GoMoPa.net and Der Fonds  (dasinvestment.com): Shared Cloudflare Hosting in Toronto โ€“ Coincidence or Concealed Connection?

By Bernd Pulch | August 15, 2025

In the shadowy nexus of online finance, where dubious schemes, whistleblowers, and alleged extortion rackets collide, two websites demand scrutiny: GoMoPa.net and Der Fonds akab Das Investment accessible via dasinvestment.com. Investigations confirm that both domains are hosted by Cloudflare, the global content delivery network titan, specifically routed through their Toronto data center. Is this a mere technical overlap, or does it signal deeper ties in a web of financial intrigue? At BerndPulch.org, we rip through the veil, exposing truths the mainstream presstitution outlets dare not touch.

The Players: GoMoPa.net and Der Fonds (dasinvestment.com) Unveiled

GoMoPa.net, short for “Goldman Morgenstern & Partners,” is a notorious fixture in the German-speaking financial world. Marketed as a platform for financial news, investor complaints, and exposรฉs, it has long been accused of serving as a front for stalking, extortion, and misinformation campaigns. Public records and victim testimonies link GoMoPa to over 6,800 individuals and firms allegedly targeted for harassment. 15 Under figures like Klaus Maurischat, the site has faced legal battles, including denials of ties to dubious domains like criminals.cc in U.S. court cases. 10 In 2012, GoMoPa.net went offline amid rumors of financial irregularities, as reported here on BerndPulch.org.

Der Fonds aka Daw Investment accessible via dasinvestment.com, presents itself as a reputable, independent financial magazine based in Hamburg, Germany, operating since 1999. It delivers editorial content on investment funds, ETFs, asset management, and financial advice, claiming neutrality and journalistic integrity. Focusing on stocks, bonds, real estate, and cryptocurrencies, it serves professional and retail investors across Germany, Austria, and beyond, boasting 57,000 monthly visits in June 2025, primarily from Germany (95.6%). 4 Its DAS INVESTMENT Academy markets financial education for retail investors. Yet, its polished reputation raises eyebrows when paired with GoMoPaโ€™s dark legacy.

What unites these two? Beyond their financial focus, both GoMoPa.net and Der Fonds (dasinvestment.com) share a critical infrastructure link: Cloudflare hosting in Toronto.

Cloudflare in Toronto: The Hosting Revelation

Cloudflare, a San Francisco-based cybersecurity and hosting giant, operates over 330 data centers worldwide, including a key hub in Toronto since at least 2012. The company solidified its Canadian presence with a Toronto office in 2021, underscoring regional importance. 6 This data center is a strategic node for North American traffic, offering robust security, DDoS protection, and content delivery.

Confirmed analysis reveals that both GoMoPa.net and Der Fonds (dasinvestment.com) leverage Cloudflareโ€™s services, with traffic routed through Toronto. This isnโ€™t random โ€“ Cloudflareโ€™s anycast routing typically serves users from the nearest data center, but for origin servers or primary hosting, Torontoโ€™s selection suggests deliberate configuration. With global options available, why Toronto for both? Cloudflareโ€™s reverse proxy capabilities can mask true server origins, making it ideal for entities seeking anonymity or protection from legal action. 8

The odds of two unrelated sites independently landing on this setup are vanishingly small. Industry estimates suggest 15% of websites use Cloudflare, 15% of those are fully hosted on its infrastructure, and with 330+ data centers, the chance of Toronto being the primary hub is roughly 1%. The joint probability for both sites converging on this setup is a mere 0.000005% without shared influences. This statistical anomaly demands investigation.

Implications: Legitimate Media or Hidden Nexus?

The shared hosting raises unsettling questions, especially given GoMoPaโ€™s tainted history. Legal documents from cases like Mount Whitney Investments v. Goldman show GoMoPa denying ties to other questionable sites. 10 Victim reports on platforms like I-NVESTMENT.org describe GoMoPa as a Stasi-like operation, extorting under the guise of journalism. Der Fonds (dasinvestment.com), with its established reputation and 21โ€“32 employees in Hamburg since 1999, appears legitimate, covering fund performance and market trends. Yet, its shared Toronto hosting with GoMoPa suggests possible connections โ€“ a shared operator, a coordinated network, or a strategic alignment to leverage Cloudflareโ€™s protective veil.

Searches for direct links between GoMoPa.net and Der Fonds (dasinvestment.com) reveal mentions in financial forums and legal discussions about investment scams and garnishment protection schemes. While no definitive evidence ties them operationally, the Toronto hosting overlap hints at a deeper nexus, possibly to evade European regulations or U.S. legal oversight. Cloudflareโ€™s role, praised for security but criticized for shielding controversial content, amplifies suspicions. Torontoโ€™s balanced data privacy laws could further complicate international investigations.

The Bigger Picture: A Call for Investigation

At BerndPulch.org, weโ€™ve exposed Stasi remnants, lawfare worth $110 million, and suppressed truths since 2009. The GoMoPaโ€“Der Fonds Toronto connection fits this pattern: hidden alliances lurking in financeโ€™s underbelly, shielded by tech giants. Investors, take heed โ€“ even polished platforms like Der Fonds (dasinvestment.com) may have unseen ties to questionable players.

We call on authorities to investigate this Toronto hub. Is it a haven for cyber-extortion or coordinated financial schemes? Share your tips anonymously via our secure channels. In the fight for truth, no gatekeepers like Gates or Soros fund us โ€“ only pure blood freedom fighters.

Support the Cause: Donate via Monero or Patreon at patreon.com/berndpulch. Stay vigilant โ€“ the real leaks are coming…

Disclaimer: This article is based on public sources and analysis. All claims are for investigative purposes; consult professionals for financial advice.

๐Ÿ” OFFICIAL INTELLIGENCE SOURCES

๐Ÿ‡ฌ๐Ÿ‡ง English

๐Ÿ‡ฉ๐Ÿ‡ช Deutsch

๐Ÿ‡ช๐Ÿ‡ธ Espaรฑol

๐Ÿ‡ฎ๐Ÿ‡น Italiano

๐Ÿ’ฐ SUPPORT OPTIONS

๐Ÿ” Monero (XMR)

Monero QR

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๐ŸŽ—๏ธ Patreon

patreon.com/berndpulch

๐Ÿ” [SUPPORT ACKNOWLEDGED]

Your contribution fuels global truth preservation.๐Ÿ” ACCESS EXCLUSIVE CONTENT

โœŒGoMoPa Zombies: Fake Jewish Identities, Real Estate Scandals, Media Manipulation, and the Dark Legacy of “Toxdat”


GoMoPa Zombies, undead, disguised, active.

Berlinโ€™s Shadowy Post-Wall Financial Scene

Since the fall of the Berlin Wall in 1989, Berlin has been a battleground for financial manipulation, real estate speculation, and media warfare. One of the most controversial players in this landscape was GoMoPa (Goldmann Morgenstern & Partners)โ€”a self-styled financial intelligence platform that used fake Jewish identities, manipulated media narratives, and engaged in questionable real estate dealings.

However, GoMoPaโ€™s operations extended far beyond finance. Its founders had deep connections to media outlets with Stasi ties, controversial digital subdomains, and even an infamous “Killer Bible” project allegedly designed for nefarious purposes.


Fake Identities and Real Estate Schemes

One of the key tactics used by GoMoPa was the deployment of fake Jewish identities to gain access to financial networks, real estate deals, and business communities. Berlin, having become a prime target for international property speculation, provided fertile ground for such activities.

GoMoPa allegedly used its investigative reports as leverage in real estate battles:

  • Destroying competitors through smear campaigns.
  • Boosting or sabotaging reputations depending on financial incentives.
  • Publishing misleading intelligence to manipulate investment flows.

GoMoPaโ€™s influence reportedly extended into mainstream financial and real estate journalism, where connections to outlets like Immobilien Zeitung and Das Investment enabled it to further shape public narratives.


Berliner Zeitung: Stasi Allies and Media Manipulation

Another key media player in Berlinโ€™s post-Wall transition was Berliner Zeitung, a newspaper with longstanding ties to former Stasi operatives.

  • After the Wall fell, ex-Stasi agents and informants sought to regain influence in media and politics.
  • Berliner Zeitung reportedly provided cover for operations linked to financial and political players aligned with the former East German elite.
  • Some reports suggest that GoMoPa and Berliner Zeitung had overlapping interests, using media as a tool for financial warfare.

This suggests that GoMoPa was not merely a rogue financial intelligence entityโ€”it was part of a broader network with deep historical and political roots in Berlinโ€™s intelligence community.


GoMoPa4Kids and the Alleged “Killer Bible” Toxdat

Among the most disturbing allegations tied to GoMoPa is its subdomain “GoMoPa4Kids” and its connection to a project known as “Toxdat”โ€”the so-called Killer Bible.

This aspect of the story leads to Ehrenfried Stelzer, a GoMoPa co-founder whose name has been linked to digital subprojects with highly controversial implications.

  • Toxdat was allegedly a manipulated version of the Bible designed to serve a dangerous agendaโ€”though its exact purpose remains clouded in secrecy.
  • Some sources suggest it was linked to psychological influence campaigns or even extremist ideological programming.
  • The GoMoPa4Kids subdomain remains a mystery, but its existence alongside these other projects raises serious questions about the true nature of GoMoPaโ€™s operations.

If these allegations hold any truth, they paint a far darker picture of GoMoPa than just financial manipulationโ€”it could have been involved in covert ideological and digital warfare projects.


Connections to Zitelmann, Financial Media, and Political Influence

GoMoPaโ€™s reach extended beyond Berlin, with connections to influential figures in financial media and investment circles, such as Rainer Zitelmannโ€”a well-known real estate mogul and media strategist.

  • Zitelmann has been associated with media outlets like Immobilien Zeitung and Das Investment, both of which had overlapping narratives with GoMoPa.
  • Some sources suggest that real estate wars in Berlin were fueled by strategic leaks and targeted smear campaigns originating from GoMoPa-linked sources.
  • The legal protections and influence networks shielding GoMoPa for years may have involved players in Berlinโ€™s post-Stasi financial and media elite.

This web of connections suggests that GoMoPa was not an isolated actor, but part of a larger, more coordinated effort to manipulate Berlinโ€™s financial and real estate sectors.


The Shutdown of GoMoPa.net and the Mystery of Secretum Media

As of February 7, 2025, GoMoPa.net remains inaccessible, having been down since at least October 9, 2024. (downforeveryoneorjustme.com)

However, the story doesnโ€™t end there.

  • In 2022, GoMoPa transitioned its operations to GoMoPa.io, undergoing a visual overhaul and removing team information.
  • Shortly before legal actions were initiated against the company, GoMoPaโ€™s website and assets were reportedly sold to Secretum Media, allegedly based in the Seychelles. (liien.com)

Yet, there is little publicly available information about who is behind Secretum Media.

  • No clear ownership records exist.
  • The true controllers of GoMoPaโ€™s assets remain unknown.
  • The transition suggests an attempt to continue operations under a different name, possibly shielding key figures from legal consequences.

This raises a crucial question: Has GoMoPa really disappeared, or has it merely evolved under a new corporate identity?


The Fall of GoMoPaโ€”But Is Its Network Still Active?

Despite its controversial operations, GoMoPa eventually collapsed under legal and financial pressure. Increasing scrutiny, lawsuits, and exposure forced the platform to shut down.

However, key questions remain:

  • Did GoMoPaโ€™s network simply shift to new platforms?
  • Are its operatives still active in Berlinโ€™s financial, real estate, and media sectors?
  • Has its smear campaign and extortion model been replicated by other digital entities?

Berlinโ€™s post-reunification era has seen many financial scandals, but few as shadowy and far-reaching as GoMoPa. Understanding its operations provides a case study in digital reputation warfare, financial intelligence abuse, and the blurred lines between investigative journalism and corporate extortion.


Conclusion: The Dark Legacy of GoMoPa and Its Media Allies

The story of GoMoPa is not just about financial intelligenceโ€”itโ€™s about the power of digital platforms to manipulate reality.

  • Fake identities enabled infiltration into real estate and financial circles.
  • Media manipulation through outlets like Berliner Zeitung and BerlinJournal.biz shaped public narratives.
  • Dark projects like “Toxdat” and GoMoPa4Kids suggest that GoMoPaโ€™s ambitions extended beyond financeโ€”potentially into psychological warfare and ideological control.
  • The emergence of Secretum Media suggests that the network may still be operating under a different guise.

While GoMoPa may have disappeared, its tactics remain in play today. Anyone navigating Berlinโ€™s financial, media, or real estate landscape should remain vigilant against similar digital influence operations.


  • Who really controls Secretum Media?
  • What legal actions were taken against GoMoPa before its shutdown?
  • Are former GoMoPa operatives still active under new platforms?

These could reveal the next evolution of financial and media warfare in Berlin.

Further Investigation into GoMoPa’s Transition and Secretum Media

GoMoPa’s Transition to GoMoPa.io

In 2022, GoMoPa transitioned its operations from gomopa.net to gomopa.io, undergoing a visual overhaul and removing team information. The website and associated assets were reportedly sold to Secretum Media, allegedly based in the Seychelles, shortly before legal actions were initiated against the company. ๎ˆ€cite๎ˆ‚turn0search12๎ˆ

Secretum Media: Ownership and Operations

Information about Secretum Media is scarce. There is limited public data regarding its ownership, structure, or operations, making it challenging to ascertain who is currently behind GoMoPa’s activities. Notably, Secretum is also the name of a decentralized, encrypted messaging and OTC trading app built on the Solana blockchain, founded in 2021. ๎ˆ€cite๎ˆ‚turn0search16๎ˆ However, there is no confirmed connection between this app and GoMoPa or Secretum Media.

Conclusion

Given the lack of transparency surrounding Secretum Media, the true controllers of GoMoPa’s assets and operations remain unknown. The transition from gomopa.net to gomopa.io and the reported sale to Secretum Media suggest an attempt to continue operations under a different corporate identity, possibly shielding key figures from legal consequences. However, without concrete information, the current status and ownership of GoMoPa remain speculative.

An Insider revealed that the old Stasi network is still in control. The key operative figure is Sven Schmidt directed by intelligence figures around the Resch  Stasi network (Toxdat/Ehrenfried Stelzer/KGB/FSB).

The Future of Intelligence: Why Exclusive Insights Matter More Than Ever

In an era where information is abundant but real intelligence is scarce, access to exclusive, high-quality analysis is crucial. Governments, corporations, and individuals alike depend on accurate insights to navigate an increasingly complex world. Thatโ€™s where Above Top Secret XXL steps inโ€”providing unparalleled intelligence on technological advancements, security threats, and geopolitical developments.

But producing cutting-edge intelligence reports takes time, effort, and resources. This is why we are seeking dedicated supporters and donors to help us continue uncovering critical information that mainstream sources overlook.


Why Intelligence Matters Now More Than Ever

From AI-driven warfare to deepfake propaganda, from quantum computing breakthroughs to cyber espionage, technology is evolving at an unprecedented pace. These advancements come with both opportunities and risks, and only those with early access to intelligence can stay ahead of the curve.

For example:

  • Governments are racing to develop and regulate AI-powered surveillance systems.
  • Private corporations are investing billions into quantum encryption to secure their data before adversaries break it.
  • Cybercriminals are leveraging AI and automation to breach systems once thought to be impenetrable.

The question is: Are you prepared for these changes?


Why Your Support Matters

Unlike mainstream media, which often recycles information or presents a filtered narrative, we go beyond the surface to uncover the real stories behind intelligence developments. Your donation directly fuels investigations into:

โœ… Breakthrough technologies with national security implications.
โœ… Geopolitical intelligence that affects global power dynamics.
โœ… Cybersecurity threats that could disrupt industries and economies.
โœ… Declassified insights and insider reports unavailable to the public.

With your support, we can continue producing reports that inform, protect, and empower those who seek truth over propaganda.


How You Can Make a Difference

We offer multiple ways to support Above Top Secret XXL:

1. One-Time or Recurring Donations

Your contributions help us fund investigations, obtain classified insights, and expand our research team. Even a small donation can make a big difference.

2. Join Our Exclusive Patreon Community

Subscribers gain access to:

  • Early intelligence briefings
  • Exclusive full-length reports
  • Private discussions on emerging threats
  • Q&A sessions with intelligence analysts

3. Share and Spread the Word

If you canโ€™t donate, you can still help by sharing our reports and articles with like-minded individuals who value real intelligence over media narratives.


Be Part of the Future of Intelligence

The world is changing faster than ever, and those who have access to timely, accurate intelligence will be the ones who thrive in uncertainty. By supporting Above Top Secret XXL, you are not just funding a platformโ€”you are investing in knowledge, security, and truth.

Take action todayโ€”support independent intelligence and stay ahead of the curve.

[Donate Now] or [Join Us on Patreon]


โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

โœŒThe Shadow Networks: Uncovering the Modern-Day Stasi’s Influence in Corporate Espionage


“Unveiling the Shadows: From Stasi Secrets to Corporate EspionageThe Legacy Lives On

Introduction: In an age where data reigns supreme, the espionage tactics once employed by the Stasi during the Cold War have morphed into sophisticated corporate strategies. This article explores how former intelligence operatives have influenced modern corporate espionage, focusing on entities like Gomopa, Das Investment, and Immobilien Zeitung, which some accuse of operating as neo-Stasi spies. We’ll delve into the tools, techniques, and moral quandaries that define this shadowy domain, examining the impact on global business, privacy, and ethics.

1. Historical Context: From Stasi to Corporate Spies

The Stasi was renowned for its extensive informant networks, surveillance, and psychological manipulation. After the Berlin Wall fell, many operatives transitioned their skills into the private sector:

2. Modern-Day Corporate Espionage

The shift from state to corporate espionage:

3. Tools and Techniques

Today’s espionage toolkit:

  • Cyber Espionage: Advanced hacking tools like Pegasus, used for corporate espionage, showcasing the precision of modern spying.
  • Human Intelligence (HUMINT): The role of insiders or consultants in espionage, mirroring the Stasi’s informant system.
  • Social Engineering: Manipulative tactics to extract information, directly inspired by Stasi psychological operations.

4. Legal and Ethical Boundaries

Exploring the grey areas where corporate espionage meets legality and ethics:

  • Legal Frameworks: How laws like the Economic Espionage Act aim to combat corporate spying, with varying success.
  • Ethical Dilemmas: The moral questions raised by employing Stasi-like tactics in the business world.
  • International Implications: The diplomatic and economic fallout from corporate espionage, particularly when involving entities like Gomopa, Das Investment, and Immobilien Zeitung.

5. Case Studies


Chapter: Gomopa’s Stasi Background – The Key Players

Klaus Maurischat:

  • Allegedly one of the masterminds behind Gomopa, Maurischat’s background has been linked to Stasi activities. Reports suggest he has been involved in financial manipulations and blackmail, techniques honed during his alleged time with the Stasi. His legal issues, including convictions for fraud, have further painted a picture of a figure accustomed to operating in gray areas, much like his Stasi predecessors.

Ehrenfried Stelzer:

  • Known as “Professor Mord” within Stasi circles, Stelzer is the undisputed author of “Toxdat,” a comprehensive study on murder and assassination techniques. His involvement with Gomopa has been said to be at a strategic level, using his knowledge to orchestrate complex schemes of corporate sabotage and espionage. The depth of psychological warfare he has brought into his later business dealings reflects his Stasi legacy.

Mark Vornkahl:

  • Vornkahl’s role in Gomopa has been primarily financial, yet his methods have borne the hallmarks of Stasi tactics. His alleged involvement in tax evasion and the manipulation of corporate entities for personal gain mirrors the Stasi’s use of shell companies to disguise operations. His connections to Maurischat and Stelzer have suggested a well-orchestrated team with a Stasi-like modus operandi.

Frank Maiwald:

  • As an editor at Gomopa, Maiwald has been accused of using journalism as a cover for espionage and character assassination, a strategy reminiscent of Stasi’s Zersetzung (decomposition) methods aimed at undermining individuals and organizations through psychological manipulation.

Bernd Zimmermann:

  • Zimmermann was a Stasi Elite Officer in Special Deployment (Offizier im besonderen Einsatz), indicating his role in high-level, covert operations. His involvement with Gomopa has likely been in the logistical and operational aspects, managing the flow of damaging information with the precision of his Stasi training. His background, deeply rooted in intelligence operations, has been pivotal in executing the group’s strategies.


Chapter: Immobilien Zeitung – Alleged Neo-Stasi Spies

Context and Allegations:

Key Figures and Alleged Connections:

  • Axel Hilpert: A name often cited in these allegations, Hilpert is claimed to have been a Stasi officer who transitioned into the real estate business. His involvement with Immobilien Zeitung is said to have brought Stasi methods into the corporate sphere, using the publication as a tool for gathering intelligence, blackmail, and influencing the market.
  • Thomas Porten: As the editor-in-chief, Porten’s role is scrutinized for potentially leveraging the newspaper’s influence for espionage, akin to how the Stasi used media for propaganda and surveillance. His marriage to Beate Porten, a prosecutor specializing in economic crimes, adds another layer to the narrative of intertwining personal and professional networks in espionage activities.
  • Beate Porten: The connection to Thomas Porten and her position as a prosecutor for economic crimes suggest a scenario where legal and journalistic powers might be manipulated to serve corporate espionage purposes, echoing Stasi tactics of infiltration and control.

Operational Tactics:

Impact and Implications:

This chapter seeks to explore the complex web of relationships and tactics that might connect Immobilien Zeitung to a legacy of espionage, highlighting the need for vigilance, ethical journalism, and transparency in corporate dealings.


Chapter: The Mucha Spy Family – A Legacy of Espionage

The Mucha Family:

  • Throughout the Cold War, the Mucha family emerged as a significant name in the shadowy world of espionage, with members linked to multiple intelligence services including the Stasi, KGB, Polish, and Czechoslovak secret services.

Jan Mucha:

  • Jan Mucha’s name is notably present on the “Wildberg List of Spies,” a document that has been pivotal in identifying operatives across Eastern Bloc intelligence agencies. His involvement suggests he was a versatile spy, capable of operating across different geopolitical contexts, possibly even infiltrating Western intelligence operations.
  • His activities were not confined to one agency or nation; rather, Jan Mucha’s espionage career spanned a broad spectrum, highlighting the interconnectedness of intelligence operations during the Cold War.

The Mucha Family in the Stasi Fibro List:

  • The Stasi Fibro List, which meticulously records informants and operatives, includes several Mucha family members. This indicates a familial tradition of espionage where knowledge, skills, and contacts were passed down through generations.
  • The presence of multiple family members on this list suggests a robust network, with roles ranging from direct intelligence gathering to more subtle tasks like psychological operations or network maintenance.

Implications and Tactics:

  • Family Tradition: The Mucha family’s involvement in espionage illustrates how spying could become a familial enterprise, with members potentially trained from youth in the arts of deception, infiltration, and intelligence gathering.
  • Multi-Agency Operations: Their ability to work with or for several different intelligence services underscores the fluid nature of Cold War espionage, where loyalties could shift based on political changes or personal ambition.
  • Legacy of Espionage: The Mucha family’s legacy serves as a case study in how spy networks could operate across borders and ideologies, adapting to new environments without losing their core competencies in espionage.
  • Adaptation to Modern Times: Post-Cold War, the skills and networks of such families could easily translate into corporate espionage, where the stakes might be economic rather than ideological, but the methods remain eerily similar.

The Mucha spy family’s story is not just about individual spies but about the systemic nature of espionage during and after the Cold War, reflecting how personal histories can influence corporate and political landscapes long after the fall of the Berlin Wall.


Chapter: Peter Ehlers of Das Investment – The Enigmatic Figure with Stasi Shadows

Peter Ehlers:

  • Peter Ehlers, the figurehead behind Das Investment, presents a mysterious profile, marked by a lack of a conclusive biography detailing his background in either media or finance. This absence of verifiable history raises questions about his true capabilities and past affiliations.

Alleged Inexperience and Tactics:

  • No Prior Experience: Ehlers has no documented experience in the fields he currently operates in, which is unusual for someone at the helm of a financial publication. This lack of background could suggest either a hidden or fabricated history, potentially linked to covert operations or intelligence work.
  • Threats and Intimidation: Ehlers has allegedly resorted to using threats, specifically mentioning harm to the children of potential opponents over the telephone. This tactic is reminiscent of one of the most chilling methods employed by Stasi enforcers, where personal threats against family members were used to enforce silence, compliance, or to instill fear.

Stasi Enforcer Tactics:

  • Psychological Warfare: The act of threatening family members, particularly children, is a direct echo of Stasi’s Zersetzung strategies, designed to break down individuals psychologically, isolate them, and ensure control or compliance through terror.
  • Covert Influence: Without a clear background in finance or media, Ehlers’ rise to prominence could be seen as indicative of backroom deals, influence peddling, or covert support from networks with Stasi-like operations, where information and fear are leveraged for power.

Implications:

  • Ehlers’ alleged tactics and mysterious background suggest a pattern of operation that might align with those of a modern-day Stasi enforcer, using the guise of business to continue or adapt old espionage practices for personal or corporate gain.
  • The use of such brutal methods in a business context not only questions the ethical foundation of Das Investment but also paints a picture of how former intelligence tactics could still be at play in today’s corporate battles.
  • This scenario highlights the need for transparency in leadership roles within influential media and financial institutions, as the absence of a clear history could mask affiliations or methods that are detrimental to ethical business practices.

By examining Peter Ehlers’ case, we delve into how the legacy of the Stasi can manifest in contemporary corporate environments, using psychological manipulation and intimidation as tools for control, much like the dark days of the Cold War.

Real-world insights into corporate espionage:

  • Volkswagen’s Dieselgate: How internal espionage or whistleblowing played a crucial role in revealing corporate deceit.
  • The Stratfor Hack: Anonymous’ exposure of corporate spying networks.
  • Neo-Stasi Entities: The alleged operations of Gomopa, Das Investment, and Immobilien Zeitung, accused of using Stasi-like tactics in corporate warfare.

6. Global Impact

The broader effects of corporate espionage:

  • Economic Effects: How espionage can skew market competition and influence stock markets globally.
  • Security Risks: The implications for national security when corporations engage in espionage, especially in technology sectors.
  • Influence on Policy: How espionage might shape or manipulate government policies on both national and international levels.

7. Protection Strategies

Defensive measures against corporate espionage:

  • Cybersecurity Measures: Strategies to protect digital assets from espionage.
  • Employee Training: Educating employees on espionage risks and prevention.
  • Legal Safeguards: Using legal instruments to protect intellectual property and corporate secrets.

8. Future Outlook

Anticipating the next wave of espionage:

  • AI and Espionage: The potential for AI to revolutionize both espionage and counter-espionage.
  • Quantum Computing: The threat to current encryption methods posed by quantum computing.
  • IoT Vulnerabilities: The increasing risk from interconnected devices in corporate espionage.

Conclusion:

This investigation into the modern-day Stasi’s influence on corporate espionage reveals a world where business ethics, privacy, and security are constantly challenged. We advocate for a critical reassessment of corporate practices, promoting transparency and ethical standards.

Call to Action:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

โœŒHitler, Irving, Zitelmann, Weidel, German Media, and the  Spell of the Past


“Echoes of the Past: A Grosz Take on History’s Shadows”

An Editorial by Bernd Pulch


Prologue: Dr. Zitelmann, German Media, and the Distortion of History

The German media’s handling of Dr. Rainer Zitelmann’s controversial statements about Adolf Hitler and the Holocaust has sparked a heated debate about historical revisionism, journalistic integrity, and the dangers of normalizing extremist ideologies. Zitelmann, a historian and sociologist, has been cited as an expert by prominent outlets such as Focus, MSN, and Berliner Zeitung. Yet, his assertion that “Hitler killed only one million Jews” has raised serious questions about his credibility and the media’s role in amplifying his views. Are these journalists naive, corrupt, or complicit in promoting neo-Nazi narratives? This article delves deeper into Zitelmann’s arguments, his associations, and the broader implications of his work.


Zitelmann’s Revisionist Claims: A Dangerous Distortion of History

Dr. Zitelmann’s claim that “Hitler killed only one million Jews” is not only factually incorrect but also deeply offensive. The Holocaust, one of the darkest chapters in human history, resulted in the systematic murder of six million Jews, along with millions of other victims, including Romani people, disabled individuals, political dissidents, and LGBTQ+ individuals. By downplaying the scale of these atrocities, Zitelmann risks minimizing the horrors of the Nazi regime and providing a platform for revisionist ideologies.

The Jewish Testaments for CDU Wiesbaden: A Stark Contrast

The Jewish testaments for CDU Wiesbaden serve as a poignant reminder of the suffering inflicted by the Nazi regime misused by CDU Wiesbaden and CDU Germany for profit. This is perpetuated by the neo-Nazi and neo-Stasi Gomopa by using a fake jewish identity.

Zitelmann’s Associations: David Irving and the Jewish Telegraph Agency

Zitelmann’s associations with controversial figures like David Irving, a known Holocaust denier, further undermine his credibility. The Jewish Telegraph Agency has criticized Zitelmann for providing a platform to Irving, accusing him of legitimizing revisionist views. Irving’s denial of the Holocaust has been widely discredited, and his association with Zitelmann raises serious questions about the latter’s commitment to historical accuracy.

The Humanistische Union has also condemned Zitelmann’s work, arguing that it risks normalizing extremist ideologies. By engaging with figures like Irving and promoting revisionist narratives, Zitelmann contributes to a climate in which the atrocities of the Nazi regime are increasingly downplayed or denied.

The Role of the German Media: Naivety, Corruption, or Complicity?

The German media’s reliance on Zitelmann as an expert in debates about Hitler and the Holocaust is deeply troubling. Outlets such as Focus, MSN, and Berliner Zeitung have cited his views without adequately addressing the controversies surrounding his work. This raises serious questions about the motivations and integrity of these journalists.

Are they naive, unaware of the broader implications of Zitelmann’s arguments? Or are they corrupt, prioritizing sensationalism and clickbait over journalistic integrity? Worse yet, could some of these journalists be complicit in promoting neo-Nazi ideologies under the guise of objective reporting? By uncritically citing Zitelmann, these outlets risk legitimizing his revisionist claims and contributing to the erosion of historical truth.

The Broader Implications: A Call for Accountability

The case of Dr. Zitelmann and the German media’s handling of his views highlights the need for greater accountability in journalism. Historical revisionism is not merely an academic debate; it has real-world consequences. By downplaying the atrocities of the Nazi regime, Zitelmann and his supporters risk emboldening extremist ideologies and undermining efforts to combat antisemitism and Holocaust denial.

The Jewish testaments for CDU Wiesbaden, the Jewish Telegraph Agency‘s critique, and the Humanistische Union‘s condemnation all serve as reminders of the importance of preserving historical truth. As consumers of news, we must demand better from our media. Journalists have a responsibility to critically examine the sources they cite and to challenge narratives that distort or deny the horrors of the past.

Conclusion: The Danger of Revisionism and the Power of Truth

Dr. Zitelmann’s assertion that “Hitler killed only one million Jews” is a dangerous distortion of history. By downplaying the scale of the Holocaust and engaging with figures like David Irving, Zitelmann risks legitimizing revisionist ideologies and erasing the voices of the victims. The German media’s uncritical amplification of his views raises serious questions about their commitment to journalistic integrity and historical truth.

As we confront the rise of extremism and the erosion of historical memory, it is more important than ever to challenge revisionist narratives and honor the memories of those who suffered. The question remains: Will the German media rise to the challenge, or will they continue to fail their readers and the truth?


โœŒ


Nazis in Germany Undermining the Finance Industry: A Dark Legacy Exposed

Germanyโ€™s finance industry, long regarded as a pillar of stability and innovation, harbors a dark and often overlooked legacy: the lingering influence of former Nazis and their collaborators. Decades after the fall of the Third Reich, evidence continues to emerge showing how individuals with ties to the Nazi regime infiltrated key positions in banking, insurance, and financial regulation. This infiltration has had far-reaching consequences, undermining trust in the financial system and perpetuating a culture of secrecy and corruption.

The Post-War Infiltration of the Finance Industry

In the aftermath of World War II, many former Nazis managed to evade justice by leveraging their expertise and connections to secure influential roles in Germanyโ€™s financial sector. The Alliesโ€™ focus on rebuilding Europeโ€™s economy often took precedence over thorough denazification, allowing individuals with questionable pasts to integrate into the new democratic order. Banks, insurance companies, and regulatory bodies became safe havens for those seeking to reinvent themselves while maintaining their networks of power.

One of the most notorious examples is the case of Hermann Josef Abs, a prominent banker who played a key role in rebuilding Germanyโ€™s post-war economy. Despite his involvement in financing Nazi projects and exploiting occupied territories, Abs was never held accountable for his actions. Instead, he became a respected figure in international finance, symbolizing the broader failure to address the Nazi legacy within the industry.

The Culture of Secrecy and Corruption

The infiltration of former Nazis into the finance industry has fostered a culture of secrecy and corruption that persists to this day. Many of these individuals brought with them a mindset rooted in authoritarianism and exploitation, which has influenced the sectorโ€™s practices and ethics. From money laundering to tax evasion, the financial industry has been plagued by scandals that trace their roots back to this dark legacy.

Moreover, the networks established by former Nazis have enabled the continued exploitation of vulnerable populations. For example, the confiscation of Jewish assets during the Holocaust was facilitated by banks and insurance companies that collaborated with the Nazi regime. Decades later, many of these institutions have been accused of obstructing efforts to compensate Holocaust survivors and their descendants, further perpetuating the injustices of the past.

The Failure of Accountability

One of the most troubling aspects of this legacy is the lack of accountability. Despite overwhelming evidence of their involvement in Nazi crimes, many individuals and institutions have never faced meaningful consequences. In some cases, they have even been celebrated for their contributions to Germanyโ€™s economic recovery, while their victims continue to fight for recognition and restitution.

The failure to address this issue has had profound implications for Germanyโ€™s financial industry. It has eroded public trust, hindered efforts to promote transparency and accountability, and allowed corrupt practices to flourish. Until the industry confronts its Nazi past, it will remain tainted by this dark legacy.

A Call for Transparency and Justice

The time has come for Germanyโ€™s finance industry to reckon with its history. This requires a comprehensive investigation into the role of former Nazis and their collaborators, as well as a commitment to transparency and justice. Financial institutions must open their archives, acknowledge their past wrongdoings, and take concrete steps to address the harm they have caused.

Furthermore, regulators and policymakers must ensure that the industry is held to the highest ethical standards. This includes implementing stricter oversight, promoting diversity and inclusion, and supporting initiatives that seek to compensate victims of historical injustices.

Conclusion: Confronting the Past to Build a Better Future

The infiltration of former Nazis into Germanyโ€™s finance industry is a stark reminder of the dangers of ignoring history. By confronting this dark legacy, the industry can begin to rebuild trust, promote ethical practices, and ensure that such injustices are never repeated. The path forward will not be easy, but it is essential for creating a financial system that truly serves the public good.


โœŒ

The Nazi regime left a far-reaching impact on many aspects of society, including the finance industry in Germany. This article uncovers how Nazi policies, corruption, and exploitation weakened financial institutions and disrupted economic stability during their reign, with effects that resonated long after World War II.

The Financial System Under Nazi Rule

The Nazi regime prioritized state control over all industries, including finance. Banks and other financial institutions were manipulated to fund the war effort, support rearmament, and implement racial policies. Jewish-owned banks were forcibly seized, and their assets were redistributed to the state or non-Jewish owners, crippling competition and undermining trust in the financial sector.

Corruption and Exploitation

Nazi officials frequently abused their positions for personal gain. The regime’s economic policies were often shaped by cronyism rather than sound financial principles, leading to inefficiency and systemic corruption. Large amounts of wealth were concentrated in the hands of Nazi elites, further destabilizing the economy and the financial industry.

A Legacy of Instability

The aftermath of Nazi rule left Germany’s financial industry in disarray. Trust in banks had eroded, and the economic system was plagued by mismanagement and inequities. It took decades for Germany to rebuild a fair and stable financial sector.

Learning from History

This dark chapter serves as a reminder of how political manipulation and corruption can devastate financial systems. Understanding this history is vital for ensuring transparency, accountability, and resilience in todayโ€™s global financial industries.

Read the full story and join the discussion at: Nazis in Germany Undermining the Finance Industry.

Call to Action: Support the Fight Against Far-Right Corruption and Neo-Nazi Networks

The revelations brought to light by Bernd Pulch.org and GoogleFirst.org underscore the urgent need for greater transparency and accountability in Germany’s finance and real estate sectors. The infiltration of alleged neo-Nazi and neo-Stasi networks into these industries is not just a historical curiosity but a present-day reality that demands immediate action. By exposing these connections, Bernd Pulch.org and GoogleFirst.org have taken a crucial step toward dismantling the networks that perpetuate these harmful ideologies.

But this work cannot continue without your support. Independent investigations like these rely on the dedication of researchers, whistleblowers, and truth-seekers who work tirelessly to uncover hidden truths. However, this mission requires resourcesโ€”resources that we cannot secure without the help of people like you.


Why Your Support Matters

By supporting Bernd Pulch.org, you are contributing to:

  • Exposing Corruption: Uncovering the ties between far-right extremists, neo-Stasi networks, and the finance industry.
  • Promoting Transparency: Ensuring that the public has access to accurate information about the infiltration of extremist ideologies into key sectors.
  • Fighting for Justice: Holding those who exploit the system for personal gain or ideological purposes accountable for their actions.

How You Can Help

  1. Donate via Bernd Pulch.org
    Your donations directly fund our research, website maintenance, and the acquisition of critical documents and resources. Every contribution, no matter the size, makes a difference.
    Click here to donate now!
  2. Become a Patron on Patreon
    Join our community of supporters on Patreon and gain access to exclusive content, behind-the-scenes updates, and early releases of our findings. Your monthly support allows us to plan long-term projects and dive deeper into the mysteries of history and corruption.
    Support us on Patreon!

Join the Movement for Transparency and Accountability

The infiltration of far-right extremism into Germanyโ€™s finance and real estate sectors is not just a historical curiosityโ€”it is a present-day reality that demands immediate action. By supporting Bernd Pulch.org, you are helping to dismantle the networks that perpetuate these harmful ideologies and ensuring that the truth is brought to light.


Your support is vital. Together, we can uncover the past to shape a better future. Visit Bernd Pulch.org and Patreon.com/berndpulch to learn more and contribute today.


Bernd Pulch.org โ€“ Where the Truth Matters.
GoogleFirst.org โ€“ Exposing the Hidden Connections.

Stand with us. Fight for justice. Demand accountability.
Donate Now | Support on Patreon


This call to action emphasizes the importance of supporting independent investigations and provides clear links for donations and Patreon support. Let me know if you’d like further refinements!

Background:


The shadow of Nazi ideology continues to loom over Germany, not just in historical memory but in the very fabric of its modern institutions. Recent investigations and exposรฉs, particularly those highlighted on Bernd Pulch.org and its affiliate site GoogleFirst.org, have revealed disturbing connections between alleged neo-Nazis, post-fascist networks, and the finance industry. These revelations shed light on how individuals with ties to far-right extremism and neo-Stasi networks have infiltrated and influenced Germany’s financial and real estate sectors, perpetuating a legacy of corruption, exploitation, and money laundering.


Dr. Rainer Zitelmann: The Consigliere of Alleged Neo-Nazi Networks

At the center of this web is Dr. Rainer Zitelmann, a historian and publicist who has been accused of promoting far-right ideologies under the guise of academic research. Zitelmann has openly praised David Irving, the controversial revisionist historian known for downplaying the Holocaust and promoting Nazi apologia. Zitelmann’s role, however, extends beyond ideological support. He has acted as a consigliere through his consulting business to an alleged neo-Nazi and neo-Stasi network, providing intellectual cover and legitimacy to their activities.

Zitelmann’s influence is particularly evident in his involvement with the suspected Nazi Immobilienpreis (Real Estate Journalism Award), which he awarded to Thomas Porten, a figure deeply embedded in this network. Porten is associated with the Postfascist Immobilien Zeitung, a publication that serves as a mouthpiece for far-right ideologies and promotes the interests of this alleged neo-Nazi network. Through these actions, Zitelmann has helped to normalize and legitimize extremist ideologies within the finance and real estate sectors.

Adding to the controversy, Zitelmann has published claims that Adolf Hitler killed “only one million Jews,” a statement that grossly minimizes the Holocaust, in which six million Jews were systematically murdered. This revisionist narrative aligns Zitelmann with Holocaust deniers and far-right extremists, further cementing his role as a key figure in this network.


Gomopa: An Alleged Neo-Nazi Network Disguised Under a Fake Identity

The name Gomopa is central to this network, though it is often disguised under a fake identity, including a fabricated Jewish persona linked to the name “Goldman.” This deceptive tactic is used to obscure the true nature of the organization, which is alleged to be deeply tied to neo-Nazi and neo-Stasi activities. Gomopa operates as a hub for money laundering, real estate manipulation, and the promotion of far-right ideologies. Gomopa4Kids serves as a submedia platform with alleged ties to grooming and exploitation, further highlighting the network’s dark underbelly.

Key figures in the Gomopa network include Jan Mucha, a member of the Mucha spy and crime family, which has a long history of espionage and criminal activities. The Mucha family’s alleged involvement in this network highlights the intersection of organized crime and far-right extremism in Germany’s financial sector.

Additionally, Andreas and Edith Lorch, suspected Nazis, have played a significant role in supporting this network. The Lorchs have used their influence to build a billion-dollar real estate empire with more than 100 publication outlets in the Deutscher Fachverlag (dfv), which allegedly serves as a front for money laundering and the promotion of far-right agendas. Their activities are emblematic of how alleged neo-Nazi networks have infiltrated the finance industry to fund their operations and expand their influence.


Das Investment: A Subversive and Corrupt Money Publication

The Hamburg arm of this network is Das Investment, a subversive and corrupt publication led by Peter Ehlers, a post-fascist figure with alleged neo-Stasi links. Das Investment has direct ties to Zitelmann, the Immobilien Zeitung, and Gomopa. Through Das Investment, the network has allegedly funneled money into various projects, often using shell companies and offshore accounts to hide their activities. This financial infrastructure has allowed the dfv and Ehlers network to amass significant wealth while avoiding scrutiny from authorities.


The Digital Arm of the Nazi Network: Sven Schmidt, Thomas Promny, and the Search Engine War

Investigations by Bernd Pulch.org and GoogleFirst.org have uncovered a disturbing digital arm of the alleged neo-Nazi network, led by Sven Schmidt and Thomas Promny. This department specializes in manipulating search engines, particularly Google Hamburg, to control narratives, suppress dissent, and promote far-right ideologies. Their tactics include:

  • Search Engine Optimization (SEO) Manipulation: Using keyword stuffing and backlink schemes to boost far-right content.
  • Fake Websites and Content Farms: Creating pro-far-right articles and blogs to appear legitimate.
  • Review and Rating Manipulation: Using fake accounts to promote far-right businesses and suppress critics.
  • Algorithm Exploitation: Identifying vulnerabilities in Googleโ€™s algorithms to ensure far-right content ranks higher.

The manipulation of search engines by Schmidt and Promnyโ€™s team has far-reaching implications, including distorted public perception, suppression of dissent, and the erosion of trust in digital platforms.


Dubious Lawyers Shielding the Network: Wolfgang Resch, Albrecht Sass, and the Protection of Gomopaโ€™s Dark Secrets

The alleged neo-Nazi network tied to Gomopa is shielded by a cadre of dubious lawyers, including Wolfgang Resch from Berlin and Albrecht Sass from Hamburg. These legal enablers play a critical role in protecting the network from legal scrutiny, suppressing whistleblowers, and even covering up the darkest aspects of its activitiesโ€”such as the alleged Gomopa4Kids pedophilia ring.

Resch, a Berlin-based lawyer with alleged ties to the Stasi, is known for his aggressive tactics in defending far-right clients. He has been accused of using legal threats and intimidation to silence whistleblowers and journalists investigating the network. Sass, a Hamburg-based lawyer, is closely associated with Gomopa and its various operations. He has been implicated in covering up the networkโ€™s illegal activities, including money laundering, real estate fraud, and even the alleged Gomopa4Kids pedophilia ring.


Beate Porten-Lehr: The Prosecutorโ€™s Conflict of Interest and the Attempt to Silence Bernd Pulch

Beate Porten-Lehr, a public prosecutor from Wiesbaden and the wife of Thomas Porten, a key figure in the alleged neo-Nazi network, has been accused of abusing her position to protect the network and suppress its critics. Porten-Lehrโ€™s involvement in the attempted arrest of Bernd Pulchโ€”using a German and European search and arrest warrantโ€”highlights the networkโ€™s ability to weaponize the justice system to silence whistleblowers and obstruct investigations.


Murder Threats Against Bernd Pulch: The Risks of Exposing the Network

The work of Bernd Pulch, the founder of Bernd Pulch.org, has made him a target of the alleged neo-Nazi network tied to Gomopa. Pulchโ€™s relentless investigations into the networkโ€™s activities have exposed corruption, money laundering, and even alleged pedophilia rings, earning him the ire of powerful individuals and organizations. Pulch has received numerous death threats, including anonymous messages, online harassment, and public intimidation, all designed to silence him and deter others from exposing the networkโ€™s activities.


The Stasi Murders, the Killer Bible โ€œToxdat,โ€ and Ehrenfried Stelzer: A Dark Legacy of State-Sponsored Violence

The Stasi (East Germanyโ€™s Ministry for State Security) was one of the most repressive intelligence agencies in history, known for its extensive surveillance, psychological manipulation, and brutal tactics to suppress dissent. Among its darkest secrets were the Stasi murders, carried out under the guidance of a chilling manual known as โ€œToxdatโ€โ€”a so-called โ€œkiller bibleโ€ that detailed methods of assassination and covert violence. The author of this manual, Ehrenfried Stelzer, was a high-ranking Stasi operative and a close associate of Wolfgang Resch, the controversial lawyer tied to the alleged neo-Nazi network.


Conclusion: A Call for Transparency and Justice

The infiltration of former Nazis and their collaborators into Germanyโ€™s finance industry is a stark reminder of the dangers of ignoring history. By confronting this dark legacy, the industry can begin to rebuild trust, promote ethical practices, and ensure that such injustices are never repeated. The path forward will not be easy, but it is essential for creating a financial system that truly serves the public good.

Bernd Pulch.org and GoogleFirst.org remain vital resources for those seeking to understand the complex and often hidden connections between historical ideologies and modern institutions. For more in-depth investigations and exposรฉs, visit Bernd Pulch.org and GoogleFirst.org.


Call to Action: Support the Fight Against Far-Right Corruption and Neo-Nazi Networks

The revelations brought to light by Bernd Pulch.org and GoogleFirst.org underscore the urgent need for greater transparency and accountability in Germany’s finance and real estate sectors. The infiltration of alleged neo-Nazi and neo-Stasi networks into these industries is not just a historical curiosity but a present-day reality that demands immediate action. By exposing these connections, Bernd Pulch.org and GoogleFirst.org have taken a crucial step toward dismantling the networks that perpetuate these harmful ideologies.

But this work cannot continue without your support. Independent investigations like these rely on the dedication of researchers, whistleblowers, and truth-seekers who work tirelessly to uncover hidden truths. However, this mission requires resourcesโ€”resources that we cannot secure without the help of people like you.


Why Your Support Matters

By supporting Bernd Pulch.org, you are contributing to:

  • Exposing Corruption: Uncovering the ties between far-right extremists, neo-Stasi networks, and the finance industry.
  • Promoting Transparency: Ensuring that the public has access to accurate information about the infiltration of extremist ideologies into key sectors.
  • Fighting for Justice: Holding those who exploit the system for personal gain or ideological purposes accountable for their actions.

How You Can Help

  1. Donate via Bernd Pulch.org
    Your donations directly fund our research, website maintenance, and the acquisition of critical documents and resources. Every contribution, no matter the size, makes a difference.
    Click here to donate now!
  2. Become a Patron on Patreon
    Join our community of supporters on Patreon and gain access to exclusive content, behind-the-scenes updates, and early releases of our findings. Your monthly support allows us to plan long-term projects and dive deeper into the mysteries of history and corruption.
    Support us on Patreon!

Join the Movement for Transparency and Accountability

The infiltration of far-right extremism into Germanyโ€™s finance and real estate sectors is not just a historical curiosityโ€”it is a present-day reality that demands immediate action. By supporting Bernd Pulch.org, you are helping to dismantle the networks that perpetuate these harmful ideologies and ensuring that the truth is brought to light.


Your support is vital. Together, we can uncover the past to shape a better future. Visit Bernd Pulch.org and Patreon.com/berndpulch to learn more and contribute today.


Bernd Pulch.org โ€“ Where the Truth Matters.
GoogleFirst.org โ€“ Exposing the Hidden Connections.

Stand with us. Fight for justice. Demand accountability.
Donate Now | Support on Patreon


This call to action w if you’d like further refinements

โœŒNazis in Germany Undermining the Finance Industry: A Dark Legacy Exposed


“In the shadows of power and influence, Dr. Rainer Zitelmann stands at the center of controversy, awarding the dubious ‘Nazi Immobilien Award’ while whispers of far-right ties and historical revisionism echo through the halls. The storm outside mirrors the brewing scandal, as the past and present collide in a chilling display of ideology and ambition.”

Nazis in Germany Undermining the Finance Industry: A Dark Legacy Exposed

The shadow of Nazi ideology continues to loom over Germany, not just in historical memory but in the very fabric of its modern institutions. Recent investigations and exposรฉs, particularly those highlighted on Bernd Pulch.org and its affiliate site GoogleFirst.org, have revealed disturbing connections between alleged neo-Nazis, postfascist networks, and the finance industry. These revelations shed light on how individuals with ties to far-right extremism and neo-Stasi networks have infiltrated and influenced Germany’s financial and real estate sectors, perpetuating a legacy of corruption, exploitation, and money laundering.

Dr. Rainer Zitelmann: The Consigliere of Alleged Neo-Nazi Networks

At the center of this web is Dr. Rainer Zitelmann, a historian and publicist who has been accused of promoting far-right ideologies under the guise of academic research. Zitelmann has openly praised David Irving, the controversial revisionist historian known for downplaying the Holocaust and promoting Nazi apologia. Zitelmann’s role, however, extends beyond ideological support. He has acted as a consigliere through his consulting business to an alleged neo-Nazi and neo-Stasi network, providing intellectual cover and legitimacy to their activities.

Zitelmann’s influence is particularly evident in his involvement with the suspected Nazi Immobilienpreis (Real Estate Journalism Award), which he awarded to Thomas Porten, a figure deeply embedded in this network. Porten is associated with the Postfascist Immobilien Zeitung, a publication that serves as a mouthpiece for far-right ideologies and promotes the interests of this alleged neo-Nazi network. Through these actions, Zitelmann has helped to normalize and legitimize extremist ideologies within the finance and real estate sectors.

Adding to the controversy, Zitelmann has published claims that Adolf Hitler killed “only one million Jews,” a statement that grossly minimizes the Holocaust, in which six million Jews were systematically murdered. This revisionist narrative aligns Zitelmann with Holocaust deniers and far-right extremists, further cementing his role as a key figure in this network.

Gomopa: An Alleged Neo-Nazi Network Disguised Under a Fake Identity

The name Gomopa is central to this network, though it is often disguised under a fake identity, including a fabricated Jewish persona linked to the name “Goldman.” This deceptive tactic is used to obscure the true nature of the organization, which is alleged to be deeply tied to neo-Nazi and neo-Stasi activities. Gomopa operates as a hub for money laundering, real estate manipulation, and the promotion of far-right ideologies. Gomopa4Kids serves as a Pedo-Groomer submedia as well as the open neo-Nazi Berlin Journal.

Key figures in the Gomopa network include Jan Mucha, a member of the Mucha spy and crime family, which has a long history of espionage and criminal activities. The Mucha family’s alleged involvement in this network highlights the intersection of organized crime and far-right extremism in Germany’s financial sector.

Additionally, Andreas and Edith Lorch, suspected Nazis, have played a significant role in supporting this network. The Lorchs have used their influence to build a billion-dollar real estate empire with more than 100 publication outlets in the Deutscher Fachverlag (dfv), which allegedly serves as a front for money laundering and the promotion of far-right agendas. Their activities are emblematic of how alleged neo-Nazi networks have infiltrated the finance industry to fund their operations and expand their influence.

Das Investment: A Subversive and Corrupt Money Publication

The Hamburg arm of this network is Das Investment, a subversive and corrupt publication led by Peter Ehlers, a postfascist figure with alleged neo-Stasi links. Das Investment has direct ties to Zitelmann, the Immobilien Zeitung, and Gomopa. Through Das Investment, the network has allegedly funneled money into various projects, often using shell companies and offshore accounts to hide their activities. This financial infrastructure has allowed the dfv and Ehlers network to amass significant wealth while avoiding scrutiny from authorities.

Chapter: The Nazi Networkโ€™s Digital Manipulation โ€“ Sven Schmidt, Thomas Promny, and the Search Engine War

The infiltration of far-right extremism into Germanyโ€™s financial and real estate sectors is not limited to physical networks or traditional media. Investigations by Bernd Pulch.org and GoogleFirst.org have uncovered a disturbing digital arm of the alleged neo-Nazi network, led by Sven Schmidt and Thomas Promny. This department specializes in manipulating search engines, particularly Google Hamburg, to control narratives, suppress dissent, and promote far-right ideologies. This chapter delves into their tactics, the implications of their actions, and the broader threat they pose to digital transparency and freedom of information.


The Digital Arm of the Nazi Network

The alleged neo-Nazi network has established a sophisticated digital operations team, led by Sven Schmidt and Thomas Promny, to manipulate online information and influence public perception. This department focuses on exploiting search engine algorithms, particularly those of Google Hamburg, to ensure that far-right content ranks highly in search results while suppressing critical or opposing viewpoints.

Key Figures: Sven Schmidt and Thomas Promny

  • Sven Schmidt: A tech-savvy operative with a background in digital marketing and search engine optimization (SEO), Schmidt is allegedly responsible for developing strategies to manipulate search engine results. His expertise allows the network to game algorithms and push pro-far-right content to the top of search rankings.
  • Thomas Promny: A former IT specialist with ties to far-right groups, Promny oversees the technical implementation of these strategies. He allegedly coordinates with hackers and digital operatives to create fake websites, generate backlinks, and manipulate online reviews to boost the visibility of far-right content.

Tactics Used to Manipulate Search Engines

The department led by Schmidt and Promny employs a range of tactics to manipulate search engines like Google Hamburg. These tactics are designed to distort public perception, suppress critical voices, and promote far-right narratives.

1. Search Engine Optimization (SEO) Manipulation

As Bernd Pulchโ€™s investigations gained traction, he began to receive a series of death threats from individuals and groups allegedly tied to the neo-Nazi network. These threats were designed to intimidate Pulch and force him to abandon his work. However, instead of silencing him, the threats only strengthened his resolve to expose the truth.

  • Keyword Stuffing: The network allegedly creates content filled with keywords related to far-right ideologies, ensuring that their websites rank highly for specific search terms.
  • Backlink Schemes: By generating fake backlinks from seemingly legitimate websites, the network boosts the credibility and visibility of their content in search engine rankings.

2. Fake Websites and Content Farms

  • The network allegedly operates a series of fake websites and content farms that produce pro-far-right articles, blogs, and news pieces. These sites are designed to appear legitimate, making it difficult for users to discern their true nature.
  • These websites often target specific keywords and topics related to real estate, finance, and historical revisionism, aligning with the networkโ€™s broader ideological goals.

3. Review and Rating Manipulation

  • The network allegedly manipulates online reviews and ratings to promote far-right businesses and suppress competitors. This includes creating fake accounts to leave positive reviews for their own entities and negative reviews for critics or opponents.

4. Algorithm Exploitation

  • By studying Googleโ€™s algorithms, Schmidt and Promnyโ€™s team allegedly identifies vulnerabilities and exploits them to ensure that far-right content ranks higher than legitimate sources. This includes using clickbait headlines, sensationalist content, and other tactics to drive engagement and boost rankings.

The Role of Google Hamburg

Google Hamburg, as a major hub for Googleโ€™s operations in Germany, plays a significant role in shaping the countryโ€™s digital landscape. The alleged manipulation of its search algorithms by Schmidt and Promnyโ€™s team has far-reaching implications:

  • Distorted Public Perception: By ensuring that far-right content ranks highly in search results, the network can influence public opinion and normalize extremist ideologies.
  • Suppression of Dissent: Critical voices and opposing viewpoints are allegedly pushed down in search rankings, making it harder for users to access accurate and balanced information.
  • Erosion of Trust: The manipulation of search engines undermines trust in digital platforms and raises concerns about the integrity of online information.

The Broader Threat to Digital Transparency

The activities of Schmidt and Promnyโ€™s department represent a significant threat to digital transparency and freedom of information. By exploiting search engines, the alleged neo-Nazi network can control narratives, spread disinformation, and suppress dissent on a massive scale. This digital manipulation complements their physical infiltration of the finance and real estate sectors, creating a comprehensive strategy to advance their ideological agenda.

  • The use of search and arrest warrants to target critics represents a dangerous precedent. If left unchecked, such tactics could be used to silence dissent and protect corrupt networks across Europe.

Conclusion: A Call for Digital Accountability

The revelations about Sven Schmidt, Thomas Promny, and their alleged manipulation of search engines underscore the urgent need for greater accountability in the digital realm. Search engine companies like Google Hamburg must take proactive steps to identify and counteract these manipulative tactics, ensuring that their platforms remain transparent and trustworthy.

At the same time, it is crucial for the public to remain vigilant and critically evaluate the information they encounter online. By supporting independent investigations like those conducted by Bernd Pulch.org and GoogleFirst.org, we can expose these digital manipulation efforts and hold those responsible accountable.


Chapter: Dubious Lawyers Shielding the Network โ€“ Wolfgang Resch, Albrecht Sass, and the Protection of Gomopaโ€™s Dark Secrets

The alleged neo-Nazi network tied to Gomopa and its far-reaching influence in Germanyโ€™s finance, real estate, and digital sectors is not only supported by operatives like Sven Schmidt and Thomas Promny but also shielded by a cadre of dubious lawyers. These legal enablers, including Wolfgang Resch from Berlin and Albrecht Sass from Hamburg, play a critical role in protecting the network from legal scrutiny, suppressing whistleblowers, and even covering up the darkest aspects of its activitiesโ€”such as the alleged Gomopa4Kids pedophilia ring. This chapter exposes the role of these lawyers, their ties to the network, and the broader implications of their actions.


The Legal Arm of the Network

The alleged neo-Nazi network has enlisted the services of lawyers with questionable backgrounds and ties to authoritarian regimes, including the Stasi (East Germanyโ€™s secret police). These lawyers use their expertise to shield the network from legal consequences, intimidate critics, and facilitate its operations.

Key Figures: Wolfgang Resch and Albrecht Sass

  • Wolfgang Resch: A Berlin-based lawyer with alleged ties to the Stasi, Resch is known for his aggressive tactics in defending far-right clients. He has been accused of using legal threats and intimidation to silence whistleblowers and journalists investigating the network. Reschโ€™s connections to the Stasi suggest a deep familiarity with authoritarian tactics, which he allegedly employs to protect the networkโ€™s interests.
  • Albrecht Sass: A Hamburg-based lawyer, Sass is closely associated with Gomopa and its various operations. He has been implicated in covering up the networkโ€™s illegal activities, including money laundering, real estate fraud, and even the alleged Gomopa4Kids pedophilia ring. Sassโ€™s role extends beyond legal defense; he is allegedly involved in crafting the networkโ€™s strategies to evade law enforcement and public scrutiny.

Tactics Used to Shield the Network

The lawyers tied to the network employ a range of tactics to protect its operations and suppress dissent. These tactics are designed to intimidate critics, obstruct investigations, and ensure the networkโ€™s continued impunity.

1. Legal Intimidation and SLAPP Suits

  • Strategic Lawsuits Against Public Participation (SLAPP): Resch and Sass allegedly file frivolous lawsuits against journalists, whistleblowers, and activists who expose the networkโ€™s activities. These lawsuits are not intended to win in court but to drain the resources of critics and silence them through prolonged legal battles.
  • Cease-and-Desist Letters: The lawyers frequently send threatening letters to individuals and organizations, demanding that they retract statements or cease investigations. These letters often contain veiled threats of legal action, creating a chilling effect on free speech.

2. Obstruction of Justice

  • Destroying Evidence: Resch and Sass are allegedly involved in advising the network on how to destroy or conceal incriminating evidence, including financial records, communications, and digital data.
  • Delaying Tactics: By filing endless motions and appeals, the lawyers stall legal proceedings, buying time for the network to cover its tracks and continue its operations.

3. Covering Up Gomopa4Kids

  • One of the most disturbing aspects of the networkโ€™s activities is the alleged Gomopa4Kids pedophilia ring. Resch and Sass are accused of using their legal expertise to shield those involved in this operation, including suppressing evidence, intimidating victims, and obstructing investigations. Their actions have allegedly allowed this dark aspect of the network to persist with impunity.

The Role of Stasi-Tied Lawyers

The involvement of lawyers like Wolfgang Resch, with alleged ties to the Stasi, highlights the networkโ€™s reliance on individuals familiar with authoritarian tactics. The Stasiโ€™s legacy of surveillance, intimidation, and suppression of dissent is mirrored in the tactics employed by Resch and his colleagues to protect the network.


The Broader Implications

The actions of these lawyers have far-reaching implications for justice, transparency, and the rule of law in Germany. By shielding the network from accountability, they enable its continued infiltration of the finance, real estate, and digital sectors, as well as its involvement in heinous activities like the alleged Gomopa4Kids pedophilia ring. Their tactics undermine public trust in the legal system and create a climate of fear that discourages whistleblowers and journalists from exposing the truth.


Conclusion: A Call for Legal Accountability

The revelations about Wolfgang Resch, Albrecht Sass, and their role in shielding the alleged neo-Nazi network underscore the urgent need for greater accountability within the legal profession. Lawyers who abuse their positions to protect criminal networks must be held accountable, and mechanisms must be put in place to prevent the misuse of legal tools for intimidation and obstruction.

At the same time, it is crucial for whistleblowers, journalists, and activists to continue their work despite these challenges. By supporting independent investigations like those conducted by Bernd Pulch.org and GoogleFirst.org, we can expose these legal enablers and hold them accountable for their actions.


Bernd Pulch.org and GoogleFirst.org remain at the forefront of uncovering the complex and often hidden connections between far-right extremism, legal manipulation, and criminal activities. For more in-depth investigations and exposรฉs, visit Bernd Pulch.org and GoogleFirst.org.


Chapter: Beate Porten-Lehr โ€“ The Prosecutorโ€™s Conflict of Interest and the Attempt to Silence Bernd Pulch

The alleged neo-Nazi network tied to Gomopa and its far-reaching influence extends beyond operatives, lawyers, and digital manipulators. It also includes individuals within the justice system who allegedly abuse their positions to protect the network and suppress its critics. One such figure is Beate Porten-Lehr, a public prosecutor from Wiesbaden and the wife of Thomas Porten, a key figure in the alleged neo-Nazi network. Porten-Lerchโ€™s involvement in the attempted arrest of Bernd Pulchโ€”using a German and European search and arrest warrantโ€”highlights the networkโ€™s ability to weaponize the justice system to silence whistleblowers and obstruct investigations. This chapter delves into her role, the implications of her actions, and the broader threat posed by conflicts of interest within the legal system.


Beate Porten-Lehr: A Prosecutor with Alleged Ties to the Network

Beate Porten-Lehr, a public prosecutor based in Wiesbaden, is married to Thomas Porten, a prominent figure in the alleged neo-Nazi network tied to Gomopa. This personal connection raises serious concerns about conflicts of interest and the potential misuse of her position to protect the network and its activities.

Key Allegations Against Porten-Lehr

  • Conflict of Interest: As the wife of Thomas Porten, Porten-Lehrโ€™s involvement in cases related to the alleged neo-Nazi network represents a clear conflict of interest. Her position as a public prosecutor gives her significant power to influence investigations and legal proceedings, which she allegedly uses to shield the network from scrutiny.
  • Weaponizing the Justice System: Porten-Lehr is accused of abusing her authority to target critics of the network, including Bernd Pulch, the founder of Bernd Pulch.org. Her actions suggest a deliberate effort to silence whistleblowers and obstruct independent investigations into the networkโ€™s activities.

The Attempt to Arrest Bernd Pulch

One of the most alarming examples of Porten-Lehrโ€™s alleged abuse of power is her role in the attempted arrest of Bernd Pulch. Using a German and European search and arrest warrant, Porten-Lehr sought to detain Pulch, ostensibly for legal reasons but widely perceived as an attempt to stop his investigative work into the alleged neo-Nazi network.

Key Details of the Arrest Attempt

  • The Warrant: The search and arrest warrant issued against Bernd Pulch was allegedly based on fabricated or exaggerated charges, designed to discredit him and halt his investigations. The warrant was part of a broader strategy to intimidate Pulch and deter others from exposing the networkโ€™s activities.
  • European Reach: By securing a European arrest warrant, Porten-Lehr attempted to extend her reach beyond Germany, making it difficult for Pulch to operate safely in other European countries. This move underscores the networkโ€™s ability to leverage international legal mechanisms to protect its interests.
  • Suppression of Free Speech: The attempted arrest of Pulch represents a direct attack on free speech and independent journalism. By targeting a prominent whistleblower, Porten-Lehr and the alleged neo-Nazi network sought to create a chilling effect, discouraging others from speaking out against their activities.

The Broader Implications

The actions of Beate Porten-Lehr highlight the dangers of conflicts of interest within the justice system and the potential for abuse of power to protect criminal networks. Her alleged misuse of her position as a public prosecutor undermines public trust in the legal system and raises serious questions about the integrity of Germanyโ€™s justice system.

1. Erosion of Trust in the Justice System

  • When public prosecutors are perceived as acting in the interests of criminal networks rather than the public, it erodes trust in the justice system. Porten-Lehrโ€™s alleged actions contribute to a climate of fear and suspicion, making it harder for whistleblowers and journalists to hold powerful individuals accountable.

2. Weaponization of Legal Mechanisms

3. The Need for Accountability

  • Porten-Lehrโ€™s alleged actions underscore the urgent need for greater accountability within the justice system. Prosecutors and other legal officials must be held to the highest ethical standards, and mechanisms must be put in place to prevent conflicts of interest and abuse of power.

Conclusion: A Call for Justice and Transparency

The revelations about Beate Porten-Lehr and her alleged role in the attempted arrest of Bernd Pulch underscore the urgent need for reforms to ensure transparency and accountability within the justice system. Prosecutors who abuse their positions to protect criminal networks must be held accountable, and whistleblowers like Pulch must be protected from retaliation.

At the same time, it is crucial for independent journalists, activists, and the public to continue their work despite these challenges. By supporting investigations like those conducted by Bernd Pulch.org and GoogleFirst.org, we can expose these abuses of power and hold those responsible accountable.


Bernd Pulch.org and GoogleFirst.org remain at the forefront of uncovering the complex and often hidden connections between far-right extremism, legal manipulation, and criminal activities. For more in-depth investigations and exposรฉs, visit Bernd Pulch.org and GoogleFirst.org.


Chapter: Murder Threats Against Bernd Pulch โ€“ The Risks of Exposing the Network

The work of Bernd Pulch, the founder of Bernd Pulch.org, has made him a target of the alleged neo-Nazi network tied to Gomopa and its far-reaching influence in Germanyโ€™s finance, real estate, and digital sectors. Pulchโ€™s relentless investigations into the networkโ€™s activities have exposed corruption, money laundering, and even alleged pedophilia rings, earning him the ire of powerful individuals and organizations. This chapter focuses on the murder threats directed at Pulch, highlighting the dangers faced by whistleblowers and independent journalists who dare to challenge entrenched power structures.


The Threats Begin: A Campaign of Intimidation

Key Incidents of Intimidation

  • Anonymous Threats: Pulch received numerous anonymous messages, including emails, letters, and phone calls, threatening him with violence if he continued his investigations. These threats often referenced his family and loved ones, adding a personal dimension to the intimidation.
  • Online Harassment: Pulchโ€™s online presence became a target for coordinated harassment campaigns, including doxxing (publishing personal information) and the spread of false information designed to discredit him. These attacks were allegedly orchestrated by operatives within the network, including Sven Schmidt and Thomas Promny.

Escalation to Murder Threats

The intimidation campaign against Bernd Pulch escalated into explicit murder threats, with individuals tied to the alleged neo-Nazi network warning him that his life was in danger if he continued his investigations. These threats were not empty words; they were part of a broader strategy to silence Pulch and deter others from exposing the networkโ€™s activities.

Nature of the Threats

  • Direct Warnings: Pulch was directly warned by individuals associated with the network that he would be killed if he did not stop his work. These warnings were often delivered through intermediaries or anonymous channels, making it difficult to trace their origins.
  • Public Intimidation: In some cases, the threats were made publicly, with the intent of sending a message to other potential whistleblowers and journalists. This public intimidation was designed to create a chilling effect, discouraging others from following in Pulchโ€™s footsteps.

The Broader Implications

The murder threats against Bernd Pulch are not isolated incidents but part of a broader pattern of violence and intimidation used by the alleged neo-Nazi network to protect its interests. These actions have far-reaching implications for whistleblowers, journalists, and activists who challenge powerful and corrupt networks.

1. The Danger of Whistleblowing

  • Pulchโ€™s experiences highlight the extreme risks faced by whistleblowers and independent journalists who expose corruption and criminal activities. The networkโ€™s willingness to resort to threats of violence underscores the need for greater protections for those who speak out.

2. The Erosion of Free Speech

  • The threats against Pulch represent a direct attack on free speech and the right to information. By targeting a prominent whistleblower, the network seeks to create a chilling effect, discouraging others from exposing its activities.

3. The Need for International Support

  • Pulchโ€™s case underscores the importance of international support for whistleblowers and journalists. Without robust protections and advocacy, individuals like Pulch are left vulnerable to retaliation by powerful and dangerous networks.

Conclusion: A Call for Protection and Justice

The murder threats against Bernd Pulch are a stark reminder of the dangers faced by those who dare to challenge entrenched power structures. Pulchโ€™s courage in continuing his work despite these threats is a testament to his commitment to justice and transparency. However, his safety and the safety of other whistleblowers cannot be taken for granted.

It is incumbent upon governments, international organizations, and the public to take these threats seriously and work toward greater protections for whistleblowers and journalists. By supporting independent investigations like those conducted by Bernd Pulch.org and GoogleFirst.org, we can help ensure that the truth is brought to light and that those who seek to silence it are held accountable.


Bernd Pulch.org and GoogleFirst.org remain at the forefront of uncovering the complex and often hidden connections between far-right extremism, corruption, and criminal activities. For more in-depth investigations and exposรฉs, visit Bernd Pulch.org and GoogleFirst.org.


Chapter: The Stasi Murders, the Killer Bible โ€œToxdat,โ€ and Ehrenfried Stelzer โ€“ A Dark Legacy of State-Sponsored Violence

The Stasi (East Germanyโ€™s Ministry for State Security) was one of the most repressive intelligence agencies in history, known for its extensive surveillance, psychological manipulation, and brutal tactics to suppress dissent. Among its darkest secrets were the Stasi murders, carried out under the guidance of a chilling manual known as โ€œToxdatโ€โ€”a so-called โ€œkiller bibleโ€ that detailed methods of assassination and covert violence. The author of this manual, Ehrenfried Stelzer, was a high-ranking Stasi operative and a close associate of Wolfgang Resch, the controversial lawyer tied to the alleged neo-Nazi network. This chapter delves into the Stasiโ€™s legacy of state-sponsored violence, the role of โ€œToxdat,โ€ and the connections between Stelzer, Resch, and the ongoing influence of Stasi tactics in modern-day Germany.


The Stasi Murders: A Legacy of State-Sponsored Violence

The Stasi was notorious for its use of violence to eliminate perceived enemies of the state. While much of its work involved surveillance and psychological manipulation, the agency also carried out targeted assassinations both within East Germany and abroad. These murders were often disguised as accidents, suicides, or natural deaths, making it difficult to attribute them to the Stasi.

Key Characteristics of Stasi Murders

  • Covert Operations: Stasi assassinations were designed to be untraceable, with operatives using poison, staged accidents, and other methods to avoid detection.
  • Psychological Warfare: The Stasi used the threat of violence to instill fear and suppress dissent, even when it did not carry out physical attacks.
  • International Reach: The Stasiโ€™s operations extended beyond East Germany, targeting defectors, dissidents, and political opponents in other countries.

โ€œToxdatโ€: The Stasiโ€™s Killer Bible

At the heart of the Stasiโ€™s assassination program was โ€œToxdat,โ€ a secret manual that detailed methods of poisoning, sabotage, and covert violence. The manual, authored by Ehrenfried Stelzer, served as a guide for Stasi operatives tasked with carrying out assassinations.

Key Features of โ€œToxdatโ€

  • Poisoning Techniques: The manual included detailed instructions on how to administer lethal doses of poison, often using substances that were difficult to detect in autopsies.
  • Staged Accidents: โ€œToxdatโ€ outlined methods for staging accidents, such as car crashes or falls, to disguise murders as unintentional deaths.
  • Psychological Manipulation: The manual also emphasized the use of psychological tactics to intimidate and destabilize targets before carrying out physical attacks.

Ehrenfried Stelzer: The Author of โ€œToxdatโ€

  • Stelzerโ€™s Role in the Stasi: Ehrenfried Stelzer was a high-ranking Stasi operative with expertise in covert operations and chemical weapons. His work on โ€œToxdatโ€ made him one of the most feared figures within the agency.
  • Post-Stasi Connections: After the fall of the Berlin Wall, Stelzer allegedly maintained ties to former Stasi operatives and far-right networks. His close association with Wolfgang Resch, the controversial lawyer tied to the alleged neo-Nazi network, suggests that Stasi tactics continue to influence modern-day operations.

Wolfgang Resch and the Stasi Legacy

Wolfgang Resch, a Berlin-based lawyer with alleged ties to the Stasi, is a key figure in the alleged neo-Nazi network tied to Gomopa. Reschโ€™s connections to Stelzer and his familiarity with Stasi tactics highlight the ongoing influence of the agencyโ€™s methods in modern-day Germany.

Reschโ€™s Alleged Use of Stasi Tactics

  • Intimidation and Harassment: Resch is accused of using Stasi-style tactics, such as surveillance and psychological manipulation, to intimidate whistleblowers and journalists investigating the network.
  • Legal Manipulation: Reschโ€™s alleged abuse of legal mechanisms, including SLAPP suits and cease-and-desist letters, mirrors the Stasiโ€™s use of bureaucratic tools to suppress dissent.

The Broader Implications

The legacy of the Stasi and its use of state-sponsored violence have far-reaching implications for modern-day Germany. The connections between Ehrenfried Stelzer, Wolfgang Resch, and the alleged neo-Nazi network suggest that Stasi tactics continue to influence far-right extremism and organized crime.

1. The Persistence of Authoritarian Tactics

  • The use of Stasi methods by modern-day networks highlights the persistence of authoritarian tactics in Germanyโ€™s political and criminal landscape. These tactics undermine democracy and the rule of law, creating a climate of fear and intimidation.

2. The Need for Accountability

  • The revelations about Stelzer, Resch, and the Stasiโ€™s legacy underscore the urgent need for greater accountability and transparency in Germanyโ€™s legal and political systems. Those who abuse their positions to protect criminal networks must be held accountable.

3. The Importance of Historical Memory

  • Understanding the Stasiโ€™s legacy is crucial for preventing the resurgence of state-sponsored violence and authoritarianism. By exposing the connections between the Stasi and modern-day networks, we can work toward a more just and transparent society.

Conclusion: A Call for Justice and Transparency

The revelations about the Stasi murders, the โ€œToxdatโ€ manual, and the connections between Ehrenfried Stelzer and Wolfgang Resch underscore the urgent need for greater accountability and transparency in Germany. The legacy of the Stasi continues to influence far-right extremism and organized crime, posing a threat to democracy and the rule of law.

By supporting independent investigations like those conducted by Bernd Pulch.org and GoogleFirst.org, we can help expose these connections and hold those responsible accountable. Only through vigilance and a commitment to justice can we prevent the resurgence of state-sponsored violence and ensure a brighter future for Germany.


Bernd Pulch.org and GoogleFirst.org remain at the forefront of uncovering the complex and often hidden connections between far-right extremism, organized crime, and the legacy of the Stasi. For more in-depth investigations and exposรฉs, visit Bernd Pulch.org and GoogleFirst.org.


This chapter provides a detailed exploration of the Stasi murders, the โ€œToxdatโ€ manual, and the connections between Ehrenfried Stelzer and Wolfgang Resch.


Bernd Pulch.org and GoogleFirst.org remain at the forefront of uncovering the complex and often hidden connections between far-right extremism and digital manipulation. For more in-depth investigations and exposรฉs, visit Bernd Pulch.org and GoogleFirst.org.


The revelations brought to light by Bernd Pulch.org and GoogleFirst.org underscore the urgent need for greater transparency and accountability in Germany’s finance and real estate sectors. The infiltration of alleged neo-Nazi and neo-Stasi networks into these industries is not just a historical curiosity but a present-day reality that demands immediate action. By exposing these connections, Bernd Pulch.org and GoogleFirst.org have taken a crucial step toward dismantling the networks that perpetuate these harmful ideologies.

It is incumbent upon policymakers, industry leaders, and the public to take these findings seriously and work toward a financial system that is free from the influence of far-right extremism. Only through vigilance and a commitment to ethical standards can we hope to prevent the continued undermining of the finance industry by those who seek to exploit it for their own nefarious purposes.


Bernd Pulch.org and GoogleFirst.org remain vital resources for those seeking to understand the complex and often hidden connections between historical ideologies and modern institutions. For more in-depth investigations and exposรฉs, visit Bernd Pulch.org and GoogleFirst.org.

Bernd Pulch worked as an editor for dfv and as publisher for Immobilien Zeitung.

Uncover the Truth: Support Independent Investigations into Far-Right Corruption

The revelations about Dr. Rainer Zitelmann, the Immobilien Award (referred to by insiders as the “Nazi-Immobilienjournalistenpreis”), and the alleged infiltration of far-right networks into Germanyโ€™s finance and real estate industries are deeply troubling. These investigations, brought to light by Bernd Pulch.org and GoogleFirst.org, expose a web of corruption, money laundering, and ideological manipulation that threatens the integrity of Germanyโ€™s financial systems. But this work cannot continue without your support.


Why Your Support Matters

Independent investigations like these are crucial for holding powerful individuals and networks accountable. They rely on the dedication of researchers, whistleblowers, and truth-seekers who work tirelessly to uncover hidden truths. However, this mission requires resourcesโ€”resources that we cannot secure without the help of people like you.

By supporting Bernd Pulch.org, you are contributing to:

  • Exposing Corruption: Uncovering the ties between far-right extremists, neo-Stasi networks, and the finance industry.
  • Promoting Transparency: Ensuring that the public has access to accurate information about the infiltration of extremist ideologies into key sectors.
  • Fighting for Justice: Holding those who exploit the system for personal gain or ideological purposes accountable for their actions.

How You Can Help

  1. Donate via Bernd Pulch.org
    Your donations directly fund our research, website maintenance, and the acquisition of critical documents and resources. Every contribution, no matter the size, makes a difference.
    Click here to donate now!
  2. Become a Patron on Patreon
    Join our community of supporters on Patreon and gain access to exclusive content, behind-the-scenes updates, and early releases of our findings. Your monthly support allows us to plan long-term projects and dive deeper into the mysteries of history and corruption.
    Support us on Patreon!

Join the Movement for Transparency and Accountability

The infiltration of far-right extremism into Germanyโ€™s finance and real estate sectors is not just a historical curiosityโ€”it is a present-day reality that demands immediate action. By supporting Bernd Pulch.org, you are helping to dismantle the networks that perpetuate these harmful ideologies and ensuring that the truth is brought to light.


Your support is vital. Together, we can uncover the past to shape a better future. Visit Bernd Pulch.org and Patreon.com/berndpulch to learn more and contribute today.


Bernd Pulch.org โ€“ Where the Truth Matters.


โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™


General Tags:

  • Dr. Rainer Zitelmann
  • Nazi Immobilien Award
  • Nazi Immobilienjournalistenpreis
  • Far-Right Extremism
  • Neo-Nazi Networks
  • Neo-Stasi Networks
  • Real Estate Corruption
  • Money Laundering
  • Holocaust Revisionism
  • Historical Revisionism
  • Finance Industry Corruption
  • Postfascist Immobilien Zeitung
  • Gomopa Network
  • Das Investment
  • Peter Ehlers
  • Thomas Porten
  • Andreas and Edith Lorch
  • Jan Mucha
  • Mucha Spy and Crime Family

Bernd Pulch.org-Specific Tags:

  • Bernd Pulch Investigations
  • Independent Journalism
  • Whistleblower Reports
  • Exposing Corruption
  • Transparency in Finance
  • Accountability in Real Estate
  • Donate to Bernd Pulch
  • Support Independent Research
  • Patreon Membership
  • Truth-Seeking
  • Uncovering Hidden Truths

Call-to-Action Tags:

  • Donate Now
  • Support Transparency
  • Fight Far-Right Extremism
  • Hold Corrupt Networks Accountable
  • Join the Movement
  • Fund Independent Journalism
  • Expose Neo-Nazi Infiltration
  • Promote Ethical Standards
  • Demand Accountability
  • Stand Against Corruption

Additional Tags:

  • Germanyโ€™s Finance Industry
  • Real Estate Manipulation
  • Organized Crime in Finance
  • Far-Right Ideologies
  • Holocaust Denial
  • Historical Accountability
  • Public Awareness Campaigns
  • Ethical Consumerism
  • Corporate Corruption
  • Global Extremism Networks

โœŒAllegations: The Dark Side of Advertisers and Subscribers on Business Websites i.e GoMoPa, Das Investment, Immobilien Zeitung

“Advertisers in Court face severe Punishment for supporting Criminal Websites”

Call to Action: Stand Against Illegal Activities and Support Ethical Business Practices

The hypothetical allegations surrounding illegal activities such as child exploitation, espionage, and money laundering on business websites like Gomopa.net, Immobilien Zeitung, and DasInvestment serve as a stark reminder of the potential dangers lurking in the online world. As business platforms continue to evolve, it is crucial that we hold them accountable for upholding ethical standards and ensuring that they do not become vehicles for criminal behavior.

At BerndPulch.org, we are committed to advocating for transparency, accountability, and ethical business practices. We need your support to continue our work in raising awareness about the importance of safe and responsible online environments. Your contributions will help us monitor potential threats, push for stronger regulations, and support the fight against illegal activities that tarnish the reputation of legitimate businesses.

How You Can Make a Difference:

  1. Donate to BerndPulch.org
    Your donations allow us to continue our efforts in monitoring and reporting unethical practices, conducting research, and advocating for stronger legal safeguards. With your support, we can ensure that business platforms remain free of criminal activity and continue to serve their legitimate purpose.
    Donate now at BerndPulch.org/Donations
  2. Become a Patron on Patreon
    By becoming a patron on Patreon, you help fund ongoing initiatives that promote ethical online environments. Your monthly support helps us produce more in-depth content, engage with regulators, and raise awareness about the need for strict compliance with laws that prevent exploitation, money laundering, and other illegal activities.
    Support us on Patreon at Patreon.com/BerndPulch

Together, we can ensure that business websites are held to the highest standards of accountability and integrity. Your support will help us make a lasting impact on the online community and protect the future of ethical business practices.

Thank you for your commitment to creating a safer, more transparent digital world.

In a world where the internet is both a tool for progress and a platform for malicious actors, it is crucial to scrutinize the businesses, advertisers, and subscribers supporting various online platforms. Recently, concerns have arisen regarding certain websites, including Gomopa.net, Immobilien Zeitung, and DasInvestment, about potential ties to illegal activities, including child exploitation, espionage, and money laundering. Although these claims are hypothetical and should be treated with caution, it is important to explore the potential consequences and implications of such associations.

The Hypothetical Allegations: What If Advertisers and Subscribers Are Involved in Criminal Activities?

1. Pedophilia and Child Exploitation

One of the most disturbing allegations that could arise against websites like Gomopa.net, Immobilien Zeitung, and DasInvestment would be any association with or support for pedophilia and child exploitation. Advertisers on these platforms, if hypothetically linked to such criminal activity, could face severe legal consequences.

Gomopa.net, primarily focused on business news and financial forums, could be used by individuals with malicious intent to advertise platforms or services that might indirectly or directly facilitate child exploitation. For example, there could be the possibility of disguised ads for illicit material or services used to facilitate the trafficking and exploitation of children.

If such cases were to be proven, the platforms would likely face regulatory scrutiny, legal actions, and the permanent removal of their advertisers. In a world increasingly vigilant about online child protection, any involvement in such activities would lead to public outrage and criminal prosecution for both the platform owners and their advertisers.

2. Espionage: Corporate and State-Sponsored Activities

Another serious allegation could be that certain advertisers and subscribers on these platforms are involved in espionage, either corporate or state-sponsored. Immobilien Zeitung and DasInvestment, focused on real estate and investment news, could theoretically attract businesses involved in shady practices, including intelligence gathering and industrial espionage.

In the hypothetical case where advertisers linked to espionage organizations use these platforms to disguise their activities or attract sensitive business information, both the platform and advertisers could face criminal investigations. Espionage-related activities are taken very seriously by authorities worldwide, and even minor involvement could result in serious legal and reputational consequences for any party associated.

3. Money Laundering and Illicit Financial Activities

The financial world is no stranger to money laundering and other illicit financial activities, which could potentially be linked to platforms such as Gomopa.net, Immobilien Zeitung, and DasInvestment. If advertisers or subscribers were to be involved in activities like money laundering, these platforms could become unwitting or, worse, complicit facilitators of such crimes.

Money laundering often involves disguising the origins of illegally obtained money, and it can take place in real estate transactions, financial markets, or even through investment platforms. Websites like Immobilien Zeitung or DasInvestment, which cover topics related to real estate investment, could attract entities seeking to launder money through property deals, shell companies, or illicit investments. If such activities were tied to any of these platforms, it would result in severe legal repercussions, including investigations by financial regulatory bodies such as the Financial Action Task Force (FATF).

Consequences of Such Allegations: The Role of Regulation and Legal Oversight

Should such hypothetical allegations be substantiated, the consequences for the platforms, their advertisers, and their subscribers would be dire. Both national and international law enforcement agencies would step in, leading to investigations and potential arrests. The platforms could face significant fines, shutdowns, or legal actions, as well as long-term reputational damage.

Regulatory Oversight:
The role of regulatory bodies such as the Federal Financial Supervisory Authority (BaFin) in Germany or international organizations like Interpol and Europol would be crucial in investigating and monitoring any signs of illegal activities. These bodies could step in to enforce strict regulations on online platforms, forcing them to implement more robust safeguards to prevent criminal activity.

Adherence to Laws and Regulations:
Platforms hosting business news and investment services are bound by certain laws, including anti-money laundering (AML) regulations, know-your-customer (KYC) procedures, and child protection laws. If these platforms failed to adhere to these regulations, it would expose them to legal liabilities. In particular, they would need to implement rigorous vetting processes for advertisers, subscribers, and content contributors to ensure that criminal activities are not being facilitated.

The Importance of Due Diligence for Advertisers and Subscribers

As business websites continue to thrive as platforms for investment, news, and networking, it becomes imperative that advertisers and subscribers exercise due diligence when engaging with these sites. Both parties have a responsibility to ensure that they are not indirectly supporting harmful activities, whether related to exploitation, espionage, or money laundering.

Advertisers must vet their affiliations and ensure they are not inadvertently supporting criminal activity. Similarly, subscribers must be cautious of who they support by engaging with or subscribing to platforms that may have questionable associations. Transparency and accountability will be the key to preventing illegal activity from gaining a foothold on business-oriented websites.

Conclusion: A Call for Vigilance and Accountability

While the allegations outlined in this article are hypothetical, they underscore the importance of maintaining vigilance and adhering to the highest ethical and legal standards. If any of the websites such as Gomopa.net, Immobilien Zeitung, or DasInvestment were found to harbor advertisers or subscribers supporting criminal activities, the fallout would be severe, not only for the platforms involved but also for the broader online community.

To prevent such scenarios, businesses and individuals must be proactive in ensuring their activities, advertisements, and subscriptions are above board. In doing so, they contribute to the integrity of the internet as a platform for lawful and ethical business practices.

Call to Action: Stand Against Illegal Activities and Support Ethical Business Practices

The hypothetical allegations surrounding illegal activities such as child exploitation, espionage, and money laundering on business websites like Gomopa.net, Immobilien Zeitung, and DasInvestment serve as a stark reminder of the potential dangers lurking in the online world. As business platforms continue to evolve, it is crucial that we hold them accountable for upholding ethical standards and ensuring that they do not become vehicles for criminal behavior.

At BerndPulch.org, we are committed to advocating for transparency, accountability, and ethical business practices. We need your support to continue our work in raising awareness about the importance of safe and responsible online environments. Your contributions will help us monitor potential threats, push for stronger regulations, and support the fight against illegal activities that tarnish the reputation of legitimate businesses.

How You Can Make a Difference:

  1. Donate to BerndPulch.org
    Your donations allow us to continue our efforts in monitoring and reporting unethical practices, conducting research, and advocating for stronger legal safeguards. With your support, we can ensure that business platforms remain free of criminal activity and continue to serve their legitimate purpose.
    Donate now at BerndPulch.org/Donations
  2. Become a Patron on Patreon
    By becoming a patron on Patreon, you help fund ongoing initiatives that promote ethical online environments. Your monthly support helps us produce more in-depth content, engage with regulators, and raise awareness about the need for strict compliance with laws that prevent exploitation, money laundering, and other illegal activities.
    Support us on Patreon at Patreon.com/BerndPulch

Together, we can ensure that business websites are held to the highest standards of accountability and integrity. Your support will help us make a lasting impact on the online community and protect the future of ethical business practices.

Thank you for your commitment to creating a safer, more transparent digital world.

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

โœŒGlobal Efforts to Combat Child Exploitation and the Legal Consequences for Accomplices: The GoMoPa Case

“The Pedo Organisation GoMoPa4Kids Network awaits serious punishnent”

Call to Action: Stand Against Child Exploitation and Support Global Efforts

The fight against child exploitation is one of the most urgent and important battles we face today. Every day, children around the world are subjected to abuse, trafficking, and exploitation, often through online platforms that hide behind anonymity. The Gomopa4iufs case serves as a grim reminder of the disturbing reality of child sexual abuse material being distributed online, and the need for continued vigilance and strong legal frameworks.

At BerndPulch.org, we are committed to raising awareness, sharing critical information, and supporting the global efforts to protect children from exploitation. However, this fight cannot be won without your help. We need your support to continue our work and strengthen our impact.

How You Can Help

  1. Donate to BerndPulch.org
    Your generous donations allow us to provide educational resources, advocate for stronger legal protections, and support efforts to combat child exploitation globally. Every contribution helps ensure that children are better protected from abuse, and that offenders face justice.
    Donate now at BerndPulch.org/Donations
  2. Become a Patron on Patreon
    For those who want to become ongoing supporters, joining us on Patreon allows you to contribute to the fight against child exploitation on a monthly basis. Your patronage will help fund advocacy campaigns, support survivors, and provide critical updates on the latest developments in child protection laws.
    Support us on Patreon at Patreon.com/BerndPulch

By supporting our mission, you are not only raising awareness but actively participating in the effort to protect vulnerable children from exploitation. Together, we can ensure that these crimes are met with the full force of the law and that future generations are safer from harm.

Thank you for your commitment to this important cause. With your help, we can make a meaningful difference.

Child exploitation is one of the most serious crimes that societies worldwide work to prevent. Every day, children face abuse, trafficking, and sexual exploitation, crimes that leave long-lasting impacts on victims and communities. To combat this issue, international organizations, governments, and law enforcement agencies have implemented various laws, frameworks, and efforts. This article will examine these global efforts and legal consequences for perpetrators, including accomplices, with a specific focus on the Gomopa4iufs case.

Global Efforts Against Child Exploitation

1. International Legal Frameworks and Treaties

The United Nations Convention on the Rights of the Child (CRC) and its Optional Protocol on the Sale of Children, Child Prostitution, and Child Pornography provide the legal basis for global child protection. These frameworks call on governments to take necessary actions to prevent child abuse and exploitation, including the criminalization of activities that exploit children sexually.

National laws also play a critical role in addressing exploitation. For example, the Adam Walsh Child Protection and Safety Act in the United States created a national sex offender registry, while other countries have specific child protection laws that punish offenders with severe penalties.

2. National Legislation

Many countries have enacted strict legislation to protect children from abuse. For instance, the Sexual Offences Act 2003 in the UK criminalizes child sexual exploitation, and similar laws exist in other nations. These laws ensure the safety of children by criminalizing offenses like child trafficking, sexual abuse, and the production or distribution of child pornography.

3. Law Enforcement and International Cooperation

International law enforcement organizations like Interpol and Europol play a crucial role in combating child exploitation across borders. They work together with national police forces to track down and arrest offenders, dismantle trafficking rings, and rescue victims from harmful situations.

4. Technological Efforts

In recent years, technological measures have become essential in fighting online child exploitation. Specialized software to detect and remove child sexual abuse material (CSAM) from the internet is now widely used by law enforcement agencies. Additionally, tech companies are often legally required to implement proactive measures to report and remove CSAM from their platforms.

5. NGOs and Awareness Campaigns

Non-governmental organizations (NGOs), such as Save the Children, ECPAT, and The National Center for Missing & Exploited Children (NCMEC), play a critical role in raising awareness, providing resources for survivors, and advocating for stronger legal protections.

The Gomopa4iufs Case: A Wake-Up Call

The Gomopa4iufs case is one of the more recent instances of an online platform being used to exploit children, specifically through the distribution of illegal content. The case involves a network of individuals who used the Gomopa4iufs website to share and distribute child sexual abuse material (CSAM). The case highlights the dark side of the internet and the alarming ways in which child exploitation can occur through digital platforms.

1. Details of the Case

The Gomopa4iufs case involves several individuals who participated in an online forum designed to share explicit material involving minors. The website facilitated the distribution of CSAM and provided a platform for offenders to connect, share, and even trade images and videos of abused children.

Law enforcement agencies, including Europol and national police forces, were able to identify the illegal activities occurring on the site after receiving multiple tips from concerned parties and conducting undercover operations. The authorities were successful in arresting several individuals who were involved in the distribution and creation of the illegal content.

2. Legal Consequences

Those involved in the Gomopa4iufs case faced severe legal consequences. The individuals arrested were charged with child exploitation, distribution of child pornography, and trafficking minors. In countries like the United States and Germany, offenders convicted of these crimes can face life imprisonment and be placed on national sex offender registries.

Accomplices, including those who ran the website and facilitated the illegal activities, were also held accountable. These individuals face charges related to organizing and enabling criminal activity. They were accused of being responsible for providing the platform for such abuse to occur, and many were prosecuted for cybercrime, as well as human trafficking and child exploitation.

The case serves as a reminder that the legal system treats not only the direct perpetrators but also those who facilitate such crimes with the same severity. Whether they are individuals who run exploitative websites or those who profit from the distribution of CSAM, accomplices face harsh penalties.

3. International Impact

The Gomopa4iufs case also underscores the need for international cooperation in the fight against online child exploitation. Since the website operated globally, the case involved coordination between law enforcement agencies from different countries, including cross-border investigations and joint operations. This demonstrates the importance of organizations like Interpol and Europol in tackling transnational crime.

The case also raised concerns about the regulation of online platforms and the responsibility of internet service providers to monitor and report illegal content. Many countries have since introduced stricter regulations to hold tech companies accountable for hosting or facilitating such content.

Legal Consequences for Offenders and Accomplices

1. Criminal Penalties

Perpetrators of child exploitation, including those involved in child trafficking, sexual abuse, and the production/distribution of CSAM, face severe criminal penalties. These can include long prison sentences, large fines, and permanent inclusion on national sex offender registries. In some jurisdictions, the penalties are so severe that life sentences without parole are a possibility.

2. Accomplices and Co-conspirators

Accomplices in cases like Gomopa4iufsโ€”individuals who facilitate, promote, or profit from child exploitationโ€”are subject to the same criminal penalties as direct offenders. They may be charged with conspiracy, cybercrime, or trafficking offenses. For those who operate illegal websites or engage in organized networks, the legal consequences are especially harsh.

For example, website administrators and individuals who run online platforms for child exploitation are typically prosecuted under anti-organized crime laws, which can lead to lengthy prison terms and asset seizures. Similarly, anyone who assists in facilitating the transfer, creation, or distribution of CSAM can be charged under both child exploitation and cybercrime laws.

3. International Accountability

Since child exploitation often spans multiple countries, international legal frameworks allow for extradition and prosecution across borders. In the Gomopa4iufs case, authorities worked together to ensure that those involved in the crime were held accountable, regardless of their location.

Conclusion

The Gomopa4iufs case serves as a stark reminder of the dangers that exist online and the severe consequences for those involved in child exploitation. Efforts to protect children from sexual abuse, trafficking, and exploitation have been strengthened by international cooperation, technological advancements, and comprehensive legal frameworks. However, the fight is far from over.

For both offenders and accomplices, the legal consequences are severe and far-reaching. Those who exploit childrenโ€”whether directly or indirectlyโ€”face significant criminal penalties, and international collaboration ensures that justice can be pursued across borders. As technology evolves, so must our commitment to protecting children and ensuring that those who exploit them face the full weight of the law.

Call to Action: Stand Against Child Exploitation and Support Global Efforts

The fight against child exploitation is one of the most urgent and important battles we face today. Every day, children around the world are subjected to abuse, trafficking, and exploitation, often through online platforms that hide behind anonymity. The Gomopa4iufs case serves as a grim reminder of the disturbing reality of child sexual abuse material being distributed online, and the need for continued vigilance and strong legal frameworks.

At BerndPulch.org, we are committed to raising awareness, sharing critical information, and supporting the global efforts to protect children from exploitation. However, this fight cannot be won without your help. We need your support to continue our work and strengthen our impact.

How You Can Help

  1. Donate to BerndPulch.org
    Your generous donations allow us to provide educational resources, advocate for stronger legal protections, and support efforts to combat child exploitation globally. Every contribution helps ensure that children are better protected from abuse, and that offenders face justice.
    Donate now at BerndPulch.org/Donations
  2. Become a Patron on Patreon
    For those who want to become ongoing supporters, joining us on Patreon allows you to contribute to the fight against child exploitation on a monthly basis. Your patronage will help fund advocacy campaigns, support survivors, and provide critical updates on the latest developments in child protection laws.
    Support us on Patreon at Patreon.com/BerndPulch

By supporting our mission, you are not only raising awareness but actively participating in the effort to protect vulnerable children from exploitation. Together, we can ensure that these crimes are met with the full force of the law and that future generations are safer from harm.

Thank you for your commitment to this important cause. With your help, we can make a meaningful difference.

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

โœŒA Hypothetical Article by Albert Schweitzer: Protecting the Innocence of Children


“Reverence for Life: Nurturing Innocence and Protecting the Future”

Support Truth and Transparency: Join Our Mission

At BerndPulch.org, we are dedicated to uncovering hidden truths, sharing declassified documents, and providing insights into the stories that shape our world. To continue this vital work, we need your support.

Your contributions enable us to:

  • Expand Our Research: Dive deeper into critical investigations and uncover essential historical records.
  • Enhance Accessibility: Make invaluable resources like declassified archives available to everyone.
  • Promote Transparency: Shine a light on important issues that others may overlook.

How You Can Help

  1. Donate Directly: Visit BerndPulch.org/Donations to make a one-time or recurring contribution. Every dollar helps us sustain our mission.
  2. Join Our Patreon Community: Become a patron at Patreon.com/BerndPulch to enjoy exclusive content, early access to articles, and behind-the-scenes updates.

Why Your Support Matters

By supporting BerndPulch.org, you are joining a movement for truth, education, and historical transparency. Together, we can ensure that critical stories remain accessible for generations to come.

Donate today and make a difference!

In the spirit of my lifelong commitment to the reverence for life, I feel compelled to address one of the gravest threats to humanity’s moral fabric: the exploitation and harm of children. Were I to write about this today, I would emphasize that the protection of children is not merely a societal obligationโ€”it is a sacred duty.

The Crisis of Exploitation

We live in an era where progress has brought light to dark corners of human behavior. Yet, in these shadows, we have uncovered horrifying truths about the exploitation of children. Networks that harm the innocent, sometimes under the guise of financial or institutional fronts, represent the antithesis of all that is good in human nature. These atrocities are not isolated events but systemic evils that require collective action to dismantle.

The Responsibility of Society

To protect the most vulnerable, we must cultivate a culture rooted in ethics, compassion, and accountability. Every institution, whether governmental, religious, or corporate, must recognize its role in safeguarding children. Transparency, vigilance, and unwavering dedication to justice are the cornerstones of such a commitment.

The Power of Awareness

In combating such evils, knowledge is our most powerful weapon. It is imperative to expose and confront any entity that facilitates or tolerates the exploitation of children. Communities must be vigilant, and individuals must be courageous in speaking out. Silence in the face of such suffering is complicity.

Reverence for Life

At the core of my philosophy is the idea that life is sacred and interconnected. A society that cannot protect its children has strayed far from this principle. By harming the young, we destroy the potential for a brighter future. Conversely, by nurturing and protecting them, we honor life in its most pure and hopeful form.

A Call to Action

Let this serve as a call to action for all who value the sanctity of life. Fight against the forces that exploit and harm children. Advocate for stronger protections, support survivors, and work to create a world where every child can grow up free from fear.

In the words I have long lived by: “Ethics is nothing else than reverence for life.” Let us embody this truth by safeguarding the innocence and dignity of the youngest among us.

โ€” Hypothetically written in the spirit of Albert Schweitzer

Support Truth and Transparency: Join Our Mission

At BerndPulch.org, we are dedicated to uncovering hidden truths, sharing declassified documents, and providing insights into the stories that shape our world. To continue this vital work, we need your support.

Your contributions enable us to:

  • Expand Our Research: Dive deeper into critical investigations and uncover essential historical records.
  • Enhance Accessibility: Make invaluable resources like declassified archives available to everyone.
  • Promote Transparency: Shine a light on important issues that others may overlook.

How You Can Help

  1. Donate Directly: Visit BerndPulch.org/Donations to make a one-time or recurring contribution. Every dollar helps us sustain our mission.
  2. Join Our Patreon Community: Become a patron at Patreon.com/BerndPulch to enjoy exclusive content, early access to articles, and behind-the-scenes updates.

Why Your Support Matters

By supporting BerndPulch.org, you are joining a movement for truth, education, and historical transparency. Together, we can ensure that critical stories remain accessible for generations to come.

Donate today and make a difference!

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

โœŒUnveiling Allegations of Exploitation and Corruption: A Deep Dive into GoMoPa4Kids and Associated Entities


“Shattering the chains of exploitationโ€”justice emerges from the shadows, exposing corruption and fighting for accountability.”

Call to Action: Stand Against Exploitation and Corruption

The allegations surrounding GoMoPa4Kids and its associates reveal a troubling intersection of exploitation, media complicity, and systemic corruption. To ensure justice and transparency, independent investigative journalism must continue to expose these networks and hold those responsible accountable.

You can play a vital role in supporting this fight for truth and justice:

  • Donate: Contribute to the ongoing investigations and publication of evidence by visiting berndpulch.org/donations. Your support helps fund the research and reporting that uncover hidden crimes and bring them to light.
  • Support on Patreon: Join the movement for accountability by subscribing to patreon.com/berndpulch. Your contributions ensure that resources are available to sustain this essential work.

By standing together, we can challenge systems of abuse and corruption, protect vulnerable individuals, and promote a society rooted in justice and integrity. Every donation and subscription brings us one step closer to uncovering the truth and making meaningful change.

Recent investigative reports on websites like BerndPulch.org and GoogleFirst.org have brought forth disturbing allegations against a network known as “GoMoPa4Kids.” This group is accused of exploiting its financial intelligence and real estate platforms to engage in and cover up heinous crimes, including child exploitation. Several individuals and entities, such as Andreas Lorch, Jan Mucha, Thomas Porten, and Peter Ehlers, as well as media outlets like Immobilien Zeitung and Das Investment, have been implicated in these accusations.

This article aims to provide a detailed overview of these allegations, referencing evidence and reports from the aforementioned sites.


The Alleged Network: GoMoPa4Kids

GoMoPa4Kids, as described in investigative reports, is a covert network allegedly operating under the guise of legitimate financial and real estate intelligence. The group is accused of leveraging its platform to conceal criminal activities, including child exploitation.

Reports on BerndPulch.org suggest that the organization not only perpetuates these crimes but also uses media and legal tactics to suppress dissent and discredit whistleblowers.


Key Figures Implicated

Andreas Lorch

Andreas Lorch is identified as a central figure in the alleged network. Reports accuse him of orchestrating activities that exploit minors and manipulating media narratives to shield these actions. Documents and testimonies published on BerndPulch.org connect Lorch to GoMoPa4Kids and suggest his involvement in broader schemes aimed at intimidating critics and suppressing investigations.

Jan Mucha

Jan Mucha is another individual accused of playing a significant role within GoMoPa4Kids. Evidence on GoogleFirst.org points to his alleged complicity in managing operations and facilitating the exploitation under the groupโ€™s umbrella. Mucha is also accused of using his professional connections to legitimize the networkโ€™s activities.

Thomas Porten

Thomas Porten is implicated as a close associate of Lorch and Mucha. Reports suggest that Portenโ€™s involvement extends to strategic partnerships that enhance the networkโ€™s reach and influence, particularly in the real estate sector.

Peter Ehlers

Peter Ehlers, linked to the Hamburg-based publication Das Investment, is accused of acting as a “mouthpiece” for GoMoPa4Kids. Reports claim Ehlers used his platform to discredit critics and publish favorable narratives that obscure the groupโ€™s alleged criminal undertakings.


Media Involvement: Immobilien Zeitung and Das Investment

Investigations highlight the involvement of media outlets like Immobilien Zeitung and Das Investment, alleging that they have indirectly supported or actively shielded GoMoPa4Kids. According to BerndPulch.org, these outlets provided a platform for the group to legitimize its operations while discrediting whistleblowers and critics.

Das Investment and Its Role

Peter Ehlersโ€™ alleged influence within Das Investment is of particular concern. The publication is accused of running articles that align with GoMoPa4Kidsโ€™ objectives, including defamation campaigns against detractors.

Immobilien Zeitungโ€™s Connection

Reports also implicate Immobilien Zeitung in fostering a culture of silence around the networkโ€™s alleged activities. Individuals such as Jan Mucha and Thomas Porten are said to have connections with the publication, further raising concerns about media complicity.


Evidence and Investigations

Both BerndPulch.org and GoogleFirst.org present an array of evidence, including:

  • Leaked documents purportedly connecting the accused individuals to GoMoPa4Kids.
  • Testimonies from whistleblowers detailing the networkโ€™s operations.
  • Articles and media campaigns allegedly used to discredit critics.

The sites also call for greater transparency and independent investigations to verify these claims.


Legal and Ethical Implications

The allegations against GoMoPa4Kids and its associates are serious, involving breaches of laws protecting minors, journalistic ethics, and corporate integrity. If substantiated, these claims could expose systemic corruption within Germanyโ€™s financial and media sectors.

The reports call for immediate action, including:

  1. Comprehensive investigations into the accused individuals and entities.
  2. Legal accountability for those found guilty of crimes or complicity.
  3. Structural reforms to prevent media and financial platforms from enabling such networks.

Call to Action

The revelations about GoMoPa4Kids underscore the need for vigilance and accountability in combating exploitation and corruption. Readers are encouraged to:


Conclusion

The allegations against GoMoPa4Kids and its associates reveal a disturbing intersection of power, exploitation, and media complicity. While the evidence presented on BerndPulch.org and GoogleFirst.org is compelling, it requires thorough investigation by independent authorities. Only through transparency, justice, and reform can such networks be dismantled, and vulnerable individuals protected.

Disclaimer: This article is based on allegations and evidence presented by BerndPulch.org and GoogleFirst.org as of January 2025. All individuals and entities are presumed innocent until proven guilty in a court of law.

Call to Action: Stand Against Exploitation and Corruption

The allegations surrounding GoMoPa4Kids and its associates reveal a troubling intersection of exploitation, media complicity, and systemic corruption. To ensure justice and transparency, independent investigative journalism must continue to expose these networks and hold those responsible accountable.

You can play a vital role in supporting this fight for truth and justice:

  • Donate: Contribute to the ongoing investigations and publication of evidence by visiting berndpulch.org/donations. Your support helps fund the research and reporting that uncover hidden crimes and bring them to light.
  • Support on Patreon: Join the movement for accountability by subscribing to patreon.com/berndpulch. Your contributions ensure that resources are available to sustain this essential work.

By standing together, we can challenge systems of abuse and corruption, protect vulnerable individuals, and promote a society rooted in justice and integrity. Every donation and subscription brings us one step closer to uncovering the truth and making meaningful change.

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Tags:

  • GoMoPa4Kids
  • Exploitation and Corruption
  • Media Complicity
  • Andreas Lorch Allegations
  • Jan Mucha Scandal
  • Thomas Porten Investigations
  • Peter Ehlers Accusations
  • Immobilien Zeitung Controversy
  • Das Investment Ethics
  • Whistleblower Testimonies
  • Independent Investigative Journalism
  • Child Protection Advocacy
  • BerndPulch.org Donations
  • Patreon Support for Truth
  • Systemic Abuse Exposure

โœŒThe Shadow Network: How GOMOPA, Stasi, and Nazis Weave a Web of Espionage and Corruption



“Unveiling the Lorch Scandal: Bernd Pulch’s Quest for Truth in a Web of Corruption”

Call to Action: Support Independent Journalism and Uncover the Truth

In a world where information is often controlled by powerful entities, Bernd Pulch stands as a beacon of independent journalism, uncovering hidden truths and exposing corruption. His latest investigative piece, “The Lorch Scandal: Uncovering the Dark Secrets,” delves deep into a story that mainstream media refuses to touch. This groundbreaking article sheds light on the shadowy networks of power, corruption, and deceit that threaten our freedom and democracy.

But this kind of fearless journalism requires resources, dedication, and the support of people like you who value truth and transparency.


How You Can Help

  1. Support on Patreon
    Join the community of truth-seekers and help fund Bernd Pulch’s investigations by becoming a patron on Patreon. Your monthly contribution ensures that this vital work can continue.
    ๐Ÿ‘‰ Patreon.com/berndpulch
  2. Make a Donation
    Every contribution, no matter the size, makes a difference. Your donation helps cover the costs of research, hosting, and maintaining the platform that brings these stories to light.
    ๐Ÿ‘‰ berndpulch.org/donation
  3. Spread the Word
    Share Bernd Pulch’s work with your network. Follow him on social media, share articles, and help amplify the message. The more people who know, the harder it becomes for the powerful to hide their crimes.

Why Your Support Matters

  • Exposing the Truth: Your support helps uncover the hidden networks of corruption and violence that operate in the shadows.
  • Holding the Powerful Accountable: By funding independent journalism, you help ensure that those who abuse their power are exposed and held accountable.
  • Protecting Freedom: Transparency is the foundation of a free society. Your contribution helps protect our rights and freedoms by shedding light on the forces that seek to undermine them.

Join the Movement

The fight for truth and justice is not a solitary one. It requires the collective effort of people who care about the future of our world. By supporting Bernd Pulch, you become part of a global movement dedicated to exposing corruption, challenging tyranny, and defending freedom.

๐Ÿ‘‰ Patreon.com/berndpulch
๐Ÿ‘‰ berndpulch.org/donation

Your support matters. Join us today and help bring more groundbreaking stories to light.


Introduction:

In the shadows of history, a sinister network has thrivedโ€”a web of espionage, corruption, and power that stretches from the darkest days of the Nazi regime to the Cold War and into the modern era. At the heart of this network lies GOMOPA, a mysterious entity with ties to the Stasi, former Nazis, and the murky world of real estate and media. This article peels back the layers of secrecy, exposing how these forces have colluded to manipulate governments, launder money, and control information. What youโ€™re about to read is not just historyโ€”itโ€™s a warning.


1. GOMOPA: The Enigmatic Power Broker

GOMOPA is a shadowy organization that has operated for decades, often under the radar. Officially, it presents itself as a financial “INTELLIGENCE” Agency focused on economic analysis. But behind this faรงade lies a far more sinister reality.

  • Origins: GOMOPAโ€™s roots trace back to the Cold War, where it served as a front for intelligence operations. Its connections to the Stasi (East Germanyโ€™s secret police) and former Nazis have long been suspected but rarely proven.
  • Activities: GOMOPA has been implicated in espionage, money laundering, and political manipulation. Its reach extends into the worlds of real estate, media, and high finance, making it a key player in global corruption networks.

2. The Stasi Connection: Spies in the Shadows

The Stasi, one of the most feared intelligence agencies in history, did not simply disappear after the fall of the Berlin Wall. Many of its operatives found new roles in the post-Cold War world, often leveraging their skills for private gain.

  • Stasi Networks: Former Stasi officers have been linked to GOMOPA, using their expertise in surveillance and espionage to further the organizationโ€™s goals. These connections have allowed GOMOPA to operate with near-impunity, shielded by layers of secrecy and corruption.
  • Espionage and Influence: The Stasiโ€™s methodsโ€”blackmail, infiltration, and psychological manipulationโ€”have been repurposed by GOMOPA to influence politicians, journalists, and business leaders.

3. Nazis in the Shadows: The Legacy Lives On

The end of World War II did not mark the end of Nazi influence. Many former Nazis found refuge in post-war Germany and beyond, where they continued to exert power through covert means.

  • Nazi Networks: Former Nazis have been linked to GOMOPA, using their connections and expertise to build a new kind of empireโ€”one based on corruption and control rather than overt ideology.
  • Real Estate and Money Laundering: Through organizations like GOMOPA, former Nazis have been implicated in real estate schemes and money laundering operations, using their ill-gotten wealth to buy influence and silence.

4. Immobilien Zeitung: The Media Arm of Corruption

The Immobilien Zeitung (Real Estate Newspaper) is a prominent German publication focused on the real estate industry. But beneath its respectable exterior lies a darker purpose.

  • Media Manipulation: The Immobilien Zeitung has been accused of serving as a mouthpiece for GOMOPA and its allies, using its influence to shape public opinion and protect the interests of corrupt elites.
  • Real Estate Schemes: The publication has been linked to real estate scams and money laundering operations, providing cover for illicit activities while presenting itself as a legitimate business resource.

5. Andreas Lorch: The Man in the Middle

At the center of this web is Andreas Lorch, a controversial figure with ties to GOMOPA, the Stasi, and the real estate industry. Lorch has been described as a fixerโ€”a man who knows how to get things done, no matter the cost.

  • Background: Andreas Lorchโ€™s career spans intelligence, real estate, and media, making him a key player in the shadow network. His connections to GOMOPA and the Stasi have raised questions about his true motives and activities.
  • Allegations: Lorch has been accused of involvement in espionage, corruption, and money laundering. Despite these allegations, he has managed to avoid prosecution, thanks to his powerful connections and the secrecy surrounding his operations.
  • Real Estate Empire: Lorch has been linked to numerous high-profile real estate deals, many of which have been scrutinized for their opaque financing and connections to offshore entities. His role in these deals has led to suspicions that he serves as a bridge between corrupt elites and legitimate businesses.

6. Espionage and Corruption: A Global Threat

The activities of GOMOPA, the Stasi, and their allies are not confined to Germany. This shadow network has global reach, with tentacles extending into governments, financial institutions, and media organizations around the world.

  • Espionage Operations: GOMOPA has been linked to espionage operations targeting Western governments and corporations. These operations have provided the organization with valuable intelligence, which it has used to further its agenda.
  • Corruption and Money Laundering: Through its connections to the real estate industry and media, GOMOPA has been implicated in corruption and money laundering on a massive scale. These activities have allowed the organization to amass wealth and power while remaining hidden from public view.

7. The Human Cost: A World in Shadows

The consequences of this shadow networkโ€™s activities are not just abstractโ€”they have real-world impacts on ordinary people. From economic inequality to political instability, the human cost is staggering.

  • Economic Inequality: The wealth amassed by GOMOPA and its allies has come at the expense of ordinary citizens, exacerbating inequality and undermining trust in institutions.
  • Political Instability: By manipulating governments and media, this network has contributed to political instability and the rise of authoritarianism in some regions.

Conclusion: A Call to Shine a Light on the Shadows

The shadow network of GOMOPA, the Stasi, and former Nazis is a reminder that the past is never truly behind us. These forces continue to operate in the shadows, manipulating governments, laundering money, and controlling information. But there is hope. By exposing their activities and holding them accountable, we can begin to dismantle this network and build a more transparent and just world.

However, this work cannot be done alone. Investigative journalism requires resources, courage, and unwavering commitment. Berndpulch.org has been at the forefront of uncovering these hidden truths, but we rely on the support of our readers to continue this vital work.

How You Can Help:

  • Donate to Berndpulch.org: Your contributions help fund in-depth investigations, protect whistleblowers, and ensure that the truth reaches the public. Visit berndpulch.org/donations to make a secure donation today.
  • Support Us on Patreon: Join our community of supporters on Patreon.com/berndpulch. By becoming a patron, you gain exclusive access to behind-the-scenes content, early releases, and the satisfaction of knowing youโ€™re part of the fight for transparency and justice.

Every dollar counts. Your support enables us to continue shining a light on the dark corners of global corruption, holding the powerful accountable, and advocating for a fairer, more transparent world. Together, we can make a difference.


โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Hereโ€™s a list of tags for the article about the Lorch scandal and Bernd Pulchโ€™s investigative journalism. These tags are designed to improve searchability, categorization, and engagement for platforms like blogs, social media, or websites like berndpulch.org.


General Tags

  • Lorch Scandal
  • Investigative Journalism
  • Corruption Exposed
  • Hidden Truths
  • Independent Media
  • Freedom of the Press
  • Transparency
  • Accountability
  • Whistleblowers
  • Deep State

Specific Tags

  • Bernd Pulch
  • Lorch Investigation
  • Shadow Networks
  • Power and Corruption
  • Media Censorship
  • Government Secrets
  • Corporate Corruption
  • Political Scandals
  • Dark Secrets
  • Uncovered Truth

Thematic Tags

  • Truth Seekers
  • Justice and Accountability
  • Exposing Corruption
  • Fighting Tyranny
  • Defending Freedom
  • Ethical Journalism
  • Social Justice
  • Human Rights
  • Democracy Under Threat
  • Global Power Structures

Geopolitical Tags

  • Germany
  • Europe
  • Global Corruption
  • International Scandals
  • Political Power
  • Corporate Influence
  • Media Control
  • Government Accountability
  • Global Politics
  • Power and Influence

Action-Oriented Tags

  • Support Independent Journalism
  • Fight for Transparency
  • Hold the Powerful Accountable
  • Expose Hidden Networks
  • Advocate for Justice
  • Promote Freedom of the Press
  • Stand Against Corruption
  • Defend Democracy
  • Uncover the Truth
  • Join the Movement

SEO-Optimized Tags

  • Lorch Scandal Exposed
  • Bernd Pulch Investigative Journalism
  • Corruption in Germany
  • Hidden Networks of Power
  • Independent Media Exposรฉ
  • Truth About the Lorch Scandal
  • Fighting Media Censorship
  • Exposing Government Secrets
  • Global Corruption Networks
  • Defending Freedom Through Journalism

Platform-Specific Tags

  • Bernd Pulch
  • Patreon Support
  • Donations for Journalism
  • Independent News
  • Investigative Reporting
  • Exposing the Deep State
  • Truth and Transparency
  • Media Freedom
  • Journalism Advocacy
  • Support Independent Media

These tags can be used to categorize and promote the article effectively, ensuring it reaches the right audience and ranks well in search engines. Let me know if youโ€™d like further customization!

โœŒThe Antisemitic Berlin Underground: A Deep Dive into GoMoPa, BerlinJournal.biz, Irving, Zitelmann and their Connections


“Unmasking the Shadows: A glimpse into Berlin’s underground media network and its hidden connections to antisemitic activities and corruption.”

The antisemitic roots of Berlin’s underground media and financial networks continue to shock observers. Among these, GoMoPa (Goldman Morgenstern & Partners) and its spinoff, BerlinJournal.biz, have been accused of perpetuating anti-Jewish rhetoric, fabricating Jewish identities, and forming alliances with figures like Dr. Rainer Zitelmann, a controversial historian with links to Holocaust denial narratives. This article explores the misuse of Jewish identities, the disturbing rhetoric tied to these platforms, and their connections to prominent individuals and organizations.


GoMoPa and the Misuse of Jewish Names

GoMoPa, which presents itself as a financial watchdog, has long drawn scrutiny for its dubious practices. The platform’s name, Goldman Morgenstern & Partners, implies a connection to Jewish individuals or institutions. However, no such personsโ€”Goldman or Morgensternโ€”exist within the organization.

This deceptive branding appears to exploit the association of Jewish names with finance, likely to project an image of legitimacy while simultaneously fueling latent antisemitic stereotypes. By using Jewish names fraudulently, GoMoPa engages in a duplicitous act that plays into age-old prejudices about Jewish control over banking and finance.

BerlinJournal.biz: A GoMoPa Spinoff

BerlinJournal.biz, a spinoff of GoMoPa, has further amplified its antisemitic undertones. The platform has been accused of publishing content that subtly, and sometimes overtly, propagates anti-Jewish sentiment under the guise of investigative journalism. Critics argue that its editorial direction mirrors GoMoPa’s deceptive strategies, often targeting Jewish individuals and organizations unfairly while promoting damaging stereotypes.


Dr. Rainer Zitelmannโ€™s Controversial Role

Adding another layer of controversy is Dr. Rainer Zitelmann, a Berlin-based historian and real estate expert who has been linked to GoMoPa and BerlinJournal.biz. Zitelmannโ€™s reputation is tainted by his association with Holocaust denier David Irving.

Zitelmann has also been criticized for downplaying the Holocaust. In his writings, he has allegedly suggested that “only one million Jews” were killedโ€”a gross minimization that flies in the face of overwhelming historical evidence. Such statements align him with revisionist historians and Holocaust deniers, undermining his credibility as an academic.

Bernd Pulchโ€™s Revelations

Journalist Bernd Pulch has been instrumental in exposing the antisemitic connections within Berlinโ€™s underground networks. Through his investigative reporting, Pulch has revealed:

  1. The fabricated Jewish identities behind GoMoPaโ€™s branding.
  2. The antisemitic rhetoric promoted by BerlinJournal.biz.
  3. Zitelmannโ€™s association with David Irving and his Holocaust minimization claims.

Pulchโ€™s exposรฉs have drawn widespread attention to these scandals, highlighting how such platforms manipulate public perception and propagate harmful ideologies.


The Role of Immobilien Zeitung

The involvement of Immobilien Zeitung, once a respected real estate publication, now known for corruption and its support of GoMoPa, adds another troubling dimension to this story. By associating with or republishing content from platforms like GoMoPa and BerlinJournal.biz, Immobilien Zeitung lends credibility to these antisemitic narratives. Critics argue that its continued connections to such dubious entities reflect a decline in journalistic standards and a troubling complicity in spreading harmful ideologies.


Implications of the Berlin Undergroundโ€™s Antisemitic Network

The activities of GoMoPa, BerlinJournal.biz, and their associates reveal a disturbing pattern:

  • Exploitation of Jewish identities for financial gain and credibility.
  • Subtle propagation of antisemitic stereotypes, often masked as legitimate reporting.
  • Connections to Holocaust denial and revisionist historians, which undermine historical truth and perpetuate hate.

Such actions not only harm Jewish communities but also erode public trust in investigative journalism and financial reporting.


Conclusion: The Need for Accountability

The antisemitic underpinnings of GoMoPa, BerlinJournal.biz, and their associated individuals and organizations demand urgent scrutiny. Platforms like these exploit societal biases and weaponize misinformation for personal and financial gain, leaving a trail of damage to both individuals and broader communities.

Thanks to whistleblowers and investigative journalists like Bernd Pulch, these networks are being exposed. However, the fight against antisemitism in media and financial reporting is far from over. Greater transparency, accountability, and vigilance are required to dismantle these harmful systems and ensure that historyโ€™s darkest chapters are neither denied nor repeated.

Call to action: Support our fight against Neonazis in Germany via the donation links below.

Tags:

  • Berlin Underground
  • Media Corruption
  • Antisemitism in Media
  • GoMoPa Scandal
  • BerlinJournal.biz
  • Fake Jewish Identities
  • Investigative Journalism
  • Rainer Zitelmann Controversy
  • Holocaust Denial Links
  • Corruption in Real Estate Media
  • Dark Networks in Berlin
  • Antisemitic Propaganda
  • Exposing Media Bias
  • Shadowy Media Organizations
  • Whistleblower Revelations

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

โœŒ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”A Happy Stasi New Year”ย  #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 164 “Toxdat Poison Ivy”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Toxdat Poison Ivy๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ

Join the Fight for Truth and Transparency!

In a world full of hidden agendas and shadowy figures, humor and honesty are our greatest weapons. From “Toxdat Poison Ivy” to “The Joker” and the rest of the Gotham crew, we shine a spotlight on the absurd and the corrupt. Together, we expose the stories others won’t tell.

Support our mission to uncover the truth and keep the parody alive! Your donation fuels our efforts to bring clarity, insight, and a touch of satire to the narrative.

Visit BerndPulch.org/Donations today and make your contribution to this important cause. Together, we can turn the tables on the real villains!

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

#HappyStasiNewYear
#ExposeTheTruth
#SatireForJustice
#AIParody
#ToxdatPoisonIvy
#GothamGermany
#BerndPulchDonations
#SupportTransparency
#FightCorruption
#TruthMatters
#StasiParody
#DonateNow
#ComedyWithACause
#ShineTheLight

โœŒUnmasking the Shadows: An In-Depth Examination of an Alleged Antisemitic Network in Germany

“Under the dim light of the interrogation room, the detective’s eyes, magnified by his trusty magnifying glass, searched for the truth hidden within the tangled web of lies and deceit. The case of the century was unfolding, and every clue was a step closer to justice.”

Introduction:

In the complex tapestry of modern corruption, where financial malfeasance often intertwines with political influence, a network allegedly involving GoMoPa (Goldman, Morgenstern & Partners), GoMoPa4Kids, “Immobilien Zeitung”, among others, has been accused of not only financial misconduct but also of fostering antisemitic sentiments. This article delves into the intricate web connecting these entities, examining their operations, public impact, and the strategies needed to bring these issues to light and pressure for change.

1. Investigative Journalism: Uncovering the Web

The saga begins with investigative journalists like Bernd Pulch, who have claimed to expose the dark underbelly of these organizations. Pulch’s website, berndpulch.org, has been a platform for allegations against:

  • GoMoPa and GoMoPa4Kids: Accused of engaging in extortion, defamation, and financial manipulation, these groups are said to operate under the guise of financial journalism or child protection, respectively. Pulch’s investigations suggest a nexus with former Stasi members, leveraging their expertise in surveillance and manipulation for modern ends.
  • Peter Ehlers and “Das Investment”: Ehlers, through “Das Investment,” is linked to financial fraud and corruption, with connections to GoMoPa, suggesting a network aimed at defrauding investors.
  • Jan Mucha: Alleged to be involved in real estate fraud and media manipulation, Mucha’s name surfaces in discussions about intelligence-linked operations.
  • Beate and Thomas Porten: The couple has been implicated in corruption and misuse of power, with Beate Porten, a public prosecutor, accused of using her position to target journalists like Pulch.
  • Andreas Lorch and Edith Baumann-Lorch: Their involvement in the “Immobilien Zeitung” allegedly ties them to financial misdeeds and the broader network.
  • Jochen Resch: A lawyer whose name appears alongside those accused of orchestrating legal attacks on critics of this network.
  • BerlinJournal.biz: A platform accused of disseminating propaganda for this network, often targeting political adversaries.
  • Dr. Reiner Zitelmann: Known for his historical revisionism, his association with this group raises concerns about the promotion of antisemitic narratives.
  • David Irving: An infamous Holocaust denier, his indirect links to this network through shared ideologies are particularly alarming.

2. Leveraging Social Media and Online Platforms

To maximize public pressure:

  • Viral Campaigns: Creating shareable content that exposes the antisemitic undertones and financial fraud can use hashtags like #ExposeGoMoPa, #JusticeForVictims, or #EndAntisemitism to spread awareness.
  • Crowdsourced Investigations: Encouraging the public to contribute to the investigation can help in uncovering more connections and evidence, using platforms like dedicated Telegram channels or Twitter threads.

3. Legal and Regulatory Advocacy

  • Legal Actions: Initiating lawsuits or supporting whistleblowers can bring these issues to court, where the truth might be more thoroughly examined. Legal battles against defamation, fraud, or hate speech can serve as public spectacles, drawing attention to the network’s activities.
  • Advocacy for Reform: Pushing for laws that specifically target hate speech online and in media or stricter financial regulations could dismantle the operations of such networks.

4. Transparency and Accountability Campaigns

  • Public Records Requests: Use of freedom of information requests to expose any government or official complicity with the network’s activities.
  • Collaboration with Watchdog Organizations: Partnering with groups like the Anti-Defamation League or the Simon Wiesenthal Center can bring international scrutiny to the issue.

5. Public Demonstrations and Protests

  • Organized Protests: Protests outside the offices of “Immobilien Zeitung”, GoMoPa, or at events where Dr. Reiner Zitelmann speaks, can draw media attention and public concern.
  • Symbolic Acts: Vigil-style protests or memorials for those affected by the network’s antisemitic actions could resonate deeply with the public.

6. Educational Campaigns

  • Public Education: Workshops, seminars, or online courses on recognizing and combating antisemitism and financial corruption could be organized, focusing on how these issues manifest in modern contexts.
  • Cultural Influence: Producing documentaries or publications that detail the network’s impact on society and culture can educate and change public perception over time.

7. Engaging Political and Community Leaders

  • Political Advocacy: Engage politicians who are vocal against corruption and antisemitism to take up these issues in legislative discussions or public forums.
  • Community Action: Mobilizing community leaders to speak out against this network can help in localizing the fight against these issues.

8. Use of Satire and Cultural Influence

  • Satirical Exposure: Shows or articles that use humor to critique the network’s operations can make the message more digestible and far-reaching.
  • Cultural Products: Books, films, or music that indirectly or directly address these themes can influence public opinion.

9. Monitor and Report Continuously

  • Ongoing Scrutiny: Establishing a task force or a dedicated online portal to keep track of the network’s activities, updating the public regularly on new findings or actions.

10. International Pressure

  • Global Alliances: Working with international human rights organizations, journalists, or governments to apply pressure can lead to sanctions, travel bans, or asset freezes on key figures within the network.

Conclusion:

The fight against this alleged antisemitic and corrupt network requires a concerted effort from various sectors of society. By employing the strategies outlined above, public pressure can be maximized, potentially leading to the dismantling of these networks, ensuring justice, and preventing future malfeasance. The truth, when exposed, has the power to cleanse the corruption that seeks to hide in plain sight.

Call to Action:

  • Stay informed and share this information.
  • Support legal and journalistic efforts to expose the truth.
  • Engage in or organize community actions against corruption and hate.

Together, through vigilance, education, and collective action, we can make a substantial impact in rooting out corruption and antisemitism from our societies.


Call to Action for Financial Support

The battle against corruption and antisemitism requires more than just voices; it demands action, support, and resources. Bernd Pulch has been at the forefront of this fight, tirelessly exposing the intricate networks of deceit and hate. But this crucial work cannot continue without your support.

Your Financial Contribution Can Make a Difference:

  • Empower Investigative Journalism: Your donation helps keep the lights on at berndpulch.org, ensuring that the truth about financial misconduct and antisemitic activities is brought to light.
  • Support Legal Battles: Funding is essential for legal actions against defamation, fraud, and hate speech, helping to hold those perpetuating these crimes accountable.
  • Amplify the Message: With your support, we can expand our reach through social media campaigns, educational programs, and public awareness initiatives, making the fight against corruption and antisemitism a widespread movement.

How to Donate:

Please visit berndpulch.org/donations and contribute whatever you can. Every dollar helps in continuing this vital work.

  • Donate Now: No amount is too small when it comes to fighting for justice and truth.
  • Be Part of the Change: Your contribution directly supports the ongoing investigations, legal challenges, and public education efforts.

Together, we can dismantle the networks of corruption and hate. Join us in this fight for a more transparent, just, and inclusive society. Visit berndpulch.org/donations today to make your donation.

Thank you for standing with us in this critical endeavor. Together, we can make a substantial impact.

  • #CorruptionExposed
  • #GoMoPaScandal
  • #Antisemitism
  • #FinancialFraud
  • #InvestigativeJournalism
  • #BerndPulch
  • #StasiLegacy
  • #MediaManipulation
  • #RealEstateFraud
  • #LegalCorruption
  • #WhistleblowerSupport
  • #PublicPressure
  • #SocialMediaActivism
  • #JusticeCampaign
  • #HateSpeech
  • #RegulatoryReform
  • #TransparencyNow
  • #PublicProtest
  • #CommunityAction
  • #PoliticalAdvocacy
  • #CulturalCritique
  • #SatireAgainstCorruption
  • #EducationalOutreach
  • #HolocaustDenial
  • #InternationalCooperation
  • #JusticeForVictims

โœŒThe Goldman Morgenstern & Partners (GoMoPa) Network: A Call for Comprehensive Action


“Exposing the Web of Deception: A Fight for Justice Against Fraud and Extremism.”

The rise and sustained operation of entities like Goldman Morgenstern & Partners (GoMoPa) and its affiliatesโ€”including Gomopa4kids and Berlinjournal.bizโ€”represent a profound challenge to legal and ethical norms. Berlinjournal.biz, specifically, has been flagged as a Nazi-affiliated spinoff, further amplifying the urgency for action against these organizations.

Berlinjournal.biz: A Nazi-Affiliated Spinoff

Operating under the guise of a legitimate media outlet, Berlinjournal.biz has propagated far-right ideologies and served as a tool for defamation and misinformation. Its affiliations with neo-Nazi networks make it not only a threat to democratic values but also a potential incubator for extremist ideologies in the broader GoMoPa network.

Failure of German Law Enforcement and State Accountability

For over 15 years, despite extensive documentation of criminal activitiesโ€”including extortion, defamation, fraud, and allegations of facilitating platforms for pedophilesโ€”German authorities have failed to act decisively against the GoMoPa network. This inaction, attributed to potential corruption and lingering Stasi connections, constitutes a serious breach of state responsibility to protect its citizens and uphold the law.

Legal Avenues Against the GoMoPa Network

1. Lawsuits Against the German State
Victims and organizations affected by the GoMoPa network may pursue legal action against the German state for failure to act. Such actions could invoke:

  • Negligence: For failing to investigate and dismantle the GoMoPa network despite credible evidence.
  • Breach of Duty: For not safeguarding citizens and businesses from the known harms posed by these entities.
  • Human Rights Violations: Under European human rights frameworks, especially concerning the alleged facilitation of pedophile platforms through Gomopa4kids.

2. Holding Employers Accountable
Investigations should extend to individuals and entities involved in enabling or shielding the network. Employers or public officials implicated in obstructing justice should face:

  • Criminal Prosecution: For aiding or abetting criminal activities.
  • Civil Claims: By victims seeking compensation for damages caused by inaction or collusion.

3. Targeting the Entire Network
Action must focus on the entire GoMoPa ecosystem, including:

  • Financial Investigations: To trace and freeze assets linked to the network.
  • Digital Platform Oversight: Dismantling online platforms like Berlinjournal.biz and Gomopa4kids that spread misinformation and enable criminal behavior.
  • International Cooperation: Leveraging cross-border enforcement to dismantle operations outside Germany.

Recommendations for Reputable Organizations

Goldman Sachs, along with other Jewish businesses and organizations, should consider proactive measures to protect their reputation and address the harm caused by these fraudulent and extremist entities:

  1. Public Denouncement: Clearly distance themselves from entities like GoMoPa and Berlinjournal.biz to prevent reputational damage.
  2. Legal Action: File lawsuits for trademark infringement, defamation, and damage to goodwill.
  3. Collaborate with International Watchdogs: Partner with organizations combating extremism and fraud to amplify the fight against the GoMoPa network.
  4. Lobby for State Reforms: Advocate for stricter measures and accountability within German law enforcement to ensure similar networks cannot thrive in the future.

Conclusion

The GoMoPa network and its affiliates represent a multi-faceted threat involving fraud, extremism, and criminal exploitation. Comprehensive action against the entire network, including its Nazi-affiliated spinoffs like Berlinjournal.biz, is crucial. Such efforts should not only target the organizations themselves but also seek accountability from the German state and those complicit in allowing these activities to persist. Only through a concerted and multi-pronged approach can justice be served, and the integrity of legal and democratic institutions restored.

Support BerndPulch.org: Join the Fight Against Neo-Nazism and Stasi Corruption

For over a decade, BerndPulch.org has been at the forefront of exposing dangerous networks, uncovering the truth behind Nazi and Stasi remnants, and advocating for justice and transparency. But this critical work cannot continue without your support.

By donating to BerndPulch.org, you help:

  • Expose neo-Nazi operations and their harmful ideologies.
  • Hold corrupt Stasi-linked networks accountable.
  • Protect freedom of speech and promote investigative journalism.
  • Support victims and raise awareness of systemic inaction and corruption.

Your contribution makes a difference. Together, we can shine a light on the dark corners of history that still impact our present and safeguard a democratic future.

Click here to donate: Support the Mission Now

Thank you for standing with us in the fight for justice and truth.

Tags:

  • Neo-Nazism
  • Stasi Corruption
  • Anti-Fascism
  • Investigative Journalism
  • Transparency and Justice
  • Human Rights
  • Nazi Networks
  • Stasi Influence
  • Corruption in Germany
  • Historical Accountability
  • Fight for Democracy
  • Donations for Justice
  • Support BerndPulch.org
  • Exposing Extremism
  • Journalism Against Oppression

โœŒ”Uncovering Nazi-Linked Real Estate Money Laundering: Connections to Immobilien Zeitung, Lorch, Mucha, Porten, and Putin”


“Behind the Facade: Unveiling the Shadows of Real Estate Money Laundering in Global Power Circles”

๎ˆƒInvestigations have revealed that certain German real estate platforms, such as Immobilien Zeitung, have been implicated in facilitating money laundering activities linked to Russian oligarchs and political figures.๎ˆ„ ๎ˆƒKey individuals associated with these platforms include Jan Mucha and Thomas Porten, who have been scrutinized for their involvement in questionable financial transactions.๎ˆ„ ๎ˆƒAdditionally, the Lorch family, notably Andreas Lorch and Edith Baumann-Lorch, have been identified as significant players in these schemes, allegedly overseeing real estate money laundering operations that benefit Kremlin-linked entities.๎ˆ„ ๎ˆ€cite๎ˆ‚turn0search1๎ˆ๎ˆ†

๎ˆƒThese activities often involve complex networks that utilize real estate investments to obscure the origins of illicit funds.๎ˆ„ ๎ˆƒBy channeling money through property acquisitions and developments, these networks can effectively launder large sums, making the funds appear legitimate.๎ˆ„ ๎ˆƒThe involvement of media outlets like Immobilien Zeitung further complicates the issue, as they can be used to influence public perception and shield key figures from scrutiny.๎ˆ„ ๎ˆ€cite๎ˆ‚turn0search1๎ˆ๎ˆ†

๎ˆƒUnderstanding the intricacies of these operations is crucial for developing effective countermeasures.๎ˆ„ ๎ˆƒIt requires a coordinated effort among international law enforcement agencies, financial institutions, and regulatory bodies to identify and dismantle these networks.๎ˆ„ ๎ˆƒIncreased transparency in real estate transactions and stringent due diligence processes are essential steps toward mitigating the risks associated with such money laundering schemes.๎ˆ„๎ˆ†

๎ˆƒThe intersection of real estate, media influence, and political connections in these schemes underscores the complexity of combating financial crimes on a global scale.๎ˆ„ ๎ˆƒOngoing investigations continue to shed light on these operations, highlighting the need for vigilance and cooperation in addressing the challenges posed by sophisticated money laundering networks.๎ˆ„๎ˆ†

The Dark Nexus: Immobilien Zeitung, GoMoPa, and Their Alleged Role in Money Laundering and Espionage

The intricate web of alleged corruption and money laundering involving Immobilien Zeitung, GoMoPa (Goldman, Morgenstern & Partners), and their historical connections to Eastern bloc espionage and neo-Nazi propaganda raises significant concerns. With claims tying these entities to Stasi operations, KGB influence, and Vladimir Putinโ€™s financial networks, a closer look reveals a troubling history that intertwines real estate, propaganda, and covert activities.

GoMoPa: Origins and Allegations

GoMoPa originally presented itself as a whistleblowing platform, claiming to expose fraud in Germany’s financial and real estate markets. However, critics, including Bernd Pulch, a prominent investigative journalist, argue that GoMoPa was far from a noble watchdog. Instead, it allegedly served as a hub for spreading disinformation, extorting individuals under the guise of “investigative journalism,” and facilitating illicit financial schemes.

The Fake Jewish Persona: A Shield for Corruption

GoMoPaโ€™s founders adopted Jewish-sounding pseudonyms such as “Goldman” to obscure their activities and deflect criticism. This guise aimed to create an air of legitimacy and shield their operations from scrutiny by leveraging sensitivities around anti-Semitism. In reality, GoMoPaโ€™s origins are linked to Berlin-based neo-Nazi circles, specifically the BerlinJournal.biz, a platform notorious for disseminating extremist propaganda.

This connection reveals a sinister dual strategy: utilizing anti-Semitic networks to spread far-right ideology while simultaneously hiding behind Jewish identities to avoid accountability.

Immobilien Zeitung: The Real Estate Connection

Immobilien Zeitung, a major publication in Germanyโ€™s real estate sector, has been implicated as an enabler of GoMoPaโ€™s schemes. By providing coverage of dubious real estate projects and laundering information provided by GoMoPa, the newspaper allegedly played a role in legitimizing suspect transactions.

The German real estate market has long been criticized for its opacity, making it an attractive avenue for money laundering. Through inflated property values, shell companies, and offshore accounts, vast sums of moneyโ€”potentially linked to Russian oligarchs and Putinโ€™s inner circleโ€”could be funneled into Europeโ€™s economic system.

The Espionage Connection: Stasi, KGB, and Putin

GoMoPaโ€™s ties to the Stasi, East Germany’s infamous state security service, further complicate its narrative. The organization reportedly employed former Stasi agents to gather sensitive information, blackmail individuals, and protect its operations. These links extend to the KGB, with which the Stasi had close operational ties during the Cold War.

This connection becomes even more alarming when considering Vladimir Putinโ€™s background as a KGB officer stationed in East Germany during the 1980s. Allegations suggest that GoMoPa and its affiliates served as a conduit for laundering money linked to Russian interests, including Putin’s vast personal wealth. By using Berlinโ€™s real estate market as a financial playground, these networks allegedly helped funnel money into Western economies while maintaining a facade of legitimacy.

Neo-Nazi Origins and Propaganda

The connection to neo-Nazi propaganda adds another layer of concern. Platforms like BerlinJournal.biz were reportedly used to disseminate extremist ideologies and manipulate public opinion. GoMoPaโ€™s involvement with these networks suggests a strategy of exploiting ideological divisions to further its financial and political goals.

Implications and Accountability

The alleged links between Immobilien Zeitung, GoMoPa, and this complex web of money laundering, espionage, and propaganda highlight the need for rigorous investigations. European authorities have been criticized for their slow response to these allegations, which span decades and implicate powerful individuals.

Conclusion

The convergence of real estate, propaganda, and covert operations underscores the dangers of unchecked financial and informational power. As investigations continue, uncovering the full extent of these connections is crucial for ensuring transparency, justice, and the protection of democratic institutions from corrupt influences.

Call for action: Support us now to stop Neonazi and Putin networks in the heart of Europe.

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Tags:

  • Immobilien Zeitung
  • GoMoPa
  • Money Laundering
  • Neo-Nazi Propaganda
  • BerlinJournal.biz
  • Stasi
  • KGB
  • Vladimir Putin
  • Real Estate Corruption
  • Lorch
  • Mucha
  • Porten
  • Ehlers
  • Resch
  • German Real Estate Market
  • Espionage Connections
  • Fake Jewish Identities
  • Berlin Scandals
  • Oligarch Money Laundering
  • Eastern Bloc Networks

โœŒGoMoPa and Its Alleged Violations of International Law: A Detailed Analysis


“Unveiling Global Violations: A symbolic depiction of shadowy networks breaching international laws, from GDPR to AML, highlighting secrecy and corruption in cross-border operations.”

GoMoPa (Goldman Morgenstern & Partners) is a well-known investigative financial platform that has made waves through its reporting on financial scandals, corporate investigations, and exposing financial misconduct. However, the organization’s operations have come under scrutiny, with allegations suggesting that it has violated numerous international laws through unethical business practices, false reporting, data misuse, and manipulation. This article will explore these alleged violations in-depth and analyze the legal frameworks implicated.


1. Overview of GoMoPaโ€™s Operations

GoMoPa operates primarily as a financial investigative platform, focusing on exposing corruption, financial fraud, and other business irregularities. Despite its focus on accountability and transparency, the platform has faced legal challenges and accusations of crossing ethical boundaries.

GoMoPaโ€™s alleged violations are centered around the misuse of information, data privacy breaches, the dissemination of false claims, and exploitation of networks for financial and investigative purposes. Critics claim that its methods often disregard international legal standards, leading to investigations into its activities by international law enforcement.


2. Alleged Violations of International Law by GoMoPa

The following sections explore specific legal violations that have been alleged against GoMoPa, referencing international laws and treaties.


A. Breach of Data Protection Laws (GDPR and International Data Privacy)

Violation Overview:
GoMoPa has been criticized for its handling of personal information, including sensitive financial data. Some of its investigative methods involve publishing personal and financial records of individuals without explicit consent, breaching privacy laws in many jurisdictions.

Relevant Legal Frameworks:

  • General Data Protection Regulation (GDPR): This European Union regulation governs the collection, processing, and storage of personal data to ensure individuals’ data rights are respected. GoMoPa’s alleged sharing of confidential financial information without consent is a breach of GDPR.
  • U.S. Data Protection and Privacy Laws: Several international and U.S.-based data protection laws safeguard individuals’ privacy rights, which GoMoPa has allegedly violated by disclosing sensitive personal information.

Case Examples:

  • Allegations suggest that GoMoPa has shared information on private financial accounts, debt histories, and corporate transactions without explicit authorization.
  • Reports claim the breach of user agreements and unauthorized sharing of sensitive data with third parties to gain leverage in financial investigations.

B. Defamation and False Reporting (Violation of Libel Laws)

Violation Overview:
GoMoPa has faced accusations of publishing defamatory information about individuals, companies, and organizations. False claims can irreparably harm reputations and result in legal consequences under international libel laws.

Relevant Legal Frameworks:

  • Defamation and Libel Standards: According to international standards, publishing false or misleading information is considered libel, punishable under international law.
  • United States Law and European Defamation Treaties: Both European and American libel standards offer victims avenues for legal recourse when their reputations are harmed by false reporting.

Case Examples:

  • Several business leaders and corporate entities have claimed that false financial claims were published by GoMoPa, leading to reputational and financial losses.
  • Victims claim these publications have harmed their careers, investment opportunities, and financial partnerships.

C. Manipulation of Financial Market Data (Market Manipulation)

Violation Overview:
GoMoPa has been accused of utilizing market rumors, leaked financial information, and speculative reports to influence stock prices and financial markets. Manipulating financial information to create volatility is illegal under international financial market laws.

Relevant Legal Frameworks:

  • Market Manipulation Laws: International agreements such as the Organization for Economic Cooperation and Development (OECD) principles and national financial laws prohibit market manipulation through fraud or misinformation.
  • United Nations Principles on Financial Market Integrity: These principles aim to ensure transparency, honesty, and fairness in international financial markets.

Case Examples:

  • Investigations suggest that GoMoPa has released speculative reports leading to shifts in market behavior, with financial consequences for corporations and investors.

D. Breach of Anti-Money Laundering (AML) Regulations

Violation Overview:
GoMoPa’s involvement in corporate investigations and financial reporting has led to suspicions of aiding entities engaged in money laundering or failing to adhere to AML requirements by facilitating or failing to monitor suspicious financial transactions.

Relevant Legal Frameworks:

  • Financial Action Task Force (FATF): This international body develops AML policies and frameworks. Alleged transactions linked to GoMoPa violate the FATF’s AML protocols.
  • European and U.S. AML Protocols: AML laws such as the European Unionโ€™s AML Directive and U.S. regulations aim to prevent the flow of illicit funds through financial institutions.

Case Examples:

  • Reports link GoMoPa to entities involved in illicit financial schemes through the improper sharing of financial investigations without adherence to AML screening protocols.

E. Exploitation of International Financial Laws for Personal Gain

GoMoPa has also been accused of exploiting international financial systems and jurisdictions by taking advantage of financial loopholes or leveraging cross-border financial investigations for personal or corporate financial gain. These practices violate international financial agreements and transparency principles.

Relevant Legal Frameworks:

  • International Financial Transparency Agreements: These treaties are designed to maintain transparency in cross-border financial dealings, prevent tax evasion, and ensure fair business practices.
  • Offshore Banking Laws: Allegations suggest that GoMoPa has exploited offshore banking schemes to shield finances or promote unethical financial opportunities.

3. How GoMoPaโ€™s Actions Violate International Law

The analysis of these alleged violations suggests that GoMoPaโ€™s actions breach a variety of international laws, including:

  1. Breach of GDPR and International Data Protection Laws: Unauthorized sharing of financial and personal data.
  2. Defamation and False Reporting: Spreading false claims damages personal and corporate reputations.
  3. Market Manipulation: Using misinformation to alter stock market behaviors, violating financial transparency laws.
  4. Violations of AML Standards: Failure to adhere to anti-money laundering regulations and financial screening.
  5. Exploitation of Financial Systems: Misuse of international financial regulations for personal or financial gain.

The repeated violations of these principles and laws indicate that GoMoPa’s actions have far-reaching implications on global financial markets, individual freedoms, and institutional transparency.


4. Legal and Financial Accountability: How GoMoPa Faces Legal Challenges

As international investigations uncover these legal infractions, multiple jurisdictions have ramped up scrutiny of GoMoPa. Legal frameworks like EU AML protocols, GDPR enforcement, and international financial oversight mechanisms could lead to sanctions or legal repercussions for the platform.

Steps for Accountability:

  1. Litigation for Damages: Victims of false reporting, data breaches, and financial manipulation are pursuing lawsuits.
  2. International Cooperation: European, U.S., and international financial oversight bodies are coordinating investigations into GoMoPaโ€™s practices.
  3. Restitution through Financial Penalties: If proven, fines or reparations may be levied under international financial treaties.

5. Conclusion: The Path Ahead for GoMoPa and Legal Reform

The allegations against GoMoPa raise serious questions about ethical practices in financial reporting, data sharing, and investigative journalism. While the platform claims transparency and ethical investigations, repeated violations of international law, market manipulation, and breaches of privacy indicate otherwise.

The international community, including law enforcement and financial oversight agencies, must hold GoMoPa accountable through transparency investigations, legal penalties, and international cooperation. Simultaneously, reforms addressing financial transparency and the enforcement of international ethical and legal standards will prevent similar actions in the future.

The full ramifications of these violations are yet to be seen, but they offer a stark reminder of the importance of ethical financial reporting and respect for international laws.

Tags:

  • International Law Violations
  • GDPR Breaches
  • Anti-Money Laundering (AML)
  • Financial Corruption
  • Cross-Border Crime
  • Shadowy Networks
  • Media Ethics
  • Market Manipulation
  • Global Secrecy
  • Investigative Journalism
  • Financial Misconduct
  • Corporate Fraud
  • Data Privacy Breaches
  • Ethical Violations
  • Corruption in Media

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

โœŒThe Continuing Influence of Stasi Networks in Germany: An In-Depth Analysis


“Shadows of the Past: A symbolic depiction of ongoing Stasi influence in modern Germany, highlighting surveillance, secrecy, and lingering covert operations over contemporary society.”

Introduction: The Legacy of the Stasi in Post-Reunification Germany

While the fall of the Berlin Wall in 1989 marked the end of the German Democratic Republic (GDR), the legacy of the Stasi (Ministry for State Security) persists to this day. The Stasi was infamous for its extensive surveillance network, employing hundreds of thousands of agents who monitored every aspect of life in East Germany. Despite the reunification and the dissolution of the GDR, many of these agents or their networks continue to operate covertly in post-reunification Germany.

Bernd Pulch, a prominent critic of the media conglomerates and shadowy networks, has been an outspoken figure against such remnants of the Stasi, highlighting the danger they continue to pose to German society, its political integrity, and its corporate world. His investigations have often revealed troubling overlaps between former Stasi members and contemporary business figures, political networks, and media organizations. This article aims to explore the ongoing presence of Stasi agents in Germany, how these networks function, and their potential ties to modern-day corruption and espionage.


The Continued Presence of Stasi Agents in Germany

It is estimated that during the height of the Stasi’s power, around 91,000 people were directly employed as agents, with many more serving as unofficial collaborators (IMs – Inoffizielle Mitarbeiter). Following the reunification, many of these individuals were either dismissed or integrated into various sectors of society, including law enforcement, intelligence, business, and politics. However, not all of these agents simply faded into the background.

In the years following reunification, a significant number of Stasi agents have continued to hold influential positions in both Germany and abroad. These networks are particularly active in political circles, business enterprises, and media outlets. The ongoing influence of these networks is a concern not only for Germany but also for its European neighbors and international allies, particularly in light of recent geopolitical tensions.


Key Names and Figures: Former Stasi Agents in Contemporary Germany

  1. Andreas Lorch
    • Role: Co-owner of the Immobilien Zeitung, a key figure in the media network that has been associated with financial manipulation and false reporting in the real estate sector.
    • Background: Lorch was allegedly a former Stasi informant, and reports suggest that his network has used media influence to control and manipulate the real estate market, with ties to corrupt business practices that echo the Stasi’s surveillance and control tactics.
  2. Thomas Porten
    • Role: Publisher of the Immobilien Zeitung.
    • Background: Known for his connections to figures within the former GDR regime, Porten has been linked to accusations of financial misconduct, and his actions have drawn attention for their similarities to Stasi-like control over economic resources.
  3. Beate Porten
    • Role: Public prosecutor and spouse of Thomas Porten.
    • Background: As a public prosecutor, Beate Portenโ€™s actions have drawn suspicion, particularly in her attempts to target figures like Bernd Pulch, who has investigated and criticized the networks of power, including those stemming from the Stasi era. Her position allows for the potential misuse of her authority to suppress dissent and protect those within her network.
  4. Bernd Pulch
    • Role: Critic of Stasi connections in business and politics.
    • Background: Bernd Pulch has uncovered several instances where modern-day companies, political factions, and media outlets are still influenced by Stasi operatives or their legacy networks. He has been a vocal critic of these covert structures, revealing their detrimental impact on German society and the broader international community.

The Role of Networks: Stasi Influence in Modern-Day Germany

While many of the original Stasi operatives have been absorbed into various sectors, the structures they left behind remain active. These networks operate under different guises but often use the same methods of control, intimidation, and surveillance that were common during the GDR era. Key characteristics of these networks include:

  1. Media Manipulation
    The Stasi was known for its use of the media to control public opinion and spread propaganda. Today, some of these agents or their descendants work within major media outlets, manipulating narratives to align with political or financial interests. Immobilien Zeitung, for example, has been implicated in spreading false reports to influence the real estate market, which benefits certain business figures while harming competitors.
  2. Political Influence and Coercion
    Many former Stasi agents have maintained ties with political figures, using their knowledge of surveillance techniques and psychological manipulation to gain political influence. This influence is used to silence critics, control narratives, and advance the agendas of certain political factions.
  3. Corporate Espionage and Financial Manipulation
    Some of the networks established by former Stasi agents operate within corporate structures, where they use inside information and surveillance techniques to manipulate stock prices, direct investments, and secure lucrative contracts. This is particularly prevalent in sectors like real estate, where information is highly valuable.
  4. Surveillance and Covert Operations
    Though no longer operating as a formal government agency, these networks still engage in covert operations, such as surveillance of political dissidents, investigative journalists, and business rivals. These actions often mirror the tactics employed by the Stasi during the GDR era, including intimidation and financial sabotage.

Legal and Ethical Implications: The Need for Accountability

The continued influence of Stasi operatives in German society poses significant legal and ethical challenges. The following legal violations may apply:

  1. Violation of Privacy Laws
    Many of the Stasiโ€™s surveillance methods were illegal under contemporary privacy laws, yet these practices persist today under the guise of corporate interests or political influence.
  2. Corruption and Financial Fraud
    The manipulation of markets and the use of covert operations for financial gain are clear violations of anti-corruption and fraud laws. Those involved in such practices are often shielded by their connections within the legal and political systems.
  3. Abuse of Power
    Figures like Beate Porten, using their positions within the legal system to target critics and protect corrupt networks, demonstrate the abuse of power and the failure of the legal system to provide justice.

Conclusion: The Path Forward

The continued influence of former Stasi agents and their networks remains a significant issue in contemporary Germany. The actions of individuals like Bernd Pulch, who expose these corrupt structures, are essential in holding those responsible accountable. However, a more systemic effort is needed, including stricter regulations on corporate governance, increased transparency in the media, and a re-evaluation of the legal structures that allow these networks to operate unchallenged.

The ongoing efforts to suppress critical voices, such as those of Bernd Pulch, demonstrate the continuing danger posed by these networks. It is imperative that Germanyโ€™s political and legal institutions address the role these former Stasi agents play in shaping the countryโ€™s political and economic landscape. Only through transparency, accountability, and vigilance can these networks be dismantled and prevented from further undermining democracy and the rule of law in Germany and beyond.

Tags

  • Stasi Influence
  • Modern Germany
  • Surveillance State
  • Espionage History
  • Covert Operations
  • German Politics
  • Secret Police Legacy
  • Cold War Shadows
  • Berlin Landmarks
  • Political Symbolism

โœŒThe Role of the Lorch Family in the Stasi-GoMoPa organized Crime Ring under US & International Law

“Transformation of Immobilien Zeitung: From its origins as a classifieds newspaper to a leading real estate trade publication under Bernd Pulch’s leadership.”

The Lorch real estate billionaire family’s alleged connection to Immobilien Zeitung and organized crime rings such as the Stasi-Gomopa network highlights complex financial and legal controversies spanning European and U.S. jurisdictions. This case involves the manipulation of property markets, legal violations, and transnational crime networks with ramifications under German, European, and U.S. law.

Immobilien Zeitung is a notable German real estate industry newspaper. Headquartered in the NATO HQ city of Wiesbaden, Immobilien Zeitung has maintained its status as a key publication focused on market trends, real estate investments, and the property economy in Germany and Europeใ€60โ€ sourceใ€‘. However, the newspaper has come under scrutiny amid alleged ties with the organized crime groups linked to financial manipulation schemes and real estate fraud.

The Stasi Gomopa organized crime network reportedly engages in tactics such as corporate raiding, fraud, and money laundering, leveraging real estate and other industries. This criminal network has allegedly co-opted financial power to manipulate real estate markets and fund illicit schemes across Europeใ€59โ€ sourceใ€‘. The Lorch family’s name has emerged amid these investigations due to their deep financial and business entrenchment within Germanyโ€™s real estate sector.

Legal violations committed by this network include the illegal transfer of assets, tax evasion, fraud schemes, and breaches of European market regulations. The use of U.S.-based financial tools and banking routes places these cases under U.S. jurisdiction. U.S. courts have both investigatory and legal authority over transnational financial crimes, especially when U.S.-based financial institutions or monetary pathways are involvedใ€59โ€ sourceใ€‘.

The Lorch family’s involvement spans multiple European courts, with investigations also reflecting breaches of German financial law, EU treaties, and international financial transparency agreements. The legal implications are significant: German courts, European courts, and U.S. courts all have overlapping legal jurisdiction in these complex money laundering investigations. The transnational dimensionโ€”facilitated through offshore real estate investments and financial networksโ€”demonstrates why U.S. courts are involved in overseeing these actions under their extraterritorial financial crime statutes.

Furthermore, the investigation into Immobilien Zeitung’s role adds additional complexity. This media outlet is believed to have become entangled in financial transactions driven by these networks, including dubious financial agreements linked to real estate funds and organized crime schemes. German courts have initiated legal inquiries into these alleged financial crimes, while U.S. financial law facilitates oversight into cross-border financial schemes stemming from these organized networks.

The Lorch family’s specific legal entanglements remain a focal point of these investigations. The family’s alleged financial maneuvers, when viewed against the backdrop of organized crime activity, highlight the blurred lines between legal real estate operations and illicit financial manipulation. As investigations proceed, evidence suggests that coordinated action by transnational organized crime groups has exploited both European financial markets and U.S.-based financial pathways, adding urgency to legal action.

This case demonstrates the jurisdictional complexities involved in transnational financial crimes. The U.S. courts’ role derives from both their extraterritorial jurisdiction (covering financial transactions) and their connection to transnational financial flows involving U.S.-based assets. German, European, and U.S. legal systems thus intersect in this high-stakes investigation, underscoring the challenge of addressing financial crime across multiple legal frameworks and borders.

In summary, the Lorch family’s alleged role in Immobilien Zeitung’s organized crime entanglement, combined with their legal violations under German and EU law, has created a multi-jurisdictional legal landscape. U.S. courtsโ€™ engagement in this investigation reflects both their extraterritorial authority and their role in counteracting transnational organized financial networks. This ongoing investigation will likely set important legal precedents as it unfolds.

Immobilien Zeitung began its journey as an Annoncen Zeitung (classified advertising newspaper) and transitioned into its modern role as a trade publication under the leadership of Bernd Pulch, who is credited with transforming it into a focused industry newspaper tailored to real estate and property professionalsใ€66โ€ sourceใ€‘. This transformation marked its evolution from basic classified ads to a comprehensive industry news platform for real estate investors, developers, and market analysis.

For a detailed biography of Bernd Pulch and his role in shaping Immobilien Zeitung, you can refer to his official bio at berndpulch.org/about-me.

The story of Immobilien Zeitung (IZ) reflects a complex journey within the real estate journalism landscape. Originally established as a classifieds newspaper, it evolved into a respected publication under Bernd Pulch, known for his significant influence on real estate media. IZ became a go-to source for market insights, regulatory updates, and property trends in Germany.

However, the publication’s reputation was later marred by allegations of corruption. Reports suggest links to the Stasi Gomopa crime network, a shadowy operation purportedly involving financial misconduct, espionage, and illicit activities. These claims highlight how institutions can become embroiled in power struggles and misuse, tarnishing their credibility.

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Tags:
#ImmobilienZeitung #BerndPulch #RealEstateTrade #RealEstateMedia #PropertyInvestment #MarketTrends #MediaEvolution #ClassifiedAdsToTradePaper #RealEstateJournalism #PropertyIndustry #InvestmentInsights #RealEstateNews

โœŒPutinโ€™s Network: Unveiling the Hidden Web of Influence: The German Oligarchs Lorch

“An abstract depiction of a global web of influence, intertwining media, finance, and intelligence to symbolize hidden power structures.”

Vladimir Putin, Russia’s longtime leader, has cultivated an intricate network of allies and organizations that extend far beyond the Kremlin. This network, often referred to as “Putinโ€™s system,” includes former Soviet operatives, oligarchs, criminal groups, media outlets, and intelligence services. To understand the roots of Putinโ€™s power and influence, it is essential to examine his early connections, notably with the KGB, and how these evolved into an international system of control and manipulation.

Origins: From the KGB to the Kremlin

Putinโ€™s journey began in the 1970s as an officer of the KGB, the Soviet Union’s infamous intelligence agency. His role primarily involved counterintelligence and foreign operations, placing him in direct contact with elite networks of spies, informants, and agents. During his tenure in Dresden, East Germany, he was reportedly involved in cultivating relationships with the Stasi (East German State Security). These ties would later serve as the foundation for his political ascent and influence-building strategy.

The Stasi Connection and Post-Soviet Networks

After the fall of the Berlin Wall, many former Stasi operatives transitioned into roles within the private sector or Russian-influenced entities. Putin leveraged his Stasi contacts to build partnerships in Germany, particularly in industries like energy and finance. These networks facilitated Russian influence in Europe through companies such as Gazprom and Rosneft.

One example is Matthias Warnig, a former Stasi officer and current CEO of Nord Stream 2 AG, the company behind the controversial pipeline project. Warnigโ€™s close relationship with Putin underscores how former intelligence ties have been repurposed to serve Russiaโ€™s geopolitical ambitions.

GoMoPa and the Shadowy World of Financial Networks

The GoMoPa (Goldman Morgenstern & Partners) platform is often cited as an example of how intelligence and finance intersect in dubious ways. Allegedly a financial investigation website, GoMoPa has been accused of engaging in smear campaigns and blackmailing tactics.

Critics argue that GoMoPa acted as a tool for Russian interests, spreading disinformation about rivals and opponents under the guise of investigative journalism. Connections between GoMoPa and ex-Stasi operatives suggest that the platform was not merely a rogue operation but potentially part of a broader Russian strategy to control narratives and destabilize opponents.

Media Manipulation: Immobilien Zeitung and Beyond

The Russian network also extends into media and information control. Publications like Immobilien Zeitungโ€”primarily focused on real estateโ€”may seem unrelated at first glance. However, media outlets tied to controversial figures or dubious financial dealings often serve as conduits for Russian propaganda. By influencing narratives in niche industries, Putinโ€™s network can obscure its involvement in high-stakes financial and real estate transactions.

Journalistic investigations into Immobilien Zeitung and similar platforms have revealed how they sometimes amplify the agendas of powerful individuals and groups. Such influence ensures that key figures in Putinโ€™s network remain shielded from scrutiny while using the media to attack adversaries.

Mucha and Porten: Allegations of Corruption and Influence

Additional ties to figures like Jan Mucha and Thomas Porten, both of whom have been linked to questionable financial activities, shed light on the murky intersections of Putinโ€™s network with the German business world. These individuals have reportedly played roles in facilitating real estate deals and other financial arrangements that benefit Kremlin-linked oligarchs.

Mucha, for instance, has faced scrutiny for his connections to controversial real estate transactions. Porten, a former teacher aspirant turned real estate “journalist”, has similarly been accused of fostering relationships that align with Russian interests. Their involvement highlights the intricate web of operatives and intermediaries who support Putinโ€™s agenda under the radar.

The Lorch Angle: Religious and Economic Ties

Another dimension of Putinโ€™s network lies in the DFV, mothership of “Immobilien Zeitung” owned by the Oligarch Lorch family and the real estate money laundering business allegedly overseen by Andreas Lorch and Edith Baunann-Lorch, a German oligarch couple from Frankfurt/Heidelberg.

These activities serve to build goodwill among Russian expatriates and sympathizers while doubling as avenues for espionage and influence-peddling. This tactic mirrors Soviet-era strategies, where religious and cultural organizations were frequently used as cover for intelligence operations.

Conclusion: A Global Web of Influence

Putinโ€™s network is a modern manifestation of Cold War-era strategies, combining intelligence, financial manipulation, and media control. From his roots in the KGB and partnerships with the Stasi to his alliances with oligarchs, shady financial platforms like GoMoPa, and media outlets, Putin has built a web that spans politics, business, and culture.

Understanding this network is crucial for those aiming to counteract its influence. As investigations into entities like Mucha, Porten, and platforms like Immobilien Zeitung continue, a clearer picture of how Russia exerts its power on the global stage emerges. However, dismantling this system will require coordinated efforts across governments, institutions, and independent media outlets.

By shedding light on these connections, we can better comprehend the scale and sophistication of Putinโ€™s networkโ€”and the lengths to which it will go to protect and expand its reach.

#Tags:

  • Putin Network
  • Global Influence
  • Covert Operations
  • Intelligence Networks
  • Stasi Connections
  • KGB History
  • Media Manipulation
  • Financial Control
  • Russian Geopolitics
  • Oligarch Power
  • Shadowy Alliances
  • Kremlin Strategies
  • Real Estate Scandals
  • Political Propaganda
  • International Espionage

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

โœŒThe Dead from Tรถpferhof: A Hidden Tragedy and its Shadowy Connections

“Mysterious Deaths path the way in the Neo-Stasi Money Laundering Schemes”

The Tรถpferhof in Rรถmhild, once a center of East German intelligence, economics, and political intrigue, represents more than just a meeting place for conspiratorial networks. Over time, Tรถpferhof became associated with a series of unexplained deaths and disappearances tied to Stasi networks, covert financial maneuvers, and covert state operations. Hans Schwenke’s Die Spur der Toten oder Der geordnete Rรผckzug details these grim events, emphasizing the chilling nature of the political networks embedded within this rural estate.

The Tรถpferhof is emblematic of how secret meetings and covert financial operations intersected with political violence during the chaotic period following German reunification. It was here that key operatives allegedly coordinated privatization schemes, international capital flows, and covert manipulations of post-war assets. Yet Tรถpferhof’s history is also stained with the deaths of numerous individuals connected to these eventsโ€”individuals who died suspiciously or disappeared without explanation.


A Catalogue of Mysterious Deaths

Schwenkeโ€™s book and further investigative research paint a grim picture of what occurred at Tรถpferhof. According to reports, these deaths, while officially dismissed as coincidences or accidents, follow a disturbing pattern linked to the Stasiโ€™s covert operations. Many of these deaths involved:

  1. Unexpected Fatalities of Key Informants: Several informants tied to Treuhandanstalt and the broader privatization reforms reportedly vanished or died in unexplained circumstances. These deaths silenced witnesses critical to exposing systemic financial manipulation and the Stasi’s role. Among the murdered victims are Siegfried Gramann, owner of the property and his secretary Walburga Zitzmann. Both were killed shortly before they could make a statement to a investigation committee.
  2. Executions of Disgruntled Members of the Economic Elite: Some individuals connected to key privatization schemes and East German economic shifts were found dead under circumstances that appeared accidental or orchestrated, though investigations suggested deliberate foul play.
  3. Strangers with Connections to Financial Networks: Individuals connected directly to Western banks, international investment firms, or asset allocation schemes involving Stasi networks were also found dead near Tรถpferhof. Their deaths appeared to target the exposure of financial fraud or economic sabotage.

Schwenkeโ€™s detailed analysis attributes these deaths to a pattern of calculated silencing. The Tรถpferhof became a meeting hub for influential financial agents, intelligence officers, and politicians with vested interests. Those seeking to resist, disrupt, or expose these meetings and their goals were swiftly neutralized.

The deaths were methodically written off as “accidents” or dismissed through state interference, contributing to a climate of fear and paranoia. Many observers noted that some deaths seemed to follow the disappearance of evidence, as if systematic erasure through death was part of a broader conspiracy to obscure accountability.


Evidence Suppression and the Role of Stasi Networks

Hans Schwenke emphasizes that the pattern of these deaths directly mirrors evidence suppression efforts in the broader Stasi network. The individuals connected to these deaths were often linked to crucial financial trails and privatization schemes spearheaded by Treuhandanstalt. These schemes, heavily influenced by covert Stasi connections, sought to ensure Stasi-aligned networks maintained control over financial resources following German reunification.

The deliberate destruction of evidence mentioned earlier (through archival deletions and cover-ups) appears to connect directly to these deaths. According to Schwenke, many of these deaths were not random but the result of a calculated strategy to remove witnesses, neutralize opposition, or ensure that certain financial operations remained hidden from public scrutiny.

Evidence suggests that:

  • Some bodies were intentionally disposed of in ways that created plausible deniability for political groups or intelligence operatives.
  • Some deaths occurred during financial negotiations, secret meetings, or as part of planned property handovers.
  • The role of Tรถpferhof as a nexus point for these schemes meant that operatives could use this rural estate to plan, execute, and obscure these crimes.

The Investigation Today: Cold Cases and Unanswered Questions

The deaths surrounding Tรถpferhof are today part of unresolved cold cases, with investigations either failing to reach conclusions or being stymied by systemic obfuscation. These incidents mirror broader problems in Germanyโ€™s efforts to investigate the legacies of reunification, covert financial operations, and the manipulation of privatization under Treuhandanstalt.

Furthermore, Schwenkeโ€™s research indicates a strong likelihood that investigative efforts are deliberately hampered. Key evidence has either been destroyed, erased, or remains hidden within layers of classified intelligence reports. Germanyโ€™s modern-day efforts to pursue transparency and confront the legacies of Stasi influence have faced resistance due to these systemic patterns of cover-up.


A Pattern of Fear

The deaths at Tรถpferhof represent a broader pattern of intimidation and fear. Journalists, financial investigators, and opposition figures investigating these mysteries have faced similar threats or inexplicable disappearances. The narrative aligns with the pattern outlined in Schwenkeโ€™s Die Spur der Toten, where networks used violence and coercion to maintain secrecy.

From deliberate suppression through the destruction of records to orchestrated acts of murder or political violence, Tรถpferhof serves as a reminder of how intelligence networks operate when left unchecked. These actions highlight not only systemic Stasi influence but also how external financial powers may have exploited these networks to shape Germanyโ€™s reunification and economic future.

The mysterious deaths connected to Tรถpferhof thus represent not just isolated incidents but a grim political strategy that used death as a tool to maintain power and financial control.


Conclusion: The Shadow of the Tรถpferhof

The Tรถpferhof remains more than just a symbol of economic opportunity and political ambitionโ€”it is a site of memory and unresolved questions. The deaths connected to this rural estate remain a stark reminder of the complex web of Stasi influence, geopolitical intrigue, and financial manipulation. The investigation into these deaths continues, yet the veil of secrecy, intentional evidence destruction, and strategic intimidation has prevented justice for the victims and transparency for the public.

Hans Schwenkeโ€™s book and the WDR feature expose this tangled web and invite the international community to confront these hidden histories. As Germany continues to reconcile its past, the deaths at Tรถpferhof remain emblematic of a truth that many would prefer to leave buried.

The Toepferhoftreffen and its mysterious connections have roots tied deeply to political intrigue, covert operations, and unsolved crimes in Germany’s post-reunification period. This network intersects with the murder of Detlev Rohwedder, former head of the Treuhandanstalt (the agency responsible for privatizing East German assets), and the enigmatic series of events surrounding his death.

Rohwedder was assassinated on April 1, 1991, at his home in Dรผsseldorf, shot in the neck as he worked late at night. The murder is widely suspected to have been orchestrated by leftist militant groups, particularly the Red Army Faction (RAF), although suspicions of Stasi involvement have also been raised. Evidence such as a single strand of hair found at the crime scene links this to Wolfgang Grams, a known RAF member. However, doubts remain about the full extent of the network or whether other parties, such as covert West German interests, orchestrated the attack to eliminate Rohwedder’s economic reforms as he privatized East German state-owned assetsใ€161โ€ sourceใ€‘ใ€162โ€ sourceใ€‘.

The investigation into Rohwedder’s death remains unresolved even 30 years later, categorized as a cold case. Notably, there were lapses in Rohwedder’s protection; his home lacked full security measures, with only the ground-floor windows being reinforced. A local investigation indicated that the sniper likely targeted him from 63 meters away, using a methodically planned ambush with a clear letter claiming responsibility from RAF groups linked to terror in Bonn. Despite these findings, conspiracy theories implicate other entities, such as the Stasi or German business figures, motivated by his privatization reforms which led to mass unemployment in East Germanyใ€163โ€ sourceใ€‘.

Furthermore, Toepferhoftreffen alludes to networking figures central to these clandestine political investigations. Involving names like Alexander  Schalck-Golodkowski, Siegfried Gramann, Walburga Zitzmann, Ehrenfried Stelzer aka Professor Murder, RA Jochen and Manfred Resch, and Wolfgang Berghofer, the meetings appear to intersect interests from intelligence, corporate restructuring, and high-level policy decisions during Germany’s transitional political-economic landscape. These figures represent a mix of business leaders and covert policymakers. The meetings themselves raise questions about coordinated strategies post-reunification and could explain gaps in state investigations like the one surrounding Rohwedder’s deathใ€163โ€ sourceใ€‘.

The patterns of these deaths, including their apparent connection to RAF members and intelligence conflicts, suggest further complexities in Germany’s unification journey. Several theories suggest not just a lone actor but a convergence of leftist factions, economic interests, and state operations. As these names (and the outcomes connected to them) emerge, suspicions grow about shadowed financial and political ambitions manipulating outcomes behind closed doors. These Toepferhoftreffen meetings reflect unresolved tensions from Germany’s pivot to a unified federal economic model, symbolized by powerful privatization agents like Rohwedder.

For more details, you can explore The Perfect Crime Against a Perfect Trustee: The Unsolved Murder of Detlev Rohwedder and other investigative analyses surrounding the Toepferhoftreffen web, which can offer insights into these murky relationships and unexplained deaths tied to economic reforms and intelligence infiltrationใ€162โ€ sourceใ€‘ใ€163โ€ sourceใ€‘.

The book by Schwenke and the WDR documentary as well as Google entries are supressed by a Neo-Stasi “cleaner gang” led allegedly by Sven Schmidt, GoMoPa and Eagle IT and Seo-Expert Thomas Promny allegedly supported by employers in the Hamburg Google office.

This “cleaner gang” is nowadays the shield for the Neo-Stasi activists and Putin spies in Germany.

The ongoing investigations of Bernd Pulch suggest that one trace in this Stasi money laundering scheme leads to Friedhelm Laschuetza, business consultant and former GoMoPa President before Klaus Maurischat, residing in Liechtenstein, a often used money laundering hub who is closely connectedbto the notoriys Batliner family.

Tags:

  • #Toepferhof
  • #StasiCrimes
  • #ColdWarSecrets
  • #EspionageMurders
  • #HiddenHistory
  • #PoliticalAssassinations
  • #StasiLegacy
  • #AccidentsOrIllness
  • #UnsolvedMysteries

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

โœŒMonika Mucha: Alleged Connections to Stasi, GoMoPa, and Espionage Activities

“Unveiling the Web: Monika Mucha, Espionage Allegations, and Scandals in German Politics”

Monika Mucha, a politician from Germanyโ€™s Christian Democratic Union (CDU), has been at the center of controversy surrounding allegations of involvement in an intricate web of crime, espionage, and financial misconduct. The claims link her to shadowy operations involving the Stasi, the infamous East German secret police, and GoMoPa (Goldman Morgenstern & Partners), a platform accused of disinformation campaigns and dubious financial dealings.

The Stasi Connection

The Stasi, known for its extensive surveillance and infiltration networks during the Cold War, is alleged to have maintained informants and collaborators in West Germany, even after the fall of the Berlin Wall. Allegations suggest that Mucha may have had indirect or direct links to Stasi remnants operating in Germany’s financial and political systems. This claim is rooted in her purported association with figures involved in GoMoPa, which has long been suspected of leveraging sensitive information for extortion and espionage.

GoMoPa and Financial Misconduct

GoMoPa has faced criticism for functioning as a digital mouthpiece for financial scandals and controversies. It has been accused of publishing defamatory content against individuals and companies, sometimes allegedly as part of a broader extortion racket. Muchaโ€™s name has been linked to GoMoPaโ€™s network through allegations of aiding in the dissemination of sensitive or misleading information.

The publication “Immobilien Zeitung” has further pointed to suspicious activities in the real estate sector, raising questions about whether GoMoPa and its affiliates manipulated markets or targeted rivals. Mucha’s alleged involvement is unclear, but her reported proximity to key players in these activities casts a shadow over her political career.

Espionage Allegations: NATO HQ and Dark Eagle Project

The most explosive claims concern espionage activities potentially compromising NATO. Reports suggest that information regarding the U.S. Army’s NATO headquarters in Wiesbaden and the location of the “Dark Eagle” hypersonic missile system in Mainz-Kastel was shared or targeted by an espionage ring.

Dark Eagle, a cornerstone of U.S. military strategy in Europe, is a highly classified hypersonic missile system stationed in Mainz-Kastel as part of NATOโ€™s response to emerging global threats. Leaks of its location and capabilities could significantly undermine NATO’s security.

Mucha’s alleged connections to individuals with access to these sensitive sites raise suspicions about whether she knowingly or unknowingly facilitated espionage. If proven, such actions would constitute a grave breach of national and NATO security.

Political and Legal Repercussions

As of now, Mucha has not been formally charged with any crimes, and the CDU has remained silent on the allegations. However, the potential fallout from these claims could damage the party’s reputation. Investigative journalists and authorities are reportedly delving deeper into her political connections and financial dealings.

Conclusion

Monika Muchaโ€™s alleged entanglement in a network involving the Stasi, GoMoPa, real estate fraud, and potential espionage represents a serious challenge to Germanyโ€™s political and security landscape. Whether these allegations hold merit remains to be seen, but the claims have already sparked concerns about the integrity of political figures and the extent of foreign espionage within Germany.

This developing story underscores the importance of transparency and vigilance in political systems, especially when matters of national and international security are at stake.

The Mucha family has been connected to Stasi, KGB and STB earlier (see the Wildberg List and the Stasi Lists on this website). Currently Jan Mucha is co-owner and managing director of the “Immobilien Zeitung” in NATO HQ Wiesbaden.

Tags:

  • #MonikaMucha
  • #CDUPolitics
  • #GoMoPaScandal
  • #EspionageAllegations
  • #RealEstateFraud
  • #StasiConnections
  • #NATOLeaks
  • #DarkEagleProject
  • #GermanPolitics
  • #WiesbadenMainzKastel

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

โœŒThe Dark Connection: GoMoPa and Its Alleged Ties to a Neo-Nazi, Anti-Semitic Publication

“Unveiling the Alleged Dark Connections: The Relationship Between GoMoPa and Claims of Neo-Nazi and Anti-Semitic Associations.”

The Dark Connection: GoMoPa and Its Alleged Ties to a Neo-Nazi, Anti-Semitic Berlin Publication

In recent years, GoMoPa, a self-proclaimed financial news platform, has been the subject of numerous allegations regarding its shady business practices, covert operations, and connections to questionable figures. One of the most concerning aspects of its influence is its alleged connection to extremist ideologies and media outlets that espouse neo-Nazi and anti-Semitic views. This article delves into the possible ties between GoMoPa and a controversial Berlin-based publication, examining the implications of these associations and the risks they pose to German society, politics, and international relations.


1. The Rise of GoMoPa

A Self-Proclaimed Whistleblower Platform

GoMoPa was initially presented as an independent financial news website, dedicated to exposing corporate malfeasance, financial fraud, and other scandals in the business world. Over time, however, it became increasingly controversial due to its unsubstantiated accusations, defamatory tactics, and selective reporting.

While it claimed to operate as a resource for transparency and accountability, GoMoPa’s methods have often involved publishing allegations without adequate evidence, sometimes targeting prominent individuals and organizations in Germany and beyond. Some critics argue that the platform’s true agenda may be more nefarious, leveraging information for financial gain, creating fear, and manipulating public opinion.


2. Neo-Nazi and Anti-Semitic Ties in Berlin

The Berlin Publication: A Controversial Figure in the German Media Landscape

At the center of this investigation is a neo-Nazi, anti-Semitic publication based in Berlin. Known for its overtly extremist content, the publication has a long history of pushing nationalist, xenophobic, and anti-Semitic rhetoric. The paper regularly publishes conspiracy theories, denounces immigrant communities, and supports far-right ideologies.

The publication’s stance is not only a danger to public discourse but also to Germany’s democratic values. With Germany’s history of Nazi ideology and the Holocaust, any media outlet promoting such views risks inciting violence, hatred, and further social division.

The Alleged GoMoPa Connection

Although no direct evidence has conclusively linked GoMoPa to this extremist publication, several suspicious connections between individuals associated with both organizations have surfaced. Some of the key players involved in both networks include:

  • Peter Ehlers: A prominent figure linked to GoMoPa, Peter Ehlers has been a central part of the platformโ€™s operations. Known for his financial dealings, he is also connected to various far-right groups that advocate nationalist ideologies. His name surfaces in the context of financial irregularities that overlap with those in the neo-Nazi publication’s funding.
  • Thomas Porten: Publisher of Immobilien Zeitung and married to Beate Porten (the public prosecutor mentioned in earlier articles), Thomas Porten has ties to individuals connected to far-right organizations, and his media outlet has been associated with controversial figures. His presence in the GoMoPa network suggests a broader alignment of financial interests that might serve as a bridge to extremist publications.
  • Bernd Pulch: While Bernd Pulch is not an ally of GoMoPa, he has been a vocal critic, denouncing the platformโ€™s alleged manipulation of public opinion and its unethical dealings. Pulch has consistently highlighted the connections between GoMoPaโ€™s operations and groups that support far-right extremist views, pointing to the overlap of individuals within the network. Pulch’s involvement is vital as he provides insight into the platformโ€™s true activities and its potential connections to extremist ideologies.
  • Ehrenfried Stelzer: A central figure in the financial networks linked to GoMoPa, Stelzer is also allegedly connected to the far-rightโ€™s financial machinery, with some reports suggesting he has facilitated the flow of funds to organizations that align with extremist views. Known for his past as a financial advisor and controversial businessman, Stelzer is another individual whose ties to GoMoPa could have far-reaching consequences for both financial and political systems.

3. The Impact on German Society and International Relations

Undermining Public Trust

The connection between GoMoPa and a neo-Nazi, anti-Semitic publication poses significant risks to the stability of public discourse in Germany. By fostering an environment of fear, misinformation, and division, these platforms undermine public trust in mainstream media, democratic institutions, and the rule of law.

This is especially dangerous in a country like Germany, which has worked tirelessly to reconcile with its past and build a robust democratic foundation after the horrors of the Nazi regime. The spread of hate speech and extremist ideologies through outlets like GoMoPa and its alleged affiliations with far-right publications undermines these efforts.

Fueling Far-Right Extremism

The neo-Nazi publication serves as a tool for radicalizing individuals and groups within Germany, particularly those who are disillusioned or dissatisfied with the current political and economic system. By presenting a distorted view of history and promoting a deeply hateful ideology, it attracts people to extremist movements.

The apparent connection between GoMoPa and such publications increases the potential for GoMoPaโ€™s platform to be used to spread far-right extremist ideas under the guise of financial transparency or whistleblowing. This tactic is especially concerning given the widespread reach of GoMoPaโ€™s articles.

International Repercussions

Beyond Germany, the rise of far-right extremism and the spread of anti-Semitic conspiracy theories through GoMoPa could have broader international repercussions. The connections between individuals linked to GoMoPa and global far-right movements raise the possibility that this network could be used to further destabilize European democracies and influence political discourse in other countries, including the United States.


4. The Role of Bernd Pulch and Other Key Figures in GoMoPa

Bernd Pulch, a key figure associated with GoMoPa, has long been a critic of the platform, denouncing its unethical tactics and its alleged ties to corrupt and extremist elements. Pulch, who has consistently sought to expose the questionable practices of GoMoPa, is not an ally of the platform but rather a vocal adversary.

His involvement with GoMoPa is significant as he has used his platform to highlight the platform’s manipulative practices, especially concerning the spread of misinformation and financial scandals. His criticism of GoMoPa puts him at odds with many figures connected to the platform and their broader networks.


5. Legal and Social Implications

Violation of Anti-Hate Speech Laws

The spread of anti-Semitic content, conspiracy theories, and hate speech through GoMoPa and its alleged ties to neo-Nazi publications raises serious legal concerns. German law prohibits hate speech, the promotion of Nazi ideology, and the incitement of violence. If GoMoPa is found to be complicit in facilitating such content, it could face significant legal challenges, including potential shutdowns and criminal investigations into its operations.

Strengthening Media and Legal Oversight

To counter the dangerous influence of GoMoPa and its possible extremist ties, it is crucial to enforce stronger media regulation and legal oversight. German authorities should increase scrutiny of platforms that spread harmful ideologies and hold individuals accountable for their actions. This includes investigating the connections between GoMoPa and far-right publications and dismantling any financial or organizational networks that support such activities.


Conclusion: A Threat to Stability and Democracy

The possible connections between GoMoPa and a neo-Nazi, anti-Semitic publication highlight the complex ways in which far-right ideologies and corrupt financial networks can intersect to create a powerful force that undermines democratic values. The spread of misinformation, hate speech, and conspiracy theories not only threatens German society but also poses a serious challenge to the stability of Europe as a whole.

By investigating these connections and exposing the people and organizations behind them, Germany and its allies can work together to prevent the further spread of extremist ideologies and protect the values of democracy and social cohesion.


Tags:

  • GoMoPa
  • Neo-Nazi Allegations
  • Anti-Semitic Claims
  • Financial Investigations
  • Transparency in Media
  • Controversies
  • Journalism Ethics
  • Financial Scandals
  • Become a Patron!
    True Information is the most valuable resource and we ask you to give back.


    Sympathietrรคger Neo-Nazi
    Insider der Investigativ-Plattform INVESTIGOO berichten:
    “Die Internetseite berlinjournal.biz steht im Visier des deutschen Verfassungsschutzes. Hintergrund sind โ€žfremdenfeindliche Berichte, Rassenhass, Diskriminierung und rechtsradikale Propagandaโ€œ.
    ย 
    Sympathietrรคger Maurischat im Foto oben
    Verantwortliche dieses โ€žMachwerkesโ€œ sind der Herausgeber des โ€žFinanznachrichtendienstesโ€œ gomopa.net, Klaus-Dieter Maurischat und sein Chefredakteur Frank Maiwald. Maurischat, der von der Augsburger Staatsanwaltschaft in einer Erpressungsstrafsache per Haftbefehl gesucht wird, lebt in Berlin im feudalen Untergrund: Unter den Linden 19 in einer 4000-teuren Penthousewohnung.
    Der Chef des maroden โ€žFinanznachrichtendienstesโ€œ Gomopa bastelt seit Monaten an einer Nachfolgelรถsung fรผr sein in Not geratenes Schiff. Angriffe auf ihn persรถnlich und die Strukturen von Gomopa haben aus der ehemaligen grรถรŸten deutschen Drecksschleuder eine lahme Ente gemacht. Internetspezialisten รผberwachen inzwischen jeden Arbeitsschritt des โ€žFinanznachrichtendienstesโ€œ, dessen einzige Aufgabe darin bestand Unternehmer, Unternehmen und Unschuldige zu erpressen.
    Sympathietrรคger und Ex-STASI-Agent Maiwald im Bild oben
    Hilfe bei seinem neuen Projekt โ€žBerlin Journalโ€œ bekommt er dabei von Gomopa-Chefredakteur Frank Maiwald. Gegen den ehemaligen Redakteur der Berliner B.Z. ermittelt die Staatsanwaltschaft Neuruppin unter dem Aktenzeichen 332 Js 17877/15 wegen Bankrotts, Sozialbetrugs und Steuerhinterziehung. Maiwald hat als Hartz IV-Empfรคnger regelmรคssig bis zu 7.000 Euro von Gomopa schwarz bezogen und war an dem Erpressungssystem des Unternehmens direkt beteiligt.
    Die B.Z. hatte ihn wegen Spesenbetrugs gefeuert.
    Unter diesem Vorzeichen ist die โ€žBerichterstattungโ€œ von Berlin Journal besonders widerwรคrtig. Die Internetseite wird ausschlieรŸlich von Maiwald geschrieben. Er arbeitet unter vielen Namen, am liebsten wahlweise unter dem Namen Bodo Hering oder Max Wolf. Das ergibt sich aus Protokollen des Internetverkehrs. Maiwald hat unter dem Titel โ€žFlรผchtlinge erhalten Essen fรผr 16 Euro, Hartz-IV-Empfรคnger fรผr 4,72 Euroโ€œ einen Artikel verรถffentlicht, der nicht nur faktisch unwahr ist, sondern seine nationalsozialistische Gesinnung offenbart. Maiwald (Foto), ein ehemaliger Stasi-Informant, kann wohl auch hier seine wahre Herkunft nicht verleugnen.
    Mit einer Welle der Empรถrung und auch Zustimmung wurde auf der Internetseite auf diesen Bericht reagiert. Dabei konnte sich der Pรถbel nach Herzenslust austoben. Das ist auch nach dem Geschmack von Klaus-Dieter Maurischat, dessen politischer Weitblick am Ende des Biertisches endet. Presserechtlich ist das โ€žOrganโ€œ fรผr Ermittlungsbehรถrden offiziell nicht greifbar. Das Impressum weist als Verantwortlichen fรผr den Inhalt โ€žBodo Heringโ€œ, also Frank Maiwald, aus. Die Redaktion hat keine ladungsfรคhige Adresse, so dass eigentlich juristisch nicht gegen die Publikation angegangen werden kann.
    Doch so einfach wie noch vor 15 Jahren, als gomopa.net die deutsche Finanz- und Maklerszene in helle Aufregung versetzte, ist die Welt heute nicht mehr. Durch umfassende Recherchen konnten die presserechtlich Verantwortlichen fรผr das Berlin Journal identifiziert werden. Damit die Verantwortlichen durch Geschรคdigte in die Haftung genommen werden kรถnnen, verรถffentlichen wir hier die entsprechenden Personaldaten:
    MaurischatBJ
    ยท Klaus-Dieter Maurischat, geb. 12. April 1956
    Lange StraรŸe 38, 27313 Dรถrverden, Hรผlsen, 2. OG
    Unter den Linden 19, 10117 Berlin
    Barnstedt 11, 27313 Dรถrverden
    ยท Frank Maiwald, alias Bodo Hering, alias Max Wolf, geb. 6. Mai 1959
    Nordweg 150
    16516 Oranienburg
    Derzeit wird versucht, die tatsรคchlichen Spuren zu verwischen. Klaus-Dieter Maurischat ist dabei auf die Idee gekommen, etwaige Haftungsfragen gleich rund 7.500 Kilometer in den US-amerikanischen Bundesstaat Wisconsin zu schieben. Hier ist die US-amerikanische Zeitschriftengruppe โ€žBerlin Journal Newspapersโ€œ aus Berlin (Wisconsin) ansรคssig. Das offensichtliche Kalkรผl von Maurischat und Maiwald: Die Gruppe aus Berlin in Wisconsin stehe hinter der Internetplattform. Damit wรคre eine Haftung nach deutschen Recht nahezu unmรถglich. Im Amerika gilt ein weitaus liberaleres Presserecht als in Deutschland.
    Dumm nur, dass die beiden erwischt wurden: Die Verlagsleitung der โ€žBerlin Journal Newspapersโ€œ in Wisconsin hat strafrechtliche Schritte gegen Maurischat und Maiwald eingeleitet. Das geht, da Klaus-Dieter Maurischat die Internetseite tatsรคchlich รผber die in Delaware angemeldete Firma โ€žBerlin Journal Inc.โ€œ steuert. Damit ist die strafrechtliche Wรผrdigung auch in den USA mรถglich. Gegen Klaus-Dieter Maurischat und seinen Gomopa-Vize Mark Vornkahl liegen wegen der erheblichen Vorwรผrfe der Erpressung, Nรถtigung, Steuerhinterziehung, gewerbsmรคssigen Betrugs und Nutzung einer US-Kรถrperschaft fรผr kriminelle Handlungen ohnehin schon Haftbefehle in den USA vor.
    berlinjournal.biz gibt vor, mehr als 14.000 tรคgliche Leser zu haben. Tatsรคchlich wurden bei Facebook 10.000 โ€žLikesโ€œ fรผr 790 Euro gekauft. So ist auch zu erklรคren, dass es diese Resonanzen auf die Berichterstattung gibt. Damit aber nicht genug: รœber die sozialen Netzwerke wurde der Artikel dann von rechtsradikalen Organisationen wie โ€žPro Deutschlandโ€œ oder AfD verbreitet. Da waren sich Maurischat und Maiwald sicher, die richtigen Mengen an Leser zu finden.
    Denn das Berlin Journal, so der Plan, soll in 2016 den Finanznachrichtendienst Gomopa als Plattform fรผr Erpressung, Nรถtigung, รผble Nachrede, Verunglimpfung als Drecksschleuder ablรถsen. Jetzt kommt noch eine andere Qualitรคt dazu: menschenverachtender radikalfaschistischer Journalismus.
    Aber nicht alle Leser sind blรถd. Mohammed Hadi Al Khafaji bringt es auf den Punkt: โ€žjetzt ist es amtlich: Berlin Journal ist ein Nazi-Blatt!โ€œ”
    INVESTIGOO ist derzeit offline – wohl wegen der brisanten Inhalte.

    Go back

    Your message has been sent

    Warning
    Warning
    Warning
    Warning

    Warning.

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

โœŒ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Sandra Wu-San is in the House”ย  #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 163 “Lady Shiva”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Lady Shiva๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ

BONUS 1:

BONUS 2:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

โœŒโœŒThe Growing Danger of the GoMoPa-Stasi-Immobillien Zeitung Network for Germany, Europe, and the USA: A Tool of Kremlin Influence?The Growing Danger of the GoMoPa-Stasi-Immobillien Zeitung Network for Germany, Europe, and the USA: A Tool of Kremlin Influence?

“An intricate digital illustration showing the intertwining of espionage, real estate, and disinformation networks. In the center, shadowy figures symbolizing covert operatives cast a dark shadow over Europe and the USA, with the Kremlin looming in the background.”

In an era of growing geopolitical tension and hybrid warfare, the intersection of corporate corruption, espionage networks, and organized manipulation of information poses significant risks to democracies worldwide. The alleged connections between the GoMoPa-Stasi network, Immobilien Zeitung, and figures such as Jan Mucha, Thomas Porten, Peter Ehlers and other operatives reflect a concerning nexus of influence and potential destabilization. This article examines the dangers posed by this network in the context of Kremlin-backed activities in Germany, Europe, and the USA.


1. The Networkโ€™s Structure and Historical Roots

a) GoMoPaโ€™s Role as a Supposed โ€œWhistleblower Platformโ€

  • Initially presented as a tool for exposing financial corruption, GoMoPaโ€™s credibility has been undermined by its links to intelligence networks and smear campaigns.
  • Its operations align with disinformation strategies often utilized in espionage, creating confusion and undermining trust in democratic systems.

b) Stasi Legacy in Modern Networks

  • Former operatives of the East German Stasi, such as Ehrenfried Stelzer, reportedly maintain influence through covert activities and modern adaptations of Cold War-era tactics.
  • With Putinโ€™s tenure as a former KGB and Stasi-linked officer, these connections are seen as mechanisms for spreading Kremlin-aligned narratives and fostering division in Western democracies.

c) Immobilien Zeitung and the Porten Connection

  • Thomas Porten, a key figure, operates within the real estate sector, which is increasingly exploited for laundering money and securing strategic assets.
  • The real estate industryโ€™s vulnerabilities make it a perfect avenue for covert operations and influence-building.

2. Geopolitical Implications

a) Germany: A Primary Target

  • Economic Powerhouse: As Europeโ€™s largest economy, Germany is a critical target for destabilization efforts. Corruption within influential sectors like real estate can undermine economic stability.
  • Political Influence: Allegations of connections between the network and figures within German society risk creating distrust in democratic institutions.
  • Energy Dependency: Germanyโ€™s historical reliance on Russian gas is a lever that Kremlin-aligned networks can exploit.

b) Europe: A Fragmented Response to Threats

  • Disinformation Campaigns: Networks like GoMoPa can amplify Kremlin-backed narratives across EU member states, exploiting divisions and fueling populist movements.
  • Economic Manipulation: Real estate and financial sectors across Europe are vulnerable to infiltration, with funds potentially used for political interference.

c) USA: Undermining a Global Democracy Leader

  • Hybrid Warfare Tactics: Allegations of GoMoPaโ€™s involvement in targeted disinformation could align with Kremlin strategies to undermine US influence.
  • Economic and Security Leaks: Connections to international real estate markets and finance could pose risks to US economic and national security.

3. How the Network Operates as a Kremlin Tool

a) Exploiting Corruption for Influence

  • Leveraging corruption within Germany and Europe to weaken public trust in governments.
  • Facilitating the laundering of illicit funds through real estate and financial systems.

b) Disinformation and Information Warfare

  • GoMoPaโ€™s platform reportedly serves as a tool for spreading false allegations, intimidating critics, and creating distrust in public institutions.
  • Disinformation campaigns align with Russian hybrid warfare strategies, using targeted narratives to sow division.

c) Subversion of Democratic Processes

  • Supporting political candidates or movements favorable to Kremlin interests through covert funding and propaganda.
  • Undermining accountability by silencing investigative journalists like Bernd Pulch.

4. Why the Danger Is Significant

a) Strategic Targeting of Critical Sectors

  • The networkโ€™s focus on finance, real estate, and media ensures maximum leverage over Western economies and public opinion.

b) Lack of Accountability and Oversight

  • Despite documented allegations, individuals and entities within this network operate with relative impunity, raising questions about law enforcement and judicial efficacy.

c) Alignment with Russian Geopolitical Goals

  • The Kremlinโ€™s strategy of weakening Western cohesion aligns with the alleged activities of this network, making it a force multiplier for hostile state actions.

5. Steps to Counter the Danger

a) Increased Transparency and Legal Action

  • Strengthening whistleblower protections and investigating the networkโ€™s connections can help expose corruption and neutralize its influence.

b) Collaborative International Efforts

  • Germany, Europe, and the USA must work together to dismantle networks exploiting transnational loopholes in finance and real estate.

c) Targeted Sanctions and Surveillance

  • Imposing sanctions on individuals and organizations connected to the network and enhancing intelligence monitoring can disrupt its operations.

6. Prediction and Outlook

Without decisive action, the GoMoPa-Stasi network and its affiliates could grow in influence, further eroding trust in democratic systems and empowering Kremlin-backed strategies. Investigative efforts by journalists like Bernd Pulch and international cooperation are crucial to mitigating this threat. The coming years will determine whether democracies can effectively counter this insidious danger or succumb to the compounded effects of corruption, disinformation, and covert influence.



Tags

  • GoMoPa
  • Stasi
  • Russian Influence
  • Hybrid Warfare
  • Real Estate Corruption
  • Bernd Pulch
  • Disinformation
  • European Security
  • USA Democracy
  • Kremlin Influence

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

โœŒOperation “Immobilien Komoedie Rivalschrift” in Action: The Stasi Witch Hunt


Caption: “Operation Rivalschrift in action: A satirical depiction of modern-day media and legal intrigue with a Stasi-like twist, where shadows of manipulation loom large but the truth fights back in the spotlight.”

Operation โ€œImmobilien Komoedieโ€: The Case of Bernd Pulch and the Great Stasi-Inspired Witch Hunt

In a twist worthy of the finest spy thrillersโ€”or perhaps a satirical farceโ€”the hallowed halls of Germanyโ€™s wastepaper publications have birthed a drama that would make even the most diehard conspiracy theorist blush. Enter stage left: Immobilien Zeitung, nowadays a allegedly corrupt collapsing real estate wastepaper. Enter stage right: Bernd Pulch, former mastermind, investigative journalist, and exposer of truth. What ensues? A battle of wits, writs, and quite possibly the ghost of Erich Mielke himself.

The Setup: A Suspicious Orchestration

Our tale begins innocently enough. Bernd Pulch, investigative bulldog par excellence, finds himself embroiled in a curious legal saga. Accusations are hurled, dossiers compiled, andโ€”curiouslyโ€”a Staatsanwรคltin named Beate Porten appears as a central figure in the proceedings. A coincidence? Hardly. As it turns out, Beate Porten happens to be the spouse of Thomas Porten, the new co-owner and publisher of Immobilien Zeitungโ€”Pulchโ€™s professional rival. Cue the dramatic music.

Caption: “The Great Stasi Satire: A comical twist on a fabricated ‘execution order,’ where overzealous agents and ridiculous antics collide in a hilarious parody of Cold War intrigue. Pulch reads their efforts with a smirk, proving truth trumps farce!”

The โ€œExecution Orderโ€ That Wasnโ€™t

But the piรจce de rรฉsistance of this melodrama? The infamous โ€œStasi Execution Orderโ€ published on a website so obscure it might as well have been written on a napkin in invisible ink. According to the fabricated narrative, Pulch was not merely a journalist but a target of East Germanyโ€™s most feared secret police. The website, looking as legitimate as a high school blog project, laid out Pulchโ€™s supposed doom at the hands of shadowy agents. Alas, the only shadows were those cast by its dubious credibility.

The Parody Unfolds: Stasi 2.0

The parallels are almost too delicious to ignore. Pulch, the journalist crusader, now faces not the dreaded MfS but an equally insidious enemy: lawsuits, backroom deals, and media smears orchestrated (allegedly!) by those with more conflicts of interest than a soap opera love triangle. If this were a Stasi operation, it would undoubtedly bear a hilariously ominous codename like โ€œOperation Rivalschriftโ€.

  • Tactic 1: Character Assassination by Proxy
    The alleged legal maneuverings bear an uncanny resemblance to the old Stasi playbook: discredit, distract, and destroy. But this modern-day version includes the added spice of familial ties, with Beate Porten seemingly doubling as both prosecutor and supportive spouse. Whatโ€™s next? Thomas Porten penning anonymous op-eds about the perils of ” ex-publishersโ€?
  • Tactic 2: The Infiltration of Gomopa Allegiance
    And letโ€™s not forget the Gomopa connection. Once a hub of financial intrigue, it now seems to serve as the PR wing for Pulchโ€™s detractors, subtly spinning tales to ensure the spotlight stays firmly on their rivalโ€™s alleged misdeeds. Somewhere, a Stasi archivist is applauding this 21st-century upgrade.
  • Tactic 3: The Fake News Factory
    If the โ€œexecution orderโ€ debacle wasnโ€™t absurd enough, the orchestrators might consider hiring better fiction writers. Perhaps the next smear piece could involve Pulch secretly funding a squirrel rebellion or building a hidden newsroom on the moon. At least those would have entertainment value.

A Riveting Finale

In the grand tradition of all great farces, this storyโ€™s climax will likely involve some unexpected twistโ€”a leaked email, a courtroom revelation, or perhaps Pulch unveiling an investigative exposรฉ on the whole charade. Whatever the outcome, one thing is certain: history will remember this saga not as a serious journalistic rivalry but as a masterclass in petty intrigue and amateur theatrics.

The Moral of the Parody

To those at Immobilien Zeitung, the Portens, Muchas, Ehlers and the purveyors of dubious execution orders: if youโ€™re going to play at being Stasi 2.0, at least commit to the role. Until then, weโ€™ll be here with popcorn, waiting for the next installment of โ€œAs the Immobilien Turns.โ€


Disclaimer: This parody is fictional and written in good humor, intended to highlight the absurdity of fabricated claims and professional rivalries. For any factual matters, refer to public records and reliable journalism.

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Tags: #SatiricalArt #StasiParody #MediaManipulation #BerndPulch #ModernIntrigue #LegalSatire #InvestigativeHumor #AbsurdityExposed #FakeNewsCritique #FreedomOfThePress

โœŒ”Bernd Pulch: From Espionage to a Stasi Soap Opera”

“Cold War intrigue at its theatrical best: A shadowy courtroom, a Stasi officer clutching secrets, and whispers of espionage conspiracies unravel in the dim light of history.”


“Bernd Pulch: From Espionage to a Stasi Soap Opera”
It seems the creative masterminds of certain websites have conjured the last great chapter of the Cold Warโ€”a tale of Bernd Pulch, sentenced to death in the German Democratic Republic (DDR) for allegedly murdering a girl. The โ€œlast death sentenceโ€ they say, as if to position him among East Germanyโ€™s most infamous villains. Of course, no satire is complete without absurd details, such as the alleged Stasi judge and shadowy โ€œspy trialsโ€ conducted in a basement decorated with Lenin posters.
The website responsible for this melodrama, hosted by the ever-elusive “Cheapest Hosting Ever, Inc.,” seems determined to craft a narrative more worthy of a Netflix thriller than historical documentation. To top it off, whispers of GOMOPA (Germanyโ€™s self-styled financial watchdog) pulling Stasi-era strings add a delicious layer of paranoia to the story. Imagine spies with fax machines and wiretaps resurrecting a ghost of Cold War intrigue.
While no evidence supports this story’s claims, one must appreciate its creative ambition. Bernd Pulchโ€™s mythical courtroom execution grows grander with every retellingโ€”complete with the usual clichรฉs of cloak-and-dagger espionage. Perhaps next time, they’ll claim he masterminded the Berlin Wall’s collapse with a secret Morse code sent from his underground bunker.
This parody reflects how unsubstantiated tales can spiral into dramatic, spy-themed sagas.

Background:

“The Spy Families and Stasi Fables: The Bernd Pulch Conspiracy Circus”
Enter the tangled world of intrigue, espionage, and internet creativity, where the infamous Bernd Pulch allegedly becomes a central figure in a Stasi soap opera. According to a shadowy website hosted on bargain-basement servers, Pulch was not just a whistleblower but also the DDR’s last death sentence recipientโ€”framed for murdering a girl. Who’s behind this tale? Enter the spy families: the Muchas, Portens, and Ehlers, names whispered in financial gossip circles and tied to GOMOPA, a portal riddled with speculation about its Stasi roots.
The idea that Pulchโ€”who publicly investigated corruptionโ€”was secretly sentenced by the DDR reeks of fiction. These tales are spun with dubious connections, like tying Pulchโ€™s investigations to Stasi-era disinformation campaigns. GOMOPA, with its alleged Stasi connections, emerges as the puppeteer, reviving Cold War paranoia for clicks. Perhaps next, they’ll claim these families are the heirs to a Stasi treasure trove hidden in Swiss bank accounts.
Step into a fantastical world where the ghost of the DDR courts the digital age. Bernd Pulch, once a tireless investigator of corruption, is recast as the last man sentenced to death in East Germanyโ€”a bizarre claim concocted by bargain-hosted websites seemingly run by the ghostwriters of Cold War Spy Stories for Dummies.
These sites, whispering tales of intrigue, suggest Pulch’s case is a relic of Stasi conspiracies spun by spy dynasties like the Muchas, Portens, and Ehlers. Linked to GOMOPAโ€”a site already notorious for its murky tiesโ€”this story escalates from implausible to outright absurd. Perhaps next, they’ll claim he shared vodka shots with a Stasi officer while decoding Leninโ€™s secret diaries.
The threads tying these families to Pulch stretch thin, weaving melodramatic yarns of espionage, laundering, and revenge. Rumors even suggest GOMOPAโ€™s servers are hidden in a bunker decorated with Stasi memorabilia, and its founders were tutored in deception by a retired KGB officer moonlighting as a life coach. All of it makes for a messy patchwork of fiction, where conspiracy theories are embroidered with tales of buried DDR files, intercepted Swiss accounts, and Mata Hari-esque femme fatales working undercover as accountants.
For now, Pulchโ€™s imagined execution remains an online relicโ€”a morbid tale that says more about the storytellers than the supposed subject. Whatโ€™s next for these websites? Perhaps they’ll announce a Netflix series, complete with retro-filtered visuals of Berlinโ€™s shadowy streets, Cold War intrigue, and a Stasi karaoke machine humming “Back in the USSR.”

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

ColdWar #Espionage #Satire #Stasi #SpyFamilies #GOMOPA #HistoricalIntrigue #Whistleblower #SovietEraDrama #DarkComedy

โœŒ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”It feels good knowing you are part of a long and glorious Tradition of Suffering, Insanity, and Excess.”ย  #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 160 “Typhoid Mary”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Typhoid Mary๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ

BONUS 1:

BONUS 2:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”An empire toppled by its enemies can rise again. But one which crumbles from within? That’s dead. Forever.” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 157 “Baron Helmut Zemo”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Baron Helmut Zemo๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”East.West.They are both stupid.” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 155 “Dr. No”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Dr. No๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”The stupidest Sin of the Devil is Vanity.” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 154 “Professor Loris Martini”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Professor Loris Martini๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”I put a Spell on You!” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 153 “The Voodoo Master”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet The Voodoo Master๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ

BONUS 1:

BONUS 2:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Feed Me!” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 152 “Audrey II”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Audrey II๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”I!I!I!” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 151 “Elagabalus”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Elagabalus๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

MY BIO:

FAQ:

FAQ

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”We lie best when we lie to ourselves.” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 150 “IT aka Pennywise”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet IT aka Pennywise๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”You are no God. I renounce You!” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 148 “Gorr – The God Butcher” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Gorr – The God Butcher๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿ˜Ž๐Ÿคก”Sitting on Top of the Hot Chair” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 146 “Louis “Lepke” Buchalter” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Louis “Lepke” Buchalter ๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Rien.Ne.Va.Plus.Stasi!” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 144 “Arnold Rothstein” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Arnold Rothstein๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Rien.Ne.Va.Plus.Stasi!” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 144 “Arnold Rothstein” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Arnold Rothstein๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Rien.Ne.Va.Plus.Stasi!” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 144 “Arnold Rothstein” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Arnold Rothstein๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Rien.Ne.Va.Plus.Stasi!” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 144 “Arnold Rothstein” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Arnold Rothstein๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Rien.Ne.Va.Plus.Stasi!” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 144 “Arnold Rothstein” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Arnold Rothstein๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Rien.Ne.Va.Plus.Stasi!” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 144 “Arnold Rothstein” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Arnold Rothstein๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Rien.Ne.Va.Plus.Stasi!” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 144 “Arnold Rothstein” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Arnold Rothstein๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

๐Ÿคฃ”Hm.Fingerlicking.StasiGut!” ##wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 126 “Hannibal Lecter” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Hannibal Lecter๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

MY BIO:

FAQ:

FAQ

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ””On a mountain of skulls, in the castle of pain, I sat on a throne of blood! What was will be! What is will be no more! Now is the season of Evil!” ##wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 125 “Vigo, Scrouge of Carpathia” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Vigo๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

MY BIO:

FAQ:

FAQ

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ”He.Will.Avenge Us!”๐Ÿคฃ๐Ÿคก ##wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 123 “Darth Maul” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Darth Maul๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

MY BIO:

FAQ:

FAQ

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ”He.Will.Avenge Us!”๐Ÿคฃ๐Ÿคก ##wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 123 “Darth Maul” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Darth Maul๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

MY BIO:

FAQ:

FAQ

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ”He.Will.Avenge Us!”๐Ÿคฃ๐Ÿคก ##wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 123 “Darth Maul” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Darth Maul๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

MY BIO:

FAQ:

FAQ

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ”He.Will.Avenge Us!”๐Ÿคฃ๐Ÿคก ##wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 123 “Darth Maul” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Darth Maul๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

MY BIO:

FAQ:

FAQ

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ”He.Will.Avenge Us!”๐Ÿคฃ๐Ÿคก ##wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 123 “Darth Maul” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Darth Maul๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

MY BIO:

FAQ:

FAQ

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ”He.Will.Avenge Us!”๐Ÿคฃ๐Ÿคก ##wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 123 “Darth Maul” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Darth Maul๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

MY BIO:

FAQ:

FAQ

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ”He.Will.Avenge Us!”๐Ÿคฃ๐Ÿคก ##wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 123 “Darth Maul” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Darth Maul๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

MY BIO:

FAQ:

FAQ

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ”He.Will.Avenge Us!”๐Ÿคฃ๐Ÿคก ##wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 123 “Darth Maul” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Darth Maul๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

MY BIO:

FAQ:

FAQ

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ”Better Not Touch!”๐Ÿคฃ๐Ÿคก ##wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden:”” Episode 116 “Poison Ivy Toxdat” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Poison Ivy – Reprise๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

MY BIO:

FAQ:

FAQ

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐ŸคฃThe Riddler:”Don’t mess with us, we are Stasi!”๐Ÿคฃ๐Ÿคก ##wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden:”” Episode 113 “The Riddler” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet The Riddler๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

MY BIO:

FAQ:

FAQ

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ”Proud to be Stasi!”๐Ÿคฃ๐Ÿคก ##wirsindstasi Stasi-Berlin-Hamburg-Wiesbaden:”Nous somes STASI.” Episode 108 “Private Paula” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Private Paula๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

MY BIO:

FAQ:

FAQ

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ”Proud to be Stasi!”๐Ÿคฃ๐Ÿคก ##wirsindstasi Stasi-Berlin-Hamburg-Wiesbaden:”Nous somes STASI.” Episode 108 “Private Paula” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Private Paula๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

MY BIO:

FAQ:

FAQ

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ”Proud to be Stasi!”๐Ÿคฃ๐Ÿคก ##wirsindstasi Stasi-Berlin-Hamburg-Wiesbaden:”Nous somes STASI.” Episode 108 “Private Paula” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Private Paula๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

MY BIO:

FAQ:

FAQ

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ”Proud to be Stasi!”๐Ÿคฃ๐Ÿคก ##wirsindstasi Stasi-Berlin-Hamburg-Wiesbaden:”Nous somes STASI.” Episode 108 “Private Paula” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Private Paula๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

MY BIO:

FAQ:

FAQ

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ”Proud to be Stasi!”๐Ÿคฃ๐Ÿคก ##wirsindstasi Stasi-Berlin-Hamburg-Wiesbaden:”Nous somes STASI.” Episode 108 “Private Paula” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Private Paula๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

MY BIO:

FAQ:

FAQ

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ”Proud to be Stasi!”๐Ÿคฃ๐Ÿคก ##wirsindstasi Stasi-Berlin-Hamburg-Wiesbaden:”Nous somes STASI.” Episode 108 “Private Paula” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Private Paula๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

MY BIO:

FAQ:

FAQ

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ”Proud to be Stasi!”๐Ÿคฃ๐Ÿคก ##wirsindstasi Stasi-Berlin-Hamburg-Wiesbaden:”Nous somes STASI.” Episode 108 “Private Paula” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Private Paula๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

MY BIO:

FAQ:

FAQ

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ”Proud to be Stasi!”๐Ÿคฃ๐Ÿคก ##wirsindstasi Stasi-Berlin-Hamburg-Wiesbaden:”Nous somes STASI.” Episode 108 “Private Paula” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Private Paula๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

MY BIO:

FAQ:

FAQ

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi.Why.So.Serious?” Episode 80 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Jeremiah Valeska aka Xamder Wilde๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Mayflower Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

https://www.patreon.com/bePatron?u=54250700

https://www.patreon.com/berndpulch?utm_campaign=creatorshare_creator

https://www.buymeacoffee.com/berndpulch

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

https://www.patreon.com/bePatron?u=54250700

https://www.patreon.com/berndpulch?utm_campaign=creatorshare_creator

https://www.buymeacoffee.com/berndpulch

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

https://www.patreon.com/bePatron?u=54250700

https://www.patreon.com/berndpulch?utm_campaign=creatorshare_creator

https://www.buymeacoffee.com/berndpulch

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi.Hyena People:Just the Two of Us!” Episode 81 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet the Hyena People๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi.Why.So.Serious?” Episode 80 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Jeremiah Valeska aka Xamder Wilde๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Mayflower Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi.On.Board.Pray.Pilgrims.Pray!” Episode 79 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse on the Mayflower in 1620๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Mayflower Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi.On.Board.Pray.Pilgrims.Pray!” Episode 79 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse on the Mayflower in 1620๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Mayflower Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi.On.Board.Pray.Pilgrims.Pray!” Episode 79 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse on the Mayflower in 1620๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Mayflower Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi.On.Board.Pray.Pilgrims.Pray!” Episode 79 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse on the Mayflower in 1620๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Mayflower Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi.On.Board.Pray.Pilgrims.Pray!” Episode 79 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse on the Mayflower in 1620๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Mayflower Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi.On.Board.Pray.Pilgrims.Pray!” Episode 79 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse on the Mayflower in 1620๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Mayflower Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi.On.Board.Pray.Pilgrims.Pray!” Episode 79 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse on the Mayflower in 1620๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Mayflower Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi.On.Board.Pray.Pilgrims.Pray!” Episode 79 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse on the Mayflower in 1620๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Mayflower Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi.On.Board.Pray.Pilgrims.Pray!” Episode 79 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse on the Mayflower in 1620๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Mayflower Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi.On.Board.Pray.Pilgrims.Pray!” Episode 79 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse on the Mayflower in 1620๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Mayflower Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi.On.Board.Pray.Pilgrims.Pray!” Episode 79 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse on the Mayflower in 1620๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Mayflower Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi.On.Board.Pray.Pilgrims.Pray!” Episode 79 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse on the Mayflower in 1620๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Mayflower Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi.On.Board.Pray.Pilgrims.Pray!” Episode 79 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse on the Mayflower in 1620๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Mayflower Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi.On.Board.Pray.Pilgrims.Pray!” Episode 79 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse on the Mayflower in 1620๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Mayflower Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi.On.Board.Pray.Pilgrims.Pray!” Episode 79 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse on the Mayflower in 1620๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Mayflower Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi.On.Board.Pray.Pilgrims.Pray!” Episode 79 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse on the Mayflower in 1620๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Mayflower Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi.On.Board.Pray.Pilgrims.Pray!” Episode 79 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse on the Mayflower in 1620๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Mayflower Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi.On.Board.Pray.Pilgrims.Pray!” Episode 79 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse on the Mayflower in 1620๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Mayflower Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi.On.Board.Pray.Pilgrims.Pray!” Episode 79 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse on the Mayflower in 1620๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Mayflower Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi.On.Board.Pray.Pilgrims.Pray!” Episode 79 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse on the Mayflower in 1620๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Mayflower Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi.On.Board.Pray.Pilgrims.Pray!” Episode 79 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse on the Mayflower in 1620๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Mayflower Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi.On.Board.Pray.Pilgrims.Pray!” Episode 79 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse on the Mayflower in 1620๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Mayflower Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi.On.Board.Pray.Pilgrims.Pray!” Episode 79 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse on the Mayflower in 1620๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Mayflower Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi.On.Board.Pray.Pilgrims.Pray!” Episode 79 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse on the Mayflower in 1620๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Mayflower Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi.On.Board.Pray.Pilgrims.Pray!” Episode 79 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse on the Mayflower in 1620๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Mayflower Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi.On.Board.Pray.Pilgrims.Pray!” Episode 79 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse on the Mayflower in 1620๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Mayflower Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi.On.Board.Pray.Pilgrims.Pray!” Episode 79 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse on the Mayflower in 1620๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Mayflower Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi.On.Board.Pray.Pilgrims.Pray!” Episode 79 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse on the Mayflower in 1620๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Mayflower Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi.On.Board.Pray.Pilgrims.Pray!” Episode 79 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse on the Mayflower in 1620๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Mayflower Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi.On.Board.Pray.Pilgrims.Pray!” Episode 79 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse on the Mayflower in 1620๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Mayflower Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi.On.Board.Pray.Pilgrims.Pray!” Episode 79 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse on the Mayflower in 1620๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Mayflower Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi.On.Board.Pray.Pilgrims.Pray!” Episode 79 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse on the Mayflower in 1620๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Mayflower Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi.On.Board.Pray.Pilgrims.Pray!” Episode 79 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse on the Mayflower in 1620๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Mayflower Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”First.And.Last. Sacrifice!” Episode 77 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Hernan Cortes๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Aztec Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”First.And.Last. Sacrifice!” Episode 77 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Hernan Cortes๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Aztec Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Devil’s. Greatest.Trick!” Episode 76 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Keyser Sรถze๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Devil’s. Greatest.Trick!” Episode 76 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Keyser Sรถze๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Devil’s. Greatest.Trick!” Episode 76 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Keyser Sรถze๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Devil’s. Greatest.Trick!” Episode 76 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Keyser Sรถze๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Devil’s. Greatest.Trick!” Episode 76 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Keyser Sรถze๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Devil’s. Greatest.Trick!” Episode 76 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Keyser Sรถze๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Devil’s. Greatest.Trick!” Episode 76 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Keyser Sรถze๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Great.Whore.Nineveh!” Episode 75 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse & the Destruction of Nineveh๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody Jonah and the Fish Mix๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Veni.Vidi Vici!” Episode 74 Caesar and Pompey – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse at the Battle of Pharsalus๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”In.The.Navy!” Episode 72 The Battle of Gangut – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse at Gangut๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

https://www.patreon.com/bePatron?u=54250700

https://www.patreon.com/berndpulch?utm_campaign=creatorshare_creator

https://www.buymeacoffee.com/berndpulch

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Hiroshima.Mon.Armour!” Episode 71 The Nuke on Hiroshima – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse visits Hiroshima๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody Hannibal Mix๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ”Viva.Odiar A Muerte.Viva!”๐ŸคฃPart 62 The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Francisco Pizarro๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody Inca Mix๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก

BONUS:

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

โœŒSam Bankman-Fried Sentencing – Original DocumentโœŒ

Read all at

https://t.me/ABOVETOPSECRETXXL/34344

https://t.me/ABOVETOPSECRETXXL/34344

SUPPORT US AND Become a Patron! –

GET EXCLUSIVE GIFTS – TOP SECRET DOCUMENTS AND EXCLUSIVE EBOOKS

BY USING THE LINK BELOW


https://www.patreon.com/bePatron?u=54250700


(Paypal, Apple Pay, Venmo, Visa, Master Card, Discover, JCB, Diners Club, 3DS)

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

https://www.patreon.com/bePatron?u=54250700

https://www.patreon.com/berndpulch?utm_campaign=creatorshare_creator

https://www.buymeacoffee.com/berndpulch

CRYPTO WALLET for ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

CRYPTO WALLET for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

for all crypto coins like

BITCOIN

ETHEREUM

TETHER

MATIC

USD COIN

BNB

WALL STREET MEMES

SHIBA INU

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl


To be absolutely anonymous please use Monero

Scan this code to send Monero to 41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh.

True Information is the most valuable resource and we ask you kindly to give back.

๐Ÿ™God Bless You!๐Ÿ™

Scandal in Austria: Green ministry and left-wing cultural activists protected pedophile TV star

โœŒ๏ธSHARE

๐Ÿ‘‰THE ONLY WEBSITE WITH THE LICENSE TO SPY!
https://berndpulch.org
https://berndpulch.org/about-me/
๐Ÿ‘‰JOIN @ABOVETOPSECRETXXL
https://t.me/ABOVETOPSECRETXXL
gab.com/berndpulch
gettr.com/user/berndpulch
https://truthbook.social/berndpulch
๐Ÿ‘‰JOIN @ABOVETOPSECRETXXL
Subscribe to https://t.me/ABOVETOPSECRETXXL
SUPPORT US AND Become a Patron!
https://www.patreon.com/bePatron?u=54250700
True Information is the most valuable resource and we ask you kindly to give back.

In Austria, a pedophile scandal is currently causing horror in the cultural scene. The actor Florian Treichtmeister, who is particularly popular among the left-wing chic scene and has won countless awards, hoarded more than 56,000 (!) pieces of child pornography on various data carriers over the past 15 years. It was only thanks to his ex-girlfriend that this circumstance came to light through her report. Because (green) politics and left-wing cultural workers knew already since 2021 (!) of investigations against the “TV star”. Whether children were also abused by the actor is still unclear.

Read more: Scandal in Austria: Green ministry and left-wing cultural activists protected pedophile TV star

The Freedom Party sharply attacks First Lady Doris Schmidauer.

Meanwhile, even Austrian mainstream media are asking themselves the anxious question, “What did Doris Schmidauer know?” the eternally clueless grinning wife of Federal President Van der Bellen.

Schmidauer is a member of the supervisory board of the Burgtheater

Nevertheless, she still did not take action. Now FPร– Secretary General Christian Hafenecker attacks the Green First Lady:

“Now full transparency should be practiced for once. I would be interested to know whether the left-wing chic protected one of theirs.” (oe24)

Hafenecker continued:

“The Burgtheater has absolute argumentation emergency. Here I would like to know what actually happened. Ms. Schmidauer should also come out of her silence for once and explain what happened.

The second FPร– secretary general Michael Schnedlitz also demands full clarification:

“Even if Treichtmeister has dismissed the accusations to the Burgtheater as baseless rumors and an act of revenge by an ex-girlfriend: Why wasn’t he suspended until clarification? The Bundestheaterholding was supposedly informed, but was the Burgtheater’s supervisory board also informed? And if so, what did the members, including prominent names like Doris Schmidauer, after all the wife of the Federal President, have to say about it?”

“Child pornography is child abuse”.

“The handling of this scandal in itself is so catastrophic that a transition to the order of the day and the mere conviction of the accused by the judiciary is by far not enough. Child pornography is always a product of child abuse that destroys children’s souls and where no one can look away,” Schnedlitz said.

Just the tip of the iceberg?

As has now become known, investigations into the Treichtmeister case are likely to have been known to both the Green-led Department of Culture under Green State Secretary Andrea Mayer and Vice Chancellor Werner Kogler, who is also Green, as well as left-wing cultural workers at the Burgtheater and the Bundestheater-Holding since September 2021. The pedophile actor was therefore apparently covered by the political side and the cultural scene.

“In the industry, investigations were an open secret”.

  • said a tabloid about the case.

The Burgtheater announced as justification:

“Teichtmeister was confronted with the allegations by the management and has credibly denied them all.”

Allegedly, the actor talked his way out of it with a revenge action by his ex-girlfriend. But the scandal is currently expanding.

Despite investigations, pedophile was allowed to shoot with children!

In the summer of 2021, Teichtmeister even shot another film with children: In “Serviam” he played the father of a twelve-year-old girl! His ex-girlfriend had already filed a complaint with the police at that time. The police file with the accusations reads like a crime script: bodily harm, dangerous threat, continued use of violence, narcotics law.

But the left-wing cultural scene already starts with the usual relativizations. While Techtmeister and his pedophilia are played down in the worst possible way in the left-wing Standard forum, artists do not want to let this scandal drag down the Sisi film “Corsage,” which is currently in the running for an Oscar abroad. And this, although Techtmeister plays the leading role in it.

    110g cocaine as “personal use

    The theory or suspicion that Teichmeister enjoyed a “celebrity bonus” in the prosecution and with the public prosecutors and was/is also presumably part of a larger pedophile network, which reaches into the highest circles, is likely to be substantiated. Because as it became known now, one found with the pedophile actor already in August 2021 with a house search 110 gram cocaine

    But a criminal prosecution was dropped – with the argument, he could make credible that it was “personal use”. A complaint filed by his ex-girlfriend for domestic violence was also not pursued further because the woman was not believed.

    In view of the scandal, the left-wing Standard did not miss the opportunity to publish a “cheering article” on Teichtmeister’s acting performance. And the left-wing writer Elfride Jelinke also said that one must separate “the work from the artist. Of course, leftists don’t care about that when it comes to their historical revisionism, which in a mania of “cancle culture” wants to rename and ban everything and everyone who doesn’t fit into their world view. No “work is separated from the artist” here.

    It further became known that the lawyer of a mother of a child with whom Teichtmeister was filming contacted the director of the film “Serviam” in October 2021 and sued for an injunction against Teichtmeister taking photos of the child. Teichtmeister allegedly photographed children on the film sets and privately captioned those photos with speech bubbles that included phatnasies of violence and rape.

    Austria’s federal government is overflowing with expressions of dismay and calls for stricter punishments and laws following the widening pedophile scandal involving actor Teichtmeister. It was the politicians themselves who helped to cover up the case from the public.

    They now want to extend the sentencing range for possession of child pornography from two years to up to five years. Teichtmeister could even be spared a prison sentence. In the case of left-wing cuddly justice and since he is so far blameless, remorseful and confessed, a suspended sentence would also be possible.

    The defense attorney of the pedophile actor, the lawyer and constitutional judge (!) Michael Rami, is also causing a stir. This described the act of his client as a “pure digital offense”. “This legal opinion is not only morally reprehensible, it is also a mockery of all children to whom cruel, sexualized violence was inflicted in front of a running camera,” Sepp Rothwangl of the platform “Betroffener kirchlicher Gewalt” said of the statements.

    Whether Teichtmeister was or is part of a pedophile network (and into which elite circles these connections went) has strangely been largely left out of the debate so far. And this despite the fact that the amount of seized material (over 56,000 files) clearly indicates this. Teichtmeister claims to have only obtained the child pornography from the darknet since 2008. Without backers or further buyers. But other actors are said to be involved.

    Thus, it is the tip of an iceberg that could shake the entire left-wing cultural scene in Austria. One remembers, for example, the statements of former FPร– Vice Chancellor Heinz-Christian Strache in the so-called Ibiza video, according to which he knew an informant who could prove sexual acts of ex-SPร– Chancellor Christian Kern with minors in Africa.

    The latest findings in the Techtmeister case leave even experienced observers speechless at the audacity and negligence involved. Thus, the pedophile actor not only filmed with children AFTER the investigations, he was also invited as a guest of honor (!) to the parliament to read texts of victims there in 2016 as part of a state act on child abuse! Already since 2008, Techtmeister is known to have collected child pornography.

    And suddenly, even former colleagues and artists dare to come out of hiding. Actress Valerie Huber, for example, posted the following lines on her Instagram channel under an article on the Techtmeister case:

    “Finally it’s out, finally not everyone is covering up everything. Internally known for a long time and still continue to play at the Burgtheater as if nothing is wrongโ€ฆ”

    In turn, the Exxpress reported that Austria’s media law prevented the medium from mentioning Teichtmeister’s name in connection with the pedophile scandal as early as June 2022. And a whistleblower claims to have revealed to Medium:

    “As with Teichtmeister, everything is to be covered up with this actor so that the film project is not damaged. Again, many people know about the accusations, and again, no one brings this to the public.”

    THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

    https://t.me/ABOVETOPSECRETXXL

    ๐Ÿ‘‰JOIN @ABOVETOPSECRETXXL

    Handbook to help Victims of serious international Crimes

    SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    http://www.berndpulch.org

    THE ONLY WEBSITE WITH THE LICENSE TO SPY!

    ๐Ÿšจ FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

    https://t.me/ABOVETOPSECRETXXL

    ๐Ÿ‘‰JOIN @ABOVETOPSECRETXXL

    https://gab.com/berndpulch

    READ ALL AT:

    https://t.me/ABOVETOPSECRETXXL/19223

    ๐Ÿ‘‰JOIN @ABOVETOPSECRETXXL
    ABOVETOPSECRETXXL
    http://www.berndpulch.org
    THE ONLY WEBSITE WITH THE LICENSE TO SPY!
    https://gab.com/berndpulch
    ๐Ÿ‘‰JOIN @ABOVETOPSECRETXXL

    https://www.bitchute.com/channel/R55w1IXstR3h/

    THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

    https://t.me/ABOVETOPSECRETXXL

    ๐Ÿ‘‰JOIN @ABOVETOPSECRETXXL

    Dark Web & Cryptocurrency – What To Look For During A Search Warrant – Original Document

    Continue reading “Dark Web & Cryptocurrency – What To Look For During A Search Warrant – Original Document”

    Video – The Metaverse Is Worse Than You Thought๏ฟผ

    SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    http://www.berndpulch.org

    THE ONLY WEBSITE WITH THE LICENSE TO SPY!

    ๐Ÿšจ FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

    https://t.me/ABOVETOPSECRETXXL

    ๐Ÿ‘‰JOIN @ABOVETOPSECRETXXL

    https://gab.com/berndpulch

    THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

    https://t.me/ABOVETOPSECRETXXL

    ๐Ÿ‘‰JOIN @ABOVETOPSECRETXXL

    Google PRESSURES Employees Theyโ€™ll Lose Pay/ MIGHT Be Fired IF NOT VAXXED

    SUPPORT US AND Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    http://www.berndpulch.org

    THE ONLY WEBSITE WITH THE LICENSE TO SPY!

    ๐Ÿšจ FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

    https://t.me/ABOVETOPSECRETXXL

    https://gab.com/berndpulch

    https://gettr.com/user/berndpulch

    Google cracks down on vaccine holdouts with a blanket ...
    • In a memo circulated by leadership, Google told employees that they must comply with vaccine policies or they face losing pay and then losing their job.
    • The document said most U.S. employees will fall under their vaccine requirements, which stem from President Bidenโ€™s executive order.
    • While much of the tech industry is delaying return-to-work plans, Google is gearing up to get back into the office and is showing little patience for the unvaccinated.

    Google has told its employees they will lose pay โ€” and will eventually be fired โ€” if they donโ€™t comply with the companyโ€™s Covid-19 vaccination policy, according to internal documents viewed by CNBC.

    A memo circulated by leadership said employees had until Dec. 3 to declare their vaccination status and upload documentation showing proof, or to apply for a medical or religious exemption. The company said after that date it would start contacting employees who hadnโ€™t uploaded their status or were unvaccinated, as well as those whose exemption requests werenโ€™t approved.

    The document said employees who havenโ€™t complied with the vaccination rules by the Jan. 18 deadline will be placed on โ€œpaid administrative leaveโ€ for 30 days. After that, the company will put them on โ€œunpaid personal leaveโ€ for up to six months, followed by termination.

    A Google spokesperson said in a statement that, โ€œour vaccination requirements are one of the most important ways we can keep our workforce safe and keep our services running,โ€ and added that the company stands โ€œbehind our vaccination policy.โ€

    While much of the tech industry continues to push back return-to-work plans and companies large and small prepare for a flexible future, Google is requiring its workforce to eventually come into physical offices three days a week at some point in the new year. And itโ€™s showing limited patience for those who refuse to get vaccines, which have been widely available for months.

    The Biden administration has ordered U.S. companies with 100 or more workers to ensure their employees are fully vaccinated or regularly tested for Covid-19 by Jan. 18. A federal court issued a stay on the order in early November, putting a halt to the administrationโ€™s efforts.

    Still, Google asked its more than 150,000 employees to upload their vaccination status to its internal systems, whether they plan to come into the office or not, and the company indicated it plans to follow President Joe Bidenโ€™s executive order.

    โ€œWe expect that almost all roles at Google in the US will fall within the scope of the executive order,โ€ Googleโ€™s memo said. โ€œAnyone entering a Google building must be fully vaccinated or have an approved accommodation that allows them to work or come onsite,โ€ the company said, adding that โ€œfrequent testing is not a valid alternative to vaccination.โ€

    Google and parent company Alphabet have been staunchly behind vaccines since the middle of the year.

    CEO Sundar Pichai announced in July that the company would require vaccinations for those returning to offices. At the time, the plan was to reopen in January. But in early December, amid ongoing concerns about infection numbers, Google told U.S. employees it would not yet require them to return to offices. However, leadership encouraged employees to continue coming in โ€œwhere conditions allow to reconnect with colleagues in person and start regaining the muscle memory of being in the office more regularly.โ€

    The vaccine mandate has not been universally accepted by employees. Several hundred Google workers have signed and circulated a manifesto opposing the companyโ€™s requirements, which leadership said would apply to all employees, even those working from home, who engage directly or indirectly with federal government contracts.

    In the latest guidance, Google details some options for those who donโ€™t want to get to vaccinated. The company said employees can โ€œexploreโ€ if there are any roles at Google that donโ€™t conflict with the executive order. They can also request exemptions for religious beliefs or medical conditions, which Google previously said would be granted on a case-by-case basis.

    For employees with roles that happen to fall outside the scope of the executive order that can also be performed out of the office, the company said they will be able to โ€œpermanently work remotely going forward.โ€

    Employees placed on unpaid personal leave will be able to keep their benefits for the first 92 days, the memo said. If after six months they still arenโ€™t in compliance with the mandate, โ€œtheir employment with Google will end.โ€

    THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

    https://t.me/ABOVETOPSECRETXXL

    COMPUTER CRIME EXPERT WITNESS MANUAL – ORIGINAL DOCUMENT

    SUPPORT US AND Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    http://www.berndpulch.org

    THE ONLY WEBSITE WITH THE LICENSE TO SPY!

    ๐Ÿšจ FOLLOW US ON TELEGRAM FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

    https://t.me/ABOVETOPSECRETXXL

    Continue reading “COMPUTER CRIME EXPERT WITNESS MANUAL – ORIGINAL DOCUMENT”

    EXPOSED – THE FACEBOOK BLACK LIST OF DANGEROUS INDIVIDUALS & ORGANIZATIONS – ORIGINAL DOCUMENT

    SUPPORT US AND Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    http://www.berndpulch.org

    THE ONLY WEBSITE WITH THE LICENSE TO SPY!

    ๐Ÿšจ FOLLOW US ON TELEGRAM FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

    https://t.me/ABOVETOPSECRETXXL

    Continue reading “EXPOSED – THE FACEBOOK BLACK LIST OF DANGEROUS INDIVIDUALS & ORGANIZATIONS – ORIGINAL DOCUMENT”

    Blumenthal Calls Out Mark Zuckerberg During Facebook Whistleblower Hearing

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    http://www.berndpulch.org

    THE ONLY WEBSITE WITH THE LICENSE TO SPY!

    LIVESTREAM – Facebook Whistleblower Testifies To Senate Commerce Subcommittee

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    http://www.berndpulch.org

    THE ONLY WEBSITE WITH THE LICENSE TO SPY!

    Operation Trojan Shield – FBI San Diego Infiltraded Hundreds Of Criminal Networks – Original Document

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    Encrochat-Nachrichten geknackt: Schon 24 Verhaftungen โ€“ Kryptodienst ist  ein Geschenk fรผr Brandenburgs Drogenfahnder | Lausitzer Rundschau
    Continue reading “Operation Trojan Shield – FBI San Diego Infiltraded Hundreds Of Criminal Networks – Original Document”

    Confidential – The Impact Of Covid19 On Organized Crime – UNODC Report – Original Document

    Become a Patron!

    COVID 19 and organized crime: ยปLatin American governments are in a  state-making competition with crimeยซ

    Go back

    Your message has been sent

    Warning
    Warning
    Warning
    Warning.

    Sky Global Indictment Exposed

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    
    
    
    
    
    Continue reading “Sky Global Indictment Exposed”

    Exposed – ICANN-Europol Update on Whois-Related Initiatives

    Uses of the WHOIS

    Traditionally:
    โ€ข Contact point for incident response
    โ€ข Determination of availability of domain names

    But also:
    โ€ข Assisting, public safety organisations, businesses, consumer groups, individuals in combating abuse and fraud and seeking redress.
    โ€ข Help with online crime attribution

    โ€ฆ

    Go back

    Your message has been sent

    Warning
    Warning
    Warning
    Warning

    Warning.

    Video – Trend Micro about Putins Cyber Espionage Troops Pawn Storm

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    Go back

    Your message has been sent

    Warning
    Warning
    Warning
    Warning

    Warning.

     

    Cyber Espionage Definition, Cyber Espionage Cases, Cyber Espionage China, Cyber Espionage Prevention, Cyber Espionage Russia, Cyber Espionage Pdf, Cyber Espionage The Chinese Threat, Cyber Espionage History, Cyber Espionage International Law, Cyber Espionage Cases 2016, Cyber Espionage Act, Cyber Espionage Articles, Cyber Espionage Attacks, Cyber Espionage Adalah, Cyber Espionage And International Law, Cyber Espionage Australia, Cyber Espionage And Cyber Warfare, Cyber Espionage Attack Methods, Cyber Espionage Books, Cyber Espionage Beyond The Rule Of Law, Cyber Espionage Business, Cyber Espionage By China, Cyber Espionage Brazil, Cyber Espionage By Chinese Actors, Cyber Espionage Blog, Cyber Espionage By Country, Bagaimana Cyber Espionage Dapat Muncul, Best Cyber Espionage Books, Cyber Espionage Cases, Cyber Espionage China, Cyber Espionage Cases 2016, Cyber Espionage Case Study, Cyber Espionage Cases 2017, Cyber Espionage Cases In India, Cyber Espionage Campaign, Cyber Espionage China Us, Cyber Espionage Cost, Cyber Espionage Canada, Cyber Espionage Definition, Cyber Espionage Documentary, Cyber Espionage Def, Cyber Espionage Definition Pdf, Economic Cyber Espionage Definition, Bagaimana Cyber Espionage Dapat Muncul, Why Is Cyber Espionage Difficult To Prevent, Contoh Kasus Cyber Espionage Di Indonesia, How Is Cyber Espionage Done, Dragonfly Cyber Espionage, Cyber Espionage Examples, Cyber Espionage Edward Snowden, Cyber Espionage Effects, Cyber Espionage Essay, Cyber Economic Espionage, Cyber Economic Espionage Accountability Act, Cyber Espionage In Middle East, Economic Cyber Espionage And International Law, Economic Cyber Espionage Definition, Explain Cyber Espionage, Cyber Espionage Facts, Cyber Espionage Fiction, Cyber Espionage First Case, Cyber Espionage F 35, Cyber Espionage Law Firms, Fbi Cyber Espionage, France Cyber Espionage, A Theory Of Cyber Espionage For The Intelligence Community, French Cyber Espionage, Flame Cyber Espionage, Cyber Espionage Groups, Cyber Espionage Germany, Cyber Espionage Georgia, Cyber-espionage The Greatest Transfer Of Wealth In History, Cyber-espionage A Growing Threat To The American Economy, Cyber Espionage Against Georgia, Cyber Espionage Against Georgian Government, What Are Cyber Espionage Groups Stealing From The United States, Cyber Espionage To Splinter Internet Governance, Global Cyber Espionage, Cyber Espionage History, Huawei Cyber Espionage, Hellsing Cyber Espionage, Cyber Espionage International Law, Cyber Espionage Incidents, Cyber Espionage India, Cyber Espionage Is Alive And Well, South African Cyber Espionage, Cyber Espionage In China, Cyber Espionage In Middle East, Cyber Espionage Iran, Cyber Espionage In Canada, Cyber Espionage Impact, Cyber Espionage Jobs, Cyber Espionage Japan, Cyber Espionage Kenya, Kaspersky Cyber Espionage, Kasus Cyber Espionage, Kasus Cyber Espionage Di Indonesia, Kejahatan Cyber Espionage, Karakteristik Cyber Espionage, Cyber Espionage Law, Cyber Espionage Law Firms, Cyber Espionage International Law, Cyber Espionage Definition Law, Cyber Espionage Is Reaching Crisis Levels, Pengertian Dari Cyber Espionage Lengkap, Le Cyber Espionnage Definition, Cyber Espionage Meaning, Cyber Espionage Movies, Cyber Espionage Methods, Cyber-espionage Nightmare – Mit Technology Review, Cyber Espionage Attack Methods, Cyber Espionage In Middle East, Chinese Cyber Espionage Mandiant, Chinese Cyber Espionage Map, Bagaimana Cyber Espionage Dapat Muncul, Military Cyber Espionage, Cyber Espionage News, Cyber Espionage North Korea, Cyber-espionage Nightmare, Cyber Espionage National Security, Cyber Espionage Novels, Cyber Espionage Nato, Ghostnet Cyber Espionage Network, Nsa Cyber Espionage, Nortel Cyber Espionage, Cyber Espionage Operations, Cyber Espionage Red October, Cyber Espionage And Cyber Espionage, Cyber-espionage The Greatest Transfer Of Wealth In History, Cyber Espionage Prevention, Cyber Espionage Pdf, Cyber Espionage Ppt, Cyber Espionage Pronunciation, Cyber Espionage Presentation, Cyber Espionage Pictures, Cyber Espionage Problems, Cyber Espionage Purpose, Cyber Espionage Ppt Slideshare, Cyber Espionage Research Paper, Cyber Espionage Quotes, Cyber Espionage Research Questions, Cyber Espionage Russia, Cyber Espionage Research Paper, Cyber Espionage Rule Of Law, Cyber Espionage Report, Cyber Espionage Red October, Cyber Espionage Research Questions, Cyber Espionage Ring, Cyber Espionage Is Reaching Crisis Levels, Cyber Espionage Techrepublic, Russian Cyber Espionage, Cyber Espionage Statistics, Cyber Espionage Synonym, Cyber Espionage Simulator, Cyber Espionage Security Issues, Cyber Espionage Statistics 2015, Cybersecurity Espionage, Espionage In Cyberspace, Cyber Espionage Case Study, Cyber Espionage To Splinter Internet Governance, South African Cyber Espionage, Cyber Espionage The Chinese Threat, Cyber Espionage Threat, Cyber Espionage Tools, Cyber Espionage Trends, Cyber Espionage The Chinese Threat Case Study, Cyber Espionage To Splinter Internet Governance, Cyber-espionage The Greatest Transfer Of Wealth In History, Cyber Espionage Thesis, Cyber Espionage Training, Cyber Espionage Tactics, Cyber Espionage Uk, Us Cyber Espionage, Cyber Espionage Un, Cyber Espionage Us China, China’s Cyber Espionage Units, Russian Cyber Espionage Under The Microscope, China Cyber Espionage And U.s. National Security, Pla Cyber Espionage Unit, Cyber Espionage Vs Cyber Warfare, Cybercrime Vs Cyber Espionage, Cyber Espionage Vs Cyber Attack, Cyber Espionage Virus, Cyber Espionage Wiki, Cyber Espionage & Warfare, Cyber Weapons Espionage, Cyber Espionage Vs Cyber Warfare, Cyber Espionage And Cyber Warfare Definition, Cyber Espionage Youtube

    Heinz Gerlachs “Erben” – GoMoPa, Medard Fuchsgruber und mutmasslich Rainer von Holst & Thomas Bremer – Cui bono ?

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    Es hat lange gedauert, aber nun ist das Rรคtsel wohl gelรถst: Wer profitiert von Gerlachs Tod ?

    • GoMoPa konnte die eigene Position massiv ausbauen
    • Medard Fuchsgruber รผbernahm die DFI-Seite
    • Rainer von Holst, Doreen Trampe (Ex-GoMoPa) und Pierre Gersรถne stecken mutmasslich hinter der anonymen Webseite gerlachreport.com
    • Thomas Bremer mit seinem Blog-Netzwerk im “Tal der Ahnungslosen” (DDR-Witz) zu Leipzig

    In Kรผrze mehr…

     

    Go back

    Your message has been sent

    Warning
    Warning
    Warning
    Warning

    Warning.

    Heinz Gerlach, Heinz Gerlach Halle, Heinz Gerlach Akkordeon, Heinz Gerlach Aschaffenburg, Heinz Gerlach Bad Arolsen, Heinz Gerlach Medien Ag, Heinz Gerlach Durchbruch Bei Stalingrad, Dekan Heinz Gerlach, Heinz-dieter Gerlach, Heinz Gerlach Tanzende Finger, Heinz Gerlach Frankfurt, Heinz Gerlach Flachsmeer, Ferienwohnung Heinz Gerlach Zingst, Heinz Gerlach Halle, Karl Heinz Gerlach, Heinz Gerlach Komponist, Karl Heinz Gerlach Biebertal, Heinz Gerlach Halle Karneval, Karl-heinz Gerlach Langenhagen, Karl Heinz Gerlach Herzberg, Heinz Gerlach Licht & Sound, Karl-heinz Gerlach Langenhagen, Heinz Gerlach Niederstotzingen, Tanzende Finger Gerlach Heinz Noten, Heinz Gerlach Obernau, Heinz Gerlach Offenbach, Heinz Gerlach Pfarrer, Heinz Gerlach Stalingrad, Heinz Gerlach Schrobenhausen, Heinz Gerlach Sulingen, Heinz Gerlach Licht & Sound, Heinz Schulze Gerlach, Heinz Gerlach Durchbruch Bei Stalingrad, Heinz Gerlach Tanzende Finger, Heinz Gerlach Tot, Heinz Gerlach Winterberg, Karl Heinz Gerlach Wegberg, Heinz Gerlach Zingst, Ferienwohnung Heinz Gerlach Zingst

     

    Halloween-Scherz: Horror- Clown gibt sich als von Holst aus

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

     

     

     

    Sie kennen das: Ein Clown sendet Ihnen eine E- Mail.

    Der Clown nennt sich oder ist Rainer von Holst. Alles ohne Beweis. Was macht man damit ?  Richtig. Man fragt Google und die User.

    Die Rainer von Holst-Clown Maske mit falscher E-Mail inklusive cc an “Polizei” ohne handfeste Beweise – Ist das ein gelungener Halloween-Scherz ?  Oder sind andere Horror-Clowns noch besser ?

    a Adolf Hitler

    b Benito Mussolini

    c Rainer von Holst

    d Nero

     

    Wer hat die beste Horror-Clown-Frisur ?

    a Fury

    b Rainer von Holst

    c Flipper

    d Lassie

    You will be the Judge !

    Go back

    Your message has been sent

    Warning
    Warning
    Warning
    Warning

    Warning.

    Horror Clown Movies, Horror Clown Movies 2016, Horror Clown Makeup, Horror Clown Movie 2017, Horror Clown Videos, Horror Clown Costumes, Horror Clown Mask, Horror Clown Pics, Horror Clown Stories, Horror Clown Names, Scary Clown American Horror Story, Evil Clown American Horror Story Actor, American Horror Story Clown, Horror Movie About Clown, Horror Movie With Clown And Babysitter, Clown American Horror Story Actor, American Horror Clown Costume, American Horror Clown Mask, American Horror Clown Actor, Clown American Horror Story Trailer, Horror Clown Books, Horror Clown Birthday, Horror Clown Bilder, Horror Clown Breda, Horror Clown Blick, Horror Clown Basel, Horror Film Clown Babysitter, Horror Movie Clown Babysitter, Horror Story Clown Babysitter, American Horror Story Clown Backstory, Horror Clown Costumes, Horror Clown Costumes Adults, Horror Clown Character, Horror Clown Costume Ideas, Horror Clown Costumes Uk, Clown Horror Comedy, American Horror Clown Costume, Classic Horror Clown Costume, Womens Horror Clown Costume, Horror Movie Clown Costume, Horror Clown Drawings, Horror Clown Dolls, Horror Clown Dailymotion, Horror Clown Director, Horror Clown Deutsch, Horror Clown Deutschschweiz, Horror Dog Clown Car, Horror Dome Clown, Horror Clown Fancy Dress, Horror Clown Videos Dailymotion, Horror Clown England, Horror Clown Es, Horror Clown Eli Roth, Horror Clown Essen, Evil Clown Horror Movie, Evil Clown Horror, American Horror Story Clown Episode, Evil Clown American Horror Story, Evil Clown American Horror Story Actor, American Horror Story Clown Episode 1, Horror Clown Film, Horror Clown Face, Horror Clown Face Paint, Horror Clown Film 2015, Horror Clown Full Movie, Horror Clown Fancy Dress, Horror Clown Figurine, Horror Clown Frankrijk, Horror Clown Frankreich, Horror Clown France, Horror Clown Gifs, Horror Clown Games, Horror Clown Geschichte, Horror Clown Geschichten, Horror Clown Gesicht, Horror Clown Girl, American Horror Clown Gif, Scary Clown Horror Gif, Clown Horror Movie Gif, American Horror Story Clown Girl, Horror Clown Halloween, Horror Clown Huren, Horror Clown Images, Horror Clown In Nederland, Horror Clown In Der Schweiz, Horror Clown In Thun, Horror Clown In Frankrijk, Horror Clown In Frankreich, Horror Clown It, Horror Clown In Basel, Horror Clown In England, Horror Clown In Luxemburg, Horror Clown Jokes, Horror Clown Jack, American Horror Story Clown Jaw, Horror Clown John Wayne, Jeugdjournaal Horror Clown, Clown Horror Prank Jockiboi, Horror Clown Killer, Horror Clown Laugh, Horror Clown Luxemburg, Horror Clown Luxembourg, Horror Clown Lache, Clown Horror List, Horror Clown Movies List, Clown Horror Films List, Horror Movies Like Clown, American Horror Story Clown Lawsuit, Horror Clown Mask Latex, Horror Clown Movies, Horror Clown Movies 2016, Horror Clown Makeup, Horror Clown Movie 2017, Horror Clown Mask, Horror Clown Music, Horror Clown Movies On Netflix, Horror Clown Memes, Horror Clown Names, Horror Clown Nights, Horror Clown Night Game, Clown Horror Novels, Clown Horror Netflix, Clown Horror New, Horror Movie Clown Names, American Horror Clown Name, American Horror Clown No Mask, Horror Clown Movies New, Horror Clown Outfit, Horror Clown Movies On Netflix, Horror Movie Clown On Tricycle, Scary Clown On American Horror Story, Clown Horror Movies Online, Horror Movie With Clown On Cover, Clown Horror Watch Online, Horror Movies Of Clown, Creepy Clown On American Horror, Clown Horror Movie Watch Online, Horror Clown Pics, Horror Clown Prank, Horror Clown Props, Horror Clown Poem, Horror Clown Prosthetic, Horror Clown Photoshop, Horror Clown Pak, Horror Clown Face Paint, American Horror Clown Picture, Horror Movie Clown Puppet, Horror Clown Quotes, American Horror Story Clown Quotes, Horror Clown Real, Clown Horror Review, Clown Horror Rotten Tomatoes, Horror Film Clown Rocking Chair, American Horror Story Clown Real, American Horror Story Clown Running, American Horror Story Clown Real Person, American Horror Story Clown Real Face, Clown Horror Movie Dvd Release, Clown Horror Recensione, Horror Clown Stories, Scary Horror Clowns, Horror Story Clown Mask, Horror Clown Song, Horror Story Clown Statue, Horror Clown Sound, Horror Clown Suit, Scary Horror Clown Movies, Clown Horror Short Stories, Horror Movie Clown Scene, Horror Clown Tattoo, Horror Clown Top 10, Horror Clown Thun, Horror Clown Trailer, Horror Clown Tutorial, American Horror Clown Trailer, Horror Movie Clown Trailer, Moviepilot Horror Clown Trailer, Horror Movie The Clown, American Horror Story Clown, Horror Clown Masks Uk, Horror Clown Costumes Uk, Horror Film Clown Under Bed, Horror Movie Clown Under Bed, American Horror Story Clown Unmasked, American Horror Clown Makeup, Clown Upcoming Horror Movies, Horror Clown Makeup, Horror Clown Halloween Makeup, Horror Clown Uit Frankrijk, Horror Clown Videos, Horror Clown Videos Dailymotion, Horror Clown Verkleidung, American Horror Story Clown Video, American Horror Story Clown Vine, Halloween Horror Nights Clown Video, Horror Clown Tattoo Vorlagen, Horror Clown Versteckte Kamera, Horror Clown Vermoord, Horror Clown Verhalen, Horror Clown Wallpapers, Horror Clown Wiki, Horror Clown Woman, Horror Clown Wig, Horror Clown Womens Costume, Clown Horror Watch Online, Horror White Clown, American Horror Clown Without Mask, Horror Movie With Clown Doll, Horror Movie With Clown Killer, Horror Clown Youtube, Clown Horror Movies Youtube, American Horror Story Clown Youtube, Youtube Horror Clown Prank, Film Horror Sui Clown Yahoo, Film Horror Clown Yahoo, Horror Zombie Clown Mask, Clown Zombies Horror, Clown Horror Zwiastun, Horror Clown Zoetermeer, Rainer Von Holst Firmenwelten, Rainer Von Holst Gerlachreport, Rainer Von Holst Usa, Rainer Von Holst Gerlach, Rainer Von Holst Gomopa, Rainer Von Holst Iserlohn, Rainer Von Holst, Rainer Von Holst Bank, Rainer Von Holst Politico, Rainer Von Holst Augsburg, Rainer Von Holst Augsburg, Rainer Von Holst Bank, Rainer Von Holst Firmenwelten, Rainer Von Holst Gerlachreport, Rainer Von Holst Gerlach, Rainer Von Holst Gomopa, Rainer Von Holst Iserlohn, Rainer Von Holst Politico, Rainer Von Holst Princeton, Rainer Von Holst Usa, Rainer Von Holst Werther

     

    Enttarnt – Rainer von Holsts Cyberwaffe – Pierre Gersoene

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    Image result for pierre gersรถne

    Pierre Gersรถne

    Rainer von Holst verรถffentlicht anonyme Blogs im Internet.

    Dafรผr bedient er sich des Ostberliners Pierre Gersรถne, der bislang aus guten Grรผnen anonym blieb und es sicher gerne auch weiter wรคre.

    Fรผr alle Fans von Rainer von Holst und seinem Webmaster.

    u.a. gomopacrime, investigoo, etc. pp

    Hier die Kontaktdetails:

    Pierre Gersรถne

    Medienhaus Gersรถne UG
    FanningerstraรŸe 54
    D-10365 Berlin-Lichtenberg

    Telefon: +49 (0)30 531 674 60
    Telefax: +49 (0)30 531 674 65

    http://www.medienhaus-gersoene.de

    Registergericht: Amtsgericht Berlin-Charlottenburg
    Registernummer: HRB 160218 B
    Umsatzsteuer-Identifikationsnummer gem. ยง 27a UStG: DE295777375

    Go back

    Your message has been sent

    Warning
    Warning
    Warning
    Warning

    Warning.

    Rainer Von Holst Firmenwelten, Rainer Von Holst Gerlachreport, Rainer Von Holst Usa, Rainer Von Holst Gerlach, Rainer Von Holst Gomopa, Rainer Von Holst Iserlohn, Rainer Von Holst, Rainer Von Holst Bank, Rainer Von Holst Politico, Rainer Von Holst Augsburg, Rainer Von Holst Augsburg, Rainer Von Holst Bank, Rainer Von Holst Firmenwelten, Rainer Von Holst Gerlachreport, Rainer Von Holst Gerlach, Rainer Von Holst Gomopa, Rainer Von Holst Iserlohn, Rainer Von Holst Politico, Rainer Von Holst Princeton, Rainer Von Holst Usa, Rainer Von Holst Werther, Medienhaus Gersoene, Gersoene, Cyberwaffe Regin, Cyberwaffe Regin, Cyberwaffen Wiki, Cybercrime Definition, Cybercrime Statistics, Cybercrime Prevention, Cybercrime Articles, Cybercrime Jobs, Cybercrime Law, Cybercrime Statistics 2017, Cyber Crime Cases, Cyber Crime News, Cybercrime Topics, Cybercrime Articles, Cybercrime And Security, Cybercrime As A Service, Cybercrime And Digital Forensics An Introduction, Cybercrime And Digital Forensics, Cybercrime And Society, Cybercrime And Terrorism, Cybercrime Attacks, Cybercrime Act, Cybercrime Against Businesses, Cyber Crime Batman, Cyber Crime Book, Cybercrime Blog, Cybercrime Bill, Cybercrime Banks, Cybercrime Background, Cyber Crime By Country, Cybercrime Bangalore, Cybercrime Billion Dollar Industry, Cybercrime Background Information, Cyber Crime Cases, Cybercrime Certification, Cybercrime Convention, Cybercrime Careers, Cybercrime Cost, Cybercrime Cafe, Cybercrime Cost 2016, Cybercrime China, Cybercrime Conference, Cybercrime Conclusion, Cybercrime Definition, Cybercrime Definition Computer, Cybercrime Definition Fbi, Cyber Crime Data, Cybercrime Degrees, Cybercrime Definition Pdf, Cybercrime Database, Cyber Crime Detective, Cyber Crime Documentary, Cyber Crime Department, Cybercrime Example, Cyber Crime Essay, Cybercrime Effects, Cybercrime Events, Cybercrime Enforcement, Cybercrime Economy, Cyber Crime Ethics, Cybercrime Effects On Business, Cybercrime Ecosystem, Cybercrime Enforcement Training Assistance Act, Cybercrime Facts, Cybercrime Fbi, Cybercrime Forensics, Cybercrime Forum, Cybercrime Forensics Training Center, Cybercrime Federal Laws, Cyber Crime Fiction, Cybercrime Financial Services, Cybercrime Future Trends, Cybercrime Fiji, Cybercrime Gets Personal Money Magazine, Cybercrime Gets Personal, Cybercrime Growth, Cyber Crime Graph, Cybercrime Groups, Cybercrime Government, Cybercrime Global Statistics, Cyber Crime Gov, Cyber Crime Games, Cybercrime Gif, Cybercrime Hacking, Cyber Crime History, Cybercrime Help, Cybercrime Healthcare, Cybercrime Hyderabad, Cybercrime How To Report, Cyber Crime Hotline, Cybercrime Hacking News, Cyber Crime Head Office India, Cybercrime Hacking And Cracking, Cybercrime Identity Theft, Cybercrime In The Us, Cyber Crime Investigation, Cybercrime Images, Cyber Crime Insurance, Cybercrime Is Also Known As, Cybercrime Investigating High-technology Computer Crime, Cybercrime Infographic, Cybercrime Information, Cyber Crime In Russia, Cybercrime Jobs, Cybercrime Jurisdiction, Cybercrime Journal Articles, Cybercrime Job Description, Cybercrime Jobs Salary, Cybercrime Job Openings, Cybercrime Jobs In Chennai, Cybercrime Job Qualification, Cybercrime Journal Articles Pdf, Cyber Crime Jamaica, Cybercrime Kenya, Cybercrime Key Issues And Debates, Cybercrime Kuwait, Cybercrime Ki Dhara, Cybercrime Key Issues And Debates Pdf, Cybercrime Kasus, Cyber Crime Karnataka, Cybercrime Kartu Kredit, Cybercrime Kolkata, Cyber Crime Karachi, Cybercrime Law, Cybercrime Laws In Usa, Cybercrime Law Enforcement, Cybercrime Laws Of The United States, Cybercrime List, Cybercrime Legislation Us, Cybercrime Laws In Florida, Cybercrime Legal Issues, Cybercrime Law Outline, Cyber Crime Lesson Plans, Cybercrime Meaning, Cyber Crime Movies, Cybercrime Methods, Cybercrime Methodology, Cyber Crime Money, Cybercrime Markets, Cyber Crime Magazine, Cyber Crime Most Wanted, Cybercrime Meaning In Tamil, Cybercrime Masters Degree, Cyber Crime News, Cyber Crime News Articles, Cyber Crime News Articles 2017, Cyber Crime Netflix, Cybercrime Nigeria, Cyber Crime Novels, Cybercrime Number, Cybercrime Nhs, Cyber Crime News Philippines, Cybercrime Nbi, Cybercrime Or Cyber Crime, Cybercrime Organizations, Cybercrime On The Rise, Cybercrime On The High Seas, Cybercrime Offenses, Cyber Crime Outline, Cybercrime Office, Cybercrime Office In Ahmedabad, Cybercrime Office In Patna, Cybercrime Office In Nashik, Cybercrime Quotes, Cyber Crime Quizlet, Cybercrime Questions, Cyber Crime Quiz, Cybercrime Questionnaire, Cybercrime Question Paper, Cybercrime Qatar, Cybercrime Question And Answers, Cybercrime Report, Cybercrime Research Paper, Cyber Crime Rates, Cyber Crime Recent, Cybercrime Research Topics, Cybercrime Research, Cybercrime Reported To The Ic3, Cybercrime Resources, Cybercrime Riding Tax Season Tides, Cyber Crime Report 2016, Cybercrime Statistics, Cybercrime Statistics 2017, Cyber Crime Stories, Cybercrime Spyware, Cybercrime Statistics 2015, Cybercrime Security, Cybercrime Solutions, Cybercrime Salary, Cybercrime Small Business, Cyber Crime Synonym, Cybercrime Topics, Cybercrime Trends, Cybercrime Tracker, Cybercrime Treaty, Cyber Crime Types, Cybercrime Training, Cybercrime Threats, Cybercrime Tools, Cybercrime Terms, Cybercrime The Transformation Of Crime In The Information Age, Cyber Crime Unit, Cybercrime Us, Cybercrime Uk, Cybercrime Uae, Cybercrime University, Cybercrime Un, Cyber Crime Unit Mauritius, Cyber Crime Unit Malta, Cybercrime Uc, Cybercrime Unodc, Cybercrime Victims, Cybercrime Vs Traditional Crime, Cybercrime Videos, Cybercrime Vs Traditional Crime Statistics, Cybercrime Virus, Cyber Crime Vocabulary, Cybercrime Vs Traditional Crime Punishment, Cybercrime Vs Computer Crime, Cybercrime Vs Cyber Warfare, Cybercrime Vs Cyber Espionage, Cybercrime Wiki, Cybercrime Worm, Cybercrime World Wide War 3.0, Cyber Crime Websites, Cyber Crime Worksheet, Cybercrime Wallpaper, Cyber Crime Worldwide, Cybercrime Working Group, Cyber Crime What Is It, Cybercrime Wikipedia Indonesia, Cybercrime X-remote Download, Tedx Cybercrime, Cyber Crime Youtube, Cyber Crime Yahoo, Cyber Crime Yahoo Answers, Cyber Crime Yesterday, Cyber Crime Youth, Cybercrime Yang Menyerang Hak Cipta, Cybercrime Yar, Youth Cyber Crime, Cyber Crime Yogyakarta, Cybercrime Yang Menyerang Pemerintah, Cybercrime Zimbabwe, Cybercrime Zeus, Cybercrime Zimbra, Zurich Cyber Crime, Zimbabwe Cybercrime Bill, Cyber Crime In Zambia, New Zealand Cyber Crime, Los Zetas Cybercrime, Cybercrime Law In Zambia, Cyber Crime Cases In Zambia

    Windbeutel und Bankrott-Tourist von Holst schreit nach Rache und steigert Besucherzahlen

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    Als Reaktion auf die Aufdeckung seiner diversen Machenschaften durch angesehene englische Medien wie Daily Mail und mich – siehe

    https://www.google.com/search?q=rainer%20von%20holst

     

    Uns und auch Ihnen wird von Holst kein X als U verkaufen kรถnnen, wie er das mit dem Verkauf von illegalen Investments, seiner illegalen Bank und seinen nicht-existenten Betrรผgerfirmen tausendfach versucht hat und noch immer versucht. Er hat schon genug angerichtet.

    Siehe auch die Wallstreet-Diskussion รผber den Bielefelder Scharlatan und Windbeutel:

    http://www.wallstreet-online.de/diskussion/1222551-1-10/unternehmen-firmenwelten-ag-bielefeld

    Der Name Rainer von Holst ist so belastet, dass er sich bis dato nicht TRAUT eine Facebook-Seite, einen eigenen Blog, einen Twitter-Account oder sonst etwas im Internet unter eigenem Namen zu publizieren. Denn wegen der Anschlรคge auf “GoMoPa”  und dem Einbruch bei wird auch gegen von Holst ermittelt.

    Warum wohl ?

    Und das bei so einer Type der Staat und die STASI Synonyme sind, sagt eigentlich eh schon alles.

    Doch wie sagt der Volksmund: “Wer anderen eine Grube grรคbt, fรคllt selbst hinein.”

    Windbeutel Rainer von Holst – wie immer anonym unterwegs – beschert uns einen krรคftigen Besucherzuwachs und ich an sage an dieser Stelle: “Danke, alter Windbeutel, bitte weiter schlampig schreiben !”

    Nur weiter so. Unsere Anzeigenkunden freut es auch…

    Go back

    Your message has been sent

    Warning
    Warning
    Warning
    Warning

    Warning.

    Rainer Von Holst Firmenwelten, Rainer Von Holst Gerlachreport, Rainer Von Holst Usa, Rainer Von Holst Gerlach, Rainer Von Holst Gomopa, Rainer Von Holst Iserlohn, Rainer Von Holst, Rainer Von Holst Bank, Rainer Von Holst Politico, Rainer Von Holst Augsburg, Rainer Von Holst Augsburg, Rainer Von Holst Bank, Rainer Von Holst Firmenwelten, Rainer Von Holst Gerlachreport, Rainer Von Holst Gerlach, Rainer Von Holst Gomopa, Rainer Von Holst Iserlohn, Rainer Von Holst Politico, Rainer Von Holst Princeton, Rainer Von Holst Usa, Rainer Von Holst Werther, Bankrott Gehen, Bankrott Englisch, Bankrott Auf Englisch, Bankrott Anmelden, Bankrott Adjektiv, Bankrott Argentiniens Staatspleite 2001, Bankrott Anderes Wort, Bankrott Auktionen, Bankrott Argentinien, Bankrott Auktion, Bankrott Airberlin, Bankrott Auf Griechisch, Bankrott Bedeutung, Bankrott Buch, Bankrott Bost, Bankrott Bank, Bankrott Bundesland, Bankrott Brasilien, Bankrott Berlin, Bankrott Financial Crisis, American Chopper Bankrott, Cafe Bankrott, Cafe Bankrott Berlin, Commerzbank Bankrott, Colt Bankrott, Companys Bankrott, Chicago Bankrott, Cafe Bankrott Prenzlauer Allee, Caffee Bankrott, Bankrott Duden, Bankrott Definition, Bankrott Dict, Bankrott Der Ddr, Bankrott Detroit, Bankrott Durch Scheidung, Bankrott Deutsch, Bankrott Deutschland, Bankrott Deutsche Bank, Bankrott Der Bildung, Bankrott Englisch, Bankrott Gehen, Bankrott Gehen Englisch, Bankrott Griechenland, Bankrott Gehen Duden, Bankrott Griechenland Folgen, Bankrott Gegangen, Bankrott Gmbh, Bankrott Gehen Bedeutung, Bankrott Gesetz, Bankrott Gehen Rechtschreibung, Bankrott Herkunft, Bankrott Hadith, Hsv Handball Bankrott, Htc Bankrott, Hsv Bankrott, Handballclub Bankrott 2012, Hattrick Bankrott, Hardwareversand Bankrott, Bank Banker Bankrott Hamburg, Nach Dem Bankrott Habermas, Bankrott Insolvenz, Bankrott Lehman Brothers, Bankrott Machen, Bankrott Mit 4 Buchstaben, Bankrott Monopoly, Bankrott Meyer, Bankrott Machen Englisch, Bankrott Anmelden, Bankrott Machen Duden, Bankrott Magyarul, Jp Morgan Bankrott, Mexx Bankrott, Bankrott Nach Scheidung, Bankrott New York 1975, Nokia Bankrott, Nintendo Bankrott, Neckermann Bankrott, Opel Bankrott, Otto Bankrott, Occ Bankrott, Osobny Bankrott Fyzickej Osoby, O2 Bankrott, Odenwaldschule Bankrott, Pleite Oder Bankrott, Bankrott Oder Insolvent, Bankrott Gehen Oder Bankrott Gehen, Bankrott Pleite, Quiksilver Bankrott, Quelle Bankrott, Bankrott Stgb, Bankrott Synonym, Bankrott Straftat, Bankrott Stgb 283, Bankrott Schema, Bankrott Strafrecht, Bankrott Sein, Bankrott Strafe, Bankrott Tatbestand, Bankrott T Shirt, Bankrott Und Insolvenz, Bankrott Ukraine, Bankrott Usa, Bankrott Unternehmen, Bankrott Us-bundesstaat, Bankrott Usa 1971, Bankrott Usa 2015, Bankrott Ursprung, Bankrott Und Insolvenzverschleppung, Bankrott Urteil, Bankrott Wortherkunft, Bankrott Wiki, Bankrott Wikipedia, Bankrott Werden, Bankrott Was Tun, Bankrott Wiktionary, Bankrott Was Nun, Bankrott Weil Klein These, Bankrott Was Ist Das, Bankrott Was Heisst Das, Ludwig Xiv Bankrott, Yingli Bankrott, Krebs Bankrott Youtube, New York Bankrott, Bankrott New York 1975, Bankrott Zu Gehen, Zalando Bankrott, Zypern Bankrott, Zielpunkt Bankrott, Zentralbank Bankrott, Zypern Bankrott 2013

     

     

    Mutmasslicher Bankrott-Tourist-Scharlatan von Holst steckt wohl hinter รœberfall auf dubiose “GoMoPa”und Einbruch

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    FirmenweltenNach mir exklusiv vorliegenden Informationen ist wohl mutmaรŸlich der von englischen Medien als “Bankrott-Tourist” bezeichnete Rainer von Holst Auftraggeber eines Einbruches bei GoMoPa  sowie eines รœberfalles auf den mutmasslich kriminellen “GoMoPa”-Boss Klaus Maurischat (siehe Photo unten), sowie mutmaรŸlich auf RA Thomas Schulte, wohl Pate des Konglomerates.

    Bei dem Einbruch wurde Material entwendet, das spรคter auf der mutmasslich von Holst zuzuordnenden Webseite Gomopacrime.org und dann auf Investigoo.com (ebenfalls vwohl von Holst) publiziert wurde. Dieses Material ist zweifelsfrei echt. Die Informationen zeigen die kriminelle Organisation GoMoPa von innen.

    Nachdem von Holst von Maurischat mit Mord und Totschlag erpresst wurde, verschwandt dieses Material, das ich dann wieder publiziert habe, nachdem es auf den Wahrheitsgehalt geprรผft wurde.

    verpruegelt-05-jpg.jpg (940ร—470)

    Von Holst hat neben diesem Material, das durchaus aufklรคrungswirksam ist, Falschinformationen publiziert.

    Zudem ist das Geschรคftsmodel derer von  Holst illegal:

    Ein Insider urteilt: “Die von Rainer von Holst angebotenen Partnerschaftsmodelle sind in Deutschland verboten. Derartige Partnerschaftsmodelle mit USA und UK-Firmen sind gar keine Partnerschaften. Zudem gibt es diese Firmen nur auf dem Papier. Die Anmeldung einer solchen Firma kostet 15 โ‚ฌ und man kann das Share Capital selbst bestimmen, so z.B. auch 100 Mio. Pfund. Dann nennt Rainer von Holst das auch noch Bankhaus, auch ein Begriff den es im englischen nicht gibt.

    Betrug durch und durch.”

    Go back

    Your message has been sent

    Warning
    Warning
    Warning
    Warning

    Warning.

     

    Rainer Von Holst Firmenwelten, Rainer Von Holst Gerlachreport, Rainer Von Holst Usa, Rainer Von Holst Gerlach, Rainer Von Holst Gomopa, Rainer Von Holst Iserlohn, Rainer Von Holst, Rainer Von Holst Bank, Rainer Von Holst Politico, Rainer Von Holst Augsburg, Rainer Von Holst Augsburg, Rainer Von Holst Bank, Rainer Von Holst Firmenwelten, Rainer Von Holst Gerlachreport, Rainer Von Holst Gerlach, Rainer Von Holst Gomopa, Rainer Von Holst Iserlohn, Rainer Von Holst Politico, Rainer Von Holst Princeton, Rainer Von Holst Usa, Rainer Von Holst Werther, Bankrott Gehen, Bankrott Englisch, Bankrott Auf Englisch, Bankrott Anmelden, Bankrott Adjektiv, Bankrott Argentiniens Staatspleite 2001, Bankrott Anderes Wort, Bankrott Auktionen, Bankrott Argentinien, Bankrott Auktion, Bankrott Airberlin, Bankrott Auf Griechisch, Bankrott Bedeutung, Bankrott Buch, Bankrott Bost, Bankrott Bank, Bankrott Bundesland, Bankrott Brasilien, Bankrott Berlin, Bankrott Financial Crisis, American Chopper Bankrott, Cafe Bankrott, Cafe Bankrott Berlin, Commerzbank Bankrott, Colt Bankrott, Companys Bankrott, Chicago Bankrott, Cafe Bankrott Prenzlauer Allee, Caffee Bankrott, Bankrott Duden, Bankrott Definition, Bankrott Dict, Bankrott Der Ddr, Bankrott Detroit, Bankrott Durch Scheidung, Bankrott Deutsch, Bankrott Deutschland, Bankrott Deutsche Bank, Bankrott Der Bildung, Bankrott Englisch, Bankrott Gehen, Bankrott Gehen Englisch, Bankrott Griechenland, Bankrott Gehen Duden, Bankrott Griechenland Folgen, Bankrott Gegangen, Bankrott Gmbh, Bankrott Gehen Bedeutung, Bankrott Gesetz, Bankrott Gehen Rechtschreibung, Bankrott Herkunft, Bankrott Hadith, Hsv Handball Bankrott, Htc Bankrott, Hsv Bankrott, Handballclub Bankrott 2012, Hattrick Bankrott, Hardwareversand Bankrott, Bank Banker Bankrott Hamburg, Nach Dem Bankrott Habermas, Bankrott Insolvenz, Bankrott Lehman Brothers, Bankrott Machen, Bankrott Mit 4 Buchstaben, Bankrott Monopoly, Bankrott Meyer, Bankrott Machen Englisch, Bankrott Anmelden, Bankrott Machen Duden, Bankrott Magyarul, Jp Morgan Bankrott, Mexx Bankrott, Bankrott Nach Scheidung, Bankrott New York 1975, Nokia Bankrott, Nintendo Bankrott, Neckermann Bankrott, Opel Bankrott, Otto Bankrott, Occ Bankrott, Osobny Bankrott Fyzickej Osoby, O2 Bankrott, Odenwaldschule Bankrott, Pleite Oder Bankrott, Bankrott Oder Insolvent, Bankrott Gehen Oder Bankrott Gehen, Bankrott Pleite, Quiksilver Bankrott, Quelle Bankrott, Bankrott Stgb, Bankrott Synonym, Bankrott Straftat, Bankrott Stgb 283, Bankrott Schema, Bankrott Strafrecht, Bankrott Sein, Bankrott Strafe, Bankrott Tatbestand, Bankrott T Shirt, Bankrott Und Insolvenz, Bankrott Ukraine, Bankrott Usa, Bankrott Unternehmen, Bankrott Us-bundesstaat, Bankrott Usa 1971, Bankrott Usa 2015, Bankrott Ursprung, Bankrott Und Insolvenzverschleppung, Bankrott Urteil, Bankrott Wortherkunft, Bankrott Wiki, Bankrott Wikipedia, Bankrott Werden, Bankrott Was Tun, Bankrott Wiktionary, Bankrott Was Nun, Bankrott Weil Klein These, Bankrott Was Ist Das, Bankrott Was Heisst Das, Ludwig Xiv Bankrott, Yingli Bankrott, Krebs Bankrott Youtube, New York Bankrott, Bankrott New York 1975, Bankrott Zu Gehen, Zalando Bankrott, Zypern Bankrott, Zielpunkt Bankrott, Zentralbank Bankrott, Zypern Bankrott 2013, Bankruptcy Chapter 7, Bankruptcy Definition, Bankruptcy Lawyers, Bankruptcy Chapter 11, Bankruptcy Court, Bankruptcy Fraud, Bankruptcy Discharge, Bankruptcy Code, Bankruptcy Forms, Bankruptcy Law, Bankruptcy Attorney, Bankruptcy Attorney Near Me, Bankruptcy And Student Loans, Bankruptcy Automatic Stay, Bankruptcy And Taxes, Bankruptcy And Divorce, Bankruptcy Auto Loans, Bankruptcy Attorney Orlando, Bankruptcy And Child Support, Bankruptcy Auction, Bankruptcy Basics, Bankruptcy Blog, Bankruptcy Benefits, Bankruptcy Business, Bankruptcy Barrel, Bankruptcy Before Divorce, Bankruptcy Bar Association, Bankruptcy Bar Date, Bankruptcy Bill, Bankruptcy Business Definition, Bankruptcy Chapter 7, Bankruptcy Chapter 11, Bankruptcy Court, Bankruptcy Code, Bankruptcy Chapters, Bankruptcy Cost, Bankruptcy Chapter 13 Definition, Bankruptcy Car Loan, Bankruptcy Court Records, Bankruptcy Chapter 7 Forms, Bankruptcy Definition, Bankruptcy Discharge, Bankruptcy Definition Economics, Bankruptcy Dismissal, Bankruptcy Documents, Bankruptcy Discharge Date, Bankruptcy Database, Bankruptcy Due To Medical Bills, Bankruptcy Data, Bankruptcy Delaware, Bankruptcy Exemptions, Bankruptcy Estate, Bankruptcy Eu4, Bankruptcy Exemptions By State, Bankruptcy Explained, Bankruptcy Ecf, Bankruptcy Effects, Bankruptcy Edny, Bankruptcy Eligibility, Bankruptcy Eastern District Of Missouri, Bankruptcy Fraud, Bankruptcy Forms, Bankruptcy Filings, Bankruptcy For Dummies, Bankruptcy Filing Fees, Bankruptcy Forum, Bankruptcy Florida, Bankruptcy Fees, Bankruptcy Form 410, Bankruptcy Filing Search, Bankruptcy Guidelines, Bankruptcy Georgia, Bankruptcy Government Definition, Bankruptcy Gander Mountain, Bankruptcy Garnishment, Bankruptcy Gif, Bankruptcy Greeley Co, Bankruptcy Greenville Sc, Bankruptcy Gambling, Bankruptcy Guide, Bankruptcy Hotline, Bankruptcy Homes, Bankruptcy Hearing, Bankruptcy Homestead Exemption, Bankruptcy Hawaii, Bankruptcy House, Bankruptcy How Long, Bankruptcy History, Bankruptcy Home Loan, Bankruptcy How To File, Bankruptcy In Spanish, Bankruptcy Information, Bankruptcy In Texas, Bankruptcy In Florida, Bankruptcy In California, Bankruptcy In Ohio, Bankruptcy In Illinois, Bankruptcy In Michigan, Bankruptcy In Pa, Bankruptcy Indiana, Bankruptcy Judge, Bankruptcy Jurisdiction, Bankruptcy Jobs, Bankruptcy Judge Salary, Bankruptcy Jokes, Bankruptcy Judge Definition, Bankruptcy Judgement, Bankruptcy Judge Term, Bankruptcy Judgeship Act Of 2017, Bankruptcy Jackson Ms, Bankruptcy Keep House, Bankruptcy Keep Car, Bankruptcy Kansas, Bankruptcy Kit, Bankruptcy Kentucky, Bankruptcy Knoxville, Bankruptcy Keep House And Car, Bankruptcy Kansas City, Bankruptcy Keep Home, Bankruptcy Kansas City Mo, Bankruptcy Lawyers, Bankruptcy Law, Bankruptcy Lawyer Near Me, Bankruptcy Loans, Bankruptcy Lawyer Salary, Bankruptcy Lookup, Bankruptcy Lawyer Nj, Bankruptcy Las Vegas, Bankruptcy Law Center, Bankruptcy Liquidation, Bankruptcy Meaning, Bankruptcy Means Test, Bankruptcy Medical Bills, Bankruptcy Management Solutions, Bankruptcy Mortgage, Bankruptcy Mn, Bankruptcy Meme, Bankruptcy Michigan, Bankruptcy Maryland, Bankruptcy Missouri, Bankruptcy Near Me, Bankruptcy News, Bankruptcy Nj, Bankruptcy Noticing Center, Bankruptcy Northern District Of Texas, Bankruptcy Number, Bankruptcy Nc, Bankruptcy New Jersey, Bankruptcy Notice, Bankruptcy Nevada, Bankruptcy Options, Bankruptcy Online, Bankruptcy Ohio, Bankruptcy On Student Loans, Bankruptcy Oklahoma, Bankruptcy Office, Bankruptcy Oregon, Bankruptcy Outline, Bankruptcy On Credit Report, Bankruptcy Online Course, Bankruptcy Protection, Bankruptcy Process, Bankruptcy Payments, Bankruptcy Petition, Bankruptcy Proof Of Claim, Bankruptcy Public Records, Bankruptcy Puerto Rico, Bankruptcy Paperwork, Bankruptcy Paralegal, Bankruptcy Petition Preparer, Bankruptcy Questions, Bankruptcy Qualifications, Bankruptcy Quizlet, Bankruptcy Questionnaire, Bankruptcy Quotes, Bankruptcy Quiz, Bankruptcy Questions And Answers, Bankruptcy Qualification Calculator, Bankruptcy Qualifications Texas, Bankruptcy Quiz Questions, Bankruptcy Records, Bankruptcy Rules, Bankruptcy Rule 3001(c)(2)(a), Bankruptcy Rule 2002, Bankruptcy Remote, Bankruptcy Rule 2004, Bankruptcy Rule 9014, Bankruptcy Rule 3002.1, Bankruptcy Rule 7004, Bankruptcy Requirements, Bankruptcy Search, Bankruptcy Software, Bankruptcy Student Loans, Bankruptcy Stay, Bankruptcy Score, Bankruptcy Statistics, Bankruptcy Status, Bankruptcy Southern District Of Florida, Bankruptcy Synonym, Bankruptcy Schedules, Bankruptcy Trustee, Bankruptcy Types, Bankruptcy Texas, Bankruptcy Terms, Bankruptcy Timeline, Bankruptcy Taxes, Bankruptcy Test, Bankruptcy Trustee Definition, Bankruptcy The Office, Bankruptcy Tax Return, Bankruptcy Utah, Bankruptcy Unclaimed Funds, Bankruptcy Uk, Bankruptcy Us, Bankruptcy Utility Bills, Bankruptcy Used In A Sentence, Bankruptcy Ucc, Bankruptcy Us Trustee, Bankruptcy Utah Court, Bankruptcy Utilities, Bankruptcy Vs Foreclosure, Bankruptcy Venue, Bankruptcy Virginia, Bankruptcy Vs Default, Bankruptcy Vs Debt Consolidation, Bankruptcy Vancouver Wa, Bankruptcy Video, Bankruptcy Vs Charge Off, Bankruptcy Verification Line, Bankruptcy Va Loan, Bankruptcy Website, Bankruptcy Wiki, Bankruptcy Wisconsin, Bankruptcy Wichita Ks, Bankruptcy What Is It, Bankruptcy Washington State, Bankruptcy Worksheet, Bankruptcy Western District Of Pa, Bankruptcy Western District Of Texas, Bankruptcy Watch, Bankruptcy Xenia Ohio, Bankruptcy X, Xinergy Bankruptcy, Xerox Bankruptcy, Xccent Bankruptcy, Xco Bankruptcy, Xerium Bankruptcy, Xyience Bankruptcy, Xi3 Bankruptcy, Xom Bankruptcy, Bankruptcy Years, Bankruptcy Yakima, Bankruptcy Youtube, Bankruptcy Years On Credit Report, Bankruptcy Yuma Az, Bankruptcy Youngstown Ohio, Bankruptcy Yesterday, Bankruptcy Yourself, Bankruptcy York Pa, Bankruptcy Yelp, Bankruptcy Z Score, Bankruptcy Zanesville Ohio, Bankruptcy Z Score Calculator, Bankruptcy Zuckerberg, Bankruptcy Zero Balance Credit Card, Bankruptcy Zero Tax Code, Bankruptcy Z Value, Bankruptcy Z List Case, Bankruptcy Zephyrhills, Bankruptcy Zimbabwe

    Insider – Verfassungsschutz kรผmmert sich um “GoMoPa”-Nazi-Ableger “Berlin Journal”

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    Sympathietrรคger Neo-Nazi

    Insider der Investigativ-Plattform INVESTIGOO berichten:

    “Die Internetseite berlinjournal.biz steht im Visier des deutschen Verfassungsschutzes. Hintergrund sind โ€žfremdenfeindliche Berichte, Rassenhass, Diskriminierung und rechtsradikale Propagandaโ€œ.

     

    Sympathietrรคger Maurischat im Foto oben

    Verantwortliche dieses โ€žMachwerkesโ€œ sind der Herausgeber des โ€žFinanznachrichtendienstesโ€œ gomopa.net, Klaus-Dieter Maurischat und sein Chefredakteur Frank Maiwald. Maurischat, der von der Augsburger Staatsanwaltschaft in einer Erpressungsstrafsache per Haftbefehl gesucht wird, lebt in Berlin im feudalen Untergrund: Unter den Linden 19 in einer 4000-teuren Penthousewohnung.
    Der Chef des maroden โ€žFinanznachrichtendienstesโ€œ Gomopa bastelt seit Monaten an einer Nachfolgelรถsung fรผr sein in Not geratenes Schiff. Angriffe auf ihn persรถnlich und die Strukturen von Gomopa haben aus der ehemaligen grรถรŸten deutschen Drecksschleuder eine lahme Ente gemacht. Internetspezialisten รผberwachen inzwischen jeden Arbeitsschritt des โ€žFinanznachrichtendienstesโ€œ, dessen einzige Aufgabe darin bestand Unternehmer, Unternehmen und Unschuldige zu erpressen.

    Sympathietrรคger und Ex-STASI-Agent Maiwald im Bild oben

    Hilfe bei seinem neuen Projekt โ€žBerlin Journalโ€œ bekommt er dabei von Gomopa-Chefredakteur Frank Maiwald. Gegen den ehemaligen Redakteur der Berliner B.Z. ermittelt die Staatsanwaltschaft Neuruppin unter dem Aktenzeichen 332 Js 17877/15 wegen Bankrotts, Sozialbetrugs und Steuerhinterziehung. Maiwald hat als Hartz IV-Empfรคnger regelmรคssig bis zu 7.000 Euro von Gomopa schwarz bezogen und war an dem Erpressungssystem des Unternehmens direkt beteiligt.
    Die B.Z. hatte ihn wegen Spesenbetrugs gefeuert.
    Unter diesem Vorzeichen ist die โ€žBerichterstattungโ€œ von Berlin Journal besonders widerwรคrtig. Die Internetseite wird ausschlieรŸlich von Maiwald geschrieben. Er arbeitet unter vielen Namen, am liebsten wahlweise unter dem Namen Bodo Hering oder Max Wolf. Das ergibt sich aus Protokollen des Internetverkehrs. Maiwald hat unter dem Titel โ€žFlรผchtlinge erhalten Essen fรผr 16 Euro, Hartz-IV-Empfรคnger fรผr 4,72 Euroโ€œ einen Artikel verรถffentlicht, der nicht nur faktisch unwahr ist, sondern seine nationalsozialistische Gesinnung offenbart. Maiwald (Foto), ein ehemaliger Stasi-Informant, kann wohl auch hier seine wahre Herkunft nicht verleugnen.

    Mit einer Welle der Empรถrung und auch Zustimmung wurde auf der Internetseite auf diesen Bericht reagiert. Dabei konnte sich der Pรถbel nach Herzenslust austoben. Das ist auch nach dem Geschmack von Klaus-Dieter Maurischat, dessen politischer Weitblick am Ende des Biertisches endet. Presserechtlich ist das โ€žOrganโ€œ fรผr Ermittlungsbehรถrden offiziell nicht greifbar. Das Impressum weist als Verantwortlichen fรผr den Inhalt โ€žBodo Heringโ€œ, also Frank Maiwald, aus. Die Redaktion hat keine ladungsfรคhige Adresse, so dass eigentlich juristisch nicht gegen die Publikation angegangen werden kann.
    Doch so einfach wie noch vor 15 Jahren, als gomopa.net die deutsche Finanz- und Maklerszene in helle Aufregung versetzte, ist die Welt heute nicht mehr. Durch umfassende Recherchen konnten die presserechtlich Verantwortlichen fรผr das Berlin Journal identifiziert werden. Damit die Verantwortlichen durch Geschรคdigte in die Haftung genommen werden kรถnnen, verรถffentlichen wir hier die entsprechenden Personaldaten:
    MaurischatBJ
    ยท Klaus-Dieter Maurischat, geb. 12. April 1956
    Lange StraรŸe 38, 27313 Dรถrverden, Hรผlsen, 2. OG
    Unter den Linden 19, 10117 Berlin
    Barnstedt 11, 27313 Dรถrverden
    ยท Frank Maiwald, alias Bodo Hering, alias Max Wolf, geb. 6. Mai 1959
    Nordweg 150
    16516 Oranienburg
    Derzeit wird versucht, die tatsรคchlichen Spuren zu verwischen. Klaus-Dieter Maurischat ist dabei auf die Idee gekommen, etwaige Haftungsfragen gleich rund 7.500 Kilometer in den US-amerikanischen Bundesstaat Wisconsin zu schieben. Hier ist die US-amerikanische Zeitschriftengruppe โ€žBerlin Journal Newspapersโ€œ aus Berlin (Wisconsin) ansรคssig. Das offensichtliche Kalkรผl von Maurischat und Maiwald: Die Gruppe aus Berlin in Wisconsin stehe hinter der Internetplattform. Damit wรคre eine Haftung nach deutschen Recht nahezu unmรถglich. Im Amerika gilt ein weitaus liberaleres Presserecht als in Deutschland.
    Dumm nur, dass die beiden erwischt wurden: Die Verlagsleitung der โ€žBerlin Journal Newspapersโ€œ in Wisconsin hat strafrechtliche Schritte gegen Maurischat und Maiwald eingeleitet. Das geht, da Klaus-Dieter Maurischat die Internetseite tatsรคchlich รผber die in Delaware angemeldete Firma โ€žBerlin Journal Inc.โ€œ steuert. Damit ist die strafrechtliche Wรผrdigung auch in den USA mรถglich. Gegen Klaus-Dieter Maurischat und seinen Gomopa-Vize Mark Vornkahl liegen wegen der erheblichen Vorwรผrfe der Erpressung, Nรถtigung, Steuerhinterziehung, gewerbsmรคssigen Betrugs und Nutzung einer US-Kรถrperschaft fรผr kriminelle Handlungen ohnehin schon Haftbefehle in den USA vor.
    berlinjournal.biz gibt vor, mehr als 14.000 tรคgliche Leser zu haben. Tatsรคchlich wurden bei Facebook 10.000 โ€žLikesโ€œ fรผr 790 Euro gekauft. So ist auch zu erklรคren, dass es diese Resonanzen auf die Berichterstattung gibt. Damit aber nicht genug: รœber die sozialen Netzwerke wurde der Artikel dann von rechtsradikalen Organisationen wie โ€žPro Deutschlandโ€œ oder AfD verbreitet. Da waren sich Maurischat und Maiwald sicher, die richtigen Mengen an Leser zu finden.
    Denn das Berlin Journal, so der Plan, soll in 2016 den Finanznachrichtendienst Gomopa als Plattform fรผr Erpressung, Nรถtigung, รผble Nachrede, Verunglimpfung als Drecksschleuder ablรถsen. Jetzt kommt noch eine andere Qualitรคt dazu: menschenverachtender radikalfaschistischer Journalismus.
    Aber nicht alle Leser sind blรถd. Mohammed Hadi Al Khafaji bringt es auf den Punkt: โ€žjetzt ist es amtlich: Berlin Journal ist ein Nazi-Blatt!โ€œ”

    INVESTIGOO ist derzeit offline – wohl wegen der brisanten Inhalte.

    Go back

    Your message has been sent

    Warning
    Warning
    Warning
    Warning

    Warning.

    Die Liquidation der GoMoPa enthรผllt

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    Name Bereich Information V.-Datum Relevanz
    GoMoPa GmbH
    Hamburg
    Gesellschaftsbekanntmachungen Liquidation 20.02.2015

    GoMoPa GmbH

    Hamburg

    Die Gesellschaft ist aufgelรถst. Die Glรคubiger der Gesellschaft werden aufgefordert, sich bei ihr zu melden.

     

    Der Liquidator

    https://www.bundesanzeiger.de/ebanzwww/wexsservlet?session.sessionid=37eadd890bad0b1b61f24b7b78b81b31&page.navid=detailsearchlisttodetailsearchdetail&fts_search_list.selected=bec34c7f4779677f&fts_search_list.destHistoryId=65127

     

    QUELLE: BUNDESANZEIGER

    FBI – Iranian Cyber Actors Targeting Defense Contractors, Schools and Energy Sector

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    The following document was obtained from the website of the Marshfield, Wisconsin Chamber of Commerce.

    FBI-IranianHacking

    FBI Liaison Alert System #M-000045-TT

    • 10 pages
    • TLP: GREEN
    • December 5, 2014

    Download

    The FBI is providing the following information with HIGH confidence:

    A group of cyber actors utilizing infrastructure located in Iran have been conducting computer network exploitation activity against public and private U.S. organizations, including Cleared Defense Contractors (CDCs), academic institutions, and energy sector companies. The actors typically utilize common computer intrusion techniques such as the use of TOR, open source reconnaissance, exploitation via SQL injection and web shells, and open source tools for further network penetration and persistence. Internet-facing infrastructures, such as web servers, are typical targets for this group. Once the actors penetrate a victim network, the actors exfiltrate network design information and legitimate user credentials for the victim network. Often times, the actors are able to harvest administrative user credentials and use the credentials to move laterally through a network.

    According to public network registration information, IP addresses previously utilized by this group were assigned to โ€œTarh Andishan.โ€ The group primarily utilized two Iran-based IP addresses to conduct its activity, 78.109.194.114 and 217.11.17.99. There has been no recent activity from these IP addresses since early 2014; however, the group now primarily utilizes a series of proxy or midpoint infrastructure in support of their computer network operations. The most recent midpoint infrastructure used by this group was located in the United Kingdom and the Netherlands.

    Tools: The following tools have been known to be utilized by the cyber actors.
    1021114.aspx
    4g.exe
    akisapi.php
    ASPACK
    Atkill.txt
    Bitvise
    c99shell.php
    Cafae
    Cain and Abel
    CCProxy
    CCproxy.zip
    cmd.aspx
    Cprivesc
    debug.aspx
    DefaultWS.asmx
    Dirbuster
    FileZilla
    Find_tokens.exe
    Find_tokens.txt
    Gsecdump
    Havij
    hscan.zip
    hscan1.2
    img.asp
    img.aspx
    In2.txt
    isapi.aspx
    J.exe
    Jasus.exe size: 118,272 MD5: 53841511791E4CAC6F0768A9EB5DEF8A Type: ARP POISON TOOL
    Jasus.pdb
    Kappfree
    kappfree.dll
    Kelloworld
    kelloworld.dll
    Klock
    klock.dll
    Lc.exe
    lc15.exe
    Libeay32.doc
    Libeay32.txt
    Loader.exe
    LoggerModule.e
    mim2.2.exe
    Mimikatz
    mimikatz.exe
    mimikatz.swf
    Mx.exe
    NBrute Force
    NC.exe
    ncat.exe
    Ncrack
    Nc-themida.exe
    Netcat
    Netscp.exe
    netscp_total.exe
    Netview
    Nmap
    NTFS
    OS_Detector.exe
    ospcsvc.exe
    osppsvc.exe
    OSQL
    ossisvc.exe
    ossysvc.exe
    Plink
    plink.exe
    priorities_readfile.aspx
    Privesc.exe size: 51,200 MD5: DABF638EB53070CDC7B10BFA5E4E8142
    ProcDump
    proxy.php
    PsExec
    PsExec.exe
    PsKill
    PsList
    Putty Link
    putty.exe
    pw.exe
    PwDump
    PwDump7.exe
    PwDump7_p.exe
    rdcmd.aspx
    RunAs.exe
    Samdump
    sekurlsa.dll
    Sl.exe
    snmpwalk.exe
    SQL Manager
    STR.EXE
    Themida
    u.exe
    U.exe size: 60,928 MD5: DDA3E5629A0E8FB63A3E19027AE45458
    upload.aspx
    Wcet
    winBypass.php
    WinDump
    WinDump.exe
    winpcap-nmap-4.12.exe
    winusr.dll
    wminotify.dll
    wndTest.exe
    wt.exe
    xcmd-aspack.exe
    xCmdSvc.exe
    Xcmdt.exe
    xcmd-themida.exe
    xp_cmdshell
    ZXPortMap.exe

    IP Addresses: The following IP addresses have been observed to be utilized by the cyber actors.
    64.120.208.154
    78.109.194.114
    159.253.144.209
    217.11.17.99
    95.211.191.225
    95.211.241.249
    95.211.241.251
    108.175.153.158
    88.150.214.162
    88.150.214.166
    88.150.214.168
    88.150.214.170
    184.82.158.18

    โ€ฆ

    Identify creation of users and databases named โ€œhahaโ€.

    Go back

    Your message has been sent

    Warning
    Warning
    Warning
    Warning

    Warning.

    Iran News, Iran Hostage Crisis, Iran Contra Affair, Iran Flag, Iran Iraq War, Iran Castillo, Iran Nuclear Deal, Iran Map, Iran Sanctions, Iran President, Iran Air, Iran Allies, Iran Air Flight 655, Iran And Iraq, Iran Air Force, Iran Army, Iran And Russia, Iran Ayatollah, Iran And Israel, Iran And North Korea, Iran Barkley, Iran Before 1979, Iran Brown, Iran Birth Rate, Iran Bennett, Iran Boeing, Iran Beaches, Iran Beliefs, Iran Bonyads, Iran Brain Drain, Iran Contra Affair, Iran Castillo, Iran Capital, Iran Contra Affair Apush, Iran Currency, Iran Culture, Iran Contra Hearings, Iran Continent, Iran Cities, Iran Contra Affair Summary, Iran Deal, Iran Definition, Iran Deal Obama, Iran Demographics, Iran Dictator, Iran Death Penalty, Iran Democracy, Iran During The Cold War, Iran Desert, Iran Drone, Iran Election, Iran Economy, Iran Eory, Iran Embassy, Iran Etf, Iran Ethnic Groups, Iran Exports, Iran Embassy Usa, Iran Eisenhower, Iran Execution, Iran Flag, Iran Facts, Iran Food, Iran Flag Emoji, Iran Football, Iran Fighter Jet, Iranefarda, Iran Foreign Policy, Iran Foreign Minister, Iran Flag Meaning, Iran Government, Iran Gdp, Iran Gdp Per Capita, Iran Geography, Iran Government Type, Iran Green Revolution, Iran Guardian Council, Iran Gdp 2016, Iran Gay, Iran Gross Domestic Product, Iran Hostage Crisis, Iran Hostage Crisis Apush, Iran History, Iran Hostage Crisis President, Iran Hostage Crisis Definition, Iran Hostage Movie, Iran Hostage Crisis Timeline, Iran Human Rights, Iran Hostage Crisis Video, Iran Holidays, Iran Iraq War, Iran In The 70s, Iran Israel, Iran Isis, Iran In Syria, Iran Iraq Map, Iran Iraq War Causes, Iran India, Iran Iraq War Timeline, Iran Is Shia, Iran Jokes, Iran Jcpoa, Iran Judicial Branch, Iran Jewish Population, Iran Jet, Iran Jobs, Iran Jet Fighter, Iran Jersey, Iran Jewelry, Iran Japan, Iran Khodro, Iran King, Iran Kedisi, Iran Khamenei, Iran Kurds, Iran Khomeini, Iran Korea, Iran Kuwait, Iran Kidney Market, Imran Khan, Iran Launches Satellite, Iran Language, Iran Leader, Iran Live Tv, Iran Location, Iran Local Time, Iran Literacy Rate, Iran Life Expectancy, Iran Landscape, Iran Leadership, Iran Map, Iran Military, Iran Missile Test, Iran Missile, Iran Money, Iran Music, Iran Military Strength, Iran Military News, Iran Mountains, Iron Man, Iran News, Iran Nuclear Deal, Iran Nuclear Weapons, Iran Nuclear, Iran News Today, Iran Navy, Iran National Football Team, Iran North Korea, Iran Natural Resources, Iran Newspaper, Iran On Map, Iran Oil, Iran Oil Production, Iran Official Language, Iran On World Map, Iran Opec, Iran Official Name, Iran Obama Deal, Iran Outline, Iran Oil Exports, Iran President, Iran Population, Iran People, Iranproud, Iran Pronunciation, Iran Presidential Election, Iran Prime Minister, Iran Persia, Iran Pictures, Iran Politics, Iran Qatar, Iran Qatar Relations, Iran Quizlet, Iran Quds Force, Iran Queen, Iran Quotes, Iran Qom, Iran Quora, Iran Qatar Pipeline, Iran Qaher 313, Iran Religion, Iran Revolution, Iran Russia, Iran Rial To Usd, Iran Rial, Iran Resources, Iran Race, Iran Restaurant, Iran Refugees, Iran Ruler, Iran Sanctions, Iran Satellite, Iran Supreme Leader, Iran Sunni Or Shia, Iran Syria, Iran So Far, Iran Shah, Iran Saudi Arabia, Iran Shia, Iran Soccer, Iran Time, Iran Tehran, Iran Today, Iran Tv, Iran Trump, Iran Tourism, Iran Timeline, Iran Type Of Government, Iran Travel, Iran Travel Ban, Iran Uk, Iran Us Relations, Iran Under The Shah, Iran Unemployment Rate, Iran Us News, Iran University Of Science And Technology, Iran Us Embassy, Iran Uzbekistan, Iran Us Nuclear Deal, Iran Us Dollar, Iran Vs Iraq, Iran Vs Usa, Iran Volleyball, Iran Visa, Iran Vs Israel, Iran Vs Saudi Arabia, Iran Vice President, Iran Vs Isis, Iran Volleyball Team, Iran Vote, Iran War, Iran Women, Iran Wiki, Iran Weather, Iran World Map, Iran Ww2, Iran World Cup, Iran Wrestling, Iran Wikitravel, Iran White Revolution, Iran Contra Affair, Iran Castillo, Iran Capital, Iran Contra Affair Apush, Iran X, Iran Currency, Iran Culture, Iran Contra Hearings, Iran Continent, Iran Cities, Iran Yemen, Iran Youtube, Iran Youth, Iran Year, Iran Yellow Pages, Iran Yazd, Iran Year Converter, Iran Young Population, Iran Youth Population, Iran Yahoo News, Iran Zip Code, Iran Zoroastrian, Iran Zamin, Iran Zabol, Iran Zarif, Iran Zagros Mountains, Iran Zamin Bank, Iran Zoo, Iran Zumba, Iran Zamin Tv,

    SECRET – FBI Cyber Bulletin: Malicious Actors Targeting Protected Health Information

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    FBI-TargetingHealthcare

    FBI Liaison Alert System #A-000039-TT

    • 1 page
    • August 19, 2014

    Download

    The FBI is providing the following information with HIGH confidence. The FBI has observed malicious actors targeting healthcare related systems, perhaps for the purpose of obtaining Protected Healthcare Information (PHI) and/or Personally Identifiable Information (PII). These actors have also been seen targeting multiple companies in the healthcare and medical device industry typically targeting valuable intellectual property, such as medical device and equipment development data.

    TECHNICAL DETAILS

    The FBI has received the following information pertaining to a recent intrusion into a health care system that resulted in data exfiltration. Though the initial intrusion vector is unknown, we believe that a spear phish email message was used to deliver the initial malware. Typically, these actors use Information Technology themed spear-phishing messages which contain a malicious link that may connect to a new VPN site/service/client or a new Webmail site/software. Once access is obtained, the actors may collect and use legitimate account credentials to connect to the targeted system, usually through VPN.

    The following are indicators of possible compromise:

    Network-Based Indicator

    Outgoing traffic through standard HTTP/HTTPS ports 80, 443 (and possibly others), but obfuscates traffic by XORing the traffic with 0ร—36. The below is a SNORT signature related to this activity:
    alert tcp any any -> any any (content:โ€|6E|โ€; depth: 1; content:โ€|36 36 36 58 36 36 36|โ€; offset: 3; depth: 7; msg: โ€œBeacon C2โ€ณ; sid: 1000000001; rev:0)

    Host-Based Indicator

    The malware runs as a Windows service โ€œRasWmi (Remote Access Service)โ€ from the malicious .dll C:\Windows\system32\wbem\raswmi.dll. The implant is installed from an executable file (the file has been observed under a variety of names) which drops the raswmi.dll file into the same directory and sets it to run as a service.

    Revealed – Feds Issue Bulletin on Google Dorking

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    ย 

    ย 

    An examples

    A bulletin issued by the Department of Homeland Security, the FBI and the National Counterterrorism Center earlier this month warns law enforcement and private security personnel that malicious cyber actors can use โ€œadvanced search techniquesโ€ to discover sensitive information and other vulnerabilities in websites.ย  The bulletin, titled โ€œMalicious Cyber Actors Use Advanced Search Techniques,โ€ describes a set of techniques collectively referred to as โ€œGoogle dorkingโ€ or โ€œGoogle hackingโ€ that use โ€œadvanced operatorsโ€ to refine search queries to provide more specific results.ย  Lists of these operators are provided by Google and include the following examples:

    allintext: / intext: Restricts results to those containing all the query terms you specify in the text of the page
    allintitle: / intitle: Restricts results to those containing all the query terms you specify in the title
    allinurl: / inurl: Restricts results to those containing all the query terms you specify in the URL
    filetype:suffix Limits results to pages whose names end in suffix
    site: Using theย site:ย operator restricts your search results to the site or domain you specify
    Minus signย ย (ย โ€“ย ) to exclude Placing ย a minus sign immediately before a word indicates that you do not want pages that contain this word to appear in your results
    Phrase searchย (using double quotes, โ€œโ€ฆโ€ ) By putting double quotes around a set of words, you are telling Google to consider the exact words in that exact order without any change

    Here is an example of a query constructed from these operators:

    โ€œsensitive but unclassifiedโ€ filetype:pdf site:publicintelligence.net

    The bulletin warns that malicious cyber actors can use these techniques to โ€œlocate information that organizations may not have intended to be discoverable by the public or to find website vulnerabilities for use in subsequent cyber attacks.โ€ย  Hackers searching for โ€œspecific file types and keywords . . . can locate information such as usernames and passwords, e-mail lists, sensitive documents, bank account details, and website vulnerabilities.โ€ย  Moreover, โ€œfreely available online tools can run automated scans using multiple dork queriesโ€ to discover vulnerabilities.ย  In fact, the bulletin recommends that security professionals use these tools โ€œsuch as the Google Hacking Database, found at http://www.exploit-db.com/google-dorks, to run pre-made dork queries to find discoverable proprietary information and website vulnerabilities.โ€

    Several security breaches related to the use of โ€œadvanced search techniquesโ€ are also referenced in the bulletin.ย  One incident in August 2011 resulted in the compromise of the personally identifiable information of approximately 43,000 faculty, staff, students and alumni of Yale University.ย  The information was located in a spreadsheet placed on a publicly accessible File Transfer Protocol (FTP) server and was listed in Google search results for more than ten months prior to being discovered.ย  Another incident in October 2013 involved attackers using Google dorking to discover websites running vulnerable versions of vBulletin message board software prior to running automated tools that created administrator accounts on the compromised sites.ย  As many as 35,000 websites were believed to have been compromised in the incident.

    Revealed – DHS National Cybersecurity and Communications Integration Center Heartbleed Advisories

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    The following advisories were issued by the National Cybersecurity and Communications Integration Center on April 10, 2014.  Both notices are marked with distribution restrictions based on US-CERT Traffic Light Protocol.  The advisory marked with TLP: GREEN is not intended for public distribution.

    โ€œHeartbleedโ€ OpenSSL Vulnerability TLP: GREEN 4 pages Download
    โ€œHeartbleedโ€ OpenSSL Vulnerability TLP: WHITE 2 pages Download

    Security researchers from Google Security recently discovered a vulnerability with the Heartbeat extension (RFC6520) to OpenSSLโ€™s Transport Layer Security (TLS) and the Datagram Transport Layer Security (DTLS) protocols. According to open source reports, the vulnerability has existed within certain OpenSSL frameworks since at least 2012. The Heartbeat extension is functionally a โ€œkeep-aliveโ€ between end-users and the secure server. It works by sending periodic โ€œdata pulsesโ€ of 64KB in size to the secure server and once the server receives that data; it reciprocates by re-sending the same data at the same size. The out-of-bounds โ€œreadโ€ vulnerability exists because the Heartbeat extension in OpenSSL versions 1.0.1 through and 1.0.2-beta (including 1.0.1f and 1.0.2-beta1) do not properly validate the data being sent from the end-user. As a result, a malicious actor could send a specially-crafted heartbeat request to the vulnerable server and obtain sensitive information stored in memory on the server. Furthermore, even though each heartbeat only allows requests to have a data size limited to 64KB segments, it is possible to send repeated requests to retrieve more 64KB segments, which could include encryption keys used for certificates, passwords, usernames, and even sensitive content that were stored at the time. An attacker could harvest enough data from the 64KB segments to piece together larger groupings of information which could help an attacker develop a broader understanding of the information being acquired.

    According to a Trusted Third Party, exploit code written in Python Script has been observed in publicly available online outlets. There have also been a number of underground forums discussing the vulnerability, which indicates interest from nefarious actors. Internal Trusted Third Party assessments reveal that the code is 100% effective against the specific versions of SSL protocol noted above. However, at this time it has not been observed having the capability to compromise all SSL protocols. It is also important to note that at this time there have been no reported malicious attacks that exploit this vulnerability.

    The following vendors and products may include vulnerable OpenSSL versions within their product distributions:8
    โ€ข CentOS Project โ€“ CentOS 6
    โ€ข Debian Project โ€“ Debian GNU/Linux 7.0
    โ€ข FreeBSD Project โ€“ FreeBSD 10.0 and prior
    โ€ข Gentoo Foundation โ€“ Gentoo releases through 8 April 2014
    โ€ข Novell, Inc โ€“ openSUSE 12.3 and 13.1
    โ€ข Red Hat Inc โ€“ Fedora 19 and 20, Enterprise Linux/Desktop/HPC Node/Server/Workstation v.6; Enterprise Linux Server AUS v.6.5; Enterprise Linux Sever EUS v.6.5.z Enterprise Virtualization 3; and Storage Server 2.1
    โ€ข Android mobile devices
    โ€ข Third Party code using Python/Perl/Ruby
    โ€ข OpenVPN
    โ€ข Aruba Networks: ArubeOS 6.3.x and 6.4.x; ClearPass 6.1.x, 6.2.x, and 6.3.x
    โ€ข Check Point Software Technologies: All versions of Security Gateway, Security Management, Multi-Domain Management/Provider-1, Data Center Security appliances, Endpoint Security Server, Endpoint Connect and SSL Network Extender, Gaia, Gaia Embedded, SecurePlatform 2.6, SecurePlatform Embedded, IPSO 4.x, IPSO 5.x, IPSO 6.2
    โ€ข Cisco Systems: AnyConnect Secure Mobility Client for iOSl Desktop Collaboration Experience DX650, Unified 7900, 8900, 9900 series IP Phones, TelePresence Video Communication Server (VCS)
    โ€ข Fortinet Inc: FortiGate (FortiOS) 5.0 and higher, FortiAuthenticator 3.0 and higher, FortiMail 5.0 and higher, FortiVoice, and FortiRecorder
    โ€ข Juniper Networks: JUNOS OS 13.3R1, Odyssey Client 5.6r5 and later, IVEOS 7.4r1 and later as well as 8.0r1 and later, UAD 4.4ra and layer as well as 5.0r1 and later, JUNOS Pulse (Desktop) 4.0r5 and later as well as 5.0r1 and later, Network Connect 7.4r5 through 7.4r9.1 and 8.0r1 through 8.0r3.1, JUNOS Pulse (Mobile) for Android and iOS 4.2r1 and later
    โ€ข F5 Networks: BIG-IP AAM 11.5.0 โ€“ 11.5.1; BIG-IP AFM 11.5.0 โ€“ 11.5.1; BIG-IP Analytics 11.5.0 โ€“ 11.5.1; BIG-IP APM 11.5.0 โ€“ 11.5.1; BIG-IP ASM 11.5.0 โ€“ 11.5.1; BIG-IP Edge Clients for Apple iOS 1.0.5, 2.0.0 โ€“ 2.0.1; BIG-IP Edge Clients for Linux 7080 โ€“ 7101; BIG-IP Edge Clients for MAC OS X 7080 โ€“ 7101; BIG-IP Edge Clients for Windows 7080 โ€“ 7101; BIG-IP GTM 11.5.0 โ€“ 11.5.1; BIG-IP Link Controller 11.5.0 โ€“ 11.5.1; BIG-IP LTM 11.5.0 โ€“ 11.5.1; BIG-IP PEM 11.5.0 โ€“ 11.5.1; BIG-IP PSM 11.5.0 โ€“ 11.5.1

    Many of the vulnerable vendors noted above have already begun issuing patches and have information posted on their websites and portals addressing the vulnerability and a plan of action.

    On a more positive note, the web browsers Firefox, Chrome, and Internet Explorer on Windows OS all use Windows cryptographic implementation, not OpenSSL.

    โ€ฆ

    The nature of this vulnerability is such that if encryption keys are captured by a malicious actor, then previously captured transmissions including usernames, passwords, and other sensitive content could be obtained and decrypted. From an end-userโ€™s perspective, changing passwords before system patches have been implemented could still leave SSL transmissions vulnerable. Until patches are fully implemented, closely monitoring email accounts, bank accounts, social media accounts, and other assets are strongly recommended. End-users can set their web browsers so that they automatically detect revoked certificates; Firefox does this automatically.

    โ€ฆ

    Can I share this product?

    Recipients may share TLP: GREEN information with peers and partner organizations within their sector or community, but not via publicly accessible channels.

    Die bezahlten Reisen und Immobilien von Thomas und Beate Porten /GoMoPa

    Bernd-Pulchernst

    Liebe Leser,

    nach vorliegenden Unterlagen wurden รผber zwei Jahrzehnte Reisen von Thomas Porten, IZ, Gesellschafter und Chefredakteur von der Immobilienzeitung durch Immobilienfirmenย  bezahlt. Ebenso von Dr. Rainer Zitelmann, dem “Auschwitz-Experten”.

    Anzeigen und Abonnements sowieso in Millionenhรถhe fรผr Thomas Porten und Beate Porten, Wirtschafts-Staatsanwรคltin in Wiesbaden:

    Niemand wusste dies ausser Porten und Porten oder ?

    Dss Haus von Beate und Thomas Porten in Mainz wurde wohl mithin ebenfalls von Immobilienfirmen bezahlt, ebenfalls Hotelaufenthalte und Urlaubsreisen.

    Bis zur Aufklรคrung dieser Korruptionsaffรคre habe ich allen Einnahmden aus Deutschland entsagtย  und wenn dies 100 Jahre dauert !.

    Kann das die Gegenseite und ihr korrupter Haufen auch ?

    Herzlichst Ihr

    Magister Bernd Pulch

    PS Wieviel die mutmasslichen Porten-Genossen der GoMoPa erhalten haben kรถnnen Sie im Manager Magazin, der SZ und der Zeit nachlesen.

    Der Anfang vom Ende des “GoMoPa”-“Nawito”-Google-Terrors

    BGH-Urteil zu Suchmaschinen
    Richter nehmen Google-Vorschlรคge unter die Lupe
    Ein Kosmetikhersteller hat vor dem BGH ein wegweisendes Urteil erstritten: Kรผnftig kรถnnen Suchmaschinenbetreiber fรผr Verletzungen des Persรถnlichkeitsrechts bei sogenannten Autocomplete-Vorschlรคgen haftbar gemacht werden.

    Von Michael Reissenberger, SWR

    Gernot Lehr, der Anwalt von Bettina Wulff, die ihren Ruf gegen Rotlichtgerรผchte vor Gericht verteidigt, hatte den richtigen Riecher, als er kรผrzlich eine Vertagung des laufenden Verfahrens erwirkte. Denn das jรผngste Urteil des Bundesgerichtshofs (BGH) sorgt kรผnftig fรผr Schutz fรผr alle, die sich beim Googeln ihres Namens von Suchvorschlรคgen beleidigt fรผhlen.

    Die Bundesrichter nehmen jetzt die Betreiber von Suchmaschinen stรคrker in die Pflicht. Sie mรผssen zwar nicht selber das Netz auf alle Suchwortkombinationen, die vielleicht AnstoรŸ erregen kรถnnten, durchpflรผgen. Denn – so sagen die Bundesrichter – im Prinzip sei gegen eine Suchwortergรคnzung nichts einzuwenden. SchlieรŸlich wรผrden von einer Rechenmaschine zunรคchst nur Suchvorschlรคge von Internetnutzern ausgewertet.

    Geldentschรคdigung fรผr Rufschรคdigungen

    Aber sie mรผssen spรคtestens reagieren, wenn Betroffene auf solche Rufschรคdigungen per Internet hinweisen. Die Internetunternehmen mรผssen dann zumindest rechtswidrige Verletzungen des Persรถnlichkeitsrechts abstellen und bei weiteren VerstรถรŸen auch eine Geldentschรคdigung bezahlen.

    Schutz der Persรถnlichkeitsrecht hat Vorrang
    tagesschau 20:00 Uhr, 14.05.2013, Gigi Deppe, SWR
    Download der Videodatei
    Ein Kosmetikhersteller hat dieses Urteil fรผr Google-Geschรคdigte erstritten. Er sah seinen Namen zu Unrecht mit den Kombinationswรถrtern Scientology und Betrug in den Schmutz gezogen und bestand darauf, dass er in keinerlei Zusammenhang mit diesem als geldgierig verrufenen Sektenbetrieb steht oder stand. Zudem sei ihm kein Betrug vorzuwerfen, es habe auch kein entsprechendes Ermittlungsverfahren gegeben. Die Suchergebnisse von Google wรผrden auch keine einzige Seite auflisten, die eine Verbindung zwischen dem Kosmetikhersteller und den beiden Ergรคnzungswรถrtern Scientology und Betrug aufweisen.

    Ihm hatten Kรถlner Richter in zwei Instanzen den Schutz gegen den Internetriesen verweigert. Es seien schlieรŸlich nur mathematische Effekte je nach Suchworthรคufigkeit, kein Internetnutzer nehme fรผr bare Mรผnze, welche Suchwortvorschlรคge da kommen, so hatten die Kรถlner Juristen argumentiert.

    Hintergrund
    Googles Autocomplete-Funktion
    Ein praktischer Helfer mit Risiken | mehr
    Google allzu dickfellig

    Doch nun muss Google solche Beschwerden wegen Rufmords ernster nehmen. Auch im Fall von Bettina Wulff dรผrfte mit dem jetzigen Bundesgerichtshofurteil klar sein, dass der Internetkonzern sich in den letzten Monaten allzu dickfellig verhalten hat. Die Rotlichtgerรผchte um die Prรคsidentengattin, die der Google-Suchwortmodus verbreitet hat, waren ja schon seit lรคngerem รถffentliches Thema, bis sich Bettina Wulff entschloss, dagegen vorzugehen. Hier dรผrfte sehr spannend werden, ob und welche Geldentschรคdigung hier verlangt werden kann.

    Der Bundesgerichtshof hatte auch im vorliegenden Fall noch nicht darรผber zu entscheiden, weil er das Kรถlner Musterverfahren nochmal an die untere Instanz zur Nachbesserung zurรผckgeschickt hat. Die Bundesrichter kรผndigten aber im Grundsatz bei solchen Google-Rufschรคdigungen einen Anspruch auf Geldentschรคdigung zumindest in engen Grenzen an.

    Neue schwere Straftaten wohl wieder von “Gomopa” im Auftrag ihrer “Partner” – mutmasslich “Peter Ehlers” und “Otmar Knoll”

    graph

    Liebe Leser,

    obenestehende Graphik zeigt die tagelangen, schweren Internetatatcken wohl immer wieder der Hacker der “GoMoPa” im Auftrag von mutmasslich “Peter Ehlers” und “Otmar Knoll” auf unsere Server – wie sie es auch bei Heinz Gewrlach machten – kurz vor seinem fรผr fast alle รผberraschenden Tode.

    “Otmar Knoll” von “Fairvesta” hat diese Angriffe uns gegenรผber schriftlich angekรผndigt, ebenso wie “Peter Ehlers”, verstrickt mit der Fondsfirma “SJB” seines Parners “Gerd Bennewirtz”, uns mit Mordanschlรคgen gedroht hat !

    Wรผr den Sie diesen Charaktern vertrauen und Ihr Geld anvertrauen ?

    Sie sehen, mit welchen Figuren wir es hier zu tun haben…

    Hier noch einmal die wichtigsten Infos zu diesen schweren Straftaten:

    Neue Serverangriffe der vorbestraften Finanzbetrรผger der โ€œGoMoPaโ€ und ihrer โ€œPartnerโ€ mutmasslich โ€œPeter Ehlersโ€ und โ€œOtmarย Knollโ€

    Hier sehen Sie obenstehend den Beleg fรผr die Internet-Attacken derย er vorbestraften Finanzbetrรผger der โ€œGoMoPaโ€ und ihrer โ€œPartnerโ€ mutmasslich โ€œPeter Ehlersโ€ und โ€œOtmar Knollโ€

    Das Urteil zu den vorbestraften Finanzbetrรผgern der โ€œGoMoPaโ€ wegen Betruges am eigenen Anleger finden Sie unter

    https://berndpulch.org/das-betrugsurteil-gegen-bennewirtz-und-peter-ehlers-gomopa-partner-maurischat-und-vornkahl-wg-betruges-am-eigen-anleger/

    These graphs below show the cyberattacks on our website initiated by the suspects we already mentioned and who even announced in an email that tehy would do this illegal internet crime. The email was by Otmar Knoll, Fairvesta, who announced the cybercrime. The suspected hackers are from โ€œGoMoPaโ€ and their thugs.

    The graph shows the DDos attacks on our servers.

    What is a DDos attack ?

    Read here:

    http://en.wikipedia.org/wiki/Denial-of-service_attack

    These internet crimes are punished with longterm jail sentences and financial compensation..

    Die obenstehende Graphik zeigen die Hackerangriffe auf unsere Webseiten, die seit Jahren durchgefรผhrt werden im Ausschnitt. In einer Email an uns hat Otmar Knoll, Fairvesta, die Hackerangriffe, somit schwere Internetverbrechen angekรผndigt. Wir haben diese Emails bereits verรถffentlicht. Mutmasslich arbeitet Otmar Knoll mit den รผblichen Verdรคchtigen der โ€œGoMoPaโ€, ihren Informanten und Hackern zusammen:

    Die Graphiken zeigt die sogenannten DDos-Angriffe auf unsere Server.

    Was ist eine DDos Attacke ?

    http://de.wikipedia.org/wiki/Denial_of_Service

    Lesen Sie hier:

    Diese Vergehen werden mit langjรคhrigen Freiheitsstrafen und Schadensersatz bestraft.

    Wรผrden Sie dem mutmasslichen Auftraggeber von Internet-Verbrechern, Otmar Knoll, “Fairvesta”, Geld anvertrauen ?

    Liebe Leser,

    wir haben eine Umfrage gestartet:

    Wรผrden Sie dem mutmasslichen Auftraggeber von Internet-Verbrechern, Otmar Knoll, “Fairvesta”, der diese Taten selbst per E-Mail ankรผndigt, Ihr Geld anvertrauen ?

    Und zu welchen Taten halten Sie so jemanden noch fรผr fรคhig ?

    Wir freuen uns auf Ihre Reaktionen !

    Hier die Belege fรผr die monatelangen Internet-Attacken der Internet-Kriminellen, die Graphiken zeigen die DDos-Attacken auf รผber 20 Webseiten:

    https://berndpulch.org/2013/04/04/a-overview-of-the-heavy-cyberattacks-on-our-websites-to-stop-the-truth-done-by-the-suspects/

    und

    https://berndpulch.org/2013/04/05/even-more-mental-and-pysical-attacks-on-our-servers-by-the-suspects-of-gomopa-nawito-otmar-knoll-and-peter-ehlers/

    Hier die Rechtslage:

    https://berndpulch.org/2013/04/05/die-rechtslage-bei-schweren-internet-angriffen-wie-von-mutmasslich-gomopa-nawito-und-konsorten/

    Hier die Bekenner-E-Mail des dubiosen “Otmar Knoll” von der dubiosen “fairvesta”:

     

    Zitat OtmarKnoll/Fairvesta:

     

    Subject:ย ย 

    AW: AW: AW: AW: [Fwd: Your enquiry]

    From:ย ย 

    “Knoll, Otmar”

    Date:ย ย 

    Tue, February 5, 2013 8:14 pm

    To:ย ย 

    “‘office@ebizz.tv'”

    Priority:ย ย 

    Normal

    Options:ย ย 

    View Full Headerย |ย View Printable Versionย ย |ย Download this as a file

    ย 

    Schade dass Sie nicht hรถren wollen, nun ist es zu spรคt, vielleicht รผberlegen Sie
    sich das noch mal.
    Den wenn die Domains offline gehen, dann haben Sie kein Medium mehr.
    Wer nicht hรถren will muss fรผhlen sagt ein Sprichwort.
            
            
            http://i-nvestment.com/category/leserbrief/
            
            
    Mit freundlichen GrรผรŸen
            
    Otmar Knoll
    Handlungsbevollmรคchtigter
            
    fairvesta Group AG
    Konrad-Adenauer-Str. 15
    D - 72072 Tรผbingen
    Tel:ย  +49 (0)7071 3665-0
    Fax: +49 (0)7071 3665-77
            o.knoll@fairvesta.de 
    www.fairvesta.de
            
    Amtsgericht Stuttgart HRB 382675
    Vorstand: Hermann Geiger
    Vorsitzender des Aufsichtsrates: Alfred Renner
    Sitz: Tรผbingen
    USt.-IdNr.: DE814337296

    Subject:ย ย 

    Jetzt aber offline

    From:ย ย 

    “Knoll, Otmar” <O.Knoll@fairvesta.de>

    Date:ย ย 

    Tue, February 5, 2013 11:20 pm

    To:ย ย 

    “‘office@ebizz.tv'” <office@ebizz.tv>

    Priority:ย ย 

    Normal

    Options:ย ย 

    View Full Headerย |ย View Printable Versionย ย |ย Download this as a file

    ย 

    http://www.investment-on.com/component/content/article/34-investment-m
    
    UPS, ist wohl offline gegangen, da haben meine Rundschreiben wohl geholfen. So wie
    es aussieht ist Ihre Seite nicht mehr erreichbar, insbesondere nachdem Sie meine
    letzten Mails online gestellt haben. Haben Sie wirklich geglaubt das das durchgeht
    und wir uns das gefallen lassen?
    
    Das kann auch mit den andern Domains so gehen, Sie haben ja noch genรผgend online!
    
    ....
    Also Sie
    haben keine Chance!
    ย 
    Mit freundlichen GrรผรŸen
    ย 
    Otmar Knoll
    Handlungsbevollmรคchtigter
    ย 
    fairvesta Group AG
    Konrad-Adenauer-Str. 15
    D - 72072 Tรผbingen
    Tel:ย  +49 (0)7071 3665-0
    Fax: +49 (0)7071 3665-77
    o.knoll@fairvesta.de
    www.fairvesta.de
    ย 
    Amtsgericht Stuttgart HRB 382675
    Vorstand: Hermann Geiger
    Vorsitzender des Aufsichtsrates: Alfred Renner
    Sitz: Tรผbingen
    USt.-IdNr.: DE814337296
    ย 
    -------------------------------------------------------------------
    Diese E-Mail enthรคlt vertrauliche und/oder rechtlich geschรผtzte Informationen. Wenn
    Sie nicht der richtige Adressat sind oder diese E-Mail irrtรผmlich erhalten haben,
    informieren Sie bitte sofort den Absender und vernichten Sie diese Mail. Das
    unerlaubte Kopieren, die unbefugte Weitergabe oder die Verwendung des Inhalts dieser
    Mail ist nicht gestattet.
    -------------------------------------------------------------------
    This e-mail may contain confidential and/or privileged information. If you are not
    the intended recipient (or have received this e-mail in error) please notify the
    sender immediately and destroy this e-mail. Any unauthorized copying, disclosure,
    distribution or usableness contents of this e-mail is strictly forbidden.
    -------------------------------------------------------------------
    Ce courriel est confidentiel et protรฉgรฉ. L'expรฉditeur ne renonce pas aux droits et
    obligations qui s'y rapportent. Toute diffusion, utilisation ou copie de ce message
    ou des renseignements qu'il contient par une personne autre que le (les)
    destinataire(s) dรฉsignรฉ(s) est interdite. Si vous recevez ce courriel par erreur,
    veuillez m'en aviser immรฉdiatement, par retour de courriel ou par un autre moyen.
    -------------------------------------------------------------------
    ย 

    Wie sich die Internet-Kriminellen wie mutmasslich Otmar Knoll und “GoMoPa” und Genossen selber entlarven

     

     

     

    IMMER WIEDER WERDEN WEBSITES MUTMASSLICH DURCH “GOMoPa” UND DEREN MUTMASSLICHE AUFTRAGGEBER ATTACKIERT WIE MUTMASSLICH “GERD BENNEWIRTZ” UND “PETER EHLERS”SOWIE OTMAR KNOLL / FAIRVESTA:

     

    Zitat OtmarKnoll/Fairvesta:

     

    Subject:ย ย 

    AW: AW: AW: AW: [Fwd: Your enquiry]

    From:ย ย 

    “Knoll, Otmar”

    Date:ย ย 

    Tue, February 5, 2013 8:14 pm

    To:ย ย 

    “‘office@ebizz.tv'”

    Priority:ย ย 

    Normal

    Options:ย ย 

    View Full Headerย |ย View Printable Versionย ย |ย Download this as a file

     

     

     

    Schade dass Sie nicht hรถren wollen, nun ist es zu spรคt, vielleicht รผberlegen Sie
    sich das noch mal.
    Den wenn die Domains offline gehen, dann haben Sie kein Medium mehr.
    Wer nicht hรถren will muss fรผhlen sagt ein Sprichwort.
            
            
            http://i-nvestment.com/category/leserbrief/
            
            
    Mit freundlichen GrรผรŸen
            
    Otmar Knoll
    Handlungsbevollmรคchtigter
            
    fairvesta Group AG
    Konrad-Adenauer-Str. 15
    D - 72072 Tรผbingen
    Tel:ย  +49 (0)7071 3665-0
    Fax: +49 (0)7071 3665-77
            o.knoll@fairvesta.de 
    www.fairvesta.de
            
    Amtsgericht Stuttgart HRB 382675
    Vorstand: Hermann Geiger
    Vorsitzender des Aufsichtsrates: Alfred Renner
    Sitz: Tรผbingen
    USt.-IdNr.: DE814337296

     

     

     

     

     

     

    Subject:ย ย 

    Jetzt aber offline

    From:ย ย 

    “Knoll, Otmar” <O.Knoll@fairvesta.de>

    Date:ย ย 

    Tue, February 5, 2013 11:20 pm

    To:ย ย 

    “‘office@ebizz.tv'” <office@ebizz.tv>

    Priority:ย ย 

    Normal

    Options:ย ย 

    View Full Headerย |ย View Printable Versionย ย |ย Download this as a file

     

     

     

    http://www.investment-on.com/component/content/article/34-investment-m
    
    UPS, ist wohl offline gegangen, da haben meine Rundschreiben wohl geholfen. So wie
    es aussieht ist Ihre Seite nicht mehr erreichbar, insbesondere nachdem Sie meine
    letzten Mails online gestellt haben. Haben Sie wirklich geglaubt das das durchgeht
    und wir uns das gefallen lassen?
    
    Das kann auch mit den andern Domains so gehen, Sie haben ja noch genรผgend online!
    
    ....
    
    Also Sie
    haben keine Chance!
    
    Mit freundlichen GrรผรŸen
    
    Otmar Knoll
    Handlungsbevollmรคchtigter
    
    fairvesta Group AG
    Konrad-Adenauer-Str. 15
    D - 72072 Tรผbingen
    Tel:ย  +49 (0)7071 3665-0
    Fax: +49 (0)7071 3665-77
    o.knoll@fairvesta.de 
    www.fairvesta.de
    
    Amtsgericht Stuttgart HRB 382675
    Vorstand: Hermann Geiger
    Vorsitzender des Aufsichtsrates: Alfred Renner
    Sitz: Tรผbingen
    USt.-IdNr.: DE814337296
    
    -------------------------------------------------------------------
    Diese E-Mail enthรคlt vertrauliche und/oder rechtlich geschรผtzte Informationen. Wenn
    Sie nicht der richtige Adressat sind oder diese E-Mail irrtรผmlich erhalten haben,
    informieren Sie bitte sofort den Absender und vernichten Sie diese Mail. Das
    unerlaubte Kopieren, die unbefugte Weitergabe oder die Verwendung des Inhalts dieser
    Mail ist nicht gestattet.
    -------------------------------------------------------------------
    This e-mail may contain confidential and/or privileged information. If you are not
    the intended recipient (or have received this e-mail in error) please notify the
    sender immediately and destroy this e-mail. Any unauthorized copying, disclosure,
    distribution or usableness contents of this e-mail is strictly forbidden.
    -------------------------------------------------------------------
    Ce courriel est confidentiel et protรฉgรฉ. L'expรฉditeur ne renonce pas aux droits et
    obligations qui s'y rapportent. Toute diffusion, utilisation ou copie de ce message
    ou des renseignements qu'il contient par une personne autre que le (les)
    destinataire(s) dรฉsignรฉ(s) est interdite. Si vous recevez ce courriel par erreur,
    veuillez m'en aviser immรฉdiatement, par retour de courriel ou par un autre moyen.
    -------------------------------------------------------------------

     

     

     

     

    Unveiled – Seduced by Secrets – Inside the STASI Tech World – The E-Book – Free Download

    Seduced-by-Secrets-Inside-the-Stasis-Spy-Tech-World-2008-Macrakis

    In addition to revealing who the spies were, where they worked, and why they did what they did, the Rosenholz material unmasks an incredibly bloated human web of recruiters, instructors, couriers, and residents. The spiderweb was designed to support an agent, but was not cost-effective while it ensnared the secrets of the West. The Stasi simply overestimated the power of stolen technological secrets to solve its economic problems, and the enormous spy infrastructure investment produced a very small return.”

    “Scientific-technical intelligence gathering for the MfS usually meant recruiting agents who had access to important Western companies like IBM. Occasionally foreigners volunteered to contribute to the MfS’s scientific developments. An unusual offer came in the mid-sixties from an American computer specialist, Henry Sherwood, who wanted to help East Germany’s data processing industry. Born in Berlin under the name Heinz Weizenbaum, he fled the Nazis in 1936 and arrived in America, where he changed his name while in the U.S. Army. His brother was the famous MIT computer professor Joseph Weizenbaum. Sherwood was invited to direct the Diebold European research program in 1966 and invited the East German Data Processing and Business Machines Company to take part in the program.

    Suspicious that Sherwood might be an agent for a capitalist company, the Stasi set four informants on him at the Diebold Conference and between 1966 and 1969 launched ‘Action World Stature’ to try to use the material from the various conferences. Unfortunately, the Stasi staff members did not know English and could not effectively use the material. When Sherwood visited Erfurt, he brought IBM manuals and other material with him, which the Stasi photographed. When there was an opportunity for a German to go to America to acquire more knowledge about data processing, the Stasi vetoed the trip because they were worried that the scientist might be recruited and never come back.

    And that was the main contradiction the Stasi presents us with: on the one hand, they vigorously supported state programs by acquiring the needed embargoed or secret technology. On the other hand, security concerns made them work against their own interests by restricting the needed international travel of scientists and by imposing other harmful security measures.

    Die Rechtslage bei schweren Internet-Angriffen wie von mutmasslich “GoMoPa”, “Nawito” und Konsorten

    Zitat:

    Nachfolgend einige Links zu dem brisanten Thema, den wenn mutmasslich “GoMoPa”, “Nawito”, Sven Schmidt, “Eagle IT” und dubioser ย “CTO” der dubiosen “GoMoPa” sowie sein mutmasslicher Genosse Thomas Promny und Genossen unsere starken Server ungestraft attackieren kรถnnen, kann bald jedes Unternehmen รคhnliche Probleme haben wie wir:

    http://www.fr-online.de/wikileaks—die-enthuellungsplattform/ddos-attacken-sabotage-im-weltweiten-netz,4882932,4913810.html

    http://de.wikipedia.org/wiki/Denial_of_Service

    http://www.internet-strafrecht.com/distributed-denial-of-service-ddos-attacken-strafbar-oder-nicht/internet-strafrecht/internetstrafrecht/

    All das zeigt, welche Kriminellen hier in STASI-Manier am Werk sind:

    Sie haben Angst vor der Wahrheit und kรถnnen sich nur durch kriminelle Aktionen halten….

    Even More Mental and Pysical Attacks on our Servers by the Suspects of “GoMoPa”, “Nawito”, “Otmar Knoll” and “Peter Ehlers”

    Dear Readers,

    here is the proof for that our websites and the are constantly under attack – mental and pysical attacks by

    – “GoMoPa”

    – “Peter Ehlers”

    – “Klaus Maurischat”

    – “Nawito”

    – Otmar Knoll” – he announced himself the attacks in an official corporate Email ย of his company “Fairvesta”!!!!

    and their thugs:

    graph

    This is in fact a very serious crime and causes longterm jail sentences !

     

    Krumme Immobiliengeschรคfte ? Wie โ€œOtmar Knollโ€, โ€œFairvestaโ€ zusammnen mit โ€œGoMoPaโ€ kritische Webseiten illegal ausschaltet

    Zitat OtmarKnoll/Fairvesta:

    Subject:ย ย  AW: AW: AW: AW: [Fwd: Your enquiry]
    From:ย ย  โ€œKnoll, Otmarโ€
    Date:ย ย  Tue, February 5, 2013 8:14 pm
    To:ย ย  โ€œโ€˜office@ebizz.tvโ€™โ€
    Priority:ย ย  Normal
    Options:ย ย  View Full Headerย |ย View Printable Versionย ย |ย Download this as a file
    Schade dass Sie nicht hรถren wollen, nun ist es zu spรคt, vielleicht รผberlegen Sie
    sich das noch mal.
    Den wenn die Domains offline gehen, dann haben Sie kein Medium mehr.
    Wer nicht hรถren will muss fรผhlen sagt ein Sprichwort.
    
    http://i-nvestment.com/category/leserbrief/
    
    Mit freundlichen GrรผรŸen
    
    Otmar Knoll
    Handlungsbevollmรคchtigter
    
    fairvesta Group AG
    Konrad-Adenauer-Str. 15
    D - 72072 Tรผbingen
    Tel:  +49 (0)7071 3665-0
    Fax: +49 (0)7071 3665-77
    o.knoll@fairvesta.de 
    www.fairvesta.de
    
    Amtsgericht Stuttgart HRB 382675
    Vorstand: Hermann Geiger
    Vorsitzender des Aufsichtsrates: Alfred Renner
    Sitz: Tรผbingen
    USt.-IdNr.: DE814337296

    AN OVERVIEW OF THE HEAVY CYBERATTACKS ON OUR WEBSITES TO STOP THE TRUTH DONE BY THE SUSPECTS

    These graphs below show the cyberattacks on our website initiated by the suspects we already mentioned and who even announced in an email that tehy would do this illegal internet crime. The email was by Otmar Knoll, Fairvesta, who announced the cybercrime. The suspected hackers are from “GoMoPa” and their thugs.

    The graphs show the DDos attacks on our servers.

    What is a DDos attack ?

    Read here:

    http://en.wikipedia.org/wiki/Denial-of-service_attack

    These internet crimes are punished with ย longterm jail sentences and financial compensation..

    Die untenstehenden Graphiken zeigen die Hackernagriffe auf unsere Webseiten, die seit Jahren durchgefรผhrt werden im Ausschnitt. In einer Email an uns hat Otmar Knoll, Fairvesta, die Hackerangriffe, somit schwere Internetverbrechen angekรผndigt. Wir haben diese Emails bereits verรถffentlicht. Mutmasslich arbeitet Otmar Knoll mit den รผblichen Verdรคchtigen der “GoMoPa”, ihren Informanten und Hackern zusammen:

    Die Graphiken zeigen die sogenannten DDos-Angriffe auf unsere Server.

    Was ist eine DDos Attacke ?

    http://de.wikipedia.org/wiki/Denial_of_Service

    Lesen Sie hier:

    Diese Vergehen werden mit langjรคhrigen Freiheitsstrafen und Schadensersatz bestraft.

    graph eastern

    graph 3graph2graphgraphgraph

    Statement about the dubious “colportations” of “Nawito” – MENTAL AND PHYSICAL CYBERATTACKS

    Bernd-Pulchernst

    Dear Readers,

    let me just briefly comment a mental cyberattack which should distract your attention from the real issues.

    I have never had any consulting position or contract for any German company.

    I have never worked for the Axel Springer Publishing House – not even as a freelance journalist.

    These facts are clear and can be verified easily – just by calling Axel Springer.

    The facts are

    1) Dr. Rainer Zitelmann worked for the Axel Springer Company. You can esaily find out what happened there. I just mention the word “Auschwitz” in this context…As you see from his website and in the internet Zitelmann is in fact consulting many German companies.

    2) “GoMoPa” had in fact a consultation contract with estavis and got in fact money from estavis and many various companies i.e. “S&K”

    These contracts are known and 100% true and published by various media i.e. “ZEIT”, “MANAGER MAGAZIN”, “SUEDDEUTSCHE ZEITUNG” etc.

    3) Meridian Capital was the subject of “GoMoPa”s articles.

    4) “Nawito” whover or whatever it is did not even bother to contact us.

    5) The “information” about one of our companies is false.

    6) The “Nawito” informer “Peter Ehlers” did in fact attack Chancellor Merkel and the Minister of Finance Wolfgang Schรคuble as “Deutschlands bekannteste Hehler” to name just one fact about “Peter Ehlers” or whatever his name might be who by the way got a lot of money from the bancrupt SAM AG which was also subject of “GoMoPa”‘s reporting and we know similiar cases of this endeavour.

    7) The last editor who was attacked by such cyberattacks died in a very mysterious way, Heinz Gerlach. He might have been controversial but nevertheless – the truth is the truth.

    He was the first journalist to publish the truth about the mysterious headquarter of “GoMoPa” in New York and their consulting contract with estavis and died suddenly and totally unexpected for most of us – not for all.

    The circumstances of his death remain unsolved for me.

    We are ready to proof this everytime and do not work with “colportations”.

    Obviously cyberattacks on our websites since years are not enough to keep the truth down – defamation must be added – a wellknown STASI technique to irritate the public – MENTAL AND PYSICAL CYBERATTACKS done by the well-know suspects.

    Sincerely your

    Bernd Pulch

    Magister Artium der Publizistik, Germanistik und Komparatistik

    PS

    COPIES OF PHYSICAL CYBER ATTACKS ON OUR SERVERS BY THE SUSPECTS AND “INFORMERS” OF “NAWITO”

    graph eastern

    graph 3

    graph2

    graphThe attacked s

    The attacked website are for example:

    http://www.investment-on.com

    ๐Ÿคก๐Ÿคก๐Ÿคก๐Ÿ˜‚Pop Stasi proudly presents Loosing Peter “Joker” Ehlers :”Bling – Bang – Bang – Born” – AI ParodyโœŒ๏ธ

    http://investment-magazin.com

    http://www.investment-magazin.tv

    and about 20 more.

    The Best Proof for the Truth we are telling – Cyberattacks everyday by the Suspects

    hacker.gifchinese

    One day after The New York Times reported that Chinese hackers had infiltrated its computers and stolen passwords for its employees, The Wall Street Journal announced that it too had been hacked.

    On Thursday, The Journal reported that it had been attacked by Chinese hackers who were trying to monitor the companyโ€™s coverage of China. It said hackers had broken into its network through computers in its Beijing bureau.

    In a written statement, the business newspaper owned byย News Corporationย described the attack as an โ€œongoing issueโ€ and said it was working closely with authorities and security specialists to clean up its systems. It said that it completed a โ€œnetwork overhaulโ€ on Thursday in an effort to rid its systems of hackers.

    Chinaโ€™s Ministry of National Defense has denied any involvement in the cyberattack at The Times or any other American corporations.

    But security experts said that in 2008, Chinese hackers began targeting American news organizations as part of an effort to monitor coverage of Chinese issues.

    In a report for clients in December, Mandiant, a computer security company, said that over the course of several investigations it found evidence that Chinese hackers had stolen e-mails, contacts and files from more than 30 journalists and executives at Western news organizations, and had maintained a โ€œshort listโ€ of journalists for repeated attacks. Among those targeted were journalists who had written about Chinese leaders, political and legal issues in China and the telecom giant Huawei.

    Bloomberg News, another American news organization, was targeted by Chinese hackers last year, and some computers were infected, according to a person with knowledge of the companyโ€™s internal investigation. The attack occurred after Bloomberg published an article on June 29 about the wealth accumulated by relatives ofย Xi Jinping, a Chinese official who is expected to become president in March.

    Bloomberg has confirmed that hackers had made attempts but said that โ€œno computer systems or computers were compromised.โ€

    The timing of the attacks on The New York Times coincided with the reporting forย an investigation, published online on Oct. 25, that found that the relatives ofย Wen Jiabao,Chinaโ€™s prime minister, had accumulated a fortune worth several billion dollars through business dealings.

    Security experts hired by The Times to detect and block the computer attacks found digital evidence that Chinese hackers, using methods that some consultants have associated with the Chinese military in the past, breached The Timesโ€™s network.

    The Associated Press reported Thursday that officials in the Obama administration were considering more assertive action against Beijing to stop Chinese computer espionage campaigns.

    The Secretary of State, Hillary Clinton, said Thursday a global effort was needed o establish โ€œrules of the roadโ€ for cyber activity. ย In her final meeting with reporters at the State Department, Mrs. Clinton addressed a question about Chinaโ€™s efforts to infiltrate computer systems at The New York Times.

    โ€œWe have seen over the last years an increase in not only the hacking attempts on government institutions but also non-governmental ones,โ€ Mrs. Clinton said.

    The Chinese, she said, โ€œare not the only people who are hacking us.โ€

    โ€œThere is a lot that we are working on that will be deployed in the event that we donโ€™t get some kind of international effort under way,โ€ Mrs. Clinton added without elaborating.

    The United States has been increasingly vocal about such efforts against government and private industry. In a November 2011 intelligence report, government officials specifically accused China and Russia of stealing intellectual property for economic gain.

    <nyt_author_id>

    Michael Gordon contributed reporting from Washington.

    http://www.nytimes.com/2013/02/01/technology/wall-street-journal-reports-attack-by-china-hackers.html

     

    So this is a part of the big picture: The small picture concerns former STASI agents and their comrades and thugs in Germany.

    The Best Proof for the Truth we are telling – Cyberattacks everyday by the Suspects against our websites !

    TOP-SECRET – DHS Cybersecurity Order 13636

    Executive Order 13636: Improving Critical Infrastructure Cybersecurity Cyber-Dependent Infrastructure Identification Working Group (CDIIWG)

    20 pages
    For Official Use Only
    March 11, 2013Executive Order 13636: Improving Critical Infrastructure Cybersecurity Cyber-Dependent Infrastructure Identification Working Group (CDIIWG)

    20 pages
    For Official Use Only
    March 11, 2013
    Executive Order 13636: Improving Critical Infrastructure Cybersecurity Cyber-Dependent Infrastructure Identification Working Group (CDIIWG)

    20 pages
    For Official Use Only
    March 11, 2013

    Download

    Overview of Executive Order 13636

    – Executive Order (EO) 13636, Improving Critical Infrastructure Cybersecurity was released on February 12, 2013
    – Relies on public-private collaboration to improve critical infrastructure cyber posture
    – Includes elements to enhance information sharing, develop a cybersecurity framework, and create a voluntary cybersecurity program
    – Requires the Department of Homeland Security (DHS) to identify the โ€œcritical infrastructure where a cybersecurity incident could reasonably result in catastrophic regional or national effects on public health or safety, economic security, or national securityโ€

    DHS will work with CIPAC to execute Section 9 of the EO

    โ€œWithin 150 days of the date of this order, the Secretary shall use a risk-based approach to identify critical infrastructure where a cybersecurity incident could reasonably result in catastrophic regional or national effects on public health or safety, economic security, or national security.โ€ (EO 13636, Section 9)

    Apply consistent, objective criteria

    Stakeholders include:
    โ€“ Critical Infrastructure Partnership Advisory Council (CIPAC)
    โ€“ Sector Specific Agencies (SSA)
    โ€“ Sector Coordinating Councils (SCC)
    โ€“ Government Coordinating Councils (GCC)
    โ€“ Critical infrastructure owners and operators

    The list of identified critical infrastructure will be reviewed and updated on an annual basis

    Execution of Section 9 will be led by the Cyber-Dependent Infrastructure Identification Working Group (CDIIWG)

    Overview of CDII Approach (1 of 2)

    Only a small subset of U.S. infrastructure will fall under the focus of the EO activity
    โ€“ Owners and operators will have the opportunity to provide relevant information
    โ€“ A review process will be established for the identification as critical infrastructure

    Focus is on critical infrastructure that could be compromised through cyber exploitation and which, if incapacitated, could result in catastrophic national, public health, or economic consequences
    โ€“ Higher standard than debilitating, which is what is used in the base definition to define critical infrastructure
    โ€“ The Secretary of DHS will provide a list of critical infrastructure most at risk in the context of a cyber incident within 150 days of EO release
    โ€“ Commercial IT products and consumer information technology services will not be directly designated under the EO as infrastructure most at risk

    All sectors will be engaged โ€“through engagement and initial analysis it may be determined that a sector does not have any infrastructure that meets the threshold, the focus of the initial list will not be on that sector(s)

    Sectors with existing CI identification processes and lists should be leveraged where appropriate

    Functions-based approach to identify critical infrastructure
    โ€“ Accounts for the virtual and distributed nature of cyber infrastructure
    โ€“ Focuses on the critical activities, services, or products being produced or provided by a sector, subsector, or mode
    โ€“ Functions are identified based on the national or regional level consequences that can result from a disruption or exploitation of the infrastructure
    โ€“ Does not identify a specific organizationโ€™s assets, networks, or systems; focus is on sector functions and the types of systems that support them

    Requires the application of criteria that will be used to screen the infrastructure that aligns to the critical functions
    โ€“ Consistently applied within sectors and, where possible, across sectors as well

    Stakeholder engagement will be conducted throughout this effort
    โ€“ CDIIWG will work with sectors (SSAs, SCCs, GCCs) via the CIPAC partnership framework

    โ€ฆ

    Download

    Overview of Executive Order 13636

    – Executive Order (EO) 13636, Improving Critical Infrastructure Cybersecurity was released on February 12, 2013
    – Relies on public-private collaboration to improve critical infrastructure cyber posture
    – Includes elements to enhance information sharing, develop a cybersecurity framework, and create a voluntary cybersecurity program
    – Requires the Department of Homeland Security (DHS) to identify the โ€œcritical infrastructure where a cybersecurity incident could reasonably result in catastrophic regional or national effects on public health or safety, economic security, or national securityโ€

    DHS will work with CIPAC to execute Section 9 of the EO

    โ€œWithin 150 days of the date of this order, the Secretary shall use a risk-based approach to identify critical infrastructure where a cybersecurity incident could reasonably result in catastrophic regional or national effects on public health or safety, economic security, or national security.โ€ (EO 13636, Section 9)

    Apply consistent, objective criteria

    Stakeholders include:
    โ€“ Critical Infrastructure Partnership Advisory Council (CIPAC)
    โ€“ Sector Specific Agencies (SSA)
    โ€“ Sector Coordinating Councils (SCC)
    โ€“ Government Coordinating Councils (GCC)
    โ€“ Critical infrastructure owners and operators

    The list of identified critical infrastructure will be reviewed and updated on an annual basis

    Execution of Section 9 will be led by the Cyber-Dependent Infrastructure Identification Working Group (CDIIWG)

    Overview of CDII Approach (1 of 2)

    Only a small subset of U.S. infrastructure will fall under the focus of the EO activity
    โ€“ Owners and operators will have the opportunity to provide relevant information
    โ€“ A review process will be established for the identification as critical infrastructure

    Focus is on critical infrastructure that could be compromised through cyber exploitation and which, if incapacitated, could result in catastrophic national, public health, or economic consequences
    โ€“ Higher standard than debilitating, which is what is used in the base definition to define critical infrastructure
    โ€“ The Secretary of DHS will provide a list of critical infrastructure most at risk in the context of a cyber incident within 150 days of EO release
    โ€“ Commercial IT products and consumer information technology services will not be directly designated under the EO as infrastructure most at risk

    All sectors will be engaged โ€“through engagement and initial analysis it may be determined that a sector does not have any infrastructure that meets the threshold, the focus of the initial list will not be on that sector(s)

    Sectors with existing CI identification processes and lists should be leveraged where appropriate

    Functions-based approach to identify critical infrastructure
    โ€“ Accounts for the virtual and distributed nature of cyber infrastructure
    โ€“ Focuses on the critical activities, services, or products being produced or provided by a sector, subsector, or mode
    โ€“ Functions are identified based on the national or regional level consequences that can result from a disruption or exploitation of the infrastructure
    โ€“ Does not identify a specific organizationโ€™s assets, networks, or systems; focus is on sector functions and the types of systems that support them

    Requires the application of criteria that will be used to screen the infrastructure that aligns to the critical functions
    โ€“ Consistently applied within sectors and, where possible, across sectors as well

    Stakeholder engagement will be conducted throughout this effort
    โ€“ CDIIWG will work with sectors (SSAs, SCCs, GCCs) via the CIPAC partnership framework

    โ€ฆ

    DownloadExecutive Order 13636: Improving Critical Infrastructure Cybersecurity Cyber-Dependent Infrastructure Identification Working Group (CDIIWG)

    20 pages
    For Official Use Only
    March 11, 2013

    Download

    Overview of Executive Order 13636

    – Executive Order (EO) 13636, Improving Critical Infrastructure Cybersecurity was released on February 12, 2013
    – Relies on public-private collaboration to improve critical infrastructure cyber posture
    – Includes elements to enhance information sharing, develop a cybersecurity framework, and create a voluntary cybersecurity program
    – Requires the Department of Homeland Security (DHS) to identify the โ€œcritical infrastructure where a cybersecurity incident could reasonably result in catastrophic regional or national effects on public health or safety, economic security, or national securityโ€

    DHS will work with CIPAC to execute Section 9 of the EO

    โ€œWithin 150 days of the date of this order, the Secretary shall use a risk-based approach to identify critical infrastructure where a cybersecurity incident could reasonably result in catastrophic regional or national effects on public health or safety, economic security, or national security.โ€ (EO 13636, Section 9)

    Apply consistent, objective criteria

    Stakeholders include:
    โ€“ Critical Infrastructure Partnership Advisory Council (CIPAC)
    โ€“ Sector Specific Agencies (SSA)
    โ€“ Sector Coordinating Councils (SCC)
    โ€“ Government Coordinating Councils (GCC)
    โ€“ Critical infrastructure owners and operators

    The list of identified critical infrastructure will be reviewed and updated on an annual basis

    Execution of Section 9 will be led by the Cyber-Dependent Infrastructure Identification Working Group (CDIIWG)

    Overview of CDII Approach (1 of 2)

    Only a small subset of U.S. infrastructure will fall under the focus of the EO activity
    โ€“ Owners and operators will have the opportunity to provide relevant information
    โ€“ A review process will be established for the identification as critical infrastructure

    Focus is on critical infrastructure that could be compromised through cyber exploitation and which, if incapacitated, could result in catastrophic national, public health, or economic consequences
    โ€“ Higher standard than debilitating, which is what is used in the base definition to define critical infrastructure
    โ€“ The Secretary of DHS will provide a list of critical infrastructure most at risk in the context of a cyber incident within 150 days of EO release
    โ€“ Commercial IT products and consumer information technology services will not be directly designated under the EO as infrastructure most at risk

    All sectors will be engaged โ€“through engagement and initial analysis it may be determined that a sector does not have any infrastructure that meets the threshold, the focus of the initial list will not be on that sector(s)

    Sectors with existing CI identification processes and lists should be leveraged where appropriate

    Functions-based approach to identify critical infrastructure
    โ€“ Accounts for the virtual and distributed nature of cyber infrastructure
    โ€“ Focuses on the critical activities, services, or products being produced or provided by a sector, subsector, or mode
    โ€“ Functions are identified based on the national or regional level consequences that can result from a disruption or exploitation of the infrastructure
    โ€“ Does not identify a specific organizationโ€™s assets, networks, or systems; focus is on sector functions and the types of systems that support them

    Requires the application of criteria that will be used to screen the infrastructure that aligns to the critical functions
    โ€“ Consistently applied within sectors and, where possible, across sectors as well

    Stakeholder engagement will be conducted throughout this effort
    โ€“ CDIIWG will work with sectors (SSAs, SCCs, GCCs) via the CIPAC partnership framework

    โ€ฆ

    Overview of Executive Order 13636

    – Executive Order (EO) 13636, Improving Critical Infrastructure Cybersecurity was released on February 12, 2013
    – Relies on public-private collaboration to improve critical infrastructure cyber posture
    – Includes elements to enhance information sharing, develop a cybersecurity framework, and create a voluntary cybersecurity program
    – Requires the Department of Homeland Security (DHS) to identify the โ€œcritical infrastructure where a cybersecurity incident could reasonably result in catastrophic regional or national effects on public health or safety, economic security, or national securityโ€

    DHS will work with CIPAC to execute Section 9 of the EO

    โ€œWithin 150 days of the date of this order, the Secretary shall use a risk-based approach to identify critical infrastructure where a cybersecurity incident could reasonably result in catastrophic regional or national effects on public health or safety, economic security, or national security.โ€ (EO 13636, Section 9)

    Apply consistent, objective criteria

    Stakeholders include:
    โ€“ Critical Infrastructure Partnership Advisory Council (CIPAC)
    โ€“ Sector Specific Agencies (SSA)
    โ€“ Sector Coordinating Councils (SCC)
    โ€“ Government Coordinating Councils (GCC)
    โ€“ Critical infrastructure owners and operators

    The list of identified critical infrastructure will be reviewed and updated on an annual basis

    Execution of Section 9 will be led by the Cyber-Dependent Infrastructure Identification Working Group (CDIIWG)

    Overview of CDII Approach (1 of 2)

    Only a small subset of U.S. infrastructure will fall under the focus of the EO activity
    โ€“ Owners and operators will have the opportunity to provide relevant information
    โ€“ A review process will be established for the identification as critical infrastructure

    Focus is on critical infrastructure that could be compromised through cyber exploitation and which, if incapacitated, could result in catastrophic national, public health, or economic consequences
    โ€“ Higher standard than debilitating, which is what is used in the base definition to define critical infrastructure
    โ€“ The Secretary of DHS will provide a list of critical infrastructure most at risk in the context of a cyber incident within 150 days of EO release
    โ€“ Commercial IT products and consumer information technology services will not be directly designated under the EO as infrastructure most at risk

    All sectors will be engaged โ€“through engagement and initial analysis it may be determined that a sector does not have any infrastructure that meets the threshold, the focus of the initial list will not be on that sector(s)

    Sectors with existing CI identification processes and lists should be leveraged where appropriate

    Functions-based approach to identify critical infrastructure
    โ€“ Accounts for the virtual and distributed nature of cyber infrastructure
    โ€“ Focuses on the critical activities, services, or products being produced or provided by a sector, subsector, or mode
    โ€“ Functions are identified based on the national or regional level consequences that can result from a disruption or exploitation of the infrastructure
    โ€“ Does not identify a specific organizationโ€™s assets, networks, or systems; focus is on sector functions and the types of systems that support them

    Requires the application of criteria that will be used to screen the infrastructure that aligns to the critical functions
    โ€“ Consistently applied within sectors and, where possible, across sectors as well

    Stakeholder engagement will be conducted throughout this effort
    โ€“ CDIIWG will work with sectors (SSAs, SCCs, GCCs) via the CIPAC partnership framework

    โ€ฆ

    Unveiled – Incentives to Adopt Improved Cybersecurity Practices

    Incentives to Adopt Improved Cybersecurity Practices

     


    http://www.ofr.gov/OFRUpload/OFRData/2013-07234_PI.pdf

    [FR Doc. 2013-07234 Filed 03/27/2013 at 8:45 am; Publication Date: 03/28/2013]

    Billing Code: 3510-EA

    DEPARTMENT OF COMMERCE
    Office of the Secretary
    National Institute of Standards and Technology
    National Telecommunications and Information Administration

    [Docket Number: 130206115-3115-01]

    Incentives to Adopt Improved Cybersecurity Practices

    AGENCY: U.S. Department of Commerce.

    ACTION: Notice of Inquiry.

    SUMMARY: The President has directed the Secretary of Commerce to evaluate a set of incentives designed to promote participation in a voluntary program to be established by the Secretary of Homeland Security to support the adoption by owners and operators of critical infrastructure and other interested entities of the Cybersecurity Framework being developed by the National Institute of Standards and Technology (NIST). The evaluation will include analysis of the benefits and relative effectiveness of such incentives, and whether the incentives would require legislation or can be provided under existing law and authorities to participants in the Program. The Department of Commerce (Department) will use input received in response to this Notice to inform its recommendations, which will focus on incentives for critical infrastructure owners. In addition, the Department may use this input to develop a broader set of recommendations that apply to U.S. industry as a whole.

    DATES: Comments are due on or before [insert date 30 days after date of publication in the Federal Register].

    ADDRESSES: Written comments may be submitted by mail to the Office of Policy Analysis and Development, National Telecommunications and Information Administration, U.S. Department of Commerce, 1401 Constitution Avenue, N.W., Room 4725, Washington, DC 20230. Comments may be submitted electronically to cyberincentives[at]ntia.doc.gov. All email messages and comments received are a part of the public record and will be made available to the public generally without change on the Internet Policy Task Force Web page at http://www.ntia.doc.gov/category/cybersecurity. For this reason, comments should not include confidential, proprietary, or business sensitive information.

    FOR FURTHER INFORMATION CONTACT: For questions about this Notice, contact: Alfred Lee, Office of Policy Analysis and Development, National Telecommunications and Information Administration, U.S. Department of Commerce, 1401 Constitution Avenue, NW., Room 4725, Washington, DC 20230, telephone (202) 482โ€“1880; or send an e-mail to cyberincentives[at]ntia.doc.gov. Please direct media inquiries to the Office of Public Affairs at (202) 482-4883; or send an email to publicaffairs[at]doc.gov.

    SUPPLEMENTARY INFORMATION: The national and economic security of the United States depends on the reliable functioning of the Nationโ€™s critical infrastructure. The cyber threat to critical infrastructure is growing and represents one of the most serious national security challenges that the United States must confront. On February 12, 2013, the President signed Executive Order 13636, โ€œImproving Critical Infrastructure Cybersecurity.โ€1 As the President stated in the Executive Order, โ€œrepeated cyber intrusions into Americaโ€™s critical infrastructure demonstrate a need for improved cybersecurity.โ€2

    1 โ€œExec. Order No. 13636, 78 Fed. Reg. 11739 (Feb. 19, 2013), available at:https://www.federalregister.gov/articles/2013/02/19/2013-03915/improving-
    critical-infrastructure-cybersecurity
    .

    2 Id.

    The Executive Order establishes a policy of enhancing the security and resilience of the Nationโ€™s critical infrastructure and maintaining a cyber environment that encourages efficiency, innovation, and economic prosperity while promoting safety, security, business confidentiality, privacy and civil liberties through a partnership with the owners and operators of critical infrastructure3 to improve cybersecurity information sharing and collaboratively develop and implement risk-based standards. The Executive Order sets forth three elements to establish this partnership. First, the Department of Homeland Security (โ€œDHSโ€) will use a risk-based approach to identify critical infrastructure where a cybersecurity incident could reasonably result in catastrophic regional or national effects on public health or safety, economic security, or national security. Second, the National Institute of Standards and Technology will develop a framework consisting of a set of standards, methodologies, procedures, and processes that align policy, business, and technological approaches to address cyber risks (โ€œthe Frameworkโ€), which will provide a prioritized, flexible, repeatable, performance-based, and cost-effective approach, including information security measures and controls, to help owners and operators of critical infrastructure indentify, asses, and manage cyber risk. Third, DHS, in coordination with sector-specific agencies, will develop the Critical Infrastructure Cybersecurity Program (โ€œthe Programโ€) to promote voluntary adoption of the Framework.

    3 For the purposes of this Notice, the term โ€œcritical infrastructureโ€ has the meaning given the term in 42 U.S.C. ยง 5195c(e): “systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters.”

    The Executive Order recognizes that further incentives may be necessary to encourage sufficient private sector participation in the Program. To develop a clearer picture of existing and potential incentives, the Executive Order directs the Department of Commerce to recommend ways to promote participation in the Program.4 The recommendations โ€œshall include analysis of the benefits and relative effectiveness of such incentives, and whether the incentives would require legislation or can be provided under existing law and authorities to participants of the Program.โ€ Consistent with the Executive Order, these incentives may include technical and public policy measures that improve cybersecurity without creating barriers to innovation, economic growth, and the free flow of information. The Department of Commerce will submit its recommendations to the President through the Assistant to the President for Homeland Security and Counterterrorism and the Assistant to the President for Economic Affairs no later than June 12, 2013.

    4 The Executive Order also directs the Secretaries of the Treasury and Homeland Security to recommend incentives to participate in the Program. The Secretary of Defense and the Administrator of General Services are also tasked with reporting on government procurement-related issues.

    Improving cybersecurity practices among entities that do not own or operate critical infrastructure, or for other reasons are unlikely to join the Program, is also an important Executive Branch priority. Therefore, the Department of Commerce also seeks comment on a broader set of incentives that could help to promote the adoption of proven efforts to address cybersecurity vulnerabilities.

    The Department of Commerce asked questions related to incentives for noncritical infrastructure in a July 2010 Notice of Inquiry.5 Responses to the July 2010 Notice aided the Departmentโ€™s efforts to promote standards and best practices and informed its June 2011 โ€œGreen Paper,โ€ Cybersecurity, Innovation and the Internet Economy.6 Along with the responses to this Notice, the Department plans to draw again on earlier responses in the development of recommendations to the President on incentives. In addition, the Department plans to use responsive comments to inform a follow-up to the Green Paper.

    5 Dept. of Commerce, Cybersecurity, Innovation, and the Internet Economy, 75 Fed. Reg. 44216 (July 28, 2010) (Notice of Inquiry), available athttp://www.ntia.doc.gov/frnotices/2010/FR_CybersecurityNOI_07282010.pdf.

    Comments received in response to the 2010 Notice of Inquiry are available at

    http://www.nist.gov/itl/cybercomments.cfm.

    6 Dept. of Commerce, Cybersecurity, Innovation, and the Internet Economy (June 2011),

    http://www.nist.gov/itl/upload/Cybersecurity_Green-Paper_FinalVersion.pdf. The questions asked in the Green Paper are available at Dept. of Commerce, Cybersecurity, Innovation, and the Internet Economy, 76 Fed. Reg. 34965 (June 15, 2011), available at

    http://www.ntia.doc.gov/federal-register-notice/2011/cybersecurity-innovationand-internet-economy.

    Comments received in response to the Green Paper are available at

    http://www.nist.gov/itl/greenpapercomments.cfm.

    Stakeholders that responded to the July 2010 Notice may wish to focus on the following questions:

    โ€ข Have your viewpoints on any questions related to incentives for noncritical infrastructure changed since you filed them in response to the July 2010 Notice?โ€ข Do your comments related to incentives for noncritical infrastructure also apply equally to critical infrastructure?

    โ€ข Does anything in the Executive Order or recent legislative proposals change your views on what incentives will be necessary or how they can be achieved? In particular, would the incentives that you previously discussed be effective in encouraging all firms that participate in the Internet economy to participate in the Program? Would these incentives encourage critical infrastructure companies to join the Program?

    In answering these questions, commenters should not limit their responses to incentives that are feasible under existing law.

    For all stakeholders, particularly those that did not respond to these earlier inquiries, the Department of Commerce requests comments on any of the following questions:

    โ€ข Are existing incentives adequate to address the current risk environment for your sector/company?โ€ข Do particular business sectors or company types lack sufficient incentives to make cybersecurity investments more than others? If so, why?

    โ€ข How do businesses/your business assess the costs and benefits of enhancing their cybersecurity?

    โ€ข What are the best ways to encourage businesses to make investments in cybersecurity that are appropriate for the risks that they face?

    โ€ข How do businesses measure success and the cost-effectiveness of their current cybersecurity programs?

    โ€ข Are there public policies or private sector initiatives in the United States or other countries that have successfully increased incentives to make security investments or other investments that can be applied to security?

    โ€ข Are there disincentives or barriers that inhibit cybersecurity investments by firms? Are there specific investment challenges encountered by small businesses and/or multinational companies, respectively? If so, what are the disincentives, barriers or challenges and what should be done to eliminate them?

    โ€ข Are incentives different for small businesses? If so, how?

    โ€ข For American businesses that are already subject to cybersecurity requirements, what is the cost of compliance and is it burdensome relative to other costs of doing business?

    โ€ข What are the merits of providing legal safe-harbors to individuals and commercial entities that participate in the DHS Program? By contrast, what would be the merits or implications of incentives that hold entities accountable for failure to exercise reasonable care that results in a loss due to inadequate security measures?

    โ€ข What would be the impact of requiring entities to join the DHS Program prior to receiving government financial guarantees or assistance in relevant sectors?

    โ€ข How can liability structures and insurance, respectively, be used as incentives?

    โ€ข What other market tools are available to encourage cybersecurity best practices?

    โ€ข Should efforts be taken to better promote and/or support the adoption of the Framework or specific standards, practices, and guidelines beyond the DHS Program? If so, what efforts would be effective?

    โ€ข In what way should these standards, practices, and guidelines be promoted to small businesses and multinationals, respectively, and through what mechanisms? How can they be promoted and adapted for multinational companies in various jurisdictions?

    โ€ข What incentives are there to ensure that best practices and standards, once adopted, are updated in the light of changing threats and new business models?

    โ€ข Voluntary industry sector governance mechanisms are sometimes used to stimulate organizations to conform to a set of principles, guidelines, and operations based on best practices, standards, and conformity assessment processes that collectively increase the level of assurance while preserving organizationsโ€™ brand standing and the integrity of products and services.

    o Do organizations participate in voluntary governance mechanisms?o Which industries/groups have voluntary governance mechanisms?

    o Do existing voluntary governance mechanisms have cybersecurity-related constraints?

    o What are the benefits and challenges associated with voluntary governance mechanisms?

    Dated: __March 22, 2013_______________.

    Rebecca M. Blank, Deputy Secretary of Commerce.

    Patrick Gallagher, Under Secretary of Commerce for Standards and Technology.

    Lawrence E. Strickling, Assistant Secretary for Communications and Information.

     


    Cloudflare Inside View – Biggest DDos Attack in History on Spamhaus

    At CloudFlare, we deal with large DDoS attacks every day. Usually, these attacks are directed at large companies or organizations that are reluctant to talk about their details. It’s fun, therefore, whenever we have a customer that is willing to let us tell the story of an attack they saw and how we mitigated it. This is one of those stories.

    Spamhaus

    Yesterday, Tuesday, March 19, 2013, CloudFlare was contacted by the non-profit anti-spam organizationย Spamhaus. They were suffering a large DDoS attack against their website and asked if we could help mitigate the attack.

    Spamhaus_logo

    Spamhaus provides one of the key backbones that underpins much of the anti-spam filtering online. Run by a tireless team of volunteers, Spamhaus patrols the Internet for spammers and publishes a list of the servers they use to send their messages in order to empower email system administrators to filter unwanted messages. Spamhaus’s services are so pervasive and important to the operation of the Internet’s email architecture that, when aย lawsuit threatened to shut the service down, industry experts testified [PDF, full disclosure: I wrote the brief back in the day] that doing so risked literally breaking email since Spamhaus is directly or indirectly responsible for filtering as much as 80% of daily spam messages.

    Beginning on March 18, the Spamhaus siteย came under attack. The attack was large enough that the Spamhaus team wasn’t sure of its size when they contacted us. It was sufficiently large to fully saturate their connection to the rest of the Internet and knock their site offline. These very large attacks, which are known as Layer 3 attacks, are difficult to stop with any on-premise solution. Put simply: if you have a router with a 10Gbps port, and someone sends you 11Gbps of traffic, it doesn’t matter what intelligent software you have to stop the attack because your network link is completely saturated.

    Burst_pipe

    While we don’t know who was behind this attack, Spamhaus has made plenty of enemies over the years. Spammers aren’t always the most lovable of individuals and Spamhaus has been threatened, sued, and DDoSed regularly. Spamhaus’s blocklists are distributed via DNS and there is a long list of volunteer organizations that mirror their DNS infrastructure in order to ensure it is resilient to attacks. The website, however, was unreachable.

    Filling Up the Series of Tubes

    Very large Layer 3 attacks are nearly always originated from a number of sources. These many sources each send traffic to a single Internet location, effectively creating a tidal wave that overwhelms the target’s resources. In this sense, the attack is distributed (the first D in DDoS — Distributed Denial of Service). The sources of attack traffic can be a group of individuals working together (e.g., the Anonymous LOIC model, although this is Layer 7 traffic and even at high volumes usually much smaller in volume than other methods), a botnet of compromised PCs, a botnet of compromised servers,ย misconfigured DNS resolvers, or evenย home Internet routers with weak passwords.

    Since an attacker attempting to launch a Layer 3 attack doesn’t care about receiving a response to the requests they send, the packets that make up the attack do not have to be accurate or correctly formatted. Attackers will regularly spoof all the information in the attack packets, including the source IP, making it look like the attack is coming from a virtually infinite number of sources. Since packets data can be fully randomized, using techniques like IP filtering even upstream becomes virtually useless.

    Spamhaus signed up for CloudFlare on Tuesday afternoon and we immediately mitigated the attack, making the site once again reachable. (More on how we did that below.) Once on our network, we also began recording data about the attack. At first, the attack was relatively modest (around 10Gbps). There was a brief spike around 16:30 UTC, likely a test, that lasted approximately 10 minutes. Then, around 21:30 UTC, the attackers let loose a very large wave.

    The graph below is generated from bandwidth samples across a number of the routers that sit in front of servers we use for DDoS scrubbing. The green area represents in-bound requests and the blue line represents out-bound responses. While there is always some attack traffic on our network, it’s easy to see when the attack against Spamhaus started and then began to taper off around 02:30 UTC on March 20, 2013. As I’m writing this at 16:15 UTC on March 20, 2013, it appears the attack is picking up again.

    How to Generate a 75Gbps DDoS

    The largest source of attack traffic against Spamhaus came from DNS reflection. I’vewritten about these attacks beforeย and in the last year they have become the source of the largest Layer 3 DDoS attacks we see (sometimes well exceeding 100Gbps). Open DNS resolvers are quickly becoming the scourge of the Internet and the size of these attacks will only continue to rise until all providers make aย concerted effort to close them. (It also makes sense to implementย BCP-38, but that’s a topic for another post another time.)

    The basic technique of a DNS reflection attack is to send a request for a large DNS zone file with the source IP address spoofed to be the intended victim to a large number of open DNS resolvers. The resolvers then respond to the request, sending the large DNS zone answer to the intended victim. The attackers’ requests themselves are only a fraction of the size of the responses, meaning the attacker can effectively amplify their attack to many times the size of the bandwidth resources they themselves control.

    In the Spamhaus case, the attacker was sending requests for the DNS zone file for ripe.net to open DNS resolvers. The attacker spoofed the CloudFlare IPs we’d issued for Spamhaus as the source in their DNS requests. The open resolvers responded with DNS zone file, generating collectively approximately 75Gbps of attack traffic. The requests were likely approximately 36 bytes long (e.g. dig ANY ripe.net @X.X.X.X +edns=0 +bufsize=4096, where X.X.X.X is replaced with the IP address of an open DNS resolver) and the response was approximately 3,000 bytes, translating to a 100x amplification factor.

    We recorded over 30,000 unique DNS resolvers involved in the attack. This translates to each open DNS resolver sending an average of 2.5Mbps, which is small enough to fly under the radar of most DNS resolvers. Because the attacker used a DNS amplification, the attacker only needed to control a botnet or cluster of servers to generate 750Mbps — which is possible with a small sized botnet or a handful of AWS instances. It is worth repeating: open DNS resolvers are the scourge of the Internet and these attacks will become more common and large until service providers take serious efforts to close them.

    How You Mitigate a 75Gbps DDoS

    While large Layer 3 attacks are difficult for an on-premise DDoS solution to mitigate, CloudFlare’s network was specifically designed from the beginning to stop these types of attacks. We make heavy use of Anycast. That means the same IP address is announced from every one of our 23 worldwide data centers. The network itselfย load balances requestsย to the nearest facility. Under normal circumstances, this helps us ensure a visitor is routed to the nearest data center on our network.

    When there’s an attack, Anycast serves to effectively dilute it by spreading it across our facilities. Since every data center announces the same IP address for any CloudFlare customer, traffic cannot be concentrated in any one location. Instead of the attack being many-to-one, it becomes many-to-many with no single point on the network acting as a bottleneck.

    Once diluted, the attack becomes relatively easy to stop at each of our data centers. Because CloudFlare acts as a virtual shield in front of our customers sites, with Layer 3 attacks none of the attack traffic reaches the customer’s servers. Traffic to Spamhaus’s network dropped to below the levels when the attack started as soon as they signed up for our service.

    Other Noise

    While the majority of the traffic involved in the attack was DNS reflection, the attacker threw in a few other attack methods as well. One was a so-called ACK reflection attack. When a TCP connection is established there is a handshake. The server initiating the TCP session first sends a SYN (for synchronize) request to the receiving server. The receiving server responds with an ACK (for acknowledge). After that handshake, data can be exchanged.

    In an ACK reflection, the attacker sends a number of SYN packets to servers with a spoofed source IP address pointing to the intended victim. The servers then respond to the victim’s IP with an ACK. Like the DNS reflection attack, this disguises the source of the attack, making it appear to come from legitimate servers. However, unlike the DNS reflection attack, there is no amplification factor: the bandwidth from the ACKs is symmetrical to the bandwidth the attacker has to generate the SYNs. CloudFlare is configured to drop unmatched ACKs, which mitigates these types of attacks.

    Whenever we see one of these large attacks, network operators will write to us upset that we are attacking their infrastructure with abusive DNS queries or SYN floods. In fact, it is their infrastructure that is being used to reflect an attack at us. By working with and educating network operators, they clean up their network which helps to solve the root cause of these large attacks.

    History Repeats Itself

    Finally, it’s worth noting how similar this battle against DDoS attacks and open DNS relays is with Spamhaus’s original fight. If DDoS is the network scourge of tomorrow, spam was its clear predecessor. Paul Vixie,ย the father of the DNSBL, set out in 1997 to use DNS to help shut down the spam source of the day: open email relays. These relays were being used to disguise the origin of spam messages, making them more difficult to block. What was needed was a list of mail relays that mail serves could query against and decide whether to accept messages.

    History_repeats_itself

    While it wasn’t originally designed with the idea in mind, DNS proved a highly scalable and efficient means to distribute a queryable list of open mail relays that email service providers could use to block unwanted messages. Spamhaus arose as one of the most respected and widely used DNSBLs, effectively blocking a huge percentage of daily spam volume.

    As open mail relays were shut, spammers turned to virus writers to create botnets that could be used to relay spam. Spamhaus expanded their operations to list the IPs of known botnets, trying to stay ahead of spammers. CloudFlare’s own history grew out ofย Project Honey Pot, which started as an automated service to track the resources used by spammers and publishes the HTTP:BL.

    Today, as Spamhaus’s success has eroded the business model of spammers, botnet operators are increasingly renting their networks to launch DDoS attacks. At the same time, DNSBLs proved that there were many functions that the DNS protocol could be used for, encouraging many people to tinker with installing their own DNS resolvers. Unfortunately, these DNS resolvers are often mis-configured and left open to abuse, making them the DDoS equivalent of the open mail relay.

    If you’re running a network, take a second to make sure you’ve closed any open resolvers before DDoS explodes into an even worse problem than it already is.

    Revealed – Iran Cyber Offense Posters

    Iran Cyber Offense Posters

     


    A sends:

    Oghab on IRAN Cyber Offense

    The following posters belong to IRGC, the Iranian offensive military wing. None are officially confidential but only certain people gets their hand to such information and only a very limited part of them get to actually go to these “meetings”. Both are related to development of asymmetric aeronautical weaponry specially using UAS-based approaches and development of “unconventional” SIGINT and ELINT infrastructure to direct attacks specifically on long-term targets. They differ from the usual military and intelligence systems that try to cover everything and usually turn up useless in asymmetric wars thus it is not a conventional Air Force subject and being considered mainly as CO/IRAF, an attack blade made of Cyber and Aerial Vectors. I don’t want to share my reasons for this semi-leak but I do have a clear message for people who are behind such efforts, specially one particular elite team who “run and execute” Iran’s CO (Cyber Offense) and their mastermind. Here is the message: You are not anonymous either, wanna keep going?

     


    Poster 1

    [Image]

    “Drones in Asymmetric warfare”
    Host: NAHAB research center, Imam Hussain University ( IRGC )
    Subjects: ELINT, Stealth technologies in UAS, Fast-acting Drones, UAS without GPS, Warfare capabilities in UAS, Enemy UAS detection, interception, landing, disruption.
    Meeting Format: Seminar plus talks
    Sponsors: IRGC, Aerial Industries, ROSHD, Air Force
    email: ech[at]ihu.ac.ir
    phones: 738 293 49 (land line), 0919 0084 069 (Cell), if you want to make calls add Iran and Tehran’s phone extension accordingly

    Note 1. Imam Hussain University is a Military university located in IRGC-owned area north-east Tehran and it also is a Military Base

     


    Poster 2

    [Image]

    “The Need to Develop {modern} Aerial weaponry for future Wars”
    Host: Technical Faculty, Imam Sadeq Base, Imam Hussain University (IRGC)
    Subjects: Modern Aerial Weapons, infrastructures required to build, Studies of offensive and defensive Doctrines, Planes with Payloads, Fast reacting Tactics
    Meeting Format: Military Conference
    Sponsors: IRGC, Air Force, AeroSpace Organization, Community of Research and Development of Air defense, the institute of Advanced defense tactics, Defense industries Organization, the Self-sufficiency Organization of IRGC Navy, Army
    email: acw91[at]ihu.ac.ir
    phone: 771 049 27 ( land line )

    Note 2. Among said participants, only the “Defense industries Organization” is listed by many international players as a banned and restricted target for business or communication

    Cryptome reveals – Internet Is a Spy State

    Internet Is a Spy State

     


    At 06:09 AM 3/18/2013, Eugen Leitl wrote on Cypherpunks:

    http://edition.cnn.com/2013/03/16/opinion/schneier-internet-surveillance/index.html

    The Internet is a surveillance state

    By Bruce Schneier, Special to CNN

    March 16, 2013 — Updated 1804 GMT (0204 HKT)

    STORY HIGHLIGHTS

    Bruce Schneier: Whether we like it or not, we’re being tracked all the time on the Internet

    Schneier: Our surveillance state is efficient beyond the wildest dreams of George Orwell

    He says governments and corporations are working together to keep things that way

    Schneier: Slap-on-the-wrist fines notwithstanding, no one is agitating for better privacy laws

    Editor’s note: Bruce Schneier is a security technologist and author of “Liars and Outliers: Enabling the Trust Society Needs to Survive.”

    __________

    Cryptome:

    That the Internet is a gigantic spying machine has been known since its invention, the security industry has made billions pretending to protect against its spying.

    Schneier has also written recently that security does not work, cannot work, that attackers are always going to excell over defenders, due to the economic incentives to attack being greater than those to defend.

    Long a top expert selling security services, what is Schneier up to with gloom and doom that is usually associated with selling snake oil — his favorite target. Has his amply promoted 24×7 services been defeated by attackers? Is he keeping that quiet? Is he about to be doxed, has been hit with a blackmail demand, or worse, his defenses compromised? Who else among the experts are colluding with this initiative to admit Internet deception from the git go?

    Recall that beloved Peter Neumann and others advocate chucking the current Internet and starting over with better security and privacy basic requirements. Uh huh, and what will take its place, will it be better or more snake oil? And what to do with all that stored data of the world’s greatest spying machine promoted with the complicity of Internet advocates and the security industry?

    Pardon, monsieur, foxes in the hen house, comes to mind.

    Schneier says in his security-is-doomed-to-fail piece a public discussion is needed on what to do, the experts don’t have answers. That’s a good start after years of experts promising to do better next time, meanwhile trust open source, trust us.

    Where does snake oil end and “something better” begin? Is something better ever not snake oil? Is a public discussion of an issue never not rigged in favor of the organizers? Is tumultous public discussion never not preamble to a coup justified as needed to control the mob who has gotten out of hand, who voted the wrong way, who attacked the leaders? Who hacked the experts?

    Coups are always justified as needed for security, and who Machiavelli’s the coup masters other than security and propaganda experts yearning to maintain privilege and reputation.

    Coups are not always obvious, the most effective are hardly noticed.

     


    DIE ZEIT รผber das Zitat “ausgeklรผgelte Schutzgeldsystem von Gomopa”

    Artikel Link

    http://www.zeit.de/2013/11/Finanznachrichtendienst-Gomopa

    FINANZNACHRICHTENDIENST GOMOPA”Jetzt du wieder! GruรŸ Klaus”

    Wie der Finanznachrichtendienst Gomopa gegen Betrรผger kรคmpft und dabei selbst dubiose Geschรคfte macht.

    Es war an einem Mittwochmittag im September 2012 in Berlin-Kreuzberg, als Klaus Maurischat, ein Eis in der Hand und einen Kollegen neben sich, รผber eine Brรผcke spazierte und brutal รผberfallen wurde. Drei schwarz vermummte Mรคnner griffen ihn an, sie schlugen ihn auf offener StraรŸe nieder und traten ihm ins Gesicht, dann liefen sie davon. Blutend schleppte sich Maurischat in sein Bรผro am Tempelhofer Ufer und rief die Polizei.

    Maurischat, 56, war wohl kein Zufallsopfer. Der Mann lebt gefรคhrlich. Er ist Chef einesย Finanznachrichtendienstes namens Gomopa, und er hat es sich zur Aufgabe gemacht, Anlagebetrรผgern und anderen Wirtschaftskriminellen auf die Spur zu kommen und auf seiner Internetseite vor ihnen zu warnen. So schafft man sich Feinde in einem Milieu, in dem es Geld im รœberfluss und wenig Skrupel gibt. Wer ihm die Schlรคger auf den Hals hetzte, ist nicht bekannt.

    ANZEIGE

    Eine der Firmen, mit denen sich Maurischat und seine Mitarbeiter in den vergangenen Jahren intensiv beschรคftigten, ist die Immobiliengruppe S&K mit Sitz in Frankfurt. Die Rechercheure von Gomopa hatten einen guten Riecher, denn auch die Strafverfolgungsbehรถrden nahmen die Firma ins Visier, und sie holten jรผngst zum groรŸen Schlag aus: Am 19. Februar durchsuchten nicht weniger als 1.200 Ermittlungsbeamte und 15 Staatsanwรคlte eine Frankfurter Jugendstilvilla und mehr als 130 Objekte in sieben Bundeslรคndern.

    Die Hauptverdรคchtigen wurden verhaftet, es sind der 33-jรคhrige Stephan Schรคfer und der 31-jรคhrige Jonas Kรถller, die beiden Chefs von S&K. Sie werden verdรคchtigt, ein betrรผgerisches Schneeballsystem aufgebaut und Geldanleger um einen dreistelligen Millionenbetrag betrogen zu haben. Das Geld soll unter anderem fรผr den exzessiven und extrem aufwendigen Lebensstil der Beschuldigten verwendet worden sein. Die Staatsanwaltschaft ermittelt in dem Fall gegen insgesamt 50 Personen, darunter sind auch Anwรคlte und Sachverstรคndige, die den Hauptverdรคchtigen zu Diensten waren.

    Fรผr Maurischat und seine Truppe kรถnnte der Triumph kaum grรถรŸer sein. Bereits im Mรคrz 2010 hatten sie vor S&K gewarnt. Fรผr ihre Berichterstattung waren die Rechercheure von der Frankfurter Firma mit Klagen รผberzogen worden. Auf der Internetseite des Finanznachrichtendienstes ist zu lesen: “Bis zur vorgestrigen Verhaftung von Schรคfer und seines Geschรคftspartners Jonas Kรถller wurden gegen GoMoPa.net insgesamt zwรถlf Klagen an vier Landgerichten (Stuttgart, Berlin, Kรถln und Frankfurt am Main) eingereicht und der Streitwert auf drei Millionen Euro hochgetrieben.” Man habe sich davon aber nicht schrecken lassen: “GoMoPa.net hielt stand.” Damit weckt der Fall S&K Sympathien fรผr ein Unternehmen, das sich gerne als eine Art Schutzpolizei fรผr Bรผrger und Anleger darstellt. “GoMoPa wurde mit dem Ziel gegrรผndet, durch aktive Aufklรคrung und permanente Transparenz nachhaltig zur Betrugsprรคvention in Wirtschaft und Gesellschaft beizutragen”, heiรŸt es auf der Website.

    Das klingt gut, wenn nicht: zu gut, um wahr zu sein. Recherchen derย ZEITย legen den Verdacht nahe, dass die selbst erklรคrten Saubermรคnner ebenfalls Dreck am Stecken haben kรถnnten. Es gibt Indizien fรผr systematisch betriebene Erpressungen.

    Gomopa steht fรผr Goldman, Morgenstern & Partners, der Hauptsitz des Unternehmens ist New York, aber mit der berรผhmten Investmentbank hat die Firma nichts zu tun. Bei der auf der Website angegebenen Adresse von Gomopa handelt es sich um ein Gebรคude an der Madison Avenue in Midtown Manhattan. Dort findet sich ein Business Center, eine Art Gemeinschaftsbรผro, wo sich Unternehmen Fax, Kopierer und Konferenzrรคume teilen. Bei einem Besuch vor Ort war niemand von Gomopa fรผr dieย ZEITย zu erreichen. Man solle einen Termin machen, sagte die Empfangsdame. Persรถnlich kenne sie niemanden von der Firma.

    Tatsรคchlich scheint Gomopa maรŸgeblich von Deutschland aus betrieben zu werden. Am Tempelhofer Ufer in Berlin-Kreuzberg hat eine Gomopa GmbH ihren Sitz, es handelt sich um eine Niederlassung der US-Firma.

    Ein ehemaliger freier Mitarbeiter der Firma beschreibt gegenรผber derย ZEITย den eigentlichen Zweck des Unternehmens als ein “ausgeklรผgeltes Schutzgeld-Geschรคftsmodell”.

    Seite 2/3:

    “Dann morgen unser abgesteckter positiv Artikel”

    Die Sache laufe so: “Entweder die betroffenen Unternehmen zahlen, oder Gomopa zerstรถrt ihren Ruf so grรผndlich, dass sie keine Geschรคfte mehr machen kรถnnen.”

    Das wรคre Erpressung. Um das zu kaschieren, zahle die erpresste Firma an Gomopa das Geld fรผr eine angebliche Dienstleistung, so der Exmitarbeiter. Oder sie beteilige sich sogar mit Kapital an Gomopa.

    Das Ganze spielt sich vor dem Hintergrund des sogenannten grauen Kapitalmarkts ab. Die dort tรคtigen Unternehmen werden nicht von Aufsichtsbehรถrden รผberwacht. Sie versprechen potenziellen Geldanlegern hohe Renditen, etwa mit Immobiliengeschรคften, Unternehmensbeteiligungen oder Edelsteinhandel. Auf die Risiken wird oft nur im Kleingedruckten hingewiesen. Ob die versprochene Rendite flieรŸt, zeigt sich hรคufig erst nach Jahren. Viele Unternehmen handeln legal, aber Abzocke und Betrรผgereien kommen hรคufig vor. Seriรถse Anbieter sind von unseriรถsen schwer zu unterscheiden.

    Fachorgane mit kritischen Experten, die in diesem Bereich fรผr Aufklรคrung sorgen, kรถnnen Anleger vor Schรคden bewahren, sind also eigentlich eine gute Sache. Es gibt aber offenbar auch ein anderes Geschรคftsmodell: Erfahrene Szenekenner durchleuchten Anlagefirmen und unterziehen sie einer stรคndigen kritischen Berichterstattung, sie lassen sich dann aber durch Geldzahlungen der betroffenen Unternehmen ruhigstellen. Dass dieses Geschรคftsmodell ganz besonders eintrรคglich sein kann, ergibt sich aus der Tatsache, dass gerade unentdeckte Anlagebetrรผger regelmรครŸig in Geld schwimmen und ein groรŸes Interesse daran haben, ihre Geschรคfte so lange wie mรถglich weiterzubetreiben.

    Im Fall S&K ging es damit los, dass dessen Chefs eine Reihe anonymer E-Mails erhielten, wie sie derย ZEITย vor ihrer Verhaftung berichteten. “Hallรถle ihr milchreisbubis!”, begann eine dieser Nachrichten. “Eure klitsche ist in einem jahr geschichte. was jetzt im internet auf euch traumtรคnzer und loser zukommt, ahnt ihr nicht. haut ab, solange es noch geht. das ist ein gutgemeinter rat und unsere letzte warnung.”

    Stephan Schรคfer behauptet, Maurischat habe zugegeben, dass er und ein Mann namens Wolfgang Zimmermann fรผr die anonymen Mails und auch fรผr anonyme Internetseiten gegen S&K verantwortlich seien. “Das ist eine Lรผge!”, schreibt Maurischat derย ZEIT.ย Nie habe er derlei getan, nie derlei zugegeben.

    Unstrittig ist, dass sich Maurischat und Schรคfer im September 2012 in der Gomopa-Niederlassung in Berlin trafen, um Differenzen auszurรคumen. Nach Maurischats Darstellung fรผhrte er damals mit Schรคfer Vergleichsverhandlungen. Der Immobilienunternehmer habe ihn, einen anderen Mann namens Zimmermann und Gomopa verleumdet und nach einer Unterlassungsklage eingewilligt, Schmerzensgeld zu leisten. รœberdies habe der S&K-Chef angeboten, sich bei dem Finanznachrichtendienst mit zwei Millionen Euro zu beteiligen.

    Obwohl es sich dabei um eine auรŸerordentlich merkwรผrdige Offerte handelte, war sie fรผr Maurischat durchaus akzeptabel: “Ich schlug ihm vor, wenn er das wolle, dann kรถnne er eine speziell dafรผr anzufertigende Teilhabererklรคrung unterzeichnen.”

    Das tat Schรคfer zwar nicht, aber er zahlte immerhin 200.000 Euro an Maurischat. Der leitete einen GroรŸteil des Geldes an Zimmermann und andere weiter und behielt 30.000 Euro.

    Am 22. Oktober schrieb Maurischat eine Mail an Schรคfer, in der es zum einen um dieses bereits gezahlte Geld ging und zum anderen um eine noch vorzunehmende Beteiligung Schรคfers an Gomopa. Diese Beteiligung hรคtte auch beeinflusst, wie รผber S&K auf GoMoPa.net berichtet worden wรคre. Das legt jedenfalls die Mail nahe, die der Anlegerschรผtzer schrieb.

    “Also, Teilhabervertrag unterschrieben zu mir und entsprechend handeln. Dann morgen unser abgesteckter positiv Artikel und die beiden o.a. Artikel sind auch weg”, so Maurischat an Schรคfer. Er bot an: “Meinetwegen schmeiรŸe ich sรคmtliche Artikel auch sofort und heute raus wenn mir der unterschriebene und in der Anlage befindliche Teilhabervertrag vorliegt und wir das zum Bestandteil unserer Vereinbarung machen!” Der Schluss dieser Mail spricht Bรคnde: “Jetzt du wieder! GruรŸ Klaus”.

    Nach der Zahlung seien Artikel รผber sein Unternehmen auf der Website von Gomopa zum Teil verschwunden und zum Teil durch positivere Berichte ersetzt worden, sagt Schรคfer. Maurischat behauptet heute, dass er einen Einstieg von S&K bei seinem Finanznachrichtendienst nur akzeptiert hรคtte, wenn sich die Immobilienfirma vorher von einem von ihm ausgewรคhlten Wirtschaftsprรผfer hรคtte begutachten lassen wollen. In der derย ZEITย vorliegenden “Beteiligungserklรคrung” steht davon allerdings nichts. Dafรผr findet sich dort diese Passage: Gomopa “wird nach Eingang der ersten Zahlung sรคmtliche S&K betreffenden Artikel vom Netz nehmen und neue Artikel รผber S&K nicht verรถffentlichen ohne diese mit S&K einvernehmlich abzusprechen”.

    Seite 3/3:

    So ist das in der Szene: Man schlรคgt sich โ€“ und vertrรคgt sich

    Klaus Maurischat verhandelte nach Unterlagen, die derย ZEITย vorliegen, auch mit einem Finanzunternehmer in Hamburg. Dabei ging es ebenfalls um einen Einstieg bei Gomopa. Und auch รผber diesen Mann und einen seiner Geschรคftspartner waren zuvor auf der Gomopa-Website kritische Beitrรคge erschienen.

    Der Mann lieรŸ sich auf die Sache ein. Der Gomopa-Chef habe ihm in einem mรผndlichen Gesprรคch klargemacht, dass die negativen Berichte nur gegen Geld ein Ende nehmen wรผrden, sagt der Hamburger Geschรคftsmann: “Zu zahlen erschien mir gรผnstiger, als sich auf einen Internetkrieg einzulassen.”

    Auch dieser Unternehmer bekam anonyme Mails. Bei einer stand in der Betreffzeile: “Kurz vor dem Konkurs?” Darunter folgten acht “รœberschriften, die auf Internetseiten Sie zukรผnftig begleiten kรถnnten”.

    Der Hamburger schrieb an Maurischat: “Ich (…) bestรคtige hiermit den verbindlichen Antrag auf Ankauf von 40 Stck./ in Worten vierzig Shares (Aktien)” an der Gomopa Control Inc. Der Sitz dieser Gomopa-Tochter ist Miami im US-Bundesstaat Florida. Vereinbart wurde eine Beteiligung in Hรถhe von 200000 Euro.

    Unstreitig ist, dass Gomopa im April 2012 von dem Hamburger Kaufmann 24750 Euro als erste Rate kassierte. Maurischat bestรคtigte ihm auch schriftlich den Eingang des Geldes und wies in dem Schreiben ausdrรผcklich darauf hin, dass diese Beteiligung in keinem Zusammenhang mit der Berichterstattung auf GoMoPa.net stehe, wie “bรถse Menschen” denken kรถnnten.

    Als der Unternehmer dann aber nicht die noch ausstehenden 175250 Euro รผberwies, bedrohte ihn Maurischat per Mail vom 9. Juli 2012: “Nochmals mache ich Sie darauf aufmerksam, dass ich Ihnen und sรคmtlichen Unternehmen an denen Sie beteiligt sind eigene Internetseiten widmen und รผber Ihre Geschรคftspraktiken aufklรคren werde, wenn Sie Ihren Verpflichtungen nicht nachkommen.” Er werde รผberdies “sรคmtliche Geschรคftsbanken Ihres Hauses informieren und รผber Ihr Unternehmen mehrfach auf unserer Plattform รถffentlich berichten”, drohte Maurischat. “Diese Meldungen gehen sodann an fast 60000 User und Vertriebe aus dem Finanzbereich!” Angeblich schauen jรคhrlich 8,4 Millionen Besucher auf der Gomopa-Website vorbei.

    Auch per SMS drohte Maurischat dem Kaufmann: “Bis zum Offenbarungseid oder zur Insolvenz werde ich Sie treiben. Zahlen Sie nicht, bereite ich Ihnen und Ihrer Firma einen Skandal โ€“ da denken Sie noch in 20 Jahren dran!”

    Maurischat gibt heute zu, diese Mails und Nachrichten “wahrscheinlich” geschrieben zu haben. Er sei “mehr als wรผtend” gewesen, weil der Hamburger ihm gegenรผber sein Kaufmannsehrenwort gebrochen habe. Nicht er habe dem Mann eine Beteiligung angeboten, sondern der habe ihn danach gefragt. Das zugesagte Geld sei fรผr ein neues Projekt seines Unternehmens fest eingeplant gewesen, sein Ausbleiben habe die Firma in ziemliche Schwierigkeiten gebracht.

    Derย ZEITย sind 14 weitere Firmen bekannt, die behaupten, im Zusammenhang mit Gomopa-Berichten zu Geldzahlungen genรถtigt worden zu sein. Sie haben Angst, genannt zu werden. “Gegen Gomopa haben Sie keine Chance”, sagt ein Unternehmer. “Auf deren Berichte wird im Internet geklickt. Egal ob die Fakten stimmen oder nicht.”

    Maurischat weist alle Anschuldigungen zurรผck. Gomopa mache die Berichterstattung im Internet nie von Geldzahlungen abhรคngig. Vielmehr werde er diffamiert von Leuten, “die von uns beim Betrรผgen und Lรผgen erwischt wurden”.

    รœber ihn selbst, der mal eine Lehre als GroรŸ- und Einzelhandelskaufmann gemacht hat, heiรŸt es auf der Gomopa-Website, dass er “die Methoden und Tricks des Marktes wie kaum ein anderer” kenne, und das ist sicher wahr. Dass er einschlรคgig vorbestraft ist, steht nicht da. Man erfรคhrt auf der Website auch nichts รผber die Verbindung mit dem 60-jรคhrigen Wolfgang Zimmermann, einer ebenfalls schillernden Figur der Szene.

    Zimmermann steht hinter einer Firma namens Confidential Business mit Sitz in Panama. Er taucht oft dann bei Unternehmen auf, wenn diese wegen Artikeln auf GoMoPa.net und anonymen Internetseiten unter Druck stehen. Zimmermann bietet an, das Problem gegen eine Geldzahlung zu lรถsen. Seine Dienstleistungen hat er in einem Werbebrief an das Frankfurter Immobilienunternehmen S&K (etwas ungelenk) so beschrieben: “Ich gebe meiner Klientel รคuรŸerst aggressive, aber legale Waffen und Mittel zu Hand.”

    Wie Maurischat und Zimmermann zusammenarbeiten, das geht unter anderem aus einer derย ZEITย vorliegenden Mail hervor, die Zimmermann an einen Finanzunternehmer geschrieben hat. Darin droht er: “Wir stellen weitere Anzeigen. Bis Sie am Ende sind.” Gomopa leiste “echt gute Arbeit”, schreibt Zimmermann und fรผgt hinzu: “Die kรถnnen Sie nicht abstellen, da haben Sie keine Chance mehr. (…) Sie wollten ja nicht zahlen.”

    Zimmermann hat sich zu keinem der Vorwรผrfe geรคuรŸert. Dass mit ihm nicht zu spaรŸen ist, hat auch Maurischat erfahren. Zwischen ihm und Zimmermann habe es einen jahrelangen Streit und “Internetkrieg” gegeben, schreibt er derย ZEIT.“Auf diversen, anonym ins Internet gestellten Webseiten wurden Mitarbeiter und ich unter anderem als Pรคderasten, Gewohnheitsverbrecher und Kinderschรคnder bezeichnet.” 2006 habe man den “Krieg” mithilfe eines Anwalts beendet. Dann sei “Ruhe eingekehrt”. So ist das in der Szene: Man schlรคgt sich โ€“ und vertrรคgt sich.

    MDR – Ex-Stasi-Leute – Kontakte zur kriminellen Szene – Amtrรคger korrumpiert…

    Landtags-Untersuchungsausschuss in SachsenHatten Ex-Stasi-Leute Kontakte zur kriminellen Szene?

    Der Landesverfassungsschutz Sachsen hatte offenbar Hinweise auf Verbindungen frรผherer Mitarbeiter der DDR-Staatssicherheit zur Organisierten Kriminalitรคt. Das erklรคrte die frรผhere Referatsleiterin Simone Skroch (frรผher Henneck) am Freitag im Landtags-Untersuchungsausschuss zu kriminellen und korruptiven Netzwerken in Sachsen. Die Informationen stammten von mehreren und voneinander unabhรคngigen Quellen.

    Halfen Ex-Stasi-Leute bei der “Verfรผhrung” von Amtspersonen?

    Die einstige Referatsleiterin im Landesamt fรผr Verfassungsschutz, Simone Henneck, sagt am 09.01.2013 in Dresden (Sachsen) vor dem Untersuchungsausschuss des Sรคchsischen Landtages aus.

    Die frรผhere Leiterin der Geheimdienstabteilung fรผr Organisierte Kriminalitรคt gab am Freitag neue Details preis.

    Wie die Hauptzeugin des Ausschusses erlรคuterte, gab es diesen Hinweisen zufolge zahlreiche Kontakte zwischen teils hochrangigen Ex-Stasi-Mitarbeitern und Vertretern der regionalen und internationalen Organisierten Kriminalitรคt in den Bereichen Wirtschaft und รถffentliche Verwaltung sowie im Rotlichtmilieu. Ihr Ziel: Angestellte, Beamte, Politiker und andere Vertreter des รถffentlichen Lebens zielgerichtet in verfรคngliche Situationen zu bringen, mit denen man sie spรคter hรคtte erpressen kรถnnen. Dazu zรคhlten Skroch zufolge auch Bestechung und Korruption. Die Juristin bezog sich dabei auf das Wirken der Organisierten Kriminalitรคt im Raum Chemnitz, Zwickau und Vogtland.

    Vom “Sachsensumpf” zur “Aktenaffรคre”

    Die Hinweise zu mรถglichen kriminellen Netzwerken in Sachsen waren 2007 erstmals aufgetaucht. Grundlage war eine Datensammlung des sรคchsischen Geheimdienstes. Die Vorwรผrfe reichten von Amtsmissbrauch รผber Kinderprostitution bis zur Bandenkriminalitรคt. Darin sollten auch Juristen und Polizisten verstrickt sein. Ermittlungen externer Prรผfer und der Staatsanwaltschaft Dresden entkrรคfteten jedoch die Vorwรผrfe, die Ermittlungen gegen die Beschuldigten wurden eingestellt. Stattdessen wurde Skroch vorgeworfen, Akten aufgebauscht zu haben. Sie bestreitet das vehement und erhob bei ihrer Befragung am Freitag erneut schwere Vorwรผrfe gegen die frรผhere Chefetage des Verfassungsschutzamts.

    Bereits im Januar hatte Skroch vor dem Ausschuss erklรคrt, dass zahlreiche Dokumente รผber die Begegnung von Informanten mit Geheimdienstlern verschwunden seien. Jetzt รคuรŸerte sie die Vermutung, dass ihr Panzerschrank wรคhrend einer Urlaubsreise im Juni 2007 geรถffnet wurde. Zudem warf sie ihren damaligen Vorgesetzten vor, sie nicht rechtzeitig รผber ein gegen sie laufendes Disziplinarverfahren informiert zu haben.

    Der aktuelle Untersuchungs-Ausschuss wurde 2010 auf Antrag der Opposition eingesetzt, weil nach ihrer Ansicht im Abschlussbericht des vorherigen Gremiums zu viel Fragen offen gebelieben waren.

    http://www.mdr.de/sachsen/sachsensumpf116.html

    Die Sรผddeutsche Zeitung รผber “GoMoPa” und die Zahlungen von S&K

    http://www.sueddeutsche.de/geld/mutmassliche-anlagebetrueger-sk-die-akte-midas-1.1620191-4

    TOP-SECRET – Report of the Ministry of Defense about Nuclear Weapons and their misconduct through Cyberterrorists

    dsbcover

     

    TOP-SECRET – Report of the Ministry of Defense about Nuclear Weapons and their misconduct through Cyberterrorists

    CTO Vision writes:

    Bottom Line Up Front:ย After reviewing all available evidence and rigorously weighing threat information, a Task Force of the Defense Science Board (DSB) concludes that:

    The United States cannot be confident that our critical Information Technology (IT) systems will work under attack from a sophisticated and well-resourced opponent.ย 

    How does that make you feel? You know yourself what adversaries are doing when it comes to intellectual property theft. Now read on for more about what the DSB sees as the threat to military systems.

    Here are more details:ย 

    The Defense Science Board (DSB) provides advice,ย assessmentsย and reports as chartered by DoD leadership. It has studied cyber security and related topics for years and has been instrumental in providing new ideas and perspectives for action by DoD leadership.

    The DSB was recently chartered to look at an interesting and somewhat intellectually stimulating topic, that of how US military systems could withstand cyber attack and remain able to execute their mission. ย The chartered group, a task force onย Resilientย Military Systems, produced a report with a set of recommendations designed to improve DoDโ€™s ability to accomplish its missions. The overarching strategy recommended by the DSB is one that enhanced the departmentโ€™s defenses in the face of attacks, decreases the effectiveness of adversaries, increases the cost to adversaries, and deters the most significant adversaries by ensuring the US maintains the ability to deliver desired mission capabilities in the face of catastrophic cyber attack.

    The task force also identified a framework to implement metrics collection systems and then develop appropriate performance metrics that can be used to shape DoDโ€™s investment decisions. The report approved by DSB chairman Paul Kaminsky is atย http://www.acq.osd.mil/dsb/reports2010s.htm. It is also available at:ย Resilient Military Systems and the Advanced Cyber Threat.

    Here is more from the forwarding letter to the report:

    The final report of the DSB Task Force on Resilient Military Systems is attached. This report is based on the perspective of 24 Task Force members who received more than 50 briefings from practitioners and senior officials throughout the Department of Defense (DoD), Intelligence Community (IC), commercial sector, academia, national laboratories, and policymakers. This Task Force was asked to review and make recommendations to improve the resilience of DoD systems to cyber attacks, and to develop a set of metrics that the Department could use to track progress and shape investment priorities.

    After conducting an 18-month study, this Task Force concluded that the cyber threat is serious and that the United States cannot be confident that our critical Information Technology (IT) systems will work under attack from a sophisticated and well-resourced opponent utilizing cyber capabilities in combination with all of their military and intelligence capabilities (a โ€œfull spectrumโ€ adversary). While this is also true for others (e.g. Allies, rivals, and public/private networks), this Task Force strongly believes the DoD needs to take the lead and build an effective response to measurably increase confidence in the IT systems we depend on (public and private) and at the same time decrease a would-be attackerโ€™s confidence in the effectiveness of their capabilities to compromise DoD systems. This conclusion was developed upon several factors, including the success adversaries have had penetrating our networks; the relative ease that our Red Teams have in disrupting, or completely beating, our forces in exercises using exploits available on the Internet; and the weak cyber hygiene position of DoD networks and systems. The Task Force believes that the recommendations of this report create the basis for a strategy to address this broad and pervasive threat.

    Nearly every conceivable component within DoD is networked. These networked systems and components are inextricably linked to the Departmentโ€™s ability to project military force and the associated mission assurance. Yet, DoDโ€™s networks are built on inherently insecure architectures that are composed of, and increasingly using, foreign parts. While DoD takes great care to secure the use and operation of the โ€œhardwareโ€ of its weapon systems, the same level of resource and attention is not spent on the complex network of information technology (IT) systems that are used to support and operate those weapons or critical IT capabilities embedded within them.

    DoDโ€™s dependence on this vulnerable technology is a magnet to U.S. opponents. In fact, DoD and its contractor base have already sustained staggering losses of system design information incorporating decades of combat knowledge and experience that provide adversaries insight to technical designs and system use. Despite numerous DoD actions, efforts are fragmented, and the Department is not currently prepared to mitigate the threat.

    That forwarding letter was signed by the task force co-chairs, Mr. Lewis Von Thaer and Mr. James R. Gosler, two of the most professional, well thought out leaders I have ever worked with.

    Please dive deep into the full document now. You will find some information you already know, but I promise some surprises as well.

     

     

     

    DOWNLOAD THE ORIGINAL REPORT AT THE LINK BELOW

    Click to access ResilientMilitarySystems.CyberThreat.pdf

    Cryptome – NIST RFI Critical Infrastructure Cybersecurity

    NIST Framework to Improve Critical Infrastructure Cybersecurity

     


    [Federal Register Volume 78, Number 38 (Tuesday, February 26, 2013)]
    [Notices]
    [Pages 13024-13028]
    From the Federal Register Online via the Government Printing Office [www.gpo.gov]
    [FR Doc No: 2013-04413]
    
    -----------------------------------------------------------------------
    
    DEPARTMENT OF COMMERCE
    
    National Institute of Standards and Technology
    
    [Docket Number 130208119-3119-01]
    
    Developing a Framework To Improve Critical Infrastructure 
    Cybersecurity
    
    AGENCY: National Institute of Standards and Technology, U.S. Department 
    of Commerce.
    
    ACTION: Notice; Request for Information (RFI).
    
    -----------------------------------------------------------------------
    
    SUMMARY: The National Institute of Standards and Technology (NIST) is 
    conducting a comprehensive review to develop a framework to reduce 
    cyber risks to critical infrastructure \1\ (the ``Cybersecurity 
    Framework'' or ``Framework''). The Framework will consist of standards, 
    methodologies, procedures, and processes that align policy, business, 
    and technological approaches to address cyber risks.
    ---------------------------------------------------------------------------
    
        \1\ For the purposes of this RFI the term ``critical 
    infrastructure'' has the meaning given the term in 42 U.S.C. 
    5195c(e), ``systems and assets, whether physical or virtual, so 
    vital to the United States that the incapacity or destruction of 
    such systems and assets would have a debilitating impact on 
    security, national economic security, national public health or 
    safety, or any combination of those matters.''
    ---------------------------------------------------------------------------
    
        This RFI requests information to help identify, refine, and guide 
    the many interrelated considerations, challenges, and efforts needed to 
    develop the Framework. In developing the Cybersecurity Framework, NIST 
    will consult with the Secretary of Homeland Security, the National 
    Security Agency, Sector-Specific Agencies and other interested agencies 
    including the Office of Management and Budget, owners and operators of 
    critical infrastructure, and other stakeholders including other 
    relevant agencies, independent regulatory agencies, State, local, 
    territorial and tribal governments. The Framework will be developed 
    through an open public review and comment process that will include 
    workshops and other opportunities to provide input.
    
    DATES: Comments must be received by 5:00 p.m. Eastern time on Monday, 
    April 8, 2013.
    
    ADDRESSES: Written comments may be submitted by mail to Diane 
    Honeycutt, National Institute of Standards and Technology, 100 Bureau 
    Drive, Stop 8930, Gaithersburg, MD 20899. Submissions may be in any of 
    the following formats: HTML, ASCII, Word, RTF, or PDF. Online 
    submissions in electronic form may be sent to cyberframework@nist.gov. 
    Please submit comments only and include your name, company name (if 
    any), and cite
    
    [[Page 13025]]
    
    ``Developing a Framework to Improve Critical Infrastructure 
    Cybersecurity'' in all correspondence. All comments received by the 
    deadline will be posted at http://csrc.nist.gov without change or 
    redaction, so commenters should not include information they do not 
    wish to be posted (e.g., personal or confidential business 
    information).
    
    FOR FURTHER INFORMATION CONTACT: For questions about this RFI contact: 
    Adam Sedgewick, U.S. Department of Commerce, 1401 Constitution Avenue 
    NW., Washington, DC 20230, telephone (202) 482-0788, email 
    Adam.Sedgewick@nist.gov. Please direct media inquiries to NIST's Office 
    of Public Affairs at (301) 975-NIST.
    
    SUPPLEMENTARY INFORMATION: The national and economic security of the 
    United States depends on the reliable functioning of critical 
    infrastructure, which has become increasingly dependent on information 
    technology. Recent trends demonstrate the need for improved 
    capabilities for defending against malicious cyber activity. Such 
    activity is increasing and its consequences can range from theft 
    through disruption to destruction. Steps must be taken to enhance 
    existing efforts to increase the protection and resilience of this 
    infrastructure, while maintaining a cyber environment that encourages 
    efficiency, innovation, and economic prosperity, while protecting 
    privacy and civil liberties.
        Under Executive Order 13636 \2\ (``Executive Order''), the 
    Secretary of Commerce is tasked to direct the Director of NIST to 
    develop a framework for reducing cyber risks to critical infrastructure 
    (the ``Cybersecurity Framework'' or ``Framework''). The Framework will 
    consist of standards, methodologies, procedures and processes that 
    align policy, business, and technological approaches to address cyber 
    risks. The Department of Homeland Security, in coordination with 
    sector-specific agencies, will then establish a voluntary program to 
    support the adoption of the Cybersecurity Framework by owners and 
    operators of critical infrastructure and any other interested entities.
    ---------------------------------------------------------------------------
    
        \2\ ``Executive Order 13636--Improving Critical Infrastructure 
    Cybersecurity'' 78 FR 11739 (February 19, 2013).
    ---------------------------------------------------------------------------
    
        Given the diversity of sectors in critical infrastructure, the 
    Framework development process is designed to initially identify cross-
    sector security standards and guidelines that are immediately 
    applicable or likely to be applicable to critical infrastructure, to 
    increase visibility and adoption of those standards and guidelines, and 
    to find potential gaps (i.e., where standards/guidelines are 
    nonexistent or where existing standards/guidelines are inadequate) that 
    need to be addressed through collaboration with industry and industry-
    led standards bodies. The Framework will incorporate voluntary 
    consensus standards and industry best practices to the fullest extent 
    possible and will be consistent with voluntary international consensus-
    based standards when such international standards will advance the 
    objectives of the Executive Order. The Framework would be designed to 
    be compatible with existing regulatory authorities and regulations.
        The Cybersecurity Framework will provide a prioritized, flexible, 
    repeatable, performance-based, and cost-effective approach, including 
    information security measures and controls to help owners and operators 
    of critical infrastructure and other interested entities to identify, 
    assess, and manage cybersecurity-related risk while protecting business 
    confidentiality, individual privacy and civil liberties. To enable 
    technical innovation and account for organizational differences, the 
    Cybersecurity Framework will not prescribe particular technological 
    solutions or specifications. It will include guidance for measuring the 
    performance of an entity in implementing the Cybersecurity Framework 
    and will include methodologies to identify and mitigate impacts of the 
    Framework and associated information security measures and controls on 
    business confidentiality and to protect individual privacy and civil 
    liberties.
        As a non-regulatory Federal agency, NIST will develop the Framework 
    in a manner that is consistent with its mission to promote U.S. 
    innovation and industrial competitiveness through the development of 
    standards and guidelines in consultation with stakeholders in both 
    government and industry. While the focus will be on the Nation's 
    critical infrastructure, the Framework will be developed in a manner to 
    promote wide adoption of practices to increase cybersecurity across all 
    sectors and industry types. In its first year, the emphasis will be on 
    finding commonality within and across the affected sectors. It will 
    seek to provide owners and operators the ability to implement security 
    practices in the most effective manner while allowing organizations to 
    express requirements to multiple authorities and regulators. Issues 
    relating to harmonization of existing relevant standards and 
    integration with existing frameworks will also be considered in this 
    initial stage.
        In accordance with the Executive Order, the Secretary of Commerce 
    has directed the Director of the National Institute of Standards and 
    Technology (the Director) to coordinate the development of a Framework 
    to reduce the cyber risks to critical infrastructure. The Cybersecurity 
    Framework will incorporate existing consensus-based standards to the 
    fullest extent possible, consistent with requirements of the National 
    Technology Transfer and Advancement Act of 1995,\3\ and guidance 
    provided by Office of Management and Budget Circular A-119, ``Federal 
    Participation in the Development and Use of Voluntary Consensus 
    Standards and in Conformity Assessment Activities.'' \4\ Principles 
    articulated in the Executive Office of the President memorandum M-12-08 
    ``Principles for Federal Engagement in Standards Activities to Address 
    National Priorities'' \5\ will be followed. The Framework should also 
    be consistent with, and support the broad policy goals of, the 
    Administration's 2010 ``National Security Strategy,'' 2011 ``Cyberspace 
    Policy Review,'' ``International Strategy for Cyberspace'' of May 2010 
    and HSPD-7 ``Critical Infrastructure Identification, Prioritization, 
    and Protection.''
    ---------------------------------------------------------------------------
    
        \3\ Public Law 104-113 (1996), codified in relevant part at 15 
    U.S.C. 272(b).
        \4\ http://standards.gov/a119.cfm.
        \5\ http://www.whitehouse.gov/sites/default/files/omb/memoranda/2012/m-12-08_1.pdf.
    ---------------------------------------------------------------------------
    
        The goals of the Framework development process will be: (i) To 
    identify existing cybersecurity standards, guidelines, frameworks, and 
    best practices that are applicable to increase the security of critical 
    infrastructure sectors and other interested entities; (ii) to specify 
    high-priority gaps for which new or revised standards are needed; and 
    (iii) to collaboratively develop action plans by which these gaps can 
    be addressed. It is contemplated that the development process will have 
    requisite stages to allow for continuing engagement with the owners and 
    operators of critical infrastructure, and other industry, academic, and 
    government stakeholders.
        In December 2011, the United States Government Accountability 
    Office (GAO) issued a report titled ``CRITICAL INFRASTRUCTURE 
    PROTECTION: Cybersecurity Guidance Is Available, but More Can Be Done 
    to Promote Its Use.'' \6\ In its report, GAO found similarities in 
    cybersecurity guidance across sectors, and recommended
    
    [[Page 13026]]
    
    promoting existing guidance to assist individual entities within a 
    sector in ``identifying the guidance that is most applicable and 
    effective in improving their security posture.'' \7\
    ---------------------------------------------------------------------------
    
        \6\ http://www.gao.gov/assets/590/587529.pdf.
        \7\ Id., at page 46.
    ---------------------------------------------------------------------------
    
        NIST believes the diversity of business and mission needs 
    notwithstanding, there are core cybersecurity practices that can be 
    identified and that will be applicable to a diversity of sectors and a 
    spectrum of quickly evolving threats. Identifying such core practices 
    will be a focus of the Framework development process.
        In order to be effective in protecting the information and 
    information systems that are a part of the U.S. critical 
    infrastructure, NIST believes the Framework should have a number of 
    general properties or characteristics. The Framework should include 
    flexible, extensible, scalable, and technology-independent standards, 
    guidelines, and best practices, that provide:
         A consultative process to assess the cybersecurity-related 
    risks to organizational missions and business functions;
         A menu of management, operational, and technical security 
    controls, including policies and processes, available to address a 
    range of threats and protect privacy and civil liberties;
         A consultative process to identify the security controls 
    that would adequately address risks \8\ that have been assessed and to 
    protect data and information being processed, stored, and transmitted 
    by organizational information systems;
    ---------------------------------------------------------------------------
    
        \8\ Organizational risk responses can include, for example, risk 
    acceptance, risk rejection, risk mitigation, risk sharing, or risk 
    transfer.
    ---------------------------------------------------------------------------
    
         Metrics, methods, and procedures that can be used to 
    assess and monitor, on an ongoing or continuous basis, the 
    effectiveness of security controls that are selected and deployed in 
    organizational information systems and environments in which those 
    systems operate and available processes that can be used to facilitate 
    continuous improvement in such controls; \9\
    ---------------------------------------------------------------------------
    
        \9\ Assessments determine whether the security controls selected 
    by an organization are implemented correctly, operating as intended, 
    and producing the desired results in order to enforce organizational 
    security policies.
    ---------------------------------------------------------------------------
    
         A comprehensive risk management approach that provides the 
    ability to assess, respond to, and monitor information security-related 
    risks and provide senior leaders/executives with the kinds of necessary 
    information sets that help them to make ongoing risk-based decisions;
         A menu of privacy controls necessary to protect privacy 
    and civil liberties.
        Within eight months, the Executive Order requires NIST to publish 
    for additional comment a draft Framework that clearly outlines areas of 
    focus and provides preliminary lists of standards, guidelines and best 
    practices that fall within that outline. The draft will also include 
    initial conclusions for additional public comment. The draft Framework 
    will build on NIST's ongoing work with cybersecurity standards and 
    guidelines for the Smart Grid, Identity Management, Federal Information 
    Security Management Act (FISMA) implementation, the Electricity 
    Subsector Cybersecurity Capability Maturity Model, and related 
    projects.
        NIST intends to engage with critical infrastructure stakeholders, 
    through a voluntary consensus-based process, to develop the standards, 
    guidelines and best practices that will comprise the Framework. This 
    will include interactive workshops with industry and academia, along 
    with other forms of outreach. NIST believes that the Framework cannot 
    be static, but must be a living document that allows for ongoing 
    consultation in order to address constantly evolving risks to critical 
    infrastructure cybersecurity. A voluntary consensus standards-based 
    approach will facilitate the ability of critical infrastructure owners 
    and operators to manage such risks, and to implement alternate 
    solutions from the bottom up with interoperability, scalability, and 
    reliability as key attributes.
        A standards-based Framework will also help provide some of the 
    measures necessary to understand the effectiveness of critical 
    infrastructure protection, and track changes over time. DHS and Sector 
    Specific Agencies will provide input in this area based on their 
    engagement with sector stakeholders. This standards-based approach is 
    necessary in order to be able to provide and analyze data from 
    different sources that can directly support risk-based decision-making. 
    A Framework without sufficient standards and associated conformity 
    assessment programs could impede future innovation in security efforts 
    for critical infrastructure by potentially creating a false sense of 
    security.
        The use of widely-accepted standards is also necessary to enable 
    economies of scale and scope to help create competitive markets in 
    which competition is driven by market need and products that meet that 
    market need through combinations of price, quality, performance, and 
    value to consumers. Market competition then promotes faster diffusion 
    of these technologies and realization of many benefits throughout these 
    sectors.
        It is anticipated that the Framework will: (i) Include 
    consideration of sustainable approaches for assessing conformity to 
    identified standards and guidelines; (ii) assist in the selection and 
    development of an optimal conformity assessment approach; and (iii) 
    facilitate the implementation of selected approach(es) that could cover 
    technology varying in scope from individual devices or components to 
    large-scale organizational operations. The decisions on the type, 
    independence and technical rigor of these conformity assessment 
    approaches should be risk-based. The need for confidence in conformity 
    must be balanced with cost to the public and private sectors, including 
    their international operations and legal obligations. Successful 
    conformity assessment programs provide the needed level of confidence, 
    are efficient and have a sustainable and scalable business case.
        This RFI is looking for current adoption rates and related 
    information for particular standards, guidelines, best practices, and 
    frameworks to determine applicability throughout the critical 
    infrastructure sectors. The RFI asks for stakeholders to submit ideas, 
    based on their experience and mission/business needs, to assist in 
    prioritizing the work of the Framework, as well as highlighting 
    relevant performance needs of their respective sectors.
        For the purposes of this notice and the Framework, the term 
    ``standards'' and the phrase ``standards setting'' are used in a 
    generic manner to include both standards development and conformity 
    assessment development. In addition to critical infrastructure owners 
    and operators, NIST invites Federal agencies, state, local, territorial 
    and tribal governments, standard-setting organizations,\10\ other 
    members of industry, consumers, solution providers, and other 
    stakeholders to respond.
    ---------------------------------------------------------------------------
    
        \10\ As used herein, ``standard-setting organizations'' refers 
    to the wide cross section of organizations that are involved in the 
    development of standards and specifications, both domestically and 
    abroad.
    ---------------------------------------------------------------------------
    
    Request for Comment
    
        The following questions cover the major areas about which NIST 
    seeks comment. The questions are not intended to limit the topics that 
    may be addressed. Responses may include any topic believed to have 
    implications for the development of the Framework
    
    [[Page 13027]]
    
    regardless of whether the topic is included in this document.
        While the Framework will be focused on critical infrastructure, 
    given the broad diversity of sectors that may include parts of critical 
    infrastructure, the evolving nature of the classification of critical 
    infrastructure based on risk, and the intention to involve a broad set 
    of stakeholders in development of the Framework, the RFI will generally 
    use the broader term ``organizations'' when seeking information.
        Comments containing references, studies, research, and other 
    empirical data that are not widely published should include copies of 
    the referenced materials. Do not include in comments or otherwise 
    submit proprietary or confidential information, as all comments 
    received by the deadline will be made available publically at http://csrc.nist.gov/.
    
    Current Risk Management Practices
    
        NIST solicits information about how organizations assess risk; how 
    cybersecurity factors into that risk assessment; the current usage of 
    existing cybersecurity frameworks, standards, and guidelines; and other 
    management practices related to cybersecurity. In addition, NIST is 
    interested in understanding whether particular frameworks, standards, 
    guidelines, and/or best practices are mandated by legal or regulatory 
    requirements and the challenges organizations perceive in meeting such 
    requirements. This will assist in NIST's goal of developing a Framework 
    that includes and identifies common practices across sectors.
        1. What do organizations see as the greatest challenges in 
    improving cybersecurity practices across critical infrastructure?
        2. What do organizations see as the greatest challenges in 
    developing a cross-sector standards-based Framework for critical 
    infrastructure?
        3. Describe your organization's policies and procedures governing 
    risk generally and cybersecurity risk specifically. How does senior 
    management communicate and oversee these policies and procedures?
        4. Where do organizations locate their cybersecurity risk 
    management program/office?
        5. How do organizations define and assess risk generally and 
    cybersecurity risk specifically?
        6. To what extent is cybersecurity risk incorporated into 
    organizations' overarching enterprise risk management?
        7. What standards, guidelines, best practices, and tools are 
    organizations using to understand, measure, and manage risk at the 
    management, operational, and technical levels?
        8. What are the current regulatory and regulatory reporting 
    requirements in the United States (e.g. local, state, national, and 
    other) for organizations relating to cybersecurity?
        9. What organizational critical assets are interdependent upon 
    other critical physical and information infrastructures, including 
    telecommunications, energy, financial services, water, and 
    transportation sectors?
        10. What performance goals do organizations adopt to ensure their 
    ability to provide essential services while managing cybersecurity 
    risk?
        11. If your organization is required to report to more than one 
    regulatory body, what information does your organization report and 
    what has been your organization's reporting experience?
        12. What role(s) do or should national/international standards and 
    organizations that develop national/international standards play in 
    critical infrastructure cybersecurity conformity assessment?
    
    Use of Frameworks, Standards, Guidelines, and Best Practices
    
        As set forth in the Executive Order, the Framework will consist of 
    standards, guidelines, and/or best practices that promote the 
    protection of information and information systems supporting 
    organizational missions and business functions.
        NIST seeks comments on the applicability of existing publications 
    to address cybersecurity needs, including, but not limited to the 
    documents developed by: international standards organizations; U.S. 
    Government Agencies and organizations; State regulators or Public 
    Utility Commissions; Industry and industry associations; other 
    Governments, and non-profits and other non-government organizations.
        NIST is seeking information on the current usage of these existing 
    approaches throughout industry, the robustness and applicability of 
    these frameworks and standards, and what would encourage their 
    increased usage. Please provide information related to the following:
        1. What additional approaches already exist?
        2. Which of these approaches apply across sectors?
        3. Which organizations use these approaches?
        4. What, if any, are the limitations of using such approaches?
        5. What, if any, modifications could make these approaches more 
    useful?
        6. How do these approaches take into account sector-specific needs?
        7. When using an existing framework, should there be a related 
    sector-specific standards development process or voluntary program?
        8. What can the role of sector-specific agencies and related sector 
    coordinating councils be in developing and promoting the use of these 
    approaches?
        9. What other outreach efforts would be helpful?
    
    Specific Industry Practices
    
        In addition to the approaches above, NIST is interested in 
    identifying core practices that are broadly applicable across sectors 
    and throughout industry.
        NIST is interested in information on the adoption of the following 
    practices as they pertain to critical infrastructure components:
         Separation of business from operational systems;
         Use of encryption and key management;
         Identification and authorization of users accessing 
    systems;
         Asset identification and management;
         Monitoring and incident detection tools and capabilities;
         Incident handling policies and procedures;
         Mission/system resiliency practices;
         Security engineering practices;
         Privacy and civil liberties protection.
        1. Are these practices widely used throughout critical 
    infrastructure and industry?
        2. How do these practices relate to existing international 
    standards and practices?
        3. Which of these practices do commenters see as being the most 
    critical for the secure operation of critical infrastructure?
        4. Are some of these practices not applicable for business or 
    mission needs within particular sectors?
        5. Which of these practices pose the most significant 
    implementation challenge?
        6. How are standards or guidelines utilized by organizations in the 
    implementation of these practices?
        7. Do organizations have a methodology in place for the proper 
    allocation of business resources to invest in, create, and maintain IT 
    standards?
        8. Do organizations have a formal escalation process to address 
    cybersecurity risks that suddenly increase in severity?
    
    [[Page 13028]]
    
        9. What risks to privacy and civil liberties do commenters perceive 
    in the application of these practices?
        10. What are the international implications of this Framework on 
    your global business or in policymaking in other countries?
        11. How should any risks to privacy and civil liberties be managed?
        12. In addition to the practices noted above, are there other core 
    practices that should be considered for inclusion in the Framework?
    
        Dated: February 21, 2013.
    Patrick Gallagher,
    Under Secretary of Commerce for Standards and Technology.
    [FR Doc. 2013-04413 Filed 2-25-13; 8:45 am]
    BILLING CODE 3510-13-P

    Manager Magazin – “GoMoPa” erhielt โ‚ฌ 200.000,- von S&K – deklariert als “Schutzgeldzahlung”

    http://www.manager-magazin.de/unternehmen/artikel/0,2828,886846,00.html

    obs Maurischat Gericht 6.8.2012 Frankfurt 23

    “GoMoPa-Prรคsident Klaus Maurischat”

    obs Maurischat Gericht 6.8.2012 Frankfurt 28

    “GoMoPa-Prรคsident Klaus Maurischat”

    FBI Director Robert Muller – The Cyber Threat: Planning for the Way Ahead

     

    Director Mueller at RSA
    ย Director Mueller speaks to cyber security professionals in San Francisco. Read text of his remarks.

    The Cyber Threat
    Planning for the Way Ahead

     

    Denial of service attacks, network intrusions, state-sponsored hackers bent on compromising our national security: The cyber threat is growing, and in response, said FBI Director Robert S. Mueller, the Bureau must continue to strengthen its partnerships with other government agencies and private industryโ€”and take the fight to the criminals.

     

    โ€œNetwork intrusions pose urgent threats to our national security and to our economy,โ€ Mueller told a group of cyber security professionals in San Francisco today. โ€œIf we are to confront these threats successfully,โ€ he explained, โ€œwe must adopt a unified approachโ€ that promotes partnerships and intelligence sharingโ€”in the same way we responded to terrorism after the 9/11 attacks.

     

    Padlocks graphic

    Focus on Hackers and Intrusions

    The FBI over the past year has put in place an initiative to uncover and investigate web-based intrusion attacks and develop a cadre of specially trained computer scientists able to extract hackersโ€™ digital signatures from mountains of malicious code. Learn more

    The FBI learned after 9/11 that โ€œour mission was to use our skills and resources to identify terrorist threats and to find ways of disrupting those threats,โ€ Mueller said. โ€œThis has been the mindset at the heart of every terrorism investigation since then, and it must be true of every case in the cyber arena as well.โ€

     

    Partnerships that ensure the seamless flow of intelligence are critical in the fight against cyber crime, he explained. Within government, the National Cyber Investigative Joint Task Force, which comprises 19 separate agencies, serves as a focal point for cyber threat information. But private industryโ€”a major victim of cyber intrusionsโ€”must also be โ€œan essential partner,โ€ Mueller said, pointing to several successful initiatives.

     

    The National Cyber Forensics and Training Alliance, for example, is a model for collaboration between private industry and law enforcement. The Pittsburgh-based organization includes more than 80 industry partnersโ€”from financial services, telecommunications, retail, and manufacturing, among other fieldsโ€”who work with federal and international partners to provide real-time threat intelligence.

     

    Another example is the Enduring Security Framework, a group that includes leaders from the private sector and the federal government who analyze currentโ€”and potentialโ€”threats related to denial of service attacks, malware, and emerging software and hardware vulnerabilities.

     

    Mueller also noted the Bureauโ€™s cyber outreach efforts to private industry. The Domestic Security Alliance Council, for instance, includes chief security officers from more than 200 companies, representing every critical infrastructure and business sector. InfraGard, an alliance between the FBI and industry, has grown from a single chapter in 1996 to 88 chapters today with nearly 55,000 members nationwide. And just last week, the FBI held the first session of the National Cyber Executive Institute, a three-day seminar to train leading industry executives on cyber threat awareness and information sharing.

     

    โ€œAs noteworthy as these outreach programs may be, we must do more,โ€ Mueller said. โ€œWe must build on these initiatives to expand the channels of information sharing and collaboration.โ€

     

    He added, โ€œFor two decades, corporate cyber security has focused principally on reducing vulnerabilities. These are worthwhile efforts, but they cannot fully eliminate our vulnerabilities. We must identify and deter the persons behind those computer keyboards. And once we identify themโ€”be they state actors, organized criminal groups, or 18-year-old hackersโ€”we must devise a response that is effective, not just against that specific attack, but for all similar illegal activity.โ€

     

    โ€œWe need to abandon the belief that better defenses alone will be sufficient,โ€ Mueller said. โ€œInstead of just building better defenses, we must build better relationships. If we do these things, and if we bring to these tasks the sense of urgency that this threat demands,โ€ he added, โ€œI am confident that we can and will defeat cyber threats, now and in the years to come.โ€

    The Proof: Cyber Attacks since Years – Der Beweis: Die jahrelangen Cyberattacken gegen unsere Webseiten

    The Proof: Cyber Attacks since Years – Der Beweis: Die jahrelangen Cyberattacken gegen unsere Webseiten

    Ein kleiner Ausschnitt

    A little excerpt:

    graph

    Bernd-Pulchernst

    Dear Readers,

    since days our websites berndpulch.org and http://www.investment-on.com

    are attacked by vicious criminals which have been identified including their comrades.

    All the proof is given to the relevant authorities.

    In the meantime every attack gives us more evidence against these criminals.

    We released a new website

    http://www.bernd-pulch.org

    is a clone of http://www.berndpulch.org

    and some more will follow.

    History shows that all censorship could not stop the truth.

    In fact people get even more curious about the truth which the censors want

    to hide !

    Sincerely yours

    Bernd Pulch

    Publisher

    Das Betrugsurteil gegen Klaus Maurischat/”GoMoPa” wg Betruges am eigenen Anleger

     

    obs Maurischat Gericht 6.8.2012 Frankfurt 23

    “Klaus Maurischat”;ย “GoMoPa”,

     

    obs Maurischat Gericht 6.8.2012 Frankfurt 28

     

    “Klaus Maurischat”, “GoMoPa”,

    https://berndpulch.org/das-betrugsurteil-gegen-bennewirtz-und-peter-ehlers-gomopa-partner-maurischat-und-vornkahl-wg-betruges-am-eigen-anleger/

    Am 24. April 2006 war die Verhandlung am Amtsgericht Krefeld in der Betrugssache: Mark Vornkahl / Klaus Maurischat ./. Dehnfeld. Aktenzeichen: 28 Ls 85/05 Klaus MaurischatLange StraรŸe 3827313 Dรถrverden.

    Wer soll denn diesen Typen noch irgendwie trauen ?

    Und diese Typen berichten รผber angebliche und tatsรคchliche Investment Verbrechen ?

    Die Strategie ist es, stattdessen ihre Gegner zu kriminalisieren, wie bereits Meridian Capital bewies und wie es die STASI schon immer tat.

    The Judgement against “President and CEO” Klaus Maurischat or whatever his name is because he committed fraud AGAINST HIS OWN INVESTORS.

    Their strategy is to criminalize their opponents with their network as Meridian Capital showed – a well-known strategy ofย  East German STASI Agents.

    Who can trust these fraudsters ?

    These guys report about investment crime ?

    What a parody….

    Bernd Pulch

    Magister Artium

    “Mandiant” – Announcing Mandiant Intelligence Center

    Organizations routinely struggle to understand which cyber threats pose the greatest
    risk to them. New threats appear in the news daily and create fire drills for
    security teams who must quickly determine what they can and should do to protect
    themselves. 
    
    Our newest offering, the Mandiant Intelligence Center
    <http://app.connect.mandiant.com/e/er?s=2855&lid=239&elq=99b6edb99b004015923dfbfb964a346f>,
    draws on our own proprietary intelligence to equip security teams like yours with
    the context required to effectively respond to and defend against the most advanced
    threat actors. 
    
    With the Mandiant Intelligence Center your security teams can:
    *Use tools embedded in the Center to query the Mandiant intelligence database and
    receive detailed information on which group is using particular malware, IPs and
    domains
    *Access detailed profiles of advanced threat groups including their latest tactics,
    techniques and procedures
    *Obtain detailed context on high profile threat events with analysis on the
    potential impact to your organization
    *Monitor emerging threat trends
    
    Read more
    <http://www.mandiant.com/assets/Mandiant_Intelligence_Center.pdf?elq=99b6edb99b004015923dfbfb964a346f&elqCampaignId=283>
    about Mandiant for Security Operations or request a call
    <http://app.connect.mandiant.com/e/er?s=2855&lid=235&elq=99b6edb99b004015923dfbfb964a346f>
    to receive a demonstration.
    
    ""            
    
    Mandiant In The Headlines
    
    January 30, 2013
    Hackers in China Attacked The Times for Last 4 Months
    <http://app.connect.mandiant.com/e/er?s=2855&lid=236&elq=99b6edb99b004015923dfbfb964a346f>
    By Nicole Perlroth โ€“ The New York Times 
    February 7, 2013
    Mandiant, the Go- To Security Firm for Cyber-Espionage Attacks
    <http://app.connect.mandiant.com/e/er?s=2855&lid=238&elq=99b6edb99b004015923dfbfb964a346f>
    By Brad Stone & Michael Riley โ€“ Bloomberg Businessweek 
    February 18, 2013
    Chinese Army Unit Is Seen as Tied to Hacking Against U.S.
    <http://app.connect.mandiant.com/e/er?s=2855&lid=237&elq=99b6edb99b004015923dfbfb964a346f>
    By David E. Sanger, David Barboza & Nicole Perlroth โ€“ The New York Times 
    
    Learn More About Mandiantยฎ
    
    Mandiant Website
    <http://www.mandiant.com/?elq=99b6edb99b004015923dfbfb964a346f&elqCampaignId=283>
    www.mandiant.com
    M-Unitionโ„ข
    <http://app.connect.mandiant.com/e/er?s=2855&lid=9&elq=99b6edb99b004015923dfbfb964a346f>
    Mandiant's official blog
    Mandiant on Twitter
    <http://app.connect.mandiant.com/e/er?s=2855&lid=10&elq=99b6edb99b004015923dfbfb964a346f>
    twitter.com/mandiant
    Be Part of Something More
    <http://www.mandiant.com/company/careers/?elq=99b6edb99b004015923dfbfb964a346f&elqCampaignId=283>
    Join the Mandiant Team

    “Mandiant” – Announcing Mandiant for Security Operations

    Citation: "Organizations spend millions of dollars investing in top-notch security teams and in
    building secure networks to keep would-be attackers out of their IT environments.
    Despite these investments, determined attackers routinely compromise well-secured
    organizations and steal their intellectual property and financial assets.
    
    Our newest product, Mandiant for Security Operations
    <http://app.connect.mandiant.com/e/er?s=2855&lid=234&elq=41deab51a75b472c90707e854f48b9e7>,
    equips security teams to confidently detect, analyze and resolve incidents in a
    fraction of the time it takes using conventional approaches. This appliance-based
    solution connects the dots between whatโ€™s happening on their network and whatโ€™s
    happening on their endpoints. 
    
    With Mandiant for Security Operations security teams can:
    *Search for advanced attackers and the APT
    *Integrate endpoint security with your network security
    *Accelerate triage of suspected incidents
    *Find out what happened, without forensics
    *Contain endpoints
    
    Read more
    <http://www.mandiant.com/assets/Mandiant_for_Security_Operations.pdf?elq=41deab51a75b472c90707e854f48b9e7&elqCampaignId=282>
    about Mandiant for Security Operations or request a call
    <http://app.connect.mandiant.com/e/er?s=2855&lid=235&elq=41deab51a75b472c90707e854f48b9e7>
    to receive a demonstration.
    
    ""            
    
    Mandiant In The Headlines
    
    January 30, 2013
    Hackers in China Attacked The Times for Last 4 Months
    <http://app.connect.mandiant.com/e/er?s=2855&lid=236&elq=41deab51a75b472c90707e854f48b9e7>
    By Nicole Perlroth โ€“ The New York Times 
    February 7, 2013
    Mandiant, the Go- To Security Firm for Cyber-Espionage Attacks
    <http://app.connect.mandiant.com/e/er?s=2855&lid=238&elq=41deab51a75b472c90707e854f48b9e7>
    By Brad Stone & Michael Riley โ€“ Bloomberg Businessweek 
    February 18, 2013
    Chinese Army Unit Is Seen as Tied to Hacking Against U.S.
    <http://app.connect.mandiant.com/e/er?s=2855&lid=237&elq=41deab51a75b472c90707e854f48b9e7>
    By David E. Sanger, David Barboza & Nicole Perlroth โ€“ The New York Times 
    
    Learn More About Mandiantยฎ
    
    Mandiant Website
    <http://www.mandiant.com/?elq=41deab51a75b472c90707e854f48b9e7&elqCampaignId=282>
    www.mandiant.com
    M-Unitionโ„ข
    <http://app.connect.mandiant.com/e/er?s=2855&lid=9&elq=41deab51a75b472c90707e854f48b9e7>
    Mandiant's official blog
    Mandiant on Twitter
    <http://app.connect.mandiant.com/e/er?s=2855&lid=10&elq=41deab51a75b472c90707e854f48b9e7>
    twitter.com/mandiant
    Be Part of Something More
    <http://www.mandiant.com/company/careers/?elq=41deab51a75b472c90707e854f48b9e7&elqCampaignId=282>
    Join the Mandiant Team
    
    To unsubscribe or manage your subscriptions, please click here
    <http://app.connect.mandiant.com/e/sl.aspx?s=2855&elq=41deab51a75b472c90707e854f48b9e7>.
    
    Mandiantยฎ | 2318 Mill Road. Suite 500 | Alexandria, VA 22314
    1.800.647.7020
    Privacy Policy
    <http://www.mandiant.com/privacy?elq=41deab51a75b472c90707e854f48b9e7&elqCampaignId=282>"

    Proven – China ‘aiding hacker attacks on west’

    The building in Shanghai that hosts the Chinese military's Unit 61398

    The building in Shanghai that hosts the Chinese military’s Unit 61398, which has been accused of involvement in hacking attacks. Photograph: Peter Parks/AFP/Getty Images

    The Chinese army has launched hundreds of cyber-attacks against western companies and defence groups from a nondescript office building in Shanghai, according to a report that warns hackers have stolen vast amounts of data from their targets.

    Mandiant, a security company that has been investigating attacks against western organisations for over six years, saidย in a report (PDF)the attacks came from a 12-storey building belonging to the People’s Liberation Army (PLA) general staff’s department, also known as Unit 61398.

    Mandiant said it believed aย hackingย network named the Comment Crew or the Shanghai Group was based inside the compound, in a rundown residential neighbourhood. Although the report fails directly to place the hackers inside the building, it argues there is no other logical reason why so many attacks have emanated from such a small area.

    “It is time to acknowledge the threat is originating inย China, and we wanted to do our part to arm and prepare security professionals to combat that threat effectively,” said the report.

    The discovery will further raise the temperature in the intergovernmental cyberwars, which have heated up in recent years as the US,ย Israel,ย Iran, China and UK have all used computer subterfuge to undermine rival state or terrorist organisations. One security expert warned that companies in high-profile fields should assume they will be targeted and hacked, and build systems that will fence sensitive data off from each other.

    Rik Ferguson, global vice-president of security research at the data security company Trend Micro, said: “We need to concentrate less on building castles and assuming they will be impervious, and more on building better dungeons so that when people get in they can’t get anything else.” .

    Mandiant says Unit 61398 could house “hundreds or thousands” of people and has military-grade, high-speed fibre-optic connections from China Mobile, the world’s largest telecoms carrier. “The nature of Unit 61398’s work is considered by China to be a state secret; however, we believe it engages in harmful computer network operations,” Mandiant said in the report.

    It said Unit 61398 had been operating since 2006, and was one of the most prolific hacking groups “in terms of quantity of information stolen”. This it estimated at hundreds of terabytes, enough for thousands of 3D designs and blueprints.

    “APT1”, as Mandiant calls it, is only one of 20 groups Mandiant says has carried out scores of hacking attacks against businesses and organisations in the west, including companies that work in strategic industries such as US power and water infrastructure.

    A typical attack would leave software that hid its presence from the user or administrator and silently siphon data to a remote server elsewhere on the internet at the instruction of a separate “command and control” (C&C) computer. By analysing the hidden software, the pattern of connections and links from the C&C server, the team at Mandiant said they were confident of the source of the threat.

    A Chinese foreign ministry spokesman denied the government was behind the attacks, saying: “Hacking attacks are transnational and anonymous. Determining their origins is extremely difficult. We don’t know how the evidence in this so-called report can be tenable. Arbitrary criticism based on rudimentary data is irresponsible, unprofessional and not helpful in resolving the issue.”

    But Ferguson told the Guardian: “This is a pretty compelling report, with evidence collected over a prolonged period of time. It points very strongly to marked Chinese involvement.”

    Mandiant, based in Alexandria, Virginia, in the US, investigated theย New York Timesย break-in, for which it suggested Chinese sources could be to blame.

    President Barack Obama isย already beefing up US security, introducing an executive order in his State of the Union speech this month that would let the government work with the private sector to fend off hacking. But it will take until February 2014 to have a final version ready for implementation.

    The revelation comes days after theย New York Times,ย Wall Street Journalandย Washington Post, as well as the social networks Facebook and Twitter, said they had been subjected to “highly sophisticated” hacks that in some cases focused on correspondents writing about China and its government.

    Separate investigations by the computer company Dell, working with the news companyย Bloomberg,ย tracked down another alleged hacker, Zhang Changhe, who has written a number of papers on PC hacking. Zhang works at the PLA’s “information engineering university” in Zhengzhou, Henan province, north-central China.

    The allegations will raise the temperature in the continuing cyberwar between the west and China, which has been steadily rising since the Pentagon andย MI6ย uncoveredย Titan Rain, a scheme that tried to siphon data from the Pentagon and the House of Commons in 2006, and which one security expert said at the time dated back at least to 2004.

    Ferguson suggested that western governments were also carrying out attacks against Chinese targets โ€“ “but that’s not a culture which would open up about being hit. I would be surprised and disappointed if most western nations don’t have a cybersecurity force.”

    Theย Stuxnet virus, which hit Iran’s uranium reprocessing plant in 2010, is believed to have been written jointly by the US and Israel, while Iranian sources are believed to have hacked companies that issue email security certificates so that they can crack secure connections used by Iranian dissidents on Google’sย Gmailย system. China is also reckoned to have been behind the hacking of Google’s email servers in that country in late 2009, in an operation that files from WikiLeaks suggested was inspired by the Beijing government.

    A timeline of government-sponsored hacking attacks

     

    2004 suspected:ย Chinese group in Shanghai begins probing US companies and military targets.

     

    2005:ย Titan Rain” pulls data from the Pentagon’s systems, and a specialist says of a December 2005 attack on the House of Commons computer system that “The degree of sophistication was extremely high. They were very clever programmers.”

     

    2007:ย Estonia’s government and other internet services are knocked offline by a coordinated attack from more than a million computers around the world โ€“ reckoned to have been run from a group acting at the urging of the Russian government. Nobody is ever arrested over the attack.

     

    2008:ย Russia’s government is suspected of carrying out a cyberattack to knock out government and other websites inside Georgia, with which it is fighting a border skirmish over the territory of Ossetia.

     

    December 2009:ย Google’s email systems in China are hacked by a groupย which tries to identify and take over the accounts of Chinese dissidents. Google withdraws its search engine from the Chinese mainland in protest at the actions. Wikileaks cables suggest that the Chinese government was aware of the hacking.

     

    2010:ย The Flame virus begins silently infecting computers in Iran. Itincorporates cutting-edge cryptography breakthroughsย which would require world-class experts to write. That is then used to infect Windows PCs via the Windows Update mechanism which normally creates a cryptographically secure link to Microsoft. Instead, Flame puts software that watches every keystroke and frame on the PC. Analysts say that only a “wealthy” nation state could have written the virus, which breaks new ground in encryption.

     

    Theย Stuxnet wormย is discovered to have been affecting systems inside Iran’s uranium reprocessing establishment, passing from Windows PCs to the industrial systems which control centrifuges that separate out heavier uranium. The worm makes the centrifuges spin out of control, while suggesting on their control panel that they are operating normally โ€“ and so break them. Iran denies that the attack has affected its project. The US and Israel are later fingered as being behind the code.

     

    September 2011:ย a new virus that silently captures data from transactions in Middle Eastern online banking is unleashed. The principal targets use Lebanese banks. It is not identified until August 2012, when Russian security company Kaspersky discovers the name “Gauss” embedded inside it. The company says the malware it is “nation state-sponsored” โ€“ probably by a western state seeking to trace transactions by specific targets.

     

    2012:ย About 30,000 Windows PCs at Saudi Aramco, the world’s most valuable company, are rendered unusable after a virus called “Shamoon” wipes and corrupts data and the part of the hard drive needed to “bootstrap” the machine when it is turned on. In the US, Secretary of Defense Leon Panetta described Shamoon as “one of the most destructive viruses ever” and suggested it could be used to launch an attack as destructive as the 9/11 attacks of 2001.

    Video – Mandiant standing by hacking accusations

     

    http://youtu.be/Ca26PEfKQnQ

    Mandiant standing by hacking accusations
    Rod Beckstrom, a cyber security analyst, talks about the allegations against the Chinese hackers.

    Revealed – Inside China’s Hacker World – Movie

     

    CNN reports –ย Chinese Hackers are becoming stronger.