✌Sam Bankman-Fried Sentencing – Original Document✌

Read all at

https://t.me/ABOVETOPSECRETXXL/34344

https://t.me/ABOVETOPSECRETXXL/34344

SUPPORT US AND Become a Patron! –

GET EXCLUSIVE GIFTS – TOP SECRET DOCUMENTS AND EXCLUSIVE EBOOKS

BY USING THE LINK BELOW


https://www.patreon.com/bePatron?u=54250700


(Paypal, Apple Pay, Venmo, Visa, Master Card, Discover, JCB, Diners Club, 3DS)

❌©BERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

https://www.patreon.com/bePatron?u=54250700

https://www.patreon.com/berndpulch?utm_campaign=creatorshare_creator

https://www.buymeacoffee.com/berndpulch

CRYPTO WALLET for ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

CRYPTO WALLET for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

for all crypto coins like

BITCOIN

ETHEREUM

TETHER

MATIC

USD COIN

BNB

WALL STREET MEMES

SHIBA INU

Follow the ONLY MEDIA with the LICENSE TO SPY ✌️@abovetopsecretxxl


To be absolutely anonymous please use Monero

Scan this code to send Monero to 41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh.

True Information is the most valuable resource and we ask you kindly to give back.

🙏God Bless You!🙏

Scandal in Austria: Green ministry and left-wing cultural activists protected pedophile TV star

✌️SHARE

👉THE ONLY WEBSITE WITH THE LICENSE TO SPY!
https://berndpulch.org
https://berndpulch.org/about-me/
👉JOIN @ABOVETOPSECRETXXL
https://t.me/ABOVETOPSECRETXXL
gab.com/berndpulch
gettr.com/user/berndpulch
https://truthbook.social/berndpulch
👉JOIN @ABOVETOPSECRETXXL
Subscribe to https://t.me/ABOVETOPSECRETXXL
SUPPORT US AND Become a Patron!
https://www.patreon.com/bePatron?u=54250700
True Information is the most valuable resource and we ask you kindly to give back.

In Austria, a pedophile scandal is currently causing horror in the cultural scene. The actor Florian Treichtmeister, who is particularly popular among the left-wing chic scene and has won countless awards, hoarded more than 56,000 (!) pieces of child pornography on various data carriers over the past 15 years. It was only thanks to his ex-girlfriend that this circumstance came to light through her report. Because (green) politics and left-wing cultural workers knew already since 2021 (!) of investigations against the “TV star”. Whether children were also abused by the actor is still unclear.

Read more: Scandal in Austria: Green ministry and left-wing cultural activists protected pedophile TV star

The Freedom Party sharply attacks First Lady Doris Schmidauer.

Meanwhile, even Austrian mainstream media are asking themselves the anxious question, “What did Doris Schmidauer know?” the eternally clueless grinning wife of Federal President Van der Bellen.

Schmidauer is a member of the supervisory board of the Burgtheater

Nevertheless, she still did not take action. Now FPÖ Secretary General Christian Hafenecker attacks the Green First Lady:

“Now full transparency should be practiced for once. I would be interested to know whether the left-wing chic protected one of theirs.” (oe24)

Hafenecker continued:

“The Burgtheater has absolute argumentation emergency. Here I would like to know what actually happened. Ms. Schmidauer should also come out of her silence for once and explain what happened.

The second FPÖ secretary general Michael Schnedlitz also demands full clarification:

“Even if Treichtmeister has dismissed the accusations to the Burgtheater as baseless rumors and an act of revenge by an ex-girlfriend: Why wasn’t he suspended until clarification? The Bundestheaterholding was supposedly informed, but was the Burgtheater’s supervisory board also informed? And if so, what did the members, including prominent names like Doris Schmidauer, after all the wife of the Federal President, have to say about it?”

“Child pornography is child abuse”.

“The handling of this scandal in itself is so catastrophic that a transition to the order of the day and the mere conviction of the accused by the judiciary is by far not enough. Child pornography is always a product of child abuse that destroys children’s souls and where no one can look away,” Schnedlitz said.

Just the tip of the iceberg?

As has now become known, investigations into the Treichtmeister case are likely to have been known to both the Green-led Department of Culture under Green State Secretary Andrea Mayer and Vice Chancellor Werner Kogler, who is also Green, as well as left-wing cultural workers at the Burgtheater and the Bundestheater-Holding since September 2021. The pedophile actor was therefore apparently covered by the political side and the cultural scene.

“In the industry, investigations were an open secret”.

  • said a tabloid about the case.

The Burgtheater announced as justification:

“Teichtmeister was confronted with the allegations by the management and has credibly denied them all.”

Allegedly, the actor talked his way out of it with a revenge action by his ex-girlfriend. But the scandal is currently expanding.

Despite investigations, pedophile was allowed to shoot with children!

In the summer of 2021, Teichtmeister even shot another film with children: In “Serviam” he played the father of a twelve-year-old girl! His ex-girlfriend had already filed a complaint with the police at that time. The police file with the accusations reads like a crime script: bodily harm, dangerous threat, continued use of violence, narcotics law.

But the left-wing cultural scene already starts with the usual relativizations. While Techtmeister and his pedophilia are played down in the worst possible way in the left-wing Standard forum, artists do not want to let this scandal drag down the Sisi film “Corsage,” which is currently in the running for an Oscar abroad. And this, although Techtmeister plays the leading role in it.

    110g cocaine as “personal use

    The theory or suspicion that Teichmeister enjoyed a “celebrity bonus” in the prosecution and with the public prosecutors and was/is also presumably part of a larger pedophile network, which reaches into the highest circles, is likely to be substantiated. Because as it became known now, one found with the pedophile actor already in August 2021 with a house search 110 gram cocaine

    But a criminal prosecution was dropped – with the argument, he could make credible that it was “personal use”. A complaint filed by his ex-girlfriend for domestic violence was also not pursued further because the woman was not believed.

    In view of the scandal, the left-wing Standard did not miss the opportunity to publish a “cheering article” on Teichtmeister’s acting performance. And the left-wing writer Elfride Jelinke also said that one must separate “the work from the artist. Of course, leftists don’t care about that when it comes to their historical revisionism, which in a mania of “cancle culture” wants to rename and ban everything and everyone who doesn’t fit into their world view. No “work is separated from the artist” here.

    It further became known that the lawyer of a mother of a child with whom Teichtmeister was filming contacted the director of the film “Serviam” in October 2021 and sued for an injunction against Teichtmeister taking photos of the child. Teichtmeister allegedly photographed children on the film sets and privately captioned those photos with speech bubbles that included phatnasies of violence and rape.

    Austria’s federal government is overflowing with expressions of dismay and calls for stricter punishments and laws following the widening pedophile scandal involving actor Teichtmeister. It was the politicians themselves who helped to cover up the case from the public.

    They now want to extend the sentencing range for possession of child pornography from two years to up to five years. Teichtmeister could even be spared a prison sentence. In the case of left-wing cuddly justice and since he is so far blameless, remorseful and confessed, a suspended sentence would also be possible.

    The defense attorney of the pedophile actor, the lawyer and constitutional judge (!) Michael Rami, is also causing a stir. This described the act of his client as a “pure digital offense”. “This legal opinion is not only morally reprehensible, it is also a mockery of all children to whom cruel, sexualized violence was inflicted in front of a running camera,” Sepp Rothwangl of the platform “Betroffener kirchlicher Gewalt” said of the statements.

    Whether Teichtmeister was or is part of a pedophile network (and into which elite circles these connections went) has strangely been largely left out of the debate so far. And this despite the fact that the amount of seized material (over 56,000 files) clearly indicates this. Teichtmeister claims to have only obtained the child pornography from the darknet since 2008. Without backers or further buyers. But other actors are said to be involved.

    Thus, it is the tip of an iceberg that could shake the entire left-wing cultural scene in Austria. One remembers, for example, the statements of former FPÖ Vice Chancellor Heinz-Christian Strache in the so-called Ibiza video, according to which he knew an informant who could prove sexual acts of ex-SPÖ Chancellor Christian Kern with minors in Africa.

    The latest findings in the Techtmeister case leave even experienced observers speechless at the audacity and negligence involved. Thus, the pedophile actor not only filmed with children AFTER the investigations, he was also invited as a guest of honor (!) to the parliament to read texts of victims there in 2016 as part of a state act on child abuse! Already since 2008, Techtmeister is known to have collected child pornography.

    And suddenly, even former colleagues and artists dare to come out of hiding. Actress Valerie Huber, for example, posted the following lines on her Instagram channel under an article on the Techtmeister case:

    “Finally it’s out, finally not everyone is covering up everything. Internally known for a long time and still continue to play at the Burgtheater as if nothing is wrong…”

    In turn, the Exxpress reported that Austria’s media law prevented the medium from mentioning Teichtmeister’s name in connection with the pedophile scandal as early as June 2022. And a whistleblower claims to have revealed to Medium:

    “As with Teichtmeister, everything is to be covered up with this actor so that the film project is not damaged. Again, many people know about the accusations, and again, no one brings this to the public.”

    THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

    https://t.me/ABOVETOPSECRETXXL

    👉JOIN @ABOVETOPSECRETXXL

    Handbook to help Victims of serious international Crimes

    SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    http://www.berndpulch.org

    THE ONLY WEBSITE WITH THE LICENSE TO SPY!

    🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

    https://t.me/ABOVETOPSECRETXXL

    👉JOIN @ABOVETOPSECRETXXL

    https://gab.com/berndpulch

    READ ALL AT:

    https://t.me/ABOVETOPSECRETXXL/19223

    👉JOIN @ABOVETOPSECRETXXL
    ABOVETOPSECRETXXL
    http://www.berndpulch.org
    THE ONLY WEBSITE WITH THE LICENSE TO SPY!
    https://gab.com/berndpulch
    👉JOIN @ABOVETOPSECRETXXL

    https://www.bitchute.com/channel/R55w1IXstR3h/

    THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

    https://t.me/ABOVETOPSECRETXXL

    👉JOIN @ABOVETOPSECRETXXL

    Video – The Metaverse Is Worse Than You Thought

    SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    http://www.berndpulch.org

    THE ONLY WEBSITE WITH THE LICENSE TO SPY!

    🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

    https://t.me/ABOVETOPSECRETXXL

    👉JOIN @ABOVETOPSECRETXXL

    https://gab.com/berndpulch

    THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

    https://t.me/ABOVETOPSECRETXXL

    👉JOIN @ABOVETOPSECRETXXL

    Google PRESSURES Employees They’ll Lose Pay/ MIGHT Be Fired IF NOT VAXXED

    SUPPORT US AND Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    http://www.berndpulch.org

    THE ONLY WEBSITE WITH THE LICENSE TO SPY!

    🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

    https://t.me/ABOVETOPSECRETXXL

    https://gab.com/berndpulch

    https://gettr.com/user/berndpulch

    Google cracks down on vaccine holdouts with a blanket ...
    • In a memo circulated by leadership, Google told employees that they must comply with vaccine policies or they face losing pay and then losing their job.
    • The document said most U.S. employees will fall under their vaccine requirements, which stem from President Biden’s executive order.
    • While much of the tech industry is delaying return-to-work plans, Google is gearing up to get back into the office and is showing little patience for the unvaccinated.

    Google has told its employees they will lose pay — and will eventually be fired — if they don’t comply with the company’s Covid-19 vaccination policy, according to internal documents viewed by CNBC.

    A memo circulated by leadership said employees had until Dec. 3 to declare their vaccination status and upload documentation showing proof, or to apply for a medical or religious exemption. The company said after that date it would start contacting employees who hadn’t uploaded their status or were unvaccinated, as well as those whose exemption requests weren’t approved.

    The document said employees who haven’t complied with the vaccination rules by the Jan. 18 deadline will be placed on “paid administrative leave” for 30 days. After that, the company will put them on “unpaid personal leave” for up to six months, followed by termination.

    A Google spokesperson said in a statement that, “our vaccination requirements are one of the most important ways we can keep our workforce safe and keep our services running,” and added that the company stands “behind our vaccination policy.”

    While much of the tech industry continues to push back return-to-work plans and companies large and small prepare for a flexible future, Google is requiring its workforce to eventually come into physical offices three days a week at some point in the new year. And it’s showing limited patience for those who refuse to get vaccines, which have been widely available for months.

    The Biden administration has ordered U.S. companies with 100 or more workers to ensure their employees are fully vaccinated or regularly tested for Covid-19 by Jan. 18. A federal court issued a stay on the order in early November, putting a halt to the administration’s efforts.

    Still, Google asked its more than 150,000 employees to upload their vaccination status to its internal systems, whether they plan to come into the office or not, and the company indicated it plans to follow President Joe Biden’s executive order.

    “We expect that almost all roles at Google in the US will fall within the scope of the executive order,” Google’s memo said. “Anyone entering a Google building must be fully vaccinated or have an approved accommodation that allows them to work or come onsite,” the company said, adding that “frequent testing is not a valid alternative to vaccination.”

    Google and parent company Alphabet have been staunchly behind vaccines since the middle of the year.

    CEO Sundar Pichai announced in July that the company would require vaccinations for those returning to offices. At the time, the plan was to reopen in January. But in early December, amid ongoing concerns about infection numbers, Google told U.S. employees it would not yet require them to return to offices. However, leadership encouraged employees to continue coming in “where conditions allow to reconnect with colleagues in person and start regaining the muscle memory of being in the office more regularly.”

    The vaccine mandate has not been universally accepted by employees. Several hundred Google workers have signed and circulated a manifesto opposing the company’s requirements, which leadership said would apply to all employees, even those working from home, who engage directly or indirectly with federal government contracts.

    In the latest guidance, Google details some options for those who don’t want to get to vaccinated. The company said employees can “explore” if there are any roles at Google that don’t conflict with the executive order. They can also request exemptions for religious beliefs or medical conditions, which Google previously said would be granted on a case-by-case basis.

    For employees with roles that happen to fall outside the scope of the executive order that can also be performed out of the office, the company said they will be able to “permanently work remotely going forward.”

    Employees placed on unpaid personal leave will be able to keep their benefits for the first 92 days, the memo said. If after six months they still aren’t in compliance with the mandate, “their employment with Google will end.”

    THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

    https://t.me/ABOVETOPSECRETXXL

    COMPUTER CRIME EXPERT WITNESS MANUAL – ORIGINAL DOCUMENT

    SUPPORT US AND Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    http://www.berndpulch.org

    THE ONLY WEBSITE WITH THE LICENSE TO SPY!

    🚨 FOLLOW US ON TELEGRAM FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

    https://t.me/ABOVETOPSECRETXXL

    Continue reading “COMPUTER CRIME EXPERT WITNESS MANUAL – ORIGINAL DOCUMENT”

    EXPOSED – THE FACEBOOK BLACK LIST OF DANGEROUS INDIVIDUALS & ORGANIZATIONS – ORIGINAL DOCUMENT

    SUPPORT US AND Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    http://www.berndpulch.org

    THE ONLY WEBSITE WITH THE LICENSE TO SPY!

    🚨 FOLLOW US ON TELEGRAM FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

    https://t.me/ABOVETOPSECRETXXL

    Continue reading “EXPOSED – THE FACEBOOK BLACK LIST OF DANGEROUS INDIVIDUALS & ORGANIZATIONS – ORIGINAL DOCUMENT”

    Blumenthal Calls Out Mark Zuckerberg During Facebook Whistleblower Hearing

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    http://www.berndpulch.org

    THE ONLY WEBSITE WITH THE LICENSE TO SPY!

    LIVESTREAM – Facebook Whistleblower Testifies To Senate Commerce Subcommittee

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    http://www.berndpulch.org

    THE ONLY WEBSITE WITH THE LICENSE TO SPY!

    Operation Trojan Shield – FBI San Diego Infiltraded Hundreds Of Criminal Networks – Original Document

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    Encrochat-Nachrichten geknackt: Schon 24 Verhaftungen – Kryptodienst ist  ein Geschenk für Brandenburgs Drogenfahnder | Lausitzer Rundschau
    Continue reading “Operation Trojan Shield – FBI San Diego Infiltraded Hundreds Of Criminal Networks – Original Document”

    Confidential – The Impact Of Covid19 On Organized Crime – UNODC Report – Original Document

    Become a Patron!

    COVID 19 and organized crime: »Latin American governments are in a  state-making competition with crime«

    Exposed – ICANN-Europol Update on Whois-Related Initiatives

    Uses of the WHOIS

    Traditionally:
    • Contact point for incident response
    • Determination of availability of domain names

    But also:
    • Assisting, public safety organisations, businesses, consumer groups, individuals in combating abuse and fraud and seeking redress.
    • Help with online crime attribution

    Video – Trend Micro about Putins Cyber Espionage Troops Pawn Storm

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

     

    Cyber Espionage Definition, Cyber Espionage Cases, Cyber Espionage China, Cyber Espionage Prevention, Cyber Espionage Russia, Cyber Espionage Pdf, Cyber Espionage The Chinese Threat, Cyber Espionage History, Cyber Espionage International Law, Cyber Espionage Cases 2016, Cyber Espionage Act, Cyber Espionage Articles, Cyber Espionage Attacks, Cyber Espionage Adalah, Cyber Espionage And International Law, Cyber Espionage Australia, Cyber Espionage And Cyber Warfare, Cyber Espionage Attack Methods, Cyber Espionage Books, Cyber Espionage Beyond The Rule Of Law, Cyber Espionage Business, Cyber Espionage By China, Cyber Espionage Brazil, Cyber Espionage By Chinese Actors, Cyber Espionage Blog, Cyber Espionage By Country, Bagaimana Cyber Espionage Dapat Muncul, Best Cyber Espionage Books, Cyber Espionage Cases, Cyber Espionage China, Cyber Espionage Cases 2016, Cyber Espionage Case Study, Cyber Espionage Cases 2017, Cyber Espionage Cases In India, Cyber Espionage Campaign, Cyber Espionage China Us, Cyber Espionage Cost, Cyber Espionage Canada, Cyber Espionage Definition, Cyber Espionage Documentary, Cyber Espionage Def, Cyber Espionage Definition Pdf, Economic Cyber Espionage Definition, Bagaimana Cyber Espionage Dapat Muncul, Why Is Cyber Espionage Difficult To Prevent, Contoh Kasus Cyber Espionage Di Indonesia, How Is Cyber Espionage Done, Dragonfly Cyber Espionage, Cyber Espionage Examples, Cyber Espionage Edward Snowden, Cyber Espionage Effects, Cyber Espionage Essay, Cyber Economic Espionage, Cyber Economic Espionage Accountability Act, Cyber Espionage In Middle East, Economic Cyber Espionage And International Law, Economic Cyber Espionage Definition, Explain Cyber Espionage, Cyber Espionage Facts, Cyber Espionage Fiction, Cyber Espionage First Case, Cyber Espionage F 35, Cyber Espionage Law Firms, Fbi Cyber Espionage, France Cyber Espionage, A Theory Of Cyber Espionage For The Intelligence Community, French Cyber Espionage, Flame Cyber Espionage, Cyber Espionage Groups, Cyber Espionage Germany, Cyber Espionage Georgia, Cyber-espionage The Greatest Transfer Of Wealth In History, Cyber-espionage A Growing Threat To The American Economy, Cyber Espionage Against Georgia, Cyber Espionage Against Georgian Government, What Are Cyber Espionage Groups Stealing From The United States, Cyber Espionage To Splinter Internet Governance, Global Cyber Espionage, Cyber Espionage History, Huawei Cyber Espionage, Hellsing Cyber Espionage, Cyber Espionage International Law, Cyber Espionage Incidents, Cyber Espionage India, Cyber Espionage Is Alive And Well, South African Cyber Espionage, Cyber Espionage In China, Cyber Espionage In Middle East, Cyber Espionage Iran, Cyber Espionage In Canada, Cyber Espionage Impact, Cyber Espionage Jobs, Cyber Espionage Japan, Cyber Espionage Kenya, Kaspersky Cyber Espionage, Kasus Cyber Espionage, Kasus Cyber Espionage Di Indonesia, Kejahatan Cyber Espionage, Karakteristik Cyber Espionage, Cyber Espionage Law, Cyber Espionage Law Firms, Cyber Espionage International Law, Cyber Espionage Definition Law, Cyber Espionage Is Reaching Crisis Levels, Pengertian Dari Cyber Espionage Lengkap, Le Cyber Espionnage Definition, Cyber Espionage Meaning, Cyber Espionage Movies, Cyber Espionage Methods, Cyber-espionage Nightmare – Mit Technology Review, Cyber Espionage Attack Methods, Cyber Espionage In Middle East, Chinese Cyber Espionage Mandiant, Chinese Cyber Espionage Map, Bagaimana Cyber Espionage Dapat Muncul, Military Cyber Espionage, Cyber Espionage News, Cyber Espionage North Korea, Cyber-espionage Nightmare, Cyber Espionage National Security, Cyber Espionage Novels, Cyber Espionage Nato, Ghostnet Cyber Espionage Network, Nsa Cyber Espionage, Nortel Cyber Espionage, Cyber Espionage Operations, Cyber Espionage Red October, Cyber Espionage And Cyber Espionage, Cyber-espionage The Greatest Transfer Of Wealth In History, Cyber Espionage Prevention, Cyber Espionage Pdf, Cyber Espionage Ppt, Cyber Espionage Pronunciation, Cyber Espionage Presentation, Cyber Espionage Pictures, Cyber Espionage Problems, Cyber Espionage Purpose, Cyber Espionage Ppt Slideshare, Cyber Espionage Research Paper, Cyber Espionage Quotes, Cyber Espionage Research Questions, Cyber Espionage Russia, Cyber Espionage Research Paper, Cyber Espionage Rule Of Law, Cyber Espionage Report, Cyber Espionage Red October, Cyber Espionage Research Questions, Cyber Espionage Ring, Cyber Espionage Is Reaching Crisis Levels, Cyber Espionage Techrepublic, Russian Cyber Espionage, Cyber Espionage Statistics, Cyber Espionage Synonym, Cyber Espionage Simulator, Cyber Espionage Security Issues, Cyber Espionage Statistics 2015, Cybersecurity Espionage, Espionage In Cyberspace, Cyber Espionage Case Study, Cyber Espionage To Splinter Internet Governance, South African Cyber Espionage, Cyber Espionage The Chinese Threat, Cyber Espionage Threat, Cyber Espionage Tools, Cyber Espionage Trends, Cyber Espionage The Chinese Threat Case Study, Cyber Espionage To Splinter Internet Governance, Cyber-espionage The Greatest Transfer Of Wealth In History, Cyber Espionage Thesis, Cyber Espionage Training, Cyber Espionage Tactics, Cyber Espionage Uk, Us Cyber Espionage, Cyber Espionage Un, Cyber Espionage Us China, China’s Cyber Espionage Units, Russian Cyber Espionage Under The Microscope, China Cyber Espionage And U.s. National Security, Pla Cyber Espionage Unit, Cyber Espionage Vs Cyber Warfare, Cybercrime Vs Cyber Espionage, Cyber Espionage Vs Cyber Attack, Cyber Espionage Virus, Cyber Espionage Wiki, Cyber Espionage & Warfare, Cyber Weapons Espionage, Cyber Espionage Vs Cyber Warfare, Cyber Espionage And Cyber Warfare Definition, Cyber Espionage Youtube

    Heinz Gerlachs “Erben” – GoMoPa, Medard Fuchsgruber und mutmasslich Rainer von Holst & Thomas Bremer – Cui bono ?

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    Es hat lange gedauert, aber nun ist das Rätsel wohl gelöst: Wer profitiert von Gerlachs Tod ?

    • GoMoPa konnte die eigene Position massiv ausbauen
    • Medard Fuchsgruber übernahm die DFI-Seite
    • Rainer von Holst, Doreen Trampe (Ex-GoMoPa) und Pierre Gersöne stecken mutmasslich hinter der anonymen Webseite gerlachreport.com
    • Thomas Bremer mit seinem Blog-Netzwerk im “Tal der Ahnungslosen” (DDR-Witz) zu Leipzig

    In Kürze mehr…

     

    Heinz Gerlach, Heinz Gerlach Halle, Heinz Gerlach Akkordeon, Heinz Gerlach Aschaffenburg, Heinz Gerlach Bad Arolsen, Heinz Gerlach Medien Ag, Heinz Gerlach Durchbruch Bei Stalingrad, Dekan Heinz Gerlach, Heinz-dieter Gerlach, Heinz Gerlach Tanzende Finger, Heinz Gerlach Frankfurt, Heinz Gerlach Flachsmeer, Ferienwohnung Heinz Gerlach Zingst, Heinz Gerlach Halle, Karl Heinz Gerlach, Heinz Gerlach Komponist, Karl Heinz Gerlach Biebertal, Heinz Gerlach Halle Karneval, Karl-heinz Gerlach Langenhagen, Karl Heinz Gerlach Herzberg, Heinz Gerlach Licht & Sound, Karl-heinz Gerlach Langenhagen, Heinz Gerlach Niederstotzingen, Tanzende Finger Gerlach Heinz Noten, Heinz Gerlach Obernau, Heinz Gerlach Offenbach, Heinz Gerlach Pfarrer, Heinz Gerlach Stalingrad, Heinz Gerlach Schrobenhausen, Heinz Gerlach Sulingen, Heinz Gerlach Licht & Sound, Heinz Schulze Gerlach, Heinz Gerlach Durchbruch Bei Stalingrad, Heinz Gerlach Tanzende Finger, Heinz Gerlach Tot, Heinz Gerlach Winterberg, Karl Heinz Gerlach Wegberg, Heinz Gerlach Zingst, Ferienwohnung Heinz Gerlach Zingst

     

    Halloween-Scherz: Horror- Clown gibt sich als von Holst aus

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

     

     

     

    Sie kennen das: Ein Clown sendet Ihnen eine E- Mail.

    Der Clown nennt sich oder ist Rainer von Holst. Alles ohne Beweis. Was macht man damit ?  Richtig. Man fragt Google und die User.

    Die Rainer von Holst-Clown Maske mit falscher E-Mail inklusive cc an “Polizei” ohne handfeste Beweise – Ist das ein gelungener Halloween-Scherz ?  Oder sind andere Horror-Clowns noch besser ?

    a Adolf Hitler

    b Benito Mussolini

    c Rainer von Holst

    d Nero

     

    Wer hat die beste Horror-Clown-Frisur ?

    a Fury

    b Rainer von Holst

    c Flipper

    d Lassie

    You will be the Judge !

    Horror Clown Movies, Horror Clown Movies 2016, Horror Clown Makeup, Horror Clown Movie 2017, Horror Clown Videos, Horror Clown Costumes, Horror Clown Mask, Horror Clown Pics, Horror Clown Stories, Horror Clown Names, Scary Clown American Horror Story, Evil Clown American Horror Story Actor, American Horror Story Clown, Horror Movie About Clown, Horror Movie With Clown And Babysitter, Clown American Horror Story Actor, American Horror Clown Costume, American Horror Clown Mask, American Horror Clown Actor, Clown American Horror Story Trailer, Horror Clown Books, Horror Clown Birthday, Horror Clown Bilder, Horror Clown Breda, Horror Clown Blick, Horror Clown Basel, Horror Film Clown Babysitter, Horror Movie Clown Babysitter, Horror Story Clown Babysitter, American Horror Story Clown Backstory, Horror Clown Costumes, Horror Clown Costumes Adults, Horror Clown Character, Horror Clown Costume Ideas, Horror Clown Costumes Uk, Clown Horror Comedy, American Horror Clown Costume, Classic Horror Clown Costume, Womens Horror Clown Costume, Horror Movie Clown Costume, Horror Clown Drawings, Horror Clown Dolls, Horror Clown Dailymotion, Horror Clown Director, Horror Clown Deutsch, Horror Clown Deutschschweiz, Horror Dog Clown Car, Horror Dome Clown, Horror Clown Fancy Dress, Horror Clown Videos Dailymotion, Horror Clown England, Horror Clown Es, Horror Clown Eli Roth, Horror Clown Essen, Evil Clown Horror Movie, Evil Clown Horror, American Horror Story Clown Episode, Evil Clown American Horror Story, Evil Clown American Horror Story Actor, American Horror Story Clown Episode 1, Horror Clown Film, Horror Clown Face, Horror Clown Face Paint, Horror Clown Film 2015, Horror Clown Full Movie, Horror Clown Fancy Dress, Horror Clown Figurine, Horror Clown Frankrijk, Horror Clown Frankreich, Horror Clown France, Horror Clown Gifs, Horror Clown Games, Horror Clown Geschichte, Horror Clown Geschichten, Horror Clown Gesicht, Horror Clown Girl, American Horror Clown Gif, Scary Clown Horror Gif, Clown Horror Movie Gif, American Horror Story Clown Girl, Horror Clown Halloween, Horror Clown Huren, Horror Clown Images, Horror Clown In Nederland, Horror Clown In Der Schweiz, Horror Clown In Thun, Horror Clown In Frankrijk, Horror Clown In Frankreich, Horror Clown It, Horror Clown In Basel, Horror Clown In England, Horror Clown In Luxemburg, Horror Clown Jokes, Horror Clown Jack, American Horror Story Clown Jaw, Horror Clown John Wayne, Jeugdjournaal Horror Clown, Clown Horror Prank Jockiboi, Horror Clown Killer, Horror Clown Laugh, Horror Clown Luxemburg, Horror Clown Luxembourg, Horror Clown Lache, Clown Horror List, Horror Clown Movies List, Clown Horror Films List, Horror Movies Like Clown, American Horror Story Clown Lawsuit, Horror Clown Mask Latex, Horror Clown Movies, Horror Clown Movies 2016, Horror Clown Makeup, Horror Clown Movie 2017, Horror Clown Mask, Horror Clown Music, Horror Clown Movies On Netflix, Horror Clown Memes, Horror Clown Names, Horror Clown Nights, Horror Clown Night Game, Clown Horror Novels, Clown Horror Netflix, Clown Horror New, Horror Movie Clown Names, American Horror Clown Name, American Horror Clown No Mask, Horror Clown Movies New, Horror Clown Outfit, Horror Clown Movies On Netflix, Horror Movie Clown On Tricycle, Scary Clown On American Horror Story, Clown Horror Movies Online, Horror Movie With Clown On Cover, Clown Horror Watch Online, Horror Movies Of Clown, Creepy Clown On American Horror, Clown Horror Movie Watch Online, Horror Clown Pics, Horror Clown Prank, Horror Clown Props, Horror Clown Poem, Horror Clown Prosthetic, Horror Clown Photoshop, Horror Clown Pak, Horror Clown Face Paint, American Horror Clown Picture, Horror Movie Clown Puppet, Horror Clown Quotes, American Horror Story Clown Quotes, Horror Clown Real, Clown Horror Review, Clown Horror Rotten Tomatoes, Horror Film Clown Rocking Chair, American Horror Story Clown Real, American Horror Story Clown Running, American Horror Story Clown Real Person, American Horror Story Clown Real Face, Clown Horror Movie Dvd Release, Clown Horror Recensione, Horror Clown Stories, Scary Horror Clowns, Horror Story Clown Mask, Horror Clown Song, Horror Story Clown Statue, Horror Clown Sound, Horror Clown Suit, Scary Horror Clown Movies, Clown Horror Short Stories, Horror Movie Clown Scene, Horror Clown Tattoo, Horror Clown Top 10, Horror Clown Thun, Horror Clown Trailer, Horror Clown Tutorial, American Horror Clown Trailer, Horror Movie Clown Trailer, Moviepilot Horror Clown Trailer, Horror Movie The Clown, American Horror Story Clown, Horror Clown Masks Uk, Horror Clown Costumes Uk, Horror Film Clown Under Bed, Horror Movie Clown Under Bed, American Horror Story Clown Unmasked, American Horror Clown Makeup, Clown Upcoming Horror Movies, Horror Clown Makeup, Horror Clown Halloween Makeup, Horror Clown Uit Frankrijk, Horror Clown Videos, Horror Clown Videos Dailymotion, Horror Clown Verkleidung, American Horror Story Clown Video, American Horror Story Clown Vine, Halloween Horror Nights Clown Video, Horror Clown Tattoo Vorlagen, Horror Clown Versteckte Kamera, Horror Clown Vermoord, Horror Clown Verhalen, Horror Clown Wallpapers, Horror Clown Wiki, Horror Clown Woman, Horror Clown Wig, Horror Clown Womens Costume, Clown Horror Watch Online, Horror White Clown, American Horror Clown Without Mask, Horror Movie With Clown Doll, Horror Movie With Clown Killer, Horror Clown Youtube, Clown Horror Movies Youtube, American Horror Story Clown Youtube, Youtube Horror Clown Prank, Film Horror Sui Clown Yahoo, Film Horror Clown Yahoo, Horror Zombie Clown Mask, Clown Zombies Horror, Clown Horror Zwiastun, Horror Clown Zoetermeer, Rainer Von Holst Firmenwelten, Rainer Von Holst Gerlachreport, Rainer Von Holst Usa, Rainer Von Holst Gerlach, Rainer Von Holst Gomopa, Rainer Von Holst Iserlohn, Rainer Von Holst, Rainer Von Holst Bank, Rainer Von Holst Politico, Rainer Von Holst Augsburg, Rainer Von Holst Augsburg, Rainer Von Holst Bank, Rainer Von Holst Firmenwelten, Rainer Von Holst Gerlachreport, Rainer Von Holst Gerlach, Rainer Von Holst Gomopa, Rainer Von Holst Iserlohn, Rainer Von Holst Politico, Rainer Von Holst Princeton, Rainer Von Holst Usa, Rainer Von Holst Werther

     

    Enttarnt – Rainer von Holsts Cyberwaffe – Pierre Gersoene

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    Image result for pierre gersöne

    Pierre Gersöne

    Rainer von Holst veröffentlicht anonyme Blogs im Internet.

    Dafür bedient er sich des Ostberliners Pierre Gersöne, der bislang aus guten Grünen anonym blieb und es sicher gerne auch weiter wäre.

    Für alle Fans von Rainer von Holst und seinem Webmaster.

    u.a. gomopacrime, investigoo, etc. pp

    Hier die Kontaktdetails:

    Pierre Gersöne

    Medienhaus Gersöne UG
    Fanningerstraße 54
    D-10365 Berlin-Lichtenberg

    Telefon: +49 (0)30 531 674 60
    Telefax: +49 (0)30 531 674 65

    http://www.medienhaus-gersoene.de

    Registergericht: Amtsgericht Berlin-Charlottenburg
    Registernummer: HRB 160218 B
    Umsatzsteuer-Identifikationsnummer gem. § 27a UStG: DE295777375

    Rainer Von Holst Firmenwelten, Rainer Von Holst Gerlachreport, Rainer Von Holst Usa, Rainer Von Holst Gerlach, Rainer Von Holst Gomopa, Rainer Von Holst Iserlohn, Rainer Von Holst, Rainer Von Holst Bank, Rainer Von Holst Politico, Rainer Von Holst Augsburg, Rainer Von Holst Augsburg, Rainer Von Holst Bank, Rainer Von Holst Firmenwelten, Rainer Von Holst Gerlachreport, Rainer Von Holst Gerlach, Rainer Von Holst Gomopa, Rainer Von Holst Iserlohn, Rainer Von Holst Politico, Rainer Von Holst Princeton, Rainer Von Holst Usa, Rainer Von Holst Werther, Medienhaus Gersoene, Gersoene, Cyberwaffe Regin, Cyberwaffe Regin, Cyberwaffen Wiki, Cybercrime Definition, Cybercrime Statistics, Cybercrime Prevention, Cybercrime Articles, Cybercrime Jobs, Cybercrime Law, Cybercrime Statistics 2017, Cyber Crime Cases, Cyber Crime News, Cybercrime Topics, Cybercrime Articles, Cybercrime And Security, Cybercrime As A Service, Cybercrime And Digital Forensics An Introduction, Cybercrime And Digital Forensics, Cybercrime And Society, Cybercrime And Terrorism, Cybercrime Attacks, Cybercrime Act, Cybercrime Against Businesses, Cyber Crime Batman, Cyber Crime Book, Cybercrime Blog, Cybercrime Bill, Cybercrime Banks, Cybercrime Background, Cyber Crime By Country, Cybercrime Bangalore, Cybercrime Billion Dollar Industry, Cybercrime Background Information, Cyber Crime Cases, Cybercrime Certification, Cybercrime Convention, Cybercrime Careers, Cybercrime Cost, Cybercrime Cafe, Cybercrime Cost 2016, Cybercrime China, Cybercrime Conference, Cybercrime Conclusion, Cybercrime Definition, Cybercrime Definition Computer, Cybercrime Definition Fbi, Cyber Crime Data, Cybercrime Degrees, Cybercrime Definition Pdf, Cybercrime Database, Cyber Crime Detective, Cyber Crime Documentary, Cyber Crime Department, Cybercrime Example, Cyber Crime Essay, Cybercrime Effects, Cybercrime Events, Cybercrime Enforcement, Cybercrime Economy, Cyber Crime Ethics, Cybercrime Effects On Business, Cybercrime Ecosystem, Cybercrime Enforcement Training Assistance Act, Cybercrime Facts, Cybercrime Fbi, Cybercrime Forensics, Cybercrime Forum, Cybercrime Forensics Training Center, Cybercrime Federal Laws, Cyber Crime Fiction, Cybercrime Financial Services, Cybercrime Future Trends, Cybercrime Fiji, Cybercrime Gets Personal Money Magazine, Cybercrime Gets Personal, Cybercrime Growth, Cyber Crime Graph, Cybercrime Groups, Cybercrime Government, Cybercrime Global Statistics, Cyber Crime Gov, Cyber Crime Games, Cybercrime Gif, Cybercrime Hacking, Cyber Crime History, Cybercrime Help, Cybercrime Healthcare, Cybercrime Hyderabad, Cybercrime How To Report, Cyber Crime Hotline, Cybercrime Hacking News, Cyber Crime Head Office India, Cybercrime Hacking And Cracking, Cybercrime Identity Theft, Cybercrime In The Us, Cyber Crime Investigation, Cybercrime Images, Cyber Crime Insurance, Cybercrime Is Also Known As, Cybercrime Investigating High-technology Computer Crime, Cybercrime Infographic, Cybercrime Information, Cyber Crime In Russia, Cybercrime Jobs, Cybercrime Jurisdiction, Cybercrime Journal Articles, Cybercrime Job Description, Cybercrime Jobs Salary, Cybercrime Job Openings, Cybercrime Jobs In Chennai, Cybercrime Job Qualification, Cybercrime Journal Articles Pdf, Cyber Crime Jamaica, Cybercrime Kenya, Cybercrime Key Issues And Debates, Cybercrime Kuwait, Cybercrime Ki Dhara, Cybercrime Key Issues And Debates Pdf, Cybercrime Kasus, Cyber Crime Karnataka, Cybercrime Kartu Kredit, Cybercrime Kolkata, Cyber Crime Karachi, Cybercrime Law, Cybercrime Laws In Usa, Cybercrime Law Enforcement, Cybercrime Laws Of The United States, Cybercrime List, Cybercrime Legislation Us, Cybercrime Laws In Florida, Cybercrime Legal Issues, Cybercrime Law Outline, Cyber Crime Lesson Plans, Cybercrime Meaning, Cyber Crime Movies, Cybercrime Methods, Cybercrime Methodology, Cyber Crime Money, Cybercrime Markets, Cyber Crime Magazine, Cyber Crime Most Wanted, Cybercrime Meaning In Tamil, Cybercrime Masters Degree, Cyber Crime News, Cyber Crime News Articles, Cyber Crime News Articles 2017, Cyber Crime Netflix, Cybercrime Nigeria, Cyber Crime Novels, Cybercrime Number, Cybercrime Nhs, Cyber Crime News Philippines, Cybercrime Nbi, Cybercrime Or Cyber Crime, Cybercrime Organizations, Cybercrime On The Rise, Cybercrime On The High Seas, Cybercrime Offenses, Cyber Crime Outline, Cybercrime Office, Cybercrime Office In Ahmedabad, Cybercrime Office In Patna, Cybercrime Office In Nashik, Cybercrime Quotes, Cyber Crime Quizlet, Cybercrime Questions, Cyber Crime Quiz, Cybercrime Questionnaire, Cybercrime Question Paper, Cybercrime Qatar, Cybercrime Question And Answers, Cybercrime Report, Cybercrime Research Paper, Cyber Crime Rates, Cyber Crime Recent, Cybercrime Research Topics, Cybercrime Research, Cybercrime Reported To The Ic3, Cybercrime Resources, Cybercrime Riding Tax Season Tides, Cyber Crime Report 2016, Cybercrime Statistics, Cybercrime Statistics 2017, Cyber Crime Stories, Cybercrime Spyware, Cybercrime Statistics 2015, Cybercrime Security, Cybercrime Solutions, Cybercrime Salary, Cybercrime Small Business, Cyber Crime Synonym, Cybercrime Topics, Cybercrime Trends, Cybercrime Tracker, Cybercrime Treaty, Cyber Crime Types, Cybercrime Training, Cybercrime Threats, Cybercrime Tools, Cybercrime Terms, Cybercrime The Transformation Of Crime In The Information Age, Cyber Crime Unit, Cybercrime Us, Cybercrime Uk, Cybercrime Uae, Cybercrime University, Cybercrime Un, Cyber Crime Unit Mauritius, Cyber Crime Unit Malta, Cybercrime Uc, Cybercrime Unodc, Cybercrime Victims, Cybercrime Vs Traditional Crime, Cybercrime Videos, Cybercrime Vs Traditional Crime Statistics, Cybercrime Virus, Cyber Crime Vocabulary, Cybercrime Vs Traditional Crime Punishment, Cybercrime Vs Computer Crime, Cybercrime Vs Cyber Warfare, Cybercrime Vs Cyber Espionage, Cybercrime Wiki, Cybercrime Worm, Cybercrime World Wide War 3.0, Cyber Crime Websites, Cyber Crime Worksheet, Cybercrime Wallpaper, Cyber Crime Worldwide, Cybercrime Working Group, Cyber Crime What Is It, Cybercrime Wikipedia Indonesia, Cybercrime X-remote Download, Tedx Cybercrime, Cyber Crime Youtube, Cyber Crime Yahoo, Cyber Crime Yahoo Answers, Cyber Crime Yesterday, Cyber Crime Youth, Cybercrime Yang Menyerang Hak Cipta, Cybercrime Yar, Youth Cyber Crime, Cyber Crime Yogyakarta, Cybercrime Yang Menyerang Pemerintah, Cybercrime Zimbabwe, Cybercrime Zeus, Cybercrime Zimbra, Zurich Cyber Crime, Zimbabwe Cybercrime Bill, Cyber Crime In Zambia, New Zealand Cyber Crime, Los Zetas Cybercrime, Cybercrime Law In Zambia, Cyber Crime Cases In Zambia

    Windbeutel und Bankrott-Tourist von Holst schreit nach Rache und steigert Besucherzahlen

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    Als Reaktion auf die Aufdeckung seiner diversen Machenschaften durch angesehene englische Medien wie Daily Mail und mich – siehe

    https://www.google.com/search?q=rainer%20von%20holst

     

    Uns und auch Ihnen wird von Holst kein X als U verkaufen können, wie er das mit dem Verkauf von illegalen Investments, seiner illegalen Bank und seinen nicht-existenten Betrügerfirmen tausendfach versucht hat und noch immer versucht. Er hat schon genug angerichtet.

    Siehe auch die Wallstreet-Diskussion über den Bielefelder Scharlatan und Windbeutel:

    http://www.wallstreet-online.de/diskussion/1222551-1-10/unternehmen-firmenwelten-ag-bielefeld

    Der Name Rainer von Holst ist so belastet, dass er sich bis dato nicht TRAUT eine Facebook-Seite, einen eigenen Blog, einen Twitter-Account oder sonst etwas im Internet unter eigenem Namen zu publizieren. Denn wegen der Anschläge auf “GoMoPa”  und dem Einbruch bei wird auch gegen von Holst ermittelt.

    Warum wohl ?

    Und das bei so einer Type der Staat und die STASI Synonyme sind, sagt eigentlich eh schon alles.

    Doch wie sagt der Volksmund: “Wer anderen eine Grube gräbt, fällt selbst hinein.”

    Windbeutel Rainer von Holst – wie immer anonym unterwegs – beschert uns einen kräftigen Besucherzuwachs und ich an sage an dieser Stelle: “Danke, alter Windbeutel, bitte weiter schlampig schreiben !”

    Nur weiter so. Unsere Anzeigenkunden freut es auch…

    Rainer Von Holst Firmenwelten, Rainer Von Holst Gerlachreport, Rainer Von Holst Usa, Rainer Von Holst Gerlach, Rainer Von Holst Gomopa, Rainer Von Holst Iserlohn, Rainer Von Holst, Rainer Von Holst Bank, Rainer Von Holst Politico, Rainer Von Holst Augsburg, Rainer Von Holst Augsburg, Rainer Von Holst Bank, Rainer Von Holst Firmenwelten, Rainer Von Holst Gerlachreport, Rainer Von Holst Gerlach, Rainer Von Holst Gomopa, Rainer Von Holst Iserlohn, Rainer Von Holst Politico, Rainer Von Holst Princeton, Rainer Von Holst Usa, Rainer Von Holst Werther, Bankrott Gehen, Bankrott Englisch, Bankrott Auf Englisch, Bankrott Anmelden, Bankrott Adjektiv, Bankrott Argentiniens Staatspleite 2001, Bankrott Anderes Wort, Bankrott Auktionen, Bankrott Argentinien, Bankrott Auktion, Bankrott Airberlin, Bankrott Auf Griechisch, Bankrott Bedeutung, Bankrott Buch, Bankrott Bost, Bankrott Bank, Bankrott Bundesland, Bankrott Brasilien, Bankrott Berlin, Bankrott Financial Crisis, American Chopper Bankrott, Cafe Bankrott, Cafe Bankrott Berlin, Commerzbank Bankrott, Colt Bankrott, Companys Bankrott, Chicago Bankrott, Cafe Bankrott Prenzlauer Allee, Caffee Bankrott, Bankrott Duden, Bankrott Definition, Bankrott Dict, Bankrott Der Ddr, Bankrott Detroit, Bankrott Durch Scheidung, Bankrott Deutsch, Bankrott Deutschland, Bankrott Deutsche Bank, Bankrott Der Bildung, Bankrott Englisch, Bankrott Gehen, Bankrott Gehen Englisch, Bankrott Griechenland, Bankrott Gehen Duden, Bankrott Griechenland Folgen, Bankrott Gegangen, Bankrott Gmbh, Bankrott Gehen Bedeutung, Bankrott Gesetz, Bankrott Gehen Rechtschreibung, Bankrott Herkunft, Bankrott Hadith, Hsv Handball Bankrott, Htc Bankrott, Hsv Bankrott, Handballclub Bankrott 2012, Hattrick Bankrott, Hardwareversand Bankrott, Bank Banker Bankrott Hamburg, Nach Dem Bankrott Habermas, Bankrott Insolvenz, Bankrott Lehman Brothers, Bankrott Machen, Bankrott Mit 4 Buchstaben, Bankrott Monopoly, Bankrott Meyer, Bankrott Machen Englisch, Bankrott Anmelden, Bankrott Machen Duden, Bankrott Magyarul, Jp Morgan Bankrott, Mexx Bankrott, Bankrott Nach Scheidung, Bankrott New York 1975, Nokia Bankrott, Nintendo Bankrott, Neckermann Bankrott, Opel Bankrott, Otto Bankrott, Occ Bankrott, Osobny Bankrott Fyzickej Osoby, O2 Bankrott, Odenwaldschule Bankrott, Pleite Oder Bankrott, Bankrott Oder Insolvent, Bankrott Gehen Oder Bankrott Gehen, Bankrott Pleite, Quiksilver Bankrott, Quelle Bankrott, Bankrott Stgb, Bankrott Synonym, Bankrott Straftat, Bankrott Stgb 283, Bankrott Schema, Bankrott Strafrecht, Bankrott Sein, Bankrott Strafe, Bankrott Tatbestand, Bankrott T Shirt, Bankrott Und Insolvenz, Bankrott Ukraine, Bankrott Usa, Bankrott Unternehmen, Bankrott Us-bundesstaat, Bankrott Usa 1971, Bankrott Usa 2015, Bankrott Ursprung, Bankrott Und Insolvenzverschleppung, Bankrott Urteil, Bankrott Wortherkunft, Bankrott Wiki, Bankrott Wikipedia, Bankrott Werden, Bankrott Was Tun, Bankrott Wiktionary, Bankrott Was Nun, Bankrott Weil Klein These, Bankrott Was Ist Das, Bankrott Was Heisst Das, Ludwig Xiv Bankrott, Yingli Bankrott, Krebs Bankrott Youtube, New York Bankrott, Bankrott New York 1975, Bankrott Zu Gehen, Zalando Bankrott, Zypern Bankrott, Zielpunkt Bankrott, Zentralbank Bankrott, Zypern Bankrott 2013

     

     

    Mutmasslicher Bankrott-Tourist-Scharlatan von Holst steckt wohl hinter Überfall auf dubiose “GoMoPa”und Einbruch

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    FirmenweltenNach mir exklusiv vorliegenden Informationen ist wohl mutmaßlich der von englischen Medien als “Bankrott-Tourist” bezeichnete Rainer von Holst Auftraggeber eines Einbruches bei GoMoPa  sowie eines Überfalles auf den mutmasslich kriminellen “GoMoPa”-Boss Klaus Maurischat (siehe Photo unten), sowie mutmaßlich auf RA Thomas Schulte, wohl Pate des Konglomerates.

    Bei dem Einbruch wurde Material entwendet, das später auf der mutmasslich von Holst zuzuordnenden Webseite Gomopacrime.org und dann auf Investigoo.com (ebenfalls vwohl von Holst) publiziert wurde. Dieses Material ist zweifelsfrei echt. Die Informationen zeigen die kriminelle Organisation GoMoPa von innen.

    Nachdem von Holst von Maurischat mit Mord und Totschlag erpresst wurde, verschwandt dieses Material, das ich dann wieder publiziert habe, nachdem es auf den Wahrheitsgehalt geprüft wurde.

    verpruegelt-05-jpg.jpg (940×470)

    Von Holst hat neben diesem Material, das durchaus aufklärungswirksam ist, Falschinformationen publiziert.

    Zudem ist das Geschäftsmodel derer von  Holst illegal:

    Ein Insider urteilt: “Die von Rainer von Holst angebotenen Partnerschaftsmodelle sind in Deutschland verboten. Derartige Partnerschaftsmodelle mit USA und UK-Firmen sind gar keine Partnerschaften. Zudem gibt es diese Firmen nur auf dem Papier. Die Anmeldung einer solchen Firma kostet 15 € und man kann das Share Capital selbst bestimmen, so z.B. auch 100 Mio. Pfund. Dann nennt Rainer von Holst das auch noch Bankhaus, auch ein Begriff den es im englischen nicht gibt.

    Betrug durch und durch.”

     

    Rainer Von Holst Firmenwelten, Rainer Von Holst Gerlachreport, Rainer Von Holst Usa, Rainer Von Holst Gerlach, Rainer Von Holst Gomopa, Rainer Von Holst Iserlohn, Rainer Von Holst, Rainer Von Holst Bank, Rainer Von Holst Politico, Rainer Von Holst Augsburg, Rainer Von Holst Augsburg, Rainer Von Holst Bank, Rainer Von Holst Firmenwelten, Rainer Von Holst Gerlachreport, Rainer Von Holst Gerlach, Rainer Von Holst Gomopa, Rainer Von Holst Iserlohn, Rainer Von Holst Politico, Rainer Von Holst Princeton, Rainer Von Holst Usa, Rainer Von Holst Werther, Bankrott Gehen, Bankrott Englisch, Bankrott Auf Englisch, Bankrott Anmelden, Bankrott Adjektiv, Bankrott Argentiniens Staatspleite 2001, Bankrott Anderes Wort, Bankrott Auktionen, Bankrott Argentinien, Bankrott Auktion, Bankrott Airberlin, Bankrott Auf Griechisch, Bankrott Bedeutung, Bankrott Buch, Bankrott Bost, Bankrott Bank, Bankrott Bundesland, Bankrott Brasilien, Bankrott Berlin, Bankrott Financial Crisis, American Chopper Bankrott, Cafe Bankrott, Cafe Bankrott Berlin, Commerzbank Bankrott, Colt Bankrott, Companys Bankrott, Chicago Bankrott, Cafe Bankrott Prenzlauer Allee, Caffee Bankrott, Bankrott Duden, Bankrott Definition, Bankrott Dict, Bankrott Der Ddr, Bankrott Detroit, Bankrott Durch Scheidung, Bankrott Deutsch, Bankrott Deutschland, Bankrott Deutsche Bank, Bankrott Der Bildung, Bankrott Englisch, Bankrott Gehen, Bankrott Gehen Englisch, Bankrott Griechenland, Bankrott Gehen Duden, Bankrott Griechenland Folgen, Bankrott Gegangen, Bankrott Gmbh, Bankrott Gehen Bedeutung, Bankrott Gesetz, Bankrott Gehen Rechtschreibung, Bankrott Herkunft, Bankrott Hadith, Hsv Handball Bankrott, Htc Bankrott, Hsv Bankrott, Handballclub Bankrott 2012, Hattrick Bankrott, Hardwareversand Bankrott, Bank Banker Bankrott Hamburg, Nach Dem Bankrott Habermas, Bankrott Insolvenz, Bankrott Lehman Brothers, Bankrott Machen, Bankrott Mit 4 Buchstaben, Bankrott Monopoly, Bankrott Meyer, Bankrott Machen Englisch, Bankrott Anmelden, Bankrott Machen Duden, Bankrott Magyarul, Jp Morgan Bankrott, Mexx Bankrott, Bankrott Nach Scheidung, Bankrott New York 1975, Nokia Bankrott, Nintendo Bankrott, Neckermann Bankrott, Opel Bankrott, Otto Bankrott, Occ Bankrott, Osobny Bankrott Fyzickej Osoby, O2 Bankrott, Odenwaldschule Bankrott, Pleite Oder Bankrott, Bankrott Oder Insolvent, Bankrott Gehen Oder Bankrott Gehen, Bankrott Pleite, Quiksilver Bankrott, Quelle Bankrott, Bankrott Stgb, Bankrott Synonym, Bankrott Straftat, Bankrott Stgb 283, Bankrott Schema, Bankrott Strafrecht, Bankrott Sein, Bankrott Strafe, Bankrott Tatbestand, Bankrott T Shirt, Bankrott Und Insolvenz, Bankrott Ukraine, Bankrott Usa, Bankrott Unternehmen, Bankrott Us-bundesstaat, Bankrott Usa 1971, Bankrott Usa 2015, Bankrott Ursprung, Bankrott Und Insolvenzverschleppung, Bankrott Urteil, Bankrott Wortherkunft, Bankrott Wiki, Bankrott Wikipedia, Bankrott Werden, Bankrott Was Tun, Bankrott Wiktionary, Bankrott Was Nun, Bankrott Weil Klein These, Bankrott Was Ist Das, Bankrott Was Heisst Das, Ludwig Xiv Bankrott, Yingli Bankrott, Krebs Bankrott Youtube, New York Bankrott, Bankrott New York 1975, Bankrott Zu Gehen, Zalando Bankrott, Zypern Bankrott, Zielpunkt Bankrott, Zentralbank Bankrott, Zypern Bankrott 2013, Bankruptcy Chapter 7, Bankruptcy Definition, Bankruptcy Lawyers, Bankruptcy Chapter 11, Bankruptcy Court, Bankruptcy Fraud, Bankruptcy Discharge, Bankruptcy Code, Bankruptcy Forms, Bankruptcy Law, Bankruptcy Attorney, Bankruptcy Attorney Near Me, Bankruptcy And Student Loans, Bankruptcy Automatic Stay, Bankruptcy And Taxes, Bankruptcy And Divorce, Bankruptcy Auto Loans, Bankruptcy Attorney Orlando, Bankruptcy And Child Support, Bankruptcy Auction, Bankruptcy Basics, Bankruptcy Blog, Bankruptcy Benefits, Bankruptcy Business, Bankruptcy Barrel, Bankruptcy Before Divorce, Bankruptcy Bar Association, Bankruptcy Bar Date, Bankruptcy Bill, Bankruptcy Business Definition, Bankruptcy Chapter 7, Bankruptcy Chapter 11, Bankruptcy Court, Bankruptcy Code, Bankruptcy Chapters, Bankruptcy Cost, Bankruptcy Chapter 13 Definition, Bankruptcy Car Loan, Bankruptcy Court Records, Bankruptcy Chapter 7 Forms, Bankruptcy Definition, Bankruptcy Discharge, Bankruptcy Definition Economics, Bankruptcy Dismissal, Bankruptcy Documents, Bankruptcy Discharge Date, Bankruptcy Database, Bankruptcy Due To Medical Bills, Bankruptcy Data, Bankruptcy Delaware, Bankruptcy Exemptions, Bankruptcy Estate, Bankruptcy Eu4, Bankruptcy Exemptions By State, Bankruptcy Explained, Bankruptcy Ecf, Bankruptcy Effects, Bankruptcy Edny, Bankruptcy Eligibility, Bankruptcy Eastern District Of Missouri, Bankruptcy Fraud, Bankruptcy Forms, Bankruptcy Filings, Bankruptcy For Dummies, Bankruptcy Filing Fees, Bankruptcy Forum, Bankruptcy Florida, Bankruptcy Fees, Bankruptcy Form 410, Bankruptcy Filing Search, Bankruptcy Guidelines, Bankruptcy Georgia, Bankruptcy Government Definition, Bankruptcy Gander Mountain, Bankruptcy Garnishment, Bankruptcy Gif, Bankruptcy Greeley Co, Bankruptcy Greenville Sc, Bankruptcy Gambling, Bankruptcy Guide, Bankruptcy Hotline, Bankruptcy Homes, Bankruptcy Hearing, Bankruptcy Homestead Exemption, Bankruptcy Hawaii, Bankruptcy House, Bankruptcy How Long, Bankruptcy History, Bankruptcy Home Loan, Bankruptcy How To File, Bankruptcy In Spanish, Bankruptcy Information, Bankruptcy In Texas, Bankruptcy In Florida, Bankruptcy In California, Bankruptcy In Ohio, Bankruptcy In Illinois, Bankruptcy In Michigan, Bankruptcy In Pa, Bankruptcy Indiana, Bankruptcy Judge, Bankruptcy Jurisdiction, Bankruptcy Jobs, Bankruptcy Judge Salary, Bankruptcy Jokes, Bankruptcy Judge Definition, Bankruptcy Judgement, Bankruptcy Judge Term, Bankruptcy Judgeship Act Of 2017, Bankruptcy Jackson Ms, Bankruptcy Keep House, Bankruptcy Keep Car, Bankruptcy Kansas, Bankruptcy Kit, Bankruptcy Kentucky, Bankruptcy Knoxville, Bankruptcy Keep House And Car, Bankruptcy Kansas City, Bankruptcy Keep Home, Bankruptcy Kansas City Mo, Bankruptcy Lawyers, Bankruptcy Law, Bankruptcy Lawyer Near Me, Bankruptcy Loans, Bankruptcy Lawyer Salary, Bankruptcy Lookup, Bankruptcy Lawyer Nj, Bankruptcy Las Vegas, Bankruptcy Law Center, Bankruptcy Liquidation, Bankruptcy Meaning, Bankruptcy Means Test, Bankruptcy Medical Bills, Bankruptcy Management Solutions, Bankruptcy Mortgage, Bankruptcy Mn, Bankruptcy Meme, Bankruptcy Michigan, Bankruptcy Maryland, Bankruptcy Missouri, Bankruptcy Near Me, Bankruptcy News, Bankruptcy Nj, Bankruptcy Noticing Center, Bankruptcy Northern District Of Texas, Bankruptcy Number, Bankruptcy Nc, Bankruptcy New Jersey, Bankruptcy Notice, Bankruptcy Nevada, Bankruptcy Options, Bankruptcy Online, Bankruptcy Ohio, Bankruptcy On Student Loans, Bankruptcy Oklahoma, Bankruptcy Office, Bankruptcy Oregon, Bankruptcy Outline, Bankruptcy On Credit Report, Bankruptcy Online Course, Bankruptcy Protection, Bankruptcy Process, Bankruptcy Payments, Bankruptcy Petition, Bankruptcy Proof Of Claim, Bankruptcy Public Records, Bankruptcy Puerto Rico, Bankruptcy Paperwork, Bankruptcy Paralegal, Bankruptcy Petition Preparer, Bankruptcy Questions, Bankruptcy Qualifications, Bankruptcy Quizlet, Bankruptcy Questionnaire, Bankruptcy Quotes, Bankruptcy Quiz, Bankruptcy Questions And Answers, Bankruptcy Qualification Calculator, Bankruptcy Qualifications Texas, Bankruptcy Quiz Questions, Bankruptcy Records, Bankruptcy Rules, Bankruptcy Rule 3001(c)(2)(a), Bankruptcy Rule 2002, Bankruptcy Remote, Bankruptcy Rule 2004, Bankruptcy Rule 9014, Bankruptcy Rule 3002.1, Bankruptcy Rule 7004, Bankruptcy Requirements, Bankruptcy Search, Bankruptcy Software, Bankruptcy Student Loans, Bankruptcy Stay, Bankruptcy Score, Bankruptcy Statistics, Bankruptcy Status, Bankruptcy Southern District Of Florida, Bankruptcy Synonym, Bankruptcy Schedules, Bankruptcy Trustee, Bankruptcy Types, Bankruptcy Texas, Bankruptcy Terms, Bankruptcy Timeline, Bankruptcy Taxes, Bankruptcy Test, Bankruptcy Trustee Definition, Bankruptcy The Office, Bankruptcy Tax Return, Bankruptcy Utah, Bankruptcy Unclaimed Funds, Bankruptcy Uk, Bankruptcy Us, Bankruptcy Utility Bills, Bankruptcy Used In A Sentence, Bankruptcy Ucc, Bankruptcy Us Trustee, Bankruptcy Utah Court, Bankruptcy Utilities, Bankruptcy Vs Foreclosure, Bankruptcy Venue, Bankruptcy Virginia, Bankruptcy Vs Default, Bankruptcy Vs Debt Consolidation, Bankruptcy Vancouver Wa, Bankruptcy Video, Bankruptcy Vs Charge Off, Bankruptcy Verification Line, Bankruptcy Va Loan, Bankruptcy Website, Bankruptcy Wiki, Bankruptcy Wisconsin, Bankruptcy Wichita Ks, Bankruptcy What Is It, Bankruptcy Washington State, Bankruptcy Worksheet, Bankruptcy Western District Of Pa, Bankruptcy Western District Of Texas, Bankruptcy Watch, Bankruptcy Xenia Ohio, Bankruptcy X, Xinergy Bankruptcy, Xerox Bankruptcy, Xccent Bankruptcy, Xco Bankruptcy, Xerium Bankruptcy, Xyience Bankruptcy, Xi3 Bankruptcy, Xom Bankruptcy, Bankruptcy Years, Bankruptcy Yakima, Bankruptcy Youtube, Bankruptcy Years On Credit Report, Bankruptcy Yuma Az, Bankruptcy Youngstown Ohio, Bankruptcy Yesterday, Bankruptcy Yourself, Bankruptcy York Pa, Bankruptcy Yelp, Bankruptcy Z Score, Bankruptcy Zanesville Ohio, Bankruptcy Z Score Calculator, Bankruptcy Zuckerberg, Bankruptcy Zero Balance Credit Card, Bankruptcy Zero Tax Code, Bankruptcy Z Value, Bankruptcy Z List Case, Bankruptcy Zephyrhills, Bankruptcy Zimbabwe

    Insider – Verfassungsschutz kümmert sich um “GoMoPa”-Nazi-Ableger “Berlin Journal”

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    Sympathieträger Neo-Nazi

    Insider der Investigativ-Plattform INVESTIGOO berichten:

    “Die Internetseite berlinjournal.biz steht im Visier des deutschen Verfassungsschutzes. Hintergrund sind „fremdenfeindliche Berichte, Rassenhass, Diskriminierung und rechtsradikale Propaganda“.

     

    Sympathieträger Maurischat im Foto oben

    Verantwortliche dieses „Machwerkes“ sind der Herausgeber des „Finanznachrichtendienstes“ gomopa.net, Klaus-Dieter Maurischat und sein Chefredakteur Frank Maiwald. Maurischat, der von der Augsburger Staatsanwaltschaft in einer Erpressungsstrafsache per Haftbefehl gesucht wird, lebt in Berlin im feudalen Untergrund: Unter den Linden 19 in einer 4000-teuren Penthousewohnung.
    Der Chef des maroden „Finanznachrichtendienstes“ Gomopa bastelt seit Monaten an einer Nachfolgelösung für sein in Not geratenes Schiff. Angriffe auf ihn persönlich und die Strukturen von Gomopa haben aus der ehemaligen größten deutschen Drecksschleuder eine lahme Ente gemacht. Internetspezialisten überwachen inzwischen jeden Arbeitsschritt des „Finanznachrichtendienstes“, dessen einzige Aufgabe darin bestand Unternehmer, Unternehmen und Unschuldige zu erpressen.

    Sympathieträger und Ex-STASI-Agent Maiwald im Bild oben

    Hilfe bei seinem neuen Projekt „Berlin Journal“ bekommt er dabei von Gomopa-Chefredakteur Frank Maiwald. Gegen den ehemaligen Redakteur der Berliner B.Z. ermittelt die Staatsanwaltschaft Neuruppin unter dem Aktenzeichen 332 Js 17877/15 wegen Bankrotts, Sozialbetrugs und Steuerhinterziehung. Maiwald hat als Hartz IV-Empfänger regelmässig bis zu 7.000 Euro von Gomopa schwarz bezogen und war an dem Erpressungssystem des Unternehmens direkt beteiligt.
    Die B.Z. hatte ihn wegen Spesenbetrugs gefeuert.
    Unter diesem Vorzeichen ist die „Berichterstattung“ von Berlin Journal besonders widerwärtig. Die Internetseite wird ausschließlich von Maiwald geschrieben. Er arbeitet unter vielen Namen, am liebsten wahlweise unter dem Namen Bodo Hering oder Max Wolf. Das ergibt sich aus Protokollen des Internetverkehrs. Maiwald hat unter dem Titel „Flüchtlinge erhalten Essen für 16 Euro, Hartz-IV-Empfänger für 4,72 Euro“ einen Artikel veröffentlicht, der nicht nur faktisch unwahr ist, sondern seine nationalsozialistische Gesinnung offenbart. Maiwald (Foto), ein ehemaliger Stasi-Informant, kann wohl auch hier seine wahre Herkunft nicht verleugnen.

    Mit einer Welle der Empörung und auch Zustimmung wurde auf der Internetseite auf diesen Bericht reagiert. Dabei konnte sich der Pöbel nach Herzenslust austoben. Das ist auch nach dem Geschmack von Klaus-Dieter Maurischat, dessen politischer Weitblick am Ende des Biertisches endet. Presserechtlich ist das „Organ“ für Ermittlungsbehörden offiziell nicht greifbar. Das Impressum weist als Verantwortlichen für den Inhalt „Bodo Hering“, also Frank Maiwald, aus. Die Redaktion hat keine ladungsfähige Adresse, so dass eigentlich juristisch nicht gegen die Publikation angegangen werden kann.
    Doch so einfach wie noch vor 15 Jahren, als gomopa.net die deutsche Finanz- und Maklerszene in helle Aufregung versetzte, ist die Welt heute nicht mehr. Durch umfassende Recherchen konnten die presserechtlich Verantwortlichen für das Berlin Journal identifiziert werden. Damit die Verantwortlichen durch Geschädigte in die Haftung genommen werden können, veröffentlichen wir hier die entsprechenden Personaldaten:
    MaurischatBJ
    · Klaus-Dieter Maurischat, geb. 12. April 1956
    Lange Straße 38, 27313 Dörverden, Hülsen, 2. OG
    Unter den Linden 19, 10117 Berlin
    Barnstedt 11, 27313 Dörverden
    · Frank Maiwald, alias Bodo Hering, alias Max Wolf, geb. 6. Mai 1959
    Nordweg 150
    16516 Oranienburg
    Derzeit wird versucht, die tatsächlichen Spuren zu verwischen. Klaus-Dieter Maurischat ist dabei auf die Idee gekommen, etwaige Haftungsfragen gleich rund 7.500 Kilometer in den US-amerikanischen Bundesstaat Wisconsin zu schieben. Hier ist die US-amerikanische Zeitschriftengruppe „Berlin Journal Newspapers“ aus Berlin (Wisconsin) ansässig. Das offensichtliche Kalkül von Maurischat und Maiwald: Die Gruppe aus Berlin in Wisconsin stehe hinter der Internetplattform. Damit wäre eine Haftung nach deutschen Recht nahezu unmöglich. Im Amerika gilt ein weitaus liberaleres Presserecht als in Deutschland.
    Dumm nur, dass die beiden erwischt wurden: Die Verlagsleitung der „Berlin Journal Newspapers“ in Wisconsin hat strafrechtliche Schritte gegen Maurischat und Maiwald eingeleitet. Das geht, da Klaus-Dieter Maurischat die Internetseite tatsächlich über die in Delaware angemeldete Firma „Berlin Journal Inc.“ steuert. Damit ist die strafrechtliche Würdigung auch in den USA möglich. Gegen Klaus-Dieter Maurischat und seinen Gomopa-Vize Mark Vornkahl liegen wegen der erheblichen Vorwürfe der Erpressung, Nötigung, Steuerhinterziehung, gewerbsmässigen Betrugs und Nutzung einer US-Körperschaft für kriminelle Handlungen ohnehin schon Haftbefehle in den USA vor.
    berlinjournal.biz gibt vor, mehr als 14.000 tägliche Leser zu haben. Tatsächlich wurden bei Facebook 10.000 „Likes“ für 790 Euro gekauft. So ist auch zu erklären, dass es diese Resonanzen auf die Berichterstattung gibt. Damit aber nicht genug: Über die sozialen Netzwerke wurde der Artikel dann von rechtsradikalen Organisationen wie „Pro Deutschland“ oder AfD verbreitet. Da waren sich Maurischat und Maiwald sicher, die richtigen Mengen an Leser zu finden.
    Denn das Berlin Journal, so der Plan, soll in 2016 den Finanznachrichtendienst Gomopa als Plattform für Erpressung, Nötigung, üble Nachrede, Verunglimpfung als Drecksschleuder ablösen. Jetzt kommt noch eine andere Qualität dazu: menschenverachtender radikalfaschistischer Journalismus.
    Aber nicht alle Leser sind blöd. Mohammed Hadi Al Khafaji bringt es auf den Punkt: „jetzt ist es amtlich: Berlin Journal ist ein Nazi-Blatt!“”

    INVESTIGOO ist derzeit offline – wohl wegen der brisanten Inhalte.

    Die Liquidation der GoMoPa enthüllt

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    Name Bereich Information V.-Datum Relevanz
    GoMoPa GmbH
    Hamburg
    Gesellschaftsbekanntmachungen Liquidation 20.02.2015

    GoMoPa GmbH

    Hamburg

    Die Gesellschaft ist aufgelöst. Die Gläubiger der Gesellschaft werden aufgefordert, sich bei ihr zu melden.

     

    Der Liquidator

    https://www.bundesanzeiger.de/ebanzwww/wexsservlet?session.sessionid=37eadd890bad0b1b61f24b7b78b81b31&page.navid=detailsearchlisttodetailsearchdetail&fts_search_list.selected=bec34c7f4779677f&fts_search_list.destHistoryId=65127

     

    QUELLE: BUNDESANZEIGER

    FBI – Iranian Cyber Actors Targeting Defense Contractors, Schools and Energy Sector

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    The following document was obtained from the website of the Marshfield, Wisconsin Chamber of Commerce.

    FBI-IranianHacking

    FBI Liaison Alert System #M-000045-TT

    • 10 pages
    • TLP: GREEN
    • December 5, 2014

    Download

    The FBI is providing the following information with HIGH confidence:

    A group of cyber actors utilizing infrastructure located in Iran have been conducting computer network exploitation activity against public and private U.S. organizations, including Cleared Defense Contractors (CDCs), academic institutions, and energy sector companies. The actors typically utilize common computer intrusion techniques such as the use of TOR, open source reconnaissance, exploitation via SQL injection and web shells, and open source tools for further network penetration and persistence. Internet-facing infrastructures, such as web servers, are typical targets for this group. Once the actors penetrate a victim network, the actors exfiltrate network design information and legitimate user credentials for the victim network. Often times, the actors are able to harvest administrative user credentials and use the credentials to move laterally through a network.

    According to public network registration information, IP addresses previously utilized by this group were assigned to “Tarh Andishan.” The group primarily utilized two Iran-based IP addresses to conduct its activity, 78.109.194.114 and 217.11.17.99. There has been no recent activity from these IP addresses since early 2014; however, the group now primarily utilizes a series of proxy or midpoint infrastructure in support of their computer network operations. The most recent midpoint infrastructure used by this group was located in the United Kingdom and the Netherlands.

    Tools: The following tools have been known to be utilized by the cyber actors.
    1021114.aspx
    4g.exe
    akisapi.php
    ASPACK
    Atkill.txt
    Bitvise
    c99shell.php
    Cafae
    Cain and Abel
    CCProxy
    CCproxy.zip
    cmd.aspx
    Cprivesc
    debug.aspx
    DefaultWS.asmx
    Dirbuster
    FileZilla
    Find_tokens.exe
    Find_tokens.txt
    Gsecdump
    Havij
    hscan.zip
    hscan1.2
    img.asp
    img.aspx
    In2.txt
    isapi.aspx
    J.exe
    Jasus.exe size: 118,272 MD5: 53841511791E4CAC6F0768A9EB5DEF8A Type: ARP POISON TOOL
    Jasus.pdb
    Kappfree
    kappfree.dll
    Kelloworld
    kelloworld.dll
    Klock
    klock.dll
    Lc.exe
    lc15.exe
    Libeay32.doc
    Libeay32.txt
    Loader.exe
    LoggerModule.e
    mim2.2.exe
    Mimikatz
    mimikatz.exe
    mimikatz.swf
    Mx.exe
    NBrute Force
    NC.exe
    ncat.exe
    Ncrack
    Nc-themida.exe
    Netcat
    Netscp.exe
    netscp_total.exe
    Netview
    Nmap
    NTFS
    OS_Detector.exe
    ospcsvc.exe
    osppsvc.exe
    OSQL
    ossisvc.exe
    ossysvc.exe
    Plink
    plink.exe
    priorities_readfile.aspx
    Privesc.exe size: 51,200 MD5: DABF638EB53070CDC7B10BFA5E4E8142
    ProcDump
    proxy.php
    PsExec
    PsExec.exe
    PsKill
    PsList
    Putty Link
    putty.exe
    pw.exe
    PwDump
    PwDump7.exe
    PwDump7_p.exe
    rdcmd.aspx
    RunAs.exe
    Samdump
    sekurlsa.dll
    Sl.exe
    snmpwalk.exe
    SQL Manager
    STR.EXE
    Themida
    u.exe
    U.exe size: 60,928 MD5: DDA3E5629A0E8FB63A3E19027AE45458
    upload.aspx
    Wcet
    winBypass.php
    WinDump
    WinDump.exe
    winpcap-nmap-4.12.exe
    winusr.dll
    wminotify.dll
    wndTest.exe
    wt.exe
    xcmd-aspack.exe
    xCmdSvc.exe
    Xcmdt.exe
    xcmd-themida.exe
    xp_cmdshell
    ZXPortMap.exe

    IP Addresses: The following IP addresses have been observed to be utilized by the cyber actors.
    64.120.208.154
    78.109.194.114
    159.253.144.209
    217.11.17.99
    95.211.191.225
    95.211.241.249
    95.211.241.251
    108.175.153.158
    88.150.214.162
    88.150.214.166
    88.150.214.168
    88.150.214.170
    184.82.158.18

    Identify creation of users and databases named “haha”.

    Iran News, Iran Hostage Crisis, Iran Contra Affair, Iran Flag, Iran Iraq War, Iran Castillo, Iran Nuclear Deal, Iran Map, Iran Sanctions, Iran President, Iran Air, Iran Allies, Iran Air Flight 655, Iran And Iraq, Iran Air Force, Iran Army, Iran And Russia, Iran Ayatollah, Iran And Israel, Iran And North Korea, Iran Barkley, Iran Before 1979, Iran Brown, Iran Birth Rate, Iran Bennett, Iran Boeing, Iran Beaches, Iran Beliefs, Iran Bonyads, Iran Brain Drain, Iran Contra Affair, Iran Castillo, Iran Capital, Iran Contra Affair Apush, Iran Currency, Iran Culture, Iran Contra Hearings, Iran Continent, Iran Cities, Iran Contra Affair Summary, Iran Deal, Iran Definition, Iran Deal Obama, Iran Demographics, Iran Dictator, Iran Death Penalty, Iran Democracy, Iran During The Cold War, Iran Desert, Iran Drone, Iran Election, Iran Economy, Iran Eory, Iran Embassy, Iran Etf, Iran Ethnic Groups, Iran Exports, Iran Embassy Usa, Iran Eisenhower, Iran Execution, Iran Flag, Iran Facts, Iran Food, Iran Flag Emoji, Iran Football, Iran Fighter Jet, Iranefarda, Iran Foreign Policy, Iran Foreign Minister, Iran Flag Meaning, Iran Government, Iran Gdp, Iran Gdp Per Capita, Iran Geography, Iran Government Type, Iran Green Revolution, Iran Guardian Council, Iran Gdp 2016, Iran Gay, Iran Gross Domestic Product, Iran Hostage Crisis, Iran Hostage Crisis Apush, Iran History, Iran Hostage Crisis President, Iran Hostage Crisis Definition, Iran Hostage Movie, Iran Hostage Crisis Timeline, Iran Human Rights, Iran Hostage Crisis Video, Iran Holidays, Iran Iraq War, Iran In The 70s, Iran Israel, Iran Isis, Iran In Syria, Iran Iraq Map, Iran Iraq War Causes, Iran India, Iran Iraq War Timeline, Iran Is Shia, Iran Jokes, Iran Jcpoa, Iran Judicial Branch, Iran Jewish Population, Iran Jet, Iran Jobs, Iran Jet Fighter, Iran Jersey, Iran Jewelry, Iran Japan, Iran Khodro, Iran King, Iran Kedisi, Iran Khamenei, Iran Kurds, Iran Khomeini, Iran Korea, Iran Kuwait, Iran Kidney Market, Imran Khan, Iran Launches Satellite, Iran Language, Iran Leader, Iran Live Tv, Iran Location, Iran Local Time, Iran Literacy Rate, Iran Life Expectancy, Iran Landscape, Iran Leadership, Iran Map, Iran Military, Iran Missile Test, Iran Missile, Iran Money, Iran Music, Iran Military Strength, Iran Military News, Iran Mountains, Iron Man, Iran News, Iran Nuclear Deal, Iran Nuclear Weapons, Iran Nuclear, Iran News Today, Iran Navy, Iran National Football Team, Iran North Korea, Iran Natural Resources, Iran Newspaper, Iran On Map, Iran Oil, Iran Oil Production, Iran Official Language, Iran On World Map, Iran Opec, Iran Official Name, Iran Obama Deal, Iran Outline, Iran Oil Exports, Iran President, Iran Population, Iran People, Iranproud, Iran Pronunciation, Iran Presidential Election, Iran Prime Minister, Iran Persia, Iran Pictures, Iran Politics, Iran Qatar, Iran Qatar Relations, Iran Quizlet, Iran Quds Force, Iran Queen, Iran Quotes, Iran Qom, Iran Quora, Iran Qatar Pipeline, Iran Qaher 313, Iran Religion, Iran Revolution, Iran Russia, Iran Rial To Usd, Iran Rial, Iran Resources, Iran Race, Iran Restaurant, Iran Refugees, Iran Ruler, Iran Sanctions, Iran Satellite, Iran Supreme Leader, Iran Sunni Or Shia, Iran Syria, Iran So Far, Iran Shah, Iran Saudi Arabia, Iran Shia, Iran Soccer, Iran Time, Iran Tehran, Iran Today, Iran Tv, Iran Trump, Iran Tourism, Iran Timeline, Iran Type Of Government, Iran Travel, Iran Travel Ban, Iran Uk, Iran Us Relations, Iran Under The Shah, Iran Unemployment Rate, Iran Us News, Iran University Of Science And Technology, Iran Us Embassy, Iran Uzbekistan, Iran Us Nuclear Deal, Iran Us Dollar, Iran Vs Iraq, Iran Vs Usa, Iran Volleyball, Iran Visa, Iran Vs Israel, Iran Vs Saudi Arabia, Iran Vice President, Iran Vs Isis, Iran Volleyball Team, Iran Vote, Iran War, Iran Women, Iran Wiki, Iran Weather, Iran World Map, Iran Ww2, Iran World Cup, Iran Wrestling, Iran Wikitravel, Iran White Revolution, Iran Contra Affair, Iran Castillo, Iran Capital, Iran Contra Affair Apush, Iran X, Iran Currency, Iran Culture, Iran Contra Hearings, Iran Continent, Iran Cities, Iran Yemen, Iran Youtube, Iran Youth, Iran Year, Iran Yellow Pages, Iran Yazd, Iran Year Converter, Iran Young Population, Iran Youth Population, Iran Yahoo News, Iran Zip Code, Iran Zoroastrian, Iran Zamin, Iran Zabol, Iran Zarif, Iran Zagros Mountains, Iran Zamin Bank, Iran Zoo, Iran Zumba, Iran Zamin Tv,

    SECRET – FBI Cyber Bulletin: Malicious Actors Targeting Protected Health Information

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    FBI-TargetingHealthcare

    FBI Liaison Alert System #A-000039-TT

    • 1 page
    • August 19, 2014

    Download

    The FBI is providing the following information with HIGH confidence. The FBI has observed malicious actors targeting healthcare related systems, perhaps for the purpose of obtaining Protected Healthcare Information (PHI) and/or Personally Identifiable Information (PII). These actors have also been seen targeting multiple companies in the healthcare and medical device industry typically targeting valuable intellectual property, such as medical device and equipment development data.

    TECHNICAL DETAILS

    The FBI has received the following information pertaining to a recent intrusion into a health care system that resulted in data exfiltration. Though the initial intrusion vector is unknown, we believe that a spear phish email message was used to deliver the initial malware. Typically, these actors use Information Technology themed spear-phishing messages which contain a malicious link that may connect to a new VPN site/service/client or a new Webmail site/software. Once access is obtained, the actors may collect and use legitimate account credentials to connect to the targeted system, usually through VPN.

    The following are indicators of possible compromise:

    Network-Based Indicator

    Outgoing traffic through standard HTTP/HTTPS ports 80, 443 (and possibly others), but obfuscates traffic by XORing the traffic with 0×36. The below is a SNORT signature related to this activity:
    alert tcp any any -> any any (content:”|6E|”; depth: 1; content:”|36 36 36 58 36 36 36|”; offset: 3; depth: 7; msg: “Beacon C2″; sid: 1000000001; rev:0)

    Host-Based Indicator

    The malware runs as a Windows service “RasWmi (Remote Access Service)” from the malicious .dll C:\Windows\system32\wbem\raswmi.dll. The implant is installed from an executable file (the file has been observed under a variety of names) which drops the raswmi.dll file into the same directory and sets it to run as a service.

    Revealed – Feds Issue Bulletin on Google Dorking

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

     

     

    An examples

    A bulletin issued by the Department of Homeland Security, the FBI and the National Counterterrorism Center earlier this month warns law enforcement and private security personnel that malicious cyber actors can use “advanced search techniques” to discover sensitive information and other vulnerabilities in websites.  The bulletin, titled “Malicious Cyber Actors Use Advanced Search Techniques,” describes a set of techniques collectively referred to as “Google dorking” or “Google hacking” that use “advanced operators” to refine search queries to provide more specific results.  Lists of these operators are provided by Google and include the following examples:

    allintext: / intext: Restricts results to those containing all the query terms you specify in the text of the page
    allintitle: / intitle: Restricts results to those containing all the query terms you specify in the title
    allinurl: / inurl: Restricts results to those containing all the query terms you specify in the URL
    filetype:suffix Limits results to pages whose names end in suffix
    site: Using the site: operator restricts your search results to the site or domain you specify
    Minus sign  ( – ) to exclude Placing  a minus sign immediately before a word indicates that you do not want pages that contain this word to appear in your results
    Phrase search (using double quotes, “…” ) By putting double quotes around a set of words, you are telling Google to consider the exact words in that exact order without any change

    Here is an example of a query constructed from these operators:

    “sensitive but unclassified” filetype:pdf site:publicintelligence.net

    The bulletin warns that malicious cyber actors can use these techniques to “locate information that organizations may not have intended to be discoverable by the public or to find website vulnerabilities for use in subsequent cyber attacks.”  Hackers searching for “specific file types and keywords . . . can locate information such as usernames and passwords, e-mail lists, sensitive documents, bank account details, and website vulnerabilities.”  Moreover, “freely available online tools can run automated scans using multiple dork queries” to discover vulnerabilities.  In fact, the bulletin recommends that security professionals use these tools “such as the Google Hacking Database, found at http://www.exploit-db.com/google-dorks, to run pre-made dork queries to find discoverable proprietary information and website vulnerabilities.”

    Several security breaches related to the use of “advanced search techniques” are also referenced in the bulletin.  One incident in August 2011 resulted in the compromise of the personally identifiable information of approximately 43,000 faculty, staff, students and alumni of Yale University.  The information was located in a spreadsheet placed on a publicly accessible File Transfer Protocol (FTP) server and was listed in Google search results for more than ten months prior to being discovered.  Another incident in October 2013 involved attackers using Google dorking to discover websites running vulnerable versions of vBulletin message board software prior to running automated tools that created administrator accounts on the compromised sites.  As many as 35,000 websites were believed to have been compromised in the incident.

    Revealed – DHS National Cybersecurity and Communications Integration Center Heartbleed Advisories

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    The following advisories were issued by the National Cybersecurity and Communications Integration Center on April 10, 2014.  Both notices are marked with distribution restrictions based on US-CERT Traffic Light Protocol.  The advisory marked with TLP: GREEN is not intended for public distribution.

    “Heartbleed” OpenSSL Vulnerability TLP: GREEN 4 pages Download
    “Heartbleed” OpenSSL Vulnerability TLP: WHITE 2 pages Download

    Security researchers from Google Security recently discovered a vulnerability with the Heartbeat extension (RFC6520) to OpenSSL’s Transport Layer Security (TLS) and the Datagram Transport Layer Security (DTLS) protocols. According to open source reports, the vulnerability has existed within certain OpenSSL frameworks since at least 2012. The Heartbeat extension is functionally a “keep-alive” between end-users and the secure server. It works by sending periodic “data pulses” of 64KB in size to the secure server and once the server receives that data; it reciprocates by re-sending the same data at the same size. The out-of-bounds “read” vulnerability exists because the Heartbeat extension in OpenSSL versions 1.0.1 through and 1.0.2-beta (including 1.0.1f and 1.0.2-beta1) do not properly validate the data being sent from the end-user. As a result, a malicious actor could send a specially-crafted heartbeat request to the vulnerable server and obtain sensitive information stored in memory on the server. Furthermore, even though each heartbeat only allows requests to have a data size limited to 64KB segments, it is possible to send repeated requests to retrieve more 64KB segments, which could include encryption keys used for certificates, passwords, usernames, and even sensitive content that were stored at the time. An attacker could harvest enough data from the 64KB segments to piece together larger groupings of information which could help an attacker develop a broader understanding of the information being acquired.

    According to a Trusted Third Party, exploit code written in Python Script has been observed in publicly available online outlets. There have also been a number of underground forums discussing the vulnerability, which indicates interest from nefarious actors. Internal Trusted Third Party assessments reveal that the code is 100% effective against the specific versions of SSL protocol noted above. However, at this time it has not been observed having the capability to compromise all SSL protocols. It is also important to note that at this time there have been no reported malicious attacks that exploit this vulnerability.

    The following vendors and products may include vulnerable OpenSSL versions within their product distributions:8
    • CentOS Project – CentOS 6
    • Debian Project – Debian GNU/Linux 7.0
    • FreeBSD Project – FreeBSD 10.0 and prior
    • Gentoo Foundation – Gentoo releases through 8 April 2014
    • Novell, Inc – openSUSE 12.3 and 13.1
    • Red Hat Inc – Fedora 19 and 20, Enterprise Linux/Desktop/HPC Node/Server/Workstation v.6; Enterprise Linux Server AUS v.6.5; Enterprise Linux Sever EUS v.6.5.z Enterprise Virtualization 3; and Storage Server 2.1
    • Android mobile devices
    • Third Party code using Python/Perl/Ruby
    • OpenVPN
    • Aruba Networks: ArubeOS 6.3.x and 6.4.x; ClearPass 6.1.x, 6.2.x, and 6.3.x
    • Check Point Software Technologies: All versions of Security Gateway, Security Management, Multi-Domain Management/Provider-1, Data Center Security appliances, Endpoint Security Server, Endpoint Connect and SSL Network Extender, Gaia, Gaia Embedded, SecurePlatform 2.6, SecurePlatform Embedded, IPSO 4.x, IPSO 5.x, IPSO 6.2
    • Cisco Systems: AnyConnect Secure Mobility Client for iOSl Desktop Collaboration Experience DX650, Unified 7900, 8900, 9900 series IP Phones, TelePresence Video Communication Server (VCS)
    • Fortinet Inc: FortiGate (FortiOS) 5.0 and higher, FortiAuthenticator 3.0 and higher, FortiMail 5.0 and higher, FortiVoice, and FortiRecorder
    • Juniper Networks: JUNOS OS 13.3R1, Odyssey Client 5.6r5 and later, IVEOS 7.4r1 and later as well as 8.0r1 and later, UAD 4.4ra and layer as well as 5.0r1 and later, JUNOS Pulse (Desktop) 4.0r5 and later as well as 5.0r1 and later, Network Connect 7.4r5 through 7.4r9.1 and 8.0r1 through 8.0r3.1, JUNOS Pulse (Mobile) for Android and iOS 4.2r1 and later
    • F5 Networks: BIG-IP AAM 11.5.0 – 11.5.1; BIG-IP AFM 11.5.0 – 11.5.1; BIG-IP Analytics 11.5.0 – 11.5.1; BIG-IP APM 11.5.0 – 11.5.1; BIG-IP ASM 11.5.0 – 11.5.1; BIG-IP Edge Clients for Apple iOS 1.0.5, 2.0.0 – 2.0.1; BIG-IP Edge Clients for Linux 7080 – 7101; BIG-IP Edge Clients for MAC OS X 7080 – 7101; BIG-IP Edge Clients for Windows 7080 – 7101; BIG-IP GTM 11.5.0 – 11.5.1; BIG-IP Link Controller 11.5.0 – 11.5.1; BIG-IP LTM 11.5.0 – 11.5.1; BIG-IP PEM 11.5.0 – 11.5.1; BIG-IP PSM 11.5.0 – 11.5.1

    Many of the vulnerable vendors noted above have already begun issuing patches and have information posted on their websites and portals addressing the vulnerability and a plan of action.

    On a more positive note, the web browsers Firefox, Chrome, and Internet Explorer on Windows OS all use Windows cryptographic implementation, not OpenSSL.

    The nature of this vulnerability is such that if encryption keys are captured by a malicious actor, then previously captured transmissions including usernames, passwords, and other sensitive content could be obtained and decrypted. From an end-user’s perspective, changing passwords before system patches have been implemented could still leave SSL transmissions vulnerable. Until patches are fully implemented, closely monitoring email accounts, bank accounts, social media accounts, and other assets are strongly recommended. End-users can set their web browsers so that they automatically detect revoked certificates; Firefox does this automatically.

    Can I share this product?

    Recipients may share TLP: GREEN information with peers and partner organizations within their sector or community, but not via publicly accessible channels.

    Die bezahlten Reisen und Immobilien von Thomas und Beate Porten /GoMoPa

    Bernd-Pulchernst

    Liebe Leser,

    nach vorliegenden Unterlagen wurden über zwei Jahrzehnte Reisen von Thomas Porten, IZ, Gesellschafter und Chefredakteur von der Immobilienzeitung durch Immobilienfirmen  bezahlt. Ebenso von Dr. Rainer Zitelmann, dem “Auschwitz-Experten”.

    Anzeigen und Abonnements sowieso in Millionenhöhe für Thomas Porten und Beate Porten, Wirtschafts-Staatsanwältin in Wiesbaden:

    Niemand wusste dies ausser Porten und Porten oder ?

    Dss Haus von Beate und Thomas Porten in Mainz wurde wohl mithin ebenfalls von Immobilienfirmen bezahlt, ebenfalls Hotelaufenthalte und Urlaubsreisen.

    Bis zur Aufklärung dieser Korruptionsaffäre habe ich allen Einnahmden aus Deutschland entsagt  und wenn dies 100 Jahre dauert !.

    Kann das die Gegenseite und ihr korrupter Haufen auch ?

    Herzlichst Ihr

    Magister Bernd Pulch

    PS Wieviel die mutmasslichen Porten-Genossen der GoMoPa erhalten haben können Sie im Manager Magazin, der SZ und der Zeit nachlesen.

    Der Anfang vom Ende des “GoMoPa”-“Nawito”-Google-Terrors

    BGH-Urteil zu Suchmaschinen
    Richter nehmen Google-Vorschläge unter die Lupe
    Ein Kosmetikhersteller hat vor dem BGH ein wegweisendes Urteil erstritten: Künftig können Suchmaschinenbetreiber für Verletzungen des Persönlichkeitsrechts bei sogenannten Autocomplete-Vorschlägen haftbar gemacht werden.

    Von Michael Reissenberger, SWR

    Gernot Lehr, der Anwalt von Bettina Wulff, die ihren Ruf gegen Rotlichtgerüchte vor Gericht verteidigt, hatte den richtigen Riecher, als er kürzlich eine Vertagung des laufenden Verfahrens erwirkte. Denn das jüngste Urteil des Bundesgerichtshofs (BGH) sorgt künftig für Schutz für alle, die sich beim Googeln ihres Namens von Suchvorschlägen beleidigt fühlen.

    Die Bundesrichter nehmen jetzt die Betreiber von Suchmaschinen stärker in die Pflicht. Sie müssen zwar nicht selber das Netz auf alle Suchwortkombinationen, die vielleicht Anstoß erregen könnten, durchpflügen. Denn – so sagen die Bundesrichter – im Prinzip sei gegen eine Suchwortergänzung nichts einzuwenden. Schließlich würden von einer Rechenmaschine zunächst nur Suchvorschläge von Internetnutzern ausgewertet.

    Geldentschädigung für Rufschädigungen

    Aber sie müssen spätestens reagieren, wenn Betroffene auf solche Rufschädigungen per Internet hinweisen. Die Internetunternehmen müssen dann zumindest rechtswidrige Verletzungen des Persönlichkeitsrechts abstellen und bei weiteren Verstößen auch eine Geldentschädigung bezahlen.

    Schutz der Persönlichkeitsrecht hat Vorrang
    tagesschau 20:00 Uhr, 14.05.2013, Gigi Deppe, SWR
    Download der Videodatei
    Ein Kosmetikhersteller hat dieses Urteil für Google-Geschädigte erstritten. Er sah seinen Namen zu Unrecht mit den Kombinationswörtern Scientology und Betrug in den Schmutz gezogen und bestand darauf, dass er in keinerlei Zusammenhang mit diesem als geldgierig verrufenen Sektenbetrieb steht oder stand. Zudem sei ihm kein Betrug vorzuwerfen, es habe auch kein entsprechendes Ermittlungsverfahren gegeben. Die Suchergebnisse von Google würden auch keine einzige Seite auflisten, die eine Verbindung zwischen dem Kosmetikhersteller und den beiden Ergänzungswörtern Scientology und Betrug aufweisen.

    Ihm hatten Kölner Richter in zwei Instanzen den Schutz gegen den Internetriesen verweigert. Es seien schließlich nur mathematische Effekte je nach Suchworthäufigkeit, kein Internetnutzer nehme für bare Münze, welche Suchwortvorschläge da kommen, so hatten die Kölner Juristen argumentiert.

    Hintergrund
    Googles Autocomplete-Funktion
    Ein praktischer Helfer mit Risiken | mehr
    Google allzu dickfellig

    Doch nun muss Google solche Beschwerden wegen Rufmords ernster nehmen. Auch im Fall von Bettina Wulff dürfte mit dem jetzigen Bundesgerichtshofurteil klar sein, dass der Internetkonzern sich in den letzten Monaten allzu dickfellig verhalten hat. Die Rotlichtgerüchte um die Präsidentengattin, die der Google-Suchwortmodus verbreitet hat, waren ja schon seit längerem öffentliches Thema, bis sich Bettina Wulff entschloss, dagegen vorzugehen. Hier dürfte sehr spannend werden, ob und welche Geldentschädigung hier verlangt werden kann.

    Der Bundesgerichtshof hatte auch im vorliegenden Fall noch nicht darüber zu entscheiden, weil er das Kölner Musterverfahren nochmal an die untere Instanz zur Nachbesserung zurückgeschickt hat. Die Bundesrichter kündigten aber im Grundsatz bei solchen Google-Rufschädigungen einen Anspruch auf Geldentschädigung zumindest in engen Grenzen an.

    Neue schwere Straftaten wohl wieder von “Gomopa” im Auftrag ihrer “Partner” – mutmasslich “Peter Ehlers” und “Otmar Knoll”

    graph

    Liebe Leser,

    obenestehende Graphik zeigt die tagelangen, schweren Internetatatcken wohl immer wieder der Hacker der “GoMoPa” im Auftrag von mutmasslich “Peter Ehlers” und “Otmar Knoll” auf unsere Server – wie sie es auch bei Heinz Gewrlach machten – kurz vor seinem für fast alle überraschenden Tode.

    “Otmar Knoll” von “Fairvesta” hat diese Angriffe uns gegenüber schriftlich angekündigt, ebenso wie “Peter Ehlers”, verstrickt mit der Fondsfirma “SJB” seines Parners “Gerd Bennewirtz”, uns mit Mordanschlägen gedroht hat !

    Wür den Sie diesen Charaktern vertrauen und Ihr Geld anvertrauen ?

    Sie sehen, mit welchen Figuren wir es hier zu tun haben…

    Hier noch einmal die wichtigsten Infos zu diesen schweren Straftaten:

    Neue Serverangriffe der vorbestraften Finanzbetrüger der “GoMoPa” und ihrer “Partner” mutmasslich “Peter Ehlers” und “Otmar Knoll”

    Hier sehen Sie obenstehend den Beleg für die Internet-Attacken der er vorbestraften Finanzbetrüger der “GoMoPa” und ihrer “Partner” mutmasslich “Peter Ehlers” und “Otmar Knoll”

    Das Urteil zu den vorbestraften Finanzbetrügern der “GoMoPa” wegen Betruges am eigenen Anleger finden Sie unter

    https://berndpulch.org/das-betrugsurteil-gegen-bennewirtz-und-peter-ehlers-gomopa-partner-maurischat-und-vornkahl-wg-betruges-am-eigen-anleger/

    These graphs below show the cyberattacks on our website initiated by the suspects we already mentioned and who even announced in an email that tehy would do this illegal internet crime. The email was by Otmar Knoll, Fairvesta, who announced the cybercrime. The suspected hackers are from “GoMoPa” and their thugs.

    The graph shows the DDos attacks on our servers.

    What is a DDos attack ?

    Read here:

    http://en.wikipedia.org/wiki/Denial-of-service_attack

    These internet crimes are punished with longterm jail sentences and financial compensation..

    Die obenstehende Graphik zeigen die Hackerangriffe auf unsere Webseiten, die seit Jahren durchgeführt werden im Ausschnitt. In einer Email an uns hat Otmar Knoll, Fairvesta, die Hackerangriffe, somit schwere Internetverbrechen angekündigt. Wir haben diese Emails bereits veröffentlicht. Mutmasslich arbeitet Otmar Knoll mit den üblichen Verdächtigen der “GoMoPa”, ihren Informanten und Hackern zusammen:

    Die Graphiken zeigt die sogenannten DDos-Angriffe auf unsere Server.

    Was ist eine DDos Attacke ?

    http://de.wikipedia.org/wiki/Denial_of_Service

    Lesen Sie hier:

    Diese Vergehen werden mit langjährigen Freiheitsstrafen und Schadensersatz bestraft.

    Würden Sie dem mutmasslichen Auftraggeber von Internet-Verbrechern, Otmar Knoll, “Fairvesta”, Geld anvertrauen ?

    Liebe Leser,

    wir haben eine Umfrage gestartet:

    Würden Sie dem mutmasslichen Auftraggeber von Internet-Verbrechern, Otmar Knoll, “Fairvesta”, der diese Taten selbst per E-Mail ankündigt, Ihr Geld anvertrauen ?

    Und zu welchen Taten halten Sie so jemanden noch für fähig ?

    Wir freuen uns auf Ihre Reaktionen !

    Hier die Belege für die monatelangen Internet-Attacken der Internet-Kriminellen, die Graphiken zeigen die DDos-Attacken auf über 20 Webseiten:

    https://berndpulch.org/2013/04/04/a-overview-of-the-heavy-cyberattacks-on-our-websites-to-stop-the-truth-done-by-the-suspects/

    und

    https://berndpulch.org/2013/04/05/even-more-mental-and-pysical-attacks-on-our-servers-by-the-suspects-of-gomopa-nawito-otmar-knoll-and-peter-ehlers/

    Hier die Rechtslage:

    https://berndpulch.org/2013/04/05/die-rechtslage-bei-schweren-internet-angriffen-wie-von-mutmasslich-gomopa-nawito-und-konsorten/

    Hier die Bekenner-E-Mail des dubiosen “Otmar Knoll” von der dubiosen “fairvesta”:

     

    Zitat OtmarKnoll/Fairvesta:

     

    Subject:  

    AW: AW: AW: AW: [Fwd: Your enquiry]

    From:  

    “Knoll, Otmar”

    Date:  

    Tue, February 5, 2013 8:14 pm

    To:  

    “‘office@ebizz.tv'”

    Priority:  

    Normal

    Options:  

    View Full Header | View Printable Version  | Download this as a file

     

    Schade dass Sie nicht hören wollen, nun ist es zu spät, vielleicht überlegen Sie
    sich das noch mal.
    Den wenn die Domains offline gehen, dann haben Sie kein Medium mehr.
    Wer nicht hören will muss fühlen sagt ein Sprichwort.
            
            
            http://i-nvestment.com/category/leserbrief/
            
            
    Mit freundlichen Grüßen
            
    Otmar Knoll
    Handlungsbevollmächtigter
            
    fairvesta Group AG
    Konrad-Adenauer-Str. 15
    D - 72072 Tübingen
    Tel:  +49 (0)7071 3665-0
    Fax: +49 (0)7071 3665-77
            o.knoll@fairvesta.de 
    www.fairvesta.de
            
    Amtsgericht Stuttgart HRB 382675
    Vorstand: Hermann Geiger
    Vorsitzender des Aufsichtsrates: Alfred Renner
    Sitz: Tübingen
    USt.-IdNr.: DE814337296

    Subject:  

    Jetzt aber offline

    From:  

    “Knoll, Otmar” <O.Knoll@fairvesta.de>

    Date:  

    Tue, February 5, 2013 11:20 pm

    To:  

    “‘office@ebizz.tv'” <office@ebizz.tv>

    Priority:  

    Normal

    Options:  

    View Full Header | View Printable Version  | Download this as a file

     

    http://www.investment-on.com/component/content/article/34-investment-m
    
    UPS, ist wohl offline gegangen, da haben meine Rundschreiben wohl geholfen. So wie
    es aussieht ist Ihre Seite nicht mehr erreichbar, insbesondere nachdem Sie meine
    letzten Mails online gestellt haben. Haben Sie wirklich geglaubt das das durchgeht
    und wir uns das gefallen lassen?
    
    Das kann auch mit den andern Domains so gehen, Sie haben ja noch genügend online!
    
    ....
    Also Sie
    haben keine Chance!
     
    Mit freundlichen Grüßen
     
    Otmar Knoll
    Handlungsbevollmächtigter
     
    fairvesta Group AG
    Konrad-Adenauer-Str. 15
    D - 72072 Tübingen
    Tel:  +49 (0)7071 3665-0
    Fax: +49 (0)7071 3665-77
    o.knoll@fairvesta.de
    www.fairvesta.de
     
    Amtsgericht Stuttgart HRB 382675
    Vorstand: Hermann Geiger
    Vorsitzender des Aufsichtsrates: Alfred Renner
    Sitz: Tübingen
    USt.-IdNr.: DE814337296
     
    -------------------------------------------------------------------
    Diese E-Mail enthält vertrauliche und/oder rechtlich geschützte Informationen. Wenn
    Sie nicht der richtige Adressat sind oder diese E-Mail irrtümlich erhalten haben,
    informieren Sie bitte sofort den Absender und vernichten Sie diese Mail. Das
    unerlaubte Kopieren, die unbefugte Weitergabe oder die Verwendung des Inhalts dieser
    Mail ist nicht gestattet.
    -------------------------------------------------------------------
    This e-mail may contain confidential and/or privileged information. If you are not
    the intended recipient (or have received this e-mail in error) please notify the
    sender immediately and destroy this e-mail. Any unauthorized copying, disclosure,
    distribution or usableness contents of this e-mail is strictly forbidden.
    -------------------------------------------------------------------
    Ce courriel est confidentiel et protégé. L'expéditeur ne renonce pas aux droits et
    obligations qui s'y rapportent. Toute diffusion, utilisation ou copie de ce message
    ou des renseignements qu'il contient par une personne autre que le (les)
    destinataire(s) désigné(s) est interdite. Si vous recevez ce courriel par erreur,
    veuillez m'en aviser immédiatement, par retour de courriel ou par un autre moyen.
    -------------------------------------------------------------------
     

    Wie sich die Internet-Kriminellen wie mutmasslich Otmar Knoll und “GoMoPa” und Genossen selber entlarven

     

     

     

    IMMER WIEDER WERDEN WEBSITES MUTMASSLICH DURCH “GOMoPa” UND DEREN MUTMASSLICHE AUFTRAGGEBER ATTACKIERT WIE MUTMASSLICH “GERD BENNEWIRTZ” UND “PETER EHLERS”SOWIE OTMAR KNOLL / FAIRVESTA:

     

    Zitat OtmarKnoll/Fairvesta:

     

    Subject:  

    AW: AW: AW: AW: [Fwd: Your enquiry]

    From:  

    “Knoll, Otmar”

    Date:  

    Tue, February 5, 2013 8:14 pm

    To:  

    “‘office@ebizz.tv'”

    Priority:  

    Normal

    Options:  

    View Full Header | View Printable Version  | Download this as a file

     

     

     

    Schade dass Sie nicht hören wollen, nun ist es zu spät, vielleicht überlegen Sie
    sich das noch mal.
    Den wenn die Domains offline gehen, dann haben Sie kein Medium mehr.
    Wer nicht hören will muss fühlen sagt ein Sprichwort.
            
            
            http://i-nvestment.com/category/leserbrief/
            
            
    Mit freundlichen Grüßen
            
    Otmar Knoll
    Handlungsbevollmächtigter
            
    fairvesta Group AG
    Konrad-Adenauer-Str. 15
    D - 72072 Tübingen
    Tel:  +49 (0)7071 3665-0
    Fax: +49 (0)7071 3665-77
            o.knoll@fairvesta.de 
    www.fairvesta.de
            
    Amtsgericht Stuttgart HRB 382675
    Vorstand: Hermann Geiger
    Vorsitzender des Aufsichtsrates: Alfred Renner
    Sitz: Tübingen
    USt.-IdNr.: DE814337296

     

     

     

     

     

     

    Subject:  

    Jetzt aber offline

    From:  

    “Knoll, Otmar” <O.Knoll@fairvesta.de>

    Date:  

    Tue, February 5, 2013 11:20 pm

    To:  

    “‘office@ebizz.tv'” <office@ebizz.tv>

    Priority:  

    Normal

    Options:  

    View Full Header | View Printable Version  | Download this as a file

     

     

     

    http://www.investment-on.com/component/content/article/34-investment-m
    
    UPS, ist wohl offline gegangen, da haben meine Rundschreiben wohl geholfen. So wie
    es aussieht ist Ihre Seite nicht mehr erreichbar, insbesondere nachdem Sie meine
    letzten Mails online gestellt haben. Haben Sie wirklich geglaubt das das durchgeht
    und wir uns das gefallen lassen?
    
    Das kann auch mit den andern Domains so gehen, Sie haben ja noch genügend online!
    
    ....
    
    Also Sie
    haben keine Chance!
    
    Mit freundlichen Grüßen
    
    Otmar Knoll
    Handlungsbevollmächtigter
    
    fairvesta Group AG
    Konrad-Adenauer-Str. 15
    D - 72072 Tübingen
    Tel:  +49 (0)7071 3665-0
    Fax: +49 (0)7071 3665-77
    o.knoll@fairvesta.de 
    www.fairvesta.de
    
    Amtsgericht Stuttgart HRB 382675
    Vorstand: Hermann Geiger
    Vorsitzender des Aufsichtsrates: Alfred Renner
    Sitz: Tübingen
    USt.-IdNr.: DE814337296
    
    -------------------------------------------------------------------
    Diese E-Mail enthält vertrauliche und/oder rechtlich geschützte Informationen. Wenn
    Sie nicht der richtige Adressat sind oder diese E-Mail irrtümlich erhalten haben,
    informieren Sie bitte sofort den Absender und vernichten Sie diese Mail. Das
    unerlaubte Kopieren, die unbefugte Weitergabe oder die Verwendung des Inhalts dieser
    Mail ist nicht gestattet.
    -------------------------------------------------------------------
    This e-mail may contain confidential and/or privileged information. If you are not
    the intended recipient (or have received this e-mail in error) please notify the
    sender immediately and destroy this e-mail. Any unauthorized copying, disclosure,
    distribution or usableness contents of this e-mail is strictly forbidden.
    -------------------------------------------------------------------
    Ce courriel est confidentiel et protégé. L'expéditeur ne renonce pas aux droits et
    obligations qui s'y rapportent. Toute diffusion, utilisation ou copie de ce message
    ou des renseignements qu'il contient par une personne autre que le (les)
    destinataire(s) désigné(s) est interdite. Si vous recevez ce courriel par erreur,
    veuillez m'en aviser immédiatement, par retour de courriel ou par un autre moyen.
    -------------------------------------------------------------------

     

     

     

     

    Unveiled – Seduced by Secrets – Inside the STASI Tech World – The E-Book – Free Download

    Seduced-by-Secrets-Inside-the-Stasis-Spy-Tech-World-2008-Macrakis

    In addition to revealing who the spies were, where they worked, and why they did what they did, the Rosenholz material unmasks an incredibly bloated human web of recruiters, instructors, couriers, and residents. The spiderweb was designed to support an agent, but was not cost-effective while it ensnared the secrets of the West. The Stasi simply overestimated the power of stolen technological secrets to solve its economic problems, and the enormous spy infrastructure investment produced a very small return.”

    “Scientific-technical intelligence gathering for the MfS usually meant recruiting agents who had access to important Western companies like IBM. Occasionally foreigners volunteered to contribute to the MfS’s scientific developments. An unusual offer came in the mid-sixties from an American computer specialist, Henry Sherwood, who wanted to help East Germany’s data processing industry. Born in Berlin under the name Heinz Weizenbaum, he fled the Nazis in 1936 and arrived in America, where he changed his name while in the U.S. Army. His brother was the famous MIT computer professor Joseph Weizenbaum. Sherwood was invited to direct the Diebold European research program in 1966 and invited the East German Data Processing and Business Machines Company to take part in the program.

    Suspicious that Sherwood might be an agent for a capitalist company, the Stasi set four informants on him at the Diebold Conference and between 1966 and 1969 launched ‘Action World Stature’ to try to use the material from the various conferences. Unfortunately, the Stasi staff members did not know English and could not effectively use the material. When Sherwood visited Erfurt, he brought IBM manuals and other material with him, which the Stasi photographed. When there was an opportunity for a German to go to America to acquire more knowledge about data processing, the Stasi vetoed the trip because they were worried that the scientist might be recruited and never come back.

    And that was the main contradiction the Stasi presents us with: on the one hand, they vigorously supported state programs by acquiring the needed embargoed or secret technology. On the other hand, security concerns made them work against their own interests by restricting the needed international travel of scientists and by imposing other harmful security measures.

    Die Rechtslage bei schweren Internet-Angriffen wie von mutmasslich “GoMoPa”, “Nawito” und Konsorten

    Zitat:

    Nachfolgend einige Links zu dem brisanten Thema, den wenn mutmasslich “GoMoPa”, “Nawito”, Sven Schmidt, “Eagle IT” und dubioser  “CTO” der dubiosen “GoMoPa” sowie sein mutmasslicher Genosse Thomas Promny und Genossen unsere starken Server ungestraft attackieren können, kann bald jedes Unternehmen ähnliche Probleme haben wie wir:

    http://www.fr-online.de/wikileaks—die-enthuellungsplattform/ddos-attacken-sabotage-im-weltweiten-netz,4882932,4913810.html

    http://de.wikipedia.org/wiki/Denial_of_Service

    http://www.internet-strafrecht.com/distributed-denial-of-service-ddos-attacken-strafbar-oder-nicht/internet-strafrecht/internetstrafrecht/

    All das zeigt, welche Kriminellen hier in STASI-Manier am Werk sind:

    Sie haben Angst vor der Wahrheit und können sich nur durch kriminelle Aktionen halten….

    Even More Mental and Pysical Attacks on our Servers by the Suspects of “GoMoPa”, “Nawito”, “Otmar Knoll” and “Peter Ehlers”

    Dear Readers,

    here is the proof for that our websites and the are constantly under attack – mental and pysical attacks by

    – “GoMoPa”

    – “Peter Ehlers”

    – “Klaus Maurischat”

    – “Nawito”

    – Otmar Knoll” – he announced himself the attacks in an official corporate Email  of his company “Fairvesta”!!!!

    and their thugs:

    graph

    This is in fact a very serious crime and causes longterm jail sentences !

     

    Krumme Immobiliengeschäfte ? Wie “Otmar Knoll”, “Fairvesta” zusammnen mit “GoMoPa” kritische Webseiten illegal ausschaltet

    Zitat OtmarKnoll/Fairvesta:

    Subject:   AW: AW: AW: AW: [Fwd: Your enquiry]
    From:   “Knoll, Otmar”
    Date:   Tue, February 5, 2013 8:14 pm
    To:   “‘office@ebizz.tv’”
    Priority:   Normal
    Options:   View Full Header | View Printable Version  | Download this as a file
    Schade dass Sie nicht hören wollen, nun ist es zu spät, vielleicht überlegen Sie
    sich das noch mal.
    Den wenn die Domains offline gehen, dann haben Sie kein Medium mehr.
    Wer nicht hören will muss fühlen sagt ein Sprichwort.
    
    http://i-nvestment.com/category/leserbrief/
    
    Mit freundlichen Grüßen
    
    Otmar Knoll
    Handlungsbevollmächtigter
    
    fairvesta Group AG
    Konrad-Adenauer-Str. 15
    D - 72072 Tübingen
    Tel:  +49 (0)7071 3665-0
    Fax: +49 (0)7071 3665-77
    o.knoll@fairvesta.de 
    www.fairvesta.de
    
    Amtsgericht Stuttgart HRB 382675
    Vorstand: Hermann Geiger
    Vorsitzender des Aufsichtsrates: Alfred Renner
    Sitz: Tübingen
    USt.-IdNr.: DE814337296

    AN OVERVIEW OF THE HEAVY CYBERATTACKS ON OUR WEBSITES TO STOP THE TRUTH DONE BY THE SUSPECTS

    These graphs below show the cyberattacks on our website initiated by the suspects we already mentioned and who even announced in an email that tehy would do this illegal internet crime. The email was by Otmar Knoll, Fairvesta, who announced the cybercrime. The suspected hackers are from “GoMoPa” and their thugs.

    The graphs show the DDos attacks on our servers.

    What is a DDos attack ?

    Read here:

    http://en.wikipedia.org/wiki/Denial-of-service_attack

    These internet crimes are punished with  longterm jail sentences and financial compensation..

    Die untenstehenden Graphiken zeigen die Hackernagriffe auf unsere Webseiten, die seit Jahren durchgeführt werden im Ausschnitt. In einer Email an uns hat Otmar Knoll, Fairvesta, die Hackerangriffe, somit schwere Internetverbrechen angekündigt. Wir haben diese Emails bereits veröffentlicht. Mutmasslich arbeitet Otmar Knoll mit den üblichen Verdächtigen der “GoMoPa”, ihren Informanten und Hackern zusammen:

    Die Graphiken zeigen die sogenannten DDos-Angriffe auf unsere Server.

    Was ist eine DDos Attacke ?

    http://de.wikipedia.org/wiki/Denial_of_Service

    Lesen Sie hier:

    Diese Vergehen werden mit langjährigen Freiheitsstrafen und Schadensersatz bestraft.

    graph eastern

    graph 3graph2graphgraphgraph

    Statement about the dubious “colportations” of “Nawito” – MENTAL AND PHYSICAL CYBERATTACKS

    Bernd-Pulchernst

    Dear Readers,

    let me just briefly comment a mental cyberattack which should distract your attention from the real issues.

    I have never had any consulting position or contract for any German company.

    I have never worked for the Axel Springer Publishing House – not even as a freelance journalist.

    These facts are clear and can be verified easily – just by calling Axel Springer.

    The facts are

    1) Dr. Rainer Zitelmann worked for the Axel Springer Company. You can esaily find out what happened there. I just mention the word “Auschwitz” in this context…As you see from his website and in the internet Zitelmann is in fact consulting many German companies.

    2) “GoMoPa” had in fact a consultation contract with estavis and got in fact money from estavis and many various companies i.e. “S&K”

    These contracts are known and 100% true and published by various media i.e. “ZEIT”, “MANAGER MAGAZIN”, “SUEDDEUTSCHE ZEITUNG” etc.

    3) Meridian Capital was the subject of “GoMoPa”s articles.

    4) “Nawito” whover or whatever it is did not even bother to contact us.

    5) The “information” about one of our companies is false.

    6) The “Nawito” informer “Peter Ehlers” did in fact attack Chancellor Merkel and the Minister of Finance Wolfgang Schäuble as “Deutschlands bekannteste Hehler” to name just one fact about “Peter Ehlers” or whatever his name might be who by the way got a lot of money from the bancrupt SAM AG which was also subject of “GoMoPa”‘s reporting and we know similiar cases of this endeavour.

    7) The last editor who was attacked by such cyberattacks died in a very mysterious way, Heinz Gerlach. He might have been controversial but nevertheless – the truth is the truth.

    He was the first journalist to publish the truth about the mysterious headquarter of “GoMoPa” in New York and their consulting contract with estavis and died suddenly and totally unexpected for most of us – not for all.

    The circumstances of his death remain unsolved for me.

    We are ready to proof this everytime and do not work with “colportations”.

    Obviously cyberattacks on our websites since years are not enough to keep the truth down – defamation must be added – a wellknown STASI technique to irritate the public – MENTAL AND PYSICAL CYBERATTACKS done by the well-know suspects.

    Sincerely your

    Bernd Pulch

    Magister Artium der Publizistik, Germanistik und Komparatistik

    PS

    COPIES OF PHYSICAL CYBER ATTACKS ON OUR SERVERS BY THE SUSPECTS AND “INFORMERS” OF “NAWITO”

    graph eastern

    graph 3

    graph2

    graphThe attacked s

    The attacked website are for example:

    http://www.investment-on.com

    http://www.berndpulch.org

    http://investment-magazin.com

    http://www.investment-magazin.tv

    and about 20 more.

    The Best Proof for the Truth we are telling – Cyberattacks everyday by the Suspects

    hacker.gifchinese

    One day after The New York Times reported that Chinese hackers had infiltrated its computers and stolen passwords for its employees, The Wall Street Journal announced that it too had been hacked.

    On Thursday, The Journal reported that it had been attacked by Chinese hackers who were trying to monitor the company’s coverage of China. It said hackers had broken into its network through computers in its Beijing bureau.

    In a written statement, the business newspaper owned by News Corporation described the attack as an “ongoing issue” and said it was working closely with authorities and security specialists to clean up its systems. It said that it completed a “network overhaul” on Thursday in an effort to rid its systems of hackers.

    China’s Ministry of National Defense has denied any involvement in the cyberattack at The Times or any other American corporations.

    But security experts said that in 2008, Chinese hackers began targeting American news organizations as part of an effort to monitor coverage of Chinese issues.

    In a report for clients in December, Mandiant, a computer security company, said that over the course of several investigations it found evidence that Chinese hackers had stolen e-mails, contacts and files from more than 30 journalists and executives at Western news organizations, and had maintained a “short list” of journalists for repeated attacks. Among those targeted were journalists who had written about Chinese leaders, political and legal issues in China and the telecom giant Huawei.

    Bloomberg News, another American news organization, was targeted by Chinese hackers last year, and some computers were infected, according to a person with knowledge of the company’s internal investigation. The attack occurred after Bloomberg published an article on June 29 about the wealth accumulated by relatives of Xi Jinping, a Chinese official who is expected to become president in March.

    Bloomberg has confirmed that hackers had made attempts but said that “no computer systems or computers were compromised.”

    The timing of the attacks on The New York Times coincided with the reporting for an investigation, published online on Oct. 25, that found that the relatives of Wen Jiabao,China’s prime minister, had accumulated a fortune worth several billion dollars through business dealings.

    Security experts hired by The Times to detect and block the computer attacks found digital evidence that Chinese hackers, using methods that some consultants have associated with the Chinese military in the past, breached The Times’s network.

    The Associated Press reported Thursday that officials in the Obama administration were considering more assertive action against Beijing to stop Chinese computer espionage campaigns.

    The Secretary of State, Hillary Clinton, said Thursday a global effort was needed o establish “rules of the road” for cyber activity.  In her final meeting with reporters at the State Department, Mrs. Clinton addressed a question about China’s efforts to infiltrate computer systems at The New York Times.

    “We have seen over the last years an increase in not only the hacking attempts on government institutions but also non-governmental ones,” Mrs. Clinton said.

    The Chinese, she said, “are not the only people who are hacking us.”

    “There is a lot that we are working on that will be deployed in the event that we don’t get some kind of international effort under way,” Mrs. Clinton added without elaborating.

    The United States has been increasingly vocal about such efforts against government and private industry. In a November 2011 intelligence report, government officials specifically accused China and Russia of stealing intellectual property for economic gain.

    <nyt_author_id>

    Michael Gordon contributed reporting from Washington.

    http://www.nytimes.com/2013/02/01/technology/wall-street-journal-reports-attack-by-china-hackers.html

     

    So this is a part of the big picture: The small picture concerns former STASI agents and their comrades and thugs in Germany.

    The Best Proof for the Truth we are telling – Cyberattacks everyday by the Suspects against our websites !

    TOP-SECRET – DHS Cybersecurity Order 13636

    Executive Order 13636: Improving Critical Infrastructure Cybersecurity Cyber-Dependent Infrastructure Identification Working Group (CDIIWG)

    20 pages
    For Official Use Only
    March 11, 2013Executive Order 13636: Improving Critical Infrastructure Cybersecurity Cyber-Dependent Infrastructure Identification Working Group (CDIIWG)

    20 pages
    For Official Use Only
    March 11, 2013
    Executive Order 13636: Improving Critical Infrastructure Cybersecurity Cyber-Dependent Infrastructure Identification Working Group (CDIIWG)

    20 pages
    For Official Use Only
    March 11, 2013

    Download

    Overview of Executive Order 13636

    – Executive Order (EO) 13636, Improving Critical Infrastructure Cybersecurity was released on February 12, 2013
    – Relies on public-private collaboration to improve critical infrastructure cyber posture
    – Includes elements to enhance information sharing, develop a cybersecurity framework, and create a voluntary cybersecurity program
    – Requires the Department of Homeland Security (DHS) to identify the “critical infrastructure where a cybersecurity incident could reasonably result in catastrophic regional or national effects on public health or safety, economic security, or national security”

    DHS will work with CIPAC to execute Section 9 of the EO

    “Within 150 days of the date of this order, the Secretary shall use a risk-based approach to identify critical infrastructure where a cybersecurity incident could reasonably result in catastrophic regional or national effects on public health or safety, economic security, or national security.” (EO 13636, Section 9)

    Apply consistent, objective criteria

    Stakeholders include:
    – Critical Infrastructure Partnership Advisory Council (CIPAC)
    – Sector Specific Agencies (SSA)
    – Sector Coordinating Councils (SCC)
    – Government Coordinating Councils (GCC)
    – Critical infrastructure owners and operators

    The list of identified critical infrastructure will be reviewed and updated on an annual basis

    Execution of Section 9 will be led by the Cyber-Dependent Infrastructure Identification Working Group (CDIIWG)

    Overview of CDII Approach (1 of 2)

    Only a small subset of U.S. infrastructure will fall under the focus of the EO activity
    – Owners and operators will have the opportunity to provide relevant information
    – A review process will be established for the identification as critical infrastructure

    Focus is on critical infrastructure that could be compromised through cyber exploitation and which, if incapacitated, could result in catastrophic national, public health, or economic consequences
    – Higher standard than debilitating, which is what is used in the base definition to define critical infrastructure
    – The Secretary of DHS will provide a list of critical infrastructure most at risk in the context of a cyber incident within 150 days of EO release
    – Commercial IT products and consumer information technology services will not be directly designated under the EO as infrastructure most at risk

    All sectors will be engaged –through engagement and initial analysis it may be determined that a sector does not have any infrastructure that meets the threshold, the focus of the initial list will not be on that sector(s)

    Sectors with existing CI identification processes and lists should be leveraged where appropriate

    Functions-based approach to identify critical infrastructure
    – Accounts for the virtual and distributed nature of cyber infrastructure
    – Focuses on the critical activities, services, or products being produced or provided by a sector, subsector, or mode
    – Functions are identified based on the national or regional level consequences that can result from a disruption or exploitation of the infrastructure
    – Does not identify a specific organization’s assets, networks, or systems; focus is on sector functions and the types of systems that support them

    Requires the application of criteria that will be used to screen the infrastructure that aligns to the critical functions
    – Consistently applied within sectors and, where possible, across sectors as well

    Stakeholder engagement will be conducted throughout this effort
    – CDIIWG will work with sectors (SSAs, SCCs, GCCs) via the CIPAC partnership framework

    Download

    Overview of Executive Order 13636

    – Executive Order (EO) 13636, Improving Critical Infrastructure Cybersecurity was released on February 12, 2013
    – Relies on public-private collaboration to improve critical infrastructure cyber posture
    – Includes elements to enhance information sharing, develop a cybersecurity framework, and create a voluntary cybersecurity program
    – Requires the Department of Homeland Security (DHS) to identify the “critical infrastructure where a cybersecurity incident could reasonably result in catastrophic regional or national effects on public health or safety, economic security, or national security”

    DHS will work with CIPAC to execute Section 9 of the EO

    “Within 150 days of the date of this order, the Secretary shall use a risk-based approach to identify critical infrastructure where a cybersecurity incident could reasonably result in catastrophic regional or national effects on public health or safety, economic security, or national security.” (EO 13636, Section 9)

    Apply consistent, objective criteria

    Stakeholders include:
    – Critical Infrastructure Partnership Advisory Council (CIPAC)
    – Sector Specific Agencies (SSA)
    – Sector Coordinating Councils (SCC)
    – Government Coordinating Councils (GCC)
    – Critical infrastructure owners and operators

    The list of identified critical infrastructure will be reviewed and updated on an annual basis

    Execution of Section 9 will be led by the Cyber-Dependent Infrastructure Identification Working Group (CDIIWG)

    Overview of CDII Approach (1 of 2)

    Only a small subset of U.S. infrastructure will fall under the focus of the EO activity
    – Owners and operators will have the opportunity to provide relevant information
    – A review process will be established for the identification as critical infrastructure

    Focus is on critical infrastructure that could be compromised through cyber exploitation and which, if incapacitated, could result in catastrophic national, public health, or economic consequences
    – Higher standard than debilitating, which is what is used in the base definition to define critical infrastructure
    – The Secretary of DHS will provide a list of critical infrastructure most at risk in the context of a cyber incident within 150 days of EO release
    – Commercial IT products and consumer information technology services will not be directly designated under the EO as infrastructure most at risk

    All sectors will be engaged –through engagement and initial analysis it may be determined that a sector does not have any infrastructure that meets the threshold, the focus of the initial list will not be on that sector(s)

    Sectors with existing CI identification processes and lists should be leveraged where appropriate

    Functions-based approach to identify critical infrastructure
    – Accounts for the virtual and distributed nature of cyber infrastructure
    – Focuses on the critical activities, services, or products being produced or provided by a sector, subsector, or mode
    – Functions are identified based on the national or regional level consequences that can result from a disruption or exploitation of the infrastructure
    – Does not identify a specific organization’s assets, networks, or systems; focus is on sector functions and the types of systems that support them

    Requires the application of criteria that will be used to screen the infrastructure that aligns to the critical functions
    – Consistently applied within sectors and, where possible, across sectors as well

    Stakeholder engagement will be conducted throughout this effort
    – CDIIWG will work with sectors (SSAs, SCCs, GCCs) via the CIPAC partnership framework

    DownloadExecutive Order 13636: Improving Critical Infrastructure Cybersecurity Cyber-Dependent Infrastructure Identification Working Group (CDIIWG)

    20 pages
    For Official Use Only
    March 11, 2013

    Download

    Overview of Executive Order 13636

    – Executive Order (EO) 13636, Improving Critical Infrastructure Cybersecurity was released on February 12, 2013
    – Relies on public-private collaboration to improve critical infrastructure cyber posture
    – Includes elements to enhance information sharing, develop a cybersecurity framework, and create a voluntary cybersecurity program
    – Requires the Department of Homeland Security (DHS) to identify the “critical infrastructure where a cybersecurity incident could reasonably result in catastrophic regional or national effects on public health or safety, economic security, or national security”

    DHS will work with CIPAC to execute Section 9 of the EO

    “Within 150 days of the date of this order, the Secretary shall use a risk-based approach to identify critical infrastructure where a cybersecurity incident could reasonably result in catastrophic regional or national effects on public health or safety, economic security, or national security.” (EO 13636, Section 9)

    Apply consistent, objective criteria

    Stakeholders include:
    – Critical Infrastructure Partnership Advisory Council (CIPAC)
    – Sector Specific Agencies (SSA)
    – Sector Coordinating Councils (SCC)
    – Government Coordinating Councils (GCC)
    – Critical infrastructure owners and operators

    The list of identified critical infrastructure will be reviewed and updated on an annual basis

    Execution of Section 9 will be led by the Cyber-Dependent Infrastructure Identification Working Group (CDIIWG)

    Overview of CDII Approach (1 of 2)

    Only a small subset of U.S. infrastructure will fall under the focus of the EO activity
    – Owners and operators will have the opportunity to provide relevant information
    – A review process will be established for the identification as critical infrastructure

    Focus is on critical infrastructure that could be compromised through cyber exploitation and which, if incapacitated, could result in catastrophic national, public health, or economic consequences
    – Higher standard than debilitating, which is what is used in the base definition to define critical infrastructure
    – The Secretary of DHS will provide a list of critical infrastructure most at risk in the context of a cyber incident within 150 days of EO release
    – Commercial IT products and consumer information technology services will not be directly designated under the EO as infrastructure most at risk

    All sectors will be engaged –through engagement and initial analysis it may be determined that a sector does not have any infrastructure that meets the threshold, the focus of the initial list will not be on that sector(s)

    Sectors with existing CI identification processes and lists should be leveraged where appropriate

    Functions-based approach to identify critical infrastructure
    – Accounts for the virtual and distributed nature of cyber infrastructure
    – Focuses on the critical activities, services, or products being produced or provided by a sector, subsector, or mode
    – Functions are identified based on the national or regional level consequences that can result from a disruption or exploitation of the infrastructure
    – Does not identify a specific organization’s assets, networks, or systems; focus is on sector functions and the types of systems that support them

    Requires the application of criteria that will be used to screen the infrastructure that aligns to the critical functions
    – Consistently applied within sectors and, where possible, across sectors as well

    Stakeholder engagement will be conducted throughout this effort
    – CDIIWG will work with sectors (SSAs, SCCs, GCCs) via the CIPAC partnership framework

    Overview of Executive Order 13636

    – Executive Order (EO) 13636, Improving Critical Infrastructure Cybersecurity was released on February 12, 2013
    – Relies on public-private collaboration to improve critical infrastructure cyber posture
    – Includes elements to enhance information sharing, develop a cybersecurity framework, and create a voluntary cybersecurity program
    – Requires the Department of Homeland Security (DHS) to identify the “critical infrastructure where a cybersecurity incident could reasonably result in catastrophic regional or national effects on public health or safety, economic security, or national security”

    DHS will work with CIPAC to execute Section 9 of the EO

    “Within 150 days of the date of this order, the Secretary shall use a risk-based approach to identify critical infrastructure where a cybersecurity incident could reasonably result in catastrophic regional or national effects on public health or safety, economic security, or national security.” (EO 13636, Section 9)

    Apply consistent, objective criteria

    Stakeholders include:
    – Critical Infrastructure Partnership Advisory Council (CIPAC)
    – Sector Specific Agencies (SSA)
    – Sector Coordinating Councils (SCC)
    – Government Coordinating Councils (GCC)
    – Critical infrastructure owners and operators

    The list of identified critical infrastructure will be reviewed and updated on an annual basis

    Execution of Section 9 will be led by the Cyber-Dependent Infrastructure Identification Working Group (CDIIWG)

    Overview of CDII Approach (1 of 2)

    Only a small subset of U.S. infrastructure will fall under the focus of the EO activity
    – Owners and operators will have the opportunity to provide relevant information
    – A review process will be established for the identification as critical infrastructure

    Focus is on critical infrastructure that could be compromised through cyber exploitation and which, if incapacitated, could result in catastrophic national, public health, or economic consequences
    – Higher standard than debilitating, which is what is used in the base definition to define critical infrastructure
    – The Secretary of DHS will provide a list of critical infrastructure most at risk in the context of a cyber incident within 150 days of EO release
    – Commercial IT products and consumer information technology services will not be directly designated under the EO as infrastructure most at risk

    All sectors will be engaged –through engagement and initial analysis it may be determined that a sector does not have any infrastructure that meets the threshold, the focus of the initial list will not be on that sector(s)

    Sectors with existing CI identification processes and lists should be leveraged where appropriate

    Functions-based approach to identify critical infrastructure
    – Accounts for the virtual and distributed nature of cyber infrastructure
    – Focuses on the critical activities, services, or products being produced or provided by a sector, subsector, or mode
    – Functions are identified based on the national or regional level consequences that can result from a disruption or exploitation of the infrastructure
    – Does not identify a specific organization’s assets, networks, or systems; focus is on sector functions and the types of systems that support them

    Requires the application of criteria that will be used to screen the infrastructure that aligns to the critical functions
    – Consistently applied within sectors and, where possible, across sectors as well

    Stakeholder engagement will be conducted throughout this effort
    – CDIIWG will work with sectors (SSAs, SCCs, GCCs) via the CIPAC partnership framework

    Unveiled – Incentives to Adopt Improved Cybersecurity Practices

    Incentives to Adopt Improved Cybersecurity Practices

     


    http://www.ofr.gov/OFRUpload/OFRData/2013-07234_PI.pdf

    [FR Doc. 2013-07234 Filed 03/27/2013 at 8:45 am; Publication Date: 03/28/2013]

    Billing Code: 3510-EA

    DEPARTMENT OF COMMERCE
    Office of the Secretary
    National Institute of Standards and Technology
    National Telecommunications and Information Administration

    [Docket Number: 130206115-3115-01]

    Incentives to Adopt Improved Cybersecurity Practices

    AGENCY: U.S. Department of Commerce.

    ACTION: Notice of Inquiry.

    SUMMARY: The President has directed the Secretary of Commerce to evaluate a set of incentives designed to promote participation in a voluntary program to be established by the Secretary of Homeland Security to support the adoption by owners and operators of critical infrastructure and other interested entities of the Cybersecurity Framework being developed by the National Institute of Standards and Technology (NIST). The evaluation will include analysis of the benefits and relative effectiveness of such incentives, and whether the incentives would require legislation or can be provided under existing law and authorities to participants in the Program. The Department of Commerce (Department) will use input received in response to this Notice to inform its recommendations, which will focus on incentives for critical infrastructure owners. In addition, the Department may use this input to develop a broader set of recommendations that apply to U.S. industry as a whole.

    DATES: Comments are due on or before [insert date 30 days after date of publication in the Federal Register].

    ADDRESSES: Written comments may be submitted by mail to the Office of Policy Analysis and Development, National Telecommunications and Information Administration, U.S. Department of Commerce, 1401 Constitution Avenue, N.W., Room 4725, Washington, DC 20230. Comments may be submitted electronically to cyberincentives[at]ntia.doc.gov. All email messages and comments received are a part of the public record and will be made available to the public generally without change on the Internet Policy Task Force Web page at http://www.ntia.doc.gov/category/cybersecurity. For this reason, comments should not include confidential, proprietary, or business sensitive information.

    FOR FURTHER INFORMATION CONTACT: For questions about this Notice, contact: Alfred Lee, Office of Policy Analysis and Development, National Telecommunications and Information Administration, U.S. Department of Commerce, 1401 Constitution Avenue, NW., Room 4725, Washington, DC 20230, telephone (202) 482–1880; or send an e-mail to cyberincentives[at]ntia.doc.gov. Please direct media inquiries to the Office of Public Affairs at (202) 482-4883; or send an email to publicaffairs[at]doc.gov.

    SUPPLEMENTARY INFORMATION: The national and economic security of the United States depends on the reliable functioning of the Nation’s critical infrastructure. The cyber threat to critical infrastructure is growing and represents one of the most serious national security challenges that the United States must confront. On February 12, 2013, the President signed Executive Order 13636, “Improving Critical Infrastructure Cybersecurity.”1 As the President stated in the Executive Order, “repeated cyber intrusions into America’s critical infrastructure demonstrate a need for improved cybersecurity.”2

    1 “Exec. Order No. 13636, 78 Fed. Reg. 11739 (Feb. 19, 2013), available at:https://www.federalregister.gov/articles/2013/02/19/2013-03915/improving-
    critical-infrastructure-cybersecurity
    .

    2 Id.

    The Executive Order establishes a policy of enhancing the security and resilience of the Nation’s critical infrastructure and maintaining a cyber environment that encourages efficiency, innovation, and economic prosperity while promoting safety, security, business confidentiality, privacy and civil liberties through a partnership with the owners and operators of critical infrastructure3 to improve cybersecurity information sharing and collaboratively develop and implement risk-based standards. The Executive Order sets forth three elements to establish this partnership. First, the Department of Homeland Security (“DHS”) will use a risk-based approach to identify critical infrastructure where a cybersecurity incident could reasonably result in catastrophic regional or national effects on public health or safety, economic security, or national security. Second, the National Institute of Standards and Technology will develop a framework consisting of a set of standards, methodologies, procedures, and processes that align policy, business, and technological approaches to address cyber risks (“the Framework”), which will provide a prioritized, flexible, repeatable, performance-based, and cost-effective approach, including information security measures and controls, to help owners and operators of critical infrastructure indentify, asses, and manage cyber risk. Third, DHS, in coordination with sector-specific agencies, will develop the Critical Infrastructure Cybersecurity Program (“the Program”) to promote voluntary adoption of the Framework.

    3 For the purposes of this Notice, the term “critical infrastructure” has the meaning given the term in 42 U.S.C. § 5195c(e): “systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters.”

    The Executive Order recognizes that further incentives may be necessary to encourage sufficient private sector participation in the Program. To develop a clearer picture of existing and potential incentives, the Executive Order directs the Department of Commerce to recommend ways to promote participation in the Program.4 The recommendations “shall include analysis of the benefits and relative effectiveness of such incentives, and whether the incentives would require legislation or can be provided under existing law and authorities to participants of the Program.” Consistent with the Executive Order, these incentives may include technical and public policy measures that improve cybersecurity without creating barriers to innovation, economic growth, and the free flow of information. The Department of Commerce will submit its recommendations to the President through the Assistant to the President for Homeland Security and Counterterrorism and the Assistant to the President for Economic Affairs no later than June 12, 2013.

    4 The Executive Order also directs the Secretaries of the Treasury and Homeland Security to recommend incentives to participate in the Program. The Secretary of Defense and the Administrator of General Services are also tasked with reporting on government procurement-related issues.

    Improving cybersecurity practices among entities that do not own or operate critical infrastructure, or for other reasons are unlikely to join the Program, is also an important Executive Branch priority. Therefore, the Department of Commerce also seeks comment on a broader set of incentives that could help to promote the adoption of proven efforts to address cybersecurity vulnerabilities.

    The Department of Commerce asked questions related to incentives for noncritical infrastructure in a July 2010 Notice of Inquiry.5 Responses to the July 2010 Notice aided the Department’s efforts to promote standards and best practices and informed its June 2011 “Green Paper,” Cybersecurity, Innovation and the Internet Economy.6 Along with the responses to this Notice, the Department plans to draw again on earlier responses in the development of recommendations to the President on incentives. In addition, the Department plans to use responsive comments to inform a follow-up to the Green Paper.

    5 Dept. of Commerce, Cybersecurity, Innovation, and the Internet Economy, 75 Fed. Reg. 44216 (July 28, 2010) (Notice of Inquiry), available athttp://www.ntia.doc.gov/frnotices/2010/FR_CybersecurityNOI_07282010.pdf.

    Comments received in response to the 2010 Notice of Inquiry are available at

    http://www.nist.gov/itl/cybercomments.cfm.

    6 Dept. of Commerce, Cybersecurity, Innovation, and the Internet Economy (June 2011),

    http://www.nist.gov/itl/upload/Cybersecurity_Green-Paper_FinalVersion.pdf. The questions asked in the Green Paper are available at Dept. of Commerce, Cybersecurity, Innovation, and the Internet Economy, 76 Fed. Reg. 34965 (June 15, 2011), available at

    http://www.ntia.doc.gov/federal-register-notice/2011/cybersecurity-innovationand-internet-economy.

    Comments received in response to the Green Paper are available at

    http://www.nist.gov/itl/greenpapercomments.cfm.

    Stakeholders that responded to the July 2010 Notice may wish to focus on the following questions:

    • Have your viewpoints on any questions related to incentives for noncritical infrastructure changed since you filed them in response to the July 2010 Notice?• Do your comments related to incentives for noncritical infrastructure also apply equally to critical infrastructure?

    • Does anything in the Executive Order or recent legislative proposals change your views on what incentives will be necessary or how they can be achieved? In particular, would the incentives that you previously discussed be effective in encouraging all firms that participate in the Internet economy to participate in the Program? Would these incentives encourage critical infrastructure companies to join the Program?

    In answering these questions, commenters should not limit their responses to incentives that are feasible under existing law.

    For all stakeholders, particularly those that did not respond to these earlier inquiries, the Department of Commerce requests comments on any of the following questions:

    • Are existing incentives adequate to address the current risk environment for your sector/company?• Do particular business sectors or company types lack sufficient incentives to make cybersecurity investments more than others? If so, why?

    • How do businesses/your business assess the costs and benefits of enhancing their cybersecurity?

    • What are the best ways to encourage businesses to make investments in cybersecurity that are appropriate for the risks that they face?

    • How do businesses measure success and the cost-effectiveness of their current cybersecurity programs?

    • Are there public policies or private sector initiatives in the United States or other countries that have successfully increased incentives to make security investments or other investments that can be applied to security?

    • Are there disincentives or barriers that inhibit cybersecurity investments by firms? Are there specific investment challenges encountered by small businesses and/or multinational companies, respectively? If so, what are the disincentives, barriers or challenges and what should be done to eliminate them?

    • Are incentives different for small businesses? If so, how?

    • For American businesses that are already subject to cybersecurity requirements, what is the cost of compliance and is it burdensome relative to other costs of doing business?

    • What are the merits of providing legal safe-harbors to individuals and commercial entities that participate in the DHS Program? By contrast, what would be the merits or implications of incentives that hold entities accountable for failure to exercise reasonable care that results in a loss due to inadequate security measures?

    • What would be the impact of requiring entities to join the DHS Program prior to receiving government financial guarantees or assistance in relevant sectors?

    • How can liability structures and insurance, respectively, be used as incentives?

    • What other market tools are available to encourage cybersecurity best practices?

    • Should efforts be taken to better promote and/or support the adoption of the Framework or specific standards, practices, and guidelines beyond the DHS Program? If so, what efforts would be effective?

    • In what way should these standards, practices, and guidelines be promoted to small businesses and multinationals, respectively, and through what mechanisms? How can they be promoted and adapted for multinational companies in various jurisdictions?

    • What incentives are there to ensure that best practices and standards, once adopted, are updated in the light of changing threats and new business models?

    • Voluntary industry sector governance mechanisms are sometimes used to stimulate organizations to conform to a set of principles, guidelines, and operations based on best practices, standards, and conformity assessment processes that collectively increase the level of assurance while preserving organizations’ brand standing and the integrity of products and services.

    o Do organizations participate in voluntary governance mechanisms?o Which industries/groups have voluntary governance mechanisms?

    o Do existing voluntary governance mechanisms have cybersecurity-related constraints?

    o What are the benefits and challenges associated with voluntary governance mechanisms?

    Dated: __March 22, 2013_______________.

    Rebecca M. Blank, Deputy Secretary of Commerce.

    Patrick Gallagher, Under Secretary of Commerce for Standards and Technology.

    Lawrence E. Strickling, Assistant Secretary for Communications and Information.

     


    Cloudflare Inside View – Biggest DDos Attack in History on Spamhaus

    At CloudFlare, we deal with large DDoS attacks every day. Usually, these attacks are directed at large companies or organizations that are reluctant to talk about their details. It’s fun, therefore, whenever we have a customer that is willing to let us tell the story of an attack they saw and how we mitigated it. This is one of those stories.

    Spamhaus

    Yesterday, Tuesday, March 19, 2013, CloudFlare was contacted by the non-profit anti-spam organization Spamhaus. They were suffering a large DDoS attack against their website and asked if we could help mitigate the attack.

    Spamhaus_logo

    Spamhaus provides one of the key backbones that underpins much of the anti-spam filtering online. Run by a tireless team of volunteers, Spamhaus patrols the Internet for spammers and publishes a list of the servers they use to send their messages in order to empower email system administrators to filter unwanted messages. Spamhaus’s services are so pervasive and important to the operation of the Internet’s email architecture that, when a lawsuit threatened to shut the service down, industry experts testified [PDF, full disclosure: I wrote the brief back in the day] that doing so risked literally breaking email since Spamhaus is directly or indirectly responsible for filtering as much as 80% of daily spam messages.

    Beginning on March 18, the Spamhaus site came under attack. The attack was large enough that the Spamhaus team wasn’t sure of its size when they contacted us. It was sufficiently large to fully saturate their connection to the rest of the Internet and knock their site offline. These very large attacks, which are known as Layer 3 attacks, are difficult to stop with any on-premise solution. Put simply: if you have a router with a 10Gbps port, and someone sends you 11Gbps of traffic, it doesn’t matter what intelligent software you have to stop the attack because your network link is completely saturated.

    Burst_pipe

    While we don’t know who was behind this attack, Spamhaus has made plenty of enemies over the years. Spammers aren’t always the most lovable of individuals and Spamhaus has been threatened, sued, and DDoSed regularly. Spamhaus’s blocklists are distributed via DNS and there is a long list of volunteer organizations that mirror their DNS infrastructure in order to ensure it is resilient to attacks. The website, however, was unreachable.

    Filling Up the Series of Tubes

    Very large Layer 3 attacks are nearly always originated from a number of sources. These many sources each send traffic to a single Internet location, effectively creating a tidal wave that overwhelms the target’s resources. In this sense, the attack is distributed (the first D in DDoS — Distributed Denial of Service). The sources of attack traffic can be a group of individuals working together (e.g., the Anonymous LOIC model, although this is Layer 7 traffic and even at high volumes usually much smaller in volume than other methods), a botnet of compromised PCs, a botnet of compromised servers, misconfigured DNS resolvers, or even home Internet routers with weak passwords.

    Since an attacker attempting to launch a Layer 3 attack doesn’t care about receiving a response to the requests they send, the packets that make up the attack do not have to be accurate or correctly formatted. Attackers will regularly spoof all the information in the attack packets, including the source IP, making it look like the attack is coming from a virtually infinite number of sources. Since packets data can be fully randomized, using techniques like IP filtering even upstream becomes virtually useless.

    Spamhaus signed up for CloudFlare on Tuesday afternoon and we immediately mitigated the attack, making the site once again reachable. (More on how we did that below.) Once on our network, we also began recording data about the attack. At first, the attack was relatively modest (around 10Gbps). There was a brief spike around 16:30 UTC, likely a test, that lasted approximately 10 minutes. Then, around 21:30 UTC, the attackers let loose a very large wave.

    The graph below is generated from bandwidth samples across a number of the routers that sit in front of servers we use for DDoS scrubbing. The green area represents in-bound requests and the blue line represents out-bound responses. While there is always some attack traffic on our network, it’s easy to see when the attack against Spamhaus started and then began to taper off around 02:30 UTC on March 20, 2013. As I’m writing this at 16:15 UTC on March 20, 2013, it appears the attack is picking up again.

    How to Generate a 75Gbps DDoS

    The largest source of attack traffic against Spamhaus came from DNS reflection. I’vewritten about these attacks before and in the last year they have become the source of the largest Layer 3 DDoS attacks we see (sometimes well exceeding 100Gbps). Open DNS resolvers are quickly becoming the scourge of the Internet and the size of these attacks will only continue to rise until all providers make a concerted effort to close them. (It also makes sense to implement BCP-38, but that’s a topic for another post another time.)

    The basic technique of a DNS reflection attack is to send a request for a large DNS zone file with the source IP address spoofed to be the intended victim to a large number of open DNS resolvers. The resolvers then respond to the request, sending the large DNS zone answer to the intended victim. The attackers’ requests themselves are only a fraction of the size of the responses, meaning the attacker can effectively amplify their attack to many times the size of the bandwidth resources they themselves control.

    In the Spamhaus case, the attacker was sending requests for the DNS zone file for ripe.net to open DNS resolvers. The attacker spoofed the CloudFlare IPs we’d issued for Spamhaus as the source in their DNS requests. The open resolvers responded with DNS zone file, generating collectively approximately 75Gbps of attack traffic. The requests were likely approximately 36 bytes long (e.g. dig ANY ripe.net @X.X.X.X +edns=0 +bufsize=4096, where X.X.X.X is replaced with the IP address of an open DNS resolver) and the response was approximately 3,000 bytes, translating to a 100x amplification factor.

    We recorded over 30,000 unique DNS resolvers involved in the attack. This translates to each open DNS resolver sending an average of 2.5Mbps, which is small enough to fly under the radar of most DNS resolvers. Because the attacker used a DNS amplification, the attacker only needed to control a botnet or cluster of servers to generate 750Mbps — which is possible with a small sized botnet or a handful of AWS instances. It is worth repeating: open DNS resolvers are the scourge of the Internet and these attacks will become more common and large until service providers take serious efforts to close them.

    How You Mitigate a 75Gbps DDoS

    While large Layer 3 attacks are difficult for an on-premise DDoS solution to mitigate, CloudFlare’s network was specifically designed from the beginning to stop these types of attacks. We make heavy use of Anycast. That means the same IP address is announced from every one of our 23 worldwide data centers. The network itself load balances requests to the nearest facility. Under normal circumstances, this helps us ensure a visitor is routed to the nearest data center on our network.

    When there’s an attack, Anycast serves to effectively dilute it by spreading it across our facilities. Since every data center announces the same IP address for any CloudFlare customer, traffic cannot be concentrated in any one location. Instead of the attack being many-to-one, it becomes many-to-many with no single point on the network acting as a bottleneck.

    Once diluted, the attack becomes relatively easy to stop at each of our data centers. Because CloudFlare acts as a virtual shield in front of our customers sites, with Layer 3 attacks none of the attack traffic reaches the customer’s servers. Traffic to Spamhaus’s network dropped to below the levels when the attack started as soon as they signed up for our service.

    Other Noise

    While the majority of the traffic involved in the attack was DNS reflection, the attacker threw in a few other attack methods as well. One was a so-called ACK reflection attack. When a TCP connection is established there is a handshake. The server initiating the TCP session first sends a SYN (for synchronize) request to the receiving server. The receiving server responds with an ACK (for acknowledge). After that handshake, data can be exchanged.

    In an ACK reflection, the attacker sends a number of SYN packets to servers with a spoofed source IP address pointing to the intended victim. The servers then respond to the victim’s IP with an ACK. Like the DNS reflection attack, this disguises the source of the attack, making it appear to come from legitimate servers. However, unlike the DNS reflection attack, there is no amplification factor: the bandwidth from the ACKs is symmetrical to the bandwidth the attacker has to generate the SYNs. CloudFlare is configured to drop unmatched ACKs, which mitigates these types of attacks.

    Whenever we see one of these large attacks, network operators will write to us upset that we are attacking their infrastructure with abusive DNS queries or SYN floods. In fact, it is their infrastructure that is being used to reflect an attack at us. By working with and educating network operators, they clean up their network which helps to solve the root cause of these large attacks.

    History Repeats Itself

    Finally, it’s worth noting how similar this battle against DDoS attacks and open DNS relays is with Spamhaus’s original fight. If DDoS is the network scourge of tomorrow, spam was its clear predecessor. Paul Vixie, the father of the DNSBL, set out in 1997 to use DNS to help shut down the spam source of the day: open email relays. These relays were being used to disguise the origin of spam messages, making them more difficult to block. What was needed was a list of mail relays that mail serves could query against and decide whether to accept messages.

    History_repeats_itself

    While it wasn’t originally designed with the idea in mind, DNS proved a highly scalable and efficient means to distribute a queryable list of open mail relays that email service providers could use to block unwanted messages. Spamhaus arose as one of the most respected and widely used DNSBLs, effectively blocking a huge percentage of daily spam volume.

    As open mail relays were shut, spammers turned to virus writers to create botnets that could be used to relay spam. Spamhaus expanded their operations to list the IPs of known botnets, trying to stay ahead of spammers. CloudFlare’s own history grew out of Project Honey Pot, which started as an automated service to track the resources used by spammers and publishes the HTTP:BL.

    Today, as Spamhaus’s success has eroded the business model of spammers, botnet operators are increasingly renting their networks to launch DDoS attacks. At the same time, DNSBLs proved that there were many functions that the DNS protocol could be used for, encouraging many people to tinker with installing their own DNS resolvers. Unfortunately, these DNS resolvers are often mis-configured and left open to abuse, making them the DDoS equivalent of the open mail relay.

    If you’re running a network, take a second to make sure you’ve closed any open resolvers before DDoS explodes into an even worse problem than it already is.

    Revealed – Iran Cyber Offense Posters

    Iran Cyber Offense Posters

     


    A sends:

    Oghab on IRAN Cyber Offense

    The following posters belong to IRGC, the Iranian offensive military wing. None are officially confidential but only certain people gets their hand to such information and only a very limited part of them get to actually go to these “meetings”. Both are related to development of asymmetric aeronautical weaponry specially using UAS-based approaches and development of “unconventional” SIGINT and ELINT infrastructure to direct attacks specifically on long-term targets. They differ from the usual military and intelligence systems that try to cover everything and usually turn up useless in asymmetric wars thus it is not a conventional Air Force subject and being considered mainly as CO/IRAF, an attack blade made of Cyber and Aerial Vectors. I don’t want to share my reasons for this semi-leak but I do have a clear message for people who are behind such efforts, specially one particular elite team who “run and execute” Iran’s CO (Cyber Offense) and their mastermind. Here is the message: You are not anonymous either, wanna keep going?

     


    Poster 1

    [Image]

    “Drones in Asymmetric warfare”
    Host: NAHAB research center, Imam Hussain University ( IRGC )
    Subjects: ELINT, Stealth technologies in UAS, Fast-acting Drones, UAS without GPS, Warfare capabilities in UAS, Enemy UAS detection, interception, landing, disruption.
    Meeting Format: Seminar plus talks
    Sponsors: IRGC, Aerial Industries, ROSHD, Air Force
    email: ech[at]ihu.ac.ir
    phones: 738 293 49 (land line), 0919 0084 069 (Cell), if you want to make calls add Iran and Tehran’s phone extension accordingly

    Note 1. Imam Hussain University is a Military university located in IRGC-owned area north-east Tehran and it also is a Military Base

     


    Poster 2

    [Image]

    “The Need to Develop {modern} Aerial weaponry for future Wars”
    Host: Technical Faculty, Imam Sadeq Base, Imam Hussain University (IRGC)
    Subjects: Modern Aerial Weapons, infrastructures required to build, Studies of offensive and defensive Doctrines, Planes with Payloads, Fast reacting Tactics
    Meeting Format: Military Conference
    Sponsors: IRGC, Air Force, AeroSpace Organization, Community of Research and Development of Air defense, the institute of Advanced defense tactics, Defense industries Organization, the Self-sufficiency Organization of IRGC Navy, Army
    email: acw91[at]ihu.ac.ir
    phone: 771 049 27 ( land line )

    Note 2. Among said participants, only the “Defense industries Organization” is listed by many international players as a banned and restricted target for business or communication

    Cryptome reveals – Internet Is a Spy State

    Internet Is a Spy State

     


    At 06:09 AM 3/18/2013, Eugen Leitl wrote on Cypherpunks:

    http://edition.cnn.com/2013/03/16/opinion/schneier-internet-surveillance/index.html

    The Internet is a surveillance state

    By Bruce Schneier, Special to CNN

    March 16, 2013 — Updated 1804 GMT (0204 HKT)

    STORY HIGHLIGHTS

    Bruce Schneier: Whether we like it or not, we’re being tracked all the time on the Internet

    Schneier: Our surveillance state is efficient beyond the wildest dreams of George Orwell

    He says governments and corporations are working together to keep things that way

    Schneier: Slap-on-the-wrist fines notwithstanding, no one is agitating for better privacy laws

    Editor’s note: Bruce Schneier is a security technologist and author of “Liars and Outliers: Enabling the Trust Society Needs to Survive.”

    __________

    Cryptome:

    That the Internet is a gigantic spying machine has been known since its invention, the security industry has made billions pretending to protect against its spying.

    Schneier has also written recently that security does not work, cannot work, that attackers are always going to excell over defenders, due to the economic incentives to attack being greater than those to defend.

    Long a top expert selling security services, what is Schneier up to with gloom and doom that is usually associated with selling snake oil — his favorite target. Has his amply promoted 24×7 services been defeated by attackers? Is he keeping that quiet? Is he about to be doxed, has been hit with a blackmail demand, or worse, his defenses compromised? Who else among the experts are colluding with this initiative to admit Internet deception from the git go?

    Recall that beloved Peter Neumann and others advocate chucking the current Internet and starting over with better security and privacy basic requirements. Uh huh, and what will take its place, will it be better or more snake oil? And what to do with all that stored data of the world’s greatest spying machine promoted with the complicity of Internet advocates and the security industry?

    Pardon, monsieur, foxes in the hen house, comes to mind.

    Schneier says in his security-is-doomed-to-fail piece a public discussion is needed on what to do, the experts don’t have answers. That’s a good start after years of experts promising to do better next time, meanwhile trust open source, trust us.

    Where does snake oil end and “something better” begin? Is something better ever not snake oil? Is a public discussion of an issue never not rigged in favor of the organizers? Is tumultous public discussion never not preamble to a coup justified as needed to control the mob who has gotten out of hand, who voted the wrong way, who attacked the leaders? Who hacked the experts?

    Coups are always justified as needed for security, and who Machiavelli’s the coup masters other than security and propaganda experts yearning to maintain privilege and reputation.

    Coups are not always obvious, the most effective are hardly noticed.

     


    DIE ZEIT über das Zitat “ausgeklügelte Schutzgeldsystem von Gomopa”

    Artikel Link

    http://www.zeit.de/2013/11/Finanznachrichtendienst-Gomopa

    FINANZNACHRICHTENDIENST GOMOPA”Jetzt du wieder! Gruß Klaus”

    Wie der Finanznachrichtendienst Gomopa gegen Betrüger kämpft und dabei selbst dubiose Geschäfte macht.

    Es war an einem Mittwochmittag im September 2012 in Berlin-Kreuzberg, als Klaus Maurischat, ein Eis in der Hand und einen Kollegen neben sich, über eine Brücke spazierte und brutal überfallen wurde. Drei schwarz vermummte Männer griffen ihn an, sie schlugen ihn auf offener Straße nieder und traten ihm ins Gesicht, dann liefen sie davon. Blutend schleppte sich Maurischat in sein Büro am Tempelhofer Ufer und rief die Polizei.

    Maurischat, 56, war wohl kein Zufallsopfer. Der Mann lebt gefährlich. Er ist Chef eines Finanznachrichtendienstes namens Gomopa, und er hat es sich zur Aufgabe gemacht, Anlagebetrügern und anderen Wirtschaftskriminellen auf die Spur zu kommen und auf seiner Internetseite vor ihnen zu warnen. So schafft man sich Feinde in einem Milieu, in dem es Geld im Überfluss und wenig Skrupel gibt. Wer ihm die Schläger auf den Hals hetzte, ist nicht bekannt.

    ANZEIGE

    Eine der Firmen, mit denen sich Maurischat und seine Mitarbeiter in den vergangenen Jahren intensiv beschäftigten, ist die Immobiliengruppe S&K mit Sitz in Frankfurt. Die Rechercheure von Gomopa hatten einen guten Riecher, denn auch die Strafverfolgungsbehörden nahmen die Firma ins Visier, und sie holten jüngst zum großen Schlag aus: Am 19. Februar durchsuchten nicht weniger als 1.200 Ermittlungsbeamte und 15 Staatsanwälte eine Frankfurter Jugendstilvilla und mehr als 130 Objekte in sieben Bundesländern.

    Die Hauptverdächtigen wurden verhaftet, es sind der 33-jährige Stephan Schäfer und der 31-jährige Jonas Köller, die beiden Chefs von S&K. Sie werden verdächtigt, ein betrügerisches Schneeballsystem aufgebaut und Geldanleger um einen dreistelligen Millionenbetrag betrogen zu haben. Das Geld soll unter anderem für den exzessiven und extrem aufwendigen Lebensstil der Beschuldigten verwendet worden sein. Die Staatsanwaltschaft ermittelt in dem Fall gegen insgesamt 50 Personen, darunter sind auch Anwälte und Sachverständige, die den Hauptverdächtigen zu Diensten waren.

    Für Maurischat und seine Truppe könnte der Triumph kaum größer sein. Bereits im März 2010 hatten sie vor S&K gewarnt. Für ihre Berichterstattung waren die Rechercheure von der Frankfurter Firma mit Klagen überzogen worden. Auf der Internetseite des Finanznachrichtendienstes ist zu lesen: “Bis zur vorgestrigen Verhaftung von Schäfer und seines Geschäftspartners Jonas Köller wurden gegen GoMoPa.net insgesamt zwölf Klagen an vier Landgerichten (Stuttgart, Berlin, Köln und Frankfurt am Main) eingereicht und der Streitwert auf drei Millionen Euro hochgetrieben.” Man habe sich davon aber nicht schrecken lassen: “GoMoPa.net hielt stand.” Damit weckt der Fall S&K Sympathien für ein Unternehmen, das sich gerne als eine Art Schutzpolizei für Bürger und Anleger darstellt. “GoMoPa wurde mit dem Ziel gegründet, durch aktive Aufklärung und permanente Transparenz nachhaltig zur Betrugsprävention in Wirtschaft und Gesellschaft beizutragen”, heißt es auf der Website.

    Das klingt gut, wenn nicht: zu gut, um wahr zu sein. Recherchen der ZEIT legen den Verdacht nahe, dass die selbst erklärten Saubermänner ebenfalls Dreck am Stecken haben könnten. Es gibt Indizien für systematisch betriebene Erpressungen.

    Gomopa steht für Goldman, Morgenstern & Partners, der Hauptsitz des Unternehmens ist New York, aber mit der berühmten Investmentbank hat die Firma nichts zu tun. Bei der auf der Website angegebenen Adresse von Gomopa handelt es sich um ein Gebäude an der Madison Avenue in Midtown Manhattan. Dort findet sich ein Business Center, eine Art Gemeinschaftsbüro, wo sich Unternehmen Fax, Kopierer und Konferenzräume teilen. Bei einem Besuch vor Ort war niemand von Gomopa für die ZEIT zu erreichen. Man solle einen Termin machen, sagte die Empfangsdame. Persönlich kenne sie niemanden von der Firma.

    Tatsächlich scheint Gomopa maßgeblich von Deutschland aus betrieben zu werden. Am Tempelhofer Ufer in Berlin-Kreuzberg hat eine Gomopa GmbH ihren Sitz, es handelt sich um eine Niederlassung der US-Firma.

    Ein ehemaliger freier Mitarbeiter der Firma beschreibt gegenüber der ZEIT den eigentlichen Zweck des Unternehmens als ein “ausgeklügeltes Schutzgeld-Geschäftsmodell”.

    Seite 2/3:

    “Dann morgen unser abgesteckter positiv Artikel”

    Die Sache laufe so: “Entweder die betroffenen Unternehmen zahlen, oder Gomopa zerstört ihren Ruf so gründlich, dass sie keine Geschäfte mehr machen können.”

    Das wäre Erpressung. Um das zu kaschieren, zahle die erpresste Firma an Gomopa das Geld für eine angebliche Dienstleistung, so der Exmitarbeiter. Oder sie beteilige sich sogar mit Kapital an Gomopa.

    Das Ganze spielt sich vor dem Hintergrund des sogenannten grauen Kapitalmarkts ab. Die dort tätigen Unternehmen werden nicht von Aufsichtsbehörden überwacht. Sie versprechen potenziellen Geldanlegern hohe Renditen, etwa mit Immobiliengeschäften, Unternehmensbeteiligungen oder Edelsteinhandel. Auf die Risiken wird oft nur im Kleingedruckten hingewiesen. Ob die versprochene Rendite fließt, zeigt sich häufig erst nach Jahren. Viele Unternehmen handeln legal, aber Abzocke und Betrügereien kommen häufig vor. Seriöse Anbieter sind von unseriösen schwer zu unterscheiden.

    Fachorgane mit kritischen Experten, die in diesem Bereich für Aufklärung sorgen, können Anleger vor Schäden bewahren, sind also eigentlich eine gute Sache. Es gibt aber offenbar auch ein anderes Geschäftsmodell: Erfahrene Szenekenner durchleuchten Anlagefirmen und unterziehen sie einer ständigen kritischen Berichterstattung, sie lassen sich dann aber durch Geldzahlungen der betroffenen Unternehmen ruhigstellen. Dass dieses Geschäftsmodell ganz besonders einträglich sein kann, ergibt sich aus der Tatsache, dass gerade unentdeckte Anlagebetrüger regelmäßig in Geld schwimmen und ein großes Interesse daran haben, ihre Geschäfte so lange wie möglich weiterzubetreiben.

    Im Fall S&K ging es damit los, dass dessen Chefs eine Reihe anonymer E-Mails erhielten, wie sie der ZEIT vor ihrer Verhaftung berichteten. “Hallöle ihr milchreisbubis!”, begann eine dieser Nachrichten. “Eure klitsche ist in einem jahr geschichte. was jetzt im internet auf euch traumtänzer und loser zukommt, ahnt ihr nicht. haut ab, solange es noch geht. das ist ein gutgemeinter rat und unsere letzte warnung.”

    Stephan Schäfer behauptet, Maurischat habe zugegeben, dass er und ein Mann namens Wolfgang Zimmermann für die anonymen Mails und auch für anonyme Internetseiten gegen S&K verantwortlich seien. “Das ist eine Lüge!”, schreibt Maurischat der ZEIT. Nie habe er derlei getan, nie derlei zugegeben.

    Unstrittig ist, dass sich Maurischat und Schäfer im September 2012 in der Gomopa-Niederlassung in Berlin trafen, um Differenzen auszuräumen. Nach Maurischats Darstellung führte er damals mit Schäfer Vergleichsverhandlungen. Der Immobilienunternehmer habe ihn, einen anderen Mann namens Zimmermann und Gomopa verleumdet und nach einer Unterlassungsklage eingewilligt, Schmerzensgeld zu leisten. Überdies habe der S&K-Chef angeboten, sich bei dem Finanznachrichtendienst mit zwei Millionen Euro zu beteiligen.

    Obwohl es sich dabei um eine außerordentlich merkwürdige Offerte handelte, war sie für Maurischat durchaus akzeptabel: “Ich schlug ihm vor, wenn er das wolle, dann könne er eine speziell dafür anzufertigende Teilhabererklärung unterzeichnen.”

    Das tat Schäfer zwar nicht, aber er zahlte immerhin 200.000 Euro an Maurischat. Der leitete einen Großteil des Geldes an Zimmermann und andere weiter und behielt 30.000 Euro.

    Am 22. Oktober schrieb Maurischat eine Mail an Schäfer, in der es zum einen um dieses bereits gezahlte Geld ging und zum anderen um eine noch vorzunehmende Beteiligung Schäfers an Gomopa. Diese Beteiligung hätte auch beeinflusst, wie über S&K auf GoMoPa.net berichtet worden wäre. Das legt jedenfalls die Mail nahe, die der Anlegerschützer schrieb.

    “Also, Teilhabervertrag unterschrieben zu mir und entsprechend handeln. Dann morgen unser abgesteckter positiv Artikel und die beiden o.a. Artikel sind auch weg”, so Maurischat an Schäfer. Er bot an: “Meinetwegen schmeiße ich sämtliche Artikel auch sofort und heute raus wenn mir der unterschriebene und in der Anlage befindliche Teilhabervertrag vorliegt und wir das zum Bestandteil unserer Vereinbarung machen!” Der Schluss dieser Mail spricht Bände: “Jetzt du wieder! Gruß Klaus”.

    Nach der Zahlung seien Artikel über sein Unternehmen auf der Website von Gomopa zum Teil verschwunden und zum Teil durch positivere Berichte ersetzt worden, sagt Schäfer. Maurischat behauptet heute, dass er einen Einstieg von S&K bei seinem Finanznachrichtendienst nur akzeptiert hätte, wenn sich die Immobilienfirma vorher von einem von ihm ausgewählten Wirtschaftsprüfer hätte begutachten lassen wollen. In der der ZEIT vorliegenden “Beteiligungserklärung” steht davon allerdings nichts. Dafür findet sich dort diese Passage: Gomopa “wird nach Eingang der ersten Zahlung sämtliche S&K betreffenden Artikel vom Netz nehmen und neue Artikel über S&K nicht veröffentlichen ohne diese mit S&K einvernehmlich abzusprechen”.

    Seite 3/3:

    So ist das in der Szene: Man schlägt sich – und verträgt sich

    Klaus Maurischat verhandelte nach Unterlagen, die der ZEIT vorliegen, auch mit einem Finanzunternehmer in Hamburg. Dabei ging es ebenfalls um einen Einstieg bei Gomopa. Und auch über diesen Mann und einen seiner Geschäftspartner waren zuvor auf der Gomopa-Website kritische Beiträge erschienen.

    Der Mann ließ sich auf die Sache ein. Der Gomopa-Chef habe ihm in einem mündlichen Gespräch klargemacht, dass die negativen Berichte nur gegen Geld ein Ende nehmen würden, sagt der Hamburger Geschäftsmann: “Zu zahlen erschien mir günstiger, als sich auf einen Internetkrieg einzulassen.”

    Auch dieser Unternehmer bekam anonyme Mails. Bei einer stand in der Betreffzeile: “Kurz vor dem Konkurs?” Darunter folgten acht “Überschriften, die auf Internetseiten Sie zukünftig begleiten könnten”.

    Der Hamburger schrieb an Maurischat: “Ich (…) bestätige hiermit den verbindlichen Antrag auf Ankauf von 40 Stck./ in Worten vierzig Shares (Aktien)” an der Gomopa Control Inc. Der Sitz dieser Gomopa-Tochter ist Miami im US-Bundesstaat Florida. Vereinbart wurde eine Beteiligung in Höhe von 200000 Euro.

    Unstreitig ist, dass Gomopa im April 2012 von dem Hamburger Kaufmann 24750 Euro als erste Rate kassierte. Maurischat bestätigte ihm auch schriftlich den Eingang des Geldes und wies in dem Schreiben ausdrücklich darauf hin, dass diese Beteiligung in keinem Zusammenhang mit der Berichterstattung auf GoMoPa.net stehe, wie “böse Menschen” denken könnten.

    Als der Unternehmer dann aber nicht die noch ausstehenden 175250 Euro überwies, bedrohte ihn Maurischat per Mail vom 9. Juli 2012: “Nochmals mache ich Sie darauf aufmerksam, dass ich Ihnen und sämtlichen Unternehmen an denen Sie beteiligt sind eigene Internetseiten widmen und über Ihre Geschäftspraktiken aufklären werde, wenn Sie Ihren Verpflichtungen nicht nachkommen.” Er werde überdies “sämtliche Geschäftsbanken Ihres Hauses informieren und über Ihr Unternehmen mehrfach auf unserer Plattform öffentlich berichten”, drohte Maurischat. “Diese Meldungen gehen sodann an fast 60000 User und Vertriebe aus dem Finanzbereich!” Angeblich schauen jährlich 8,4 Millionen Besucher auf der Gomopa-Website vorbei.

    Auch per SMS drohte Maurischat dem Kaufmann: “Bis zum Offenbarungseid oder zur Insolvenz werde ich Sie treiben. Zahlen Sie nicht, bereite ich Ihnen und Ihrer Firma einen Skandal – da denken Sie noch in 20 Jahren dran!”

    Maurischat gibt heute zu, diese Mails und Nachrichten “wahrscheinlich” geschrieben zu haben. Er sei “mehr als wütend” gewesen, weil der Hamburger ihm gegenüber sein Kaufmannsehrenwort gebrochen habe. Nicht er habe dem Mann eine Beteiligung angeboten, sondern der habe ihn danach gefragt. Das zugesagte Geld sei für ein neues Projekt seines Unternehmens fest eingeplant gewesen, sein Ausbleiben habe die Firma in ziemliche Schwierigkeiten gebracht.

    Der ZEIT sind 14 weitere Firmen bekannt, die behaupten, im Zusammenhang mit Gomopa-Berichten zu Geldzahlungen genötigt worden zu sein. Sie haben Angst, genannt zu werden. “Gegen Gomopa haben Sie keine Chance”, sagt ein Unternehmer. “Auf deren Berichte wird im Internet geklickt. Egal ob die Fakten stimmen oder nicht.”

    Maurischat weist alle Anschuldigungen zurück. Gomopa mache die Berichterstattung im Internet nie von Geldzahlungen abhängig. Vielmehr werde er diffamiert von Leuten, “die von uns beim Betrügen und Lügen erwischt wurden”.

    Über ihn selbst, der mal eine Lehre als Groß- und Einzelhandelskaufmann gemacht hat, heißt es auf der Gomopa-Website, dass er “die Methoden und Tricks des Marktes wie kaum ein anderer” kenne, und das ist sicher wahr. Dass er einschlägig vorbestraft ist, steht nicht da. Man erfährt auf der Website auch nichts über die Verbindung mit dem 60-jährigen Wolfgang Zimmermann, einer ebenfalls schillernden Figur der Szene.

    Zimmermann steht hinter einer Firma namens Confidential Business mit Sitz in Panama. Er taucht oft dann bei Unternehmen auf, wenn diese wegen Artikeln auf GoMoPa.net und anonymen Internetseiten unter Druck stehen. Zimmermann bietet an, das Problem gegen eine Geldzahlung zu lösen. Seine Dienstleistungen hat er in einem Werbebrief an das Frankfurter Immobilienunternehmen S&K (etwas ungelenk) so beschrieben: “Ich gebe meiner Klientel äußerst aggressive, aber legale Waffen und Mittel zu Hand.”

    Wie Maurischat und Zimmermann zusammenarbeiten, das geht unter anderem aus einer der ZEIT vorliegenden Mail hervor, die Zimmermann an einen Finanzunternehmer geschrieben hat. Darin droht er: “Wir stellen weitere Anzeigen. Bis Sie am Ende sind.” Gomopa leiste “echt gute Arbeit”, schreibt Zimmermann und fügt hinzu: “Die können Sie nicht abstellen, da haben Sie keine Chance mehr. (…) Sie wollten ja nicht zahlen.”

    Zimmermann hat sich zu keinem der Vorwürfe geäußert. Dass mit ihm nicht zu spaßen ist, hat auch Maurischat erfahren. Zwischen ihm und Zimmermann habe es einen jahrelangen Streit und “Internetkrieg” gegeben, schreibt er der ZEIT.“Auf diversen, anonym ins Internet gestellten Webseiten wurden Mitarbeiter und ich unter anderem als Päderasten, Gewohnheitsverbrecher und Kinderschänder bezeichnet.” 2006 habe man den “Krieg” mithilfe eines Anwalts beendet. Dann sei “Ruhe eingekehrt”. So ist das in der Szene: Man schlägt sich – und verträgt sich.

    MDR – Ex-Stasi-Leute – Kontakte zur kriminellen Szene – Amträger korrumpiert…

    Landtags-Untersuchungsausschuss in SachsenHatten Ex-Stasi-Leute Kontakte zur kriminellen Szene?

    Der Landesverfassungsschutz Sachsen hatte offenbar Hinweise auf Verbindungen früherer Mitarbeiter der DDR-Staatssicherheit zur Organisierten Kriminalität. Das erklärte die frühere Referatsleiterin Simone Skroch (früher Henneck) am Freitag im Landtags-Untersuchungsausschuss zu kriminellen und korruptiven Netzwerken in Sachsen. Die Informationen stammten von mehreren und voneinander unabhängigen Quellen.

    Halfen Ex-Stasi-Leute bei der “Verführung” von Amtspersonen?

    Die einstige Referatsleiterin im Landesamt für Verfassungsschutz, Simone Henneck, sagt am 09.01.2013 in Dresden (Sachsen) vor dem Untersuchungsausschuss des Sächsischen Landtages aus.

    Die frühere Leiterin der Geheimdienstabteilung für Organisierte Kriminalität gab am Freitag neue Details preis.

    Wie die Hauptzeugin des Ausschusses erläuterte, gab es diesen Hinweisen zufolge zahlreiche Kontakte zwischen teils hochrangigen Ex-Stasi-Mitarbeitern und Vertretern der regionalen und internationalen Organisierten Kriminalität in den Bereichen Wirtschaft und öffentliche Verwaltung sowie im Rotlichtmilieu. Ihr Ziel: Angestellte, Beamte, Politiker und andere Vertreter des öffentlichen Lebens zielgerichtet in verfängliche Situationen zu bringen, mit denen man sie später hätte erpressen können. Dazu zählten Skroch zufolge auch Bestechung und Korruption. Die Juristin bezog sich dabei auf das Wirken der Organisierten Kriminalität im Raum Chemnitz, Zwickau und Vogtland.

    Vom “Sachsensumpf” zur “Aktenaffäre”

    Die Hinweise zu möglichen kriminellen Netzwerken in Sachsen waren 2007 erstmals aufgetaucht. Grundlage war eine Datensammlung des sächsischen Geheimdienstes. Die Vorwürfe reichten von Amtsmissbrauch über Kinderprostitution bis zur Bandenkriminalität. Darin sollten auch Juristen und Polizisten verstrickt sein. Ermittlungen externer Prüfer und der Staatsanwaltschaft Dresden entkräfteten jedoch die Vorwürfe, die Ermittlungen gegen die Beschuldigten wurden eingestellt. Stattdessen wurde Skroch vorgeworfen, Akten aufgebauscht zu haben. Sie bestreitet das vehement und erhob bei ihrer Befragung am Freitag erneut schwere Vorwürfe gegen die frühere Chefetage des Verfassungsschutzamts.

    Bereits im Januar hatte Skroch vor dem Ausschuss erklärt, dass zahlreiche Dokumente über die Begegnung von Informanten mit Geheimdienstlern verschwunden seien. Jetzt äußerte sie die Vermutung, dass ihr Panzerschrank während einer Urlaubsreise im Juni 2007 geöffnet wurde. Zudem warf sie ihren damaligen Vorgesetzten vor, sie nicht rechtzeitig über ein gegen sie laufendes Disziplinarverfahren informiert zu haben.

    Der aktuelle Untersuchungs-Ausschuss wurde 2010 auf Antrag der Opposition eingesetzt, weil nach ihrer Ansicht im Abschlussbericht des vorherigen Gremiums zu viel Fragen offen gebelieben waren.

    http://www.mdr.de/sachsen/sachsensumpf116.html

    TOP-SECRET – Report of the Ministry of Defense about Nuclear Weapons and their misconduct through Cyberterrorists

    dsbcover

     

    TOP-SECRET – Report of the Ministry of Defense about Nuclear Weapons and their misconduct through Cyberterrorists

    CTO Vision writes:

    Bottom Line Up Front: After reviewing all available evidence and rigorously weighing threat information, a Task Force of the Defense Science Board (DSB) concludes that:

    The United States cannot be confident that our critical Information Technology (IT) systems will work under attack from a sophisticated and well-resourced opponent. 

    How does that make you feel? You know yourself what adversaries are doing when it comes to intellectual property theft. Now read on for more about what the DSB sees as the threat to military systems.

    Here are more details: 

    The Defense Science Board (DSB) provides advice, assessments and reports as chartered by DoD leadership. It has studied cyber security and related topics for years and has been instrumental in providing new ideas and perspectives for action by DoD leadership.

    The DSB was recently chartered to look at an interesting and somewhat intellectually stimulating topic, that of how US military systems could withstand cyber attack and remain able to execute their mission.  The chartered group, a task force on Resilient Military Systems, produced a report with a set of recommendations designed to improve DoD’s ability to accomplish its missions. The overarching strategy recommended by the DSB is one that enhanced the department’s defenses in the face of attacks, decreases the effectiveness of adversaries, increases the cost to adversaries, and deters the most significant adversaries by ensuring the US maintains the ability to deliver desired mission capabilities in the face of catastrophic cyber attack.

    The task force also identified a framework to implement metrics collection systems and then develop appropriate performance metrics that can be used to shape DoD’s investment decisions. The report approved by DSB chairman Paul Kaminsky is at http://www.acq.osd.mil/dsb/reports2010s.htm. It is also available at: Resilient Military Systems and the Advanced Cyber Threat.

    Here is more from the forwarding letter to the report:

    The final report of the DSB Task Force on Resilient Military Systems is attached. This report is based on the perspective of 24 Task Force members who received more than 50 briefings from practitioners and senior officials throughout the Department of Defense (DoD), Intelligence Community (IC), commercial sector, academia, national laboratories, and policymakers. This Task Force was asked to review and make recommendations to improve the resilience of DoD systems to cyber attacks, and to develop a set of metrics that the Department could use to track progress and shape investment priorities.

    After conducting an 18-month study, this Task Force concluded that the cyber threat is serious and that the United States cannot be confident that our critical Information Technology (IT) systems will work under attack from a sophisticated and well-resourced opponent utilizing cyber capabilities in combination with all of their military and intelligence capabilities (a “full spectrum” adversary). While this is also true for others (e.g. Allies, rivals, and public/private networks), this Task Force strongly believes the DoD needs to take the lead and build an effective response to measurably increase confidence in the IT systems we depend on (public and private) and at the same time decrease a would-be attacker’s confidence in the effectiveness of their capabilities to compromise DoD systems. This conclusion was developed upon several factors, including the success adversaries have had penetrating our networks; the relative ease that our Red Teams have in disrupting, or completely beating, our forces in exercises using exploits available on the Internet; and the weak cyber hygiene position of DoD networks and systems. The Task Force believes that the recommendations of this report create the basis for a strategy to address this broad and pervasive threat.

    Nearly every conceivable component within DoD is networked. These networked systems and components are inextricably linked to the Department’s ability to project military force and the associated mission assurance. Yet, DoD’s networks are built on inherently insecure architectures that are composed of, and increasingly using, foreign parts. While DoD takes great care to secure the use and operation of the “hardware” of its weapon systems, the same level of resource and attention is not spent on the complex network of information technology (IT) systems that are used to support and operate those weapons or critical IT capabilities embedded within them.

    DoD’s dependence on this vulnerable technology is a magnet to U.S. opponents. In fact, DoD and its contractor base have already sustained staggering losses of system design information incorporating decades of combat knowledge and experience that provide adversaries insight to technical designs and system use. Despite numerous DoD actions, efforts are fragmented, and the Department is not currently prepared to mitigate the threat.

    That forwarding letter was signed by the task force co-chairs, Mr. Lewis Von Thaer and Mr. James R. Gosler, two of the most professional, well thought out leaders I have ever worked with.

    Please dive deep into the full document now. You will find some information you already know, but I promise some surprises as well.

     

     

     

    DOWNLOAD THE ORIGINAL REPORT AT THE LINK BELOW

    Click to access ResilientMilitarySystems.CyberThreat.pdf

    Cryptome – NIST RFI Critical Infrastructure Cybersecurity

    NIST Framework to Improve Critical Infrastructure Cybersecurity

     


    [Federal Register Volume 78, Number 38 (Tuesday, February 26, 2013)]
    [Notices]
    [Pages 13024-13028]
    From the Federal Register Online via the Government Printing Office [www.gpo.gov]
    [FR Doc No: 2013-04413]
    
    -----------------------------------------------------------------------
    
    DEPARTMENT OF COMMERCE
    
    National Institute of Standards and Technology
    
    [Docket Number 130208119-3119-01]
    
    Developing a Framework To Improve Critical Infrastructure 
    Cybersecurity
    
    AGENCY: National Institute of Standards and Technology, U.S. Department 
    of Commerce.
    
    ACTION: Notice; Request for Information (RFI).
    
    -----------------------------------------------------------------------
    
    SUMMARY: The National Institute of Standards and Technology (NIST) is 
    conducting a comprehensive review to develop a framework to reduce 
    cyber risks to critical infrastructure \1\ (the ``Cybersecurity 
    Framework'' or ``Framework''). The Framework will consist of standards, 
    methodologies, procedures, and processes that align policy, business, 
    and technological approaches to address cyber risks.
    ---------------------------------------------------------------------------
    
        \1\ For the purposes of this RFI the term ``critical 
    infrastructure'' has the meaning given the term in 42 U.S.C. 
    5195c(e), ``systems and assets, whether physical or virtual, so 
    vital to the United States that the incapacity or destruction of 
    such systems and assets would have a debilitating impact on 
    security, national economic security, national public health or 
    safety, or any combination of those matters.''
    ---------------------------------------------------------------------------
    
        This RFI requests information to help identify, refine, and guide 
    the many interrelated considerations, challenges, and efforts needed to 
    develop the Framework. In developing the Cybersecurity Framework, NIST 
    will consult with the Secretary of Homeland Security, the National 
    Security Agency, Sector-Specific Agencies and other interested agencies 
    including the Office of Management and Budget, owners and operators of 
    critical infrastructure, and other stakeholders including other 
    relevant agencies, independent regulatory agencies, State, local, 
    territorial and tribal governments. The Framework will be developed 
    through an open public review and comment process that will include 
    workshops and other opportunities to provide input.
    
    DATES: Comments must be received by 5:00 p.m. Eastern time on Monday, 
    April 8, 2013.
    
    ADDRESSES: Written comments may be submitted by mail to Diane 
    Honeycutt, National Institute of Standards and Technology, 100 Bureau 
    Drive, Stop 8930, Gaithersburg, MD 20899. Submissions may be in any of 
    the following formats: HTML, ASCII, Word, RTF, or PDF. Online 
    submissions in electronic form may be sent to cyberframework@nist.gov. 
    Please submit comments only and include your name, company name (if 
    any), and cite
    
    [[Page 13025]]
    
    ``Developing a Framework to Improve Critical Infrastructure 
    Cybersecurity'' in all correspondence. All comments received by the 
    deadline will be posted at http://csrc.nist.gov without change or 
    redaction, so commenters should not include information they do not 
    wish to be posted (e.g., personal or confidential business 
    information).
    
    FOR FURTHER INFORMATION CONTACT: For questions about this RFI contact: 
    Adam Sedgewick, U.S. Department of Commerce, 1401 Constitution Avenue 
    NW., Washington, DC 20230, telephone (202) 482-0788, email 
    Adam.Sedgewick@nist.gov. Please direct media inquiries to NIST's Office 
    of Public Affairs at (301) 975-NIST.
    
    SUPPLEMENTARY INFORMATION: The national and economic security of the 
    United States depends on the reliable functioning of critical 
    infrastructure, which has become increasingly dependent on information 
    technology. Recent trends demonstrate the need for improved 
    capabilities for defending against malicious cyber activity. Such 
    activity is increasing and its consequences can range from theft 
    through disruption to destruction. Steps must be taken to enhance 
    existing efforts to increase the protection and resilience of this 
    infrastructure, while maintaining a cyber environment that encourages 
    efficiency, innovation, and economic prosperity, while protecting 
    privacy and civil liberties.
        Under Executive Order 13636 \2\ (``Executive Order''), the 
    Secretary of Commerce is tasked to direct the Director of NIST to 
    develop a framework for reducing cyber risks to critical infrastructure 
    (the ``Cybersecurity Framework'' or ``Framework''). The Framework will 
    consist of standards, methodologies, procedures and processes that 
    align policy, business, and technological approaches to address cyber 
    risks. The Department of Homeland Security, in coordination with 
    sector-specific agencies, will then establish a voluntary program to 
    support the adoption of the Cybersecurity Framework by owners and 
    operators of critical infrastructure and any other interested entities.
    ---------------------------------------------------------------------------
    
        \2\ ``Executive Order 13636--Improving Critical Infrastructure 
    Cybersecurity'' 78 FR 11739 (February 19, 2013).
    ---------------------------------------------------------------------------
    
        Given the diversity of sectors in critical infrastructure, the 
    Framework development process is designed to initially identify cross-
    sector security standards and guidelines that are immediately 
    applicable or likely to be applicable to critical infrastructure, to 
    increase visibility and adoption of those standards and guidelines, and 
    to find potential gaps (i.e., where standards/guidelines are 
    nonexistent or where existing standards/guidelines are inadequate) that 
    need to be addressed through collaboration with industry and industry-
    led standards bodies. The Framework will incorporate voluntary 
    consensus standards and industry best practices to the fullest extent 
    possible and will be consistent with voluntary international consensus-
    based standards when such international standards will advance the 
    objectives of the Executive Order. The Framework would be designed to 
    be compatible with existing regulatory authorities and regulations.
        The Cybersecurity Framework will provide a prioritized, flexible, 
    repeatable, performance-based, and cost-effective approach, including 
    information security measures and controls to help owners and operators 
    of critical infrastructure and other interested entities to identify, 
    assess, and manage cybersecurity-related risk while protecting business 
    confidentiality, individual privacy and civil liberties. To enable 
    technical innovation and account for organizational differences, the 
    Cybersecurity Framework will not prescribe particular technological 
    solutions or specifications. It will include guidance for measuring the 
    performance of an entity in implementing the Cybersecurity Framework 
    and will include methodologies to identify and mitigate impacts of the 
    Framework and associated information security measures and controls on 
    business confidentiality and to protect individual privacy and civil 
    liberties.
        As a non-regulatory Federal agency, NIST will develop the Framework 
    in a manner that is consistent with its mission to promote U.S. 
    innovation and industrial competitiveness through the development of 
    standards and guidelines in consultation with stakeholders in both 
    government and industry. While the focus will be on the Nation's 
    critical infrastructure, the Framework will be developed in a manner to 
    promote wide adoption of practices to increase cybersecurity across all 
    sectors and industry types. In its first year, the emphasis will be on 
    finding commonality within and across the affected sectors. It will 
    seek to provide owners and operators the ability to implement security 
    practices in the most effective manner while allowing organizations to 
    express requirements to multiple authorities and regulators. Issues 
    relating to harmonization of existing relevant standards and 
    integration with existing frameworks will also be considered in this 
    initial stage.
        In accordance with the Executive Order, the Secretary of Commerce 
    has directed the Director of the National Institute of Standards and 
    Technology (the Director) to coordinate the development of a Framework 
    to reduce the cyber risks to critical infrastructure. The Cybersecurity 
    Framework will incorporate existing consensus-based standards to the 
    fullest extent possible, consistent with requirements of the National 
    Technology Transfer and Advancement Act of 1995,\3\ and guidance 
    provided by Office of Management and Budget Circular A-119, ``Federal 
    Participation in the Development and Use of Voluntary Consensus 
    Standards and in Conformity Assessment Activities.'' \4\ Principles 
    articulated in the Executive Office of the President memorandum M-12-08 
    ``Principles for Federal Engagement in Standards Activities to Address 
    National Priorities'' \5\ will be followed. The Framework should also 
    be consistent with, and support the broad policy goals of, the 
    Administration's 2010 ``National Security Strategy,'' 2011 ``Cyberspace 
    Policy Review,'' ``International Strategy for Cyberspace'' of May 2010 
    and HSPD-7 ``Critical Infrastructure Identification, Prioritization, 
    and Protection.''
    ---------------------------------------------------------------------------
    
        \3\ Public Law 104-113 (1996), codified in relevant part at 15 
    U.S.C. 272(b).
        \4\ http://standards.gov/a119.cfm.
        \5\ http://www.whitehouse.gov/sites/default/files/omb/memoranda/2012/m-12-08_1.pdf.
    ---------------------------------------------------------------------------
    
        The goals of the Framework development process will be: (i) To 
    identify existing cybersecurity standards, guidelines, frameworks, and 
    best practices that are applicable to increase the security of critical 
    infrastructure sectors and other interested entities; (ii) to specify 
    high-priority gaps for which new or revised standards are needed; and 
    (iii) to collaboratively develop action plans by which these gaps can 
    be addressed. It is contemplated that the development process will have 
    requisite stages to allow for continuing engagement with the owners and 
    operators of critical infrastructure, and other industry, academic, and 
    government stakeholders.
        In December 2011, the United States Government Accountability 
    Office (GAO) issued a report titled ``CRITICAL INFRASTRUCTURE 
    PROTECTION: Cybersecurity Guidance Is Available, but More Can Be Done 
    to Promote Its Use.'' \6\ In its report, GAO found similarities in 
    cybersecurity guidance across sectors, and recommended
    
    [[Page 13026]]
    
    promoting existing guidance to assist individual entities within a 
    sector in ``identifying the guidance that is most applicable and 
    effective in improving their security posture.'' \7\
    ---------------------------------------------------------------------------
    
        \6\ http://www.gao.gov/assets/590/587529.pdf.
        \7\ Id., at page 46.
    ---------------------------------------------------------------------------
    
        NIST believes the diversity of business and mission needs 
    notwithstanding, there are core cybersecurity practices that can be 
    identified and that will be applicable to a diversity of sectors and a 
    spectrum of quickly evolving threats. Identifying such core practices 
    will be a focus of the Framework development process.
        In order to be effective in protecting the information and 
    information systems that are a part of the U.S. critical 
    infrastructure, NIST believes the Framework should have a number of 
    general properties or characteristics. The Framework should include 
    flexible, extensible, scalable, and technology-independent standards, 
    guidelines, and best practices, that provide:
         A consultative process to assess the cybersecurity-related 
    risks to organizational missions and business functions;
         A menu of management, operational, and technical security 
    controls, including policies and processes, available to address a 
    range of threats and protect privacy and civil liberties;
         A consultative process to identify the security controls 
    that would adequately address risks \8\ that have been assessed and to 
    protect data and information being processed, stored, and transmitted 
    by organizational information systems;
    ---------------------------------------------------------------------------
    
        \8\ Organizational risk responses can include, for example, risk 
    acceptance, risk rejection, risk mitigation, risk sharing, or risk 
    transfer.
    ---------------------------------------------------------------------------
    
         Metrics, methods, and procedures that can be used to 
    assess and monitor, on an ongoing or continuous basis, the 
    effectiveness of security controls that are selected and deployed in 
    organizational information systems and environments in which those 
    systems operate and available processes that can be used to facilitate 
    continuous improvement in such controls; \9\
    ---------------------------------------------------------------------------
    
        \9\ Assessments determine whether the security controls selected 
    by an organization are implemented correctly, operating as intended, 
    and producing the desired results in order to enforce organizational 
    security policies.
    ---------------------------------------------------------------------------
    
         A comprehensive risk management approach that provides the 
    ability to assess, respond to, and monitor information security-related 
    risks and provide senior leaders/executives with the kinds of necessary 
    information sets that help them to make ongoing risk-based decisions;
         A menu of privacy controls necessary to protect privacy 
    and civil liberties.
        Within eight months, the Executive Order requires NIST to publish 
    for additional comment a draft Framework that clearly outlines areas of 
    focus and provides preliminary lists of standards, guidelines and best 
    practices that fall within that outline. The draft will also include 
    initial conclusions for additional public comment. The draft Framework 
    will build on NIST's ongoing work with cybersecurity standards and 
    guidelines for the Smart Grid, Identity Management, Federal Information 
    Security Management Act (FISMA) implementation, the Electricity 
    Subsector Cybersecurity Capability Maturity Model, and related 
    projects.
        NIST intends to engage with critical infrastructure stakeholders, 
    through a voluntary consensus-based process, to develop the standards, 
    guidelines and best practices that will comprise the Framework. This 
    will include interactive workshops with industry and academia, along 
    with other forms of outreach. NIST believes that the Framework cannot 
    be static, but must be a living document that allows for ongoing 
    consultation in order to address constantly evolving risks to critical 
    infrastructure cybersecurity. A voluntary consensus standards-based 
    approach will facilitate the ability of critical infrastructure owners 
    and operators to manage such risks, and to implement alternate 
    solutions from the bottom up with interoperability, scalability, and 
    reliability as key attributes.
        A standards-based Framework will also help provide some of the 
    measures necessary to understand the effectiveness of critical 
    infrastructure protection, and track changes over time. DHS and Sector 
    Specific Agencies will provide input in this area based on their 
    engagement with sector stakeholders. This standards-based approach is 
    necessary in order to be able to provide and analyze data from 
    different sources that can directly support risk-based decision-making. 
    A Framework without sufficient standards and associated conformity 
    assessment programs could impede future innovation in security efforts 
    for critical infrastructure by potentially creating a false sense of 
    security.
        The use of widely-accepted standards is also necessary to enable 
    economies of scale and scope to help create competitive markets in 
    which competition is driven by market need and products that meet that 
    market need through combinations of price, quality, performance, and 
    value to consumers. Market competition then promotes faster diffusion 
    of these technologies and realization of many benefits throughout these 
    sectors.
        It is anticipated that the Framework will: (i) Include 
    consideration of sustainable approaches for assessing conformity to 
    identified standards and guidelines; (ii) assist in the selection and 
    development of an optimal conformity assessment approach; and (iii) 
    facilitate the implementation of selected approach(es) that could cover 
    technology varying in scope from individual devices or components to 
    large-scale organizational operations. The decisions on the type, 
    independence and technical rigor of these conformity assessment 
    approaches should be risk-based. The need for confidence in conformity 
    must be balanced with cost to the public and private sectors, including 
    their international operations and legal obligations. Successful 
    conformity assessment programs provide the needed level of confidence, 
    are efficient and have a sustainable and scalable business case.
        This RFI is looking for current adoption rates and related 
    information for particular standards, guidelines, best practices, and 
    frameworks to determine applicability throughout the critical 
    infrastructure sectors. The RFI asks for stakeholders to submit ideas, 
    based on their experience and mission/business needs, to assist in 
    prioritizing the work of the Framework, as well as highlighting 
    relevant performance needs of their respective sectors.
        For the purposes of this notice and the Framework, the term 
    ``standards'' and the phrase ``standards setting'' are used in a 
    generic manner to include both standards development and conformity 
    assessment development. In addition to critical infrastructure owners 
    and operators, NIST invites Federal agencies, state, local, territorial 
    and tribal governments, standard-setting organizations,\10\ other 
    members of industry, consumers, solution providers, and other 
    stakeholders to respond.
    ---------------------------------------------------------------------------
    
        \10\ As used herein, ``standard-setting organizations'' refers 
    to the wide cross section of organizations that are involved in the 
    development of standards and specifications, both domestically and 
    abroad.
    ---------------------------------------------------------------------------
    
    Request for Comment
    
        The following questions cover the major areas about which NIST 
    seeks comment. The questions are not intended to limit the topics that 
    may be addressed. Responses may include any topic believed to have 
    implications for the development of the Framework
    
    [[Page 13027]]
    
    regardless of whether the topic is included in this document.
        While the Framework will be focused on critical infrastructure, 
    given the broad diversity of sectors that may include parts of critical 
    infrastructure, the evolving nature of the classification of critical 
    infrastructure based on risk, and the intention to involve a broad set 
    of stakeholders in development of the Framework, the RFI will generally 
    use the broader term ``organizations'' when seeking information.
        Comments containing references, studies, research, and other 
    empirical data that are not widely published should include copies of 
    the referenced materials. Do not include in comments or otherwise 
    submit proprietary or confidential information, as all comments 
    received by the deadline will be made available publically at http://csrc.nist.gov/.
    
    Current Risk Management Practices
    
        NIST solicits information about how organizations assess risk; how 
    cybersecurity factors into that risk assessment; the current usage of 
    existing cybersecurity frameworks, standards, and guidelines; and other 
    management practices related to cybersecurity. In addition, NIST is 
    interested in understanding whether particular frameworks, standards, 
    guidelines, and/or best practices are mandated by legal or regulatory 
    requirements and the challenges organizations perceive in meeting such 
    requirements. This will assist in NIST's goal of developing a Framework 
    that includes and identifies common practices across sectors.
        1. What do organizations see as the greatest challenges in 
    improving cybersecurity practices across critical infrastructure?
        2. What do organizations see as the greatest challenges in 
    developing a cross-sector standards-based Framework for critical 
    infrastructure?
        3. Describe your organization's policies and procedures governing 
    risk generally and cybersecurity risk specifically. How does senior 
    management communicate and oversee these policies and procedures?
        4. Where do organizations locate their cybersecurity risk 
    management program/office?
        5. How do organizations define and assess risk generally and 
    cybersecurity risk specifically?
        6. To what extent is cybersecurity risk incorporated into 
    organizations' overarching enterprise risk management?
        7. What standards, guidelines, best practices, and tools are 
    organizations using to understand, measure, and manage risk at the 
    management, operational, and technical levels?
        8. What are the current regulatory and regulatory reporting 
    requirements in the United States (e.g. local, state, national, and 
    other) for organizations relating to cybersecurity?
        9. What organizational critical assets are interdependent upon 
    other critical physical and information infrastructures, including 
    telecommunications, energy, financial services, water, and 
    transportation sectors?
        10. What performance goals do organizations adopt to ensure their 
    ability to provide essential services while managing cybersecurity 
    risk?
        11. If your organization is required to report to more than one 
    regulatory body, what information does your organization report and 
    what has been your organization's reporting experience?
        12. What role(s) do or should national/international standards and 
    organizations that develop national/international standards play in 
    critical infrastructure cybersecurity conformity assessment?
    
    Use of Frameworks, Standards, Guidelines, and Best Practices
    
        As set forth in the Executive Order, the Framework will consist of 
    standards, guidelines, and/or best practices that promote the 
    protection of information and information systems supporting 
    organizational missions and business functions.
        NIST seeks comments on the applicability of existing publications 
    to address cybersecurity needs, including, but not limited to the 
    documents developed by: international standards organizations; U.S. 
    Government Agencies and organizations; State regulators or Public 
    Utility Commissions; Industry and industry associations; other 
    Governments, and non-profits and other non-government organizations.
        NIST is seeking information on the current usage of these existing 
    approaches throughout industry, the robustness and applicability of 
    these frameworks and standards, and what would encourage their 
    increased usage. Please provide information related to the following:
        1. What additional approaches already exist?
        2. Which of these approaches apply across sectors?
        3. Which organizations use these approaches?
        4. What, if any, are the limitations of using such approaches?
        5. What, if any, modifications could make these approaches more 
    useful?
        6. How do these approaches take into account sector-specific needs?
        7. When using an existing framework, should there be a related 
    sector-specific standards development process or voluntary program?
        8. What can the role of sector-specific agencies and related sector 
    coordinating councils be in developing and promoting the use of these 
    approaches?
        9. What other outreach efforts would be helpful?
    
    Specific Industry Practices
    
        In addition to the approaches above, NIST is interested in 
    identifying core practices that are broadly applicable across sectors 
    and throughout industry.
        NIST is interested in information on the adoption of the following 
    practices as they pertain to critical infrastructure components:
         Separation of business from operational systems;
         Use of encryption and key management;
         Identification and authorization of users accessing 
    systems;
         Asset identification and management;
         Monitoring and incident detection tools and capabilities;
         Incident handling policies and procedures;
         Mission/system resiliency practices;
         Security engineering practices;
         Privacy and civil liberties protection.
        1. Are these practices widely used throughout critical 
    infrastructure and industry?
        2. How do these practices relate to existing international 
    standards and practices?
        3. Which of these practices do commenters see as being the most 
    critical for the secure operation of critical infrastructure?
        4. Are some of these practices not applicable for business or 
    mission needs within particular sectors?
        5. Which of these practices pose the most significant 
    implementation challenge?
        6. How are standards or guidelines utilized by organizations in the 
    implementation of these practices?
        7. Do organizations have a methodology in place for the proper 
    allocation of business resources to invest in, create, and maintain IT 
    standards?
        8. Do organizations have a formal escalation process to address 
    cybersecurity risks that suddenly increase in severity?
    
    [[Page 13028]]
    
        9. What risks to privacy and civil liberties do commenters perceive 
    in the application of these practices?
        10. What are the international implications of this Framework on 
    your global business or in policymaking in other countries?
        11. How should any risks to privacy and civil liberties be managed?
        12. In addition to the practices noted above, are there other core 
    practices that should be considered for inclusion in the Framework?
    
        Dated: February 21, 2013.
    Patrick Gallagher,
    Under Secretary of Commerce for Standards and Technology.
    [FR Doc. 2013-04413 Filed 2-25-13; 8:45 am]
    BILLING CODE 3510-13-P

    FBI Director Robert Muller – The Cyber Threat: Planning for the Way Ahead

     

    Director Mueller at RSA
     Director Mueller speaks to cyber security professionals in San Francisco. Read text of his remarks.

    The Cyber Threat
    Planning for the Way Ahead

     

    Denial of service attacks, network intrusions, state-sponsored hackers bent on compromising our national security: The cyber threat is growing, and in response, said FBI Director Robert S. Mueller, the Bureau must continue to strengthen its partnerships with other government agencies and private industry—and take the fight to the criminals.

     

    “Network intrusions pose urgent threats to our national security and to our economy,” Mueller told a group of cyber security professionals in San Francisco today. “If we are to confront these threats successfully,” he explained, “we must adopt a unified approach” that promotes partnerships and intelligence sharing—in the same way we responded to terrorism after the 9/11 attacks.

     

    Padlocks graphic

    Focus on Hackers and Intrusions

    The FBI over the past year has put in place an initiative to uncover and investigate web-based intrusion attacks and develop a cadre of specially trained computer scientists able to extract hackers’ digital signatures from mountains of malicious code. Learn more

    The FBI learned after 9/11 that “our mission was to use our skills and resources to identify terrorist threats and to find ways of disrupting those threats,” Mueller said. “This has been the mindset at the heart of every terrorism investigation since then, and it must be true of every case in the cyber arena as well.”

     

    Partnerships that ensure the seamless flow of intelligence are critical in the fight against cyber crime, he explained. Within government, the National Cyber Investigative Joint Task Force, which comprises 19 separate agencies, serves as a focal point for cyber threat information. But private industry—a major victim of cyber intrusions—must also be “an essential partner,” Mueller said, pointing to several successful initiatives.

     

    The National Cyber Forensics and Training Alliance, for example, is a model for collaboration between private industry and law enforcement. The Pittsburgh-based organization includes more than 80 industry partners—from financial services, telecommunications, retail, and manufacturing, among other fields—who work with federal and international partners to provide real-time threat intelligence.

     

    Another example is the Enduring Security Framework, a group that includes leaders from the private sector and the federal government who analyze current—and potential—threats related to denial of service attacks, malware, and emerging software and hardware vulnerabilities.

     

    Mueller also noted the Bureau’s cyber outreach efforts to private industry. The Domestic Security Alliance Council, for instance, includes chief security officers from more than 200 companies, representing every critical infrastructure and business sector. InfraGard, an alliance between the FBI and industry, has grown from a single chapter in 1996 to 88 chapters today with nearly 55,000 members nationwide. And just last week, the FBI held the first session of the National Cyber Executive Institute, a three-day seminar to train leading industry executives on cyber threat awareness and information sharing.

     

    “As noteworthy as these outreach programs may be, we must do more,” Mueller said. “We must build on these initiatives to expand the channels of information sharing and collaboration.”

     

    He added, “For two decades, corporate cyber security has focused principally on reducing vulnerabilities. These are worthwhile efforts, but they cannot fully eliminate our vulnerabilities. We must identify and deter the persons behind those computer keyboards. And once we identify them—be they state actors, organized criminal groups, or 18-year-old hackers—we must devise a response that is effective, not just against that specific attack, but for all similar illegal activity.”

     

    “We need to abandon the belief that better defenses alone will be sufficient,” Mueller said. “Instead of just building better defenses, we must build better relationships. If we do these things, and if we bring to these tasks the sense of urgency that this threat demands,” he added, “I am confident that we can and will defeat cyber threats, now and in the years to come.”

    The Proof: Cyber Attacks since Years – Der Beweis: Die jahrelangen Cyberattacken gegen unsere Webseiten

    The Proof: Cyber Attacks since Years – Der Beweis: Die jahrelangen Cyberattacken gegen unsere Webseiten

    Ein kleiner Ausschnitt

    A little excerpt:

    graph

    Bernd-Pulchernst

    Dear Readers,

    since days our websites berndpulch.org and http://www.investment-on.com

    are attacked by vicious criminals which have been identified including their comrades.

    All the proof is given to the relevant authorities.

    In the meantime every attack gives us more evidence against these criminals.

    We released a new website

    http://www.bernd-pulch.org

    is a clone of http://www.berndpulch.org

    and some more will follow.

    History shows that all censorship could not stop the truth.

    In fact people get even more curious about the truth which the censors want

    to hide !

    Sincerely yours

    Bernd Pulch

    Publisher

    Das Betrugsurteil gegen Klaus Maurischat/”GoMoPa” wg Betruges am eigenen Anleger

     

    obs Maurischat Gericht 6.8.2012 Frankfurt 23

    “Klaus Maurischat”; “GoMoPa”,

     

    obs Maurischat Gericht 6.8.2012 Frankfurt 28

     

    “Klaus Maurischat”, “GoMoPa”,

    https://berndpulch.org/das-betrugsurteil-gegen-bennewirtz-und-peter-ehlers-gomopa-partner-maurischat-und-vornkahl-wg-betruges-am-eigen-anleger/

    Am 24. April 2006 war die Verhandlung am Amtsgericht Krefeld in der Betrugssache: Mark Vornkahl / Klaus Maurischat ./. Dehnfeld. Aktenzeichen: 28 Ls 85/05 Klaus MaurischatLange Straße 3827313 Dörverden.

    Wer soll denn diesen Typen noch irgendwie trauen ?

    Und diese Typen berichten über angebliche und tatsächliche Investment Verbrechen ?

    Die Strategie ist es, stattdessen ihre Gegner zu kriminalisieren, wie bereits Meridian Capital bewies und wie es die STASI schon immer tat.

    The Judgement against “President and CEO” Klaus Maurischat or whatever his name is because he committed fraud AGAINST HIS OWN INVESTORS.

    Their strategy is to criminalize their opponents with their network as Meridian Capital showed – a well-known strategy of  East German STASI Agents.

    Who can trust these fraudsters ?

    These guys report about investment crime ?

    What a parody….

    Bernd Pulch

    Magister Artium

    “Mandiant” – Announcing Mandiant Intelligence Center

    Organizations routinely struggle to understand which cyber threats pose the greatest
    risk to them. New threats appear in the news daily and create fire drills for
    security teams who must quickly determine what they can and should do to protect
    themselves. 
    
    Our newest offering, the Mandiant Intelligence Center
    <http://app.connect.mandiant.com/e/er?s=2855&lid=239&elq=99b6edb99b004015923dfbfb964a346f>,
    draws on our own proprietary intelligence to equip security teams like yours with
    the context required to effectively respond to and defend against the most advanced
    threat actors. 
    
    With the Mandiant Intelligence Center your security teams can:
    *Use tools embedded in the Center to query the Mandiant intelligence database and
    receive detailed information on which group is using particular malware, IPs and
    domains
    *Access detailed profiles of advanced threat groups including their latest tactics,
    techniques and procedures
    *Obtain detailed context on high profile threat events with analysis on the
    potential impact to your organization
    *Monitor emerging threat trends
    
    Read more
    <http://www.mandiant.com/assets/Mandiant_Intelligence_Center.pdf?elq=99b6edb99b004015923dfbfb964a346f&elqCampaignId=283>
    about Mandiant for Security Operations or request a call
    <http://app.connect.mandiant.com/e/er?s=2855&lid=235&elq=99b6edb99b004015923dfbfb964a346f>
    to receive a demonstration.
    
    ""            
    
    Mandiant In The Headlines
    
    January 30, 2013
    Hackers in China Attacked The Times for Last 4 Months
    <http://app.connect.mandiant.com/e/er?s=2855&lid=236&elq=99b6edb99b004015923dfbfb964a346f>
    By Nicole Perlroth – The New York Times 
    February 7, 2013
    Mandiant, the Go- To Security Firm for Cyber-Espionage Attacks
    <http://app.connect.mandiant.com/e/er?s=2855&lid=238&elq=99b6edb99b004015923dfbfb964a346f>
    By Brad Stone & Michael Riley – Bloomberg Businessweek 
    February 18, 2013
    Chinese Army Unit Is Seen as Tied to Hacking Against U.S.
    <http://app.connect.mandiant.com/e/er?s=2855&lid=237&elq=99b6edb99b004015923dfbfb964a346f>
    By David E. Sanger, David Barboza & Nicole Perlroth – The New York Times 
    
    Learn More About Mandiant®
    
    Mandiant Website
    <http://www.mandiant.com/?elq=99b6edb99b004015923dfbfb964a346f&elqCampaignId=283>
    www.mandiant.com
    M-Unition™
    <http://app.connect.mandiant.com/e/er?s=2855&lid=9&elq=99b6edb99b004015923dfbfb964a346f>
    Mandiant's official blog
    Mandiant on Twitter
    <http://app.connect.mandiant.com/e/er?s=2855&lid=10&elq=99b6edb99b004015923dfbfb964a346f>
    twitter.com/mandiant
    Be Part of Something More
    <http://www.mandiant.com/company/careers/?elq=99b6edb99b004015923dfbfb964a346f&elqCampaignId=283>
    Join the Mandiant Team

    “Mandiant” – Announcing Mandiant for Security Operations

    Citation: "Organizations spend millions of dollars investing in top-notch security teams and in
    building secure networks to keep would-be attackers out of their IT environments.
    Despite these investments, determined attackers routinely compromise well-secured
    organizations and steal their intellectual property and financial assets.
    
    Our newest product, Mandiant for Security Operations
    <http://app.connect.mandiant.com/e/er?s=2855&lid=234&elq=41deab51a75b472c90707e854f48b9e7>,
    equips security teams to confidently detect, analyze and resolve incidents in a
    fraction of the time it takes using conventional approaches. This appliance-based
    solution connects the dots between what’s happening on their network and what’s
    happening on their endpoints. 
    
    With Mandiant for Security Operations security teams can:
    *Search for advanced attackers and the APT
    *Integrate endpoint security with your network security
    *Accelerate triage of suspected incidents
    *Find out what happened, without forensics
    *Contain endpoints
    
    Read more
    <http://www.mandiant.com/assets/Mandiant_for_Security_Operations.pdf?elq=41deab51a75b472c90707e854f48b9e7&elqCampaignId=282>
    about Mandiant for Security Operations or request a call
    <http://app.connect.mandiant.com/e/er?s=2855&lid=235&elq=41deab51a75b472c90707e854f48b9e7>
    to receive a demonstration.
    
    ""            
    
    Mandiant In The Headlines
    
    January 30, 2013
    Hackers in China Attacked The Times for Last 4 Months
    <http://app.connect.mandiant.com/e/er?s=2855&lid=236&elq=41deab51a75b472c90707e854f48b9e7>
    By Nicole Perlroth – The New York Times 
    February 7, 2013
    Mandiant, the Go- To Security Firm for Cyber-Espionage Attacks
    <http://app.connect.mandiant.com/e/er?s=2855&lid=238&elq=41deab51a75b472c90707e854f48b9e7>
    By Brad Stone & Michael Riley – Bloomberg Businessweek 
    February 18, 2013
    Chinese Army Unit Is Seen as Tied to Hacking Against U.S.
    <http://app.connect.mandiant.com/e/er?s=2855&lid=237&elq=41deab51a75b472c90707e854f48b9e7>
    By David E. Sanger, David Barboza & Nicole Perlroth – The New York Times 
    
    Learn More About Mandiant®
    
    Mandiant Website
    <http://www.mandiant.com/?elq=41deab51a75b472c90707e854f48b9e7&elqCampaignId=282>
    www.mandiant.com
    M-Unition™
    <http://app.connect.mandiant.com/e/er?s=2855&lid=9&elq=41deab51a75b472c90707e854f48b9e7>
    Mandiant's official blog
    Mandiant on Twitter
    <http://app.connect.mandiant.com/e/er?s=2855&lid=10&elq=41deab51a75b472c90707e854f48b9e7>
    twitter.com/mandiant
    Be Part of Something More
    <http://www.mandiant.com/company/careers/?elq=41deab51a75b472c90707e854f48b9e7&elqCampaignId=282>
    Join the Mandiant Team
    
    To unsubscribe or manage your subscriptions, please click here
    <http://app.connect.mandiant.com/e/sl.aspx?s=2855&elq=41deab51a75b472c90707e854f48b9e7>.
    
    Mandiant® | 2318 Mill Road. Suite 500 | Alexandria, VA 22314
    1.800.647.7020
    Privacy Policy
    <http://www.mandiant.com/privacy?elq=41deab51a75b472c90707e854f48b9e7&elqCampaignId=282>"

    Proven – China ‘aiding hacker attacks on west’

    The building in Shanghai that hosts the Chinese military's Unit 61398

    The building in Shanghai that hosts the Chinese military’s Unit 61398, which has been accused of involvement in hacking attacks. Photograph: Peter Parks/AFP/Getty Images

    The Chinese army has launched hundreds of cyber-attacks against western companies and defence groups from a nondescript office building in Shanghai, according to a report that warns hackers have stolen vast amounts of data from their targets.

    Mandiant, a security company that has been investigating attacks against western organisations for over six years, said in a report (PDF)the attacks came from a 12-storey building belonging to the People’s Liberation Army (PLA) general staff’s department, also known as Unit 61398.

    Mandiant said it believed a hacking network named the Comment Crew or the Shanghai Group was based inside the compound, in a rundown residential neighbourhood. Although the report fails directly to place the hackers inside the building, it argues there is no other logical reason why so many attacks have emanated from such a small area.

    “It is time to acknowledge the threat is originating in China, and we wanted to do our part to arm and prepare security professionals to combat that threat effectively,” said the report.

    The discovery will further raise the temperature in the intergovernmental cyberwars, which have heated up in recent years as the US, IsraelIran, China and UK have all used computer subterfuge to undermine rival state or terrorist organisations. One security expert warned that companies in high-profile fields should assume they will be targeted and hacked, and build systems that will fence sensitive data off from each other.

    Rik Ferguson, global vice-president of security research at the data security company Trend Micro, said: “We need to concentrate less on building castles and assuming they will be impervious, and more on building better dungeons so that when people get in they can’t get anything else.” .

    Mandiant says Unit 61398 could house “hundreds or thousands” of people and has military-grade, high-speed fibre-optic connections from China Mobile, the world’s largest telecoms carrier. “The nature of Unit 61398’s work is considered by China to be a state secret; however, we believe it engages in harmful computer network operations,” Mandiant said in the report.

    It said Unit 61398 had been operating since 2006, and was one of the most prolific hacking groups “in terms of quantity of information stolen”. This it estimated at hundreds of terabytes, enough for thousands of 3D designs and blueprints.

    “APT1”, as Mandiant calls it, is only one of 20 groups Mandiant says has carried out scores of hacking attacks against businesses and organisations in the west, including companies that work in strategic industries such as US power and water infrastructure.

    A typical attack would leave software that hid its presence from the user or administrator and silently siphon data to a remote server elsewhere on the internet at the instruction of a separate “command and control” (C&C) computer. By analysing the hidden software, the pattern of connections and links from the C&C server, the team at Mandiant said they were confident of the source of the threat.

    A Chinese foreign ministry spokesman denied the government was behind the attacks, saying: “Hacking attacks are transnational and anonymous. Determining their origins is extremely difficult. We don’t know how the evidence in this so-called report can be tenable. Arbitrary criticism based on rudimentary data is irresponsible, unprofessional and not helpful in resolving the issue.”

    But Ferguson told the Guardian: “This is a pretty compelling report, with evidence collected over a prolonged period of time. It points very strongly to marked Chinese involvement.”

    Mandiant, based in Alexandria, Virginia, in the US, investigated the New York Times break-in, for which it suggested Chinese sources could be to blame.

    President Barack Obama is already beefing up US security, introducing an executive order in his State of the Union speech this month that would let the government work with the private sector to fend off hacking. But it will take until February 2014 to have a final version ready for implementation.

    The revelation comes days after the New York TimesWall Street Journaland Washington Post, as well as the social networks Facebook and Twitter, said they had been subjected to “highly sophisticated” hacks that in some cases focused on correspondents writing about China and its government.

    Separate investigations by the computer company Dell, working with the news company Bloombergtracked down another alleged hacker, Zhang Changhe, who has written a number of papers on PC hacking. Zhang works at the PLA’s “information engineering university” in Zhengzhou, Henan province, north-central China.

    The allegations will raise the temperature in the continuing cyberwar between the west and China, which has been steadily rising since the Pentagon and MI6 uncovered Titan Rain, a scheme that tried to siphon data from the Pentagon and the House of Commons in 2006, and which one security expert said at the time dated back at least to 2004.

    Ferguson suggested that western governments were also carrying out attacks against Chinese targets – “but that’s not a culture which would open up about being hit. I would be surprised and disappointed if most western nations don’t have a cybersecurity force.”

    The Stuxnet virus, which hit Iran’s uranium reprocessing plant in 2010, is believed to have been written jointly by the US and Israel, while Iranian sources are believed to have hacked companies that issue email security certificates so that they can crack secure connections used by Iranian dissidents on Google’s Gmail system. China is also reckoned to have been behind the hacking of Google’s email servers in that country in late 2009, in an operation that files from WikiLeaks suggested was inspired by the Beijing government.

    A timeline of government-sponsored hacking attacks

     

    2004 suspected: Chinese group in Shanghai begins probing US companies and military targets.

     

    2005: Titan Rain” pulls data from the Pentagon’s systems, and a specialist says of a December 2005 attack on the House of Commons computer system that “The degree of sophistication was extremely high. They were very clever programmers.”

     

    2007: Estonia’s government and other internet services are knocked offline by a coordinated attack from more than a million computers around the world – reckoned to have been run from a group acting at the urging of the Russian government. Nobody is ever arrested over the attack.

     

    2008: Russia’s government is suspected of carrying out a cyberattack to knock out government and other websites inside Georgia, with which it is fighting a border skirmish over the territory of Ossetia.

     

    December 2009: Google’s email systems in China are hacked by a group which tries to identify and take over the accounts of Chinese dissidents. Google withdraws its search engine from the Chinese mainland in protest at the actions. Wikileaks cables suggest that the Chinese government was aware of the hacking.

     

    2010: The Flame virus begins silently infecting computers in Iran. Itincorporates cutting-edge cryptography breakthroughs which would require world-class experts to write. That is then used to infect Windows PCs via the Windows Update mechanism which normally creates a cryptographically secure link to Microsoft. Instead, Flame puts software that watches every keystroke and frame on the PC. Analysts say that only a “wealthy” nation state could have written the virus, which breaks new ground in encryption.

     

    The Stuxnet worm is discovered to have been affecting systems inside Iran’s uranium reprocessing establishment, passing from Windows PCs to the industrial systems which control centrifuges that separate out heavier uranium. The worm makes the centrifuges spin out of control, while suggesting on their control panel that they are operating normally – and so break them. Iran denies that the attack has affected its project. The US and Israel are later fingered as being behind the code.

     

    September 2011: a new virus that silently captures data from transactions in Middle Eastern online banking is unleashed. The principal targets use Lebanese banks. It is not identified until August 2012, when Russian security company Kaspersky discovers the name “Gauss” embedded inside it. The company says the malware it is “nation state-sponsored” – probably by a western state seeking to trace transactions by specific targets.

     

    2012: About 30,000 Windows PCs at Saudi Aramco, the world’s most valuable company, are rendered unusable after a virus called “Shamoon” wipes and corrupts data and the part of the hard drive needed to “bootstrap” the machine when it is turned on. In the US, Secretary of Defense Leon Panetta described Shamoon as “one of the most destructive viruses ever” and suggested it could be used to launch an attack as destructive as the 9/11 attacks of 2001.