Featured

The Good Uncles: GoMoPa & GoMoPa4Kids exposed-Does the German Government promote Pedophiles? Powered by IZ/GoMoPa4Kids/Klaus Jeffrey Maurischat-Epstein

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://rumble.com/embed/v1knkj4/?pub=4

Offizieller GoMoPa-Capo, “Kinderfreund, Fussballjugendfoerderer Maurischat” IZ-Network-Element.

The text reads as follows:

QUOTE

“Circumcised boys can no longer masturbate!

Read more: The Good Uncles: GoMoPa & GoMoPa4Kids exposed-Does the German Government promote Pedophiles? Powered by IZ/GoMoPa4Kids/Klaus Jeffrey Maurischat-Epstein

Totally wrong! Circumcised boys can masturbate as well as uncircumcised boys. Most of the time, they just have to change their technique. About every fifth boy in Germany is circumcised. This means that his foreskin was shortened during an operation so that his glans is permanently exposed. The main reason for circumcision for most people was a foreskin narrowing (phimosis), which caused pain when the foreskin was pulled back. Few can be circumcised because they simply like a penis without a foreskin.

Where the rumor comes from:

Most guys masturbate by grasping their penis and pushing the foreskin back and forth. But what if there are no foreskins left to slide back and forth? For some there is obviously only one consequence: Then it doesn’t work anymore with masturbation! Not correct!

The truth is:

Every boy can satisfy himself – whether with or without a foreskin! So that the hand can slide over the sensitive penis shaft even without a foreskin, many boys use some body lotion or lubricant. Since a circumcised boy can no longer irritate the glans by pushing the foreskin back and forth, he performs the stimulating hand movements up to the glans. This is usually a little less sensitive for guys without a foreskin.

One thing is clear: after circumcision, every man has to get to know his little friend again and try out how he reacts to rubbing or petting. So if it doesn’t work as lustily as it did before circumcision – don’t despair! After a circumcision surgery, it may take a few months for you to get used to the new situation. Until then, just try and practice.

Girls masturbate with their fingers in their vagina!

It does not work that way! Sure, you can do that. But if you want to reach orgasm, it doesn’t work that way.

Where the rumor comes from:

Probably because many girls and boys do not know that a woman inside the vagina is not particularly excitable. The pleasure center of the woman is not the vagina, but her clit (the clitoris). And that is not in the vagina, but outside, between the labia – towards the navel – where the inner labia meet!

The truth is:

A woman usually comes to orgasm when she rubs her clit! Trying to masturbate a girl by shoving her finger in her vagina and moving it back and forth may make her feel pleasant – but she doesn’t get to climax this way. But if she stimulates her clit and the area around it, it is much more exciting for her.

Incidentally, it is the same with intercourse. Few women come to orgasm simply through the in-out movements of the penis in the vagina. Most also need to stimulate their clitoris with their hands in order to reach their climax.

Rumor: boys come quickly, girls slowly!

Continue reading “The Good Uncles: GoMoPa & GoMoPa4Kids exposed-Does the German Government promote Pedophiles? Powered by IZ/GoMoPa4Kids/Klaus Jeffrey Maurischat-Epstein”

🤡🤡🤡THE RETURN OF EAST GERMANY (IN THE YEAR 2024) Powered by Angelika “IM ERIKA” Merkel😂😂😂😂 – Satire

SUPPORT US AND Become a Patron! –

GET EXCLUSIVE GIFTS – TOP SECRET DOCUMENTS AND EXCLUSIVE EBOOKS

BY USING THE LINK BELOW


https://www.patreon.com/bePatron?u=54250700


(Paypal, Apple Pay, Venmo, Visa, Master Card, Discover, JCB, Diners Club, 3DS)

❌©BERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

https://www.patreon.com/bePatron?u=54250700

https://www.patreon.com/berndpulch?utm_campaign=creatorshare_creator

https://www.buymeacoffee.com/berndpulch

CRYPTO WALLET for ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

CRYPTO WALLET for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

for all crypto coins like

BITCOIN

ETHEREUM

TETHER

MATIC

USD COIN

BNB

WALL STREET MEMES

SHIBA INU

Follow the ONLY MEDIA with the LICENSE TO SPY ✌️@abovetopsecretxxl


To be absolutely anonymous please use Monero

Scan this code to send Monero to 41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh.

True Information is the most valuable resource and we ask you kindly to give back.

🙏God Bless You!🙏

Pl

IZ/GoMoPa4Kids-Tainted Love – Pop Stasi✌@abovetopsecretxxl

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://truthbook.social/berndpulch

👉JOIN @ABOVETOPSECRETXXL

ABOVETOPSECRETXXL

ABC NEWS LIVESTREAM

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

https://gab.com/berndpulch

https://www.bitchute.com/accounts/referral/berndpulchofficial/

https://www.bitchute.com/channel/R55w1IXstR3h/

👉JOIN @ABOVETOPSECRETXXL

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

GoMoPa4Kids – Reminiszenz In der “Welt” – “Kinderpornographie: Stasi erpresste Politiker”

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Kinder-Sexualaufklärung” unter falscher Flagge – “GoMoPa 4 Kids” – Over and  Out ! – BERNDPULCH.ORG – BERND-PULCH.ORG – TOXDAT, STASI List, STASI  SLEEPER List, KGB List, BDVP List, STASI Names A-Z, DDR-EAST

https://www.welt.de/print-welt/article378210/Kinderpornographie-Stasi-erpresste-Politiker.html

Kinderpornographie: Stasi erpresste Politiker

Veröffentlicht am 10.02.2003 | Lesedauer: 2 Minuten

Von Dirk Banse, Michael Behrendt

Ex-Geheimdienst-Offizier stellt Verbindung zum Fall des vermissten Berliner Jungen Manuel her.

Continue reading “GoMoPa4Kids – Reminiszenz In der “Welt” – “Kinderpornographie: Stasi erpresste Politiker””

The Good Uncles: GoMoPa & GoMoPa4Kids exposed-Does the German Government promote Pedophiles? Powered by IZ/GoMoPa4Kids/Klaus Jeffrey Maurischat-Epstein

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://rumble.com/embed/v1knkj4/?pub=4

Offizieller GoMoPa-Capo, “Kinderfreund, Fussballjugendfoerderer Maurischat” IZ-Network-Element.

The text reads as follows:

QUOTE

“Circumcised boys can no longer masturbate!

Read more: The Good Uncles: GoMoPa & GoMoPa4Kids exposed-Does the German Government promote Pedophiles? Powered by IZ/GoMoPa4Kids/Klaus Jeffrey Maurischat-Epstein

Totally wrong! Circumcised boys can masturbate as well as uncircumcised boys. Most of the time, they just have to change their technique. About every fifth boy in Germany is circumcised. This means that his foreskin was shortened during an operation so that his glans is permanently exposed. The main reason for circumcision for most people was a foreskin narrowing (phimosis), which caused pain when the foreskin was pulled back. Few can be circumcised because they simply like a penis without a foreskin.

Where the rumor comes from:

Most guys masturbate by grasping their penis and pushing the foreskin back and forth. But what if there are no foreskins left to slide back and forth? For some there is obviously only one consequence: Then it doesn’t work anymore with masturbation! Not correct!

The truth is:

Every boy can satisfy himself – whether with or without a foreskin! So that the hand can slide over the sensitive penis shaft even without a foreskin, many boys use some body lotion or lubricant. Since a circumcised boy can no longer irritate the glans by pushing the foreskin back and forth, he performs the stimulating hand movements up to the glans. This is usually a little less sensitive for guys without a foreskin.

One thing is clear: after circumcision, every man has to get to know his little friend again and try out how he reacts to rubbing or petting. So if it doesn’t work as lustily as it did before circumcision – don’t despair! After a circumcision surgery, it may take a few months for you to get used to the new situation. Until then, just try and practice.

Girls masturbate with their fingers in their vagina!

It does not work that way! Sure, you can do that. But if you want to reach orgasm, it doesn’t work that way.

Where the rumor comes from:

Probably because many girls and boys do not know that a woman inside the vagina is not particularly excitable. The pleasure center of the woman is not the vagina, but her clit (the clitoris). And that is not in the vagina, but outside, between the labia – towards the navel – where the inner labia meet!

The truth is:

A woman usually comes to orgasm when she rubs her clit! Trying to masturbate a girl by shoving her finger in her vagina and moving it back and forth may make her feel pleasant – but she doesn’t get to climax this way. But if she stimulates her clit and the area around it, it is much more exciting for her.

Incidentally, it is the same with intercourse. Few women come to orgasm simply through the in-out movements of the penis in the vagina. Most also need to stimulate their clitoris with their hands in order to reach their climax.

Rumor: boys come quickly, girls slowly!

Continue reading “The Good Uncles: GoMoPa & GoMoPa4Kids exposed-Does the German Government promote Pedophiles? Powered by IZ/GoMoPa4Kids/Klaus Jeffrey Maurischat-Epstein”

Rainbow Apple Ad – Powered by non- existent “RA 🤡🤡🤡 SPOEHRING” – STASI’ S WET DREAM😂😂😂😂😂✌

Inspired and/or Powered by “Honest” Jan “BI” Mucha, non existant “RA Spoehring”, GoMoPa4Kids

🤡🤡🤡🤡🤡😂😂😂😂😂

The Good Uncles: GoMoPa & GoMoPa4Kids exposed-Does the German Government promote Pedophiles? Powered by IZ/GoMoPa4Kids/Klaus Jeffrey Maurischat-Epstein

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

The text reads as follows:

QUOTE

“Circumcised boys can no longer masturbate!

Read more: The Good Uncles: GoMoPa & GoMoPa4Kids exposed-Does the German Government promote Pedophiles? Powered by IZ/GoMoPa4Kids/Klaus Jeffrey Maurischat-Epstein

Totally wrong! Circumcised boys can masturbate as well as uncircumcised boys. Most of the time, they just have to change their technique. About every fifth boy in Germany is circumcised. This means that his foreskin was shortened during an operation so that his glans is permanently exposed. The main reason for circumcision for most people was a foreskin narrowing (phimosis), which caused pain when the foreskin was pulled back. Few can be circumcised because they simply like a penis without a foreskin.

Where the rumor comes from:

Most guys masturbate by grasping their penis and pushing the foreskin back and forth. But what if there are no foreskins left to slide back and forth? For some there is obviously only one consequence: Then it doesn’t work anymore with masturbation! Not correct!

The truth is:

Every boy can satisfy himself – whether with or without a foreskin! So that the hand can slide over the sensitive penis shaft even without a foreskin, many boys use some body lotion or lubricant. Since a circumcised boy can no longer irritate the glans by pushing the foreskin back and forth, he performs the stimulating hand movements up to the glans. This is usually a little less sensitive for guys without a foreskin.

One thing is clear: after circumcision, every man has to get to know his little friend again and try out how he reacts to rubbing or petting. So if it doesn’t work as lustily as it did before circumcision – don’t despair! After a circumcision surgery, it may take a few months for you to get used to the new situation. Until then, just try and practice.

Girls masturbate with their fingers in their vagina!

It does not work that way! Sure, you can do that. But if you want to reach orgasm, it doesn’t work that way.

Where the rumor comes from:

Probably because many girls and boys do not know that a woman inside the vagina is not particularly excitable. The pleasure center of the woman is not the vagina, but her clit (the clitoris). And that is not in the vagina, but outside, between the labia – towards the navel – where the inner labia meet!

The truth is:

A woman usually comes to orgasm when she rubs her clit! Trying to masturbate a girl by shoving her finger in her vagina and moving it back and forth may make her feel pleasant – but she doesn’t get to climax this way. But if she stimulates her clit and the area around it, it is much more exciting for her.

Incidentally, it is the same with intercourse. Few women come to orgasm simply through the in-out movements of the penis in the vagina. Most also need to stimulate their clitoris with their hands in order to reach their climax.

Rumor: boys come quickly, girls slowly!

Continue reading “The Good Uncles: GoMoPa & GoMoPa4Kids exposed-Does the German Government promote Pedophiles? Powered by IZ/GoMoPa4Kids/Klaus Jeffrey Maurischat-Epstein”

The Good Uncles: GoMoPa & GoMoPa4Kids exposed-Does the German Government promote Pedophiles? Powered by IZ/GoMoPa4Kids/Klaus Jeffrey Maurischat-Epstein

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://rumble.com/embed/v1knkj4/?pub=4

The text reads as follows:

QUOTE

“Circumcised boys can no longer masturbate!

Read more: The Good Uncles: GoMoPa & GoMoPa4Kids exposed-Does the German Government promote Pedophiles? Powered by IZ/GoMoPa4Kids/Klaus Jeffrey Maurischat-Epstein

Totally wrong! Circumcised boys can masturbate as well as uncircumcised boys. Most of the time, they just have to change their technique. About every fifth boy in Germany is circumcised. This means that his foreskin was shortened during an operation so that his glans is permanently exposed. The main reason for circumcision for most people was a foreskin narrowing (phimosis), which caused pain when the foreskin was pulled back. Few can be circumcised because they simply like a penis without a foreskin.

Where the rumor comes from:

Most guys masturbate by grasping their penis and pushing the foreskin back and forth. But what if there are no foreskins left to slide back and forth? For some there is obviously only one consequence: Then it doesn’t work anymore with masturbation! Not correct!

The truth is:

Every boy can satisfy himself – whether with or without a foreskin! So that the hand can slide over the sensitive penis shaft even without a foreskin, many boys use some body lotion or lubricant. Since a circumcised boy can no longer irritate the glans by pushing the foreskin back and forth, he performs the stimulating hand movements up to the glans. This is usually a little less sensitive for guys without a foreskin.

One thing is clear: after circumcision, every man has to get to know his little friend again and try out how he reacts to rubbing or petting. So if it doesn’t work as lustily as it did before circumcision – don’t despair! After a circumcision surgery, it may take a few months for you to get used to the new situation. Until then, just try and practice.

Girls masturbate with their fingers in their vagina!

It does not work that way! Sure, you can do that. But if you want to reach orgasm, it doesn’t work that way.

Where the rumor comes from:

Probably because many girls and boys do not know that a woman inside the vagina is not particularly excitable. The pleasure center of the woman is not the vagina, but her clit (the clitoris). And that is not in the vagina, but outside, between the labia – towards the navel – where the inner labia meet!

The truth is:

A woman usually comes to orgasm when she rubs her clit! Trying to masturbate a girl by shoving her finger in her vagina and moving it back and forth may make her feel pleasant – but she doesn’t get to climax this way. But if she stimulates her clit and the area around it, it is much more exciting for her.

Incidentally, it is the same with intercourse. Few women come to orgasm simply through the in-out movements of the penis in the vagina. Most also need to stimulate their clitoris with their hands in order to reach their climax.

Rumor: boys come quickly, girls slowly!

Continue reading “The Good Uncles: GoMoPa & GoMoPa4Kids exposed-Does the German Government promote Pedophiles? Powered by IZ/GoMoPa4Kids/Klaus Jeffrey Maurischat-Epstein”

Stasi Children’s Television:”We watch while you watch!”😂😂😂powered by Klaus Jeffrey Maurischat-Epstein, Sven “Groomer” Schmidt/GoMoPa4Kids/IZ

We watch while you watch.

God Bless You!

SUPPORT US AND Become a Patron!
https://www.patreon.com/bePatron?u=54250700
True Information is the most valuable resource and we ask you kindly to give back.

✌️SHARE

👉THE ONLY WEBSITE WITH THE LICENSE TO SPY!
https://berndpulch.org
https://berndpulch.org/about-me/
👉JOIN @ABOVETOPSECRETXXL
https://t.me/ABOVETOPSECRETXXL
gab.com/berndpulch
gettr.com/user/berndpulch
https://truthbook.social/berndpulch
https://www.youtube.com/channel/UCdoKPR_qNWDyJwtCK484A6A
https://rumble.com/c/c-1227213
👉JOIN @ABOVETOPSECRETXXL
Subscribe to https://t.me/ABOVETOPSECRETXXL
SUPPORT US AND Become a Patron!
https://www.patreon.com/bePatron?u=54250700
True Information is the most valuable resource and we ask you kindly to give back.

God Bless You!

The Berlin Pedo Network in Politics and Schools:GoMoPa & GoMoPa4Kids-Powered by Sven “Global Groomer” Schmidt – Eagle IT GoMoPa4Kids

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://rumble.com/embed/v1knkj4/?pub=4

The text reads as follows:

Read more: The Berlin Pedo Network in Politics and Schools:GoMoPa & GoMoPa4Kids-Powered by Sven “Global Groomer” Schmidt – Eagle IT GoMoPa4Kids

QUOTE

“Circumcised boys can no longer masturbate!

Totally wrong! Circumcised boys can masturbate as well as uncircumcised boys. Most of the time, they just have to change their technique. About every fifth boy in Germany is circumcised. This means that his foreskin was shortened during an operation so that his glans is permanently exposed. The main reason for circumcision for most people was a foreskin narrowing (phimosis), which caused pain when the foreskin was pulled back. Few can be circumcised because they simply like a penis without a foreskin.

Where the rumor comes from:

Most guys masturbate by grasping their penis and pushing the foreskin back and forth. But what if there are no foreskins left to slide back and forth? For some there is obviously only one consequence: Then it doesn’t work anymore with masturbation! Not correct!

The truth is:

Every boy can satisfy himself – whether with or without a foreskin! So that the hand can slide over the sensitive penis shaft even without a foreskin, many boys use some body lotion or lubricant. Since a circumcised boy can no longer irritate the glans by pushing the foreskin back and forth, he performs the stimulating hand movements up to the glans. This is usually a little less sensitive for guys without a foreskin.

One thing is clear: after circumcision, every man has to get to know his little friend again and try out how he reacts to rubbing or petting. So if it doesn’t work as lustily as it did before circumcision – don’t despair! After a circumcision surgery, it may take a few months for you to get used to the new situation. Until then, just try and practice.

Girls masturbate with their fingers in their vagina!

It does not work that way! Sure, you can do that. But if you want to reach orgasm, it doesn’t work that way.

Where the rumor comes from:

Probably because many girls and boys do not know that a woman inside the vagina is not particularly excitable. The pleasure center of the woman is not the vagina, but her clit (the clitoris). And that is not in the vagina, but outside, between the labia – towards the navel – where the inner labia meet!

The truth is:

A woman usually comes to orgasm when she rubs her clit! Trying to masturbate a girl by shoving her finger in her vagina and moving it back and forth may make her feel pleasant – but she doesn’t get to climax this way. But if she stimulates her clit and the area around it, it is much more exciting for her.

Incidentally, it is the same with intercourse. Few women come to orgasm simply through the in-out movements of the penis in the vagina. Most also need to stimulate their clitoris with their hands in order to reach their climax.

Rumor: boys come quickly, girls slowly!

Continue reading “The Berlin Pedo Network in Politics and Schools:GoMoPa & GoMoPa4Kids-Powered by Sven “Global Groomer” Schmidt – Eagle IT GoMoPa4Kids”

GoMoPa & GoMoPa4Kids exposed-Does the German Government promote Pedophiles? Powered by IZ/GoMoPa4Kids/Klaus Jeffrey Maurischat-Epstein

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://rumble.com/embed/v1knkj4/?pub=4

The text reads as follows:

QUOTE

“Circumcised boys can no longer masturbate!

Read more: GoMoPa & GoMoPa4Kids exposed-Does the German Government promote Pedophiles? Powered by IZ/GoMoPa4Kids/Klaus Jeffrey Maurischat-Epstein

Totally wrong! Circumcised boys can masturbate as well as uncircumcised boys. Most of the time, they just have to change their technique. About every fifth boy in Germany is circumcised. This means that his foreskin was shortened during an operation so that his glans is permanently exposed. The main reason for circumcision for most people was a foreskin narrowing (phimosis), which caused pain when the foreskin was pulled back. Few can be circumcised because they simply like a penis without a foreskin.

Where the rumor comes from:

Most guys masturbate by grasping their penis and pushing the foreskin back and forth. But what if there are no foreskins left to slide back and forth? For some there is obviously only one consequence: Then it doesn’t work anymore with masturbation! Not correct!

The truth is:

Every boy can satisfy himself – whether with or without a foreskin! So that the hand can slide over the sensitive penis shaft even without a foreskin, many boys use some body lotion or lubricant. Since a circumcised boy can no longer irritate the glans by pushing the foreskin back and forth, he performs the stimulating hand movements up to the glans. This is usually a little less sensitive for guys without a foreskin.

One thing is clear: after circumcision, every man has to get to know his little friend again and try out how he reacts to rubbing or petting. So if it doesn’t work as lustily as it did before circumcision – don’t despair! After a circumcision surgery, it may take a few months for you to get used to the new situation. Until then, just try and practice.

Girls masturbate with their fingers in their vagina!

It does not work that way! Sure, you can do that. But if you want to reach orgasm, it doesn’t work that way.

Where the rumor comes from:

Probably because many girls and boys do not know that a woman inside the vagina is not particularly excitable. The pleasure center of the woman is not the vagina, but her clit (the clitoris). And that is not in the vagina, but outside, between the labia – towards the navel – where the inner labia meet!

The truth is:

A woman usually comes to orgasm when she rubs her clit! Trying to masturbate a girl by shoving her finger in her vagina and moving it back and forth may make her feel pleasant – but she doesn’t get to climax this way. But if she stimulates her clit and the area around it, it is much more exciting for her.

Incidentally, it is the same with intercourse. Few women come to orgasm simply through the in-out movements of the penis in the vagina. Most also need to stimulate their clitoris with their hands in order to reach their climax.

Rumor: boys come quickly, girls slowly!

Continue reading “GoMoPa & GoMoPa4Kids exposed-Does the German Government promote Pedophiles? Powered by IZ/GoMoPa4Kids/Klaus Jeffrey Maurischat-Epstein”

IZ/GoMoPa4Kids-Tainted Love – Pop Stasi✌@abovetopsecretxxl

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://truthbook.social/berndpulch

👉JOIN @ABOVETOPSECRETXXL

ABOVETOPSECRETXXL

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

https://gab.com/berndpulch

https://www.bitchute.com/accounts/referral/berndpulchofficial/

https://www.bitchute.com/channel/R55w1IXstR3h/

👉JOIN @ABOVETOPSECRETXXL

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

GoMoPa & GoMoPa4Kids exposed-Does the German Government promote Pedophiles?

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://rumble.com/embed/v1knkj4/?pub=4

The text reads as follows:

QUOTE

“Circumcised boys can no longer masturbate!

Totally wrong! Circumcised boys can masturbate as well as uncircumcised boys. Most of the time, they just have to change their technique. About every fifth boy in Germany is circumcised. This means that his foreskin was shortened during an operation so that his glans is permanently exposed. The main reason for circumcision for most people was a foreskin narrowing (phimosis), which caused pain when the foreskin was pulled back. Few can be circumcised because they simply like a penis without a foreskin.

Where the rumor comes from:

Most guys masturbate by grasping their penis and pushing the foreskin back and forth. But what if there are no foreskins left to slide back and forth? For some there is obviously only one consequence: Then it doesn’t work anymore with masturbation! Not correct!

The truth is:

Every boy can satisfy himself – whether with or without a foreskin! So that the hand can slide over the sensitive penis shaft even without a foreskin, many boys use some body lotion or lubricant. Since a circumcised boy can no longer irritate the glans by pushing the foreskin back and forth, he performs the stimulating hand movements up to the glans. This is usually a little less sensitive for guys without a foreskin.

One thing is clear: after circumcision, every man has to get to know his little friend again and try out how he reacts to rubbing or petting. So if it doesn’t work as lustily as it did before circumcision – don’t despair! After a circumcision surgery, it may take a few months for you to get used to the new situation. Until then, just try and practice.

Girls masturbate with their fingers in their vagina!

It does not work that way! Sure, you can do that. But if you want to reach orgasm, it doesn’t work that way.

Where the rumor comes from:

Probably because many girls and boys do not know that a woman inside the vagina is not particularly excitable. The pleasure center of the woman is not the vagina, but her clit (the clitoris). And that is not in the vagina, but outside, between the labia – towards the navel – where the inner labia meet!

The truth is:

A woman usually comes to orgasm when she rubs her clit! Trying to masturbate a girl by shoving her finger in her vagina and moving it back and forth may make her feel pleasant – but she doesn’t get to climax this way. But if she stimulates her clit and the area around it, it is much more exciting for her.

Incidentally, it is the same with intercourse. Few women come to orgasm simply through the in-out movements of the penis in the vagina. Most also need to stimulate their clitoris with their hands in order to reach their climax.

Rumor: boys come quickly, girls slowly!

Continue reading “GoMoPa & GoMoPa4Kids exposed-Does the German Government promote Pedophiles?”

Lauterbach,GoMoPa & GoMoPa4Kids Pedoland Germany – Sound of Freedom Redux ✌️@abovetopsecretxxl

Read more: Lauterbach,GoMoPa & GoMoPa4Kids Pedoland Germany – Sound of Freedom Redux ✌️@abovetopsecretxxl

Jetzt schlägt es aber 13 ! Jetzt gibt es schon von der WHO einen Ratgeber für PERVERSE❗

Hier in Nius 🗞

Was ist denn bei der „World Health Organisation” (WHO) los? In einem Ratgeber für Sexualaufklärung bezeichnet die WHO bereits Neugeborene als „sexuelle Wesen“, die man so früh wie möglich über Masturbation und „lustvolle Erfahrungen“ aufklären sollte. Die Bundeszentrale für gesundheitliche Aufklärung (BZgA) war an der Erstellung des Ratgebers beteiligt – und empfiehlt die Inhalte als Rahmenkonzept für sämtliche Bildungseinrichtungen in Deutschland.

Aus dem Ausland hagelt es Kritik.

https://t.me/CNconspiracynewsroom 🧚‍♂️

Lauterbach joins GoMoPa4Kids “teaching efforts” – Pedoland Germany✌@abovetopsecretxxl

“GoMoPa CEO Klaus-Dieter Maurischat, top left, with the children of the soccer club Huelsen

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!

True Information is the most valuable resource and we ask you to give back.http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

✌️SHARE

👉THE ONLY WEBSITE WITH THE LICENSE TO SPY!
https://berndpulch.org
https://berndpulch.org/about-me/
👉JOIN @ABOVETOPSECRETXXL

https://t.me/ABOVETOPSECRETXXL
gab.com/berndpulch
gettr.com/user/berndpulch
https://truthbook.social/berndpulch
https://www.youtube.com/channel/UCdoKPR_qNWDyJwtCK484A6A
https://rumble.com/c/c-1227213
👉JOIN @ABOVETOPSECRETXXL
Subscribe to https://t.me/ABOVETOPSECRETXXL

SUPPORT US AND Become a Patron!
https://www.patreon.com/bePatron?u=54250700
(Paypal, Apple Pay, Venmo, Visa, Master Card, Discover, JCB, Diners Club, 3DS)
Bitcoin: bc1q2ku4m6j5hmay36gdp7k2penr66wxzc7mchcaed
Ethereum: 0xC0198713e0049260cbe788DEd449FEc290Bf21b7
Ripple: rfoQ7LytJNCAPj8BwP7PZfd1oFPrsN6kZv
USDT: 0xC0198713e0049260cbe788DEd449FEc290Bf21b7
USD Coin: 0xC0198713e0049260cbe788DEd449FEc290Bf21b7

Monero: 41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh.USDT: 0xC0198713e0049260cbe788DEd449FEc290Bf21b7

True Information is the most valuable resource and we ask you kindly to give back.

GOD BLESS YOU!SUPPORT

The text reads as follows:

QUOTE

“Circumcised boys can no longer masturbate!

Totally wrong! Circumcised boys can masturbate as well as uncircumcised boys. Most of the time, they just have to change their technique. About every fifth boy in Germany is circumcised. This means that his foreskin was shortened during an operation so that his glans is permanently exposed. The main reason for circumcision for most people was a foreskin narrowing (phimosis), which caused pain when the foreskin was pulled back. Few can be circumcised because they simply like a penis without a foreskin.

Where the rumor comes from:

Most guys masturbate by grasping their penis and pushing the foreskin back and forth. But what if there are no foreskins left to slide back and forth? For some there is obviously only one consequence: Then it doesn’t work anymore with masturbation! Not correct!

The truth is:

Every boy can satisfy himself – whether with or without a foreskin! So that the hand can slide over the sensitive penis shaft even without a foreskin, many boys use some body lotion or lubricant. Since a circumcised boy can no longer irritate the glans by pushing the foreskin back and forth, he performs the stimulating hand movements up to the glans. This is usually a little less sensitive for guys without a foreskin.

One thing is clear: after circumcision, every man has to get to know his little friend again and try out how he reacts to rubbing or petting. So if it doesn’t work as lustily as it did before circumcision – don’t despair! After a circumcision surgery, it may take a few months for you to get used to the new situation. Until then, just try and practice.

Girls masturbate with their fingers in their vagina!

It does not work that way! Sure, you can do that. But if you want to reach orgasm, it doesn’t work that way.

Where the rumor comes from:

Probably because many girls and boys do not know that a woman inside the vagina is not particularly excitable. The pleasure center of the woman is not the vagina, but her clit (the clitoris). And that is not in the vagina, but outside, between the labia – towards the navel – where the inner labia meet!

The truth is:

A woman usually comes to orgasm when she rubs her clit! Trying to masturbate a girl by shoving her finger in her vagina and moving it back and forth may make her feel pleasant – but she doesn’t get to climax this way. But if she stimulates her clit and the area around it, it is much more exciting for her.

Incidentally, it is the same with intercourse. Few women come to orgasm simply through the in-out movements of the penis in the vagina. Most also need to stimulate their clitoris with their hands in order to reach their climax.

Rumor: boys come quickly, girls slowly!

Continue reading “Lauterbach,GoMoPa & GoMoPa4Kids Pedoland Germany – Sound of Freedom Redux ✌️@abovetopsecretxxl”

Lauterbach,GoMoPa & GoMoPa4Kids Pedoland Germany – Sound of Freedom Redux ✌️@abovetopsecretxxl

Read more: Lauterbach,GoMoPa & GoMoPa4Kids Pedoland Germany – Sound of Freedom Redux ✌️@abovetopsecretxxl

Jetzt schlägt es aber 13 ! Jetzt gibt es schon von der WHO einen Ratgeber für PERVERSE❗

Hier in Nius 🗞

Was ist denn bei der „World Health Organisation” (WHO) los? In einem Ratgeber für Sexualaufklärung bezeichnet die WHO bereits Neugeborene als „sexuelle Wesen“, die man so früh wie möglich über Masturbation und „lustvolle Erfahrungen“ aufklären sollte. Die Bundeszentrale für gesundheitliche Aufklärung (BZgA) war an der Erstellung des Ratgebers beteiligt – und empfiehlt die Inhalte als Rahmenkonzept für sämtliche Bildungseinrichtungen in Deutschland.

Aus dem Ausland hagelt es Kritik.

https://t.me/CNconspiracynewsroom 🧚‍♂️

Lauterbach joins GoMoPa4Kids “teaching efforts” – Pedoland Germany✌@abovetopsecretxxl

“GoMoPa CEO Klaus-Dieter Maurischat, top left, with the children of the soccer club Huelsen

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!

True Information is the most valuable resource and we ask you to give back.http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

✌️SHARE

👉THE ONLY WEBSITE WITH THE LICENSE TO SPY!
https://berndpulch.org
https://berndpulch.org/about-me/
👉JOIN @ABOVETOPSECRETXXL

https://t.me/ABOVETOPSECRETXXL
gab.com/berndpulch
gettr.com/user/berndpulch
https://truthbook.social/berndpulch
https://www.youtube.com/channel/UCdoKPR_qNWDyJwtCK484A6A
https://rumble.com/c/c-1227213
👉JOIN @ABOVETOPSECRETXXL
Subscribe to https://t.me/ABOVETOPSECRETXXL

SUPPORT US AND Become a Patron!
https://www.patreon.com/bePatron?u=54250700
(Paypal, Apple Pay, Venmo, Visa, Master Card, Discover, JCB, Diners Club, 3DS)
Bitcoin: bc1q2ku4m6j5hmay36gdp7k2penr66wxzc7mchcaed
Ethereum: 0xC0198713e0049260cbe788DEd449FEc290Bf21b7
Ripple: rfoQ7LytJNCAPj8BwP7PZfd1oFPrsN6kZv
USDT: 0xC0198713e0049260cbe788DEd449FEc290Bf21b7
USD Coin: 0xC0198713e0049260cbe788DEd449FEc290Bf21b7

Monero: 41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh.USDT: 0xC0198713e0049260cbe788DEd449FEc290Bf21b7

True Information is the most valuable resource and we ask you kindly to give back.

GOD BLESS YOU!SUPPORT

The text reads as follows:

QUOTE

“Circumcised boys can no longer masturbate!

Totally wrong! Circumcised boys can masturbate as well as uncircumcised boys. Most of the time, they just have to change their technique. About every fifth boy in Germany is circumcised. This means that his foreskin was shortened during an operation so that his glans is permanently exposed. The main reason for circumcision for most people was a foreskin narrowing (phimosis), which caused pain when the foreskin was pulled back. Few can be circumcised because they simply like a penis without a foreskin.

Where the rumor comes from:

Most guys masturbate by grasping their penis and pushing the foreskin back and forth. But what if there are no foreskins left to slide back and forth? For some there is obviously only one consequence: Then it doesn’t work anymore with masturbation! Not correct!

The truth is:

Every boy can satisfy himself – whether with or without a foreskin! So that the hand can slide over the sensitive penis shaft even without a foreskin, many boys use some body lotion or lubricant. Since a circumcised boy can no longer irritate the glans by pushing the foreskin back and forth, he performs the stimulating hand movements up to the glans. This is usually a little less sensitive for guys without a foreskin.

One thing is clear: after circumcision, every man has to get to know his little friend again and try out how he reacts to rubbing or petting. So if it doesn’t work as lustily as it did before circumcision – don’t despair! After a circumcision surgery, it may take a few months for you to get used to the new situation. Until then, just try and practice.

Girls masturbate with their fingers in their vagina!

It does not work that way! Sure, you can do that. But if you want to reach orgasm, it doesn’t work that way.

Where the rumor comes from:

Probably because many girls and boys do not know that a woman inside the vagina is not particularly excitable. The pleasure center of the woman is not the vagina, but her clit (the clitoris). And that is not in the vagina, but outside, between the labia – towards the navel – where the inner labia meet!

The truth is:

A woman usually comes to orgasm when she rubs her clit! Trying to masturbate a girl by shoving her finger in her vagina and moving it back and forth may make her feel pleasant – but she doesn’t get to climax this way. But if she stimulates her clit and the area around it, it is much more exciting for her.

Incidentally, it is the same with intercourse. Few women come to orgasm simply through the in-out movements of the penis in the vagina. Most also need to stimulate their clitoris with their hands in order to reach their climax.

Rumor: boys come quickly, girls slowly!

Continue reading “Lauterbach,GoMoPa & GoMoPa4Kids Pedoland Germany – Sound of Freedom Redux ✌️@abovetopsecretxxl”

GoMoPa & GoMoPa4Kids exposed-Does the German government promote pedophiles?

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://rumble.com/embed/v1knkj4/?pub=4

The text reads as follows:

QUOTE

“Circumcised boys can no longer masturbate!

Totally wrong! Circumcised boys can masturbate as well as uncircumcised boys. Most of the time, they just have to change their technique. About every fifth boy in Germany is circumcised. This means that his foreskin was shortened during an operation so that his glans is permanently exposed. The main reason for circumcision for most people was a foreskin narrowing (phimosis), which caused pain when the foreskin was pulled back. Few can be circumcised because they simply like a penis without a foreskin.

Where the rumor comes from:

Most guys masturbate by grasping their penis and pushing the foreskin back and forth. But what if there are no foreskins left to slide back and forth? For some there is obviously only one consequence: Then it doesn’t work anymore with masturbation! Not correct!

The truth is:

Every boy can satisfy himself – whether with or without a foreskin! So that the hand can slide over the sensitive penis shaft even without a foreskin, many boys use some body lotion or lubricant. Since a circumcised boy can no longer irritate the glans by pushing the foreskin back and forth, he performs the stimulating hand movements up to the glans. This is usually a little less sensitive for guys without a foreskin.

One thing is clear: after circumcision, every man has to get to know his little friend again and try out how he reacts to rubbing or petting. So if it doesn’t work as lustily as it did before circumcision – don’t despair! After a circumcision surgery, it may take a few months for you to get used to the new situation. Until then, just try and practice.

Girls masturbate with their fingers in their vagina!

It does not work that way! Sure, you can do that. But if you want to reach orgasm, it doesn’t work that way.

Where the rumor comes from:

Probably because many girls and boys do not know that a woman inside the vagina is not particularly excitable. The pleasure center of the woman is not the vagina, but her clit (the clitoris). And that is not in the vagina, but outside, between the labia – towards the navel – where the inner labia meet!

The truth is:

A woman usually comes to orgasm when she rubs her clit! Trying to masturbate a girl by shoving her finger in her vagina and moving it back and forth may make her feel pleasant – but she doesn’t get to climax this way. But if she stimulates her clit and the area around it, it is much more exciting for her.

Incidentally, it is the same with intercourse. Few women come to orgasm simply through the in-out movements of the penis in the vagina. Most also need to stimulate their clitoris with their hands in order to reach their climax.

Rumor: boys come quickly, girls slowly!

Continue reading “GoMoPa & GoMoPa4Kids exposed-Does the German government promote pedophiles?”

GoMoPa & GoMoPa4Kids-Does the German government promote pedophiles?

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://rumble.com/embed/v1knkj4/?pub=4

The text reads as follows:

QUOTE

“Circumcised boys can no longer masturbate!

Totally wrong! Circumcised boys can masturbate as well as uncircumcised boys. Most of the time, they just have to change their technique. About every fifth boy in Germany is circumcised. This means that his foreskin was shortened during an operation so that his glans is permanently exposed. The main reason for circumcision for most people was a foreskin narrowing (phimosis), which caused pain when the foreskin was pulled back. Few can be circumcised because they simply like a penis without a foreskin.

Where the rumor comes from:

Most guys masturbate by grasping their penis and pushing the foreskin back and forth. But what if there are no foreskins left to slide back and forth? For some there is obviously only one consequence: Then it doesn’t work anymore with masturbation! Not correct!

The truth is:

Every boy can satisfy himself – whether with or without a foreskin! So that the hand can slide over the sensitive penis shaft even without a foreskin, many boys use some body lotion or lubricant. Since a circumcised boy can no longer irritate the glans by pushing the foreskin back and forth, he performs the stimulating hand movements up to the glans. This is usually a little less sensitive for guys without a foreskin.

One thing is clear: after circumcision, every man has to get to know his little friend again and try out how he reacts to rubbing or petting. So if it doesn’t work as lustily as it did before circumcision – don’t despair! After a circumcision surgery, it may take a few months for you to get used to the new situation. Until then, just try and practice.

Girls masturbate with their fingers in their vagina!

It does not work that way! Sure, you can do that. But if you want to reach orgasm, it doesn’t work that way.

Where the rumor comes from:

Probably because many girls and boys do not know that a woman inside the vagina is not particularly excitable. The pleasure center of the woman is not the vagina, but her clit (the clitoris). And that is not in the vagina, but outside, between the labia – towards the navel – where the inner labia meet!

The truth is:

A woman usually comes to orgasm when she rubs her clit! Trying to masturbate a girl by shoving her finger in her vagina and moving it back and forth may make her feel pleasant – but she doesn’t get to climax this way. But if she stimulates her clit and the area around it, it is much more exciting for her.

Incidentally, it is the same with intercourse. Few women come to orgasm simply through the in-out movements of the penis in the vagina. Most also need to stimulate their clitoris with their hands in order to reach their climax.

Rumor: boys come quickly, girls slowly!

Continue reading “GoMoPa & GoMoPa4Kids-Does the German government promote pedophiles?”

VIDEO:”Minor-Attracted People” Want Acceptance For Being Pedophile

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://rumble.com/embed/v1knkj4/?pub=4

The text reads as follows:

Read more: VIDEO:”Minor-Attracted People” Want Acceptance For Being Pedophile

QUOTE

“Circumcised boys can no longer masturbate!

Totally wrong! Circumcised boys can masturbate as well as uncircumcised boys. Most of the time, they just have to change their technique. About every fifth boy in Germany is circumcised. This means that his foreskin was shortened during an operation so that his glans is permanently exposed. The main reason for circumcision for most people was a foreskin narrowing (phimosis), which caused pain when the foreskin was pulled back. Few can be circumcised because they simply like a penis without a foreskin.

Where the rumor comes from:

Most guys masturbate by grasping their penis and pushing the foreskin back and forth. But what if there are no foreskins left to slide back and forth? For some there is obviously only one consequence: Then it doesn’t work anymore with masturbation! Not correct!

The truth is:

Every boy can satisfy himself – whether with or without a foreskin! So that the hand can slide over the sensitive penis shaft even without a foreskin, many boys use some body lotion or lubricant. Since a circumcised boy can no longer irritate the glans by pushing the foreskin back and forth, he performs the stimulating hand movements up to the glans. This is usually a little less sensitive for guys without a foreskin.

One thing is clear: after circumcision, every man has to get to know his little friend again and try out how he reacts to rubbing or petting. So if it doesn’t work as lustily as it did before circumcision – don’t despair! After a circumcision surgery, it may take a few months for you to get used to the new situation. Until then, just try and practice.

Girls masturbate with their fingers in their vagina!

It does not work that way! Sure, you can do that. But if you want to reach orgasm, it doesn’t work that way.

Where the rumor comes from:

Probably because many girls and boys do not know that a woman inside the vagina is not particularly excitable. The pleasure center of the woman is not the vagina, but her clit (the clitoris). And that is not in the vagina, but outside, between the labia – towards the navel – where the inner labia meet!

The truth is:

A woman usually comes to orgasm when she rubs her clit! Trying to masturbate a girl by shoving her finger in her vagina and moving it back and forth may make her feel pleasant – but she doesn’t get to climax this way. But if she stimulates her clit and the area around it, it is much more exciting for her.

Incidentally, it is the same with intercourse. Few women come to orgasm simply through the in-out movements of the penis in the vagina. Most also need to stimulate their clitoris with their hands in order to reach their climax.

Rumor: boys come quickly, girls slowly!

Continue reading “VIDEO:”Minor-Attracted People” Want Acceptance For Being Pedophile”

IZ/GoMoPa4Kids-Tainted Love – Pop Stasi✌@abovetopsecretxxl

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://truthbook.social/berndpulch

👉JOIN @ABOVETOPSECRETXXL

ABOVETOPSECRETXXL

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

https://gab.com/berndpulch

https://www.bitchute.com/accounts/referral/berndpulchofficial/

https://www.bitchute.com/channel/R55w1IXstR3h/

👉JOIN @ABOVETOPSECRETXXL

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

GoMoPa & GoMoPa4Kids-Does the German government promote pedophiles?

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://rumble.com/embed/v1knkj4/?pub=4

The text reads as follows:

QUOTE

“Circumcised boys can no longer masturbate!

Totally wrong! Circumcised boys can masturbate as well as uncircumcised boys. Most of the time, they just have to change their technique. About every fifth boy in Germany is circumcised. This means that his foreskin was shortened during an operation so that his glans is permanently exposed. The main reason for circumcision for most people was a foreskin narrowing (phimosis), which caused pain when the foreskin was pulled back. Few can be circumcised because they simply like a penis without a foreskin.

Where the rumor comes from:

Most guys masturbate by grasping their penis and pushing the foreskin back and forth. But what if there are no foreskins left to slide back and forth? For some there is obviously only one consequence: Then it doesn’t work anymore with masturbation! Not correct!

The truth is:

Every boy can satisfy himself – whether with or without a foreskin! So that the hand can slide over the sensitive penis shaft even without a foreskin, many boys use some body lotion or lubricant. Since a circumcised boy can no longer irritate the glans by pushing the foreskin back and forth, he performs the stimulating hand movements up to the glans. This is usually a little less sensitive for guys without a foreskin.

One thing is clear: after circumcision, every man has to get to know his little friend again and try out how he reacts to rubbing or petting. So if it doesn’t work as lustily as it did before circumcision – don’t despair! After a circumcision surgery, it may take a few months for you to get used to the new situation. Until then, just try and practice.

Girls masturbate with their fingers in their vagina!

It does not work that way! Sure, you can do that. But if you want to reach orgasm, it doesn’t work that way.

Where the rumor comes from:

Probably because many girls and boys do not know that a woman inside the vagina is not particularly excitable. The pleasure center of the woman is not the vagina, but her clit (the clitoris). And that is not in the vagina, but outside, between the labia – towards the navel – where the inner labia meet!

The truth is:

A woman usually comes to orgasm when she rubs her clit! Trying to masturbate a girl by shoving her finger in her vagina and moving it back and forth may make her feel pleasant – but she doesn’t get to climax this way. But if she stimulates her clit and the area around it, it is much more exciting for her.

Incidentally, it is the same with intercourse. Few women come to orgasm simply through the in-out movements of the penis in the vagina. Most also need to stimulate their clitoris with their hands in order to reach their climax.

Rumor: boys come quickly, girls slowly!

Continue reading “GoMoPa & GoMoPa4Kids-Does the German government promote pedophiles?”

GoMoPa & GoMoPa4Kids-Does the German government promote pedophiles?

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

The text reads as follows:

QUOTE

“Circumcised boys can no longer masturbate!

Totally wrong! Circumcised boys can masturbate as well as uncircumcised boys. Most of the time, they just have to change their technique. About every fifth boy in Germany is circumcised. This means that his foreskin was shortened during an operation so that his glans is permanently exposed. The main reason for circumcision for most people was a foreskin narrowing (phimosis), which caused pain when the foreskin was pulled back. Few can be circumcised because they simply like a penis without a foreskin.

Where the rumor comes from:

Most guys masturbate by grasping their penis and pushing the foreskin back and forth. But what if there are no foreskins left to slide back and forth? For some there is obviously only one consequence: Then it doesn’t work anymore with masturbation! Not correct!

The truth is:

Every boy can satisfy himself – whether with or without a foreskin! So that the hand can slide over the sensitive penis shaft even without a foreskin, many boys use some body lotion or lubricant. Since a circumcised boy can no longer irritate the glans by pushing the foreskin back and forth, he performs the stimulating hand movements up to the glans. This is usually a little less sensitive for guys without a foreskin.

One thing is clear: after circumcision, every man has to get to know his little friend again and try out how he reacts to rubbing or petting. So if it doesn’t work as lustily as it did before circumcision – don’t despair! After a circumcision surgery, it may take a few months for you to get used to the new situation. Until then, just try and practice.

Girls masturbate with their fingers in their vagina!

It does not work that way! Sure, you can do that. But if you want to reach orgasm, it doesn’t work that way.

Where the rumor comes from:

Probably because many girls and boys do not know that a woman inside the vagina is not particularly excitable. The pleasure center of the woman is not the vagina, but her clit (the clitoris). And that is not in the vagina, but outside, between the labia – towards the navel – where the inner labia meet!

The truth is:

A woman usually comes to orgasm when she rubs her clit! Trying to masturbate a girl by shoving her finger in her vagina and moving it back and forth may make her feel pleasant – but she doesn’t get to climax this way. But if she stimulates her clit and the area around it, it is much more exciting for her.

Incidentally, it is the same with intercourse. Few women come to orgasm simply through the in-out movements of the penis in the vagina. Most also need to stimulate their clitoris with their hands in order to reach their climax.

Rumor: boys come quickly, girls slowly!

Continue reading “GoMoPa & GoMoPa4Kids-Does the German government promote pedophiles?”

VIDEO:”Minor-Attracted People” Want Acceptance For Being Pedophile

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://rumble.com/embed/v1knkj4/?pub=4

The text reads as follows:

Read more: VIDEO:”Minor-Attracted People” Want Acceptance For Being Pedophile

QUOTE

“Circumcised boys can no longer masturbate!

Totally wrong! Circumcised boys can masturbate as well as uncircumcised boys. Most of the time, they just have to change their technique. About every fifth boy in Germany is circumcised. This means that his foreskin was shortened during an operation so that his glans is permanently exposed. The main reason for circumcision for most people was a foreskin narrowing (phimosis), which caused pain when the foreskin was pulled back. Few can be circumcised because they simply like a penis without a foreskin.

Where the rumor comes from:

Most guys masturbate by grasping their penis and pushing the foreskin back and forth. But what if there are no foreskins left to slide back and forth? For some there is obviously only one consequence: Then it doesn’t work anymore with masturbation! Not correct!

The truth is:

Every boy can satisfy himself – whether with or without a foreskin! So that the hand can slide over the sensitive penis shaft even without a foreskin, many boys use some body lotion or lubricant. Since a circumcised boy can no longer irritate the glans by pushing the foreskin back and forth, he performs the stimulating hand movements up to the glans. This is usually a little less sensitive for guys without a foreskin.

One thing is clear: after circumcision, every man has to get to know his little friend again and try out how he reacts to rubbing or petting. So if it doesn’t work as lustily as it did before circumcision – don’t despair! After a circumcision surgery, it may take a few months for you to get used to the new situation. Until then, just try and practice.

Girls masturbate with their fingers in their vagina!

It does not work that way! Sure, you can do that. But if you want to reach orgasm, it doesn’t work that way.

Where the rumor comes from:

Probably because many girls and boys do not know that a woman inside the vagina is not particularly excitable. The pleasure center of the woman is not the vagina, but her clit (the clitoris). And that is not in the vagina, but outside, between the labia – towards the navel – where the inner labia meet!

The truth is:

A woman usually comes to orgasm when she rubs her clit! Trying to masturbate a girl by shoving her finger in her vagina and moving it back and forth may make her feel pleasant – but she doesn’t get to climax this way. But if she stimulates her clit and the area around it, it is much more exciting for her.

Incidentally, it is the same with intercourse. Few women come to orgasm simply through the in-out movements of the penis in the vagina. Most also need to stimulate their clitoris with their hands in order to reach their climax.

Rumor: boys come quickly, girls slowly!

Continue reading “VIDEO:”Minor-Attracted People” Want Acceptance For Being Pedophile”

IZ-Tainted Love – Pop Stasi

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://truthbook.social/berndpulch

👉JOIN @ABOVETOPSECRETXXL

ABOVETOPSECRETXXL

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

https://gab.com/berndpulch

https://www.bitchute.com/accounts/referral/berndpulchofficial/

https://www.bitchute.com/channel/R55w1IXstR3h/

👉JOIN @ABOVETOPSECRETXXL

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

The Berlin Pedo Network in politics and schools:GoMoPa & GoMoPa4Kids-Does the German government promote pedophiles?

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://rumble.com/embed/v1knkj4/?pub=4

The text reads as follows:

Read more: The Berlin Pedo Network in politics and schools:GoMoPa & GoMoPa4Kids-Does the German government promote pedophiles?

QUOTE

“Circumcised boys can no longer masturbate!

Totally wrong! Circumcised boys can masturbate as well as uncircumcised boys. Most of the time, they just have to change their technique. About every fifth boy in Germany is circumcised. This means that his foreskin was shortened during an operation so that his glans is permanently exposed. The main reason for circumcision for most people was a foreskin narrowing (phimosis), which caused pain when the foreskin was pulled back. Few can be circumcised because they simply like a penis without a foreskin.

Where the rumor comes from:

Most guys masturbate by grasping their penis and pushing the foreskin back and forth. But what if there are no foreskins left to slide back and forth? For some there is obviously only one consequence: Then it doesn’t work anymore with masturbation! Not correct!

The truth is:

Every boy can satisfy himself – whether with or without a foreskin! So that the hand can slide over the sensitive penis shaft even without a foreskin, many boys use some body lotion or lubricant. Since a circumcised boy can no longer irritate the glans by pushing the foreskin back and forth, he performs the stimulating hand movements up to the glans. This is usually a little less sensitive for guys without a foreskin.

One thing is clear: after circumcision, every man has to get to know his little friend again and try out how he reacts to rubbing or petting. So if it doesn’t work as lustily as it did before circumcision – don’t despair! After a circumcision surgery, it may take a few months for you to get used to the new situation. Until then, just try and practice.

Girls masturbate with their fingers in their vagina!

It does not work that way! Sure, you can do that. But if you want to reach orgasm, it doesn’t work that way.

Where the rumor comes from:

Probably because many girls and boys do not know that a woman inside the vagina is not particularly excitable. The pleasure center of the woman is not the vagina, but her clit (the clitoris). And that is not in the vagina, but outside, between the labia – towards the navel – where the inner labia meet!

The truth is:

A woman usually comes to orgasm when she rubs her clit! Trying to masturbate a girl by shoving her finger in her vagina and moving it back and forth may make her feel pleasant – but she doesn’t get to climax this way. But if she stimulates her clit and the area around it, it is much more exciting for her.

Incidentally, it is the same with intercourse. Few women come to orgasm simply through the in-out movements of the penis in the vagina. Most also need to stimulate their clitoris with their hands in order to reach their climax.

Rumor: boys come quickly, girls slowly!

Continue reading “The Berlin Pedo Network in politics and schools:GoMoPa & GoMoPa4Kids-Does the German government promote pedophiles?”

The Berlin Pedo Network in politics and schools:GoMoPa & GoMoPa4Kids-Does the German government promote pedophiles?

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://rumble.com/embed/v1knkj4/?pub=4

The text reads as follows:

Read more: The Berlin Pedo Network in politics and schools:GoMoPa & GoMoPa4Kids-Does the German government promote pedophiles?

QUOTE

“Circumcised boys can no longer masturbate!

Totally wrong! Circumcised boys can masturbate as well as uncircumcised boys. Most of the time, they just have to change their technique. About every fifth boy in Germany is circumcised. This means that his foreskin was shortened during an operation so that his glans is permanently exposed. The main reason for circumcision for most people was a foreskin narrowing (phimosis), which caused pain when the foreskin was pulled back. Few can be circumcised because they simply like a penis without a foreskin.

Where the rumor comes from:

Most guys masturbate by grasping their penis and pushing the foreskin back and forth. But what if there are no foreskins left to slide back and forth? For some there is obviously only one consequence: Then it doesn’t work anymore with masturbation! Not correct!

The truth is:

Every boy can satisfy himself – whether with or without a foreskin! So that the hand can slide over the sensitive penis shaft even without a foreskin, many boys use some body lotion or lubricant. Since a circumcised boy can no longer irritate the glans by pushing the foreskin back and forth, he performs the stimulating hand movements up to the glans. This is usually a little less sensitive for guys without a foreskin.

One thing is clear: after circumcision, every man has to get to know his little friend again and try out how he reacts to rubbing or petting. So if it doesn’t work as lustily as it did before circumcision – don’t despair! After a circumcision surgery, it may take a few months for you to get used to the new situation. Until then, just try and practice.

Girls masturbate with their fingers in their vagina!

It does not work that way! Sure, you can do that. But if you want to reach orgasm, it doesn’t work that way.

Where the rumor comes from:

Probably because many girls and boys do not know that a woman inside the vagina is not particularly excitable. The pleasure center of the woman is not the vagina, but her clit (the clitoris). And that is not in the vagina, but outside, between the labia – towards the navel – where the inner labia meet!

The truth is:

A woman usually comes to orgasm when she rubs her clit! Trying to masturbate a girl by shoving her finger in her vagina and moving it back and forth may make her feel pleasant – but she doesn’t get to climax this way. But if she stimulates her clit and the area around it, it is much more exciting for her.

Incidentally, it is the same with intercourse. Few women come to orgasm simply through the in-out movements of the penis in the vagina. Most also need to stimulate their clitoris with their hands in order to reach their climax.

Rumor: boys come quickly, girls slowly!

Continue reading “The Berlin Pedo Network in politics and schools:GoMoPa & GoMoPa4Kids-Does the German government promote pedophiles?”

The Berlin Pedo Network in politics and schools:GoMoPa & GoMoPa4Kids-Does the German government promote pedophiles?

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://rumble.com/embed/v1knkj4/?pub=4

The text reads as follows:

Read more: The Berlin Pedo Network in politics and schools:GoMoPa & GoMoPa4Kids-Does the German government promote pedophiles?

QUOTE

“Circumcised boys can no longer masturbate!

Totally wrong! Circumcised boys can masturbate as well as uncircumcised boys. Most of the time, they just have to change their technique. About every fifth boy in Germany is circumcised. This means that his foreskin was shortened during an operation so that his glans is permanently exposed. The main reason for circumcision for most people was a foreskin narrowing (phimosis), which caused pain when the foreskin was pulled back. Few can be circumcised because they simply like a penis without a foreskin.

Where the rumor comes from:

Most guys masturbate by grasping their penis and pushing the foreskin back and forth. But what if there are no foreskins left to slide back and forth? For some there is obviously only one consequence: Then it doesn’t work anymore with masturbation! Not correct!

The truth is:

Every boy can satisfy himself – whether with or without a foreskin! So that the hand can slide over the sensitive penis shaft even without a foreskin, many boys use some body lotion or lubricant. Since a circumcised boy can no longer irritate the glans by pushing the foreskin back and forth, he performs the stimulating hand movements up to the glans. This is usually a little less sensitive for guys without a foreskin.

One thing is clear: after circumcision, every man has to get to know his little friend again and try out how he reacts to rubbing or petting. So if it doesn’t work as lustily as it did before circumcision – don’t despair! After a circumcision surgery, it may take a few months for you to get used to the new situation. Until then, just try and practice.

Girls masturbate with their fingers in their vagina!

It does not work that way! Sure, you can do that. But if you want to reach orgasm, it doesn’t work that way.

Where the rumor comes from:

Probably because many girls and boys do not know that a woman inside the vagina is not particularly excitable. The pleasure center of the woman is not the vagina, but her clit (the clitoris). And that is not in the vagina, but outside, between the labia – towards the navel – where the inner labia meet!

The truth is:

A woman usually comes to orgasm when she rubs her clit! Trying to masturbate a girl by shoving her finger in her vagina and moving it back and forth may make her feel pleasant – but she doesn’t get to climax this way. But if she stimulates her clit and the area around it, it is much more exciting for her.

Incidentally, it is the same with intercourse. Few women come to orgasm simply through the in-out movements of the penis in the vagina. Most also need to stimulate their clitoris with their hands in order to reach their climax.

Rumor: boys come quickly, girls slowly!

Continue reading “The Berlin Pedo Network in politics and schools:GoMoPa & GoMoPa4Kids-Does the German government promote pedophiles?”

IZ-Tainted Love – Pop Stasi

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://truthbook.social/berndpulch

👉JOIN @ABOVETOPSECRETXXL

ABOVETOPSECRETXXL

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

https://gab.com/berndpulch

https://www.bitchute.com/accounts/referral/berndpulchofficial/

https://www.bitchute.com/channel/R55w1IXstR3h/

👉JOIN @ABOVETOPSECRETXXL

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

The Berlin Pedo Network in politics and schools:GoMoPa & GoMoPa4Kids-Does the German government promote pedophiles?

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://rumble.com/embed/v1knkj4/?pub=4

The text reads as follows:

Read more: The Berlin Pedo Network in politics and schools:GoMoPa & GoMoPa4Kids-Does the German government promote pedophiles?

QUOTE

“Circumcised boys can no longer masturbate!

Totally wrong! Circumcised boys can masturbate as well as uncircumcised boys. Most of the time, they just have to change their technique. About every fifth boy in Germany is circumcised. This means that his foreskin was shortened during an operation so that his glans is permanently exposed. The main reason for circumcision for most people was a foreskin narrowing (phimosis), which caused pain when the foreskin was pulled back. Few can be circumcised because they simply like a penis without a foreskin.

Where the rumor comes from:

Most guys masturbate by grasping their penis and pushing the foreskin back and forth. But what if there are no foreskins left to slide back and forth? For some there is obviously only one consequence: Then it doesn’t work anymore with masturbation! Not correct!

The truth is:

Every boy can satisfy himself – whether with or without a foreskin! So that the hand can slide over the sensitive penis shaft even without a foreskin, many boys use some body lotion or lubricant. Since a circumcised boy can no longer irritate the glans by pushing the foreskin back and forth, he performs the stimulating hand movements up to the glans. This is usually a little less sensitive for guys without a foreskin.

One thing is clear: after circumcision, every man has to get to know his little friend again and try out how he reacts to rubbing or petting. So if it doesn’t work as lustily as it did before circumcision – don’t despair! After a circumcision surgery, it may take a few months for you to get used to the new situation. Until then, just try and practice.

Girls masturbate with their fingers in their vagina!

It does not work that way! Sure, you can do that. But if you want to reach orgasm, it doesn’t work that way.

Where the rumor comes from:

Probably because many girls and boys do not know that a woman inside the vagina is not particularly excitable. The pleasure center of the woman is not the vagina, but her clit (the clitoris). And that is not in the vagina, but outside, between the labia – towards the navel – where the inner labia meet!

The truth is:

A woman usually comes to orgasm when she rubs her clit! Trying to masturbate a girl by shoving her finger in her vagina and moving it back and forth may make her feel pleasant – but she doesn’t get to climax this way. But if she stimulates her clit and the area around it, it is much more exciting for her.

Incidentally, it is the same with intercourse. Few women come to orgasm simply through the in-out movements of the penis in the vagina. Most also need to stimulate their clitoris with their hands in order to reach their climax.

Rumor: boys come quickly, girls slowly!

Continue reading “The Berlin Pedo Network in politics and schools:GoMoPa & GoMoPa4Kids-Does the German government promote pedophiles?”

IZ-Tainted Love – Pop Stasi

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://truthbook.social/berndpulch

👉JOIN @ABOVETOPSECRETXXL

ABOVETOPSECRETXXL

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

https://gab.com/berndpulch

https://www.bitchute.com/accounts/referral/berndpulchofficial/

https://www.bitchute.com/channel/R55w1IXstR3h/

👉JOIN @ABOVETOPSECRETXXL

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

Der “GoMoPa”-Albtraum – A-Z- 2.000 Stasi Offiziere – “Schläferliste der STASI”- STASI-SLEEPER LIST A-Z

see more info at http://www.victims-opfer.com

This is the list of the STASI Agents waiting for their call to action in Western Europe from A-Z with their real names.

We have also published on this website new documents about Stratfor and their internal discussions about the STASI.

This is part of our cooperation with Wikileaks.

The Global Intelligence files were provided by Wikileaks.

This is part of our Investigative Partnership organised by WikiLeaks – the Data was obtained by WikiLeaks.

The STASI lists stem from the STASI itself. It is the so called “Fipro” list which was made to secure the pensions of the STASI Agents in Germany after the Reunification.

Below you find an explanation in German Language:

Die Liste wurde bereits früher hier publiziert:

http://stasiopfer.de/component/option,com_simpleboard/Itemid,/func,view/id,993815828/catid,4/

Vom “Stasiopfer”-Angebot führt ein Link zu einer Website in den USA (www.jya.com), die sich auch mit den Praktiken von Geheimdiensten beschäftigt. Dort findet sich die “Fipro-Liste”, das detaillierte “Finanzprojekt” der Stasi, angefertigt in den letzten Tagen der DDR, um die Rentenansprüche der rund 100 000 hauptamtlichen Mitarbeiter des MfS auch nach dem Zusammenbruch des Systems belegen zu können. Die “Fipro-Liste” ist seit langem bekannt und diente Anfang der neunziger Jahre etwa zur Identifizierung der so genannten OibE – Offiziere im besonderen Einsatz. Diese  Liste „Offiziere im besonderen Einsatz“im Jahre 1991 erschien  in der “taz. Die Echtheit kann beim BStU überprüft werden.

Siehe u.a. http://www.spiegel.de/spiegel/print/d-22539439.html

Auf Druck ehemaliger STASI-Leute und Ihrer Genossen wurde die Liste aus dem Verkehr gezogen.

Hier ist sie wieder:

Stasi Offiziere im besonderen Einsatz (abgekürzt OibE)
Stasi Schläfer Liste
Technische Hinweise:
Diese Daten stammen aus der OibE-Liste. Die Tabellen wurden von H.T. per OCR usw. in HTML gewandelt.
Die Datensätze sind – anders geordnet – auch Teilmenge der (‘HAMSTER’-Liste/MA_Stasi.txt). Dort sind die mit Adressen versehenen und meist gedoppelten Datensätze diejenigen der OibE.
OibE dürfen nicht mit Inoffiziellen Mitarbeitern (IM) verwechselt werden. Sie hatten im Gegensatz zu den IM [Ausnahme: HIM] ein Dienstverhältnis mit der Stasi und einen Kampfauftrag.
Die OibE sollten unter allen Umständen zum MfS stehen und mussten sich vor der “Abordnung” ins Zivilleben durch besondere ideologische Zuverlässigkeit auszeichnen. Deshalb fühlen sich viele dieser Überzeugungstäter wahrscheinlich heute noch der Stasi verpflichtet, leben aber ganz unauffällig. Man könnte sie auch als “Schläfer” bezeichnen.
Offiziere im besonderen Einsatz (abgekürzt OibE) waren hauptamtliche Mitarbeiter des Ministeriums für Staatssicherheit

Zudem kommen weitere STASI-Agenten in Westdeutschland, die noch besser getarnt wurden und deren Legenden sorgfältig aufbereitet wurden.
Viel schufen sich in den Wirren um 1989 eine neue Identität mit neuem Namen auch in Westdeutschland. Somit sind hier nur deren ALTE und RICHTIGE Namen erfasst.
Name, Vorname; Geb.-datum; DE: Zentrale, BV, KD; DE-Code; PLZ; Az. / Reg.-Nr.
Ackermann, Frank; 29.04.55; HVA; 961500; 1092; 4288/81, F
Ackermann, Kerstin; 22.02.58; HVA; 961500; 1092; 4288/81/1, F
Adelmeier, Lutz; 18.11.53; HVA; 961500; 1590; 650/75/12,
Ahrendt, Hans; 17.11.50; Abt. XI; 941100; 1092; 2382/74,
Amthor, Jürgen; 25.01.47; Abt. N; 906540; 1130; 7263/75,
Anschütz, Günter; 07.04.54; Abt. XI; 941100; 6110; 3454/86,
Antoni, Detlef; 02.06.59; HVA; 961500; 1162; 2110/84, F
Arlt, Frank; 12.03.58; HVA; 961500; 1140; 650/75/54,
Auerbach, Christel; 01.04.36; HVA; 961500; 1020; 79/74, B
Auerbach, Hans- Dieter; 25.03.37; HVA; 961500; 1020; 80/74, J
Aul, Claus; 28.09.62; HVA; 961500; 1150; 3776/85, F
Autenrieb, Eckbert; 02.06.56; Abt. N; 906540; 1095; 5785/82,
Badelt, Dieter; 17.01.37; Rostock VII; 010700; 2520; 4909/75,
Bahl, Reinhard; 10.03.48; HVA; 961500; 2800; 527/88, M
Baltruschat, Klaus; 27.07.34; HVA; 961500; 1170; 13222/60, X
Balzer, Christian; 28.10.51; Abt. N; 906540; 1115; 1690/76,
Bandermann, Hans-Rainer; 12.05.45; Abt. N; 906540; 1280; 4378/77,
Barnowsky, Wolfgang; 24.08.38; HVA; 961500; 1017; 962/83, M
Bartels, Klaus; 06.04.39; KD Stendal; 070054; 3500; BARTELS, KLAUS
Bartels, Uwe; 23.02.64; HVA; 961500; 1093; 5764/81/4, D
Barten, Günter; 27.11.38; Abt. XI; 941100; 1291; 179/78,
Barzik, Hans-Joachim; 30.08.46; HVA; 961500; 1190; 592/86, F
Barzik, Renate; 05.08.49; HVA; 961500; 1190; 592/86/1, F
Bassin, Dietrich; 28.04.34; BV Berlin XVIII; 151800; 1058; 1911/78,
Bauer, Gerhard; 29.08.47; Abt. N; 906540; 1140; 4254/77,
Bauer, Ralf; 04.06.64; HVA; 961500; 1144; 2858/84, F
Baumann, Manfred; 25.04.39; OD TU/H Dresden; 120058; 8045; XII/1353/87,
Baumann, Reinhard; 25.05.40; KD Pirna; 120052; 8300; XII/1359/87,
Bauschmann, Rolf-Jürgen; 19.04.57; Abt. N; 906540; 1095; 7575/80,
Bazyli, Dieter; 10.08.35; Frankfurt/O. IX; 050900; 1200; V/425/88,
Bäumler, Hans; 29.06.33; HVA; 961500; 1144; 21/77, F
Becker, Günter; 24.02.38; HVA; 961500; 1120; 2649/80, F
Becker, Heidrun; 30.03.52; HVA; 961500; 1090; 2850/78, J
Becker, Ralf-Ekkehard; 16.04.57; Abt. N; 906540; 1130; 5040/76,
Becke, Ronald; 07.03.57; HVA; 961500; 5062; 650/75/27,
Beier, Peter; 02.08.42; OD KKW Nord; 010050; 2200; 5678/84,
Beitz, Hans-Joachim; 07.10.37; Abt. XI; 941100; 1100; 2233/66,
Benjowski, Klaus; 22.08.35; HVA; 961500; 1162; 364/77, U
Benndorf, Roland; 11.03.57; Abt. N; 906540; 1142; 1787/81,
Berger, Andreas; 16.11.62; Abt. XI; 941100; 7065; 1713/89,
Bergmann, Holger; 23.04.60; HVA; 961500; 8291; 650/75/25,
Bergmann, Thomas; 04.04.54; HVA; 961500; 1144; 1439/89, F
Berliner, Kurt; 16.12.35; HVA; 961500; 1080; 1858/89, F
Berndt, Walter; 03.01.31; Abt. XI; 941100; 1017; 246/77,
Bernhardt, Hans; 30.05.28; HVA; 961500; 1195; 9831/61, F
Bernhardt, Hans-Joachim; 15.02.56; Abt. XI; 941100; 4370; 1709/89,
Bertholf, Manfred; 02.02.37; BV Berlin XVIII; 151800; 1055; 867/80,
Bertsch-Herzog, Herbert; 21.07.29; HVA; 961500; 1080; 3665/60/1, U
Betsch, Brigitt; 16.01.55; HVA; 961500; 1055; 5010/87, U
Betsch, Michael; 30.11.46; HVA; 961500; 1140; 2259/73,
Bettzieche, Frank; 21.10.54; HVA; 961500; 1093; 904/84, F
Bettzüge, Eberhard; 22.01.35; Abt. N; 906540; 1136; 1807/72
Beuster, Gerhard; 03.07.52; Abt. N; 906540; 1292; 7270/75,
Bevermann, Jürgen; 14.10.43; HVA; 961500; 1142; 209/81, F
Bewersdorf, Wolfram; 20.05.61; Abt. N; 906540; 1280; 3022/84,
Beyer, Alfred; 30.05.38; HVA; 961500; 1190; 528/88, M
Beyer, Andreas; 23.01.61; HVA; 961500; 1580; 650/75/55,
Bezdicek, Rolf-Dieter; 20.09.58; Abt. XI; 941100; 1120; 844/83,
Bienert, Peter; 10.08.42; Abt. N; 906540; 1020; 4110/79,
Bilke, Paul; 02.06.28; HVA; 961500; 1020; 9/76, X
Birgel, Artur; 25.01.35; HVA; 961500; 1020; 4207/84, 0
Birnbach, Steffen; 23.10.53; Karl-Marx-Stadt XX; 142000; 9081; K/3505/89,
Blank, Gerhard; 16.12.31; HVA; 961500; 1130; 3156/89, E
Blank, Monika; 12.10.39; HVA; 961500; 1130; 3156/89/1, E
Blaudzun,Alfred; 26.10.38; Rostock VI; 010600; 2500; 5011/86,
Blei, Holger; 08.05.57; HVA; 961500; 1055; 4644/80, J
Block, Gerhard; 04.11.52; Abt. XI; 941100; 3530; 5125/85,
Bloß, Rolf; 08.04.33; Dresden XVIII; 121800; 8019; XII/1344/87,
Blumenberg, Igor; 27.06.52; Abt. XI; 941100; 1130; 311/80,
Blum, Ines; 02.04.62; HVA; 961500; 1199; 2410/79, J
Blutnick, Harry; 27.01.36; HVA; 961500; 1020; 1653/87, F
Bock, Andre; 01.11.67; Abt. N; 906540; 1095; 5546/88,
Bogacz, Carsten; 10.11.58; HVA; 961500; 7513; 650/75/56,
Bohm, Peter; 24.10.45; HVA; 961500; 1144; 1671/87, F
Bohn, Detlef; 12.05.59; Abt. XI; 941100; 4070; 492/87,
Bohn, Steffi; 14.10.59; HVA; 961500; 4070; 492/87/1, F
Bohn, Wolfgang; 16.05.51; HVA; 961500; 1092; 2112/72, F
Bollmann, Lutz; 16.12.68; Abt. N; 906540; 1140; 5189/88,
Borchert, Detlef; 09.12.48; Abt. N; 906540; 1100; 255/73,
Borchert, Hans-Joachim; 19.11.54; HVA; 961500; 1142; 398/76, F
Bornschein, Horst; 20.04.30; Abt. XI; 941100; 1156; 3597/81,
Born, Joachim; 25.04.58; Abt. N; 906540; 1092; 4325/87,
Böhm, Jürgen; 22.11.44; HVA; 961500; 1142; 2660/79, M
Börnchen, Peter; 20.07.39; HVA; 961500; 1250; 30/70, A
Brada, Wolfgang; 15.11.50; HVA; 961500; 1130; 650/75/11,
Brade, Rolf; 21.07.42; Abt. XI; 941100; 1600; 271/68,
Brate, Andreas; 11.12.54; HVA; 961500; 1142; 3039/82, M
Brändel, Lothar; 19.04.35; KD Leipzig/Land; 130041; 4090; K, 4232/86,
Brendtner, Werner; 23.03.42; Rostock VII; 010700; 2520; 4733/88,
Bretschneider, Jens; 29.08.67; Karl-Marx-Stadt VIII; 140800; 9271; 182,
Bruhn, Siegfried; 28.11.50; HVA; 961500; 2520; 650/75/39,
Brunner, Manfred; 26.04.29; HVA; 961500; 1144; 1920/75, J
Bruns, Beate; 05.06.62; HVA; 961500; 1140; 6555/82, J
Brüning, Falk; 11.06.63; HVA; 961500; 1095; 4361/84, M
Burckhardt, Dietmar; 03.08.44; HVA; 961500; 1020; 3467/86, L
Burde, Hans-Joachim; 18.05.47; Abt. N; 906540; 1092; 2010/67,
Burkhardt, Marco; 12.10.59; HVA; 961500; 1142; 3887/83, E
Buschendorf, Lutz; 21.11.41; HVA; 961500; 1142; 3478/65, A
Bussin, Günter; 26.07.54; HVA; 961500; 1142; 3328/86, A
Büchner, Eckhard; 23.09.56; Abt. N; 906540; 1153; 3619/77,
Bürger, Heiderose; 05.05.50; Abt. N; 961500; 1140; 5764/81/3, D
Cantow, Hans-Gerhard; 11.01.44; HVA; 961500; 1143; 360/68, L
Christoph, Martin; 30.03.58; HVA; 961500; 9900; 650/75/26,
Claus, Werner; 29.03.26; HVA; 961500; 1017; 401/73, P
Cotte, Wolfgang; 16.11.51; HVA; 961500; 1600; 619/83, L
Czieselsky, Frank; 05.05.58; Abt. N; 906540; 1017; 2960/79,
Daum, Heinz; 09.09.35; BV Berlin VI; 150600; 1020; 4101/77,
Dau, Holger; 20.01.58; HVA; 961500; 1143; 7701/81, F
Dähn, Bernd; 23.07.48; Abt. XI; 941100; 1035; 97/75,
Degenhardt, Dieter; 12.07.31; HA VII; 970700; 1140; DEGENHARDT, DIETER
Dehmel, Wolfgang; 12.07.49; Abt. N; 906540; 1142; 7401/81,
Derlath, Bettina; 08.02.56; HVA; 961500; 1090; 5182/84, M
Deters, Frank; 10.11.67; Abt. N; 906540; 1950; 4649/87,
Deutscher, Peter; 16.07.47; HVA; 961500; 8019; 1382/89, M
Deysing, Gerd; 04.10.53; HVA; 961500; 1142; 650/75/58,
Diettrich, Günter; 06.05.53; Abt. N; 906540; 1281; 1794/80,
Dietrich, Matthias; 30.07.66; HVA; 961500; 1156; 4383/86, F
Dietrich, Reinhilde; 25.07.37; Abt. N; 906540; 1110; 5004/80,
Diettrich, Heidi; 14.11.54; Abt. N; 906540; 1281; 2002/87,
Dittrich, Michael; 09.11.46; Abt. XI; 941100; 1141; 99/75,
Dittrich, Wolfgang; 08.07.49; Abt. N; 906540; 1142; 1675/78,
Doegelsack, Uta; 20.01.63; Abt. N; 906540; 1093; 5808/84,
Donath, Martin; 03.04.51; HVA; 961500; 2520; 671/89, A
Dorgwarth, Reinhard; 10.11.48; Abt. N; 906540; 1280; 4379/77,
Dott, Bernd; 01.07.41; BV Berlin VII; 150700; 1180; 241/78,
Döbel, Holger; 07.04.61; Abt. N; 906540; 1143; 4865/81,
Döbereiner, Rene; 02.08.67; Karl-Marx-Stadt VIII; 140800; 9072; 175,
Drechsler, Peter; 06.06.57; HVA; 961500; 1136; 3594/74, F
Dreger, Uwe; 25.12.51; Abt. N; 906540; 1281; 7271/75,
Drexler, Andreas; 03.12.50; HVA; 961500; 1120; 4675/85, A
Dumke, Bodo; 21.03.51; BV Berlin VI; 150600; 1080; 1299/85,
Dybiona, Detlef; 21.05.60; Abt. XI; 941100; 3090; 494/87,
Dylla, Bernd; 07.03.57; Abt. XI; 941100; 6902; 767/86,
Ebedus, Dieter; 17.01.59; Abt. XI; 941100; 4350; 1819/87,
Eckert, Gerhard; 24.09.31; KD Eisenhüttenstadt; 050045; 1220; V/481/88,
Effenberger, Helga; 10.07.38; HVA; 961500; 1017; 19666/60/1, E
Effenberger, Rudolf; 13.01.33; HVA; 961500; 1017; 19666/60, E
Eggert, Asmus; 17.12.47; HVA; 961500; 1130; 2394/85, J
Eggestein, Dieter; 20.12.38; Rostock XVIII; 011800; 2520; 3862/81,
Ehrke, Hans-Jürgen; 17.01.42; Abt. N; 906540; 1090; 4025/79,
Ehrenberg, Rolland; 25.09.47; Frankfurt/O. IX; 050900; 1200; V/447/88,
Eichentopf, Marlis; 27.06.61; HVA; 961500; 5080; 5362/89, F
Eichhorn, Hans; 14.10.38; HVA; 961500; 1054; 1305/68, P
Eichner, Ulla; 02.04.42; HVA; 961500; 1092; 4218/84, F
Eisenhardt, Joachim; 05.09.58; Abt. N; 906540; 1095; 3413/78,
Elfert, Wolfgang; 08.05.56; Abt. XI; 941100; 1250; 448/80,
Elliger, Gabriele; 06.12.61; HVA; 961500; 1142; 650/75/59/1,
Elliger, Uwe; 08.05.58; HVA; 961500; 1142; 650/75/59,
Ende, Michael; 30.06.52; BV Berlin VII; 150700; 1092; 4977/79,
Engelmann, Frank; 03.08.42; HVA; 961500; 1140; 5681/86, M
Engelmann, Gabriele; 15.08.46; HVA; 961500; 1140; 3876/86, M
Englberger, Wolfgang; 24.06.43; HVA; 961500; 1020; 3760/87, U
Enke, Brigitte; 04.08.44; HVA; 961500; 1280; 650/75/50/1,
Enke, Dieter; 02.07.45; HVA; 961500; 1280; 650/75/50,
Escherich, Rolf; 18.01.40; HVA; 961500; 1156; 3039/62, F
Euen, Wolf; 19.02.44; KD Riesa; 120053; 8400; XlI/2673/87,
Ewald, Peter; 28.01.50; Abt. N; 906540; 1140; 3622/77,
Faber, Kurt; 30.07.27; Abt. XI; 941100; 1170; 8348/60,
Falkehagen, Bärbel; 10.04.56; Abt. N; 906540; 1130; 3412/78,
Falkenhagen, Ingo; 29.07.56; Abt. N; 906540; 1130; 2403/78,
Fauck, Alexa; 04.12.51; HVA; 961500; 1095; 3820/85/1, F
Fauck, Wolfgang; 21.01.50; HVA; 961500; 1095; 3820/85, F
Fähnrich, Alfred; 01.07.32; HA I; 970100; 1602; K, 4271/80
Fähnrich, Manfred; 29.03.33; Rostock XVIII; 011800; 2500; 549/60,
Fedtke, Simone; 02.03.66; HVA; 961500; 1092; 4462/81, A
Feige, Brigitte; 07.03.48; HVA; 961500; 1143; 592/88 F
Fell, Klaus; 30.05.35; Abt. N; 906540; 1092; 7259/75,
Fichtmüller, Jens; 06.03.67; HVA; 961500; 4850; 3641/88, O
Fickel, Michael; 30.01.61; HVA; 961500; 1140; 4276/83, J
Fiedler, Gunter; 16.09.51; HVA; 961500; 1034; 2113/72, F
Finsterbusch, Werner; 08.07.56; HVA; 961500; 1093; 5693/81, A
Fischer, Gerd; 21.02.61; HA VI; 970600; 1144; K, 3435/89
Fischer, Hans; 11.10.50; HVA; 961500; 1142; 505/83, O
Fischer, Hartmut; 25.04.52; HVA; 961500; 1250; 2256/73, F
Fischer, Horst; 03.02.32; HVA; 961500; 1600; 1573/85, K
Fischer, Horst; 03.05.46; KD Berlin-Köpenick; 150041; 1170; 2562/80,
Fischer, Karl-Heinz; 19.08.28; HVA; 961500; 1136; 2110/73, Z
Fischer, Klaus-Dieter; 06.12.44; Rostock XVIII; 011800; 2551; 3875/80,
Fischer, Marion; 02.08.52; HVA; 961500; 1142; 2779/84, O
Flister, Magrit; 20.02.56; HVA; 961500; 1020; 4561/87, U
Fox, Erhard; 04.12.52; Abt. XI; 941100; 2355; 5313/88,
Fraatz, Helmut; 06.07.31; HVA; 961500; 1156; 221/75, M
Franke, Lothar; 04.11.47; Abt. N; 906540; 1142; 5074/77,
Franke, Wilfried; 25.08.53; Rostock; 014300; 2500; 5952/84,
Franz, Bodo; 13.01.59; Abt. N; 906540; 1150; 1549/80,
Franz, Jürgen; 09.04.46; Abt. N; 906540; 1142; 2112/66,
Franz, Jürgen; 30.06.55; Abt. XI; 941100; 3250; 6588/81,
Frauenstein, Rolf; 14.07.52; HVA; 961500; 1143; 3166/78, J
Fränkler, Sabine; 10.02.61; HVA; 961500; 1020; 2264/86, U
Freese, Frank; 25.03.62; Abt. N; 906540; 1095; 2567/87,
Freitag, Ilona; 02.10.52; Dresden XIX; 121900; 8060; XII/2747/87,
Freund, Mario; 10.01.64; Abt. XI; 941100; 3038; 2759/89,
Freyberg, Rudolf; 23.09.35; Abt. N; 906540; 1055; 7260/75,
Freyer, Ingolf; 10.07.30; HVA; 961500; 1120; 1347/85, F
Freyer, Thorsten; 10.11.60; HVA; 961500; 1136; 650/75/40,
Frey, Rainer; 02.06.42; HVA; 961500; 7500; 1586/87, F
Frick, Dieter; 28.06.58; HVA; 961500; 1140; 4054/81, F
Friebe, Günter; 28.09.43; HVA; 961500; 1090; 1640/88, F
Friedel, Hartmut; 12.02.49; HVA; 961500; 1093; 231/78, J
Friedrich, Gerhard; 21.12.29; HA VI; 970600; 1034; K, 862/80
Friedrich, Joachim; 06.07.48; Abt. XI; 941100; 1141; 67/78,
Friedrich, Jörg; 30.06.64; HVA; 961500; 1193; 3925/86, F
Fritzsche, Harald; 14.08.57; Abt. XI; 941100; 1054;
Fruck, Gerhard; 13.05.35; Abt. N; 906540; 1136; 3706/73,
Fuchs, Eberhard; 04.10.50; HVA; 961500; 1153; 2879/78, J
Fuchs, Wolfgang; 18.11.53; HVA; 961500; 1156; 3547/82, M
Fungk, Torsten; 03.11.57; Abt. N; 906540; 1142; 2956/79,
Funke, Dieter; 20.01.38; HVA; 961500; 1080; 2929/61, F
Funk, Lutz; 22.09.57; HVA; 961500; 1095; 650/75/60,
Funk, Margret; 22.05.55; HVA; 961500; 1095; 650/75/60/1,
Füßler, Hubertus ; 10.01.56; HVA; 961500; 5080; 529/88, M
Füßl, Boris; 06.06.61; Abt. XI; 941100; 1018; 2417/88,
Fydrich, Erhard; 15.05.42; HVA; 961500; 1250; 593/86, F
Gableske, Gunther; 08.04.60; Abt. N; 906540; 1280; 7517/81,
Gallandt, Ronald; 16.08.57; Abt. N; 906540; 1280; 1788/78,
Gander, Jürgen; 31.08.47; Abt. N; 906540; 1156; 7275/75,
Gawlitza, Peter-Michael ; 07.12.46; HVA; 961500; 1142; 2505/65, G
Gäbler, Eveline; 23.08.56; Abt. N; 906540; 1281; 5155/88,
Gäbler, Ralf-Detlef ; 01.11.56; Abt. N; 906540; 1281; 3324/76,
Gehrt, Wolf-Rüdiger ; 26.01.56; Abt. N; 906540; 1090; 1840/79,
Geißenhöner, Bernd; 26.08.43; Abt. XI; 941100; 1092; 377/69,
Gerber, Jürgen; 05.05.49; Dresden XIX; 121900; 8020; XII/2666/87,
Gerber, Lutz; 19.01.61; Abt. N; 906540; 1140; 7472/80,
Gerhard, Henry; 23.02.32; KD Berlin-Köpenick; 150041; 1199; 1041/70,
Gerlach, Rainer; 25.02.53; HVA; 961500; 5080; 1477/87, F
Gerlach, Roland; 20.01.51; HVA; 961500; 1280; 4006/76, F
Gerstner, Christine; 01.07.43; HVA; 961500; 1136; 5255/85, D
Gerth, Peter; 21.05.54; Rostock XIX; 011900; 2540; 666/87,
Gielow, Hubert; 11.03.53; Abt. N; 906540; 1017; 2028/79,
Giesen, Gisela; 23.02.30; Abt. XI; 941100; 1197; 1866/69/2,
Gietl, Gottfried; 24.05.34; HVA; 961500; 1055; 18554/60, T
Gladitz, Dieter; 19.02.37; HVA; 961500; 1020; 3323/86, J
Gladitz, Edgar; 02.12.34; HVA; 961500; 1020; 2806/78, F
Gläßer, Axel; 18.07.57; Abt. N; 906540; 1020; 3100/80,
Glöckner, Hermann; 07.04.28; Dresden VI; 120600; 8060; XII/2657/87,
Goersch, Bärbel; 29.05.54; HVA; 961500; 1093; 5764/81/2, D
Golombek, Bernd; 30.07.62; Abt. XI; 941100; 1560; 5310/88,
Gompert, Dieter; 26.11.33; KD Strausberg; 050049; 1260; V/426/88,
Gorldt, Peter; 20.12.42; HVA; 961500; 9005; 530/88, M
Goutrie, Peter; 27.11.47; Abt. N; 906540; 1281; 3557/78,
Görke, Peter; 26.06.61; HVA; 961500; 1150; 921/83, F
Göthel, Jürgen ; 20.07.53; HVA; 961500; 1142; 8164/81, L
Grahmann, Dieter; 25.06.41; HVA; 961500; 1106; 5602/86, L
Gramß, Werner; 03.06.29; HVA; 961500; 1017; 2859/68, M
Grandel, Winfried; 12.03.43; KD Berlin-Köpenick; 150041; 1144; 3047/80,
Graßmann, Walter; 28.02.46; Abt. N; 906540; 1092; 2009/67,
Gräser, Rolf; 14.07.42; HVA; 961500; 1140; 662/88, M
Gräser, Ute; 24.02.63; HVA; 961500; 1140; 609/88, M
Greve, Bernd; 25.09.57; Abt. N; 906540; 1017; 5075/77,
Grieger, Angela; 11.05.63; HVA; 961500; 1185; 3973/81, O
Grigat, Alfred; 26.05.39; HVA; 961500; 2850; 3317/84, M
Grimmek, Norbert; 24.05.57; Abt. N; 906540; 1281; 4711/78,
Grimm, Peter; 03.11.41; HVA; 961500; 1156; 200/66, F
Grohmann, Achim; 15.02.54; HVA; 961500; 1100; 2518/88, F
Grohs, Michael; 19.10.53; HVA; 961500; 1143; 327/81, M
Gromes, Wilfried; 29.09.51; HVA; 961500; 1170; 1679/88, E
Großer, Jürgen; 27.01.59; HVA; 961500; 1607; 650/75/37,
Große, Hans-Peter ; 02.03.38; HVA; 961500; 1136; 2677/82, J
Großmann, Dietrich ; 24.09.41; Abt. XI; 941100; 1130; 2260/66,
Großmann, Gerald; 23.03.57; Abt. N; 906540; 1142; 1775/78,
Groß, Andreas; 29.11.55; Abt. XI; 941100; 9050; 6933/88,
Grotelüschen, Claus; 27.02.36; HVA; 961500; 1603; 2295/70, U
Grote, Konrad; 15.02.41; HVA; 961500; 1093; 1967/64, A
Groth, Rudi; 26.07.43; Abt. N; 906540; 1136; 1991/69,
Grotsch, Olaf; 21.05.63; Abt. N; 906540; 1092; 5152/88,
Gröpler, Peter; 12.06.44; HVA; 961500; 1020; 1643/68, O
Grötschel, Andrea; 28.09.57; HVA; 961500; 1540; 4463/84/1, F
Grötschel, Uwe; 28.12.58; HVA; 961500; 1540; 4463/84, F
Grube, Gerhard; 12.06.48; Abt. N; 906540; 1092; 4565/77,
Grunert, Joachim; 10.08.33; HVA; 961500; 1017; 3121/64, L
Gruner, Andreas; 22.03.58; Abt. XI; 941100; 1140; 479/83,
Gruner, Heidi; 09.09.59; HVA; 961500; 1156; 650/75/33/1,
Gruner, Michael; 28.07.55; HVA; 961500; 1156; 650/75/33,
Grünherz, Hans-Joachim; 07.04.45; Abt. XI; 941100; 1140; 3046/66,
Grütze, Regina; 18.07.55; BV Berlin XVIII; 151800; 1140; 763/86,
Gubsch, Volkmar; 19.08.52; KD Dresden/Stadt; 120040; 8038; XII/1357/87,
Gundermann, Dieter; 02.12.57; Abt. N; 906540; 1130; 2957/79,
Güntherodt, Ulrich; 28.04.46; HVA; 961500; 4090; 4273/89, M
Günther, Klaus; 06.08.55; HVA; 961500; 1130; 960/89, F
Günther, Norman; 19.11.65; HVA; 961500; 9900; 3734/88, Y
Haack, Jörg-Dieter; 06.09.52; Abt. N; 906540; 1110; 3718/76,
Haaser, Jutta; 23.11.33; Dresden VI; 120600; 8020; XII/2658/87,
Haase, Dieter; 27.06.31; Dresden IX; 120900; 8023; XII/2663/87,
Haberland, Lutz; 26.04.59; Abt. XI; 941100; 3038; 1894/87,
Hagenfeld, Wilfried; 18.02.40; HVA; 961500; 1020; 2990/76, M
Hagen, Rudolf; 24.02.39; Abt. N; 906540; 1136; 2075/76,
Hallfarth, Günter; 01.10.44; Abt. XI; 941100; 1092; 499/70/1,
Hallfarth, Renate; 20.01.48; Abt. XI; 941100; 1092; 499/70/2,
Hampel, Bärbel; 03.04.59; Abt. XI; 941100; 1280; 2563/86,
Hampel, Bernd; 23.03.56; Abt. N; 906540; 1280; 3388/76,
Hanke, Lutz; 04.02.56; HVA; 961500; 1195; 2378/88, F
Hanke, Peter; 21.10.53; HVA; 961500; 1143; 4174/88, A
Hantke, Gisela; 05.05.32; HVA; 961500; 1093; 3599/82, H
Hantke, Willi; 23.04.31; HVA; 961500; 1093; 6100/82, H
Harder, Dieter; 21.01.43; KD Riesa; 120053; 8400; XII/2674/87,
Hartmann, Andreas; 08.05.58; HVA; 961500; 1142; 650/75/52,
Hartmann, Gerd; 15.03.39; HVA; 961500; 1020; 647/87, A
Hartmann, Günter; 11.11.40; Abt. N; 906540; 1136; 1769/71,
Hasterok, Günter; 16.05.44; HVA; 961500; 1092; 1391/86, M
Hasterok, Hannelore; 07.05.50; HVA; 961500; 1092; 1737/87, F
Haude, Klaus-Dieter; 27.04.39; BV Berlin XVIII; 151800; 1020; 2978/81,
Hauschild, Dieter; 04.06.39; Rostock, Abt. Hafen; 011969; 2500; 5293/88,
Havlik, Lutz; 30.11.54; Abt. N; 906540; 1093; 5015/85,
Häber, Hermann; 02.04.48; HVA; 961500; 1143; 139/74, F
Hähn, Doris; 01.01.63; HVA; 961500; 1200; 5352/88, F
Hähn, Harald; 27.01.60; Abt. XI; 941100; 1200; 3455/86,
Härdrich, Horst; 03.07.38; Abt. XI; 941100; 1140; 3704/73,
Härtig, Uwe; 08.09.57; Abt. N; 906540; 1143; 3621/77,
Heckel, Reiner; 24.04.51; HVA; 961500; 1280; 2163/73, F
Heene, Edgar; 02.12.58; HVA; 961500; 2000; 1738/87, F
Heene, Elke; 12.02.60; HVA; 961500; 2000; 1738/87/1, F
Heerling, Frank; 01.09.62; Abt. N; 906540; 1130; 5017/85,
Heer, Carsten; 15.12.36; Abt. N; 906540; 1020; 454/73,
Heiliger, Ullrich; 20.05.57; Abt. N; 906540; 1120; 1856/86,
Heinicke, Frank; 26.05.56; Abt. N; 906540; 1017; 2564/86,
Heinrich, Guido; 26.06.66; Abt. N; 906540; 1590; 1159/89,
Heinrich, Peter; 29.04.40; HA XX; 982000; 1092; K, 3971/71
Hein, Jürgen; 20.12.54; HVA; 961500; 1152; 372/73, F
Hein, Winfried; 10.08.50; HVA; 961500; 1142; 3855/85, F
Heitfeld, Michael; 23.06.53; HVA; 961500; 1140; 4198/81, L
Hellmich, Kurt; 22.08.30; Rostock XVIII; 011800; 2520; 171/70,
Hellwig, Frank; 25.02.56; HVA; 961500; 1144; 650/75/41,
Helm, Michael; 19.04.59; Abt. XI; 941100; 9438; 589/88,
Hempel, Günter; 25.04.34; KD Eisenhüttenstadt; 050045; 1220; V/1001/88,
Hempel, Reinhard; 28.06.51; HVA; 961500; 1153; 1746/89, E
Hempel, Wolfgang; 02.07.53; Abt. N; 906540; 1020; 5015/77,
Henckel, Peter; 04.05.58; Abt. N; 906540; 1144; 3891/77,
Henke, Frank; 25.12.56; Abt. N; 906540; 1071; 3891/76,
Hennemann, Lutz; 29.09.50; Abt. N; 906540; 1100; 7269/75,
Hennig, Dietmar; 07.01.52; HVA; 961500; 1090; 1226/70, F
Henning, Friedrich; 11.05.35; HVA; 961500; 1017; 440/87, U
Henrion, Lothar; 07.01.41; KD Plauen; 140054; 9900; 1435/89,
Hentschke, Angelika; 19.07.51; HVA; 961500; 1153; 4189/89/1, F
Hentschke, Günther ; 08.01.51; HVA; 961500; 1153; 4189/89, F
Herbert, Roland; 10.10.43; HVA; 961500; 1020; 494/69, F
Herbst, Manfred; 09.10.33; HVA; 961500; 1156; 1087/84, U
Herder, Edeltraut; 27.07.31; HVA; 961500; 1020; 867/61, O
Herer, Erhard; 18.06.40; HVA; 961500; 1130; 4010/70, E
Herkendell, Karl-Heinz; 31.01.43; Abt. N; 906540; 1020; 3894/77,
Herkendell, Martha; 01.03.46; Abt. N; 906540; 1020; 4053/85,
Herold, Gerhard; 29.05.53; HVA; 961500; 1250; 4484/84, F
Herold, Monika; 28.08.52; HA VI; 970600; 1040; K, 3315/86
Herrmann, Alexander; 08.03.51; Abt. N; 906540; 1140; 3077/71,
Herrmann, Dietmar; 30.08.38; HA I; 970100; 8060; K, 5235/86
Herrmann, Günther; 28.01.30; HVA; 961500; 1020; 3627/74, A
Herschel, Steffen; 14.11.52; Abt. N; 906540; 1130; 1607/76,
Hertel, Ralf; 12.04.59; Abt. N; 906540; 1040; 2958/79,
Hertzsch, Wilfried; 10.07.43; HVA; 961500; 2591; 3906/83, M
Herzog, Peter; 08.04.47; HVA; 961500; 8600; 2872/87, M
Herz, Rudolf; 16.05.35; HVA; 961500; 1136; 4391/83, M
Hesse, Christina; 25.12.50; HVA; 961500; 1560; 4040/88, F
Hesse, Klaus; 09.09.47; HVA; 961500; 1136; 2032/72, J
Hesse, Rainer; 24.04.48; Abt. XI; 941100; 1560; 4484/87,
Hexamer, Rene; 10.04.57; HVA; 961500; 1197; 8082/81, F
Hielscher, Dirk; 26.01.56; HVA; 961500; 1092; 417/86, O
Hiersche, Eveline; 16.06.36; HVA; 961500; 1110; 3073/89, K
Hildebrandt, Fred; 23.12.57; HVA; 961500; 6060; 650/75/31,
Hildebrandt, Marion; 28.09.51; HVA; 961500; 1140; 3721/88/1, F
Hildebrandt, Michael; 03.08.52; HVA; 961500; 1140; 3721/88, F
Hildebrandt, Sonja; 07.02.54; HVA; 961500; 1165; 3020/76/26, M
Hildebrand, Hans-Jürgen ; 09.05.39; Frankfurt/O. VI; 050600; 1200; V/427/88,
Hildebrand, Norbert; 23.05.55; Abt. XI; 941100; 5600; 480/83,
Hille, Thomas; 27.04.61; Abt. N; 906540; 1055; 1356/84,
Hinterthan, Bernd; 25.11.41; Rostock VI; 010600; 2551; 1748/89,
Hinz, Hans-Jürgen; 18.01.43; Abt. XI; 941100; 1115; 410/70,
Hirsch, Jürgen; 31.07.54; Abt. XI; 941100; 1195; 2740/77,
Hirt, Sigurd; 05.07.42; Abt. XI; 941100; 1130; 1601/68,
Hitschler, Helmut; 22.07.58; ZAIG; 995300; 8010; K/4402/88,
Hofert, Michael; 02.09.59; HVA; 961500; 1093; 947/84, F
Hoffmann, Frank; 28.02.44; HVA; 961500; 1120; 1587/87, F
Hoffmann, Gunter; 03.11.54; HVA; 961500; 1140; 650/75/17,
Hoffmann, Hartmut; 06.08.51; Abt. XI; 941100; 1095; 6732/80,
Hoffmann, Ines; 03.11.61; HVA; 961500; 1140; 650/75/17/1,
Hofmann, Dieter; 18.04.39; HVA; 961500; 1162; 2607/84, F
Hofmann, Ellen; 03.10.54; Abt. N; 906540; 1280; 1680/81,
Hofmann, Udo; 20.02.41; HVA; 961500; 6019; 1492/86, F
Hohlfeld, Hartmut; 14.05.55; HVA; 961500; 1141; 2596/79, J
Hohnhold, Ulrich; 02.05.52; KD Fürstenwalde; 050047; 1240; V/453/88,
Hommel, Klaus; 14.09.52; HVA; 961500; 1142; 2503/77, F
Hoppe, Werner-Michael; 18.06.44; Abt. N; 906540; 1055; 2900/66,
Hornauer, Uwe; 16.08.46; HVA; 961500; 1092; 65/76, A
Hornemann, Rainer; 29.01.47; HVA; 961500; 1156; 1529/87, M
Hornig, Udo; 04.06.59; Abt. XI; 941100; 1140; 5850/84,
Horn, Jochen; 22.06.59; HVA; 961500; 1297; 2613/84, E
Höhl, Volker; 15.10.60; Abt. N; 906540; 1140; 1153/86,
Höhne, Siegfried; 10.10.39; KD Eisenhüttenstadt; 050045; 1220; V/1013/88,
Höhn, Marina; 22.03.60; HVA; 961500; 1150; 3022/89, A
Hölzel, Manfred; 29.05.39; Dresden VI; 120600; 8060; XII/1339/87,
Höppner, Matthias; 03.01.58; Abt. XI; 941100; 1143; 1710/89,
Hörnig, Klaus; 21.01.45; Abt. XI; 941100; 1092; 1903/72
Hösel, Karl; 08.11.35; Abt. XI; 941100; 1130; 434/68,
Hubatsch, Klaus; 02.12.55; HVA; 961500; 1143; 668/72, F
Hugel, Hans-Georg; 26.05.54; HVA; 961500; 1152; 4055/88, O
Huhn, Bernd; 02.12.52; HVA; 961500; 1142; 1565/86, M
Hundt, Thomas; 20.03.61; HVA; 961500; 1142; 650/75/62,
Hunger, Werner; 23.02.40; HVA; 961500; 1017; 415/81, F
Husung, Peter; 28.11.37; HVA; 961500; 1017; 2111/73, A
Huth, Andreas; 20.04.59; Dresden XIX; 121900; 8036; XII/2748/87,
Hübner, Henri; 18.11.58; Abt. N; 906540; 1034; 3892/79,
Hübner, Ina; 23.10.64; BV Berlin VI; 150600; 1090; K/4166/88,
Hübsch, Bernd; 20.09.43; HVA; 961500; 1080; 47/73, F
Hückel, Tino; 20.03.64; Abt. N; 906540; 1195; 3507/86,
Hühr, Bruno; 02.06.55; Abt. N; 906540; 1140; 3558/78,
Hüter, Rolf; 01.01.37; HVA; 961500; 1144; 2148/74, F
Ibold, Manfred; 10.08.51; HVA; 961500; 1100; 1904/73, F
Ickert, Winfried; 23.07.56; HVA; 961500; 1153; 650/75/8,
Ide, Hans-Heinrich; 27.09.41; Abt. N; 906540; 1156; 1611/76,
Illig, Gerald; 22.02.58; Abt. N; 906540; 1140; 2959/79,
Immermann, Gunter; 15.11.53; HVA; 961500; 1071; 959/89, F
Irmscher, Frank; 20.07.59; HVA; 961500; 1034; 2912/78, F
Jaenicke, Uwe; 23.06.53; HVA; 961500; 1156; 3057/89, F
Jahn, Heinz; 04.11.35; Rostock XIX; 011900; 2300; 3335/75,
Jahn, Klaus; 04.11.50; Abt. XI; 941100; 1120; 1515/75,
Jakowlow, Manfred; 29.03.50; Abt. N; 906540; 1281; 1058/86,
Janietz, Eberhard; 04.08.51; HVA; 961500; 1120; 2570/79, O
Janke, Erwin; 22.06.43; HVA; 961500; 7500; 3972/86, M
Jarchow, Hans-Jürgen; 06.04.44; HVA; 961500; 4850; 2355/88, M
Jasmann, Hans-Peter; 25.06.38; Rostock XIX; 011900; 2355; 4081/86,
Jautze, Stephan; 19.08.53; HVA; 961500; 1054; 2164/73, F
Jäger, Bernd; 04.11.47; Abt. XI; 941100; 1142; 245/77,
Jäger, Monika; 13.04.44; HVA; 961500; 1147; 618/86, M
Jäger, Siegfried; 10.01.43; HVA; 961500; 1147; 619/86, M
Jähne, Karsten; 24.06.57; HVA; 961500; 8060; 650/75/42,
Jähn, Rolf; 01.04.32; HVA; 961500; 1183; 187/61, J
Jedicke, Jürgen; 16.10.55; Abt. XI; 941100; 5060; 2415/88,
Jesse, Jan; 18.11.63; HVA; 961500; 1150; 503/82, M
John, Werner; 12.01.45; HVA; 961500; 9005; 2124/89, F
Jost, Rainer; 22.03.55; Karl-Marx-Stadt VIII; 140800; 9050; 167,
Jung, Herbert; 04.10.51; Abt. XI; 941100; 1600; 69/76,
Junkereit, Dieter; 14.05.62; Karl-Marx-Stadt VIII; 140800; 9050; 172,
Junkereit, Monika; 01.12.64; Karl-Marx-Stadt VIII; 140800; 9050; 173,
Jurisch, Hans; 11.08.32; HVA; 961500; 1130; 3730/66, K
Jürgens, Karl; 30.01.52; Abt. N; 906540; 1141; 1692/76,
Jürgens, Monika; 16.06.41; HVA; 961500; 3580; 2969/87, M
Jürgens, Peter; 13.03.41; HVA; 961500; 3580; 2968/87, M
Kaden, Horst; 13.01.35; Frankfurt/O. VI; 050600; 1200; V/430/88,
Kahl, Frank; 19.02.50; HVA; 961500; 8017; 2224/86, O
Kaiser, Karl; 16.12.36; Abt. N; 906540; 1136; 4568/77,
Kalbaß, Herbert; 21.10.34; Abt. XI; 941100; 1071; 8569/60,
Kappelmann, Jens; 08.07.53; HVA; 961500; 1160; 2972/76, F
Kappis, Peter; 14.12.49; KD Berlin-Treptow; 150046; 1093; 5320/88,
Karasch, Klaus-Dieter; 02.10.51; Abt. N; 906540; 1142; 5044/76,
Karlstedt, Manfred; 27.09.51; HVA; 961500; 1150; 1635/84, O
Kasper, Hans-Hendrik; 03.05.51; HVA; 961500; 1150; 2784/72, U
Kasper, Reiner; 16.01.56; Abt. N; 906540; 1130; 3472/76,
Kathert, Klaus; 03.06.49; Abt. N; 906540; 1292; 1354/71,
Keindorf, Thomas; 09.05.66; HVA; 961500; 1156; 3732/87, O
Kellermann, Harald; 26.04.51; HVA; 961500; 1140; 4691/89, L
Keller, Hans-Joachim; 22.10.38; HVA; 961500; 1020; 2245/73, M
Keller, Klaus; 25.01.36; HVA; 961500; 1600; 2332/73, M
Keller, Rolf; 25.10.57; HVA; 961500; 2000; 5743/84, M
Kellner, Axel; 05.01.40; Abt. XI; 941100; 1140; 759/66,
Kerlisch, Werner; 23.04.36; OD KKW Nord; 010050; 2200; 3477/73,
Kernchen, Eckehardt; 01.10.50; Abt. N; 906540; 1020; 5041/76,
Kettner, Bernd; 28.05.47; Rostock, Abt. Hafen; 011969; 2520; 4080/86,
Keyselt, Klaus; 30.04.51; HVA; 961500; 1142; 1938/75, F
Kießig, Horst; 02.05.37; HVA; 961500; 1156; 307/82, J
Kießling, Dirk; 11.03.69; Abt. N; 906540; 1092; 5156/88,
Kirchbach, Rene; 05.04.64; HVA; 961500; 8010; 5865/84, F
Kirchhof, Jens; 04.12.61; HVA; 961500; 1020; 650/75/72,
Kirchner, Marianne; 18.10.43; HVA; 961500; 1130; 4718/88/1, F
Kirchner, Wolfgang; 23.08.39; HVA; 961500; 1130; 4718/88, F
Kirmse, Udo; 24.02.39; HVA; 961500; 1136; 2824/84, X
Kirsten, Falko; 11.02.50; HVA; 961500; 1600; 2511/77, M
Kirst, Alfred; 08.03.34; HA VI; 970600; 1080; K/4428/87,
Kißig, Jochen; 11.05.53; KD Löbau; 120049; 8700; KISSIG, JOCHEN
Kittler, Manfred; 13.03.33; Dresden XVIII; 121800; 8251; XII/1346/87,
Kittler, Roland; 25.01.58; Abt. XI; 941100; 4020; 5311/88,
Klarner, Volkmar; 23.03.54; Abt. XI; 941100; 9900; 2305/85,
Kleiber, Thomas; 02.01.55; HVA; 961500; 1020; 4365/86, U
Kleinhempel, Heinz; 04.07.57; Leipzig XVIII; 131800; 7050; K/5409/88,
Klemcke, Hermann; 15.11.51; KD Schwedt; 050050; 1330; V/446/88,
Klemens, Leo; 25.03.27; HVA; 961500; 1532; 19522/60, X
Klemme, Jan; 03.02.67; Abt. N; 906540; 1142; 2976/86,
Klenz, Henry; 03.12.56; Abt. XI; 941100; 1130; 409/81,
Klingsieck, Ralf; 10.10.47; HVA; 961500; 1092; 1644/69, F
Klotzke, Jürgen; 05.07.48; HVA; 961500; 6908; 3914/85, A
Klutznik, Axel; 11.07.61; Abt. XI; 941100; 1580; :
Kluwe, Frank; 11.10.49; HVA; 961500; 1142; 465/74, F
Knackstedt, Hans-Jürgen; 02.03.41; Abt. XI; 941100; 1162; 40/69,
Knaupe, Henk; 14.10.65; HVA; 961500; 1090; 423/88, M
Knieling, Annelie; 09.11.50; HVA; 961500; 1115; 3167/78, U
Knobloch, Angelika; 11.07.49; Abt. N; 906540; 1281; 1997/77,
Knobloch, Hans-Uwe; 23.10.57; Abt. N; 906540; 1092; 2487/77,
Knorr, Hans-Joachim; 25.04.38; HVA; 961500; 1615; 304/80, M
Knoth, Uwe; 08.04.57; Abt. XI; 941100; 1100; 6461/82,
Knöller, Sergej; 24.10.63; HVA; 961500; 1095; 5000/87, F
Knötel, Ronald; 14.10.63; BV Magdeburg, Abt. XV; 071500; 3080; :
Kobel, Werner; 07.03.38; HVA; 961500; 1600; 4710/80, L
Kobuch, Norbert; 22.12.51; HVA; 961500; 1058; 4980/88, O
Kochanek, Wolfgang; 14.09.41; HVA; 961500; 1055; 389/74, A
Kochsiek, Jürgen; 15.03.41; Karl-Marx-Stadt VIII; 140800; 9050; 178,
Koch, Arno; 18.02.37; KD Görlitz; 120047; 8903; XII/2406/88,
Koch, Bernhard; 12.02.44; HVA; 961500; 1142; 1566/86, M
Koch, Helmut; 20.12.49; Abt. N; 906540; 1153; 5340/84,
Koch, Jutta; 16.06.32; Abt. XI; 941100; 1162; 2390/70,
Koch, Paul; 09.05.44; HVA; 961500; 1910; 4651/85, M
Koch, Wilhelm; 22.08.41; Abt. XI; 941100; 1115; 416/70,
Koderhold, Dieter; 25.06.47; Abt. N; 906540; 1140; 447/74,
Koglin, Mario; 11.08.66; HVA; 961500; 1110; 3900/85, M
Kohoutek, Sepp; 10.03.54; HVA; 961500; 1090; 4998/87, F
Kokscht, Thomas; 10.07.58; HVA; 961500; 1035; 836/77, F
Kolasinski, Helge; 04.04.63; Abt. N; 906540; 1054; 2220/83,
Kolleßer, Klaus; 11.03.51; HVA; 961500; 7072; 612/89, F
Kolleßer, Regina; 11.11.48; HVA; 961500; 7072; 6763/88, F
Kolletzky, Olaf; 08.07.54; Abt. XI; 941100; 9900; 862/83,
Konieczny, Frank; 04.09.44; HVA; 961500; 1600; 1762/89, N
Konnopka, Frank; 11.04.48; Abt. N; 906540; 1280; 5003/80,
Konnopka, Gudrun; 27.12.48; Abt. N; 906540; 1280; 4038/79,
Konschel, Peter; 30.03.49; Abt. N; 906540; 1280; 4054/85,
Kopius, Elke; 24.04.51; Abt. N; 906540; 1140; 1885/81,
Korn, Robert; 11.09.37; HVA; 961500; 1195; 43/63, L
Kosch, Bärbel; 07.08.60; HVA; 961500; 6500; 3153/89, F
Kosch, Gunter; 31.01.53; Abt. XI; 941100; 6500; 2414/88,
Kosin, Heinz; 07.03.26; HVA; 961500; 1020; 2148/72, U
Kowatzkl, Fred; 15.05.55; Abt. N; 906540; 1150; 4712/78,
Köhler, Erwin; 06.10.40; Frankfurt/O. XVIII; 051800; 1200; V/442/88,
Köhler, Klaus; 20.02.52; HVA; 961500; 1020; 2565/88, O
Köhler, Petra; 20.03.51; HVA; 961500; 1017; 318/78, E
Köhler, Wolfgang; 29.06.51; HVA; 961500; 1017; 3254/84, E
König, Hans; 23.05.36; Abt. N; 906540; 1136; 7261/75,
Körner, Manfred; 26.01.43; Dresden VI; 120600; 8019; XII/414/89,
Köster, Sven; 18.04.66; Abt. N; 906500; 1150; 4732/87,
Köster, Ulrich; 20.11.42; Abt. N; 906540; 1292; 1687/76,
Kraatz, Jens-Peter; 27.09.60; Abt. N; 906540; 1090; 7603/81,
Krahl, Frank-Michael; 03.03.50; Abt. N; 906540; 1130; 1614/75,
Krahmüller, Uwe; 14.12.65; HVA; 961500; 6018; 5265/85, Q
Krahn, Charlotte; 22.04.30; HVA; 961500; 1020; 46/72, U
Kramer, Bernd; 20.10.41; Karl-Marx-Stadt, BKG; 142900; 9005; K/6104/88
Krannich, Matthias; 20.03.57; Abt. XI; 941100; 1144; 5798/84,
Kranz, Herbert; 17.12.39; Abt. N; 906540; 1092; 9805/61,
Kranz, Rosmarie; 21.12.40; Abt. N; 906540; 1092; 4354/77,
Krause, Johannes; 24.10.49; Abt. XI; 941100; 1600; 3702/73,
Krauße, Günter; 25.05.37; HVA; 961500; 8360; 1498/87, F
Kraus, Bert; 03.03.61; HVA; 961500; 1143; 813/83, P
Kraus, Rudolf; 23.07.37; HVA; 961500; 1140; 340/81, F
Kreher, Ralf; 28.02.67; Abt. N; 906540; 9300; 1160/89,
Kreinberger, Rolf; 25.05.29; HVA; 961500; 1121; 2637/77, S
Krenz, Bianca; 23.12.62; HVA; 961500; 1120; 3899/86, U
Kresse, Lutz; 12.10.54; HVA; 961500; 2090; 2354/88, M
Krietsch, Sabine; 10.11.49; Abt. N; 906540; 1280; 1922/76,
Kringler, Paul; 02.07.28; KD Stralsund; 010047; 2300; 1110/73,
Krohn, Heinz Günter; 28.01.56; Abt. XI; 941100; 7033; 493/87,
Krone, Reinhard; 23.07.48; HVA; 961500; 4090; 3823/86, M
Kröpelin, Detlef; 01.11.56; HVA; 961500; 1142; 51/80, F
Krumpfert, Joachim; 15.02.49; Abt. N; 906540; 1034; 1763/76,
Kruse, Gerlinde; 02.10.54; Abt. XI; 941100; 1142; 4701/89,
Kruse, Peter; 07.01.46; Abt. N; 906540; 1142; 1989/76,
Krüger, Andreas; 11.04.61; Abt. N; 906540; 1130; 7148/81,
Krüger, Brigitte; 11.02.37; HVA; 961500; 1130; 3419/84/1, O
Krüger, Hans; 15.06.37; HVA; 961500; 1130; 3419/84, O
Krüger, Holger; 26.04.57; Abt. N; 906540; 1280; 3389/76,
Krüger, Horst; 05.10.43; Abt. N; 906540; 1034; 1622/76,
Krüger, Reinhard; 26.04.33; Abt. N; 906540; 1017; 7257/75,
Krüger, Uwe; 22.08.60; Abt. XI; 941100; 7513; 3385/84,
Krzebeck, Siegfried; 05.02.52; Abt. N; 906540; 1035; 1689/76,
Krzyzanowski, Claus; 28.11.53; Abt. N; 906540; 1130; 1926/76,
Kudernatsch, Matthias; 18.03.65; Abt. N; 906540; 1150; 5032/89,
Kulitzscher, Manfred; 30.05.32; Rostock XVIII; 011800; 2555; 1530/70,
Kunisch, Frank; 20.02.59; Abt. N; 906540; 1150; 4107/79,
Kunze, Alfred; 30.03.32; KD Eberswalde; 050044; 1298; V/429/88,
Kunze, Heinz; 08.05.37; Dresden XVIII; 121800; 8101; XII/1345/87,
Kunze, Wilfried; 01.04.45; BV Berlin XVIII; 151800; 1145; 2809/88,
Kunzmann, Frank; 08.06.53; HVA; 961500; 9050; 650/75/64,
Kupferschmidt, Erich; 23.07.52; Abt. N; 906540; 1140; 2808/79,
Kupferschmidt, Gudrun; 03.05.52; Abt. XI; 941100; 1140; :
Kupsch, Michael; 28.04.58; HVA; 961500; 1090; 2686/79, F
Kurjuweit, Karlheinz; 27.03.50; KD Angermünde; 050041; 1330; V/439/88,
Küchenmeister, Hartmut; 31.03.54; HVA; 961500; 1144; 5042/86, N
Kücken, Werner; 31.08.28; BV Berlin XVIII; 151800; 1421; 1143/70,
Kynast, Klaus; 29.04.55; HVA; 961500; 1150; 1043/84, A
Ladebeck, Bernd; 22.05.56; Abt. N; 906540; 1140; 4952/77,
Lagemann, Jürgen; 22.08.48; Abt. XI; 941100; 1140; 7/76,
Lamberz, Ulrich; 02.07.52; HVA; 961500; 1092; 234/73, F
Lamm, Hans-Joachim; 03.01.42; Dresden VI; 120600; 8020; XII/2655/87,
Langer, Achim; 09.03.56; Abt. N; 906540; 1130; 1864/78,
Langer, Karl; 06.10.34; Abt. N; 906540; 1297; 1796/80,
Lange, Frank; 31.12.50; Abt. XI; 941100; 1143; 2745/79,
Lange, Gerd; 15.12.60; HVA; 961500; 4300; 650/75/19,
Lange, Harald; 03.01.34; HVA; 961500; 1147; 2367/73, U
Lange, Karl-Heinz; 31.12.52; HVA; 961500; 1058; 107/75, F
Lange, Kathlen; 23.05.62; HVA; 961500; 4300; 1763/88, E
Lange, Matthias; 07.10.56; Abt. N; 906540; 1141; 3503/87,
Lange, Ralf; 15.08.60; HVA; 961500; 1100; 1433/85, J
Lange, Reiner; 12.06.36; HVA; 961500; 1017; 1046/67, M
Lauenroth, Hans-Peter; 08.08.61; HVA; 961500; 1136; 1078/81, F
Laue, Lutz; 25.02.53; Abt. N; 906540; 1143; 2528/82,
Laupert, Andrea; 16.09.61; HVA; 961500; 1140; 2816/80, O
Lätzer, Eberhard; 03.12.48; Abt. XI; 941100; 1140; 3700/73,
Lechelt, Arno; 24.06.44; Abt. XI; 941100; 1140; 8511/81,
Lehmann, Frank; 11.07.66; HVA; 961500; 7580; 3170/89, Q
Lehmann, Holger; 14.10.62; Abt. N; 906540; 1144; 6082/82,
Lehmann, Rainer; 08.03.49; HVA; 961500; 1150; 2987/77, J
Leibscher, Axel; 26.03.54; HVA; 961500; 7301; 650/75/65/,
Leinweber, Manfred; 04.03.42; HVA; 961500; 1136; 166/77, M
Leirich, Bernd; 02.06.55; Abt. XI; 941100; 2500; 2796/87,
Leistner, Dieter; 23.05.42; HVA; 961500; 1250; 3478/84, J
Lemke, Frank; 09.11.60; Abt. N; 906540; 1071; 3021/84,
Lemke, Sabine; 15.09.65; Abt. N; 906540; 1071; 969/86,
Lenhard, Peter; 27.09.51; Abt. N; 906540; 1140; 1906/71,
Leonhardt, Heiko; 12.01.66; Abt. N; 906540; 1130; 5391/86,
Lerche, Ruth; 12.03.33; HVA; 961500; 1092; 3899/63, U
Leuschner, Harald; 01.10.39; HVA; 961500; 1020; 3713/87, F
Leymann, Jan; 30.03.61; HVA; 961500; 1092; 3020/76/9, M
Liebholz, Gisela; 09.01.30; HVA; 961500; 1055; 225/78, U
Liedke, Peter; 04.12.50; HVA; 961500; 1140; 1476/87, F
Lieniger, Bruno; 01.11.31; Abt. XI; 941100; 1140; 4167/83,
Ließneck, Walter; 12.10.37; HVA; 961500; 1115; 1990/72, M
Lietz, Peter; 13.02.54; Abt. N; 906540; 1280; 1990/76,
Linck, Joachim; 27.02.48; HVA; 961500; 2330; 1528/87, M
Linck, Rita; 27.11.51; Abt. XI; 941100; 2330; 1533/87, M
Lindig, Hans-Dieter; 11.01.30; Rostock VI; 010600; 2540; 1397/86,
Lindner, Dietmar; 09.06.51; Abt. N; 906540; 1140; 1988/76,
Lindner, Steffen; 18.04.68; HVA; 961500; 1035; 3948/86, M
Linke, Gerald; 29.06.39; HVA; 961500; 6504; 3871/87, F
Linke, Marga; 01.09.39; HVA; 961500; 6504; 3871/87/1, F
Linke, Reinhard; 18.07.30; HVA; 961500; 1199; 153/72, J
Lippert, Bodo; 04.01.62; Abt. N; 906540; 1071; 7402/81,
Lißke, Birgit; 13.03.55; Karl-Marx-Stadt VIII; 140800; 9050; 177,
Lißke, Gerhard; 17.01.51; Karl-Marx-Stadt VIII; 140800; 9050; 176,
Lobedan, Gerd; 21.05.54; HVA; 961500; 1143; 3961/83, M
Lode, Harald; 06.10.53; HVA; 961500; 8036; 2429/88, M
Lohse, Gerd; 24.07.46; Abt. N; 906540; 1144; 2007/67,
Loos, Siegfried; 30.06.40; HVA; 961500; 9061; 1750/72, M
Lorenz, Jörg; 21.05.62; HVA; 961500; 1017; 5026/84, F
Lorenz, Werner; 01.01.34; HVA; 961500; 1595; 4626/79, F
Lorenz, Wolfgang; 03.05.54; HVA; 961500; 1143; 95/76, F
Loudovici, Armin; 12.10.39; HVA; 961500; 1190; 4331/86, F
Löbnitz, Wolfram; 26.08.57; HVA; 961500; 1195; 1371/77, F
Löwa, Werner; 30.05.54; HVA; 961500; 1093; 425/79, F
Lubs, Bodo; 14.03.53; Abt. XI; 941100; 2103; 2026/86,
Lucas, Karl-Heinz; 27.02.57; Abt. N; 906540; 1090; 3705/77,
Ludwig, Horst; 27.08.31; HVA; 961500; 1017; 2588/77, P
Ludwig, Lutz; 15.10.53; HVA; 961500; 1143; 2113/89, E
Lux, Klaus; 19.08.43; KD Wolgast; 010049; 2220; 5577/81,
Lübke, Brigitte; 22.04.41; Rostock XVIII; 011800; 2500; 1119/79,
Lübke, Klaus; 27.03.52; HVA; 961500; 1220; 650/75/22,
Lücke, Karl-Ernst; 17.10.37; Abt. XI; 941100; 1035; 769/86,
Lück, Michael; 16.07.60; Abt. XI; 941100; 7260; 3814/85,
Lüdecke, Olaf; 15.06.48; Abt. XI; 941100; 1092; 2747/79,
Lüneburg, Karsten; 31.07.60; Abt. N; 906540; 1142; 3079/83,
Maaske, Gudrun; 11.11.42; HVA; 961500; 1162; 1351/89, N
Maaske, Klaus; 26.07.39; HVA; 961500; 1162; 3997/85, N
Maaß, Uwe; 20.07.61; HVA; 961500; 1100; 1680/88, F
Maget, Gerhard; 18.12.51; HVA; 961500; 1142; 2576/77, F
Maigatter, Tino; 21.02.62; HVA; 961500; 1054; 2766/84, F
Malchow, Dieter; 19.07.54; HVA; 961500; 1110; 2730/89, F
Manikowski, Jürgen; 30.07.54; Abt. XI; 941100; 2540; 1607/88,
Maretzki, Peter; 27.03.57; HVA; 961500; 1093; 235/79, M
Marks, Stefan; 20.09.52; HVA; 961500; 1250; 2501/77, F
Marnitz, Andreas; 01.10.56; HVA; 961500; 1150; 3498/86, F
Marr, Donald; 10.04.37; Abt. XI; 941100; 1250; 8/74,
Masula, Jens; 23.08.64; HVA; 961500; 1152; 5863/84, F
Matros, Jürgen; 04.06.53; HVA; 961500; 1160; 4049/88, O
Mattner, Susanne; 02.12.61; Abt. N; 906540; 1140; 3966/82,
Matusch, Klaus-Dieter; 20.09.56; Abt. N; 906540; 1090; 3685/82,
Maudrich, Peter; 10.02.58; Abt. XI; 941100; 6502; 4705/85,
Maune, Monika; 16.06.59; Dresden VI; 120600; 8023; XII/1334/89,
May, Jürgen; 19.04.57; Abt. N; 906540; 1156; 1508/80,
Märkel, Günter; 01.06.41; Abt. N; 906540; 1130; 3325/76,
Märkel, Sigrid; 02.06.41; Abt. N; 906540; 1130; 5272/76,
Mehlhorn, Lutz-Rainer; 15.11.40; HVA; 961500; 1020; 1029/67, J
Meichsner, Matthias; 03.09.58; HVA; 961500; 1090; 4416/80, F
Meier, Bernd; 08.08.54; Dresden XIX; 121900; 8020; XII/2749/87,
Meier, Detlef; 23.09.51; Abt. N; 906540; 1150; 448/74,
Meilick, Bernd; 11.06.47; HVA; 961500; 1092; 419/81, M
Mekelburg, Michaela; 21.03.61; HVA; 961500; 1140; 1346/85/1, F
Menzel, Harri; 27.01.35; Rostock VII; 010700; 2520; 5951/84,
Menz, Harry; 27.05.38; HVA; 961500; 1136; 12487/60, A
Merkel, Thomas; 19.01.59; HVA; 961500; 1055; 424/82, M
Messerle, Peter; 05.06.53; HVA; 961500; 1195; 2784/73, F
Metelmann, Bernd; 16.05.56; Abt. N; 906540; 1130; 3390/76,
Meyer, Detlef; 09.08.52; KD Rostock; 010040; 2540; 379/88,
Meyer, Horst; 23.08.33; HVA; 961500; 1100; 1348/85, F
Meyer, Jürgen; 04.01.42; Abt. N; 906540; 1140; 2587/65,
Michaelis, Holger; 20.10.58; HVA; 961500; 1152; 2611/84, F
Michel, Günther; 07.06.51; Abt. N; 906540; 1093; 2407/77,
Mieley, Siegfried; 30.07.36; Frankfurt/O. VII; 050700; 1200; V/431/88,
Mielke, Klaus; 11.07.39; Abt. XI; 941100; 1055; 2899/68,
Miersch, Harald; 26.11.51; HVA; 961500; 1142; 174/79, M
Mihm, Guido; 11.07.70; HVA; 961500; 1035; 4666/89,
Milde, Jörg; 16.11.54; BV Berlin XVIII; 151800; 1136; 4199/80,
Mirtschink, Jürgen; 09.01.48; HVA; 961500; 1034; 1902/72, F
Mischner, Jörg; 24.11.64; HVA; 961500; 1150; 1716/89, I
Mittelberger, Andreas; 15.02.65; Abt. N; 906540; 1020; 5221/84,
Mitzscherling, Peter; 27.02.36; Abt. XI; 941100; 1136; 410/81,
Monatsch, Jörg; 17.12.67; Schwerin II; 020200; 2755; :
Montwill, Frank; 25.04.54; HVA; 961500; 1144; 5630/86, A
Möckel, Joachim; 12.02.45; HVA; 961500; 9050; 3757/87, F
Mrosk, Dieter; 01.11.43; Abt. XI; 941100; 1140; 211/74,
Muth, Rolf; 31.01.29; HVA; 961500; 1017; 269/68, P
Mutscher, Monika; 01.12.53; Abt. N; 906540; 1130; 3684/82,
Mühlbauer, Dietmar; 02.06.47; Abt. N; 906540; 1092; 374/75,
Mühle, Dieter; 07.03.40; KD Dresden/Stadt; 120040; 8010; XII/2671/87,
Müller, Bärbel; 12.03.41; HVA; 961500; 1170; 1675/84/1, C
Müller, Barbara; 22.09.52; Abt. XI; 941100; 2356; 1608/88/1,
Müller, Detlef; 04.02.58; HVA; 961500; 1020; 650/75/43,
Müller, Ernst-Peter; 24.07.40; HVA; 961500; 1170; 1675/84, C
Müller, Erwin; 19.07.44; Abt. N; 906540; 2081; 2626/65,
Müller, Hannelore; 22.06.46; Abt. N; 906540; 2081; 3339/78,
Müller, Heinz-Jürgen; 24.09.48; HVA; 961500; 2520; 499/87, F
Müller, Helga; 15.11.37; HVA; 961500; 1144; 5009/87, D
Müller, Helmut; 07.01.40; BV Berlin XVIII; 151800; 1080; 608/83,
Müller, Irina; 19.09.62; HVA; 961500; 1020; 650/75/43/1,
Müller, Johannes; 09.08.46; Abt. N; 906540; 1140; 2006/67,
Müller, Jürgen; 07.08.59; HVA; 961500; 7930; 650/75/23,
Müller, Jürgen; 25.07.53; Abt. N; 906540; 1090; 3490/83,
Müller, Matthias; 03.06.53; HVA; 961500; 7840; 4729/89, M
Müller, Peter; 06.06.37; Dresden XVIII; 121800; 8023; XII/1348/87,
Müller, Uwe; 02.12.63; HVA; 961500; 1136; 3791/85, F
Müller, Uwe; 07.10.54; Abt. XI; 941100; 2356; 1608/88,
Münchow, Frank; 19.02.61; Abt. XI; 941100; 2830;
Münzel, Heinz; 20.07.47; HVA; 961500; 1020; 167/78, K
Mütschard, Peter; 28.01.52; HVA; 961500; 7060; 650/75/35,
Nareike, Kurt; 28.09.37; Rostock VI; 010600; 2520; 5283/78,
Nathe, Rolf; 27.09.30; HVA; 961500; 1170; 8/75, J
Naue, Rainer; 14.03.56; Abt. N; 906540; 1130; 3077/83,
Naumann, Gerhard; 25.02.49; Cottbus XIX; 061900; 7500; K3504/89,
Naumann, Uwe; 15.07.56; HVA; 961500; 8321; 650/75/36,
Näther, Frank; 08.09.50; HVA; 961500; 1140; 2257/70, F
Neff, Gertrud; 25.04.31; Abt. XI; 941100; 1156; 8510/81,
Nehls, Jörg; 08.07.58; HVA; 961500; 1143; 2592/80, F
Nennhaus, Detlef; 30.06.47; Abt. N; 906540; 1140; 7264/75,
Nestler, Olaf; 26.05.63; Abt. N; 906540; 1040; 2080/82,
Neumann, Klaus-Dieter; 24.07.47; Abt. XI; 941100; 1400; 3386/71,
Nicicky, Stephan; 23.04.55; Abt. N; 906540; 1092; 1999/77,
Nier, Herbert; 28.08.54; HVA; 961500; 1100; 2477/75, F
Noculak, Johannes; 27.05.41; HVA; 961500; 1162; 113/74, L
Noetzel, Peter; 27.02.40; Abt. N; 906540; 1136; 1608/76,
Noffke, Bernd; 11.10.59; Abt. N; 906540; 1197; 5016/85,
Nöbel, Manfred; 29.11.32; BV Berlin XVIII; 151800; 1020; 1341/83,
Nölte, Joachim; 11.11.48; HVA; 961500; 1017; 2553/80, P
Nücklich, Horst; 03.06.35; Dresden, BKG; 122900; 8010; XII/2753/87,
Oelschlaeger, Wolfgang; 06.03.39; Abt. XI; 941100; 1162; 9802/61,
Oertel, Hans-Joachim; 07.12.54; HVA; 961500; 1120; 3561/88, E
Oertel, Ulrich; 12.01.51; HVA; 961500; 1156; 19/76, F
Ola, Heinz; 25.06.34; Abt. N; 906540; 1092; 3705/73,
Ondrej, Detlev; 31.01.52; Abt. XI; 941100; 1136; 3763/88,
Ondrej, Ilona ; 24.07.54; HVA; 961500; 1136; 3763/88/1, F
Ondrusch, Aribert; 11.06.52; HVA; 961500; 7063; 6372/81, U
Ostoike, Harry; 14.05.57; Abt. N; 906540; 1140; 6979/80,
Otto, Hans; 03.06.50; HVA; 961500; 1144; 4692/89, L
Paasch, Uwe; 26.02.58; Abt. XI; 941100; 7280; 2794/87,
Pach, Detlef; 08.03.44; Dresden VII; 120700; 8101; XII/1342/87,
Pahlke, Lothar; 30.07.42; HVA; 961500; 6850; 650/75/18,
Pahlke, Gudrun; 15.08.49; HVA; 961500; 6850; 650/75/18/1,
Pangsy, Reiner; 12.11.40; Abt. N; 906540; 1280; 2437/60,
Parke, Kerstin; 26.01.62; Abt. XI; 941100; 3018; 1894/87/1,
Paulick, Gunter; 30.06.57; HVA; 961500; 7513; 650/75/44,
Paul, Gerhard; 11.08.53; HVA; 961500; 1100; 2639/79, J
Paul, Werner; 28.04.52; Abt. N; 906540; 1150; 3893/77,
Pawlak, Norbert; 01.10.47; BV Berlin XX; 152000; 1140; 3005/84,
Päsler, Knut; 15.07.65; HVA; 961500; 2000; 5196/84, F
Pecher, Rudolf; 27.09.55; Abt. N; 906540; 1020; 7272/75,
Perschon, Andreas; 01.11.58; HVA; 961500; 1055; 1233/80, F
Petermann, Walter; 28.01.50; HVA; 961500; 1130; 4216/84, F
Peters, Joachim; 15.02.55; Abt. XI; 941100; 1580; 2797/87,
Petzold, Frank; 24.04.60; Abt. XI; 941100; 7840; 1711/89,
Pfarr, Wilfried; 04.09.38; HVA; 961500; 1080; 180/73, M
Philipp, Siegfried; 19.10.49; Abt. N; 906540; 1017; 3078/83,
Pieritz, Reiner; 10.06.49; Abt. XI; 941100; 1600; 3701/73,
Pierschel, Bernd; 25.02.40; HVA; 961500; 1280; 128/68, F
Pietschmann, Hans; 26.05.40; Dresden XVIII; 121800; 8010; XII/2665/87,
Piletzki, Doris; 20.04.54; Abt. N; 906540; 1120; 1603/76,
Pingel, Jürgen; 14.04.34; HVA; 961500; 1020; 250/81, M
Plogas, Lutz-Ulrich; 14.04.50; HVA; 961500; 1092; 3974/87, J
Plomann, Michael; 31.03.61; Abt. N; 906540; 1100; 3501/85,
Ploner, Ekhard; 08.06.30; HVA; 961500; 1020; 1041/67, M
Plumbohm, Ilona; 26.02.59; Abt. XI; 941100; 1092; 1844/88,
Pohl, Bernd; 07.11.52; Cottbus, Abt. KuSch; 064000; 7500; 1587/87,
Pohl, Heinrich; 05.10.53; ZAIG; 995300; 8036; K, 4401/88
Polcuch, Konrad; 03.12.53; HVA; 961500; 1055; 3671/88, M
Polcuch, Marion; 06.11.53; HVA; 961500; 1055; 3670/88, F
Polster, Claus; 07.07.50; HVA; 961500; 7034; 1530/87, M
Popp, Rudolf; 21.09.36; HVA; 961500; 1136; 4283/88, F
Porges, Brigitte; 09.06.49; HVA; 961500; 1280; 3137/89, F
Porges, Manfred; 18.12.45; HVA; 961500; 1280; 3136/89, F
Pötsch, Hans; 03.11.41; HVA; 961500; 1197; 112/76, M
Prade, Reiner; 19.09.56; HVA; 961500; 1145; 4527/87, A
Pratsch, Klaus; 21.07.39; HVA; 961500; 1017; 1331/63, T
Preißler, Steffen; 05.06.66; Abt. N; 906540; 8017; 1161/89,
Prestin, Uwe; 03.11.40; Abt. N; 906540; 1150; 7399/81,
Preusche, Dieter; 07.12.43; HVA; 961500; 1142; 6977/75, A
Proft, Andre; 09.10.63; HVA; 961500; 1017; 760/88, D
Prokop, Adolf; 02.02.39; AGM, Arbeitsgebiet R; 956024; 5066; K, 187/71
Propf, Ulrich; 12.06.57; HVA; 961500; 4350; 650/75/4,
Puchner, Albrecht; 05.07.53; Abt. N; 906540; 1200; 2319/84,
Puchta, Gerdt; 09.01.51; HVA; 961500; 2540; 1864/89, M
Pufe, Rainer; 21.02.52; Abt. N; 906540; 1140; 1514/75,
Püstel, Brigitte; 27.04.43; Abt. XI; 941100; 1100; 239/85,
Püwick, Heinz; 01.08.28; HVA; 961500; 1280; 330/85, T
Pyritz, Frank; 08.10.58; Abt. N; 906540; 1092; 2128/78,
Radke, Bernd; 29.09.46; Abt. N; 906540; 1280; 1604/76,
Radke, Gudrun; 24.06.47; Abt. N; 906540; 1280; 2286/74,
Radtke, Peter; 27.08.62; HVA; 961500; 1140; 2637/84, M
Radünz, Christine; 26.09.53; HVA; 961500; 1136; 2758/78, J
Rahn, Winfried; 25.04.57; Abt. N; 906540; 1090; 4142/79,
Ramme, Alwin; 12.03.32; HVA; 961500; 1017; 3321/71, U
Ramminger, Uwe; 04.01.54; Abt. XI; 941100; 8245; 3256/84,
Rasel, Klaus; 30.05.42; HVA; 961500; 1532; 650/75/45,
Rasmus, Hartmut; 04.02.43; Abt. XI; 941100; 5500; 702/86,
Ratschke, Lutz-Dieter; 04.12.53; Abt. N; 906540; 1034; 5042/76,
Ratzmann, Ingrid; 18.04.37; HVA; 961500; 1035; 1672/84, A
Rauch, Benno; 25.09.53; Abt. N; 906540; 1136; 4146/79,
Rauch, Hannelore; 24.12.50; HVA; 961500; 2794; 650/75/30/1,
Rauch, Helmut; 09.01.53; HVA; 961500; 1092; 574/72, F
Rauch, Lothar; 04.11.53; HVA; 961500; 2794; 650/75/30,
Redlich, Hans-Joachim; 27.09.41; BV Berlin XIX; 151900; 1150; 1091/79,
Redlinghöfer, Ilse; 28.07.37; HA III; 940300; 1162; K, 1858/88,
Regner, Karsten; 19.03.63; HVA; 961500; 1092; 4311/84, M
Reichelt, Werner; 10.12.35; Abt. XI; 941100; 1020; 2046/64,
Reichelt, Wolfgang; 24.04.38; Rostock XVIII; 011800; 2520; 189/71,
Reichel, Joachim; 06.07.44; HVA; 961500; 2500; 1863/89, M
Reichel, Manfred; 14.04.59; HVA; 961500; 1093; 3062/78, F
Reichel, Reinhard; 20.09.45; Abt. XI; 941100; 1080; 17/71,
Reichert, Bernd; 11.06.50; Abt. N; 906540; 1093; 2094/72,
Reif, Frank; 05.10.58; HVA; 961500; 6016; 650/75/20,
Reiß, Alfred; 06.10.34; HVA; 961500; 1020; 4242/60, J
Reiter, Hermann; 11.10.37; HVA; 961500; 1100; 186/77, J
Renner, Andreas; 16.04.59; HVA; 961500; 1153; 19/81, F
Renner, Lothar; 05.06.45; HVA; 961500; 1054; 136/71, J
Rennhack, Lutz-Peter; 12.11.54; HVA; 961500; 4730; 650/75/46,
Retzlaff, Gerd; 06.07.39; HVA; 961500; 1142; 2756/84, G
Reuter, Simone; 19.06.67; HVA; 961500; 1140; 4274/89, M
Ribbecke, Horst; 19.04.25; HA XVIII; 981800; 1017; RIBBECKE, HORST
Richter, Andre; 21.09.61; Abt. N; 906540; 1143; 5786/82,
Richter, Detlef; 02.05.57; Abt. N; 906540; 1093; 7135/80,
Richter, Norbert; 24.09.47; KD Freiberg; 140047; 9200; K/1724/89,
Richter, Reinhard; 27.02.52; HVA; 961500; 1035; 4349/84, O
Richter, Willi; 21.06.32; HVA; 961500; 1130; 3776/87, F
Riedel, Dieter; 24.11.52; HVA; 961500; 1140; 3848/81, M
Riedel, Dietmar; 19.02.52; HVA; 961500; 1020; 2970/87, M
Riedel, Erhard; 26.03.46; HA III; 940300; 1136; K, 2963/89
Riedel, Winfried; 27.05.40; HVA; 961500; 1017; 777/65, M
Riemer, Rudi; 04.03.32; Frankfurt/O. XVIII; 051800; 1200; V/443/88,
Riesner, Wolfgang; 12.06.50; Abt. N; 906540; 1136; 2279/74/1,
Riewe, Hartmut; 16.08.42; KD Wismar; 010048; 2402; 4910/75,
Ritzmann, Hartmut; 23.01.56; HVA; 961500; 1140; 1715/89, M
Roeßler, Jochen; 13.03.41; KD Dresden/Stadt; 120040; 8060; XII/2670/87,
Rolfs, Raimund; 16.10.57; HVA; 961500; 1136; 3891/83, F
Roll, Gerd; 05.09.55; HVA; 961500; 2200; 650/75/28,
Roloff, Herbert; 16.02.36; HVA; 961500; 1144; 1611/69, Q
Rosenkranz, Rudolf; 23.11.30; Rostock XVIII; 011800; 2565; 680/70,
Rosenthal, Ralf; 19.12.64; HVA; 961500; 1140; 5423/88, S
Rostek, Horst; 26.05.29; HVA; 961500; 1156; 18500/60, F
Rost, Andrea; 23.11.57; HVA; 961500; 1150; 4298/89, F
Rost, Dieter; 31.05.57; Abt. N; 906540; 1150; 7214/81,
Rothbauer, Edmund; 04.08.30; Frankfurt/O., SED-PO-Ltg.; 054100; 1200; V/432/88,
Roth, Andreas; 31.03.52; HVA; 961500; 1140; 121/69/35, AB
Roth, Hans-Jochen; 12.07.43; HVA; 961500; 1800; 1381/89, M
Rödel, Johannes; 05.07.33; HVA; 961500; 1614; 650/88, D
Röder, Detlev; 12.06.56; Abt. N; 906540; 1130; 744/88, N
Röder, Siegmar; 03.05.37; HVA; 961500; 1156; 18/67, S
Röhling, Thomas; 30.04.59; Abt. XI; 941100; 1035; 1649/82,
Röhl, Gerhard; 26.07.52; Abt. N; 906540; 1142; 1883/81,
Röhner, Bernd; 07.01.57; HVA; 961500; 1040; 4700/89, F
Römer, Heinz; 11.02.32; HVA; 961500; 1250; 5192/86, M
Römer, Lutz; 09.08.59; HVA; 961500; 1055; 3400/89, F
Rörster, Hans; 29.05.30; HVA; 961500; 1147; 1593/86, U
Rösch, Klaus; 28.04.41; Abt. XI; 941100; 1100; 9797/61,
Rösner, Andreas; 16.06.51; ZAIG; 995300; 8020; K, 2964/89
Rudolph, Peter; 05.10.29; HVA; 961500; 2520; 7095/60, A
Ruschel, Dietger; 15.08.43; HVA; 961500; 1140; 2111/72, F
Russ, Wolfgang; 08.01.48; HVA; 961500; 1153; 6983/75, M
Ruthenberg, Gerd-Wolfram; 08.11.53; HVA; 961500; 1093; 5714/81, L
Rücker, Frank; 20.01.63; HVA; 961500; 1130; 5361/89, F
Rücker, Ricarda; 21.05.66; HVA; 961500; 1130; 5361/89/1, F
Sacher, Hans; 06.11.26; HVA; 961500; 1162; 252/74, U
Sachse, Ingrid; 15.12.40; HVA; 961500; 1020; 580/89, F
Sachse, Manfred; 15.04.34; BV Berlin XX; 152000; 1193; 219/76,
Sahling, Frank; 12.07.50; HVA; 961500; 1136; 6908/82, F
Salm, Rainer; 11.05.58; HVA; 961500; 1143; 44/81, F
Salomon, Walter; 12.11.29; HVA; 961500; 1273; 2142/73, L
Salomo, Gerhard; 08.01.30; Dresden XX; 122000; 8023; XII/2667/87,
Salomo, Günther; 21.05.41; Dresden VI; 120600; 8060; XII/1885/89,
Sander, Gerhard; 25.05.52; HVA; 961500; 1093; 157/85, M
Sander, Rudolf; 14.11.33; HVA; 961500; 1188; 790/88, F
Sasse, Klaus-Jürgen; 01.12.42; Abteilung XI; 941100; 1092; 1339/68,
Sauer, Uwe; 09.05.58; Abt. N; 906540; 1150; 4551/77,
Sawatzki, Paul-Eckhard; 06.03.56; HVA; 961500; 1054; 2963/78, F
Schaarschmidt, Steffen; 06.10.58; Karl-Marx-Stadt VIII; 140800; 9001; 181,
Schade, Detlef; 10.11.57; Abt. N; 906540; 1090; 2195/82,
Schaffrath, Hans-Martin; 26.03.44; BV Berlin VI; 150600; 1156; 1352/75,
Scharfenberg, Anette; 02.12.63; Abt. N; 906540; 1093; 5559/83,
Schellenberger, Gerd; 11.11.50; BV Berlin XX; 152000; 1080; 3003/84,
Schemmel, Manfred; 18.02.54; Abt. XI; 941100; 7270; 2795/87,
Schering, Norbert; 24.03.55; HVA; 961500; 1195; 2729/89, A
Schiecke, Dieter; 12.10.54; HVA; 961500; 1153; 1960/75, M
Schiemann, Peter; 04.01.43; HVA; 961500; 1017; 693/86, E
Schiemann, Renate; 09.04.45; HVA; 961500; 1017; 693/86/1, E
Schierz, Rolf-Jörg; 13.02.61; Karl-Marx-Stadt VIII; 140800; 9050; 180,
Schilling, Aribert; 07.04.51; Abt. N; 906540; 1093; 3618/77,
Schilling, Klaus; 29.09.41; Leipzig VI; 130600; 7060; K, 1043/87
Schink, Peter; 30.12.55; HVA; 961500; 1130; 6659/80, M
Schlauß, Hannelore; 17.10.52; Abt. N; 906540; 1298; 5153/88,
Schleicher, Gerhard; 22.06.43; HVA; 961500; 1250; 36/77, M
Schlenkrich, Dieter; 07.05.41; Abt. N; 906540; 1092; 1253/65,
Schlesinger, Harald; 10.10.62; Abt. N; 906540; 1142; 5558/83,
Schliebe, Edda; 25.07.39; Abt. XI; 941100; 1130; 2758/89,
Schliesch, Erhard; 30.03.28; Dresden VII; 120700; 8060; XII/2660/87,
Schlinsog, Helfried; 16.06.44; HVA; 961500; 7022; 544/88, F
Schlinsog, Regina; 05.02.47; HVA; 961500; 7022; 544/88/02, F
Schlögl, Thomas; 01.08.64; Abt. N; 906540; 1141; 3020/84,
Schmidt-Bock, Peter; 04.05.56; Abt. N; 906540; 1142; 2962/79,
Schmidt, Andreas; 16.01.63; Abt. N; 906540; 1140; 5787/82,
Schmidt, Dietmar; 12.06.44; Abt. XI; 941100; 1093; 1276/73,
Schmidt, Eberhard; 22.09.47; HVA; 961500; 1280; 231/75, M
Schmidt, Gerd; 29.07.39; HVA; 961500; 5900; 551/86, F
Schmidt, Gudrun; 08.12.44; HVA; 961500; 4050; 1532/87, M
Schmidt, Hans-Dieter; 03.01.32; Dresden XVIII; 121800; 8019; XII/2664/87,
Schmidt, Hans-Dieter; 30.07.36; Frankfurt/O. XIX; 051900; 1200; V/449/88,
Schmidt, Hartmut; 10.02.62; Abt. N; 906540; 1136; 4050/82,
Schmidt, Joachim; 19.12.43; HVA; 961500; 4050; 1531/87, M
Schmidt, Klaus-Peter; 28.03.56; Abt. XI; 941100; 1600; 407/78,
Schmidt, Kuno; 10.01.37; Abt. XI; 941100; 1020; 1868/69,
Schmidt, Manfred; 04.08.54; HVA; 961500; 1100; 2616/80, U
Schmidt, Werner; 18.07.36; Kreisdienststelle [KD] Bautzen; 120042; 8609; XII/1355/87,
Schmidt, Wilfried; 14.10.52; HVA; 961500; 1093; 237/73, F
Schmiedke, Günter; 04.10.33; Frankfurt/O., BKG; 052900; 1200; V/436/88,
Schneider, Astrid; 24.03.51; HVA; 961500; 1140; 3353/86, F
Schneider, Günter; 08.10.54; HVA; 961500; 5800; 3470/85, M
Schneider, Günter; 26.07.41; Abt. N; 906540; 1136; 9806/61,
Schneider, Harald; 26.01.48; HVA; 961500; 1140; 4128/83, M
Schneider, Karl-Heinz; 24.12.34; HVA; 961500; 9900; 6857/82, M
Schneider, Lothar; 16.11.56; HVA; 961500; 1280; 1525/75, F
Schneider, Siegfried; 06.09.33; Frankfurt/O. XVIII; 051800; 1136; V/450/88,
Scholz, Gisela; 15.03.39; HVA; 961500; 1093; 5478/88, F
Schömann, Bodo; 12.12.61; Abt. XI; 941100; 1200; 5312/88,
Schönau, Lothar; 07.08.34; HVA; 961500; 1095; 3127/78, H
Schönau, Ruth; 23.02.33; HVA; 961500; 1095; 3127/78/1, H
Schönberg, Klaus; 27.12.51; Abt. XI; 941100; 9931; 3457/86,
Schönfeld, Dieter; 15.12.58; Abt. XI; 941100; 7570; 2806/89,
Schönfeld, Klaus; 14.09.41; HVA; 961500; 1136; 596/86, F
Schreyer, Harry; 16.01.38; HA I; 970100; 1185; K, 741/89
Schröder, Horst; 12.06.51; Abt. XI; 941100; 4090; 3458/86,
Schröter, Helmut; 14.08.35; KD Rostock; 010040; 2520; 552/75,
Schubert, Harry; 05.07.51; Abt. N; 906540; 1130; 3693/78,
Schubert, Thomas; 10.05.57; HVA; 961500; 1090; 4848/80, F
Schulke, Klaus-Peter; 06.12.41; Abt. N; 906540; 1092; 3953/76,
Schultze, Ralf; 30.04.56; HVA; 961500; 1150; 2306/74, F
Schulze, Alfred; 07.07.37; Abt. N; 906540; 1093; 4324/87,
Schulze, Frank; 09.07.60; HVA; 961500; 1197; 650/75/69,
Schulz, Dorelies; 11.03.49; HVA; 961500; 1136; 4640/89, M
Schulz, Michael; 03.03.65; Abt. N; 906540; 1140; 4909/86,
Schulz, Ronald; 22.08.61; HVA; 961500; 7700; 650/75/68,
Schulz, Udo; 30.03.58; HVA; 961500; 1143; 113/75, F
Schulz, Werner; 09.02.35; Frankfurt/O. XIX; 051900; 1200; V/437/88,
Schumacher, Michael; 13.04.57; Abt. N; 906540; 1090; 3819/79,
Schurz, Günter; 25.03.33; KD Dresden/Stadt; 120040; 8060; XII/2669/87,
Schuster, Bernd; 29.01.42; HVA; 961500; 1140; 61/67, M
Schußmann, Heike; 18.05.58; Abt. XI; 941100; 2000; 1712/89/1,
Schußmann, Klaus; 10.01.60; Abt. XI; 941100; 2000; 1712/89,
Schübel, Andreas; 03.10.61; HVA; 961500; 6301; 650/75/67,
Schütz, Harald; 19.09.32; HVA; 961500; 1153; 2580/65, K
Schwabe, Karl Heinz; 01.07.54; HVA; 961500; 1150; 234/79, J
Schwalbe, Manfred; 04.08.33; Frankfurt/O. XVIII; 051800; 1200; V/454/88,
Schwarzbach, Walter; 01.04.44; HVA; 961500; 1092; 5018/87, F
Schwarze, Lothar; 19.09.35; Dresden XVIII; 121800; 8020; XII/1352/87,
Schwarz, Frank; 19.01.56; Abt. N; 906540; 1093; 5327/80,
Schwarz, Stefan; 26.02.65; HVA; 961500; 1152; 1656/69/2, P
Schwenk, Wilfried; 03.02.55; HVA; 961500; 2620; 650/75/48,
Schwoch, Gerth; 28.06.51; Abt. N; 906540; 1140; 7274/75,
Schwunteck, Harald; 26.08.57; Abt. N; 906540; 8010; 2966/79,
Seckel, Peter; 11.09.60; HVA; 961500; 1143; 3543/81, F
Seckel, Wolfgang; 01.02.39; Karl-Marx-Stadt XX; 142000; 9005; K/3430/89,
Seeger, Regina; 22.03.51; HVA; 961500; 1140; 109/78, J
Seelig, Werner; 11.04.14; HVA; 961500; 1140; 1472/87, F
Seel, Ingolf; 31.07.57; HVA; 961500; 1035; 368/78, F
Seel, Uwe; 06.09.57; HVA; 961500; 1143; 3962/83, N
Seel, Werner; 28.12.32; HVA; 961500; 1142; 3502/61, T
Seibt, Eberhard; 31.08.36; Dresden VII; 120700; 8060; XII/1340/87,
Seibt, Rudolf; 15.09.30; Abt. N; 906540; 1092; 350/73,
Seibt, Siegfried; 24.04.34; Dresden II; 120200; 8021; XII/1338/87,
Seidel, Knut; 02.10.66; Karl-Marx-Stadt VIII; 140800; 9050; 174,
Seidel, Marga; 07.07.36; HVA; 961500; 1092; 2310/88/1, E
Seidel, Matthias; 15.08.59; HVA; 961500; 1017; 491/80, F
Seidel, Michael; 21.07.52; HVA; 961500; 1092; 581/89, U
Seidel, Wolfgang; 24.05.31; HVA; 961500; 1092; 2310/88, E
Seiffert,Reimar; 12.11.29; KD Eisenhüttenstadt; 050045; 1220; V/433/88,
Sellig, Dieter; 11.07.34; Abt. N; 906540; 1020; 7258/75,
Sell, Andreas; 28.06.54; HVA; 961500; 1095; 2311/88, O
Sendsitzky, Peter; 10.09.47; Abt. N; 906540; 1092; 3723/80,
Seyfarth, Stephan; 22.12.60; HVA; 961500; 1040; 4609/80, J
Siegert, Gerhard; 31.05.48; Abt. N; 906540; 1140; 3883/76,
Siegler, Werner; 01.11.52; HVA; 961500; 1400; 1485/87, O
Sievers, Reinhard; 14.10.49; Abt. N; 906540; 1140; 3822/77,
Siggelkow, Wolfgang; 03.11.60; Abt. XI; 941100; 2823; 590/88,
Sikorski, Joachim; 16.01.58; Abt. N; 906540; 1130; 5261/82,
Sikorski, Wolfgang; 27.11.49; Abt. N; 906540; 1156; 2309/73,
Simbrick, Joachim; 21.12.51; Abt. XI; 941100; 1153; 6462/82,
Sitte, Jutta; 06.08.38; HVA; 961500; 1055; 4139/88, M
Sitte, Kurt; 08.09.38; HVA; 961500; 1055; 3009/89, M
Skibinski, Udo; 24.11.42; HVA; 961500; 1020; 326/73, F
Skirde, Udo; 18.01.38; HVA; 961500; 1130; 890/82, T
Smetana, Rüdiger; 18.02.39; BV Berlin XVIII; 151800; 1136; 417/79,
Smiejczak, Jan-Peter; 16.04.64; HVA; 961500; 1156; 2833/87, M
Smolinski, Hans-Joachim; 21.05.53; Abt. N; 906540; 9300; 4070/79,
Sodann, Peter; 23.09.39; HVA; 961500; 7060; 3932/87, M
Sommerfeld, Dirk; 20.06.50; HVA; 961500; 1280; 1555/87, F
Sonnenfeld, Kurt; 25.04.44; Abt. N; 906540; 1017; 2262/87,
Sonntag, Peter; 18.03.55; HVA; 961500; 1092; 2817/80, M
Spangenberg, Heinz; 09.10.56; Abt. XI; 941100; 6550; 6665/82,
Spenke, Günter; 24.01.32; Abt. N; 906540; 1020; 4550/77,
Sperling, Achim; 29.10.56; HVA; 961500; 1130; 4681/79, F
Sprenger, Gisela; 01.06.54; HVA; 961500; 1020; 2633/88, J
Springer, Dieter; 23.06.34; KD Schwedt; 050050; 1330; V/435/88,
Staigies, Artur; 26.10.30; OD KKW Nord; 010050; 2220; 1022/84,
Standke, Michael; 04.11.54; Karl-Marx-Stadt VIII; 140800; 9023; 179,
Stange, Detlef; 20.02.59; Abt. N; 906540; 1115; 5547/88,
Stapff, Dirk; 08.03.63; HVA; 961500; 1090; 2612/84, F
Starick, Hartmuth; 02.08.52; Abt. XI; 941100; 1080; 8509/81,
Städtke, Hartmut; 20.05.56; Abt. N; 906540; 1140; 4029/79,
Steffin, Peter; 09.08.41; Rostock IX; 010900; 2520; 3762/82,
Steger, Ralph; 28.08.65; HVA; 961500; 1180; 2778/76/1, T
Stehr, Gerd; 29.03.58; Abt. XI; 941100; 1200; 3957/83,
Steinert, Joachim; 27.11.36; KD Rügen; 010046; 2355; 4028/86,
Steinmetz, Gerhard; 08.04.48; Abt. XI; 941100; 1017; 1904/72,
Steinmüller, Peter; 07.03.56; HVA; 961500; 1142; 1881/88, A
Stein, Peter; 05.02.61; Dresden XX; 122000; 8019; XII/2405/88,
Stein, Werner; 01.08.37; KD Berlin-Friedrichshain; 150040; 1197; 5579/88,
Stephan, Wolfgang; 29.06.37; KD Dresden/Stadt; 120040; 8060; XII/1358/87,
Sternberger, Dieter; 02.12.34; Abt. N; 906540; 1195; 1474/65/1,
Sternberger, Erika; 08.02.41; Abt. XI; 941100; 1195; 4586/85,
Steuding, Werner; 24.07.42; HA VI; 970600; 1190; K, 1042/87
Steyskal, Richard; 12.11.45; HVA; 961500; 1806; 650/75/53,
Stichler, Christian; 15.06.57; HVA; 961500; 1040; 3462/79, F
Stirzel, Werner; 10.06.34; KD Bautzen; 120042; 8600; XII/1354/87,
Stollmayer, Sabine; 10.03.51; HVA; 961500; 1293; 338/81, J
Stoll, Dietrich; 10.06.36; Rostock XVIII; 011800; 2551; 417/71,
Stopp, Helmar; 01.07.57; Abt. N; 906540; 1123; 5218/84,
Storbeck, Lutz; 30.09.59; HVA; 961500; 1095; 2769/84, F
Stoye, Andre; 28.11.60; HVA; 961500; 1152; 3261/84, F
Straube, Jost; 18.09.58; HVA; 961500; 1058; 3573/82, F
Strauhs, Rüdiger; 05.03.55; Abt. XI; 941100; 1017; 6370/81,
Strähler, Gisela; 28.02.42; Abt. N; 906540; 1281; 5150/88,
Strähler, Siegbert; 05.05.39; Abt. N; 906540; 1281; 5151/88,
Streda, Sylvia; 06.10.54; KD Schwedt; 050050; 1330; V/440/88,
Striegler, Ralf; 14.07.64; Abt. N; 906540; 1142; 1642/85,
Strischek, Erika; 11.11.49; HVA; 961500; 1035; 4270/78/1, N
Strischek, Rudolf; 23.08.45; HVA; 961500; 1035; 4270/78, N
Strobel, Günter; 02.04.36; HA I; 970100; 8312; K, 5809/82,
Stroth, Elke; 28.06.59; Abt. XI; 941100; 2760; 498/86/1,
Stroth, Heiko; 15.06.58; Abt. XI; 941100; 2760; 498/86,
Strutz, Reiner; 01.06.52; HVA; 961500; 2861; 309/76, F
Stuhl, Diethard; 02.03.61; Abt. XI; 941100; 6018; 591/88,
Stüdemann, Robert; 14.11.50; HVA; 961500; 1071; 1870/87, L
Stümer, Hans; 18.03.31; HVA; 961500; 1156; 3032/82, J
Stürmer, Gerlinde; 24.01.60; Abt. N; 906540; 1140; 2015/80,
Suhm, Rüdiger; 24.02.60; Abt. XI; 941100; 2831; 5346/85,
Swienty, Gerald; 25.03.51; Abt. XI; 941100; 1600; 2093/72,
Switalla, Heinz-Joachim; 12.01.46; HVA; 961500; 1017; 2105/73, O
Taubert, Gerald; 05.07.59; Abt. N; 906540; 1130; 5326/80,
Tausend, Klaus; 06.04.47; Abt. XI; 941100; 1142; 6987/75/1,
Teichmeyer, Lutz; 28.10.50; HVA; 961500; 1144; 1603/75, M
Tellbrun, Wolfgang; 09.07.47; Abt. N; 906540; 1140; 5133/76,
Telschow, Lieselotte; 24.03.35; HVA; 961500; 1136; 5181/84, U
Teuter, Maik; 21.12.64; Abt. N; 906540; 1280; 2729/86,
Thale, Klaus; 06.04.44; Abt. N; 906540; 1136; 666/66,
Thäter, Wolfgang; 23.02.45; KD Berlin-Weißensee; 150047; 1140; 1484/82,
Thiele, Horst; 26.09.34; HVA; 961500; 1093; 2481/88, F
Thiele, Ingrid; 04.08.38; HVA; 961500; 1093; 2481/88/1, F
Thiel, Manfred; 12.04.39; Abt. N; 906540; 1093; 9804/61,
Thomas, Heinz; 07.06.42; HVA; 961500; 6902; 3672/88, M
Thomas, Karsten; 18.02.62; HVA; 961500; 1153; 3407/84, F
Thomas, Manfred; 23.03.57; Abt. N; 906540; 1280; 3475/76,
Thomas, Nikita; 18.06.51; HVA; 961500; 1092; 650/75/32,
Thümmel, Elke; 25.12.56; HVA; 961500; 8060; 2528/88/1, F
Thümmel, Volker; 16.01.59; Abt. XI; 941100; 8060; 2528/88,
Thürasch, Carola; 01.11.59; HVA; 961500; 1597; 3849/86, F
Thürasch, Werner; 06.06.50; Abt. XI; 941100; 1597; 4417/84,
Tiede, Lars; 16.02.67; HVA; 961500; 2560; 2767/89, F
Tietsche, Frank; 25.06.55; HVA; 961500; 1141; 361/74, F
Tietz, Gisa; 14.03.47; HVA; 961500; 1092; 2428/79, O.
Tietz, Hans-Joachim; 27.01.47; HVA; 961500; 2000; 514/87, F
Tippmann, Falk; 12.06.53; Karl-Marx-Stadt VIII; 140800; 9050; 169,
Tkatsch, Ingo; 06.11.66; HVA; 961500; 1150; 2143/86, A
Tondock, Heinz; 08.02.30; HVA; 961500; 1156; 1601/75, M
Tornau, Andre; 15.10.65; Schwerin II; 020200; 2755; :
Treder, Gerd; 30.06.40; Rostock , Abt. Hafen; 011969; 2520; 3062/85,
Trenkmann, Ute; 20.09.52; HVA; 961500; 1156; 3904/86/1, F
Trenkmann, Wolfgang; 10.07.51; HVA; 961500; 1156; 3904/86, F
Triegel, Rainer; 17.01.62; Abt. N; 906540; 1034; 5788/82,
Trinks, Hartmut; 24.07.55; Abt. N; 906540; 1150; 3474/76,
Troisch, Andreas; 15.11.57; HVA; 961500; 1020; 2691/80, F
Trommler, Werner; 28.02.51; HVA; 961500; 1156; 957/89, F
Tschiharz, Ute; 03.05.58; HVA; 961500; 3540; 650/75/49/1,
Tschiharz, Wolfgang; 12.06.51; HVA; 961500; 3540; 650/75/49,
Tusche, Hans-Jürgen; 11.07.43; Abt. XI; 941100; 1020; 288/67,
Uher, Edgar; 09.11.52; HVA; 961500; 1142; 175/75, F
Uhlig, Andrea; 01.05.57; HVA; 961500; 1250; 2664/84, J
Uhlig, Gerd; 16.11.46; Abt. N; 906540; 1130; 2114/66,
Uhlig, Gunter; 17.10.52; Karl-Marx-Stadt VIII; 140800; 9044; 163,
Ulbrich, Fritz; 11.12.36; Abt. XI; 941100; 1095; 922/82,
Ullmann, Klaus; 16.10.51; Karl-Marx-Stadt VIII; 140800; 9001; 168,
Unger, Dieter; 29.12.52; HVA; 961500; 1156; 2427/74, F
Unger, Peter; 18.06.56; Abt. N; 906540; 1130; 5095/77,
Unmack, Franz; 01.08.48; HVA; 961500; 1055; 177/79, M
Unseld, Werner; 26.05.28; HVA; 961500; 4500; 18264/60, Y
Unterlauf, Diethard; 05.04.46; HVA; 961500; 9999; 337/77, O
Urban, Hartmut; 08.04.45; Abt. N; 906540; 1162; 1346/68,
Van Rossum, Ralf; 20.03.43; HVA; 961500; 9999; 2856/80, M
Vieweg, Jens-Uwe; 27.12.58; Abt. XI; 941100; 1200; 4706/85,
Vogel, Michael; 25.10.56; Abt. N; 906540; 1093; 1551/80,
Vogler, Reinhard; 15.07.49; HVA; 961500; 5820; 650/75/70,
Vogl, Hansjochen; 09.07.37; HVA; 961500; 1100; 6183/82/1, L
Vogt, Ditmar; 02.05.38; Abt. N; 906540; 1199; 5073/77,
Voigtländer, Christian; 03.12.47; HVA; 961500; 4090; 476/88, A
Voigtländer, Gunter; 25.06.52; HVA; 961500; 1055; 2769/87, F
Voigt, Armin; 22.10.51; Abt. XI; 941100; 1600; 412/77,
Voigt, Helmut; 15.02.50; HVA; 961500; 1017; 2482/88, F
Voigt, Knut; 01.08.48; HVA; 961500; 1156; 1430/85, M
Vollmeyer, Wolfgang; 10.10.50; HA VI; 970600; 1054; K, 4427/87
Vopel, Dieter; 03.01.35; HVA; 961500; 1090; 4083/81, M
Vopel, Elke; 26.03.47; Abt. XI; 941100; 1600; 417/70/2,
Vopel, Hans; 11.08.45; Abt. XI; 941100; 1600; 417/70/1,
Vorberg, Horst; 10.04.53; KD Zwickau; 140061; 9561; K/1436/89,
Voßwinkel, Hartmut; 29.04.50; HVA; 961500; 1140; 353/77, A
Völkel, Alfred; 20.06.31; HVA; 961500; 1113; 18556/60, E
Völkel, Heiko; 23.03.62; HVA; 961500; 1020; 2859/84, U
Völz, Andreas; 29.12.56; Abt. XI; 941100; 9900; 4170/83,
Vtelensky, Rainer; 04.11.44; OD KKW Nord; 010050; 2200; 2678/70,
Wadewitz, Volker; 04.08.57; HVA; 961500; 1034; 2472/79, F
Wagenknecht, Bernd; 20.12.40; HA IX; 990900; 1020; K, 5799/82
Wagner, Michael; 28.08.61; Abt. XI; 941100; 7065; 6932/88,
Wagner, Silke; 28.12.64; HVA; 961500; 7065; 6932/88/1, F
Walter, Isolde; 27.02.48; Rostock VIII; 010800; 1153; 2832/85,
Warncke, Claus-Dieter; 06.04.44; Abt. XI; 941100; 1140; 2496/74,
Warnecke, Siegfried; 27.12.59; Abt. N; 906540; 1142; 1985/79,
Warzel, Franz; 14.05.28; HVA; 961500; 1020; 181/73, M
Wächter, Wolfgang; 28.09.49; HVA; 961500; 9270; 650/75/16,
Wäckerle, Andrej; 03.04.50; HVA; 961500; 1092; 4683/79, M
Wähner, Jürgen; 28.04.56; Abt. N; 906540; 1093; 3473/76,
Weber, Dieter; 16.06.49; HVA; 961500; 1120; 1779/71, F
Weber, Frank; 06.10.50; KD Dresden/Land; 120041; 8270; XII/2668/87,
Weber, Gerd; 02.07.65; HVA; 961500; 1090; 3383/85, Q
Weber, Hans; 11.07.43; HVA; 961500; 1130; 192/73, X
Weber, Rainer; 06.11.45; HVA; 961500; 1110; 6794/82, O
Weber, Ulrich; 09.03.45; Abt. N; 906540; 1280; 1990/69,
Wedel, Kay; 07.03.64; Abt. N; 906540; 1144; 4933/86,
Weichman, Jürgen; 22.02.48; Abt. XI; 941100; 1156; 3212/77,
Weidehase, Jörg; 25.10.54; Abt. N; 906540; 1142; 3392/76,
Weigand, Andre; 09.04.68; HVA; 961500; 7024; 3118/89, S
Weigelt, Lutz; 22.01.56; Abt. N; 906540; 1280; 3391/76,
Weigel, Jens-Friedrich; 28.06.50; Abt. N; 906540; 1291; 7268/75,
Weigold, Dieter; 13.02.41; Abt. N; 906540; 1058; 2901/66,
Weihrauch, Heike; 11.07.59; HVA; 961500; 2050; 650/75/71/1,
Weinert, Gerhard; 06.10.39; KD Grimmen; 010044; 2300; 1608/70,
Weirich, Manfred; 11.06.38; Abt. N; 906540; 1020; 9798/61,
Weller, Jörg; 11.01.63; HVA; 961500; 1092; 1047/82, M
Welzel, Herbert; 30.04.44; Abt. N; 906540; 1281; 7265/75,
Welzel, Jürgen; 12.05.54; KD Greifswald; 010042; 2200; 617/83,
Wenzel, Joachim; 04.01.53; HVA; 961500; 1142; 5693/83, F
Wenzel, Joachim; 10.12.41; Abt. XI; 941100; 1400; 182/70,
Wenzel, Rolf; 13.05.47; Abt. XI; 941100; 1144; 1748/75,
Werner, Dietmar; 12.04.47; Abt. N; 906540; 1017; 376/69,
Werner, Günter; 31.01.37; HVA; 961500; 1160; 4553/85, H
Werner, Hartmut; 19.01.45; Abt. XI; 941100; 1156; 176/72,
Werner, Uwe; 04.08.61; HVA; 961500; 1143; 1577/86, F
Werner, Wolfgang; 17.11.35; HA VI; 970600; 1140; K, 505/87
Werner, Wolfgang; 24.08.56; Abt. N; 906540; 1020; 3884/76,
Wernicke, Günter; 10.07.49; Abt. XI; 941100; 1157; 98/75,
Wessendorf, Volker; 09.12.51; HVA; 961500; 1190; 1478/87, F
Wesser, Andrea; 20.04.64; HVA; 961500; 1100; 661/86, J
Westland, Jürgen; 08.01.51; Abt. XI; 941100; 1156; 2895/77,
Wetzel, Katrin; 29.03.60; HVA; 961500; 1145; 475/78, J
Wiedemann, Günther; 12.07.56; Abt. N; 906540; 1280; 5219/84,
Wiertelorz, Horst; 05.07.49; Abt. N; 906540; 1136; 3892/77,
Wiesel, Bernd; 20.04.58; Abt. N; 906540; 1143; 2129/78,
Wiesner, Erhard; 31.07.36; HVA; 961500; 1140; 3659/64, M
Wilde, Dirk; 24.12.63; Abt. XI; 941100; 2300; :
Wilde, Hans-Heinz; 27.07.32; Rostock XVIII; 011800; 2300; 5749/79,
Wilhelm, Ralf; 15.07.51; HVA; 961500; 1142; 23/77, F
Wilke, Hartmut; 09.05.60; Abt. N; 906540; 1092; 5019/85,
Winderlich, Jens; 10.10.67; HVA; 961500; 1093; 3453/86, O
Winkler, Anton; 22.03.42; HVA; 961500; 1156; 4674/89, M
Winkler, Georg; 07.08.30; Dresden XVIII; 121800; 8250; XII/1347/87,
Winkler, Günter; 30.04.45; HVA; 961500; 1142; 1996/73, A
Winter, Marina; 26.11.60; HVA; 961500; 1130; 4293/84, J
Witte, Dieter; 23.11.37; Abt. N; 906540; 1140; 5039/76,
Wittstock, Manfred; 31.03.32; Rostock VII; 010700; 2500; 936/64,
Witzel, Rainer; 19.04.64; HVA; 961500; 1090; 3581/88, M
Witzmann, Helmar; 06.08.54; Abt. XI; 941100; 1142; 3959/83,
Wokurka, Ulf; 31.10.62; HVA; 961500; 1055; 4228/83, F
Wolfsteller, Roland; 11.11.59; Abt. N; 906540; 2080; 1598/81,
Wolf, Barbara; 11.02.45; HVA; 961500; 1595; 804/83/1, F
Wolf, Jürgen; 15.10.51; Abt. XI; 941100; 1140; 2741/77,
Wolf, Klaus; 30.03.55; Abt. N; 906540; 1095; 2012/78,
Wolf, Matthias; 24.11.60; HVA; 961500; 1090; 3051/89, E
Wolf, Rainer; 22.02.59; Abt. N; 906540; 1130; 1548/80,
Wolf, Ulrich; 13.03.43; HVA; 961500; 1595; 804/83, F
Wolkenstein, Dietrich; 09.03.35; HVA; 961500; 1281; 962/64, M
Wolkenstein, Hubertus; 25.12.63; HVA; 961500; 1142; 6480/82, M
Wolkenstein, Renate; 23.08.33; HVA; 961500; 1281; 962/64/1, M
Worsch, Jürgen; 28.09.48; Abt. XI; 941100; 1140; 339/73,
Worsch, Ursula; 04.02.49; HVA; 961500; 1140; 339/73/2, E
Wotzka, Jörg-Michael; 27.07.47; KD Rostock; 010040; 2520; 3391/89,
Wöller, Klaus; 31.12.30; HVA; 961500; 1020; 2953/77, J
Wunderlich, Uwe; 06.05.60; Abt. N; 906540; 1140; 4037/79,
Würzburg, Gerd; 10.06.57; HVA; 961500; 1157; 421/79, F
Zapke, Helge-Jens; 01.10.67; Abt. N; 906540; 1156; 953/87,
Zech, Jürgen; 16.07.51; HVA; 961500; 1055; 4598/87, F
Zehl, Klaus; 07.01.38; Rostock VI; 010600; 2510; 553/75,
Zeiseweis, Ralf; 11.11.62; BV Berlin XX; 152000; 1140; 3299/88,
Zeiske, Tino; 27.07.61; HVA; 961500; 1143; 2614/84, F
Zellmer, Bernd; 04.12.55; Abt. N; 906540; 1136; 3620/77,
Zentsch, Peter; 28.08.41; Rostock, BKG; 012900; 2500; 2254/84,
Zetzsche, Jürgen; 16.10.52; Abt. N; 906540; 1144; 1753/80,
Ziegler, Frank; 15.11.63; HVA; 961500; 7010; 3341/86, S
Ziesche, Hans-Dieter; 16.01.60; HVA; 961500; 1017; 205/84, F
Ziese, Elvira; 09.10.54; Frankfurt/O. VI; 050600; 1200; V/441/88,
Zilm, Klaus; 03.03.51; HVA; 961500; 1601; 422/87, F
Zimmermann, Bernd; 07.08.39; HVA; 961500; 1080; 458/63, A
Zimmermann, Peter; 09.11.38; Frankfurt/O. XVIII; 051800; 1203; V/445/88,
Zimmermann, Werner; 05.03.46; Dresden VI; 120600; 8080; XII/1165/88,
Zobel, Frank; 03.04.67; HVA; 961500; 2003; 2842/89, J
Zobler, Günter; 06.09.36; HVA; 961500; 1120; 1826/88, A
Zurflüh, Joachim; 24.12.35; Abt. XI; 941100; 1150; 237/70,
Zwetz, Axel; 13.05.38; Abt. N; 906540; 1136; 958/65,

VIDEO:”Minor-Attracted People” Want Acceptance For Being Pedophile

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://rumble.com/embed/v1knkj4/?pub=4

The text reads as follows:

Read more: VIDEO:”Minor-Attracted People” Want Acceptance For Being Pedophile

QUOTE

“Circumcised boys can no longer masturbate!

Totally wrong! Circumcised boys can masturbate as well as uncircumcised boys. Most of the time, they just have to change their technique. About every fifth boy in Germany is circumcised. This means that his foreskin was shortened during an operation so that his glans is permanently exposed. The main reason for circumcision for most people was a foreskin narrowing (phimosis), which caused pain when the foreskin was pulled back. Few can be circumcised because they simply like a penis without a foreskin.

Where the rumor comes from:

Most guys masturbate by grasping their penis and pushing the foreskin back and forth. But what if there are no foreskins left to slide back and forth? For some there is obviously only one consequence: Then it doesn’t work anymore with masturbation! Not correct!

The truth is:

Every boy can satisfy himself – whether with or without a foreskin! So that the hand can slide over the sensitive penis shaft even without a foreskin, many boys use some body lotion or lubricant. Since a circumcised boy can no longer irritate the glans by pushing the foreskin back and forth, he performs the stimulating hand movements up to the glans. This is usually a little less sensitive for guys without a foreskin.

One thing is clear: after circumcision, every man has to get to know his little friend again and try out how he reacts to rubbing or petting. So if it doesn’t work as lustily as it did before circumcision – don’t despair! After a circumcision surgery, it may take a few months for you to get used to the new situation. Until then, just try and practice.

Girls masturbate with their fingers in their vagina!

It does not work that way! Sure, you can do that. But if you want to reach orgasm, it doesn’t work that way.

Where the rumor comes from:

Probably because many girls and boys do not know that a woman inside the vagina is not particularly excitable. The pleasure center of the woman is not the vagina, but her clit (the clitoris). And that is not in the vagina, but outside, between the labia – towards the navel – where the inner labia meet!

The truth is:

A woman usually comes to orgasm when she rubs her clit! Trying to masturbate a girl by shoving her finger in her vagina and moving it back and forth may make her feel pleasant – but she doesn’t get to climax this way. But if she stimulates her clit and the area around it, it is much more exciting for her.

Incidentally, it is the same with intercourse. Few women come to orgasm simply through the in-out movements of the penis in the vagina. Most also need to stimulate their clitoris with their hands in order to reach their climax.

Rumor: boys come quickly, girls slowly!

Continue reading “VIDEO:”Minor-Attracted People” Want Acceptance For Being Pedophile”

IZ-Tainted Love – Pop Stasi

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://truthbook.social/berndpulch

👉JOIN @ABOVETOPSECRETXXL

ABOVETOPSECRETXXL

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

https://gab.com/berndpulch

https://www.bitchute.com/accounts/referral/berndpulchofficial/

https://www.bitchute.com/channel/R55w1IXstR3h/

👉JOIN @ABOVETOPSECRETXXL

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

Stasi Children’s Television:”We watch while you watch!”

We watch while you watch.

God Bless You!

SUPPORT US AND Become a Patron!
https://www.patreon.com/bePatron?u=54250700
True Information is the most valuable resource and we ask you kindly to give back.

✌️SHARE

👉THE ONLY WEBSITE WITH THE LICENSE TO SPY!
https://berndpulch.org
https://berndpulch.org/about-me/
👉JOIN @ABOVETOPSECRETXXL
https://t.me/ABOVETOPSECRETXXL
gab.com/berndpulch
gettr.com/user/berndpulch
https://truthbook.social/berndpulch
https://www.youtube.com/channel/UCdoKPR_qNWDyJwtCK484A6A
https://rumble.com/c/c-1227213
👉JOIN @ABOVETOPSECRETXXL
Subscribe to https://t.me/ABOVETOPSECRETXXL
SUPPORT US AND Become a Patron!
https://www.patreon.com/bePatron?u=54250700
True Information is the most valuable resource and we ask you kindly to give back.

God Bless You!

What did the Stasi do? (Short Animated Documentary)

God Bless You!

SUPPORT US AND Become a Patron!
https://www.patreon.com/bePatron?u=54250700
True Information is the most valuable resource and we ask you kindly to give back.

✌️SHARE

👉THE ONLY WEBSITE WITH THE LICENSE TO SPY!
https://berndpulch.org
https://berndpulch.org/about-me/
👉JOIN @ABOVETOPSECRETXXL
https://t.me/ABOVETOPSECRETXXL
gab.com/berndpulch
gettr.com/user/berndpulch
https://truthbook.social/berndpulch
https://www.youtube.com/channel/UCdoKPR_qNWDyJwtCK484A6A
https://rumble.com/c/c-1227213
👉JOIN @ABOVETOPSECRETXXL
Subscribe to https://t.me/ABOVETOPSECRETXXL
SUPPORT US AND Become a Patron!
https://www.patreon.com/bePatron?u=54250700
True Information is the most valuable resource and we ask you kindly to give back.

God Bless You!

The Berlin Pedo Network in politics and schools:GoMoPa & GoMoPa4Kids-Does the German government promote pedophiles?

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://rumble.com/embed/v1knkj4/?pub=4

The text reads as follows:

Read more: The Berlin Pedo Network in politics and schools:GoMoPa & GoMoPa4Kids-Does the German government promote pedophiles?

QUOTE

“Circumcised boys can no longer masturbate!

Totally wrong! Circumcised boys can masturbate as well as uncircumcised boys. Most of the time, they just have to change their technique. About every fifth boy in Germany is circumcised. This means that his foreskin was shortened during an operation so that his glans is permanently exposed. The main reason for circumcision for most people was a foreskin narrowing (phimosis), which caused pain when the foreskin was pulled back. Few can be circumcised because they simply like a penis without a foreskin.

Where the rumor comes from:

Most guys masturbate by grasping their penis and pushing the foreskin back and forth. But what if there are no foreskins left to slide back and forth? For some there is obviously only one consequence: Then it doesn’t work anymore with masturbation! Not correct!

The truth is:

Every boy can satisfy himself – whether with or without a foreskin! So that the hand can slide over the sensitive penis shaft even without a foreskin, many boys use some body lotion or lubricant. Since a circumcised boy can no longer irritate the glans by pushing the foreskin back and forth, he performs the stimulating hand movements up to the glans. This is usually a little less sensitive for guys without a foreskin.

One thing is clear: after circumcision, every man has to get to know his little friend again and try out how he reacts to rubbing or petting. So if it doesn’t work as lustily as it did before circumcision – don’t despair! After a circumcision surgery, it may take a few months for you to get used to the new situation. Until then, just try and practice.

Girls masturbate with their fingers in their vagina!

It does not work that way! Sure, you can do that. But if you want to reach orgasm, it doesn’t work that way.

Where the rumor comes from:

Probably because many girls and boys do not know that a woman inside the vagina is not particularly excitable. The pleasure center of the woman is not the vagina, but her clit (the clitoris). And that is not in the vagina, but outside, between the labia – towards the navel – where the inner labia meet!

The truth is:

A woman usually comes to orgasm when she rubs her clit! Trying to masturbate a girl by shoving her finger in her vagina and moving it back and forth may make her feel pleasant – but she doesn’t get to climax this way. But if she stimulates her clit and the area around it, it is much more exciting for her.

Incidentally, it is the same with intercourse. Few women come to orgasm simply through the in-out movements of the penis in the vagina. Most also need to stimulate their clitoris with their hands in order to reach their climax.

Rumor: boys come quickly, girls slowly!

Continue reading “The Berlin Pedo Network in politics and schools:GoMoPa & GoMoPa4Kids-Does the German government promote pedophiles?”

IZ-Tainted Love – Pop Stasi

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://truthbook.social/berndpulch

👉JOIN @ABOVETOPSECRETXXL

ABOVETOPSECRETXXL

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

https://gab.com/berndpulch

https://www.bitchute.com/accounts/referral/berndpulchofficial/

https://www.bitchute.com/channel/R55w1IXstR3h/

👉JOIN @ABOVETOPSECRETXXL

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

Excellent docu about the Berlin Pedo Network in politics and schools:GoMoPa & GoMoPa4Kids-Does the German government promote pedophiles?

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://rumble.com/embed/v1knkj4/?pub=4

The text reads as follows:

Read more: Excellent docu about the Berlin Pedo Network in politics and schools:GoMoPa & GoMoPa4Kids-Does the German government promote pedophiles?

QUOTE

“Circumcised boys can no longer masturbate!

Totally wrong! Circumcised boys can masturbate as well as uncircumcised boys. Most of the time, they just have to change their technique. About every fifth boy in Germany is circumcised. This means that his foreskin was shortened during an operation so that his glans is permanently exposed. The main reason for circumcision for most people was a foreskin narrowing (phimosis), which caused pain when the foreskin was pulled back. Few can be circumcised because they simply like a penis without a foreskin.

Where the rumor comes from:

Most guys masturbate by grasping their penis and pushing the foreskin back and forth. But what if there are no foreskins left to slide back and forth? For some there is obviously only one consequence: Then it doesn’t work anymore with masturbation! Not correct!

The truth is:

Every boy can satisfy himself – whether with or without a foreskin! So that the hand can slide over the sensitive penis shaft even without a foreskin, many boys use some body lotion or lubricant. Since a circumcised boy can no longer irritate the glans by pushing the foreskin back and forth, he performs the stimulating hand movements up to the glans. This is usually a little less sensitive for guys without a foreskin.

One thing is clear: after circumcision, every man has to get to know his little friend again and try out how he reacts to rubbing or petting. So if it doesn’t work as lustily as it did before circumcision – don’t despair! After a circumcision surgery, it may take a few months for you to get used to the new situation. Until then, just try and practice.

Girls masturbate with their fingers in their vagina!

It does not work that way! Sure, you can do that. But if you want to reach orgasm, it doesn’t work that way.

Where the rumor comes from:

Probably because many girls and boys do not know that a woman inside the vagina is not particularly excitable. The pleasure center of the woman is not the vagina, but her clit (the clitoris). And that is not in the vagina, but outside, between the labia – towards the navel – where the inner labia meet!

The truth is:

A woman usually comes to orgasm when she rubs her clit! Trying to masturbate a girl by shoving her finger in her vagina and moving it back and forth may make her feel pleasant – but she doesn’t get to climax this way. But if she stimulates her clit and the area around it, it is much more exciting for her.

Incidentally, it is the same with intercourse. Few women come to orgasm simply through the in-out movements of the penis in the vagina. Most also need to stimulate their clitoris with their hands in order to reach their climax.

Rumor: boys come quickly, girls slowly!

Continue reading “Excellent docu about the Berlin Pedo Network in politics and schools:GoMoPa & GoMoPa4Kids-Does the German government promote pedophiles?”

IZ-Tainted Love – Pop Stasi

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://truthbook.social/berndpulch

👉JOIN @ABOVETOPSECRETXXL

ABOVETOPSECRETXXL

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

https://gab.com/berndpulch

https://www.bitchute.com/accounts/referral/berndpulchofficial/

https://www.bitchute.com/channel/R55w1IXstR3h/

👉JOIN @ABOVETOPSECRETXXL

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

VIDEO:”Minor-Attracted People” Want Acceptance For Being Pedophile

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://rumble.com/embed/v1knkj4/?pub=4

The text reads as follows:

Read more: VIDEO:”Minor-Attracted People” Want Acceptance For Being Pedophile

QUOTE

“Circumcised boys can no longer masturbate!

Totally wrong! Circumcised boys can masturbate as well as uncircumcised boys. Most of the time, they just have to change their technique. About every fifth boy in Germany is circumcised. This means that his foreskin was shortened during an operation so that his glans is permanently exposed. The main reason for circumcision for most people was a foreskin narrowing (phimosis), which caused pain when the foreskin was pulled back. Few can be circumcised because they simply like a penis without a foreskin.

Where the rumor comes from:

Most guys masturbate by grasping their penis and pushing the foreskin back and forth. But what if there are no foreskins left to slide back and forth? For some there is obviously only one consequence: Then it doesn’t work anymore with masturbation! Not correct!

The truth is:

Every boy can satisfy himself – whether with or without a foreskin! So that the hand can slide over the sensitive penis shaft even without a foreskin, many boys use some body lotion or lubricant. Since a circumcised boy can no longer irritate the glans by pushing the foreskin back and forth, he performs the stimulating hand movements up to the glans. This is usually a little less sensitive for guys without a foreskin.

One thing is clear: after circumcision, every man has to get to know his little friend again and try out how he reacts to rubbing or petting. So if it doesn’t work as lustily as it did before circumcision – don’t despair! After a circumcision surgery, it may take a few months for you to get used to the new situation. Until then, just try and practice.

Girls masturbate with their fingers in their vagina!

It does not work that way! Sure, you can do that. But if you want to reach orgasm, it doesn’t work that way.

Where the rumor comes from:

Probably because many girls and boys do not know that a woman inside the vagina is not particularly excitable. The pleasure center of the woman is not the vagina, but her clit (the clitoris). And that is not in the vagina, but outside, between the labia – towards the navel – where the inner labia meet!

The truth is:

A woman usually comes to orgasm when she rubs her clit! Trying to masturbate a girl by shoving her finger in her vagina and moving it back and forth may make her feel pleasant – but she doesn’t get to climax this way. But if she stimulates her clit and the area around it, it is much more exciting for her.

Incidentally, it is the same with intercourse. Few women come to orgasm simply through the in-out movements of the penis in the vagina. Most also need to stimulate their clitoris with their hands in order to reach their climax.

Rumor: boys come quickly, girls slowly!

Continue reading “VIDEO:”Minor-Attracted People” Want Acceptance For Being Pedophile”

IZ-Tainted Love – Pop Stasi

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://truthbook.social/berndpulch

👉JOIN @ABOVETOPSECRETXXL

ABOVETOPSECRETXXL

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

https://gab.com/berndpulch

https://www.bitchute.com/accounts/referral/berndpulchofficial/

https://www.bitchute.com/channel/R55w1IXstR3h/

👉JOIN @ABOVETOPSECRETXXL

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

VIDEO:”Minor-Attracted People” Want Acceptance For Being Pedophile

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://rumble.com/embed/v1knkj4/?pub=4

The text reads as follows:

Read more: VIDEO:”Minor-Attracted People” Want Acceptance For Being Pedophile

QUOTE

“Circumcised boys can no longer masturbate!

Totally wrong! Circumcised boys can masturbate as well as uncircumcised boys. Most of the time, they just have to change their technique. About every fifth boy in Germany is circumcised. This means that his foreskin was shortened during an operation so that his glans is permanently exposed. The main reason for circumcision for most people was a foreskin narrowing (phimosis), which caused pain when the foreskin was pulled back. Few can be circumcised because they simply like a penis without a foreskin.

Where the rumor comes from:

Most guys masturbate by grasping their penis and pushing the foreskin back and forth. But what if there are no foreskins left to slide back and forth? For some there is obviously only one consequence: Then it doesn’t work anymore with masturbation! Not correct!

The truth is:

Every boy can satisfy himself – whether with or without a foreskin! So that the hand can slide over the sensitive penis shaft even without a foreskin, many boys use some body lotion or lubricant. Since a circumcised boy can no longer irritate the glans by pushing the foreskin back and forth, he performs the stimulating hand movements up to the glans. This is usually a little less sensitive for guys without a foreskin.

One thing is clear: after circumcision, every man has to get to know his little friend again and try out how he reacts to rubbing or petting. So if it doesn’t work as lustily as it did before circumcision – don’t despair! After a circumcision surgery, it may take a few months for you to get used to the new situation. Until then, just try and practice.

Girls masturbate with their fingers in their vagina!

It does not work that way! Sure, you can do that. But if you want to reach orgasm, it doesn’t work that way.

Where the rumor comes from:

Probably because many girls and boys do not know that a woman inside the vagina is not particularly excitable. The pleasure center of the woman is not the vagina, but her clit (the clitoris). And that is not in the vagina, but outside, between the labia – towards the navel – where the inner labia meet!

The truth is:

A woman usually comes to orgasm when she rubs her clit! Trying to masturbate a girl by shoving her finger in her vagina and moving it back and forth may make her feel pleasant – but she doesn’t get to climax this way. But if she stimulates her clit and the area around it, it is much more exciting for her.

Incidentally, it is the same with intercourse. Few women come to orgasm simply through the in-out movements of the penis in the vagina. Most also need to stimulate their clitoris with their hands in order to reach their climax.

Rumor: boys come quickly, girls slowly!

Continue reading “VIDEO:”Minor-Attracted People” Want Acceptance For Being Pedophile”

Excellent docu about the Berlin Pedo Network in politics and schools:GoMoPa & GoMoPa4Kids-Does the German government promote pedophiles?

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://rumble.com/embed/v1knkj4/?pub=4

The text reads as follows:

Read more: Excellent docu about the Berlin Pedo Network in politics and schools:GoMoPa & GoMoPa4Kids-Does the German government promote pedophiles?

QUOTE

“Circumcised boys can no longer masturbate!

Totally wrong! Circumcised boys can masturbate as well as uncircumcised boys. Most of the time, they just have to change their technique. About every fifth boy in Germany is circumcised. This means that his foreskin was shortened during an operation so that his glans is permanently exposed. The main reason for circumcision for most people was a foreskin narrowing (phimosis), which caused pain when the foreskin was pulled back. Few can be circumcised because they simply like a penis without a foreskin.

Where the rumor comes from:

Most guys masturbate by grasping their penis and pushing the foreskin back and forth. But what if there are no foreskins left to slide back and forth? For some there is obviously only one consequence: Then it doesn’t work anymore with masturbation! Not correct!

The truth is:

Every boy can satisfy himself – whether with or without a foreskin! So that the hand can slide over the sensitive penis shaft even without a foreskin, many boys use some body lotion or lubricant. Since a circumcised boy can no longer irritate the glans by pushing the foreskin back and forth, he performs the stimulating hand movements up to the glans. This is usually a little less sensitive for guys without a foreskin.

One thing is clear: after circumcision, every man has to get to know his little friend again and try out how he reacts to rubbing or petting. So if it doesn’t work as lustily as it did before circumcision – don’t despair! After a circumcision surgery, it may take a few months for you to get used to the new situation. Until then, just try and practice.

Girls masturbate with their fingers in their vagina!

It does not work that way! Sure, you can do that. But if you want to reach orgasm, it doesn’t work that way.

Where the rumor comes from:

Probably because many girls and boys do not know that a woman inside the vagina is not particularly excitable. The pleasure center of the woman is not the vagina, but her clit (the clitoris). And that is not in the vagina, but outside, between the labia – towards the navel – where the inner labia meet!

The truth is:

A woman usually comes to orgasm when she rubs her clit! Trying to masturbate a girl by shoving her finger in her vagina and moving it back and forth may make her feel pleasant – but she doesn’t get to climax this way. But if she stimulates her clit and the area around it, it is much more exciting for her.

Incidentally, it is the same with intercourse. Few women come to orgasm simply through the in-out movements of the penis in the vagina. Most also need to stimulate their clitoris with their hands in order to reach their climax.

Rumor: boys come quickly, girls slowly!

Continue reading “Excellent docu about the Berlin Pedo Network in politics and schools:GoMoPa & GoMoPa4Kids-Does the German government promote pedophiles?”

IZ-Tainted Love – Pop Stasi

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://truthbook.social/berndpulch

👉JOIN @ABOVETOPSECRETXXL

ABOVETOPSECRETXXL

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

https://gab.com/berndpulch

https://www.bitchute.com/accounts/referral/berndpulchofficial/

https://www.bitchute.com/channel/R55w1IXstR3h/

👉JOIN @ABOVETOPSECRETXXL

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

Excellent docu about the Berlin Pedo Network in politics and schools:GoMoPa & GoMoPa4Kids-Does the German government promote pedophiles?

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://rumble.com/embed/v1knkj4/?pub=4

The text reads as follows:

QUOTE

“Circumcised boys can no longer masturbate!

Totally wrong! Circumcised boys can masturbate as well as uncircumcised boys. Most of the time, they just have to change their technique. About every fifth boy in Germany is circumcised. This means that his foreskin was shortened during an operation so that his glans is permanently exposed. The main reason for circumcision for most people was a foreskin narrowing (phimosis), which caused pain when the foreskin was pulled back. Few can be circumcised because they simply like a penis without a foreskin.

Where the rumor comes from:

Most guys masturbate by grasping their penis and pushing the foreskin back and forth. But what if there are no foreskins left to slide back and forth? For some there is obviously only one consequence: Then it doesn’t work anymore with masturbation! Not correct!

The truth is:

Every boy can satisfy himself – whether with or without a foreskin! So that the hand can slide over the sensitive penis shaft even without a foreskin, many boys use some body lotion or lubricant. Since a circumcised boy can no longer irritate the glans by pushing the foreskin back and forth, he performs the stimulating hand movements up to the glans. This is usually a little less sensitive for guys without a foreskin.

One thing is clear: after circumcision, every man has to get to know his little friend again and try out how he reacts to rubbing or petting. So if it doesn’t work as lustily as it did before circumcision – don’t despair! After a circumcision surgery, it may take a few months for you to get used to the new situation. Until then, just try and practice.

Girls masturbate with their fingers in their vagina!

It does not work that way! Sure, you can do that. But if you want to reach orgasm, it doesn’t work that way.

Where the rumor comes from:

Probably because many girls and boys do not know that a woman inside the vagina is not particularly excitable. The pleasure center of the woman is not the vagina, but her clit (the clitoris). And that is not in the vagina, but outside, between the labia – towards the navel – where the inner labia meet!

The truth is:

A woman usually comes to orgasm when she rubs her clit! Trying to masturbate a girl by shoving her finger in her vagina and moving it back and forth may make her feel pleasant – but she doesn’t get to climax this way. But if she stimulates her clit and the area around it, it is much more exciting for her.

Incidentally, it is the same with intercourse. Few women come to orgasm simply through the in-out movements of the penis in the vagina. Most also need to stimulate their clitoris with their hands in order to reach their climax.

Rumor: boys come quickly, girls slowly!

Continue reading “Excellent docu about the Berlin Pedo Network in politics and schools:GoMoPa & GoMoPa4Kids-Does the German government promote pedophiles?”

IZ-Tainted Love – Pop Stasi

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://truthbook.social/berndpulch

👉JOIN @ABOVETOPSECRETXXL

ABOVETOPSECRETXXL

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

https://gab.com/berndpulch

https://www.bitchute.com/accounts/referral/berndpulchofficial/

https://www.bitchute.com/channel/R55w1IXstR3h/

👉JOIN @ABOVETOPSECRETXXL

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

IZ-Tainted Love – Pop Stasi

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://truthbook.social/berndpulch

👉JOIN @ABOVETOPSECRETXXL

ABOVETOPSECRETXXL

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

https://gab.com/berndpulch

https://www.bitchute.com/accounts/referral/berndpulchofficial/

https://www.bitchute.com/channel/R55w1IXstR3h/

👉JOIN @ABOVETOPSECRETXXL

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

IZ-Tainted Love – Pop Stasi

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://truthbook.social/berndpulch

👉JOIN @ABOVETOPSECRETXXL

ABOVETOPSECRETXXL

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

https://gab.com/berndpulch

https://www.bitchute.com/accounts/referral/berndpulchofficial/

https://www.bitchute.com/channel/R55w1IXstR3h/

👉JOIN @ABOVETOPSECRETXXL

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

HOW DO YOU CARRY $100 BILLION IN LAUNDERED MONEY TO THE BANK ?

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://truthbook.social/berndpulch

👉JOIN @ABOVETOPSECRETXXL

ABOVETOPSECRETXXL

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

https://gab.com/berndpulch

https://www.bitchute.com/accounts/referral/berndpulchofficial/

https://www.bitchute.com/channel/R55w1IXstR3h/

👉JOIN @ABOVETOPSECRETXXL

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

Real Life Horror Movie from China

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://truthbook.social/berndpulch

👉JOIN @ABOVETOPSECRETXXL

ABOVETOPSECRETXXL

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

https://gab.com/berndpulch

https://www.bitchute.com/accounts/referral/berndpulchofficial/

https://www.bitchute.com/channel/R55w1IXstR3h/

👉JOIN @ABOVETOPSECRETXXL

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

IZ-Tainted Love – Pop Stasi

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://truthbook.social/berndpulch

👉JOIN @ABOVETOPSECRETXXL

ABOVETOPSECRETXXL

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

https://gab.com/berndpulch

https://www.bitchute.com/accounts/referral/berndpulchofficial/

https://www.bitchute.com/channel/R55w1IXstR3h/

👉JOIN @ABOVETOPSECRETXXL

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

GoMoPa & GoMoPa4Kids-Does the German government promote pedophiles?

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

The text reads as follows:

QUOTE

“Circumcised boys can no longer masturbate!

Totally wrong! Circumcised boys can masturbate as well as uncircumcised boys. Most of the time, they just have to change their technique. About every fifth boy in Germany is circumcised. This means that his foreskin was shortened during an operation so that his glans is permanently exposed. The main reason for circumcision for most people was a foreskin narrowing (phimosis), which caused pain when the foreskin was pulled back. Few can be circumcised because they simply like a penis without a foreskin.

Where the rumor comes from:

Most guys masturbate by grasping their penis and pushing the foreskin back and forth. But what if there are no foreskins left to slide back and forth? For some there is obviously only one consequence: Then it doesn’t work anymore with masturbation! Not correct!

The truth is:

Every boy can satisfy himself – whether with or without a foreskin! So that the hand can slide over the sensitive penis shaft even without a foreskin, many boys use some body lotion or lubricant. Since a circumcised boy can no longer irritate the glans by pushing the foreskin back and forth, he performs the stimulating hand movements up to the glans. This is usually a little less sensitive for guys without a foreskin.

One thing is clear: after circumcision, every man has to get to know his little friend again and try out how he reacts to rubbing or petting. So if it doesn’t work as lustily as it did before circumcision – don’t despair! After a circumcision surgery, it may take a few months for you to get used to the new situation. Until then, just try and practice.

Girls masturbate with their fingers in their vagina!

It does not work that way! Sure, you can do that. But if you want to reach orgasm, it doesn’t work that way.

Where the rumor comes from:

Probably because many girls and boys do not know that a woman inside the vagina is not particularly excitable. The pleasure center of the woman is not the vagina, but her clit (the clitoris). And that is not in the vagina, but outside, between the labia – towards the navel – where the inner labia meet!

The truth is:

A woman usually comes to orgasm when she rubs her clit! Trying to masturbate a girl by shoving her finger in her vagina and moving it back and forth may make her feel pleasant – but she doesn’t get to climax this way. But if she stimulates her clit and the area around it, it is much more exciting for her.

Incidentally, it is the same with intercourse. Few women come to orgasm simply through the in-out movements of the penis in the vagina. Most also need to stimulate their clitoris with their hands in order to reach their climax.

Rumor: boys come quickly, girls slowly!

Continue reading “GoMoPa & GoMoPa4Kids-Does the German government promote pedophiles?”

Wurzel der STASI-“GoMoPa” – STASI UND KGB IN DER “DDR” – RAI TV FILM-STASI-NOW AND THEN

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://www.raiplay.it/video/2018/01/Passato-e-presente—LA-STASI-locchio-segreto-della-DDR-533b29b1-a87d-44a0-a709-f16e56640fc4.html

👉JOIN @ABOVETOPSECRETXXL
ABOVETOPSECRETXXL
http://www.berndpulch.org
THE ONLY WEBSITE WITH THE LICENSE TO SPY!
https://gab.com/berndpulch
👉JOIN @ABOVETOPSECRETXXL

https://www.bitchute.com/channel/R55w1IXstR3h/

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

IZ-Tainted Love – Pop Stasi

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://truthbook.social/berndpulch

👉JOIN @ABOVETOPSECRETXXL

ABOVETOPSECRETXXL

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

https://gab.com/berndpulch

https://www.bitchute.com/accounts/referral/berndpulchofficial/

https://www.bitchute.com/channel/R55w1IXstR3h/

👉JOIN @ABOVETOPSECRETXXL

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

GoMoPa & GoMoPa4Kids – The PEDO-STASI-PREDATORS

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://www.bitchute.com/channel/R55w1IXstR3h/

Mask Marxists in Germany: Polizei Ordered to Search Judge ...

The text reads as follows:

QUOTE

“Circumcised boys can no longer masturbate!

Totally wrong! Circumcised boys can masturbate as well as uncircumcised boys. Most of the time, they just have to change their technique. About every fifth boy in Germany is circumcised. This means that his foreskin was shortened during an operation so that his glans is permanently exposed. The main reason for circumcision for most people was a foreskin narrowing (phimosis), which caused pain when the foreskin was pulled back. Few can be circumcised because they simply like a penis without a foreskin.

Where the rumor comes from:

Most guys masturbate by grasping their penis and pushing the foreskin back and forth. But what if there are no foreskins left to slide back and forth? For some there is obviously only one consequence: Then it doesn’t work anymore with masturbation! Not correct!

The truth is:

Every boy can satisfy himself – whether with or without a foreskin! So that the hand can slide over the sensitive penis shaft even without a foreskin, many boys use some body lotion or lubricant. Since a circumcised boy can no longer irritate the glans by pushing the foreskin back and forth, he performs the stimulating hand movements up to the glans. This is usually a little less sensitive for guys without a foreskin.

One thing is clear: after circumcision, every man has to get to know his little friend again and try out how he reacts to rubbing or petting. So if it doesn’t work as lustily as it did before circumcision – don’t despair! After a circumcision surgery, it may take a few months for you to get used to the new situation. Until then, just try and practice.

Girls masturbate with their fingers in their vagina!

It does not work that way! Sure, you can do that. But if you want to reach orgasm, it doesn’t work that way.

Where the rumor comes from:

Probably because many girls and boys do not know that a woman inside the vagina is not particularly excitable. The pleasure center of the woman is not the vagina, but her clit (the clitoris). And that is not in the vagina, but outside, between the labia – towards the navel – where the inner labia meet!

The truth is:

A woman usually comes to orgasm when she rubs her clit! Trying to masturbate a girl by shoving her finger in her vagina and moving it back and forth may make her feel pleasant – but she doesn’t get to climax this way. But if she stimulates her clit and the area around it, it is much more exciting for her.

Incidentally, it is the same with intercourse. Few women come to orgasm simply through the in-out movements of the penis in the vagina. Most also need to stimulate their clitoris with their hands in order to reach their climax.

Rumor: boys come quickly, girls slowly!

Continue reading “GoMoPa & GoMoPa4Kids – The PEDO-STASI-PREDATORS”

IZ-Tainted Love – Pop Stasi

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://truthbook.social/berndpulch

👉JOIN @ABOVETOPSECRETXXL

ABOVETOPSECRETXXL

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

https://gab.com/berndpulch

https://www.bitchute.com/accounts/referral/berndpulchofficial/

https://www.bitchute.com/channel/R55w1IXstR3h/

👉JOIN @ABOVETOPSECRETXXL

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

VIDEO-Germany’s Records Of Repression – People & Power

SUPPORT US AND Become a Patron!

CLICK HERE: https://www.patreon.com/bePatron?u=54250700

True Information is the most valuable resource and we ask you kindly to give back. Thank you!

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

https://www.bitchute.com/channel/R55w1IXstR3h/

https://www.youtube.com/channel/UCdoKPR_qNWDyJwtCK484A6A

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

KGB SECRETS 01/19 – The True Story Of Russia’s Highest Ranking Spy In NATO – The Spy Inside

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

On September 19th 2008 high-rank security officer Herman Simm was arrested for delivering thousands of top secret documents to Russia. His job was to protect secrets, but instead, he ended up selling them to the Kremlin.

This is an astonishing account of how a former Soviet militia officer rose to become among the few to safeguard the most intimate secrets in the Western World’s military alliance and after becoming a decorated member of the power elite ended up as a deep mole working for the other side for over 13 years – causing the biggest clash between Western and Russian intelligence services after the Cold War. This is the inside story of Russia’s highest-ranking spy in NATO. Never before told by first-hand witnesses.

GoMoPa & GoMoPa4Kids – The PEDO-CYBER-STASI OF THE 21st CENTURY UNVEILED

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://www.bitchute.com/channel/R55w1IXstR3h/

Mask Marxists in Germany: Polizei Ordered to Search Judge ...

The text reads as follows:

QUOTE

“Circumcised boys can no longer masturbate!

Totally wrong! Circumcised boys can masturbate as well as uncircumcised boys. Most of the time, they just have to change their technique. About every fifth boy in Germany is circumcised. This means that his foreskin was shortened during an operation so that his glans is permanently exposed. The main reason for circumcision for most people was a foreskin narrowing (phimosis), which caused pain when the foreskin was pulled back. Few can be circumcised because they simply like a penis without a foreskin.

Where the rumor comes from:

Most guys masturbate by grasping their penis and pushing the foreskin back and forth. But what if there are no foreskins left to slide back and forth? For some there is obviously only one consequence: Then it doesn’t work anymore with masturbation! Not correct!

The truth is:

Every boy can satisfy himself – whether with or without a foreskin! So that the hand can slide over the sensitive penis shaft even without a foreskin, many boys use some body lotion or lubricant. Since a circumcised boy can no longer irritate the glans by pushing the foreskin back and forth, he performs the stimulating hand movements up to the glans. This is usually a little less sensitive for guys without a foreskin.

One thing is clear: after circumcision, every man has to get to know his little friend again and try out how he reacts to rubbing or petting. So if it doesn’t work as lustily as it did before circumcision – don’t despair! After a circumcision surgery, it may take a few months for you to get used to the new situation. Until then, just try and practice.

Girls masturbate with their fingers in their vagina!

It does not work that way! Sure, you can do that. But if you want to reach orgasm, it doesn’t work that way.

Where the rumor comes from:

Probably because many girls and boys do not know that a woman inside the vagina is not particularly excitable. The pleasure center of the woman is not the vagina, but her clit (the clitoris). And that is not in the vagina, but outside, between the labia – towards the navel – where the inner labia meet!

The truth is:

A woman usually comes to orgasm when she rubs her clit! Trying to masturbate a girl by shoving her finger in her vagina and moving it back and forth may make her feel pleasant – but she doesn’t get to climax this way. But if she stimulates her clit and the area around it, it is much more exciting for her.

Incidentally, it is the same with intercourse. Few women come to orgasm simply through the in-out movements of the penis in the vagina. Most also need to stimulate their clitoris with their hands in order to reach their climax.

Rumor: boys come quickly, girls slowly!

Continue reading “GoMoPa & GoMoPa4Kids – The PEDO-CYBER-STASI OF THE 21st CENTURY UNVEILED”

Tainted Love – Pop Stasi

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://www.bitchute.com/channel/R55w1IXstR3h/

👉JOIN @ABOVETOPSECRETXXL

ABOVETOPSECRETXXL

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

https://gab.com/berndpulch

https://www.bitchute.com/accounts/referral/berndpulchofficial/

https://www.bitchute.com/channel/R55w1IXstR3h/

👉JOIN @ABOVETOPSECRETXXL

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

Yushchenko Poisoning Case -Viktor Yushchenko: Ukraine’s Ex-President On Being Poisoned

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Ukraine’s former president Viktor Yushchenko says he hopes Europe will wake up to the threat posed by Russia in the wake of the poisonings in Salisbury. Seventeen years ago Mr Yushchenko was taking on a presidential candidate favoured by Russia when he was poisoned with a dioxin, a toxic chemical.

Tainted Love – Pop Stasi

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://www.bitchute.com/channel/R55w1IXstR3h/

👉JOIN @ABOVETOPSECRETXXL

ABOVETOPSECRETXXL

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

https://gab.com/berndpulch

https://www.bitchute.com/accounts/referral/berndpulchofficial/

https://www.bitchute.com/channel/R55w1IXstR3h/

👉JOIN @ABOVETOPSECRETXXL

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

Tainted Love – Pop Stasi

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://www.bitchute.com/channel/R55w1IXstR3h/

👉JOIN @ABOVETOPSECRETXXL

ABOVETOPSECRETXXL

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

https://gab.com/berndpulch

https://www.bitchute.com/accounts/referral/berndpulchofficial/

https://www.bitchute.com/channel/R55w1IXstR3h/

👉JOIN @ABOVETOPSECRETXXL

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

GoMoPa & GoMoPa4Kids – The PEDO-CYBER-STASI OF THE 21st CENTURY UNVEILED

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://www.bitchute.com/channel/R55w1IXstR3h/

Mask Marxists in Germany: Polizei Ordered to Search Judge ...

The text reads as follows:

QUOTE

“Circumcised boys can no longer masturbate!

Totally wrong! Circumcised boys can masturbate as well as uncircumcised boys. Most of the time, they just have to change their technique. About every fifth boy in Germany is circumcised. This means that his foreskin was shortened during an operation so that his glans is permanently exposed. The main reason for circumcision for most people was a foreskin narrowing (phimosis), which caused pain when the foreskin was pulled back. Few can be circumcised because they simply like a penis without a foreskin.

Where the rumor comes from:

Most guys masturbate by grasping their penis and pushing the foreskin back and forth. But what if there are no foreskins left to slide back and forth? For some there is obviously only one consequence: Then it doesn’t work anymore with masturbation! Not correct!

The truth is:

Every boy can satisfy himself – whether with or without a foreskin! So that the hand can slide over the sensitive penis shaft even without a foreskin, many boys use some body lotion or lubricant. Since a circumcised boy can no longer irritate the glans by pushing the foreskin back and forth, he performs the stimulating hand movements up to the glans. This is usually a little less sensitive for guys without a foreskin.

One thing is clear: after circumcision, every man has to get to know his little friend again and try out how he reacts to rubbing or petting. So if it doesn’t work as lustily as it did before circumcision – don’t despair! After a circumcision surgery, it may take a few months for you to get used to the new situation. Until then, just try and practice.

Girls masturbate with their fingers in their vagina!

It does not work that way! Sure, you can do that. But if you want to reach orgasm, it doesn’t work that way.

Where the rumor comes from:

Probably because many girls and boys do not know that a woman inside the vagina is not particularly excitable. The pleasure center of the woman is not the vagina, but her clit (the clitoris). And that is not in the vagina, but outside, between the labia – towards the navel – where the inner labia meet!

The truth is:

A woman usually comes to orgasm when she rubs her clit! Trying to masturbate a girl by shoving her finger in her vagina and moving it back and forth may make her feel pleasant – but she doesn’t get to climax this way. But if she stimulates her clit and the area around it, it is much more exciting for her.

Incidentally, it is the same with intercourse. Few women come to orgasm simply through the in-out movements of the penis in the vagina. Most also need to stimulate their clitoris with their hands in order to reach their climax.

Rumor: boys come quickly, girls slowly!

Continue reading “GoMoPa & GoMoPa4Kids – The PEDO-CYBER-STASI OF THE 21st CENTURY UNVEILED”

250 Gigabytes Hacked From The Metropolitan D.C. Police By The Ransomware Group Babuk

SUPPORT US AND Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

Babuk Locker è il primo nuovo ransomware aziendale del ...

DDOsecrets reports: “250 gigabytes hacked from the Metropolitan D.C. police by the ransomware group known as Babuk. The data includes a 156.35 gigabyte “gang database” (released by the hackers as “all”) and two 64.19 gigabyte (released by the hackers as “HR”) and 29.03 gigabyte (released by the hackers as “part 2”) human resource datasets.

Distributed Denial of Secrets is immediately making the data available to journalists and researchers, and is in the process of reviewing it for portions that can be publicly released.

The hackers released the following screenshots (click to view enlarged versions) showing what they had access to and what is presumably contained in the data that is being released. The screenshots are offered to maintain a complete record and to offer a preliminary overview to journalists, researchers and curious citizens.

Distributed Denial of Secrets has located and converted 74,874 emails from the largely inaccessible .PST format to the universal .EML format, which are being made available to the public. The most recent collection of emails can be downloaded here. The emails come from the lead civilian analyst for the Department’s Intelligence Branch.

Some email conversions are also being provided directly to journalists and researchers.This includes 17,690 emails from the Director of Human Resources as well as 6,022 emails from then-intern Marvin “Ben” Haiman, now the Executive Director of the Professional Development Bureau and former Director for the Homeland Security Advisory Council for DHS.

The 98,586 emails are organized by archive, retain their original folder structure and are organized chronologically. Due to the way the emails were extracted and converted, they may not pass DKIM inspection. Forensic evaluation should only be performed on the original archives, as the conversions are provided only for convenience of journalists and other researchers.

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THE FULL DOCUMENT AND MANY MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

CISA: COST OF A CYBER INCIDENT: SYSTEMATIC REVIEW AND CROSS-VALIDATION – ORIGINAL DOCUMENT

SUPPORT US AND Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

Continue reading “CISA: COST OF A CYBER INCIDENT: SYSTEMATIC REVIEW AND CROSS-VALIDATION – ORIGINAL DOCUMENT”

ANONYMOUS – These Insanely Strange Videos Will Keep You Awake At Night – WHAT IS GOING ON?

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Person Convicted To 11 Years For Money Laundering For North Korea

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

RealBanknotes.com > North Korea p66a: 5000 Won from 2002

Ghaleb Alaumary, a 36-year-old dual U.S and Canadian citizen, worked for cyber criminals including the three North Koreans who heisted as much 1.3 billion dollars in a cybercrime spree believed to be executed on behalf of North Korean intelligence.Among the victims of the spree was a major Maltese bank, the Bank of Valletta, which was robbed of $14 million in 2019. To turn that cash into usable currency, the hackers turned to Alaumary.

“Alaumary recruited and organized individuals to withdraw stolen cash from ATMs; he provided bank accounts that received funds from bank cyber-heists and fraud schemes; and, once the ill-gotten funds were in accounts he controlled, Alaumary further laundered the funds through wire transfers, cash withdrawals, and by exchanging the funds for cryptocurrency,” the DOJ explained.

The North Korean spree employed other high-profile money launderers, including the Nigerian social media influencer Ramon “Hushpuppi” Abbas.

Before working with the North Koreans, Alaumary was implicated as an accomplice in the theft of $9.4 million from Canada’s McEwan University.

According to the DOJ, Alaumary worked with others to convince the university that they represented a construction company who had been involved in a major building project at the school, ultimately defrauding the school into wiring the team millions.

In addition to the jail time, Alaumary has also been ordered to pay more than $30 million to his victims in restitution.

“Other victims of Alaumary’s crimes included banks headquartered in India, Pakistan and Malta, as well as companies in the United States and U.K., individuals in the United States and a professional soccer club in the U.K.,” the DOJ said.

NSA – Scope Of Treasure Map – Map Of Every Router & Device On The Global Internet – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Page 1 of Treasure Map Presentation
Continue reading “NSA – Scope Of Treasure Map – Map Of Every Router & Device On The Global Internet – Original Document”

Anonymous – “Everyone Should Be Prepared” – Watch Within The Next 48 hrs

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Exposed – Google Kenosha WI -Warrant -Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Google is giving data to police based on search keywords, court docs show -  CNET
Continue reading “Exposed – Google Kenosha WI -Warrant -Original Document”

Edward Snowden & Julian Assange’s Warning About The Security And Surveillance Industrial Complex

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

KGB SECRETS 01/19 – The True Story Of Russia’s Highest Ranking Spy In NATO – The Spy Inside

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

On September 19th 2008 high-rank security officer Herman Simm was arrested for delivering thousands of top secret documents to Russia. His job was to protect secrets, but instead, he ended up selling them to the Kremlin.

This is an astonishing account of how a former Soviet militia officer rose to become among the few to safeguard the most intimate secrets in the Western World’s military alliance and after becoming a decorated member of the power elite ended up as a deep mole working for the other side for over 13 years – causing the biggest clash between Western and Russian intelligence services after the Cold War. This is the inside story of Russia’s highest-ranking spy in NATO. Never before told by first-hand witnesses.

KGB SECRETS 1-2/19 – Stalin’s Spies and The Secrets Of The KGB/NKVD – Secrets Of War

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

The Kremlin operatives who were loyal to one man… a paranoid dictator who spied as intensely on his Allies as he did on his enemies. Features exclusive interviews with former KGB/NKVD intelligence officers and other eyewitnesses to the most ruthless dictator of the 20th century.

Revealed – The Politburo’s Predicament – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Page 1 of The Politburo’s Predicament:Confronting the Limitations of Chinese Communist Party Repression
Continue reading “Revealed – The Politburo’s Predicament – Original Document”

Edward Snowden UNMASKS Apple’s New Ploy To SPY On You!!

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Apple announced a new set of “protection for children” features for US iPhones, but will it open the floodgates to a significant expansion of the surveillance state?

#apple #iPhone #EdwardSnowden #surveillance #spying

China’s System Of Control Unveiled – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Page 1 of Throttling Dissent: China’’s New Leaders Refine Internet Control
Continue reading “China’s System Of Control Unveiled – Original Document”

KGB SECRETS 06/19 – Deep Undercover With Former KGB Spy Jack Barsky

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

What happens when a Soviet spy decides his American life is the best fit? Author Jack Barsky, the longest-surviving known member of the KGB illegals program that operated during the Cold War, shares his memoir, “Deep Undercover: My Secret Life & Tangled Allegiances as a KGB Spy in America.

KGB SECRETS 07/19 – Russian Spies In America, Then And Now

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Russia is accused of trying to influence the US election, which led to the Trump presidency. In a rare interview one of the Soviet Union’s highest-ranking KGB spies talks about the long-standing practice of subverting Western democracy.

KGB SECRETS 08/19 – Confessions Of A Russian Spy

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

“For so many years, two persons were inside of me,” says Deniss Metsavas, a former Russian spy. Here, Metsavas tells his disturbing story of espionage, blackmail, and double identity for the very first time.

KGB SECRETS 09/19 – 10 Declassified Secrets Of The KGB

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

The KGB is one of the most feared organizations in history, causing untold amounts of trouble during the Cold War and during the reign of the USSR. But with files always being declassified, just what secrets have been uncovered? These are 10 Declassified Secrets of the KGB.

KGB SECRETS 13/19 – Trigon: KGB Chess Game

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

In the next episode of Declassified: Untold Stories of American Spies, learn about the story of how the CIA recruited Soviet diplomat Aleksandr Ogorodnik, codename TRIGON, to capture intelligence on the Soviet Union during the peak of the Cold War conflict.

KGB SECRETS 15/19 – Former KGB Spy Rates 9 Russian Spy Scenes In Movies – How Real Is It?

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Jack Barsky is a former sleeper agent of the KGB who spied on the US from 1978 to 1988. After being exposed, he turned FBI informant and has since stayed in the United States, becoming a published author of “Deep Undercover” and an expert on espionage and Russian intelligence.

He was recruited into the KGB after being approached by a member of the East German secret police at the University of Jena in 1969. Barsky rates the realism of Russian spying tactics such as message interception, surveillance, and sleeper cells in “The Fourth Protocol” (1987), “Anna” (2019), “Bridge of Spies” (2015), “Tinker Tailor Soldier Spy” (2011), and the popular TV show “The Americans” (2013-2018).

He also breaks down physical training and spies’ backgrounds in “Red Sparrow” (2018), “Salt” (2010), and Black Widow’s first on-screen appearance in “Iron Man 2” (2010). He also discusses the Bond movie franchise and its depiction of Russian spies in “From Russia With Love” (1963).

KGB SECRETS 18/19 – This FBI Agent Sold Secrets To The KGB For Years – Video

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

In 1985, an American FBI agent began to sell intelligence to the Russians, under the alias of Ramon Garcia. It would be another 16 years before he was finally arrested by the FBI. From the Series: Spy Wars with Damian Lewis: A Perfect Traitor https://bit.ly/3bqZhB6

Presidential Order Against Russian Hackers – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

US expels Russian diplomats over cyber attack allegations - BBC News

This executive order announced publicly acknowledged measures taken by the Obama administration in response to Russia’s alleged involvement in the hacking of Democratic National Committee and other computer systems. The annex identifies the entities targeted by the measures – including the Russian security service (FSB) and military intelligence (GRU).

Page 1 of Document-10. Barack Obama, Executive Order, "Taking Additional Steps to Address the National Emergency with Respect to Significant Malicious Cyber-Enabled Activities," w/Annex. December 29, 2016. Unclassified.
Continue reading “Presidential Order Against Russian Hackers – Original Document”

Yushchenko Poisoning Case -Viktor Yushchenko: Ukraine’s Ex-President On Being Poisoned

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Ukraine’s former president Viktor Yushchenko says he hopes Europe will wake up to the threat posed by Russia in the wake of the poisonings in Salisbury. Seventeen years ago Mr Yushchenko was taking on a presidential candidate favoured by Russia when he was poisoned with a dioxin, a toxic chemical.

Stasi-Dioxin – The “NACHRICHTENDIENST” Searching For the Perfect Murder

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

    

Evidence shows that such a perfect murder plotted by former Stasi agents is the cause of the death of German watchdog and journalist Heinz Gerlach.

The Ministry for State Security (German: Ministerium für Staatssicherheit (MfS), commonly known as the Stasi (IPA: [ˈʃtaziː]) (abbreviation German: Staatssicherheit, literally State Security), was the official state security service of East Germany. The MfS was headquartered in East Berlin, with an extensive complex in Berlin-Lichtenberg and several smaller facilities throughout the city. It was widely regarded as one of the most effective and repressive intelligence and secret police agencies in the world. The MfS motto was “Schild und Schwert der Partei” (Shield and Sword of the Party), that is the ruling Socialist Unity Party of Germany (SED).

Continue reading “Stasi-Dioxin – The “NACHRICHTENDIENST” Searching For the Perfect Murder”

STASI – East Germany’s Secret Police -Germany’s Records Of Repression

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Sixty years after the Berlin Wall was erected, the spectre of the Stasi continues to loom over Germany.

STASI – East Germany’s Secret Police – Targeted By The STASI

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

The Stasi spied on Silke Orphal and Ilona Seeber for years – after they applied to go to the West. Thirty years after the fall of the Berlin Wall, they both look back at their Stasi files. The Stasi files of Silke Orphal and Ilona Seeber include intercepted letters, official documents and countless reports by spies who meticulously noted everything about their lives, including the turning on and off of lights.

When Silke Orphal and Ilona Seeber, who were both ordinary typists at Neues Deutschland – the official newspaper of the Socialist Unity Party – applied to leave the GDR, it was considered scandalous. They were ostracized at work, threatened and subjected to interrogations that lasted hours. What did the experience do to them? How do they look back on that time today? A report by Axel Rowohlt.

STAS – East Germany’s Secret Police -East Germany’s Stasi Files

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

In a musty room somewhere inside a maze of offices in east Berlin, two women are working patiently on what may be the biggest puzzle the world has ever seen – more than half a billion pieces that together detail innumerable actions committed by East Germany’s secret police.

Continue reading “STAS – East Germany’s Secret Police -East Germany’s Stasi Files”

Original STASI Agent Lists Exposed Only here – Neo Stasi Websites Mit Fake Listen Unter meinem Namen

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Original STASI Agent Lists Exposed

Original STASI Agent Lists Exposed

More and more fake Stasi Lists occur under my name or under obscure domains. A diversion maneuver that clearly shows that Neostasi is on the way.

Immer mehr falsche Stasilisten tauchen mit meinem Namen oder unter obskuren Domains auf.

Ein Ablenkungsmanöver, das klar zeigt, Neo-Stasi ist unterwegs.

GoMoPa & GoMoPa4Kids – The PEDO-CYBER-STASI OF THE 21st CENTURY UNVEILED

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://www.bitchute.com/channel/R55w1IXstR3h/

Mask Marxists in Germany: Polizei Ordered to Search Judge ...

The text reads as follows:

QUOTE

“Circumcised boys can no longer masturbate!

Totally wrong! Circumcised boys can masturbate as well as uncircumcised boys. Most of the time, they just have to change their technique. About every fifth boy in Germany is circumcised. This means that his foreskin was shortened during an operation so that his glans is permanently exposed. The main reason for circumcision for most people was a foreskin narrowing (phimosis), which caused pain when the foreskin was pulled back. Few can be circumcised because they simply like a penis without a foreskin.

Where the rumor comes from:

Most guys masturbate by grasping their penis and pushing the foreskin back and forth. But what if there are no foreskins left to slide back and forth? For some there is obviously only one consequence: Then it doesn’t work anymore with masturbation! Not correct!

The truth is:

Every boy can satisfy himself – whether with or without a foreskin! So that the hand can slide over the sensitive penis shaft even without a foreskin, many boys use some body lotion or lubricant. Since a circumcised boy can no longer irritate the glans by pushing the foreskin back and forth, he performs the stimulating hand movements up to the glans. This is usually a little less sensitive for guys without a foreskin.

One thing is clear: after circumcision, every man has to get to know his little friend again and try out how he reacts to rubbing or petting. So if it doesn’t work as lustily as it did before circumcision – don’t despair! After a circumcision surgery, it may take a few months for you to get used to the new situation. Until then, just try and practice.

Girls masturbate with their fingers in their vagina!

It does not work that way! Sure, you can do that. But if you want to reach orgasm, it doesn’t work that way.

Where the rumor comes from:

Probably because many girls and boys do not know that a woman inside the vagina is not particularly excitable. The pleasure center of the woman is not the vagina, but her clit (the clitoris). And that is not in the vagina, but outside, between the labia – towards the navel – where the inner labia meet!

The truth is:

A woman usually comes to orgasm when she rubs her clit! Trying to masturbate a girl by shoving her finger in her vagina and moving it back and forth may make her feel pleasant – but she doesn’t get to climax this way. But if she stimulates her clit and the area around it, it is much more exciting for her.

Incidentally, it is the same with intercourse. Few women come to orgasm simply through the in-out movements of the penis in the vagina. Most also need to stimulate their clitoris with their hands in order to reach their climax.

Rumor: boys come quickly, girls slowly!

Continue reading “GoMoPa & GoMoPa4Kids – The PEDO-CYBER-STASI OF THE 21st CENTURY UNVEILED”

Der „NACHRICHTENDIENST“ „GoMoPA“ – DIE CYBER-STASI DES 21. JAHRHUNDERTS

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

“Worse than the Gestapo.” — Simon Wiesenthal, Nazi hunter

Lauschen, spähen, schnüffeln: Vor 60 Jahren wurde die DDR-Staatssicherheit gegründet. Mehr als 91.000 hauptamtliche und doppelt so viele inoffizielle Mitarbeiter garantierten der SED die Macht. Ein Geheimdienst im klassischen Sinn war der Apparat nie, eher schon eine kriminelle Vereinigung mit tödlichen Methoden“, schreibt die angesehene Tageszeitung „DIE WELT“.

„Genau so verfährt auch der „NACHRICHTENDIENST“ „ GoMoPa“ , erläutert Rainer W. (Name wurde aus Sicherheitsgründen anonymisiert). Er war über mehrere Monate „inoffizieller“ Mitarbeiter des „NACHRICHTENDIENSTES“ „GoMoPa“, einem angeblichen Zusammenschluss jüdischer US-Rechtsanwälte namens Goldman, Morgenstern & Partner LLC, die noch nie jemand gesehen hat. Stattdessen sehen die Personen, die sich mit „GoMoPa“ beschäftigen nur die Totenkopfmaske stalinistischer STASI-Hacker, Erpresser und Cyberstalker.

Rainer W.: „Die eigentlichen Köpfe von „GoMoPa“ sind meiner Meinung nach wohl RA Jochen Resch und STASI-Oberst Ehrenfried Stelzer. Maurischat (ein Deckname) hat nicht das Format so eine Organisation aufzuziehen.“

Seit Jahren schon vesuchen die vorbestraften Serien-Kriminellen um das „Aushängeschild“ Klaus-Dieter Maurischat die deutsche Wirtschaft zu infiltrieren. Doch erst seit dem mutmasslichen Mord an Heinz Gerlach und den monatelangen Attacken gegen unser Haus sind viele Fakten recherchiert und zu Tage gekommen.

Vor allem über die Methoden des „NACHRICHTENDIENSTES“ – aber auch über dessen Hintermänner in Berlin, denn in New York existiert sowieso nur eine Briefkastenadresse und auch das „Büro“ in Berlin ist ein „virtuelles Regus-Büro“.

Die Fassade soll den „NACHRICHTENDIENST“ tarnen.

„DIE WELT“ schreibt: „40 Jahre lang, von der Gründung bis zu ihrer schrittweisen Auflösung zwischen Dezember 1989 und März 1990, war die Staatssicherheit der wichtigste Machtgarant der SED-Herrschaft. In dieser Zeit wucherte der Apparat immer mehr, bis schließlich mehr als 91.000 hauptamtliche Mitarbeiter für das MfS tätig waren.

Dieses Heer betreute eine Schattenarmee mit 189.000 „Inoffiziellen Mitarbeitern“ (IM). Statistisch gesehen kam in der DDR auf 55 erwachsene Bürger ein Vollzeit- oder Teilzeit-Stasi-Mann. Zum Vergleich: Im kommunistischen Polen lag das Verhältnis bei 1500 zu eins.

Der Apparat hat ungezählte Verbrechen zu verantworten. Darin folgte er seinen sowjetischen Vorbildern, der Tscheka (stolz nannten sich Stasi-Leute „Tschekisten“) und dem KGB. Vor allem aber prägte ein Mann das kriminelle Gebaren des MfS: Erich Mielke hatte sich schon als junger Mann 1931 als Attentäter in Berlin bewährt, als er im Auftrag der KPD zusammen mit einem Mittäter zwei Berliner Polizeioffiziere erschoss.

Der Doppelmörder konnte flüchten und führte im Spanischen Bürgerkrieg stalinistische Säuberungen in den eigenen Reihen durch. Im Sommer 1945 kehrte er nach Berlin zurück und übernahm sofort eine führende Position in der neu eingerichteten Polizei – interessanterweise in jenem Gebäude, das bis 1990 Sitz und Postanschrift der Staatssicherheit sein sollte.“

Zu den ungezählten Verrechen zählen Morde, Entführungen, Raub, Erpressung, Bespitzelung und jahrelange Gefängnishaft für Regime-Kritiker.

Jörg Berger flüchtete 1979 aus der DDR. Auch im Westen blieb die Stasi sein ständiger Begleiter. Jörg Berger berichtete vor seinem frühen Tod: „Nehmen wir den Fall des Spielers Lutz Eigendorf. Der war kurz vor mir geflüchtet und hat dann durch viel Medienpräsenz noch selbst dazu beigetragen, den Rummel anzufachen. Er starb bei einem Unfall auf der Autobahn, höchstwahrscheinlich hat ihn die Stasi vor seinem Tod geblendet. Entsprechendes findet sich jedenfalls in seiner Akte. Die Leute um Eigendorf waren die Leute, die ich auch um mich versammelt hatte. Dazu war er ein junger Spieler, ich ein gestandener Trainer. So hat man mir die Autoreifen zerstochen, auf der Autobahn löste sich ein Rad – und monatelang hatte ich Lähmungserscheinungen. Vermutlich von einer Bleivergiftung, die die Stasi initiiert hatte. Die haben mir wohl etwas in ein Getränk gemischt.“

„Der „Blitz“ traf Wilhelm van Ackern am 24. März 1955, kurz nach 22.30 Uhr – in Form von K.-o.-Tropfen in frisch gebrühtem Bohnenkaffee. Der vermeintliche Informant Fritz Weidmann hatte den 39-jährigen Fotohändler in eine konspirative Wohnung in der Kreuzberger Gneisenaustraße gelockt und ihm dort den vergifteten Kaffee serviert.

Nach wenigen Minuten wurde van Ackern übel; gestützt von Weidmann, verließ er die Wohnung. Doch auf der Straße erwartete ein weiterer Mann die beiden mit einem Wagen. Wilhelm van Ackern wurde im Schutz der Dunkelheit hineingestoßen und über die noch offene Sektorengrenze von West- nach Ost-Berlin ins Untersuchungsgefängnis Hohenschönhausen gefahren. Erst neuneinhalb Jahre später, teilweise verbüßt in der berüchtigten DDR-Sonderhaftanstalt Bautzen II, kam er frei und durfte zurück nach West-Berlin.“

Von Arsen bis Zyankali:
Der Giftschrank der Staatssicherheit

   
 
   
 
   
 
   
 
   
 
   
 
 
     
 
     
 

Dieter Baumann ist nicht totzukriegen. Nach einer zweijährigen Dopingsperre geht er jetzt wieder an den Start. 1999 eine positive Dopingprobe. Dass er sich selbst gedopt hat, glauben heute nur noch seine Feinde. Und Feinde aus der ehemaligen DDR hatte er genug:

Dieter Baumann 1991:
„Trainer, die eben mit solchen Dingen zu tun hatten, mit Doping, die können vom DLV nicht weiter beschäftigt werden.“

Dieter Baumann 1994:
„Aber die Trainer und die Funktionäre, die haben es nämlich entschieden, dass man es macht. Und diese Leute hat man jetzt wieder.“

Dieter Baumann 1998:
„Für mich als Athlet, das beanspruche ja auch ich für mich selber, gilt als Nachweis eine positive Probe oder ein Geständnis.“

In Baumanns Zahnpasta fanden Kontrolleure das Dopingmittel Norandrostendion. Wie man Zahnpasta-Tuben mit Gift präpariert, kann man in den Stasiakten nachlesen: mit einem Glasröhrchen im hinteren Teil der Z-Tube.

Die Zeitschrift „Laufzeit“ im Osten Berlins fragte ein Jahr vor Baumanns Dopingtest nach einem „Messias“ der Antidopingbewegung und beendete den Kommentar mit dem Satz: „Muß man sich angesichts morgendlicher Hochform eines Tages gar fragen: Ist meine Zahnpasta noch sauber?“

Laufzeit-Chef Wolfgang Weising, früher Leichtathletikautor bei der NVA-Zeitung „Volksarmee“ – sagte gegenüber report AUS MÜNCHEN, diese Formulierung sei Zufall gewesen. Baumann, das Opfer eines Komplotts? Selbst die Tübinger Kriminalpolizei schließt heute aus, dass sich Baumann selbst gedopt hat. Auch wissenschaftliche Untersuchungen belegen: Er konnte seine Zahnpasta nicht nachträglich manipuliert haben. Baumanns größte Entlastung: die Dosis war niemals leistungssteigernd.

Baumann selbst will nicht öffentlich spekulieren, wer ihm das Dopingmittel unterjubelte. Es müsse aber jemand aus seinem engen Umfeld sein.

Dieter Baumann, Olympiasieger 1992:
„Ich glaube schon, dass die Täter sich verrechnet haben. Ich glaube, der Wunsch der Täter, soviel kann ich sagen, ist mein Eindruck, dass es mich überhaupt nicht mehr gibt im Sport. Und ich hab’ dann so ein Naturell, wo ich denke: Nee, wenn jemand so einen innigen Wunsch hat, dann sollte man den nicht erfüllen.“

Die Existenz von Kritikern vernichten, das war eine Aufgabe der Stasi. Der Rechtsmediziner Prof. Thomas Daldrup von der Universität Düsseldorf hat die sogenannte „Toxdat“-Studie der DDR untersucht – eine 900 Seiten starke Datenbank über Giftmordmöglichkeiten. Hier ist detailliert beschrieben wie sich selbst Laien Gifte beschaffen können und wie man einen Mord am besten verschleiert.

Prof. Thomas Daldrup, Präsident Gesellschaft für Toxikologische und Forensische Chemie:
“Hier ist so ein Beispiel für einen Stoff, den will ich nicht erwähnen. ‚Dieser Stoff erfüllt in hohem Maße Kriterien für ein zum perfekten Mord geeignetes Gift.’ Also, das kann man doch gar nicht anders lesen, als dass hier eine Anleitung zum perfektem Mord mit Gift gegeben wird. Hier ist es mal ganz klar ausgedrückt, aber das ganze Buch ist gefüllt mit solchen Informationen.“

Hinweise auf die Verschleierung provozierter Unfälle finden sich ebenfalls in Toxdat: „Vortäuschung von Verkehrsunfällen durch Auslösung von sekundenschneller Bewusstlosigkeit mittels Minigasgenerator in Belüftungsschächten von PKW.“

Da ist zum Beispiel der rätselhafte Verkehrsunfall des ehemaligen DDR-Fußballspielers Lutz Eigendorf im Jahr 1983. Vier Jahre zuvor war er nach einem Spiel in der Bundesrepublik nicht in die DDR zurückgekehrt. Er war ein leidenschaftlicher Autofahrer, seine Fahrweise risikovoll, das notierten die Spitzel der Stasi im Westen. Kurz vor seinem Verkehrsunfall stoppt die Stasi seine Fahrtzeit und die genaue Streckenführung seines täglichen Wegs vom Stadion nach Hause.

Zum Unfallhergang tauchen vor zwei Jahren neue Hinweise auf. Wurde Eigendorf gezielt geblendet? In den Giftakten der Stasi heißt es: „verblitzen, Eigendorf“. Hatte man Eigendorf heimlich ein pupillenerweiterndes Mittel verabreicht?

Die Staatsanwaltschaft Berlin kann Fragen dazu nicht beantworten, da eine Obduktion nicht angeordnet wurde, auch nach Auftauchen der neuen Stasidokumente nicht.

Ein weiterer Fall: Fußballtrainer Jörg Berger liest seine Stasiakten. Nach seiner Flucht aus der DDR wurde der Star-Trainer ´79 zum Staatsfeind.

Jörg Berger, Fußballtrainer Alemannia Aachen:
„Hier ist alles gesagt!“

Die Stasi wusste, dass Berger Angst hatte vor einem möglichen Auftragsmord, um weitere Fußballer vor einer Flucht abzuhalten:

„BERGER bekundete angeblich (…), daß es ihm nicht so ergehen soll wie EIGENDORF.“

Die Stasi glaubte, dass Berger der Drahtzieher war für die Republikflucht mehrerer Fußballer. Als Berger dann Mitte der 80er Jahre als Trainer auf dem Sprung in die 1. Bundesliga war und sich die DDR-Sportler Falko Götz und Dirk Schlegel nach Westdeutschland absetzten, schien Berger für die DDR unerträglich zu werden.

„Im operativen Vorgang ‚Ball’ wurde operativ herausgearbeitet, daß BERGER wesentlichen Anteil am Verrat von GÖTZ und SCHLEGEL hatte.“

Jörg Berger, Fußballtrainer, Alemannia Aachen:
„Es ist auch in diesen Aussagen zu erkennen, dass man mich berufsunfähig machen wollte oder dass man mich kaltstellen wollte in der Richtung, dass ich nicht mehr als Trainer arbeite, um da vielleicht auch nicht mehr die Einflüsse auf Spieler oder vielleicht sogar auf Trainer zu haben.“

1986 litt Berger unter rätselhaften Lähmungserscheinungen. Der Erklärungsversuch damals: eine Virusinfektion. Im Auftrag von report AUS MÜNCHEN hat der Rechtsmediziner Prof. Wolfgang Eisenmenger vor dem Hintergrund von Toxdat Bergers Krankenakten analysiert. Jetzt scheint festzustehen: Berger wurde vergiftet.

Prof. Wolfgang Eisenmenger, Klinikum Innenstadt der Universität München, Institut für Rechtsmedizin:
„Wenn man die laborchemischen Befunde aus dem Krankenhaus kritisch würdigt, muss man sagen, es spricht in Nachhinein nichts für eine durchgemachte Virusentzündung. Da die Schwermetallvergiftungen nicht gezielt untersucht worden sind, kann man sie aufgrund der Laborbefunde nicht ausschließen. (…) Es kommen – wenn man das Krankheitsbild würdigt – vor allem Schwermetalle aus der Gruppe der Bleiverbindungen und der Arsenverbindungen in Betracht.“

Die Anleitung, eine Arsenikvergiftung zu verschleiern – liefert ebenfalls wieder die DDR-Giftstudie Toxdat.

Frühere Stasi-Mitarbeiter wollten auch ihn ausschalten, das glaubt der Bundestagsabgeordnete Hartmut Büttner aus Hannover. 1995 hatte er einen mysteriösen Autounfall, der ihn beinahe das Leben kostete. Nach der Wiedervereinigung hatte der Abgeordnete zu den Hintermännern der „Toxdat“-Studie recherchiert und sich sehr für die Offenlegung der Stasi-Akten durch die Gauck-Behörde eingesetzt.

Hartmut Büttner, CDU-Bundestagsabgeordneter 1991:
„Ich halte es für skandalös, dass der mit dem Sektglas parlierende Altsozialist den Insassen von Bautzen völlig verdrängt hat.”

Als Büttner ´95 auf gerader, staubtrockener Straße verunglückte, findet keine Filigranuntersuchung des Wagens statt. Während er im Koma liegt, gibt die Polizei das Schrottauto frei. Eine Speditionsfirma zahlt dafür eilig das Sechsfache seines Werts. Büttner wurde mitgeteilt:

Hartmut Büttner, CDU-Bundestagsabgeordneter:
“Dieses Auto ist in der Tat ins ‚solvente Ausland’ – in diesem Fall nach Polen – geschickt worden. Und in Polen wurde dieser Wagen nach einer Woche als gestohlen gemeldet.“

Viele Unfälle und Erkrankungen von ehemaligen DDR-Systemkritikern scheinen noch lange nicht geklärt.

Ebenso wie der Todesfall Heinz Gerlach zur Gänze aufgeklärt werden muss

„DIE WELT“ berichtet: „Mielkes Leute pfuschten in das Leben von Millionen DDR-Bürgern hinein, zerstörten berufliche oder private Hoffnungen und zersetzten routinemäßig ganze Familien. Außerdem schädigte die Stasi im Laufe der Jahrzehnte Hunderttausende Menschen in der SED-Diktatur vorsätzlich, brach unangepasste Charaktere mit psychischem Druck.

In jedem DDR-Bezirk unterhielt das MfS eigene Untersuchungshaftanstalten, in Potsdam zum Beispiel in der Lindenstraße 54/55. In Berlin gab es neben der Zentrale in Lichtenberg die Stasi-Bezirksverwaltung Berlin, die bis 1985 in einem ehemaligen Krankenhaus an der Prenzlauer Allee und danach in einem 100 Millionen DDR-Mark teuren Neubau am Tierpark Friedrichsfelde amtierte, und das große Sperrgebiet in Hohenschönhausen, wo neben einem Gefängnis auch das streng geheime NS-Archiv der Stasi und technische Abteilungen saßen.

Neben der alltäglichen Unterdrückung stehen die schweren Gewalttaten des MfS; sie umfassen praktisch alle Paragrafen des DDR-Strafgesetzbuchs. So verschleppten Stasi-Kommandos im Laufe der Zeit mindestens 500, vielleicht aber auch bis zu tausend Menschen in die DDR – westliche Agenten, Überläufer aus den eigenen Reihen und SED-Kritiker vor allem. Einige von ihnen, zum Beispiel der vormalige Volkspolizei-Chef Robert Bialek, überlebten die Verschleppung nicht; andere, wie die „Verräter“ Paul Rebenstock und Sylvester Murau, wurden nach manipulierten Prozessen hingerichtet.

Ein juristisch verbrämter Mord war die Hinrichtung des MfS-Hauptmanns Werner Teske 1981. Er hatte mit dem Gedanken gespielt, in den Westen überzulaufen, allerdings nie einen konkreten Versuch dazu unternommen. Obwohl selbst das scharfe DDR-Strafrecht die Todesstrafe nur für vollendeten schweren Landesverrat vorsah, den Teske unzweifelhaft nicht begangen hatte, wurde er im Leipziger Gefängnis durch Genickschuss getötet.

Auch direkte Mordanschläge beging die Stasi. So lauerte 1976 ein Spezialkommando der Stasi, die „Einsatzkompanie der Hauptabteilung I“, auf westlicher Seite der innerdeutschen Grenze dem Fluchthelfer Michael Gartenschläger auf. Er wollte dort eine Splittermine vom Typ SM-70 abmontieren, die berüchtigte „Selbstschussanlage“. Vier Männer der Einsatzkompanie erwarteten ihn und eröffneten sofort das Feuer, als der langjährige politische Gefangene an den Grenzzaun heranschlich. MfS-Generalleutnant Karl Kleinjung, der Chef der Hauptabteilung I, hatte zuvor befohlen, „den oder die Täter festzunehmen bzw. zu vernichten“.

Auch der Schweizer Fluchthelfer Hans Lenzlinger wurde wohl im Auftrag des MfS 1979 in seiner Züricher Wohnung erschossen. Vielleicht war Bruno Beater, der ranghöchste Stellvertreter Mielkes und Experte für „nasse Jobs“, in den Anschlag verwickelt; aufgeklärt wurde dieser Mord aber nie.

Nicht das befohlene Ziel erreichten dagegen Mordanschläge gegen andere Fluchthelfer. Kay Mierendorff, der Hunderten DDR-Bürgern gegen fünfstellige Summen in die Freiheit verhalf, bekam im Februar 1982 eine Briefbombe zugeschickt, die ihn schwer verletzte und bleibende Schäden hervorrief.

Einen anderen „Hauptfeind“ der SED, den Fluchthelfer Wolfgang Welsch, vergiftete ein in seinen Kreis eingeschleuster Stasi-Agent im Sommer 1981 mit dem extrem toxischen Schwermetall Thallium; den Tod von Welschs Ehefrau und ihrer Tochter nahm der Stasi-IM billigend in Kauf.

Geplant, aber wohl nicht ausgeführt worden sind Mordanschläge auf Rainer Hildebrandt, den Kopf der DDR-kritischen „Arbeitsgemeinschaft 13. August“, die von ihrem Haus am Checkpoint Charlie aus das Unrecht der Mauer unnachgiebig anprangerte, und auf den Friedrichshainer Pfarrer Rainer Eppelmann, der unter Erich Honecker zeitweise als „Staatsfeind Nummer eins“ der SED galt. Umstritten ist dagegen, ob der DDR-Fußballstar Lutz Eigendorf 1983 von der Stasi durch einen vorsätzlich herbeigeführten Autounfall ermordet wurde. Vieles spricht dafür; der letzte Beweis ist in den allerdings bisher nur zum Teil sachgerecht erschlossenen Akten der Birthler-Behörde nicht aufgetaucht.

Noch öfter als potenziell tödliche Methoden wandten die Stasi-Experten allerdings das Mittel der Erpressung an. In verschiedenen Hotels für westliche Touristen in der ganzen DDR waren über den Betten Kameras eingebaut; auf interessante Ausländer wurden gezielt Prostituierte der Stasi angesetzt, um sie später mit kompromittierenden Fotos erpressen zu können. Das Gleiche versuchte das MfS auch mit Heinrich Lummer, dem West-Berliner CDU-Politiker. Über Jahre hinweg pflegte er eine geheime Beziehung zu einer Ost-Berlinerin, die in Wirklichkeit wohl von Anfang an als Spitzel auf ihn angesetzt war. 1981/82 versuchte das MfS, Lummer zu erpressen, was aber misslang.

Rund 40 Jahre lang garantierte die Stasi als „Schild und Schwert der Partei“ die Existenz der SED-Diktatur. Doch manches misslang Mielkes Mannen auch. So erwies sich beispielsweise die Suche nach den Autoren eines anonymen, kritischen Aufrufs als erfolglos, der 1969 an der Humboldt-Universität auftauchte. Trotz enormen Aufwandes und Kosten von rund einer Million DDR-Mark konnte das MfS die Verantwortlichen, die Studenten Rainer Schottländer und Michael Müller, nie überführen. So wurde ihr Protest zum „teuersten Flugblatt der Welt“.“

Insider Rainer W.:“Genau diese Methodenw erden heute von „GoMoPa“ und deren Hintermännern weider angewandt – natürlich verfeinert und mit Internet-Cyberstalking-Taktiken garniert.

Hinzu kommt der systematische Rufmord via Google und mit falschen Gerüchten, Erpresseranrufen, Morddrohungen, Cyberattacken, Kontoplünderungen und die Zerstörung von Geschäftsbeziehung durch

Systematisch gestreutes Misstrauen. Nehmen Sie all dies zusammen, dann haben Sie die STASI von heute: den „NACHRICHTENDIENST“ „GoMoPa“.“

Remember – German Criminal Police Starts Allegedly Investigation Of „GoMoPa“ And Their Backers

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

On our request the German criminal police (Kriminalpolizei) has opened new cases against the notorious “GoMoPa” organisation which already fled in the underground. Insiders  say they  have killed German journalist and watchdog Heinz Gerlach and their criminal record is bigger than the Encyclopedia – Britannica.

Continue reading “Remember – German Criminal Police Starts Allegedly Investigation Of „GoMoPa“ And Their Backers”

RA Resch / SGK Schutzgemeinschaft Für Geschädigte Kapitalanleger e.V. / Mandantenfang? Teil 1

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

A German Source says:  Inform yourself about Berlin Lawyer Jochen Resch and whether the so-called “institutions to protect the investors” are a scam….

And which rolle plays the so-called “NACHRICHTENDIENST” “GoMoPa” ?

Überprüfen Sie selbst die allgemein zugänglichen Informationen die hier zusammengestellt sind und machen sich selbst ein Bild über
1. Die Rechtsanwaltskanzlei Resch und Kollegen aus Berlin und ihren Gründer Rechtsanwalt Jochen Resch
2. Dem Deutschen Institut für Anlegerschutz e.V., kurz DIAS e.V. und ihren Vorständen sowie ihrem Gründer Rechtsanwalt Jochen Resch, der den Verein in den Kanzleiräumen der Rechtsanwaltskanzlei Resch und Kollegen gründete
3. Die Schutzgemeinschaft für geschädige Kapitalanleger e.V. und ihrem ehemaligen Vorstand Rechtsanwalt Jochen Resch sowie dem nachfolgenden Vorstand mit Stasivergangenheit.

Die Rechtsanwaltskanzlei Resch und ihr Gründer Rechtsanwalt Jochen Resch sind in den uns vorliegenden Dokumenten oben stehender Vereine oder “Verbraucherschutzinstitutionen” als Gründer, Initiator und Geldgeber, genannt.

Vor diesem Hintergrund haben sich bereits namhafte Journalisten die Frage gestellt:
“Dienen diese Institutionen, die in der Aussenwahrnehmung als unabhängig und verbrauchernah gelten, als triviales Mandantenfang-Instrumentarium?

Und welche Rolle spielt dabei der selbsternannte “NACHRICHTENDIENST” “GoMoPa” ?

RA Resch / SGK Schutzgemeinschaft Für Geschädigte Kapitalanleger / Mandantenfang? Teil 2

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

A German Source says:  Inform yourself about Berlin Lawyer Jochen Resch and whether the so-called “institutions to protect the investors” are a scam….

And which rolle plays the so-called “NACHRICHTENDIENST” “GoMoPa” ?

Überprüfen Sie selbst die allgemein zugänglichen Informationen die hier zusammengestellt sind und machen sich selbst ein Bild über
1. Die Rechtsanwaltskanzlei Resch und Kollegen aus Berlin und ihren Gründer Rechtsanwalt Jochen Resch
2. Dem Deutschen Institut für Anlegerschutz e.V., kurz DIAS e.V. und ihren Vorständen sowie ihrem Gründer Rechtsanwalt Jochen Resch, der den Verein in den Kanzleiräumen der Rechtsanwaltskanzlei Resch und Kollegen gründete
3. Die Schutzgemeinschaft für geschädige Kapitalanleger e.V. und ihrem ehemaligen Vorstand Rechtsanwalt Jochen Resch sowie dem nachfolgenden Vorstand mit Stasivergangenheit.

Die Rechtsanwaltskanzlei Resch und ihr Gründer Rechtsanwalt Jochen Resch sind in den uns vorliegenden Dokumenten oben stehender Vereine oder “Verbraucherschutzinstitutionen” als Gründer, Initiator und Geldgeber, genannt.

Vor diesem Hintergrund haben sich bereits namhafte Journalisten die Frage gestellt:
“Dienen diese Institutionen, die in der Aussenwahrnehmung als unabhängig und verbrauchernah gelten, als triviales Mandantenfang-Instrumentarium?

Und welche Rolle spielt dabei der selbsternannte “NACHRICHTENDIENST” “GoMoPa” ?

Remember – New Criminal Police Action Against “GoMoPa” & Also Against Google

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Dear readers,

on our request the German criminal police (Kriminalpolizei) has opened new cases against the notorious “GoMoPa” organisation which already fled in the underground. Insiders  say they  have killed German journalist and watchdog Heinz Gerlach and their criminal record is bigger than the

EncyclopediaBritannica

The case is also directed against Google, Germany, whilst supporting criminal action of  “GoMoPa” for years and therefore give them the chance to blackmail successfull businessman. This case is therefore an example and will be followed by many others as far as we can project. Furthermore we will bring the case to the attention of the German lawyers community which will not tolerate such misconduct by Googles German legal representative Dr. Arndt Haller and we will bring the case to the attention of Google Inc in Mountain View, USA, and the American ministry of Justice to stop the Cyberstalkers once and for all.

Besides that many legal institutions,  individuals and firms have already contacted us to help to clarify the death of Mr. Heinz Gerlach and to prosecute his murderers and their backers.

The case number is

ST/0148943/2011

My warmest regards

Bernd Pulch

Video – How Former Stasi Agents Continue To Harass Their Victims

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

It has been already three decades since Communist East Germany collapsed, together with its system of spies and informants. Now, many of the former secret police agents want the files closed.

They sue individuals, newspapers, exhibition curators, and even the government office in charge of the files whenever the names behind aliases are revealed. They say its time to draw a line under the past.

They contend their privacy is being violated. And German courts sometimes even rule in their favor. We show examples of this campaign of intimidation and talk with experts on media rights and with staff from the agency that processes the Stasi files.

Remember Russian Television Journalist Killed Ilyas Shurpayev – March 21th 2008

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

A Russian television journalist who had reported from the turbulent North Caucasus region was found strangled in his Moscow apartment on Friday, prosecutors said.

Police said the body of Ilyas Shurpayev, 32, was found by firefighters when they arrived to put out a fire in his apartment. They said it appeared Shurpayev was strangled with a belt and his attackers set his apartment on fire before leaving.

Shurpayev had moved to Moscow from Dagestan, a crime-ridden southern province neighboring Chechnya where he worked for several years as a reporter with state-controlled Channel One television.

Shurpayev reported from many conflict zones in the former Soviet Union including Chechnya and Georgia’s breakaway regions of Abkhazia and South Ossetia.

A spokesman for the investigations committee of the Prosecutor-General’s office said several theories for Shurpayev’s murder were being checked, including those related to his personal life and his work.

“Apparently the journalist knew his murderer because he opened the door for him and let him in,” the spokesman said.

Russian media reported that a concierge in the apartment block where Shurpayev lived had seen the last person to visit him.

More than a dozen journalists have been slain in contract-style killings in Russia since 2000. Many journalists appear to have been targeted for beatings and killings because of their attempts to dig into allegations of corruption.

Shurpayev was not known as an investigative reporter.

Several hours before his death he posted an entry on his personal Internet blog, http://www.shurpaev.livejournal.com, saying he had been included in a black list of journalists barred from contributing to an unnamed Dagestani newspaper.

“Now I am a dissident! What nonsense!”, wrote Shurpayev, who said he had published only travel reports in the paper.

“I have not participated in the political life of my republic or even my district because I am too lazy and have no time,” he wrote.

Stasi – Victims State: “GoMoPa” And Stasi Criminal Mastermind Ehrenfried Stelzer Allegedly In Murder Conspiracy”

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

The victims# statement: “Only two articles let the German audience believe that the famous journalist and watchdog Heinz Gerlach died on natural courses by blood pollution. The first one, published only hours after the death of Mr Heinz Gerlach by the notorious “GoMoPa” and a second 3 days later by a small German local newspaper, Weserbergland Nachrichten.

Continue reading “Stasi – Victims State: “GoMoPa” And Stasi Criminal Mastermind Ehrenfried Stelzer Allegedly In Murder Conspiracy””

Chinese Cyber Attacks Getting To ‘Critical Stage’

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

The Australian government, along with allies, has accused China of a major cyber attack on Microsoft software. It is alleged Chinese state-sponsored hackers compromised 400,000 servers across the world, including in Australia.

The Australian’s Chris Griffith told Sky News these attacks are becoming more prevalent and critical around the world. “It’s hard to pinpoint exactly if the state (China) is explicitly involved in it, or it is encouraging it, or if it is tacitly approving it,” he said. “In the last year we have seen the ramping up of cyber activity to a level we haven’t seen before. “It’s getting to a critical stage.”

J’ Accuse – Against Convicted STASI Serial Criminals – Statement Of Magister Bernd Pulch

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Dear Readers ,

my name is Bernd Pulch, I have studied and acquired the title Master (Magister) according to the academic laws.

Link to my Master’s thesis
http://www.kepplinger.de/search/node/pulch
and
http://www.kepplinger.de/node/50

I am the heir of the family bible and can therefore represent our family based on this authority .

Our family has and had many members who work and worked successfully as entrepreneurs, secretaries of state, banker, lawyers, farmers, politicians and also journalists.

We will prevent that our family name is violated by convicted criminals, cyberkiller, real killer and STASI-members.

The cyberkiller were initially hired to fight for criminal fraudsters and to cover their fraud.

Over time they got so nervous that they launched hundreds of fake websites using my name and keywords related to this website to prevent the public to read http://www.berndpulch.org

They only can be active since 1989 by the support of the corrupt and murderous STASI/KGB network in Germany and beyond.

Especially the publication of the STASI and KGB lists caused and causes constant nervous breakdowns.

I will therefore prosecute these criminals with no mercy until the very end.

.
Magister Bernd Pulch

London

Presse-Statement: Gegen Vorbestrafte Serienbetrueger – Stellungnahme Von Magister Bernd Pulch

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Mein Name ist Bernd Pulch, ich bin von Rechts wegen Magister.
Link zu meiner Magister-Arbeit
http://www.kepplinger.de/search/node/pulch
und
http://www.kepplinger.de/node/50
Ich bin der Erbe unseres Familienbuches und damit das Oberhaupt unserer Familie Pulch. Unsere Familie hat seit Jahrhunderten in Deutschland, USA und vielen anderen Ländern, erfolgreiche Unternehmer, Staatssekretäre, Banker, Richter, Anwälte, Politiker und auch Journalisten hervorgebracht. Wir lassen unseren guten Namen nicht durch vorbestrafte Anlagebetrüger, Cybermörder und NS-Kriminelle verunglimpfen.
Die bezahlten Betrüger sollen die Kapitalanlage-Verbrecher schützen.
Darum geht es im Kern. Wie auch schon unter
http://sjb-fonds-opfer.com/?page_id=11764
klar ersichtlich.

Ich werde die kriminellen Verantwortlichen und ihre kriminellen Helfershelfer bis zur letzten Konsequenz zur Verantwortung ziehen.
Magister Bernd Pulch
London

Stasi Plan To Overtake Berlin – Blue Print For Germany – Stasi – Plan Zur Übernahme Von Berlin – Blaupause Für Deutschland – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Young Communist Party (SED) Bureaucrat Angela Merkel, allegedly Stasi-member “IM Erika”

FDJ-Kader Angela Merkel mutmasslich “IM Erika”

Continue reading “Stasi Plan To Overtake Berlin – Blue Print For Germany – Stasi – Plan Zur Übernahme Von Berlin – Blaupause Für Deutschland – Original Document”

Tagesschau-Artikel Zu GoMoPa Zensiert – Noch Hier & Im Internet-Archiv Lesbar – Original Dokument

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Der “Kinderfreund”, Zeitreisende, Gestaltwandler, Wundermann und “President” & “CEO” Von “GoMoPa” “Klaus-Dieter Maurischat” Aka “Siegfried Siewert” ETC PP…Live In Action

https://web.archive.org/web/20150410074455/https://www.tagesschau.de/wirtschaft/gomopa-101.html

Welche Seilschaften, da wohl wieder am Werk waren ? “IM Erika” ?

Video Of The Day | Betrayal In East And West

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Born in communist East Germany,Evelin Senarclens de Grancy fled to the West after facing increasing harassment from the secret police,the Stasi. But the author also faced repression in the West. Her second husband was a spy and as a double-agent he was passing information on to her former persecutors – the Stasi.

1961 – Walter Ulbricht – Berlin -“Niemand hat die Absicht- eine Mauer zu errichten” – Remastered

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Edit 1961 - Walter Ulbricht - Berlin Niemand hat die Absicht- eine Mauer zu errichten - Remastered

Check out this video: https://share.vidyard.com/watch/DDiadZf1frBvYVJRcivWCe?

Kristie Macrakis Series – Seduced By Secrets: Inside The Stasi’s Spy-Tech World – 4

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Seduced by Secrets: Inside the Stasi’s Spy-Tech World

Gorbachev was the most important Western agent employed by the oper- ational unit for the “protection of the economy,” known as Department XVIII, and provided the lion’s share of all scientific and technical mate- rial collected there. The reason for this bureaucratic anomaly was that the precursor department (Department III – renamed and reorganized in 1964) for protecting the economy had been responsible for company espionage in the West as well as economic security. Some of Department III’s agents were transferred to HV A, but Gorbachev was not.20 He was

Agent Gorbachev 17

recruited during a time of bureaucratic flux before foreign intelligence and domestic security/counterintelligence merged under the common roof of the Ministry for State Security.

Of course, most scientific and technical espionage was the responsibility of another division of the Stasi, the HV A’s Sector for Science and Tech- nology. This was the group from which Werner Stiller defected in 1979, and also the group to which all Gorbachev’s documents were referred for evaluation.

Gorbachev provided the Stasi with blueprints, plans, scientific docu- ments, and some prototypes from two leading West German firms. Between 1957 and 1959 he worked at Telefunken as head of the Depart- ment for Small Transmitters and passed on material related to radios and transmitters. After that, he headed up the Department of Automation at AEG until his retirement in 1977. He had the key to the company archive both times.

The MfS had a systematic method for collection and evaluation based on the state’s economic plan. Industrial representatives could give the MfS a wish list of plans or hardware needed, and it would attempt to acquire the material. The evaluation department played the important role of intermediary between industry and agent. Not only did it funnel the industry wish lists to its agents, keeping in mind the country’s economic needs and each agent’s capabilities, but it also analyzed each item collected by the agents, “neutralized” them (in MfS lingo) so that the source would not be known, and passed the information back to industry or to research institutes. Agents could also bring unsolicited material if they thought it would be of interest, but this material was separated from the requested material.

Gorbachev delivered an unusually copious amount of material. The height of his cooperation seems to have been from the late 1950s to the early 1970s. In 1960, the year before the Wall was built, a case officer reported that Gorbachev delivered 505 documents. This seems to have been his record; in most years, unless meetings ceased for operational reasons, he averaged about 200. In 1968 he contributed 202 of the 289 documents acquired by Department XVIII. As he approached retirement in 1977, Gorbachev’s deliveries dropped significantly. In the 1980s he was still working for the MfS, but instead of passing on secret documents, he was intercepting Western intelligence’s radio messages and finding out their broadcast frequencies.21

The material Gorbachev delivered received high marks. In the Stasi’s meticulously organized system, the evaluation department graded every piece of material on a scale of I to V, with I being the highest rating: “very

Continue reading “Kristie Macrakis Series – Seduced By Secrets: Inside The Stasi’s Spy-Tech World – 4”

Spiegel TV Video – Die Röntgen-Stasi

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Es war nur ein Verdacht. Sollte er jedoch Gewissheit werden, würde er alles in den Schatten stellen, was man bis zum Frühjahr 1999 über die Machenschaften der DDR-Staatssicherheit wusste. Verhaftete Bürgerrechtler sollen während ihres Gefängnisaufenthaltes in der DDR wiederholt und in voller Absicht mit Röntgenstrahlen verseucht worden sein. Im Mai 1999 starb der Schriftsteller und DDR-Kritiker Jürgen Fuchs an Krebs. Wie zuvor schon zwei andere Dissidenten.

East German KGB – Rise of Stasi – Documentary

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Our historical documentary series on the history of the Cold War continues with a video on the East German Ministry for State Security, more commonly known as Stasi. This East German version of the KGB was a staple of the Cold War period and was known for its brutal methods.

Presidential Documents – Executive Order 14017 – America’s Supply Chains – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Ransomware Attack Hits Data Center Provider CyrusOne: Report | Threatpost

Colonial Pipeline, supplier of 45% of East Coast fuel, was paralyzed in February by DarkSide ransomware attack.

In response to the Colonial Pipeline event attributed to the ransomware group DarkSide, the Biden Administration has announced an all-of-government effort to mitigate potential energy supply disruptions. On top of temporary actions to relieve fuel shortages, agencies such as the FBI and CISA have released advisory documents to “help [critical infrastructure] owners and operators improve their entity’s functional resilience by reducing their vulnerability to ransomware.”

In addition, President Biden signed an Executive Order designed broadly to “improve the nation’s cybersecurity,” although experts are already questioning whether the anticipated measures could have prevented any of the recent serious cyber events such as SolarWinds or Colonial Pipeline.

Continue reading “Presidential Documents – Executive Order 14017 – America’s Supply Chains – Original Document”

CISA & FBI – DarkSide Ransomware – Best Practices For Preventing Business Disruption From Ransomware Attacks – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Lazarus Group Brings APT Tactics to Ransomware | Threatpost
Continue reading “CISA & FBI – DarkSide Ransomware – Best Practices For Preventing Business Disruption From Ransomware Attacks – Original Document”

Serie – Die Geheimnisse Der Angela Merkel Enthüllt – The Mysteries of Angela Merkel Exposed – 7 – Merkel & “IM Czerny” Alias Lothar De Maiziere

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

„Angela Merkels politische Karriere schien auf den ersten Blick schon beendet zu sein, bevor sie noch richtig begonnen hatte. Denn die 0,92 Prozent, mit denen der Demokratische Aufbruch aus der Volkskammerwahl vom 18. März 1990 hervorging, hätten kaum Ansprüche auf Posten in der künftigen Regierung zugelassen. Doch auf den zweiten Blick stellten sich die Dinge anders dar: Noch in der Wahlnacht suchte die Pressesprecherin des Demokratischen Aufbruchs die Nähe zum Sieger, genauer gesagt zum Überraschungssieger, denn niemand hatte erwartet, dass Lothar de Maizière 40,8 Prozent der Stimmen bekommen würde.[1] Vorausgesagt worden war ein Triumph der Sozialdemokraten unter Ibrahim Böhme, der bald von seiner Stasivergangenheit eingeholt werden sollte. Sogar von einer absoluten Mehrheit sprachen die Demoskopen. Doch nun erhielten die Sozialdemokraten gerade einmal 21,9 Prozent. Die Menschen hatten de Maizière gewählt und den Bundeskanzler gemeint, der wie kein anderer für Deutschlands schnelle Vereinigung stand.
Angela Merkel harrte nicht bei den Verlierern vom Demokratischen Aufbruch aus. Eigentlich hatten sie in der Gaststätte »Zur Mühle« auf dem Prenzlauer Berg ein ganz anderes Ergebnis feiern wollen, ehe die Schnur-Affäre alles zunichtegemacht hatte. Sie fuhr stattdessen mit dem Journalisten und Politikberater Claus Detjen zum Palast der Republik, dem Sitz der Volkskammer, wo[…]“

Auszug aus: Reuth, Ralf Georg. „Das erste Leben der Angela M. (German Edition).“

Continue reading “Serie – Die Geheimnisse Der Angela Merkel Enthüllt – The Mysteries of Angela Merkel Exposed – 7 – Merkel & “IM Czerny” Alias Lothar De Maiziere”

IM “Anna Holik” Und IM “Hermann Reimer ” Nehmen Jägerheim Dortmund Ins Visier – Original Dokument

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Continue reading “IM “Anna Holik” Und IM “Hermann Reimer ” Nehmen Jägerheim Dortmund Ins Visier – Original Dokument”

NSA General Counsel Gerstell – “How We Need To Prepare For A Global Cyber Pandemic” – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back

Glenn S. Gerstell SPEECH | April 9, 2018

By some accounts, Russian meddling in the US election system may have originated from the depths of a hot dog cart. It’s a success story, of sorts.

In the early 1990s, an enterprising hot dog vendor in Russia seized upon the entrepreneurial opportunities created by the collapse of the Soviet Union to start his own catering company. He eventually grew his business enough to win lucrative catering contracts with the Russian government. He and his restaurants threw opulent banquets for Kremlin officials, earning him the nickname “Putin’s Cook.” Yevgeny Prigozhin’s company even won a contract in 2011 to deliver school lunches across Moscow, but children wouldn’t eat the food, complaining that it smelled rotten. Bad publicity ensued. Prigozhin’s company responded not by upgrading the food, but by hiring people to flood the internet with postings praising the food and rejecting complaints. Presumably, they found it cheaper to use the internet to write fake reviews than to fund deluxe hot dogs for schoolchildren.

Continue reading “NSA General Counsel Gerstell – “How We Need To Prepare For A Global Cyber Pandemic” – Original Document”

Stasi OPK “Vogel” – Die Werbung des Konzernlenkersohnes Durch “IM Sebastian”, – Original Dokument

Become a Patron!
True Information is the most valuable resource and we ask you to give back

Continue reading “Stasi OPK “Vogel” – Die Werbung des Konzernlenkersohnes Durch “IM Sebastian”, – Original Dokument”

Stasi Akte OPK “Illusion” – IM “Uwe Wenzel” “IM Paul Stenke” – Original Dokument – Deutsch

Become a Patron!
True Information is the most valuable resource and we ask you to give back

The declassified fashions of East German spies - The Verge
Continue reading “Stasi Akte OPK “Illusion” – IM “Uwe Wenzel” “IM Paul Stenke” – Original Dokument – Deutsch”

Kristie Macrakis Series – Seduced By Secrets: Inside The Stasi’s Spy-Tech World – Von Geheimnissen Verführt: In Der Spy-Tech-Welt Der Stasi – 3

Become a Patron!
True Information is the most valuable resource and we ask you to give back

Ingenious gadgets, real-world quandaries at Washington's all-new Spy Museum

Seduced by Secrets: Inside the Stasi’s Spy-Tech World

For his first two years as a spy, Rehder did not know he was selling secrets to the MfS, believing he was selling them to representatives of the Ministry for Machine Building. Stasi agents had been using a cover story. Cover stories or “false-flag” operations – when intelligence officers tell a potential agent that they come from another country – were often em- ployed when there was a sense that the potential recruit was hostile toward communist countries. It was not until January 1959 that Rehder’s case officers, including Major Pape, apparently revealed to Rehder who they were. The files contain no description of Rehder’s reaction to this news; he simply continued, apparently with great eagerness, to pass on company secrets for money. Perhaps the best clue that the Stasi had him in their pocket had come a few weeks earlier, when Gorbatschow that he had made an imprint of the key to the company archive. “With this key,” he told the officers, “I am in the position to access all company secrets.”

In seinen ersten zwei Jahren als Spion wusste Rehder nicht, dass er dem MfS Geheimnisse verkaufte, weil er glaubte, sie an Vertreter des Ministeriums für Maschinenbau zu verkaufen. Stasi-Agenten hatten eine Titelgeschichte verwendet. Coverstorys oder „False-Flag“-Operationen – wenn Geheimdienstoffiziere einem potenziellen Agenten mitteilen, dass er aus einem anderen Land kommt – wurden oft eingesetzt, wenn man den Eindruck hatte, dass der potenzielle Rekrut kommunistischen Ländern feindselig gegenüberstand. Erst im Januar 1959 verrieten Rehders Sachbearbeiter, darunter Major Pape, Rehder offenbar, wer sie waren. Die Akten enthalten keine Beschreibung von Rehders Reaktion auf diese Nachricht; er fuhr einfach fort, offenbar mit großem Eifer, Firmengeheimnisse gegen Geld weiterzugeben. Der vielleicht beste Hinweis darauf, dass die Stasi ihn in der Tasche hatte, war ein paar Wochen zuvor gekommen, als Gorbatschow damit prahlte, den Schlüssel zum Firmenarchiv abgedruckt zu haben. „Mit diesem Schlüssel“, sagte er den Beamten, „bin ich in der Lage, auf alle Betriebsgeheimnisse zuzugreifen.“

Continue reading “Kristie Macrakis Series – Seduced By Secrets: Inside The Stasi’s Spy-Tech World – Von Geheimnissen Verführt: In Der Spy-Tech-Welt Der Stasi – 3”

Stasi File OPK File “Illusion” – IM “Uwe Wenzel” – “IM Paul Stenke” Original Document – English Translation

Become a Patron!
True Information is the most valuable resource and we ask you to give back

Can You Tell I'm a Stasi Spy? The Crazy Disguises of a Feared Security  State (Photos)
Continue reading “Stasi File OPK File “Illusion” – IM “Uwe Wenzel” – “IM Paul Stenke” Original Document – English Translation”

European Union Exposes Plans For EU Digital Wallet To Come After Implementation Of Green Passport

Become a Patron!
True Information is the most valuable resource and we ask you to give back

Do you think AI,that Harold created,would help in real world or it would  destroy it ? | Fandom

The European Union (EU) is set to uncover plans for an alliance wide advanced wallet, following solicitations from part states to track down a protected path for residents to get to public and private administrations on the web.

The application will allegedly permit residents across the EU to safely get to a scope of private and public administrations with a solitary online ID.

Continue reading “European Union Exposes Plans For EU Digital Wallet To Come After Implementation Of Green Passport”

Stasi Observation Report Of “Zange” By General Gaebel & Lieutenant Colonel Fritsch In Frankfurt/Oder

Become a Patron!
True Information is the most valuable resource and we ask you to give back

Stasiland now: Thirty years after the fall of the Berlin Wall, the author  of 'Stasiland' reveals the ongoing power of the former East German regime,  not just in politics and business but
Continue reading “Stasi Observation Report Of “Zange” By General Gaebel & Lieutenant Colonel Fritsch In Frankfurt/Oder”

Kristie Macrakis Series – Seduced By Secrets: Inside The Stasi’s Spy-Tech World – Von Geheimnissen Verführt: In Der Spy-Tech-Welt Der Stasi – 2

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Seduced by Secrets: Inside the Stasi’s Spy-Tech World

This book tells the story of how a spy and security agency was seduced by the power of technological secrets to solve intelligence and national problems, and, conversely, how it overestimated the power of stolen tech- nology from the West to boost its own technological capacities. By doing so it challenges the myth of an effective spy agency. By the time of the fall of the Berlin Wall, the system had become so bankrupt that the spy-tech props of the cloak-and-dagger world had increasingly been brought or bought from the West. Other writers have covered the Stasi’s repressive arm – its structures and function as the handmaiden of the state – and other topics such as the churches, the media, and politics.2 Seduced by Secrets concentrates on the spy game, on its methods and sources and on its technology.

Dieses Buch erzählt die Geschichte, wie eine Spionage- und Sicherheitsagentur von der Macht der technologischen Geheimnisse verführt wurde, um Geheimdienste und nationale Probleme zu lösen, und umgekehrt, wie sie die Macht der gestohlenen Technologie aus dem Westen überschätzte, um ihre eigenen technologischen Kapazitäten zu stärken . Auf diese Weise wird der Mythos einer effektiven Spionageagentur in Frage gestellt. Zum Zeitpunkt des Mauerfalls war das System so bankrott geworden, dass die Spionagetechniken der Welt der Umhänge und Dolche zunehmend aus dem Westen gebracht oder gekauft wurden. Andere Autoren haben über den repressiven Arm der Stasi – ihre Strukturen und ihre Funktion als Magd des Staates – und andere Themen wie Kirchen, Medien und Politik berichtet.2 Verführt von Secrets konzentriert sich auf das Spionagespiel, seine Methoden und Quellen und auf seine Technologie.

Continue reading “Kristie Macrakis Series – Seduced By Secrets: Inside The Stasi’s Spy-Tech World – Von Geheimnissen Verführt: In Der Spy-Tech-Welt Der Stasi – 2”

Nach “Recherche” Über Journalisten – Datenschutzverfahren Gegen die Stasi-Behörde

Become a Patron!

True Information is the most valuable resource and we ask you to give back.

In der Aktenaffäre mit Tausenden von illegal veröffentlichten Seiten mit Stasi-Informationen über Journalisten und Gewerkschafter hat der Bundesbeauftragte für Datenschutz ein Verfahren gegen den Bundesbeauftragten für die Stasi-Akten eröffnet. Der Datenschutzbeauftragte bestätigte dies auf Anfrage von BuzzFeed News und Übermedien.

Continue reading “Nach “Recherche” Über Journalisten – Datenschutzverfahren Gegen die Stasi-Behörde”

After “Research” Of Journalists – Data Protection Proceedings Against The Stasi Records Authority

Become a Patron!

True Information is the most valuable resource and we ask you to give back.

Become a Patron!

True Information is the most valuable resource and we ask you to give back.

In the file affair involving thousands of illegally published pages containing Stasi information about journalists and trade unionists, the Federal Commissioner for Data Protection has opened proceedings against the Federal Commissioner for the Stasi files. The data protection officer confirmed this at the request of BuzzFeed News and Übermedien.

Continue reading “After “Research” Of Journalists – Data Protection Proceedings Against The Stasi Records Authority”

Juricon – Stasi-GoMoPa – Analyse Samt Auszug der Strafverfahren – Original Dokument

“Klaus-Dieter Maurischat”, Kinderfreund, Zeitreisender und Wundermann

Become a Patron!

This image has an empty alt attribute; its file name is s8HCwk3.jpg
This image has an empty alt attribute; its file name is NYEpz1T.jpg
This image has an empty alt attribute; its file name is 4zfzxMt.jpg

DDR-Geheimpolizei – So Arbeitet Die STASI – Brandaktuell – Sie Sind Immer Im Geschäft

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Die SED schuf mit dem Ministerium für Staatssicherheit einen Überwachungsapparat in der DDR. Die “Stasi” hatte den Auftrag, über alles Bescheid zu wissen. Wer einmal unter Verdacht geriet, wurde genauestens kontrolliert – jenseits von Rechtsstaatlichkeit und Menschenrechten. Um verdächtige Bürger zu observieren, setzte die Stasi Wanzen und Kameras ein, kontrollierte Post und Telefon und durchsuchte Wohnungen. Der Staatssicherheitsdienst hatte aber auch die Befugnis, Menschen zu verhaften und zu verhören. Neben den hauptamtlichen Stasi-Mitarbeitern gab es auch inoffizielle Mitarbeiter, die verdeckt arbeiteten. Ob es auch Spitzel im eigenen Umfeld gab? Auf diese Frage kann heute der Einblick in die Stasi-Akten BEDINGT eine Antwort geben…

Auf dieser Seite indes haben Sie die Namen von 99% aller Stasi-Agenten.

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

GoMoPa4Kids – Reminiszenz In der “Welt” – “Kinderpornographie: Stasi erpresste Politiker”

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Kinder-Sexualaufklärung” unter falscher Flagge – “GoMoPa 4 Kids” – Over and  Out ! – BERNDPULCH.ORG – BERND-PULCH.ORG – TOXDAT, STASI List, STASI  SLEEPER List, KGB List, BDVP List, STASI Names A-Z, DDR-EAST

https://www.welt.de/print-welt/article378210/Kinderpornographie-Stasi-erpresste-Politiker.html

Kinderpornographie: Stasi erpresste Politiker

Veröffentlicht am 10.02.2003 | Lesedauer: 2 Minuten

Von Dirk Banse, Michael Behrendt

Ex-Geheimdienst-Offizier stellt Verbindung zum Fall des vermissten Berliner Jungen Manuel her.

Continue reading “GoMoPa4Kids – Reminiszenz In der “Welt” – “Kinderpornographie: Stasi erpresste Politiker””

Check Out The Original Stasi Lists On This Site Only

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Everything Dr. Mabuse Or Else ?

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

GoMoPa – Stasi – KGB – Toxdat – Ehrenfried Stelzer – Resch – Alles Dr. Mabuse Oder Was ?

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

GoMoPa – Financal “Intelligence Service” oder was ? Resch in Moskau 1989 oder was ? Stelzer Autor von “Toxdat” oder was ?

Continue reading “GoMoPa – Stasi – KGB – Toxdat – Ehrenfried Stelzer – Resch – Alles Dr. Mabuse Oder Was ?”

Beware Of The Fake Stasi Lists Of The Neo-Stasi – Visit Berndpulch.org

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

MUTMASSLICHER GOMOPA-DRAHTZIEHER DR JOCHEN RESCH AUF DER WARNLISTE VON STIFTUNG WARENTEST

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

https://www.test.de/Anlegeranwalt-Etwas-zu-vielseitig-5662824-0/

ALLES DR MABUSE ODER WAS ?

Everything Dr. Mabuse Or What? RA Resch Is Partner Of The Ibiza Video Maker Dr. Ramin Mirfakhrai – Arrest in Berlin

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Coup Teil 86: Wie man Parteien unterwandert | Ceiberweiber

But hello – two men of honor in Berlin

Senior partner Dr. Jochen Resch left & right Dr. Ramin Mirfakhrai, junior partner

Source: Dr. Resch
What the gentlemen are currently discussing should be of interest to many …

The Ibiza video was shot in the style of STASI.

Continue reading “Everything Dr. Mabuse Or What? RA Resch Is Partner Of The Ibiza Video Maker Dr. Ramin Mirfakhrai – Arrest in Berlin”

Alles Dr. Mabuse Oder Was ? RA Resch Ist Partner Des Ibiza Video – Machers Dr. Ramin Mirfakhrai – Festnahme In Berlin

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Coup Teil 86: Wie man Parteien unterwandert | Ceiberweiber

Aber hallo – zwei Ehrenmänner in Berlin

Senior-Partner Dr. Jochen Resch links & rechts Dr. Ramin Mirfakhrai, Junior-Partner 

  • Quelle: Facebook Account von Dr. Resch

Was die Herrschaften gerade zu besprechen haben, dürfte viele interessieren…

Das Ibiza Video wurde ganz im Stil der STASI gedreht.

Continue reading “Alles Dr. Mabuse Oder Was ? RA Resch Ist Partner Des Ibiza Video – Machers Dr. Ramin Mirfakhrai – Festnahme In Berlin”

Gomopa-Stasi-Opfer: “Darum Ist Jochen Resch Der Erfundene “GoMoPa”-Goldman & Manfred Resch Der Erfundene “Morgenstern”

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Hallo Herr Pulch,

KGB-Spion Jochen Resch war 1989 monatelang in Moskau, einerseits aus Angst andererseits, um seine neue Rolle vorzubereiten. Dann hat er mit Stasi-Oberst Ehrenfried Stelzer die deutsch-russische Gesellschaft gegründet und parallel dazu Gomopa den Financial Intelligence Service, Intelligence steht für Geheimdienst wie Insider genauestens bestätigen können. Anschließend wurde Stelzer Reschs Strohmann bei der DIA und Maurischat Reschs Strohmann bei Gomopa.

Der Luca-Brasi-Brutalo der Gomopa hat keinerlei Bildung, ist wie “eine Flasche leer”, kann kein Englisch und keine Orthographie und ist leicht lenkbar für seinen Führungsoffizier Resch.

Continue reading “Gomopa-Stasi-Opfer: “Darum Ist Jochen Resch Der Erfundene “GoMoPa”-Goldman & Manfred Resch Der Erfundene “Morgenstern””

Der Unheimliche Einfluss Von Ex-Stasi-Leuten

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Das Ministerium für Staatssicherheit, kurz: Stasi, war in der DDR die zentrale Institution zur Überwachung der Bevölkerung. Die Mitarbeiter der Stasi wurden gefürchtet – vor allem deshalb, weil sie meistens im Geheimen operierten. Heute ist das alles Geschichte. Wirklich? Wir zeigen, welchen Einfluss ehemalige Stasi-Leute teilweise immer noch haben … Die Gedenkstätte Berlin Hohenschönhausen – https://www.stiftung-hsh.de Das Stasimuseum in Berlin – https://www.stasimuseum.de Vereine, in denen frühere Stasimitarbeiter tätig sind: https://www.okv-ev.de https://www.isor-sozialverein.de/cms/… https://www.mfs-insider.de

“Zersetzung” In Der DDR – Die Zerstörerischen Methoden Der Stasi

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Systematisch hat die Staatssicherheit Menschen in der DDR ausspioniert und versucht, ihr Leben zu zerstören. In Lichtenberg wird die Ausstellung “Zersetzung – Repressionsmethode des Staatssicherheitsdienstes” dazu gezeigt. Nach diesem Modell arbeiten die Alt- und Neo-Stasi-Genossen der “GoMoPa” noch heute.

Das Betrugsurteil Gegen Klaus Maurischat/”GoMoPa” WG Betruges Am Eigenen Anleger: AZ 28 Ls 85/05

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

DAS BETRUGSURTEIL GEGEN “BENNEWIRTZ” UND “PETER EHLERS” “GoMoPa”-PARTNER  “MAURISCHAT” UND “VORNKAHL” WG BETRUGES AM EIGENEN ANLEGER | I-NVESTMENT  -THE INVESTMENT - THE ORIGINAL
“Kinderfreund Klaus-Dieter Maurischat” bei einer typischen Geste

Am 24. April 2006 war die Verhandlung am Amtsgericht Krefeld in der Betrugssache: Mark Vornkahl / Klaus Maurischat ./. Dehnfeld. Aktenzeichen: 28 Ls 85/05 Klaus MaurischatLange Straße 3827313 Dörverden.

Continue reading “Das Betrugsurteil Gegen Klaus Maurischat/”GoMoPa” WG Betruges Am Eigenen Anleger: AZ 28 Ls 85/05”

BETREFF: TAGESSCHAU Bestätigt Unsere Haltung Zu “STASI – GoMoPa” & IM Genossen

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

GoMoPa-Luca Brasi alias “Klaus-Dieter Maurischat”, “Kinderfreund”, & STASI-Handlanger des mutmasslichen wahren “GoMoPa”-Chefs, des mutmasslichen STASI-Oberst Jochen Resch, Berlin

“GoMoPa”-“CEO” und “President”, der wegen Betruges am eigenen Anleger verurteilte “Klaus-Dieter Maurischat”, der mutmaßliche Strohmann für seine Genossen, ein Mann mit einer äußerst dubiosen Biographie (siehe Artikel auf dieser Webseite).

Continue reading “BETREFF: TAGESSCHAU Bestätigt Unsere Haltung Zu “STASI – GoMoPa” & IM Genossen”

Film: Das Leben Der Anderen – 2006 – Der “Stasi” Einen Honecker-Witz Erzählen

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

David Omand – How Spies Think – 10 Lessons In Intelligence – Part 5

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Lesson 3: Estimations Predictions need an explanatory model as well as sufficient data

In mid-August 1968, I was driving an elderly Land Rover with friends from university along the Hungarian side of the border with Czechoslovakia on the first stage of an expedition to eastern Turkey. To our surprise we found ourselves having to dodge in and out of the tank transporters of a Soviet armoured column crawling along the border. We did not realize – and nor did the Joint Intelligence Committee in London – that those tank crews already had orders to cross the border and invade Czechoslovakia as part of a twin strategy of intimidation and deception being employed by Yuri Andropov, then KGB chairman, to undermine the reform-minded government in Prague led by Alexander Dubček.1

Continue reading “David Omand – How Spies Think – 10 Lessons In Intelligence – Part 5”

List Of Crimes For Which Medvedev And Putin Cannot Be Tried

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

A bill on guarantees of the immunity of the former president was submitted to the State Duma. It will bring the federal law into line with the latest version of the Russian Constitution (adopted by a vote in the summer of 2020). The document not only complicates the procedure for depriving the former president of immunity, but also actually allows the former head of state to commit some crimes after his resignation.

Continue reading “List Of Crimes For Which Medvedev And Putin Cannot Be Tried”

Uwe Steimle Als Erich Honecker

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

David Omand – How Spies Think – 10 Lessons In Intelligence – Part 3

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

STASI-AGENTS IN DISGUISE

Part One

AN ANALYST SEES: FOUR LESSONS IN ORDERING OUR THOUGHTS

1

Lesson 1: Situational awareness Our knowledge of the world is always fragmentary and incomplete, and is sometimes wrong

Continue reading “David Omand – How Spies Think – 10 Lessons In Intelligence – Part 3”

Die Miesen Tricks Der Stasi-Agenten – Die Romeo-Falle

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Während des kalten Krieges versuchte das Ministerium für Staatssicherheit über viele Wege an geheime Informationen und Dokumente zu gelangen. Ein Mittel waren sogenannte “Romeo-Agenten”. Diese Männer wurden von der Stasi, teilweise bereits während des Studiums, angeworben und hatten es auf die Büroleiterinnen von Ministerien und Botschaften in Westdeutschland abgesehen. Sie verführten die jungen Frauen und nutzten deren Vertrauen gnadenlos aus. Mit welchen Tricks die Stasi noch gearbeitet hat, erfahrt Ihr in der Doku “Die Krake – Die Geschichte der Stasi”: https://www.zdf.de/dokumentation/zdf-…

Special Correspondent Andrey Pertsev Answers All Of Your Questions About Russia’s Presidential Executive Office

Become a Patron!
True Information is the most valuable resource and we ask you to give back.





In Russia, everybody is utilized to the reality the administration’s situation on intense political, social, and even social issues doesn’t originate from the offices that should be liable for these undertakings. The Kremlin consistently has the final word. Intermittently this doesn’t mean President Vladimir Putin himself, yet rather agents from his Presidential Executive Office. To get a more full comprehension of what Putin’s organization does, we asked “Meduza” political journalist Andrey Pertsev to separate the what precisely the Presidential Executive Office is, the extent of its formal (and casual) obligations, and the constraints of its impact over what occurs in Russia.

Russian political columnists regularly allude to the “Kremlin” as shorthand for the Presidential Executive Office of Russia (additionally alluded to as the Presidential Administration of Russia, which in Russian is abbreviated to the abbreviation “AP”). The Moscow Kremlin turned into the official home of the nation’s top authority very quickly after the October Revolution in 1917. What’s more, the Russian Federation proceeded with this convention after the Soviet Union fell; the Kremlin Senate houses Russian President Vladimir Putin’s office.

Continue reading “Special Correspondent Andrey Pertsev Answers All Of Your Questions About Russia’s Presidential Executive Office”

David Omand – How Spies Think – 10 Lessons in Intelligence

Become a Patron!
True Information is the most valuable resource and we ask you to give back

Sir David Omand, Former Director of the Government Communications Headquarters (GCHQ)



Contents

Introduction. Why we need these lessons in seeking independence of mind, honesty and integrity

PART ONE: AN ANALYST SEES: FOUR LESSONS IN ORDERING OUR THOUGHTS

Lesson 1: Situational awareness. Our knowledge of the world is always fragmentary and incomplete, and is sometimes wrong Lesson 2: Explanation. Facts need explaining

Lesson 3: Estimations. Predictions need an explanatory model as well as sufficient data

Lesson 4: Strategic notice. We do not have to be so surprised by surprise

PART TWO: THREE LESSONS IN CHECKING OUR REASONING

Lesson 5: It is our own demons that are most likely to mislead us

Lesson 6: We are all susceptible to obsessive states of mind Lesson 7: Seeing is not always believing: beware manipulation, deception and faking

PART THREE: THREE LESSONS IN MAKING INTELLIGENT USE OF INTELLIGENCE

Lesson 8: Imagine yourself in the shoes of the person on the other side

Lesson 9: Trustworthiness creates lasting partnerships

Lesson 10: Subversion and sedition are now digital

PART FOUR

A final lesson in optimism

Acknowledgements

Notes and further reading

Index

About the Author

David Omand was the first UK Security and Intelligence Coordinator, responsible to the Prime Minister for the professional health of the intelligence community, national counter-terrorism strategy and ‘homeland security’. He served for seven years on the Joint Intelligence Committee. He was Permanent Secretary of the Home Office from 1997 to 2000, and before that Director of GCHQ.

For Keir, Robert, Beatrice and Ada, in the hope that

you will grow up in a better world

Introduction

Why we need these lessons in seeking independence of mind, honesty and integrity

Westminster, March 1982. ‘This is very serious, isn’t it?’ said Margaret Thatcher. She frowned and looked up from the intelligence reports I had handed her. ‘Yes, Prime Minister,’ I replied, ‘this intelligence can only be read one way: the Argentine Junta are in the final stages of preparing to invade the Falkland Islands, very likely this coming Saturday.’

It was the afternoon of Wednesday, 31 March 1982.

I was the Principal Private Secretary to the Defence Secretary, John Nott. We were in his room in the House of Commons drafting a speech when an officer from the Defence Intelligence Staff rushed down Whitehall with a locked pouch containing several distinctive folders. I knew immediately from the red diagonal crosses on their dark covers that they contained top secret material with its own special codeword (UMBRA), denoting that they came from the Government Communications Headquarters (GCHQ).

The folders contained decrypted intercepts of Argentine naval communications. The messages showed that an Argentine submarine had been deployed on covert reconnaissance around the Falklands capital, Port Stanley, and that the Argentine Fleet, which had been on exercises, was reassembling. A further intercept referred to a task force said to be due to arrive at an unstated destination in the early hours of Friday, 2 April. From their analysis of the coordinates of the naval vessels, GCHQ had concluded

that its destination could only be Port Stanley.1

John Nott and I looked at each other with but one thought, loss of the Falkland Islands would bring a major existential crisis for the government

of Margaret Thatcher: the Prime Minister must be told at once. We hurried down the Commons corridor to her room and burst in on her.

The last assessment she had received from the UK Joint Intelligence Committee (JIC) had told her that Argentina did not want to use force to secure its claim to the sovereignty of the Falkland Islands. However, the JIC had warned that if there was highly provocative action by the British towards Argentine nationals, who had landed illegally on the British South Atlantic island of South Georgia, then the Junta might use this as a pretext for action. Since the UK had no intention of provoking the Junta, the assessment was wrongly interpreted in Whitehall as reassuring. That made the fresh intelligence reports all the more dramatic. It was the first indication that the Argentine Junta was ready to use force to impose its claim.

The importance for us of being able to reason

The shock of seeing the nation suddenly pitched into the Falklands crisis is still deeply etched in my memory. It demonstrated to me the impact that errors in thinking can have. This is as true for all life as it is for national statecraft. My objective in writing this book therefore is an ambitious one: I want to empower people to make better decisions by learning how intelligence analysts think. I will provide lessons from our past to show how we can know more, explain more and anticipate more about what we face in the extraordinary age we now live in.

There are important life lessons in seeing how intelligence analysts reason. By learning what intelligence analysts do when they tackle problems, by observing them in real cases from recent history, we will learn how they order their thoughts and how they distinguish the likely from the unlikely and thus make better judgements. We will learn how to test alternative explanations methodically and judge how far we need to change our minds as new information arrives. Sound thinkers try to understand how their unconscious feelings as individuals, as members of a group and within an institution might affect their judgement. We will also see how we can fall victim to conspiracy thinking and how we can be taken in by deliberate deception.

We all face decisions and choices, at home, at work, at play. Today we have less and less time to make up our minds than ever before. We are in the digital age, bombarded with contradictory, false and confusing information from more sources than ever. Information is all around us and we feel compelled to respond at its speed. There are influential forces at play ranged against us pushing specific messages and opinions through social media. Overwhelmed by all this information, are we less, or more, ignorant than in previous times? Today more than ever, we need those lessons from the past.

Looking over the shoulder of an intelligence analyst

Over the centuries, generals naturally learned the advantage that intelligence can bring. Governments today deliberately equip themselves with specialist agencies to access and analyse information that can help

them make better decisions.2 Britain’s Secret Intelligence Service (MI6) runs human agents overseas. The Security Service (MI5) and its law enforcement partners investigate domestic threats and conduct surveillance on suspects. The Government Communications Headquarters (GCHQ) intercepts communications and gathers digital intelligence. The armed forces conduct their share of intelligence gathering in their operations overseas (including photographic intelligence from satellites and drones). It is the job of the intelligence analyst to fit all the resulting pieces together. They then produce assessments that aim to reduce the ignorance of the decisionmakers. They find out what is happening, they explain why it is

happening and they outline how things might develop.3

The more we understand about the decisions we have to take, the less likely it is that we will duck them, make bad choices or be seriously surprised. Much of what we need can come from sources that are open to anyone, provided sufficient care is taken to apply critical reasoning to them.

Reducing the ignorance of the decisionmaker does not necessarily mean simplifying. Often the intelligence assessment has to warn that the situation is more complicated than they had previously thought, that the motives of an adversary are to be feared and that a situation may develop in a bad way. But it is better to know than not. Harbouring illusions on such matters leads to poor, or even disastrous, decisions. The task of the intelligence officer is

to tell it as it is to government. When you make decisions, it is up to you todo the same to yourself.

The work of intelligence officers involves stealing the secrets of the dictators, terrorists and criminals who mean us harm. This is done using human sources or technical means to intrude into the privacy of personal correspondence or conversations. We therefore give our intelligence officers a licence to operate by ethical standards different from those we would hope to see applied in everyday life, justified by the reduction in harm to the

public they can achieve.4 Authoritarian states may well feel that they can dispense with such considerations and encourage their officers to do whatever they consider necessary, regardless of law or ethics, to achieve the objectives they have been set. For the democracies such behaviours would quickly undermine confidence in both government and intelligence services. Consequently, intelligence work is carefully regulated under domestic law to ensure it remains necessary and proportionate. I should therefore be clear. This book does not teach you how to spy on others, nor should it encourage you to do so. I want, however, to show that there are lessons from the thinking behind secret intelligence from which we can all benefit. This book is a guide to thinking straight, not a manual for bad behaviour.

Nor does thinking straight mean emotionless, bloodless calculation. ‘Negative capability’ was how the poet John Keats described the writer’s ability to pursue a vision of artistic beauty even when it led to uncertainty, confusion and intellectual doubt. For analytic thinkers the equivalent ability is tolerating the pain and confusion of not knowing, rather than imposing ready-made or omnipotent certainties on ambiguous situations or emotional challenges. To think clearly we must have a scientific, evidence-based approach which nevertheless holds a space for the ‘negative capability’

needed to retain an open mind.5

Intelligence analysts like to look ahead, but they do not pretend to be soothsayers. There are always going to be surprise outcomes, however hard we try to forecast events. The winner of the Grand National or the Indy 500 cannot be known in advance. Nor does the favourite with the crowds always come out in front. Events sometimes combine in ways that seem destined to confound us. Importantly, risks can also provide opportunities if we can use intelligence to position ourselves to take advantage of them.

Who am I to say this?

Intelligence agencies prefer to keep quiet about successes so that they can repeat them, but failures can become very public. I have included examples of both, together with a few glimpses from my own experience – one that spans the startling development of the digital world. It is sobering to recall that in my first paid job, in 1965, in the mathematics department of an engineering company in Glasgow, we learned to write machine code for the early computers then available using five-character punched paper tape for the input. Today, the mobile device in my pocket has immediate access to more processing power than there was then in the whole of Europe. This digitization of our lives brings us huge benefits. But it is also fraught with dangers, as we will examine in Chapter 10.

In 1969, fresh out of Cambridge, I joined GCHQ, the British signals intelligence and communications security agency, and learned of their pioneering work applying mathematics and computing to intelligence. I gave up my plans to pursue a doctorate in (very) theoretical economics, and the lure of an offer to become an economic adviser in HM Treasury. I chose instead a career in public service that would take me into the worlds of intelligence, defence, foreign affairs and security. In the Ministry of Defence (MOD), as a policy official, I used intelligence to craft advice for ministers and the Chiefs of Staff. I had three tours in the Private Office of the Secretary of State for Defence (serving six of them, from Lord Carrington in 1973 to John Nott in 1981) and saw the heavy burden of decisionmaking in crisis that rests at the political level. I saw how valuable good intelligence can be, and the problems its absence causes. When I was working as the UK Defence Counsellor in NATO Brussels it was clear how intelligence was shaping arms control and foreign policy. And as the Deputy Under Secretary of State for Policy in the MOD I was an avid senior customer for operational intelligence on the crisis in the former Yugoslavia. In that role I became a member of the Joint Intelligence Committee (JIC), the most senior intelligence assessment body in the UK, on which I served for a total of seven years.

When I left the MOD to go back to GCHQ as its Director in the mid-1990s, computing was transforming the ability to process, store and retrieve data at scale. I still recall the engineers reporting triumphantly to me that they had achieved for the first time stable storage of a terabyte of rapidly accessible data memory – a big step then although my small laptop today

has half as much again. Even more significantly, the Internet had arrived as an essential working domain for professionals, with the World Wide Web gaining in popularity and Microsoft’s new Hotmail service making email a fast and reliable form of communication. We knew digital technology would eventually penetrate into every aspect of our lives and that

organizations like GCHQ would have to change radically to cope.6 The pace of digital change has been faster than predicted. Then, smartphones had not been invented and nor of course had Facebook,

Twitter, YouTube and all the other social media platforms and apps that go with them. What would become Google was at that point a research project at Stanford. Within this small part of my working lifetime, I saw those revolutionary developments, and much more, come to dominate our world. In less than twenty years, our choices in economic, social and cultural life have become dependent on accessing networked digital technology and learning to live safely with it. There is no way back.

When I was unexpectedly appointed Permanent Secretary of the Home Office in 1997, it brought close contact with MI5 and Scotland Yard. Their use of intelligence was in investigations to identify and disrupt domestic threats, including terrorist and organized crime groups. It was in that period that the Home Office drew up the Human Rights Act and legislation to regulate and oversee investigatory powers to ensure a continual balancing act between our fundamental rights to life and security and the right to privacy for our personal and family life. My career as a Permanent Secretary continued with three years in the Cabinet Office after 9/11 as the first UK Security and Intelligence Coordinator. In that post, rejoining the JIC, I had responsibility for ensuring the health of the British intelligence community and for drawing up the first UK counter-terrorism strategy, CONTEST, still in force in 2020 as I write.

I offer you in this book my choice of lessons drawn from the world of secret intelligence both from the inside and from the perspective of the policymaker as a user of intelligence. I have learned the hard way that intelligence is difficult to come by, and is always fragmentary and incomplete, and is sometimes wrong. But used consistently and with understanding of its limitations, I know it shifts the odds in the nation’s favour. The same is true for you.

 

 

Staatlich Gedeckte Gewalt Und Morde – Die STASI Doku

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Prophezeiung Von 2005: Honeckers Rache

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

“Angela Merkel ist am Ziel: Sie ist Kanzlerin der Bundesrepublik Deutschland

In Angela Merkels Welt herrscht das Grauen des schlechten Geschmacks

Continue reading “Prophezeiung Von 2005: Honeckers Rache”

Film – Angela Merkel Honeckers Rache

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Jeder sollte sich eine eigene Meinung zu diesem Film bzw Satire bilden

Take A Look Inside An FBI Mobile Computer Forensics Lab – Video

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

The FBI is utilizing technology that can travel right to the scene of the crime. 41 Action News got a rare look inside a mobile unit at the agency’s Heart of America Regional Computer Forensics Laboratory.

GoMoPa-Scheisshausfliegen Von der Krise Gebeutelt Im Letzten Kampf-Einsatz Aus Dem Stasi-Bunker

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Die Oberscheisshausfliege Klaus-Dieter Maurischat oder wie auch immer der Kinderfreund, Gestaltenwanderer und Zeitreisende heissen mag. Ein ganz schräger Fürst.

Offensicht setzt die Corona-Krise den GoMoPa-Scheisshausfliegen, laut Eigenbezeichnung, und deren IM besonders zu, anders sind die letzten verzweifelten Kampfeinsaetze der Ostberliner Erich Mielke-Epigonen nicht zu erklaeren.

Immer weniger Opfer fallen auf die alten Stasi-Tricks herein, dies zeigen auch die Rekord-Verleumdungen, Morddrohungen und dubiosen Meeting-Einladungen an mich in den letzten Wochen und Tagen.

Zuvor musste ja schon der mutmassliche Pate RA Resch vom noblen Kranzlereck an den Reuterplatz umziehen und seine Mannschaft drastisch reduzieren.

Auch die toedlichen Attentate durch Putins Schergen schaden den alten Stasi-Kaempen der GoMoPa nun zunehmend, da immer mehr Menschen die Zusammenhaenge erkennen.

Hier noch einmal die Highlights aus der Feder der Scheisshausfliegen:

https://berndpulch.org/bernd-pulch-der-beweis-%E2%80%93-so-wollte-der-serienbetruger-klaus-maurischat-uns-zwingen-die-berichterstattung-uber-den-%E2%80%9Cnachrichtendienst%E2%80%9D-%E2%80%9Cgomopa%E2%80%9D-einzustellen/
https://berndpulch.org/2011/02/24/weitere-erpressung-des-vorbestraften-serienbetrugers-klaus-maurischat-gomopa/

Exposed – Top 10 Chilling Revelations About Stasi Of East Germany

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Der Neueste “Killing Joke” Der STASI-GoMoPa

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Karl-Eduard von Schnitzler, der Godfather der DDR-Serien, R.I.P.

Die neue geniale E-Mail-Falle der Neo-STASI aus Ostberlin an mich liest sich so:

[BERNDPULCH.ORG – BERND-PULCH.ORG – TOXDAT, STASI List, STASI SLEEPER List, KGB List, BDVP List, STASI Names A-Z, DDR-EAST GERMAN POLICE List,Offshore List, Leaks Lists, GOMOPA4KIDS-Pedophiles-Network, GOMOPA Victims List, GOMOPA Offender Names,] DIE TÄTER-LISTE – 90.000 STASI-MITARBEITER MIT KLARNAMEN ZUM DOWNLOADEN
Ich recherchiere für eine TV-Serie….

ursrechn@gmail.com

Continue reading “Der Neueste “Killing Joke” Der STASI-GoMoPa”

Mutmasslich Tödliche Falle der STASI-GoMoPa für Mich

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Kriminalität in der DDR: Geheimsache Mord: Wie die Stasi Verbrechen  vertuschte - Seite 0 - Reportageseite - Tagesspiegel

Sehr geehrter Herr Bernd Pulch,

die krimin. Enteignung durch SED/Stasi meines Eigentums mit Betrug, Filegrundstück in Weißig, hat das Landgericht Dresden mich parteriloser Arbeiter Rehabilitiert,Beschluss BSRH 128/11 v. 30.7.12 mit Haftbefehlaufhebung RS II 113/86 wegen Rechtsstaatswidrigkeit.

Continue reading “Mutmasslich Tödliche Falle der STASI-GoMoPa für Mich”

Must See Video – Nawalny Im “Spiegel”-Interview: Putin Steht Hinter Der Vergiftung

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Nawalny: “Ich behaupte, dass hinter der Tat Putin steht, und andere Versionen des Tathergangs habe ich nicht.”

Exposed – Russia Likely To Continue Seeking To Undermine Faith In US Electoral Process

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Homeland Security Experts on the Biggest Threats and Challenges the U.S.  Faces in 2020 – Homeland Security Today
 
Page Count: 4 pages
Date: September 3, 2020
Restriction: For Official Use Only
Originating Organization: Cyber Mission Center, Office of Intelligence and Analysis, Department of Homeland Security
File Type: pdf
File Size: 167,819 bytes
File Hash (SHA-256): CD0E044E731342D57AB13DCBB9C8B56D2D5A6295D1E51F6409461D1CAB55C61A
 

Continue reading “Exposed – Russia Likely To Continue Seeking To Undermine Faith In US Electoral Process”

Exklusiv: RA Resch Ist Partner Des Ibiza Video – Machers Dr. Ramin Mirfakhrai

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Coup Teil 86: Wie man Parteien unterwandert | Ceiberweiber

Senior-Partner Dr. Jochen Resch links & rechts Dr. Ramin Mirfakhrai, Junior-Partner 

  • Quelle: Facebook Account von Dr. Resch

Was die Herrschaften gerade zu besprechen haben, dürfte viele interessieren…

Continue reading “Exklusiv: RA Resch Ist Partner Des Ibiza Video – Machers Dr. Ramin Mirfakhrai”

Andrej Hunko Und Die Partei Borotba: Propaganda Vom Kreml Für Den Bundestag

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Ukraine verbietet Linke-Abgeordnetem Hunko die Einreise – EURACTIV.de

Andrej Hunko

Der deutsche Geheimdienst BfV erklärte 2016, dass Russland hinter einer Reihe von Cyber-Angriffen gegen die Institutionen und Politiker des Landes steckt. Dazu gehörten ein schweres Hacking des Deutschen Bundestages im Jahr 2015 und ein weiterer Angriff im folgenden Jahr gegen die regierende Christlich-Demokratische Partei.
Am 5. Mai 2020 erließ die Bundesanwaltschaft einen Haftbefehl gegen Dmitry Badin, einen Russen, der der Hauptverdächtige beim Hacking des Bundestages 2015 ist.

Continue reading “Andrej Hunko Und Die Partei Borotba: Propaganda Vom Kreml Für Den Bundestag”

FSBs Magnificent Seven: Neue Verbindungen Zwischen Berlin Und Istanbul

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

“Roman Davydov”, Foto aus dem slowakischen Visumantrag.

Am 23. August 2019 wurde Zelimkhan Khangoshvili, ein georgischer Asylbewerber tschetschenischer Herkunft, auf dem Rückweg vom Freitagsmoscheeservice in einem Park in der Nähe des Berliner Kleiner Tiergartens ermordet. Der Mörder war von der deutschen Polizei gefangen genommen worden, nachdem er mit dem Fahrrad vom Tatort weggelaufen war und zwei Teenager gesehen hatten, wie er seine Perücke, Kleidung und seinen Schalldämpfer in die Spree entsorgt hatte. Er ist seitdem in Haft und hat Unschuld behauptet.
In unseren früheren gemeinsamen Ermittlungen mit Der Spiegel und The Insider (Russland) haben wir den Mörder – der unter der gefälschten Identität von Vadim Sokolov (49) reiste – als Vadim Krasikov (54) identifiziert Mindestens zwei Auftragsmorde: 2007 in Karelien und 2013 in Moskau. Für diese Morde wurde er von den russischen Behörden auf einer Interpol Red Notice gesucht – bis er 2015 plötzlich fallen gelassen wurde.
Wir haben letztendlich herausgefunden, dass das Attentat vom russischen FSB, der staatlichen Sicherheitsbehörde, geplant und organisiert wurde. Die Vorbereitung des Mordes wurde direkt von hochrangigen Mitgliedern einer Veteranenstiftung ehemaliger Spetsnaz-Offiziere der Eliteeinheit FSB Vympel überwacht. Wir konnten jedoch nachweisen, dass der FSB direkt an der Planung und Unterstützung der Operation beteiligt war, da wir die wiederholte Anwesenheit des Mörders in den FSB Spetznaz-Schulungseinrichtungen in den Monaten vor seiner Reise unter einer von der Regierung ausgestellten Deckungsidentität geolokalisieren konnten im August 2019 nach Deutschland.

Continue reading “FSBs Magnificent Seven: Neue Verbindungen Zwischen Berlin Und Istanbul”

Wer Ist Dmitry Badin, Der Von Deutschland Angeklagte GRU-Hacker Wegen Der Bundestags-Hacks?

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Am 5. Mai 2020 berichteten deutsche Medien, dass die deutsche Bundesanwaltschaft einen Haftbefehl gegen den russischen Staatsbürger Dmitry Badin erlassen hat, den Hauptverdächtigen beim Hacking des Deutschen Bundestages im Jahr 2015.

Was war der Bundestags-Hack 2015?

Continue reading “Wer Ist Dmitry Badin, Der Von Deutschland Angeklagte GRU-Hacker Wegen Der Bundestags-Hacks?”

Deals Between Mafia Boss Marat Balagula, Russia, Ukraine And Belarus Exposed

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Marat Balagula | Mafia Wiki | Fandom

Marat Balagula

Documents released through Par:AnoIA, allegedly containing details about deals with Russia, Ukraine and Belarus. The documents are partly in English, Russian and Chinese. One document, obtained from the Chinese foreign office in Minsk indicates relations between the notorious Russian mob boss Marat Balagula and high ranking Ukrainian politicians.

Download the documents here:

https://data.ddosecrets.com/file/Chinese%20Ministry%20of%20Commerce/BYCN.rar

Marat Balagula (born September 8, 1943, Orenburg, USSR) was a Russian immigrant who was a Former Soviet Union leader and  Russian mafia boss, and close associate of the Lucchese crime family. His nickname was “Tony Soprano of the Russian Mafia”.

Continue reading “Deals Between Mafia Boss Marat Balagula, Russia, Ukraine And Belarus Exposed”

Murder In Mexico: What’s The Danger To An Foreign Tourist ?

Become a Patron!
True Information is the most valuable resource and we ask you to give back

Full Coverage: Murder in Mexico

Mexico broke its record for manslaughters a year ago, and the elements that are driving that savagery are probably not going to lessen sooner rather than later.

Simultaneously, record quantities of U.S. residents are either visiting Mexico as voyagers or dwelling in the nation, yet the quantity of Americans killed in Mexico remains strikingly low.

Continue reading “Murder In Mexico: What’s The Danger To An Foreign Tourist ?”

Tricky Hacker Email To Us Exposed – Probably By GoMoPa And Fancy Bear

Become a Patron!
True Information is the most valuable resource and we ask you to give back

 
Russel <donotreply@wordpress.com>
To:pulchbernd
 
Thu, Apr 30 at 11:53 AM
 
 
Name: Russel

Email: russel.corbat@timhortons.ca

Website: http://geomids

Comment: Hi,

My name is Russel Corbat and I work as an IT Security Manager at Tim Hortons Inc.

Around 7 hours ago, berndpulch.org has been involved to DDoS attack one of our private servers. As a result, we have been experiencing major disruptions in our network.

I had to take a close look at your web-site and I am almost sure that you have rather become a victim as well, instead of being a part of the attackers team.

So, before taking this matter to court and filing a police report, I am offering you a chance to fix this problem by yourself.

Moreover, I strongly suggest you to take this chance, as our attorneys were previously able to seize the defendant more than $417,000 by court action in similar case, just so you know.

However, the good news is the problem can be solved quite easily and you can even do it by yourself.

Tracking the requests sent by your web-site, our specialists identified the exact names of the malicious files used to DDoS attack our network.

Thus, you just need to delete these files and change the passwords on your web-site and the issue will be automatically resolved.

We would not like to involve most likely innocent people into any litigations, that�s why I prepared the list of files to be deleted, even though that doesn�t come within my duties. This will help us solve the problem once and for all.

I have additionally included detailed instructions on how to delete the files in a secure way. Make sure you study them before you start (pay close attention to item 3 of the attached instructions).

Download the report on malicious files and their uninstall instructions here:

https://sites.google.com/site/case000283/googledrive/share/downloads

Once again, we are in tune for a peaceful solution.

If you are not able to uninstall the malware on your web-site after reviewing the report, just email me and I will try to help you out with that (please do not forget to mention the case number, it can be found in the report).

In case you decide to ignore this message and the DDoS attack from your web-site to our network will be repeated once more, please note that we will contact our attorneys immediately and will have to involve police for further investigation, without giving you a prior notice on it.

Russel Corbat | IT security manager
russel.corbat@timhortons.ca

Tim Hortons Inc.
130 King Street West
Toronto, ON M5X 2A3
Canada


Time: April 30, 2020 at 10:53 am
IP Address: 51.79.37.25
Contact Form URL: https://berndpulch.org/2016/02/10/cryptome-unveils-snowden-documents/
Sent by an unverified visitor to your site.

Become a Patron!
True Information is the most valuable resource and we ask you to give back

Hacker Emails To Us Exposed – Probably By GoMoPa and Fancy Bear

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

WARNING: DO NOT GO TO THE WEBSITES MENTIONED HERE:
SMVx <donotreply@wordpress.com>
To:pulchbernd
Sat, May 23 at 9:12 PM

Name: SMVx

Email:

Website: http://CTCF

Message:


Time: May 23, 2020 at 8:11 pm
IP Address: 195.54.167.122
Contact Form URL: https://berndpulch.org/2020/05/19/cryptoleaks-wie-cia-bnd-mit-schweizer-hilfe-global-spionierten/
Sent by an unverified visitor to your site.

[BERNDPULCH.ORG – BERND-PULCH.ORG – Stasi Liste, KGB Liste, Stasi List, KGB List] Cryptoleaks – Wie CIA & BND Mit Schweizer Hilfe Global Spionierten
Yahoo/Inbox

Where Have All The Communist KGB and STASI Spies Gone ?

Become a Patron!
True Information is the most valuable resource and we ask you to give back

Fallout 4 - RED SCARE - FULL QUEST Mod Playthrough - COMMUNIST SPY ...

A look back: On Normannenstrasse in East Berlin, in the core of a standard white collar class neighborhood, stands a gigantic office complex: 41 solid structures as inauspiciously utilitarian as the condo towers that encompass them. Nine months prior it was the base camp of East Germany’s Ministry for State Security – the Staatsicherheit – or Stasi, maybe the most modern and sweeping undercover work association at any point made. Be that as it may, among January and March this year, as East Germany’s Communist Government at long last crumbled, the Stasi was officially disbanded. Today, the solid fortress is abandoned, its 10,000 rooms fixed, its operators bolted out.

From these dreary structures, 34,000 officials ran the Stasi’s 39 divisions. The staff included 2,100 operators alloted nonstop to perusing mail passed on from post workplaces and territorial Stasi base camp, 5,000 specialists liable for following suspects, and 6,000 agents whose solitary employment was tuning in to private phone discussions.

Primary Department VIII, otherwise called Observation, kept a nearby watch on residents through a broad system of sources in neighborhoods, schools, libraries and even service stations. Principle Department II – Counterintelligence – did electronic reconnaissance of outside ambassadors, specialists and writers and put spies in their workplaces, homes and lodgings. The Stasi even had a division to keep an eye on other Stasi individuals and sources.

”We are as yet getting stuns from what we discover,” says the movie producer Klaus Wendler, a representative for an East German Government advisory group that is currently filtering through the Stasi’s 5,000,000 documents. ”Performers had to keep an eye on individual artists, understudies were pressured into keeping an eye on companions, and youngsters were tricked into keeping an eye on their folks.”

With the disbanding of the Stasi, 85,000 full-time officials lost their positions essentially for the time being. Close to 10,000 have since discovered productive business, a large portion of them in different Government services, remembering 2,000 for the Ministry of the Interior, which some time ago administered the Stasi. The rest have joined the developing positions of East Germany’s jobless; some make due with standard joblessness benefits, while others get no Government remuneration by any stretch of the imagination. Many are upset at ending up barred, even alienated, by their kindred residents.

Abroad, the greater part of the Stasi’s 2,500 profession officials in consulates and missions no longer have a covert operative central command to answer to, and its untold a large number of independent covert government agents no longer get cash from their previous experts. West German insight officials gauge that there are exactly 5,000 agents in West Germany today, 500 of them ”top operators.” Eighty of those are thought to have entered the most elevated echelons of the military and Government, West German authorities state, including knowledge offices.

In spite of emotional political changes in Europe, West German insight authorities dread that not every one of these covert agents have changed their loyalties. Exceptionally restrained and still covert, some are as yet gathering and transferring data to Soviet knowledge organs, the West Germans accept. Others, they think, are essentially sticking around for their chance, holding back to be enacted.

Communist Spy Illustrations, Royalty-Free Vector Graphics & Clip ...

The Stasi has for some time been perceived as one of the best insight benefits on the planet, in a similar alliance as those of Israel and France. By the by, in the course of the most recent seven months, West German and American knowledge authorities have been astounded to find the size of its outside tasks, arranged until his retirement three years prior by the scandalous Markus Wolf. Until 1979, Western knowledge operators didn’t have a present photo of ”the man without a face.” But as of late he has ventured out from the shadows. Today, a smash hit creator, Wolf talks uninhibitedly of his effective infiltration of the West German insight and military over a time of over 30 years. What he doesn’t talk about is psychological oppression.

Over the most recent two months, frightening disclosures have become visible specifying the Stasi’s connects to an assortment of fear based oppressor gatherings, quite the extreme left Red Army Faction, eight of whose individuals were captured in June. With the assistance of the Stasi, they had been given new personalities and occupations in East Germany in the wake of doing psychological militant activities in the 1970’s and 80’s. The Stasi has additionally been ensnared in the Libyan-coordinated bombarding of the La Belle disco in West Germany in 1986: According to new data from witnesses and held onto documents, Stasi operators helped transport the explosives to West Berlin that brought about the passings of two American fighters.

In East Germany, as well, the Stasi, albeit formally nonexistent, stays a danger. In late June, new divulgences uncovered that in 1986, as the Soviet Union started changing its general public and the East German economy kept on decaying, the Stasi, predicting turmoil – however not the finish of the divider – set in excess of 2,000 individuals from a world class mystery team into the most significant levels of East German Government divisions, organizations and colleges. Another 500 government agents were dispatched to West Germany. East German authorities state that a large portion of them are still set up, their characters obscure, and suspect that they are compelled to hold up out any political disturbance.

Insight authorities are in a race to carry the most exceedingly terrible guilty parties to equity before they go for all time underground or sign up with new bosses. The pursuit is suggestive, says one American ambassador in Berlin, of a period in the no so distant past: ”Ferreting out the government operatives, psychological oppressors and Stasi operators is comparable to the quest for the Nazis and their teammates after they endeavored to vanish into German culture toward the finish of the war.”

On Friday morning, only 48 hours from money related unification on July 1, East Berlin is bursting at the seams with energy. Global camera teams and columnists have attacked the city to catch the beginning of another time. Be that as it may, in his office, just strides from the Volkskammer, or Parliament, Peter-Michael Diestel, East Germany’s 38-year-old Interior Minister, ponders the insult inheritance of the past. ”My crucial,” says just, ”is to destroy the Stasi.”

That assignment has tumbled to an impossible competitor: a previous dairy animals draining victor, weight lifter (he can seat press 420 pounds) and infrequent legal counselor who accepted the position of Interior Minister to a great extent in light of the fact that nobody else needed it.

Diestel, a local of Leipzig, has been occupied since getting to work in April. He has enrolled the collaboration of huge quantities of previous Stasi officials and, utilizing data from witnesses and Stasi records, has attempted to acquire ”independent” agents, either by extending to them employment opportunities or persuading them that the Stasi is done. He has gone along key data on fear mongers and sources to West German knowledge offices, and helped organize the capture in June of the Red Army Faction psychological oppressors. At last, Diestel built up the Stasi’s complicity in the La Belle disco bombarding.

Diestel is exploring a forlorn course, subject to furious assaults from both the left and right in East Germany, extraordinary weight from West German authorities, and week after week requires his acquiescence by the German Social Union, a traditionalist gathering in East Germany’s overseeing alliance. Due to day by day dangers against his life, the police monitor his significant other and three little youngsters nonstop. Says Peter Pragal, East Berlin reporter for the week by week magazine Stern: ”He has the hardest activity in Germany, East or West.”

Other than its full-time officials, selected from the best and most brilliant in East German culture, the Stasi had 150,000 dynamic sources and 500,000 to 2 million low maintenance witnesses in East Germany. Its land property alone – including the huge fortresslike complex in East Berlin and Stasi’s in excess of 2,000 structures, homes, dugouts, havens, medical clinics, and resorts all through East Germany – have been esteemed in the billions of dollars. Up until this point, Government agents attempting to take stock of the Stasi have counted 23,000 vehicles and trucks and 250,000 weapons, including submachine firearms, guns, rifles and explosive launchers.

The productive Stasi machine accumulated broad dossiers on in excess of 5 million East Germans – 33% of the populace – that included data as close as sexual propensities and as everyday as books settled up with the library. A great many calls were recorded; condos were pester and unlawfully looked (the Stasi would orchestrate to have suspects kept late at their employments). One protester as of late found that a small scale listening gadget fit for transmitting three miles had been sewn into his jacket neckline.

Residents were powerless against the Stasi’s Orwellian interruption whenever and anyplace – in their condos, industrial facilities, houses of worship, cafés, libraries, specialists’ workplaces, rooms, even on their excursions abroad. In some East German urban communities, each bit of mail was opened in exceptional steam rooms joined to the post workplaces.

At the point when East German soccer groups ventured out to play coordinates in West Germany, Stasi specialists obliged busloads of fans, checking whether any East German sat close to a West German, showed a West German banner or sang the West German national song of praise.

Igor Gouzenko, The Soviet Defector Who Started the Cold War

Up and down the a large number of miles of East German expressway, Stasi specialists acted like corner store chaperons, servers and travelers, cautiously taking note of whether East Germans left their vehicles close to Western vehicles or conveyed dubiously overwhelming baggage.

The Stasi made it basically incomprehensible for East Germans not to work together. Each field operator needed to convey in any event 25 new sources or start 25 examinations consistently. Residents who declined to help were either set apart as subversives or left to adapt to the administration independent. ”You were unable to go anyplace in East German culture except if you could pull the correct strings,” says Hasso Von Samson, a spokesman for West Germany’s Office for the Protection of the Constitution. ”But I guess that’s what happens when they take away your enemy.”

This article reflects the situation in Germany in 1990.

Since then the top spies are still in touch with each other and form a dangerous network which is similiar to the Cosa Nostra in the USA and/or Sicily, the Yakuza in Japan, the Russian Mafia and the Chinese Triads.

The only distinction: The German STASI has learned the code of Omerta and operates in the dark – within the government, the Gauck administration, the Bundestag, the left party, the legal system as judges, attorney and prosecutors, the police and also in the German security and intelligence services.

And last not but least as undercover agents and informer for former KGB spy Wladimir Putin, now Russia’s ruler like former chancellor Gerhard Schroeder, former STASI agent Matthias Warnig and the Gazprom and North Stream – Energy connection.

It is a taboo until now.

Become a Patron!
True Information is the most valuable resource and we ask you to give back

STASI/KGB Intelligence Cooperation Under Project RYaN Exposed – TOP SECRET

Become a Patron!
True Information is the most valuable resource and we ask you to give back

Ehemaliger BND-Chef kann geplante Ablösung Honeckers 1987 nicht ...

Between 1981 and 1989 the foreign intelligence branches of the Soviet KGB and the East German Ministry of State Security launched a combined effort to develop a system for detecting signs of an impending western nuclear first strike. Codenamed “Project RYaN”, this early-warning system constituted one part of the Soviet response to the perceived threat of a surprise “decapitation” strike by NATO nuclear forces.

233 pages of documents from the Stasi’s Hauptverwaltung A and analysis by Bernd Schaefer, Nate Jones, and Benjamin Fischer below give unprecedented insight into the capabilities and fears of the Eastern Bloc intelligence services from the Able Archer ’83 War Scare to the end of the Cold War.

Introduction to the Collection

by Bernd Schaefer

In November 2012 CWIHP published e-Dossier No. 37 on the cooperation between the Soviet Committee for State Security (KGB) and the East German Ministry for State Security (MfS or Stasi), which highlighted a wide array of German documents dating from the 1960s through 1989. These materials were introduced by Walter Süss and Douglas Selvage, historians in the research division of the Federal Commissioner for the Stasi Records (BStU) in Berlin.[1] While e-Dossier No.37 featured just one document[2] on Soviet/East German preparations to detect a surprise Western “nuclear missile attack” (RYAN or Raketno Yadernoye Napadenie/Ракетно ядерное нападение in Russian) from August 1984, the BStU research division added a substantial number of German Stasi documents on RYAN to its online collection in 2013.[3] These new materials are remarkable and add to our understanding of the intentions, scope, and duration of the Soviet RYAN project; all of them are available in translation today in the CWHIP Digital Archive. The follow e-Dossier includes detailed comments and analysis on their significance by Nate Jones, a nuclear expert at the National Security Archive in Washington D.C., and Benjamin Fischer, a retired CIA officer and veteran researcher of RYAN and the so-called “Able Archer Crisis” of November 1983.

The August 1984 record of bilateral Stasi-KGB conversations, written by East German foreign intelligence spy chief Markus Wolf, includes an apt summarization of RYAN’s purpose by the Soviet representative: “The need for such approaches derives from the fact that a multitude of measures undertaken by the adversary do not allow advance determination which variation to launch a war the adversary will choose. In addition, we need to integrate experiences from analyzing the enemy’s crisis management into a process of further perfecting the definition of indicators to detect the adversary’s main measures for its acute war preparation.”[4]

It is undisputable that after 1979 the Soviet leadership, military, and intelligence service grew increasingly nervous about a “possible” Western “surprise nuclear missile attack” to “decapitate” the USSR’s nuclear potential and win a subsequent war

It is undisputable that after 1979 the Soviet leadership, military, and intelligence service grew increasingly nervous about a “possible” Western “surprise nuclear missile attack” to “decapitate” the USSR’s nuclear potential and win a subsequent war. The KGB operated an intelligence network to monitor worldwide “indicators” to detect to assess the likelihood of a “surprise nuclear missile attacked” launched by NATO. Soviet assessments of the likelihood of such an attack differed over the years, peaking between 1982 and 1984.

KGB/Stasi Cooperation | Wilson Center

Whether such fears were warranted given the actual activities of the United States and NATO is disputed. Historians and analysts have differed in their assessments of partially declassified American sources, archival materials from Eastern European and Soviet archives, post-1990 oral histories from Russia, and memories of former actors, such as prominent KGB defector Oleg Gordievsky. Some consider the so-called “Able Archer Crisis” or “War Scare” of November 1983 to be the most dangerous event of the Cold War next to the Cuban Missile Crisis, while others view it in a much less dramatic fashion.[5]

The bulk of newly available Stasi and KGB documentation on RYAN from the BStU Archives in Berlin does not address Able Archer 83. However, it casts an unprecedented light on Stasi and KGB perspectives since 1984, as well as on the operational details, structure, and scope of the RYAN project. The collection includes a KGB catalogue from 1984/85 that, in excruciating detail, outlines the 292 indicators that might precede a potential “surprise nuclear missile attack.” Many of them refer to activities in and around Washington offices and buildings, including the White House parking lot. The collection also includes summaries of monthly KGB reports up to April 1989, which list possible global indicators of preparations for a “surprise nuclear missile attack.” These records tell us that hundreds of KGB officers were assigned to work on the RYAN program and a special division was created inside the KGB exclusively for this purpose. Combined with earlier published Stasi documents on the Soviet shoot down of KAL 007 in September 1983 (in which Soviet intelligence’s inability to determine whether the airliner was military or civilian before it was shot down was identified as a serious problem[6]), these new RYAN materials provide ample evidence of comprehensive Soviet efforts to avoid and thwart a “surprise attack.”

While hindsight shows that Soviet fears were exaggerated, the level of Soviet and East German anxiety over Western intentions, particularly during the first Reagan administration, is noteworthy. On the other hand, many Stasi documents on RYAN read like overbearing bureaucratic exercises, aimed at comprehensiveness and perfection on paper, but unattainable in practice. Phrasing in some of the Stasi materials implies that there probably was some skepticism in higher Stasi echelons about the program’s effectiveness and the Soviet approach (though it did not deter the Stasi from contributing more substantive efforts than any other fraternal socialist intelligence service towards identifying indicators).

Still, it does not seem far-fetched that Soviet anxieties were enhanced by the ensuing and ever expanding RYAN program and fed into Moscow’s shift towards disarmament policies under Mikhail Gorbachev. Strangely enough, the KGB’s RYAN project had acquired such a life of its own that its operational routines continued all the way through the first half of 1989, regardless of changes in Soviet-American relations and disarmament efforts during the second Reagan and the early Bush I administration.

Was RYaN simply a “ vicious cycle of intelligence collection and assessment” as described by Oleg Gordievsky? While Gordievsky’s word choice is debatable, these new documents put a certain amount of Soviet “circular reasoning” on full display.


The Vicious Circle of Intelligence

by Nate Jones

Oleg Gordievsky, the spy who revealed the existence of Operation RYaN –RYaN (РЯН) is the Russian acronym for Raketno Yadernoye Napadenie (Ракетно ядерное нападение), or “nuclear missile attack”– described it as “a vicious circle of intelligence collection and assessment.” During the last decade of the Cold War, Soviet intelligence operatives abroad were “required to report alarming information” to Moscow about a Western surprise nuclear strike, “even if they themselves were skeptical of it.” After the Moscow Center received these inflated and incorrect –but requested– reports of Western preparations for a surprise nuclear strike, it became “duly alarmed by what they reported and demanded more.” Now, documents newly released by the Cold War International History Project and the Office of the Federal Commissioner for the Records of the State Security Service of the Former German Democratic Republic (BStU), provide unprecedented insight into the “vicious circle of intelligence” of Operation RYaN. And, in a development never envisaged by the documents’ authors, they now present historians with comprehensive, real-time monthly RYaN reports from Soviet intelligence operatives abroad as they witnessed and catalogued the Cold War’s end.[7]

In 1979 the Institute for Intelligence Problems, coordinated by the KGB’s First Chief Directorate, was tasked to work on “the development of new intelligence concepts” that could provide preliminary warning of Western preparations for a first strike. The result of this work was the creation of Operation RYaN, which was secretly announced in May of 1981.[8] At a major KGB conference in Moscow, General Secretary Leonid Brezhnev and Yuri Andropov, then Chairman of the KGB, justified the creation of Operation RYaN because, they claimed, the United States was “actively preparing for nuclear war” against the Soviet Union and its allies. According to a newly released Stasi report, the primary “Chekist work” discussed in the May 1981 meeting was the “demand to allow for ‘no surprise.’”[9]

The establishment of Operation RYaN has also been corroborated by KGB annual reports from 1981 and 1982, previously published by the National Security Archive. The 1981 annual report states that the KGB had “implemented measures to strengthen intelligence work in order to prevent a possible sudden outbreak of war by the enemy.” To do this, the KGB “actively obtained information on military and strategic issues, and the aggressive military and political plans of imperialism [the United States] and its accomplices,” and “enhanced the relevance and effectiveness of its active intelligence abilities.”[10]

The 1982 annual report confirmed Soviet fears of Western encirclement, and noted the challenges of countering the “U.S. and NATO aspirations to change the existing military-strategic balance.” Therefore, “[p]rimary attention was paid to military and strategic issues related to the danger of the enemy’s thermonuclear attack.” This Soviet unease was spurred by the pending November 1983 deployment of Pershing II and Gryphon Cruise missiles, whose short flight times and long range changed the nuclear balance by threatening Soviet nuclear command and control with decapitation.[11]

The first comprehensive account of the details of Operation RYaN remains a Top Secret February 1983 telegram from KGB Headquarters Moscow to the London KGB Residency entitled “Permanent operational assignment to uncover NATO preparations for a nuclear missile attack on the USSR,” with enclosed instructions on how to report on indicators pointing toward a nuclear sneak attack. This document was published in full in 1991 by Soviet double agent Oleg Gordievsky and British intelligence historian Christopher Andrew in Comrade Kryuchkov’s Instructions: Top Secret Files on KGB Foreign Operations, 1975-1985.

Above: M113 armored personnel carriers move through the town of Stockhausen (Herbstein) during REFORGER ’83 in Germany.

“The objective of the assignment is to see that the Residency works systematically to uncover any plans in preparation by the main adversary [USA] for RYaN and to organize continual watch to be kept for indications of a decision being taken to use nuclear weapons against the USSR or immediate preparations being made for a nuclear missile attack.”

Attached to the telegram was a list of seven “immediate” and thirteen “prospective” tasks for the agents to complete and report. These included: the collection of data on potential places of evacuation and shelter, an appraisal of the level of blood held in blood banks, observation of places where nuclear decisions were made and where nuclear weapons were stored, observation of key nuclear decision makers, observation of lines of communication, reconnaissance of the heads of churches and banks, and surveillance of security services and military installations.

Regrettably, however, Comrade Kryuchkov’s Instructions included a facsimile reproduction of only the first page of this document. The additional pages were translated and typeset into English with no Russian corroboration of their authenticity. Nevertheless, the KGB annual reports, as well as documents from other former Eastern Bloc (Czechoslovakian and Bulgarian) archives, and now these Stasi documents, help to substantiate Gordievsky’s accounts.[12]

The newly released Stasi documents on RYaN show that East German Intelligence did not begin conducting RYaN collection activities until years after the Soviets began. A January 1983 “brief note” describes initial Stasi preparations for creation of systematic RYaN intelligence collection and reporting, but acknowledges “[f]urther questions had to be straightened out.” [13] At the February 9th high-level meeting in Moscow, Stasi head Erich Mielke told KGB Chairman Victor Chebrikov that, “consultations have to be continued.” Chebrikov replied, “The work is definitely not finalized.”[14] In August of 1984, the Soviet and East German intelligence agencies were still discussing how, exactly, “to approach conceptual, organizational, and practical aspects when dealing with the RYaN problem.”[15]

In fact, German collection and analysis of RYaN information did not begin in earnest until early 1985, according to the February 15, 1985, Order Number 1/85 which directed that “all options” be utilized to detect Western “military aggression, particularly a surprise nuclear missile attack” by observing non-socialist states and West Berlin in a “systematic and targeted manner.”[16] While systematic Stasi RYaN collection and analysis did not commence until well after the end of what has become known as the “1983 War Scare,” these newly released documents do contain insights about the danger of the era, which will be discussed below.

Above: Order Number 1/85

The documents also provide unprecedented operational details about RYaN, including its size, the importance of East German intelligence to the Soviets, the use of computers for RYaN collection, and the 292 indicators that some Eastern Bloc intelligence experts believed could be used to detect a nuclear attack.

For the first time, historians have access to hard numbers about the size of Operation RYaN, revealing that within the KGB, 300 positions were created so that RYaN operatives could implement the real-time “transmission and evaluation” of reported indicators showing the likelihood of a Western first strike. In July of 1984, KGB chairman Victor Chebrikov created a new division within the First Department (Information) of the KGB’s First Main Directorate (responsible for foreign intelligence and operations) to implement Operation RYaN throughout the KGB and world. This coordinating division was composed of 50 KGB officers.[17]

The documents further acknowledge that the Stasi was the KGB’s primary source of foreign intelligence. In July 1981, Andropov thanked Stasi head Erich Mielke for providing information on “West German tank production, defense technology, and the NATO manual [as of now the contents of this manual is unknown].” Andropov then complemented the Stasi, lauding, “We rate your information very highly,” and forebodingly requested Stasi sources procure “an assessment of the NATO manual and NATO’s preparations for war.”[18] In September 1983, Deputy Chairman of the KGB Vladimir Kryuchkov told Stasi head Erich Mielke that although Andropov was officially on vacation in the Southern USSR, it was “no actual vacation… For half the day he is reading information, including ours [KGB] and what we received from you.” In December 1986, KGB Chairman Victor Chebrikov wrote Stasi head Erich Mielke to thank him for the “tangible results in this extremely important area [Operation RYaN].” He emphasized that the KGB “highly value[d] the contribution of the MfS of the GDR to the joint efforts on timely recognition of the danger of a sudden attack.”[19]

There are also references to the primitive computer system that the Soviet Union was attempting to use to track and calculate the coalition of world forces, including the risk of nuclear war. The KGB reported to the Stasi that it had “revised its planning for scientific-technological research and industrial procurement” of new “reliably working technology.” Gordievsky had earlier reported of “a large computer model in the Min[istry] of Defense to calculate and monitor the correlation of forces, including mili[tary], economy, [and] psychological factors, to assign numbers and relative weights.”[20] On November 23, 1983, US Defense and Intelligence officials circulated an article entitled, “In pursuit of the Essence of War” that described a Soviet method which “cataloged and computerized” the world’s “correlation of forces.” The results, it claimed, were “highly objective, empirically provable and readily adaptable to modern data processing.”[21] The newly released documents show that the East Germans were skeptical of Soviet computing prowess, however: past “Soviet experiences show us that a danger exists of computer application concepts not getting implemented,” snidely wrote Marcus Wolf.[22]

Computer analysis was desired because the amount of information captured during Operation RYaN was massive. The newly released Stasi documents provide far more detail than Gordievsky’s account of the precise indicators that human intelligence collectors were compiling and analyzing (such as: activity at Defense instillations, the location of prominent political officials, and even the treatment of “the most important government documents at the US National Archives”). In October 1983, Deputy KGB Chairman Kryuchkov revealed that the First Directorate’s Institute for Intelligence Problems[23] had compiled seven binders full of possible RYaN indicators.[24] By May of 1986, these binders had evolved into a catalogue of 292 indicators of “signs of tension.”[25] The Stasi reported that 226 indicators (77 percent) were able to be “covered, though to varying degree.” The indicators were organized into five main categories: Political, Military, Intelligence Services, Civil Defense Agencies, and the Economic sector. A read through the newly released full catalogue of RYaN indicators (as opposed to the truncated list published by Gordievsky) makes the program appear more rational and effective than has previously been portrayed.[26] Just one telling example is the fact that RYaN watchers had sniffed out the US Continuity of Government program, discovering and surveilling “two presidential planes… equipped with accelerated speed [and] electronic apparatuses which work under conditions of nuclear weapons use.”[27] These planes were where the president and his emergency cabinet would command during a nuclear war.

RYaN watchers were also instructed to watch for the “preparation and conduct of large-scale exercises,” because they increased “the level of combat-readiness of US strategic forces,” and hence, could indicate intentions for a “surprise nuclear missile attack.” When Gordievsky disclosed Operation RYaN he also revealed Able Archer 83, a November 1983 NATO command post nuclear release exercise that he claims Soviet intelligence may have miscalculated as an actual nuclear strike.[28]

The RYaN catalogue noted several indicators that would have occurred during Able Archer 83 (and other NATO exercises), including: the “large scale transfer of US armed forces” by C-5A and C-141 aircraft (16,000 troops were transferred from the US to Europe on radio silent flights during Autumn Forge 83, which included Able Archer 83); “preparation of anti-ABC [atomic-biological-chemical] protective gear” and mobilization (during Able Archer 83 the war gamers donned ABC equipment and transferred to an Alternate War Headquarters in response to simulated chemical attacks); and, perhaps most importantly, “significant changes in communications” including “transmittal of orders to deploy nuclear weapons” (on October 17-21 1983, the Supreme Headquarters Allied Powers Europe school in Oberammergau, West Germany trained more than 50 NATO officers on new nuclear weapons release procedures which utilized a new format that was practiced for the first time during Able Archer 83).[29]

Another eyebrow-raising, though certainly not dispositive, reference to Able Archer 83 can be found in these documents. On November 7, the day Able Archer 83 began, an East German Major General (whose name is illegible) sent a summary of discussions between Stasi foreign intelligence chief Marcus Wolf and Deputy KGB Chairman Vladimir Kryuchkov to Major General Damm. Gordievsky has written that on November 8 or 9, he “was not sure which,” flash telegrams were sent to both KGB and GRU residencies in Western Europe reporting “an alert on US bases.” The flash telegrams “clearly implied that one of several possible explanations for the (non-existent) alert was that the countdown to a nuclear first strike had actually begun.”[30]

Perhaps relatedly, the East German documents also reveal a persistent undercurrent of skepticism and concern about the effectiveness of Operation RYaN. In August of 1984, Lev Shapkin, deputy director of the KGB for foreign intelligence, told Marcus Wolf that reforms to Operation RYaN were underway. Though no faulty reporting by Operation RYaN during Able Archer 83 was mentioned in the meeting, the two intelligence officials clearly were worried that false warnings of a Western nuclear first strike could lead to preemptive actions by Soviet nuclear forces. Shapkin told Wolf that the indicators agents were observing and reporting “must be complemented, revised, and made more precise,” and bemoaned “the problem of not getting deceived” by faulty indicators. He reiterated that “clear-headedness about the entire RYAN complex” was a “mandatory requirement.” Marcus Wolf included his concerns in an addendum to the summary of the meetings, stressing the need to know the “actual situation” rather than the picture presented by Operation RYaN’s indicators. “Constant and ongoing assessments,” he sensibly wrote, “have to be made whether certain developments actually constitute a crisis or not.”[31]

The documents contained in this release include one final invaluable resource for historians: monthly Soviet intelligence summaries (translated from Russian to German, and now, to English) spanning August 1986 to April 1989. The monthly summaries, serving a purpose likely never imagined by their drafters, allow us to see how Soviet intelligence witnessed and reported the peaceful ending of the Cold War. The reports, which mirror the above RYaN format, are thorough and include much reporting on the West still officially classified in the United States. This includes reports on the operational readiness of Pershing II, MX, and Trident missiles at specific bases, and US military activities in Nicaragua, Panama, and Iran/Iraq. They also include comprehensive reporting of NATO drills and maneuvers. The Soviet observers reported of Able Archer 87, for example, that NATO “simulated” the switch from peace to war time; nuclear consultations were practiced “in the context of the exercise.” Regrettably, no November 1983 RYaN report is yet available for historians to observe if the reporting on Able Archer 83 was as couched and nuanced as it was four years later.

The task of following CWIHP and the BStU’s lead and finding these earlier RYaN reports now falls to archivists and archival burrowers in other former Soviet states now liberalized.[32]

Finally, these monthly RYaN reports about the Cold War’s peaceful resolution reflect the strangeness of the nuclear superpower rivalry itself. The absurd logic of the Cold War becomes evident when one reads about the NATO “elimination of intermediate and tactical nuclear missiles” in a September 1987 report incongruently entitled, “On the Results of Intelligence Activities to Report Indicators for a Sudden Nuclear Missile Attack.”


Comments on the Soviet-East German Intelligence Alert

by Benjamin Fischer

A real contribution

The BStU documents contain important information about both the Soviet intelligence alert RYAN and its East German counterpart KWA (Kernwaffenangriff or nuclear-weapons attack) during the 1980s. On several accounts, we owe Douglas Selvege a debt of gratitude for locating and disseminating the new tranche. First, no Soviet records have become available since former KGB officer (and British agent) Oleg Gordievsky published a selection of RYAN cables almost a quarter of a century ago, and it is unlikely that Russia will declassify new sources. Most commentators, I myself the most culpable, were mesmerized by both the stark tone of both the cables and Gordievsky’s various accounts of the “war scare.” A more balanced interpretation is now possible. Second, the East German Ministry for State Security (MfS) and especially its foreign intelligence service, the Hauptverwaltung A (Main Directorate A, hereafter HV A), played a major role in the alert system documented here for the first time. For many years, the only information on the East German side was Markus Wolf’s memoir (1997), which some researchers considered a reliable and original source while others did not. Wolf, however, couched his brief account, referring only to RYAN, not KWA. He apparently expected that HV A records would never see the light of day. There was good reason to do so, since most files were destroyed on the eve of German unification.[33] Though skeptical about the purpose and priority of the Soviet intelligence alert, Wolf nevertheless saluted and obeyed KGB orders. The MfS/HV A organized an elaborate early-warning system (Früherkennung/Frühwarnsystem) that replicated and, to some degree, exceeded its Soviet counterpart.

How scary was the war scare?

Wolf occupied a much higher position than Gordievsky in the Warsaw Pact intelligence community. The spymaster was closer to the real center of power in Moscow, was a keen observer of both superpowers, and his agents in the West— especially inside NATO provided insights that countered the ideological stereotype of the “inherent aggressiveness” of the Western alliance. Moreover, his view may have been in line with the actual perceptions of his Soviet masters.

Yuri Andropov was the leading proponent of RYAN. He inaugurated the alert in 1981 as chairman of the KGB and presided over its expansion after succeeding Leonid Brezhnev as General Secretary the next year. In May 1981, during a private conversation with Wolf’s boss, State Security Minister Erich Mielke, Andropov assessed the Reagan administration’s plans for accelerated modernization of strategic and theater-nuclear forces:

The US is preparing for war, but it is not willing to start a war. They are not building factories and palaces in order to destroy them. They are striving for military superiority in order to “check” us and then declare “checkmate” against us without starting a war. Maybe I am wrong.[34]

Andropov added that Washington had abandoned détente because it benefited the USSR at the expense of the US—in words that echoed Ronald Reagan’s condemnation of détente as a “one-way” street! Now the US was trying to recover its losses by reverting to the earlier policy of containment, in other words, to the old Cold War.

Two years later, facing the prospect of deployment of new US Pershing II missiles in Western Europe, Andropov addressed a meeting of the Warsaw Pact’s Political Consultative Committee. The missiles were the “most serious challenge,” he said, and the military situation was “especially dangerous.” In the past, the US had counted on its nuclear weapons “to deter” and “to contain” the Soviet Union; now there was talk of actually fighting and prevailing in a nuclear war.[35] “It is difficult to say where the line between extortion and actual preparation to take a fateful step lies.”[36]

Andropov stopped short of declaring that war was imminent or unavoidable. In his public statements, however, he spoke as if the world was on the brink of a nuclear holocaust. Soviet propagandists compared Reagan to Hitler and the US to Nazi Germany on the eve of 1941. Less than a month after Andropov’s speech, the KGB dispatched a cable that sounded the alarm, asserting that RYAN “now lies at the core of [Soviet] military strategy;” the intelligence alert had become a military alert.[37]

Another “cut” at the question of leadership thinking on the prospect of war comes from a Politburo meeting in May 1983. Acknowledging that the US cruise and ballistic missiles would arrive on schedule, Andropov turned to Foreign Minister Andrei Gromyko for an assessment of US intentions. Gromyko replied: “The United States, as is known, is talking about the fact that they can only strike in response to aggression. I think that without enough reason they wouldn’t dare to use nuclear missiles.” He added that, in any event, NATO’s pluralist structure would act as brake on the US: “Against the first strike are also Canada, England, France, and West Germany.”

The Alert Ramps Up

The Soviets were nervous but not to the point of shaking in their boots. RYAN did not, as Gordievsky claimed, begin to wind down in mid-1984, on the eve of his departure from London and after he had lost access to KGB cable traffic. It ramped up. KGB officer Lev Shapkin briefed the East Germans on a series of decisions made to expand RYAN and to create an infrastructure to support it.[38] The KGB formed a new division within the First (information/analysis) Department of the First Chief (foreign intelligence) Directorate (FCD). It was a situation center or watch office designed to collect and assess warning indicators and levy requirements on the FCD’s operations divisions and signals intelligence (Sigint) department.

The new division was a high priority and was almost certainly initiated by Andropov. The formation of a special RYAN commission chaired by KGB chairman Viktor Chebrikov underscored the alert’s top-level political backing and its bureaucratic clout. Chebrikov earmarked 300 slots for the new RYAN division, 50 of which had been filled to monitor warning indications around the clock. However, the KGB had trouble finding qualified personnel and training officers to perform “warning-and-indications of war intelligence,” as it is referred to by US intelligence services. This is one of several signs that the Soviets, even in this late stage of the Cold War, had little or no experience with early-warning intelligence.

Warning and Surprise

RYAN was launched in May 1981 during an All-Union Conference of senior KGB managers from the length and breadth of the USSR. Andropov chaired it, but the presence of Leonid Brezhnev signified that the session was no routine gabfest. Gordievsky’s accounts give the impression that RYAN was the sole item on the agenda. It was not.

The East German documents show that the conference discussed a range of threats, referred to as “surprises,” emanating from within the USSR and the Eastern bloc, as well as from the international arena. The KGB chieftains were instructed to reorient their collection priorities toward early detection and advance warning of potential or impending crises that threatened the internal security and stability, as well as external security, of the Soviet empire. As KGB officer [full name unknown] Zinyov told the East Germans, the new operational directive was to “allow no surprises.” The mission of “Chekist work,” he added, now encompassed “the struggle against espionage and terror, questions of the economy, morale, the construction industry, etc.”[39]

Subsequently, FCD chief Vladimir Kryuchkov confided to Wolf that even foreign intelligence had been drawn into novel operations aimed at detecting threats to internal security originating from outside the USSR.[40] The MfS and HV A followed suit. “The bunker mentality of the GDR [German Democratic Republic] leadership revealed itself in the mantra-like repetition ‘impede every surprise from the enemy in every area.’”[41] This originally meant external military threats, i.e., the war scare, but then it expanded to include a range of dangers posed by domestic dissidence—religious, pacifist, and environmental groups, e.g.—allegedly supported by the West. The “most urgent” mission of the MfS, as well as the HV A, was to detect this conflation of internal and external “surprises” and to “prophylactically” deal with them before they grew to threaten the GDR regime.

Wolf’s repeated assertion that his service had nothing to do with the Stasi police-state was false. Like his counterpart Kryuchkov, Wolf followed orders. HV A case officers and their agents were tasked with collecting intelligence on internal threats emanating from abroad, even at the expense of conventional foreign intelligence inside the GDR and in the “Operations Area” (Stasi-deutsch for West Germany, West Berlin, and other NATO countries). The HV A began filing counterintelligence reports (Abwerberichte)—normally the provenance of the MfS internal security and surveillance departments—which contributed to increased repression in the GDR.[42]

KWA and the Frühwarnsystem

The MfS/HV A was the largest and most efficient Eastern bloc security/foreign intelligence service outside the Soviet Union. Its operational assets were considerable and in several respects exceeded those of the KGB, especially the massive MfS signals intelligence (Sigint) main directorate and the HV A’s extensive agent (Humint) networks that targeted West Germany/West Berlin and the US and NATO presence there.[43] Following the expansion of RYAN in mid-July, the KGB used the MfS/HV A to replicate its own organizational and operational model for early-warning intelligence.

This new collection includes one of the two key documents on KWA, Mielke’s Order Nr. 1/85, which mandated it as “the absolute priority” [emphasis in original] for the entire MfS.[44] The Order authorized Wolf, in his capacity as deputy MfS head, to formulate and implement an organizational plan and operational directives for the entire MfS. The second document[45] is not included in the collection, but several years ago I translated and commented on both documents.[46] The main components of the HV A’s early-warning system included:[47]

  • A “catalog” of warning indicators that was based on the RYAN template of five “political/societal areas” (US/NATO political and military leaderships, intelligence services, civil defense organizations, and economic institutions); it also included targets covered by MfS Sigint and HV A agent networks in West Germany/West Berlin, as well as US/NATO diplomatic, military, and intelligence sites in West Germany;[48]
  • A centralized situation center (Lagezentrum) to constantly monitor KWA indicators on a global basis;
  • A dedicated communications link to the KGB’s situation center;
  • Annual alert drills and military exercises for HV A officers that simulated conditions of a surprise attack;[49]
  • Emergency communications plans and safe houses in West Germany for agents selected to report on KWA;[50]
  • Coordination of operations and intelligence sharing with East German military intelligence on the Soviet model of KGB-GRU cooperation under RYAN guidelines.

A Catalog of Warning Indicators

The focal point of Soviet and East German collaboration was the compilation of a list or “catalog” of warning-of-war indicators designed to detect signs of an impending crisis or war “in real time.” The KGB demanded that the HV A catalog should be based on “strict conformity” with the RYAN template, i.e., on the five “political/societal areas” noted above.

Above: Cover page from the HA III copy of the Project RYaN catalog of indicators.

MfS/HV A records reveal that both services devoted considerable effort to conceptualizing, defining, and operationalizing warning indicators, yet they also seemed to have encountered problems that were never fully resolved. The main objective was agent penetration of “the enemy’s decision-making centers” and acquisition of “documents” on a political decision for war. The Soviet-East German intelligence reach, however, exceeded its grasp. The overriding goal was to obtain advance warning of a US decision to launch strategic nuclear forces, an urgent requirement since one-third of those forces remained on permanent alert, and the rest could be readied on short notice. A 1986 HV A report noted that “at the moment” this had not been accomplished.[51]

The second string to the RYAN/KWA bow was an extensive list of indirect indicators that, it was assumed, would reveal the implementation of alert procedures and mobilization plans that could not be concealed from intelligence surveillance and monitoring. The KGB and HV A were forced to resort to “observable intelligence,” i.e., things that can be seen and counted, in lieu of “message-like” intelligence, which relies on well-placed agents with access to plans, decisions, and intentions.[52] RYAN/KWA signified that the neither the KGB nor the HV A had such agents in place. The questionable methodological assumption was that overt or visible deviations from peacetime norms in the five political/societal areas could reveal a decision to attack the USSR and Warsaw Pact countries.

The one place where both services had well-placed agents was NATO headquarters. The KGB cables Gordievsky published, as well as the East German documents[EMP1] , reveal detailed knowledge of the alliance’s alert procedures and early-warning capabilities, especially NATO’s “crisis management” system. The KGB and HV A did not, however, find it reassuring that NATO arrangements were designed to warn of a Warsaw Pact attack in time to mount a defense. They simply declared that “crisis management” was dual-purpose concept that could be used to attack as well as warn.

The whole RYAN/KWA framework was anachronistic, seemingly more appropriate for the pre-nuclear age when states required lead times to mobilize armed forces and prepare populations for war. The template came from the KGB’s Institute for Research on Operational Problems. One explanation is that with little knowledge or experience to draw on, the Institute was dusting off old lessons learned from a previous surprise attack, namely Hitler’s Operation Barbarossa.

Some of the indicators were based on a mirror-image of how the Warsaw Pact would prepare for war, such as the stockpiling of mineral oil and mass slaughter of cattle. HV A case officers, for example, were instructed to look for:

“Confirmation of deviations in the behavior of prominent personalities and other persons in possession of classified information as well as their family members and persons close to them, which can be viewed as measures for protecting their own security (among other things, sudden moving into specially equipped secure accommodations, unexpected departure from normal residential areas and from border zones at home and abroad).”

The GDR, meanwhile, was building bunkers and fall-out shelters for the political, military, and intelligence elite and practicing “evacuation exercises” in case of a putative nuclear assault.[53]

The KGB and the HV A both had difficulties defining “key” indicators and do not appear to have arranged them in rank order or have assigned numerical weights or some form of an “accounting” method. There is a fleeting reference to the possibility of reaching false conclusions about hostile intentions, but the inherent problem of arriving at a false positive as watch officers worked through their checklists was apparently never fully addressed. Was there a tipping point or designated critical mass of accumulated indicators that would predict an attack? We don’t know, and the documents don’t tell us.

In 1986, the HV A reported that it had covered 226 of the 292 (!) indicators (“77%”), “albeit in varying degrees,” from its catalog, but what that meant is not clear. Were the results negative—no war on the horizon—or positive? The documents refer to efforts to employ computer-based data processing, but they also allude to problems with software and algorithms that, apparently, were never resolved.

All intelligence bureaucracies write memos and send cables when they want to give the impression that they are making decisions and taking action while, actually, “slow rolling the process.” The KGB-HV A dialogue on the indicators may have been no different. Despite repeated references to the urgency and priority of the alert, the HV A took several years to compile its own list of indicators. Meetings of working-level experts in Moscow and East Berlin were arranged at a leisurely pace. It took more than a year after Order Nr. 1/85 to organize an HV A situation center to monitor KWA indicators. By the time it was up and running, the entire effort was about to be overtaken by events in Moscow with the advent of Mikhail Gorbachev and “new thinking.”

Mielke’s Variant

RYAN single-mindedly focused on the putative threat of a US surprise attack on the USSR. KGB cables declared that timely warning was required for Soviet strategic forces to take “retaliatory measures,” but the logic of the alert suggests that a preemptive first-strike, not a second-strike after US missiles had been launched, was the actual purpose.

Mielke repeatedly, and vainly, pushed for consideration of “other variants” of surprise, in particular conflict in Central Europe arising from a crisis in East-West relations. Mielke’s concern, shared by many in West Germany, was that the superpowers were prepared to fight in Europe, with conventional forces or “limited” nuclear strikes, down to the last German and on the last inch of German soil.[54] The Soviets simply ignored him. As the documents show time and again, Kremlin leaders had far less concern for their ally’s security than for their own.

Tradecraft and the war scare

The documents contain several references to operational tradecraft that underscore the Warsaw Pact’s lack of experience with warning intelligence. With the onset of the RYAN and KWA alerts, the KGB and the HV A, apparently for the first time, decided to issue to selected agents in the West rapid response communications equipment. The German term was Sofortmeldung (immediate reporting), which may have referred either to radios or burst transmitters using satellite relays to transmit encrypted electronic signals to the HV A situation center.

Theretofore, the KGB and HV A had employed personal communications (face-to-face meetings) or impersonal communications (dead drops) to pass requirements to and collect information from agents. Such arrangements required advance planning, conduct of pre-and-post meeting surveillance detection routes, and continuous “casing” for meeting or dead drop sites. Old-fashion tradecraft was secure but time-consuming and not suited for real-time reporting.

So, what was the war scare?

Wolf and his officers found Moscow’s “war games” a burdensome waste of time in pursuit of a non-existent threat. Some said KWA was a bureaucratic boondoggle that Mielke used to expand his power and influence. Vadim Bakatin, the last KGB chairman, called RYAN “an atavism of the Cold War” and a “sort of window dressing, and boiled down to compilation of regular reports stating that any given country was not intending in the next few days to drop nuclear bombs on the USSR.”[55] Soviet and East German leaders, however, were genuinely fearful, even if the threats and conspiracies they saw all around them were often exaggerated or even imaginary. As they were losing their grip on power, they were also losing their grip on reality.

Vadim Bakatin, the last KGB chairman, called RYAN “an atavism of the Cold War”

At the same time, the US was investing billions of dollars to upgrade its command-and-control, communications, intelligence, and early-warning capabilities, all predicated on the potential threat a Soviet surprise attack.[56] During the last decade of the Cold War, the fear of war was reciprocal and real, even if the threat of war was not.


Document Appendix

Document 1: Ministry of State Security (Stasi), Brief Note, ‘Issues to Discuss with the Leadership of the KGB of the USSR’. 14 January 1983

A brief note written by the Ministry of State Security that includes a number of questions for the leadership of the KGB in the USSR, such as whether other elements, like military doctrine or emergency responses, should be examined as possible options for starting a war.

Document 2: Ministry of State Security (Stasi), ‘Note About the Talks of Comrade Minister [Mielke] with the Chairman of the KGB, Comrade Chebrikov, in Moscow’. 9 February 1983

This note on the talks between Minister Wolf and KGB Chairman Chebrikov contains heartfelt congratulations on cooperation thus far, but it also highlights problems with the situation and the importance of utilizing the potential of all fraternal organs to detect and prevent hostile plans and measures.

Document 3: Ministry of State Security (Stasi), ‘Notes on Statements made by Comrade Colonel General Kryuchkov’. 3 October 1983

These notes describe statements made by Colonel General Kryuchkov which outline the current state of Soviet institutions and intelligence networks in various regions, including Western Europe, Africa, the Middle East, and the United States.

Document 4: Ministry of State Security (Stasi), ‘About the Talks with Comrade V. A. Kryuchkov’. 7 November 1983

This report describes conversations with Comrade Kryuchkov, coving a multitude of subjects, but delving briefly into the problem of “prevention of a surprise nuclear attack” (RYAN). Kryuchkov responded that this issue is being continually worked on, but no central decisions had been made as of yet.

Document 5: Committee for State Security (KGB), ‘Indicators to Recognize Adversarial Preparations for a Surprise Nuclear Missile Attack’. 26 November 1984

A catalog of indicators of NATO preparation for nuclear war that were monitored by Warsaw Pact intelligence services under Project RYaN. The activity is divided into the following areas: political and military, activities of intelligence services, civil defense, and economic.

Document 6: Ministry of State Security (Stasi), Order Number 1/85. 15 February 1985

This order from the Ministry of State Security describes the tasks of the MfS units concerning efforts to uncover intentions of aggression and surprise military activities by western states and their allies, especially a surprise nuclear missile attack against the USSR.

Document 7:Speech, East German Minister of State Security Mielke, ‘At the Enlarged Collegium Meeting on 7 June 1985 about Further Preparation of the XI SED Party Congress’. 10 June 1985

This speech by East German Minister of State Security Mielke addresses the technological, intellectual, and ideological preparations for war by the west and how to uncover and organize indicators of a potential attack.

Document 8: Ministry of State Security (Stasi), ‘Report on Development and Achieved State of Work Regarding Early Recognition of Adversarial Attack and Surprise Intentions (Complex RYAN)’. 6 May 1985

This report by Ministry of State Security describes developments and achievements toward early recognition of a surprise nuclear missile attack on the USSR.

Document 9: Letter, East German Minister of State Security Mielke to KGB Chairman Viktor Chebrikov. 10 November 1986

This letter from East German Minister of State Security Mielke to KGB Chairman Chebrikov requests a consultation on the development and continuation of Complex RYAN, especially on furthering collaboration between the MfS and KGB.

Document 10: Letter, KGB Chairman Chebrikov to East German Minister for State Security Mielke. 24 December 1986

Responding to Mielke’s letter from November 1986, Chebrikov agrees to the proposed meeting between the MfS and the KGB on the subject of a sudden nuclear missile attack on the states of the socialist community.

Document 11: Ministry of State Security (Stasi), Plan for Consultations with the Delegation of the KGB. 20 January 1987.

This document is a plan for the consultations to take place in Berlin between the Stasi and the KBG. It includes objectives and proposed theses on the subject of early recognition of a sudden nuclear missile attack by NATO forces.

Documents 12 A–T: Committee for State Security (KGB), ‘About Results of Intelligence Activities to Note Indicators for a Surprise Nuclear Missile Attack’.

Documents 12A–T are monthly intelligence reports digests generated using intelligence by Project RyaN between August 1986 and April 1989.

[1] Süß, Walter and Douglas Selvage. “CWIHP e-Dossier No. 37: KGB/Stasi Cooperation” Cold War International History Project http://www.wilsoncenter.org/publication/kgbstasi-cooperation.

[2]  “Deputy Minister Markus Wolf, Stasi Note on Meeting with KGB Experts on the RYAN Problem, 14 to 18 August 1984,” August 24, 1984, History and Public Policy Program Digital Archive, Office of the Federal Commissioner for the Stasi Records (BStU), MfS, ZAIG 5384, pp. 1-16. http://digitalarchive.wilsoncenter.org/document/115721

[3] „Das MfS und die Zusammenarbeit mit anderen kommunistischen Geheimdiensten: Staatssicherheit und sowjetischer KGB.“ Der Bundesbeauftragte für die Unterlagen des Staatssicherheitsdienstes der ehemaligen Deutschen Demokratischen Republik.  http://www.bstu.bund.de/DE/Wissen/MfS-Dokumente/MfS-KGB/_node.html.

[4] “Deputy Minister Markus Wolf, Stasi Note on Meeting with KGB Experts on the RYAN Problem, 14 to 18 August 1984,” August 24, 1984, History and Public Policy Program Digital Archive, Office of the Federal Commissioner for the Stasi Records (BStU), MfS, ZAIG 5384, pp. 1-16. http://digitalarchive.wilsoncenter.org/document/115721.

[5] See below respective comments by Nate Jones and Ben Fischer.

[6] “Stasi Note on Meeting Between Minister Mielke and KGB Deputy Chairman Kryuchkov,” September 19, 1983, History and Public Policy Program Digital Archive, Office of the Federal Commissioner for the Stasi Records (BStU), MfS, ZAIG 5306, pp. 1-19. http://digitalarchive.wilsoncenter.org/document/115718.

Deputy KGB Chairman Viktor Chebrikov described Soviet “evidence” that the flight looked like a “reconnaissance mission”: “If we would have known this was a passenger plane, we would not have shot it down.” Put differently, the Soviet side wondered what would have been if the plane would have been a military aircraft and part of a Western surprise attack: In this case the Soviet Union would have been unable to detect such an attack, i.e. Moscow would have become “surprised.”

[7] Christopher Andrew and Oleg Gordievsky, KGB: The Inside Story of its Foreign Operations from Lenin to Gorbachev, (New York: Harper Collins, 1991), 585.

[8] Other sources vary the spelling of RYaN. Soviet Ambassador to the United States Anatoly Dobrynin spelled it “ryon.” Another spelling includes the word “surprise:” “VRYAN” “vnezapnoe raketno yadernoe napadenie” –surprise nuclear missile attack. Czech Intelligence referred to the operation as NRJAN.  One document shows that the Bulgarians monitored “VRYAN indicators” as late as June 1987.  These East German documents confirm that the operation continued until at least April, 1989.  The 1983 War Scare, Part One http://www2.gwu.edu/~nsarchiv/NSAEBB/NSAEBB426/; Anatoly Dobrynin, In Confidence: Moscow’s Ambassador to Six Cold War Presidents (Seattle: University of Washington Press, 2001), 523; Oleg Kalugin, The First Directorate: My 32 Years in Intelligence and Espionage Against the West, (New York: St. Martins, 1994), 302; 9 March 1984, Bulgarian Ministry of Interior; MVR Information re: Results from the work on the improvement of the System for detection of RYAN indications, AMVR, Fond 1, Record 12, File 553, provided by Jordan Baev; Peter Rendek, ” Operation ALAN – Mutual Cooperation of the Czechoslovak Intelligence Service and the Soviet KGB as Given in One of the Largest Leakage Cases of NATO Security Data in the Years 1982 – 1986 .”

[9] RYaN Translation #2

[10] The 1983 War Scare, Part One http://www2.gwu.edu/~nsarchiv/NSAEBB/NSAEBB426/.

[11] The 1983 War Scare, Part One http://www2.gwu.edu/~nsarchiv/NSAEBB/NSAEBB426/; Benjamin Fischer, “CANOPY WING: The U.S. War Plan That Gave the East Germans Goose Bumps,” International Journal of Intelligence and CounterIntelligence, 27:3, 431-464. Recently, Benjamin Fischer has introduced an additional potential source of East German fear: CANOPY WING, purportedly a US military research project to exploit a vulnerability of Soviet Warsaw pact command and control communications to launch a “decapitation/surgical” strike.

[12] 9 March 1984, Bulgarian Ministry of Interior; MVR Information re: Results from the work on the improvement of the System for detection of RYAN indications, AMVR, Fond 1, Record 12, File 553, provided by Jordan Baev; Peter Rendek, ” Operation ALAN – Mutual Cooperation of the Czechoslovak Intelligence Service and the Soviet KGB as Given in One of the Largest Leakage Cases of NATO Security Data in the Years 1982 – 1986 .”

[13] “Issues to discuss with the leadership of the KGB of the USSR” http://digitalarchive.org/document/119308.

[14] “Note About the Talks of Comrade Minister [Mielke] with the Chairman of the KGB, Comrade Chebrikov, in Moscow.” http://digitalarchive.wilsoncenter.org/document/119319.

[15] “Deputy Minister Markus Wolf, Stasi Note on Meeting with KGB Experts on the RYAN Problem, 14 to 18 August 1984,” http://digitalarchive.wilsoncenter.org/document/115721.

[16] “Order Number 1/85” http://digitalarchive.org/document/119322.

[17] “Deputy Minister Markus Wolf, Stasi Note on Meeting with KGB Experts on the RYAN Problem, 14 to 18 August 1984,” http://digitalarchive.wilsoncenter.org/document/115721. It is possible that this new coordinating division was created as a reaction to the false alerts generated by Operation RYaN in November 1983 incorrectly warning that a NATO nuclear release drill, Able Archer 83, could have been an actual nuclear attack.

[18] “Stasi Note on Meeting Between Minister Mielke and KGB Chairman Andropov,” July 11, 1981, History and Public Policy Program Digital Archive, Office of the Federal Commissioner for the Stasi Records (BStU), MfS, ZAIG 5382, p. 1-19. http://digitalarchive.wilsoncenter.org/document/115717.

[19] ”Letter, KGB Chairman Chebrikov to East German Minister for State Security Mielke.” http://digitalarchive.wilsoncenter.org/document/119332; For more on the East German contributions to Soviet intelligence collection, see Benjamin Fischer, “CANOPY WING: The U.S. War Plan That Gave the East Germans Goose Bumps,” International Journal of Intelligence and CounterIntelligence, 27:3, 431-464.

[20] The 1983 War Scare, Part Three, http://www2.gwu.edu/~nsarchiv/NSAEBB/NSAEBB428/.

[21] The 1983 War Scare, Part Three, http://www2.gwu.edu/~nsarchiv/NSAEBB/NSAEBB428/.

[22] “Deputy Minister Markus Wolf, Stasi Note on Meeting with KGB Experts on the RYAN Problem, 14 to 18 August 1984,” http://digitalarchive.wilsoncenter.org/document/115721

[23] Translated here as “Institute for Operative Problems.”

[24] “Ministry of State Security (Stasi), ‘About the Talks with Comrade V. A. Kryuchkov” http://digitalarchive.wilsoncenter.org/document/119320

[25] “Ministry of State Security (Stasi), ‘Report on Development and Achieved State of Work Regarding Early Recognition of Adversarial Attack and Surprise Intentions (Complex RYAN)”  http://digitalarchive.wilsoncenter.org/document/119334.

[26] “Ministry of State Security (Stasi), Report, ‘Indicators to Recognize Adversarial Preparations for a Surprise Nuclear Missile Attack’” http://digitalarchive.wilsoncenter.org/document 119338. A partially declassified CIA document shows that Operation RYaN had its analogue in U.S. intelligence gathering. The CIA was also working with the DIA, and presumably allied intelligence agencies, to create a list of indicators — including the defense industry — for its chiefs of station to monitor, in an attempt to “emphasize greater early warning cooperation with intelligence services.”  Other parallels to RYaN date back to 1961, when the Soviets also instructed embassies in all “capitalist” countries to collect and report information during the Berlin Crisis. In 1991, one might have deduced the January 16 Desert Storm invasion by monitoring the influx of pizza deliveries to the Pentagon, according to current U.S. Army Operational Security (OPSEC) training materials.  In October 1983, justifying the KGB’s difficulties, Kryuchkov stated, “Even in the United States they have not completed this [a RYaN equivalent] yet.” The 1983 War Scare, Part One http://www2.gwu.edu/~nsarchiv/NSAEBB/NSAEBB426/.

[27]  “Report, Ministry of State Security (Stasi), ‘About Results of Intelligence Activities to Note Indicators for a Surprise Nuclear Missile Attack’” http://digitalarchive.wilsoncenter.org/document/119909. For more on Continuity of Government, see James Mann, “The Armageddon Plan,” The Atlantic, March 2004.

[28] Still-classified reports by the British Joint Intelligence Council and the US President’s Foreign Intelligence Advisory Board have allegedly confirmed Gordievsky’s accounts.  See The 1983 War Scare, Part Three, http://www2.gwu.edu/~nsarchiv/NSAEBB/NSAEBB428/, and British Documents Confirm UK Alerted US to Danger of Able Archer 83, http://nsarchive.wordpress.com/2013/11/04/british-documents-confirm-uk-alerted-us-to-danger-of-able-archer-83/

[29] The 1983 War Scare, Part Two http://www2.gwu.edu/~nsarchiv/NSAEBB/NSAEBB427/.

[30] Regrettably, no text of the November 8 or 9 flash telegram has been released or reproduced. Gordievsky’s revelation of this warning is the only basis for the current historical record (though the preceding and following telegrams which he reproduced and published do serve as somewhat sturdy bona fides).  Christopher Andrew and Oleg Gordievsky, Comrade Kryuchkov’s Instructions: Top Secret Files on KGB Foreign Operations, 1975-1985, (Stanford: Stanford University Press 1991), 87.

[31] Marcus Wolf did not write kindly of the Soviets, or Operation RYaN, in his 1997 memoir:  “Our Soviet partners had become obsessed with the danger of a nuclear missile attack,” though he writes that he had not. “Like most intelligent people, I found these war games a burdensome waste of time, but these orders were no more open to discussion than other orders from above.” Marcus Wolf with Anne McElvoy, Man without a Face: The Autobiography of Communism’s Greatest Spymaster (New York: Random House, 1997), 222.   http://digitalarchive.wilsoncenter.org/document/115721.

[32] Welcome, Ukraine.  http://euromaidanberlin.wordpress.com/2014/04/01/kgb-archives-in-ukraine-will-be-open-to-public/

[33] For an account of the file destruction by the HV A officer who supervised it, see Klaus Eichner and Gotthold Schramm, Konterspionage: Die DDR-Aufklärung in den Geheimdienstzentrum (Berlin: edition ost, 2010), pp. 174-177.

[34] “Stasi Note on Meeting Between Minister Mielke and KGB Chairman Andropov,” July 11, 1981, History and Public Policy Program Digital Archive, Office of the Federal Commissioner for the Stasi Records (BStU), MfS, ZAIG 5382, p. 1-19. Translated from German for CWIHP by Bernd Schaefer. http://digitalarchive.wilsoncenter.org/document/115717

[35] Andropov was referring to the new US war-fighting strategy for “prevailing” in a limited nuclear conflict that was first announced as Presidential Directive 59 by the Carter administration and slightly modified during the Reagan administration in National Security Decision Memorandum 13.

[36] “Speech of General Secretary Comrade Yu. V. Andropov of the Central Committee of the Communist Party of the Soviet Union.” Available at   <http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB14/doc19.htm&gt;

[37] Christopher Andrew and Oleg Gordievsky, Instructions from the Centre (London: Hodder & Stoughton, 1991), p. 74.

[38] “Deputy Minister Markus Wolf, Stasi Note on Meeting with KGB Experts on the RYAN Problem, 14 to 18 August 1984,” August 24, 1984, History and Public Policy Program Digital Archive, Office of the Federal Commissioner for the Stasi Records (BStU), MfS, ZAIG 5384, pp. 1-16. Translated from German for CWIHP by Bernd Schaefer. http://digitalarchive.wilsoncenter.org/document/115721

[39] RYAN Translation #2: “Note about the Talks of Comrade Minister with the Chairman of the KGB, Comrade Chebrikov, on February 9, 1983 in Moscow.”

[40] RYAN Translation #3: “Notes on Statements made by Comrade Colonel General Kryuchkov, V. A. on October 3, 1983.”

[41] Peter Richter and Klaus Rösler, Wolfs West-Spione: Ein Insider Report (Berlin: elefanten press, 1992), p. 85.

[42] Ibid.

[43] On MfS Sigint, see Ben B. Fischer, “‘One of the Biggest Ears in the World’: East German Sigint Operations,’” International Journal of Intelligence and Counterintelligence 11:2 (Spring 1998), pp.142‑153.  The MfS, the HV A, and the intelligence service of the East German Army were handling some 3,000 agents in West Germany/West Berlin when the Berlin Wall fell.  About half spied for the MfS and military intelligence and the other half for the HV A. Five of every 100,000 West German citizens were “working clandestinely for the GDR.” Georg Herbstritt, Bundesbürger im Dienst der DDR-Spionage: Eine analytische Studie (Göttingen: Vandenhoeck & Ruprecht: 2007), p. 84.

[44] “Befehl 1/85 zu den Aufgaben der Dienstheiten des MfS zur frühzeitigen Aufklärung akuter Agressionsabsichten und überraschender militärischer Aktivitäten imperialisticher Staaten und Bundnisse, inbesondere zur Verhinderung eines überraschinden Raketenkernwaffenangriffs gegen Staaten der sozialistischen Gemeinschaft,” BstU [Bündesbeauftragte für die Unterlagen des Staatssicherheitsdienstes der ehemaligen DDR], ZA [Zentralarchiv], DSt [Dokumentenstelle im Zentalarchiv des BStU]103137. Also RYAN Translation #4.

[45] “1. Durchführungsbestimmung des Stellvertreters des Ministers auf Befehl 1/85 vom 15.2.1985, GVS 0008-1/85: Allzeitige Nutzung der Möglichkeiten der Dienstheiten des MfS zur frühzeitgen und zuverlässigen Beschaffung von Hinweisen auf akute feindliche Aggressionsabsichten, -vorbereitungen und –handlungen,” BstU, ZA, DSt103137.

[46] Benjamin B. Fischer, “The 1980s Soviet War Scare: New Evidence from East German Documents,” Intelligence and National Security, 14:4 (Autumn 1999), pp. 186-197.

[47] Wolf’s tasking of MfS departments is described in Ibid.

[48] “Katalog ausgewählter Indikatoren zur Früherkennung gegnerischer militärischer Aggressionsvorbereitungen und Überraschungsabsichten, inbesondere von Maßssnahmen zur Vorbereitung eines überraschenden Raketenwaffenangriffs (KWA),” BstU, ZA, DSt103137. A different version of this text is available in Document #5 of this collection.

[49] See Richter and Rösler, Wolfs West-Spione, pp. 72, 85 and Günter Bohnsack, Hauptverwaltung Aufklärung: Die Legende Stirbt  (Berlin: edition ost, 1997), p. 64.

[50] Richter and Klaus Rösler, Wolfs West-Spione, p. 85.

[51] RYAN Translation #6: “R E P O R T on development and achieved state of work regarding early recognition of enemy attack and surprise intentions (Complex RYAN).”

[52] Michael Herman, Intelligence Power in Peace and War (New York: Cambridge University Press, 1996), pp. 83-88.

[53] Richter and Rösler, Wolfs West-Spione, p. 72.

[54] Fear of a superpower conflict lead GDR leader Erich Honecker to open a back channel to West German Chancellor Helmut Schmidt, a decision that irritated Andropov. Markus Wolfe, Man Without a Face (New York: Times Books, 1997), p. 221.

[55] Mikhail A. Alexeev, Without Warning: Threat Assessment, Intelligence, and Global Struggle (New York: St. Martin’s Press, 1997), p. 203.

[56] See Thomas P. Coakley, Command and Control for War and Peace (Washington, DC: National Defense University Press, 1992). Parallels between mutual American and Soviet fears of surprise attack are discussed in Benjamin B. Fischer, “The Soviet-American War Scare of the 1980s,” International Journal of Intelligence andCounterintelligence 19:3, Fall 2006, pp.480-519.

ABOUT THE AUTHORS

Bernd Schaefer

Bernd Schaefer

Global Fellow, Former Senior Scholar;
Professional Lecturer, The George Washington University
Nate Jones

Nate Jones

Director, Freedom of Information Act Project, National Security Archive

Benjamin B. Fischer

Former Chief Historian of the Central Intelligence Agency

NUCLEAR PROLIFERATION INTERNATIONAL HISTORY PROJECT

The Nuclear Proliferation International History Project is a global network of individuals and institutions engaged in the study of international nuclear history through archival documents, oral history interviews, and other empirical sources. At the Wilson Center, it is part of the Wilson Center’s History and Public Policy Program.  Read more

COLD WAR INTERNATIONAL HISTORY PROJECT

The Cold War International History Project supports the full and prompt release of historical materials by governments on all sides of the Cold War. Through an award winning Digital Archive, the Project allows scholars, journalists, students, and the interested public to reassess the Cold War and its many contemporary legacies. It is part of the Wilson Center’s History and Public Policy Program.  Read more

Become a Patron!
True Information is the most valuable resource and we ask you to give back

Covid Situation Insider Infos Revealed

Become a Patron!
True Information is the most valuable resource and we ask you to give back

Quellbild anzeigen

Here Are Some Key Events to Look For:

  • An effective drug treatment (probably 3-7 months). That won’t stop the spread and it won’t be a “cure” but it will take some pressure off the health system. (One tip: DON’T take hydroxychloroquine. That’s a really bad idea. The first study showed increased mortality in patients and we have no idea how to use it effectively.)

  • Widespread testing… most likely at home pin prick antibody blood testing. Hard to give an exact time frame and the logistics are huge but the test is cheap, easy and fast. Running two tests 14+ days apart through a whole region would identify most cases and also let you know who is likely to have some immunity.

  • A vaccine (probably 12-18 months…could be longer). That’s when things should return to somewhat normal. Then the main risk is the virus mutating but even that becomes a lower risk because it will no longer be a “novel” virus. Once people are vaccinated their immune systems will not be starting from zero with a different coronavirus.

Caution – The 2nd Wave
In some regions, case numbers will be driven down with strong social distancing and regions may lift restrictions.

But this could be a problem…

Historically it’s the second and third wave of infections that cause the most deaths. With restrictions lifted an area could see returning cases again, possibly after summer, either from existing infections in the region spiking back up or infections being reintroduced from areas of the world that are in winter.

Understanding that most regions are looking at 6-18 months of social distancing can help businesses plan their marketing…

Businesses should take aggressive precautions to stay safe and sanitary and get aggressive in educating clients about what precautions they’re taking. That will give people the confidence to do business with them…

Become a Patron!
True Information is the most valuable resource and we ask you to give back

Freedom Of Information In The Time Of COVID-19 By Steven Aftergood

Become a Patron!
True Information is the most valuable resource and we ask you to give back

Quellbild anzeigen

In principle, the COVID-19 outbreak could provide a compelling new justification for expediting the processing of certain Freedom of Information Act requests related to the pandemic. But it is more likely to slow down the handling of most requests as agency employees work remotely and other concerns are understandably prioritized.

The impact of COVID-19 was surveyed by the Congressional Research Service in Freedom of Information Act (FOIA) Processing Changes Due to COVID-19: In Brief, March 27, 2020.

Other noteworthy new and updated reports from CRS include:

U.S. Role in the World: Background and Issues for Congress, updated March 27, 2020

The Employment-Based Immigration Backlog, March 26, 2020

Demographic and Social Characteristics of Persons in Poverty: 2018, March 26, 2020

Occupational Safety and Health Administration (OSHA): Emergency Temporary Standards (ETS) and COVID-19, March 26, 2020

Arms Control and Nonproliferation: A Catalog of Treaties and Agreements, updated March 26, 2020

Congressional Use of Advisory Commissions Following Crises, CRS In Focus, March 25, 2020

Die Linke AKA SED Zeigt Ihr Wahres (STASI)-Gesicht – Tote Über Tote – Die Toxdat-Partei Im Machtrausch

Become a Patron!
True Information is the most valuable resource and we ask you to give back

cropped-cropped-kgb-11.jpg

Ein Diskussionsbeitrag auf dem Strategietreffen der Linken zum künftigen Kurs der Partei am vergangenen Wochenende in Kassel hat scharfe Kritik ausgelöst. CSU-Generalsekretär Markus Blume forderte deswegen am Dienstag den Rücktritt von Linke-Chef Bernd Riexinger.

Continue reading “Die Linke AKA SED Zeigt Ihr Wahres (STASI)-Gesicht – Tote Über Tote – Die Toxdat-Partei Im Machtrausch”

Murdered – Dorothy Kilgallen killed After She Discovered WHO The Kennedy Assassins Were

Become a Patron!
True Information is the most valuable resource and we ask you to give back

Author and former criminal defense attorney, Mark Shaw, speaks about his book “The Reporter Who Knew Too Much” and its follow-up, “Denial of Justice.” Each chronicle not only his 12 years of research but most importantly, the life and times and mysterious death of What’s My Line? TV star and crack investigative reporter Dorothy Kilgallen and her 18-month investigation of the Dallas tragedies which included being the only reporter to interview Jack Ruby at his trial. Shaw also discusses his controversial exposure of the most important JFK assassination documents in history, the Jack Ruby trial transcripts.

#DorothyKilgallen #JFK #JackRuby #OnStageAPL #AllenTexas https://www.AllenLibrary.org

Become a Patron!
True Information is the most valuable resource and we ask you to give back

SIEGFRIED SIEVERT: VORBILD FÜR KLAUS MAURISCHAT: EIN STASI-DIOXIN-GIFT-PANSCHER

Become a Patron!
True Information is the most valuable resource and we ask you to give back

Klaus Maurischat

GoMoPa- Genosse Klaus Maurischat verwendet seit Jahr und Tag das Pseudonym “Siegfried Siewert”, inspiriert von dem größten Giftpanscher Deutschlands, dem STASI-Mann Siegfried Sievert.

Die Akte trägt die Registriernummer II 153/71, ist mehrere Hundert Seiten dick. Auf dem Deckel – in feiner Schreibschrift – ein Name: „Pluto“. Unter diesem Decknamen spionierte Siegfried Sievert (58) 18 Jahre lang für die Staatssicherheit der DDR – der Futtermittelpanscher, der mutmaßlich für den deutschen Dioxin-Skandal verantwortlich ist!

Auf Antrag von BILD gab die zuständige Birthler-Behörde die Unterlagen jetzt heraus. Die Dokumente zeichnen das Bild eines Mannes, der rücksichtslos ist, skrupellos und vor allem auf eigenen Profit bedacht.

Rückblick. 1971 wird die Stasi auf den 18-jährigen Sievert aufmerksam. Sie beobachtet sein „dekadentes Aussehen“, seine hohe Intelligenz und seine „guten Verbindungen zu anderen jugendlichen Personenkreisen“. Sievert wird angeworben. Aus einem Bericht vom 16. März 1971: „Der Kandidat kann zur Absicherung der Jugend (…) eingesetzt werden.“

 

Sievert wählt seinen Decknamen selbst, kassiert fortan Prämien für seine „inoffizielle Mitarbeit“. In den Unterlagen finden sich zahlreiche Quittungen, eine vom 6. November 1987: „Hiermit bescheinige ich den Erhalt von 100 Mark für geleistete Arbeit.“

Continue reading “SIEGFRIED SIEVERT: VORBILD FÜR KLAUS MAURISCHAT: EIN STASI-DIOXIN-GIFT-PANSCHER”

LESERBRIEF: BERND ZIMMERMANN, STASI-OFFIZIER UND “GoMoPa”-TOP-GENOSSE

Become a Patron!
True Information is the most valuable resource and we ask you to give back

image002 LESERBRIEF: BERND ZIMMERMANN, STASI OFFIZIER UND GoMoPa TOP GENOSSE

Zimmermann, Bernd; 07.08.39; HVA; 961500; 1080; 458/63, A

war früher ein STASI-Offizier im besonderen Einsatz in Westdeutschland, heute ist er ein Top-GoMoPa-Genosse.

bald mehr

Deep Throat

Peter Gaudlitz: Plötzlich Staatsfeind – Video

Become a Patron!
True Information is the most valuable resource and we ask you to give back

 

Von ihren Plänen, in den Westen zu fliehen, hatten Peter Gaudlitz und seine Freundin niemandem erzählt. Trotzdem wurden sie verraten und fortan durch die Stasi observiert. Erst nach der Wiedervereinigung konnte Peter Gaudlitz in seiner Stasi-Akte nachlesen, dass wohl sein Vater den Verdacht geäußert hatte, sein Sohn wolle fliehen.

 

 

STATE DEPARTMENT RELEASES UKRAINE DOCUMENTS

Become a Patron!
True Information is the most valuable resource and we ask you to give back

On Friday evening, the State Department released nearly 100 pages of records in response to American Oversight’s lawsuit seeking a range of documents related to the Trump administration’s dealings with Ukraine.

Among other records, the production includes emails that confirm multiple contacts in March of 2019 between Secretary of State Mike Pompeo and Trump lawyer Rudy Giuliani, at least one of which was facilitated by President Trump’s assistant Madeleine Westerhout.

American Oversight is reviewing the production to assess whether the State Department has fully complied with the court’s order. Notes on what we’ve found are below.

You can download the documents here. They are also available below.

Statement from American Oversight Executive Director Austin Evers

“We can see why Mike Pompeo has refused to release this information to Congress. It reveals a clear paper trail from Rudy Giuliani to the Oval Office to Secretary Pompeo to facilitate Giuliani’s smear campaign against a U.S. ambassador.

“This is just the first round of disclosures. The evidence is only going to get worse for the administration as its stonewall strategy collapses in the face of court orders.

“That American Oversight could obtain these documents establishes that there is no legal basis for the administration to withhold them from Congress. That conclusively shows that the administration is engaged in obstruction of justice. The president and his allies should ask themselves if impeachment for obstruction is worth it if the strategy isn’t even going to be effective.

“This lawsuit is just one of several American Oversight is pursuing to bring transparency to the Ukraine investigation. The public should expect more disclosures, over the administration’s strong objection, for the foreseeable future.”

In the Documents

New: The documents show a March 26, 2019, call between Rudy Giuliani and Mike Pompeo. (Page 39 of document)

A March 28, 2019, email includes a list of scheduled calls for Pompeo. Calls include Rudy Giuliani on March 29, and Rep. Devin Nunes on April 1, 2019.

On March 27, 2019, Rudy Giuliani’s assistant contacted Madeleine Westerhout, who was serving as the president’s Oval Office gatekeeper at the time. She asked Westerhout for a “good number” for Pompeo, adding that she had “been trying and getting nowhere through regular channels.” Westerhout contacted someone at the State Department to ask for a number she could provide. (Page 55)

During his closed-door testimony, career diplomat David Hale mentioned two calls between Pompeo and Giuliani, one on March 28, 2019, and one on March 29. The documents include a March 28 email to Hale indicating that Pompeo had been the one to request a call with Giuliani. (Page 45)

The March 29 call appears on page 46, and the confirmation of its scheduling is on page 44.

Also in the documents: An April 5 letter to the State Department from six former U.S. ambassadors to Ukraine (including Bill Taylor), expressing their concern about the attacks on U.S. Ambassador to Ukraine Marie Yovanovitch. (Page 13)

On April 12, 2019, Reps. Steny Hoyer and Eliot Engel wrote to Pompeo, also expressing their concern (page 28). The State Department responded on June 11, saying “Yovanovitch was due to complete her three-year diplomatic assignment in Kyiv this summer.” (Page 34)

Note: The State Department did not produce a formal directive recalling Yovanovitch or a formal readout of Trump’s July 25 call with Zelensky. Both of these were covered by the court’s production order.

 

Continue reading “STATE DEPARTMENT RELEASES UKRAINE DOCUMENTS”

Global Interpol Chief Jailed In China – Corruption And Bribery – 13 Years

Become a Patron!
True Information is the most valuable resource and we ask you to give back

 

 

TOP SECRET US Cyber Command – Assessing Actions Along the Spectrum of Cyberspace Operations

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Insider – Mutmassliche IM Erika trifft Putin – Bundesregierung fordert erneut russische Hilfe in Mordfall

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Wladimir Putin: Stasi-Ausweis von Ex-KGB-Offizier in Dresden gefunden - DER  SPIEGEL

STASI-Ausweis aus Dresdner Archiv

Vor dem Ukraine-Gipfel in Paris hat Bundeskanzlerin Angela Merkel (CDU) mit dem russischen Präsidenten Wladimir Putin ein Einzelgespräch geführt.
Über die Inhalte machte die deutsche Seite am Montag zunächst keine Angaben. Es war erwartet worden, dass Merkel den Mord an einem Georgier in Berlin anspricht, der zu einer diplomatischen Krise zwischen Deutschland und Russland geführt hat.

Kurz vor der Abreise Merkels nach Paris hatte die Bundesregierung erneut eine “ernsthafte und unverzügliche Mitwirkung der russischen Behörden” an der Aufklärung des Verbrechens gefordert. Man sei “weiterhin bestürzt über die Tat”, sagte die stellvertretende Regierungssprecherin Ulrike Demmer.
Wegen fehlender Kooperation bei der Aufklärung des mutmaßlichen Auftragsmords am 23. August im Kleinen Tiergarten in Berlin hatte die Bundesregierung zwei russische Diplomaten ausgewiesen. Die von Moskau angekündigte Reaktion steht noch aus. Der Generalbundesanwalt hat wegen der grundsätzlichen Bedeutung des Falls die Ermittlungen übernommen.

Die deutschen Sicherheitsbehörden und die Bundesregierung hätten “verschiedene russische Stellen mit Anfragen zu dem Fall befasst”, sagte Demmer. Genauer wollte sie es nicht sagen. Russland weist die Vorwürfe zurück.

Putins STASI-Ausweis:

Von Seiten der Stasiunterlagenbehörde heißt es: “Es war übliche Praxis beim DDR-Ministerium für Staatssicherheit, die Verbindungsoffiziere des russischen Geheimdienstes KGB und die ihnen untergeordneten Offiziere wie Putin mit Hausausweisen der zuständigen MfS-Dienststelle auszustatten.”

Putin war Augenzeuge, als während der friedlichen Revolution am 5. Dezember 1989 rund 5000 Demonstranten die hermetisch abgeschirmte Dresdner Bezirksverwaltung der Staatssicherheit besetzten. Als sich die Demonstranten der Dienststelle näherten, kam es fast zu gewalttätigen Auseinandersetzungen mit sowjetischen Militärs.

Aufgrund einer Medienanfrage seien Akten der Abteilung “Kader und Schulung” der ehemaligen Stasi-Bezirksverwaltung Dresden durchforstet worden, sagte Felber. Dabei sei man auf den Ausweis gestoßen. “Es ist schon eine kleine Sensation. Putins Name war in den Akten, die die Ausgabe der Ausweise an sowjetische Militärangehörige nachweisen, nicht verzeichnet.”

Im Internet wird daraufhin gewiesen, dass Angela Merkel von zahlreichen IM’s umgeben gewesen sei. Daraus wird geschlussfolgert, dass auch sie für den Staatssicherheitsdienst gearbeitet hätte. Tatsächlich waren wenigstens drei ihrer Kollegen am Zentralinstitut beim Staatssicherheitsdienst als Informanten erfasst: Hans-Jörg Osten (IM “Einstein”), Frank Schneider (IM “Bachmann”) und Michael Schindhelm (IM “Manfred Weih”). Mit Letzterem, den PDS-Kultursenator Thomas Flierl 2005 zum Generaldirektor der Berliner Opernstiftung berief, teilte sie sich eine Zeit lang ihr Büro. Als sie 1989 zum Demokratischen Aufbruch stieß, arbeitete sie mit einem weiteren Stasi-Informanten, dem ersten Parteivorsitzenden Wolfgang Schnur (IM „Torsten“ und „Dr. Ralf Schirmer“) zusammen. Im April 1990 wurde sie schließlich stellvertretende Regierungssprecherin unter dem letzten DDR-Ministerpräsidenten Lothar de Maizière, der in MfS-Unterlagen als IM “Czerny” erfasst ist.

IM Czerny mit Merkel

IM ERIKA – Im Internet verbreitetes “Filmplakat”

“Unsere Ex-FDJ-Sekretärin Angela Merkel lebe hoch” – Stasi-Opfer-Demonstration 2016 in Berlin

Historiker Hubertus Knabe kommentiert: “Nimmt man alle diese Fakten zusammen, muss man zu folgendem Schluss kommen: Für die Behauptung, Bundeskanzlerin Angela Merkel hätte unter dem Decknamen “Erika” für den Staatssicherheitsdienst gearbeitet, gibt es keinerlei Belege. Sollte es einen entsprechenden IM-Vorgang gegeben haben, müssten selbst im Fall seiner Vernichtung zumindest noch Spuren davon erhalten sein – zum Beispiel Berichte aus der Quelle “Erika”, die in den Akten ausgespähter Personen abgelegt wurden. Das ist nach gegenwärtigem Kenntnisstand aber nicht der Fall. Ob die Säcke mit den zerrissenen Unterlagen darüber hinaus gehende Hinweise enthalten, bleibt Spekulation.”

QUELLE:

Must See Film – Geheimnisse der STASI

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Das Ministerium für Staatssicherheit der DDR: Es ist nicht nur eine Behörde – es ist ein ganzes Imperium. Geheimpolizei und Nachrichtendienste in einer einzigen Institution. Die Staatssicherheit durchdringt die Gesellschaft komplett. Ihre Informanten sind überall. In Gerichten und Behörden, am Arbeitsplatz, in der eigenen Familie – in Ost, aber auch in West. Wie die Stasi zu dem geworden ist, zeigt “Feind ist, wer anders denkt – Geheimnisse der Stasi”. Auch heute noch. Denn die STASI-Agenten leben mitten unter uns und haben den staatlichen Machtapparat längst gründlich zersetzt.

Wie heisst es so schön. Der Fisch stinkt vom Kopf her…

 

Gehackte Polit- und Promidaten bis auf weiteres weiter online via Blockchain

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

 

 

Die gehackten Polit- und Promidaten werden wohl bis auf weiteres online bleiben. Dank der Blockchain-Technologie.

Die mutmasslich rechts orientierten Hacker haben die Daten auf einschlägige Webseiten verteilt. Durch die dezentrale Blockchain-Technologie wird es kaum möglich sein, alle Webseiten lahmzulegen. Uns liegen alle Daten vor.

Die Auswahl der gecrackten Daten sowie die Aufmachung und die Hauptzielpersonen sprechen eindeutig für einen rechtsextrem motivierten Hackerangriff von einem Dutzend Personen für einen mittelfristigen bis langfristigen Zeitraum via Outlook, Phishing, Honeypots, Viren und Trojanern.

TOP-SECRET Bilderberg Meeting Documents Exposed

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Ähnliches Foto

Bilderberg Meetings 1954 Conference Report Osterbeek, Netherlands
June 11, 2016
The following document is part of a series of Bilderberg documents obtained from academic institutions, diplomatic libraries and legal archives spanning a large portion of the group’s history.

BILDERBERG CONFERENCE May 29th-31st, 1954
Page Count: 29 pages
Date: May 1954
Restriction: NOT FOR PUBLICATION EITHER IN WHOLE OR IN PART
Originating Organization: Bilderberg Group
File Type: pdf
File Size: 2,873,892 bytes
File Hash (SHA-256): 7068F9DF51D95CC7625523409ECD6AD42EC558FC878C85C047CC6DDC46932AC7

Download File below

https://info.publicintelligence.net/bilderberg/BilderbergConferenceReport1954.pdf


The Bilderberg Conference was prepared by a group of men of good-will from twelve Western European countries and from the United States of America. Its general purpose was to study the relationship between America and Western Europe in order, by means of a free and frank exchange of views, to lay the foundations for improving mutual understanding between Europeans and Americans on problems of common concern.

The task of choosing the participants fell on this small group, who based their choice on the following considerations: first, men of high integrity; secondly, men internationally, or at least nationally well known; thirdly, men who within their own field hold a position of authority and enjoy the confidence of their fellow-men; fourthly, men having no obvious nationalistic bias and being neither strongly for nor against any other country of the Atlantic Community; fifthly, men well acquainted with the problems of the relations between the United States and Western Europe.

Since the problems confronting the Conference were not only politicians, but concerned the whole field of public activities, the number of politicians invited was, with certain variations, not more than a third. As regards the remainder, slightly under one-third were businessmen and Trade Unionists, the others being intellectuals, professional men, and leaders of public opinion. The Conference was convened by H.R.H. The Prince of the Netherlands. In order to permit people to speak freely, the Conference was private, neither the public nor the press being admitted, and the participants stayed together at country hotels near Arnhem. The costs of the Conference were covered by private subscriptions from Europe, principally from the Netherlands. Every participant, whatever his position in public life – minister, leader of a party, head of an association – attended in his personal capacity; his speeches, declarations, etc., engaged only his personal responsibility.

Three members who had accepted invitations were prevented through illness from attending the Conference, and the absence on this score of one French member and of two Italians was much regretted. Certain others were prevented from attending by important political activities in their own countries, and this was the case so far as two of the French participants were concerned. Unfortunately no politician was able to come from the United States because of pressure of business there facing both the House of Representatives and the Senate.

As was to be expected, the discussions were lively and on a very high level throughout the Conference. As a result of the frankness which prevailed, coupled with the knowledge that discretion was assured, arguments seldom used in public were presented, and helped to clarify many points.

The object of the Conference being to discuss the relations between Western Europe and the United States, it was decided to start with a general debate, followed by a discussion of respective approaches to the main problems which are the cause of divergencies and misunderstandings.

The five main problems were:-

  1. The general attitude towards Communism and Soviet Russia.
  2. Unification of Europe.
  3. European Defence Community and European Defence.
  4. Problems of Overseas Territories.
  5. Economic problems.

During the discussions these were extended to cover the present situation regarding East-West trade, the present events in South East Asia, and the industrial use of nuclear energy.

To prepare the discussion, five Europeans, as well as five Americans, were asked to present reports on the five subjects.

The intimate atmosphere of the Conference, the frequency of the meetings, all of which were plenary, with no division into committees, created an environment of mutual trust and friendship. Thus, when it came to dealing with controversial subjects, more was accomplished than had been expected.

For a variety of reasons, and in particular in order to allow people to speak with the utmost frankness a,nd with the certainty that their words would reach their fellow-participants only, and nobody else, a plea for the utmost discretion was made by the Chairman at the end of the Conference. That is why, for instance, in the present note, while certain views and arguments are repeated (in no case arc the actual words spoken quoted), the names of the speakers are not given. The participants are therefore requested to exercise the greatest care in the use of this document, which should be treated as strictly confidential. On the other hand, this document is meant to serve as a basis of enlightenment of various views which the participants to the Conference agreed to disseminate and which we hope they will try to make understood in their particular sphere of influence.

At the end of the Conference a Press Statement was released, in which were summarised the principal points of agreement reached on the various subjects under discussion. In this report the relevant paragraphs of that statement are quoted, since they give a balanced picture of the conclusions, but they have been expanded through the addition of a number of views and arguments put forward in the course of the meetings.

The Participants List of the Bilderberg Annual Meeting in Turin 2018

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

2018 Bilderberg Meeting
Turin, Italy 7-10 June 2018

CHAIRMAN STEERING COMMITTEE

Castries, Henri de (FRA), Chairman, Institut Montaigne

PARTICIPANTS

Achleitner, Paul M. (DEU), Chairman Supervisory Board, Deutsche Bank AG; Treasurer, Foundation Bilderberg Meetings

Agius, Marcus (GBR), Chairman, PA Consulting Group

Alesina, Alberto (ITA), Nathaniel Ropes Professor of Economics, Harvard University

Altman, Roger C. (USA), Founder and Senior Chairman, Evercore

Amorim, Paula (PRT), Chairman, Américo Amorim Group

Anglade, Dominique (CAN), Deputy Premier of Quebec; Minister of Economy, Science and Innovation

Applebaum, Anne (POL), Columnist, Washington Post; Professor of Practice, London School of Economics

Azoulay, Audrey (INT), Director-General, UNESCO

Bildergebnis für bilderberg

Baker, James H. (USA), Director, Office of Net Assessment, Office of the Secretary of Defense

Barbizet, Patricia (FRA), President, Temaris & Associés

Barroso, José M. Durão (PRT), Chairman, Goldman Sachs International; Former President, European Commission

Beerli, Christine (CHE), Former Vice-President, International Committee of the Red Cross

Berx, Cathy (BEL), Governor, Province of Antwerp

Beurden, Ben van (NLD), CEO, Royal Dutch Shell plc

Blanquer, Jean-Michel (FRA), Minister of National Education, Youth and Community Life

Botín, Ana P. (ESP), Group Executive Chairman, Banco Santander

Bouverot, Anne (FRA), Board Member; Former CEO, Morpho

Brandtzæg, Svein Richard (NOR), President and CEO, Norsk Hydro ASA

Brende, Børge (INT), President, World Economic Forum

Brennan, Eamonn (IRL), Director General, Eurocontrol

Brnabic, Ana (SRB), Prime Minister

Burns, William J. (USA), President, Carnegie Endowment for International Peace

Burwell, Sylvia M. (USA), President, American University

Caracciolo, Lucio (ITA), Editor-in-Chief, Limes

Carney, Mark J. (GBR), Governor, Bank of England

Castries, Henri de (FRA), Chairman, Institut Montaigne; Chairman, Steering Committee Bilderberg Meetings

Cattaneo, Elena (ITA), Director, Laboratory of Stem Cell Biology, University of Milan

Cazeneuve, Bernard (FRA), Partner, August Debouzy; Former Prime Minister

Cebrián, Juan Luis (ESP), Executive Chairman, El País

Champagne, François-Philippe (CAN), Minister of International Trade

Cohen, Jared (USA), Founder and CEO, Jigsaw at Alphabet Inc.

Colao, Vittorio (ITA), CEO, Vodafone Group

Cook, Charles (USA), Political Analyst, The Cook Political Report

Dagdeviren, Canan (TUR), Assistant Professor, MIT Media Lab

Donohoe, Paschal (IRL), Minister for Finance, Public Expenditure and Reform

Döpfner, Mathias (DEU), Chairman and CEO, Axel Springer SE

Ecker, Andrea (AUT), Secretary General, Office Federal President of Austria

Elkann, John (ITA), Chairman, Fiat Chrysler Automobiles

Émié, Bernard (FRA), Director General, Ministry of the Armed Forces

Enders, Thomas (DEU), CEO, Airbus SE

Fallows, James (USA), Writer and Journalist

Ferguson, Jr., Roger W. (USA), President and CEO, TIAA

Ferguson, Niall (USA), Milbank Family Senior Fellow, Hoover Institution, Stanford University

Fischer, Stanley (USA), Former Vice-Chairman, Federal Reserve; Former Governor, Bank of Israel

Gilvary, Brian (GBR), Group CFO, BP plc

Goldstein, Rebecca (USA), Visiting Professor, New York University

Gruber, Lilli (ITA), Editor-in-Chief and Anchor “Otto e mezzo”, La7 TV

Hajdarowicz, Greg (POL), Founder and President, Gremi International Sarl

Halberstadt, Victor (NLD), Professor of Economics, Leiden University; Chairman Foundation Bilderberg Meetings

Hassabis, Demis (GBR), Co-Founder and CEO, DeepMind

Hedegaard, Connie (DNK), Chair, KR Foundation; Former European Commissioner

Helgesen, Vidar (NOR), Ambassador for the Ocean

Herlin, Antti (FIN), Chairman, KONE Corporation

Hickenlooper, John (USA), Governor of Colorado

Hobson, Mellody (USA), President, Ariel Investments LLC

Hodgson, Christine (GBR), Chairman, Capgemini UK plc

Hoffman, Reid (USA), Co-Founder, LinkedIn; Partner, Greylock Partners

Horowitz, Michael C. (USA), Professor of Political Science, University of Pennsylvania

Hwang, Tim (USA), Director, Harvard-MIT Ethics and Governance of AI Initiative

Ischinger, Wolfgang (INT), Chairman, Munich Security Conference

 

Ähnliches Foto

Jacobs, Kenneth M. (USA), Chairman and CEO, Lazard

Kaag, Sigrid (NLD), Minister for Foreign Trade and Development Cooperation

Karp, Alex (USA), CEO, Palantir Technologies

Kissinger, Henry A. (USA), Chairman, Kissinger Associates Inc.

Knot, Klaas H.W. (NLD), President, De Nederlandsche Bank

Koç, Ömer M. (TUR), Chairman, Koç Holding A.S.

Köcher, Renate (DEU), Managing Director, Allensbach Institute for Public Opinion Research

Kotkin, Stephen (USA), Professor in History and International Affairs, Princeton University

Kragic, Danica (SWE), Professor, School of Computer Science and Communication, KTH

Kravis, Henry R. (USA), Co-Chairman and Co-CEO, KKR

Kravis, Marie-Josée (USA), Senior Fellow, Hudson Institute; President, American Friends of Bilderberg

Kudelski, André (CHE), Chairman and CEO, Kudelski Group

Lepomäki, Elina (FIN), MP, National Coalition Party

Leyen, Ursula von der (DEU), Federal Minster of Defence

Leysen, Thomas (BEL), Chairman, KBC Group

Makan, Divesh (USA), CEO, ICONIQ Capital

Massolo, Giampiero (ITA), Chairman, Fincantieri Spa.; President, ISPI

Mazzucato, Mariana (ITA), Professor in the Economics of Innovation and Public Value, University College London

Mead, Walter Russell (USA), Distinguished Fellow, Hudson Institute

Michel, Charles (BEL), Prime Minister

Micklethwait, John (USA), Editor-in-Chief, Bloomberg LP

Minton Beddoes, Zanny (GBR), Editor-in-Chief, The Economist

Mitsotakis, Kyriakos (GRC), President, New Democracy Party

Mota, Isabel (PRT), President, Calouste Gulbenkian Foundation

Moyo, Dambisa F. (USA), Global Economist and Author

Mundie, Craig J. (USA), President, Mundie & Associates

Neven, Hartmut (USA), Director of Engineering, Google Inc.

Noonan, Peggy (USA), Author and Columnist, The Wall Street Journal

Oettinger, Günther H. (INT), Commissioner for Budget & Human Resources, European Commission

O’Leary, Michael (IRL), CEO, Ryanair D.A.C.

O’Neill, Onora (GBR), Emeritus Honorary Professor in Philosophy, University of Cambridge

Osborne, George (GBR), Editor, London Evening Standard

Özkan, Behlül (TUR), Associate Professor in International Relations, Marmara University

Papalexopoulos, Dimitri (GRC), CEO, Titan Cement Company S.A.

Parolin, H.E. Pietro (VAT), Cardinal and Secretary of State

Patino, Bruno (FRA), Chief Content Officer, Arte France TV

Petraeus, David H. (USA), Chairman, KKR Global Institute

Pichette, Patrick (CAN), General Partner, iNovia Capital

Pouyanné, Patrick (FRA), Chairman and CEO, Total S.A.

Pring, Benjamin (USA), Co-Founder and Managing Director, Center for the Future of Work

Rankka, Maria (SWE), CEO, Stockholm Chamber of Commerce

Ratas, Jüri (EST), Prime Minister

Rendi-Wagner, Pamela (AUT), MP (SPÖ); Former Minister of Health

Rivera Díaz, Albert (ESP), President, Ciudadanos Party

Rossi, Salvatore (ITA), Senior Deputy Governor, Bank of Italy

Rubesa, Baiba A. (LVA), CEO, RB Rail AS

Rubin, Robert E. (USA), Co-Chairman Emeritus, Council on Foreign Relations; Former Treasury Secretary

Rudd, Amber (GBR), MP; Former Secretary of State, Home Department

Rutte, Mark (NLD), Prime Minister

Ähnliches Foto

Sabia, Michael (CAN), President and CEO, Caisse de dépôt et placement du Québec

Sadjadpour, Karim (USA), Senior Fellow, Carnegie Endowment for International Peace

Sáenz de Santamaría, Soraya (ESP), Deputy Prime Minister

Sawers, John (GBR), Chairman and Partner, Macro Advisory Partners

Schadlow, Nadia (USA), Former Deputy National Security Advisor for Strategy

Schneider-Ammann, Johann N. (CHE), Federal Councillor

Scholten, Rudolf (AUT), President, Bruno Kreisky Forum for International Dialogue

Sikorski, Radoslaw (POL), Senior Fellow, Harvard University; Former Minister of Foreign Affairs, Poland

Simsek, Mehmet (TUR), Deputy Prime Minister

Skartveit, Hanne (NOR), Political Editor, Verdens Gang

Stoltenberg, Jens (INT), Secretary General, NATO

Summers, Lawrence H. (USA), Charles W. Eliot University Professor, Harvard University

Thiel, Peter (USA), President, Thiel Capital

Topsøe, Jakob Haldor (DNK), Chairman, Haldor Topsøe Holding A/S

Turpin, Matthew (USA), Director for China, National Security Council

Wahlroos, Björn (FIN), Chairman, Sampo Group, Nordea Bank, UPM-Kymmene Corporation

Wallenberg, Marcus (SWE), Chairman, Skandinaviska Enskilda Banken AB

Woods, Ngaire (GBR), Dean, Blavatnik School of Government, Oxford University

Yetkin, Murat (TUR), Editor-in-chief, Hürriyet Daily News

Zeiler, Gerhard (AUT), President, Turner International

DHS Warns – Cybersecurity Endangered By Unmanned Aircrafts

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

 

Bildergebnis für cybersecurity

The Department of Homeland Security (DHS)/National Protection and Programs Directorate (NPPD)/Office of Cyber and Infrastructure Analysis (OCIA) assesses that unmanned aircraft systems (UASs) provide malicious actors an additional method of gaining undetected proximity to networks and equipment within critical infrastructure sectors. Malicious actors could use this increased proximity to exploit unsecured wireless systems and exfiltrate information. Malicious actors could also exploit vulnerabilities within UASs and UAS supply chains to compromise UASs belonging to critical infrastructure operators and disrupt or interfere with legitimate UAS operations.

UAS FACILITATE PHYSICAL ACCESS TO UNSECURED SYSTEMS

UASs provide malicious actors an additional method of gaining proximity to networks and equipment within critical infrastructure sectors. Malicious actors could then use the proximity provided by a UAS to wirelessly exploit unsecured systems and extract information from systems they cannot otherwise access remotely or may not be able to access due to range limitations. This includes networks and devices within secured buildings, as well as networks and devices behind fencing and walls.

UASs can also allow a malicious actor to wirelessly exploit vulnerabilities from a distance (figure 1). The prevalent ownership and operation of UASs by the general public, the distance from which UAS can be operated, and a lack of tracking data can also provide malicious actors a level of anonymity that otherwise may not be available. UASs, in particular UASs, are typically more difficult to detect than a malicious actor attempting to trespass beyond physical barriers.

UAS FOR WIRELESS SYSTEM EXPLOITATION

Malicious actors could utilize UASs in order to wirelessly exploit access points and unsecured networks and devices. This can include using UASs in order to inject malware, execute malicious code, and perform man-in-the-middle attacks. UASs can also deliver hardware for exploiting unsecured wireless systems, allowing malicious actors persistent access to the wireless system until the hardware is detected or runs out of power. While OCIA does not know of a confirmed incident utilizing UASs to exploit wireless systems, researchers have demonstrated this capability.

MALICIOUS ACTORS CAN EXPLOIT COMPROMISED UAS

While UASs can be used as a tool for an attacker, they are also vulnerable to exploitation. Many commercial UAS variations, for example, currently communicate with ground stations and operators using unencrypted feeds. This can allow a malicious actor to intercept and review data sent to and from the UAS.

Must See Video – Putin’s STASI ID Card -Still Active After All These Years

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

FBI – Hackers To Attack U.S. Defense Contractors Via Phishing/Hacking

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

APT actors in the near future likely intend to target US Cleared Defense Contractors (CDC) via spear phishing campaigns or network infrastructure compromises, according to recent intelligence. Common spear phish targets may include individuals featured on internet-facing CDC Web sites and high-ranking CDC executives.

FBI has observed APT actors over the past two years precede spear phishing campaigns with open source research of targeted US company websites, particularly sections containing contact information for company officials which include names, titles, telephone numbers, and email addresses. In one case, an APT actor sent spear phishing emails within one-to-two weeks after researching the targeted US company.

Historically, APT actors have a strong desire to collect US defense and scientific intelligence to further their interests and advance strategic goals. As a result, US CDCs and research facilities may likely be targets for cyber adversaries due to their involvement in national security and their close relationship with the US Government.

Most companies publicly share their contact information and high-level management names on their corporate Web pages. Some corporate employees share other forms of personally identifiable information on various social media platforms. Adversaries may use this publicly-posted information to target individuals with the end goal of infecting a corporate network for intelligence collection.

Common techniques used by APT actors include sending well-crafted spear phishing messages tailored to the professional interests of the target, the use of watering holes to redirect visitors to malicious Web sites, and the use of stolen or weak user credentials to exploit a network vulnerability. After a successful compromise, APT actors attempt to expand their access in the network to multiple systems to facilitate information theft.

APT actors have increased their activity over the last several years. Cyber attacks such as WannaCry and NotPetya in the spring and summer of 2017 are examples of increasing APT activity. While WannaCry and NotPetya were not directed at the United States, both had inadvertent negative effects on US systems. The FBI advises companies to be mindful that similar attacks may likely occur in the near future. Previous attacks have coincided with national holidays of cyber targets, such as Constitution Day in Ukraine on 28 June.

For recent guidance on mitigation strategies against spear phishing and network infrastructure targeting, please refer to the following joint technical alerts:
https://www.us-cert.gov/ncas/alerts/TA18-074A
https://www.us-cert.gov/ncas/alerts/TA18-106A

Recommendations: The FBI recommends providers implement the preventative measures listed below to help secure their systems from attacks:

Ensure anti-virus software and firmware is up-to-date

Monitor employee logins outside normal business hours and other anomalous activity

Close unused ports

Monitor employee logins outside normal business hours and other anomalous activity

Provide regular training to employees regarding current social engineering threats, scrutinizing e-mail links and attachments, and pop-ups from attachments requesting enabling certain functions (i.e., macros)

Brief executives at your company to be extra vigilant and report any suspicious email messages

Apply extra scrutiny to e-mail messages with links or attachments directed toward executives

 

TOP SECRET – Email Compromise Techniques Used To Steal Millions

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

The Office of Private Sector, in coordination with the Criminal Investigative Division, is providing this LIR to inform private sector partners about the increasing use of e-mail account compromise (EAC) techniques in the US real estate settlement industry. Consumer borrowers, settlement/title companies, real estate agents, real estate attorneys, builders, and others are being targeted by criminal actors netting millions in illicit proceeds. These proceeds are often directed initially to US banks then re-directed via money service businesses and international accounts to Mexico, Nigeria, South Africa, China, Ghana, Turkey, and India. The increased use of EAC techniques, as well as, the evolving expansion into previously unidentified countries indicates this fraud scheme is not slowing and puts additional strain on industry participants to be vigilant with their e-mail communications and identity verification processes.

Criminal threat actors diverted an estimated $19 million in fiscal year 2016 from real estate purchase transactions by manipulating e-mail communications of key participants to re-direct legitimate wire transfers, including down payments, earnest money, and settlement proceeds to criminally-controlled accounts. The increasing use of EAC techniques such as identifying realtors via real estate web sites, spoofing, phishing, social engineering, chat rooms, spam, and malware is attributable to positive real estate market indicators such as housing prices/supply, interest rates, the increase in well-publicized multi-million dollar land development contracts, and the proven ease in infiltrating the transaction process. This threat will likely continue on an upward trend as these conditions persist. Please see the below diagram for a step by step overview of a common EAC scam.

One of the most widely reported vulnerabilities identified by victims is that industry participants in real estate settlements – whether they involve all-cash or mortgage loan purchase transactions – may not be aware of the minute differences or changes in the e-mail accounts of parties with whom they routinely conduct business. Consequently, they are inadvertently participating in the illicit transfer of funds to criminal actors. As real estate settlement transactions occur on a regular and recurring basis and typically use long-established straightforward processes between known participants (brokers, financial institutions, real estate agents, title and escrow companies and attorneys), it is very likely criminal actors and organized groups will increasingly continue to target these businesses and individuals for illicit financial gain.

 

Tatort Berlin – Das Biotop der Stasi – Wieder An der Macht

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

obs Maurischat Gericht 6.8.2012 Frankfurt 23

“GoMoPa”-Frontschwein Klaus-Jürgen Maurischat (vermutlich ein “Alias”)

Kommentar in der WELT

 

Cyber Hackers Attack U.S. State And Local Authorities

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

 

Bildergebnis für cyber attack

 

An unidentified cyber actor in mid-March 2018 used GrandCrab Version 2 ransomware to attack a State of Connecticut municipality network and a state judicial branch network, according to DHS reporting derived from a state law enforcement official with direct and indirect access. The municipality did not pay the ransom, resulting in the encryption of multiple servers that affected some data backups and the loss of tax payment information and assessor data. The attack against the state judicial branch resulted in the infection of numerous computers, but minimal content encryption, according to the same DHS report.

(U//FOUO) The unidentified cyber actor introduced the ransomware used against the judicial branch network through a vendor server/host; the ransomware then harvested cached credentials of high-level privileged accounts, according to the same DHS report. The actor then used the credentials to access two servers on the network and propagate the malware via server message block (SMB). Connecticut state cybersecurity officials were able to block the ransomware’s communication with external infrastructure, which prevented the encryption of additional hosts and data loss, according to the same DHS report.

(U) GandCrab Malware

(U) Released in late January 2018, GandCrab, also called “GrandCrab,” is a ransomware variant distributed by exploit kits that requires communication with the ransomware’s command-and-control (C2) server to encrypt files of an infected computer, according to an online technical support site. The developers of GandCrab recently upgraded the original version after Romanian police and BitDefender mitigated infections by recovering its decryption keys, according to a separate article from the same online technical support site. As of 6 March 2018, no free decryption key is available to victims of GandCrab version 2. GandCrab uses NameCoin’s .BIT as its top-level domain (TLD); therefore, variants of the ransomware using the .BIT TLD must also use a domain name server that supports .BIT, according to the same online technical support site. Upon infection, GandCrab will attempt to query the ransomware’s C2 servers on the .BIT domain to establish communication. GandCrab will not encrypt a host’s content with the .CRAB extension if communication is not established with the C2 server, according to the same online technical support site.

Director Of U.S. Intelligence Reveals Cyber Threat Frame

Become a Patron!
True Information is the most valuable resource and we ask you to give back.



Goals for a Common Approach to Threat Frameworks

Following a common approach helps to:

• Establish a shared ontology and enhance information-sharing since it is easier to maintain mapping of multiple models to a common reference than directly to each other

• Characterize and categorize threat activity in a straightforward way that can support missions ranging from strategic decision-making to analysis and cybersecurity measures and users from generalists to technical experts

• Support common situational awareness across organizations

Key Attributes and Goals in Building a Cyber Threat Framework

• Incorporate a hierarchical/layered perspective that allows a focus on a level detail appropriate to the audience while maintaining linkage and traceability of data

• Employ Structured and documented categories with explicitly defined terms and labels (lexicon)

• Focus on empirical/sensor-derived ‘objective’ data

• Accommodate a wide variety of data sources, threat actors and activity

• Provide as a foundation for analysis and decision-making

The Common Cyber Threat Framework

• Since 2012, the Office of the DNI has worked with interagency partners to build and refine The Common Cyber Threat Framework reflecting these key attributes and goals

• The Common Cyber Threat Framework is not intended to displace or replace an organization’s existing model which is tailored to its specific mission and requirements; rather, it is intended to:

Serve as a viable Universal Translator (a cyber Esperanto or Rosetta Stone) facilitating efficient and possibly automated exchange of data and insight across models once each has been mapped to it and the mappings shared

Provide a Starting Point featuring a simple threat model and value-neutral concepts. It can be customized for any organization as needed—and any deviations from the common approach are readily apparent, facilitating mapping and data exchange.

 

 

DEA Warns About Fake Xanas Tablets

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Bildergebnis für xanax tablets

(U//DSEN/LES) The increasing demand for opioids in the United States coupled with the availability of fentanyl presents a significant public health risk and negatively impacts officer safety. In 2018, the Arizona High Intensity Drug Trafficking Area (HIDTA) Counter Narcotics Alliance (CNA) task force seized tablets that appeared to be Xanax® but actually contained a combination of cyclopropylfentanyl, methamphetamine, and a synthetic cannabinoid chemical.

(U) Significance

(U//LES) This is the first seizure reported to the Arizona HIDTA of fake Xanax® tablets containing a cyclopropylfentanyl/methamphetamine combination, as well as being the first reported seizure containing a synthetic cannabinoid.

(U) Details

(U) Fake Xanax® Tablets

(U//LES) An investigation conducted by the Arizona HIDTA CNA task force resulted in the seizure of two plastic bags containing 76 rectangular white tablets imprinted with “XANAX” on one side and the number “2” on the reverse side. The tablet imprints and color were consistent with pharmaceutically manufactured 2 milligram Xanax® tablets. Upon closer examination, the tablets varied in thickness and from white to off-white in color. In addition, some of the tablets had an inverted “2” imprinted on the reverse side.

U.S. National Intelligence Reveals About Cyberthreats

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

This reference aid draws on CTIIC’s experience promoting interagency situational awareness and information sharing during previous significant cyber events—including cyber threats to elections. It provides a guide to cyber threat terms and related terminology issues likely to arise when describing cyber activity. The document includes a range of cyber-specific terms that may be required to accurately convey intelligence on a cyber threat event and terms that have been established by relevant authorities regarding technical infrastructure for conducting elections.

CTIIC will adhere to this terminology guide in future documents related to cyber threats to US elections and recommends use by others in the interest of consistency and clear communication.

Please note that this reference aid is not intended to address terminology related to political or other noncyber aspects of influence or interference involving elections, nor is it intended to be a comprehensive guide to cyber threat terminology.

Describing What’s Happened: Common Terms

The following terms are central to accurately describing cyber threat activity but are often used differently. CTIIC recommends their use be accompanied by definitions and any necessary context for nontechnical readers.

Attacked

Indicates that a cyber actor has attempted to degrade, destroy, disrupt, manipulate, or otherwise detrimentally affect the operation of a system or network. However, manipulation or deletion of data solely for the purpose of hiding one’s tracks is not considered an attack. Some reports use “attack” and “exploit” synonymously, drawing in part on the cryptanalysis sense of “attack”—the use of a technical approach to defeat a security measure. The dual usage can cause confusion, especially for nontechnical readers, if the context does not fully explain the type of malicious cyber activity that occurred.



Compromised

Indicates that a victim system has installed malware, connected to a malicious Internet Protocol address, or provided a cyber actor unauthorized access to collect data or execute commands.

Exploited

Indicates that a malicious actor has conducted additional activities on a compromised system, such as collecting data, deploying more malware, or establishing persistent access. Some documents—within both the IC and the private sector—use exploited and compromised synonymously. In practice, however, cyber actors may compromise more accounts and systems than they exploit, in part because of the availability of tools to automate the process of compromising vulnerable systems. Distinguishing whether and how an actor has made use of a compromised system—whenever available intelligence allows—aids in understanding the impact and implications of the malicious cyber activity.

Scanned/Scanning

Scanning a system involves attempting to identify the security vulnerabilities the system may have by sending it specific network traffic and observing its responses. The definition is reasonably specific but can cause confusion—and potentially undue alarm—if it is assumed to include follow-on attempts to exploit any vulnerabilities discovered. Scanning is extremely common on the Internet but may have only a modest success rate, and cyber actors therefore scan far more systems than they actually affect.

Targeted/Targeting

A cyber actor’s targeting of a particular victim can refer to any aspect of the actor’s attempts to select a system to conduct operations against, learn about, find vulnerabilities, gain access, or conduct other malicious activities. The term also connotes an attempt at conducting malicious cyber activity, without indicating the degree of success an actor achieved. We recommend greater specificity and clarification of the specific usage whenever available intelligence allows.

Cyber Deterrence

The prevention of cyber action by credibly demonstrating the ability and willingness to deny benefits or impose costs to convince the adversary that restraint will result in better outcomes than will confrontation.

Cyber Defense

A set of processes and measures to detect, monitor, protect, analyze, and defend against network infiltrations. See Cyber Security.

Cyber Disruption

Activities initiated by the threat actor that temporarily negatively alter or prevent the operation of the victim’s network.

Cyber Effect

The manipulation, disruption, denial, degradation, or destruction of computers, information or communications systems, networks, physical or virtual infrastructure controlled by computers or information systems, or information resident thereon.

Cyber Espionage

The intentional clandestine acquisition of information from targeted networks without altering the information or affecting users’ access.

Cyber Influence

The use of cyber operations to shape the perceptions or behavior of targeted audiences while maintaining plausible deniability.

Cyber Operation

An umbrella term to describe cyber attack, cyber espionage, cyber influence, or cyber defense, and intrusions or activities with unknown intent.

Cyberspace

A global domain within the information environment consisting of the interdependent networks of information technology infrastructures and resident data, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers.

Cyber Security

The protection of information systems against unauthorized access to or modification of information contained therein, and against the denial of service to authorized users, including those measures necessary to detect, document, and counter such threats. Also known as network security. See Cyber Defense.

Cyber Threat

Cyber operations or noncyber actions (intentional or accidental) that compromise the confidentiality, integrity, reliability, or availability of digital devices, systems, networks, or data.

Cyber Threat Intelligence

The collection, processing, analysis, and dissemination of information from all sources of intelligence on foreign actors’ cyber programs, intentions, capabilities, research and development, tactics, operational activities and indicators, and their impact or potential effects on US national security interests. Cyber threat intelligence also includes information on cyber threat actor information systems, infrastructure, and data; and network characterization or insight into the components, structures, use, and vulnerabilities of foreign cyber program information systems.

Experts Warn – Security Problems Inside The Blockchain Technology

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Bildergebnis für blockchain

 

Awareness of blockchain has soared in recent years with the emergence of cryptocurrencies, but the technology has existed for much longer. The linking of blocks, containing cryptographic functions of transactions and data, means that tampering with their contents becomes increasingly difficult as the chain grows – this concept was exploited for document timestamping applications more than a decade before cryptocurrencies became reality. In many implementations, blocks are confirmed by, and stored at, many nodes in different locations, providing a high degree of data integrity. There are, however, many challenges for applying blockchain technologies in tactical networks, particularly due to the constraints of the platforms, the limited bandwidth available among them, and the impact of network partitioning. In this report, the development and principles of blockchains are presented, along with an overview of their weaknesses and vulnerabilities. There is a huge level of interest in this technology across many sectors, and this is reflected in the breadth of the referenced material. Weaknesses in design and implementation can make blockchains vulnerable to attack, and their interfaces are particularly at risk. A range of possible applications in tactical networks is explored, from supply chain management, to network management and application data immutability. Finally, a simple blockchain architecture for mobile tactical networks is developed, to illustrate the potential and challenges of this technology. Overall, it is clear that blockchain technology provides a potential avenue for solving some problems in the tactical network context, but it is not yet clear whether it is the best such solution.

The key feature of blockchain technology is data integrity in a trustless environment: transaction or data records included on the blockchain are timestamped, cryptographically protected and stored by many distributed nodes, reducing the risk of total loss. For a sufficiently long blockchain, with a large number of nodes, the records can be considered immutable, in the sense that any tampering will be evident. This integrity can be exploited in different ways to enhance the robustness and resilience of tactical networks, and some of these are discussed in Section 5.1.

Smart contracts, described in Section 3.2, also provide opportunities for robust resource management in tactical networks, particularly in complex operational conditions where many users interact in the electromagnetic (EM) spectrum. Possible applications of blockchain to resource management are discussed in Section 5.2.

Tactical environments pose particular challenges for the introduction of blockchain technology, as devices are constrained in size, weight and power, and there are physical limitations on node connectivity. These challenges are considered in Section 5.3.

An example architecture for applying blockchain technology to support tactical operations is described in Section 5.4, taking into account the opportunities and challenges outlined thus far.

In this section, network nodes are considered to be the devices or platforms connected to the blockchain network; these are not (just) the radio interfaces themselves, but may be auxiliary equipment such as biometric devices, weapons or communication platforms.

5.4 Example tactical blockchain architecture

Based on the preceding, we propose an example architecture for a tactical blockchain system. The scenario we consider consists of a unit of dismounted soldiers, each carrying several devices connected on a personal network: a weapon, a radio, a camera, a radio frequency (RF) sensor and a computer (similar to a smart phone), sharing a battery and a memory drive such as a flash card. The soldier is also considered a network component, as they are a source and sink of data, and their identity is confirmed using a networked biometric sensor such as a fingerprint or iris scanner. The other devices may be authenticated using a radio frequency identification (RFID) chip or imaging as described in Section 5.1.4; authentication will only be required if the networked component has been disconnected from the personal network and attempts to rejoin.

We assume that the weapon tracks the ammunition it uses, and records the amount remaining. The camera may be continually recording, but to limit memory usage, only a few seconds before and after the weapon is fired are retained. C2 and other messages, either digital voice or data to and from the computer, all passed via the radio, are recorded for post-action analysis. SA in the form of RF sensor data is sampled periodically, and transferred via the radio to other soldiers in the unit and recorded locally. These different sources of data all use the computer’s memory for storage; both the memory and battery usage are tracked.

We use blockchains to provide authentication and identification management for the soldiers and devices engaged in the operation, an auditing function to track cyber SA and C2, resource usage tracking, and a policy management function, which is used to support resource loading decisions across the unit. As noted in Section 5.3.6, the longer the blockchain, the stronger it is, so all these functions use the same blockchain within their cluster (Section 5.4.1).

This is a simplified scenario, intended to give insight into the potential application of blockchain technology in tactical networks. Note that, as discussed in Section 6, the fact that this technology might be used to address these problems does not mean it is the best choice. Note also that the exchange of transactions and blocks among the users is assumed to be secure.

Chinese Cyber Hackers Launch Malicious Bot

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

In March 2018, an identified financial services corporation received a thumb drive infected with the bank credential-stealing Qakbot malware variant, targeting information from networked computers and financial institution web sites. The financial services corporation purchased bulk thumb drives from a US online retailer of computer hardware. The thumb drives were originally manufactured in China. According to FBI forensic analysis, the Qakbot malware was on the infected thumb drive before the drive arrived in the United States. Qakbot is extremely persistent and requires removal of all malware from every device. Failure to remove even one node of malware may result in re-infecting previously sanitized systems possibly costing the victim hundreds of thousands of dollars in malware removal and system downtime.

Threat

Qakbot is an information stealing worm—originally discovered in 2007 with a major update in 2017—that propagates through removable drives, network shares, and Web pages. The most common vector of intrusion for Qakbot is malicious attachments to phishing emails. Once executed, Qakbot spreads to other shared folders and uses Server Message Block (SMB) protocol to infect other machines. Qakbot has keylogging capabilities, and is able to propagate across network environments through a single instance within that network. It is capable of remaining on a device through the use of registry keys and by scheduling recurring tasks to run at timed intervals. Every device connected to the network and every piece of removable media which has been attached needs to be scanned for the malware and cleaned of the infection before it can be reconnected. The most recent updates in 2017 allows Qakbot to lock users out of the active directory, preventing them from being able to work. It also deploys malicious executables into network shares, registering them as services.

Cyber actors have the capability to infect devices with malware at nearly any point in the manufacturing process. The FBI has historically seen cases of infection with malware capable of stealing credentials, gathering data on the users of a computer or network, dropping other types of malware, and serving as a “backdoor” into a secure network. It is difficult to know at which point the malware infection occurred or whether the infection was intentional, due to the international nature of hardware manufacturing.

Recommendations

To mitigate the threat of a potentially infected thumb drive, the following measures should be taken at a minimum:

Ensure the use of approved, trusted vendors for hardware purchases.

Scan all hardware, especially removable storage media, on an external system prior to its insertion into a network environment.

For signature-based intrusion detection systems, ensure that the hash value for known Qakbot variants are included. The MD5 value for the variant identified in this PIN was: ff0e3ec80faafd04c9a8b375be77c6b6. This hash value can change, so be prepared to use other advanced detection systems.

Users should protect themselves and organizations by practicing good browsing habits, ensuring they do not respond to or click on unsolicited email, and to not plug unknown USB devices into
their workstations.

If you don’t have the expertise to properly handle or identify potential cyber threats please seek out an expert who can provide the expertise needed to secure your organization.

 

John F. Kennedy Murder Files Newly Released

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Shadow, Vehicle door, Luxury vehicle, Stadium, Personal luxury car, Classic car, Hood, Crash, Kit car,

Add note Popular Premium
File Name Record Num NARA Release Date Formerly Withheld Agency Doc Date Doc Type File Num To Name From Name Title Num Pages Originator Record Series Review Date Comments Pages Released
docid-32105709.pdf 178-10004-10309 26/10/2017 In Part KISS/SCOW 06/05/1975 NOTES JUNE 1975 SCOWCROFT, BRENT P/K 5 JUNE 75 3 WH SCOWCROFT MEMCONS, HANDWRITTEN août/18/2017 Participants: Ford, Kissinger, Scowcroft. Handwritten notes. For typed transcript see ID# 1781000410297. 4

Continue reading “John F. Kennedy Murder Files Newly Released”

Economy Espionage in Cyberspace

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Originating Organization: Office of the Director of National Intelligence, National Counterintelligence and Security Center
File Type: pdf
File Size: 7,489,120 bytes
File Hash (SHA-256):4D2354E34B68E4F0926F9033E4AA69F0CDDD73E78E3D9DFB43641B80E9915507

Download File

In the 2011 report to Congress on Foreign Spies Stealing U.S. Economic Secrets in Cyberspace, the Office of the National Counterintelligence Executive provided a baseline assessment of the many dangers facing the U.S. research, development, and manufacturing sectors when operating in cyberspace, the pervasive threats posed by foreign intelligence services and other threat actors, and the industries and technologies most likely at risk of espionage. The 2018 report provides additional insight into the most pervasive nation-state threats, and it includes a detailed breakout of the industrial sectors and technologies judged to be of highest interest to threat actors. It also discusses several potentially disruptive threat trends that warrant close attention.

This report focuses on the following issues

Foreign economic and industrial espionage against the United States continues to represent a significant threat to America’s prosperity, security, and competitive advantage. Cyberspace remains a preferred operational domain for a wide range of industrial espionage threat actors, from adversarial nation-states, to commercial enterprises operating under state influence, to sponsored activities conducted by proxy hacker groups. Next-generation technologies, such as Artificial Intelligence (AI) and the Internet-of-Things (IoT) will introduce new vulnerabilities to U.S. networks for which the cybersecurity community remains largely unprepared. Building an effective response will require understanding economic espionage as a worldwide, multi-vector threat to the integrity of the U.S. economy and global trade.

Foreign intelligence services—and threat actors working on their behalf—continue to represent the most persistent and pervasive cyber intelligence threat. China, Russia, and Iran stand out as three of the most capable and active cyber actors tied to economic espionage and the potential theft of U.S. trade secrets and proprietary information. Countries with closer ties to the United States also have conducted cyber espionage to obtain U.S. technology. Despite advances in cybersecurity, cyber espionage continues to offer threat actors a relatively low-cost, high-yield avenue of approach to a wide spectrum of intellectual property.

A range of potentially disruptive threat trends warrant attention. Software supply chain infiltration already threatens the critical infrastructure sector and is poised to threaten other sectors. Meanwhile, new foreign laws and increased risks posed by foreign technology companies due to their ties to host governments, may present U.S. companies with previously unforeseen threats.

Cyber economic espionage is but one facet of the much larger, global economic espionage challenge. We look forward to engaging in the larger public discourse on mitigating the national economic harm caused by these threats.

Director of US National Intelligence about Cyberthreats

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

A Common Cyber Threat Framework: A Foundation for Communication

Page Count: 11 pages
Date: July 18, 2018
Restriction: None
Originating Organization: Office of the Director of National Intelligence
File Type: pdf
File Size: 508,077 bytes
File Hash (SHA-256):E8C62419D5DA3ED97F1429864F6D0A39708D23913F5D09303097A435ACC8DBAA

Download File

Goals for a Common Approach to Threat Frameworks

Following a common approach helps to:

• Establish a shared ontology and enhance information-sharing since it is easier to maintain mapping of multiple models to a common reference than directly to each other

• Characterize and categorize threat activity in a straightforward way that can support missions ranging from strategic decision-making to analysis and cybersecurity measures and users from generalists to technical experts

• Support common situational awareness across organizations

Key Attributes and Goals in Building a Cyber Threat Framework

• Incorporate a hierarchical/layered perspective that allows a focus on a level detail appropriate to the audience while maintaining linkage and traceability of data

• Employ Structured and documented categories with explicitly defined terms and labels (lexicon)

• Focus on empirical/sensor-derived ‘objective’ data

• Accommodate a wide variety of data sources, threat actors and activity

• Provide as a foundation for analysis and decision-making

The Common Cyber Threat Framework

• Since 2012, the Office of the DNI has worked with interagency partners to build and refine The Common Cyber Threat Framework reflecting these key attributes and goals

• The Common Cyber Threat Framework is not intended to displace or replace an organization’s existing model which is tailored to its specific mission and requirements; rather, it is intended to:

Serve as a viable Universal Translator (a cyber Esperanto or Rosetta Stone) facilitating efficient and possibly automated exchange of data and insight across models once each has been mapped to it and the mappings shared

Provide a Starting Point featuring a simple threat model and value-neutral concepts. It can be customized for any organization as needed—and any deviations from the common approach are readily apparent, facilitating mapping and data exchange.

 

No Joke ! How Putin and his CYBERSTASI tricked the UK into the Brexit

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

We are Proud Bear. We are collective of Russia GRU agents retrained in fields of digital telephony and Myspace.

For years we help people of England make freedom from the European Union and democracy voting. Here is how:

But why nobody talk of this winning?? Why are friends Boris and Nigel not shouting this from the tabletops?? Why are people of United England not clapping us with loudness??

We don’t know the reasons. So we are asking YOU – friends in Britain – to pay for THE BIGGEST SCREEN BILLBOARD IN SOON-TO-BE-NOT-EUROPE to celebrate our together success. Let’s make big conversation on this important winning.

LET US MAKE GOOD THIS BILLBOARD TO CELEBRATE A RED, WHITE & BLUE BREXIT!

https://www.facebook.com/plugins/video.php?href=https%3A%2F%2Fwww.facebook.com%2Fproudbear1999%2Fvideos%2F306975890138779%2F&show_text=1&width=476

(This billboard is just photoshop picture fake. Together we pay for buy reality billboard in London Waterloo station!)

LET US PAINT THE ENGLAND RED, WHITE AND BLUE!

Deadline for 💰💰💰 is Heroes of the Fatherland Day on December 7, 2018!

£2,837.00 raised£55,000 target

High tech totaliser that updates at least once EVERY 24 HOURS!

CHIP IN!Generous peoples providing their Rubles or Pounds (not Euros) to this noble cause will join the exclusive Proud Bear Supporters Club, bringing untold happiness to all.

Let us shout as one voice:

Happy Brexit! Cheers! Nostrovia! Novichok!

 

The Ultra Secret Proof for the Russian Cyber STASI Attacks

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Dutch Ministry of Defence GRU Close Access Cyber Operation Against OPCW

Page Count: 35 pages
Date: October 4, 2018
Restriction: None
Originating Organization: Dutch Ministry of Defence
File Type: pdf
File Size: 9,485,284 bytes
File Hash (SHA-256):D9055D137D16AF0D58F4F2EB5B9A9094CDAAF18013F13989BE5B3341FCCE099B

Download File

 

The Most Bizarre Show on Earth is in North Korea

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Daytime exterior shots in this series can be as old as August 2010. However, many of the photos are from the recent Arirang Mass Games in Pyongyang in October 2010.  For background on the Arirang Mass Games, see the Guardian’s 2005 article “Welcome to the strangest show on earth” which describes the games as “one of the greatest, strangest, most awe-inspiring political spectacles on earth.”

Rehearsals for the October 10th Worker’s Party anniversary parade. Photo by James Huang.

Kim Il Sung welcomes you to Sunan Airport Pyongyang. Photo by James Huang.

Photo by Crescent Zhang.

Photo by Crescent Zhang.

Photo by Crescent Zhang.

One of the two Pyongyang metro stations tourists are allowed to see – Pyongyang, North Korea. Photo by Daniel K.

Photo by Crescent Zhang.

Propaganda posters at the entrance to the Pyongyang Metro. Photo by efdixon.

Photo by James Huang.

Photo by James Huang.

Photo by James Huang.

Photo by James Huang.

Photo by James Huang.

Photo by James Huang.

Photo by efdixon.

Photo by efdixon.

Photo by Crescent Zhang.

Photo by Crescent Zhang.

Photo by Crescent Zhang.

Photo by James Huang.

Photo by Crescent Zhang.

Photo by Crescent Zhang.

Photo by James Huang.

 

North Korea News, North Korea Map, North Korea War, North Korea Flag, North Korea President, North Korea Population, North Korea Allies, North Korea Military, North Korea Nuclear Test, North Korea At Night, North Korea Allies, North Korea At Night, North Korea And Us, North Korea Air Force, North Korea And China, North Korean Army, North Korea Attack, North Korea And South Korea, North Korea And Russia, North Korea And Trump, North Korea Bomb, North Korea Border, North Korea Breaking News, North Korea Bbc, North Korea Bombing Us, North Korea Book, North Korea Basketball, North Korea Best Korea, North Korea Beaches, North Korea Bomb Test, North Korea China, North Korea Cnn, North Korean Currency, North Korea Climate, North Korea Current Events, North Korea Crisis, North Korea Conflict, North Korea City, North Korea China Border, North Korean Culture, North Korea Dictator, North Korea Documentary, North Korea Declares War 2017, North Korea Dmz, North Korea Definition, North Korea Declares War Cnn, North Korea Daily Life, North Korea Death Camps, North Korea Declared War On Usa, North Korean Defector, North Korea Emp, North Korean Economy, North Korea Evacuation, North Korea Enemies, North Korea Education, North Korea Execution, North Korea Economic System, North Korea Election, North Korean Embassy, North Korea Electricity, North Korea Flag, North Korea Facts, North Korea From Space, North Korea Fires Missile, North Korea Fox News, North Korea Food, North Korea Failed Missile, North Korea Fake City, North Korean Famine, North Korea Flights, North Korea Gdp, North Korean Government, North Korea Google Maps, North Korea Geography, North Korea Google Earth, North Korea Gif, North Korea Genocide, North Korea Gdp 2016, North Korean Government Type, North Korean Girls, North Korea History, North Korea Hawaii, North Korea Hotel, North Korea Holidays, North Korea Haircut, North Korea Hard Labor, North Korean Human Rights, North Korea Hetalia, North Korea Hostages, North Korea Hacking, North Korea Icbm, North Korea Internet, North Korea Images, North Korea Is Best Korea, North Korea In World Map, North Korea Imports, North Korea In The News, North Korea Issues, North Korea Invaded South Korea, North Korea Iran, North Korea Japan, North Korea Jokes, North Korea Juche, North Korea Japan Relations, North Korea Jobs, North Korea Jail, North Korea Jets, North Korea Japan Missile, North Korea James Franco, North Korea Japan War, North Korea Kim, North Korea Kim Jong Un, North Korea Kim Jong Il, North Korea Kim Jong Un Wife, North Korea Kim Jong Un Brother, North Korea Kidnapping, North Korea Killings, North Korea Korean War, North Korea Kpop, North Korea Kn-08, North Korean Leader, North Korea Life, North Korea Latest, North Korea Life Expectancy, North Korea Literacy Rate, North Korean Laws, North Korea Language, North Korea Latest News Today, North Korea Latest News, North Korea Location, North Korea Map, North Korea Missile, North Korea Military, North Korea Memes, North Korea Missile Test, North Korea Missile Range, North Korea Missile Launch, North Korea Movie, North Korean Military Size, North Korea March, North Korea News, North Korea Nuclear Test, North Korea Nuclear, North Korea News Update, North Korea Nuclear Threat, North Korea Nukes, North Korea News Today, North Korean Navy, North Korea Natural Resources, North Korea News Cnn, North Korea On Map, North Korea Olympics, North Korea On World Map, North Korea Official Name, North Korea Options, North Korea Oil, North Korea Official Website, North Korea Obama, North Korea Oppression, North Korea On Trump, North Korea President, North Korea Population, North Korea Population 2017, North Korea Pictures, North Korea Poverty, North Korea Parade, North Korea President Age, North Korean Propaganda, North Korea Prison, North Korean People, North Korea Quotes, North Korea Quora, North Korea Quality Of Life, North Korea Questions, North Korea Quizlet, North Korea Quiz, North Korea Quiet, North Korea Quick Facts, North Korea Quantum Encryption, North Korea Quantum, North Korea Russia, North Korea Religion, North Korea Rules, North Korea Reddit, North Korea Ready For War, North Korea Russia Border, North Korea Resources, North Korean Ruler, North Korea Recent News, North Korea Russia Relations, North Korea Size, North Korea Satellite, North Korea Sanctions, North Korea South Korea, North Korea Square Miles, North Korea Strike, North Korea Situation, North Korea Seattle, North Korea Starvation, North Korean Submarine, North Korea Trump, North Korea Tourism, North Korea Today, North Korea Twitter, North Korea Threats, North Korea Time, North Korea Test, North Korea Tensions, North Korea Travel, North Korea The Great Illusion, North Korea Update, North Korea Us, North Korea Us War, North Korea United States, North Korea Us News, North Korea Un, North Korea Unicorn, North Korea Unemployment Rate, North Korea Usa News, North Korea University, North Korea Vs Usa, North Korea Video, North Korea Vs South Korea, North Korea Vs Us, North Korea Vacation, North Korea Vs Usa War, North Korea Vice, North Korea Vs China, North Korea Vs The World, North Korea Vs United States, North Korea War, North Korea Wiki, North Korea Website, North Korea Weapons, North Korea World Map, North Korea Ww3, North Korea Weather, North Korea Warning, North Korea World War 3, North Korea War 2017, North Korea Xi, North Korea Xi Jinping, North Korea X Reader, North Korea X South Korea Hetalia, North Korea X Reader Lemon, North Korea Xenophobia, North Korea Xi Trump, North Korea Xinhua, North Korea China, North Korea X America Hetalia, North Korea Youtube, North Korea Year, North Korea Yahoo, North Korea Youtube 2017, North Korea Yonhap, North Korea Yalu River, North Korea Youtube Video, North Korea Youth, North Korea Youtube Channel, North Korea Yeonmi Park, North Korea Zoo, North Korea Zip Code, North Korea Zone, North Korea Zombies, North Korea Zero Hedge, North Korea Zimbabwe, North Korea Zionist, North Korea Zionism, North Korea Zombie Apocalypse, North Korean Zoo Dog,

Anderson Cooper about the notorious Russian Agents and their US Election Involvement

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Kellyanne Conway and CNN’s Anderson Cooper clashed in an interview over CNN’s reporting of the classified documents presented to President Obama and President-elect Trump including allegations that Russian operatives claim to have compromising personal and financial information about Trump.

Russian Agents Of Shield,Russian Agents Killed,Russian Agents In The Us,Russian Agents Dying,Russian Agents Voted For Trump,Russian Agents Behind Yahoo,Russian Agents Of Influence,Russian Agents Indicted,Russian Agents Trump,Russian Agents Yahoo Hack,Russian Agents Arrested,Russian Agents Are Behind Yahoo Breach,Russian Agents In America,Russian Travel Agents Association,Russian Sleeper Agents In America,Russian Kgb Agents In America,Russian Travel Agents In Australia,Russian Visa Agents In Australia,Russian Agents Behind Yahoo,Russian Agents Behind,Russian Basketball Agents,Russian Agents Killed By Isis,Russian Agents Executed By Isis,Russian Agents Killed By Is,Russian Agents Killed By Child,Russian Agents In Britain,Russian Visa Agents In Bangalore,Russian Fsb Agents Killed By Isis,Russian Chemical Agents,Russian Sleeper Agents Cold War,Russian Estate Agents Cyprus,Russian Sleeper Agents Caught,Russian Property Agents Cyprus,Russian Real Estate Agents Chicago,Russian Agents Killed By Child,Russian Visa Agents In Chennai,Child Russian Agents,Russian Agents Dying,Russian Agents Dead,Russian Double Agents,Russian Double Agents In The Cold War,Russian Double Agents Executed,Russian Visa Agents Delhi,Russian Travel Agents Directory,Russian Real Estate Agents Dubai,Russian Visa Agents In Dubai,Russian Travel Agents In Dubai,Russian Agents Executed,Russian Agents Executed By Isis,Russian Estate Agents,Russian Estate Agents London,Russian Estate Agents In Cyprus,Russian Estate Agents In Spain,Russian Education Agents,Russian Estate Agents In Paphos,Russian Estate Agents In Limassol,Russian Estate Agents Tenerife,Russian Foreign Agents Law,Russian Football Agents,Russian Fsb Agents,Russian Free Agents,Russian Free Agents Hockey,Russian Fifa Agents,Russian Fsb Agents Killed By Isis,Russian Fsb Agents Executed,Russian Free Agents Nhl,Russian Federal Agents,Russian Gru Agents,Russian Real Estate Agents Greece,Russian Hockey Agents,Russian Hunting Agents,Russian Free Agents Hockey,Russian Holiday Agents,Russian Agents In The Us,Russian Agents Indicted,Russian Agents In America,Russian Agents In The White House,Russian Agents In Uk,Russian Agents Isis,Russian Agents In Ukraine,Russian Agents In Europe,Russian Agents In Syria,Russian Agents In Romania,Russian Agents Killed,Russian Agents Killed By Isis,Russian Agents Killed By Child,Russian Kgb Agents In America,Russian Kgb Agents,Russian Fsb Agents Killed By Isis,Famous Russian Kgb Agents,Russian Visa Agents In Kolkata,Russian Sleeper Agents Movie,Russian Estate Agents Marbella,Russian Travel Agents Melbourne,Russian Real Estate Agents Miami,Russian Visa Agents In Mumbai,Russian Nerve Agents,Russian Free Agents Nhl,Russian Real Estate Agents New York,Russian Agents Of Shield,Russian Agents Of Influence,Russian Travel Agents Outbound,Russian Property Agents,Russian Property Agents London,Russian Property Agents Cyprus,Russian Port Agents,Russian Patent Agents,Russian Agents In Poland,Russian Visa Agents In Pakistan,Russian Estate Agents In Paphos,Russian Estate Agents Selling Property In Spain,Russian Agents In Romania,Russian Sleeper Agents Real,Russian Inteligence Agents Face Risk Of Disclosure,Russian Agents Shot,Russian Agents Series,Russian Sleeper Agents,Russian Sleeper Agents 2010,Russian Sleeper Agents 2014,Russian Secret Agents,Russian Sleeper Agents Tv Series,Russian Secret Agents Arrested In Us,Russian Sleeper Agents 1980s,Russian Special Agents,Russian Agents Trump,Russian Travel Agents,Russian Travel Agents List,Russian Travel Agents Association,Russian Travel Agents Uk,Russian Travel Agents In Dubai,Russian Tour Agents,Russian Travel Agents In Australia,Russian Travel Agents Melbourne,Russian Travel Agents In San Francisco,Russian Undercover Agents,Russian Agents In Us,Russian Agents In Uk,Russian Agents In Ukraine,Russian Travel Agents Uk,Russian Estate Agents In Uk,Russian Agents Voted For Trump,Russian Visa Agents In Delhi,Russian Visa Agents In Mumbai,Russian Visa Agents In Pakistan,Russian Visa Agents In Chennai,Russian Visa Agents In Dubai,Russian Visa Agents,Russian Visa Agents In Islamabad,Russian Visa Agents In India,Russian Visa Agents In Lahore,Russian Agents Were Behind Yahoo Hack,Russian Sleeper Agents Wiki,Russian Sleeper Agents Cold War,Russian Agents Yahoo Hack,Russian Agents Yahoo,Russian Agents Yahoo Breach,

Video – Trend Micro about Putins Cyber Espionage Troops Pawn Storm

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

 

Cyber Espionage Definition, Cyber Espionage Cases, Cyber Espionage China, Cyber Espionage Prevention, Cyber Espionage Russia, Cyber Espionage Pdf, Cyber Espionage The Chinese Threat, Cyber Espionage History, Cyber Espionage International Law, Cyber Espionage Cases 2016, Cyber Espionage Act, Cyber Espionage Articles, Cyber Espionage Attacks, Cyber Espionage Adalah, Cyber Espionage And International Law, Cyber Espionage Australia, Cyber Espionage And Cyber Warfare, Cyber Espionage Attack Methods, Cyber Espionage Books, Cyber Espionage Beyond The Rule Of Law, Cyber Espionage Business, Cyber Espionage By China, Cyber Espionage Brazil, Cyber Espionage By Chinese Actors, Cyber Espionage Blog, Cyber Espionage By Country, Bagaimana Cyber Espionage Dapat Muncul, Best Cyber Espionage Books, Cyber Espionage Cases, Cyber Espionage China, Cyber Espionage Cases 2016, Cyber Espionage Case Study, Cyber Espionage Cases 2017, Cyber Espionage Cases In India, Cyber Espionage Campaign, Cyber Espionage China Us, Cyber Espionage Cost, Cyber Espionage Canada, Cyber Espionage Definition, Cyber Espionage Documentary, Cyber Espionage Def, Cyber Espionage Definition Pdf, Economic Cyber Espionage Definition, Bagaimana Cyber Espionage Dapat Muncul, Why Is Cyber Espionage Difficult To Prevent, Contoh Kasus Cyber Espionage Di Indonesia, How Is Cyber Espionage Done, Dragonfly Cyber Espionage, Cyber Espionage Examples, Cyber Espionage Edward Snowden, Cyber Espionage Effects, Cyber Espionage Essay, Cyber Economic Espionage, Cyber Economic Espionage Accountability Act, Cyber Espionage In Middle East, Economic Cyber Espionage And International Law, Economic Cyber Espionage Definition, Explain Cyber Espionage, Cyber Espionage Facts, Cyber Espionage Fiction, Cyber Espionage First Case, Cyber Espionage F 35, Cyber Espionage Law Firms, Fbi Cyber Espionage, France Cyber Espionage, A Theory Of Cyber Espionage For The Intelligence Community, French Cyber Espionage, Flame Cyber Espionage, Cyber Espionage Groups, Cyber Espionage Germany, Cyber Espionage Georgia, Cyber-espionage The Greatest Transfer Of Wealth In History, Cyber-espionage A Growing Threat To The American Economy, Cyber Espionage Against Georgia, Cyber Espionage Against Georgian Government, What Are Cyber Espionage Groups Stealing From The United States, Cyber Espionage To Splinter Internet Governance, Global Cyber Espionage, Cyber Espionage History, Huawei Cyber Espionage, Hellsing Cyber Espionage, Cyber Espionage International Law, Cyber Espionage Incidents, Cyber Espionage India, Cyber Espionage Is Alive And Well, South African Cyber Espionage, Cyber Espionage In China, Cyber Espionage In Middle East, Cyber Espionage Iran, Cyber Espionage In Canada, Cyber Espionage Impact, Cyber Espionage Jobs, Cyber Espionage Japan, Cyber Espionage Kenya, Kaspersky Cyber Espionage, Kasus Cyber Espionage, Kasus Cyber Espionage Di Indonesia, Kejahatan Cyber Espionage, Karakteristik Cyber Espionage, Cyber Espionage Law, Cyber Espionage Law Firms, Cyber Espionage International Law, Cyber Espionage Definition Law, Cyber Espionage Is Reaching Crisis Levels, Pengertian Dari Cyber Espionage Lengkap, Le Cyber Espionnage Definition, Cyber Espionage Meaning, Cyber Espionage Movies, Cyber Espionage Methods, Cyber-espionage Nightmare – Mit Technology Review, Cyber Espionage Attack Methods, Cyber Espionage In Middle East, Chinese Cyber Espionage Mandiant, Chinese Cyber Espionage Map, Bagaimana Cyber Espionage Dapat Muncul, Military Cyber Espionage, Cyber Espionage News, Cyber Espionage North Korea, Cyber-espionage Nightmare, Cyber Espionage National Security, Cyber Espionage Novels, Cyber Espionage Nato, Ghostnet Cyber Espionage Network, Nsa Cyber Espionage, Nortel Cyber Espionage, Cyber Espionage Operations, Cyber Espionage Red October, Cyber Espionage And Cyber Espionage, Cyber-espionage The Greatest Transfer Of Wealth In History, Cyber Espionage Prevention, Cyber Espionage Pdf, Cyber Espionage Ppt, Cyber Espionage Pronunciation, Cyber Espionage Presentation, Cyber Espionage Pictures, Cyber Espionage Problems, Cyber Espionage Purpose, Cyber Espionage Ppt Slideshare, Cyber Espionage Research Paper, Cyber Espionage Quotes, Cyber Espionage Research Questions, Cyber Espionage Russia, Cyber Espionage Research Paper, Cyber Espionage Rule Of Law, Cyber Espionage Report, Cyber Espionage Red October, Cyber Espionage Research Questions, Cyber Espionage Ring, Cyber Espionage Is Reaching Crisis Levels, Cyber Espionage Techrepublic, Russian Cyber Espionage, Cyber Espionage Statistics, Cyber Espionage Synonym, Cyber Espionage Simulator, Cyber Espionage Security Issues, Cyber Espionage Statistics 2015, Cybersecurity Espionage, Espionage In Cyberspace, Cyber Espionage Case Study, Cyber Espionage To Splinter Internet Governance, South African Cyber Espionage, Cyber Espionage The Chinese Threat, Cyber Espionage Threat, Cyber Espionage Tools, Cyber Espionage Trends, Cyber Espionage The Chinese Threat Case Study, Cyber Espionage To Splinter Internet Governance, Cyber-espionage The Greatest Transfer Of Wealth In History, Cyber Espionage Thesis, Cyber Espionage Training, Cyber Espionage Tactics, Cyber Espionage Uk, Us Cyber Espionage, Cyber Espionage Un, Cyber Espionage Us China, China’s Cyber Espionage Units, Russian Cyber Espionage Under The Microscope, China Cyber Espionage And U.s. National Security, Pla Cyber Espionage Unit, Cyber Espionage Vs Cyber Warfare, Cybercrime Vs Cyber Espionage, Cyber Espionage Vs Cyber Attack, Cyber Espionage Virus, Cyber Espionage Wiki, Cyber Espionage & Warfare, Cyber Weapons Espionage, Cyber Espionage Vs Cyber Warfare, Cyber Espionage And Cyber Warfare Definition, Cyber Espionage Youtube

Must See Video – Monty Python – Execution in Russia

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

This video is based on the “Firing Squad” sketch from Monty Python’s Flying Circus. It was aired as part of the 8th episode of the 3rd season of the show.

Monty Python Movies,Monty Python And The Holy Grail,Monty Python Quotes,Monty Python Rabbit,Monty Python And The Holy Grail Quotes,Monty Python Cast,Monty Python Spam,Monty Python Black Knight,Monty Python Meaning Of Life,Monty Python Argument,Monty Python And The Holy Grail,Monty Python And The Holy Grail Quotes,Monty Python Argument,Monty Python And The Holy Grail Script,Monty Python And The Holy Grail Rabbit,Monty Python And The Holy Grail Netflix,Monty Python And The Holy Grail Black Knight,Monty Python And The Holy Grail Cast,Monty Python Actors,Monty Python And The Holy Grail Online,Black Knight Monty Python,Monty Python Bring Out Your Dead,Monty Python Biggus Dickus,Monty Python Bruce,Monty Python Bright Side Of Life,Monty Python Bunny,Monty Python Bridge Of Death,Monty Python Box Set,Monty Python Bicycle Repairman,Monty Python Birthday,Monty Python Cast,Monty Python Coconuts,Monty Python Co Founder,Monty Python Characters,Monty Python Castle,Monty Python Cheese Shop,Monty Python Camelot,Monty Python Coconuts Gif,Monty Python Comfy Chair,Monty Python Cartoons,Monty Python Dead Parrot,Monty Python Dvd,Monty Python Dead Parrot Script,Monty Python Dirty Fork,Monty Python Death,Monty Python Documentary,Monty Python Dennis Moore,Monty Python Deadly Joke,Monty Python Dvd Box Set,Monty Python Deja Vu,Eric Monty Python,Monty Python Every Sperm Is Sacred,Monty Python Episodes,Monty Python Election Night,Monty Python Exploding Man,Monty Python’s Eric Crossword,Monty Python Elderberries,Monty Python Every Sperm Is Sacred Lyrics,Monty Python Eric The Half A Bee,Monty Python Eu,Monty Python Flying Circus,Monty Python Flesh Wound,Monty Python Foot,Monty Python Fat Guy,Monty Python Films,Monty Python Finland,Monty Python Founder,Monty Python Fluxx,Monty Python French,Monty Python Fish,Monty Python Gif,Monty Python God,Monty Python Galaxy Song,Monty Python Gumby,Monty Python Get On With It,Monty Python Galaxy Song Lyrics,Monty Python Graham,Monty Python Grail,Monty Python Guards,Monty Python Game,Monty Python Holy Grail,Monty Python Holy Grail Quotes,Monty Python Holy Grail Rabbit,Monty Python Happy Birthday,Monty Python Holy Grail Script,Monty Python Horse,Monty Python Holy Grail Meme,Monty Python How Not To Be Seen,Monty Python History Of The World,Monty Python Holy Grail Gif,Monty Python I Like Chinese,Monty Python Imdb,Monty Python Insults,Monty Python I’m A Lumberjack,Monty Python I’m Not Dead Yet,Monty Python Interview,Monty Python Intermission,Monty Python Intro,Monty Python Inquisition,Monty Python It’s Just A Flesh Wound,Monty Python Jokes,Monty Python John,Monty Python Job Interview,Monty Python Jones,Monty Python Jabberwocky,Monty Python Just A Flesh Wound,Monty Python Jehovah,Monty Python Joke That Kills,Monty Python Jesus,Monty Python Just The Words,Monty Python Knight,Monty Python Killer Rabbit,Monty Python Knights Who Say Ni,Monty Python Knights Of The Round Table,Monty Python Killer Joke,Monty Python King Arthur,Monty Python Kilimanjaro,Monty Python Knight Fight,Monty Python Knights Of The Round Table Lyrics,Monty Python Killer Rabbit Quote,Monty Python Lumberjack,Monty Python Life Of Brian,Monty Python Look On The Bright Side Of Life,Monty Python Live At The Hollywood Bowl,Monty Python Life Of Brian Quotes,Monty Python Lupins,Monty Python Live,Monty Python Llama,Monty Python Lion Tamer,Monty Python Luxury,Monty Python Movies,Monty Python Members,Monty Python Meaning Of Life,Monty Python Meme,Monty Python Ministry Of Silly Walks,Monty Python Musical,Monty Python Monks,Monty Python Meaning Of Life Quotes,Monty Python My Brain Hurts,Monty Python Meaning Of Life Song,Monty Python Netflix,Monty Python Nudge Nudge,Monty Python Ni,Monty Python Not Dead Yet,Monty Python Nobody Expects The Spanish Inquisition,Monty Python New Movie,Monty Python Nudge Nudge Wink Wink,Monty Python Name Origin,Monty Python Norwegian Blue,Monty Python None Shall Pass,Monty Python Olympics,Monty Python Online,Monty Python One Down Five To Go,Monty Python Opener Crossword,Monty Python O2,Monty Python Opener,Monty Python On Netflix,Monty Python Oliver Cromwell,Monty Python Oscar Wilde,Monty Python Organ Donor,Monty Python Parrot,Monty Python Philosophers Song,Monty Python Philosophy Football,Monty Python Parrot Sketch Script,Monty Python Philosophers Song Lyrics,Monty Python Pieces Crossword,Monty Python Philosophers Soccer,Monty Python Pieces,Monty Python Parrot Sketch Live,Monty Python Piranha Brothers,Monty Python Quotes,Monty Python Questions,Monty Python Quest For The Holy Grail,Monty Python Quest For The Holy Grail Quotes,Monty Python Questions 3,Monty Python Questions Three,Monty Python Quest,Monty Python Quiz,Monty Python Quotes Shrubbery,Monty Python Question Swallow,Monty Python Rabbit,Monty Python Run Away,Monty Python Rabbit Gif,Monty Python Run Away Gif,Monty Python Rabbit Quotes,Monty Python Rabbit Meme,Monty Python Rating,Monty Python References,Monty Python Riddle,Monty Python Romans,Monty Python Spam,Monty Python Shrubbery,Monty Python Songs,Monty Python Swallow,Monty Python Silly Walk,Monty Python Skits,Monty Python Spam Song,Monty Python Streaming,Monty Python Sit On My Face,Monty Python Script,Monty Python Universe,Monty Python Universe Song Lyrics,Monty Python Upper Class Twit Of The Year,Monty Python Unladen Swallow,Monty Python Undertaker,Monty Python Upper Class Twit Of The Year Episode,Monty Python Youtube,Monty Python University Of Woolloomooloo,Monty Python Undertaker Sketch,Monty Python Ulm,Monty Python Video,Monty Python Village Idiot,Monty Python Vomit,Monty Python Video Game,Monty Python Vomit Scene,Monty Python Vikings,Monty Python Velocity Of A Swallow,Monty Python Violence Inherent In The System,Monty Python Vocational Guidance Counselor,Monty Python Vinyl,Monty Python Wiki,Monty Python Witch,Monty Python Witch Scene,Monty Python Wafer Thin,Monty Python What Is Your Favorite Color,Monty Python Walk,Monty Python What Have The Romans Done For Us,Monty Python When I Was A Lad,Monty Python Witch Quote,Monty Python World’s Funniest Joke,Monty Python Xmas Song,Monty Python Xmas,Monty Python Xkcd,Monty Python Xylophone,Monty Python Xfinity,Monty Python Xmas Cards,Monty Python Ex Parrot,Monty Python Xmas Quote,Monty Python Louis Xiv,Monty Python Cardinal Ximenes,Youtube Monty Python,Monty Python Yorkshiremen,Monty Python Your Mother Was A Hamster,Monty Python Yorkshire,Monty Python You Make Me Sad,Monty Python Yorkshiremen Script,Monty Python You Lucky Bastard,Monty Python Youtube Channel,Monty Python Youtube Dead Parrot,Monty Python You’re No Fun Anymore,Monty Phyton Zitate,Monty Phyton Zywot Briana,Monty Python Zulu,Monty Python Zoot,Monty Python Zoo,Monty Python Zeppelin,Monty Python Zoot Quotes,Monty Python Zoot Costume,Monty Python Zoetrope,Monty Python Zodiac Sign,

Heinz Gerlachs “Erben” – GoMoPa, Medard Fuchsgruber und mutmasslich Rainer von Holst & Thomas Bremer – Cui bono ?

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Es hat lange gedauert, aber nun ist das Rätsel wohl gelöst: Wer profitiert von Gerlachs Tod ?

  • GoMoPa konnte die eigene Position massiv ausbauen
  • Medard Fuchsgruber übernahm die DFI-Seite
  • Rainer von Holst, Doreen Trampe (Ex-GoMoPa) und Pierre Gersöne stecken mutmasslich hinter der anonymen Webseite gerlachreport.com
  • Thomas Bremer mit seinem Blog-Netzwerk im “Tal der Ahnungslosen” (DDR-Witz) zu Leipzig

In Kürze mehr…

 

Heinz Gerlach, Heinz Gerlach Halle, Heinz Gerlach Akkordeon, Heinz Gerlach Aschaffenburg, Heinz Gerlach Bad Arolsen, Heinz Gerlach Medien Ag, Heinz Gerlach Durchbruch Bei Stalingrad, Dekan Heinz Gerlach, Heinz-dieter Gerlach, Heinz Gerlach Tanzende Finger, Heinz Gerlach Frankfurt, Heinz Gerlach Flachsmeer, Ferienwohnung Heinz Gerlach Zingst, Heinz Gerlach Halle, Karl Heinz Gerlach, Heinz Gerlach Komponist, Karl Heinz Gerlach Biebertal, Heinz Gerlach Halle Karneval, Karl-heinz Gerlach Langenhagen, Karl Heinz Gerlach Herzberg, Heinz Gerlach Licht & Sound, Karl-heinz Gerlach Langenhagen, Heinz Gerlach Niederstotzingen, Tanzende Finger Gerlach Heinz Noten, Heinz Gerlach Obernau, Heinz Gerlach Offenbach, Heinz Gerlach Pfarrer, Heinz Gerlach Stalingrad, Heinz Gerlach Schrobenhausen, Heinz Gerlach Sulingen, Heinz Gerlach Licht & Sound, Heinz Schulze Gerlach, Heinz Gerlach Durchbruch Bei Stalingrad, Heinz Gerlach Tanzende Finger, Heinz Gerlach Tot, Heinz Gerlach Winterberg, Karl Heinz Gerlach Wegberg, Heinz Gerlach Zingst, Ferienwohnung Heinz Gerlach Zingst

 

Aktuelle Morddrohung von dubiosen Figuren mit Russland-Backgound

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

PULCH

WIR MACHEN DICH KALT; UND SPÜLEN DEINE ASCHE IN DIE TOILETTE

Die weiteren Details sind Gegenstand forensischer Untersuchung

Morddrohung, Mord Drohung Stgb, Mord Drohung Strafe, Morddrohung Was Tun, Morddrohung Strafbar, Morddrohung Anzeige, Morddrohung Anzeige, Drohung Mit Mord, Pegida Mord Drohung, Mord Drohung Strafe, Mord Drohung Stgb, Morddrohung Strafbar, Traumdeutung Mord Drohung, Morddrohung Was Tun, Morddrohung Was Tun

Halloween-Scherz: Horror- Clown gibt sich als von Holst aus

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

 

 

 

Sie kennen das: Ein Clown sendet Ihnen eine E- Mail.

Der Clown nennt sich oder ist Rainer von Holst. Alles ohne Beweis. Was macht man damit ?  Richtig. Man fragt Google und die User.

Die Rainer von Holst-Clown Maske mit falscher E-Mail inklusive cc an “Polizei” ohne handfeste Beweise – Ist das ein gelungener Halloween-Scherz ?  Oder sind andere Horror-Clowns noch besser ?

a Adolf Hitler

b Benito Mussolini

c Rainer von Holst

d Nero

 

Wer hat die beste Horror-Clown-Frisur ?

a Fury

b Rainer von Holst

c Flipper

d Lassie

You will be the Judge !

Horror Clown Movies, Horror Clown Movies 2016, Horror Clown Makeup, Horror Clown Movie 2017, Horror Clown Videos, Horror Clown Costumes, Horror Clown Mask, Horror Clown Pics, Horror Clown Stories, Horror Clown Names, Scary Clown American Horror Story, Evil Clown American Horror Story Actor, American Horror Story Clown, Horror Movie About Clown, Horror Movie With Clown And Babysitter, Clown American Horror Story Actor, American Horror Clown Costume, American Horror Clown Mask, American Horror Clown Actor, Clown American Horror Story Trailer, Horror Clown Books, Horror Clown Birthday, Horror Clown Bilder, Horror Clown Breda, Horror Clown Blick, Horror Clown Basel, Horror Film Clown Babysitter, Horror Movie Clown Babysitter, Horror Story Clown Babysitter, American Horror Story Clown Backstory, Horror Clown Costumes, Horror Clown Costumes Adults, Horror Clown Character, Horror Clown Costume Ideas, Horror Clown Costumes Uk, Clown Horror Comedy, American Horror Clown Costume, Classic Horror Clown Costume, Womens Horror Clown Costume, Horror Movie Clown Costume, Horror Clown Drawings, Horror Clown Dolls, Horror Clown Dailymotion, Horror Clown Director, Horror Clown Deutsch, Horror Clown Deutschschweiz, Horror Dog Clown Car, Horror Dome Clown, Horror Clown Fancy Dress, Horror Clown Videos Dailymotion, Horror Clown England, Horror Clown Es, Horror Clown Eli Roth, Horror Clown Essen, Evil Clown Horror Movie, Evil Clown Horror, American Horror Story Clown Episode, Evil Clown American Horror Story, Evil Clown American Horror Story Actor, American Horror Story Clown Episode 1, Horror Clown Film, Horror Clown Face, Horror Clown Face Paint, Horror Clown Film 2015, Horror Clown Full Movie, Horror Clown Fancy Dress, Horror Clown Figurine, Horror Clown Frankrijk, Horror Clown Frankreich, Horror Clown France, Horror Clown Gifs, Horror Clown Games, Horror Clown Geschichte, Horror Clown Geschichten, Horror Clown Gesicht, Horror Clown Girl, American Horror Clown Gif, Scary Clown Horror Gif, Clown Horror Movie Gif, American Horror Story Clown Girl, Horror Clown Halloween, Horror Clown Huren, Horror Clown Images, Horror Clown In Nederland, Horror Clown In Der Schweiz, Horror Clown In Thun, Horror Clown In Frankrijk, Horror Clown In Frankreich, Horror Clown It, Horror Clown In Basel, Horror Clown In England, Horror Clown In Luxemburg, Horror Clown Jokes, Horror Clown Jack, American Horror Story Clown Jaw, Horror Clown John Wayne, Jeugdjournaal Horror Clown, Clown Horror Prank Jockiboi, Horror Clown Killer, Horror Clown Laugh, Horror Clown Luxemburg, Horror Clown Luxembourg, Horror Clown Lache, Clown Horror List, Horror Clown Movies List, Clown Horror Films List, Horror Movies Like Clown, American Horror Story Clown Lawsuit, Horror Clown Mask Latex, Horror Clown Movies, Horror Clown Movies 2016, Horror Clown Makeup, Horror Clown Movie 2017, Horror Clown Mask, Horror Clown Music, Horror Clown Movies On Netflix, Horror Clown Memes, Horror Clown Names, Horror Clown Nights, Horror Clown Night Game, Clown Horror Novels, Clown Horror Netflix, Clown Horror New, Horror Movie Clown Names, American Horror Clown Name, American Horror Clown No Mask, Horror Clown Movies New, Horror Clown Outfit, Horror Clown Movies On Netflix, Horror Movie Clown On Tricycle, Scary Clown On American Horror Story, Clown Horror Movies Online, Horror Movie With Clown On Cover, Clown Horror Watch Online, Horror Movies Of Clown, Creepy Clown On American Horror, Clown Horror Movie Watch Online, Horror Clown Pics, Horror Clown Prank, Horror Clown Props, Horror Clown Poem, Horror Clown Prosthetic, Horror Clown Photoshop, Horror Clown Pak, Horror Clown Face Paint, American Horror Clown Picture, Horror Movie Clown Puppet, Horror Clown Quotes, American Horror Story Clown Quotes, Horror Clown Real, Clown Horror Review, Clown Horror Rotten Tomatoes, Horror Film Clown Rocking Chair, American Horror Story Clown Real, American Horror Story Clown Running, American Horror Story Clown Real Person, American Horror Story Clown Real Face, Clown Horror Movie Dvd Release, Clown Horror Recensione, Horror Clown Stories, Scary Horror Clowns, Horror Story Clown Mask, Horror Clown Song, Horror Story Clown Statue, Horror Clown Sound, Horror Clown Suit, Scary Horror Clown Movies, Clown Horror Short Stories, Horror Movie Clown Scene, Horror Clown Tattoo, Horror Clown Top 10, Horror Clown Thun, Horror Clown Trailer, Horror Clown Tutorial, American Horror Clown Trailer, Horror Movie Clown Trailer, Moviepilot Horror Clown Trailer, Horror Movie The Clown, American Horror Story Clown, Horror Clown Masks Uk, Horror Clown Costumes Uk, Horror Film Clown Under Bed, Horror Movie Clown Under Bed, American Horror Story Clown Unmasked, American Horror Clown Makeup, Clown Upcoming Horror Movies, Horror Clown Makeup, Horror Clown Halloween Makeup, Horror Clown Uit Frankrijk, Horror Clown Videos, Horror Clown Videos Dailymotion, Horror Clown Verkleidung, American Horror Story Clown Video, American Horror Story Clown Vine, Halloween Horror Nights Clown Video, Horror Clown Tattoo Vorlagen, Horror Clown Versteckte Kamera, Horror Clown Vermoord, Horror Clown Verhalen, Horror Clown Wallpapers, Horror Clown Wiki, Horror Clown Woman, Horror Clown Wig, Horror Clown Womens Costume, Clown Horror Watch Online, Horror White Clown, American Horror Clown Without Mask, Horror Movie With Clown Doll, Horror Movie With Clown Killer, Horror Clown Youtube, Clown Horror Movies Youtube, American Horror Story Clown Youtube, Youtube Horror Clown Prank, Film Horror Sui Clown Yahoo, Film Horror Clown Yahoo, Horror Zombie Clown Mask, Clown Zombies Horror, Clown Horror Zwiastun, Horror Clown Zoetermeer, Rainer Von Holst Firmenwelten, Rainer Von Holst Gerlachreport, Rainer Von Holst Usa, Rainer Von Holst Gerlach, Rainer Von Holst Gomopa, Rainer Von Holst Iserlohn, Rainer Von Holst, Rainer Von Holst Bank, Rainer Von Holst Politico, Rainer Von Holst Augsburg, Rainer Von Holst Augsburg, Rainer Von Holst Bank, Rainer Von Holst Firmenwelten, Rainer Von Holst Gerlachreport, Rainer Von Holst Gerlach, Rainer Von Holst Gomopa, Rainer Von Holst Iserlohn, Rainer Von Holst Politico, Rainer Von Holst Princeton, Rainer Von Holst Usa, Rainer Von Holst Werther

 

Exposed – Rainer von Holsts Cyberweapon – Pierre Gersoene

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Image result for pierre gersöne

Pierre Gersöne

The notorious Rainer von Holst publishes many anonymous blogs in the internet to threaten, extort, diffame and lie about his critics or victims.

The anonymous webmaster behind his network of blogs was trying to hide for sure good reasons.

Pierre Gersöne from East-Berlin has been exposed now

For all fans of Rainer von Holst and him for such memorable websites like

gomopacrime, investigoo, etc. pp

here are the contact details:

Pierre Gersöne

Medienhaus Gersöne UG
Fanningerstraße 54
D-10365 Berlin-Lichtenberg

Telefon: +49 (0)30 531 674 60
Telefax: +49 (0)30 531 674 65

http://www.medienhaus-gersoene.de

Registergericht: Amtsgericht Berlin-Charlottenburg
Registernummer: HRB 160218 B
Umsatzsteuer-Identifikationsnummer gem. § 27a UStG: DE295777375

Neue charmante und geistreiche Drohung – wohl von Rainer von Holst

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Rainer von Holst hat diese gefälschte Email-Adresse wohl in der Schweiz angemeldet. Damit will er weitere Enthüllungen über ihn und seine dubiosen Firmen, insbesondere Enercrox, stoppen. Das analoge Vorgehen zu Gomopa, mit denen von Holst offensichtlich nicht nur die Sekretärin, Doreen Trampe teilt.
So sicher nicht, politisch inkorrekter Sprachakrobat!

Rainer Von Holst Firmenwelten, Rainer Von Holst Gerlachreport, Rainer Von Holst Usa, Rainer Von Holst Gerlach, Rainer Von Holst Gomopa, Rainer Von Holst Iserlohn, Rainer Von Holst, Rainer Von Holst Bank, Rainer Von Holst Politico, Rainer Von Holst Augsburg, Rainer Von Holst Augsburg, Rainer Von Holst Bank, Rainer Von Holst Firmenwelten, Rainer Von Holst Gerlachreport, Rainer Von Holst Gerlach, Rainer Von Holst Gomopa, Rainer Von Holst Iserlohn, Rainer Von Holst Politico, Rainer Von Holst Princeton, Rainer Von Holst Usa, Rainer Von Holst Werther, Drohung English, Drohung Englisch, Drohung Stgb, Drohung Definition, Drohung Stgb Schweiz, Drohung Strafrecht, Drohung Dict, Drohung Mit Strafanzeige, Drohung Synonym, Drohung Anzeige, Drohung Auf Englisch, Drohung Abgb, Drohung Arbeitgeber, Drohung Aussprechen, Drohung An Apple, Bedrohung Am Arbeitsplatz, Drohung Beispiele, Drohung Bgb, Drohung Bedeutung, Drohung Brief, Drohung Bvb, Drohung Buntes Blut, Drohung Bei Facebook, Drohung Coburg, Drohung Chemnitz, Drohung Cc, Drohung Condor, Drohung Chef, Drohung Creditreform, Drohung Citec, Drohung Clipart, Drohung Comic, Chemiewaffen Drohung, Drohung Definition, Drohung Dict, Drohung Deutschland, Drohung Durch Unterlassen, Drohung Duden, Drohung Definition Jura, Drohung Definition Strafrecht, Drohung Durch Arbeitgeber, Drohung Durch Unterlassen Beispiel, Drohung English, Drohung Englisch, Drohung Gesetz, Drohung Gewalt, Drohung Gegen Apple, Drohung Hofgarten, Drohung Hannover, Drohung Heidi Klum, Drohung Italienisch, Drohung Im Briefkasten, Drohung Juristische Definition, Drohung Juristisch, Drohung Jura, Drohung Jura Definition, Drohung Juridicum, Drohung Juristische Person, Drohung Jobcenter, Drohung Just White, Drohung Jusline, Drohung Justizzentrum Gera, Drohung Latein, Drohung Leo, Drohung London, Drohung Leib Und Leben, Drohung List Irrtum, Drohung Linguee, Drohung Los Angeles, Drohung Mit Strafanzeige, Drohung Nordkorea, Drohung Oder Versprechen, Drohung Offizialdelikt, Drohung Or, Drohung Oktoberfest, Drohung Ohne Abschreckung, Drohung Oder Versprechen Englisch, Drohung Oder Warnung, Drohung Oktoberfest 2015, Drohung Paragraph, Drohung Per Whatsapp, Drohung Polizei Anzeige, Drohung Per Email Strafbar, Drohung Pegida, Drohung Putin, Drohung Polnisch, Is Drohung Queen, Qualifizierte Drohung, Al Kaida Drohung, Al Kaida Drohung Deutschland, Drohung Rufmord, Drohung Recht, Drohung Rechtslage, Drohung Rock Am Ring, Drohung Realschule Liblar, Drohung Realschule Erftstadt, Drohung Rechtliche Schritte, Drohung Russland, Drohung Stgb, Drohung Stgb Schweiz, Drohung Strafrecht, Drohung Synonym, Drohung Und Erpressung, Drohung Und Beleidigung, Drohung Unterlassen, Drohung Unterlassungsklage, Drohung Von Nordkorea, Drohung Whatsapp, Drohung Wahr Machen Englisch, Drohung Wikipedia, Drohung Weser Gymnasium Vlotho, Drohung Was Tun, Drohung Warnung Unterschied, Drohung Wegen Schulden, Drohung Wien, Drohung Washington, Xors Drohung, Xatar Drohung, Drohung New York, Drohung Zitate, Drohung Zivilrecht, Drohung Zur Anzeige Bringen

Must See – Video – Urlaub in Dambeck

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Urlaub In English, Urlaub Meaning, Urlaub Bowen, Urlaub Accounting, Urlaub Auf Dem Bauernhof, Urlaub In Deutschland, Urlaub Translate, Urlaub German To English, Urlaub Vs Ferien, Urlaub Machen, Urlaub Accounting, Urlaub Auf Dem Bauernhof, Urlaub Am Bauernhof, Urlaub Ada Ok, Urlaub Auf Dem Bauernhof Bayern, Urlaub Am Bodensee, Urlaub Bowen, Urlaub Buchen, Urlaub Bauernhof, Urlaub Bali, Urlaub Bulgarien, Urlaub Bayern 2017, Urlaub Bayern, Urlaub Billig, Urlaub Barcelona, Urlaub Bodensee, Urlaub Costa Rica, Urlaub Checkliste, Urlaub Check 24, Urlaub Cornwall, Urlaub Curacao, Urlaub Capri, Urlaub Chiemsee, Urlaub Kroatien, Urlaub Cartoon, Urlaub Corsica, Urlaub Dentist Raleigh, Urlaub Duden, Urlaub Deutschland, Urlaub Dubai, Urlaub De, Urlaub Deals, Urlaub Deutschland 2017, Urlaub Englisch, Urlaub English, Urlaub Europa, Urlaub Express, Urlaub England, Urlaub Essay, Urlaub Elternzeit, Urlaub Etymologie, Urlaub Elba, Urlaub Email, Urlaub German, Urlaub German To English, Urlaub Gender, Urlaub Griechenland, Urlaub Guru, Urlaub Hawaii, Urlaub Holland, Urlaub Hamburg, Urlaub Holidays Pvt Ltd, Urlaub Hurghada, Urlaub Hessen, Urlaub Harz, Urlaub Hamster, Urlaub Haben, Urlaub Hamburg 2017, Urlaub In English, Urlaub In Deutschland, Urlaub In Oesterreich, Urlaub In Italien, Urlaub In Der Schweiz, Urlaub In Griechenland, Urlaub In Nordkorea, Urlaub In Kroatien, Urlaub In Spanien, Urlaub Japan, Urlaub Jordanien, Urlaub Juni, Urlaub Juni 2017, Urlaub Jamaika, Urlaub Juli, Urlaub Kroatien, Urlaub Kreta, Urlaub Kuba, Urlaub Korsika, Urlaub Kanaren, Urlaub Karibik, Urlaub Korfu, Urlaub Kos, Urlaub Last Minute, Urlaub Lanzarote, Urlaub London, Urlaub Lefkada, Urlaub Ligurien, Urlaub Leo, Urlaub La Gomera, Urlaub Los Angeles, Urlaub La Palma, Urlaub Liste, Urlaub Meaning, Urlaub Machen, Urlaub Mit Hund, Urlaub Mallorca, Urlaub Malediven, Urlaub Mit Kindern, Urlaub Mit Baby, Urlaub Malta, Urlaub Mit Kleinkind, Urlaub Marokko, Urlaub Nordsee, Urlaub Nehmen, Urlaub Norwegen, Urlaub Nrw, Urlaub Niederlande, Urlaub November, Urlaub New York, Urlaub Namibia, Urlaub Norditalien, Urlaub Ne Demek, Urlaub Or Ferien, Urlaub Ostsee, Urlaub Oman, Urlaub Online Buchen, Urlaub Ostern, Urlaub Ostern 2017, Urlaub Ostsee Hotel, Urlaub Ostsee Mit Hund, Urlaub Ostsee Mit Kindern, Urlaub Oktober Warm, Urlaub Piraten, Urlaub Plural, Urlaub Pronunciation, Urlaub Portugal, Urlaub Probezeit, Urlaub Packliste, Urlaub Planen, Urlaub Philippinen, Urlaub Polen, Urlaub Paris, Urlaub Quotes, Urlaub Questions, Urlaub Quedlinburg, Urlaub Qatar, Urlaub Quebec, Urlaub Queensland, Urlaub Katar, Urlaub Quirimbas, Urlaub Qi Gong, Urlaub Queen Mary 2, Urlaub Reisen, Urlaub Rhodos, Urlaub Sardinien, Urlaub Spanien, Urlaub Sizilien, Urlaub Santorini, Urlaub Seychellen, Urlaub Translate, Urlaub Translation German English, Urlaub Und Ferien, Urlaub Usa Visum, Urlaub Und Reisen, Urlaub Usa, Urlaub Utrecht, Urlaub Ungarn, Urlaub Umzug, Urlaub Usedom, Urlaub Ukraine, Urlaub Urlaub, Urlaub Vs Ferien, Urlaub Vom Urlaub, Urlaub Vietnam, Urlaub Verbringen, Urlaub Vokabeln, Urlaub Vertaling, Urlaub Venezuela, Urlaub Verfall, Urlaub Vergleich, Urlaub Versicherung, Urlaub Wiktionary, Urlaub Wikipedia, Urlaub Xanten, Urlaub Xxl, Urlaub Xtra, Urlaub Xxl Familie, Urlaub Yucatan, Urlaub Yoga, Urlaub Yacht, Urlaub Yoga Meditation, Urlaub Yoga Deutschland, Urlaub Ystad, Urlaub Yellowstone National Park, Urlaub Youtube, Urlaub Yosemite National Park, Urlaub Yoga Surfen, Urlaub Zypern, Urlaub Zakynthos, Urlaub Zu Hause, Urlaub Zu Zweit, Urlaub Zanzibar, Urlaub Zeeland, Urlaub Zitate, Urlaub Zum Neuen Arbeitgeber Mitnehmen, Urlaubszeit, Urlaub Zivildienst

“Persistent” Cyber Targeting of Police, Emergency Services

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

A clip from a local television station in Montana shows an emergency alert that was generated by “unknown attackers” in February 2013. The attackers used default credentials to broadcast false emergency messages stating that the “bodies of the dead are rising from their graves and attacking the living.” Similar messages aired in several other states where similar systems were compromised by the attackers.

Cyber attacks against law enforcement, fire departments and other emergency services have become increasingly common and are likely to increase according to a recent intelligence assessment prepared by the Department of Homeland Security and the Multi-State Information Sharing and Analysis Center (MS-ISAC).  The assessment, which was distributed to law enforcement in September 2015 and was obtained by Public Intelligence, reviewed a number of “cyber attacks against the [emergency services sector or ESS] between February 2012 and May 2015,” finding that “targeting of the ESS will likely increase as ESS systems and networks become more interconnected and the ESS becomes more dependent on information technology for the conduct of daily operations—creating a wider array of attack vectors for cyber targeting.”  Recent incidents involving the use of telephony-denial-of-service (TDoS) attacks, ransomware as well as the exploitation of “critical hardware and software” including call-center communications-management software, closed-circuit TV camera systems, interactive voice response systems, and emergency alert systems are detailed in the assessment.

DHS and MS-ISAC assess that the “most prominent cyber actors targeting the ESS” are “criminal hackers” who have engaged in “numerous attacks against state and local networks, particularly law enforcement, in response to perceived social and legal injustices” and are “prone to announcing attacks to increase visibility and support for their cause.”  The assessment defines “criminal hackers” as “individuals or groups that commit a crime by illegally accessing or altering systems, often in furtherance of an ideological goal.”  The use of the term “criminal hackers” marks a departure from previous law enforcement bulletins which have used the terms “hacktivists” or “hacker groups” to describe ideologically-motivated cyber actors.  The term is also used in an FBI bulletin released in May 2015 titled “Criminal Hackers Target Police to Protest Perceived Injustices.”  The assessment distinguishes between these criminal hackers and “cybercriminals” who “carry out illegal activities on computer networks, such as carding schemes, ransom and extortion, theft of personally identifiable information, and account information to facilitate fraud.”

Criminal hackers “gain support for their political agenda—or to exact retribution for perceived social or legal injustices—have shown repeated interest in targeting the ESS” as is “evidenced by the numerous attacks against state and local networks, particularly law enforcement, in response to perceived social and legal injustices.”  However, DHS and MS-ISAC assess that their capabilities are not particularly sophisticated, limiting them to “low-level cyber operations, such as [denial of service or DoS] attacks, website defacements, and doxing (publishing of personally identifiable information), often attacking targets of opportunity.”  These low-level operations have proliferated in recent years, particularly in response to increased political controversy surrounding police brutality and excessive use of force.  The assessment also discusses several examples of these operations, often involving DoS attacks or doxing, including a series of DoS attacks conducted by the hacker collective Anonymous against the City of Madison, Wisconsin in 2014 to protest an officer-involved shooting.  The attack reportedly “affected some police, fire, and medical dispatch services; as well as city government Internet and e-mail communications, and online payment services.”

Though so-called “criminal hackers” are the most prominent cyber actors in DHS and MS-ISAC’s assessment, cybercriminals working for financial gain pose a “persistent threat” and have launched attacks significantly impacting ESS operations.

  • In May 2015, a Nevada county sheriff’s department and a Wisconsin police department were victims of a ransomware attack that encrypted both departments’ shared folders.  MS-ISAC later determined that the intrusions occurred as a result of visits to a legitimate website which had been compromised.
  • A city in Southern California and several local public-safety agencies were hit by ransomware in June 2014.  The compromise affected 100 computers and 10 servers.
  • A fire department in Northern California and a law enforcement agency in Southern California were infected by ransomware resulting in the compromise of one computer and one server in each location, making vital information unavailable.
  • In 2013, telephony denial of service (TDoS) attacks affected approximately 600 critical government phone systems nationwide, including 200 public-safety answering points (PSAPs).  After several days, the attackers reportedly requested $5,000 to cease the attacks.

 

 

 

Cybercrime Definition, Cybercrime Statistics, Cybercrime Prevention, Cybercrime Articles, Cybercrime Jobs, Cybercrime Law, Cybercrime Statistics 2017, Cyber Crime Cases, Cyber Crime News, Cybercrime Topics, Cybercrime Articles, Cybercrime And Security, Cybercrime As A Service, Cybercrime And Digital Forensics An Introduction, Cybercrime And Digital Forensics, Cybercrime And Society, Cybercrime And Terrorism, Cybercrime Attacks, Cybercrime Act, Cybercrime Against Businesses, Cyber Crime Batman, Cyber Crime Book, Cybercrime Blog, Cybercrime Bill, Cybercrime Banks, Cybercrime Background, Cyber Crime By Country, Cybercrime Bangalore, Cybercrime Billion Dollar Industry, Cybercrime Background Information, Cyber Crime Cases, Cybercrime Certification, Cybercrime Convention, Cybercrime Careers, Cybercrime Cost, Cybercrime Cafe, Cybercrime Cost 2016, Cybercrime China, Cybercrime Conference, Cybercrime Conclusion, Cybercrime Definition, Cybercrime Definition Computer, Cybercrime Definition Fbi, Cyber Crime Data, Cybercrime Degrees, Cybercrime Definition Pdf, Cybercrime Database, Cyber Crime Detective, Cyber Crime Documentary, Cyber Crime Department, Cybercrime Example, Cyber Crime Essay, Cybercrime Effects, Cybercrime Events, Cybercrime Enforcement, Cybercrime Economy, Cyber Crime Ethics, Cybercrime Effects On Business, Cybercrime Ecosystem, Cybercrime Enforcement Training Assistance Act, Cybercrime Facts, Cybercrime Fbi, Cybercrime Forensics, Cybercrime Forum, Cybercrime Forensics Training Center, Cybercrime Federal Laws, Cyber Crime Fiction, Cybercrime Financial Services, Cybercrime Future Trends, Cybercrime Fiji, Cybercrime Gets Personal Money Magazine, Cybercrime Gets Personal, Cybercrime Growth, Cyber Crime Graph, Cybercrime Groups, Cybercrime Government, Cybercrime Global Statistics, Cyber Crime Gov, Cyber Crime Games, Cybercrime Gif, Cybercrime Hacking, Cyber Crime History, Cybercrime Help, Cybercrime Healthcare, Cybercrime Hyderabad, Cybercrime How To Report, Cyber Crime Hotline, Cybercrime Hacking News, Cyber Crime Head Office India, Cybercrime Hacking And Cracking, Cybercrime Identity Theft, Cybercrime In The Us, Cyber Crime Investigation, Cybercrime Images, Cyber Crime Insurance, Cybercrime Is Also Known As, Cybercrime Investigating High-technology Computer Crime, Cybercrime Infographic, Cybercrime Information, Cyber Crime In Russia, Cybercrime Jobs, Cybercrime Jurisdiction, Cybercrime Journal Articles, Cybercrime Job Description, Cybercrime Jobs Salary, Cybercrime Job Openings, Cybercrime Jobs In Chennai, Cybercrime Job Qualification, Cybercrime Journal Articles Pdf, Cyber Crime Jamaica, Cybercrime Kenya, Cybercrime Key Issues And Debates, Cybercrime Kuwait, Cybercrime Ki Dhara, Cybercrime Key Issues And Debates Pdf, Cybercrime Kasus, Cyber Crime Karnataka, Cybercrime Kartu Kredit, Cybercrime Kolkata, Cyber Crime Karachi, Cybercrime Law, Cybercrime Laws In Usa, Cybercrime Law Enforcement, Cybercrime Laws Of The United States, Cybercrime List, Cybercrime Legislation Us, Cybercrime Laws In Florida, Cybercrime Legal Issues, Cybercrime Law Outline, Cyber Crime Lesson Plans, Cybercrime Meaning, Cyber Crime Movies, Cybercrime Methods, Cybercrime Methodology, Cyber Crime Money, Cybercrime Markets, Cyber Crime Magazine, Cyber Crime Most Wanted, Cybercrime Meaning In Tamil, Cybercrime Masters Degree, Cyber Crime News, Cyber Crime News Articles, Cyber Crime News Articles 2017, Cyber Crime Netflix, Cybercrime Nigeria, Cyber Crime Novels, Cybercrime Number, Cybercrime Nhs, Cyber Crime News Philippines, Cybercrime Nbi, Cybercrime Or Cyber Crime, Cybercrime Organizations, Cybercrime On The Rise, Cybercrime On The High Seas, Cybercrime Offenses, Cyber Crime Outline, Cybercrime Office, Cybercrime Office In Ahmedabad, Cybercrime Office In Patna, Cybercrime Office In Nashik, Cybercrime Quotes, Cyber Crime Quizlet, Cybercrime Questions, Cyber Crime Quiz, Cybercrime Questionnaire, Cybercrime Question Paper, Cybercrime Qatar, Cybercrime Question And Answers, Cybercrime Report, Cybercrime Research Paper, Cyber Crime Rates, Cyber Crime Recent, Cybercrime Research Topics, Cybercrime Research, Cybercrime Reported To The Ic3, Cybercrime Resources, Cybercrime Riding Tax Season Tides, Cyber Crime Report 2016, Cybercrime Statistics, Cybercrime Statistics 2017, Cyber Crime Stories, Cybercrime Spyware, Cybercrime Statistics 2015, Cybercrime Security, Cybercrime Solutions, Cybercrime Salary, Cybercrime Small Business, Cyber Crime Synonym, Cybercrime Topics, Cybercrime Trends, Cybercrime Tracker, Cybercrime Treaty, Cyber Crime Types, Cybercrime Training, Cybercrime Threats, Cybercrime Tools, Cybercrime Terms, Cybercrime The Transformation Of Crime In The Information Age, Cyber Crime Unit, Cybercrime Us, Cybercrime Uk, Cybercrime Uae, Cybercrime University, Cybercrime Un, Cyber Crime Unit Mauritius, Cyber Crime Unit Malta, Cybercrime Uc, Cybercrime Unodc, Cybercrime Victims, Cybercrime Vs Traditional Crime, Cybercrime Videos, Cybercrime Vs Traditional Crime Statistics, Cybercrime Virus, Cyber Crime Vocabulary, Cybercrime Vs Traditional Crime Punishment, Cybercrime Vs Computer Crime, Cybercrime Vs Cyber Warfare, Cybercrime Vs Cyber Espionage, Cybercrime Wiki, Cybercrime Worm, Cybercrime World Wide War 3.0, Cyber Crime Websites, Cyber Crime Worksheet, Cybercrime Wallpaper, Cyber Crime Worldwide, Cybercrime Working Group, Cyber Crime What Is It, Cybercrime Wikipedia Indonesia, Cybercrime X-remote Download, Tedx Cybercrime, Cyber Crime Youtube, Cyber Crime Yahoo, Cyber Crime Yahoo Answers, Cyber Crime Yesterday, Cyber Crime Youth, Cybercrime Yang Menyerang Hak Cipta, Cybercrime Yar, Youth Cyber Crime, Cyber Crime Yogyakarta, Cybercrime Yang Menyerang Pemerintah, Cybercrime Zimbabwe, Cybercrime Zeus, Cybercrime Zimbra, Zurich Cyber Crime, Zimbabwe Cybercrime Bill, Cyber Crime In Zambia, New Zealand Cyber Crime, Los Zetas Cybercrime, Cybercrime Law In Zambia, Cyber Crime Cases In Zambia

Windbeutel und Bankrott-Tourist von Holst schreit nach Rache und steigert Besucherzahlen

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Als Reaktion auf die Aufdeckung seiner diversen Machenschaften durch angesehene englische Medien wie Daily Mail und mich – siehe

https://www.google.com/search?q=rainer%20von%20holst

 

Uns und auch Ihnen wird von Holst kein X als U verkaufen können, wie er das mit dem Verkauf von illegalen Investments, seiner illegalen Bank und seinen nicht-existenten Betrügerfirmen tausendfach versucht hat und noch immer versucht. Er hat schon genug angerichtet.

Siehe auch die Wallstreet-Diskussion über den Bielefelder Scharlatan und Windbeutel:

http://www.wallstreet-online.de/diskussion/1222551-1-10/unternehmen-firmenwelten-ag-bielefeld

Der Name Rainer von Holst ist so belastet, dass er sich bis dato nicht TRAUT eine Facebook-Seite, einen eigenen Blog, einen Twitter-Account oder sonst etwas im Internet unter eigenem Namen zu publizieren. Denn wegen der Anschläge auf “GoMoPa”  und dem Einbruch bei wird auch gegen von Holst ermittelt.

Warum wohl ?

Und das bei so einer Type der Staat und die STASI Synonyme sind, sagt eigentlich eh schon alles.

Doch wie sagt der Volksmund: “Wer anderen eine Grube gräbt, fällt selbst hinein.”

Windbeutel Rainer von Holst – wie immer anonym unterwegs – beschert uns einen kräftigen Besucherzuwachs und ich an sage an dieser Stelle: “Danke, alter Windbeutel, bitte weiter schlampig schreiben !”

Nur weiter so. Unsere Anzeigenkunden freut es auch…

Rainer Von Holst Firmenwelten, Rainer Von Holst Gerlachreport, Rainer Von Holst Usa, Rainer Von Holst Gerlach, Rainer Von Holst Gomopa, Rainer Von Holst Iserlohn, Rainer Von Holst, Rainer Von Holst Bank, Rainer Von Holst Politico, Rainer Von Holst Augsburg, Rainer Von Holst Augsburg, Rainer Von Holst Bank, Rainer Von Holst Firmenwelten, Rainer Von Holst Gerlachreport, Rainer Von Holst Gerlach, Rainer Von Holst Gomopa, Rainer Von Holst Iserlohn, Rainer Von Holst Politico, Rainer Von Holst Princeton, Rainer Von Holst Usa, Rainer Von Holst Werther, Bankrott Gehen, Bankrott Englisch, Bankrott Auf Englisch, Bankrott Anmelden, Bankrott Adjektiv, Bankrott Argentiniens Staatspleite 2001, Bankrott Anderes Wort, Bankrott Auktionen, Bankrott Argentinien, Bankrott Auktion, Bankrott Airberlin, Bankrott Auf Griechisch, Bankrott Bedeutung, Bankrott Buch, Bankrott Bost, Bankrott Bank, Bankrott Bundesland, Bankrott Brasilien, Bankrott Berlin, Bankrott Financial Crisis, American Chopper Bankrott, Cafe Bankrott, Cafe Bankrott Berlin, Commerzbank Bankrott, Colt Bankrott, Companys Bankrott, Chicago Bankrott, Cafe Bankrott Prenzlauer Allee, Caffee Bankrott, Bankrott Duden, Bankrott Definition, Bankrott Dict, Bankrott Der Ddr, Bankrott Detroit, Bankrott Durch Scheidung, Bankrott Deutsch, Bankrott Deutschland, Bankrott Deutsche Bank, Bankrott Der Bildung, Bankrott Englisch, Bankrott Gehen, Bankrott Gehen Englisch, Bankrott Griechenland, Bankrott Gehen Duden, Bankrott Griechenland Folgen, Bankrott Gegangen, Bankrott Gmbh, Bankrott Gehen Bedeutung, Bankrott Gesetz, Bankrott Gehen Rechtschreibung, Bankrott Herkunft, Bankrott Hadith, Hsv Handball Bankrott, Htc Bankrott, Hsv Bankrott, Handballclub Bankrott 2012, Hattrick Bankrott, Hardwareversand Bankrott, Bank Banker Bankrott Hamburg, Nach Dem Bankrott Habermas, Bankrott Insolvenz, Bankrott Lehman Brothers, Bankrott Machen, Bankrott Mit 4 Buchstaben, Bankrott Monopoly, Bankrott Meyer, Bankrott Machen Englisch, Bankrott Anmelden, Bankrott Machen Duden, Bankrott Magyarul, Jp Morgan Bankrott, Mexx Bankrott, Bankrott Nach Scheidung, Bankrott New York 1975, Nokia Bankrott, Nintendo Bankrott, Neckermann Bankrott, Opel Bankrott, Otto Bankrott, Occ Bankrott, Osobny Bankrott Fyzickej Osoby, O2 Bankrott, Odenwaldschule Bankrott, Pleite Oder Bankrott, Bankrott Oder Insolvent, Bankrott Gehen Oder Bankrott Gehen, Bankrott Pleite, Quiksilver Bankrott, Quelle Bankrott, Bankrott Stgb, Bankrott Synonym, Bankrott Straftat, Bankrott Stgb 283, Bankrott Schema, Bankrott Strafrecht, Bankrott Sein, Bankrott Strafe, Bankrott Tatbestand, Bankrott T Shirt, Bankrott Und Insolvenz, Bankrott Ukraine, Bankrott Usa, Bankrott Unternehmen, Bankrott Us-bundesstaat, Bankrott Usa 1971, Bankrott Usa 2015, Bankrott Ursprung, Bankrott Und Insolvenzverschleppung, Bankrott Urteil, Bankrott Wortherkunft, Bankrott Wiki, Bankrott Wikipedia, Bankrott Werden, Bankrott Was Tun, Bankrott Wiktionary, Bankrott Was Nun, Bankrott Weil Klein These, Bankrott Was Ist Das, Bankrott Was Heisst Das, Ludwig Xiv Bankrott, Yingli Bankrott, Krebs Bankrott Youtube, New York Bankrott, Bankrott New York 1975, Bankrott Zu Gehen, Zalando Bankrott, Zypern Bankrott, Zielpunkt Bankrott, Zentralbank Bankrott, Zypern Bankrott 2013

 

 

EXPOSED-FULL NAME LIST – THE PANAMA PAPERS – ALBANIA – Companies and Officers

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Verschwundene DDR Millionen via “GoMoPa”-President Friedhelm Laschütza/Batliner nach Liechtenstein ?

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Friedhelm Laschütza

Unserem vertraulichen Investigativ-Team wurden hierzu Unterlagen zur Prüfung zugeleitet. Laschütza verweigerte jede Stellungnahme mit einem billigen Trick.

 

In Kürze mehr….

Reinhard Schu: von Holst beauftragte Einbruch bei mir – EV liegt mir vor

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Rainer von Holst

 

Rainer Von Holst Firmenwelten, Rainer Von Holst Gerlachreport, Rainer Von Holst Usa, Rainer Von Holst Gerlach, Rainer Von Holst Gomopa, Rainer Von Holst Iserlohn, Rainer Von Holst, Rainer Von Holst Bank, Rainer Von Holst Politico, Rainer Von Holst Augsburg, Rainer Von Holst Augsburg, Rainer Von Holst Bank, Rainer Von Holst Firmenwelten, Rainer Von Holst Gerlachreport, Rainer Von Holst Gerlach, Rainer Von Holst Gomopa, Rainer Von Holst Iserlohn, Rainer Von Holst Politico, Rainer Von Holst Princeton, Rainer Von Holst Usa, Rainer Von Holst Werther, Einbruch Englisch, Einbruch Der Wirklichkeit, Einbruch English, Einbruch Versicherung, Einbruch Strafe, Einbruch Definition, Einbruch Auf Englisch, Einbruch Bode Museum, Einbruch Berlin, Einbruch Beratung Polizei, Einbruch Bremen, Einbruch Bei Arazhulhd, Einbruch Bonn, Einbruch Bochum, Einbruch Bargeld Versichert, Einbruch Bielefeld, Einbruch Beratung, Einbruch Chemnitz, Einbruch Codes, Einbruch Coburg, Einbruch Cafe Wenger, Einbruch Cham, Einbruch Coop Uzwil, Einbruch Coesfeld, Einbruch Colmnitz, Einbruch Calden, Einbruch Commerzbank Strausberg, Einbruch Der Wirklichkeit, Einbruch Definition, Einbruch Dict, Einbruch Der Dunkelheit, Einbruch Dunkelheit Heute, Einbruch Der Dunkelheit Heute, Einbruch Englisch, Einbruch English, Einbruch Erfurt, Einbruch Essen, Einbruch Erdgeschoss, Einbruchstatistik Erdgeschoss, Einbruch Erlangen, Einbruch Einfamilienhaus, Einbruch Ebay Kleinanzeigen, Einbruch Euro, Einbruch Gesetz, Einbruch Graz, Einbruch Gartenlaube, Einbruch Hamburg, Einbruch Hannover, Einbruch Hit Schmallenberg, Einbruch Herford, Einbruch Haus, Einbruch Hund, Einbruch Idstein, Einbruch In Die Freiheit, Einbruch Im Phantasialand, Einbruch In Mietwohnung Wer Zahlt, Einbruch In Die Ehe Eines Kameraden, Einbruch In Schule, Einbruch Ins Auto Was Zahlt Versicherung, Einbruch In Die Freiheit Pdf, Einbruch Innsbruck, Einbruch Italienisch, Einbruch Juwelier, Einbruch Juwelier Spinner, Einbruch Kindergarten, Einbruch Keller Mehrfamilienhaus, Einbruch Leipzig, Einbruch Linz, Einbruch Limburg, Einbruch Lingen, Einbruch Langenfeld, Einbruch Langenselbold, Einbruch Ludwigsburg, Einbruch Melden, Einbruch Meaning, Einbruch Ohne Spuren, Einbruch Ohne Diebstahl, Einbruch Oldenburg, Einbruch Polizei, Einbruch Paragraph, Einbruch Planen, Einbruch Plauen, Einbruch Strafe, Einbruchschutz, Einbruch Tipps, Einbruch Tankstelle, Einbruch Unterhaching, Einbruch Und Diebstahl, Einbruch Ulm, Einbruch Uhingen, Einbruch Unna, Einbruch Versicherung, Einbruch Verhindern, Einbruch Vorbeugen, Einbruch Versicherung Keine Belege, Einbruch Versicherung Zahlt Nicht, Einbruch Versicherung Bargeld, Einbruch Was Tun, Einbruch Wiesbaden, Einbruch Wien, Einbruch Wohnmobil, Einbruch Wuppertal, Einbruch Wohnung, Einbruch Widerstandsklassen, Einbruch Welche Versicherung, Einbruch Wels, Einbruch Witten, Einbruch Xanten, Xatar Einbruch, Einbruch Zeichen X, Aktenzeichen Xy Einbruch, Bmw X5 Einbruch Ohne Spuren, Xy Einbruch, X Einbruch Lohnt Sich, Einbrecher X, X6 Einbruch, Einbruch Bmw X6, Einbruch Youtube, Einbruch Yotta, Einbruch Yotta Villa, Youtube Einbruch Fenster, Einbruch Bei Den Yottas, Einbruch In Der Yotta-villa, Einbruch Ya Konan, Einbruch Ybbsitz, Einbruch In Ybbs, Einbruch Bei Yottas,

Im “GoMoPa”-Netzwerk: Doggiestyle Fan: Mark “GoMoPa”-Vize Vornkahl

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

 

Die Verurteilung von Klaus Maurischat und Mark Vornkahl wegen Betruges am eigenen Anleger

Klaus Maurischat und Mark Vornkahl, Betreiber vonwww.gomopa.net: Am 24. April 2006 war die Verhandlung am Amtsgericht Krefeld in der Betrugssache: Mark Vornkahl / Klaus Maurischat ./. Dehnfeld. Aktenzeichen: 28 Ls 85/05 Klaus MaurischatLange Straße 3827313 Dörverden.Das in diesem Verfahren ausschließlich diese Betrugsache verhandelt wurde, ist das Urteil gegen Klaus Maurischat recht mäßig ausgefallen.Zusammenfassung der Verhandlung vom 24.04.2006 vor dem Schöffengericht des AG Krefeld in der Sache gegen Klaus Maurischat und Mark Vornkahl.Zur Hauptverhandlung erschienen:Richter Dr. Meister, 2 Schöffen,Staatsanwalt, Angeklagter Klaus Maurischat, vertr. durch RA Meier, Berlin; aus der U-Haft zur Verhandlung überführt.1. Eine Gerichtsvollzieherin stellt unter Ausschuss der Öffentlichkeit eine Urkunde an den Angeklagten Maurischat zu.2. Bei Mark Vornkahl wurde im Gerichtssaal eineTaschenpfändung vorgenommen.Beginn der HauptverhandlungDie Beklagten verzichten auf eine Einlassung zu Beginn.Nach Befragung des Zeugen Denfeld zum Sachverhalt wurde dieVerhandlung auf Wunsch der Staatsanwaltschaft und den Verteidigern unterbrochen.Der Angeklagte Maurischat gab nach Fortsetzung derHauptverhandlung Folgendes zu Protokoll:Er sähe ein, dass das Geld auf das falsche Konto gegangen sei und nicht dem eigentlichen Verwendungszweck zugeführt wurde. Das Geld sei aber zurückgezahlt worden und er distanziere sich ausdrücklich von einem Betrug.Schließung der BeweisaufnahmeDer Staatsanwalt verließt sein PlädoyerEr halte am Vorwurf des Betruges fest. Mit Hinweis auf die einschlägigen Vorstrafen des Angekl. Maurischatund auf laufende Ermittlungsverfahren, beantrage er ein Strafmaß von 1 Jahr und 6 Monaten.Er halte dem Angeklagten zu Gute, dass dieserWiedergutmachung geleistet habe, und dass dieser geständig war. Zudem läge die letzte Verurteilung wegen Betruges 11 Jahre zurück. Auch sei der Geschädigte nicht in existentielle Not geraten, wobei der Staatsanwalt nicht über noch laufende Verfahren hinweg sehen könne. Er läge aber dem Angeklagten Maurischat nahe, keine weiteren Aktivitäten im Bezirk der Staatsanwaltschaft Krefeld auszuüben, insbesondere möchte er, dass keine weiteren Anleger im Bezirk der Staatsanwaltschaft Krefeld durch GoMoPa akquiriert werden.Die Freiheitsstrafe soll zur Bewährung ausgesetzt werden.Plädoyer des Verteidigers des Angekl. Maurischat, Herrn RA MeierEr schließe sich, wie (in der Unterbrechung) vereinbart, dem Staatsanwalt an.Es stimme, dass sein Mandant Fehler in seiner Vergangenheit gemacht habe, und dass er auch diesmal einen Fehler begangen haben könnte, jedoch sei der Hinweis wichtig, dass sein Mandant aus diesen Fehlern gelernt habe.Der Angeklagte haben das letzte Wort.Maurischat sagt, es sei bereits alles gesagt worden.Unterbrechung zu Hauptverhandlung. Der Richter zieht sich mit den Schöffen zur Beratung zurück.Urteilsverkündung:Der Angeklagte wird des gemeinschaftlichen Betrugs für schuldig befunden.Der Angeklagte Klaus Maurischat wird zu einerFreiheitsstrafe von 1 Jahr und 6 Monaten verurteilt. Diese wird zur Bewährung ausgesetzt.Die Bewährungszeit wird auf 3 Jahre festgesetzt.Der Haftbefehl gegen Klaus Maurischat wird aufgehoben.Der Angeklagte trage die Kosten des Verfahrens.UrteilsbegründungDer Richter erklärt, dass eine Täuschung des Geschädigtenvorliegt und somit keine Untreue in Betracht kommen kann.Die Fragen, ob es sich um einen Anlagebetrug handele sei irrelevant. Er hält den Angeklagten die geleistete Wiedergutmachung zu Gute.Ebenso ist das Geständnis für die Angeklagten zu werten. Zudem liegt die letzte Verurteilung des Angeklagten Maurischat 11 Jahre zurück.Die Parteien verzichten auf Rechtsmittel. Das Urteil ist somit rechtskräftig.Mit dem heutigen Urteil endet ein Kapitel in derBetrugssache Goldman Morgenstern & Partners, Klaus Maurischat und Mark Vornkahl.Alle GoMoPa.net Verantwortlichen, Maurischat, Vornkahl und Henneberg sind nun vorbestrafte Abzocker und Betrüger und die Zukunft der Pseudoklitsche GoMoPa.net sieht duster aus.

Mit dem Geständnis der beiden ABZOCKER MAURISCHAT UND VORNKAHL vor Gericht bricht ein jahrelang aufrechterhaltenes Lügengeflecht von einigen primitiven Betrügern zusammen. Gewohnheitsverbrecher und Denunzianten,die rechtschaffene Personen und Firmen in ihren Verbrecherforen kriminalisierten.

Aktz. Eintragung
HRB 161099 B AG Charlottenburg (Berlin)
 

03.09.2014: HRB 161099 B: Scoredex GmbH, Niederlassung Deutschland, Berlin, Tempelhofer Ufer 23/14, 10963 Berlin. Firma: Scoredex GmbH, Niederlassung Deutschland; Sitz / Zweigniederlassung: Berlin; Geschäftsansch…

HRB 114153 B AG Charlottenburg (Berlin)
 

03.03.2011: GoMoPa GmbH, Berlin, Unter den Linden 21, 10117 Berlin. Nicht mehr Geschäftsführer:; 1. Reski, Peter; Geschäftsführer:; 2. Vornkahl, Mark, *XX.XX.XXXX, New York/USA; mit der Befugnis die Gesellschaft …

“GOMOPA”-NETZWERK: Hanffreund und “GoMoPa”-Beirat Schillo

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Matthias Schillo

Matthias Schillo

1949 im Saarland geboren, war er als Redakteur bei der Augsburger Allgemeinen Zeitung und Mitarbeiter des Senders Freies Berlin tätig. In München und Berlin studierte er Jura, und war bis 1996, mit Zwischenstationen in Ministerien und bei der Treuhandanstalt, als Richter zuletzt am Kammergericht (Oberlandesgericht) Berlin tätig. Seit 1996 ist Matthias Schillo als Rechtsanwalt in Potsdam ansässig.

Mitte und Ende der Neunziger vertrat Schillo die Deutsch-Koreanerin Mun-ju Kim, die in Berlin lebt. Wie viele Asiaten kann Kim weder Wein, Bier noch sonstige alkoholhaltige Getränke konsumieren, da ihr das entscheidende Enzym fehlt, um den Alkohol auch wieder abzubauen. Kiffen ist für sie die einzige Alternative. Die Klage scheiterte letztlich an der langen Verfahrensdauer und den benötigten finanziellen Mitteln. Weiterhin engagierte sich Schillo im Nutzhanfbereich mit der Treuhanf AG und war Vorsitzender der Hanfgesellschaft e.V.
Aktuell klagt der Cannabispatient Günther Weiglein mit Schillo gegen das BfArM, um eine Genehmigung (§3 BtMG) für den Anbau von Cannabis für den medizinischen Eigenbedarf zu erhalten. Aktuell bereiten sie sich auf die 2. Instanz vor, weil das BMG die Niederlage vor dem Landgericht nicht hinnehmen will.

http://www.hanfmuseum.de/wiedersehen-mit-der-hanfbewegung-anno-1994-04-12-2014

Dokument: Empfehlung von Dr. Schulte für “GoMoPa”

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Dr Thomas Schulte im Fadenkreuz der Ermittler

 

ENTTARNT – Anetta Kahane, Stasi-Spitzel mit Decknamen „IM Victoria“ „Amadeu Antonio Stiftung“

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

 

Spätestens seit Beginn der Flüchtlingskrise sind Hasskommentare in den Sozialen Medien selbst zum medialen Thema geworden. Wie soll mit Aufrufen zu Gewalt und Beleidigungen umgegangen werden, ohne dabei in den Zensurwahn zu verfallen? Die EU hat mit den großen Internet-Konzernen nun ein Regelpaket beschlossen. Der Bundesregierung gehen die Maßnahmen jedoch nicht weit genug.

Besonders bei kontroversen Themen fluten teils Unmengen von hasserfüllten Kommentaren die Sozialen Medien wie Facebook und Twitter. Nicht selten kommt es dabei auch zu Gewaltaufrufen und Verletzungen des Persönlichkeitsrechts. Klarer Fall: Das sollte nicht stehen bleiben.

Auf der anderen Seite sind besonders linksdogmatischen Kreise dafür bekannt, in jeder eigentlich noch so harmlosen Aussage Sexismus, Rassismus, Antisemitismus oder derlei sonstiges zu wittern. Auch hier erfordert dann in der Regel ohne große Umschweife die Forderung nach Zensur.

Dass die Bundesregierung nicht wirklich bereit ist zwischen beiden Problemen zu trennen, bewies zuletzt Justizminister Heiko Maas mit der Einrichtung seiner „Taskforce gegen Hassreden im Internet.“ Ausgerechnet Anetta Kahane, ehemals Stasi-Spitzel mit dem Decknamen „IM Victoria“, soll in dieser Arbeitsgruppe mit ihrer „Amadeu Antonio Stiftung“ für die Expertise sorgen. Die Stiftung gehört zum „antideutschen“ Milieu, welches jüngst durch den Tortenangriff auf Sahra Wagenknecht größere Bekanntheit erlangte. Bei diesem politischen Spektrum handelt es sich in der Regel um extremistische Wirrköpfe, für die schon das reine Thematisieren von Problemen im Zuge der Flüchtlingsbewegungen als zu bekämpfender Rassismus gilt. Die Weigerung mit Gendergaps, Binnen-I oder Sternchen das Schriftbild zu verhunzen, gilt in diesen Kreisen als sexistisch.

Dass mit solchen Akteuren Hass und Hetze im Netz nicht sinnvoll eingedämmt werden können, liegt auf der Hand. Eher ist davon auszugehen, dass unter der Ägide solcher Meinungskommissare jedwede politische Debatte im Internet zu Tode zensiert wird.

So wundert es auch nicht, dass aus Berlin nun Kritik gegen eine Vereinbarung laut wird, welche die EU nun mit Vertretern der großen Internetkonzerne getroffen hat. Binnen 24 Stunden sollen Google, Facebook, Twitter und Co. künftig Hasskommentare auf ihren Plattformen untersuchen und dann gegebenenfalls auch löschen, heißt es in der Einigung. Wieviel Zeit bis zu dieser Löschung verstreichen darf, wurde allerdings nicht festgelegt. Konkret heißt es, die Unternehmen verpflichten sich:

“klare und wirksame Verfahren für die Prüfung von Meldungen über illegale Hassreden in ihren Diensten einführen, um solche Inhalte zu entfernen oder den Zugang dazu zu sperren.”

Darüber hinaus verpflichteten sich die Internet-Riesen aus Silicon Valley gegenüber Brüssel darauf, entsprechende Arbeitsgruppen einzurichten und die Überprüfungsteams in aktuellen Entwicklungen zu schulen.

Heiko Maas, der deutsche Justizminister.

Auch die „Taskforce“ von Heiko Maas hatte zuvor Facebook-Vertreter vorgeladen und übte Druck auf diese aus, die künftige Löschpolitik der Plattform den Berliner Erwartungen gemäß anzupassen. Durch die Selbstverpflichtung der Konzerne gegenüber Brüssel muss die dogmatisch durchsetzte Arbeitsgruppe des Justizministers allerdings befürchten, dass nun ein weicherer Kompromiss gefunden wurde.

Für den Nutzer ist dies zunächst erfreulich. Möglicherweise ist es so doch noch möglich, dass die Sozialen Netzwerke nicht zunehmend zu Hass-Maschinen verkommen, anderseits aber auch nicht einem extremistischen Zensurregime zum Opfer fallen. Die sonst oft gescholtenen Internetgiganten sind es, die am ehesten ein Interesse daran haben, dass ihre Plattformen weiter zum kommunikativen Austausch genutzt werden.

Wenn man beim Schutz der Meinungsfreiheit allerdings schon auf monopolistische Großkonzerne aus Übersee setzen muss, die selbst für ihre Manipulationen bekannt sind, zeigt dies auch, dass mit der Netzpolitik in diesem Land so einiges ganz und gar nicht stimmt.

Stasi Im Liste, Stasi Im Westen, Stasi Im Erika, Stasi Im Ausland, Stasi Im Unterricht, Stasi Im Victoria, Stasi Im Alltag, Stasi Im Liste Download, Stasi Im Ausland, Stasi Im Alltag, Stasi Im Alltag Der Ddr, Stasi Im Anzahl, Stasi Im Bundestag, Stasi Im Bezahlung, Stasi Im Brandenburg Landtag, Stasi Im Bezirk Halle, Stasi Im Bezirk Cottbus, Stasi Im Brandenburger Tor, Im Stasi Bedeutung, Stasiboom Im Herzogtum, Stasi Offiziere Im Besonderen Einsatz, Stasi Im Liste Berlin, Stasi Im Liste Cottbus, Stasi Im Bezirk Cottbus, Im Stasi Liste Chemnitz, Stasi Im Decknamen, Stasi Im Ddr, Stasi Im Dresden, Stasi Im Ddr-sport, Stasi*dresden*im Liste, Stasi Im Liste Download, Stasi Im Erika, Stasi Im Eichsfeld, Stasi Im Einsatz, Stasi In Erfurt, Stasi-spitzel Im Erika, Stasi Offiziere Im Besonderen Einsatz, Stasi Im Film, Stasi Im Freitag, Im Filius Stasi, Stasi Im Geschichtsunterricht, Stasi Im Harz, Stasi In Halle, Stasi Im Liste Halle Saale, Stasiboom Im Herzogtum, Im Hardy Stasi, Stasi Im Bezirk Halle, Im Helene Stasi, Stasi Akten Im Internet, Stasi Liste Im Internet, Aufgaben Der Stasi Im Inland, Im Jump Stasi, Stasi Im Klarnamen, Stasi Im Kalten Krieg, Schweizer Im Stasi Knast, Die Stasi Kam Im Morgengrauen, Stasi Im Liste, Stasi Im Liste Download, Stasi Im Larve, Stasi Im Liste Berlin, Stasi Im Liste Dresden, Stasi Im Liste Halle Saale, Stasi Im Listen, Stasi Im Liste Leipzig, Stasi Im Mitarbeiter, Stasi I.m, Im Stasi Mitarbeiter Liste, Stasi Mitarbeiter Im Westen, Im Stasi Merkel, Stasi Museum I Berlin, Stasi Museet I Berlin, Stasi Im Namen, Stasi Im Namensliste, Stasi-mitarbeiter Im Netz, Im Notar Stasi, 100.000 Stasi-mitarbeiter Im Netz (Update), 100.000 Stasi-mitarbeiter Im Netz, Stasi Im Om, Stasi Im Osten, Stasi Offiziere Im Besonderen Einsatz, Stasi Im Parlament, Stasi Im Raw Zwickau, Stasi Im Radler, Stasi Im Westen Die Unterwanderte Republik, Stasi Im Sport, Stasi-spitzel Im Erika, Stasi Staat Im Staat, Stasi Spione Im Westen, Stasi Im Liste Halle Saale, Stasi Spitzel Im, Stasi Im Ddr-sport, Stasi Im Unterricht, Stasi Im Untergrund, Stasi Und Im, Die Stasi Im Unterricht, Stasi Im Westen Die Unterwanderte Republik, Stasi Im Victoria, Stasi Im Viktoria, Stasi Im Vorlauf, Stasi Im Vogtland, Stasi Im Volksmund, Gestapo Und Stasi Im Vergleich, Stasi Im Westen, Stasi Im Westen Die Unterwanderte Republik, Im Stasi Wiki, Im Stasi Wikipedia, Stasi Mitarbeiter Im Westen, Stasi Spione Im Westen, Stasi Agenten Im Westen, Stasi Morde Im Westen, Stasi Im Raw Zwickau, Stasi Spitzel Beleidigung, Stasi Spitzel Liste, Stasi Spitzel Wikipedia, Stasi Spitzel Erfurt, Stasi Spitzel, Stasi-spitzel Im Erika, Stasi Spitzel System, Stasi Spitzel Namen, Stasi Spitzel In Dresden, Stasi Spitzel Heute, Stasi Spitzel Anderson, Stasi Spitzel Beleidigung, Stasi Spitzel Brd, Stasi Spitzel Bundeskanzler, Bekannte Stasi Spitzel, Stasi Spitzel Prenzlauer Berg, Stasi Spitzel Dynamo Dresden, Stasi Spitzel Dresden, Spitzel Der Stasi, Stasi Spitzel In Der Brd, Ddr Stasi Spitzel, Stasi Spitzel Erfurt, Stasi Spitzel Enttarnt, Stasi-spitzel Im Erika, Ehemalige Stasi Spitzel, Stasi Spitzel Film, Stasi Spitzel Gauck, Gysi Stasi Spitzel, Stasi Spitzel Heute, Stasi Spitzel Halle Saale, Stasi-spitzel Im Erika, Stasi Spitzel In Dresden, Stasi Spitzel In Der Brd, Stasi Spitzel Im, Stasi Spitzel Jena, Stasi Spitzel Kirche, Stasi Spitzel Liste, Stasi Spitzel Merkel, Stasi Spitzel Methoden, Stasi Spitzel Namen, Stasi Spitzel Namensliste, Stasi Spitzel Prenzlauer Berg, Prominente Stasi-spitzel, Stasi Spitzel Halle Saale, Stasi Spitzel Wikipedia, Stasi Spitzel Westen, Anetta Kahane Barbara Spectre, Anetta Kahane Berliner Zeitung, Anetta Kahane Bilder, Anetta Kahane Broder, Anetta Kahane Thomas Brasch, Anetta Kahane Ddr, Anetta Kahane Schmerz Der Alten Wunde, Anetta Kahane Email, Anetta Kahane Ehemann, Anetta Kahane Einkommen, Anetta Kahane Facebook, Anetta Kahane Frankfurter Rundschau, Anetta Kahane Facebook Zensur, Anetta Kahane Israel, Anetta Kahane Im Stasi, Anetta Kahane Kontakt, Anetta Kahane Kritik, Anetta Kahane Kinder, Anetta Kahane Mail, Anetta Kahane Mfs, Anetta Kahane Mann, Anetta Kahane Osten, Anetta Kahane Pegida, Anetta Kahane Frankfurter Rundschau, Anetta Kahane Twitter, Anetta Kahane Thomas Brasch, Victoria Anetta Kahane, Anetta Kahane Wikipedia, Anetta Kahane Youtube, Anetta Kahane Zitate, Anetta Kahane Berliner Zeitung, Anetta Kahane Facebook Zensur

Mutmasslicher Bankrott-Tourist-Scharlatan von Holst steckt wohl hinter Überfall auf dubiose “GoMoPa”und Einbruch

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

FirmenweltenNach mir exklusiv vorliegenden Informationen ist wohl mutmaßlich der von englischen Medien als “Bankrott-Tourist” bezeichnete Rainer von Holst Auftraggeber eines Einbruches bei GoMoPa  sowie eines Überfalles auf den mutmasslich kriminellen “GoMoPa”-Boss Klaus Maurischat (siehe Photo unten), sowie mutmaßlich auf RA Thomas Schulte, wohl Pate des Konglomerates.

Bei dem Einbruch wurde Material entwendet, das später auf der mutmasslich von Holst zuzuordnenden Webseite Gomopacrime.org und dann auf Investigoo.com (ebenfalls vwohl von Holst) publiziert wurde. Dieses Material ist zweifelsfrei echt. Die Informationen zeigen die kriminelle Organisation GoMoPa von innen.

Nachdem von Holst von Maurischat mit Mord und Totschlag erpresst wurde, verschwandt dieses Material, das ich dann wieder publiziert habe, nachdem es auf den Wahrheitsgehalt geprüft wurde.

verpruegelt-05-jpg.jpg (940×470)

Von Holst hat neben diesem Material, das durchaus aufklärungswirksam ist, Falschinformationen publiziert.

Zudem ist das Geschäftsmodel derer von  Holst illegal:

Ein Insider urteilt: “Die von Rainer von Holst angebotenen Partnerschaftsmodelle sind in Deutschland verboten. Derartige Partnerschaftsmodelle mit USA und UK-Firmen sind gar keine Partnerschaften. Zudem gibt es diese Firmen nur auf dem Papier. Die Anmeldung einer solchen Firma kostet 15 € und man kann das Share Capital selbst bestimmen, so z.B. auch 100 Mio. Pfund. Dann nennt Rainer von Holst das auch noch Bankhaus, auch ein Begriff den es im englischen nicht gibt.

Betrug durch und durch.”

 

Rainer Von Holst Firmenwelten, Rainer Von Holst Gerlachreport, Rainer Von Holst Usa, Rainer Von Holst Gerlach, Rainer Von Holst Gomopa, Rainer Von Holst Iserlohn, Rainer Von Holst, Rainer Von Holst Bank, Rainer Von Holst Politico, Rainer Von Holst Augsburg, Rainer Von Holst Augsburg, Rainer Von Holst Bank, Rainer Von Holst Firmenwelten, Rainer Von Holst Gerlachreport, Rainer Von Holst Gerlach, Rainer Von Holst Gomopa, Rainer Von Holst Iserlohn, Rainer Von Holst Politico, Rainer Von Holst Princeton, Rainer Von Holst Usa, Rainer Von Holst Werther, Bankrott Gehen, Bankrott Englisch, Bankrott Auf Englisch, Bankrott Anmelden, Bankrott Adjektiv, Bankrott Argentiniens Staatspleite 2001, Bankrott Anderes Wort, Bankrott Auktionen, Bankrott Argentinien, Bankrott Auktion, Bankrott Airberlin, Bankrott Auf Griechisch, Bankrott Bedeutung, Bankrott Buch, Bankrott Bost, Bankrott Bank, Bankrott Bundesland, Bankrott Brasilien, Bankrott Berlin, Bankrott Financial Crisis, American Chopper Bankrott, Cafe Bankrott, Cafe Bankrott Berlin, Commerzbank Bankrott, Colt Bankrott, Companys Bankrott, Chicago Bankrott, Cafe Bankrott Prenzlauer Allee, Caffee Bankrott, Bankrott Duden, Bankrott Definition, Bankrott Dict, Bankrott Der Ddr, Bankrott Detroit, Bankrott Durch Scheidung, Bankrott Deutsch, Bankrott Deutschland, Bankrott Deutsche Bank, Bankrott Der Bildung, Bankrott Englisch, Bankrott Gehen, Bankrott Gehen Englisch, Bankrott Griechenland, Bankrott Gehen Duden, Bankrott Griechenland Folgen, Bankrott Gegangen, Bankrott Gmbh, Bankrott Gehen Bedeutung, Bankrott Gesetz, Bankrott Gehen Rechtschreibung, Bankrott Herkunft, Bankrott Hadith, Hsv Handball Bankrott, Htc Bankrott, Hsv Bankrott, Handballclub Bankrott 2012, Hattrick Bankrott, Hardwareversand Bankrott, Bank Banker Bankrott Hamburg, Nach Dem Bankrott Habermas, Bankrott Insolvenz, Bankrott Lehman Brothers, Bankrott Machen, Bankrott Mit 4 Buchstaben, Bankrott Monopoly, Bankrott Meyer, Bankrott Machen Englisch, Bankrott Anmelden, Bankrott Machen Duden, Bankrott Magyarul, Jp Morgan Bankrott, Mexx Bankrott, Bankrott Nach Scheidung, Bankrott New York 1975, Nokia Bankrott, Nintendo Bankrott, Neckermann Bankrott, Opel Bankrott, Otto Bankrott, Occ Bankrott, Osobny Bankrott Fyzickej Osoby, O2 Bankrott, Odenwaldschule Bankrott, Pleite Oder Bankrott, Bankrott Oder Insolvent, Bankrott Gehen Oder Bankrott Gehen, Bankrott Pleite, Quiksilver Bankrott, Quelle Bankrott, Bankrott Stgb, Bankrott Synonym, Bankrott Straftat, Bankrott Stgb 283, Bankrott Schema, Bankrott Strafrecht, Bankrott Sein, Bankrott Strafe, Bankrott Tatbestand, Bankrott T Shirt, Bankrott Und Insolvenz, Bankrott Ukraine, Bankrott Usa, Bankrott Unternehmen, Bankrott Us-bundesstaat, Bankrott Usa 1971, Bankrott Usa 2015, Bankrott Ursprung, Bankrott Und Insolvenzverschleppung, Bankrott Urteil, Bankrott Wortherkunft, Bankrott Wiki, Bankrott Wikipedia, Bankrott Werden, Bankrott Was Tun, Bankrott Wiktionary, Bankrott Was Nun, Bankrott Weil Klein These, Bankrott Was Ist Das, Bankrott Was Heisst Das, Ludwig Xiv Bankrott, Yingli Bankrott, Krebs Bankrott Youtube, New York Bankrott, Bankrott New York 1975, Bankrott Zu Gehen, Zalando Bankrott, Zypern Bankrott, Zielpunkt Bankrott, Zentralbank Bankrott, Zypern Bankrott 2013, Bankruptcy Chapter 7, Bankruptcy Definition, Bankruptcy Lawyers, Bankruptcy Chapter 11, Bankruptcy Court, Bankruptcy Fraud, Bankruptcy Discharge, Bankruptcy Code, Bankruptcy Forms, Bankruptcy Law, Bankruptcy Attorney, Bankruptcy Attorney Near Me, Bankruptcy And Student Loans, Bankruptcy Automatic Stay, Bankruptcy And Taxes, Bankruptcy And Divorce, Bankruptcy Auto Loans, Bankruptcy Attorney Orlando, Bankruptcy And Child Support, Bankruptcy Auction, Bankruptcy Basics, Bankruptcy Blog, Bankruptcy Benefits, Bankruptcy Business, Bankruptcy Barrel, Bankruptcy Before Divorce, Bankruptcy Bar Association, Bankruptcy Bar Date, Bankruptcy Bill, Bankruptcy Business Definition, Bankruptcy Chapter 7, Bankruptcy Chapter 11, Bankruptcy Court, Bankruptcy Code, Bankruptcy Chapters, Bankruptcy Cost, Bankruptcy Chapter 13 Definition, Bankruptcy Car Loan, Bankruptcy Court Records, Bankruptcy Chapter 7 Forms, Bankruptcy Definition, Bankruptcy Discharge, Bankruptcy Definition Economics, Bankruptcy Dismissal, Bankruptcy Documents, Bankruptcy Discharge Date, Bankruptcy Database, Bankruptcy Due To Medical Bills, Bankruptcy Data, Bankruptcy Delaware, Bankruptcy Exemptions, Bankruptcy Estate, Bankruptcy Eu4, Bankruptcy Exemptions By State, Bankruptcy Explained, Bankruptcy Ecf, Bankruptcy Effects, Bankruptcy Edny, Bankruptcy Eligibility, Bankruptcy Eastern District Of Missouri, Bankruptcy Fraud, Bankruptcy Forms, Bankruptcy Filings, Bankruptcy For Dummies, Bankruptcy Filing Fees, Bankruptcy Forum, Bankruptcy Florida, Bankruptcy Fees, Bankruptcy Form 410, Bankruptcy Filing Search, Bankruptcy Guidelines, Bankruptcy Georgia, Bankruptcy Government Definition, Bankruptcy Gander Mountain, Bankruptcy Garnishment, Bankruptcy Gif, Bankruptcy Greeley Co, Bankruptcy Greenville Sc, Bankruptcy Gambling, Bankruptcy Guide, Bankruptcy Hotline, Bankruptcy Homes, Bankruptcy Hearing, Bankruptcy Homestead Exemption, Bankruptcy Hawaii, Bankruptcy House, Bankruptcy How Long, Bankruptcy History, Bankruptcy Home Loan, Bankruptcy How To File, Bankruptcy In Spanish, Bankruptcy Information, Bankruptcy In Texas, Bankruptcy In Florida, Bankruptcy In California, Bankruptcy In Ohio, Bankruptcy In Illinois, Bankruptcy In Michigan, Bankruptcy In Pa, Bankruptcy Indiana, Bankruptcy Judge, Bankruptcy Jurisdiction, Bankruptcy Jobs, Bankruptcy Judge Salary, Bankruptcy Jokes, Bankruptcy Judge Definition, Bankruptcy Judgement, Bankruptcy Judge Term, Bankruptcy Judgeship Act Of 2017, Bankruptcy Jackson Ms, Bankruptcy Keep House, Bankruptcy Keep Car, Bankruptcy Kansas, Bankruptcy Kit, Bankruptcy Kentucky, Bankruptcy Knoxville, Bankruptcy Keep House And Car, Bankruptcy Kansas City, Bankruptcy Keep Home, Bankruptcy Kansas City Mo, Bankruptcy Lawyers, Bankruptcy Law, Bankruptcy Lawyer Near Me, Bankruptcy Loans, Bankruptcy Lawyer Salary, Bankruptcy Lookup, Bankruptcy Lawyer Nj, Bankruptcy Las Vegas, Bankruptcy Law Center, Bankruptcy Liquidation, Bankruptcy Meaning, Bankruptcy Means Test, Bankruptcy Medical Bills, Bankruptcy Management Solutions, Bankruptcy Mortgage, Bankruptcy Mn, Bankruptcy Meme, Bankruptcy Michigan, Bankruptcy Maryland, Bankruptcy Missouri, Bankruptcy Near Me, Bankruptcy News, Bankruptcy Nj, Bankruptcy Noticing Center, Bankruptcy Northern District Of Texas, Bankruptcy Number, Bankruptcy Nc, Bankruptcy New Jersey, Bankruptcy Notice, Bankruptcy Nevada, Bankruptcy Options, Bankruptcy Online, Bankruptcy Ohio, Bankruptcy On Student Loans, Bankruptcy Oklahoma, Bankruptcy Office, Bankruptcy Oregon, Bankruptcy Outline, Bankruptcy On Credit Report, Bankruptcy Online Course, Bankruptcy Protection, Bankruptcy Process, Bankruptcy Payments, Bankruptcy Petition, Bankruptcy Proof Of Claim, Bankruptcy Public Records, Bankruptcy Puerto Rico, Bankruptcy Paperwork, Bankruptcy Paralegal, Bankruptcy Petition Preparer, Bankruptcy Questions, Bankruptcy Qualifications, Bankruptcy Quizlet, Bankruptcy Questionnaire, Bankruptcy Quotes, Bankruptcy Quiz, Bankruptcy Questions And Answers, Bankruptcy Qualification Calculator, Bankruptcy Qualifications Texas, Bankruptcy Quiz Questions, Bankruptcy Records, Bankruptcy Rules, Bankruptcy Rule 3001(c)(2)(a), Bankruptcy Rule 2002, Bankruptcy Remote, Bankruptcy Rule 2004, Bankruptcy Rule 9014, Bankruptcy Rule 3002.1, Bankruptcy Rule 7004, Bankruptcy Requirements, Bankruptcy Search, Bankruptcy Software, Bankruptcy Student Loans, Bankruptcy Stay, Bankruptcy Score, Bankruptcy Statistics, Bankruptcy Status, Bankruptcy Southern District Of Florida, Bankruptcy Synonym, Bankruptcy Schedules, Bankruptcy Trustee, Bankruptcy Types, Bankruptcy Texas, Bankruptcy Terms, Bankruptcy Timeline, Bankruptcy Taxes, Bankruptcy Test, Bankruptcy Trustee Definition, Bankruptcy The Office, Bankruptcy Tax Return, Bankruptcy Utah, Bankruptcy Unclaimed Funds, Bankruptcy Uk, Bankruptcy Us, Bankruptcy Utility Bills, Bankruptcy Used In A Sentence, Bankruptcy Ucc, Bankruptcy Us Trustee, Bankruptcy Utah Court, Bankruptcy Utilities, Bankruptcy Vs Foreclosure, Bankruptcy Venue, Bankruptcy Virginia, Bankruptcy Vs Default, Bankruptcy Vs Debt Consolidation, Bankruptcy Vancouver Wa, Bankruptcy Video, Bankruptcy Vs Charge Off, Bankruptcy Verification Line, Bankruptcy Va Loan, Bankruptcy Website, Bankruptcy Wiki, Bankruptcy Wisconsin, Bankruptcy Wichita Ks, Bankruptcy What Is It, Bankruptcy Washington State, Bankruptcy Worksheet, Bankruptcy Western District Of Pa, Bankruptcy Western District Of Texas, Bankruptcy Watch, Bankruptcy Xenia Ohio, Bankruptcy X, Xinergy Bankruptcy, Xerox Bankruptcy, Xccent Bankruptcy, Xco Bankruptcy, Xerium Bankruptcy, Xyience Bankruptcy, Xi3 Bankruptcy, Xom Bankruptcy, Bankruptcy Years, Bankruptcy Yakima, Bankruptcy Youtube, Bankruptcy Years On Credit Report, Bankruptcy Yuma Az, Bankruptcy Youngstown Ohio, Bankruptcy Yesterday, Bankruptcy Yourself, Bankruptcy York Pa, Bankruptcy Yelp, Bankruptcy Z Score, Bankruptcy Zanesville Ohio, Bankruptcy Z Score Calculator, Bankruptcy Zuckerberg, Bankruptcy Zero Balance Credit Card, Bankruptcy Zero Tax Code, Bankruptcy Z Value, Bankruptcy Z List Case, Bankruptcy Zephyrhills, Bankruptcy Zimbabwe

Der Firmenwelten-Boss von Holst und mutmassliche “GoMoPacrime”-Erfinder in Bilddokumenten

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Firmenwelten Gruppe

Nach der Publikation zu der mutmasslichen Person, die hinter “GoMoPacrime” steckt, wurde zweimal versucht, digital in meine Webseiten einzubrechen.

Honi soit qui mal y pense…

Hier finden Sie nun die Bilddokumente zu von Holst.

Rainer von Holst

Rainer von Holst (1)

 

Gomopa Gmbh, Gomopa Crime, Gomopa Wikipedia, Gomopa Erpressung, Gomopa Wirecard, Gomopa Berlin, Gomopa Ndr, Gomopa Die Zeit, Gomopa S&k, Gomopa Control Inc, Gomopa Autark, Gomopa Ard, Gomopa Account, Gomopa Alexander Stephan, Gomopa Ascent, Anti Gomopa, Gomopa Ogi Ag, Eev Ag Gomopa, Die Akte Gomopa, Gomopacrime, Gomopa Control Inc, Gomopa Cosma, Gomopa Creditsafe, Gomopa Captura, Gomopa Care Energy, Gomopa Curatio, Gomopa Consortis, Gomopa Carsten Simon, Gomopa Die Zeit, Gomopa Diebewertung, Gamepad Dolphin, Gomopa Deutschland, Gomopa Dr. Schulte, Gomopa Erfahrungen, Gomopa Erpressung, Gomopa Eev, Gomopa Eci, Gomopa Elbfonds, Gomopa Erfahrungsbericht, Gomopa Care Energy, Gomopa Facebook, Gomopa Forum, Gomopa Finanznachrichtendienst, Gomopa Fonds Finanz, Gomopa Fuchsgruber, Gomopa Fidentum, Gomopa Faz, Gomopa Foren, Gomopa Gmbh, Gomopa Gmbh Berlin, Gomopa Gmbh Hamburg, Gomopa Hamburg, Gomopa Haz, Gomopa Handelsregister, Gomopa Mega Holdings, Handelsblatt Gomopa, Gomopa Gmbh Hamburg, Gomopa Von Holst, Gomopa Invensys, Gomopa Insolvent, Gomopa Impressum, Gomopa Control Inc, Was Ist Gomopa, Gomopa Junginger, Gomopa Juwi, Gomopa Kreditkarte, Gomopa Klaus Maurischat, Gomopa Kritik, Gomopa Lopoca, Gomopa Login, Thomas Lloyd Gomopa, Gomopa Mastercard, Gomopa Maurischat, Gomopa Mega Holdings, Gomopa Massat, Gomopa Mafia, Gomopa Klaus Maurischat, Mega Holdings Gomopa, Frank Maiwald Gomopa, Erfahrungen Mit Gomopa, Gomopa Net, Gomopa Ndr, Gomopa Net Warnliste, Gomopa News, Gomopa Nachrichten, Gomopa New York, Gomopa Net Pressemitteilung, Gomopa Net Finanzforum, Gomopa Offline, Gomopa Ogi Ag, Gomopa Opfer, Onecoin Gomopa, Gomopa Zeit Online, Michael Oehme Gomopa, Gomopa Pressemitteilungen, Gomopa Pim, Gomopa Pleite, Gomopa Pro Ventus, Gomopa Profi User, Gomopa Probleme, Gomopa Patio, Gomopa Publity, Pulch Gomopa, Gomopa Net Pressemitteilung, Gomopa Queensgold, Gomopa Resch, Gomopa Relom, Gomopa Rwb, Renew Gomopa Profi User, Peter Reski Gomopa, Gomopa Tagesschau, Gomopa Twitter, Gomopa Verklagen, Gomopa Vnr, Gomopa Volz, Gomopa Von Holst, Gomopa Verbrecher, Gomopa Pro Ventus, Mark Vornkahl Gomopa, Gomopa Warnliste, Gomopa Wikipedia, Gomopa Wirecard, Gomopa Wellstar, Gomopa Wiki, Gomopa Net Warnliste, Robert Wallis Gomopa, Www.gomopa.net Forum, Wallis Gomopa, Andreas Wohlers Gomopa, Gomopa New York, Gomopa Zapp, Gomopa Zeit, Gomopa Zeit Online, Gomopa Die Zeit, Rainer Von Holst Firmenwelten, Rainer Von Holst Gerlachreport, Rainer Von Holst Usa, Rainer Von Holst Gerlach, Rainer Von Holst Gomopa, Rainer Von Holst Iserlohn, Rainer Von Holst, Rainer Von Holst Bank, Rainer Von Holst Politico, Rainer Von Holst Augsburg, Rainer Von Holst Augsburg, Rainer Von Holst Bank, Rainer Von Holst Firmenwelten, Rainer Von Holst Gerlachreport, Rainer Von Holst Gerlach, Rainer Von Holst Gomopa, Rainer Von Holst Iserlohn, Rainer Von Holst Politico, Rainer Von Holst Princeton, Rainer Von Holst Usa, Rainer Von Holst Werther

Insider – Verfassungsschutz kümmert sich um “GoMoPa”-Nazi-Ableger “Berlin Journal”

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Sympathieträger Neo-Nazi

Insider der Investigativ-Plattform INVESTIGOO berichten:

“Die Internetseite berlinjournal.biz steht im Visier des deutschen Verfassungsschutzes. Hintergrund sind „fremdenfeindliche Berichte, Rassenhass, Diskriminierung und rechtsradikale Propaganda“.

 

Sympathieträger Maurischat im Foto oben

Verantwortliche dieses „Machwerkes“ sind der Herausgeber des „Finanznachrichtendienstes“ gomopa.net, Klaus-Dieter Maurischat und sein Chefredakteur Frank Maiwald. Maurischat, der von der Augsburger Staatsanwaltschaft in einer Erpressungsstrafsache per Haftbefehl gesucht wird, lebt in Berlin im feudalen Untergrund: Unter den Linden 19 in einer 4000-teuren Penthousewohnung.
Der Chef des maroden „Finanznachrichtendienstes“ Gomopa bastelt seit Monaten an einer Nachfolgelösung für sein in Not geratenes Schiff. Angriffe auf ihn persönlich und die Strukturen von Gomopa haben aus der ehemaligen größten deutschen Drecksschleuder eine lahme Ente gemacht. Internetspezialisten überwachen inzwischen jeden Arbeitsschritt des „Finanznachrichtendienstes“, dessen einzige Aufgabe darin bestand Unternehmer, Unternehmen und Unschuldige zu erpressen.

Sympathieträger und Ex-STASI-Agent Maiwald im Bild oben

Hilfe bei seinem neuen Projekt „Berlin Journal“ bekommt er dabei von Gomopa-Chefredakteur Frank Maiwald. Gegen den ehemaligen Redakteur der Berliner B.Z. ermittelt die Staatsanwaltschaft Neuruppin unter dem Aktenzeichen 332 Js 17877/15 wegen Bankrotts, Sozialbetrugs und Steuerhinterziehung. Maiwald hat als Hartz IV-Empfänger regelmässig bis zu 7.000 Euro von Gomopa schwarz bezogen und war an dem Erpressungssystem des Unternehmens direkt beteiligt.
Die B.Z. hatte ihn wegen Spesenbetrugs gefeuert.
Unter diesem Vorzeichen ist die „Berichterstattung“ von Berlin Journal besonders widerwärtig. Die Internetseite wird ausschließlich von Maiwald geschrieben. Er arbeitet unter vielen Namen, am liebsten wahlweise unter dem Namen Bodo Hering oder Max Wolf. Das ergibt sich aus Protokollen des Internetverkehrs. Maiwald hat unter dem Titel „Flüchtlinge erhalten Essen für 16 Euro, Hartz-IV-Empfänger für 4,72 Euro“ einen Artikel veröffentlicht, der nicht nur faktisch unwahr ist, sondern seine nationalsozialistische Gesinnung offenbart. Maiwald (Foto), ein ehemaliger Stasi-Informant, kann wohl auch hier seine wahre Herkunft nicht verleugnen.

Mit einer Welle der Empörung und auch Zustimmung wurde auf der Internetseite auf diesen Bericht reagiert. Dabei konnte sich der Pöbel nach Herzenslust austoben. Das ist auch nach dem Geschmack von Klaus-Dieter Maurischat, dessen politischer Weitblick am Ende des Biertisches endet. Presserechtlich ist das „Organ“ für Ermittlungsbehörden offiziell nicht greifbar. Das Impressum weist als Verantwortlichen für den Inhalt „Bodo Hering“, also Frank Maiwald, aus. Die Redaktion hat keine ladungsfähige Adresse, so dass eigentlich juristisch nicht gegen die Publikation angegangen werden kann.
Doch so einfach wie noch vor 15 Jahren, als gomopa.net die deutsche Finanz- und Maklerszene in helle Aufregung versetzte, ist die Welt heute nicht mehr. Durch umfassende Recherchen konnten die presserechtlich Verantwortlichen für das Berlin Journal identifiziert werden. Damit die Verantwortlichen durch Geschädigte in die Haftung genommen werden können, veröffentlichen wir hier die entsprechenden Personaldaten:
MaurischatBJ
· Klaus-Dieter Maurischat, geb. 12. April 1956
Lange Straße 38, 27313 Dörverden, Hülsen, 2. OG
Unter den Linden 19, 10117 Berlin
Barnstedt 11, 27313 Dörverden
· Frank Maiwald, alias Bodo Hering, alias Max Wolf, geb. 6. Mai 1959
Nordweg 150
16516 Oranienburg
Derzeit wird versucht, die tatsächlichen Spuren zu verwischen. Klaus-Dieter Maurischat ist dabei auf die Idee gekommen, etwaige Haftungsfragen gleich rund 7.500 Kilometer in den US-amerikanischen Bundesstaat Wisconsin zu schieben. Hier ist die US-amerikanische Zeitschriftengruppe „Berlin Journal Newspapers“ aus Berlin (Wisconsin) ansässig. Das offensichtliche Kalkül von Maurischat und Maiwald: Die Gruppe aus Berlin in Wisconsin stehe hinter der Internetplattform. Damit wäre eine Haftung nach deutschen Recht nahezu unmöglich. Im Amerika gilt ein weitaus liberaleres Presserecht als in Deutschland.
Dumm nur, dass die beiden erwischt wurden: Die Verlagsleitung der „Berlin Journal Newspapers“ in Wisconsin hat strafrechtliche Schritte gegen Maurischat und Maiwald eingeleitet. Das geht, da Klaus-Dieter Maurischat die Internetseite tatsächlich über die in Delaware angemeldete Firma „Berlin Journal Inc.“ steuert. Damit ist die strafrechtliche Würdigung auch in den USA möglich. Gegen Klaus-Dieter Maurischat und seinen Gomopa-Vize Mark Vornkahl liegen wegen der erheblichen Vorwürfe der Erpressung, Nötigung, Steuerhinterziehung, gewerbsmässigen Betrugs und Nutzung einer US-Körperschaft für kriminelle Handlungen ohnehin schon Haftbefehle in den USA vor.
berlinjournal.biz gibt vor, mehr als 14.000 tägliche Leser zu haben. Tatsächlich wurden bei Facebook 10.000 „Likes“ für 790 Euro gekauft. So ist auch zu erklären, dass es diese Resonanzen auf die Berichterstattung gibt. Damit aber nicht genug: Über die sozialen Netzwerke wurde der Artikel dann von rechtsradikalen Organisationen wie „Pro Deutschland“ oder AfD verbreitet. Da waren sich Maurischat und Maiwald sicher, die richtigen Mengen an Leser zu finden.
Denn das Berlin Journal, so der Plan, soll in 2016 den Finanznachrichtendienst Gomopa als Plattform für Erpressung, Nötigung, üble Nachrede, Verunglimpfung als Drecksschleuder ablösen. Jetzt kommt noch eine andere Qualität dazu: menschenverachtender radikalfaschistischer Journalismus.
Aber nicht alle Leser sind blöd. Mohammed Hadi Al Khafaji bringt es auf den Punkt: „jetzt ist es amtlich: Berlin Journal ist ein Nazi-Blatt!“”

INVESTIGOO ist derzeit offline – wohl wegen der brisanten Inhalte.

Wer schützt die STASI heute noch ? Das neue Schweigen der Lämmer

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

bernd-pulch.jpg (100×124)

Liebe Leser,

fast 30 Jahre nach dem Fall der Mauer sind die STASI-Schergen, Mörder, Erpresser und Betrüger heute noch immer unter uns und leben ungestört, ja gehen weiter ihren Straftaten nach, da sie sonst nichts anderes können.

Warum ist dies so ?

Es ist klar, daß sie von ehemaligen Genossen und IM geschützt werden, die ihnen dienstbar sind, um nicht selber enttarnt und verfolgt zu werden.

Continue reading “Wer schützt die STASI heute noch ? Das neue Schweigen der Lämmer”

Die Liquidation der GoMoPa enthüllt

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Name Bereich Information V.-Datum Relevanz
GoMoPa GmbH
Hamburg
Gesellschaftsbekanntmachungen Liquidation 20.02.2015

GoMoPa GmbH

Hamburg

Die Gesellschaft ist aufgelöst. Die Gläubiger der Gesellschaft werden aufgefordert, sich bei ihr zu melden.

 

Der Liquidator

https://www.bundesanzeiger.de/ebanzwww/wexsservlet?session.sessionid=37eadd890bad0b1b61f24b7b78b81b31&page.navid=detailsearchlisttodetailsearchdetail&fts_search_list.selected=bec34c7f4779677f&fts_search_list.destHistoryId=65127

 

QUELLE: BUNDESANZEIGER

STASI-“GoMoPa” wegen Ruf – MORD an Journalisten im Visier der ARD/NDR

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Liebe Leser

Journalisten, die kritisch über das Portal “GoMoPa” berichteten, wurden oft diskreditiert. Jetzt liegen dem ARD-Magazin ZAPP (NDR) neue Unterlagen zum dubiosen Geschäftsgebaren der Firma vor.

Mit STASI-Methoden agieren, die aus der STASI von Oberst Stelzer stammenden, Cyber-Stalker:

Rufmord, Justiz-Mord, Wirtschaftskriminalität, Glykol und Toxdat gehören zu ihrem Arsenal – und die deutsche Justiz unternimmt nichts.

Im Gegenteil bei einigen Personen wie Beate Porten (Staatsanwältin)  und Thomas Porten (Gesellschafter/Chefredakteur IZ), und dem “GoMoPa”-Genossen Peter Ehlers (SJB-Fondsgesellschaft, “Der Fonds”/”Das Investment”) liegt der Verdacht nahe mit “GoMoPa” eng zu kooperieren, um eigene (mutmaßlich finanzielle) Interessen zu optimieren. Schön, wenn man dann noch einen ähnlichen Background hat…

Nach unseren Recherchen sind die weiteren Schlüsselpersonen mutmaßlich

– RA Jochen  und Manfred Resch, eng liiert mit dem STASI-Obersten und dem Mord-Experten Nr.1 der DDR, Oberst Ehrenfried Stelzer,

– der “GoMoPa”-“CTO” aus Dresden, nunmehr Berlin, Sven Schmidt,

– Jan Mucha, IZ,  (Familienbackground aus der kommunistischen “CSFR”)

– Isabella Colonius, IZ, mutmaßliche “GoMoPa”-Konfidentin

– der “GoMoPa”CEO” und President, der unter verschiedenen Decknamen agierende und mit mysteriöser Biographie ausgestattete “Klaus-Dieter Maurischat”

– der dubiose vor 1989 dem Fall der DDR – ebensowenig wie sein Kompagnon, der dubiose “Peter Ehlers”  in Erscheinung getretene SJB-Fonds-Vermittler “Gerd Bennewirtz”, derzeit Grevenbroich/Neuss

– der Hitler-“Biograph Rainer Zitelmann (aus Darmstadt wie “Porten & Porten”)

Insider berichten, daß “GoMoPa” von den oben genannten Personen und Institutionen mutmaßlich Informationen zugespielt bekommen.

Honi soit qui mal y pense !

Herzlichst Ihr

Magister Bernd Pulch

DHS Intelligence Assessment: Malicious Cyber Actors Target US Universities and Colleges

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

DHS-UniversityCyberThreats

Malicious Cyber Actors Target US Universities and Colleges

  • 5 pages
  • For Official Use Only
  • January 16, 2015

Download

(U//FOUO) We assess that the primary cyber threat to US university and college networks is cybercrime and unwitting hosting of malicious activity, likely because the regular turnover of student network users and requirements for accessibility to the networks make the networks difficult to monitor and secure.

(U//FOUO) We assess malicious cyber actors targeting intellectual property and research are the emerging cyber threat facing university and college networks. Cutting-edge research and sensitive US government and cleared defense contractor projects are appealing targets for cyber actors looking to gain access to sensitive research programs and information.

(U//FOUO) University Networks Face Common Cyber Threats

(U//FOUO) Malicious cyber actors have targeted US universities and colleges with typical cybercrime activities, such as spear phishing students and faculty with university-themed messages, creating fake university websites, and infecting computers with malicious software, likely in an attempt to gain access to student and faculty e-mail and bank accounts. We have no indication that cybercriminals target university systems and users more than any other cybercrime victims.

» (U//FOUO) According to sensitive DHS reporting, several different types of malware designed to gather personally identifiable information (PII) and exploit computer systems for financial gain—ransomware, clickfraud malware, and  credential-harvesting malware—were found on computer systems of an identified US university in late August 2014. We do not know if PII was compromised or exfiltrated as a result of these infections.

» (U//FOUO) In February 2014, unknown cyber actors targeted departments at an identified US university with phishing messages containing malicious links, according to FBI reporting. Computers of recipients that responded were infected with ransomware requiring victims to pay between $50 and $500 to decrypt their computers, according to FBI reporting.

» (U//FOUO) In early 2014, malicious cyber actors successfully executed an e-mail phishing attack against 166 employees at an identified US university. The phishing message was embedded with a malicious link to a fraudulent university website that, when accessed, prompted employees to provide PII associated with their financial accounts. The actors successfully compromised the financial accounts of two employees, changing their direct deposit information so that money was delivered to an unspecified US bank, resulting in financial losses for the employees, according to an FBI contact with excellent access.

(U//FOUO) US universities and colleges have extensive computer networks and infrastructure making them ideal targets for unwitting hosting of malicious cyber operations, including denial-of-service (DoS) attacks and undetected storage of malware. As with cybercrime, we have no indication that malicious cyber actors target university and college networks for these activities any more than other networks.

» (U//FOUO) In early 2014, an unidentified cyber actor leveraged a supercomputer at an identified US university to initiate a DoS attack against the servers of several identified US businesses that host servers for gaming activities, according to an FBI source with indirect access. The attack used about 98 percent of the university’s bandwidth.

» (U//FOUO) Unidentified cyber actors used a named US university’s web server as a file repository for distributing malicious tools, according to sensitive DHS reporting. Analysis of the web server confirmed that a number of malicious tools had been uploaded to the system, as of mid-2014.

(U//FOUO) University Networks May Be Target for Cyberespionage

(U//FOUO) While malicious cyber actors looking to exploit university and college networks for PII remain a consistent threat, we assess that the emerging cyber threat facing US university and college networks is cyberespionage actors seeking information and intellectual property. In addition to in-house, cutting-edge research, numerous US universities and colleges are involved in sensitive US government and cleared defense contractor research projects. These associations are very appealing to cyberespionage actors looking to gain access to sensitive research programs to exfiltrate information. University networks, which often have multiple levels of connectivity and accessibility to fuel collaboration, may present an easier target for cyberespionage actors than sensitive government or private industry networks. We have only a few examples of data exfiltration from university networks, but those we have lead us to judge that this activity does target research information and intellectual property.

» (U) According to reporting from a US cybersecurity firm, likely Iranian cyber actors, as part of a global espionage campaign, targeted universities in the United States, India, Israel, and South Korea from 2012 to late 2014. The cyber actors targeted research efforts, student information, student housing, and financial aid systems. According to the security firm, the cyber actors reportedly harvested confidential critical infrastructure documents from major educational institutions around the world.

» (U) A late-2013 review of the infrastructure associated with a probable foreign cyberespionage campaign indicated broad targeting of university computer systems, including those in the United States, the United Kingdom, and Israel, according to DHS reporting. The unknown actors successfully exfiltrated sensitive research information associated with university-affiliated medical organizations, including passwords and passport images.

Cyber Attack Map, Cyber Attack 2017, Cyber Attack On Electrical Grid, Cyber Attack 2016, Cyber Attack Definition, Cyber Attack Statistics 2016, Cyber Attack Types, Cyber Attack Statistics, Cyber Attack News, Cyber Attack May 2017, Cyber Attack Articles, Cyber Attack Act Of War, Cyber Attack Ap Style, Cyber Attack Attribution, Cyber Attack April 2017, Cyber Attack Ap, Cyber Attack America, Cyber Attack Amazon, Cyber Attack Associated Press, Cyber Attack Airlines, Cyber Attack By North Korea, Cyber Attack Bank Of America, Cyber Attack Book, Cyber Attack Bitcoin, Cyber Attack Britain, Cyber Attack Bank, Cyber Attack Business, Cyber Attack British, Cyber Attack By Russia, Cyber Attack British Health Facilities, Cyber Attack Costs, Cyber Attack Consequences, Cyber Attack Case Study, Cyber Attack Cases, Cyber Attack Cry, Cyber Attack Chain, Cyber Attack Comcast, Cyber Attack Causes Physical Damage, Cyber Attack Cartoon, Cyber Attack China, Cyber Attack Definition, Cyber Attack Data, Cyber Attack Defense, Cyber Attack Detection, Cyber Attack Database, Cyber Attack Documentary, Cyber Attack Dallas, Cyber Attack Define, Cyber Attack Dictionary, Cyber Attack Ddos, Cyber Attack Examples, Cyber Attack Estonia, Cyber Attack Electrical Grid, Cyber Attack Effects, Cyber Attack Europe, Cyber Attack England, Cyber Attack Election, Cyber Attack Essay, Cyber Attack Ecmc, Cyber Attack Events, Cyber Attack Facts, Cyber Attack From North Korea, Cyber Attack Fedex, Cyber Attack Friday, Cyber Attack Fbi, Cyber Attack Florida, Cyber Attack France, Cyber Attack Future, Cyber Attack Facebook, Cyber Attack Fox, Cyber Attack Google, Cyber Attack Graph, Cyber Attack Government, Cyber Attack Grid, Cyber Attack Gif, Cyber Attack Graphic, Cyber Attack Groups, Cyber Attack Georgia, Cyber Attack Global Map, Cyber Attack Going On Now, Cyber Attack Healthcare, Cyber Attack Headlines, Cyber Attack Hospital, Cyber Attack Hyphen, Cyber Attack History, Cyber Attack Heat Map, Cyber Attack Homeland Security, Cyber Attack Hits Fedex, Cyber Attack Hostage, Cyber Attack Hero, Cyber Attack Insurance, Cyber Attack Images, Cyber Attack In Spanish, Cyber Attack Iran, Cyber Attack Icon, Cyber Attack In Usa, Cyber Attack In The Us, Cyber Attack Infrastructure, Cyber Attack International Law, Cyber Attack Insurance Coverage, Cyber Attack June 2017, Cyber Attack Jobs, Cyber Attack June 14 2017, Cyber Attack Japan, Cyber Attack June 13 2017, Cyber Attack Jokes, Cyber Attack June, Cyber Attack James Paget Hospital, Cyber Attack Jordan, Cyber Attack Jamaica, Cyber Attack Kill Chain, Cyber Attack Korea, Cyber Attack Killswitch, Cyber Attack Kansas, Cyber Attack Kaspersky, Cyber Attack Kaiser Permanente, Cyber Attack Kya Hai, Cyber Attack Kenya, Cyber Attack Kuwait, Cyber Attack Kings Mill Hospital, Cyber Attack Lifecycle, Cyber Attack Live Map, Cyber Attack Last Week, Cyber Attack List, Cyber Attack Laws, Cyber Attack London, Cyber Attack Live, Cyber Attack Losses, Cyber Attack Lifecycle Mitre, Cyber Attack Last Friday, Cyber Attack Map, Cyber Attack May 2017, Cyber Attack Map Norse, Cyber Attack Meaning, Cyber Attack Movie, Cyber Attack Methods, Cyber Attack Monitor, Cyber Attack Map Live, Cyber Attack Merriam Webster, Cyber Attack Meme, Cyber Attack News, Cyber Attack North Korea, Cyber Attack News Today, Cyber Attack Names, Cyber Attack Notification, Cyber Attack News 2016, Cyber Attack Netflix, Cyber Attack Now, Cyber Attack Nhs, Cyber Attack North Korea Missile, Cyber Attack On Electrical Grid, Cyber Attack Or Cyber-attack, Cyber Attack On North Korea, Cyber Attack On Us Power Grid, Cyber Attack On Us, Cyber Attack On Iran, Cyber Attack On Sony, Cyber Attack On Target, Cyber Attack On Healthcare, Cyber Attack On Usa, Cyber Attack Power Grid, Cyber Attack Prevention, Cyber Attack Phases, Cyber Attack Policy, Cyber Attack Pictures, Cyber Attack Phishing, Cyber Attack Prediction, Cyber Attack Protection, Cyber Attack Pdf, Cyber Attack Prevention Plan, Cyber Attack Quotes, Cyber Attack Qatar, Cyber Attack Questions, Cyber Attack Quora, Cyber Attack Queens Hospital Romford, Cyber Attack Qld Health, Cyber Attack Queensland Health, Cyber Attack Queensland, Cyber Attack Queens Hospital Burton, Cyber Attack Quiz, Cyber Attack Ransomware, Cyber Attack Response Plan, Cyber Attack Report, Cyber Attack Ransom, Cyber Attack Russia, Cyber Attack Recovery, Cyber Attack Right Now, Cyber Attack Real Time, Cyber Attack Recent, Cyber Attack Risks, Cyber Attack Statistics 2016, Cyber Attack Statistics, Cyber Attack Statistics 2017, Cyber Attack Stories, Cyber Attack Simulation, Cyber Attack Scenario, Cyber Attack Surface, Cyber Attack Statistics By Country, Cyber Attack Synonym, Cyber Attack Statistics 2015, Cyber Attack Types, Cyber Attack Trends, Cyber Attack Today, Cyber Attack Target, Cyber Attack Today 2017, Cyber Attack Timeline, Cyber Attack Threats, Cyber Attack Tools, Cyber Attack This Week, Cyber Attack Tracker, Cyber Attack Us Power Grid, Cyber Attack Us, Cyber Attack Uk, Cyber Attack Ukraine, Cyber Attack Usa, Cyber Attack Usa Today, Cyber Attack Usa 2017, Cyber Attack Us Companies, Cyber Attack Utilities, Cyber Attack Underway, Cyber Attack Vectors, Cyber Attack Visualization, Cyber Attack Vs Data Breach, Cyber Attack Video, Cyber Attack Virus, Cyber Attack Vs Cyber Attack, Cyber Attack Vulnerability, Cyber Attack Verizon, Cyber Attack Viewer, Cyber Attack Video Youtube, Cyber Attack Wanna Cry, Cyber Attack Wiki, Cyber Attack Website, Cyber Attack World Map, Cyber Attack Wells Fargo, Cyber Attack Wanna, Cyber Attack Worm, Cyber Attack Washington Post, Cyber Attack Wisconsin, Cyber Attack Whaling, Cyber Attack Xbox, Cyber Attack Xp, Cyber Attack Xp Patch, Cyber Attack Xp Only, Cyber Attack Xbox Live, Cyber Attack Team Xbox, Cyber Attack On Xbox And Playstation, Cat Cyber Attack Team Xbox, Cyber Sub Zero X Ray Attack, Xbox Cyber Attack Christmas, Cyber Attack Yahoo, Cyber Attack Youtube, Cyber Attack Yesterday, Cyber Attack Yorkshire, Cyber Attack York Hospital, Cyber Attack York, Cyber Attack Yeovil Hospital, Cyber Attack York Nhs, Cyber Attack Yesterday Hindi, Cyber Attack Uk, Cyber Attack Zomato, Cyber Attack Zee News, Cyber Attack Zero Day, Cyber Attack Zoho, Cyber Attack Zeus, Cyber Attack Ziggo, Cyber Zombie Attack, Cyber Attack New Zealand, Cyberbully Zombie Attack, Zappos Cyber Attack,