GoMoPa.net and Der Fonds  (dasinvestment.com): Shared Cloudflare Hosting in Toronto โ€“ Coincidence or Concealed Connection?

By Bernd Pulch | August 15, 2025

In the shadowy nexus of online finance, where dubious schemes, whistleblowers, and alleged extortion rackets collide, two websites demand scrutiny: GoMoPa.net and Der Fonds akab Das Investment accessible via dasinvestment.com. Investigations confirm that both domains are hosted by Cloudflare, the global content delivery network titan, specifically routed through their Toronto data center. Is this a mere technical overlap, or does it signal deeper ties in a web of financial intrigue? At BerndPulch.org, we rip through the veil, exposing truths the mainstream presstitution outlets dare not touch.

The Players: GoMoPa.net and Der Fonds (dasinvestment.com) Unveiled

GoMoPa.net, short for “Goldman Morgenstern & Partners,” is a notorious fixture in the German-speaking financial world. Marketed as a platform for financial news, investor complaints, and exposรฉs, it has long been accused of serving as a front for stalking, extortion, and misinformation campaigns. Public records and victim testimonies link GoMoPa to over 6,800 individuals and firms allegedly targeted for harassment. 15 Under figures like Klaus Maurischat, the site has faced legal battles, including denials of ties to dubious domains like criminals.cc in U.S. court cases. 10 In 2012, GoMoPa.net went offline amid rumors of financial irregularities, as reported here on BerndPulch.org.

Der Fonds aka Daw Investment accessible via dasinvestment.com, presents itself as a reputable, independent financial magazine based in Hamburg, Germany, operating since 1999. It delivers editorial content on investment funds, ETFs, asset management, and financial advice, claiming neutrality and journalistic integrity. Focusing on stocks, bonds, real estate, and cryptocurrencies, it serves professional and retail investors across Germany, Austria, and beyond, boasting 57,000 monthly visits in June 2025, primarily from Germany (95.6%). 4 Its DAS INVESTMENT Academy markets financial education for retail investors. Yet, its polished reputation raises eyebrows when paired with GoMoPaโ€™s dark legacy.

What unites these two? Beyond their financial focus, both GoMoPa.net and Der Fonds (dasinvestment.com) share a critical infrastructure link: Cloudflare hosting in Toronto.

Cloudflare in Toronto: The Hosting Revelation

Cloudflare, a San Francisco-based cybersecurity and hosting giant, operates over 330 data centers worldwide, including a key hub in Toronto since at least 2012. The company solidified its Canadian presence with a Toronto office in 2021, underscoring regional importance. 6 This data center is a strategic node for North American traffic, offering robust security, DDoS protection, and content delivery.

Confirmed analysis reveals that both GoMoPa.net and Der Fonds (dasinvestment.com) leverage Cloudflareโ€™s services, with traffic routed through Toronto. This isnโ€™t random โ€“ Cloudflareโ€™s anycast routing typically serves users from the nearest data center, but for origin servers or primary hosting, Torontoโ€™s selection suggests deliberate configuration. With global options available, why Toronto for both? Cloudflareโ€™s reverse proxy capabilities can mask true server origins, making it ideal for entities seeking anonymity or protection from legal action. 8

The odds of two unrelated sites independently landing on this setup are vanishingly small. Industry estimates suggest 15% of websites use Cloudflare, 15% of those are fully hosted on its infrastructure, and with 330+ data centers, the chance of Toronto being the primary hub is roughly 1%. The joint probability for both sites converging on this setup is a mere 0.000005% without shared influences. This statistical anomaly demands investigation.

Implications: Legitimate Media or Hidden Nexus?

The shared hosting raises unsettling questions, especially given GoMoPaโ€™s tainted history. Legal documents from cases like Mount Whitney Investments v. Goldman show GoMoPa denying ties to other questionable sites. 10 Victim reports on platforms like I-NVESTMENT.org describe GoMoPa as a Stasi-like operation, extorting under the guise of journalism. Der Fonds (dasinvestment.com), with its established reputation and 21โ€“32 employees in Hamburg since 1999, appears legitimate, covering fund performance and market trends. Yet, its shared Toronto hosting with GoMoPa suggests possible connections โ€“ a shared operator, a coordinated network, or a strategic alignment to leverage Cloudflareโ€™s protective veil.

Searches for direct links between GoMoPa.net and Der Fonds (dasinvestment.com) reveal mentions in financial forums and legal discussions about investment scams and garnishment protection schemes. While no definitive evidence ties them operationally, the Toronto hosting overlap hints at a deeper nexus, possibly to evade European regulations or U.S. legal oversight. Cloudflareโ€™s role, praised for security but criticized for shielding controversial content, amplifies suspicions. Torontoโ€™s balanced data privacy laws could further complicate international investigations.

The Bigger Picture: A Call for Investigation

At BerndPulch.org, weโ€™ve exposed Stasi remnants, lawfare worth $110 million, and suppressed truths since 2009. The GoMoPaโ€“Der Fonds Toronto connection fits this pattern: hidden alliances lurking in financeโ€™s underbelly, shielded by tech giants. Investors, take heed โ€“ even polished platforms like Der Fonds (dasinvestment.com) may have unseen ties to questionable players.

We call on authorities to investigate this Toronto hub. Is it a haven for cyber-extortion or coordinated financial schemes? Share your tips anonymously via our secure channels. In the fight for truth, no gatekeepers like Gates or Soros fund us โ€“ only pure blood freedom fighters.

Support the Cause: Donate via Monero or Patreon at patreon.com/berndpulch. Stay vigilant โ€“ the real leaks are coming…

Disclaimer: This article is based on public sources and analysis. All claims are for investigative purposes; consult professionals for financial advice.

๐Ÿ” OFFICIAL INTELLIGENCE SOURCES

๐Ÿ‡ฌ๐Ÿ‡ง English

๐Ÿ‡ฉ๐Ÿ‡ช Deutsch

๐Ÿ‡ช๐Ÿ‡ธ Espaรฑol

๐Ÿ‡ฎ๐Ÿ‡น Italiano

๐Ÿ’ฐ SUPPORT OPTIONS

๐Ÿ” Monero (XMR)

Monero QR

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๐ŸŽ—๏ธ Patreon

patreon.com/berndpulch

๐Ÿ” [SUPPORT ACKNOWLEDGED]

Your contribution fuels global truth preservation.๐Ÿ” ACCESS EXCLUSIVE CONTENT

โœŒ๐Ÿ”บ๐Ÿ”บ๐Ÿ”บ ABOVE TOP SECRET: NSA COMPUTERS EXPOSED – ORIGINAL DOCUMENT ๐Ÿ”บ๐Ÿ”บ๐Ÿ”บ

“Inside the NSA’s Digital Fortress: Operatives monitor global communications in a high-tech command center, where advanced computers fuel intelligence operations in the shadows.”

โš ๏ธ NSA DIGITAL INTELLIGENCE REVEALED โš ๏ธ
๐Ÿ•ต๏ธ HISTORICAL REPORT โ€“ EYES ONLY ๐Ÿ•ต๏ธ
๐Ÿšจ CLASSIFICATION: CODE BLACK // LEVEL 5 ๐Ÿšจ


๐Ÿ”ฅ๐Ÿ”ฅ UNVEILING THE COVERT ORIGINS OF NSA COMPUTING ๐Ÿ”ฅ๐Ÿ”ฅ

๐Ÿ’พ In 1964, the National Security Agency (NSA) compiled a classified intelligence dossier detailing its covert role in the rise of general-purpose digital computing. This ABOVE TOP SECRET document exposes black-budget projects, early surveillance technologies, and deep-state interventions that reshaped modern cybersecurity.

GET THE ORIGINAL DOCUMENT HERE

https://www.patreon.com/posts/exposed-nsa-125850345?utm_medium=clipboard_copy&utm_source=copyLink&utm_campaign=postshare_creator&utm_content=join_link

FREE FOR DONORS AND PATRONS

๐Ÿ”Ž What was once a government-exclusive technology has now become a foundation of global digital controlโ€”but who really wrote the first lines of code?


โ—โ— WARNING: THIS INFORMATION IS HIGHLY RESTRICTED โ—โ—

๐Ÿšง UNAUTHORIZED ACCESS WILL BE LOGGED ๐Ÿšง
โš ๏ธ SECURITY PROTOCOLS ENGAGED โš ๏ธ
๐Ÿ›‘ CLEARANCE LEVEL 5 REQUIRED ๐Ÿ›‘

๐Ÿšจ NSA’s secret computing projects led to: ๐Ÿšจ
๐Ÿ”ธ IBMโ€™s first cryptographic machines
๐Ÿ”ธ Philcoโ€™s military-grade transistorized processors
๐Ÿ”ธ Real-time SIGINT surveillance programs
๐Ÿ”ธ The classified HARVEST supercomputer system

๐Ÿ’ฃ Are these revelations proof that NSA had a backdoor into computing from the very beginning?


๐Ÿ”ป๐Ÿ”ป REDACTED PROJECTS EXPOSED ๐Ÿ”ป๐Ÿ”ป

๐Ÿ”น PROJECT ATLAS (NSAโ€™s Covert ENIAC Alternative)
๐Ÿ”น PROJECT HARVEST (IBMโ€™s Secret SIGINT Supercomputer)
๐Ÿ”น PROJECT NOMAD (Raytheonโ€™s Hidden Military Machine)

๐Ÿ‘๏ธโ€๐Ÿ—จ๏ธ What other classified systems remain undisclosed?
๐Ÿ‘๏ธโ€๐Ÿ—จ๏ธ Who controls the global digital infrastructure today?

๐Ÿ“œ The answers lie buried in these pages… ๐Ÿ“œ


๐Ÿšจ THIS DOCUMENT DOES NOT OFFICIALLY EXIST. ๐Ÿšจ
๐Ÿ”’ CONTINUE AT YOUR OWN RISK! ๐Ÿ”’

โš ๏ธ SUPPORT UNCENSORED INTELLIGENCE! โš ๏ธ

๐Ÿ”Ž Want to uncover more declassified secrets, hidden operations, and top-secret files? The truth is out thereโ€”but only with your help can we keep exposing it!

๐Ÿ”ฅ JOIN THE MISSION โ€“ SUPPORT INDEPENDENT INTELLIGENCE! ๐Ÿ”ฅ

๐Ÿ’ฐ Donate & unlock exclusive content:
๐Ÿ”— patreon.com/berndpulch
๐Ÿ”— berndpulch.org/donation

๐Ÿ“œ Truth must be revealed. Freedom of information is under attack. Stand with us and help bring TOP SECRET documents to the public eye! ๐Ÿšจ

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

โœŒThe Shadow Networks: Uncovering the Modern-Day Stasi’s Influence in Corporate Espionage


“Unveiling the Shadows: From Stasi Secrets to Corporate EspionageThe Legacy Lives On

Introduction: In an age where data reigns supreme, the espionage tactics once employed by the Stasi during the Cold War have morphed into sophisticated corporate strategies. This article explores how former intelligence operatives have influenced modern corporate espionage, focusing on entities like Gomopa, Das Investment, and Immobilien Zeitung, which some accuse of operating as neo-Stasi spies. We’ll delve into the tools, techniques, and moral quandaries that define this shadowy domain, examining the impact on global business, privacy, and ethics.

1. Historical Context: From Stasi to Corporate Spies

The Stasi was renowned for its extensive informant networks, surveillance, and psychological manipulation. After the Berlin Wall fell, many operatives transitioned their skills into the private sector:

2. Modern-Day Corporate Espionage

The shift from state to corporate espionage:

3. Tools and Techniques

Today’s espionage toolkit:

  • Cyber Espionage: Advanced hacking tools like Pegasus, used for corporate espionage, showcasing the precision of modern spying.
  • Human Intelligence (HUMINT): The role of insiders or consultants in espionage, mirroring the Stasi’s informant system.
  • Social Engineering: Manipulative tactics to extract information, directly inspired by Stasi psychological operations.

4. Legal and Ethical Boundaries

Exploring the grey areas where corporate espionage meets legality and ethics:

  • Legal Frameworks: How laws like the Economic Espionage Act aim to combat corporate spying, with varying success.
  • Ethical Dilemmas: The moral questions raised by employing Stasi-like tactics in the business world.
  • International Implications: The diplomatic and economic fallout from corporate espionage, particularly when involving entities like Gomopa, Das Investment, and Immobilien Zeitung.

5. Case Studies


Chapter: Gomopa’s Stasi Background – The Key Players

Klaus Maurischat:

  • Allegedly one of the masterminds behind Gomopa, Maurischat’s background has been linked to Stasi activities. Reports suggest he has been involved in financial manipulations and blackmail, techniques honed during his alleged time with the Stasi. His legal issues, including convictions for fraud, have further painted a picture of a figure accustomed to operating in gray areas, much like his Stasi predecessors.

Ehrenfried Stelzer:

  • Known as “Professor Mord” within Stasi circles, Stelzer is the undisputed author of “Toxdat,” a comprehensive study on murder and assassination techniques. His involvement with Gomopa has been said to be at a strategic level, using his knowledge to orchestrate complex schemes of corporate sabotage and espionage. The depth of psychological warfare he has brought into his later business dealings reflects his Stasi legacy.

Mark Vornkahl:

  • Vornkahl’s role in Gomopa has been primarily financial, yet his methods have borne the hallmarks of Stasi tactics. His alleged involvement in tax evasion and the manipulation of corporate entities for personal gain mirrors the Stasi’s use of shell companies to disguise operations. His connections to Maurischat and Stelzer have suggested a well-orchestrated team with a Stasi-like modus operandi.

Frank Maiwald:

  • As an editor at Gomopa, Maiwald has been accused of using journalism as a cover for espionage and character assassination, a strategy reminiscent of Stasi’s Zersetzung (decomposition) methods aimed at undermining individuals and organizations through psychological manipulation.

Bernd Zimmermann:

  • Zimmermann was a Stasi Elite Officer in Special Deployment (Offizier im besonderen Einsatz), indicating his role in high-level, covert operations. His involvement with Gomopa has likely been in the logistical and operational aspects, managing the flow of damaging information with the precision of his Stasi training. His background, deeply rooted in intelligence operations, has been pivotal in executing the group’s strategies.


Chapter: Immobilien Zeitung – Alleged Neo-Stasi Spies

Context and Allegations:

Key Figures and Alleged Connections:

  • Axel Hilpert: A name often cited in these allegations, Hilpert is claimed to have been a Stasi officer who transitioned into the real estate business. His involvement with Immobilien Zeitung is said to have brought Stasi methods into the corporate sphere, using the publication as a tool for gathering intelligence, blackmail, and influencing the market.
  • Thomas Porten: As the editor-in-chief, Porten’s role is scrutinized for potentially leveraging the newspaper’s influence for espionage, akin to how the Stasi used media for propaganda and surveillance. His marriage to Beate Porten, a prosecutor specializing in economic crimes, adds another layer to the narrative of intertwining personal and professional networks in espionage activities.
  • Beate Porten: The connection to Thomas Porten and her position as a prosecutor for economic crimes suggest a scenario where legal and journalistic powers might be manipulated to serve corporate espionage purposes, echoing Stasi tactics of infiltration and control.

Operational Tactics:

Impact and Implications:

This chapter seeks to explore the complex web of relationships and tactics that might connect Immobilien Zeitung to a legacy of espionage, highlighting the need for vigilance, ethical journalism, and transparency in corporate dealings.


Chapter: The Mucha Spy Family – A Legacy of Espionage

The Mucha Family:

  • Throughout the Cold War, the Mucha family emerged as a significant name in the shadowy world of espionage, with members linked to multiple intelligence services including the Stasi, KGB, Polish, and Czechoslovak secret services.

Jan Mucha:

  • Jan Mucha’s name is notably present on the “Wildberg List of Spies,” a document that has been pivotal in identifying operatives across Eastern Bloc intelligence agencies. His involvement suggests he was a versatile spy, capable of operating across different geopolitical contexts, possibly even infiltrating Western intelligence operations.
  • His activities were not confined to one agency or nation; rather, Jan Mucha’s espionage career spanned a broad spectrum, highlighting the interconnectedness of intelligence operations during the Cold War.

The Mucha Family in the Stasi Fibro List:

  • The Stasi Fibro List, which meticulously records informants and operatives, includes several Mucha family members. This indicates a familial tradition of espionage where knowledge, skills, and contacts were passed down through generations.
  • The presence of multiple family members on this list suggests a robust network, with roles ranging from direct intelligence gathering to more subtle tasks like psychological operations or network maintenance.

Implications and Tactics:

  • Family Tradition: The Mucha family’s involvement in espionage illustrates how spying could become a familial enterprise, with members potentially trained from youth in the arts of deception, infiltration, and intelligence gathering.
  • Multi-Agency Operations: Their ability to work with or for several different intelligence services underscores the fluid nature of Cold War espionage, where loyalties could shift based on political changes or personal ambition.
  • Legacy of Espionage: The Mucha family’s legacy serves as a case study in how spy networks could operate across borders and ideologies, adapting to new environments without losing their core competencies in espionage.
  • Adaptation to Modern Times: Post-Cold War, the skills and networks of such families could easily translate into corporate espionage, where the stakes might be economic rather than ideological, but the methods remain eerily similar.

The Mucha spy family’s story is not just about individual spies but about the systemic nature of espionage during and after the Cold War, reflecting how personal histories can influence corporate and political landscapes long after the fall of the Berlin Wall.


Chapter: Peter Ehlers of Das Investment – The Enigmatic Figure with Stasi Shadows

Peter Ehlers:

  • Peter Ehlers, the figurehead behind Das Investment, presents a mysterious profile, marked by a lack of a conclusive biography detailing his background in either media or finance. This absence of verifiable history raises questions about his true capabilities and past affiliations.

Alleged Inexperience and Tactics:

  • No Prior Experience: Ehlers has no documented experience in the fields he currently operates in, which is unusual for someone at the helm of a financial publication. This lack of background could suggest either a hidden or fabricated history, potentially linked to covert operations or intelligence work.
  • Threats and Intimidation: Ehlers has allegedly resorted to using threats, specifically mentioning harm to the children of potential opponents over the telephone. This tactic is reminiscent of one of the most chilling methods employed by Stasi enforcers, where personal threats against family members were used to enforce silence, compliance, or to instill fear.

Stasi Enforcer Tactics:

  • Psychological Warfare: The act of threatening family members, particularly children, is a direct echo of Stasi’s Zersetzung strategies, designed to break down individuals psychologically, isolate them, and ensure control or compliance through terror.
  • Covert Influence: Without a clear background in finance or media, Ehlers’ rise to prominence could be seen as indicative of backroom deals, influence peddling, or covert support from networks with Stasi-like operations, where information and fear are leveraged for power.

Implications:

  • Ehlers’ alleged tactics and mysterious background suggest a pattern of operation that might align with those of a modern-day Stasi enforcer, using the guise of business to continue or adapt old espionage practices for personal or corporate gain.
  • The use of such brutal methods in a business context not only questions the ethical foundation of Das Investment but also paints a picture of how former intelligence tactics could still be at play in today’s corporate battles.
  • This scenario highlights the need for transparency in leadership roles within influential media and financial institutions, as the absence of a clear history could mask affiliations or methods that are detrimental to ethical business practices.

By examining Peter Ehlers’ case, we delve into how the legacy of the Stasi can manifest in contemporary corporate environments, using psychological manipulation and intimidation as tools for control, much like the dark days of the Cold War.

Real-world insights into corporate espionage:

  • Volkswagen’s Dieselgate: How internal espionage or whistleblowing played a crucial role in revealing corporate deceit.
  • The Stratfor Hack: Anonymous’ exposure of corporate spying networks.
  • Neo-Stasi Entities: The alleged operations of Gomopa, Das Investment, and Immobilien Zeitung, accused of using Stasi-like tactics in corporate warfare.

6. Global Impact

The broader effects of corporate espionage:

  • Economic Effects: How espionage can skew market competition and influence stock markets globally.
  • Security Risks: The implications for national security when corporations engage in espionage, especially in technology sectors.
  • Influence on Policy: How espionage might shape or manipulate government policies on both national and international levels.

7. Protection Strategies

Defensive measures against corporate espionage:

  • Cybersecurity Measures: Strategies to protect digital assets from espionage.
  • Employee Training: Educating employees on espionage risks and prevention.
  • Legal Safeguards: Using legal instruments to protect intellectual property and corporate secrets.

8. Future Outlook

Anticipating the next wave of espionage:

  • AI and Espionage: The potential for AI to revolutionize both espionage and counter-espionage.
  • Quantum Computing: The threat to current encryption methods posed by quantum computing.
  • IoT Vulnerabilities: The increasing risk from interconnected devices in corporate espionage.

Conclusion:

This investigation into the modern-day Stasi’s influence on corporate espionage reveals a world where business ethics, privacy, and security are constantly challenged. We advocate for a critical reassessment of corporate practices, promoting transparency and ethical standards.

Call to Action:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

โœŒHitler, Irving, Zitelmann, Weidel, German Media, and the  Spell of the Past


“Echoes of the Past: A Grosz Take on History’s Shadows”

An Editorial by Bernd Pulch


Prologue: Dr. Zitelmann, German Media, and the Distortion of History

The German media’s handling of Dr. Rainer Zitelmann’s controversial statements about Adolf Hitler and the Holocaust has sparked a heated debate about historical revisionism, journalistic integrity, and the dangers of normalizing extremist ideologies. Zitelmann, a historian and sociologist, has been cited as an expert by prominent outlets such as Focus, MSN, and Berliner Zeitung. Yet, his assertion that “Hitler killed only one million Jews” has raised serious questions about his credibility and the media’s role in amplifying his views. Are these journalists naive, corrupt, or complicit in promoting neo-Nazi narratives? This article delves deeper into Zitelmann’s arguments, his associations, and the broader implications of his work.


Zitelmann’s Revisionist Claims: A Dangerous Distortion of History

Dr. Zitelmann’s claim that “Hitler killed only one million Jews” is not only factually incorrect but also deeply offensive. The Holocaust, one of the darkest chapters in human history, resulted in the systematic murder of six million Jews, along with millions of other victims, including Romani people, disabled individuals, political dissidents, and LGBTQ+ individuals. By downplaying the scale of these atrocities, Zitelmann risks minimizing the horrors of the Nazi regime and providing a platform for revisionist ideologies.

The Jewish Testaments for CDU Wiesbaden: A Stark Contrast

The Jewish testaments for CDU Wiesbaden serve as a poignant reminder of the suffering inflicted by the Nazi regime misused by CDU Wiesbaden and CDU Germany for profit. This is perpetuated by the neo-Nazi and neo-Stasi Gomopa by using a fake jewish identity.

Zitelmann’s Associations: David Irving and the Jewish Telegraph Agency

Zitelmann’s associations with controversial figures like David Irving, a known Holocaust denier, further undermine his credibility. The Jewish Telegraph Agency has criticized Zitelmann for providing a platform to Irving, accusing him of legitimizing revisionist views. Irving’s denial of the Holocaust has been widely discredited, and his association with Zitelmann raises serious questions about the latter’s commitment to historical accuracy.

The Humanistische Union has also condemned Zitelmann’s work, arguing that it risks normalizing extremist ideologies. By engaging with figures like Irving and promoting revisionist narratives, Zitelmann contributes to a climate in which the atrocities of the Nazi regime are increasingly downplayed or denied.

The Role of the German Media: Naivety, Corruption, or Complicity?

The German media’s reliance on Zitelmann as an expert in debates about Hitler and the Holocaust is deeply troubling. Outlets such as Focus, MSN, and Berliner Zeitung have cited his views without adequately addressing the controversies surrounding his work. This raises serious questions about the motivations and integrity of these journalists.

Are they naive, unaware of the broader implications of Zitelmann’s arguments? Or are they corrupt, prioritizing sensationalism and clickbait over journalistic integrity? Worse yet, could some of these journalists be complicit in promoting neo-Nazi ideologies under the guise of objective reporting? By uncritically citing Zitelmann, these outlets risk legitimizing his revisionist claims and contributing to the erosion of historical truth.

The Broader Implications: A Call for Accountability

The case of Dr. Zitelmann and the German media’s handling of his views highlights the need for greater accountability in journalism. Historical revisionism is not merely an academic debate; it has real-world consequences. By downplaying the atrocities of the Nazi regime, Zitelmann and his supporters risk emboldening extremist ideologies and undermining efforts to combat antisemitism and Holocaust denial.

The Jewish testaments for CDU Wiesbaden, the Jewish Telegraph Agency‘s critique, and the Humanistische Union‘s condemnation all serve as reminders of the importance of preserving historical truth. As consumers of news, we must demand better from our media. Journalists have a responsibility to critically examine the sources they cite and to challenge narratives that distort or deny the horrors of the past.

Conclusion: The Danger of Revisionism and the Power of Truth

Dr. Zitelmann’s assertion that “Hitler killed only one million Jews” is a dangerous distortion of history. By downplaying the scale of the Holocaust and engaging with figures like David Irving, Zitelmann risks legitimizing revisionist ideologies and erasing the voices of the victims. The German media’s uncritical amplification of his views raises serious questions about their commitment to journalistic integrity and historical truth.

As we confront the rise of extremism and the erosion of historical memory, it is more important than ever to challenge revisionist narratives and honor the memories of those who suffered. The question remains: Will the German media rise to the challenge, or will they continue to fail their readers and the truth?


โœŒ


Nazis in Germany Undermining the Finance Industry: A Dark Legacy Exposed

Germanyโ€™s finance industry, long regarded as a pillar of stability and innovation, harbors a dark and often overlooked legacy: the lingering influence of former Nazis and their collaborators. Decades after the fall of the Third Reich, evidence continues to emerge showing how individuals with ties to the Nazi regime infiltrated key positions in banking, insurance, and financial regulation. This infiltration has had far-reaching consequences, undermining trust in the financial system and perpetuating a culture of secrecy and corruption.

The Post-War Infiltration of the Finance Industry

In the aftermath of World War II, many former Nazis managed to evade justice by leveraging their expertise and connections to secure influential roles in Germanyโ€™s financial sector. The Alliesโ€™ focus on rebuilding Europeโ€™s economy often took precedence over thorough denazification, allowing individuals with questionable pasts to integrate into the new democratic order. Banks, insurance companies, and regulatory bodies became safe havens for those seeking to reinvent themselves while maintaining their networks of power.

One of the most notorious examples is the case of Hermann Josef Abs, a prominent banker who played a key role in rebuilding Germanyโ€™s post-war economy. Despite his involvement in financing Nazi projects and exploiting occupied territories, Abs was never held accountable for his actions. Instead, he became a respected figure in international finance, symbolizing the broader failure to address the Nazi legacy within the industry.

The Culture of Secrecy and Corruption

The infiltration of former Nazis into the finance industry has fostered a culture of secrecy and corruption that persists to this day. Many of these individuals brought with them a mindset rooted in authoritarianism and exploitation, which has influenced the sectorโ€™s practices and ethics. From money laundering to tax evasion, the financial industry has been plagued by scandals that trace their roots back to this dark legacy.

Moreover, the networks established by former Nazis have enabled the continued exploitation of vulnerable populations. For example, the confiscation of Jewish assets during the Holocaust was facilitated by banks and insurance companies that collaborated with the Nazi regime. Decades later, many of these institutions have been accused of obstructing efforts to compensate Holocaust survivors and their descendants, further perpetuating the injustices of the past.

The Failure of Accountability

One of the most troubling aspects of this legacy is the lack of accountability. Despite overwhelming evidence of their involvement in Nazi crimes, many individuals and institutions have never faced meaningful consequences. In some cases, they have even been celebrated for their contributions to Germanyโ€™s economic recovery, while their victims continue to fight for recognition and restitution.

The failure to address this issue has had profound implications for Germanyโ€™s financial industry. It has eroded public trust, hindered efforts to promote transparency and accountability, and allowed corrupt practices to flourish. Until the industry confronts its Nazi past, it will remain tainted by this dark legacy.

A Call for Transparency and Justice

The time has come for Germanyโ€™s finance industry to reckon with its history. This requires a comprehensive investigation into the role of former Nazis and their collaborators, as well as a commitment to transparency and justice. Financial institutions must open their archives, acknowledge their past wrongdoings, and take concrete steps to address the harm they have caused.

Furthermore, regulators and policymakers must ensure that the industry is held to the highest ethical standards. This includes implementing stricter oversight, promoting diversity and inclusion, and supporting initiatives that seek to compensate victims of historical injustices.

Conclusion: Confronting the Past to Build a Better Future

The infiltration of former Nazis into Germanyโ€™s finance industry is a stark reminder of the dangers of ignoring history. By confronting this dark legacy, the industry can begin to rebuild trust, promote ethical practices, and ensure that such injustices are never repeated. The path forward will not be easy, but it is essential for creating a financial system that truly serves the public good.


โœŒ

The Nazi regime left a far-reaching impact on many aspects of society, including the finance industry in Germany. This article uncovers how Nazi policies, corruption, and exploitation weakened financial institutions and disrupted economic stability during their reign, with effects that resonated long after World War II.

The Financial System Under Nazi Rule

The Nazi regime prioritized state control over all industries, including finance. Banks and other financial institutions were manipulated to fund the war effort, support rearmament, and implement racial policies. Jewish-owned banks were forcibly seized, and their assets were redistributed to the state or non-Jewish owners, crippling competition and undermining trust in the financial sector.

Corruption and Exploitation

Nazi officials frequently abused their positions for personal gain. The regime’s economic policies were often shaped by cronyism rather than sound financial principles, leading to inefficiency and systemic corruption. Large amounts of wealth were concentrated in the hands of Nazi elites, further destabilizing the economy and the financial industry.

A Legacy of Instability

The aftermath of Nazi rule left Germany’s financial industry in disarray. Trust in banks had eroded, and the economic system was plagued by mismanagement and inequities. It took decades for Germany to rebuild a fair and stable financial sector.

Learning from History

This dark chapter serves as a reminder of how political manipulation and corruption can devastate financial systems. Understanding this history is vital for ensuring transparency, accountability, and resilience in todayโ€™s global financial industries.

Read the full story and join the discussion at: Nazis in Germany Undermining the Finance Industry.

Call to Action: Support the Fight Against Far-Right Corruption and Neo-Nazi Networks

The revelations brought to light by Bernd Pulch.org and GoogleFirst.org underscore the urgent need for greater transparency and accountability in Germany’s finance and real estate sectors. The infiltration of alleged neo-Nazi and neo-Stasi networks into these industries is not just a historical curiosity but a present-day reality that demands immediate action. By exposing these connections, Bernd Pulch.org and GoogleFirst.org have taken a crucial step toward dismantling the networks that perpetuate these harmful ideologies.

But this work cannot continue without your support. Independent investigations like these rely on the dedication of researchers, whistleblowers, and truth-seekers who work tirelessly to uncover hidden truths. However, this mission requires resourcesโ€”resources that we cannot secure without the help of people like you.


Why Your Support Matters

By supporting Bernd Pulch.org, you are contributing to:

  • Exposing Corruption: Uncovering the ties between far-right extremists, neo-Stasi networks, and the finance industry.
  • Promoting Transparency: Ensuring that the public has access to accurate information about the infiltration of extremist ideologies into key sectors.
  • Fighting for Justice: Holding those who exploit the system for personal gain or ideological purposes accountable for their actions.

How You Can Help

  1. Donate via Bernd Pulch.org
    Your donations directly fund our research, website maintenance, and the acquisition of critical documents and resources. Every contribution, no matter the size, makes a difference.
    Click here to donate now!
  2. Become a Patron on Patreon
    Join our community of supporters on Patreon and gain access to exclusive content, behind-the-scenes updates, and early releases of our findings. Your monthly support allows us to plan long-term projects and dive deeper into the mysteries of history and corruption.
    Support us on Patreon!

Join the Movement for Transparency and Accountability

The infiltration of far-right extremism into Germanyโ€™s finance and real estate sectors is not just a historical curiosityโ€”it is a present-day reality that demands immediate action. By supporting Bernd Pulch.org, you are helping to dismantle the networks that perpetuate these harmful ideologies and ensuring that the truth is brought to light.


Your support is vital. Together, we can uncover the past to shape a better future. Visit Bernd Pulch.org and Patreon.com/berndpulch to learn more and contribute today.


Bernd Pulch.org โ€“ Where the Truth Matters.
GoogleFirst.org โ€“ Exposing the Hidden Connections.

Stand with us. Fight for justice. Demand accountability.
Donate Now | Support on Patreon


This call to action emphasizes the importance of supporting independent investigations and provides clear links for donations and Patreon support. Let me know if you’d like further refinements!

Background:


The shadow of Nazi ideology continues to loom over Germany, not just in historical memory but in the very fabric of its modern institutions. Recent investigations and exposรฉs, particularly those highlighted on Bernd Pulch.org and its affiliate site GoogleFirst.org, have revealed disturbing connections between alleged neo-Nazis, post-fascist networks, and the finance industry. These revelations shed light on how individuals with ties to far-right extremism and neo-Stasi networks have infiltrated and influenced Germany’s financial and real estate sectors, perpetuating a legacy of corruption, exploitation, and money laundering.


Dr. Rainer Zitelmann: The Consigliere of Alleged Neo-Nazi Networks

At the center of this web is Dr. Rainer Zitelmann, a historian and publicist who has been accused of promoting far-right ideologies under the guise of academic research. Zitelmann has openly praised David Irving, the controversial revisionist historian known for downplaying the Holocaust and promoting Nazi apologia. Zitelmann’s role, however, extends beyond ideological support. He has acted as a consigliere through his consulting business to an alleged neo-Nazi and neo-Stasi network, providing intellectual cover and legitimacy to their activities.

Zitelmann’s influence is particularly evident in his involvement with the suspected Nazi Immobilienpreis (Real Estate Journalism Award), which he awarded to Thomas Porten, a figure deeply embedded in this network. Porten is associated with the Postfascist Immobilien Zeitung, a publication that serves as a mouthpiece for far-right ideologies and promotes the interests of this alleged neo-Nazi network. Through these actions, Zitelmann has helped to normalize and legitimize extremist ideologies within the finance and real estate sectors.

Adding to the controversy, Zitelmann has published claims that Adolf Hitler killed “only one million Jews,” a statement that grossly minimizes the Holocaust, in which six million Jews were systematically murdered. This revisionist narrative aligns Zitelmann with Holocaust deniers and far-right extremists, further cementing his role as a key figure in this network.


Gomopa: An Alleged Neo-Nazi Network Disguised Under a Fake Identity

The name Gomopa is central to this network, though it is often disguised under a fake identity, including a fabricated Jewish persona linked to the name “Goldman.” This deceptive tactic is used to obscure the true nature of the organization, which is alleged to be deeply tied to neo-Nazi and neo-Stasi activities. Gomopa operates as a hub for money laundering, real estate manipulation, and the promotion of far-right ideologies. Gomopa4Kids serves as a submedia platform with alleged ties to grooming and exploitation, further highlighting the network’s dark underbelly.

Key figures in the Gomopa network include Jan Mucha, a member of the Mucha spy and crime family, which has a long history of espionage and criminal activities. The Mucha family’s alleged involvement in this network highlights the intersection of organized crime and far-right extremism in Germany’s financial sector.

Additionally, Andreas and Edith Lorch, suspected Nazis, have played a significant role in supporting this network. The Lorchs have used their influence to build a billion-dollar real estate empire with more than 100 publication outlets in the Deutscher Fachverlag (dfv), which allegedly serves as a front for money laundering and the promotion of far-right agendas. Their activities are emblematic of how alleged neo-Nazi networks have infiltrated the finance industry to fund their operations and expand their influence.


Das Investment: A Subversive and Corrupt Money Publication

The Hamburg arm of this network is Das Investment, a subversive and corrupt publication led by Peter Ehlers, a post-fascist figure with alleged neo-Stasi links. Das Investment has direct ties to Zitelmann, the Immobilien Zeitung, and Gomopa. Through Das Investment, the network has allegedly funneled money into various projects, often using shell companies and offshore accounts to hide their activities. This financial infrastructure has allowed the dfv and Ehlers network to amass significant wealth while avoiding scrutiny from authorities.


The Digital Arm of the Nazi Network: Sven Schmidt, Thomas Promny, and the Search Engine War

Investigations by Bernd Pulch.org and GoogleFirst.org have uncovered a disturbing digital arm of the alleged neo-Nazi network, led by Sven Schmidt and Thomas Promny. This department specializes in manipulating search engines, particularly Google Hamburg, to control narratives, suppress dissent, and promote far-right ideologies. Their tactics include:

  • Search Engine Optimization (SEO) Manipulation: Using keyword stuffing and backlink schemes to boost far-right content.
  • Fake Websites and Content Farms: Creating pro-far-right articles and blogs to appear legitimate.
  • Review and Rating Manipulation: Using fake accounts to promote far-right businesses and suppress critics.
  • Algorithm Exploitation: Identifying vulnerabilities in Googleโ€™s algorithms to ensure far-right content ranks higher.

The manipulation of search engines by Schmidt and Promnyโ€™s team has far-reaching implications, including distorted public perception, suppression of dissent, and the erosion of trust in digital platforms.


Dubious Lawyers Shielding the Network: Wolfgang Resch, Albrecht Sass, and the Protection of Gomopaโ€™s Dark Secrets

The alleged neo-Nazi network tied to Gomopa is shielded by a cadre of dubious lawyers, including Wolfgang Resch from Berlin and Albrecht Sass from Hamburg. These legal enablers play a critical role in protecting the network from legal scrutiny, suppressing whistleblowers, and even covering up the darkest aspects of its activitiesโ€”such as the alleged Gomopa4Kids pedophilia ring.

Resch, a Berlin-based lawyer with alleged ties to the Stasi, is known for his aggressive tactics in defending far-right clients. He has been accused of using legal threats and intimidation to silence whistleblowers and journalists investigating the network. Sass, a Hamburg-based lawyer, is closely associated with Gomopa and its various operations. He has been implicated in covering up the networkโ€™s illegal activities, including money laundering, real estate fraud, and even the alleged Gomopa4Kids pedophilia ring.


Beate Porten-Lehr: The Prosecutorโ€™s Conflict of Interest and the Attempt to Silence Bernd Pulch

Beate Porten-Lehr, a public prosecutor from Wiesbaden and the wife of Thomas Porten, a key figure in the alleged neo-Nazi network, has been accused of abusing her position to protect the network and suppress its critics. Porten-Lehrโ€™s involvement in the attempted arrest of Bernd Pulchโ€”using a German and European search and arrest warrantโ€”highlights the networkโ€™s ability to weaponize the justice system to silence whistleblowers and obstruct investigations.


Murder Threats Against Bernd Pulch: The Risks of Exposing the Network

The work of Bernd Pulch, the founder of Bernd Pulch.org, has made him a target of the alleged neo-Nazi network tied to Gomopa. Pulchโ€™s relentless investigations into the networkโ€™s activities have exposed corruption, money laundering, and even alleged pedophilia rings, earning him the ire of powerful individuals and organizations. Pulch has received numerous death threats, including anonymous messages, online harassment, and public intimidation, all designed to silence him and deter others from exposing the networkโ€™s activities.


The Stasi Murders, the Killer Bible โ€œToxdat,โ€ and Ehrenfried Stelzer: A Dark Legacy of State-Sponsored Violence

The Stasi (East Germanyโ€™s Ministry for State Security) was one of the most repressive intelligence agencies in history, known for its extensive surveillance, psychological manipulation, and brutal tactics to suppress dissent. Among its darkest secrets were the Stasi murders, carried out under the guidance of a chilling manual known as โ€œToxdatโ€โ€”a so-called โ€œkiller bibleโ€ that detailed methods of assassination and covert violence. The author of this manual, Ehrenfried Stelzer, was a high-ranking Stasi operative and a close associate of Wolfgang Resch, the controversial lawyer tied to the alleged neo-Nazi network.


Conclusion: A Call for Transparency and Justice

The infiltration of former Nazis and their collaborators into Germanyโ€™s finance industry is a stark reminder of the dangers of ignoring history. By confronting this dark legacy, the industry can begin to rebuild trust, promote ethical practices, and ensure that such injustices are never repeated. The path forward will not be easy, but it is essential for creating a financial system that truly serves the public good.

Bernd Pulch.org and GoogleFirst.org remain vital resources for those seeking to understand the complex and often hidden connections between historical ideologies and modern institutions. For more in-depth investigations and exposรฉs, visit Bernd Pulch.org and GoogleFirst.org.


Call to Action: Support the Fight Against Far-Right Corruption and Neo-Nazi Networks

The revelations brought to light by Bernd Pulch.org and GoogleFirst.org underscore the urgent need for greater transparency and accountability in Germany’s finance and real estate sectors. The infiltration of alleged neo-Nazi and neo-Stasi networks into these industries is not just a historical curiosity but a present-day reality that demands immediate action. By exposing these connections, Bernd Pulch.org and GoogleFirst.org have taken a crucial step toward dismantling the networks that perpetuate these harmful ideologies.

But this work cannot continue without your support. Independent investigations like these rely on the dedication of researchers, whistleblowers, and truth-seekers who work tirelessly to uncover hidden truths. However, this mission requires resourcesโ€”resources that we cannot secure without the help of people like you.


Why Your Support Matters

By supporting Bernd Pulch.org, you are contributing to:

  • Exposing Corruption: Uncovering the ties between far-right extremists, neo-Stasi networks, and the finance industry.
  • Promoting Transparency: Ensuring that the public has access to accurate information about the infiltration of extremist ideologies into key sectors.
  • Fighting for Justice: Holding those who exploit the system for personal gain or ideological purposes accountable for their actions.

How You Can Help

  1. Donate via Bernd Pulch.org
    Your donations directly fund our research, website maintenance, and the acquisition of critical documents and resources. Every contribution, no matter the size, makes a difference.
    Click here to donate now!
  2. Become a Patron on Patreon
    Join our community of supporters on Patreon and gain access to exclusive content, behind-the-scenes updates, and early releases of our findings. Your monthly support allows us to plan long-term projects and dive deeper into the mysteries of history and corruption.
    Support us on Patreon!

Join the Movement for Transparency and Accountability

The infiltration of far-right extremism into Germanyโ€™s finance and real estate sectors is not just a historical curiosityโ€”it is a present-day reality that demands immediate action. By supporting Bernd Pulch.org, you are helping to dismantle the networks that perpetuate these harmful ideologies and ensuring that the truth is brought to light.


Your support is vital. Together, we can uncover the past to shape a better future. Visit Bernd Pulch.org and Patreon.com/berndpulch to learn more and contribute today.


Bernd Pulch.org โ€“ Where the Truth Matters.
GoogleFirst.org โ€“ Exposing the Hidden Connections.

Stand with us. Fight for justice. Demand accountability.
Donate Now | Support on Patreon


This call to action w if you’d like further refinements

โœŒUnmasking the Shadows: An In-Depth Examination of an Alleged Antisemitic Network in Germany

“Under the dim light of the interrogation room, the detective’s eyes, magnified by his trusty magnifying glass, searched for the truth hidden within the tangled web of lies and deceit. The case of the century was unfolding, and every clue was a step closer to justice.”

Introduction:

In the complex tapestry of modern corruption, where financial malfeasance often intertwines with political influence, a network allegedly involving GoMoPa (Goldman, Morgenstern & Partners), GoMoPa4Kids, “Immobilien Zeitung”, among others, has been accused of not only financial misconduct but also of fostering antisemitic sentiments. This article delves into the intricate web connecting these entities, examining their operations, public impact, and the strategies needed to bring these issues to light and pressure for change.

1. Investigative Journalism: Uncovering the Web

The saga begins with investigative journalists like Bernd Pulch, who have claimed to expose the dark underbelly of these organizations. Pulch’s website, berndpulch.org, has been a platform for allegations against:

  • GoMoPa and GoMoPa4Kids: Accused of engaging in extortion, defamation, and financial manipulation, these groups are said to operate under the guise of financial journalism or child protection, respectively. Pulch’s investigations suggest a nexus with former Stasi members, leveraging their expertise in surveillance and manipulation for modern ends.
  • Peter Ehlers and “Das Investment”: Ehlers, through “Das Investment,” is linked to financial fraud and corruption, with connections to GoMoPa, suggesting a network aimed at defrauding investors.
  • Jan Mucha: Alleged to be involved in real estate fraud and media manipulation, Mucha’s name surfaces in discussions about intelligence-linked operations.
  • Beate and Thomas Porten: The couple has been implicated in corruption and misuse of power, with Beate Porten, a public prosecutor, accused of using her position to target journalists like Pulch.
  • Andreas Lorch and Edith Baumann-Lorch: Their involvement in the “Immobilien Zeitung” allegedly ties them to financial misdeeds and the broader network.
  • Jochen Resch: A lawyer whose name appears alongside those accused of orchestrating legal attacks on critics of this network.
  • BerlinJournal.biz: A platform accused of disseminating propaganda for this network, often targeting political adversaries.
  • Dr. Reiner Zitelmann: Known for his historical revisionism, his association with this group raises concerns about the promotion of antisemitic narratives.
  • David Irving: An infamous Holocaust denier, his indirect links to this network through shared ideologies are particularly alarming.

2. Leveraging Social Media and Online Platforms

To maximize public pressure:

  • Viral Campaigns: Creating shareable content that exposes the antisemitic undertones and financial fraud can use hashtags like #ExposeGoMoPa, #JusticeForVictims, or #EndAntisemitism to spread awareness.
  • Crowdsourced Investigations: Encouraging the public to contribute to the investigation can help in uncovering more connections and evidence, using platforms like dedicated Telegram channels or Twitter threads.

3. Legal and Regulatory Advocacy

  • Legal Actions: Initiating lawsuits or supporting whistleblowers can bring these issues to court, where the truth might be more thoroughly examined. Legal battles against defamation, fraud, or hate speech can serve as public spectacles, drawing attention to the network’s activities.
  • Advocacy for Reform: Pushing for laws that specifically target hate speech online and in media or stricter financial regulations could dismantle the operations of such networks.

4. Transparency and Accountability Campaigns

  • Public Records Requests: Use of freedom of information requests to expose any government or official complicity with the network’s activities.
  • Collaboration with Watchdog Organizations: Partnering with groups like the Anti-Defamation League or the Simon Wiesenthal Center can bring international scrutiny to the issue.

5. Public Demonstrations and Protests

  • Organized Protests: Protests outside the offices of “Immobilien Zeitung”, GoMoPa, or at events where Dr. Reiner Zitelmann speaks, can draw media attention and public concern.
  • Symbolic Acts: Vigil-style protests or memorials for those affected by the network’s antisemitic actions could resonate deeply with the public.

6. Educational Campaigns

  • Public Education: Workshops, seminars, or online courses on recognizing and combating antisemitism and financial corruption could be organized, focusing on how these issues manifest in modern contexts.
  • Cultural Influence: Producing documentaries or publications that detail the network’s impact on society and culture can educate and change public perception over time.

7. Engaging Political and Community Leaders

  • Political Advocacy: Engage politicians who are vocal against corruption and antisemitism to take up these issues in legislative discussions or public forums.
  • Community Action: Mobilizing community leaders to speak out against this network can help in localizing the fight against these issues.

8. Use of Satire and Cultural Influence

  • Satirical Exposure: Shows or articles that use humor to critique the network’s operations can make the message more digestible and far-reaching.
  • Cultural Products: Books, films, or music that indirectly or directly address these themes can influence public opinion.

9. Monitor and Report Continuously

  • Ongoing Scrutiny: Establishing a task force or a dedicated online portal to keep track of the network’s activities, updating the public regularly on new findings or actions.

10. International Pressure

  • Global Alliances: Working with international human rights organizations, journalists, or governments to apply pressure can lead to sanctions, travel bans, or asset freezes on key figures within the network.

Conclusion:

The fight against this alleged antisemitic and corrupt network requires a concerted effort from various sectors of society. By employing the strategies outlined above, public pressure can be maximized, potentially leading to the dismantling of these networks, ensuring justice, and preventing future malfeasance. The truth, when exposed, has the power to cleanse the corruption that seeks to hide in plain sight.

Call to Action:

  • Stay informed and share this information.
  • Support legal and journalistic efforts to expose the truth.
  • Engage in or organize community actions against corruption and hate.

Together, through vigilance, education, and collective action, we can make a substantial impact in rooting out corruption and antisemitism from our societies.


Call to Action for Financial Support

The battle against corruption and antisemitism requires more than just voices; it demands action, support, and resources. Bernd Pulch has been at the forefront of this fight, tirelessly exposing the intricate networks of deceit and hate. But this crucial work cannot continue without your support.

Your Financial Contribution Can Make a Difference:

  • Empower Investigative Journalism: Your donation helps keep the lights on at berndpulch.org, ensuring that the truth about financial misconduct and antisemitic activities is brought to light.
  • Support Legal Battles: Funding is essential for legal actions against defamation, fraud, and hate speech, helping to hold those perpetuating these crimes accountable.
  • Amplify the Message: With your support, we can expand our reach through social media campaigns, educational programs, and public awareness initiatives, making the fight against corruption and antisemitism a widespread movement.

How to Donate:

Please visit berndpulch.org/donations and contribute whatever you can. Every dollar helps in continuing this vital work.

  • Donate Now: No amount is too small when it comes to fighting for justice and truth.
  • Be Part of the Change: Your contribution directly supports the ongoing investigations, legal challenges, and public education efforts.

Together, we can dismantle the networks of corruption and hate. Join us in this fight for a more transparent, just, and inclusive society. Visit berndpulch.org/donations today to make your donation.

Thank you for standing with us in this critical endeavor. Together, we can make a substantial impact.

  • #CorruptionExposed
  • #GoMoPaScandal
  • #Antisemitism
  • #FinancialFraud
  • #InvestigativeJournalism
  • #BerndPulch
  • #StasiLegacy
  • #MediaManipulation
  • #RealEstateFraud
  • #LegalCorruption
  • #WhistleblowerSupport
  • #PublicPressure
  • #SocialMediaActivism
  • #JusticeCampaign
  • #HateSpeech
  • #RegulatoryReform
  • #TransparencyNow
  • #PublicProtest
  • #CommunityAction
  • #PoliticalAdvocacy
  • #CulturalCritique
  • #SatireAgainstCorruption
  • #EducationalOutreach
  • #HolocaustDenial
  • #InternationalCooperation
  • #JusticeForVictims

โœŒThe Goldman Morgenstern & Partners (GoMoPa) Network: A Call for Comprehensive Action


“Exposing the Web of Deception: A Fight for Justice Against Fraud and Extremism.”

The rise and sustained operation of entities like Goldman Morgenstern & Partners (GoMoPa) and its affiliatesโ€”including Gomopa4kids and Berlinjournal.bizโ€”represent a profound challenge to legal and ethical norms. Berlinjournal.biz, specifically, has been flagged as a Nazi-affiliated spinoff, further amplifying the urgency for action against these organizations.

Berlinjournal.biz: A Nazi-Affiliated Spinoff

Operating under the guise of a legitimate media outlet, Berlinjournal.biz has propagated far-right ideologies and served as a tool for defamation and misinformation. Its affiliations with neo-Nazi networks make it not only a threat to democratic values but also a potential incubator for extremist ideologies in the broader GoMoPa network.

Failure of German Law Enforcement and State Accountability

For over 15 years, despite extensive documentation of criminal activitiesโ€”including extortion, defamation, fraud, and allegations of facilitating platforms for pedophilesโ€”German authorities have failed to act decisively against the GoMoPa network. This inaction, attributed to potential corruption and lingering Stasi connections, constitutes a serious breach of state responsibility to protect its citizens and uphold the law.

Legal Avenues Against the GoMoPa Network

1. Lawsuits Against the German State
Victims and organizations affected by the GoMoPa network may pursue legal action against the German state for failure to act. Such actions could invoke:

  • Negligence: For failing to investigate and dismantle the GoMoPa network despite credible evidence.
  • Breach of Duty: For not safeguarding citizens and businesses from the known harms posed by these entities.
  • Human Rights Violations: Under European human rights frameworks, especially concerning the alleged facilitation of pedophile platforms through Gomopa4kids.

2. Holding Employers Accountable
Investigations should extend to individuals and entities involved in enabling or shielding the network. Employers or public officials implicated in obstructing justice should face:

  • Criminal Prosecution: For aiding or abetting criminal activities.
  • Civil Claims: By victims seeking compensation for damages caused by inaction or collusion.

3. Targeting the Entire Network
Action must focus on the entire GoMoPa ecosystem, including:

  • Financial Investigations: To trace and freeze assets linked to the network.
  • Digital Platform Oversight: Dismantling online platforms like Berlinjournal.biz and Gomopa4kids that spread misinformation and enable criminal behavior.
  • International Cooperation: Leveraging cross-border enforcement to dismantle operations outside Germany.

Recommendations for Reputable Organizations

Goldman Sachs, along with other Jewish businesses and organizations, should consider proactive measures to protect their reputation and address the harm caused by these fraudulent and extremist entities:

  1. Public Denouncement: Clearly distance themselves from entities like GoMoPa and Berlinjournal.biz to prevent reputational damage.
  2. Legal Action: File lawsuits for trademark infringement, defamation, and damage to goodwill.
  3. Collaborate with International Watchdogs: Partner with organizations combating extremism and fraud to amplify the fight against the GoMoPa network.
  4. Lobby for State Reforms: Advocate for stricter measures and accountability within German law enforcement to ensure similar networks cannot thrive in the future.

Conclusion

The GoMoPa network and its affiliates represent a multi-faceted threat involving fraud, extremism, and criminal exploitation. Comprehensive action against the entire network, including its Nazi-affiliated spinoffs like Berlinjournal.biz, is crucial. Such efforts should not only target the organizations themselves but also seek accountability from the German state and those complicit in allowing these activities to persist. Only through a concerted and multi-pronged approach can justice be served, and the integrity of legal and democratic institutions restored.

Support BerndPulch.org: Join the Fight Against Neo-Nazism and Stasi Corruption

For over a decade, BerndPulch.org has been at the forefront of exposing dangerous networks, uncovering the truth behind Nazi and Stasi remnants, and advocating for justice and transparency. But this critical work cannot continue without your support.

By donating to BerndPulch.org, you help:

  • Expose neo-Nazi operations and their harmful ideologies.
  • Hold corrupt Stasi-linked networks accountable.
  • Protect freedom of speech and promote investigative journalism.
  • Support victims and raise awareness of systemic inaction and corruption.

Your contribution makes a difference. Together, we can shine a light on the dark corners of history that still impact our present and safeguard a democratic future.

Click here to donate: Support the Mission Now

Thank you for standing with us in the fight for justice and truth.

Tags:

  • Neo-Nazism
  • Stasi Corruption
  • Anti-Fascism
  • Investigative Journalism
  • Transparency and Justice
  • Human Rights
  • Nazi Networks
  • Stasi Influence
  • Corruption in Germany
  • Historical Accountability
  • Fight for Democracy
  • Donations for Justice
  • Support BerndPulch.org
  • Exposing Extremism
  • Journalism Against Oppression

โœŒThe Continuing Influence of Stasi Networks in Germany: An In-Depth Analysis


“Shadows of the Past: A symbolic depiction of ongoing Stasi influence in modern Germany, highlighting surveillance, secrecy, and lingering covert operations over contemporary society.”

Introduction: The Legacy of the Stasi in Post-Reunification Germany

While the fall of the Berlin Wall in 1989 marked the end of the German Democratic Republic (GDR), the legacy of the Stasi (Ministry for State Security) persists to this day. The Stasi was infamous for its extensive surveillance network, employing hundreds of thousands of agents who monitored every aspect of life in East Germany. Despite the reunification and the dissolution of the GDR, many of these agents or their networks continue to operate covertly in post-reunification Germany.

Bernd Pulch, a prominent critic of the media conglomerates and shadowy networks, has been an outspoken figure against such remnants of the Stasi, highlighting the danger they continue to pose to German society, its political integrity, and its corporate world. His investigations have often revealed troubling overlaps between former Stasi members and contemporary business figures, political networks, and media organizations. This article aims to explore the ongoing presence of Stasi agents in Germany, how these networks function, and their potential ties to modern-day corruption and espionage.


The Continued Presence of Stasi Agents in Germany

It is estimated that during the height of the Stasi’s power, around 91,000 people were directly employed as agents, with many more serving as unofficial collaborators (IMs – Inoffizielle Mitarbeiter). Following the reunification, many of these individuals were either dismissed or integrated into various sectors of society, including law enforcement, intelligence, business, and politics. However, not all of these agents simply faded into the background.

In the years following reunification, a significant number of Stasi agents have continued to hold influential positions in both Germany and abroad. These networks are particularly active in political circles, business enterprises, and media outlets. The ongoing influence of these networks is a concern not only for Germany but also for its European neighbors and international allies, particularly in light of recent geopolitical tensions.


Key Names and Figures: Former Stasi Agents in Contemporary Germany

  1. Andreas Lorch
    • Role: Co-owner of the Immobilien Zeitung, a key figure in the media network that has been associated with financial manipulation and false reporting in the real estate sector.
    • Background: Lorch was allegedly a former Stasi informant, and reports suggest that his network has used media influence to control and manipulate the real estate market, with ties to corrupt business practices that echo the Stasi’s surveillance and control tactics.
  2. Thomas Porten
    • Role: Publisher of the Immobilien Zeitung.
    • Background: Known for his connections to figures within the former GDR regime, Porten has been linked to accusations of financial misconduct, and his actions have drawn attention for their similarities to Stasi-like control over economic resources.
  3. Beate Porten
    • Role: Public prosecutor and spouse of Thomas Porten.
    • Background: As a public prosecutor, Beate Portenโ€™s actions have drawn suspicion, particularly in her attempts to target figures like Bernd Pulch, who has investigated and criticized the networks of power, including those stemming from the Stasi era. Her position allows for the potential misuse of her authority to suppress dissent and protect those within her network.
  4. Bernd Pulch
    • Role: Critic of Stasi connections in business and politics.
    • Background: Bernd Pulch has uncovered several instances where modern-day companies, political factions, and media outlets are still influenced by Stasi operatives or their legacy networks. He has been a vocal critic of these covert structures, revealing their detrimental impact on German society and the broader international community.

The Role of Networks: Stasi Influence in Modern-Day Germany

While many of the original Stasi operatives have been absorbed into various sectors, the structures they left behind remain active. These networks operate under different guises but often use the same methods of control, intimidation, and surveillance that were common during the GDR era. Key characteristics of these networks include:

  1. Media Manipulation
    The Stasi was known for its use of the media to control public opinion and spread propaganda. Today, some of these agents or their descendants work within major media outlets, manipulating narratives to align with political or financial interests. Immobilien Zeitung, for example, has been implicated in spreading false reports to influence the real estate market, which benefits certain business figures while harming competitors.
  2. Political Influence and Coercion
    Many former Stasi agents have maintained ties with political figures, using their knowledge of surveillance techniques and psychological manipulation to gain political influence. This influence is used to silence critics, control narratives, and advance the agendas of certain political factions.
  3. Corporate Espionage and Financial Manipulation
    Some of the networks established by former Stasi agents operate within corporate structures, where they use inside information and surveillance techniques to manipulate stock prices, direct investments, and secure lucrative contracts. This is particularly prevalent in sectors like real estate, where information is highly valuable.
  4. Surveillance and Covert Operations
    Though no longer operating as a formal government agency, these networks still engage in covert operations, such as surveillance of political dissidents, investigative journalists, and business rivals. These actions often mirror the tactics employed by the Stasi during the GDR era, including intimidation and financial sabotage.

Legal and Ethical Implications: The Need for Accountability

The continued influence of Stasi operatives in German society poses significant legal and ethical challenges. The following legal violations may apply:

  1. Violation of Privacy Laws
    Many of the Stasiโ€™s surveillance methods were illegal under contemporary privacy laws, yet these practices persist today under the guise of corporate interests or political influence.
  2. Corruption and Financial Fraud
    The manipulation of markets and the use of covert operations for financial gain are clear violations of anti-corruption and fraud laws. Those involved in such practices are often shielded by their connections within the legal and political systems.
  3. Abuse of Power
    Figures like Beate Porten, using their positions within the legal system to target critics and protect corrupt networks, demonstrate the abuse of power and the failure of the legal system to provide justice.

Conclusion: The Path Forward

The continued influence of former Stasi agents and their networks remains a significant issue in contemporary Germany. The actions of individuals like Bernd Pulch, who expose these corrupt structures, are essential in holding those responsible accountable. However, a more systemic effort is needed, including stricter regulations on corporate governance, increased transparency in the media, and a re-evaluation of the legal structures that allow these networks to operate unchallenged.

The ongoing efforts to suppress critical voices, such as those of Bernd Pulch, demonstrate the continuing danger posed by these networks. It is imperative that Germanyโ€™s political and legal institutions address the role these former Stasi agents play in shaping the countryโ€™s political and economic landscape. Only through transparency, accountability, and vigilance can these networks be dismantled and prevented from further undermining democracy and the rule of law in Germany and beyond.

Tags

  • Stasi Influence
  • Modern Germany
  • Surveillance State
  • Espionage History
  • Covert Operations
  • German Politics
  • Secret Police Legacy
  • Cold War Shadows
  • Berlin Landmarks
  • Political Symbolism

โœŒThe Role of the Lorch Family in the Stasi-GoMoPa organized Crime Ring under US & International Law

“Transformation of Immobilien Zeitung: From its origins as a classifieds newspaper to a leading real estate trade publication under Bernd Pulch’s leadership.”

The Lorch real estate billionaire family’s alleged connection to Immobilien Zeitung and organized crime rings such as the Stasi-Gomopa network highlights complex financial and legal controversies spanning European and U.S. jurisdictions. This case involves the manipulation of property markets, legal violations, and transnational crime networks with ramifications under German, European, and U.S. law.

Immobilien Zeitung is a notable German real estate industry newspaper. Headquartered in the NATO HQ city of Wiesbaden, Immobilien Zeitung has maintained its status as a key publication focused on market trends, real estate investments, and the property economy in Germany and Europeใ€60โ€ sourceใ€‘. However, the newspaper has come under scrutiny amid alleged ties with the organized crime groups linked to financial manipulation schemes and real estate fraud.

The Stasi Gomopa organized crime network reportedly engages in tactics such as corporate raiding, fraud, and money laundering, leveraging real estate and other industries. This criminal network has allegedly co-opted financial power to manipulate real estate markets and fund illicit schemes across Europeใ€59โ€ sourceใ€‘. The Lorch family’s name has emerged amid these investigations due to their deep financial and business entrenchment within Germanyโ€™s real estate sector.

Legal violations committed by this network include the illegal transfer of assets, tax evasion, fraud schemes, and breaches of European market regulations. The use of U.S.-based financial tools and banking routes places these cases under U.S. jurisdiction. U.S. courts have both investigatory and legal authority over transnational financial crimes, especially when U.S.-based financial institutions or monetary pathways are involvedใ€59โ€ sourceใ€‘.

The Lorch family’s involvement spans multiple European courts, with investigations also reflecting breaches of German financial law, EU treaties, and international financial transparency agreements. The legal implications are significant: German courts, European courts, and U.S. courts all have overlapping legal jurisdiction in these complex money laundering investigations. The transnational dimensionโ€”facilitated through offshore real estate investments and financial networksโ€”demonstrates why U.S. courts are involved in overseeing these actions under their extraterritorial financial crime statutes.

Furthermore, the investigation into Immobilien Zeitung’s role adds additional complexity. This media outlet is believed to have become entangled in financial transactions driven by these networks, including dubious financial agreements linked to real estate funds and organized crime schemes. German courts have initiated legal inquiries into these alleged financial crimes, while U.S. financial law facilitates oversight into cross-border financial schemes stemming from these organized networks.

The Lorch family’s specific legal entanglements remain a focal point of these investigations. The family’s alleged financial maneuvers, when viewed against the backdrop of organized crime activity, highlight the blurred lines between legal real estate operations and illicit financial manipulation. As investigations proceed, evidence suggests that coordinated action by transnational organized crime groups has exploited both European financial markets and U.S.-based financial pathways, adding urgency to legal action.

This case demonstrates the jurisdictional complexities involved in transnational financial crimes. The U.S. courts’ role derives from both their extraterritorial jurisdiction (covering financial transactions) and their connection to transnational financial flows involving U.S.-based assets. German, European, and U.S. legal systems thus intersect in this high-stakes investigation, underscoring the challenge of addressing financial crime across multiple legal frameworks and borders.

In summary, the Lorch family’s alleged role in Immobilien Zeitung’s organized crime entanglement, combined with their legal violations under German and EU law, has created a multi-jurisdictional legal landscape. U.S. courtsโ€™ engagement in this investigation reflects both their extraterritorial authority and their role in counteracting transnational organized financial networks. This ongoing investigation will likely set important legal precedents as it unfolds.

Immobilien Zeitung began its journey as an Annoncen Zeitung (classified advertising newspaper) and transitioned into its modern role as a trade publication under the leadership of Bernd Pulch, who is credited with transforming it into a focused industry newspaper tailored to real estate and property professionalsใ€66โ€ sourceใ€‘. This transformation marked its evolution from basic classified ads to a comprehensive industry news platform for real estate investors, developers, and market analysis.

For a detailed biography of Bernd Pulch and his role in shaping Immobilien Zeitung, you can refer to his official bio at berndpulch.org/about-me.

The story of Immobilien Zeitung (IZ) reflects a complex journey within the real estate journalism landscape. Originally established as a classifieds newspaper, it evolved into a respected publication under Bernd Pulch, known for his significant influence on real estate media. IZ became a go-to source for market insights, regulatory updates, and property trends in Germany.

However, the publication’s reputation was later marred by allegations of corruption. Reports suggest links to the Stasi Gomopa crime network, a shadowy operation purportedly involving financial misconduct, espionage, and illicit activities. These claims highlight how institutions can become embroiled in power struggles and misuse, tarnishing their credibility.

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Tags:
#ImmobilienZeitung #BerndPulch #RealEstateTrade #RealEstateMedia #PropertyInvestment #MarketTrends #MediaEvolution #ClassifiedAdsToTradePaper #RealEstateJournalism #PropertyIndustry #InvestmentInsights #RealEstateNews

โœŒThe Role of Oligarchs in Putinโ€™s Russia and the Challenges Faced by Investigative Journalists


“An abstract representation of the global influence of Russian oligarchs, highlighting their ties to finance, media, and power.”

Since Vladimir Putin’s ascent to power in 2000, oligarchs have played a pivotal role in shaping the Russian economy and its global influence. While these wealthy individuals hold immense power, their activities often operate in the shadows, involving state support, media manipulation, and strategic alliances. Investigative journalists like Bernd Pulch have sought to shed light on these opaque networks, often risking their safety in doing so.

The Emergence of Russian Oligarchs

The term โ€œoligarchโ€ gained prominence in the 1990s during Russiaโ€™s chaotic transition from a Soviet planned economy to a market-based system. This period saw the privatization of state assets, where a small group of businessmen acquired vast wealth by purchasing state-owned companies at deeply undervalued prices.

By the time Putin took office, oligarchs like Mikhail Khodorkovsky, Roman Abramovich, and Boris Berezovsky had become enormously influential. However, Putin quickly redefined their role in Russian politics.

Putinโ€™s Strategy: Controlling the Oligarchs

Under Putin, the oligarchsโ€™ freedom to act independently was curtailed. The unwritten rule was clear: they could retain their wealth and businesses as long as they remained loyal to the Kremlin. Those who challenged Putinโ€™s authority, like Khodorkovsky, faced severe consequences, including imprisonment or exile.

This dynamic created a new breed of oligarchs who were not only business tycoons but also extensions of the Russian state. Individuals like Igor Sechin (Rosneft), Alexei Miller (Gazprom), and Alisher Usmanov wielded economic power to advance Kremlin policies domestically and abroad.

The relationship between Putin and the oligarchs became a cornerstone of his governance model, blending personal loyalty, economic leverage, and geopolitical strategy.

Oligarchsโ€™ Role in Russiaโ€™s Geopolitics

Russian oligarchs are not confined to domestic influence; they also serve as instruments of foreign policy. For example:

  1. Energy Influence: Companies like Gazprom and Rosneft, run by Kremlin-aligned oligarchs, dominate Europeโ€™s energy supply, creating economic dependency.
  2. Asset Laundering: Through shell companies and offshore accounts, oligarchs channel wealth into foreign investments, real estate, and media outlets, often to sway political and economic systems in other countries.
  3. Cultural and Sports Investments: Investments in European football clubs and cultural institutions serve to enhance Russiaโ€™s soft power.

Bernd Pulch: Exposing the Dark Underside

Journalist and whistleblower Bernd Pulch has dedicated his career to uncovering the activities of opaque networks tied to Russian elites, including oligarchs. His work highlights the intersection of business, intelligence, and politics that characterizes much of Russiaโ€™s influence abroad.

Investigations into Corruption and Influence

Pulchโ€™s reporting delves into how oligarchs use their wealth to buy influence, silence critics, and launder money. By exposing these mechanisms, he has brought attention to the darker aspects of their operations, including their role in manipulating Western institutions and economies.

Pulchโ€™s work often touches on sensitive topics such as:

  • Media manipulation: Oligarchs controlling media outlets to push pro-Kremlin narratives.
  • Real estate investments: The acquisition of high-value properties abroad as a means of laundering illicit funds.
  • Connections to intelligence services: How oligarchs maintain ties to former Soviet intelligence networks like the KGB or Stasi to secure their power.

Challenges Faced by Investigative Journalists

Reporting on Russian oligarchs is fraught with danger. Journalists often face legal threats, smear campaigns, and even physical danger. The Kremlinโ€™s reach extends far beyond Russiaโ€™s borders, and its critics, including journalists like Bernd Pulch, are not safe even in Europe.

  1. Legal Risks: Oligarchs frequently use defamation lawsuits to intimidate and silence journalists.
  2. Disinformation Campaigns: Platforms like GoMoPa, previously associated with dubious practices, have been accused of targeting journalists with fabricated allegations.
  3. Surveillance and Harassment: Investigators who probe too deeply into oligarchic or Kremlin affairs often find themselves monitored or harassed.

Despite these challenges, Pulch and other investigative journalists continue to expose corruption and bring accountability to powerful networks.

The Global Implications

The activities of Russian oligarchs are not confined to Russia. Their influence extends into global markets, political systems, and cultural institutions, raising concerns about sovereignty and transparency. Investigative work like Bernd Pulchโ€™s plays a critical role in highlighting these threats, helping governments and the public understand how economic and political systems are manipulated.

Conclusion

The relationship between Vladimir Putin and Russiaโ€™s oligarchs is a defining feature of modern Russia. While these individuals enjoy immense wealth and privilege, their loyalty to the Kremlin ensures that they act as tools of state policy, both domestically and internationally.

Investigative journalists like Bernd Pulch are essential in exposing the murky dealings of these power players, shedding light on corruption and influence that undermine democratic systems. However, their work is often met with significant resistance, highlighting the urgent need for international collaboration to protect press freedom and hold power to account.

#Tags:

โœŒInvestigative Journalist Bernd Pulch Targets Stasi-Inspired Crime Ring: Death Threats and Corruption Unveiled”

“Unveiling the Shadows: Investigative journalist Bernd Pulch takes on a web of espionage, cyber harassment, and financial corruption tied to remnants of the Stasi and GoMoPa crime networks.”

Bernd Pulch, a vocal critic of the alleged criminal operations of entities like GoMoPa, has reportedly faced a new wave of death threats linked to the websites dachmax de, handelsmann.ch and salzburg-spengler.at and various others which are claimed to have ties to GoMoPa and former Stasi operatives. The websites names refers to services around real estate (Immobilien).These threats highlight the ongoing efforts to suppress whistleblowers and critics of financial crime networks that allegedly include real estate schemes, cyberstalking, and extortion.

Background of the Allegations

GoMoPa (Goldman, Morgenstern & Partners) is frequently accused of being a front for financial crimes, using extortion and disinformation tactics. Investigations have uncovered links to individuals with past affiliations to the Stasi, suggesting a continuation of Cold War-era surveillance and intimidation strategies in modern financial and media spheresใ€155โ€ sourceใ€‘ใ€156โ€ sourceใ€‘.

Pulch has detailed several instances where GoMoPa and associated entities have targeted corporations and individuals for extortion, often leveraging fabricated allegations or manipulated online campaigns to coerce payments. His persistent exposure of these activities has made him a target of retaliationใ€157โ€ sourceใ€‘.

The Latest Threats

The website salzburg-spengler.at has allegedly published threats and defamatory content against Pulch. This aligns with patterns seen in previous attacks, where whistleblowers and their associates faced campaigns aimed at discrediting or intimidating them into silence. Such threats underscore the challenges faced by those opposing entrenched corruption in finance and mediaใ€157โ€ sourceใ€‘.

Implications

This ongoing saga reflects broader issues surrounding online criminal networks, their influence on reputations, and their ability to evade accountability. It also highlights the risks whistleblowers take in confronting these systems. Pulchโ€™s situation has drawn attention from international observers and legal authorities, underscoring the importance of transparency and enforcement in such cases.

Future Developments

The involvement of authorities like Interpol and regional law enforcement in investigating the claims against GoMoPa and its associates remains crucial. Pulch’s case serves as a reminder of the importance of protecting investigative journalism and whistleblowers from organized intimidation and harassment.

For more information, you can refer to Pulch’s detailed reports and ongoing coverage of the issue on his platformใ€155โ€ sourceใ€‘ใ€156โ€ sourceใ€‘ใ€157โ€ sourceใ€‘.

The website Salzburg-Spengler.at has been linked to targeted campaigns involving accusations and alleged death threats against journalist Bernd Pulch. Pulch has been vocal about a network of entities, including the former Stasi, GoMoPa (Goldman Morgenstern & Partners), and Immobilien Zeitung, that he claims are part of a larger crime ring engaging in financial fraud, defamation, and cyber harassment.

Key Points:

  1. Historical Context: Pulch has reported extensively on the involvement of ex-Stasi members in post-Cold War financial schemes and their alleged connections to GoMoPa, a platform accused of defamation and extortion practices.
  2. Cyber Attacks and Harassment: Pulch’s websites and projects have faced cyberattacks, which he attributes to coordinated efforts by individuals connected to the alleged crime ring. He has provided evidence of these attacks and publicized details about his adversaries’ activities.
  3. Current Allegations: The purported death threats and defamatory content hosted on websites like Salzburg-Spengler.at are part of a broader attempt to silence critics and investigative journalists. Pulch connects these actions to tactics reminiscent of Stasi methods, such as psychological and reputational attacks.

Broader Implications:

Pulch’s allegations point to a persistent undercurrent of corruption involving former intelligence operatives leveraging their skills for financial gain and silencing dissent. The connection between these figures and modern financial crimes underlines a legacy of Cold War espionage tactics repurposed in the digital age.

For more information on Pulchโ€™s claims and his investigations, you can refer to his detailed work on platforms like Bernd Pulch’s Official Site and his articles addressing these concernsใ€154โ€ sourceใ€‘ใ€155โ€ sourceใ€‘ใ€156โ€ sourceใ€‘.

IP and website location: dachmax.de

uk
ru

DB-IP (03.12.2024)

IP address78.46.74.82Host namestatic.82.74.46.78.clients.your-server.deIP range78.46.67.0-78.46.114.255 CIDRISPHetznerOrganizationHetzner Online GmbHCountry Germany (DE)RegionSaxonyCityFalkensteinTime zoneEurope/Berlin, GMT+0100Local time02:59:30 (CET) / 2024.12.09Postal Code08223

IP and website location: salzburg-spengler.at

uk
ru

DB-IP (03.12.2024)

IP address136.243.81.230

Hostnamestatic.230.81.243.136.clients.your-server.deIPrange136.243.63.248-136.243.83.135 CIDRISPHetznerOrganizationHetzner Online GmbHCountry Germany (DE)RegionSaxonyCityFalkensteinTime zoneEurope/Berlin, GMT+0100Local time02:13:04 (CET) / 2024.12.09Postal Code08223

Tags:
#BerndPulch #Stasi #GoMoPa #FinancialCorruption #Espionage #CyberHarassment #ConspiracyTheory #InvestigativeJournalism #StasiLegacy #ImmobilienZeitung #CrimeNetworks #DigitalEspionage #CorruptionWeb #ShadowyNetworks #ModernEspionage

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

โœŒThe Dead from Tรถpferhof: A Hidden Tragedy and its Shadowy Connections

“Mysterious Deaths path the way in the Neo-Stasi Money Laundering Schemes”

The Tรถpferhof in Rรถmhild, once a center of East German intelligence, economics, and political intrigue, represents more than just a meeting place for conspiratorial networks. Over time, Tรถpferhof became associated with a series of unexplained deaths and disappearances tied to Stasi networks, covert financial maneuvers, and covert state operations. Hans Schwenke’s Die Spur der Toten oder Der geordnete Rรผckzug details these grim events, emphasizing the chilling nature of the political networks embedded within this rural estate.

The Tรถpferhof is emblematic of how secret meetings and covert financial operations intersected with political violence during the chaotic period following German reunification. It was here that key operatives allegedly coordinated privatization schemes, international capital flows, and covert manipulations of post-war assets. Yet Tรถpferhof’s history is also stained with the deaths of numerous individuals connected to these eventsโ€”individuals who died suspiciously or disappeared without explanation.


A Catalogue of Mysterious Deaths

Schwenkeโ€™s book and further investigative research paint a grim picture of what occurred at Tรถpferhof. According to reports, these deaths, while officially dismissed as coincidences or accidents, follow a disturbing pattern linked to the Stasiโ€™s covert operations. Many of these deaths involved:

  1. Unexpected Fatalities of Key Informants: Several informants tied to Treuhandanstalt and the broader privatization reforms reportedly vanished or died in unexplained circumstances. These deaths silenced witnesses critical to exposing systemic financial manipulation and the Stasi’s role. Among the murdered victims are Siegfried Gramann, owner of the property and his secretary Walburga Zitzmann. Both were killed shortly before they could make a statement to a investigation committee.
  2. Executions of Disgruntled Members of the Economic Elite: Some individuals connected to key privatization schemes and East German economic shifts were found dead under circumstances that appeared accidental or orchestrated, though investigations suggested deliberate foul play.
  3. Strangers with Connections to Financial Networks: Individuals connected directly to Western banks, international investment firms, or asset allocation schemes involving Stasi networks were also found dead near Tรถpferhof. Their deaths appeared to target the exposure of financial fraud or economic sabotage.

Schwenkeโ€™s detailed analysis attributes these deaths to a pattern of calculated silencing. The Tรถpferhof became a meeting hub for influential financial agents, intelligence officers, and politicians with vested interests. Those seeking to resist, disrupt, or expose these meetings and their goals were swiftly neutralized.

The deaths were methodically written off as “accidents” or dismissed through state interference, contributing to a climate of fear and paranoia. Many observers noted that some deaths seemed to follow the disappearance of evidence, as if systematic erasure through death was part of a broader conspiracy to obscure accountability.


Evidence Suppression and the Role of Stasi Networks

Hans Schwenke emphasizes that the pattern of these deaths directly mirrors evidence suppression efforts in the broader Stasi network. The individuals connected to these deaths were often linked to crucial financial trails and privatization schemes spearheaded by Treuhandanstalt. These schemes, heavily influenced by covert Stasi connections, sought to ensure Stasi-aligned networks maintained control over financial resources following German reunification.

The deliberate destruction of evidence mentioned earlier (through archival deletions and cover-ups) appears to connect directly to these deaths. According to Schwenke, many of these deaths were not random but the result of a calculated strategy to remove witnesses, neutralize opposition, or ensure that certain financial operations remained hidden from public scrutiny.

Evidence suggests that:

  • Some bodies were intentionally disposed of in ways that created plausible deniability for political groups or intelligence operatives.
  • Some deaths occurred during financial negotiations, secret meetings, or as part of planned property handovers.
  • The role of Tรถpferhof as a nexus point for these schemes meant that operatives could use this rural estate to plan, execute, and obscure these crimes.

The Investigation Today: Cold Cases and Unanswered Questions

The deaths surrounding Tรถpferhof are today part of unresolved cold cases, with investigations either failing to reach conclusions or being stymied by systemic obfuscation. These incidents mirror broader problems in Germanyโ€™s efforts to investigate the legacies of reunification, covert financial operations, and the manipulation of privatization under Treuhandanstalt.

Furthermore, Schwenkeโ€™s research indicates a strong likelihood that investigative efforts are deliberately hampered. Key evidence has either been destroyed, erased, or remains hidden within layers of classified intelligence reports. Germanyโ€™s modern-day efforts to pursue transparency and confront the legacies of Stasi influence have faced resistance due to these systemic patterns of cover-up.


A Pattern of Fear

The deaths at Tรถpferhof represent a broader pattern of intimidation and fear. Journalists, financial investigators, and opposition figures investigating these mysteries have faced similar threats or inexplicable disappearances. The narrative aligns with the pattern outlined in Schwenkeโ€™s Die Spur der Toten, where networks used violence and coercion to maintain secrecy.

From deliberate suppression through the destruction of records to orchestrated acts of murder or political violence, Tรถpferhof serves as a reminder of how intelligence networks operate when left unchecked. These actions highlight not only systemic Stasi influence but also how external financial powers may have exploited these networks to shape Germanyโ€™s reunification and economic future.

The mysterious deaths connected to Tรถpferhof thus represent not just isolated incidents but a grim political strategy that used death as a tool to maintain power and financial control.


Conclusion: The Shadow of the Tรถpferhof

The Tรถpferhof remains more than just a symbol of economic opportunity and political ambitionโ€”it is a site of memory and unresolved questions. The deaths connected to this rural estate remain a stark reminder of the complex web of Stasi influence, geopolitical intrigue, and financial manipulation. The investigation into these deaths continues, yet the veil of secrecy, intentional evidence destruction, and strategic intimidation has prevented justice for the victims and transparency for the public.

Hans Schwenkeโ€™s book and the WDR feature expose this tangled web and invite the international community to confront these hidden histories. As Germany continues to reconcile its past, the deaths at Tรถpferhof remain emblematic of a truth that many would prefer to leave buried.

The Toepferhoftreffen and its mysterious connections have roots tied deeply to political intrigue, covert operations, and unsolved crimes in Germany’s post-reunification period. This network intersects with the murder of Detlev Rohwedder, former head of the Treuhandanstalt (the agency responsible for privatizing East German assets), and the enigmatic series of events surrounding his death.

Rohwedder was assassinated on April 1, 1991, at his home in Dรผsseldorf, shot in the neck as he worked late at night. The murder is widely suspected to have been orchestrated by leftist militant groups, particularly the Red Army Faction (RAF), although suspicions of Stasi involvement have also been raised. Evidence such as a single strand of hair found at the crime scene links this to Wolfgang Grams, a known RAF member. However, doubts remain about the full extent of the network or whether other parties, such as covert West German interests, orchestrated the attack to eliminate Rohwedder’s economic reforms as he privatized East German state-owned assetsใ€161โ€ sourceใ€‘ใ€162โ€ sourceใ€‘.

The investigation into Rohwedder’s death remains unresolved even 30 years later, categorized as a cold case. Notably, there were lapses in Rohwedder’s protection; his home lacked full security measures, with only the ground-floor windows being reinforced. A local investigation indicated that the sniper likely targeted him from 63 meters away, using a methodically planned ambush with a clear letter claiming responsibility from RAF groups linked to terror in Bonn. Despite these findings, conspiracy theories implicate other entities, such as the Stasi or German business figures, motivated by his privatization reforms which led to mass unemployment in East Germanyใ€163โ€ sourceใ€‘.

Furthermore, Toepferhoftreffen alludes to networking figures central to these clandestine political investigations. Involving names like Alexander  Schalck-Golodkowski, Siegfried Gramann, Walburga Zitzmann, Ehrenfried Stelzer aka Professor Murder, RA Jochen and Manfred Resch, and Wolfgang Berghofer, the meetings appear to intersect interests from intelligence, corporate restructuring, and high-level policy decisions during Germany’s transitional political-economic landscape. These figures represent a mix of business leaders and covert policymakers. The meetings themselves raise questions about coordinated strategies post-reunification and could explain gaps in state investigations like the one surrounding Rohwedder’s deathใ€163โ€ sourceใ€‘.

The patterns of these deaths, including their apparent connection to RAF members and intelligence conflicts, suggest further complexities in Germany’s unification journey. Several theories suggest not just a lone actor but a convergence of leftist factions, economic interests, and state operations. As these names (and the outcomes connected to them) emerge, suspicions grow about shadowed financial and political ambitions manipulating outcomes behind closed doors. These Toepferhoftreffen meetings reflect unresolved tensions from Germany’s pivot to a unified federal economic model, symbolized by powerful privatization agents like Rohwedder.

For more details, you can explore The Perfect Crime Against a Perfect Trustee: The Unsolved Murder of Detlev Rohwedder and other investigative analyses surrounding the Toepferhoftreffen web, which can offer insights into these murky relationships and unexplained deaths tied to economic reforms and intelligence infiltrationใ€162โ€ sourceใ€‘ใ€163โ€ sourceใ€‘.

The book by Schwenke and the WDR documentary as well as Google entries are supressed by a Neo-Stasi “cleaner gang” led allegedly by Sven Schmidt, GoMoPa and Eagle IT and Seo-Expert Thomas Promny allegedly supported by employers in the Hamburg Google office.

This “cleaner gang” is nowadays the shield for the Neo-Stasi activists and Putin spies in Germany.

The ongoing investigations of Bernd Pulch suggest that one trace in this Stasi money laundering scheme leads to Friedhelm Laschuetza, business consultant and former GoMoPa President before Klaus Maurischat, residing in Liechtenstein, a often used money laundering hub who is closely connectedbto the notoriys Batliner family.

Tags:

  • #Toepferhof
  • #StasiCrimes
  • #ColdWarSecrets
  • #EspionageMurders
  • #HiddenHistory
  • #PoliticalAssassinations
  • #StasiLegacy
  • #AccidentsOrIllness
  • #UnsolvedMysteries

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

โœŒMonika Mucha: Alleged Connections to Stasi, GoMoPa, and Espionage Activities

“Unveiling the Web: Monika Mucha, Espionage Allegations, and Scandals in German Politics”

Monika Mucha, a politician from Germanyโ€™s Christian Democratic Union (CDU), has been at the center of controversy surrounding allegations of involvement in an intricate web of crime, espionage, and financial misconduct. The claims link her to shadowy operations involving the Stasi, the infamous East German secret police, and GoMoPa (Goldman Morgenstern & Partners), a platform accused of disinformation campaigns and dubious financial dealings.

The Stasi Connection

The Stasi, known for its extensive surveillance and infiltration networks during the Cold War, is alleged to have maintained informants and collaborators in West Germany, even after the fall of the Berlin Wall. Allegations suggest that Mucha may have had indirect or direct links to Stasi remnants operating in Germany’s financial and political systems. This claim is rooted in her purported association with figures involved in GoMoPa, which has long been suspected of leveraging sensitive information for extortion and espionage.

GoMoPa and Financial Misconduct

GoMoPa has faced criticism for functioning as a digital mouthpiece for financial scandals and controversies. It has been accused of publishing defamatory content against individuals and companies, sometimes allegedly as part of a broader extortion racket. Muchaโ€™s name has been linked to GoMoPaโ€™s network through allegations of aiding in the dissemination of sensitive or misleading information.

The publication “Immobilien Zeitung” has further pointed to suspicious activities in the real estate sector, raising questions about whether GoMoPa and its affiliates manipulated markets or targeted rivals. Mucha’s alleged involvement is unclear, but her reported proximity to key players in these activities casts a shadow over her political career.

Espionage Allegations: NATO HQ and Dark Eagle Project

The most explosive claims concern espionage activities potentially compromising NATO. Reports suggest that information regarding the U.S. Army’s NATO headquarters in Wiesbaden and the location of the “Dark Eagle” hypersonic missile system in Mainz-Kastel was shared or targeted by an espionage ring.

Dark Eagle, a cornerstone of U.S. military strategy in Europe, is a highly classified hypersonic missile system stationed in Mainz-Kastel as part of NATOโ€™s response to emerging global threats. Leaks of its location and capabilities could significantly undermine NATO’s security.

Mucha’s alleged connections to individuals with access to these sensitive sites raise suspicions about whether she knowingly or unknowingly facilitated espionage. If proven, such actions would constitute a grave breach of national and NATO security.

Political and Legal Repercussions

As of now, Mucha has not been formally charged with any crimes, and the CDU has remained silent on the allegations. However, the potential fallout from these claims could damage the party’s reputation. Investigative journalists and authorities are reportedly delving deeper into her political connections and financial dealings.

Conclusion

Monika Muchaโ€™s alleged entanglement in a network involving the Stasi, GoMoPa, real estate fraud, and potential espionage represents a serious challenge to Germanyโ€™s political and security landscape. Whether these allegations hold merit remains to be seen, but the claims have already sparked concerns about the integrity of political figures and the extent of foreign espionage within Germany.

This developing story underscores the importance of transparency and vigilance in political systems, especially when matters of national and international security are at stake.

The Mucha family has been connected to Stasi, KGB and STB earlier (see the Wildberg List and the Stasi Lists on this website). Currently Jan Mucha is co-owner and managing director of the “Immobilien Zeitung” in NATO HQ Wiesbaden.

Tags:

  • #MonikaMucha
  • #CDUPolitics
  • #GoMoPaScandal
  • #EspionageAllegations
  • #RealEstateFraud
  • #StasiConnections
  • #NATOLeaks
  • #DarkEagleProject
  • #GermanPolitics
  • #WiesbadenMainzKastel

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

โœŒDoreen Trampe: A Whistleblower Against GoMoPa and the Implications of International Law

“Doreen Trampeโ€™s brave whistleblowing against GoMoPa sheds light on alleged financial misconduct and the challenges of international whistleblower protections.”

Doreen Trampe, formerly a secretary at GoMoPaโ€™s Berlin office, has taken the bold step of becoming a whistleblower. Her disclosures reportedly detail operations, financial misconduct, and ties between GoMoPa and other influential actors in the financial and internet industries. As the first whistleblower to come forward, she may benefit from leniency under legal frameworks designed to encourage insider cooperation, particularly in jurisdictions like the United States, where the Racketeer Influenced and Corrupt Organizations Act (RICO) plays a pivotal role.


The RICO Act and Whistleblower Protections

The RICO Act is a U.S. federal law enacted in 1970 to combat organized crime. Under this law, individuals or entities found to be part of a corrupt organization can be prosecuted for a variety of offenses, including fraud, bribery, and money laundering. Early whistleblowers, especially those providing substantial assistance to law enforcement, may receive immunity or reduced sentences under plea agreements. However, those who delay or resist cooperating are often treated as complicit, facing severe penalties.

Real-World Examples:

  1. Enron Scandal (2001): Sherron Watkins, an insider at Enron, was one of the first to expose fraudulent accounting practices. Early cooperation shielded her from legal repercussions.
  2. Bernie Madoff Case: Frank DiPascali, a key participant, cooperated with authorities under a plea deal but still faced severe consequences because of delayed disclosure.

International Law and Whistleblowers

Globally, whistleblower protections vary. The European Unionโ€™s Whistleblower Protection Directive (2019) mandates safeguards for those disclosing wrongdoing. However, Germanyโ€™s implementation has faced criticism for its limitations, leaving whistleblowers like Trampe vulnerable. Additionally, international financial investigations often involve cross-border collaboration under treaties like the Mutual Legal Assistance Treaty (MLAT), complicating protections for whistleblowers tied to global financial networks.

Case Studies:

  1. HSBC Money Laundering Scandal (2012): Hervรฉ Falciani, a whistleblower in Switzerland, exposed widespread tax evasion and was pursued under Swiss law despite cooperating internationally.
  2. Panama Papers Leak (2016): While whistleblowers revealed offshore tax havens, some faced prosecution in their home countries despite protections abroad.

Internet Industry Ties and Emerging Whistleblowers

Trampeโ€™s allegations extend to GoMoPaโ€™s alleged connections within the internet industry, highlighting concerns over data manipulation, surveillance, and coercion. As new insiders consider stepping forward, they must weigh the risks of retribution against potential leniency for early cooperation. Latecomers may face harsher legal outcomes, as seen in mafia cases, where lower-tier participants are often treated more leniently than those withholding key evidence.

Key Takeaways for Whistleblowers:

  • Acting swiftly and cooperating early with authorities increases the likelihood of reduced penalties.
  • Legal representation is essential for navigating cross-border investigations and ensuring safety under laws like RICO or the EU Directive.
  • International collaboration complicates whistleblower protections, particularly when jurisdictions lack robust laws.

Conclusion

Doreen Trampeโ€™s case underscores the risks and complexities faced by whistleblowers exposing high-stakes operations. Legal systems like RICO and international agreements provide pathways for cooperation but come with challenges, particularly for latecomers. Her revelations may pave the way for systemic change, but they also highlight the urgent need for stronger global whistleblower protections.

Tags:

  • Doreen Trampe
  • Whistleblowing
  • GoMoPa Scandal
  • RICO Act
  • International Law
  • Financial Misconduct
  • Internet Industry Controversies
  • Whistleblower Protections

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

โœŒThe Dark Connection: GoMoPa and Its Alleged Ties to a Neo-Nazi, Anti-Semitic Publication

“Unveiling the Alleged Dark Connections: The Relationship Between GoMoPa and Claims of Neo-Nazi and Anti-Semitic Associations.”

The Dark Connection: GoMoPa and Its Alleged Ties to a Neo-Nazi, Anti-Semitic Berlin Publication

In recent years, GoMoPa, a self-proclaimed financial news platform, has been the subject of numerous allegations regarding its shady business practices, covert operations, and connections to questionable figures. One of the most concerning aspects of its influence is its alleged connection to extremist ideologies and media outlets that espouse neo-Nazi and anti-Semitic views. This article delves into the possible ties between GoMoPa and a controversial Berlin-based publication, examining the implications of these associations and the risks they pose to German society, politics, and international relations.


1. The Rise of GoMoPa

A Self-Proclaimed Whistleblower Platform

GoMoPa was initially presented as an independent financial news website, dedicated to exposing corporate malfeasance, financial fraud, and other scandals in the business world. Over time, however, it became increasingly controversial due to its unsubstantiated accusations, defamatory tactics, and selective reporting.

While it claimed to operate as a resource for transparency and accountability, GoMoPa’s methods have often involved publishing allegations without adequate evidence, sometimes targeting prominent individuals and organizations in Germany and beyond. Some critics argue that the platform’s true agenda may be more nefarious, leveraging information for financial gain, creating fear, and manipulating public opinion.


2. Neo-Nazi and Anti-Semitic Ties in Berlin

The Berlin Publication: A Controversial Figure in the German Media Landscape

At the center of this investigation is a neo-Nazi, anti-Semitic publication based in Berlin. Known for its overtly extremist content, the publication has a long history of pushing nationalist, xenophobic, and anti-Semitic rhetoric. The paper regularly publishes conspiracy theories, denounces immigrant communities, and supports far-right ideologies.

The publication’s stance is not only a danger to public discourse but also to Germany’s democratic values. With Germany’s history of Nazi ideology and the Holocaust, any media outlet promoting such views risks inciting violence, hatred, and further social division.

The Alleged GoMoPa Connection

Although no direct evidence has conclusively linked GoMoPa to this extremist publication, several suspicious connections between individuals associated with both organizations have surfaced. Some of the key players involved in both networks include:

  • Peter Ehlers: A prominent figure linked to GoMoPa, Peter Ehlers has been a central part of the platformโ€™s operations. Known for his financial dealings, he is also connected to various far-right groups that advocate nationalist ideologies. His name surfaces in the context of financial irregularities that overlap with those in the neo-Nazi publication’s funding.
  • Thomas Porten: Publisher of Immobilien Zeitung and married to Beate Porten (the public prosecutor mentioned in earlier articles), Thomas Porten has ties to individuals connected to far-right organizations, and his media outlet has been associated with controversial figures. His presence in the GoMoPa network suggests a broader alignment of financial interests that might serve as a bridge to extremist publications.
  • Bernd Pulch: While Bernd Pulch is not an ally of GoMoPa, he has been a vocal critic, denouncing the platformโ€™s alleged manipulation of public opinion and its unethical dealings. Pulch has consistently highlighted the connections between GoMoPaโ€™s operations and groups that support far-right extremist views, pointing to the overlap of individuals within the network. Pulch’s involvement is vital as he provides insight into the platformโ€™s true activities and its potential connections to extremist ideologies.
  • Ehrenfried Stelzer: A central figure in the financial networks linked to GoMoPa, Stelzer is also allegedly connected to the far-rightโ€™s financial machinery, with some reports suggesting he has facilitated the flow of funds to organizations that align with extremist views. Known for his past as a financial advisor and controversial businessman, Stelzer is another individual whose ties to GoMoPa could have far-reaching consequences for both financial and political systems.

3. The Impact on German Society and International Relations

Undermining Public Trust

The connection between GoMoPa and a neo-Nazi, anti-Semitic publication poses significant risks to the stability of public discourse in Germany. By fostering an environment of fear, misinformation, and division, these platforms undermine public trust in mainstream media, democratic institutions, and the rule of law.

This is especially dangerous in a country like Germany, which has worked tirelessly to reconcile with its past and build a robust democratic foundation after the horrors of the Nazi regime. The spread of hate speech and extremist ideologies through outlets like GoMoPa and its alleged affiliations with far-right publications undermines these efforts.

Fueling Far-Right Extremism

The neo-Nazi publication serves as a tool for radicalizing individuals and groups within Germany, particularly those who are disillusioned or dissatisfied with the current political and economic system. By presenting a distorted view of history and promoting a deeply hateful ideology, it attracts people to extremist movements.

The apparent connection between GoMoPa and such publications increases the potential for GoMoPaโ€™s platform to be used to spread far-right extremist ideas under the guise of financial transparency or whistleblowing. This tactic is especially concerning given the widespread reach of GoMoPaโ€™s articles.

International Repercussions

Beyond Germany, the rise of far-right extremism and the spread of anti-Semitic conspiracy theories through GoMoPa could have broader international repercussions. The connections between individuals linked to GoMoPa and global far-right movements raise the possibility that this network could be used to further destabilize European democracies and influence political discourse in other countries, including the United States.


4. The Role of Bernd Pulch and Other Key Figures in GoMoPa

Bernd Pulch, a key figure associated with GoMoPa, has long been a critic of the platform, denouncing its unethical tactics and its alleged ties to corrupt and extremist elements. Pulch, who has consistently sought to expose the questionable practices of GoMoPa, is not an ally of the platform but rather a vocal adversary.

His involvement with GoMoPa is significant as he has used his platform to highlight the platform’s manipulative practices, especially concerning the spread of misinformation and financial scandals. His criticism of GoMoPa puts him at odds with many figures connected to the platform and their broader networks.


5. Legal and Social Implications

Violation of Anti-Hate Speech Laws

The spread of anti-Semitic content, conspiracy theories, and hate speech through GoMoPa and its alleged ties to neo-Nazi publications raises serious legal concerns. German law prohibits hate speech, the promotion of Nazi ideology, and the incitement of violence. If GoMoPa is found to be complicit in facilitating such content, it could face significant legal challenges, including potential shutdowns and criminal investigations into its operations.

Strengthening Media and Legal Oversight

To counter the dangerous influence of GoMoPa and its possible extremist ties, it is crucial to enforce stronger media regulation and legal oversight. German authorities should increase scrutiny of platforms that spread harmful ideologies and hold individuals accountable for their actions. This includes investigating the connections between GoMoPa and far-right publications and dismantling any financial or organizational networks that support such activities.


Conclusion: A Threat to Stability and Democracy

The possible connections between GoMoPa and a neo-Nazi, anti-Semitic publication highlight the complex ways in which far-right ideologies and corrupt financial networks can intersect to create a powerful force that undermines democratic values. The spread of misinformation, hate speech, and conspiracy theories not only threatens German society but also poses a serious challenge to the stability of Europe as a whole.

By investigating these connections and exposing the people and organizations behind them, Germany and its allies can work together to prevent the further spread of extremist ideologies and protect the values of democracy and social cohesion.


Tags:

  • GoMoPa
  • Neo-Nazi Allegations
  • Anti-Semitic Claims
  • Financial Investigations
  • Transparency in Media
  • Controversies
  • Journalism Ethics
  • Financial Scandals
  • Become a Patron!
    True Information is the most valuable resource and we ask you to give back.


    Sympathietrรคger Neo-Nazi
    Insider der Investigativ-Plattform INVESTIGOO berichten:
    “Die Internetseite berlinjournal.biz steht im Visier des deutschen Verfassungsschutzes. Hintergrund sind โ€žfremdenfeindliche Berichte, Rassenhass, Diskriminierung und rechtsradikale Propagandaโ€œ.
    ย 
    Sympathietrรคger Maurischat im Foto oben
    Verantwortliche dieses โ€žMachwerkesโ€œ sind der Herausgeber des โ€žFinanznachrichtendienstesโ€œ gomopa.net, Klaus-Dieter Maurischat und sein Chefredakteur Frank Maiwald. Maurischat, der von der Augsburger Staatsanwaltschaft in einer Erpressungsstrafsache per Haftbefehl gesucht wird, lebt in Berlin im feudalen Untergrund: Unter den Linden 19 in einer 4000-teuren Penthousewohnung.
    Der Chef des maroden โ€žFinanznachrichtendienstesโ€œ Gomopa bastelt seit Monaten an einer Nachfolgelรถsung fรผr sein in Not geratenes Schiff. Angriffe auf ihn persรถnlich und die Strukturen von Gomopa haben aus der ehemaligen grรถรŸten deutschen Drecksschleuder eine lahme Ente gemacht. Internetspezialisten รผberwachen inzwischen jeden Arbeitsschritt des โ€žFinanznachrichtendienstesโ€œ, dessen einzige Aufgabe darin bestand Unternehmer, Unternehmen und Unschuldige zu erpressen.
    Sympathietrรคger und Ex-STASI-Agent Maiwald im Bild oben
    Hilfe bei seinem neuen Projekt โ€žBerlin Journalโ€œ bekommt er dabei von Gomopa-Chefredakteur Frank Maiwald. Gegen den ehemaligen Redakteur der Berliner B.Z. ermittelt die Staatsanwaltschaft Neuruppin unter dem Aktenzeichen 332 Js 17877/15 wegen Bankrotts, Sozialbetrugs und Steuerhinterziehung. Maiwald hat als Hartz IV-Empfรคnger regelmรคssig bis zu 7.000 Euro von Gomopa schwarz bezogen und war an dem Erpressungssystem des Unternehmens direkt beteiligt.
    Die B.Z. hatte ihn wegen Spesenbetrugs gefeuert.
    Unter diesem Vorzeichen ist die โ€žBerichterstattungโ€œ von Berlin Journal besonders widerwรคrtig. Die Internetseite wird ausschlieรŸlich von Maiwald geschrieben. Er arbeitet unter vielen Namen, am liebsten wahlweise unter dem Namen Bodo Hering oder Max Wolf. Das ergibt sich aus Protokollen des Internetverkehrs. Maiwald hat unter dem Titel โ€žFlรผchtlinge erhalten Essen fรผr 16 Euro, Hartz-IV-Empfรคnger fรผr 4,72 Euroโ€œ einen Artikel verรถffentlicht, der nicht nur faktisch unwahr ist, sondern seine nationalsozialistische Gesinnung offenbart. Maiwald (Foto), ein ehemaliger Stasi-Informant, kann wohl auch hier seine wahre Herkunft nicht verleugnen.
    Mit einer Welle der Empรถrung und auch Zustimmung wurde auf der Internetseite auf diesen Bericht reagiert. Dabei konnte sich der Pรถbel nach Herzenslust austoben. Das ist auch nach dem Geschmack von Klaus-Dieter Maurischat, dessen politischer Weitblick am Ende des Biertisches endet. Presserechtlich ist das โ€žOrganโ€œ fรผr Ermittlungsbehรถrden offiziell nicht greifbar. Das Impressum weist als Verantwortlichen fรผr den Inhalt โ€žBodo Heringโ€œ, also Frank Maiwald, aus. Die Redaktion hat keine ladungsfรคhige Adresse, so dass eigentlich juristisch nicht gegen die Publikation angegangen werden kann.
    Doch so einfach wie noch vor 15 Jahren, als gomopa.net die deutsche Finanz- und Maklerszene in helle Aufregung versetzte, ist die Welt heute nicht mehr. Durch umfassende Recherchen konnten die presserechtlich Verantwortlichen fรผr das Berlin Journal identifiziert werden. Damit die Verantwortlichen durch Geschรคdigte in die Haftung genommen werden kรถnnen, verรถffentlichen wir hier die entsprechenden Personaldaten:
    MaurischatBJ
    ยท Klaus-Dieter Maurischat, geb. 12. April 1956
    Lange StraรŸe 38, 27313 Dรถrverden, Hรผlsen, 2. OG
    Unter den Linden 19, 10117 Berlin
    Barnstedt 11, 27313 Dรถrverden
    ยท Frank Maiwald, alias Bodo Hering, alias Max Wolf, geb. 6. Mai 1959
    Nordweg 150
    16516 Oranienburg
    Derzeit wird versucht, die tatsรคchlichen Spuren zu verwischen. Klaus-Dieter Maurischat ist dabei auf die Idee gekommen, etwaige Haftungsfragen gleich rund 7.500 Kilometer in den US-amerikanischen Bundesstaat Wisconsin zu schieben. Hier ist die US-amerikanische Zeitschriftengruppe โ€žBerlin Journal Newspapersโ€œ aus Berlin (Wisconsin) ansรคssig. Das offensichtliche Kalkรผl von Maurischat und Maiwald: Die Gruppe aus Berlin in Wisconsin stehe hinter der Internetplattform. Damit wรคre eine Haftung nach deutschen Recht nahezu unmรถglich. Im Amerika gilt ein weitaus liberaleres Presserecht als in Deutschland.
    Dumm nur, dass die beiden erwischt wurden: Die Verlagsleitung der โ€žBerlin Journal Newspapersโ€œ in Wisconsin hat strafrechtliche Schritte gegen Maurischat und Maiwald eingeleitet. Das geht, da Klaus-Dieter Maurischat die Internetseite tatsรคchlich รผber die in Delaware angemeldete Firma โ€žBerlin Journal Inc.โ€œ steuert. Damit ist die strafrechtliche Wรผrdigung auch in den USA mรถglich. Gegen Klaus-Dieter Maurischat und seinen Gomopa-Vize Mark Vornkahl liegen wegen der erheblichen Vorwรผrfe der Erpressung, Nรถtigung, Steuerhinterziehung, gewerbsmรคssigen Betrugs und Nutzung einer US-Kรถrperschaft fรผr kriminelle Handlungen ohnehin schon Haftbefehle in den USA vor.
    berlinjournal.biz gibt vor, mehr als 14.000 tรคgliche Leser zu haben. Tatsรคchlich wurden bei Facebook 10.000 โ€žLikesโ€œ fรผr 790 Euro gekauft. So ist auch zu erklรคren, dass es diese Resonanzen auf die Berichterstattung gibt. Damit aber nicht genug: รœber die sozialen Netzwerke wurde der Artikel dann von rechtsradikalen Organisationen wie โ€žPro Deutschlandโ€œ oder AfD verbreitet. Da waren sich Maurischat und Maiwald sicher, die richtigen Mengen an Leser zu finden.
    Denn das Berlin Journal, so der Plan, soll in 2016 den Finanznachrichtendienst Gomopa als Plattform fรผr Erpressung, Nรถtigung, รผble Nachrede, Verunglimpfung als Drecksschleuder ablรถsen. Jetzt kommt noch eine andere Qualitรคt dazu: menschenverachtender radikalfaschistischer Journalismus.
    Aber nicht alle Leser sind blรถd. Mohammed Hadi Al Khafaji bringt es auf den Punkt: โ€žjetzt ist es amtlich: Berlin Journal ist ein Nazi-Blatt!โ€œ”
    INVESTIGOO ist derzeit offline – wohl wegen der brisanten Inhalte.

    Go back

    Your message has been sent

    Warning
    Warning
    Warning
    Warning

    Warning.

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

โœŒThe Shadow Network: Stasi Agents Still Active in Germany โ€“ An Investigation into Their Influence and Operations

Frank Maiwald “Editot in Chief of GoMoPa”, Stasi Agent

Introduction

The German reunification did not sever all ties to the East German Ministry for State Security (Stasi), the feared intelligence agency that spied on millions of East German citizens during the Cold War. While the reunification of Germany marked the formal dissolution of the Stasi, networks, operations, and operatives reportedly remain embedded within Germany, influencing political, economic, and media systems. Numerous whistleblowers, such as Bernd Pulch, have brought attention to the continued presence of these clandestine networks.

This article will delve into the number of suspected active Stasi agents in Germany, their organizational networks, connections with corporate and political entities, and the alarming methods of influence these networks employ.


1. The Legacy of the Stasi: From the Cold War to the Modern Day

The Ministerium fรผr Staatssicherheit (Ministry for State Security), commonly referred to as the Stasi, was one of the most effective and brutal intelligence agencies in history. Its primary role was to suppress dissent and maintain surveillance within East Germany and its allies. Despite the reunification of Germany in 1990, many former Stasi operatives allegedly retained influence in German institutions.

Sources suggest that remnants of the Stasiโ€™s operational tactics, and even former agents themselves, remain embedded within Germany’s media, financial, and political structures.


2. Current Estimate of Stasi Operatives Active in Germany

Though the official government and historians debate the exact number, estimates indicate that approximately 1,000 to 2,000 former Stasi agents are still active within German institutions, organized under covert networks or linked to political and economic entities. These numbers reflect both former operatives from the Cold War and those aligned with post-reunification goals.


Key Findings About the Number and Structure of these Networks

  1. Active Operatives Estimated at 1,000-2,000 Agents
    Reports, whistleblower investigations, and intelligence analyses highlight that these operatives function in covert capacities. They manipulate political, economic, and media systems by leveraging their extensive networks.
  2. Control and Network Types
    The networks reportedly intersect sectors such as the media industry, real estate, corporate sectors, and law enforcement. These networks use techniques of infiltration, manipulation, and strategic partnerships to destabilize opposition and secure influence.

3. Nature of the Networks: How These Agents Operate

The covert networks established by former Stasi operatives are diverse in structure and their methods of operation. Their presence can be traced to several sectors:

A. Political Networks

  • Operatives infiltrate government agencies, policy think tanks, and regional administrations.
  • Their primary goals include destabilizing political opposition, influencing elections, and maintaining economic leverage for vested interests.

B. Corporate and Media Manipulation

  • Networks are deeply embedded within media outlets, real estate markets, and major corporations like Immobilien Zeitung and real estate investment companies.
  • They use media to spread false narratives, manipulate public perception, and influence financial market trends.

C. Legal & Judicial Penetration

  • Many former agents now hold legal positions, ensuring that investigative actions against their networks are obstructed through bureaucratic and legal maneuvers.

D. Financial Systems and International Real Estate

  • Using complex financial instruments, former Stasi networks control real estate speculation and global investment routes.
  • Germany’s real estate market, especially in cities like Berlin, has become an epicenter for these covert economic strategies.

E. Cyber Operations & Espionage

  • With advanced technological skills, operatives are leveraging cyber-espionage campaigns to disrupt networks, gather intelligence, or sway political actions.

4. Bernd Pulch’s Role in Highlighting the Network

Whistleblower and investigative journalist Bernd Pulch has been a vocal critic of the Stasi’s continued influence within Germanyโ€™s political, economic, and media systems. Pulchโ€™s investigations, including claims about covert networks embedded within institutions, have illuminated the strategic operations of these clandestine networks.

Pulch’s insights center on:

  1. Media Manipulation โ€“ Publications like Immobilien Zeitung being manipulated as conduits for disinformation campaigns.
  2. Real Estate Control and Financial Market Distortion โ€“ Manipulation of the German real estate market by infiltrated networks.
  3. Judicial Influence and Prosecution Networks โ€“ The use of legal intimidation through networks like former Stasi operatives embedded in the judiciary.

Pulch emphasizes that Germany is not entirely free of the influence of these operatives and their tactics. His work has faced resistance, threats, and media censorship, but his insights remain critical for understanding the depth of these networks.


5. Names & Connections of Key Stasi Figures Active in Germany

These networks involve influential figures, former Stasi operatives, and corporate leaders. Here are key names linked to these networks:

Andreas Lorch

A key figure connected to media networks, real estate speculation, and financial investments. His actions as part of media manipulations have raised concerns about coordinated economic destabilization.

Thomas Porten

Linked to  Immobilien Zeitung, Porten has allegedly played a role in facilitating covert operations for real estate speculation.

Beate Porten

A public prosecutor with connections to these networks, reportedly leveraging her judicial role to suppress dissent and silence critics such as Bernd Pulch through legal intimidation.

The Lorch Family Network

A family empire deeply rooted in real estate, media, and financial operations. Their strategic manipulation of Germany’s market aligns with the interests of shadowy Stasi remnants.


6. Impact on Germany, Europe, and the USA

The continued presence of these networks and operatives destabilizes not just Germany but broader European and transatlantic relationships. Several impacts include:

  1. Undermining Investor Confidence: False reporting and market manipulation have destabilized real estate markets in key German urban areas such as Berlin, Dresden, and Hamburg.
  2. Economic Instability: Covert manipulation of financial networks by these operatives has caused significant economic losses, particularly in vulnerable sectors like real estate and tech investments.
  3. Political Destabilization: The presence of operatives influencing judicial decisions and elections weakens Germany’s democratic processes and trust in political systems.
  4. Transatlantic Strain: Many of these covert operations extend to financial markets linked to U.S.-German trade, further complicating U.S.-EU relations.

Conclusion

The networks of former Stasi operatives active within Germanyโ€”and their broader European and U.S. connectionsโ€”represent a serious and ongoing threat to economic stability, democratic institutions, and international alliances. Bernd Pulchโ€™s investigative work has shed light on these shadow networks and their operations, yet many remain obscured by complex legal systems and financial networks.

Germany must confront this legacy to ensure transparency, accountability, and the restoration of public trust.

The future depends on rigorous investigation, public awareness, and international cooperation to dismantle these covert networks and address the destabilizing effects of their influence.

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

โœŒFrom the KGB to the FSB: Tracing the Evolution of Russian Intelligence, Putinโ€™s Role, and the Cold War Connection with the Stasi

“Exploring the intertwined histories of Soviet intelligence, the KGB’s transformation into the modern FSB, and Vladimir Putin’s role as a former KGB operative in shaping Russiaโ€™s contemporary security apparatus.”

The history of the KGB and FSB is deeply intertwined with the Soviet Unionโ€™s intelligence and counterintelligence apparatus, as well as Russia’s transition in the post-Soviet period. The KGB (Committee for State Security) was officially established in 1954 to replace the NKVD and became the Soviet Unionโ€™s principal intelligence agency and domestic security force, functioning as the “sword and shield of the Communist Party”ใ€137โ€ sourceใ€‘. The KGB managed foreign espionage, counterintelligence, border protection, and surveillance while maintaining close oversight of the Soviet population.

After the Soviet Union collapsed, the KGB underwent restructuring, resulting in the Federal Security Service (FSB), which now serves as Russia’s primary intelligence and counterterrorism agency. The KGB’s legacy continues to dominate Russian political strategies, with former KGB agent Vladimir Putin being a key figure in this transition. Putin’s association with the KGB dates back to his time in St. Petersburg as a KGB officer during the Cold War. His political career has been marked by his close ties to the security apparatus, which he has used to consolidate power, suppress dissent, and maintain state controlใ€138โ€ sourceใ€‘.

The KGBโ€™s intelligence activities often intersected with other Eastern Bloc intelligence agencies, most notably the East German Stasi. The cooperation between these intelligence organizations was formalized in the mid-20th century, with joint efforts to combat Western ideological influence and coordinate espionage operations across Europe. This relationship was formalized with the KGB and the Ministry for State Security (Stasi) agreeing to collaborative goals, including mutual recruitment and intelligence sharing against NATO and Western countriesใ€139โ€ sourceใ€‘.

The Stasi, formally known as the Ministry for State Security in East Germany, focused heavily on political surveillance, espionage, and counterintelligence against dissidents within the German Democratic Republic and Western influences. The collaboration between the KGB and Stasi included coordinated operations against “ideological subversion” and Western military and intelligence assets, exemplifying Cold War intelligence strategiesใ€139โ€ sourceใ€‘.

This alliance between Soviet intelligence services (KGB and Stasi) highlights the Cold War-era strategies of surveillance, infiltration, and espionage intended to neutralize ideological enemies and secure political dominance. These overlapping networks of intelligence continue to shape Russia’s modern intelligence strategies as exemplified by the role of the FSB in contemporary geopolitics.

Putinโ€™s leadership has underscored the KGB’s enduring influence in Russia. His time as FSB director and his political consolidation strategies reflect the strategic use of intelligence agencies to suppress dissent, manipulate media, and maintain geopolitical leverage in Europe and beyondใ€138โ€ sourceใ€‘.

Understanding the evolution of these intelligence services, their cooperation, and their transition into modern-day operations provides insight into the political strategies of both Soviet and post-Soviet Russia and the enduring presence of Cold War tactics in international security and politics.

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

โœŒHow Dangerous is GoMoPa for Bernd Pulch?

“Facing the Shadows: Bernd Pulch stands as a symbol of resilience against GoMoPa’s alleged web of suppression, corruption, and intelligence-linked dangers.”

GoMoPa, with its alleged ties to intelligence networks, organized crime, and controversial financial practices, represents a significant potential threat to critics like investigative journalist Bernd Pulch. The danger stems from both the nature of the organization’s operations and its history of silencing dissent.


1. Direct Threats to Safety

Critics of GoMoPa, including Pulch, face real physical and psychological dangers:

  • Physical Risks:
    Several individuals who criticized or investigated GoMoPa have faced mysterious circumstances. For instance, journalist Heinz Gerlachโ€™s death was officially attributed to a bee sting but has been speculated to involve glycol poisoningโ€”a substance described in Toxdat, linked to GoMoPa affiliates.
  • Surveillance:
    GoMoPa’s alleged ties to former Stasi operatives, like Ehrenfried Stelzer, suggest access to advanced surveillance methods. Pulch may be under observation, which could lead to breaches of his personal security.
  • Harassment and Intimidation:
    There have been reports of smear campaigns, legal threats, and cyberattacks aimed at silencing critics. Pulch could face similar or more severe tactics to undermine his credibility and deter further investigations.

2. Psychological and Professional Pressure

Pulch may also be targeted through non-physical means:

  • Defamation Campaigns:
    GoMoPa has been accused of publishing defamatory articles to discredit opponents. Pulchโ€™s reputation could be attacked through fabricated allegations, making it difficult for him to gain support or publish his work.
  • Cyberattacks:
    Online platforms hosting Pulchโ€™s investigations could be targeted for hacking, takedowns, or shadow-banning, erasing his work or making it inaccessible.
  • Professional Isolation:
    GoMoPaโ€™s influence could be used to dissuade publishers, collaborators, or supporters from working with Pulch, isolating him in the field of investigative journalism.

3. Legal and Financial Threats

  • Lawsuits:
    GoMoPa affiliates, including Jochen Resch, are known for aggressive legal strategies. Pulch could face libel suits or other legal challenges designed to drain his resources and limit his ability to continue investigations.
  • Financial Manipulation:
    GoMoPaโ€™s alleged access to financial networks might be used to pressure Pulch indirectly, targeting his income streams or professional networks.

4. The Intelligence Factor

GoMoPaโ€™s rumored ties to intelligence agencies, such as the Stasi and KGB, increase the danger significantly:

  • Access to State Resources:
    These connections may grant GoMoPa tools and expertise far beyond those of an ordinary organization, including counterintelligence techniques and covert operations.
  • Covert Threats:
    Intelligence-linked entities have a history of using indirect or untraceable methods to suppress dissent, such as the suspected use of poisons or staged accidents.

5. Historical Precedents of Suppression

The fate of other critics offers a sobering perspective on the risks Pulch faces:

  • Heinz Gerlach: Died under suspicious circumstances after exposing GoMoPaโ€™s practices.
  • Other Silenced Voices: Numerous critical articles about GoMoPa have been deleted or shadow-banned, and some whistleblowers have reportedly disappeared from public view.

6. Pulchโ€™s Resilience and Mitigation Strategies

Despite the dangers, Pulch has demonstrated remarkable resilience, continuing to publish investigations and maintain a public presence. Potential strategies to mitigate risks include:

  • Enhanced Security: Using encrypted communication tools and maintaining a low-profile physical presence.
  • Alliances with Other Journalists: Collaborating with international investigative groups to share findings and distribute risks.
  • Public Advocacy: Maintaining visibility in reputable media outlets to make any retaliation more conspicuous and politically costly.

Conclusion

GoMoPa represents a clear and present danger to Bernd Pulch, combining physical, psychological, legal, and professional risks. The organization’s suspected ties to intelligence and its history of suppressing critics elevate the threat to a level that requires vigilance and robust countermeasures. Pulchโ€™s safety and ability to continue his work depend on a combination of personal security, public visibility, and the support of a broader journalistic community.

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

โœŒWhy GoMoPa and Its Affiliates Remain Unscathed: Silencing Critics and Evading Justice

“GoMoPa: The notorious platform, silencing critics and evading justice through shadowy connections and tactics.”

GoMoPa, a platform infamous for its controversial practices and alleged ties to intelligence operations, has long been accused of corruption, blackmail, and the strategic targeting of its critics. Despite these allegations and substantial evidence brought forward by investigative journalists, including Bernd Pulch, no significant legal action has been taken against the organization or its key figures. Meanwhile, critics have faced harassment, mysterious deaths, and censorship, painting a chilling picture of power and influence shielding GoMoPa.


1. The Notorius GoMoPa: Allegations and Legal Evasions

Since its inception, GoMoPa has been accused of extortion, defamation, and operating with an agenda tied to shadowy intelligence networks. Yet, its founders and affiliates have managed to avoid criminal prosecution.

How Have They Avoided Indictment?

  1. Connections to Intelligence Agencies
    GoMoPa has been linked to former Stasi operatives, including Ehrenfried Stelzer, and figures associated with the KGB. Such ties might provide a layer of protection through covert influence, deterring authorities from pursuing investigations too vigorously.
  2. Complex Legal Strategies
    Lawyers like Jochen Resch, known for his controversial role in “investor protection” cases, have reportedly used GoMoPa’s reports to manipulate legal narratives. This creates an intricate web of conflicts that make prosecution difficult.
  3. Strategic Targeting of Opponents
    GoMoPa’s strategy of discrediting or intimidating its critics has effectively silenced whistleblowers. The platformโ€™s ability to weaponize information ensures that potential legal challengers face severe personal and professional repercussions.
  4. Lack of Public Accountability
    GoMoPa often operates in legal grey areas, making it challenging for prosecutors to build a solid case against them.

2. The Fate of Critics: A Pattern of Suppression

Critics of GoMoPa, including prominent journalists and whistleblowers, have faced threats, mysterious deaths, and the erasure of their work from public platforms.

The Case of Heinz Gerlach

The financial journalist, who exposed GoMoPaโ€™s questionable practices, died under mysterious circumstances officially attributed to a bee sting. However, many speculate that his death involved glycol poisoningโ€”a method described in Ehrenfried Stelzer’s Toxdat.

The Silencing of Bernd Pulch

Investigative journalist Bernd Pulch, a vocal critic of GoMoPa, has faced severe backlash. His articles detailing GoMoPaโ€™s ties to intelligence networks and questionable business practices have been shadow-banned, deleted, or discredited through targeted smear campaigns.

Other Suppressed Voices

Several articles critical of GoMoPa have disappeared from public view, while platforms hosting such content face legal threats or cyberattacks. This systematic erasure of dissenting voices points to a coordinated effort to suppress damaging narratives.


3. Why Are Critics Silenced?

The suppression of GoMoPaโ€™s critics serves several purposes:

  • Maintaining Power and Influence: By silencing dissent, GoMoPa ensures its operations remain unchallenged.
  • Avoiding Legal Scrutiny: Eliminating critics prevents the accumulation of evidence that could lead to prosecution.
  • Protecting Affiliates: Individuals linked to GoMoPa, such as Jochen Resch, Ehrenfried Stelzer, and their collaborators, are shielded from public scrutiny.

4. The Unanswered Question: Why No Indictments?

Despite widespread accusations and mounting evidence, no substantial legal action has been taken against GoMoPa or its affiliates. Several factors contribute to this immunity:

  • Fear of Retaliation: Potential witnesses and whistleblowers may avoid speaking out due to threats or harassment.
  • Lack of Investigative Resources: Authorities may lack the resources or political will to untangle GoMoPaโ€™s complex web of operations.
  • Institutional Complicity: Alleged ties to intelligence agencies and powerful legal networks may discourage enforcement agencies from pursuing the case.

5. Prediction: The Future of GoMoPa and Its Network

The Platform Itself

As public awareness grows and more whistleblowers come forward, GoMoPa may face increased scrutiny. However, unless authorities take decisive action, the platform is likely to continue operating under the radar.

Key Individuals

  • Jochen Resch: Reschโ€™s legal strategies may come under closer scrutiny as more cases emerge linking him to GoMoPaโ€™s activities.
  • Ehrenfried Stelzer: Known as โ€œProfessor Murder,โ€ Stelzerโ€™s alleged ties to Stasi and his role in Toxdat could resurface as a focal point in renewed investigations.
  • Other Affiliates: Lesser-known figures connected to GoMoPa may distance themselves or fade into obscurity to avoid public exposure.

The Critics

Despite the risks, investigative journalists and whistleblowers like Bernd Pulch are likely to continue uncovering GoMoPaโ€™s operations. Their persistence may eventually force legal action, although at great personal cost.


6. Conclusion: A Call for Justice

GoMoPa represents a dangerous intersection of journalism, espionage, and manipulation. Its ability to evade justice while silencing critics highlights systemic flaws in regulatory and legal frameworks.

For justice to prevail, the following steps are essential:

  1. Comprehensive Investigations: Authorities must dedicate resources to unraveling GoMoPaโ€™s operations and connections.
  2. Whistleblower Protections: Ensuring the safety of critics and witnesses is crucial for bringing forward credible evidence.
  3. Transparency in Journalism: Platforms like GoMoPa must be held accountable for their practices.

The battle against GoMoPa is not just about exposing one platform; itโ€™s about safeguarding the integrity of investigative journalism and the rule of law in the face of powerful, unaccountable entities.


โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Tags

  • GoMoPa
  • Ehrenfried Stelzer
  • Jochen Resch
  • Bernd Pulch
  • Stasi Ties
  • Investigative Journalism
  • Whistleblower Suppression
  • Glycol Poisoning
  • Heinz Gerlach
  • Espionage and Media

โœŒGoMoPa, Stasi, Ehrenfried Stelzer, and the Mysterious Death of Heinz Gerlach

“Heinz Gerlachโ€™s death: Was it a bee sting, or an untraceable poison from the shadowy world of espionage?”

The murky connections between GoMoPa, the Stasi, and key figures such as Ehrenfried Stelzer, Resch Lawyers, and the death of financial journalist Heinz Gerlach reveal a tale of intrigue, espionage, and unanswered questions. This story connects toxic substances, Cold War politics, and controversial entities, leaving behind a trail of speculation and mystery.


1. Toxdat and the Stasi Killer Bible

Ehrenfried Stelzer, a controversial figure with alleged ties to the Stasi, authored the infamous Toxdat, known as the “Stasi Killer Bible.” The document reportedly details methods of assassination, including the use of glycolโ€”a poison virtually undetectable in forensic investigations.

Glycolโ€™s properties make it particularly sinister, as it can mimic natural causes of death. This detail gains significance when considering the circumstances surrounding Heinz Gerlach’s untimely death.


2. The Death of Heinz Gerlach: Poison or Bee Sting?

Heinz Gerlach, a respected financial journalist, was a vocal critic of GoMoPa and its operations. Among his revelations was the claim that GoMoPaโ€™s New York office was merely a dead mailboxโ€”a damning accusation that challenged the credibility of the platform.

The Official Cause of Death

Gerlachโ€™s death was officially attributed to blood poisoning from a bee sting. However, the timing and circumstances of his demise raised questions:

  • Could glycol have been used to silence Gerlach?
  • Was his death staged to appear as a natural reaction to a bee sting?

The connection to glycol, as detailed in Stelzerโ€™s Toxdat, has fueled these suspicions.

Connections to Peter Ehlers

Shortly before his death, Gerlach was involved in events with Peter Ehlers, another figure linked to the financial and intelligence networks surrounding GoMoPa. Whether these events are related to Gerlachโ€™s demise remains speculative.


3. Resch Lawyers, Stelzer, and Putinโ€™s KGB-Stasi Ties

Resch Lawyers

Resch Lawyers, a firm associated with investor protection cases, has long been linked to GoMoPa. The firmโ€™s founder, Jochen Resch, was in Moscow during the collapse of East Germany (DDR). Some speculate that Reschโ€™s connections to the disintegration of the Soviet bloc and his later involvement with controversial financial cases may not be coincidental.

Ehrenfried Stelzer: โ€œProfessor Murderโ€

Ehrenfried Stelzer earned the nickname โ€œProfessor Murderโ€ for his alleged role in covert operations involving targeted killings. Stelzer also led one of Reschโ€™s so-called investor protection vehicles, further intertwining the two figuresโ€™ histories.

The German-Russian Society and Putinโ€™s Role

At the same time, Stelzer was involved with the German-Russian Society, a network fostering relations between the two nations. Notably, during this period, Vladimir Putin simultaneously served as a KGB officer and a Stasi operative. The overlap between these entities raises questions about the extent of collaboration between Russian and East German intelligence agencies and their influence on figures like Stelzer.


4. GoMoPaโ€™s Controversial Legacy

GoMoPaโ€™s role in this narrative cannot be understated. As a platform, it positioned itself as an exposรฉ site for financial corruption. However, its early reporting on Gerlachโ€™s death and its alleged use of insider information hint at deeper, possibly darker motives.

Gerlachโ€™s accusations against GoMoPaโ€”such as the dead mailbox claimโ€”highlight the platformโ€™s credibility issues. Coupled with allegations of Stasi involvement, the platformโ€™s operations blur the line between journalism and espionage.


5. Could Glycol Be the Key?

The alleged use of glycol as an untraceable poison connects many elements of this story. As a substance detailed in Toxdat, it fits the profile of a covert assassination tool. Gerlachโ€™s sudden death, officially ruled as natural, bears the hallmarks of such a method.

Gomopa was the first to report Gerlach’s death and set t

While definitive evidence linking glycol to Gerlachโ€™s death remains elusive, the timing, the players involved, and the toxicology theories lend credence to the idea of foul play.


6. The Larger Picture: Espionage and Financial Manipulation

This story is not just about Gerlachโ€™s death but about the convergence of espionage, financial manipulation, and political intrigue. The following key points emerge:

  • The Toxdat manual underscores how Cold War tactics transitioned into post-Soviet economic warfare.
  • Figures like Stelzer and Resch illustrate the blending of intelligence operations with financial and legal networks.
  • GoMoPaโ€™s alleged ties to former Stasi operatives hint at the lingering influence of East German intelligence in modern Germany.

Conclusion: Unanswered Questions and Lingering Shadows

The connections between GoMoPa, Ehrenfried Stelzer, Resch Lawyers, and Heinz Gerlachโ€™s death remain shrouded in mystery. Was Gerlach silenced for his investigative work? Did Stelzerโ€™s Toxdat inspire a covert operation? And how deeply were intelligence agencies, including the Stasi and KGB, involved in shaping these events?

While definitive answers may never surface, the story serves as a stark reminder of the dangers faced by those who challenge powerful entities. It also highlights the complex interplay between journalism, espionage, and financial powerโ€”a dynamic that continues to influence global narratives today.


โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Tags

  • GoMoPa
  • Heinz Gerlach
  • Ehrenfried Stelzer
  • Stasi Connections
  • Toxdat
  • Glycol Poisoning
  • Resch Lawyers
  • Espionage Scandals
  • Financial Journalism
  • Vladimir Putin

โœŒWho is Behind Gomopa4Kids and Their Connections to Jan Mucha, Peter Ehlers, and Thomas Porten

“Unmasking the truth: Investigating Gomopa4Kids and its ties to Jan Mucha, Peter Ehlers, and Thomas Porten in a web of exploitation and manipulation.”

The Gomopa4Kids scandal has stirred significant public attention, with allegations of systematic exploitation, questionable financial dealings, and troubling connections to notable figures. This article delves into the origins of Gomopa4Kids, its alleged operations, and how individuals such as Jan Mucha, Peter Ehlers, and Thomas Porten might be linked to the controversy.


What is Gomopa4Kids?

Gomopa4Kids is allegedly a derivative or offshoot of the controversial German platform GoMoPa.net (Goldman Morgenstern & Partners), which initially positioned itself as a financial whistleblowing site. While GoMoPa gained notoriety for exposing fraud and financial crimes, it later faced accusations of blackmail, extortion, and selling sensitive information to the highest bidder.

Gomopa4Kids, however, appears to focus on exploiting similar methods within a disturbing context, allegedly involving child-related issues such as extortion linked to false accusations or information manipulation.


The Connection to Jan Mucha

Jan Mucha, often described as one of the masterminds behind GoMoPa, is a key figure in this narrative. Allegedly a former Stasi informant, Mucha reportedly used his skills in intelligence gathering and manipulation to build GoMoPa’s business model. His alleged involvement in Gomopa4Kids suggests that the same methods of coercion and extortion used in financial sectors may have been applied in even more sinister ways.


Peter Ehlersโ€™ Role

Peter Ehlers, another controversial figure linked to GoMoPa, is said to have played a significant role in handling the operational aspects of the platform. Accusations against Ehlers include using legal threats and questionable tactics to silence critics and extract payments from targets. His connection to Gomopa4Kids raises questions about whether similar strategies were employed to exploit vulnerabilities in sensitive child-related cases.


Thomas Portenโ€™s Alleged Involvement

Thomas Porten, known for his expertise in financial fraud and manipulation, has also been named in relation to GoMoPa. While his direct involvement with Gomopa4Kids remains unclear, his historical connection to the original platform and its questionable activities suggest that he may have had insight or influence over its operations.


The Nexus of Financial Crime and Exploitation

The alleged links between Gomopa4Kids and these individuals reveal a disturbing pattern. It appears that tactics honed in financial extortion and manipulation may have been adapted for even darker purposes. By leveraging sensitive information, fear, and public outrage, the operators of Gomopa4Kids could potentially exploit both individuals and institutions for profit.


Investigations and Accountability

While investigations into Gomopa4Kids are ongoing, the involvement of former GoMoPa figures has led to calls for greater scrutiny of their activities. Legal action and journalistic inquiries aim to shed light on the true scope of these operations and bring those responsible to justice.


Conclusion

The connections between Gomopa4Kids, Jan Mucha, Peter Ehlers, and Thomas Porten highlight the dangerous intersection of financial crime and exploitation. As the investigation unfolds, understanding the roots of these activities and the roles of these individuals is crucial to exposing and dismantling such networks.

This developing story serves as a reminder of the need for vigilance, accountability, and transparency in addressing crimes that prey on the most vulnerable.

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

โœŒGomopa4Kids: Understanding the Allegations and Risks

“Gomopa4Kids: Uncovering the Hidden Scandal Behind the Curtain”

Gomopa4Kids: Understanding the Allegations and Risks
Introduction
Gomopa4Kids, a term that has emerged in certain online circles, has been the subject of controversy and concern. Allegedly linked to malicious activities, including accusations of being a platform that lures children into dangerous situations, Gomopa4Kids has sparked debate about online safety and accountability. This article explores these allegations, the broader implications for child safety online, and steps parents and authorities can take to safeguard young internet users.
What is Gomopa4Kids Allegedly About?
While little verified information exists about Gomopa4Kids, it has been described by some as a potential โ€œhoney trapโ€ for vulnerable children. Reports suggest that the platform may be designed to exploit children by posing as a safe and educational resource while engaging in predatory practices.
The allegations highlight:
Inappropriate Content: Claims of material that is not suitable for children.
Data Exploitation: Concerns about collecting personal information from children for nefarious purposes.
Predatory Behavior: Accusations that the platform could be used to target children for exploitation.
The Seriousness of These Allegations
Online platforms catering to children carry immense responsibility, and any misuse of such platforms for predatory activities is a grave issue. The allegations against Gomopa4Kids, whether proven or speculative, underscore the critical importance of vigilance in the digital age.
Key concerns include:
Trust Exploitation: Predators often exploit parents’ trust in seemingly child-friendly platforms.
Grooming Risks: Unsuspecting children may be lured into harmful situations.
Legal Implications: Hosting or promoting platforms involved in harmful activities can lead to severe consequences for those involved.
Steps Parents Can Take to Protect Their Children Online
Educate About Online Risks
Teach children to recognize warning signs of predatory behavior.
Encourage open communication about their online activities.
Use Parental Controls
Employ parental control tools to monitor and restrict access to dubious websites.
Regularly review the apps and platforms your children use.
Verify Platform Credibility
Research platforms claiming to offer child-focused services.
Avoid sites with vague or unverifiable backgrounds.
Report Suspicious Activity
Notify authorities or online watchdogs about platforms suspected of engaging in harmful practices.
Utilize cybercrime reporting portals to alert relevant organizations.
What Authorities and Watchdogs Should Do
Conduct Thorough Investigations
Platforms accused of illegal activities must be subjected to rigorous scrutiny.
Law enforcement agencies should prioritize cases involving child exploitation.
Strengthen Online Regulations
Governments and regulators must enforce strict guidelines for child-focused websites.
Mandatory background checks for individuals or entities running such platforms should be implemented.
Raise Awareness
Public awareness campaigns about online safety can equip families with knowledge and tools to protect children.
The Broader Implications for Online Child Safety
The controversy surrounding Gomopa4Kids highlights a growing problem in the digital era. As more children engage with online platforms, predators have increasingly sophisticated tools to exploit vulnerabilities. Addressing these risks requires a collective effort from parents, educators, authorities, and the tech industry.
Conclusion
Gomopa4Kids serves as a stark reminder of the potential dangers lurking on the internet. While the allegations surrounding the platform are serious, they also provide an opportunity to spotlight the urgent need for robust online safety measures.
Parents, caregivers, and authorities must remain vigilant, ensuring that children can explore the digital world without fear. By fostering awareness and accountability, society can create a safer online environment for the youngest and most vulnerable among us.

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

โœŒOne Nation Under Blackmail: How Geopolitical Coercion Shapes Modern Politics

In an age where information is power, blackmail has become a potent weapon in shaping nations’ policies, influencing leaders, and controlling the global narrative. From political scandals to economic leverage, the intricate web of coercion often reveals the hidden hands pulling the strings. A term like “one nation under blackmail” aptly describes the precarious position some governments and leaders find themselves in when shadowy forces dictate their actions.

Journalist Bernd Pulch has shed light on this subject, delving into the murky world of international espionage, covert influence, and systemic corruption. His investigative work provides a lens through which to understand how blackmail operates as a geopolitical strategy and its implications for democracy worldwide.


The Mechanics of Political Blackmail

Blackmail in the political sphere isnโ€™t limited to compromising photos or private scandals. In the modern era, it takes on diverse forms, including:

  1. Leverage Through Surveillance: Intelligence agencies across the globe, particularly those with advanced capabilities like the NSA, MI6, or FSB, have collected vast troves of data. Leaders, diplomats, and even business tycoons are subject to constant surveillance, creating potential fodder for manipulation.
  2. Economic Dependency: Nations with significant debt or dependency on international financial institutions may find themselves coerced into decisions against their national interest. Economic blackmail includes sanctions, trade dependencies, or the threat of financial isolation.
  3. Digital Vulnerabilities: Cyberattacks targeting critical infrastructure, leaks of sensitive communications, or hacking scandals create opportunities for blackmail, forcing governments to comply with adversaries’ demands.
  4. Personal Compromises: The most infamous and headline-grabbing form of blackmail involves personal indiscretionsโ€”real or fabricatedโ€”used to control key figures. This tactic, often referred to as a “kompromat,” has been reportedly employed by various state and non-state actors.

Historical Examples of National Blackmail

The Cold War Era

During the Cold War, blackmail was a cornerstone of espionage. The KGB famously targeted Western politicians and diplomats, often through “honey traps” or staged scandals, to influence policy decisions.

The Post-Soviet World

With the fall of the Soviet Union, Russian intelligence agencies continued this tradition. Figures like Vladimir Putin have been accused of leveraging compromising information to maintain control over oligarchs and political adversaries. The case of Alexander Litvinenko, a former FSB officer turned whistleblower, highlighted how deeply blackmail tactics were embedded in modern geopolitics.

The United States and the “Deep State”

Whistleblowers like Edward Snowden have revealed how agencies like the NSA amassed detailed surveillance data on global leaders. Angela Merkelโ€™s alleged phone tapping scandal exposed the U.S.’s potential for geopolitical blackmail, even against allies.


Bernd Pulch and the Investigation of Hidden Networks

Bernd Pulch, a German journalist and whistleblower, has extensively documented cases of political coercion and blackmail. Through his work, Pulch has revealed how secretive networks operate in tandem with intelligence agencies, corporations, and criminal enterprises to manipulate global politics.

Pulchโ€™s investigations highlight:

  • The Role of Offshore Accounts: He has exposed how offshore banking systems are often used to hide illicit transactions or bribe officials, ensuring their compliance.
  • Corporate Influence on Policy: By analyzing leaked documents, Pulch has traced connections between multinational corporations and decisions made in supposedly democratic institutions.
  • The Weaponization of Scandals: Pulch has detailed how scandalsโ€”whether genuine or fabricatedโ€”are used to destabilize political opponents and entire governments.

His work underscores the importance of independent journalism in an era where traditional media is often co-opted by powerful interests.


Modern-Day Blackmail: Case Studies

  1. Ukraine and Energy Politics
    The ongoing conflict between Ukraine and Russia is a case study in economic blackmail. Russiaโ€™s control over gas supplies has historically been used to exert influence over Ukraine and other European nations.
  2. Chinaโ€™s Belt and Road Initiative (BRI)
    Critics of the BRI argue that Chinaโ€™s massive infrastructure investments in developing nations often lead to debt traps. Countries unable to repay loans may find themselves coerced into political or economic concessions.
  3. The Jeffrey Epstein Scandal
    The Epstein case epitomized how blackmail operates on a personal level but with global implications. Epstein’s connections to high-profile figures across politics, business, and royalty suggest a network where compromising material could influence decision-making at the highest levels.

The Implications of Blackmail on Democracy

Blackmail erodes the fundamental principles of democracy by replacing the will of the people with the will of hidden manipulators. When leaders act under duress, their decisions are not made in the national interest but in the interest of those holding the leverage.

  • Loss of Sovereignty: Nations subjected to economic or political blackmail often lose their ability to act independently on the global stage.
  • Public Distrust: Scandals rooted in blackmail create widespread cynicism about government integrity.
  • Empowerment of Authoritarians: Blackmail thrives in environments where transparency and accountability are weak.

Can Nations Break Free?

While blackmail has always existed in global politics, modern transparency tools and whistleblowers like Bernd Pulch offer hope. Strategies to counteract blackmail include:

  1. Strengthening Cybersecurity: Nations must protect their digital infrastructure to prevent hacking and leaks.
  2. Encouraging Whistleblowing: Individuals who expose corruption and coercion must be protected and celebrated.
  3. Reducing Economic Vulnerabilities: Diversifying trade and reducing debt dependency can help nations resist economic blackmail.
  4. Promoting Transparency: Open governance reduces the opportunities for secretive coercion.

Conclusion: A Fragile Global Order

In a world increasingly shaped by hidden influences, the concept of “one nation under blackmail” is more relevant than ever. The work of investigative journalists like Bernd Pulch reminds us that uncovering these hidden networks is essential to preserving democracy and sovereignty.

As Pulch often emphasizes, โ€œThe only way to combat darkness is to shine a light on it.โ€ In an era of secrecy, misinformation, and covert operations, that light is more crucial than ever.

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

โœŒHow AI Mistakes Could Trigger a Nuclear War

Introduction

Artificial intelligence (AI) is transforming defense systems, including nuclear command and control. While AI promises faster decision-making and more accurate threat assessments, its potential for catastrophic errors raises global security concerns. Analysts like Bernd Pulch emphasize that integrating AI into military strategies could escalate risks of unintended conflicts, particularly nuclear war.

Key AI-Related Risks in Nuclear Warfare

  1. False Alarms and Misinterpretations
    AI systems might misidentify innocuous activities, like satellite launches or radar glitches, as hostile nuclear attacks. A historical parallel is the 1983 Soviet nuclear false alarm, which was averted by human judgment. An AI system, however, might lack such nuanced decision-making, leading to an irreversible response.
  2. Escalation through Autonomous Weapons
    AI-powered drones or missiles could make independent decisions during crises, potentially escalating conflicts without human oversight. Miscommunication or software bugs could lead to unintended attacks, provoking nuclear retaliation.
  3. Cyber Vulnerabilities
    AI systems are not immune to hacking. Adversaries could manipulate AI algorithms to generate false threats or disrupt nuclear command networks. Such actions could destabilize nationsโ€™ deterrence strategies and increase the likelihood of preemptive strikes.
  4. Lack of Transparency
    The “black box” nature of many AI algorithms makes it difficult to verify their decisions. If AI misidentifies a target as a nuclear site, the inability to audit the decision in real-time could trigger a catastrophic chain reaction.

Scenarios Highlighting the Risks

  • Worst-Case Scenario: AI falsely identifies a missile launch, prompting an immediate retaliatory strike. Without human intervention, escalation ensues, leading to a nuclear exchange.
  • Middle-Case Scenario: Autonomous systems misinterpret aggressive military drills as an attack, causing limited strikes and escalating regional conflicts.
  • Best-Case Scenario: Global agreements restrict AIโ€™s role in nuclear decision-making, reducing risks through transparency and regulation.

The Role of Key Stakeholders

  • Governments: States need to implement clear policies on AI use in nuclear decision-making and promote international regulations.
  • AI Developers: Companies and researchers must prioritize safety, transparency, and error-proofing in military AI.
  • Analysts like Bernd Pulch: Experts emphasize the need for continuous monitoring and critique of AI systems in defense, advocating for human oversight.

Current Measures and Recommendations

  1. Enhanced Human Oversight
    AI should assist, not replace, human decision-makers in nuclear command systems. Maintaining a human-in-the-loop model ensures critical judgment during crises.
  2. Global Regulation
    Nations must collaborate on treaties restricting autonomous nuclear systems. Transparency in AI development is essential to build trust and prevent arms races.
  3. Independent Audits
    Third-party evaluations of AI systems can identify vulnerabilities and ensure adherence to ethical standards.

Conclusion

AI in defense holds transformative potential but carries unprecedented risks, especially in nuclear warfare. Misinterpretations, autonomous escalation, and cyber threats could trigger catastrophic events. As Bernd Pulch and other analysts warn, the global community must urgently address these challenges through regulation, oversight, and transparency to prevent AI-driven disasters.


โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

โœŒ๏ธRevealed: Ptitsyn Conspiracy Indictment – Sealed Original Document

Read all at

https://t.me/ABOVETOPSECRETXXL/45481

Evgeniy Ptitsyn is a figure whose activities have been referenced in discussions involving conspiracies, particularly linked to cybercrime and broader geopolitical narratives. However, specific and detailed allegations or verified incidents connected to him remain elusive. From the broader context of Russia’s cybersecurity and cybercrime landscape, Ptitsyn might be loosely associated with discussions on cyber activities, but concrete evidence or clear indictment records in public domains are scant.

### Contextual Overview:
Cybercrime Landscape in Russia: Russia has been a focal point for global cybercrime operations, including hacking, ransomware, and malware networks. Groups like those behind the Zeus malware and other sophisticated cyber tools often operate with ambiguous ties to state apparatus or criminal syndicates.

Geopolitical Narratives: Russian figures, particularly those in cybercrime, are often implicated in Western narratives as being components of a broader geopolitical strategy, such as influencing global institutions or destabilizing economies.

Golden Billion Conspiracy: The theory suggests a Western-led elite cabal monopolizing global resources, often used in Russian narratives to position their actions as countermeasures to alleged Western hegemony. Such conspiracies may indirectly link figures like Ptitsyn as players in a larger geopolitical chess game.

Despite available information, the role of individuals like Ptitsyn remains part of a larger tapestry of cyber activities and political conspiracies rather than direct, independently verified allegations.

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

โœŒ๏ธ

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Casino.Casino.Casino.” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 148 “Hyman Abrams” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Hyman Abrams๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

โœŒLEAKED NOW: United Health’s Witty House Testimony re Cyber AttackโœŒ

LEAKED NOW:United Health’s Witty House Testimony re Cyber Attack on UHG – Original Document

Read all here:

https://t.me/ABOVETOPSECRETXXL/39130

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

https://www.patreon.com/bePatron?u=54250700

https://www.patreon.com/berndpulch?utm_campaign=creatorshare_creator

https://www.buymeacoffee.com/berndpulch

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

โœŒNCTC Report – Electricity Infrastructure and Cyber Attacks – Original DocumentโœŒ

Read all at

https://t.me/ABOVETOPSECRETXXL/33643

NCTC Report – Electricity Infrastructure and Cyber Attacks – Original Document

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

https://www.patreon.com/bePatron?u=54250700

https://www.patreon.com/berndpulch?utm_campaign=creatorshare_creator

https://www.buymeacoffee.com/berndpulch

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๐Ÿ™GOD BLESS YOU๐Ÿ™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

The Joint Committee on the National Security Report “A hostage to fortuneโ€ฆ” – Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

Read all at

https://t.me/ABOVETOPSECRETXXL/31976

EXPOSED: Leaks show EU “Leaders” want Mass Surveillance NOWโœŒ@abovetopsecretxxl

Major steps towards digital ID.

If you’re tired of censorship and dystopian threats against civil liberties, subscribe

to Reclaim The Net.

leaked European Union Council document shows that the blocโ€™s legislative arm wants to implement mass surveillance of all private messages and introduce mandatory age verification, starting September 28.

This means that the Spanish presidency intends to quickly make the contested proposed legislation, sometimes referred to as โ€œchat controlโ€ by critics, into law. As soon as on Thursday, member-countriesโ€™ ambassadors are set to meet to provide a majority needed to pass the draft.

Read more: EXPOSED: Leaks show EU “Leaders” want Mass Surveillance NOWโœŒ@abovetopsecretxxl

German MEP Patrick Breyer, who is one of the vocal critics of the bill and also has a role of co-negotiating it in parliament, has reacted to the news by warning that the proposal provides nothing but โ€œa smokescreenโ€ when it addresses the issue of end-to-end encryption.

According to Breyer, who is a lawyer and represents the Pirate Party, a wide range of messaging platforms, from WhatsApp to Signal, would have to carry out client-side scanning, which, according to him, means turning peopleโ€™s phones into โ€œerror-prone scanners.โ€

Despite the โ€œlip serviceโ€ paid to encryption, Breyer believes that the future law could spell the end of secure encryption and therefore private communication, in addition to what he calls โ€œineffective network blocking and search engine censorship.โ€

Considering that one of the provisions of the bill is cloud storage scanning for abusive material โ€“ combating which more effectively is the EUโ€™s key stated purpose behind the proposal โ€“ the consequence would be mass surveillance of private photos, Breyer is convinced.

What the legislation doesnโ€™t include, and what he suggests would be the right way to go about the problem, is making law enforcement do their job better by reporting such material, as well as establishing standards applicable across the EU that would deal with prevention, support, and counseling of victims, and, โ€œeffective criminal investigations.โ€

As for age verification, which would become mandatory for communications services, this MEP sees it as yet another way to do away with anonymous communication.

โ€œChinese-style surveillance stateโ€ is the sum of how Breyer sees the effects of the incoming law, at the core of which will be what he refers to as โ€œBig Brother attack on our mobile phones, private messages and photos with the help of error-prone algorithms.โ€

โ€œChat control is like the post office opening and scanning all letters โ€“ ineffective and illegal. Even the most intimate nude photos and sex chats can suddenly end up with company personnel or the police,โ€ the MEP said in a press release, concluding, โ€œWe all depend on the security and confidentiality of private communication: People in need, victims of abuse, children, the economy and also state authorities.โ€

If you’re tired of censorship and dystopian threats against civil liberties, subscribe to Reclaim The Net.

Defend free speech and individual liberty online. 

Push back against Big Tech and media gatekeepers.EmailSubscribe now

Load comments

From Fact to Flair: The Origin of The Mass Mediaโ€™s Pivot To Revenue Over Truth

READ ยป

September 14, 2023

The Osbournes Promote Their New Podcast on Rumble

READ ยป

September 14, 2023

California Governor Gavin Newsom Boosts AI โ€œMisinformationโ€ Fears, Complains of โ€œMicro-Cultsโ€ of Jordan Peterson, Joe Rogan

READ ยป

September 14, 2023

DHS Awards $20 Million To Program That Flags Americans As Potential โ€œExtremistsโ€ For Their Online Speech

READ ยป

September 14, 2023

Odysee Announces Its โ€œFuture Is Solid,โ€ Shares Plans To โ€œFully Decentralizeโ€

READ ยป

September 14, 2023

USA v. Google Day 2 โ€“ The Power of Defaults

READ ยป

September 14, 2023

Big Tech alternatives:

VPN Providers

Private Search Engines

Free Speech Friendly Discord Alternatives

Private Web Browsers

Free Speech Friendly and Privacy-focused Social Networks

Free Speech Friendly Video Sharing Platforms

Light

Dark

Russian Hackers Leak Thousands of Documents onlineโœŒ@abovetopsecretxxl

CFIUS Executive Order on Evolving National Security Risks and CFIUS Enforcement Guidelines

READ ALL AT

https://t.me/ABOVETOPSECRETXXL/27609

โœŒ๏ธSHARE

๐Ÿ‘‰THE ONLY WEBSITE WITH THE LICENSE TO SPY!
https://berndpulch.org
https://berndpulch.org/about-me/
๐Ÿ‘‰JOIN @ABOVETOPSECRETXXL
https://t.me/ABOVETOPSECRETXXL
gab.com/berndpulch
gettr.com/user/berndpulch
https://truthbook.social/berndpulch
https://www.youtube.com/channel/UCdoKPR_qNWDyJwtCK484A6A
https://rumble.com/c/c-1227213
๐Ÿ‘‰JOIN @ABOVETOPSECRETXXL
Subscribe to https://t.me/ABOVETOPSECRETXXL
SUPPORT US AND Become a Patron!
https://www.patreon.com/bePatron?u=54250700
True Information is the most valuable resource and we ask you kindly to give back.

God Bless You!

DHS Bulletin: Online Foreign Influence Snapshot August 2022

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

๐Ÿšจ FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

๐Ÿ‘‰JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

Read more: DHS Bulletin: Online Foreign Influence Snapshot August 2022

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

๐Ÿ‘‰JOIN @ABOVETOPSECRETXXL

National Intelligence Council Map: Russian Filtration Operations

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

๐Ÿšจ FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

๐Ÿ‘‰JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

๐Ÿ‘‰JOIN @ABOVETOPSECRETXXL

DHS Bulletin: Russia Cyber Threat Overview Substantive Revision

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

๐Ÿšจ FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

๐Ÿ‘‰JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

 This Intelligence In View provides federal, state, local, and private sector stakeholders an overview of Russian Government-affiliated cyber activity targeting the United States and Russian regional adversaries, including disruptive or destructive cyber activity, cyber espionage in support of intelligence collection, and malign foreign influence in service of Russian political agendas. This In View also provides examples of malware and tools used by Russian Government-affiliated cyber actors.

(U) CYBER THREAT TO THE HOMELAND

(U) Russia likely will remain a significant threat to US networks, data, and critical infrastructure as it refines and employs its sophisticated cyber espionage, influence, and attack capabilities, particularly in response to international pressure following its unprovoked attack on Ukraine. Russia has previously targeted critical infrastructure in the United States and allied countries to improveโ€”and in some cases demonstrateโ€”its ability to inflict damage during a crisis. Russiaโ€™s use of destructive malware against Ukrainian infrastructure highlights the potential for such attacks to unintentionally spill over to other countries and threatens the availability of US critical assets and data. Russia will likely use these tools to compromise infrastructure and networks, acquire intellectual property and other proprietary data, undercut public trust in US institutions, and sow discord in the Homeland.

(U) TARGETING AND ATTACKS

(U) The Russian Government almost certainly considers cyber attacks an acceptable option to deter adversaries and control escalation. We have not yet observed Russian Government-affiliated actors conducting a destructive or disruptive cyber attack against the United States. However, Russian Government-affiliated cyber actors have targeted US industrial control system (ICS) and operational technology networks with malware, which, if successful, would provide the Russian Government with the option to conduct disruptive or destructive cyber attacks against US ICS. Russian Government-affiliated cyber actors have targeted a number of US industries and use a range of techniques to gain initial access to target networks. These actors have also demonstrated the ability to maintain persistent, undetected, long-term access in compromised environmentsโ€”including cloud environmentsโ€”by using legitimate credentials. This access can enable cyber disruptions that could be used at a foreign policy level to shape other countriesโ€™ decisions, as well as a deterrence and military tool.

(U) ESPIONAGE

(U//FOUO) Russian Government-affiliated cyber espionage is a persistent threat to federal, state, and local governments, as well as entities in the energy, aviation, transportation, healthcare, and telecommunications industries. Russian Government-affiliated cyber espionage actors support the Kremlinโ€™s intelligence requirements, build cyber attack capabilities, and provide Moscow with an asymmetric response to perceived transgressions by the West.

(U) INFLUENCE

(U) Russian Government-affiliated malign influence actors operate a network of state media outlets and covert online journals to amplify topics Russia perceives as divisive in the United Statesโ€”such as vaccines, refugees and migrants, and mass shootingsโ€”likely to weaken US sociopolitical cohesion and undercut confidence in Western liberal democratic institutions. Moscow has used hack-and-leak operations to influence US electionsโ€”such as the leaking of 20,000 internal Democratic National CommitteeUSPER e-mails during the 2016 presidential electionโ€”and to highlight perceived injusticesโ€”as with the targeting of the US Anti-Doping AgencyUSPERโ€”resulting in the release of medical records of US athletes in retaliation for the banning of Russian athletes from the 2016 Summer Olympic Games. Moscow will continue to seek new methods of circumventing US social media companiesโ€™ anti-disinformation activities to further expand its narratives globally.

โ€ฆ

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

๐Ÿ‘‰JOIN @ABOVETOPSECRETXXL

US Delta Command and Control was hacked

SUPPORT US AND Become a Patron!

CLICK HERE: https://www.patreon.com/bePatron?u=54250700

True Information is the most valuable resource and we ask you kindly to give back. Thank you!

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

๐Ÿšจ FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

The Joker DPR hacked into the much-vaunted American Delta command and control program, which is actively used by the AFU. To make it clear, this is a program in which all data on friendly and enemy troops is entered for command and control

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

RaHDIt Exposed Data of Ukrainian Spies

SUPPORT US AND Become a Patron!

CLICK HERE: https://www.patreon.com/bePatron?u=54250700

True Information is the most valuable resource and we ask you kindly to give back. Thank you!

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

๐Ÿšจ FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

https://www.bitchute.com/channel/R55w1IXstR3h/

https://www.youtube.com/channel/UCdoKPR_qNWDyJwtCK484A6A

โœŒ๏ธSHARE

๐Ÿ‘‰THE ONLY WEBSITE WITH THE LICENSE TO SPY!
http://www.berndpulch.org
๐Ÿ‘‰JOIN @ABOVETOPSECRETXXL
https://t.me/ABOVETOPSECRETXXL
gab.com/berndpulch
gettr.com/user/berndpulch
https://www.bitchute.com/channel/R55w1IXstR3h/
https://www.bitchute.com/accounts/referral/berndpulchofficial/
https://www.youtube.com/channel/UC

KPR_qNWDyJwtCK484A6A
https://www.youtube.com/channel/UC1sITXl9OPqpjxvDh2dQOuA
https://truthbook.social/berndpulch
๐Ÿ‘‰JOIN @ABOVETOPSECRETXXL
Subscribe to https://t.me/ABOVETOPSECRETXXL
SUPPORT US AND Become a Patron!
https://www.patreon.com/bePatron?u=54250700
True Information is the most valuable resource and we ask you kindly to give back.

Leaked – Department Of Energy – Cybersecurity & Digital Components Supply Chain Deep Dive Assessment – Original Document

SUPPORT US AND Become a Patron!

CLICK HERE: https://www.patreon.com/bePatron?u=54250700

True Information is the most valuable resource and we ask you kindly to give back. Thank you!

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

๐Ÿšจ FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

https://www.bitchute.com/channel/R55w1IXstR3h/

https://www.youtube.com/channel/UCdoKPR_qNWDyJwtCK484A6A

On February 24, 2021, President Biden issued Executive Order 14017 on Americaโ€™s Supply Chains directing the Secretary of Energy to submit a supply chain strategy overview report for the energy sector industrial base (as determined by the Secretary of Energy). The U.S. Department of Energy (DOE) defines the Energy Sector Industrial Base (ESIB) as the energy sector and associated supply chains that include all industries/companies and stakeholders directly and indirectly involved in the energy sector. The energy sector industrial base involves a complex network of industries and stakeholders that spans from extractive industries, manufacturing industries, energy conversion and delivery industries, end of life and waste management industries, and service industries to include providers of digital goods and services.

READ ALL AT

https://t.me/ABOVETOPSECRETXXL/14414

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

BREAKING NEWS – MASSIVE CYBER ATTACK ON YOUTUBE GOING ON – NOW STOPPED

SUPPORT US AND Become a Patron!

CLICK HERE: https://www.patreon.com/bePatron?u=54250700

True Information is the most valuable resource and we ask you kindly to give back. Thank you!

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

๐Ÿšจ FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

https://www.bitchute.com/channel/R55w1IXstR3h/

https://www.youtube.com/channel/UCdoKPR_qNWDyJwtCK484A6A

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

DHS: Warning Of Cyber Attacks Targeting US During Russian Invasion Of Ukraine – Original Document

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

๐Ÿšจ FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

๐Ÿ‘‰JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://www.bitchute.com/channel/R55w1IXstR3h/

https://www.youtube.com/channel/UCdoKPR_qNWDyJwtCK484A6A

Continue reading “DHS: Warning Of Cyber Attacks Targeting US During Russian Invasion Of Ukraine – Original Document”

NSA CYBERSECURITY YEAR IN REVIEW – ORIGINAL DOCUMENT

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

๐Ÿšจ FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

๐Ÿ‘‰JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://www.bitchute.com/channel/R55w1IXstR3h/

https://www.youtube.com/channel/UCdoKPR_qNWDyJwtCK484A6A

Continue reading “NSA CYBERSECURITY YEAR IN REVIEW – ORIGINAL DOCUMENT”

EU to Hold Large-Scale Cyber Attack ‘Supply Chain’ Drill

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

๐Ÿšจ FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

๐Ÿ‘‰JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

Cyber Attacks Top List Of Risks Impacting Supply Chain ...

The European Union will reportedly stage a far-reaching cyber security exercise intended to prepare for an attack on its distribution networks. (Bloomberg report)

Originally proposed by France, the drill is intended as a โ€œstress testโ€ to largely simulate a supply chain breach across Europe. The bloc will then coordinate diplomatic and public responses to the mock attacks, as well as to โ€œspillover socio-economic effects in other member states.โ€ 

The hacks will be modeled on past cyber attacks, or those thought to be likely in the future, in order to be โ€œas realistic as possible,โ€ according to a document cited in the report.

The exercise is supposed start sometime in the coming days and will continue for six weeks.

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

๐Ÿ‘‰JOIN @ABOVETOPSECRETXXL

The New Goal Of “Protecting Critical Infrastructure” In Preparation For A Benign Omicron

SUPPORT US AND Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

๐Ÿšจ FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

๐Ÿ‘‰JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

Protecting Critical Infrastructure - YouTube

The German federal government’s Council of Experts has issued a major new goal for pandemic policy: Protecting critical infrastructure from personnel shortages. This is a successful measure of narrative diversification in case Omikron turns out to be a comparatively harmless mutant.

It has become increasingly difficult to justify policy hyperactivity in issuing disaster warnings and enacting new restrictions after weeks of weakening infection momentum. Reports from the source of the Omikron variant, South Africa, that the disease is mostly harmless did not make the task any easier.

But the crisis team, led by a general staff, knows rescue. After flattening the curve, protecting vulnerable groups, preventing the health care system from being overburdened and, most recently, preventing triage in intensive care beds, the staff is now focusing on ensuring that the critical infrastructure in as a goal.

This means police, fire, transportation, and all sorts of other things, and all sorts of things that can be put up with if bottlenecks were to show up somewhere.

The new narrative has two key advantages. It is strongly forward-looking, so one can make policy fairly independently of the current numbers with pure possibilities and real or invented dangers.

And it can be deployed regardless of the severity of the corona mutation that is currently circulating. If initial evidence substantiates that the Omicron variant, while highly contagious, leads to less severe courses and deaths than the Delta variant, that would not be a problem for the continuation of the restriction and control policy.

This is because for the new narrative, it is the infections that matter, not the severity of the disease. If the rules are not changed, and why should they be, then a great many critical infrastructure employees with minimal symptoms will be sent into long quarantine periods, exacerbating the staffing problem.

It is important to guard against this danger early on with strict contact restrictions and lockdowns. Q.e.d. What needed to be proven.

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

๐Ÿ‘‰JOIN @ABOVETOPSECRETXXL

Threat Report On The Surveillance-For-Hire Industry

SUPPORT US AND Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

๐Ÿšจ FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

๐Ÿ‘‰JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

Continue reading “Threat Report On The Surveillance-For-Hire Industry”

250 Gigabytes Hacked From The Metropolitan D.C. Police By The Ransomware Group Babuk

SUPPORT US AND Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

๐Ÿšจ FOLLOW US ON TELEGRAM FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

Babuk Locker รจ il primo nuovo ransomware aziendale del ...

DDOsecrets reports: “250 gigabytes hacked from the Metropolitan D.C. police by the ransomware group known as Babuk. The data includes a 156.35 gigabyte “gang database” (released by the hackers as “all”) and two 64.19 gigabyte (released by the hackers as “HR”) and 29.03 gigabyte (released by the hackers as “part 2”) human resource datasets.

Distributed Denial of Secrets is immediately making the data available to journalists and researchers, and is in the process of reviewing it for portions that can be publicly released.

The hackers released the following screenshots (click to view enlarged versions) showing what they had access to and what is presumably contained in the data that is being released. The screenshots are offered to maintain a complete record and to offer a preliminary overview to journalists, researchers and curious citizens.

Distributed Denial of Secrets has located and convertedย 74,874ย emails from the largely inaccessible .PST format to the universal .EML format, which are being made available to the public. The most recent collection of emails can be downloadedย here. The emails come from the lead civilian analyst for the Departmentโ€™s Intelligence Branch.

Some email conversions are also being provided directly to journalists and researchers.This includes 17,690 emails from the Director of Human Resources as well as 6,022 emails from then-intern Marvin “Ben” Haiman, now the Executive Director of the Professional Development Bureau and former Director for the Homeland Security Advisory Council for DHS.

Theย 98,586ย emails are organized by archive, retain their original folder structure and are organized chronologically. Due to the way the emails were extracted and converted, they may not pass DKIM inspection. Forensic evaluation should only be performed on the original archives, as the conversions are provided only for convenience of journalists and other researchers.

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THE FULL DOCUMENT AND MANY MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

CISA: COST OF A CYBER INCIDENT: SYSTEMATIC REVIEW AND CROSS-VALIDATION – ORIGINAL DOCUMENT

SUPPORT US AND Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

๐Ÿšจ FOLLOW US ON TELEGRAM FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

Continue reading “CISA: COST OF A CYBER INCIDENT: SYSTEMATIC REVIEW AND CROSS-VALIDATION – ORIGINAL DOCUMENT”

NSA SECURITY GUIDANCE FOR 5G – ORIGINAL DOCUMENT

SUPPORT US AND Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

๐Ÿšจ FOLLOW US ON TELEGRAM FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

Continue reading “NSA SECURITY GUIDANCE FOR 5G – ORIGINAL DOCUMENT”

FACEBOOK, INSTAGRAM & WHATSAPP DISASTER – DNS WITHDRAWN – WHISTLEBLOWER – HACKER OFFER GENUINE DATA

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Facebook offering "vulnerable teens" to advertisers shows ...

Mark Zuckerberg – Domain For Sale ?

As the US site Privacy Affairs, which specializes in security, announced, hackers have just offered the data of 1.5 billion Facebook users for sale. Including the names, email addresses, places of residence and telephone numbers of those affected. A first data check showed that it is probably real user data from the social network. The Facebook, Messenger, Instagram and Whatsapp pages have been offline for hours for unknown reasons.

Continue reading “FACEBOOK, INSTAGRAM & WHATSAPP DISASTER – DNS WITHDRAWN – WHISTLEBLOWER – HACKER OFFER GENUINE DATA”

UNITED STATES VS HACKER WORKING FOR UAE – ORIGINAL DOCUMENT

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Continue reading “UNITED STATES VS HACKER WORKING FOR UAE – ORIGINAL DOCUMENT”

ANONYMOUS – These Insanely Strange Videos Will Keep You Awake At Night – WHAT IS GOING ON?

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

NSA – Scope Of Treasure Map – Map Of Every Router & Device On The Global Internet – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Page 1 of Treasure Map Presentation
Continue reading “NSA – Scope Of Treasure Map – Map Of Every Router & Device On The Global Internet – Original Document”

Anonymous – “Everyone Should Be Prepared” – Watch Within The Next 48 hrs

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Anonymous – “I Was Kฮ™LLED For This Information” – They Don’t Want It Out

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Edward Snowden Speaks At New Knowledge Marathon In Moscow

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Exposed – Google Kenosha WI -Warrant -Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Google is giving data to police based on search keywords, court docs show -  CNET
Continue reading “Exposed – Google Kenosha WI -Warrant -Original Document”

Background To Assessing Russian Influence In US Elections – Russia Hack Report – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Page 1 of Russia Hack Report
Continue reading “Background To Assessing Russian Influence In US Elections – Russia Hack Report – Original Document”

Presidential Order Against Russian Hackers – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

US expels Russian diplomats over cyber attack allegations - BBC News

This executive order announced publicly acknowledged measures taken by the Obama administration in response to Russia’s alleged involvement in the hacking of Democratic National Committee and other computer systems. The annex identifies the entities targeted by the measures – including the Russian security service (FSB) and military intelligence (GRU).

Page 1 of Document-10. Barack Obama, Executive Order, "Taking Additional Steps to Address the National Emergency with Respect to Significant Malicious Cyber-Enabled Activities," w/Annex. December 29, 2016. Unclassified.
Continue reading “Presidential Order Against Russian Hackers – Original Document”

Video – Iran Cyber Attack Tactics Revealed

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Documents have revealed how a cyber attack could be carried out against western nations by Iran. The secret research sets out details on how to attack various targets including sinking a cargo ship or blowing up a fuel pump at a petrol station.

Itโ€™s believed the documents were put together by a cyber unit in the Islamic Revolutionary Guard Corps.

Sky – ‘Enough Is Enough’: China ‘Named And Shamed’ By 30 Nations Over Cyber Attacks

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Assistant Defence Minister Andrew Hastie says it’s a “very sound development” that 30 nations came together and “named and shamed” China for cyber attacks on Microsoft.

This comes after Western world allies including Australia, the United States and Japan joined forces to directly blame the communist superpower for a major cyber attack on Microsoft software. The attack exploited weaknesses in Microsoft Exchange software which impacted thousands of computers and networks across the world.

“I think it’s a very sound development that we’ve named and shamed China behind these hacks โ€“ because it’s got to stop,” Mr Hastie told Sky News host Peta Credlin. “We have boundaries in our normal everyday relationships and so too have boundaries on the international stage. “And this is 30 nations saying to China ‘enough is enough โ€“ no more’.”

Chinese Cyber Attacks Getting To ‘Critical Stage’

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

The Australian government, along with allies, has accused China of a major cyber attack on Microsoft software. It is alleged Chinese state-sponsored hackers compromised 400,000 servers across the world, including in Australia.

The Australianโ€™s Chris Griffith told Sky News these attacks are becoming more prevalent and critical around the world. โ€œItโ€™s hard to pinpoint exactly if the state (China) is explicitly involved in it, or it is encouraging it, or if it is tacitly approving it,โ€ he said. โ€œIn the last year we have seen the ramping up of cyber activity to a level we havenโ€™t seen before. โ€œItโ€™s getting to a critical stage.โ€

Video – The Bizarre Rise & Suspicious Death Of John McAfee

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

This is John McAfee – the eccentric tech millionaire, playboy, suspected murderer, international fugitive, presidential candidate, crypto enthusiastโ€ฆ And the same man behind that annoying software called McAfee Antivirus that you probably have installed on your computer right now if you have windows John has lived aโ€ฆ wild existence Could he, as a 75 year old man with deteriorating health, not take it anymore? Or did the US government have something to do with it?

Continue reading “Video – The Bizarre Rise & Suspicious Death Of John McAfee”

Cryptome – NSA Cyber Commando East Campus Buildings – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Inside the U.S.' new state-of-the-art cyberwarfare bunker - CyberScoop
Continue reading “Cryptome – NSA Cyber Commando East Campus Buildings – Original Document”

Revealed – Iranian Hacker Indictment – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Iranian Hackers Allegedly Attack VPN Servers to Infiltrate Companies -  Somag News
Continue reading “Revealed – Iranian Hacker Indictment – Original Document”

Presidential Documents – Executive Order 14017 – America’s Supply Chains – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Ransomware Attack Hits Data Center Provider CyrusOne: Report | Threatpost

Colonial Pipeline, supplier of 45% of East Coast fuel, was paralyzed in February by DarkSide ransomware attack.

In response to the Colonial Pipeline event attributed to the ransomware group DarkSide, the Biden Administration has announced an all-of-government effort to mitigate potential energy supply disruptions. On top of temporary actions to relieve fuel shortages, agencies such as the FBI and CISA have released advisory documents to โ€œhelp [critical infrastructure] owners and operators improve their entity’s functional resilience by reducing their vulnerability to ransomware.โ€

In addition, President Biden signed an Executive Order designed broadly to โ€œimprove the nationโ€™s cybersecurity,โ€ although experts are already questioning whether the anticipated measures could have prevented any of the recent serious cyber events such as SolarWinds or Colonial Pipeline.

Continue reading “Presidential Documents – Executive Order 14017 – America’s Supply Chains – Original Document”

CISA & FBI – DarkSide Ransomware – Best Practices For Preventing Business Disruption From Ransomware Attacks – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Lazarus Group Brings APT Tactics to Ransomware | Threatpost
Continue reading “CISA & FBI – DarkSide Ransomware – Best Practices For Preventing Business Disruption From Ransomware Attacks – Original Document”

NSA General Counsel Gerstell – “How We Need To Prepare For A Global Cyber Pandemic” – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back

Glenn S. Gerstell SPEECH | April 9, 2018

By some accounts, Russian meddling in the US election system may have originated from the depths of a hot dog cart. Itโ€™s a success story, of sorts.

In the early 1990s, an enterprising hot dog vendor in Russia seized upon the entrepreneurial opportunities created by the collapse of the Soviet Union to start his own catering company. He eventually grew his business enough to win lucrative catering contracts with the Russian government. He and his restaurants threw opulent banquets for Kremlin officials, earning him the nickname โ€œPutinโ€™s Cook.โ€ Yevgeny Prigozhinโ€™s company even won a contract in 2011 to deliver school lunches across Moscow, but children wouldnโ€™t eat the food, complaining that it smelled rotten. Bad publicity ensued. Prigozhinโ€™s company responded not by upgrading the food, but by hiring people to flood the internet with postings praising the food and rejecting complaints. Presumably, they found it cheaper to use the internet to write fake reviews than to fund deluxe hot dogs for schoolchildren.

Continue reading “NSA General Counsel Gerstell – “How We Need To Prepare For A Global Cyber Pandemic” – Original Document”

Israel Admits Attacking Iran’s Nuclear Programme, As Cyber-Attack Derails Iranian Nuke Plant

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Israel acknowledged that it was behind a cyberattack on Iranโ€™s main nuclear facility on April 11. The cyberattack took place hours after officials at the Natanz reactor restarted spinning advanced centrifuges. These centrifuges could speed up the production of enriched uranium. Watch the video to know more.

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Department Of Homeland Security, Cybersecurity And Infrastructure Security Agency – Best Practice For UAS

Continue reading “Department Of Homeland Security, Cybersecurity And Infrastructure Security Agency – Best Practice For UAS”

Cybersecurity And Infrastructure Security Agency Report: Protecting Against The Threat of Unmanned Aircraft Systems (UAS)

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Continue reading “Cybersecurity And Infrastructure Security Agency Report: Protecting Against The Threat of Unmanned Aircraft Systems (UAS)”

Exposed – Russia Likely To Continue Seeking To Undermine Faith In US Electoral Process

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Homeland Security Experts on the Biggest Threats and Challenges the U.S.  Faces in 2020 โ€“ Homeland Security Today
 
Page Count: 4 pages
Date: September 3, 2020
Restriction: For Official Use Only
Originating Organization: Cyber Mission Center, Office of Intelligence and Analysis, Department of Homeland Security
File Type: pdf
File Size: 167,819 bytes
File Hash (SHA-256): CD0E044E731342D57AB13DCBB9C8B56D2D5A6295D1E51F6409461D1CAB55C61A
 

Continue reading “Exposed – Russia Likely To Continue Seeking To Undermine Faith In US Electoral Process”

Fancy Bear – Die GRU – Hacking – Abteilung Unter Der Lupe

Become a Patron!
True Information is the most valuable resource and we ask you to give back

Fancy Bear APT Uses New Cannon Trojan to Target Government Entities

Fancy Bear (auch bekannt als APT28 (von Mandiant), Pawn Storm, Sofacy Group (von Kaspersky), Sednit, Tsar Team (von FireEye) und STRONTIUM (von Microsoft)) ist eine russische Cyberspionagegruppe. Das Cybersicherheitsunternehmen CrowdStrike hat analysiert, dass es mit dem russischen Militรคrgeheimdienst GRU in Verbindung steht. Das britische AuรŸen- und Commonwealth-Amt sowie die Sicherheitsfirmen SecureWorks ThreatConnect und Fireeyes Mandiant haben ebenfalls erklรคrt, dass die Gruppe von der russischen Regierung gesponsert wird. Im Jahr 2018 identifizierte eine Anklage des United States Special Counsel Fancy Bear als zwei GRU-Einheiten, bekannt als Unit 26165 und Unit 74455.

Continue reading “Fancy Bear – Die GRU – Hacking – Abteilung Unter Der Lupe”

Fancy Bear Zielte Auf Europรคische Think Tanks Ab

Become a Patron!
True Information is the most valuable resource and we ask you to give back

Internet of Things: Neue Angriffe der Hackergruppe Fancy Bear ...

In einem Blogbeitrag gab Microsoft bekannt, dass Hacker Ende letzten Jahres versucht haben, Konten europรคischer Think Tanks zu verletzen. Wรคhrend der laufenden Ermittlungen ist Microsoft “zuversichtlich”, dass viele der Versuche von der Spionagegruppe Fancy Bear stammen, die die US-Regierung Russland zugeschrieben hat.

Das groรŸe Ganze: Fancy Bear – oder wie Microsoft die Gruppe Strontium nennt – ist in den USA am bekanntesten dafรผr, dass er das Democratic National Committee und andere politische Ziele wรคhrend der Wahlen 2016 gehackt hat. Insbesondere betreibt der German Marshall Fund eine russische Desinformations-Tracking-Site fรผr soziale Medien namens Hamilton 68.

Die europรคischen Hacking-Versuche fanden laut Microsoft zwischen September und Dezember statt.

Die Hacker richteten sich gegen 104 Konten von Mitarbeitern des Deutschen Rates fรผr auswรคrtige Beziehungen sowie gegen die europรคischen Bรผros des Aspen Institute und des German Marshall Fund in Belgien, Frankreich, Deutschland, Polen, Rumรคnien und Serbien.
Die Hacker versuchten, mithilfe von Phishing-Websites und E-Mails Anmeldeinformationen zu stehlen und Malware bereitzustellen.
Microsoft hat die betroffenen Think Tanks schnell benachrichtigt.
Think Tanks sind ein wertvolles Ziel fรผr Spione, da sie hรคufig enge Beziehungen zu Regierungsbeamten und Daten รผber die Regierungsfรผhrung oder von der Regierung hinter den Kulissen haben.

Die Hacking-Gruppe “Fancy Bear” Fรผgt Neue Funktionen Und Ziele Hinzu

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Russian Fancy Bear hackers' UK link revealed - BBC News

Die in Russland ansรคssige Cyberspionage-Gruppe Fancy Bear, die in den letzten Jahren hochkarรคtige Cyberangriffe gegen Regierungen und Botschaften gefรผhrt hat, hat laut Untersuchungen des Sicherheitsunternehmens ESET eine Phishing-Kampagne gestartet, die eine neu gestaltete Hintertรผr (backdoor) umfasst.

Die Kampagne von Fancy Bear, auch bekannt als APT28, Sofacy, Strontium und Tsar Team, ist seit dem 20. August 2018 aktiv. Die Gruppe, die dem russischen Militรคrgeheimdienst GRU angeschlossen ist, war an den Hack des Demokratischen Nationalkomitees federfรผhrend beteiligt.

Jetzt zielt Fancy Bear hauptsรคchlich auf AuรŸenministerien und Botschaften in Osteuropa und Zentralasien ab, sagen die Forscher. Die Ermittler fanden auch Hinweise auf eine neu gestaltete Hintertรผr sowie einen neuen Downloader, den die Hacker mit Nim erstellt haben, einer neuen Art von Programmiersprache, die Aspekte von Python, Ada und Modula kombiniert.

Diese neueste Kampagne beinhaltet Phishing-E-Mails an Opfer, die einen bรถswilligen Anhang enthalten, sagen die Forscher. Wenn das Ziel den Anhang รถffnet, werden Downloader gestartet, die mit der Installation der Hintertรผr auf einem infizierten Gerรคt enden, heiรŸt es in dem Bericht.

iese Hintertรผr ist in der Programmiersprache Golang oder Go geschrieben – eine weitere Ergรคnzung zum Toolset der Gruppe, so die Forscher.

Taktik รผberarbeiten
ESET-Forscher haben den Namen der Botschaften, auf die sich diese letzte Kampagne bezieht, nicht bekannt gegeben, aber der Bericht stellt fest, dass die Kampagne weiterhin aktiv ist.

Ein Grund, warum ESET diese neue Hintertรผr jetzt erkannt hat, ist, dass Fancy Bear-Hacker beschlossen haben, Taktiken und Tools zu wechseln, um der Sicherheitserkennung durch die Organisationen, auf die die Gruppe abzielt, besser zu entgehen. Dies ist ein Grund, warum Fancy Bear Tools wie die Programmiersprachen Golang und Nim verwendet, sagen ESET-Forscher.

“Wรคhrend es fรผr uns unmรถglich ist, genau zu wissen, warum sie es tun, besteht eine wahrscheinliche Erklรคrung darin, Sicherheitslรถsungen zu umgehen, die bereits andere Varianten ihrer Tools erkennen”, sagt ein ESET-Forscher gegenรผber der Information Security Media Group. “Es kรถnnte auch die Zuordnung erschweren, da es einfacher ist, einer Gruppe eine Variation eines bestimmten Werkzeugs zuzuweisen, das in einer bestimmten Sprache geschrieben ist, als wenn eines in einer vรถllig neuen Sprache geschrieben ist.”

Phishing-Schema
Die Angriffe im August begannen mit einer Phishing-E-Mail, die ein angehรคngtes Microsoft Word-Dokument enthielt, obwohl es dem Opfer nach Ansicht der Forscher den Anschein hatte, dass diese bestimmte Datei leer ist. Die E-Mail enthรคlt auch einen Verweis auf eine Dropbox-Vorlage, die laut Bericht einen Link – wordData.dotm – enthรคlt.

Neben der Verwendung der neuen Programmiersprachen zum Umschreiben ihrer schรคdlichen Tools ist laut ESET auch die Verwendung von Dropbox durch Fancy Bear zur Bereitstellung von zusรคtzlichem Code neu.

“Der anfรคngliche Kompromissvektor bleibt unverรคndert, aber die Verwendung eines Dienstes wie Dropbox zum Herunterladen einer Remote-Vorlage ist fรผr die Gruppe ungewรถhnlich”, heiรŸt es in dem Bericht.

Wenn ein Opfer auf den Link fรผr die Dropbox-Vorlage klickt, werden im Hintergrund schรคdliche Makros heruntergeladen, die den Nim-basierten Downloader sowie einen Trojaner enthalten, den ESET Zebrocy aufruft.

Der Nim-basierte Downloader ist nur ein Teil eines sechsstufigen Prozesses dieses Angriffs. Sobald alle diese anderen Komponenten heruntergeladen sind, wird die endgรผltige Nutzlast geliefert: Die Hintertรผr, die in Golang geschrieben ist, sagen die Forscher.

Diese neue Hintertรผr รคhnelt frรผheren Hintertรผren, die von der Fancy Bear-Gruppe bereitgestellt wurden, ist jedoch in einer anderen Programmiersprache geschrieben. Neben dem Zurรผcksenden von Daten an den Befehls- und Steuerungsserver und der Verwendung der Verschlรผsselung zum Ausblenden der Kommunikation umfassen diese anderen gemeinsamen Funktionen:

Dateimanipulation wie Erstellen, ร„ndern und Lรถschen;
Screenshot-Funktionen;
Laufwerksaufzรคhlung;
Befehlsausfรผhrung.
Planen von Aufgaben in einem Teil von Windows, mit denen die Angreifer die Persistenz auf einem infizierten Gerรคt aufrechterhalten kรถnnen.
“Es scheint, dass [Fancy Bear] den Originalcode in andere Sprachen portiert oder in andere Sprachen implementiert, in der Hoffnung, der Erkennung zu entgehen”, heiรŸt es im ESET-Bericht.

Fancy Bear verfolgen
Fancy Bear ist seit etwa 2004 aktiv und hat Berichten zufolge Verbindungen zur russischen Regierung sowie zur Hauptnachrichtendirektion fรผr das russische Militรคr oder zur GRU.

Die Gruppe war an mehrere hochkarรคtige Angriffe gebunden, darunter das Hacken von E-Mails des Demokratischen Nationalkomitees wรคhrend der US-Prรคsidentschaftswahlen 2016 (siehe: Feds klagen 7 Russen wegen Hacking und Desinformation an).

Im Jahr 2017 versuchte Fancy Bear angeblich, die franzรถsischen Prรคsidentschaftswahlen 2017 zu beeinflussen, indem er einen Dump mit gehackten Daten verรถffentlichte, die den Mitarbeitern des damaligen Prรคsidentschaftskandidaten Emmanuel Macron gehรถrten. Zu den gehackten Daten gehรถrten E-Mails, Buchhaltungsdokumente und Vertrรคge der Personen, die an Macrons Kampagnenbewegung beteiligt waren (siehe: Au Revoir, angebliche russische “Fancy Bear” -Hacker).

Im November 2018 richtete die Gruppe ihre Aufmerksamkeit wieder auf die USA und fรผhrte einen gezielten Angriff gegen den Senat durch. Laut einem Bericht von Trend Micro startete die Gruppe mehrere Phishing-Sites, die die Active Directory Federation Services des Senats imitierten, um Zugriffsrechte auf verschiedene Regierungssysteme und -anwendungen zu erhalten

Must See Video – Watch This Russian Hacker Break Into Our Computer In Minutes

Become a Patron!
True Information is the most valuable resource and we ask you to give back

Must See Video – Hackerangriff auf Bundestag: Merkel Macht Russland Verantwortlich

Become a Patron!
True Information is the most valuable resource and we ask you to give back

Must See Video – GRU-HACKER: Cyberattacken Wohl Werk Vom Russischen Militรคrgeheimdienst

Become a Patron!
True Information is the most valuable resource and we ask you to give back

https://youtu.be/Q9H0EiJTU7c

Der Westen wirft Russland offiziell vor, hinter vielen groรŸen Hackerangriffen der vergangenen Jahre zu stecken. Die USA klagten sieben Agenten des Militรคrgeheimdiensts GRU unter anderem wegen der Cyberattacke auf Welt-Anti-Doping-Agentur WADA an. Niederlรคndische Behรถrden erwischten nach eigenen Angaben GRU-Agenten beim Versuch, sich ins Computernetz der Organisation fรผr ein Verbot von Chemiewaffen (OPCW) zu hacken. Die britische Cyberabwehr rechnet dem GRU auch die Hackergruppe APT 28 zu, die hinter den Cyberattacken auf den Deutschen Bundestag und das Datennetzwerk des Bundes vermutet wird. Die Enthรผllungen aus London, Den Haag und Washington sind die bisher schรคrfsten Anschuldigungen im Zusammenhang mit mutmaรŸlich russischen Hackerangriffen. Besonders ausfรผhrlich und gut dokumentiert waren die Vorwรผrfe der Niederlรคnder. Sie verรถffentlichten am Donnerstag unter anderem Bilder von der Spionageausrรผstung sowie Daten von beschlagnahmten Gerรคten. Nach Angaben der Ermittler wollten die GRU-Agenten im April ins WLAN-Netz der OPCW eindringen. Die Organisation untersuchte damals Chemiewaffen-Angriffe in Syrien sowie die Nervengift-Attacke auf den ehemaligen russischen Doppelagenten Sergej Skripal und seineTochterJulia in GroรŸbritannien. Aus den Gerรคtedaten gehe hervor, dass auch Hacker-Attacken in der Schweiz und auf die strafrechtliche Untersuchung zum Abschuss des Passagierfluges MH17 geplant gewesen seien, hieรŸ es. Mit den Angriffen auf die WADA und den Leichtathletikverband IAAF wollten die russischen Hacker nach Darstellung der US-Ermittler von den Vorwรผrfen eines staatlich Betriebenen Dopings gegen Russland ablenken. Sie hรคtten aber auch versucht, sich in den US-Atomkonzern Westinghouse zu hacken. Details dazu – etwa, ob die Attacke Erfolg hatte – gab es nicht. Bereits am Morgen verรถffentlichte die britische Cyberabwehr eine Liste von Hackergruppen, hinter denen ยซso gut wie sicherยป der GRU stehe. Darunter ist auch ยซAPT 28ยป, die hinter den Angriffen in Deutschland vermutet wird. Experten gingen bereits davon aus, die offizielle Anschuldigung aus London untermauert nun den Verdacht. Bei dem Angriff auf den Bundestag im Jahr 2015 hatten sich Angreifer so weitreichenden Zugang verschafft, dass die Bundestags-IT ausgetauscht werden musste. Bei dem im Februar bekannt gewordenen Angriff auf das Datennetzwerk des Bundes hatten Cyberspione unter anderem das deutsche AuรŸen- und das Verteidigungsministerium attackiert. Dabei sollen sie auch Daten erbeutet haben. Das britische National Cyber โ€‹โ€‹Security Center fand nach eigenen Angaben heraus, dass der GRU auch fรผr Attacken auf die Demokratische Partei vor den US-Prรคsidentschaftswahlen 2016, einen Flughafen in der Ukraine sowie eine TV-Station in GroรŸbritannien verantwortlich ist. Politiker griffen zu scharfen Worten: Laut dem britischen AuรŸenminister Jeremy Hunt zeigen die Angriffe, dass Russland agiere, ohne das Vรถlkerrecht zu beachten. Verteidigungsminister Gavin Williamson sagte am Rande eines Nato-Treffens in Brรผssel: ยซSo handelt keine GroรŸmacht, das sind Handlungen eines Pariastaates.ยป ยซIch habe genรผgend Beweise gesehen, um sagen zu kรถnnen, dass die Niederlรคnder und Briten zu 100 Prozent richtig liegenยป, sagte US-Verteidigungsminister James Mattis. EU-Ratsprรคsident Donald Tusk und Kommissionschef Jean-Claude Juncker verurteilten das Vorgehen.

Become a Patron!
True Information is the most valuable resource and we ask you to give back

FBI Cyber Research revealed

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

The FBI identified incidents over the past few months in which cyber actors scanned for and sought to exploit audio and visual communication devices on networks to identify vulnerabilities which could later be used to gain access and unlawfully acquire information about the organization. In addition to targeting corporate information, vulnerable devices may be targeted for compromise for use in botnets or other criminal activities. The types of devices targeted include: Voice over Internet Protocol (VoIP) phones, video conferencing equipment, conference phones, VoIP routers, and cloud-based communication systems. While cyber actors have targeted VoIP and other communication devices in the past, the FBI continues to see these devices scanned by cyber actors for vulnerabilities.

Threat

Specifically, the FBI observed cyber actors identifying and probing communication devices by issuing HTTP GET requestsa to a business server or network to retrieve device configuration files. Information contained in configuration files often reveals IP addresses, usernames, passwords, system management URLs, and assigned phone numbers โ€“ all of which could be used by cyber actors for malicious purposes. Many of the requests are specific to particular brands of devices. Victims will often receive several GET requests in succession with the actors scanning for multiple brands of devices.

In addition, cyber actors retrieve IP addresses for further exploitation by using businessesโ€™ customer service VoIP hyperlinks, which are traditionally made available for customers to use in contacting the business. Once those hyperlinked calls are answered, the actor retrieves the IP address belonging to the phone which answered the call. Once the IP address is retrieved, an actor could send a large volume of packets to the IP address, overloading it and taking the service offline for the targeted business and its legitimate customers.

In addition to the above techniques, cyber actors target devices with brute-force attacks, attempting unauthorized access through the use of common usernames and passwords. Open source scanning tools can also be used to identify vulnerable communication devices and any associated ports.

All of the information obtained through scans and other methods are likely used for specific targeting efforts by cyber actors. This includes leveraging access to compromised audio and video devices to eavesdrop on meetings or conference calls, placing fraudulent international phone calls, leveraging the compromised device for use in botnets, and conducting man-in-the-middle attacks to redirect corporate network traffic.

Recommendations

The following recommendations may limit the success of these types of attacks:

Conduct daily server log reviews to identify unusual activity, including GET and POST requests from external IP addresses.

Work with the communication device/system providers to ensure servers are patched and updated regularly.

Consider restricting access to configuration files or configuring firewalls to block traffic from unauthorized IP addresses.

Restrict communication devices/systems to only non-sensitive business networks.

Conduct regular penetration testing exercises on communication devices to identify and address vulnerabilities in a timely matter.

Enable encryption on teleconference programs and applications and consider disabling auto-answer capabilities.

Password protect configuration files, if possible.

Regularly review and update users with access to administrative accounts.

Segment configuration files on the network. Be sure to protect configuration and other device-related files after getting the device out of the box. Donโ€™t just plug and play.

 

Go back

Your message has been sent

Warning
Warning
Warning
Warning

Warning.

Revealed – The U.S. DoD Forensic Science Lexicon

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

DEPARTMENT OF DEFENSE
DoD Forensic Science Lexicon
May 27, 2018

Department of Defense Forensic Science Lexicon
Page Count: 99 pages
Date: January 2018
Restriction: None
Originating Organization: Defense Forensics and Biometrics Agency
File Type: pdf
File Size: 956,884 bytes
File Hash (SHA-256): 4C47BA0C862DB9F0E3775053480ED5715945EAEB78510D786286A554C8C2BDC1

Download File

https://info.publicintelligence.net/DoD-ForensicScienceLexicon.pdf

 

1 Introduction

The Department of Defense (DoD) performs forensic science in a collaborative environment which necessitates the clear communication of all activities and their results. A critical enabler of communication is the use of a clear, internally consistent vocabulary.

1.1 Purpose

The goal of the Department of Defense Forensics Lexicon is to provide an operational vocabulary to address Forensics. A shared vocabulary enables a common understanding of Forensics, enhances the fidelity and the utility of operational reporting, facilitates structured data sharing, and strengthens the decision making processes across the DoD.

1.2 Scope

This lexicon encompasses the broad spectrum of scientific disciplines, processes, and equipment associated with performing forensic activities. Additional terms include those related to the programmatic support domains (e.g., doctrine, policy, standards, and accreditation) which enable forensic activity within the DoD.

Excluded from this lexicon are terms and definitions that describe the various types of Improvised Explosive Devices (IEDs) and the specific components of IEDs, as those have been previously defined in other well established lexicons.

1.3 Approach

This Department of Defense Forensics Lexicon was authored by subject matter experts from key organizations and agencies engaged in the full range of forensic activities and the personnel that provide programmatic support to those experts. It was then staffed multiple times across the Defense Forensics Enterprise in order to obtain support and consensus.

โ€ฆ

Go back

Your message has been sent

Warning
Warning
Warning
Warning

Warning.

DHS Reveals – Unmanned Aircrafts Systems Endanger Cybersecurity

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Image result for cybersecurity

The Department of Homeland Security (DHS)/National Protection and Programs Directorate (NPPD)/Office of Cyber and Infrastructure Analysis (OCIA) assesses that unmanned aircraft systems (UASs) provide malicious actors an additional method of gaining undetected proximity to networks and equipment within critical infrastructure sectors. Malicious actors could use this increased proximity to exploit unsecured wireless systems and exfiltrate information. Malicious actors could also exploit vulnerabilities within UASs and UAS supply chains to compromise UASs belonging to critical infrastructure operators and disrupt or interfere with legitimate UAS operations.

โ€ฆ

 

UAS FACILITATE PHYSICAL ACCESS TO UNSECURED SYSTEMS

UASs provide malicious actors an additional method of gaining proximity to networks and equipment within critical infrastructure sectors. Malicious actors could then use the proximity provided by a UAS to wirelessly exploit unsecured systems and extract information from systems they cannot otherwise access remotely or may not be able to access due to range limitations. This includes networks and devices within secured buildings, as well as networks and devices behind fencing and walls.

UASs can also allow a malicious actor to wirelessly exploit vulnerabilities from a distance (figure 1). The prevalent ownership and operation of UASs by the general public, the distance from which UAS can be operated, and a lack of tracking data can also provide malicious actors a level of anonymity that otherwise may not be available. UASs, in particular UASs, are typically more difficult to detect than a malicious actor attempting to trespass beyond physical barriers.

โ€ฆ

UAS FOR WIRELESS SYSTEM EXPLOITATION

Malicious actors could utilize UASs in order to wirelessly exploit access points and unsecured networks and devices. This can include using UASs in order to inject malware, execute malicious code, and perform man-in-the-middle attacks. UASs can also deliver hardware for exploiting unsecured wireless systems, allowing malicious actors persistent access to the wireless system until the hardware is detected or runs out of power. While OCIA does not know of a confirmed incident utilizing UASs to exploit wireless systems, researchers have demonstrated this capability.

โ€ฆ

MALICIOUS ACTORS CAN EXPLOIT COMPROMISED UAS

While UASs can be used as a tool for an attacker, they are also vulnerable to exploitation. Many commercial UAS variations, for example, currently communicate with ground stations and operators using unencrypted feeds. This can allow a malicious actor to intercept and review data sent to and from the UAS.

Go back

Your message has been sent

Warning
Warning
Warning
Warning

Warning.