Wer schützt die STASI heute noch ? Das neue Schweigen der Lämmer

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

bernd-pulch.jpg (100×124)

Liebe Leser,

fast 30 Jahre nach dem Fall der Mauer sind die STASI-Schergen, Mörder, Erpresser und Betrüger heute noch immer unter uns und leben ungestört, ja gehen weiter ihren Straftaten nach, da sie sonst nichts anderes können.

Warum ist dies so ?

Es ist klar, daß sie von ehemaligen Genossen und IM geschützt werden, die ihnen dienstbar sind, um nicht selber enttarnt und verfolgt zu werden.

Continue reading “Wer schützt die STASI heute noch ? Das neue Schweigen der Lämmer”

Statement about the dubious “colportations” of “Nawito” – MENTAL AND PHYSICAL CYBERATTACKS


Dear Readers,

let me just briefly comment a mental cyberattack which should distract your attention from the real issues.

I have never had any consulting position or contract for any German company.

I have never worked for the Axel Springer Publishing House – not even as a freelance journalist.

These facts are clear and can be verified easily – just by calling Axel Springer.

The facts are

1) Dr. Rainer Zitelmann worked for the Axel Springer Company. You can esaily find out what happened there. I just mention the word “Auschwitz” in this context…As you see from his website and in the internet Zitelmann is in fact consulting many German companies.

2) “GoMoPa” had in fact a consultation contract with estavis and got in fact money from estavis and many various companies i.e. “S&K”

These contracts are known and 100% true and published by various media i.e. “ZEIT”, “MANAGER MAGAZIN”, “SUEDDEUTSCHE ZEITUNG” etc.

3) Meridian Capital was the subject of “GoMoPa”s articles.

4) “Nawito” whover or whatever it is did not even bother to contact us.

5) The “information” about one of our companies is false.

6) The “Nawito” informer “Peter Ehlers” did in fact attack Chancellor Merkel and the Minister of Finance Wolfgang Schäuble as “Deutschlands bekannteste Hehler” to name just one fact about “Peter Ehlers” or whatever his name might be who by the way got a lot of money from the bancrupt SAM AG which was also subject of “GoMoPa”‘s reporting and we know similiar cases of this endeavour.

7) The last editor who was attacked by such cyberattacks died in a very mysterious way, Heinz Gerlach. He might have been controversial but nevertheless – the truth is the truth.

He was the first journalist to publish the truth about the mysterious headquarter of “GoMoPa” in New York and their consulting contract with estavis and died suddenly and totally unexpected for most of us – not for all.

The circumstances of his death remain unsolved for me.

We are ready to proof this everytime and do not work with “colportations”.

Obviously cyberattacks on our websites since years are not enough to keep the truth down – defamation must be added – a wellknown STASI technique to irritate the public – MENTAL AND PYSICAL CYBERATTACKS done by the well-know suspects.

Sincerely your

Bernd Pulch

Magister Artium der Publizistik, Germanistik und Komparatistik



graph eastern

graph 3


graphThe attacked s

The attacked website are for example:





and about 20 more.

The Best Proof for the Truth we are telling – Cyberattacks everyday by the Suspects


One day after The New York Times reported that Chinese hackers had infiltrated its computers and stolen passwords for its employees, The Wall Street Journal announced that it too had been hacked.

On Thursday, The Journal reported that it had been attacked by Chinese hackers who were trying to monitor the company’s coverage of China. It said hackers had broken into its network through computers in its Beijing bureau.

In a written statement, the business newspaper owned by News Corporation described the attack as an “ongoing issue” and said it was working closely with authorities and security specialists to clean up its systems. It said that it completed a “network overhaul” on Thursday in an effort to rid its systems of hackers.

China’s Ministry of National Defense has denied any involvement in the cyberattack at The Times or any other American corporations.

But security experts said that in 2008, Chinese hackers began targeting American news organizations as part of an effort to monitor coverage of Chinese issues.

In a report for clients in December, Mandiant, a computer security company, said that over the course of several investigations it found evidence that Chinese hackers had stolen e-mails, contacts and files from more than 30 journalists and executives at Western news organizations, and had maintained a “short list” of journalists for repeated attacks. Among those targeted were journalists who had written about Chinese leaders, political and legal issues in China and the telecom giant Huawei.

Bloomberg News, another American news organization, was targeted by Chinese hackers last year, and some computers were infected, according to a person with knowledge of the company’s internal investigation. The attack occurred after Bloomberg published an article on June 29 about the wealth accumulated by relatives of Xi Jinping, a Chinese official who is expected to become president in March.

Bloomberg has confirmed that hackers had made attempts but said that “no computer systems or computers were compromised.”

The timing of the attacks on The New York Times coincided with the reporting for an investigation, published online on Oct. 25, that found that the relatives of Wen Jiabao,China’s prime minister, had accumulated a fortune worth several billion dollars through business dealings.

Security experts hired by The Times to detect and block the computer attacks found digital evidence that Chinese hackers, using methods that some consultants have associated with the Chinese military in the past, breached The Times’s network.

The Associated Press reported Thursday that officials in the Obama administration were considering more assertive action against Beijing to stop Chinese computer espionage campaigns.

The Secretary of State, Hillary Clinton, said Thursday a global effort was needed o establish “rules of the road” for cyber activity.  In her final meeting with reporters at the State Department, Mrs. Clinton addressed a question about China’s efforts to infiltrate computer systems at The New York Times.

“We have seen over the last years an increase in not only the hacking attempts on government institutions but also non-governmental ones,” Mrs. Clinton said.

The Chinese, she said, “are not the only people who are hacking us.”

“There is a lot that we are working on that will be deployed in the event that we don’t get some kind of international effort under way,” Mrs. Clinton added without elaborating.

The United States has been increasingly vocal about such efforts against government and private industry. In a November 2011 intelligence report, government officials specifically accused China and Russia of stealing intellectual property for economic gain.


Michael Gordon contributed reporting from Washington.



So this is a part of the big picture: The small picture concerns former STASI agents and their comrades and thugs in Germany.

The Best Proof for the Truth we are telling – Cyberattacks everyday by the Suspects against our websites !

S & K – angeblicher Finanzskandal Teil 2 – Wer zieht die Fäden und wer profitiert ?

Honi soit qui mal y pense

Es geht um einen Schaden in dreistelliger Millionenhöhe. Die Wirtschaftswoche hatte Ende Januar vor den Aktivitäten gewarnt.

Die Staatsanwaltschaft geht von der Annahme aus, dass Schöneich ihre Zeitschrift zum Zwecke der persönlichen Bereicherung als Werbebroschüre von der S&K-Gruppe missbrauchen ließ. So habe sie sie für die Unterstützung der Hauptbeschuldigten Schäfer und Köller allein 6000 Euro monatlich als „Beraterhonorar“ erhalten.

Wenn der S&K durch ihre Tätigkeit Anlegergelder zuflossen, habe sie zudem ein Prozent der Umsätze vereinnahmt. Darüber hinaus habe Schöneich von Schäfer und Köller teure Geschenke wie Handtaschen und Schmuck angenommen. Schöneich reagierte bis zum Redaktionsschluss gestern nicht auf Anfragen des Handelsblatts.

Anlagetipps: Finger weg von Finanzprodukten, wenn…

  • Tipp 1

    … Renditen von über acht Prozent pro Jahr versprochen werden, gleichzeitig aber ein Drittel der eingeworbenen Summe für Kosten wie Werbung oder Vertrieb draufgeht

  • Tipp 2
  • Tipp 3
  • Tipp 4
  • Tipp 5

Die Finanzwelt ist nach eigenen Angaben mit 100 000 Lesern eine der führenden Publikationen für den erfolgsorientierten, qualifizierten Finanzberater im deutschsprachigen Raum. In der Selbstdarstellung heißt es: „Finanzwelt greift wichtige Themen der Finanzbranche auf, setzt Impulse und berichtet hierüber zum Wohle der Branche.“

Nach der bundesweiten Großrazzia gegen mutmaßliche Anlagebetrüger vom Dienstag waren eine Reihe von Hauptverdächtigen in Untersuchungshaft genommen worden. Die Personen stehen im Verdacht, ein betrügerisches Schneeballsystem aufgebaut und Anleger um mehr als 100 Millionen Euro geprellt zu haben. Die Wirtschaftswoche hatte Ende Januar vor den Aktivitäten gewarnt.

EDITORIAL – Versprechen gehalten – STASI enttarnt

Liebe Leser,

ich habe die Hintergründe der STASI-Mafia in Deutschland aufgedeckt und werde dies weiter tun.

Egal, was kommt.

Und eines noch zu den kriminellen deutschen Juristen, meinen speziellen Freunden:

Die Gerechtigkeit bestraft AUCH EUCH  UND EUCH INSBESONDERE !

Und ich bin nicht allein…

Herzlichst Ihr

Bernd Pulch

Magister Artium, Publizistik, Germanistik und Komparatistik

DIE “GoMoPa” will dies verhindern – Stellungnahme von Magister Bernd Pulch

(DAS INVESTMENT MAGAZIN – DAS ORIGINAL – IMMOBILIEN VERTRAULICH) DAS ORIGINAL) – Mein Name ist Bernd Pulch, ich bin von Rechts wegen Magister.
Link zu meiner Magister-Arbeit
Ich bin der Erbe unseres Familienbuches und damit das Oberhaupt unserer Familie Pulch. Unsere Familie hat seit Jahrhunderten in Deutschland, USA und vielen anderen Ländern, erfolgreiche Unternehmer, Staatssekretäre, Banker, Richter, Anwälte, Politiker und auch Journalisten hervorgebracht. Wir lassen unseren guten Namen nicht durch vorbestrafte Anlagebetrüger, Cybermörder und Stasi/NS-Kriminelle verunglimpfen. Deren Taten und Fäkalsprache sprechen für sich und bedürfen keiner ernsthaften Auseinandersetzung.

Die bezahlten Betrüger sollen die Kapitalanlage-Verbrecher schützen.
Darum geht es im Kern. Wie auch schon unter
klar ersichtlich.

Der neueste Coup der Verbrecher, Sie kopieren unsere Belege und wollen weiter Verunsicherung säen.
Dies wird Ihnen nicht gelingen.

Hier ist die Info zu Meridian Capital




Ich werde die kriminellen Verantwortlichen und ihre kriminellen Helfershelfer bis zur letzten Konsequenz zur Verantwortung ziehen.
Magister Bernd Pulch

PS Ich bedanke mich bei investment-on.com sowie allen anderen Medien für die Möglichkeit, die Dinge gerade zu rücken.

Reporting by Kai Friedrich, Renate Kebes, edited by Magister Bernd Pulch* and Sandra Lowe

Aus sicherheitstechnischen Gründen geben wir zu unseren Mitarbeitern keine weiteren persönlichen Daten bekannt.

siehe unseren Kreuzzug gegen Cyber Stalking

*Magister Bernd M. Pulch (MA – Magister Artium)

Abschluss des Studiums der Publizistik (Note 2) , Komparatistik (Note 1) und Germanistik (Note 1-2) 1988

Universität Mainz

Magisterarbeit bei Professor Kepplinger über Dolf Zillmanns “Emotional Arousal Theory”1987, Mainz, 400 Seiten

Sie können die Magisterarbeit bei uns zum Preis von nur € 99,- über das Kontaktformular bestellen.

Die Zahlung erfolgt per Vorkasse. Die Lieferzeit beträgt ca. 14 Tage in Deutschland.


Investment Magazin, Investment, Das Investment, Investment Magazine

Editorial – Our Investigative Partnership with Wikileaks

Dear Readers,

it is a pleasure for me to inform you that we have been invited by Wikileaks to join their investigative partnership.

Here is what it means – defined by Wikileaks:

LONDON—WikiLeaks began publishing The Global Intelligence Files – more than five million emails from the Texas-headquartered “global intelligence” company Stratfor. The emails date from between July 2004 and late December 2011. They reveal the inner workings of a company that fronts as an intelligence publisher, but provides confidential intelligence services to large corporations, such as Bhopal’s Dow Chemical Co., Lockheed Martin, Northrop Grumman, Raytheon and government agencies, including the US Department of Homeland Security, the US Marines and the US Defense Intelligence Agency. The emails show Stratfor’s web of informers, pay-off structure, payment-laundering techniques and psychological methods, for example :

“[Y]ou have to take control of him. Control means financial, sexual or psychological control… This is intended to start our conversation on your next phase” – CEO George Friedman to Stratfor analyst Reva Bhalla on 6 December 2011, on how to exploit an Israeli intelligence informant providing information on the medical condition of the President of Venezuala, Hugo Chavez.

The material contains privileged information about the US government’s attacks against Julian Assange and WikiLeaks and Stratfor’s own attempts to subvert WikiLeaks. There are more than 4,000 emails mentioning WikiLeaks or Julian Assange. The emails also expose the revolving door that operates in private intelligence companies in the United States. Government and diplomatic sources from around the world give Stratfor advance knowledge of global politics and events in exchange for money. The Global Intelligence Files exposes how Stratfor has recruited a global network of informants who are paid via Swiss banks accounts and pre-paid credit cards. Stratfor has a mix of covert and overt informants, which includes government employees, embassy staff and journalists around the world.

The material shows how a private intelligence agency works, and how they target individuals for their corporate and government clients. For example, Stratfor monitored and analysed the online activities of Bhopal activists, including the “Yes Men”, for the US chemical giant Dow Chemical. The activists seek redress for the 1984 Dow Chemical/Union Carbide gas disaster in Bhopal, India. The disaster led to thousands of deaths, injuries in more than half a million people, and lasting environmental damage.

Stratfor has realised that its routine use of secret cash bribes to get information from insiders is risky. In August 2011, Stratfor CEO George Friedman confidentially told his employees : “We are retaining a law firm to create a policy for Stratfor on the Foreign Corrupt Practices Act. I don’t plan to do the perp walk and I don’t want anyone here doing it either.”

Stratfor’s use of insiders for intelligence soon turned into a money-making scheme of questionable legality. The emails show that in 2009 then-Goldman Sachs Managing Director Shea Morenz and Stratfor CEO George Friedman hatched an idea to “utilise the intelligence” it was pulling in from its insider network to start up a captive strategic investment fund. CEO George Friedman explained in a confidential August 2011 document, marked DO NOT SHARE OR DISCUSS : “What StratCap will do is use our Stratfor’s intelligence and analysis to trade in a range of geopolitical instruments, particularly government bonds, currencies and the like”. The emails show that in 2011 Goldman Sach’s Morenz invested “substantially” more than $4million and joined Stratfor’s board of directors. Throughout 2011, a complex offshore share structure extending as far as South Africa was erected, designed to make StratCap appear to be legally independent. But, confidentially, Friedman told StratFor staff : “Do not think of StratCap as an outside organisation. It will be integral… It will be useful to you if, for the sake of convenience, you think of it as another aspect of Stratfor and Shea as another executive in Stratfor… we are already working on mock portfolios and trades”. StratCap is due to launch in 2012.

The Stratfor emails reveal a company that cultivates close ties with US government agencies and employs former US government staff. It is preparing the 3-year Forecast for the Commandant of the US Marine Corps, and it trains US marines and “other government intelligence agencies” in “becoming government Stratfors”. Stratfor’s Vice-President for Intelligence, Fred Burton, was formerly a special agent with the US State Department’s Diplomatic Security Service and was their Deputy Chief of the counterterrorism division. Despite the governmental ties, Stratfor and similar companies operate in complete secrecy with no political oversight or accountability. Stratfor claims that it operates “without ideology, agenda or national bias”, yet the emails reveal private intelligence staff who align themselves closely with US government policies and channel tips to the Mossad – including through an information mule in the Israeli newspaper Haaretz, Yossi Melman, who conspired with Guardian journalist David Leigh to secretly, and in violation of WikiLeaks’ contract with the Guardian, move WikiLeaks US diplomatic cables to Israel.

Ironically, considering the present circumstances, Stratfor was trying to get into what it called the leak-focused “gravy train” that sprung up after WikiLeaks’ Afghanistan disclosures :

“[Is it] possible for us to get some of that ’leak-focused’ gravy train ? This is an obvious fear sale, so that’s a good thing. And we have something to offer that the IT security companies don’t, mainly our focus on counter-intelligence and surveillance that Fred and Stick know better than anyone on the planet… Could we develop some ideas and procedures on the idea of ´leak-focused’ network security that focuses on preventing one’s own employees from leaking sensitive information… In fact, I’m not so sure this is an IT problem that requires an IT solution.”

Like WikiLeaks’ diplomatic cables, much of the significance of the emails will be revealed over the coming weeks, as our coalition and the public search through them and discover connections. Readers will find that whereas large numbers of Stratfor’s subscribers and clients work in the US military and intelligence agencies, Stratfor gave a complimentary membership to the controversial Pakistan general Hamid Gul, former head of Pakistan’s ISI intelligence service, who, according to US diplomatic cables, planned an IED attack on international forces in Afghanistan in 2006. Readers will discover Stratfor’s internal email classification system that codes correspondence according to categories such as ’alpha’, ’tactical’ and ’secure’. The correspondence also contains code names for people of particular interest such as ’Hizzies’ (members of Hezbollah), or ’Adogg’ (Mahmoud Ahmedinejad).

Stratfor did secret deals with dozens of media organisations and journalists – from Reuters to the Kiev Post. The list of Stratfor’s “Confederation Partners”, whom Stratfor internally referred to as its “Confed Fuck House” are included in the release. While it is acceptable for journalists to swap information or be paid by other media organisations, because Stratfor is a private intelligence organisation that services governments and private clients these relationships are corrupt or corrupting.

WikiLeaks has also obtained Stratfor’s list of informants and, in many cases, records of its payoffs, including $1,200 a month paid to the informant “Geronimo” , handled by Stratfor’s Former State Department agent Fred Burton.

WikiLeaks has built an investigative partnership with more than 25 media organisations and activists to inform the public about this huge body of documents. The organisations were provided access to a sophisticated investigative database developed by WikiLeaks and together with WikiLeaks are conducting journalistic evaluations of these emails. Important revelations discovered using this system will appear in the media in the coming weeks, together with the gradual release of the source documents.

End of Wikileaks Press Release

We are convinced that this cooperation will generate many benefits for all persons and the media involved and of course for our readers and users.

Sincerely yours

Bernd Pulch, MA


Dear Readers,

I have gotten many requests and mails.

Please understand

– I am in vacation

– I can not trust German Authorities as they do not trust themselves (see NSU – complex and President  Gaucks statement)

– I can not solve German problems and I do not want to do – even to try this because of possible corruption and old corrupt networks

– What I can do is to inform the international business community what is going on in Germany and I sure will do

– As long as the Germans themselves do not fight “GoMoPa”  and their allies – and even some State bureaucrats support them

you will suffer the consequences

Think about it!

Sunny vacations

My best regards

Bernd Pulch, Magister Artium Publiztik, Germanistik, Comparatisk.

My Special Day – Happy 46th Birthday, Freedom of Information!

Lyndon Johnson usually signed bills into law this way, with a crowd — but not the Freedom of Information Act, which he signed at the last minute, grudgingly, alone, at the ranch in Texas. (Credit: Wikimedia Commons).

Happy 46th Birthday, Freedom of Information!

National Security Archive Compilation of 46 News Stories

Shows Impact of FOIA for Public Health and Government Accountability

LBJ signed FOIA into law July 4, 1966 “kicking and screaming”

For more information contact:
Nate Jones/Tom Blanton – 202/994-7000



Washington, DC, July 4, 2012 – Marking the 46th anniversary of President Johnson’s signing the Freedom of Information Act, the National Security Archive today posted a compilation of 46 news headlines from the past year made possible by active and creative use of the FOIA. This representative sample, drawn from hundreds of FOIA stories reported by newspapers, blogs, broadcasters, and researchers, describe FOIA requests that revealed the theft of Jack Daniels whiskey by airport security screeners, the keywords used by homeland security officials to monitor social networking sites, the soil contamination endangering Marines and their families at Camp Lejeune, pre-9/11 attempts to whack Osama bin Laden, and $1.2 trillion of secret Federal Reserve loans to banks, among dozens of other topics that the public has a right and a need to know.

“These freedom of information stories show the paradox of FOIA,” remarked Tom Blanton, director of the Archive, which has made tens of thousands of successful FOIA requests since its founding in 1985. “We requesters always complain about the constant delays, the bureaucratic obstacles, the processing fee harassment, and the excessive government secrecy; yet the FOIA actually produces front-page results every year that make a real difference to citizens and to better government.”

“Agencies are still dragging their heels on fulfilling President Obama’s transparency promises,” said Nate Jones, the Archive’s Freedom of Information Coordinator, citing the Archive’s government-wide audits of FOIA performance. “But persistence and focus and pressure pay off, as these headlines show; and the core principle of FOIA – that government information belongs to the people – is worth fighting for.”

The Archive’s detailed 122-page guide, “Effective FOIA Requesting for Everyone,” is available online at the Archive’s FOIA page, here.

The Archive’s previous postings of documentation from the Johnson, Nixon and Ford presidential libraries show that President Johnson grudgingly signed the FOIA into law 46 years ago today, at the last possible minute, only after pressure from newspaper editors and his own press secretary Bill Moyers, who later said LBJ was “dragged kicking and screaming” into signing the bill. Moyers credited the persistence of longtime California congressman John Moss, lead author of the FOIA bill, for making the law happen.

46 FOIA News Stories for FOIA’s 46th Birthday

“FBI admits noted Memphis civil rights photographer Ernest Withers was informant,” The Commercial Appeal, Memphis, Tennessee, July 3, 2012, By Marc Perrusquia.
Documents released under FOIA to the Commercial Appeal confirm that Ernest Withers, who photographed the Civil Rights Movement and Martin Luther King, Jr., worked as an FBI informant for 14 years. U.S. District Judge Amy Berman Jackson ruled that the FBI must release portions of its file on Withers; the US government rarely releases the files of its informants.

“Army ‘investigating’ Bradley Manning Support Network; Admits to ‘Active Investigation,'” Antiwar.com, July 2, 2012, by Jason Ditz.
A U.S. Army response to a FOIA request confirms that The Bradley Manning Support Network is part of “an active investigation.” The group maintains the website of Bradley Manning, who is being charged under the Espionage Act for “aiding the enemy” by improperly disseminating classified information.

“Probe into soil contamination closes scrap metal lot at Camp Lejeune,” The Daily News, Jacksonville, North Carolina, June 29, 2012, By Lindell Kay.
A scrap metal yard at Camp Lejeune Marine Corps Base may be exposing workers to potentially carcinogenic chemicals. A Freedom of Information Act request shows that the Environmental Protection Agency and state regulators have been attempting to move the scrap yard for years, without avail.

“Group: Gas industry got inside information in N.Y.,” Associated Press, June 29, 2012, By Mary Esch.
Email exchanges obtained through New York’s Freedom of Information Law show that a natural gas industry lawyers repeatedly requested New York environmental regulators to weaken drilling and fracking regulations in their state.

“Declassified documents shed light on scramble to ‘hit’ bin Laden before 9/11,” CNN, June 21, 2012, By Tim Lister.
Documents released to the National Security Archive in response to a FOIA request show that the US government considered attacks on bin Laden several times before September 11, 2001. The documents also show that CIA and US Air Force drones “observed an individual most likely to be bin Laden” twice in the fall of 2000, but “had no way at the time to react to this information.”

“US Reveals Years of Accusations against Secret Service: Claims Include Involvement with Prostitutes, Leaks of Sensitive Information, Illegal Wiretaps,” MSNBC, June 15, 2012, By Alicia A. Caldwell.
Documents released by a Freedom of Information Act request reveal an extensive list of allegations filed against Secret Service agents and officers since 2004. The complaints include allegations of publishing pornography, illegal wiretaps, drunken behavior, and sexual assault.

“Steve Jobs’s Pentagon File: Blackmail Fears, Youthful Arrest and LSD Cubes,” Wired, June 11, 2012, By Kim Zetter.
Documents obtained through FOIA by Wired Magazine provide insight into Steve Jobs’s personal life after he founded Apple. In a 1988 security clearance interview with the Department of Defense, Jobs revealed that he was concerned about his daughter’s safety, disclosed his past altercations with the law, and chronicled his drug use.

“NOAA Cuts May Weaken Tsunami Mitigation Programs,” Oregon Public Broadcasting News, June 11, 2012, By Kristian Foden-Vencil.
Documents obtained through the Freedom of Information Act show that proposed federal cuts to the National Oceanic and Atmospheric Administration’s Tsunami Hazard Mitigation Program in 2013 would leave hundreds of coastal communities vulnerable to tsunamis.

“The Department of Energy is Under Attack. Cyber Attack,” CNBC, June 8, 2012, By Eamon Javers.
Documents obtained by CNBC through FOIA show that the DOE is frequently under what it believes to be an aggressive attack by private sector firms to access its website at times when it releases “market-moving” economic data to the public.

“DHS social media monitoring practices revealed under FOIA,” Government Security News, May 29, 2012, By Mark Rockwell.
Documents attained through FOIA reveal a long, sometimes bizarre, list of trigger words that the Department of Homeland Security monitors social networking sites for, including: “Amtrak,” “swine,” “BART,” and “cops.” The document also advises analysts which news organizations it deems the most credible, including Fox News.

“Secret Service Releases Identity of ‘Spy’ Printer Manufacturers,” The FOIA blog, May 24, 2012, By Scott Hodes.
Documents obtained through a Freedom of Information Act request reveal the names of 10 printer manufacturers that released their machine identification codes to the Secret Service, thereby allowing the Secret Service to trace printed materials back to their origin.

“ACLU raises issue with single-sex education programs,” Augusta Free Press, May 21, 2012.
Documents acquired through the Freedom of Information Act by the ACLU show an alarming trend of unlawful sex-segregation through single-sex programs in Virginia’s public schools.

“DHS Considers Collecting DNA From Kids; DEA and US Marshals Already Do,” The Electronic Freedom Foundation, May 14, 2012, By Jennifer Lynch.
Documents obtained through FOIA by the EFF show that the Department of Homeland Security is contemplating collecting DNA from children over the age of 14, and is exploring how to collect DNA from children even younger than that. ICE is the first component of DHS to collect DNA in such cases; the DEA and U.S. Marshals already do.

“National Security Letter Gag Order FOIA,” ACLU, May 9, 2012.
A FOIA lawsuit by the ACLU has led to the release of the National Security Letter template used by the FBI. National Security Letters force internet service providers, credit card companies, cell phone providers, and others, to hand over information about their customers. It is illegal to inform customers that their information has been turned over to the government.

“TSA Reveals Passenger Complaints … Four Years Later,” ProPublica, May 4, 2012, Friday, by Michael Grabell.
Documents obtained through the Freedom of Information Act reveal – albeit after a four year wait – the litany of complaints travelers filed with the Transportation Security Administration in 2008. Grievances ranged from a complaint of wheelchair-bound passenger being forced to walk through security, to an allegation that a passenger’s bottle of Jack Daniels was surreptitiously emptied by TSA screeners.

“Govt Appeals Court-Ordered Release of Classified Document,” Secrecy News, April 27, 2012, By Steven Aftergood.
A U.S. District Court ruled that the U.S. Trade Representative must release documents concerning the U.S. negotiating position in free trade negotiations that were the subject of a Freedom of Information Act Request. Judge Roberts concluded that the continued classification of the document was not “logical;” the U.S. Department of Justice has decided to appeal the decision.

“Stonington attorney a no-show at Freedom of Information training,” The Day, New London, Conn, April 25, 2012, by Joe Wojtas.
After the Connecticut Freedom of Information Commission ruled that the town of New London had violated state FOIA law in 2011, it ordered town officials to undergo FOI training. A dozen town officials took the two hour training. However, attorney Michael Satti -who mishandled the FOIA cases- did not attend despite the Commission encouraging him, “in the strongest possible terms” to do so.

“City admits to violating Freedom of Information Act,” The Stamford Advocate, Conn, April 22, 2012, By Kate King.
The Stamford Office of Legal Affairs was forced to pay a $300 fine because it improperly withheld public documents requested under the act. The city wrongly denied a request by state Rep. Sal Gabriele, for documents about theft of scrap metal by city workers and a credit account opened by public workers to fund an annual golf tournament. “Substantially all” of the documents were eventually released to Rep. Gabriele.

“ICE confirms inquiry into freedom of information denial in Dallas case,” The Dallas Morning News, April 17, 2012, By Dianne Solis.
According to a reply to a FOIA request, the Dallas branch of Immigration and Customs Enforcement confirmed that it was investigating its office’s improper “pawning of personal property of immigration detainees.” Several individuals within the senor leadership of the office have been reassigned and an investigation is ongoing.

“Memo shows US official disagreed with Bush administration’s view on torture; Previously-unreleased document shows state department official thought techniques were ‘cruel’ and ‘degrading’ punishment,” Associated Press, April 2, 2012, By Pete Yost.
In response to a FOIA request by the National Security Archive, the Department of State released a 2006 internal memo written by the State Department’s legal counselor Philip Zelikow that warned that he believed the Bush administration’s “enhanced interrogation” practices were in fact illegal. Zelikow recounted that the White House “attempted to collect and destroy all copies of my memo.”

“US feared Falklands war would be ‘close-run thing,’ documents reveal; Declassified cables show US felt Thatcher had not considered diplomatic options, and feared Soviet Union could be drawn in,” The Guardian, April 1, 2012, By Julian Borger.
U.S. diplomatic cables, released to the National Security Archive under FOIA, show that during the Falklands War, the United States provided the United Kingdom with substantial covert support. As U.S. Secretary of State Alexander Haig explained to Prime Minister Margaret Thatcher, “We are not impartial.”

“Documents show NYPD infiltrated liberal groups,” The Associated Press, March 23, 2012, By Matt Apuzzo and Adam Goldman.
Documents attained by a FOIA request show that from at least 2004-2008, undercover NYPD officers infiltrated liberal political organizations’ meetings and kept files on activists planning protests around the country. The use of these counterterrorism tactics likely violated the First Amendment.

“The State Department Tells Us How They Really Felt,” Huffington Post, February 17, 2012, By David Isenberg.
Documents obtained through a FOIA request shed light on how the Department of State rates, grades, and oversees the work assigned to its contractors. One assessment reported that Blackwater’s poor performance in Iraq caused the Department of State, “to lose confidence in their credibility and management ability.”

“Justices: Release Little Rock police officer’s use-of-force reports,” Arkansas Democrat-Gazette, February 17, 2012, By Alison Sider.
The Arkansas State Supreme Court ruled that a police officer’s “use of force reports” were not exempt under the state FOI law’s protection of employee privacy. The” use of force report” at issue recounts an incident where an officer struck a man “several times in the facial area” for refusing to leave a bar.

“Pentagon Discloses Military Intelligence Budget Request,” Secrecy News, February 14, 2012, By Steven Aftergood.
After refusing to disclose its Military Intelligence Program budget proposal request in response to a 2011 Freedom of Information Act request, the Department of Defense disclosed the amount of its FY2013 budget proposal request for its Military Intelligence Program in 2012. It requested 19.2 billion dollars.

“Congress Left in Dark on DOJ Wiretaps,” Wired Magazine, February 13, 2012, By David Kravetz.
Documents obtained via the Freedom of Information Act prove that the Department of Justice was illegally withholding material from Congress between 2004 and 2008. Specifically, the DOJ was refusing to turn over documentation on the number of times they used surveillance tools called “pen register” and “trap-and-trace capturing,” which are covert mobile telephone surveillance methods.

“No Conviction, No Freedom: Immigration Authorities Locked 13,000 In Limbo,” Huffington Post, January 27, 2012, By Elise Foley.
Documents obtained through the FOIA by the Huffington Post reveal that an alarming 40% of people in immigration detentions are held without being convicted of a crime.

“Federal Immigration Enforcement is Mandatory, Memo Says,” Los Angeles Times, January 8, 2012, By Paloma Esquivel.
Documents released through a FOIA request reveals that Secure Communities, the DHS’ controversial immigration enforcement program, will become mandatory by 2012, though states and some counties had initially been told they could opt out.

“FOIA Documents Show FBI Illegally Collecting Intelligence Under Guise of ‘Community Outreach,'” ACLU, December 1, 2011.
Documents obtained through FOIA reveal that the FBI has been using community outreach programs to spy on religious and community organizations. These actions have raised concerns that the Bureau may be violating various constitutional protections.

“Secret Fed Loans Gave Banks $13 Billion Undisclosed to Congress,” Bloomberg, November 27, 2011, By Bob Ivry, Bradley Keoun and Phil Kuntz.
29,000 pages of documents acquired by Bloomberg News FOIA requests reveal that the Federal Reserve loaned major banking institutions more than 1.2 trillion dollars on December 5, 2008, at the crux of the financial crisis. By taking advantage of the Fed’s below market rates, banks were able to make an estimated combined $13 billion in profits, according to Bloomberg’s calculation of data released to it under FOIA.

“Obama Intelligence Panel Identified after Suit,” Security Law Brief, November 12, 2011.
Documents obtained through a FOIA request provide the names of the members of the panel that oversees reports of illegal and improper spying by the intelligence community, the Intelligence Oversight Board.

“An FBI director with a grudge,” Los Angeles Times, November 6, 2011, By Richard A. Serrano.
Documents obtained by a FOIA request to the FBI reveal that long-time Bureau director J. Edgar Hoover had L.A. Times journalist Jack Nelson kept under close surveillance, as Hoover was concerned that Nelson could out Hoover as a homosexual.

“FBI releases Russian spy trove,” CNN, October 31, 2011, By Suzanne Kelly.
Documents attained by a FOIA request shed light on “Operation Ghost Stories,” an investigation into the “Anna Chapman” Russian spy ring. The documents reveal information about Russian Foreign Intelligence operatives in the U.S. who were thought to be attempting to access classified documents from undercover FBI agents; they include videos of Russian operatives conducting “brush passes” and other operational espionage.

“What If We Paid Off The Debt? The Secret Government Report,” NPR, October 20, 2011, By David Kestenbaum.
A document obtained through a FOIA request by NPR provides insight on how the government viewed a potential crisis in the year 2000. What was the crisis? How the global financial would suffer if the U.S. government entirely paid off its debt.

“FOIA request elicits declassification processing for NGA budget documents,” Progressive Technology Federal Systems, October 19, 2011.
Documents acquired by a Freedom of Information Act request by the Federation of American Scientists expose the budget considerations of the National Geospatial Intelligence Agency (NGA). The documents reveal the NGA’s concern about an upcoming wave of retirements, and the possible loss of valuable institutional knowledge and critical skills that could follow.

Enviros: TransCanada, State emails ‘cozy,'” PoliticoPro, October 3, 2011, By Bob King.
Documents obtained through the Freedom of Information Act illuminate a startling familiarity between State Department employees and lobbyists for the Canadian oil giant TransCanada, regarding approval for a North American oil pipeline.

“Don’t call us, we’ll call you: Tales of a DHS FOIA,” Federal Times, September 30, 2011, by Andy Medici.
Documents attained through FOIA a reporter for Federal Times show that the Department of Homeland Security redacts the contact information of their public relations employees – in order to prevent “an unwarranted invasion of personal privacy.”

“Even Those Cleared of Crimes Can Stay on F.B.I.’s Watch List,” The New York Times, September 27, 2011, By Charlie Savage.
Documents obtained through a Freedom of Information Act request reveal that the Federal Bureau of Investigation is allowed to keep people on the government’s terrorist watch list – even if they have been acquitted of terrorism-related offenses, or if the charges have been dropped. This revelation brings the FBI’s practices under greater scrutiny.

“Declassified US spy satellites reveal rare look at Cold War space program,” MSNBC, September 18, 2011, by Roger Guillemette.
For its 50th anniversary, the National Reconnaissance Office declassified and released thousands of pages of documents about its GAMBIT and HEXAGON satellite programs which were active from 1963 until 1986.

“FOIA Victory Will Shed More Light on Warrantless Tracking of Cell Phones,” The Electronic Frontier Foundation, September 10, 2011.
A U.S. District Court ruled in favor of FOIA requesters seeking information on the warrantless tracking of cell phones. The Court case forces the government to turn over information about the cases that federal law enforcement agencies obtained information by tracking cell phones without a warrant.

“Details released on probe of Manchin administration; Subpoena included request for records relating to private airplane, campaign finance, email accounts,” Daily Mail Capitol Reporter, August 25, 2011, By Ry Rivard.
Subpoenas released in response to a Freedom of Information request show that federal investigators sought flight records, emails, and bids for roads contracts from the administration of former West Virginia governor Joe Manchin, now a U.S. senator. No one was charged as a result of the probe.

“History Held Hostage; A group’s legal effort to dislodge the CIA’s official history of the Bay of Pigs fiasco shows that prying secrets from the spy agency remains far too difficult,” The Daily Beast, August 13, 2011, By Peter Kornbluh.
In response to a FOIA lawsuit by the National Security Archive, the Central Intelligence Agency released over 1200 pages of its internal history of the Bay of Pigs invasion. The history includes accounts of CIA personnel shooting at their own aircraft, and new revelations about assassination plots and the use of Americans in combat.

“Energy Friendships Spur Conflicts of Interest,” Associated Press, July 27, 2011, By Dina Cappiello.
Documents acquired through the Freedom of Information Act reveal that relations between offshore oil and gas companies and the federal agency in charge of regulating them – the Bureau of Ocean Energy Management and Regulation – were so intertwined that, a year after new ethics rules were enforced, nearly a third of inspectors located in the Gulf of Mexico region have been disqualified.

“Defense Contractors Block Auditor Access to Records, Insiders Say,” TIME Magazine, July 22, 2011, By Nick Schwellenbach.
Documents obtained through the FOIA reveal that the Pentagon frequently disregards requests for access to contractor records. Specifically, documents acquired by the Project on Government Oversight (POGO) show that the Pentagon ignored proposals from the Defense Contracting Audit Agency for greater access to contractor information.

“Court Rules TSA Adopted Body Scanners Improperly: Agency did not Solicit Public Comment before Installing Whole-Body Scanners,” Consumer Affairs, July 16, 2011, By James R. Hood.
Documents obtained via a FOIA request prove that DHS required body scanners used by TSA to be capable of recording and storing “images of unclothed passengers.”

“Final Space Shuttle Launch Threatened by Bad Weather,” Techland, July 6, 2011, By Matt Peckham.
Documents obtained via the Freedom of Information Act show that NASA’s space shuttle launches are “100 times more dangerous” to launch-site spectators than other types of U.S. rockets, though odds of a spectator actually being killed are “extremely remote.”


Das neue “GoMoPa”-System der WordPress – Blogs oder “Der Bauer erkennt seine Schweine am Gang.”

Liebe Leser,

“GoMoPa” hat mit immer neuen WordPress-Blogs zwei Dinge vor:

– von negativen Meldungen abzulenken

– themenspezifische Angriffe zu starten.

Früher bediente sich die dubiose selbsternannte “Finanznachrichtenagentur” eines Blog-Netzwerkes aus teilweise fremden Blogs.

Scheinbar sind wohl diese Blogger auf Distanz zu der laut Eigenaussage “Financial Intelligence” gegangen.

Im Übrigen bedeutet Intelligence im Englischen Sprachgebrauch “Geheimdienst”.

Wohl kein Zufall – sieht man sich das STASI-Netzwerk um den STASI-Obersten Ehrenfried Stelzer, den “Ersten Kriminologen der DDR”  an.

Wie schreibt “GoMoPa” so schön und ich darf die dubiosen Genossen hier – als Sohn eines Landwirtes, der auf dem Bauernhof groß geworden ist, – mit besonderer Freude zitieren: “Der Bauer erkennt seine Schweine am Gang !”


Herzlichst Ihr

Bernd Pulch

Magister der Publizistik, Germanistik und Komparatistik


Liebe Leser,

ich habe Ihnen versprochen die Hintergründe der STASI-“GoMoPa” aufzudecken.

Ich habe dies getan.

Wir werden nicht ruhen, bevor diese Kriminellen  und ihre Auftraggeber und Helfer ausgeschaltet sind.

Aus verständlichen Gründen gebe ich hier keine weiteren Infos an.

Herzlichst Ihr

Bernd Pulch,


Revealed – Kony 2012 Campaign Loses Couch Potatoes



Linking to a video on Facebook is one thing. Getting off the couch is quite another.

Viral internet sensation Kony 2012 found the campaign’s youthful army of ”clicktivists” largely unwilling to actually get up, go outside and put up posters.

Judging by the mood online, many had decided the whole meme was, like, so 10 minutes ago.

Participants in the campaign’s Cover the Night event on Friday were asked to form into teams, volunteer for their community for a few hours by picking up rubbish or washing cars, then spend the evening plastering walls, pavements and windows with promotional material.

But amazing things generally failed to happen. In New York, barely 5000 people had pledged on Facebook to join in. The event’s page didn’t specify a location, and Twitter revealed only a handful of groups heading to places such as Times Square, where a big video screen showed a Kony 2012 trailer every half hour just above a Foot Locker store.

Editorial – The New (Conservative) Liberalism by Charles Davis

Charles Davis, on liberalism in America, and how it fails to provide systemic solutions to the problems faced in an increasingly conservative world. Via Al Jazeera:

Once upon a time — say, three years ago — your average Democrat appeared to care about issues of war and peace. When the man dropping the bombs spoke with an affected Texas twang, the moral and fiscal costs of empire were the subject of numerous protests and earnest panel discussions, the issue not just a banal matter of policy upon which reasonable people could disagree, but a matter of the nation’s very soul.

Then the guy in the White House changed.

Now, if the Democratic rank and file haven’t necessarily learned to love the bomb – though many certainly have — they have at least learned to stop worrying about it. Barack Obama may have dramatically expanded the war in Afghanistan, launched twice as many drone strikes in Pakistan as his predecessor and dropped women-and-children killing cluster bombs in Yemen, but peruse a liberal magazine or blog and you’re more likely to find a strongly worded denunciation of Rush Limbaugh than the president. War isn’t over, but one could be forgiven for thinking that it is.

Given the lamentable state of liberal affairs, Drift, a new book from MSNBC’s Rachel Maddow, is refreshing. Most left-of-centre pundits long ago relegated the issue of killing poor foreigners in unjustifiable wars of aggression to the status of a niche concern, somewhere between Mitt Romney’s family dog and the search results for “Santorum” in terms of national importance. So in that sense, it’s nice to see a prominent progressive at least trying to grapple with the evils of militarism and rise of the US empire. It’s just a shame the book isn’t very good…


Editorial – Internet Eyes Citizen Spy Game – The New Stasi?

Liberty lies in the hearts of men and women; when it dies there, no constitution, no law, no court can save it…
– Judge Learned Hand, ‘The Spirit of Liberty’ speech (1944)

The launch of Internet Eyes on 4th October (as part of a three month trial) marks another disturbing chapter in Britain’s surveillance society.

Internet EyesIn the autumn of 2009 Internet Eyes Limited hit the headlines when they announced their desire to launch a CCTV game that they were keen to claim was not a game. Private individuals would subscribe to private camera feeds connected to the internet and spy on people going about their business, with a cash prize each month for the person who reports the most infringements. The game is now being launched as part of a three month trial at 12 shops (including Costcutter and Spar franchises) in towns including Reading, Wokingham and Newton Abbott.

The UK’s Information Commissioner has put private profit above personal privacy in allowing a private company to launch its Stasi style citizen spy game rather than defending the rights of British citizens. This is the privatisation of the surveillance society – a private company asking private individuals to spy on each other using private cameras connected to the internet. Internet Eyes must be challenged.

Texas Virtual Border

In the United States in 2008 a similar hair-brained project, called the ‘Texas Virtual Border Watch Program’ [1] was launched which allows anyone in the world to log on via the internet and watch a live feed of the Texas border to supposedly report suspicious activity (which in reality consists mainly of birds or deer lurking with intent).

A July 2009 Homeland Security Newswire article ‘Virtual border system ineffective, out of cash’ [2] details a few of the reports made by Texas Virtual Border Patrol viewers:

Some, such as Phyllis Waller of Bartlesville, Oklahoma, reported precisely what they saw. “Cow or deer walked by; now out of screen,” she wrote. Another activity report simply read, “armadillo by the water.”

One border watcher offered some advice: “Just a word of warning: A moment ago I saw a spider crawl across the top of the camera. You might want to try and prevent any webs from being spun across the lens area by treating with repellent or take other measures.”

Much like the failed US citizen spy system Internet Eyes viewers will be watching nothing much going on, in this case in shops – just people going about their daily business: buying a pint of milk, standing in a queue or choosing a chocolate bar.

Citizen spies

There have been other citizen spy pilots such as the cable TV channel in East London that showed live feeds of CCTV cameras in the area. All of these seek to outsource surveillance monitoring to members of the public, making members of the public the watchers and consequently part of the surveillance state. In doing so they hope to normalise people to surveillance and aim to make people ignore the uses to which constant monitoring can be put by the state or corporations. Not to mention the appalling impact this disconnect has on society.

Last year a BBC television programme, ‘Inside Out’ [3] described Internet Eyes as a “revolution” in CCTV despite the fact that it had not yet launched and that the Texas virtual border patrol to which they compared it was an enormously expensive failure ($2 million dollars spent in the first year for just 12 arrests).

people on raftOf course none of this was mentioned in the BBC’s programme. At one point the presenter says that he has logged on to the Texas Virtual Border Watch website. Next we see him watching a video and he tells us: “There’s a family here in a raft and it’s amazing to think that by clicking a link here in London I can have border patrol go out and stop them”. It really would have been amazing – because the footage was not streaming live but was from the BorderWatch Archives section of their website [4].

Numerous studies (including those commissioned by the Home Office) have shown that CCTV does not have a significant effect on crime, so such “revolutions” are ways of ensuring that the public does not focus on the lie that they have been sold. Creating systems that encourage people to watch the world through a monitor and report those they see on the screen actually discourages them from interacting with real people and participating in the community in which they live.

One of the claims made by Internet Eyes is that the reason CCTV doesn’t work is because there is hardly anyone watching them in real time. This just isn’t true. The vast majority of council/police cameras in the UK are watched 24 hours a day by trained staff. It is these cameras that have been subject to the most studies and have been shown to be ineffective.

ICO complaint

No CCTV along with Privacy International issued a joint complaint [5] to the Information Commissioner’s Office (ICO) last year as we believe that as well as being a ludicrous gimmick the game breaches the Data Protection Act. We laid out in detail the ways in which Internet Eyes breaches the Act but the ICO refused to block the launch of Internet Eyes and in fact bent over backwards to help the private company squeeze it’s game into the existing legal framework.

Section 8.2 of the ICO CCTV guidelines [6] states: “[…] it would not be appropriate to disclose images of identifiable individuals to the media for entertainment purposes or place them on the internet”. Despite claims of technical safeguards Internet Eyes Ltd have no way of knowing who is viewing their images and they have no way of controlling where such images are stored or distributed. For instance an internet viewer could simply use a video camera to record images from a CCTV feed and then keep those images permanently or distribute them as they see fit.

The thinking behind the Information Commissioner, Christopher Graham’s failure to block the launch of Internet Eyes was revealed when he appeared before the House of Commons Justice Committee session on ‘Justice issues in Europe’ in January of this year [7], Graham told MPs:

I think there are differences of view within the European Union and some of my colleagues, some of the data protection authorities take not just a purist view but see it as their role to stop things happening whereas I think in the UK we take a more practical approach where we say here are tremendous opportunities provided by modern technology and the question is finding the balance between getting the best out of the opportunities that the technology provides and the necessary protection of privacy. If you simply begin by saying privacy is an absolute and we must stop things in the name of privacy, you do not get anything done. It is much more of a challenge to come up with that balance between getting the utility from technology while protecting privacy.

Graham’s claim of balance between privacy and technology is not viable. In reality every new technology erodes privacy – if as each new technology comes along a new “balance” is sought then a bit more privacy is given away and privacy never gets to regain lost ground.

Much of the media coverage around the launch has suggested that the Information Commissioners Office (ICO) has in some way approved Internet Eyes. This is not quite true. The ICO was not willing to prevent Internet Eyes from launching. They have advised the company about data protection compliance and the company has made some changes to its service. Once the service has launched the ICO will have to respond to complaints and should it be found that the service breaches the Data Protection Act then they will have to take action.

Internet Eyes is a very grave concern and we call on those affected by the citizen spy game to contact us with a view to legal action.

As Sir Ken MacDonald, former Director of Public Prosecutions warned at a CPS lecture in 2008 [8]: “… we should take very great care to imagine the world we are creating before we build it. We might end up living with something we can’t bear.”


Dear Readers, Liebe Leser – Perspectives for a Free Germany – Perspektiven für ein freies Deutschland

Dear Readers, liebe Leser,

since 2 decades the communist regime is over in East Germany but still their heirs keep doing their best job – spying, infiltrating and murdering –  for clients and on their own behalf – in reality and in the virtual reality.

Seit 2 Jahrzehnten ist die kommunistische Herrschaft in Ostdeutschland gebrochen, doch deren STASI-Schergen tun weiter das, was sie am besten können: Spionieren, Infiltrieren und Morden – im Auftrag und auf eigene Rechnung – im Cyberspace und im realen Leben.

To make a long story short as well as we keep fighting against the Nazi rebirth in Germany – we keep fighting against their red partners.

Um eine lange Geschichte kurz zu machen, ebenso wie wir weiter die Neonazis in Deutschland bekämpfen, werden wir die Neo-STASI weiter bekämpfen.

This fight is most crucial in the financial industry because these henchmen of Hitler and Stalin and their heirs get their fundings hereof.

Diese Aufklärung zielt insbesondere auf die deutsche Finanzindustrie, die Hitler und Stalins Erben weiter finanziert.

We focus in the next months more and more on the international investment industry to make sure they do not cooperate with Hitlers and Stalins heirs in Germany.

Wir werden in den kommenden Monaten unser Haupt-Augenmerk insbesondere auf internationale Investoren richten, um diese aufzuklären, nicht mit Hitlers und/oder Stalins Erben zu kooperieren.

My warmest regards


Bernd Pulch

Magister Artium of Media, German Studies and International Literature

Magister Artium der Publizistik, Germanistik und Komparatistik