In Ahmedabad, Cybercrime Office In Patna, Cybercrime Office In Nashik, Cybercrime Quotes, Cyber Crime Quizlet, Cybercrime Questions, Cyber Crime Quiz, Cybercrime Questionnaire, Cybercrime Question Paper, Cybercrime Qatar, Cybercrime Question And Answers, Cybercrime Report, Cybercrime Research Paper, Cyber Crime Rates, Cyber Crime Recent, Cybercrime Research Topics, Cybercrime Research, Cybercrime Reported To The Ic3, Cybercrime Resources, Cybercrime Riding Tax Season Tides, Cyber Crime Report 2016, Cybercrime Statistics, Cybercrime Statistics 2017, Cyber Crime Stories, Cybercrime Spyware, Cybercrime Statistics 2015, Cybercrime Security, Cybercrime Solutions, Cybercrime Salary, Cybercrime Small Business, Cyber Crime Synonym, Cybercrime Topics, Cybercrime Trends, Cybercrime Tracker, Cybercrime Treaty, Cyber Crime Types, Cybercrime Training, Cybercrime Threats, Cybercrime Tools, Cybercrime Terms, Cybercrime The Transformation Of Crime In The Information Age, Cyber Crime Unit, Cybercrime Us, Cybercrime Uk, Cybercrime Uae, Cybercrime University, Cybercrime Un, Cyber Crime Unit Mauritius, Cyber Crime Unit Malta, Cybercrime Uc, Cybercrime Unodc, Cybercrime Victims, Cybercrime Vs Traditional Crime, Cybercrime Videos, Cybercrime Vs Traditional Crime Statistics, Cybercrime Virus, Cyber Crime Vocabulary, Cybercrime Vs Traditional Crime Punishment, Cybercrime Vs Computer Crime, Cybercrime Vs Cyber Warfare, Cybercrime Vs Cyber Espionage, Cybercrime Wiki, Cybercrime Worm, Cybercrime World Wide War 3.0, Cyber Crime Websites, Cyber Crime Worksheet, Cybercrime Wallpaper, Cyber Crime Worldwide, Cybercrime Working Group, Cyber Crime What Is It, Cybercrime Wikipedia Indonesia, Cybercrime X-remote Download, Tedx Cybercrime, Cyber Crime Youtube, Cyber Crime Yahoo, Cyber Crime Yahoo Answers, Cyber Crime Yesterday, Cyber Crime Youth, Cybercrime Yang Menyerang Hak Cipta, Cybercrime Yar, Youth Cyber Crime, Cyber Crime Yogyakarta, Cybercrime Yang Menyerang Pemerintah, Cybercrime Zimbabwe, Cybercrime Zeus, Cybercrime Zimbra, Zurich Cyber Crime, Zimbabwe Cybercrime Bill, Cyber Crime In Zambia, New Zealand Cyber Crime, Los Zetas Cybercrime, Cybercrime Law In Zambia, Cyber Crime Cases In Zambia, Erpressung Englisch, Erpressung English, Erpressung Stgb, Erpressung Auf Englisch, Erpressung Schema, Erpressung Definition, Erpressung Synonym, Erpressung Schumacher, Erpressung Von Haus Stelleris, Erpressung Auf Englisch, Erpressung Am Arbeitsplatz, Erpressung Aufbau, Erpressung Anzeigen, Erpressung Anzeige, Erpressung Anzeige Erstatten, Erpressung Bedeutung, Erpressung Borussia Dortmund, Erpressung Bgb, Erpressung Bvb, Erpressung Bei Kindern, Erpressung Bilder, Erpressung Bibel, Erpressung Beziehung, Erpressung Bei Facebook, Erpressung Beispiel, Erpressung Corinna Schumacher, Erpressung Corinna, Erpressung Club Globe, Erpressung Ch, Erpressung Carstensen, Erpressung Chef, Erpressung Chantage, Erpressung Chat, Erpressung Computer, Erpressung Cz, Erpressung Definition, Erpressung Duden, Erpressung Dict, Erpressung Durch Arbeitgeber, Erpressung Durch Skype Video, Erpressung Drohung Mit Strafanzeige, Erpressung Drohung Mit Anzeige, Erpressung Durch Unterlassen, Erpressung Deutschland, Erpressung Durch Rechtsanwalt, Erpressung Englisch, Erpressung English, Erpressung Gesetz, Erpressung Geld Oder Anzeige, Erpressung Geld, Erpressung Geschichte, Erpressung Gewalt, Erpressung Gut Aiderbichl, Erpressung Grundschule, Erpressung Geldstrafe, Erpressung Griechenland, Erpressung Hitchcock, Erpressung Heinrich, Erpressung Haftstrafe, Erpressung Hacker, Erpressung Haus Stelleris, Erpressung Hausarbeit, Erpressung Hells Angels, Erpressung Hsv, Erpressung In English, Erpressung In Englisch, Erpressung Im Internet, Erpressung In Der Beziehung, Erpressung In Der Schule, Erpressung Internet, Erpressung Im Internet Was Tun, Erpressung Italienisch, Erpressung In Der Ehe, Erpressung In Beziehung, Erpressung Jura, Erpressung Jura Individuell, Erpressung Jugendstrafe, Erpressung Jusline, Erpressung Juraschema, Erpressung Juristisch, Erpressung Juristische Definition, Erpressung Juristische Person, Erpressung Jugendamt, Erpressung Jva, Erpressung Kinder, Erpressung Lidl, Erpressung Leo, Erpressung Latein, Erpressung Lebensmittel, Erpressung Lebensmittelhersteller, Erpressung Mit Bildern, Erpressung Mit Fotos, Erpressung Mit Video, Erpressung Mit Anzeige, Erpressung Michael Schumacher, Erpressung Mindeststrafe, Erpressung Mit Schlechter Bewertung, Erpressung Mit Strafanzeige, Erpressung Mit Youtube Video, Erpressung Mit Todesfolge, Erpressung Offizialdelikt, Erpressung Online, Erpressung Polnisch, Erpressung Polizei, Erpressung Quandt-erbin, Erpressung Quant, Erpressung Qualifikation, Quand Erpressung, Erpressung Stgb, Erpressung Schema, Erpressung Synonym, Erpressung Schumacher, Erpressung Schweiz, Erpressung Strafrecht, Erpressung Stgb Schema, Erpressung Unter Kindern, Erpressung Von Haus Stelleris, Erpressung Von Apple, Erpressung Von Haus Stelleris Weltquest, Erpressung Von Haus Stellaris Wow, Erpressung Virus, Erpressung Vergehen Oder Verbrechen, Erpressung Verbrechen, Erpressung Wiki, Erpressung Whatsapp, Erpressung Wie Verhalten, Erpressung Was Ist Deine Familie Wert, Erpressung Youtube, Yelp Erpressung, Erpressung Mit Youtube Video, Erpressung Zitate, Erpressung Zur Falschaussage, Erpressung Zell Am See, Erpressung Zivilrechtlicher Anspruch, Erpressung Zjs, Erpressung Zu Sexuellen Handlungen, Erpressung Zivilrecht, Zeitarbeit Erpressung, Zeitungsartikel Erpressung, Rufmord English, Rufmord Auf Englisch, Rufmord Schweiz, Rufmord Gesetz, Rufmord Strafe, Rufmord Stgb, Rufmord Anzeige, Rufmord Bedeutung, Rufmord Auf Englisch, Rufmord Anzeige, Rufmord Am Arbeitsplatz, Rufmord Bedeutung, Rufmord Bgb, Rufmord Band, Rufmord Bei Facebook, Rufmord Beispiele, Rufmord Begehen, Rufmord Bestrafung, Rufmord Bei Wahrheit, Rufmord Beweisen, Rufmord Bei Der Arbeit, Rufmord Chef, Rufmord Im Internet Christian Scherg, Major Crimes Rufmord, Cybermobbing Rufmord, Rufmord Durch Chef, Notruf California Rufmord, Rufmord Definition, Rufmord Duden, Rufmord Dict, Rufmord Durch Presse, Rufmord Durch Kollegen, Rufmord Durch Arbeitgeber, Rufmord Durch Vermieter, Rufmord Die Drei Fragezeichen, Rufmord Durch Polizei, Rufmord Dejure, Rufmord English, Rufmord Englisch, Rufmord Film, Rufmord Facebook Strafe, Rufmord Firma, Rufmord Gesetz, Rufmord Gerichtsurteile Paragrafen, Rufmord Gesetz Deutschland, Rufmord Geldstrafe, Rufmord Gesetzestext, Rufmord Hassel, Rufmord Hilfe, Rufmord Helmut G, Rufmord Haftstrafe, Rufmord Hip Hop, Rufmord In English, Rufmord Im Internet, Rufmord In Der Familie, Rufmord Im Internet Strafe, Rufmord Internet, Rufmord Im Internet Was Tun, Rufmord Im Internet 37 Grad, Rufmord In Der Schule, Rufmord In Facebook, Rufmord Im Netz, Rufmord Juristisch, Rufmord Jenseits Der Moral, Rufmord Jenseits Der Moral Stream, Rufmord Jenseits Der Moral Trailer, Rufmord Jusline, Rufmord Jura, Rufmord Klage, Rufmord Kroatisch, Rufmord Konsequenzen, Rufmord Klage Gericht, Rufmord Lehrer, Rufmord Luxemburg, Rufmord Mobbing, Rufmord Mitarbeiter, Rufmord Medicopter 117, Rufmord Menschen Hautnah, Rufmord Medien, Rufmord Musik, Rufmord Mit Todesfolge, Rufmord Machen, Rufmord Melden, Rufmord Metin2, Rufmord Nachbarn, Rufmord Oder Verleumdung, Rufmord Ohne Namen, Rufmord Ohne Beweise, Rufmord Opfer, Rufmord Online, Rufmord Band Oberberg, Rufmord Polizei, Rufmord Paragraph, Rufmord Privat, Rufmord Rapper, Rufmord Schweiz, Rufmord Strafe, Rufmord Stgb, Rufmord Strafbar, Rufmord Schadensersatz, Rufmord Tatbestand, Rufmord Und Verleumdung, Rufmord Unternehmen, Rufmord Verleumdung, Rufmord Was Tun, Rufmord Wiki, Rufmord Welche Strafe, Rufmord Wie Vorgehen, Rufmord Wenn Stimmt, Rufmord Was Dagegen Tun, Rufmord Wdr, Rufmord Was Kann Man Tun, Rufmord Welcher Anwalt, Rufmord Wahrheit, Youtube Rufmord Im Internet, Rufmord Youtube, Rufmord Zitate, Rufmord Zeitung, Rufmord Zgb, Rufmord Zivilrecht, Rufmord Zur Anzeige Bringen, Rufmord Bild Zeitung, Rufmord Durch Zeitung, Rufmord Im Internet ZDF, Goldman, Morgenstern und Partner, Gomopa Gmbh, Gomopa Crime, Gomopa Wikipedia, Gomopa Erpressung, Gomopa Wirecard, Gomopa Berlin, Gomopa Ndr, Gomopa Die Zeit, Gomopa S&k, Gomopa Control Inc, Gomopa Autark, Gomopa Ard, Gomopa Account, Gomopa Alexander Stephan, Gomopa Ascent, Anti Gomopa, Gomopa Ogi Ag, Eev Ag Gomopa, Die Akte Gomopa, Gomopacrime, Gomopa Control Inc, Gomopa Cosma, Gomopa Creditsafe, Gomopa Captura, Gomopa Care Energy, Gomopa Curatio, Gomopa Consortis, Gomopa Carsten Simon, Gomopa Die Zeit, Gomopa Diebewertung, Gamepad Dolphin, Gomopa Deutschland, Gomopa Dr. Schulte, Gomopa Erfahrungen, Gomopa Erpressung, Gomopa Eev, Gomopa Eci, Gomopa Elbfonds, Gomopa Erfahrungsbericht, Gomopa Care Energy, Gomopa Facebook, Gomopa Forum, Gomopa Finanznachrichtendienst, Gomopa Fonds Finanz, Gomopa Fuchsgruber, Gomopa Fidentum, Gomopa Faz, Gomopa Foren, Gomopa Gmbh, Gomopa Gmbh Berlin, Gomopa Gmbh Hamburg, Gomopa Hamburg, Gomopa Haz, Gomopa Handelsregister, Gomopa Mega Holdings, Handelsblatt Gomopa, Gomopa Gmbh Hamburg, Gomopa Von Holst, Gomopa Invensys, Gomopa Insolvent, Gomopa Impressum, Gomopa Control Inc, Was Ist Gomopa, Gomopa Junginger, Gomopa Juwi, Gomopa Kreditkarte, Gomopa Klaus Maurischat, Gomopa Kritik, Gomopa Lopoca, Gomopa Login, Thomas Lloyd Gomopa, Gomopa Mastercard, Gomopa Maurischat, Gomopa Mega Holdings, Gomopa Massat, Gomopa Mafia, Gomopa Klaus Maurischat, Mega Holdings Gomopa, Frank Maiwald Gomopa, Erfahrungen Mit Gomopa, Gomopa Net, Gomopa Ndr, Gomopa Net Warnliste, Gomopa News, Gomopa Nachrichten, Gomopa New York, Gomopa Net Pressemitteilung, Gomopa Net Finanzforum, Gomopa Offline, Gomopa Ogi Ag, Gomopa Opfer, Onecoin Gomopa, Gomopa Zeit Online, Michael Oehme Gomopa, Gomopa Pressemitteilungen, Gomopa Pim, Gomopa Pleite, Gomopa Pro Ventus, Gomopa Profi User, Gomopa Probleme, Gomopa Patio, Gomopa Publity, Pulch Gomopa, Gomopa Net Pressemitteilung, Gomopa Queensgold, Gomopa Resch, Gomopa Relom, Gomopa Rwb, Renew Gomopa Profi User, Peter Reski Gomopa, Gomopa Tagesschau, Gomopa Twitter, Gomopa Verklagen, Gomopa Vnr, Gomopa Volz, Gomopa Von Holst, Klaus Maurischat, Klaus Maurischat Gomopa, Klaus Dieter Maurischat, Klaus Maurischat Stasi, Klaus Maurischat Facebook, Klaus Maurischat Berlin, Klaus Maurischat Verden, Klaus Maurischat Mark Vornkahl, Klaus Maurischat Berlin, Klaus Dieter Maurischat, Klaus Maurischat Facebook, Klaus Maurischat Gomopa, Klaus Maurischat Mark Vornkahl, Klaus Maurischat Stasi, Klaus Maurischat Verden, Klaus Maurischat Mark Vornkahl, Gregor Schulmeister, ehrenfried stelzer, Klaus Maurischat, Klaus-Dieter Maurischat,Peter Ehlers, Gerd Bennewirtz, Wolfgang Zimmermann, Johann Sternberg, Sven Schmidt, Frank Maiwald, Aline Kleinwaechter, Mark Vornkahl, Gomopa Verbrecher, Gomopa Pro Ventus, Mark Vornkahl Gomopa, Gomopa Warnliste, Gomopa Wikipedia, Gomopa Wirecard, Gomopa Wellstar, Gomopa Wiki, Gomopa Net Warnliste, Robert Wallis Gomopa, Www.gomopa.net Forum, Wallis Gomopa, Andreas Wohlers Gomopa, Gomopa New York, Gomopa Zapp, Gomopa Zeit, Gomopa Zeit Online, Gomopa Die Zeit, Klaus Maurischat, Klaus Maurischat Gomopa, Klaus Dieter Maurischat, Klaus Maurischat Stasi, Klaus Maurischat Facebook, Klaus Maurischat Berlin, Klaus Maurischat Verden, Klaus Maurischat Mark Vornkahl, Klaus Maurischat Berlin, Klaus Dieter Maurischat, Klaus Maurischat Facebook, Klaus Maurischat Gomopa, Klaus Maurischat Mark Vornkahl, Klaus Maurischat Stasi, Klaus Maurischat Verden, Klaus Maurischat Mark Vornkahl, Betrug In English, Betrug Englisch, Betrug Stgb, Betrug Schema, Betrug Meaning, Betrug Ebay Kleinanzeigen, Betrug Definition, Betrug Duden, Betrug Synonym, Betrug Melden, Betrug Auf Englisch, Betrug Airbnb, Betrug Anzeigen, Betrug Antragsdelikt, Betrug Amazon, Betrug Autokauf, Betrug Aufbau, Betrug Auf Ebay Kleinanzeigen, Betrug Autoverkauf, Betrug Anzeige, Betrug Bgb, Betrug Bei Ebay, Betrug Bei Ebay Kleinanzeigen, Betrug Beim Autokauf, Betrug Beim Autoverkauf, Betrug Bei Amazon, Betrug Bei Paypal, Betrug Bei Ebay Kleinanzeigen Was Tun, Betrug Bei Kleiderkreisel, Betrug Bei Ebay Melden, Betrug Curling, Betrug Definition, Betrug Duden, Betrug Dict, Betrug Durch Unterlassen, Betrug Durch Unterlassen Schema, Betrug Dsds 2015, Betrug Diebstahl, Betrug Durch Unterlassen Fall, Betrug Deutschland, Betrug Dsds, Betrug English, Betrug Englisch, Betrug Ebay Kleinanzeigen, Betrug Ebay, Betrug Gesetz, Betrug Geringwertig, Betrug Gewinnspiel, Betrug Haftstrafe, Betrug Hausarbeit, Betrug Hartz 4, Betrug Handyvertrag, Betrug Hauskauf, Betrug Heinrich, Betrug Handynummer, Betrug Handwerker, Betrug In English, Betrug Im Internet, Betrug Im Weissen Kittel, Betrug In Englisch, Betrug Immobilienscout, Betrug In Der Ehe, Betrug Im Internet Was Tun, Betrug Immobilienscout24, Betrug Jura, Betrug Jobcenter, Betrug Juristisch, Betrug Jusline, Betrug Juristische Person, Betrug Ja Sagen, Betrug Juraschema, Betrug Juracademy, Betrug Jura Online, Betrug Juris, Betrug Kleinanzeigen, Betrug Kreditkarte, Betrug Kleiderkreisel, Betrug Krankenkasse, Betrug Latein, Betrug Liebe, Betrug Leoni, Betrug Lebensversicherung, Betrug Lotto, Betrug Lastschrift, Betrug Meaning, Betrug Melden, Betrug Mit Paypal, Betrug Mehrzahl, Betrug Microsoft Anruf, Betrug Mit Western Union, Betrug Mobile.de, Betrug Mit Handynummer, Betrug Mit Whatsapp, Betrug Mit Paysafecard, Betrug Nachweisen, Betrug Nummer, Betrug Nebenkostenabrechnung Strafanzeige, Betrug Nigeria, Betrug Nach Stgb, Betrug Nebenkostenabrechnung, Betrug Nachsendeauftrag, Betrug Ne Demek, Betrug Nebenklage, Betrugsnummer Melden, Betrug Online Melden, Betrug Online, Betrug Onecoin, Betrug Obersatz, Betrug Ohne Schaden, Betrug Ohne Vorsatz, Betrug Online Banking, Betrug Objektiver Tatbestand, Betrug Oder Unterschlagung, Betrug Online Casino, Betrug Plural, Betrug Paypal Kleinanzeigen, Betrug Paypal, Betrug Quoka, Betrug Qualifikation, Betrug Quoka Polizei, Betrug Quizduell, Betrug Qualifikationen, Betrug Quotes, Betrug Quizsendung Schweiz, Betrug Questico, Betrug Quotenschaden, Betrug Quizsendung, Betrug Rentenversicherung, Betrug Russisch, Betrug Ris, Betrug Russische Frauen, Betrug Rechtsanwalt, Betrug Reisekostenabrechnung, Betrug Stgb, Betrug Schema, Betrug Synonym, Betrug Strafe, Betrug Schweiz, Betrug Strafantrag, Betrug Stoffgleichheit, Betrug Tatbestand, Betrug Translation, Betrug Traumdeutung, Betrug Tatbestandsmerkmale, Betrug Thermomix, Betrug Telekom Rechnung, Betrug Telekom, Betrug Tatbestandsvoraussetzungen, Betrug Trotz Paypal, Betrug Teppichreinigung, Betrug Unterschlagung, Betrug Vorsatz, Betrug Verzeihen, Betrug Wucher, Betrug Wiki, Betrug Willhaben, Betrug Was Tun, Betrug Whatsapp, Betrug Western Union, Betrug Wieder Gut Machen, Betrug Web.de, Betrug Wohnwagen Verkauf, Betrug Warenbestellung, Xtrasize Betrug, Xing Betrug, Sgb Xii Betrug, Fg Xpress Betrug, Garten Xxl Betrug, Xango Betrug, Xmile Betrug, Xcite Betrug, Xtb Betrug, Xbox Betrug, Betrug Yourfone, Betrug Youtube, Betrug Yahoo, Yotta Betrug, Yelp Betrug, Yoox Betrug, Youtradefx Betrug, Youtailor Betrug, Yokebe Betrug, Yoga Betrug, Betrug Zitate, Betrug Zermatt, Betrug Zweckverfehlung, Betrug Zum Nachteil Von Versicherungen, Betrug Zjs, Betrug Zum Nachteil, Betrug Zugunsten Dritter, Betrug Zahnarzt, Betrug Zweifel Irrtum, Betrug Zahnarzt Dessau, Cybercrime Definition, Cybercrime Statistics, Cybercrime Prevention, Cybercrime Articles, Cybercrime Jobs, Cybercrime Law, Cybercrime Statistics 2017, Cyber Crime Cases, Cyber Crime News, Cybercrime Topics, Cybercrime Articles, Cybercrime And Security, Cybercrime As A Service, Cybercrime And Digital Forensics An Introduction, Cybercrime And Digital Forensics, Cybercrime And Society, Cybercrime And Terrorism, Cybercrime Attacks, Cybercrime Act, Cybercrime Against Businesses, Cyber Crime Batman, Cyber Crime Book, Cybercrime Blog, Cybercrime Bill, Cybercrime Banks, Cybercrime Background, Cyber Crime By Country, Cybercrime Bangalore, Cybercrime Billion Dollar Industry, Cybercrime Background Information, Cyber Crime Cases, Cybercrime Certification, Cybercrime Convention, Cybercrime Careers, Cybercrime Cost, Cybercrime Cafe, Cybercrime Cost 2016, Cybercrime China, Cybercrime Conference, Cybercrime Conclusion, Cybercrime Definition, Cybercrime Definition Computer, Cybercrime Definition Fbi, Cyber Crime Data, Cybercrime Degrees, Cybercrime Definition Pdf, Cybercrime Database, Cyber Crime Detective, Cyber Crime Documentary, Cyber Crime Department, Cybercrime Example, Cyber Crime Essay, Cybercrime Effects, Cybercrime Events, Cybercrime Enforcement, Cybercrime Economy, Cyber Crime Ethics, Cybercrime Effects On Business, Cybercrime Ecosystem, Cybercrime Enforcement Training Assistance Act, Cybercrime Facts, Cybercrime Fbi, Cybercrime Forensics, Cybercrime Forum, Cybercrime Forensics Training Center, Cybercrime Federal Laws, Cyber Crime Fiction, Cybercrime Financial Services, Cybercrime Future Trends, Cybercrime Fiji, Cybercrime Gets Personal Money Magazine, Cybercrime Gets Personal, Cybercrime Growth, Cyber Crime Graph, Cybercrime Groups, Cybercrime Government, Cybercrime Global Statistics, Cyber Crime Gov, Cyber Crime Games, Cybercrime Gif, Cybercrime Hacking, Cyber Crime History, Cybercrime Help, Cybercrime Healthcare, Cybercrime Hyderabad, Cybercrime How To Report, Cyber Crime Hotline, Cybercrime Hacking News, Cyber Crime Head Office India, Cybercrime Hacking And Cracking, Cybercrime Identity Theft, Cybercrime In The Us, Cyber Crime Investigation, Cybercrime Images, Cyber Crime Insurance, Cybercrime Is Also Known As, Cybercrime Investigating High-technology Computer Crime, Cybercrime Infographic, Cybercrime Information, Cyber Crime In Russia, Cybercrime Jobs, Cybercrime Jurisdiction, Cybercrime Journal Articles, Cybercrime Job Description, Cybercrime Jobs Salary, Cybercrime Job Openings, Cybercrime Jobs In Chennai, Cybercrime Job Qualification, Cybercrime Journal Articles Pdf, Cyber Crime Jamaica, Cybercrime Kenya, Cybercrime Key Issues And Debates, Cybercrime Kuwait, Cybercrime Ki Dhara, Cybercrime Key Issues And Debates Pdf, Cybercrime Kasus, Cyber Crime Karnataka, Cybercrime Kartu Kredit, Cybercrime Kolkata, Cyber Crime Karachi, Cybercrime Law, Cybercrime Laws In Usa, Cybercrime Law Enforcement, Cybercrime Laws Of The United States, Cybercrime List, Cybercrime Legislation Us, Cybercrime Laws In Florida, Cybercrime Legal Issues, Cybercrime Law Outline, Cyber Crime Lesson Plans, Cybercrime Meaning, Cyber Crime Movies, Cybercrime Methods, Cybercrime Methodology, Cyber Crime Money, Cybercrime Markets, Cyber Crime Magazine, Cyber Crime Most Wanted, Cybercrime Meaning In Tamil, Cybercrime Masters Degree, Cyber Crime News, Cyber Crime News Articles, Cyber Crime News Articles 2017, Cyber Crime Netflix, Cybercrime Nigeria, Cyber Crime Novels, Cybercrime Number, Cybercrime Nhs, Cyber Crime News Philippines, Cybercrime Nbi, Cybercrime Or Cyber Crime, Cybercrime Organizations, Cybercrime On The Rise, Cybercrime On The High Seas, Cybercrime Offenses, Cyber Crime Outline, Cybercrime Office, Cybercrime Office In Ahmedabad, Cybercrime Office In Patna, Cybercrime Office In Nashik, Cybercrime Quotes, Cyber Crime Quizlet, Cybercrime Questions, Cyber Crime Quiz, Cybercrime Questionnaire, Cybercrime Question Paper, Cybercrime Qatar, Cybercrime Question And Answers, Cybercrime Report, Cybercrime Research Paper, Cyber Crime Rates, Cyber Crime Recent, Cybercrime Research Topics, Cybercrime Research, Cybercrime Reported To The Ic3, Cybercrime Resources, Cybercrime Riding Tax Season Tides, Cyber Crime Report 2016, Cybercrime Statistics, Cybercrime Statistics 2017, Cyber Crime Stories, Cybercrime Spyware, Cybercrime Statistics 2015, Cybercrime Security, Cybercrime Solutions, Cybercrime Salary, Cybercrime Small Business, Cyber Crime Synonym, Cybercrime Topics, Cybercrime Trends, Cybercrime Tracker, Cybercrime Treaty, Cyber Crime Types, Cybercrime Training, Cybercrime Threats, Cybercrime Tools, Cybercrime Terms, Cybercrime The Transformation Of Crime In The Information Age, Cyber Crime Unit, Cybercrime Us, Cybercrime Uk, Cybercrime Uae, Cybercrime University, Cybercrime Un, Cyber Crime Unit Mauritius, Cyber Crime Unit Malta, Cybercrime Uc, Cybercrime Unodc, Cybercrime Victims, Cybercrime Vs Traditional Crime, Cybercrime Videos, Cybercrime Vs Traditional Crime Statistics, Cybercrime Virus, Cyber Crime Vocabulary, Cybercrime Vs Traditional Crime Punishment, Cybercrime Vs Computer Crime, Cybercrime Vs Cyber Warfare, Cybercrime Vs Cyber Espionage, Cybercrime Wiki, Cybercrime Worm, Cybercrime World Wide War 3.0, Cyber Crime Websites, Cyber Crime Worksheet, Cybercrime Wallpaper, Cyber Crime Worldwide, Cybercrime Working Group, Cyber Crime What Is It, Cybercrime Wikipedia Indonesia, Cybercrime X-remote Download, Tedx Cybercrime, Cyber Crime Youtube, Cyber Crime Yahoo, Cyber Crime Yahoo Answers, Cyber Crime Yesterday, Cyber Crime Youth, Cybercrime Yang Menyerang Hak Cipta, Cybercrime Yar, Youth Cyber Crime, Cyber Crime Yogyakarta, Cybercrime Yang Menyerang Pemerintah, Cybercrime Zimbabwe, Cybercrime Zeus, Cybercrime Zimbra, Zurich Cyber Crime, Zimbabwe Cybercrime Bill, Cyber Crime In Zambia, New Zealand Cyber Crime, Los Zetas Cybercrime, Cybercrime Law In Zambia, Cyber Crime Cases In Zambia, Erpressung Englisch, Erpressung English, Erpressung Stgb, Erpressung Auf Englisch, Erpressung Schema, Erpressung Definition, Erpressung Synonym, Erpressung Schumacher, Erpressung Von Haus Stelleris, Erpressung Auf Englisch, Erpressung Am Arbeitsplatz, Erpressung Aufbau, Erpressung Anzeigen, Erpressung Anzeige, Erpressung Anzeige Erstatten, Erpressung Bedeutung, Erpressung Borussia Dortmund, Erpressung Bgb, Erpressung Bvb, Erpressung Bei Kindern, Erpressung Bilder, Erpressung Bibel, Erpressung Beziehung, Erpressung Bei Facebook, Erpressung Beispiel, Erpressung Corinna Schumacher, Erpressung Corinna, Erpressung Club Globe, Erpressung Ch, Erpressung Carstensen, Erpressung Chef, Erpressung Chantage, Erpressung Chat, Erpressung Computer, Erpressung Cz, Erpressung Definition, Erpressung Duden, Erpressung Dict, Erpressung Durch Arbeitgeber, Erpressung Durch Skype Video, Erpressung Drohung Mit Strafanzeige, Erpressung Drohung Mit Anzeige, Erpressung Durch Unterlassen, Erpressung Deutschland, Erpressung Durch Rechtsanwalt, Erpressung Englisch, Erpressung English, Erpressung Gesetz, Erpressung Geld Oder Anzeige, Erpressung Geld, Erpressung Geschichte, Erpressung Gewalt, Erpressung Gut Aiderbichl, Erpressung Grundschule, Erpressung Geldstrafe, Erpressung Griechenland, Erpressung Hitchcock, Erpressung Heinrich, Erpressung Haftstrafe, Erpressung Hacker, Erpressung Haus Stelleris, Erpressung Hausarbeit, Erpressung Hells Angels, Erpressung Hsv, Erpressung In English, Erpressung In Englisch, Erpressung Im Internet, Erpressung In Der Beziehung, Erpressung In Der Schule, Erpressung Internet, Erpressung Im Internet Was Tun, Erpressung Italienisch, Erpressung In Der Ehe, Erpressung In Beziehung, Erpressung Jura, Erpressung Jura Individuell, Erpressung Jugendstrafe, Erpressung Jusline, Erpressung Juraschema, Erpressung Juristisch, Erpressung Juristische Definition, Erpressung Juristische Person, Erpressung Jugendamt, Erpressung Jva, Erpressung Kinder, Erpressung Lidl, Erpressung Leo, Erpressung Latein, Erpressung Lebensmittel, Erpressung Lebensmittelhersteller, Erpressung Mit Bildern, Erpressung Mit Fotos, Erpressung Mit Video, Erpressung Mit Anzeige, Erpressung Michael Schumacher, Erpressung Mindeststrafe, Erpressung Mit Schlechter Bewertung, Erpressung Mit Strafanzeige, Erpressung Mit Youtube Video, Erpressung Mit Todesfolge, Erpressung Offizialdelikt, Erpressung Online, Erpressung Polnisch, Erpressung Polizei, Erpressung Quandt-erbin, Erpressung Quant, Erpressung Qualifikation, Quand Erpressung, Erpressung Stgb, Erpressung Schema, Erpressung Synonym, Erpressung Schumacher, Erpressung Schweiz, Erpressung Strafrecht, Erpressung Stgb Schema, Erpressung Unter Kindern, Erpressung Von Haus Stelleris, Erpressung Von Apple, Erpressung Von Haus Stelleris Weltquest, Erpressung Von Haus Stellaris Wow, Erpressung Virus, Erpressung Vergehen Oder Verbrechen, Erpressung Verbrechen, Erpressung Wiki, Erpressung Whatsapp, Erpressung Wie Verhalten, Erpressung Was Ist Deine Familie Wert, Erpressung Youtube, Yelp Erpressung, Erpressung Mit Youtube Video, Erpressung Zitate, Erpressung Zur Falschaussage, Erpressung Zell Am See, Erpressung Zivilrechtlicher Anspruch, Erpressung Zjs, Erpressung Zu Sexuellen Handlungen, Erpressung Zivilrecht, Zeitarbeit Erpressung, Zeitungsartikel Erpressung, Rufmord English, Rufmord Auf Englisch, Rufmord Schweiz, Rufmord Gesetz, Rufmord Strafe, Rufmord Stgb, Rufmord Anzeige, Rufmord Bedeutung, Rufmord Auf Englisch, Rufmord Anzeige, Rufmord Am Arbeitsplatz, Rufmord Bedeutung, Rufmord Bgb, Rufmord Band, Rufmord Bei Facebook, Rufmord Beispiele, Rufmord Begehen, Rufmord Bestrafung, Rufmord Bei Wahrheit, Rufmord Beweisen, Rufmord Bei Der Arbeit, Rufmord Chef, Rufmord Im Internet Christian Scherg, Major Crimes Rufmord, Cybermobbing Rufmord, Rufmord Durch Chef, Notruf California Rufmord, Rufmord Definition, Rufmord Duden, Rufmord Dict, Rufmord Durch Presse, Rufmord Durch Kollegen, Rufmord Durch Arbeitgeber, Rufmord Durch Vermieter, Rufmord Die Drei Fragezeichen, Rufmord Durch Polizei, Rufmord Dejure, Rufmord English, Rufmord Englisch, Rufmord Film, Rufmord Facebook Strafe, Rufmord Firma, Rufmord Gesetz, Rufmord Gerichtsurteile Paragrafen, Rufmord Gesetz Deutschland, Rufmord Geldstrafe, Rufmord Gesetzestext, Rufmord Hassel, Rufmord Hilfe, Rufmord Helmut G, Rufmord Haftstrafe, Rufmord Hip Hop, Rufmord In English, Rufmord Im Internet, Rufmord In Der Familie, Rufmord Im Internet Strafe, Rufmord Internet, Rufmord Im Internet Was Tun, Rufmord Im Internet 37 Grad, Rufmord In Der Schule, Rufmord In Facebook, Rufmord Im Netz, Rufmord Juristisch, Rufmord Jenseits Der Moral, Rufmord Jenseits Der Moral Stream, Rufmord Jenseits Der Moral Trailer, Rufmord Jusline, Rufmord Jura, Rufmord Klage, Rufmord Kroatisch, Rufmord Konsequenzen, Rufmord Klage Gericht, Rufmord Lehrer, Rufmord Luxemburg, Rufmord Mobbing, Rufmord Mitarbeiter, Rufmord Medicopter 117, Rufmord Menschen Hautnah, Rufmord Medien, Rufmord Musik, Rufmord Mit Todesfolge, Rufmord Machen, Rufmord Melden, Rufmord Metin2, Rufmord Nachbarn, Rufmord Oder Verleumdung, Rufmord Ohne Namen, Rufmord Ohne Beweise, Rufmord Opfer, Rufmord Online, Rufmord Band Oberberg, Rufmord Polizei, Rufmord Paragraph, Rufmord Privat, Rufmord Rapper, Rufmord Schweiz, Rufmord Strafe, Rufmord Stgb, Rufmord Strafbar, Rufmord Schadensersatz, Rufmord Tatbestand, Rufmord Und Verleumdung, Rufmord Unternehmen, Rufmord Verleumdung, Rufmord Was Tun, Rufmord Wiki, Rufmord Welche Strafe, Rufmord Wie Vorgehen, Rufmord Wenn Stimmt, Rufmord Was Dagegen Tun, Rufmord Wdr, Rufmord Was Kann Man Tun, Rufmord Welcher Anwalt, Rufmord Wahrheit, Youtube Rufmord Im Internet, Rufmord Youtube, Rufmord Zitate, Rufmord Zeitung, Rufmord Zgb, Rufmord Zivilrecht, Rufmord Zur Anzeige Bringen, Rufmord Bild Zeitung, Rufmord Durch Zeitung, Rufmord Im Internet ZDF,