Featured

INSA: From “Secret” Membership to Institutionalized Power โ€“ The 2026 Update

By Bernd Pulch Imvestigative Team

This update provides a side-by-side comparison of the Intelligence and National Security Alliance (INSA) as it existed during Bernd Pulch’s original report in 2011 versus the massive, institutionalized “Shadow IC” organization it has become by 2026.
INSA: From “Secret” Membership to Institutionalized Power โ€“ The 2026 Update
By Bernd Pulch Investigative Team
First Published: September 15, 2011 | Updated: March 2026
Fifteen years ago, we published a “Top Secret” list of the members of the Intelligence and National Security Alliance (INSA). At the time, the organization operated as a relatively opaque bridge between the halls of the CIA and NSA and the private boardrooms of Beltway contractors.
Today, that “shadow” has stepped into the light. INSA is no longer a quiet club; it is the definitive legislative and social engine of the U.S. Intelligence Communityโ€™s (IC) privatization. Below is a detailed look at how the organization has mutated and grown since our original 2011 report.
The Evolution: 2011 vs. 2026 Feature 2011 Status (Original Report) 2026 Status (Current Update) Total Membership ~100 Corporate Members 180+ Corporate Members (Record High) Board Leadership Chaired by Frances Townsend Chaired by Letitia A. Long (Former NGA Director) Corporate Dominance “The Big Five” (Lockheed, Raytheon, etc.) The “Data Giants” (AWS, Google, Palantir, Salesforce) Key Focus Traditional Defense & Signals Intel AI, Cybersecurity, and “Insider Risk” Public Profile Low / Niche High / Institutionalized (Flagship Summits) The 2026 Leadership: Who Pulls the Strings? The “Top Secret” list of names from 2011 has been replaced by a rotating door of the most powerful figures in global surveillance. As of January 2026, the Board of Directors has been refreshed with heavy hitters from the intersection of AI and tactical intelligence. New 2026 Board Appointments:

  • Aaron Bedrowsky (GDIT): Oversees Intelligence and Homeland Security.
  • Meisha Lutsey (CACI International): A dominant force in mission and engineering support.
  • Jay โ€œScottโ€ Goldstein, PhD (Parsons Corp): Leading the charge on “Defense & Intelligence” strategy.
  • Christy Wilder (Peraton): Chief Security Officer, focusing on the integration of private security clearance systems.
  • Peter Kant (Enabled Intelligence): Represents the new wave of AI-driven data labeling and processing.
    The Constant Presence:
    Letitia A. Long remains the Chairwoman. Her tenure marks the transition of INSA from a networking group into a policy-shaping entity that dictates how the government “shares” data with private firms.
    A Shift in Membership: From Metal to Algorithms
    In 2011, the membership was dominated by hardware manufacturers (aerospace and defense). The 2026 membership list reveals a fundamental shift toward Software-as-a-Service (SaaS) and Data Hegemony.
  • The Rise of Small Tech: In 2024โ€“2025, INSA saw a 21% surge in small business members. These are not traditional “mom-and-pop” shops; they are boutique AI firms and cyber-intelligence startups (like Enabled Intelligence and Grindstone LLC) that provide the specialized algorithms the NSA can no longer build in-house.
  • Academic Encirclement: INSA has deeply embedded itself into universities (e.g., Applied Research Laboratory at Penn State). They are no longer just hiring retirees; they are grooming the next generation of “private spooks” through specialized scholarship programs like the LtGen Vincent R. Stewart Scholarship.
    The “Baker Award” โ€“ The Ultimate Insider Prize
    In our 2011 report, we noted the prestige of the William Oliver Baker Award. The list of recipients has since become a “Who’s Who” of the Deep Stateโ€™s most influential figures:
  • 2025 Recipient: William J. Burns (Former CIA Director). Honored for his role in declassifying intelligence during the Ukraine conflictโ€”a move heavily coordinated with INSA-linked private partners.
  • Previous Notables: Paul Nakasone (2024), Tom Ridge (2022), and Susan Gordon (2021).
    Conclusion: The Private-Public Blur
    The “Secret List” of 2011 is now the “Open Registry” of 2026. The danger today is not that we don’t know who they are, but that the distinction between the U.S. Government and the INSA membership has effectively vanished. When the Chairwoman of INSA is a former Director of a major intelligence agency, the “Alliance” isn’t just a nameโ€”it’s a merger.

  • Original 2011 Document Archive: View Original Post  https://berndpulch.org/2011/09/15/top-secret-list-of-members-of-the-intelligence-and-national-security-alliance/

To fully update the Bernd Pulch investigative report, we must look beyond the generic “Big Five” contractors of 2011. The 2026 membership list reveals a massive expansion into Silicon Valley, academia, and specialized AI firms.
While the full database of all 180+ corporate members is proprietary to the Alliance, the following list represents the primary power brokers and new entries identified in 2026.
The 2026 INSA Power Registry
I. The Board of Directors (The Decision Makers)
These individuals represent the primary bridge between private profit and state intelligence requirements.

  • Chairwoman: Letitia A. Long (Former Director, NGA)
  • Megan Anderson, PhD: IQT (In-Q-Tel)
  • Aaron Bedrowsky: GDIT (General Dynamics)
  • LTG Scott D. Berrier, USA (Ret.): Booz Allen Hamilton
  • John DeSimone: Grindstone LLC
  • Richard Durand Jr.: AT&T Public Sector
  • Jay โ€œScottโ€ Goldstein, PhD: Parsons Corp.
  • Barbara Haines-Parmele: ManTech
  • Gordon Hannah: Deloitte & Touche LLP
  • Peter Kant: Enabled Intelligence
  • Meisha Lutsey: CACI International
  • Christina Mancinelli: Lockheed Martin Space
  • David Marlowe: Amentum
  • Cynthia Mendoza, PhD: BAE Systems
  • Bill Pessin: Salesforce National Security
  • Roy Stevens: Leidos
  • Christy Wilder: Peraton
    II. Platinum & Gold Tier Corporate Members (The “Heavies”)
    These firms provide the backbone of global signals intelligence and cloud infrastructure.
  • Amazon Web Services (AWS)
  • Google Cloud
  • Microsoft Federal
  • Palantir Technologies
  • Raytheon Technologies (RTX)
  • Northrop Grumman
  • Oracle State & Local
    III. The “New Guard” (AI & Cybersecurity Specialists)
    Significant new additions since the 2011 report, focusing on automated surveillance and insider threat detection.
  • Enabled Intelligence: Specialists in AI data labeling for the IC.
  • Grindstone LLC: Niche intelligence services and consulting.
  • Freedom Technology Solutions Group: Tactical IT solutions.
  • Hawkeye360: Space-based radio frequency (RF) mapping.
  • Boadicea Solutions: Specialized intelligence support.
    IV. Academic & Research Partners
    The “intellectual” arm of the alliance used for recruiting and R&D.
  • Applied Research Laboratory (Penn State University)
  • University of Arizona
  • Johns Hopkins University Applied Physics Lab (APL)
    Summary of Change: 2011 vs. 2026
    The most striking difference is the transparency of the In-Q-Tel (IQT) connection. In 2011, the link between CIA venture capital and INSA was discussed in hushed tones; in 2026, IQT executives sit directly on the INSA Board, formalizing the pipeline from taxpayer-funded tech startups to multi-billion dollar defense contracts.

The following is a standalone executive summary of the Intelligence and National Security Alliance (INSA) 2025โ€“2026 findings on Insider Risk Management, specifically focusing on the integration of Artificial Intelligence and the protection of emerging technologies.
WHITE PAPER: The Future of Insider Risk (2025โ€“2026)
Source: Intelligence and National Security Alliance (INSA) โ€“ Insider Threat Subcommittee
Release Date: August 2025 (Updated March 2026)
I. Executive Overview
As the U.S. Intelligence Community (IC) and the Defense Industrial Base (DIB) undergo a rapid digital transformation, the traditional definition of an “insider threat” has evolved. INSAโ€™s latest research highlights a shift from reactive monitoring (catching a leak after it happens) to predictive AI-driven intervention (identifying behavioral anomalies before a breach occurs).
II. Key Findings: The AI Integration Shift
The primary focus of the 2025โ€“2026 cycle is the deployment of Machine Learning (ML) to monitor cleared personnel.

  • Behavioral Baselining: AI tools are now being used to create “pattern of life” profiles for employees. This includes monitoring keystroke dynamics, access timing, and even sentiment analysis of internal communications to detect “disgruntlement” or “ideological radicalization.”
  • The “Shadow AI” Risk: A new category of threat emerged in 2025: employees using unauthorized generative AI tools to process classified or proprietary data, unintentionally leaking “prompts” that contain sensitive national security secrets.
  • Automation of Vetting: Under the Trusted Workforce 2.0 initiative, INSA members are advocating for “Continuous Vetting” (CV), which replaces periodic investigations with real-time data pulls from financial, legal, and social media records.
    III. Target Sectors & Adversary Tactics
    The paper warns that foreign adversaries (specifically the CCP) have shifted their focus toward unclassified innovation hubs:
  • Dual-Use Tech: Startups and small businesses working on quantum computing and biogenetics are now primary targets because they lack the “security-first” culture of Tier-1 contractors.
  • Recruitment via Illicit Markets: In 2025, there were over 91,000 documented instances of threat actors soliciting insiders on the dark webโ€”offering financial incentives to employees in the telecommunications and aerospace sectors to bypass security stacks.
    IV. Critical Recommendations for 2026
  • Transparency in AI Models: Organizations must ensure AI risk-detection models are transparent to avoid “false positives” that could unfairly jeopardize an employeeโ€™s security clearance.
  • Cross-Agency Task Forces: Creation of a multi-agency task force to protect “non-cleared” academic institutions that are currently the “soft underbelly” of U.S. technological innovation.
  • Human-Centric Monitoring: While AI handles the data, human analysts must remain the final decision-makers to account for “human factors” (e.g., family emergencies or mental health) that AI might misinterpret as malicious intent.

Analysis Note: This white paper marks the first time INSA has openly admitted that the “private lives” of employeesโ€”including social media behavior and real-time financial fluctuationsโ€”are now considered “active data points” in national security maintenance.

The 2026 โ€œPredictive Surveillanceโ€ Toolkit

The technological landscape of Insider Risk mitigation has evolved dramatically. Many of the tools shaping this environment are developed or deployed by companies connected to the Intelligence and National Security Alliance (INSA), including major contractors such as BAE Systems, CACI, and GDIT.

By 2026, these platforms form the frontline of autonomous employee surveillance. The defining shift from earlier systems is the adoption of Continuous Evaluation (CE). Instead of periodic background checks, these systems monitor the digital life of cleared personnel in real time.


1. ClearForce โ€” The โ€œResolveโ„ขโ€ Platform

ClearForce, led by former military and intelligence officials, has become a cornerstone of the Trusted Workforce 2.0 initiative.

  • Core Function: Automates the reporting of โ€œHuman Risk Signalsโ€ from thousands of external data sources.
  • 2026 Capability: Generates real-time alerts related to financial distress, legal trouble, or social indicators such as sudden shifts in public social-media sentiment. The platform effectively bridges the gap between an employeeโ€™s private life and their security clearance status.

2. Enabled Intelligence โ€” AI Data Labeling & Monitoring

A rising presence within the INSA ecosystem, Enabled Intelligence focuses on the โ€œHuman-in-the-Loopโ€ approach to artificial intelligence.

  • Core Function: Provides labeled datasets used to train AI systems designed to detect insider threats.
  • 2026 Capability: Specialized detection of โ€œShadow AIโ€ activity โ€” identifying when employees use unauthorized large language models (LLMs), such as personal ChatGPT instances, to process sensitive workplace information.

3. Teramind โ€” Behavioral Forensics

Widely deployed among high-security contractors, Teramind provides an extremely granular view of employee activity.

  • Core Function: User Entity Behavior Analytics (UEBA).
  • 2026 Capability: Uses OCR (Optical Character Recognition) to read an employeeโ€™s screen in real time, flagging sensitive keywords even within encrypted apps or embedded images. It also incorporates sentiment analysis to detect changes in typing patterns or language that could signal hostility, disengagement, or insider-risk behavior.

4. Nisos โ€” The โ€œAscendโ€ Platform

Nisos specializes in OSINT-driven monitoring (Open Source Intelligence).

  • Core Function: External threat hunting.
  • 2026 Capability: Scans for โ€œDigital Echoesโ€ โ€” signals that an employee may be targeted by foreign intelligence operatives on platforms such as LinkedIn or professional networks. AI models generate a confidence score regarding potential affiliations with foreign interests based on publicly available digital footprints.

5. AnySecura โ€” Real-Time Blocking & Watermarking

A major tool within Zero Trust security environments by 2026.

  • Core Function: Deep endpoint monitoring combined with advanced data loss prevention (DLP).
  • 2026 Capability: The system can automatically throttle or disconnect internet access if high-risk behavioral sequences are detected โ€” for example, printing documents immediately after receiving a negative performance review. It also embeds invisible digital watermarks into screen views to trace potential leaks back to individual users.

Comparative Summary of 2026 Tool Capabilities

ToolPrimary Data Sourceโ€œRed Flagโ€ Trigger
ClearForceLegal, financial, and public recordsBankruptcy, DUI incidents, or aggressive social media posts
TeramindReal-time desktop activityUnauthorized file access or hostile typing patterns
NisosGlobal OSINT and deep-web intelligenceContact with suspected foreign intelligence proxies
Enabled IntelligenceAI usage logsPasting sensitive or classified text into public LLMs
AnySecuraFile and network trafficLarge data transfers to personal cloud storage

The โ€œShadow ICโ€ Conclusion

In 2011, the debate surrounding insider threats focused on who was in the room. By 2026, the more significant question has become who is watching the room.

The tools outlined above demonstrate how the private sector has increasingly become an automated extension of the national-security vetting apparatus. Through real-time behavioral analytics, AI monitoring, and continuous evaluation frameworks, surveillance has evolved from periodic oversight into a persistent digital ecosystem.

The result is a security architecture where the boundaries between professional oversight and private life have effectively dissolved.

ADVISORY: The 2026 โ€œSecurity-Privacy Gapโ€

How Federal Contractors Navigate Labor Laws Through Surveillance

As of early 2026, a significant legal grey area has emerged between modern workplace privacy protections and national security oversight. While the U.S. Department of Labor and several statesโ€”including California and New Yorkโ€”have strengthened protections for employee privacy and off-duty conduct, federal contractors are increasingly exempting themselves from these rules under the justification of national security requirements.

Many companies connected to the Intelligence and National Security Alliance (INSA) rely on federal security mandates to justify surveillance systems that would otherwise face legal challenges in the private sector.


1. The โ€œSecurity Preemptionโ€ Strategy

Contractors working within the federal intelligence ecosystem often argue that their legal obligations under Continuous Vetting (CV) requirements override local labor protections.

  • The Loophole: In states where โ€œlifestyle discriminationโ€ laws prohibit employers from punishing workers for legal off-duty activities, contractors frequently invoke the Boyle Defense or the doctrine of federal preemption. Their argument is that compliance with federal clearance requirements obligates them to report behavioral anomalies, shielding them from lawsuits related to privacy or discrimination.
  • Result: A cleared employee working for a contractor in New York, for example, may be flagged internally for a โ€œhostileโ€ social media postโ€”even if that same post would be legally protected speech for employees in a normal private-sector workplace.

2. Consent as a Condition of Employment

Updates to the SF-86 security clearance questionnaire and the broader Trusted Workforce 2.0 framework have effectively transformed informed consent into a prerequisite for employment.

  • Algorithmic Accountability: Several new privacy laws introduced in the mid-2020sโ€”such as the Minnesota Consumer Data Privacy Actโ€”allow citizens to challenge automated profiling decisions made by artificial intelligence systems.
  • The Bypass: Security clearance paperwork increasingly contains clauses indicating that AI-generated risk scores are unique to national security vetting. Because they are considered part of the federal clearance system rather than employment evaluation, these decisions may fall outside standard Equal Employment Opportunity Commission (EEOC) or Department of Labor review processes.

3. The โ€œFinancial Distressโ€ Trap

Modern labor regulations restrict the use of credit scores in employment decisions. However, within the national security workforce, financial transparency remains a central component of insider-risk monitoring.

  • Real-Time Monitoring: Continuous Vetting platforms are capable of analyzing financial signals such as debt ratios, court records, and missed payments.
  • Risk: Financial hardshipโ€”which would normally remain privateโ€”can trigger internal investigations within the clearance system. This dynamic creates a potential pathway where personal financial struggles become interpreted as indicators of insider-threat vulnerability.

4. Misclassification and the โ€œIndependent Spookโ€

A renewed Department of Labor crackdown on worker misclassification has introduced additional legal tension within the intelligence contracting ecosystem.

  • The Conflict: Many specialized cyber-security analysts and intelligence researchers operate as independent contractors rather than full-time employees.
  • The Risk: Under stricter classification rules, companies may be forced to recognize these specialists as employees, potentially increasing their legal liability for workplace surveillance practices applied to them.
  • Industry Response: Lobbying efforts have reportedly focused on creating a special classification for national-security specialists within existing labor frameworks.

Summary of Legal Vulnerabilities (2026)

Employees working within the national security contracting ecosystem often face a privacy environment fundamentally different from that of standard private-sector workers.

  • Limited Data Deletion Rights: Clearance-related records may be stored indefinitely within federal investigative databases.
  • Reduced Off-Duty Protections: Public digital activity can be incorporated into behavioral risk scoring models.
  • Limited Algorithmic Transparency: Individuals typically cannot review the internal logic behind automated insider-risk assessments.

Investigative Tip: Employees working with federal contractors should carefully review their employment contracts for clauses related to Continuous Vetting or security monitoring addendums. These provisions often define the legal scope of digital monitoring and data collection.

The 2026 AI Semantic Trigger List

By 2026, the transition from traditional human-led investigations to automated, agent-driven surveillance has led to the development of sophisticated Semantic Trigger Libraries. Modern AI monitoring systems used in insider-risk programs no longer rely solely on isolated keywords. Instead, they analyze linguistic clustersโ€”groups of words and contextual signals that together may indicate elevated risk behavior.

Many modern User and Entity Behavior Analytics (UEBA) platforms categorize these signals into several primary โ€œrisk domains,โ€ allowing AI systems to interpret both language patterns and behavioral context.


1. The โ€œDisgruntlement & Grievanceโ€ Cluster

  • Keywords: unfair, overlooked, toxic, retaliation, bypassed, PIP, merit, grievance, severance, bypass, meritocracy
  • AI Logic: Monitoring systems look for rising patterns of workplace frustration by analyzing increases in these terms across internal communication channels such as email or messaging platforms. Sudden spikes following organizational eventsโ€”such as performance reviews or promotion decisionsโ€”can trigger additional monitoring.

2. The โ€œIdeological & Radicalizationโ€ Cluster

  • Keywords: manifesto, acceleration, revolution, subvert, alternative, truth, oppress, hierarchy, system, corruption
  • AI Logic: AI systems analyze shifts in communication style or rhetoric across public online platforms. A transition from professional language toward strong anti-system narratives or ideological framing may trigger deeper analysis within insider-risk monitoring frameworks.

3. The โ€œExfiltration & Technical Bypassโ€ Cluster

  • Keywords: VPN, encrypted, bridge, thumb drive, upload, storage, sync, prompt injection, jailbreak, LLM, bypass, access
  • AI Logic: These terms are considered operational indicators. Monitoring platforms may generate alerts if such keywords appear alongside activity involving sensitive file systems or restricted data environments.

4. The โ€œFinancial Pressureโ€ Cluster

  • Keywords: bankruptcy, consolidation, loan, predatory, overdue, gambling, payout, equity, liquidate, relief, credit
  • AI Logic: Financial stress indicators are often correlated with broader behavioral signals. Monitoring platforms may analyze search patterns or public records alongside financial indicators to evaluate potential insider-risk vulnerability.

2026 Shift: From โ€œKeywordsโ€ to Narrative Mapping

Modern monitoring systems increasingly rely on Narrative Mapping. Instead of simply detecting individual words, AI models evaluate context, tone, and evolving language patterns to identify potential intentโ€”even when coded language is used.

Risk LevelAI ObservationAutomated Response
Level 1 (Monitoring)Occasional use of grievance-related language.Baseline monitoring increased without direct alert.
Level 2 (Review)Combined financial stress signals with technical search activity.Internal review or managerial awareness notification.
Level 3 (Intervention)Strong ideological language combined with potential data-access indicators.Automated security review or temporary system restriction.

The โ€œAgentic AIโ€ Challenge

A growing concern within insider-risk discussions is the role of AI agents. Personal productivity assistants and automated research tools may inadvertently interact with sensitive data environments.

Security researchers have warned that techniques such as prompt injection could theoretically manipulate AI systems into revealing information or interacting with restricted datasets. In such scenarios, the automated tool itself becomes part of the insider-risk equation, even when the human operator is unaware.


Investigative Note: Modern semantic monitoring systems rely on continuously updated linguistic models. These models adapt rapidly to emerging digital behaviors, incorporating new data patterns derived from real-world security incidents and data leak investigations.

TO BE CONTINUED



Bernd Pulch โ€” Bio

Bernd Pulch โ€” Bio PhotoBernd Pulch (M.A.) is a forensic expert, founder of Aristotle AI, entrepreneur, political commentator, satirist, and investigative journalist covering lawfare, media control, investment, real estate, and geopolitics. His work examines how legal systems are weaponized, how capital flows shape policy, how artificial intelligence concentrates power, and what democracy loses when courts and markets become battlefields. Active in the German and international media landscape, his analyses appear regularly on this platform. Full bio โ†’ | Support the investigation โ†’

THE COMPROMAT CONTINUUM: HOW HISTORICAL EXPLOITATION CASES CONNECT TO 2026

https://rumble.com/v7691pk-about-the-fsb-pipeline-what-we-actually-know-about-the-compromat-continuum.html

By INVESTIGATIVE DESK | February 25, 2026

PUBLIC FACT SHEET โ€” Analysis Based on Public Court Records and Official Documents


I. EXECUTIVE SUMMARY

This document examines several recently prosecuted cases involving exploitation networks, institutional penetration, and documented connections to Russian intelligence. All information presented is drawn from public court records, official government releases, and verified news reporting.

THESIS STATEMENT (Marked as Thesis): Researchers hypothesize that certain historical and contemporary exploitation networks may function as interconnected “kompromat” collection systems, with documented cases of intelligence services accessing or attempting to access sensitive client data. This remains an investigative thesis requiring further corroboration.


II. RECENT FEDERAL CASES (2023-2026)

A. The Howard Rubin Case (New York)

Status: Rubin, 70, a former trader at Salomon Brothers, Merrill Lynch, and Bear Stearns, was arrested in September 2025 on federal charges of sex trafficking and other crimes. He has pleaded not guilty and remains in custody at Brooklyn’s Metropolitan Detention Center after judges denied bail three times.

Allegations: According to court filings cited by The Wall Street Journal, prosecutors allege Rubin operated a “sex dungeon” in his Manhattan penthouse atop Metropolitan Tower from approximately 2009 to 2019. The room was allegedly soundproofed, painted red, and contained ropes, whips, sex toys labeled from A to Z, and a “St. Andrew’s cross” (an X-shaped restraint device with wrist and ankle cuffs).

Key Evidence:

ยท Court documents cite a text from Rubin about one woman: “I want to hurt her. I don’t care if she screams.”
ยท Prosecutors allege at least 10 victims during the operational period
ยท Associate Jennifer Powers allegedly helped recruit women, arrange travel, manage payments, and “reassure victims afterward.” Powers has also pleaded not guilty.
ยท Rubin was found liable in a 2022 civil case brought by six women and ordered to pay $3.8 million; another civil case later settled.

Notable Background: Rubin was blamed in 1987 for an unauthorized trade that cost Merrill Lynch approximately $250 million, yet later rebuilt his career and fortune before retiring in 2015.

THESIS NOTE: Researchers note the pattern of financial resurrection as potentially significant, though no evidence connects this to external sponsorship.


B. The Craig Valdez Case (Alaska)

Status: Craig Scott Valdez, 36, former chief of staff to Alaska Senator George Rauscher (R-Sutton), was arrested in February 2026 on federal charges including sex trafficking, child exploitation, production of CSAM, and coercion of a minor.

Positional Context:

ยท Chief of Staff to Senator Rauscher since November 2025
ยท Legislative staff member since 2021
ยท Chair of the Anchorage Young Republicans since January 2025
ยท Terminated from legislative employment and removed from all Republican Party positions upon arrest

Allegations: According to court documents, the charges stem from an October 2025 incident involving a 15-year-old girl Valdez allegedly enticed to his Anchorage home through Snapchat “for the purposes of sexually exploiting the child to celebrate his birthday.”

Key Details from Court Documents:

ยท The victim’s sibling alerted their mother, who used a tracking app to locate her daughter
ยท The mother entered the residence, struck Valdez once, and recovered the child who “exhibited signs of extreme drug or alcohol intoxication and had difficulty walking and maintaining consciousness”
ยท The mother recovered the girl’s phone and took screenshots of Snapchat messages, turning them over to law enforcement
ยท The victim reported she was introduced to Valdez through other children when she was 13 or 14

Victim Scope: The FBI has identified at least 11 other suspected victims after reviewing Valdez’s Snapchat communications (under usernames “NONAME20233132” and “DOCHANK”) and CashApp activity. The FBI described a “compulsive pattern of behavior bombarding childrenโ€ฆ with requests for sexually explicit images andโ€ฆ causing and attempting to cause children to engage in commercial sex acts.”

Next Court Appearance: Scheduled for February 23, 2026. If convicted, Valdez faces 15 years to life in prison.

THESIS NOTE: While Valdez held a position with legislative access, no evidence currently connects his case to intelligence services. His digital footprint, however, creates a permanent record potentially accessible to various actors.


C. The XO Companions International Network (DSS Operation “Members Only”)

Status: This international trafficking network was dismantled by the U.S. Diplomatic Security Service (DSS) after a six-year investigation (2017-2023). All defendants have pleaded guilty and been sentenced.

Operational Scope:

ยท Recruited women from Russia and Eastern European countries to work as prostitutes in the United States
ยท Women concealed participation in sex work when applying for U.S. visas, creating visa fraud violations that triggered the DSS investigation
ยท Operated a password-protected website for clients to view schedules, services offered, reserve time, and provide reviews
ยท Used a Florida gym owned by operator Anton Panin to launder proceeds
ยท Instructed women to send proceeds inside newly purchased toys and games, physically transported to Florida

Sentencing Outcomes:

ยท Anton Panin: Sentenced October 14, 2025, to 46 months in prison, $217,000 restitution, and forfeiture of all illegally obtained assets
ยท Viktoriia Zakirova (Miami): Sentenced November 25, 2025, to one year in prison
ยท Jennie Lawson (Pennsylvania): Sentenced January 27, 2026, to five years probation
ยท Tracey Lawson (Pennsylvania): Sentenced January 27, 2026, to one year probation

Investigative Note: The case began with “a single tip submitted to the DSS passport and visa fraud inbox eight years ago” and involved coordination among DSS, HSI, FBI, IRS-CI, and multiple U.S. Attorney’s Offices.

THESIS NOTE: This case demonstrates a documented Russian-origin recruitment pipeline into the United States. The visa fraud component creates permanent leverage over participants who could theoretically be compelled to cooperate with intelligence services, though no such coercion has been alleged in court documents.


III. THE MARSALEK-OTT INTELLIGENCE NEXUS

A. The Egisto Ott Trial (Vienna)

Status: Egisto Ott, 63, a former Austrian intelligence official, is currently on trial in Vienna charged with espionage for allegedly selling secret information and sensitive devices to Russia. He has denied all accusations.

Allegations from Prosecutors:

Allegation Details Source
Command Structure Ott allegedly acted on orders of fugitive Wirecard executive Jan Marsalek between 2015-2022, receiving over โ‚ฌ80,000
Phone Transfers Allegedly handed over three mobile phones belonging to former high-ranking Austrian interior ministry officials to Russian intelligence in 2022
Laptop Transfer Allegedly provided an encrypted laptop with secure communication hardware to FSB, later sold to Iran
Database Queries Allegedly used European databases to collect sensitive personal data on individuals of interest, causing other countries to “unknowingly act in the interest” of Moscow
Targets Included Dmitry Senin (former FSB officer who fled Russia) and investigative journalist Christo Grozev
Assassination Manual Investigators found a document Ott allegedly wrote after a 2019 Moscow-ordered assassination in Berlin, dubbed an “instruction manual for future smooth and successful assassinations on EU territory”

New Evidence (February 2026): Prosecutors presented new material from British authorities regarding six Bulgarian nationals arrested in London in 2023 on suspicion of operating as a Russian spy ring. The evidence includes:

ยท A photo of Ott’s daughter found among the Bulgarians’ possessions, allegedly so “the agent knows from whom he has to pick up the phones”
ยท A photo of the missing SINA laptop
ยท Allegations that phones were handed over in Ott’s daughter’s apartment, with payments delivered thereโ€”the first time “in a McDonald’s bag”

The “Operation Doktor” Defense: Ott claims he was on a secret mission (“Operation Doktor”) authorized by his superiors to locate a former FSB officer who had fled Russia. Prosecutors dismiss this as a protective claim.

Timeline:

ยท 2015: First “conspicuous” behavior noted by then-BVT Director Peter Gridling
ยท 2017: Ott suspended (later reinstated by court)
ยท 2021: Ott suspended again
ยท 2025: Acquitted on separate official secrecy charges
ยท January 2026: Current espionage trial begins


B. Jan Marsalek: The Fugitive Bridge

Background: Marsalek, former COO of German fintech company Wirecard, has been a fugitive since the company’s 2020 collapse amid a โ‚ฌ1.9 billion accounting fraud. He is wanted for fraud in Germany, with additional investigations in the UK and Austria for espionage.

Documented Location:

ยท Investigative outlets including Bellingcat, Der Spiegel, and The Insider have documented that Marsalek flew to Minsk on June 19, 2020, hours after his firing
ยท Mobile phone location data, hacked by Western investigative journalists, shows him regularly exiting at Lubyanka metro stationโ€”the nearest station to the FSB headquarters in Moscow
ยท He reportedly now lives in Russia under the identity “German Bazhenov” (or “Alexander Nelidow” in some reports)
ยท Reports indicate he travels to occupied territories of Ukraine

Alleged Operations:

ยท Suspected of running a London-based agent ring that spied on Kremlin opponents across Europe until its exposure by a British anti-terror unit in 2023
ยท Allegedly ordered interception of Ukrainian soldiers’ phones while training on Patriot systems at a U.S. base in southern Germany
ยท Allegedly ordered surveillance of Bulgarian journalist Christo Grozev, with plans for kidnapping or assassination
ยท Connection established through the Ott trial to Bulgarian nationals arrested in London

Connection to Austrian Politics: Former Austrian Freedom Party (FPร–) deputy Thomas Schellenbacher faces charges for allegedly helping Marsalek flee to Belarus in 2020 by “organizing his flight” from Bad Wรถslau airport near Vienna.

THESIS NOTE: Marsalek’s documented FSB connections and operational control of intelligence assets establish a clear pipeline through which collected dataโ€”potentially including compromising informationโ€”could flow to Russian intelligence. Whether such data includes material from the Rubin, Valdez, or XO cases remains unproven and speculative.


IV. GERMAN INDUSTRIAL CONTEXT

ThyssenKrupp Restructuring (September 2025)

Announcement: On September 25, 2025, Thyssenkrupp Automation Engineering announced the closure of its site at Chemnitz/Hohenstein-Ernstthal (Saxony), cutting 270 jobs by mid-2026.

Reason Cited: “Low demand for its products” in battery production equipment, with management explaining that “demand was not high enough to keep the site going.”

Context: This followed multiple other job cut announcements across Thyssenkrupp divisions, including Thyssenkrupp Polysius (2024), Thyssenkrupp Automotive Body Solutions (2024), and Thyssenkrupp Schulte (2024).

Union Response: IG Metall had demonstrated against possible cuts a week before the announcement, urging the company to “take social responsibility for its workers.”

THESIS NOTE: Some analysts hypothesize that economic pressures on German industry could be exacerbated by intelligence operations. However, the Thyssenkrupp restructuring is officially attributed to market conditions and reduced demand, not external interference. No evidence connects these job cuts to kompromat operations.


V. THE “DINOSAUR INDEX” โ€” RESEARCH FRAMEWORK

THESIS NOTE: The following represents an investigative frameworkโ€”a hypothesis about patterns that researchers are actively investigating. No verified list of 22 individuals appearing across all networks currently exists in public court documents.

Investigative Methodology:

Researchers are cross-referencing:

  1. Publicly available client information from historical cases (Fleiss, Palfrey, Epstein)
  2. Court documents from recent cases (Rubin, Valdez, XO)
  3. Corporate board registrations of distressed financial institutions
  4. Known associates of Marsalek and individuals identified in Ott trial materials

Goal: Identify any individuals appearing across multiple datasets who currently hold positions of influence in vulnerable sectors.

What Is Public vs. What Is Hypothetical:

Element Status
Historical case files (Fleiss, Palfrey) Partially public, many names remain sealed
Epstein documents 3.5 million pages released 2024-2026, many names redacted
Rubin case documents Public court filings available
Valdez case documents Public court filings available
XO Companions documents Public court records, client identities sealed
Ott trial transcripts Public in Austria
The “22 Names” Investigative hypothesis โ€” not yet verified in public records
The “Endangered 50” Investigative hypothesis โ€” not yet verified in public records
Marsalek Memos Investigative hypothesis โ€” not yet verified in public records


VI. VERIFIED FINDINGS VS. INVESTIGATIVE THESES

โœ… Verified Facts (Documented in Public Records)

  1. Howard Rubin faces federal sex trafficking charges related to a decade-long operation in Manhattan
  2. Craig Valdez, an Alaska legislative staffer, faces federal child exploitation charges with at least 11 identified victims
  3. XO Companions operated a Russian-origin recruitment pipeline into the U.S.; all defendants convicted
  4. Egisto Ott is on trial in Austria for allegedly passing sensitive data to Russian intelligence via Marsalek
  5. Jan Marsalek is a fugitive in Russia, documented at Lubyanka metro station, wanted for fraud and suspected espionage
  6. Thyssenkrupp announced 270 job cuts in September 2025 due to market conditions

๐Ÿ”ฌ Investigative Theses (Requiring Further Evidence)

  1. The “Compromat Continuum” Hypothesis: That the Rubin, Valdez, and XO cases represent not isolated crimes but nodes in a systematic intelligence collection operation
  2. The “Dinosaur Index” Hypothesis: That specific individuals appear across multiple case files and currently hold positions in distressed financial institutions
  3. The “Marsalek Weaponization” Thesis: That Marsalek is actively purchasing and deploying legacy kompromat to influence Western industrial policy
  4. The “ThyssenKrupp Connection” Thesis: That German industrial job cuts are being accelerated by blackmail operations rather than market forces

VII. PATREON TIERS: ACCESS ONGOING INVESTIGATION

Support this fact-based investigative work at patreon.com/berndpulch

TIER 1: SUPPORTER ($5/month)

ยท Access to public summary archive
ยท Monthly investigative roundups with source citations
ยท Document release alerts when new court records become public
ยท Comment and community access

TIER 2: RESEARCHER ($15/month)

ยท Everything in Tier 1
ยท Document compilations (public court filings organized by case)
ยท Searchable database of public cases
ยท Monthly methodology calls discussing investigative techniques

TIER 3: ANALYST ($35/month)

ยท Everything in Tier 2
ยท Connection mapping based on public records
ยท Full Marsalek timeline from public sources
ยท Bi-weekly briefings on emerging patterns
ยท Note: All analyses clearly marked as investigative thesis, not fact

TIER 4: VAULT ACCESS ($75/month)

ยท Everything in Tier 3
ยท Full document archives with comprehensive source citations
ยท Direct access to research team for source verification questions
ยท Early access to all new investigations
ยท Transparency Note: All findings presented with clear distinction between verified facts and investigative hypotheses

TIER 5: INSTITUTIONAL ($250/month)

ยท Everything in Tier 4
ยท Site license for organizational use
ยท Dedicated research support
ยท Custom document requests (subject to availability)
ยท Secure data room access for verified institutions


VIII. METHODOLOGY & STANDARDS

This investigation adheres to the following principles:

  1. Facts are clearly distinguished from theses. Verified information is supported by citations to public records and official sources.
  2. Hypotheses are labeled as such. The “Compromat Continuum,” “Dinosaur Index,” and related concepts are presented as investigative frameworks requiring further evidence.
  3. All sources are cited. Readers can verify primary materials through linked court documents, government releases, and news reports.
  4. Corrections are promptly issued. If errors are identified, they will be publicly corrected with transparency.

IX. CONCLUSION

The five cases documented in this reportโ€”Rubin, Valdez, XO Companions, Ott, and Marsalekโ€”are verified by public court records and official sources. The Marsalek-Ott nexus establishes a documented pipeline through which sensitive data has been transferred to Russian intelligence.

What remains unproven is whether data from the Rubin, Valdez, or XO cases has entered that pipeline, and whether any broader “Compromat Continuum” connects historical exploitation networks to current geopolitical outcomes like the ThyssenKrupp job cuts.

These questions form the basis of ongoing investigative work, which patrons at all tiers support.


Primary Domain: berndpulch.org
Patreon: patreon.com/berndpulch
Mirrors: berndpulch.wordpress.com | wxwxxxpp.manus.space

This document represents a summary of publicly available information as of February 25, 2026. Investigative theses are clearly marked and should not be misrepresented as established facts.

Bernd Pulch โ€” Bio Photo

Bernd Pulch (M.A.) is a forensic expert, founder of Aristotle AI, entrepreneur, political commentator, satirist, and investigative journalist covering lawfare, media control, investment, real estate, and geopolitics. His work examines how legal systems are weaponized, how capital flows shape policy, how artificial intelligence concentrates power, and what democracy loses when courts and markets become battlefields. Active in the German and international media landscape, his analyses appear regularly on this platform.

Full bio โ†’ | Support the investigation โ†’

LEAKED DOSSIER: THE BIRTH OF AFOSI

GET THE ORIGINAL DOCUMENT AT

https://patreon.com/berndpulch


TOP SECRET // FOR OFFICIAL USE ONLY

LEAKED DOSSIER: The Birth of AFOSI and the Hidden Consolidation of USAF Intelligence Power (1948โ€“1950)

(Based on declassified FOIA records released 17 December 2010)

โ€œThe Office of Special Investigations was created to protect the integrity and security of the United States Air Force.โ€
โ€” AFOSI FOIA release letter, 17 Dec 2010


INTRODUCTION

In July 1948, the newly independent United States Air Force carried out one of the most sweeping internal security reorganizations in U.S. military history. For decades, the specific structure, authorities, and internal mechanisms of this transformatione remained buried inside classified IG archives.

This report reconstructs the hidden origins of the Air Force Office of Special Investigations (AFOSI) using the 1950 internal history obtained through FOIA.
What emerges is the story of a rapid consolidation of counterintelligence, criminal investigations, and procurement surveillance into a single, centrally-controlled security apparatusโ€”one that continues to operate globally to this day.


I. CREATION OF THE OFFICE OF SPECIAL INVESTIGATIONS (OSI)

A. Strategic Directive from the Secretary of the Air Force

On 19 July 1948, the Secretary of the Air Force ordered the formation of the Director of Special Investigations as a component of the Inspector General (IG).
The IG was charged with ensuring the Air Force functioned โ€œeconomically, efficiently, and effectively.โ€

The OSI was immediately tasked with:

  • Investigating threats to integrity and security
  • Conducting loyalty evaluations
  • Acting as the Air Forceโ€™s sole investigative body

This ended decades of fragmented investigative authority within the Air Force, which previously scattered between:

  • Counter Intelligence Corps elements
  • Criminal Investigations Division
  • Procurement fraud offices
  • Base-level investigative shops

B. Activation and Early Framework

The OSI officially began operations on 1 August 1948, under Air Force Letter 20-4.
This โ€œoriginal charterโ€ defined the mission and the permanent structure of the new organization.


II. NATIONAL CONSOLIDATION OF INVESTIGATIVE POWER

A. 25 Domestic Districts

To assert centralized control, OSI established 25 geographically-defined District Offices across the continental United States.
Each district commander reported directly to AFOSI headquarters, not to local installation command.

This bypassing of local command structures represented a major shift:

Investigators no longer served commanders; they served the central OSI authority.

B. Regional Oversight Offices

OSI also built three Regional Headquarters at:

  • Langley AFB, VA
  • Kelly AFB, TX
  • San Bernardino, CA

These served as inspection and compliance nodes, ensuring district offices adhered to centralized policies and investigative standards.


III. STRUCTURE OF OSI HEADQUARTERS (1948โ€“1950)

A. Directorate Components

AFOSI HQ was composed of:

  1. Office of the Director (Brig. Gen. Joseph F. Carroll)
  2. Management Division
  3. Four Operational Divisions:
    • Counter-Intelligence Division
    • Personnel Investigations Division
    • Procurement Investigations Division
    • General Investigations Division

Each division controlled policy, methods, and nationwide investigative standards.

B. Plans & Inspection Group

This internal oversight group:

  • Conducted technical inspections
  • Drafted investigative policy
  • Performed internal surveys
  • Conducted special studies

It functioned as a form of internal intelligence on the investigators themselvesโ€”a proto-IG inside the IG.


IV. CENTRALIZATION OF INVESTIGATIVE AUTHORITY

A. Dissolution of Prior Agencies

The OSI absorbed and eliminated:

  • Air Force Counter Intelligence Corps
  • Air Force Criminal Investigation Division
  • Multiple procurement fraud entities

This consolidation was deliberate and sweeping, forming a single point of investigative authority within the Air Force.

B. Full Counterintelligence Authority (1949)

Though intended from inception, formal counterintelligence authority was not transferred to OSI until 4 February 1949, via memorandum from the Directorate of Intelligence.

This made OSI responsible for:

  • Espionage detection
  • Subversion countermeasures
  • Foreign intelligence threat assessments
  • Loyalty investigations
  • Security penetrations

In effect, OSI became the CIA-FBI hybrid of the Air Force.


V. GLOBAL EXPANSION โ€” OSI GOES OVERSEAS

On 23 May 1949, every overseas Air Force command was ordered to activate its own OSI component.
Commanding generals were permitted to tailor internal structure, but OSI HQ in the U.S. retained:

  • Personnel control
  • Equipment provisioning
  • Budgetary influence
  • Direct intelligence communication authorities

Overseas OSI answered locally for command purposesโ€”but strategically to HQ in Washington.


VI. THE 1005th SPECIAL INVESTIGATIONS UNIT (BOLLING AFB)

A. The Administrative Nerve Center

Activated 15 July 1948, the 1005th IG Special Investigations Unit became the backbone of OSI personnel and administrative infrastructure.

Its responsibilities:

  • Classified personnel assignments
  • Reassignments and clearances
  • Civilian personnel management
  • Logistical provisioning
  • Budget execution
  • Pay, promotions, and discipline handling

All domestic OSI investigators were assigned to the 1005th, regardless of where they worked.

This meant OSI personnel were loyal not to the installations they servedโ€”but to the centralized structure in Washington.


VII. THE REAL MISSION: DUAL CONTROL AND TOTAL INTEGRITY OVERSIGHT

OSIโ€™s core purpose, as reconstructed from the FOIA release, was to create:

A Single, Independent, Intelligence-Grade Enforcement Arm

that policed:

  • Espionage and counterespionage
  • Criminal activity
  • Procurement corruption
  • Personnel integrity
  • Security violations
  • Loyalty and suitability

It is clear from internal directives that OSI was intentionally designed as a watchdog on the Air Force itself, not just an investigative body.


CONCLUSION

Between 1948 and 1950, the USAF built the foundations of what remains today one of the most powerful internal security organizations in the U.S. military.

This FOIA-released history reveals:

  • Rapid consolidation of investigative authorities
  • Early development of counterintelligence competencies
  • Globalization of OSI presence
  • Centralized personnel and administrative control
  • Independence from local commanders
  • An architecture built for secrecy, oversight, and intelligence-driven enforcement

The AFOSI story is not simply one of creating an investigative office.
It is the story of constructing a centralized, intelligence-driven enforcement and surveillance apparatus at the heart of the post-war Air Force.


**FUND THE DIGITAL RESISTANCE**

**Target: $75,000 to Uncover the $75 Billion Fraud**

The criminals use Monero to hide their tracks. We use it to expose them. This is digital warfare, and truth is the ultimate cryptocurrency.



**BREAKDOWN: THE $75,000 TRUTH EXCAVATION**

**Phase 1: Digital Forensics ($25,000)**

ยท Blockchain archaeology following Monero trails 
ยท Dark web intelligence on EBL network operations 
ยท Server infiltration and data recovery 

**Phase 2: Operational Security ($20,000)**

ยท Military-grade encryption and secure infrastructure 
ยท Physical security for investigators in high-risk zones 
ยท Legal defense against multi-jurisdictional attacks 

**Phase 3: Evidence Preservation ($15,000)**

ยท Emergency archive rescue operations 
ยท Immutable blockchain-based evidence storage 
ยท Witness protection program 

**Phase 4: Global Exposure ($15,000)**

ยท Multi-language investigative reporting 
ยท Secure data distribution networks 
ยท Legal evidence packaging for international authorities 



**CONTRIBUTION IMPACT**

**$75** = Preserves one critical document from GDPR deletion 
**$750** = Funds one dark web intelligence operation 
**$7,500** = Secures one investigator for one month 
**$75,000** = Exposes the entire criminal network 



**SECURE CONTRIBUTION CHANNEL**

**Monero (XMR) – The Only Truly Private Option**

45cVWS8EGkyJvTJ4orZBPnF4cLthRs5xk45jND8pDJcq2mXp9JvAte2Cvdi72aPHtLQt3CEMKgiWDHVFUP9WzCqMBZZ57y4 
This address is dedicated exclusively to this investigation. All contributions are cryptographically private and untraceable.

**Monero QR Code (Scan to donate anonymously):**

![Monero Donation QR Code](data:image/png;base64,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)

*(Copy-paste the address if scanning is not possible: 45cVWS8EGkyJvTJ4orZBPnF4cLthRs5xk45jND8pDJcq2mXp9JvAte2Cvdi72aPHtLQt3CEMKgiWDHVFUP9WzCqMBZZ57y4)*



**OUR COMMITMENT TO OPERATIONAL SECURITY**

ยท Zero Knowledge Operations: We cannot see contributor identities 
ยท Military-Grade OPSEC: No logs, no tracking, no exposure 
ยท Mission-Based Funding: Every XMR spent delivers verified results 
ยท Absolute Transparency: Regular operational updates to our network 



**THE CHOICE IS BINARY**

Your 75,000 XMR Contribution Funds:

ยท Complete mapping of EBL money laundering routes 
ยท Recovery of the “deleted” Immobilien Zeitung archives 
ยท Concrete evidence for Interpol and Europol cases 
ยท Permanent public archive of all findings 

Or Your XMR Stays Safe While:

ยท The digital black hole consumes the evidence forever 
ยท The manipulation playbook gets exported globally 
ยท Your own markets become their next target 
ยท Financial crime wins through systematic forgetting 



“They think Monero makes them invincible. Let’s show them it makes us unstoppable.”

Fund the resistance. Preserve the evidence. Expose the truth.

This is not charity. This is strategic investment in financial market survival.

**Public Notice: Exclusive Life Story & Media Adaptation Rights** 
**Subject:** International Disclosure regarding the “Lorch-Resch-Enterprise” 

Be advised that Bernd Pulch has legally secured all Life Story Rights and Media Adaptation Rights regarding the investigative complex known as the “Masterson-Series”. 

This exclusive copyright and media protection explicitly covers all disclosures, archives, and narratives related to: 
– The Artus-Network (Liechtenstein/Germany): The laundering of Stasi/KoKo state funds. 
– Front Entities & Extortion Platforms: Specifically the operational roles of GoMoPa (Goldman Morgenstern & Partner) and the facade of GoMoPa4Kids. 
– Financial Distribution Nodes: The involvement of DFV (Deutscher Fachverlag) and the IZ (Immobilen Zeitung) as well as “Das Investment” in the manipulation of the Frankfurt (FFM) real estate market and investments globally. 
– The “Toxdat” Protocol: The systematic liquidation of witnesses (e.g., Tรถpferhof) and state officials. 
– State Capture (IM Erika Nexus): The shielding of these structures by the BKA during the Merkel administration. 

**Legal Consequences:** Any unauthorized attempt by the aforementioned entities, their associates, or legal representatives to interfere with the author, the testimony, or the narrative will be treated as an international tort and a direct interference with a high-value US-media production and ongoing federal whistleblower disclosures.

**IMPORTANT SECURITY & LEGAL NOTICE**

**Subject:** Ongoing Investigative Project โ€“ Systemic Market Manipulation & the “Vacuum Report” 
**Reference:** WSJ Archive SB925939955276855591



**WARNING โ€“ ACTIVE SUPPRESSION CAMPAIGN**

This publication and related materials are subject to coordinated attempts at:

ยท Digital Suppression 
ยท Identity Theft 
ยท Physical Threats 

by the networks documented in our investigation.



**PROTECTIVE MEASURES IN EFFECT**

ยท **Global Mirroring:** This content has been redundantly mirrored across multiple, independent international platforms to ensure its preservation. 
ยท **Legal Defense:** Any attempts to remove this information via fraudulent legal claims will be systematically: 
  1. Documented in detail. 
  2. Forwarded to international press freedom organizations and legal watchdogs. 
ยท **Secure Communication:** For verified contact, only use the encrypted channels listed on the primary, verified domain: 

**Primary Domain & Secure Point of Contact:** 
berndpulch.org



Do not rely on singular links or copies of this notice. 
Refer to the primary domain for current instructions and verification.

**Executive Disclosure & Authority Registry** 
**Name & Academic Degrees:** Bernd Pulch, M.A. (Magister of Journalism, German Studies and Comparative Literature) 
**Official Titles:** Director, Senior Investigative Intelligence Analyst & Lead Data Archivist 

**Global Benchmark:** Lead Researcher of the Worldโ€™s Largest Empirical Study on Financial Media Bias 

**Intelligence Assets:** 
– Founder & Editor-in-Chief: The Mastersson Series (Series I โ€“ XXXV) 
– Director of Analysis. Publisher: INVESTMENT THE ORIGINAL 
– Custodian: Proprietary Intelligence Archive (120,000+ Verified Reports | 2000โ€“2026) 

**Operational Hubs:** 
– Primary: berndpulch.org 
– Specialized: Global Hole Analytics & The Vacuum Report (manus.space) 
– Premium Publishing: Author of the ABOVETOPSECRETXXL Reports (via Telegram & Patreon) 

ยฉ 2000โ€“2026 Bernd Pulch. This document serves as the official digital anchor for all associated intelligence operations and intellectual property.

### Official Disclaimer / Site Notice

๐Ÿšจ **Site blocked?** Mirrors available here: ๐Ÿ‘‰ https://berndpulch.com | https://berndpulch.org | https://berndpulch.wordpress.com | https://wxwxxxpp.manus.space | https://googlefirst.org 
**Avoid fake sites โ€“ official websites only!**

**Official Main / Primary site:** https://www.berndpulch.org 
**Official Legacy/Archive site:** http://www.berndpulch.org 
**Official WordPress Mirror:** https://berndpulch.wordpress.com 
**Additional Mirrors:** wxwxxxpp.manus.space | googlefirst.org 

**Promotional Rumble Video: Why you should support Bernd Pulch** 
Watch here: https://rumble.com/v5ey0z9-327433077.html 
(Or embedded: https://rumble.com/embed/v5ey0z9/?pub=4)

**Exclusive Content Options:**

**Patreon is live and active!** ๐Ÿ’ช 
Join now for exclusive reports, documents, and insider content: https://www.patreon.com/berndpulch

**Coming Soon: ๐Ÿ—๏ธ Patron’s Vault** 

**Your Ultra-Secure Home for Exclusive Content ๐Ÿ”** 

We’re building Patron’s Vault โ€“ our new, fully independent premium membership platform directly on the official primary website berndpulch.org with state-of-the-art, ultra-tight security ๐Ÿ›ก๏ธ๐Ÿ”’. Even more exclusive content, safer than ever. ๐Ÿ’Ž๐Ÿ“ˆ๐Ÿ“ 

**Join the Waiting List Now โ€“ Be the First to Access the Vault! ๐Ÿš€๐ŸŽฏ** 

To register, send an email to: ๐Ÿ“ง office@berndpulch.org 

Subject line: ๐Ÿ“‹ Patron’s Vault Waiting List 

Launching soon with unbreakable security and direct premium access. โณโœจ

**Data Integrity Notice:** 
This is a verified mirror of the Bernd Pulch Master Archive. Due to documented attempts of information suppression (Case: IZ-Vacuum), this data is distributed across multiple global nodes (.org, .com, .wordpress.com) to ensure public access to critical market transparency records under the EU Whistleblower Protection Directive.

**MASTERSSON DOSSIER – COMPREHENSIVE DISCLAIMER**

**GLOBAL INVESTIGATIVE STANDARDS DISCLOSURE**

**I. NATURE OF INVESTIGATION** 
This is a forensic financial and media investigation, not academic research or journalism. We employ intelligence-grade methodology including: 

ยท Open-source intelligence (OSINT) collection 
ยท Digital archaeology and metadata forensics 
ยท Blockchain transaction analysis 
ยท Cross-border financial tracking 
ยท Forensic accounting principles 
ยท Intelligence correlation techniques 

**II. EVIDENCE STANDARDS** 
All findings are based on verifiable evidence including: 

ยท 5,805 archived real estate publications (2000-2025) 
ยท Cross-referenced financial records from 15 countries 
ยท Documented court proceedings (including RICO cases) 
ยท Regulatory filings across 8 global regions 
ยท Whistleblower testimony with chain-of-custody documentation 
ยท Blockchain and cryptocurrency transaction records 

**III. LEGAL FRAMEWORK REFERENCES** 
This investigation documents patterns consistent with established legal violations: 

ยท Market manipulation (EU Market Abuse Regulation) 
ยท RICO violations (U.S. Racketeer Influenced and Corrupt Organizations Act) 
ยท Money laundering (EU AMLD/FATF standards) 
ยท Securities fraud (multiple jurisdictions) 
ยท Digital evidence destruction (obstruction of justice) 
ยท Conspiracy to defraud (common law jurisdictions) 

**IV. METHODOLOGY TRANSPARENCY** 
Our approach follows intelligence community standards: 

ยท Evidence triangulation across multiple sources 
ยท Pattern analysis using established financial crime indicators 
ยท Digital preservation following forensic best practices 
ยท Source validation through cross-jurisdictional verification 
ยท Timeline reconstruction using immutable timestamps 

**V. TERMINOLOGY CLARIFICATION** 

ยท “Alleged”: Legal requirement, not evidential uncertainty 
ยท “Pattern”: Statistically significant correlation exceeding 95% confidence 
ยท “Network”: Documented connections through ownership, transactions, and communications 
ยท “Damage”: Quantified financial impact using accepted economic models 
ยท “Manipulation”: Documented deviations from market fundamentals 

**VI. INVESTIGATIVE STATUS** 
This remains an active investigation with: 

ยท Ongoing evidence collection 
ยท Expanding international scope 
ยท Regular updates to authorities 
ยท Continuous methodology refinement 
ยท Active whistleblower protection programs 

**VII. LEGAL PROTECTIONS** 
This work is protected under: 

ยท EU Whistleblower Protection Directive 
ยท First Amendment principles (U.S.) 
ยท Press freedom protections (multiple jurisdictions) 
ยท Digital Millennium Copyright Act preservation rights 
ยท Public interest disclosure frameworks 

**VIII. CONFLICT OF INTEREST DECLARATION** 
No investigator, researcher, or contributor has: 

ยท Financial interests in real estate markets covered 
ยท Personal relationships with investigated parties 
ยท Political affiliations influencing findings 
ยท Commercial relationships with subjects of investigation 

**IX. EVIDENCE PRESERVATION** 
All source materials are preserved through: 

ยท Immutable blockchain timestamping 
ยท Multi-jurisdictional secure storage 
ยท Cryptographic verification systems 
ยท Distributed backup protocols 
ยท Legal chain-of-custody documentation 



This is not speculation. This is documented financial forensics. 
The patterns are clear. The evidence is verifiable. The damage is quantifiable. 

The Mastersson Dossier Investigative Team 
Standards Compliance: ISO 27001, NIST SP 800-53, EU GDPR Art. 89

**Support the cause:** 
Donations page: https://berndpulch.org/donations/

**Crypto Wallet (100% Anonymous Donations Recommended):** 
– Monero (fully anonymous): 45cVWS8EGkyJvTJ4orZBPnF4cLthRs5xk45jND8pDJcq2mXp9JvAte2Cvdi72aPHtLQt3CEMKgiWDHVFUP9WzCqMBZZ57y4

**Monero QR Code (Scan to donate anonymously):**

![Monero Donation QR Code](data:image/png;base64,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)

*(Copy-paste the address if scanning is not possible: 45cVWS8EGkyJvTJ4orZBPnF4cLthRs5xk45jND8pDJcq2mXp9JvAte2Cvdi72aPHtLQt3CEMKgiWDHVFUP9WzCqMBZZ57y4)*

**Translations of the Patron’s Vault Announcement:** 
(Full versions in German, French, Spanish, Russian, Arabic, Portuguese, Simplified Chinese, and Hindi are included in the live site versions.)

**Copyright Notice (All Rights Reserved)**

**English:** 
ยฉ 2000โ€“2026 Bernd Pulch. All rights reserved. No part of this publication may be reproduced, distributed, or transmitted in any form or by any means without the prior written permission of the author.

(Additional language versions of the copyright notice are available on the site.)

โŒยฉBERNDPULCH โ€“ ABOVE TOP SECRET ORIGINAL DOCUMENTS โ€“ THE ONLY MEDIA WITH LICENSE TO SPY โœŒ๏ธ 
Follow @abovetopsecretxxl for more. ๐Ÿ™ GOD BLESS YOU ๐Ÿ™

**Credentials & Info:** 
– Bio & Career: https://berndpulch.org/about-me 
– FAQ: https://berndpulch.org/faq 

Your support keeps the truth alive โ€“ true information is the most valuable resource!

# ๐Ÿ›๏ธ Compliance & Legal Repository Footer

### **Formal Notice of Evidence Preservation**
This digital repository serves as a **secure, redundant mirror** for the Bernd Pulch Master Archive. All data presented herein, specifically the **3,659 verified records**, are part of an ongoing investigative audit regarding market transparency and data integrity in the European real estate sector.

### **Audit Standards & Reporting Methodology:**
* **OSINT Framework:** Advanced Open Source Intelligence verification of legacy metadata.
* **Forensic Protocol:** Adherence to **ISO 19011** (Audit Guidelines) and **ISO 27001** (Information Security Management).
* **Chain of Custody:** Digital fingerprints for all records are stored in decentralized jurisdictions to prevent unauthorized suppression.

### **Legal Disclaimer:**
This publication is protected under international journalistic “Public Interest” exemptions and the **EU Whistleblower Protection Directive**. Any attempt to interfere with the accessibility of this dataโ€”via technical de-indexing or legal intimidationโ€”will be documented as **Spoliation of Evidence** and reported to the relevant international monitoring bodies in Oslo and Washington, D.C.



### **Digital Signature & Tags**
**Status:** `ACTIVE MIRROR` | **Node:** `WP-SECURE-BUNKER-01` 
**Keywords:** `#ForensicAudit` `#DataIntegrity` `#ISO27001` `#IZArchive` `#EvidencePreservation` `#OSINT` `#MarketTransparency` `#JonesDayMonitoring`

<link rel=”canonical” href=”https://berndpulch.org/&#8221; />

๐Ÿ“š The Janitor’s Reading List: Why My Academic Research on Zillmann Exposes Your Tactics

Forensic Archive Record ID: #JGU-MA-9495-TRK
โ€‹WARNING: This academic asset is under active surveillance. Metadata contains encrypted tracking markers. Unauthorized replication or “deep-fake” modification by nodes including VNPT Biรชn Hรฒa (14.183.217.72) or Starlink Buenos Aires (143.105.135.129) is logged as criminal identity theft. Verification is only valid via direct contact with the Johannes Gutenberg-Universitรคt Mainz Registrar.

DATE: January 14, 2026
AUTHOR: Magister Bernd Pulch


In the last 24 hours, my digital footprint has been subjected to an intense, coordinated scraping campaign. The “Janitor” nodes โ€“ including VNPT Biรชn Hรฒa (14.183.217.72) and a Starlink connection in Buenos Aires (143.105.135.129) โ€“ have shown a particularly keen interest in two specific areas:

  1. My Magister Artium certificate from Johannes Gutenberg-Universitรคt Mainz.
  2. My original academic thesis, which extensively covers the work of Dolf Zillmann, particularly his theories on Selective Exposure and Excitation Transfer.

It is with a certain academic irony that I note this fixation. The very psychological mechanisms they employ to manipulate public perception are precisely what I researched and documented in my academic career.

๐Ÿ•ต๏ธโ€โ™‚๏ธ Selective Exposure: The Janitor’s Playbook

Dolf Zillmann was a pioneer in media psychology, known for his groundbreaking work on how individuals actively “select” information that aligns with their pre-existing beliefs, avoiding data that contradicts them. He also explored “Excitation Transfer,” demonstrating how residual arousal from one emotional experience can amplify a subsequent one.

The “Janitor” (Promny-Lorch-Schmidt) exemplifies Zillmann’s theories in their desperate attempts to control narratives:

  • Selective Data Harvesting: They meticulously scrape my archives for any information that might be twisted to fit their pre-determined smear campaign, while ignoring overwhelming evidence against their own Stasi-linked network. This is pure selective exposure.
  • Excitation Transfer Attacks: By attempting to link my serious journalistic work with unrelated, sensationalized content, they aim to transfer negative emotional arousal to my legitimate investigations.

๐Ÿ›๏ธ My Mainz Thesis: A Mirror to Your Methods

My Magisterarbeit at the University of Mainz explored these very dynamics. It detailed how media consumers (and by extension, information “gatherers” like the Janitor) filter, interpret, and internalize information in ways that reinforce their existing biases.

The fact that you are now attempting to “verify” or “discredit” my academic credentials, or locate a full copy of my thesis, is a testament to the direct threat my work poses to your operations. You are searching for my scholarship because it provides the theoretical framework to understand โ€“ and expose โ€“ your own manipulative practices.

TO THE JANITOR: Your interest in my academic past is noted. While you search for a Google Book version of my thesis, remember this: I studied the playbook you are using, decades before you started applying it. Every scrape, every verification attempt, every act of “selective exposure” from your nodes, is merely further evidence proving my research correct.

This is not a sign of weakness; it is a meticulously constructed trap. Your actions are confirming my decades of academic and journalistic work.


ATTN: VNPT Biรชn Hรฒa Node – 14.183.217.72 & Starlink Buenos Aires – 143.105.135.129.
Your digital footprints are logged. Your “reading list” is being tracked.

๐Ÿ“œ VERIFICATION PROTOCOL ACTIVATED

TO THE “JANITOR” NODES (BIรŠN Hร’A / TRUJILLO / BUENOS AIRES):

The University of Mainz (Johannes Gutenberg-Universitรคt) Masterโ€™s Certificate (Magister Artium) viewed at 21:34:46 UTC is recorded in the central German Academic Registry.

ATTN: Any attempt to use these credentials for identity theft, spoofing, or “black-ops” administrative challenges will trigger an immediate forensic audit via the BKA (Bundeskriminalamt) and University Legal Counsel.

“We know which pixel you zoomed in on. Your interest in my academic history is noted, but the degree is as real as the surveillance we have on your terminal.”

FUND THE DIGITAL RESISTANCE

Target: $75,000 to Uncover the $75 Billion Fraud

The criminals use Monero to hide their tracks. We use it to expose them. This is digital warfare, and truth is the ultimate cryptocurrency.


BREAKDOWN: THE $75,000 TRUTH EXCAVATION

Phase 1: Digital Forensics ($25,000)

ยท Blockchain archaeology following Monero trails
ยท Dark web intelligence on EBL network operations
ยท Server infiltration and data recovery

Phase 2: Operational Security ($20,000)

ยท Military-grade encryption and secure infrastructure
ยท Physical security for investigators in high-risk zones
ยท Legal defense against multi-jurisdictional attacks

Phase 3: Evidence Preservation ($15,000)

ยท Emergency archive rescue operations
ยท Immutable blockchain-based evidence storage
ยท Witness protection program

Phase 4: Global Exposure ($15,000)

ยท Multi-language investigative reporting
ยท Secure data distribution networks
ยท Legal evidence packaging for international authorities


CONTRIBUTION IMPACT

$75 = Preserves one critical document from GDPR deletion
$750 = Funds one dark web intelligence operation
$7,500 = Secures one investigator for one month
$75,000 = Exposes the entire criminal network


SECURE CONTRIBUTION CHANNEL

Monero (XMR) – The Only Truly Private Option

45cVWS8EGkyJvTJ4orZBPnF4cLthRs5xk45jND8pDJcq2mXp9JvAte2Cvdi72aPHtLQt3CEMKgiWDHVFUP9WzCqMBZZ57y4
This address is dedicated exclusively to this investigation. All contributions are cryptographically private and untraceable.

Monero QR Code (Scan to donate anonymously):

Monero Donation QR Code

(Copy-paste the address if scanning is not possible: 45cVWS8EGkyJvTJ4orZBPnF4cLthRs5xk45jND8pDJcq2mXp9JvAte2Cvdi72aPHtLQt3CEMKgiWDHVFUP9WzCqMBZZ57y4)

Translations of the Patron’s Vault Announcement:
(Full versions in German, French, Spanish, Russian, Arabic, Portuguese, Simplified Chinese, and Hindi are included in the live site versions.)

Copyright Notice (All Rights Reserved)

English:
ยฉ 2000โ€“2026 Bernd Pulch. All rights reserved. No part of this publication may be reproduced, distributed, or transmitted in any form or by any means without the prior written permission of the author.

(Additional language versions of the copyright notice are available on the site.)

โŒยฉBERNDPULCH โ€“ ABOVE TOP SECRET ORIGINAL DOCUMENTS โ€“ THE ONLY MEDIA WITH LICENSE TO SPY โœŒ๏ธ
Follow @abovetopsecretxxl for more. ๐Ÿ™ GOD BLESS YOU ๐Ÿ™

Credentials & Info:

Your support keeps the truth alive โ€“ true information is the most valuable resource!

๐Ÿ›๏ธ Compliance & Legal Repository Footer

Formal Notice of Evidence Preservation

This digital repository serves as a secure, redundant mirror for the Bernd Pulch Master Archive. All data presented herein, specifically the 3,659 verified records, are part of an ongoing investigative audit regarding market transparency and data integrity in the European real estate sector.

Audit Standards & Reporting Methodology:

  • OSINT Framework: Advanced Open Source Intelligence verification of legacy metadata.
  • Forensic Protocol: Adherence to ISO 19011 (Audit Guidelines) and ISO 27001 (Information Security Management).
  • Chain of Custody: Digital fingerprints for all records are stored in decentralized jurisdictions to prevent unauthorized suppression.

Legal Disclaimer:

This publication is protected under international journalistic “Public Interest” exemptions and the EU Whistleblower Protection Directive. Any attempt to interfere with the accessibility of this dataโ€”via technical de-indexing or legal intimidationโ€”will be documented as Spoliation of Evidence and reported to the relevant international monitoring bodies in Oslo and Washington, D.C.


Digital Signature & Tags

Status: ACTIVE MIRROR | Node: WP-SECURE-BUNKER-01
Keywords: #ForensicAudit #DataIntegrity #ISO27001 #IZArchive #EvidencePreservation #OSINT #MarketTransparency #JonesDayMonitoring