Daran hat sich nichts geändert. Im Gegenteil: Die STASI-Connections zu Putin und auch nach China werden intensiver genutzt denn je:

  • für Subventionsbetrug
  • Energie-Pipelines
  • Gazprom Deutschland
  • Cybercrime
  • Zersetzung der deutschen und europäischen Politik, Justiz, Medien und Wirtschaft

Wie schon immer werden die STASI-Seilschaften aus Moskau dirigiert.

Denn auch Wladimir Putin ist einer von ihnen:

Quellbild anzeigen


TOP SECRET – GRU Close Access Cyber Operation Against OPCW

TOP SECRET – GRU Close Access Cyber Operation Against OPCW

The following presentation was released by the U.S. Department of Justice in relation to their indictment of seven Russian GRU officers on charges related to “International Hacking and Related Influence and Disinformation Operations.”


Page Count: 35 pages
Date: October 4, 2018
Restriction: None
Originating Organization: Dutch Ministry of Defence
File Type: pdf
File Size: 9,485,284 bytes
File Hash (SHA-256): D9055D137D16AF0D58F4F2EB5B9A9094CDAAF18013F13989BE5B3341FCCE099B

Download File





You want to check whether a certain person was or is in the KGB ? You may look at on this website in the KGB spies category for more information.


Bildergebnis für LUKASCHENKO

The accompanying report is a piece of a progression of Social Media Landscape guides delivered by the U.S. Branch of State for its U.S.- European Media Hub which is depicted as interfacing “European crowds with U.S. policymakers and viewpoints.” The Media Hub, which is situated in Brussels, Belgium, is a piece of the International Media Engagement Office of the U.S. Branch of


For USG Official Use Only

Web-based social networking Landscape: Belarus

I. Belarus initially

Web-based social networking appropriation is beginning and restricted to significant urban areas (particularly Minsk)

Broad communications control makes online networking an undeniably progressively believable wellspring of data

Utilization of web-based social networking in government is constrained to a great extent to resistance groups

Absence of framework and the predominant Russian language implies Belarusian online networking are subsumed inside the Russian Internet people group

II. Official Summary

The Internet and online networking are in beginning times of advancement in Belarus. The absence of foundation and the expense of access imply that the online network is described by well-to-do, instructed working classes from the metropolitan regions of the nation (particularly Minsk). Web in Belarus has not yet accomplished the infiltration important to be socially agent.

In spite of the availability challenges, online life are as yet demonstrating well known, especially among more youthful socioeconomics. Online data sources and particularly web based life, guarantee an unprejudiced nature that is frequently ailing in Belarusian broad communications channels, which many consider to be excessively impacted by the national government. From a political perspective, this hosts implied that restriction gatherings have been swifter to explore different avenues regarding on the web commitment to increase open help, despite the fact that their utilization of internet based life as vital instrument for battling is still moderately test.

A noteworthy test for online networking networks in Belarus will be in setting up their own character, separate to the Russian Internet space. The absence of committed Belarusian stages and framework implies that somewhat Belarus online culture is being subsumed by Russia. Online in any event, the limits are obscured.

III. Access

Web get to rates in Belarus are low contrasted with the remainder of Europe, with by far most of action moved in Minsk

The predominant online gathering is men, matured between 15-34, knowledgeable and living the capital

Charges imposed on Belarusian Internet spaces are a noteworthy factor in easing back the improvement of the nation’s online economy

Connection between Internet access and family profile


Hitched: 44.69%

Not wedded: 42.84%

Unregistered wedded: 5.65%

Separated or bereaved: 6.8%

Family size:

Living alone: 6.56%

Living in a group of two: 17.04%

Living in a group of three: 35.84%

Living in a group of four: 31.09%

Living in a group of five +: 9.47%

Web access in Belarus is accessible to 32.5% of the populace, while cell phone entrance remains at 76%. Cell phone entrance rates are low thus most by far of individuals get to online substance through PCs or PCs. Web action is packed in the capital, Minsk, and the encompassing area, where 45.7% of the online populace are dynamic. The rest of individuals is circulated the nation over major urban focuses: 16% in the Brest district, 7.3% in the Vitebsk area, 12.8% in the Gomel locale, 9.9% in the Grodno district and 8.3% in the Mogilev area.

Most of Internet clients are male (53%) and underneath the age of 24 (15-multi year-olds represent 38% of the online populace). 25-multi year-olds structure 25% of the network, 35-multi year-olds 22% and those 45 and over are the minority bunch at 15%. This age profile joined with the segment dissemination make Internet get to the advantage of the more youthful instructed, set up white collar classes. Understudies, “experts” and center to top level chiefs are the biggest three gatherings dynamic on the web, while practically 50% of all Internet clients are hitched (44.7%). Just 9.5% of Internet clients live in groups of more than five individuals, another sign that as of now in Belarus the online populace is only characterized by rich, urban, taught and proficient classes.

Proficient dispersion of Internet clients

Understudies: 18.48%

Experts: 18.18%

Center and ranking directors: 11.27%

Architects/manual specialists: 11.04%

Business visionaries (SME): 4.93%

Regulatory specialists: 4.83%

Joblessness: 1.91%

Others: 17.42%.

In the mean time, from a foundation viewpoint, there are right now around 180 broadcast communications organizations associated with giving Internet get to, another sign that development and combination is yet to be accomplished in the Belarus advertise.

14.9% of Internet clients approach broadband (4.8% of the populace generally), a low figure contrasted with most of other European nations. The major broadband specialist organization is Beltelecom.

A critical factor easing back the improvement of the Internet economy in Belarus is the enrollment procedure important to verify a .by space.

Candidates must enlist their area by means of a privately owned business; “Otrkytyj kontakt”, and a devoted government body; The State Center for Security of Information. The expense of enrollment and backing is around USD50, contrasted with USD2.49 for a similar assistance to help a .ru (Russian) space. Especially in the non-business division, this extra expense is a huge boundary to advancement.

IV. Action

Livejournal is the most well known stage for online movement in Belarus and blogging as a rule is demonstrating a famous action

Russian stages are additionally exceptionally powerful, particularly the informal organization VKontakte. As far as online networking movement, the limits among Belarus and Russia are unmistakably obscured

In spite of the entrance issues, web based life are demonstrating mainstream since they offer an elective wellspring of data to the broad communications, saw by numerous individuals as ailing in believability because of state impact

Blogging is picking up fame in Belarus and the age scope of bloggers is expanding. In 2007, a universal web based life grants occasion named a Belarusian task, Fotografomanstvo (created by Livejournal client ak-bara, best blog. Belarusian bloggers are a dedicated network in general; while half keep up one blog, 46% compose a few sites and 4% at least four web journals.

The greater part of Belarusian bloggers are male (75%) and in their mid twenties (normal age 25). 46% are understudies or have accomplished a college degree and generally (79%) live in the Belarusian capital, Minsk. Just like the case in neighboring Russia, the most famous innovation stage for blogging is Livejournal, with WordPress additionally well-utilized.

Nearby blogging stages are additionally now rising. The first of these,, propelled in 2005. It currently has around 2,200 web journals, including the well known “Library blog”, which centers around libraries and data in Belarus and past and has won a few Belarusian media grants. ByJournal is additionally demonstrating well known and now has organizing occasions to which prominent Belarusian bloggers are welcomed. Another well known, nearby stage is, which positions itself as the goal for VIP and the stage online journals.

With regards to person to person communication, most of Belarusians utilize Russian stages. (a Russian Facebook clone), Livejournal, Liveinternet and are generally famous centers of action., propelled as the principal Belarusian interpersonal organization, presently has a little more than 17,000 individuals. The other fundamental systems utilized in the nation are (25,229 individuals) and (a system made explicitly to rejoin previous school cohorts, on which movement levels are generally low). As far as mixed media, a neighborhood photosharing stage,, is additionally well known. For long range informal communication generally, in any case, enrollment volume and movement rates are low contrasted with those of the Russian-possessed systems.

Migrant gatherings have embraced online networking as a way to keep in touch inside the network. Belarusians who have moved to another country likewise utilize online life so as to connect with individual exiles. Livejournal people group are the most famous channel for such action. Especially noteworthy networks incorporate by_mf, by governmental issues, by_warszawa, belarus_france, by_maskva, by_praha, by_warszawa, catholic_by, great_litva, and ua_by.

In spite of the fact that Internet entrance rates are moderately low in Belarus, among those with get to, online life is demonstrating famous and a chance to organize. Various grassroots occasions have occurred to join the Belarusian Internet people group, including BarCamp-style social affairs assembled ByCamp and conferences of the little however developing digital broadcast network (dynamic on the Russian podcasting stage at and Since 1999 various conventional meetings outfitted towards invigorating the Belarus Internet economy have additionally occurred. These incorporate the Belarusian Internet Forum (occurred yearly somewhere in the range of 1999 and 2005), local gatherings in Grodno, Vitebsk and Brest and, in 2006, the main meeting committed to online business. Generally, be that as it may, sorted out gathering movement is moderately sporadic.

Customary media investment in online networking

Some experimentation with internet based life is occurring among the news outlets, in spite of the fact that it is as of now restricted in scope. The paper Nasha niva (Наша ніва) has writes by well known editorialists including Alexander Klasnovsky, Lelik Ushkin, conventional clergyman Alexander Shamko, and picture takers Andrey Lenkevich and Yulia Doroshkevich. In any case, their substance and style of introduction contrasts nearly nothing.


Just before 12 PM on Tuesday night, the White House spending office discharged almost 200 pages of Ukraine-related records to American Oversight because of a FOIA claim. Those pages included already unreleased messages that demonstrated high ranking representatives in the Office of Management and Budget (OMB) were laying the basis to freeze military help to Ukraine even before President Trump’s scandalous July 25 call with Ukrainian president Volodymyr Zelensky.

These records had likewise never been given to Congress — either during the House reprimand hearings or the Senate preliminary. Truth be told, in the hours preceding the OMB records were discharged to American Oversight, the Senate opposed two separate endeavors to give subpoenas looking for huge numbers of these equivalent reports.

Under 18 hours after the fact, on Wednesday evening, the archives we had acquired from OMB were in plain view on the Senate floor. Delegate Jason Crow, one of the House’s indictment chiefs, held up a duplicate of an intensely redacted email that had been discharged to American Oversight and posted on our site.

Later that night, Representative Adam Schiff again highlighted the OMB messages we revealed.

As we have composed previously, the way that American Oversight has had the option to get Ukraine-related records through FOIA when those equivalent archives were retained from House examiners is away from of the Trump organization’s hindrance of Congress. Our work was refered to in the House Intelligence Committee’s denunciation report, and Obstruction of Congress is the second of the two articles of indictment at present pending before the Senate.

The Trump White House and Senate Majority Leader Mitch McConnell have been depending on a methodology of all out hindrance to forestall the Senate and the American individuals from getting the full truth about the Ukraine outrage. Yet, on account of FOIA prosecution from American Oversight, the New York Times, the Center for Public Integrity, and others, that technique is separating.

As of now we have gotten a few hundred pages of reports that — even regardless of overwhelming redactions — have revealed new insight into the planning and execution of the plan to retain military guide from Ukraine in return for political impedance in the up and coming political decision.

Also, more records are just around the corner. Next Tuesday, January 28, the Department of Energy has a cutoff time to start discharging responsive records identified with previous secretary Rick Perry’s job in an official assignment to President Zelensky’s introduction just as his interchanges with key people. Perry was one of the alleged “three amigos” who, alongside EU Ambassador Gordon Sondland and previous Ukraine agent Kurt Volker, were entrusted with executing President Trump’s motivation in Ukraine. He has since left the organization, however his records despite everything have a place with the American individuals, and we’re going to continue battling to make them open.

There are significantly greater archive generation cutoff times coming throughout the following half a month, and as we have done previously, we will cause the records we to acquire accessible to the general population here on the site.

Indeed, even as the reprimand preliminary has become the overwhelming focus, we’ve been proceeding with our work to research new improvements in the Ukraine adventure just as progressing defilement and offense over the Trump organization. This is what else our group has been dealing with this week:

Records of Giuliani’s DOJ Visits: While a significant number of the most recent disclosures in the reprimand procedures have rotated around OMB or the State Department, Trump legal counselor Rudy Giuliani stays a focal figure in the undertaking. A week ago, CNN detailed that Attorney General William Barr was at a Justice Department meeting where Giuliani was likewise present. We approached the DOJ for guest logs, safety faculty messages, and different records used to monitor guests that may reflect visits made by Rudy Giuliani and others.

Fox and Feds: The connection between Fox News and the Trump Administration is surely a particular one. President Trump consistently communicates his inclination for Fox News inclusion, once in a while by conceding more extensive access to Fox journalists. In the mean time, a spinning entryway has framed between the news source and the organization with over twelve previous Fox donors currently serving in government positions. We recorded a solicitation to the State Department for correspondences sent to Fox News from explicit organization authorities who used to work with the media organization, including State Spokesperson Morgan Ortagus and a few U.S. represetatives.

Boeing’s New Boardmember: Last Spring, previous U.S. Represetative to the United Nations Nikki Haley joined Boeing’s top managerial staff — a choice she made in the wake of depicting the private part as a “progression up” from open help. Haley presently directs the private aviation organization which likewise satisfies billions of dollars worth of government contracts, basically for the U.S. military. We documented solicitations to various offices to learn if Haley has reached high positioning government authorities since the start of her residency at Boeing, including pioneers at the Department of Defense, the Department of State, NASA, and the Department of Transportation. We additionally mentioned any interchanges among Haley and Boeing during her administration as UN Ambassador.

Delrahim’s Texting Practices: In December the New York Times revealed that Makan Delrahim, aide lawyer general of the DOJ’s antitrust division, worked with T-Mobile and Sprint, two of the biggest remote organizations, to close a merger worth $26 billion. Instant messages uncover that Delrahim assumed a bizarrely included job in supporting the organizations through the guideline procedure, showing that the DOJ might not have endorsed the notable merger without his assistance and bringing up issues about his messaging practices (and how he directs official office business). We’re approaching the DOJ for Delrahim’s resume and morals records, just as his instant messages and schedule passages beginning from when he expected office in September 2017.

Adapting the DOD’s Emergency Network: Rivada Networks, an interchanges innovation organization that professes to turn “remote systems into business sectors,” has campaigned the Trump organization with a foundation model that adapts the DOD’s regularly unused crisis arrange framework. The Rivada framework vows to bring better system administration to rustic networks by selling the system when it’s not being used. In any case, questions have been raised about the model’s common sense just as about claims that Rivada’s top official attempted to bypass the government contract grants forms with a past organization. We requested interchanges between certain FCC authorities and explicit outer people and gatherings to decide whether outside impacts are controlling government broadcast communications approach.

Records from the Commission on Unalienable Rights: On July 8, 2019, Secretary of State Mike Pompeo declared the arrangement of the Commission on Unalienable Rights, a board that will furnish the secretary with human rights guidance while attempting to additionally characterize the idea of ‘unalienable rights.’ The commission raised quick worry among scholastics and human rights gatherings. Kenneth Roth, official executive of the Human Rights Watch, affirmed that the commission’s hearings “have been laden with dangers to the exceptionally human rights that the commission indicates to fortify… . [and] the reason for this commission isn’t to maintain all rights yet to single out among them.” We documented a solicitation under the Federal Advisory Committee Act for commission meeting records that ought to have been made accessible to people in general.

EPA’s California Communications: When the EPA and DOT moved to move back national tailpipe contamination benchmarks, the province of California reacted by suing the Trump organization and marking a different arrangement with automakers. From that point forward, the Trump organization has made a progression of substantive objections against California, numerous through the EPA. We approached the EPA for correspondences between top organization authorities and the White House about California to get familiar with the EPA’s inspirations driving late activities.

Tennessee Valley Authority Travel Expenses: Last September, examiners assessed about $1.8 million dollars worth of movement costs of the governmentally claimed Tennessee Valley Authority (TVA). An auditor general’s report discovered occasions of unreasonable travel spending among TVA administrators infringing upon government guidelines, including expensive suppers, picking progressively costly vehicle benefits, and overpaying remittances. We documented a solicitation for records that can reveal insight into movement costs for TVA officials.

State Accountability Project: Over the previous year American Oversight has researched Texas authorities’ interchanges with “voter extortion” lobbyist gatherings, documented open data demands about surveying place terminations, just as Texas voter move support orders. Presently we’re asking numerous Texas elements, including the Texas Senate and Office of the Governor, for duplicates of their strategies with respect to records maintenance and email auto-cancellation. We additionally recorded a progression of solicitations about changes to surveying place areas in Clayton County, Georgia.


On Friday evening, the State Department released nearly 100 pages of records in response to American Oversight’s lawsuit seeking a range of documents related to the Trump administration’s dealings with Ukraine.

Among other records, the production includes emails that confirm multiple contacts in March of 2019 between Secretary of State Mike Pompeo and Trump lawyer Rudy Giuliani, at least one of which was facilitated by President Trump’s assistant Madeleine Westerhout.

American Oversight is reviewing the production to assess whether the State Department has fully complied with the court’s order. Notes on what we’ve found are below.

You can download the documents here. They are also available below.


Statement from American Oversight Executive Director Austin Evers

“We can see why Mike Pompeo has refused to release this information to Congress. It reveals a clear paper trail from Rudy Giuliani to the Oval Office to Secretary Pompeo to facilitate Giuliani’s smear campaign against a U.S. ambassador.

“This is just the first round of disclosures. The evidence is only going to get worse for the administration as its stonewall strategy collapses in the face of court orders.

“That American Oversight could obtain these documents establishes that there is no legal basis for the administration to withhold them from Congress. That conclusively shows that the administration is engaged in obstruction of justice. The president and his allies should ask themselves if impeachment for obstruction is worth it if the strategy isn’t even going to be effective.

“This lawsuit is just one of several American Oversight is pursuing to bring transparency to the Ukraine investigation. The public should expect more disclosures, over the administration’s strong objection, for the foreseeable future.”


In the Documents

New: The documents show a March 26, 2019, call between Rudy Giuliani and Mike Pompeo. (Page 39 of document)

A March 28, 2019, email includes a list of scheduled calls for Pompeo. Calls include Rudy Giuliani on March 29, and Rep. Devin Nunes on April 1, 2019.

On March 27, 2019, Rudy Giuliani’s assistant contacted Madeleine Westerhout, who was serving as the president’s Oval Office gatekeeper at the time. She asked Westerhout for a “good number” for Pompeo, adding that she had “been trying and getting nowhere through regular channels.” Westerhout contacted someone at the State Department to ask for a number she could provide. (Page 55)

During his closed-door testimony, career diplomat David Hale mentioned two calls between Pompeo and Giuliani, one on March 28, 2019, and one on March 29. The documents include a March 28 email to Hale indicating that Pompeo had been the one to request a call with Giuliani. (Page 45)

The March 29 call appears on page 46, and the confirmation of its scheduling is on page 44.

Also in the documents: An April 5 letter to the State Department from six former U.S. ambassadors to Ukraine (including Bill Taylor), expressing their concern about the attacks on U.S. Ambassador to Ukraine Marie Yovanovitch. (Page 13)

On April 12, 2019, Reps. Steny Hoyer and Eliot Engel wrote to Pompeo, also expressing their concern (page 28). The State Department responded on June 11, saying “Yovanovitch was due to complete her three-year diplomatic assignment in Kyiv this summer.” (Page 34)

Note: The State Department did not produce a formal directive recalling Yovanovitch or a formal readout of Trump’s July 25 call with Zelensky. Both of these were covered by the court’s production order.

FBI Counterintelligence Note Warns About Chinese Talent Programs

FBI Counterintelligence Note Warns About Chinese Talent Programs


Chinese Talent Programs are a vital part of Chinese industry. Talent programs recruit experts to fill technical jobs that drive innovation and growth in China’s economy. National, provincial, and municipal talent recruitment programs provide opportunities for experts to work in industry and academic organizations supporting key areas deemed critical to China’s development. The talent programs recruit experts globally from businesses, industry, and universities with multiple incentives to work in China. Associating with these talent programs is legal and breaks no laws; however, individuals who agree to the Chinese terms must understand what is and is not legal under US law when sharing information. A simple download of intellectual property (IP) or proprietary information has the potential to become criminal activity.

(U//FOUO) The large number of foreign students, researchers, scientists, and professionals in the United States, combined with current technological capabilities, allows foreign governments to contact and recruit individuals with the hopes to acquire advanced technology without research costs. While the majority of the population are law abiding individuals, anyone has the capability to acquire information. The theft of information can come from current or former employees, business partners, consultants, contractors, temporary hires, foreign agents, suppliers, or even vendors who have access to proprietary information.

(U) Recruiting these individuals allows China to:

  • (U//FOUO) Gain access to research and expertise for cutting edge technology
  • (U//FOUO) Benefit from years of scientific research conducted in the United States supported by US Government grants and private funding
  • (U//FOUO) Severely impact the US economy.

(U) The goal of this SPIN is to provide an overview of the potential threats posed by the Chinese Talent Programs.


(U//FOUO) China’s most prominent national talent recruitment program is the “Recruitment Program of Global Experts,” which is commonly known as the Thousand Talents Program. It focuses on identifying key national-level organizations and associ-ated personnel involved in implementation and management.

(U) Its goal is to recruit ethnic Chinese experts from Western universities, research cen-ters, and private companies to boost China’s national capabilities in the science and technology (S&T) fields and to move China forward as an innovative nation. The pro-gram also implemented sub-programs for both young and foreign (non-ethnic Chinese) experts.

(U//FOUO) Originally, this program had a five-to-ten year goal of recruiting 2,000 profes-sionals worldwide who could lead innovation and pioneering work in key technologies, and promote the development of emerging industries. However, this program expanded its scope — recruiting far more than the initial goal of 2,000 individuals — and extended its life through at least 2020.

(U) In order to be eligible as a candidate for the Thousand Talents Program, an individual must be in a field of study the Chi-nese Academy of Science (CAS) deems critical or meet the following criteria:

  • (U) Expert or scholar with full professorship in a prestigious foreign university or research and development (R&D) insti-tute
  • (U) Technical managerial professional in a senior position at an internationally known company or financial institution
  • (U) Entrepreneur holding IP rights or key technologies and possesses overseas experience


(U//FOUO) Chinese Talent Programs pose a serious threat to US businesses and universities through economic espionage and theft of IP. The different programs focus on specific fields deemed critical to China, to boost China’s national capability in S&T fields. These subject mat-ter experts often are not required to sign non-disclosure agreements with US entities, which could result in lost of unprotected information that jeopardizes contracts or research funding. One of the greatest threats toward these experts is transferring or transporting proprietary, classified, or export-controlled information, or IP, which can lead to criminal charges.

(U//FOUO) The threat not only targets businesses or universities but potentially targets the researchers or scientists themselves. The technology researched or developed not only costs millions of dollars but costs years, if not decades to develop. Additionally, the theft of informa-tion or IP creates a risk that someone else could take credit for the researcher’s efforts. The information stolen can be recreated, resold or claimed by others, which in turn will cost the originator creditability and potential funding for future endeavors.

(U) Theft of intellectual property is an increasing threat to organizations and can go unnoticed for months or even years. In today’s society, technology affords easier access to every aspect of academia and business. Some of these tools have become effective for recruiting, such as social media. Social media websites often display large amounts of personal data, such as who an individual works for, phone numbers, known associates, previous jobs, and locations. Additionally, websites like LinkedIn have full resumes, detailing the history of an individual’s achievements and accomplishments.

(U) The FBI assesses each year the United States loses billions of dollars due to technology transfer. While it is important to conduct collaborative research, it is vital for the survival of US businesses and universities that they protect their information and mitigate lost or stolen in-formation.

TOP-SECRET – Iran Making Nuclear Weapons Report

TOP-SECRET – Iran Making Nuclear Weapons Report

1. This report of the Director General to the Board of Governors and, in parallel, to the Security Council, is on the implementation of the NPT Safeguards Agreement and relevant provisions of Security Council resolutions in the Islamic Republic of Iran (Iran).

G. Possible Military Dimensions

38. Previous reports by the Director General have identified outstanding issues related to possible military dimensions to Iran’s nuclear programme and actions required of Iran to resolve these. Since 2002, the Agency has become increasingly concerned about the possible existence in Iran of undisclosed nuclear related activities involving military related organizations, including activities related to the development of a nuclear payload for a missile, about which the Agency has regularly received new information.

39. The Board of Governors has called on Iran on a number of occasions to engage with the Agency on the resolution of all outstanding issues in order to exclude the existence of possible military dimensions to Iran’s nuclear programme. In resolution 1929 (2010), the Security Council reaffirmed Iran’s obligations to take the steps required by the Board of Governors in its resolutions GOV/2006/14 and GOV/2009/82, and to cooperate fully with the Agency on all outstanding issues, particularly those which give rise to concerns about the possible military dimensions to Iran’s nuclear programme, including by providing access without delay to all sites, equipment, persons and documents requested by the Agency. Since August 2008, Iran has not engaged with the Agency in any substantive way on this matter.

40. The Director General, in his opening remarks to the Board of Governors on 12 September 2011, stated that in the near future he hoped to set out in greater detail the basis for the Agency’s concerns so that all Member States would be kept fully informed. In line with that statement, the Annex to this report provides a detailed analysis of the information available to the Agency to date which has given rise to concerns about possible military dimensions to Iran’s nuclear programme.

41. The analysis itself is based on a structured and systematic approach to information analysis which the Agency uses in its evaluation of safeguards implementation in all States with comprehensive safeguards agreements in force. This approach involves, inter alia, the identification of indicators of the existence or development of the processes associated with nuclear-related activities, including weaponization.

42. The information which serves as the basis for the Agency’s analysis and concerns, as identified in the Annex, is assessed by the Agency to be, overall, credible. The information comes from a wide variety of independent sources, including from a number of Member States, from the Agency’s own efforts and from information provided by Iran itself. It is consistent in terms of technical content, individuals and organizations involved, and time frames.

43. The information indicates that Iran has carried out the following activities that are relevant to the development of a nuclear explosive device:

• Efforts, some successful, to procure nuclear related and dual use equipment and materials by military related individuals and entities (Annex, Sections C.1 and C.2);
• Efforts to develop undeclared pathways for the production of nuclear material (Annex, Section C.3);
• The acquisition of nuclear weapons development information and documentation from a clandestine nuclear supply network (Annex, Section C.4); and
• Work on the development of an indigenous design of a nuclear weapon including the testing of components (Annex, Sections C.5–C.12).

44. While some of the activities identified in the Annex have civilian as well as military applications, others are specific to nuclear weapons.

45. The information indicates that prior to the end of 2003 the above activities took place under a structured programme. There are also indications that some activities relevant to the development of a nuclear explosive device continued after 2003, and that some may still be ongoing.

Escalating Tensions Between the United States and Iran Pose Potential Threats to the United States

Escalating Tensions Between the United States and Iran Pose Potential Threats to the United States



The Joint Intelligence Bulletin (JIB) is planned to help bureaucratic, state, nearby, innate, and regional counterterrorism, digital, and law implementation authorities, and private segment accomplices, to viably stop, forestall, appropriate, or react to episodes, deadly tasks, or fear based oppressor assaults in the United States that could be led by or for the benefit of the Government of Iran (GOI) if the GOI were to see activities of the United States Government (USG) as demonstrations of war or existential dangers to the Iranian system. The GOI could act straightforwardly or enroll the participation of intermediaries and accomplices, for example, Lebanese Hizballah. The FBI, DHS, and NCTC had evaluated any active retaliatory assault would initially happen abroad. In the occasion the GOI were to decide to direct a Homeland assault, potential targets and strategies for assault in the Homeland could run from digital activities, to focused deaths of people considered dangers to the Iranian system, to damage of open or private foundation, including US army installations, oil and gas offices, and open tourist spots. USG activities may likewise incite vicious radical supporters of the GOI to submit assaults in retaliation, with next to zero notice, against US-based Iranian protesters, Jewish, Israeli, and Saudi people and interests, and USG faculty.

(U//FOUO) Immediate Response in Homeland Could Take Form of Cyber Operations

(U//FOUO) The FBI, DHS, and NCTC survey a prompt GOI reaction in the Homeland could appear as endeavored digital activities against USG offices and systems, including US military frameworks, and basic private part works, given that such tasks could be endeavored by Iran-based digital entertainers without the need of building up a US nearness. The US Intelligence Community has evaluated that Iran keeps on getting ready for digital assaults against the United States and partners. It is fit for causing confined, impermanent problematic impacts during a digital assault on unfortunate casualty systems. Verifiably, Iran has demonstrated the capacity to complete troublesome and ruinous digital assaults against open and private business systems, for example, expanded dispersed forswearing of-administration (DDoS) battles and information erasure assaults.

(U//FOUO) Iran speaks to a digital secret activities and assault risk, utilizing progressively refined digital methods and endeavoring to convey digital abilities that would empower assaults against basic foundation in the United States. Tehran’s general hazard math for a digital reaction likely will change dependent on the US strike, which Iranian pioneers have vocally depicted as escalatory, and hostile digital activities are probably going to be considered as retaliatory alternatives. Malignant action and observation may not really happen from Iranian Internet Protocol (IP) space, as on-screen characters may utilize midpoint framework in different nations. All things considered, traffic from Iranian IP locations may not be demonstrative of malignant movement. The FBI, DHS, and NCTC stress great digital cleanliness, for example, fixing frameworks and instructing work force to make preparations for generally utilized digital entertainer procedures, for example, social building and lance phishing.

(U//FOUO) Potential for GOI-Directed Lethal Attacks in the Homeland

(U//FOUO) as of late, the USG has captured a few people following up in the interest of either the GOI or Lebanese Hizballah who have directed reconnaissance demonstrative of possibility making arrangements for deadly assaults in the United States against offices and people.

» (U//FOUO) A specialist of the GOI captured in 2018 had led observation of Hillel CenterUSPER and Rohr Chabad CenterUSPER, Jewish establishments situated in Chicago, including shooting the security highlights encompassing the Chabad Center.

» (U//FOUO) Three Lebanese Hizballah External Security Organization (ESO) agents captured somewhere in the range of 2017 and 2019 had directed reconnaissance of US military and law implementation offices, basic foundation, private segment scenes, and open tourist spots in New York City, Boston, and Washington, DC.

(U//FOUO) The GOI likewise has a background marked by directing deaths and death endeavors against people in the United States it regards a danger to the Iranian system. The GOI killed the US-based previous representative for the Shah of the Iran in 1980 and plotted to kill the Saudi Arabian envoy to the United States in 2011. In August 2018, the USG captured two people for going about as operators of the GOI by directing incognito reconnaissance of Iranian protesters in New York City and Washington, DC, and the previously mentioned security highlights of Jewish offices in Chicago.


Website Defacement Activity Indicators of Compromise and Techniques Used to Disseminate Pro-Iranian Messages

Website Defacement Activity Indicators of Compromise and Techniques Used to Disseminate Pro-Iranian Messages

Following a week ago’s US airstrikes against Iranian military initiative, the FBI watched expanded revealing of site ruination movement spreading Pro-Iranian messages. The FBI accepts a few of the site disfigurement were the consequence of digital on-screen characters misusing realized vulnerabilities in content administration frameworks (CMSs) to transfer ruination documents. The FBI exhorts associations and individuals worried about Iranian digital focusing on be acquainted with the markers, strategies, and procedures gave in this FLASH, just as strategies and methods gave in as of late spread Private Industry Notification “Notice on Iranian Cyber Tactics and Techniques” (20200109-001, 9 January 2020).

Specialized Details:

The FBI recognized malevolent on-screen characters utilizing known vulnerabilities in CMSs to transfer ruination pictures onto injured individual sites. The FBI trusts one on-screen character utilized realized vulnerabilities permitting remote execution by means of treat and remote establishment. The FBI likewise distinguished that one of the records utilized in a destruction was presented on a site where the server facilitating the undermined site was designed so outer clients could direct HTTP POSTs. The FBI watched the utilization of a HTTP PUT direction to transfer a destruction document to an injured individual server.

The FBI notes various on-screen characters directed site mutilation movement with genius Iranian messages. Accordingly, the IP locations and procedures utilized will change. The FBI distinguished the underneath groupings of destruction movement.

One lot of mutilation action utilized the beneath record:

Filename MD5



The accompanying connections, contact data, and strings were remembered for a disfigurement record:





The accompanying IP addresses are related with the on-screen character connected to the disfigurement action with the above referenced connections, contact data, and strings:

IP Address



A second arrangement of destruction movement was distinguished utilizing the underneath record:



The FBI takes note of the above mutilation picture was transferred by means of a HTTP PUT order. The accompanying IP address is related with the on-screen character connected to this arrangement of ruination action:

IP Address


A third arrangement of mutilation action was distinguished utilizing the underneath IP address:

IP Address


The FBI notes for this mutilation action, the on-screen character had the option to direct a HTTP POST of a document utilized in a destruction.

Best Practices for Network Security and Defense:

Utilize customary updates to applications and the host working framework to guarantee insurance against known vulnerabilities.

Set up, and reinforcement disconnected, a “known decent” adaptation of the pertinent server and an ordinary change-the board arrangement to empower checking for modifications to servable substance with a document honesty framework.

Utilize client input approval to confine nearby and remote record incorporation vulnerabilities.

Execute a least-benefits approach on the Webserver to:

o Reduce foes’ capacity to raise benefits or turn horizontally to different hosts.

o Control creation and execution of records specifically catalogs.

If not effectively present, consider sending a peaceful area (DMZ) between the Web-confronting frameworks and corporate system. Constraining the communication and logging traffic between the two gives a technique to recognize conceivable noxious movement.

Guarantee a protected arrangement of Webservers. Every single pointless assistance and ports ought to be incapacitated or blocked. Every essential assistance and ports ought to be confined where plausible. This can incorporate whitelisting or blocking outside access to organization boards and not utilizing default login qualifications.

Utilize a switch intermediary or elective support of limit available URL ways to known authentic ones.

Direct customary framework and application weakness sweeps to build up regions of hazard. While this strategy doesn’t secure against multi day assaults, it will feature potential zones of concern.

Convey a Web application firewall, and direct ordinary infection signature checks, application fluffing, code audits, and server arrange examination.


Der Spielfilm “DIE RUECKKEHR DER DDR (IM JAHRE 2014)” mit DDR-General Vladimir Schablonsky. ****** Die Webseite zu diesem Spielfilm lautet:

Von der Realität längst überholt…

Unvealed – Google AdSense Leaked by Ex-Google Employer

Unvealed – Google AdSense Leaked by Ex-Google Employer

I am a former Google employee and I am writing this to leak information to the public of what I
witnessed and took part in while being an employee. My position was to deal with AdSense accounts,
more specifically the accounts of publishers (not advertisers). I was employed at Google for a period of
several years in this capacity.

Having signed many documents such as NDA’s and non-competes, there are many repercussions for me,
especially in the form of legal retribution from Google. I have carefully planned this leak to coincide with
certain factors in Google such as waiting for the appropriate employee turn around so that my identity
could not be discovered.

To sum it up for everyone, I took part in what I (and many others) would consider theft of money from
the publishers by Google, and from direct orders of management. There were many AdSense employees
involved, and it spanned many years, and I hear it still is happening today except on a much wider scale.
No one on the outside knows it, if they did, the FBI and possibly IRS would immediately launch an
investigation, because what they are doing is so inherently illegal and they are flying completely under
the radar.

It began in 2009. Everything was perfectly fine prior to 2009, and in fact it couldn’t be more perfect from
an AdSense employees perspective, but something changed.

Google Bans and Ban Criteria

Before December 2012:

In the first quarter of 2009 there was a “sit-down” from the AdSense division higher ups to talk about
new emerging issues and the role we (the employees in the AdSense division needed to play. It was a
very long meeting, and it was very detailed and intense. What it boiled down to was that Google had
suffered some very serious losses in the financial department several months earlier. They kept saying
how we “needed to tighten the belts” and they didn’t want it to come from Google employees pockets.
So they were going to (in their words) “carry out extreme quality control on AdSense publishers”. When
one of my fellow co-workers asked what they meant by that. Their response was that AdSense itself
hands out too many checks each month to publishers, and that the checks were too large and that
needed to end right away. Many of the employees were not pleased about this (like myself). But they
were successful in scaring the rest into thinking it would be their jobs and their money that would be on
the line if they didn’t participate. The meeting left many confused as to how this was going to happen.
What did they mean by extreme quality control? A few other smaller meetings occur with certain key
people in the AdSense division that furthered the idea and procedure they planned on implementing.
There were lots of rumors and quiet talking amongst the employees, there was lots of speculations,
some came true and some didn’t. But the word was that they were planning to cut off a large portion of
publisher’s payments.

After that point there was a running gag amongst fellow co-workers where we would walk by each other
and whisper “Don’t be evil, pft!” and roll our eyes.

What happened afterwards became much worse. Their “quality control” came into full effect. Managers
pushed for wide scale account bans, and the first big batch of bans happened in March of 2009. The
main reason, the publishers made too much money. But something quite devious happened. We were
told to begin banning accounts that were close to their payout period (which is why account bans never
occur immediately after a payout). The purpose was to get that money owed to publishers back to
Google AdSense, while having already served up the ads to the public.

This way the advertiser’s couldn’t claim we did not do our part in delivering their ads and ask for money
back. So in a sense, we had thousands upon thousands of publishers deliver ads we knew they were
never going to get paid for.

Google reaped both sides of the coin, got money from the advertisers, used the publishers, and didn’t
have to pay them a single penny. We were told to go and look into the publishers accounts, and if any
publisher had accumulated earnings exceeding $5000 and was near a payout or in the process of a
payout, we were to ban the account right away and reverse the earnings back. They kept saying it was
needed for the company, and that most of these publishers were ripping Google off anyways, and that
their gravy train needed to end. Many employees were not happy about this. A few resigned over it.
I did not. I stayed because I had a family to support, and secondly I wanted to see how far they would

From 2009 to 2012 there were many more big batches of bans. The biggest of all the banning sessions
occurred in April of 2012. The AdSense division had enormous pressure from the company to make up
for financial losses, and for Google’s lack of reaching certain internal financial goals for the quarter prior.
So the push was on. The employees felt really uneasy about the whole thing, but we were threatened
with job losses if we didn’t enforce the company’s wishes. Those who voiced concerned or issue were
basically ridiculed with “not having the company’s best interest in mind” and not being “team players”.
Morale in the division was at an all-time low. The mood of the whole place changed quite rapidly. It no
longer was a fun place to work.

The bans of April 2012 came fast and furious. Absolutely none of them were investigated, nor were they
justified in any way. We were told to get rid of as many of the accounts with the largest
checks/payouts/earnings waiting to happen. No reason, just do it, and don’t question it. It was heart
wrenching seeing all that money people had earned all get stolen from them. And that’s what I saw it as,
it was a robbery of the AdSense publishers. Many launched appeals, complaints, but it was futile
because absolutely no one actually took the time to review the appeals or complaints. Most were simply
erased without even being opened, the rest were deposited into the database, never to be touched

Several publishers launched legal actions which were settled, but Google had come up with a new policy
to deal with situations such as that because it was perceived as a serious problem to be avoided.
So they came up with a new policy.

After December 2012: The New Policy

The new policy; “shelter the possible problem makers, and fuck the rest” (those words were actually
said by a Google AdSense exec) when he spoke about the new procedure and policy for “Account
Quality Control”.

The new policy was officially called AdSense Quality Control Color Codes (commonly called AQ3C by
employees). What it basically was a categorization of publisher accounts. Those publisher’s that could
do the most damage by having their account banned were placed in a VIP group that was to be left
alone. The rest of the publishers would be placed into other groupings accordingly.
The new AQ3C also implemented “quality control” quotas for the account auditors, so if you didn’t meet
the “quality control” target (aka account bans) you would be called in for a performance review.
There were four “groups” publishers could fall into if they reached certain milestones.

They were:

Red Group: Urgent Attention Required
Any AdSense account that reaches the $10,000/month mark is immediately flagged (unless they are part
of the Green Group).
– In the beginning there were many in this category, and most were seen as problematic and were seen
as abusing the system by Google. So every effort was taken to bring their numbers down.
– They are placed in what employees termed “The Eagle Eye”, where the “AdSense Eagle Eye Team”
would actively and constantly audit their accounts and look for any absolute reason for a ban. Even if
the reason was far-fetched, or unsubstantiated, and unprovable, the ban would occur. The “Eagle Eye
Team” referred to a group of internal account auditors whose main role was to constantly monitor
publisher’s accounts and sites.
– A reason has to be internally attached to the account ban. The problem was that notifying the
publisher for the reason is not a requirement, even if the publisher asks. The exception: The exact
reason must be provided if a legal representative contacts Google on behalf of the account holder.
– But again, if a ban is to occur, it must occur as close to a payout period as possible with the most
amount of money accrued/earned.

Yellow Group: Serious Attention Required
Any AdSense account that reaches the $5,000/month mark is flagged for review (unless they are part of
the Green Group).
– All of the publisher’s site(s)/account will be placed in queue for an audit.
– Most of the time the queue is quite full so most are delayed their audit in a timely fashion.
– The second highest amount of bans occur at this level.
– A reason has to be internally attached to the account ban. Notifiying the publisher for the reason is not
a requirement, even if the publisher asks. The exception: The exact reason must be provided if a legal
representative contacts Google on behalf of the account holder.
– But again, if a ban is to occur, it must occur as close to a payout period as possible with the most
amount of money accrued/earned.

Blue Group: Moderate Attention Required
Any AdSense account that reaches the $1,000/month mark is flagged for possible review (unless they
are part of the Green Group).
– Only the main site and account will be place in queue for what is called a quick audit.
– Most bans that occur happen at this level. Main reason is that a reason doesn’t have to be attached to
the ban, so the employees use these bans to fill their monthly quotas. So many are simply a random pick
and click.
– A reason does not have to be internally attached to the account ban. Notifying the publisher for the
reason is not a requirement, even if the publisher asks.
– But again, if a ban is to occur, it must occur as close to a payout period as possible with the most
amount of money accrued.

Green Group: VIP Status (what employees refer to as the “untouchables”)
Any AdSense account associated with an incorporated entity or individual that can inflict serious
damage onto Google by negative media information, rallying large amounts of anti-AdSense support, or
cause mass loss of AdSense publisher support.
– Google employees wanting to use AdSense on their websites were automatically placed in the Green
group. So the database contained many Google insiders and their family members. If you work or
worked for Google and were placed in the category, you stayed in it, even if you left Google. So it
included many former employees. Employees simply had to submit a form with site specific details and
their account info.
– Sites in the Green Group were basically given “carte blanche” to do anything they wanted, even if they
flagrantly went against the AdSense TOS and Policies. That is why you will encounter sites with AdSense,
but yet have and do things completely against AdSense rules.
– Extra care is taken not to interrupt or disrupt these accounts.
– If an employee makes a mistake with a Green Level account they can lose their job. Since it seen as
very grievous mistake.

New Policy 2012 Part 2:

Internal changes to the policy were constant. They wanted to make it more efficient and streamlined.
They saw its current process as having too much human involvement and oversight. They wanted it
more automated and less involved.

So the other part of the new policy change was to incorporate other Google services into assisting the
“quality control” program. What they came up with will anger many users when they find out. It
involved skewing data in Google Analytics. They decided it was a good idea to alter the statistical data
shown for websites. It first began with just altering data reports for Analytics account holders that also
had an AdSense account, but they ran into too many issues and decided it would be simpler just to skew
the report data across the board to remain consistent and implement features globally.
So what this means is that the statistical data for a website using Google Analytics is not even close to
being accurate. The numbers are incredibly deflated. The reasoning behind their decision is that if an
individual links their AdSense account and their Analytics account, the Analytics account can be used to
deflate the earnings automatically without any human intervention. They discovered that if an individual
had an AdSense account then they were also likely to use Google Analytics. So Google used it to their

This led to many publishers to actively display ads, without earning any money at all (even to this day).
Even if their actual website traffic was high, and had high click-throughs the data would be automatically
skewed in favor of Google, and at a total loss of publishers. This successfully made it almost impossible
for anyone to earn amounts even remotely close what individuals with similar sites were earning prior
to 2012, and most definitely nowhere near pre-2009 earnings.
Other policy changes also included how to deal with appeals, which still to this day, the large majority
are completely ignored, and why you will rarely get an actual answer as to why your account was
banned and absolutely no way to resolve it.


The BIG Problem (which Google is aware of)
There is an enormous problem that existed for a long time in Google’s AdSense accounts. Many of the
upper management are aware of this problem but do not want to acknowledge or attempt to come up
with a solution to the problem.

It is regarding false clicks on ads. Many accounts get banned for “invalid clicks” on ads. In the past this
was caused by a publisher trying to self inflate click-throughs by clicking on the ads featured on their
website. The servers automatically detect self-clicking with comparison to IP addresses and other such
information, and the persons account would get banned for invalid clicking.

But there was something forming under the surface. A competitor or malicious person would actively go
to their competitor’s website(s) or pick a random website running AdSense and begin multiple-clicking
and overclicking ads, which they would do over and over again. Of course this would trigger an invalid
clicking related ban, mainly because it could not be proven if the publisher was actually behind the
clicking. This was internally referred to as “Click-Bombing”. Many innocent publishers would get caught
up in bans for invalid clicks which they were not involved in and were never told about.

This issue has been in the awareness of Google for a very long time but nothing was done to rectify the
issue and probably never will be. Thus if someone wants to ruin a Google AdSense publishers account,
all you would have to do is go to their website, and start click-bombing their Google Ads over and over
again, it will lead the servers to detect invalid clicks and poof, they get banned. The publisher would be
completely innocent and unaware of the occurrence but be blamed for it anyways.


Their BIG Fear
The biggest fear that Google has about these AdSense procedures and policies is that it will be publicly
discovered by their former publishers who were banned, and that those publishers unite together and
launch an class-action lawsuit.

They also fear those whose primary monthly earnings are from AdSense, because in many countries if a
person claims the monthly amount to their tax agency and they state the monthly amount and that they
are earning money from Google on a monthly basis, in certain nations technically Google can be seen as
an employer. Thus, an employer who withholds payment of earnings, can be heavily fined by
government bodies dealing with labor and employment. And if these government bodies dealing with
labor and employment decide to go after Google, then it would get very ugly, very quickly ….. that is on
top of a class-action lawsuit.

CIA Offers Tips on Preparing a “Go-Bag” for Emergencies in Iran and Elsewhere

Ask Molly: November 20, 2019

Dear Molly,

I’ve been closely following the news out in California, and the devastation caused by wildfires that continue to burn. Though we don’t live in the area, it got me wondering if my family is prepared to handle a natural disaster like that. What can I do? #AskMollyHale

~Not Your Average Prepper

Dear Not Your Average Prepper,

Great question! Unfortunately, many people don’t think about these types of things until disaster strikes. It’s great that you’re thinking about emergency preparedness now.

CIA Officer with a Go-Bag

At CIA, we spend a lot of time discussing emergency preparedness and planning with our officers, who often find themselves working in all kinds of remote—and sometimes dangerous—places around the world. Often villages, towns or even cities are ill-equipped to handle major emergencies. What those emergencies might look like (hurricanes, earthquakes, civil unrest, violent uprisings or wildfires, etc.) can be hard to predict, but a well thought-out emergency plan, paired with regular drills and the right equipment, can put you in a better position to weather the storm, whatever form it takes.I asked our Office of Security for tips on developing an emergency action plan, and they had lots of suggestions. They also recommended that everyone learn how to create a “go-bag.” (A go-bag has important items that you may need during an emergency) Hopefully you’ll find these tips useful for you and your family.

Tips for Developing an Emergency Action Plan

An emergency action plan is, simply put, the plan of action for you and your family if a crisis arises. It’s important to discuss (and write down) your plan so you and your family know exactly what to do during an emergency. Remember: Planning shouldn’t be done in isolation. Every member of your family should be included and actively contribute. Here are a few things you should consider discussing when creating your emergency plan:

  • Be aware: What sort of natural disasters are frequent to your area? How might they affect your access to resources, roads or general infrastructure? Does your area have an emergency alert system? Do you know how you might be able to access it? These types of questions can help you shape your family’s planning meeting.
  • Establish a communication plan: The odds of you and your family being in the same location during an emergency are slim, so planning for communications is critical. Who is the primary point of contact for the family? What about a secondary point of contact, if your primary point of contact can’t be reached? What should you do if you don’t have a cell phone or if it isn’t working? Larger families should establish a ‘phone tree’ system in which each person is responsible for establishing contact with a particular person or set of persons.
  • Identify meeting points (primary/secondary/tertiary): If you and your family aren’t able to make contact with one another it’s important that everyone knows the location of designated meeting points. Meeting points should be familiar places around town where you and your family can plan to meet if an emergency were to occur while you were separated. It is best to pick locations that are familiar to your family, such as your home or that of a relative. Other options can include schools or local civic buildings. Be sure to have a few back-up locations just in case you can’t reach the first one. For instance, if the primary location is home but the roads are blocked, everyone should know to make their way to a secondary location, like a school or a grandparent’s house.
  • Consider the specific needs of your household: You can easily find an off-the-shelf emergency action plan on the Internet, but is it going to address the needs of your family in your specific area? Probably not. An emergency action plan should take into account precautions that are unique to you and your family. Perhaps you have a family member in a wheelchair; if so, your designated meeting points should take handicap accessibility into consideration. Do you have pets? Make sure you have food/water, vaccination records, proof of ownership and even a photo of your pet, in case you get separated. Check out the website for the Federal Emergency Management Agency (FEMA) for more information on how to prepare your pets for an emergency.
  • Plan evacuation routes: An emergency could require that you and your family quickly evacuate the area. If so, you need to be aware of all possible evacuation routes, without relying on GPS. Try to memorize these routes. That way you can evacuate an area safely and quickly—even if some roads are blocked and communication networks aren’t working.
  • Practice, practice, practice: An emergency plan is no good if it sits in the kitchen drawer unread and unused. It is important to commit the plan to memory. Our security officers encourage all of us at CIA to not only plan for emergencies, but also to practice them, both at home and at work. When practicing, throw in some curveballs that require you and your family to fall back on secondary plans or even completely unplanned options.

Building the Perfect Go-Bag

Emergency Kit Go-Bag on CIA Seal

According to FEMA, people should be prepared to take care of themselves and family members for up to 72 hours, or three days, following a disaster. To do this effectively you should collect and consolidate the appropriate materials at a well-known location in your home, work or vehicle ahead of time. We recommend consolidating the items into what we call a “go-bag,” so named because it is a tool that is intended for use in ‘on-the-go’ situations, such as a hasty evacuation.As some of our officers can attest, multiple go-bags scattered throughout the house, vehicles and your workplace might be the best solution. You never know where you’ll be when disaster strikes and having a go-bag within arm’s reach can mean the difference between life and death.

Contents of your go-bag should (at a minimum) include:

  • 1 gallon of water per day (or purification tablets)
  • Spoil-free food (i.e. protein bars)
  • First aid kit (with any prescription medications needed)
  • Light source (flashlight, glow sticks, etc.)
  • Spare batteries- (replenish them regularly)
  • Disaster plan with contact numbers, map and evacuation routes
  • Copies of passports and other critical documents
  • Warm blanket and several space blankets
  • Change of clothes with sturdy shoes
  • Hygiene supplies
  • Multi-tool (i.e., one that includes tools like a knife, screw driver and tweezers)
  • Cash and traveler’s checks
  • Matches or other fire starter in a waterproof case
  • Waterproof storage
  • Paper and pencil
  • Cell phone with emergency contact numbers and charger
  • Portable power bank for cell phones
  • Emergency repair kit (parachute cord, duct tape, safety pins)

This is by no means an exhaustive list, but should serve as a reference as you build a more personalized list based on your needs and those of your family, as well as the specific threats or challenges you are likely to face in your part of the world. If, for instance, you live along the coastline, you may want to put more time/effort into waterproofing your go bag and its contents. Those living or staying in areas of earthquake activity should consider including temporary shelters and focusing on communications, as cellular towers could be impacted.

Hopefully these tips are helpful!

Stay safe,

~ Molly

Must See Comedy Video – Urlaub in Dambeck

Ganz Deutschland ist wiedervereinigt. Ganz Deutschland? Nein! Dambeck (Altmark) bleibt von der Wiedervereinigung ausgeschlossen und vegetiert als Rest-DDR als souveräner Dritte-Welt-Staat vor sich hin. Weil wir Dambeck nicht wollen!!! NIEMAND WILL DAMBECK!!!!!!!!! Dambecker sind Kannibalen und auch sonst nicht ungefährlich. Dieser Film ist meinem ehemaligen Arbeitskollegen aus Dambeck gewidmet.

Unvealed – Records Related to Former NSA Director Keith Alexander’s Attendance of Bilderberg Meetings in 2008, 2009, 2011

The following set of documents was obtained via a Freedom of Information Act request made to the National Security Agency for “records relating to NSA Director Gen. Keith B. Alexander’s attendance of the Bilderberg Meetings held in 2008 in Chantilly Virginia; in 2009 in Vouliagmeni, Greece; and in 2011 in St. Moritz, Switzerland.” The request took the NSA 5 years and 13 days to fulfill.

File Contents

  • FOIA request response letter from June 27, 2016
  • Military leave information for NSA Director Keith Alexander to attend the 2008 Bilderberg Meeting in Chantilly, Virginia
  • Military leave information for NSA Director Keith Alexander to attend the 2009 Bilderberg Meeting in Vouliagmeni, Greece
  • Military leave information for NSA Director Keith Alexander to attend the 2011 Bilderberg Meeting in St. Moritz, Switzerland
  • Request to Under Secretary of Defense for Intelligence to attend the 2009 Bilderberg Meeting in Vouliagmeni, Greece
  • Second request to Under Secretary of Defense for Intelligence to attend the 2009 Bilderberg Meeting in Vouliagmeni, Greece
  • Action Memo approved by the Under Secretary of Defense for Intelligence to attend the 2008 Bilderberg Meeting in Chantilly, Virginia
  • Bilderberg Temporary Duty (TDY) Itinerary
  • Travel authorization form for Request to Under Secretary of Defense for Intelligence to attend the 2011 Bilderberg Meeting in St. Moritz, Switzerland
  • Request to Under Secretary of Defense for Intelligence to attend the 2011 Bilderberg Meeting in St. Moritz, Switzerland


Exposed – ICANN-Europol Update on Whois-Related Initiatives

Uses of the WHOIS

• Contact point for incident response
• Determination of availability of domain names

But also:
• Assisting, public safety organisations, businesses, consumer groups, individuals in combating abuse and fraud and seeking redress.
• Help with online crime attribution