Corrupt To The Bone – Kirill Shamalov – Putin’s Son In Law

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Putin's billionaire son-in-law replaces Russian leader's daughter for  glamorous new socialite wife | Daily Mail Online

Thousands of emails sent and received by Kirill Shamalov — Vladimir Putin’s former son-in-law — showcase the fantastic wealth and personal power that come with access to Russia’s first family.

Key Findings

  • Shamalov and Putin’s daughter spent millions setting up luxurious households in Russia and France even as Putin banned Russian elites from owning foreign assets.
  • Soon after marrying Putin’s daughter, Shamalov spent an astonishing $100 to acquire a share in Russia’s largest petrochemical company that was worth $380 million.
  • Shamalov later acquired an additional, much larger stake in the company in a well-known deal that made him a billionaire. His emails reveal that this acquisition was just one of the lucrative opportunities with which he was presented — and contain a hint about how it may have been structured.
  • Shamalov’s proximity to political power made him a highly desired partner. In one case, he was offered a free share in a large company in exchange for his ability to wield “administrative resources,” exemplifying the corrupt nexus of power and business that characterizes modern Russia.
Continue reading “Corrupt To The Bone – Kirill Shamalov – Putin’s Son In Law”

Marching For Navalny Defying Demonstrators Across Russia Live

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

 

EU Parliament wants Sanctions Against Putin’s Inner Circle And Russian Oligarchs

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Nawalny veröffentlicht Video zu angeblichem Luxus-Palast von Putin |  STERN.de

The European Parliament has adopted a resolution calling on EU member states to “significantly strengthen” sanctions against Russia and stop work on completing the Nord Stream 2 pipeline in response to the arrest of opposition figure Alexey Navalny. 

Continue reading “EU Parliament wants Sanctions Against Putin’s Inner Circle And Russian Oligarchs”

Nawalny Veröffentlicht Investigatives Video Über Putin | Machtkampf In Russland

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Putin´s berühmtester Kritiker Nawalny veröffentlichte vor einigen Stunden ein investigatives Antikorruptionsvideo gegen den russischen Präsidenten. Innerhalb weniger Stunden wurde das Video bereits 18 Millionen mal angeklickt. Studio Berlin veröffentlicht das fast 2 Stunden lange Video ungekürzt.

Continue reading “Nawalny Veröffentlicht Investigatives Video Über Putin | Machtkampf In Russland”

Borat At Putin’s Palace From The Investigation Of Alexei Navalny

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Freedom for Alexei Navalny. Wikipedia: Putin’s Palace(Residence at Cape Idokopas). On 19 January 2021, two days after Navalny was detained by Russian authorities upon his return to Russia, a video investigation by him and the Anti-Corruption Foundation FBK was published accusing President Vladimir Putin of using fraudulently obtained funds to build the estate for himself in what he called “the world’s biggest bribe”. In the investigation.

Navalny said that the estate is 39 times the size of Monaco and cost over 100 billion rubles $1.35 billion to construct. It also showed aerial footage of the estate via a drone and a detailed floorplan of the palace that Navalny said was given by a contractor, which he compared to photographs from inside the palace that were leaked onto the Internet in 2011. He also detailed an elaborate corruption scheme allegedly involving Putin’s inner circle that allowed Putin to hide billions of dollars to build the estate. World community Alexey Navalny needs your help. The Residence at Cape Idokopas Russian: Резиденция на мысе Идокопас, also known as Putin’s Palace is a large Italianate palace complex located on the Black Sea coast near the village of Praskoveevka in Gelendzhik, Krasnodar Krai, Russia. The palace was claimed to have been built for President Vladimir Putin.

Become a Patron!
True Information is the most valuable resource and we ask you to give back.





“Where Injustice Becomes Right, Resistance Becomes A Duty!”

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Alexej Nawalny: Wie der Anti-Putin wirklich tickt und was ihn antreibt

“Where injustice becomes right, resistance becomes a duty!”

This motto does not only apply to the Hitler era, but also to Russia under Putin.

Alexey Navalny lives this resistance, setting an example for all of us – as do Julian Assange and Edward Snowden.

This becomes all the more important as the mainstream media of all countries are often corrupt and use the above-mentioned lone fighters as an alibi.

Allow me to remind you that even in Germany former Chancellors and active Prime Ministers still actively support Putin and his system of injustice.

A murderous system of injustice to which former Stasi employees and their IMs will still be subject to in 2021.

The federal German legislature, judiciary and executive are also disintegrated by these figures.

As is well known, the fish stinks from the head.

Sincerely you

Bernd Pulch

“Wo Unrecht Zu Recht Wird, Wird Widerstand Zur Pflicht !”

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Gemeinsam gegen Putin: Chodorkowski unterstützt Nawalny - n-tv.de

“Wo Unrecht zu Recht wird, wird Widerstand zur Pflicht !”

Dieses Motto gilt nicht nur für die Hitler-Zeit, sondern ebenso für das Russland unter Putin.

Alexey Nawalny lebt diesen Widerstand, beispiel gebend für uns alle – ebenso wie Julian Assange und Edward Snowden.

Dies wird um so wichtiger als die Mainstream-Medien aller Länder oft korrupt sind und die oben genannten Einzelkämpfer als Alibi nutzen.

Es sei mir erlaubt daran zu erinnern, dass auch in Deutschland noch ehemalige Bundeskanzler und aktive Ministerpräsidentinnen Putin und sein Unrechtssystem aktiv unterstützen.

Ein mörderisches Unrechtssystem, dem weiter ehemalige Stasi-Mitarbeiter und deren IM auch in 2021 noch untertan sind.

Auch die bundesdeutsche Legislative, Judikative und Exekutive ist von diesen Gestalten zersetzt.

Der Fisch stinkt bekanntlich vom Kopf her.

Herzlichst Ihr

Bernd Pulch

i

JOINT INTELLIGENCE – Domestic Terrorism Threat Likely Amid Political Transitions

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

The Capitol! Storm it, Take What You Want; Real Justice! - LA Progressive

This Joint Intelligence Bulletin (JIB) is intended to highlight the threat of violence from domestic violent extremists (DVEs) in the wake of the 6 January violent breach by some DVEs of the US Capitol Building in Washington, DC, following lawful protest activity related to the results of the General Election. Anti-government or anti-authority violent extremists (AGAAVE), specifically militia violent extremists (MVEs); racially or ethnically motivated violent extremists (RMVEs); and DVEs citing partisan political grievances will very likely pose the greatest domestic terrorism threats in 2021. In 2021 , threats and plotting of illegal activity, including destruction of property and violence targeting officials at all levels of the government, law enforcement, journalists, and infrastructure, as well as sporadic violence surrounding lawful protests, rallies, demonstrations, and other gatherings by DVEs will very likely increase due to renewed measures to mitigate the spread of COVID-19, socio-political conditions, and perceived government overreach. The FBI, DHS, and NCTC advise federal, state, local, tribal, and territorial government counterterrorism and law enforcement officials, and private sector security partners to remain vigilant in light of the persistent threat posed by DVEs and their unpredictable target selection in order to effectively detect. prevent. preempt. or respond to incidents and terrorist attacks in the United States.

Continue reading “JOINT INTELLIGENCE – Domestic Terrorism Threat Likely Amid Political Transitions”

Everything Dr. Mabuse Or What? RA Resch Is Partner Of The Ibiza Video Maker Dr. Ramin Mirfakhrai – Arrest in Berlin

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Coup Teil 86: Wie man Parteien unterwandert | Ceiberweiber

But hello – two men of honor in Berlin

Senior partner Dr. Jochen Resch left & right Dr. Ramin Mirfakhrai, junior partner

Source: Dr. Resch
What the gentlemen are currently discussing should be of interest to many …

The Ibiza video was shot in the style of STASI.

Continue reading “Everything Dr. Mabuse Or What? RA Resch Is Partner Of The Ibiza Video Maker Dr. Ramin Mirfakhrai – Arrest in Berlin”

Alles Dr. Mabuse Oder Was ? RA Resch Ist Partner Des Ibiza Video – Machers Dr. Ramin Mirfakhrai – Festnahme In Berlin

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Coup Teil 86: Wie man Parteien unterwandert | Ceiberweiber

Aber hallo – zwei Ehrenmänner in Berlin

Senior-Partner Dr. Jochen Resch links & rechts Dr. Ramin Mirfakhrai, Junior-Partner 

  • Quelle: Facebook Account von Dr. Resch

Was die Herrschaften gerade zu besprechen haben, dürfte viele interessieren…

Das Ibiza Video wurde ganz im Stil der STASI gedreht.

Continue reading “Alles Dr. Mabuse Oder Was ? RA Resch Ist Partner Des Ibiza Video – Machers Dr. Ramin Mirfakhrai – Festnahme In Berlin”

VOLLLTREFFER – KGB-STASI-**RSCHE GEHEN AUF GRUNDEIS – DER BEWEIS

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Liebe Neo-Stasi,

die letzte Post hat die Genossen von der Gomopa-Stasi unter dem mutmasslichen Capo Jochen Resch und seinem Luca Brasi aus dem Haeuschen gebracht. Denn sie zielt ins Herz der Neo-Stasi.

Der getroffene KGB-Stasi-Genosse bellt und manipuliert die Suchmaschine Google…

Eine alte Falschmeldung aus 2011 bzgl. eines angeblichen Haftbefehls von Frau Beate Porten, Frau von IZ-Gesellschafter Thomas Porten (der meine Anteile an der IZ kaufte) wird wieder im Netz hochgespielt.

Herrschaften: Mich werdet Ihr nicht wie Heinz Gerlach ausschalten !

A bientot

Magister Bernd Pulch

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Gomopa-Stasi-Opfer: “Darum Ist Jochen Resch Der Erfundene “GoMoPa”-Goldman & Manfred Resch Der Erfundene “Morgenstern”

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Hallo Herr Pulch,

KGB-Spion Jochen Resch war 1989 monatelang in Moskau, einerseits aus Angst andererseits, um seine neue Rolle vorzubereiten. Dann hat er mit Stasi-Oberst Ehrenfried Stelzer die deutsch-russische Gesellschaft gegründet und parallel dazu Gomopa den Financial Intelligence Service, Intelligence steht für Geheimdienst wie Insider genauestens bestätigen können. Anschließend wurde Stelzer Reschs Strohmann bei der DIA und Maurischat Reschs Strohmann bei Gomopa.

Der Luca-Brasi-Brutalo der Gomopa hat keinerlei Bildung, ist wie “eine Flasche leer”, kann kein Englisch und keine Orthographie und ist leicht lenkbar für seinen Führungsoffizier Resch.

Continue reading “Gomopa-Stasi-Opfer: “Darum Ist Jochen Resch Der Erfundene “GoMoPa”-Goldman & Manfred Resch Der Erfundene “Morgenstern””

Dutch Govt Removes Two Russians Utilizing Political Cover

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

The Dutch minister of the Interior, Kajsa Ollongren, sent a letter (in Dutch) to the House of Representatives to educate the parliament about the disturbance regarding a Russian reconnaissance activity.

Two Russians utilizing a conciliatory cover to submit undercover work for the Russian common unfamiliar knowledge organization SVR have been ousted from the Netherlands. Both were certify as representative at the Russian government office in The Hague. The clergyman says the SVR insight official assembled a “generous” organization of sources (i.e., he was a case official) working in the Dutch innovative area. He sought after data about AI, semiconductors and nano innovation; information that has both common and military applications. At times the sources got paid for their participation.

Continue reading “Dutch Govt Removes Two Russians Utilizing Political Cover”

COVID 19 – Operation Warp Speed Therapeutics: Monoclonal Antibody Playbook Version 2.0

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Page Count: 37 pages
Date: November 22, 2020
Restriction: None
Originating Organization: Department of Defense, Department of Health and Human Services
File Type: pdf
File Size: 988,362 bytes
File Hash (SHA-256): 84C91E504D1097677DE9078D83160245ADF8D244F9E1788B3915756BDEA0E7F6

Continue reading “COVID 19 – Operation Warp Speed Therapeutics: Monoclonal Antibody Playbook Version 2.0”

MEMORANDUM FROM GENERAL VASILII CHUIKOV, PAVEL YUDIN, AND IVAN IL’ICHEV TO GEORGII MALENKOV CRITICALLY ASSESSING THE SITUATION IN THE GDR

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Quellbild anzeigen

SECRET
Copy No.

Soviet Control Commission in Germany

18 May 1953
pg. 00195

In the Presidium of the Central Committee of the Communist Party of the Soviet Union

to Comrade G.M. Malenkov

Continue reading “MEMORANDUM FROM GENERAL VASILII CHUIKOV, PAVEL YUDIN, AND IVAN IL’ICHEV TO GEORGII MALENKOV CRITICALLY ASSESSING THE SITUATION IN THE GDR”

NOTES BY WILHELM PIECK ON THE DISCUSSION WITH STALIN

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Final Discussion on 7 April 1952–11:20 p.m. in Moscow

St[alin]: up to now all proposals rejected
Situation:
no compromises
Creation of a European Army–not against the SU [Soviet Union] but rather about power in Europe

Atlantic Treaty–independent state in the West
Demarcation line dangerous borders
1st Line Germans (Stasi), behind [it] Soviet soldiers
We must consider terrorist acts.

Continue reading “NOTES BY WILHELM PIECK ON THE DISCUSSION WITH STALIN”

Der Unheimliche Einfluss Von Ex-Stasi-Leuten

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Das Ministerium für Staatssicherheit, kurz: Stasi, war in der DDR die zentrale Institution zur Überwachung der Bevölkerung. Die Mitarbeiter der Stasi wurden gefürchtet – vor allem deshalb, weil sie meistens im Geheimen operierten. Heute ist das alles Geschichte. Wirklich? Wir zeigen, welchen Einfluss ehemalige Stasi-Leute teilweise immer noch haben … Die Gedenkstätte Berlin Hohenschönhausen – https://www.stiftung-hsh.de Das Stasimuseum in Berlin – https://www.stasimuseum.de Vereine, in denen frühere Stasimitarbeiter tätig sind: https://www.okv-ev.de https://www.isor-sozialverein.de/cms/… https://www.mfs-insider.de

“Zersetzung” In Der DDR – Die Zerstörerischen Methoden Der Stasi

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Systematisch hat die Staatssicherheit Menschen in der DDR ausspioniert und versucht, ihr Leben zu zerstören. In Lichtenberg wird die Ausstellung “Zersetzung – Repressionsmethode des Staatssicherheitsdienstes” dazu gezeigt. Nach diesem Modell arbeiten die Alt- und Neo-Stasi-Genossen der “GoMoPa” noch heute.

CC BCP POLITBURO RESOLUTION “B” PROTOCOL FOR COOPERATION BETWEEN THE MINISTRY OF INTERNAL AFFAIRS AND STASI

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Quellbild anzeigen

DOCUMENT SUMMARY
The CC BCP Politburo approves the protocol for cooperation between the Ministry of Internal Affairs and the East German Ministry for State Security (Stasi), agreed upon at a September meeting in Berlin.

Continue reading “CC BCP POLITBURO RESOLUTION “B” PROTOCOL FOR COOPERATION BETWEEN THE MINISTRY OF INTERNAL AFFAIRS AND STASI”

CABLE FROM THE CZECHOSLOVAK MISSION IN BERLIN TO FOREIGN MINISTER VACLAV DAVID, 4:30 P.M.

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Quellbild anzeigen

Receiving number: 6569/53 Sent by: Berlin
Re: information Received: [6/17/53] at 4:30 PM
Attention: I. Referred: [6/17/53] at 5:30 PM Zi
Assigned: GO/I

Flash!

Comrade Minister of Foreign Affairs David

Continue reading “CABLE FROM THE CZECHOSLOVAK MISSION IN BERLIN TO FOREIGN MINISTER VACLAV DAVID, 4:30 P.M.”

Exposed – MILITARY EXERCISE SHCHIT-88 OPERATIONAL SUMMARY NO. 1 FOR THE PERIOD 0800 25 MAY TO 0800 2 JUNE 1988

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Quellbild anzeigen

DOCUMENT SUMMARY
This document describes Warsaw Pact military exercises conducted between 25 May and 2 June 1988. Summarized in detail, the comprehensive exercise brought all facets of the combined forces to “wartime strength” in response to a theoretical threat posed by NATO.

Continue reading “Exposed – MILITARY EXERCISE SHCHIT-88 OPERATIONAL SUMMARY NO. 1 FOR THE PERIOD 0800 25 MAY TO 0800 2 JUNE 1988”

Unvealed – MILITARY EXERCISE SHCHIT-88 OPERATIONAL SUMMARY NO. 2 FOR THE PERIOD 0800 2 JUNE TO 1900 6 JUNE 1988

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Quellbild anzeigen

Secret

Copy Nº 4

Exercise Shchit [Shield]-88

[Original Polish receipt and

declassification stamps]

Continue reading “Unvealed – MILITARY EXERCISE SHCHIT-88 OPERATIONAL SUMMARY NO. 2 FOR THE PERIOD 0800 2 JUNE TO 1900 6 JUNE 1988”

Exposed – MILITARY EXERCISE SHCHIT-88 INFORMATION SUMMARY NO. 1 AS OF 0800 2 JUNE 1988

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Quellbild anzeigen

[letterhead] General Staff of the Polish Armed Forces

SECRET

Copy Nº 4

Exercise

[Original Polish receipt and

declassification stamps]

Continue reading “Exposed – MILITARY EXERCISE SHCHIT-88 INFORMATION SUMMARY NO. 1 AS OF 0800 2 JUNE 1988”

INFORMATION ON THE ORDER OF IMPLEMENTING MILITARY TECHNICAL COOPERATION OF THE USSR WITH FOREIGN COUNTRIES

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Quellbild anzeigen

On the order of implementing military technical cooperation of the USSR with foreign countries

1.Decisions on questions of military technical cooperation of the Soviet Union and foreign countries are made by the USSR Council of Ministers after approval by the CPSU Central Committee.

Continue reading “INFORMATION ON THE ORDER OF IMPLEMENTING MILITARY TECHNICAL COOPERATION OF THE USSR WITH FOREIGN COUNTRIES”

LETTER FROM STALIN TO CDE. G. APRESOV, CONSUL GENERAL IN URUMQI

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

 

7 Atrocities Soviet Dictator Joseph Stalin Committed | HowStuffWorksCde. APRESOV!

Sheng Shicai’s letter made a depressing impression on our comrades. Only a provocateur or an hopeless “leftist” having no idea about Marxism could have written it. What could have happened that Sheng, having such an adviser as you, could have written us (me, Molotov, and Voroshilov) such a letter?

We are sending Sheng a suitable letter, but Cde. Svanidze will pass you a copy of our reply.

You should explain to Sheng the meaning of our reply and take steps so that the instructions given in our reply are followed.

I warn that if our instructions are not taken into consideration we will be forced to deny aid to Sheng.

The charter of the Union is not bad, but paragraph five about “equal rights” for women is not suitable for Xinjiang conditions and should be discarded.

Greetings!

I. STALIN.

27 July 1934

[a handwritten version of the above follows]

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

LETTER OF GOVERNOR SHICAI SHENG TO CDES. STALIN, MOLOTOV, AND VOROSHILOV

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Sheng Shicai - Wikiwand

CREATOR
SHENG, SHICAI, 1897-1970

SUBJECTS DISCUSSED
Molotov, Vyacheslav M.
Stalin, Joseph, 1879-1953
China–Politics and government–1912-1949
Communism–History–China
Xinjiang Uygur Zizhiqu (China)–History
Sheng, Shicai, 1897-1970
Voroshilov, Kliment Efremovich, 1881-1969
China (Republic)–Foreign relations–Soviet Union
More …
LOCATIONS DISCUSSED
Soviet Union
Xinjiang Uygur Autonomous Region

Archive.

I. Stalin

Top Secret

Translation from Chinese

Continue reading “LETTER OF GOVERNOR SHICAI SHENG TO CDES. STALIN, MOLOTOV, AND VOROSHILOV”

2020 Global Terrorism Index: Deaths From Psychological Oppression Arrive At Five-Year Low, However New Dangers Arise

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Global Terrorism Index (GTI) – Arise News

All around the world, passings from psychological warfare succumbed to the fifth successive year in 2019, to 13,826 — a 15 percent decline from the earlier year. In North America, Western Europe and Oceania, extreme right assaults have expanded by 250 percent since 2014 – they are higher now than whenever over the most recent fifty years. 63 nations recorded in any event one demise from psychological oppression, the most reduced number since 2013. The worldwide financial effect of psychological oppression was $16.4 billion of every 2019, an abatement of 25 percent from the earlier year. IS’s focal point of gravity moves to sub-Saharan Africa with absolute passings by IS in the district expanding by 67 percent. IS and their members were likewise liable for assaults in 27 nations in 2019.

Continue reading “2020 Global Terrorism Index: Deaths From Psychological Oppression Arrive At Five-Year Low, However New Dangers Arise”

WORKING NOTES FROM THE SESSION OF THE CPSU CC PRESIDIUM ON 4 NOVEMBER 1956 – HUNGARIAN REVOLUTION

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Nikita Khrushchev at the 20th Congress of the CPSU (1956) - CVCE Website

Working Notes from the Session of the CPSU CC Presidium on 4 November 1956
(Re: Protocol No. 51)

Those Taking Part: Bulganin, Voroshilov,Kaganovich, Malenkov, Molotov, Pervukhin, Saburov, Suslov, Khrushchev, Zhukov, Shepilov, Furtseva, Pospelov.

On the Operations and Situation in Hungary(1)
Cde. Kaganovich’s ciphered cable from
Cde. Malinin at Cde. Khrushchev (4 XI).(2)

1) Bring back Cdes. Mikoyan and Brezhnev.
2) Provide assistance to Hungary.(3)
3) More actively take part in the assistance to Egypt.(4)

Continue reading “WORKING NOTES FROM THE SESSION OF THE CPSU CC PRESIDIUM ON 4 NOVEMBER 1956 – HUNGARIAN REVOLUTION”

WORKING NOTES FROM THE SESSION OF THE CPSU CC PRESIDIUM ON 30 OCTOBER 1956 – CHINESE COMRADES

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

 

(Re: Point 1 of Protocol No. 49)(2)
Those Taking Part: Bulganin, Voroshilov, Molotov, Kaganovich, Saburov, Brezhnev, Zhukov, Shepilov, Shvernik, Furtseva, Pospelov

On the Situation in Hungary
Information from Cdes. Mikoyan and Serov is read aloud.(3)

Cde. Zhukov provides information about the concentration of mil.-transport aircraft in the Vienna region.(4) Nagy is playing a double game (in Malinin’s opinion). Cde. Konev is to be sent to Budapest.(5)

On Discussions with the Chinese comrades. (6)
(Khrushchev)

We should adopt a declaration today on the withdrawal of troops from the countries of people’s democracy (and consider these matters at a session of the Warsaw Pact), taking account of the views of the countries in which our troops are based. The entire CPC CC Politburo supports this position. One document for the Hungarians, and another for the participants of the Warsaw Pact. On Rokossowski—I said to Gomulka that this matter is for you (the Poles) to decide.(7)

Cde. Bulganin—The Chinese cdes. have an incorrect impression of our relations with the countries of people’s democracy. On our appeal to the Hungarians—we should prepare it. A declaration should be prepared.

Cde. Molotov—Today an appeal must be written to the Hungarian people so that they promptly enter into negotiations about the withdrawal of troops. There is the Warsaw Pact. This must be considered with other countries. On the view of the Chinese comrades—they suggest that relations with the countries of the socialist camp be built on the principles of Pancha Shila.(8) Relations along interstate lines are on one basis and interparty relations on another.

Continue reading “WORKING NOTES FROM THE SESSION OF THE CPSU CC PRESIDIUM ON 30 OCTOBER 1956 – CHINESE COMRADES”

ABOUT THE LAST OPERATION/ OPERATIONAL MISSION OF COMRADE [REDACTED]

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Schah Mohammed Reza Pahlevi | corona

About the last operation/ operational mission of comrade [redacted]

Between 1979 and 1981 comrade [redacted] was stationed as a resident in Teheran.

In 1981 the Soviet- Iranian relations heated up (Mass persecutions, arrests and executions of operatives of the Tudeh- Party; temporary occupation of the UdSSR- Embassy by the revolutionary- guards, mysterious disappearance (probably treason) of the soviet counselor [redacted]).

Continue reading “ABOUT THE LAST OPERATION/ OPERATIONAL MISSION OF COMRADE [REDACTED]”

GDR-IRAN EXCHANGE OF OPINIONS

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

1979 hatte der Iran einen blutigen Machtwechsel erlebt. Die Islamische  Revolution zwang Schah Mohammad Reza Pahlavi

1. GDR-Iran Exchange of Opinions

On February 12, 1981, a government delegation of the Islamic Republic of Iran was staying in the GDR under the leadership of the Minister of Education, Dr. Mohammed Javad Bahonar. He indicated to Comrade Oskar Fischer that his goal was find out the GDR’s position toward Iran’s Islamic revolution, the Iraqi invasion of Iran, and the preparedness of the GDR for further cooperation between the two countries.

Continue reading “GDR-IRAN EXCHANGE OF OPINIONS”

INFORMATION [ABOUT] ACTIVITIES OF COUNTERREVOLUTIONARY IRANIAN FORCES IN CONNECTION WITH THE AMERICAN AND WEST GERMAN SECRET SERVICE

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Mohammad Reza Pahlavi - DER SPIEGEL

Main Department XX
Strictly Secret

Berlin, 7.7.1981
8 copies

Information

[about]

Activities of counterrevolutionary Iranian forces in connection with the American and West German secret service

Continue reading “INFORMATION [ABOUT] ACTIVITIES OF COUNTERREVOLUTIONARY IRANIAN FORCES IN CONNECTION WITH THE AMERICAN AND WEST GERMAN SECRET SERVICE”

ON THE REPORT FROM INFORMAL COLLABORATOR (IC) “REZA” FROM 26.7.78

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

DOCUMENT SUMMARY
Report from informal collaborator on personal conflicts among Tudeh Party leaders in Leipzig.

CREATOR
GERMANY (EAST). MINISTRY FOR STATE SECURITY (STASI)

SUBJECTS DISCUSSED
People’s Party of Iran (Tudeh)
LOCATIONS DISCUSSED
East Germany
Iran

Continue reading “ON THE REPORT FROM INFORMAL COLLABORATOR (IC) “REZA” FROM 26.7.78″

STASI REPORT ON WEST GERMAN GOVERNMENT’S ATTITUDE TO RADIO FREE EUROPE AND RADIO LIBERTY

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

CITATION SHARE DOWNLOAD

Ministry of state security
Berlin, 23 September 1970

No. 993/70

According to a reliable source, the attitude of the Federal Government towards the afore-mentioned stations was described by leading SPD officials at the beginning of September 1970 as follows:

The attacks by the Soviet Union, the GDR and some other socialist countries against the activities of the stations are harsh, and they could call into question the Olympic Games. The Federal Government is aware from various, not just official, sources that some of the socialist countries are relatively serious in their threat to boycott the Olympic Games in Munich if the stations do not terminate their activities.

Continue reading “STASI REPORT ON WEST GERMAN GOVERNMENT’S ATTITUDE TO RADIO FREE EUROPE AND RADIO LIBERTY”

STASI REPORT ON MEETINGS WITH THE KGB, 30 NOVEMBER-1 DECEMBER 1964

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Meetings between KGB Chairman Semichastny and East German Minister for State Security Mielke. Topics of discussion include Lyndon B. Johnson’s recent election in the United States, Khrushchev’s ouster from the Kremlin, Sino-Soviet relation, and Khrushchev’s son-in-law Alexei Adzhubei.

CREATORS
GERMANY (EAST). MINISTRY FOR STATE SECURITY (STASI)

MIELKE, ERICH

SEMICHASTNY, V.

WOLF, MARKUS

SUBJECTS DISCUSSED
Nuclear weapons–China
European Economic Community
National liberation movements–Africa
Germany (East). Ministry for State Security (Stasi)
Soviet Union. Committee for State Security (KGB)

Continue reading “STASI REPORT ON MEETINGS WITH THE KGB, 30 NOVEMBER-1 DECEMBER 1964”

‘BRIEF ASSESSMENT OF THE INVESTIGATION RESULTS ACHIEVED IN 1961 IN WORK ON CRIMES OF ESPIONAGE’

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Assessment by the Stasi of the espionage of the main Western secret services in East Germany based on its investigation of cases of spying in 1961.

CREATOR
GERMANY (EAST). MINISTRY FOR STATE SECURITY (STASI)

SUBJECTS DISCUSSED
Berlin (Germany)–International status
Espionage, American
Berlin Crisis, 1961
Espionage, French
Espionage, German

Continue reading “‘BRIEF ASSESSMENT OF THE INVESTIGATION RESULTS ACHIEVED IN 1961 IN WORK ON CRIMES OF ESPIONAGE’”

EAST GERMAN MINISTRY OF STATE SECURITY, ‘NEW METHODS OF OPERATION OF WESTERN SECRET SERVICES

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Assessment by the Stasi of changes to operations made by the main Western secret services in response to Khrushchev’s November 1958 diplomatic note to the United States, Britain, and France demanding an end to the occupation of West Berlin.

CREATOR
GERMANY (EAST). MINISTRY FOR STATE SECURITY (STASI)

SUBJECTS DISCUSSED
Berlin (Germany)–International status
Espionage, American
Berlin Crisis, 1961
Espionage, French
Espionage, German

Main Department IX/1

New methods of operation of Western secret services

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Continue reading “EAST GERMAN MINISTRY OF STATE SECURITY, ‘NEW METHODS OF OPERATION OF WESTERN SECRET SERVICES”

Two Face America: 73 Million Trump Party Apparatchiks Guarantee Turmoil Over The Coming Years

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Two Face America: 73 Million Trump Party Apparatchiks Guarantee Turmoil Over the Coming Years
by John Stanton

It is happening here.
The soul of America is like the character Two Face in the Batman movie series.
One defeat of the Party of Trump and its 73 million apparatchiks is not enough. In Trump, the United States has bred its own dictator in waiting and he’s got an army of servile apostles willing to fight and die for him. Vigilance by his opponents has never been more important.
“This Fuhrer dictatorship could produce only lackeys and profiteers of the most reactionary and aggressive part of German imperialist reaction. Its Germanic democracy reared the repulsive type of a human breed that was boundlessly servile to men of higher rank and just as boundlessly cruelly tyrannical towards men below it.” The Destruction of Reason, Georg Lukacs
Incumbent President Donald Trump now owns the Republican Party, lock, stock and barrel. With 73 million restless apparatchiks clearly beholden to the cult of Trump, will it be long before the Republican Party gets rebranded as the Trump National Party; or, perhaps, the MAGA Party
(Make America Great Again)? Maybe Trump sells-off his faltering real estate empire and creates a media conglomerate—consisting of television, radio,and the Internet/WWW—that spews out divisive, fascist, ultraconservative fare 24 hours a day, 7 days week. Trump Media would
absorb the National Review, New York Post and similar conservative publications/websites.
Sky’s the limit for Trump: His 73 million followers include an increasing number of Blacks and Latinos who appear to revere him for his apparent strength, tough talk and sense of honor.
According to Fortune Magazine, “As Trump once put it: ‘Real power is fear. It’s all about strength. Never show weakness. You’ve always got to be strong. Don’t be bullied. There is no choice.’”


Adolf Hitler Said That Too.

Continue reading “Two Face America: 73 Million Trump Party Apparatchiks Guarantee Turmoil Over The Coming Years”

EXPOSED – SOVIET PLAN TO ASSASSINATE TITO

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

 

NKVD plan to assassinate Josip Broz Tito by a Soviet covert agent, codenamed “Max.” The plan envisions assassinating Tito during a private audience during Tito’s forthcoming visit to London, or at a diplomatic reception in Belgrade. This document was not dated.

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

 

POLITISCHE MITVERANTWORTUNG DER SCHWEIZER BEHÖRDEN FÜR DIE AKTIVITÄTEN DER CRYPTO AG

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Die Geschäftsprüfungsdelegation (GPDel) hat ihren Inspektionsbericht zum Fall Crypto AG am 2. November 2020 verabschiedet. Laut den Abklärungen der GPDel war auch der Schweizer Nachrichtendienst Nutzniesser von der Operation der amerikanischen Dienste mit der Crypto AG. Diese Zusammenarbeit war grundsätzlich mit dem geltenden Recht vereinbar. Die GPDel erkennt eine politische Mitverantwortung der Schweizer Behörden für die Aktivitäten der Firma. Zudem untersuchte die GPDel die Sistierung der Generalausfuhrbewilligungen durch das Staatssekretariat für Wirtschaft (SECO) und deren Folgen.

Continue reading “POLITISCHE MITVERANTWORTUNG DER SCHWEIZER BEHÖRDEN FÜR DIE AKTIVITÄTEN DER CRYPTO AG”

STALIN AND THE LEADERS OF THE SOCIALIST UNITY PARTY OF GERMANY, WILHELM PIECK AND OTTO GROTEWOHL

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Top Secret

Present: V. M. Molotov, A. A. Zhdanov, G. M. Malenkov, V. S. Semenov (SVAG [Soviet Military Administration in Germany]), and interpreters – G. Ya. Korotkevich and F. Elsner.

PIECK thanked I. V. Stalin for the welcome and also for the aid which the Soviet Military Administration in Germany gives the SED [Socialist Unity Party].

I. V. STALIN asks whether the Military Administration is actually giving aid or if this is a compliment.

PIECK and GROTEWOHL say that they are actually receiving aid.

STALIN, joking, asks again, does this mean that they don’t just oppress you, but also give aid?

PIECK, laughing, confirms [this]. Then he says that he will describe political issues and Grotewohl economic [ones]. In Pieck’s words, the exacerbation of the conflicts between the Allies on the issues of an imperialistic or democratic peace with Germany, the unity or dismemberment of Germany, and its democratic development or colonialization by means of the Marshall Plan are influencing the mood of the German people. These conflicts are not so clear to the broad masses but they are influencing the mood of the masses, especially in Berlin. The Western powers are trying to influence the population and direct it against the USSR, arousing hostility against communism which supposedly wants to crush [poglotit’] the people, take the Germans’ private property away from them, etc.

STALIN laughs.

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

SED MEETING WITH STALIN – ORIGINAL DOCUMENT

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Meeting Friday, 1.31.1947, in Moscow, 9-12 in the Evening

Stalin, Marshal, Suslov, Semenov, Volkov —

Pieck, Grotewohl, Ulbricht, Fechner, Oelsner

Continue reading “SED MEETING WITH STALIN – ORIGINAL DOCUMENT”

David Omand – How Spies Think – 10 Lessons In Intelligence – Part 7

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Lesson 5: It is our own demons that are most likely to mislead us

Well, you can kiss my ass in Macy’s window’ was the brutal one-line dismissal by Ava, the CIA’s Iraq Group Chief, of the over-reliance of US Biological Warfare (BW) expert analysts on a single human intelligence source on Saddam Hussein’s BW programmes, codenamed Curveball. When she challenged the experts’ faith in using information from that source, in her words, ‘they looked at me like pigs looking at a

Continue reading “David Omand – How Spies Think – 10 Lessons In Intelligence – Part 7”

MEMORANDUM OF CONVERSATION BETWEEN ERICH HONECKER AND KIM IL SUNG

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

North Korea cables reveal East Germany′s deep-rooted suspicion of Kim  regime | In Depth | DW | 08.02.2018

May 31, 1984
Memorandum of Conversation between Erich Honecker and Kim Il Sung

E. Honecker used the meeting to address some issues that could not be addressed in greater detail during the official talks on 30 May 1984 due to time constraints.

Continue reading “MEMORANDUM OF CONVERSATION BETWEEN ERICH HONECKER AND KIM IL SUNG”

David Omand – How Spies Think – 10 Lessons in Intelligence – Part 6

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

4

Lesson 4: Strategic notice We do not have to be so surprised by surprise

Early in the blustery spring morning of 14 April 2010 an Icelandic volcano with a near unpronounceable name (Eyjafjallajökull) exploded, throwing a cloud of fine ash high into the sky. The debris was quickly swept south-east by the regular jet stream of wind across the Atlantic until the skies above Northern Europe were filled with ash. Deep under the Icelandic ice-sheet melt water from the heat of the magma had flowed into the site of the eruption, rapidly cooling the lava and causing the debris to be rich in corrosive glass particles. These are known to pose a potential hazard if ingested by aircraft jet engines. The next day alarmed air traffic authorities decided they had to play it safe since no one had prescribed in advance specific particle sizes and levels below which engines were considered not to be at risk and thus safe to fly. They closed airspace over Europe and grounded all civil aviation in the biggest shut-down since the Second World War.1

Continue reading “David Omand – How Spies Think – 10 Lessons in Intelligence – Part 6”

David Omand – How Spies Think – 10 Lessons In Intelligence – Part 5

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Lesson 3: Estimations Predictions need an explanatory model as well as sufficient data

In mid-August 1968, I was driving an elderly Land Rover with friends from university along the Hungarian side of the border with Czechoslovakia on the first stage of an expedition to eastern Turkey. To our surprise we found ourselves having to dodge in and out of the tank transporters of a Soviet armoured column crawling along the border. We did not realize – and nor did the Joint Intelligence Committee in London – that those tank crews already had orders to cross the border and invade Czechoslovakia as part of a twin strategy of intimidation and deception being employed by Yuri Andropov, then KGB chairman, to undermine the reform-minded government in Prague led by Alexander Dubček.1

Continue reading “David Omand – How Spies Think – 10 Lessons In Intelligence – Part 5”

List Of Crimes For Which Medvedev And Putin Cannot Be Tried

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

A bill on guarantees of the immunity of the former president was submitted to the State Duma. It will bring the federal law into line with the latest version of the Russian Constitution (adopted by a vote in the summer of 2020). The document not only complicates the procedure for depriving the former president of immunity, but also actually allows the former head of state to commit some crimes after his resignation.

Continue reading “List Of Crimes For Which Medvedev And Putin Cannot Be Tried”

David Omand – How Spies Think – 10 Lessons in Intelligence – Part 4

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Lesson 2: Explanation Facts need explaining

Belgrade, Sunday, 23 July 1995. It was getting dark when our military aircraft landed on an airfield just outside the Serbian capital. We were met by armed Serbian security officers and quickly hustled into cars, watched over cautiously by a diplomat from the British Embassy. After what seemed an endless drive into the country we arrived at a government guest house. Our mission was to deliver in person an ultimatum to its occupant, General Ratko Mladić, the commander of the Bosnian Serb Army, the man who

Continue reading “David Omand – How Spies Think – 10 Lessons in Intelligence – Part 4”

Uwe Steimle Als Erich Honecker

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

David Omand – How Spies Think – 10 Lessons In Intelligence – Part 3

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

STASI-AGENTS IN DISGUISE

Part One

AN ANALYST SEES: FOUR LESSONS IN ORDERING OUR THOUGHTS

1

Lesson 1: Situational awareness Our knowledge of the world is always fragmentary and incomplete, and is sometimes wrong

Continue reading “David Omand – How Spies Think – 10 Lessons In Intelligence – Part 3”

Die Miesen Tricks Der Stasi-Agenten – Die Romeo-Falle

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Während des kalten Krieges versuchte das Ministerium für Staatssicherheit über viele Wege an geheime Informationen und Dokumente zu gelangen. Ein Mittel waren sogenannte “Romeo-Agenten”. Diese Männer wurden von der Stasi, teilweise bereits während des Studiums, angeworben und hatten es auf die Büroleiterinnen von Ministerien und Botschaften in Westdeutschland abgesehen. Sie verführten die jungen Frauen und nutzten deren Vertrauen gnadenlos aus. Mit welchen Tricks die Stasi noch gearbeitet hat, erfahrt Ihr in der Doku “Die Krake – Die Geschichte der Stasi”: https://www.zdf.de/dokumentation/zdf-…

Participants Of Thousands Of Actions Burn French Flags And Portraits Of Macron

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

In Islamic countries, protests continue against the publication of cartoons of the Prophet Muhammad, which Muslims consider blasphemous, and statements by French President Emmanuel Macron. Demonstrations are taking place in Bangladesh, Indonesia, Lebanon, Pakistan, Turkey and other places. Protesters are calling for a boycott of French goods, seeking an apology from the French authorities and demanding an end to Islamophobia.

“Violent Protests Are a Neo-Nazi Fever Dream Come True” – By Rita Katz

It’s hard not to feel disheartened as national divisions turn increasingly deadly.

For months, we have been seeing armed citizens patrolling streets alongside militarized police forces, demonstrations devolving into bloody brawls between protesters and counter-protesters. But for one manipulative and malicious community, it’s exactly what they’ve been hoping to see. 

Continue reading ““Violent Protests Are a Neo-Nazi Fever Dream Come True” – By Rita Katz”

Staatlich Gedeckte Gewalt Und Morde – Die STASI Doku

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

GoMoPa-Scheisshausfliegen Von der Krise Gebeutelt Im Letzten Kampf-Einsatz Aus Dem Stasi-Bunker

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Die Oberscheisshausfliege Klaus-Dieter Maurischat oder wie auch immer der Kinderfreund, Gestaltenwanderer und Zeitreisende heissen mag. Ein ganz schräger Fürst.

Offensicht setzt die Corona-Krise den GoMoPa-Scheisshausfliegen, laut Eigenbezeichnung, und deren IM besonders zu, anders sind die letzten verzweifelten Kampfeinsaetze der Ostberliner Erich Mielke-Epigonen nicht zu erklaeren.

Immer weniger Opfer fallen auf die alten Stasi-Tricks herein, dies zeigen auch die Rekord-Verleumdungen, Morddrohungen und dubiosen Meeting-Einladungen an mich in den letzten Wochen und Tagen.

Zuvor musste ja schon der mutmassliche Pate RA Resch vom noblen Kranzlereck an den Reuterplatz umziehen und seine Mannschaft drastisch reduzieren.

Auch die toedlichen Attentate durch Putins Schergen schaden den alten Stasi-Kaempen der GoMoPa nun zunehmend, da immer mehr Menschen die Zusammenhaenge erkennen.

Hier noch einmal die Highlights aus der Feder der Scheisshausfliegen:

https://berndpulch.org/bernd-pulch-der-beweis-%E2%80%93-so-wollte-der-serienbetruger-klaus-maurischat-uns-zwingen-die-berichterstattung-uber-den-%E2%80%9Cnachrichtendienst%E2%80%9D-%E2%80%9Cgomopa%E2%80%9D-einzustellen/
https://berndpulch.org/2011/02/24/weitere-erpressung-des-vorbestraften-serienbetrugers-klaus-maurischat-gomopa/

Exposed – Top 10 Chilling Revelations About Stasi Of East Germany

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Because Of COVID-19, Russia Has More Past Due Advances Than Any Other Time

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Russian banks and microfinance associations have never had more late advances than they do well now: 12.6 million. As indicated by new figures delivered by the National Association of Professional Collection Agencies and examiners at Equifax, the financial aftermath from the Covid pandemic has prompted the credit blast. The quantity of credits in Russia at any rate 90 days late is 12.5 percent higher now than as of now a year ago, and an ever increasing number of advances go unpaid consistently, raising the all out by 80,000–500,000 consistently.

Continue reading “Because Of COVID-19, Russia Has More Past Due Advances Than Any Other Time”

Russian Private Military Companies In Operations, Competition, And Conflict

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

The Asymmetric Warfare Group (AWG) supported the Johns Hopkins University Applied Physics Laboratory (JHU/APL) to break down the wonder of Russian private military organizations (PMCs), the situations under which they would matter to U.S. Armed force move commandants, and whether they comprise a one of a kind danger to U.S. furthermore, accomplice powers.

The essential crowd for this investigation is U.S. Armed force move administrators and their staffs, yet the discoveries and experiences ought to likewise be valuable for anybody in the U.S. public security and protection networks worried about deviated activities of the Russian Federation around the globe. To begin with, this examination presents key discoveries from profound jump exploration and investigation on Russian PMCs introduced in the supplement. It tends to their utilizations, hardware, preparing, faculty, state contribution, legitimate issues, and other related subjects. Second, these discoveries are utilized to advise a scientific model to investigate the operational difficulties and contemplations Russian PMCs could present to U.S. Armed force move officers.

Key Findings

Primary concern Up Front: Russian PMCs are utilized as a power multiplier to accomplish targets for both government and Russia-adjusted private interests while limiting both political and military expenses. While Moscow keeps on considering the to be of Russian PMCs as helpful, their utilization likewise presents a few weaknesses that present both operational and key dangers to Russian Federation targets.

Continue reading “Russian Private Military Companies In Operations, Competition, And Conflict”

Moscow City Chamber Individuals Ask Lead Prosecutor To Obstruct Chairman’s Most Recent Covid Orders

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Covid 19 hits Moscow hard

Eight appointees from two enlisted resistance groups serving on Moscow’s city gathering have officially asked District Attorney Denis Popov to audit the legitimateness of Mayor Sobyanin’s leader orders requiring neighborhood organizations to move 30%, everything being equal, to far off work.

Continue reading “Moscow City Chamber Individuals Ask Lead Prosecutor To Obstruct Chairman’s Most Recent Covid Orders”

Svetlana Tikhanovskaya Issues ‘Final Offer’ To The Belarusian Regime

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Svetlana Tikhanovskaya

Resistance pioneer Svetlana Tikhanovskaya (Sviatlana Tsikhanouskaya) reported a “people’s final proposal” routed to the Belarusian experts on Tuesday, October 13. The announcement showed up on the official Telegram station for her press administration.

Continue reading “Svetlana Tikhanovskaya Issues ‘Final Offer’ To The Belarusian Regime”

Doctor At Omsk Clinic Who Treated Navalny Has Surrendered

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

The appointee head doctor at the Omsk clinic that quickly treated resistance figure Alexey Navalny in August has surrendered “for individual reasons,” as per the news office RIA Novosti. Anatoly Kalinichenko told the site Ngs55.ru that his choice to take an occupation somewhere else is unopinionated and due basically to the way that he’d developed worn out on managerial work. He simply needs to re-visitation of medical procedure, he says.

Navalny was hospitalized at Kalinichenko’s office on August 20 after his departure from Tomsk to Moscow made a crisis arrival in Omsk. While he stayed at the Omsk clinic until the night of August 21, Kalinichenko was the essential wellspring of data for writers giving an account of Navalny’s ailment.

Kalinichenko was one of the medical clinic authorities who asserted that specialists found no hints of toxin in Navalny’s framework and contended that the legislator’s delicate state forestalled his prompt exchange to a superior prepared facility in Berlin.

On Film: The Execution of Amon Goeth, SS Murderer & Monster

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Amon Goeth was a Nazi Officer who headed a German forced labor camp in Poland during WWII. He was ruthless and “a monster”. His life became somewhat famous because of Ralph Fiennes portrayal of him in the movie SCHINDLER’S LIST by Steven Spielberg.



How Amon Goeth died was not accurately presented in the film. Here is the historical presentation of his execution. For all that say this isn’t him….would be interested in hearing your comments concerning this Wikipedia page: http://en.wikipedia.org/wiki/Amon_Goeth and the pictures posted on the page which are the same as the person who is executed in the video. Also, see http://www.auschwitz.dk/goeth.htm. WARNING: This video contains extremely graphic material that is not suitable for all (especially young) viewers. Disclaimer: I do not own or profess any rights to the movie SCHINDLER’S LIST, but use the short film clip included as historical comparison to the actual event. The video of the actual event is located at the WFDiF Archieves from Warsaw, Poland. —- DISCLAIMER! —- Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use.

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Deadly – The Chilling Way Vladimir Putin Deals With His Enemies

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

“The Russian state goes after enemies, traitors, opponents, critics, journalists,” Buzzfeed News’ Heidi Blake told InsideEdition.com. The results are chilling, and often deadly. Blake is the author of “From Russia, With Blood: the Kremlin’s Ruthless Assassination Program and Vladimir Putin’s Secret War on the West.” Her investigative team found Russian links to over a dozen mysterious deaths on English soil, including that of exiled oligarch Boris Berezovsky.

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Der Neueste “Killing Joke” Der STASI-GoMoPa

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Karl-Eduard von Schnitzler, der Godfather der DDR-Serien, R.I.P.

Die neue geniale E-Mail-Falle der Neo-STASI aus Ostberlin an mich liest sich so:

[BERNDPULCH.ORG – BERND-PULCH.ORG – TOXDAT, STASI List, STASI SLEEPER List, KGB List, BDVP List, STASI Names A-Z, DDR-EAST GERMAN POLICE List,Offshore List, Leaks Lists, GOMOPA4KIDS-Pedophiles-Network, GOMOPA Victims List, GOMOPA Offender Names,] DIE TÄTER-LISTE – 90.000 STASI-MITARBEITER MIT KLARNAMEN ZUM DOWNLOADEN
Ich recherchiere für eine TV-Serie….

ursrechn@gmail.com

Continue reading “Der Neueste “Killing Joke” Der STASI-GoMoPa”

Mutmasslich Tödliche Falle der STASI-GoMoPa für Mich

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Kriminalität in der DDR: Geheimsache Mord: Wie die Stasi Verbrechen  vertuschte - Seite 0 - Reportageseite - Tagesspiegel

Sehr geehrter Herr Bernd Pulch,

die krimin. Enteignung durch SED/Stasi meines Eigentums mit Betrug, Filegrundstück in Weißig, hat das Landgericht Dresden mich parteriloser Arbeiter Rehabilitiert,Beschluss BSRH 128/11 v. 30.7.12 mit Haftbefehlaufhebung RS II 113/86 wegen Rechtsstaatswidrigkeit.

Continue reading “Mutmasslich Tödliche Falle der STASI-GoMoPa für Mich”

Kinder Sollten Nicht In Russischen Internaten Leben

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Revealed – Cybersecurity And Infrastructure Security Agency Mail-In Voting In 2020

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Presidential Election Day USA 2020. Vote In USA, Banner Design.. Royalty  Free Cliparts, Vectors, And Stock Illustration. Image 142112824.

Page Count: 11 pages
Date: July 28, 2020
Restriction: None
Originating Organization: Cybersecurity and Infrastructure Security Agency, Department of Homeland Security
File Type: pdf
File Size: 577,002 bytes
File Hash (SHA-256): 4018616B3963268F457A9A294BF1A3A04EB90025898BC3C54B4785B048C873BB

Continue reading “Revealed – Cybersecurity And Infrastructure Security Agency Mail-In Voting In 2020”

Exposed – Russia Likely To Continue Seeking To Undermine Faith In US Electoral Process

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Homeland Security Experts on the Biggest Threats and Challenges the U.S.  Faces in 2020 – Homeland Security Today
 
Page Count: 4 pages
Date: September 3, 2020
Restriction: For Official Use Only
Originating Organization: Cyber Mission Center, Office of Intelligence and Analysis, Department of Homeland Security
File Type: pdf
File Size: 167,819 bytes
File Hash (SHA-256): CD0E044E731342D57AB13DCBB9C8B56D2D5A6295D1E51F6409461D1CAB55C61A
 

Continue reading “Exposed – Russia Likely To Continue Seeking To Undermine Faith In US Electoral Process”

Video – Russland: Der Fall Nawalny – Opposition In Gefahr

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Die Vergiftung von Oppositionsführer Alexej Nawalny ist nicht der erste Anschlag gegen einen Putin-Kritiker. Politischer Widerstand in Russland kann lebensgefährlich sein.

Regimekritiker Michail Efremow Vor Dubiosem Moskauer Gericht – 11 Jahre Gefängnis Gefordert

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Russland: Populärer Schauspieler nach Alkoholfahrt mit tödlichem Ausgang  unter Hausarrest — RT Deutsch

Das Gericht verkündet demnächst ein Urteil über den Regimekritiker & Schauspieler Michail Efremow. Die Staatsanwaltschaft fordert, den Schauspieler wegen eines Unfalls, bei dem der 57-jährige Sergei Zakharov starb, zu 11 Jahren Gefängnis zu verurteilen.

Continue reading “Regimekritiker Michail Efremow Vor Dubiosem Moskauer Gericht – 11 Jahre Gefängnis Gefordert”

Nawalny Aus Koma Geweckt – Deutsch-Russisches Verhältnis Am Boden

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Sein Zustand verbessert sich und er ist wieder ansprechbar: Berliner Ärzte haben den Kremlkritiker Alexej Nawalny aus dem künstlichen Koma geholt. Sein Fall hat inzwischen hohe Wellen geschlagen.

Nawalny Vergiftet: Statement Von Maas Und Kramp-Karrenbauer Zum Vorfall

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Seit mehreren Tagen befindet sich der russische Kreml-Kritiker Alexej Nawalny in der Berliner Charité. Er war dorthin mit Symptomen einer Vergiftung gekommen. Nun gibt es laut Bundesregierung einen “zweifelsfreien Nachweis” für eine Vergiftung mit einem chemischen Nervenkampfstoff aus der Nowitschok-Gruppe. Das erklärte Regierungssprecher Steffen Seibert. Ein Speziallabor der Bundeswehr habe eine toxikologische Untersuchung anhand von Proben durchgeführt. Hierbei sei die Vergiftung nachgewiesen worden.

Mögliche Sanktionen Gegen Russland – Navalny-Ärzte Suchen Hilfe Bei Novichok-Forschern

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Hilferuf an Bundeswehr - Charité geht von Nervengift-Anschlag auf Nawalny aus - Politik Inland - Bild.de
Deutschlands Außenminister Heiko Maas sagte, Berlin sei bereit, diplomatische Sanktionen gegen Russland einzuführen, wenn sich herausstellen würde, dass die russischen Behörden hinter der Vergiftung des Oppositionspolitikers Alexey Navalny stecken, berichtet Reuters.

Continue reading “Mögliche Sanktionen Gegen Russland – Navalny-Ärzte Suchen Hilfe Bei Novichok-Forschern”

Charité: Kreml-Kritiker Nawalny Mit Cholinesterase-Hemmer Vergiftet

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Die Ärzte der Berliner Charité haben die Wirkung eines Giftstoffs in Alexei Nawalnys Körper nachgewiesen und vermuten, dass der russische Oppositionelle mit einem Cholinesterase-Hemmer vergiftet worden ist. Sie behandeln Nawalny mit dem Gegenmittel Atropin. Wie stark sein Nervensystem geschädigt ist, sei noch nicht klar. Spätfolgen schließen die Charité-Mediziner nicht aus. In einer schriftlichen Erklärung teilten sie zudem mit, dass Alexej Nawalnys Gesundheitszustand nach wie vor ernst sei, es bestehe aber keine akute Lebensgefahr. Der bekannte Kreml-Kritiker wird seit Samstag im Berliner Klinikum Charité behandelt, nachdem er am Donnerstag ins Koma gefallen war. Den Ärzten, die Nawalny zuerst in der russischen Stadt Omsk versorgten, vertraute sein Umfeld nicht. Denn Gift hätten die Ärzte bei Blutanalysen nicht gefunden.

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Nawalny-Mordanschag: Moskau Mauert – Und Luegt Weiter

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Während der Ruf nach Aufklärung weltweit lauter wird, mauert Moskau und will untersuchen lassen, ob eine “fremde Macht” einen russischen Staatsbürger geschädigt habe, um Moskau zu diskreditieren.

Das ist die alte Vorgehensweise der Tschekisten aus KGB, STASI und wie die einschlägigen Ost-Mördergeheimdienste sich jeweils nennen – bis hin zu STASI-GoMoPa.

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Must See Video – The Nazi Hunter: Capturing The Architect Of The Holocaust

Become a Patron!
True Information is the most valuable resource and we ask you to give back

A thrilling true-crime story of how secret agent Zvi Aharoni hunted down one of the highest-ranking Nazi war criminals on the run in Argentina in 1960. Read more: https://www.theatlantic.com/video/ind… “The Driver Is Red” was directed by Randall Christopher (https://www.thedriverisred.com). It is part of The Atlantic Selects, an online showcase of short documentaries from independent creators, curated by The Atlantic. Subscribe to The Atlantic on YouTube: http://bit.ly/subAtlanticYT

STILL ALIVE AND KICKING – DIE STASI SEILSCHAFTEN 2020

Become a Patron!
True Information is the most valuable resource and we ask you to give back

https://www.welt.de/debatte/kommentare/article134309778/Auf-die-SED-Seilschaften-ist-noch-immer-Verlass.html

Daran hat sich nichts geändert. Im Gegenteil: Die STASI-Connections zu Putin und auch nach China werden intensiver genutzt denn je:

  • für Subventionsbetrug
  • Energie-Pipelines
  • Gazprom Deutschland
  • Cybercrime
  • Zersetzung der deutschen und europäischen Politik, Justiz, Medien und Wirtschaft

Wie schon immer werden die STASI-Seilschaften aus Moskau dirigiert.

Denn auch Wladimir Putin ist einer von ihnen:

Quellbild anzeigen

Video – THE KGB LIST REVEALED

Become a Patron!
True Information is the most valuable resource and we ask you to give back

You want to check whether a certain person was or is in the KGB ? You may look at on this website http://www.berndpulch.org in the KGB spies category for more information.

Endgame – Russian PM, Government Resigns After Putin’s Annual Address

Become a Patron!
True Information is the most valuable resource and we ask you to give back

Original STASI-Film – Festnahmen am Berliner Alexanderplatz

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Seit Anfang 1988 bekämpfte die Staatssicherheit die Ost-Berliner Friedens- und Bürgerrechtsbewegung unter dem Decknamen “Störenfried”. Im September 1989 griff die Geheimpolzei bei einer kleinen Demonstration auf dem Berliner Alexanderplatz durch.

 

STASI – Lehrfilm über das MfS-Wachregiment “Felix Edmundowitsch Dzierzynski”

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

FBI – Study About Active Shooters Cause Massacres

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

 

 

Bildergebnis für shooting massacre

In 2017 there were 30 separate active shootings in the United States, the largest number ever recorded by the FBI during a one-year period.1 With so many attacks occurring, it can become easy to believe that nothing can stop an active shooter determined to commit violence. “The offender just snapped” and “There’s no way that anyone could have seen this coming” are common reactions that can fuel a collective sense of a “new normal,” one punctuated by a sense of hopelessness and helplessness. Faced with so many tragedies, society routinely wrestles with a fundamental question: can anything be done to prevent attacks on our loved ones, our children, our schools, our churches, concerts, and communities?

There is cause for hope because there is something that can be done. In the weeks and months before an attack, many active shooters engage in behaviors that may signal impending violence. While some of these behaviors are intentionally concealed, others are observable and — if recognized and reported — may lead to a disruption prior to an attack. Unfortunately, well-meaning bystanders (often friends and family members of the active shooter) may struggle to appropriately categorize the observed behavior as malevolent. They may even resist taking action to report for fear of erroneously labeling a friend or family member as a potential killer. Once reported to law enforcement, those in authority may also struggle to decide how best to assess and intervene, particularly if no crime has yet been committed.

By articulating the concrete, observable pre-attack behaviors of many active shooters, the FBI hopes to make these warning signs more visible and easily identifiable. This information is intended to be used not only by law enforcement officials, mental health care practitioners, and threat assessment professionals, but also by parents, friends, teachers, employers and anyone who suspects that a person is moving towards violence.

Key Findings of the Phase II Study

  1. The 63 active shooters examined in this study did not appear to be uniform in any way such that they could be readily identified prior to attacking based on demographics alone.
  2. Active shooters take time to plan and prepare for the attack, with 77% of the subjects spending a week or longer planning their attack and 46% spending a week or longer actually preparing (procuring the means) for the attack.
  3. A majority of active shooters obtained their firearms legally, with only very small percentages obtaining a firearm illegally.
  4. The FBI could only verify that 25% of active shooters in the study had ever been diagnosed with a mental illness. Of those diagnosed, only three had been diagnosed with a psychotic disorder.
  5. Active shooters were typically experiencing multiple stressors (an average of 3.6 separate stressors) in the year before they attacked.
  6. On average, each active shooter displayed 4 to 5 concerning behaviors over time that were observable to others around the shooter. The most frequently occurring concerning behaviors were related to the active shooter’s mental health, problematic interpersonal interactions, and leakage of violent intent.
  7. For active shooters under age 18, school peers and teachers were more likely to observe concerning behaviors than family members. For active shooters 18 years old and over, spouses/domestic partners were the most likely to observe concerning behaviors.
  8. When concerning behavior was observed by others, the most common response was to communicate directly to the active shooter (83%) or do nothing (54%). In 41% of the cases the concerning behavior was reported to law enforcement. Therefore, just because concerning behavior was recognized does not necessarily mean that it was reported to law enforcement.
  9. In those cases where the active shooter’s primary grievance could be identified, the most common grievances were related to an adverse interpersonal or employment action against the shooter (49%).
  10. In the majority of cases (64%) at least one of the victims was specifically targeted by the active shooter. 

U.S. National Intelligence Reveals About Cyberthreats

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

This reference aid draws on CTIIC’s experience promoting interagency situational awareness and information sharing during previous significant cyber events—including cyber threats to elections. It provides a guide to cyber threat terms and related terminology issues likely to arise when describing cyber activity. The document includes a range of cyber-specific terms that may be required to accurately convey intelligence on a cyber threat event and terms that have been established by relevant authorities regarding technical infrastructure for conducting elections.

CTIIC will adhere to this terminology guide in future documents related to cyber threats to US elections and recommends use by others in the interest of consistency and clear communication.

Please note that this reference aid is not intended to address terminology related to political or other noncyber aspects of influence or interference involving elections, nor is it intended to be a comprehensive guide to cyber threat terminology.

Describing What’s Happened: Common Terms

The following terms are central to accurately describing cyber threat activity but are often used differently. CTIIC recommends their use be accompanied by definitions and any necessary context for nontechnical readers.

Attacked

Indicates that a cyber actor has attempted to degrade, destroy, disrupt, manipulate, or otherwise detrimentally affect the operation of a system or network. However, manipulation or deletion of data solely for the purpose of hiding one’s tracks is not considered an attack. Some reports use “attack” and “exploit” synonymously, drawing in part on the cryptanalysis sense of “attack”—the use of a technical approach to defeat a security measure. The dual usage can cause confusion, especially for nontechnical readers, if the context does not fully explain the type of malicious cyber activity that occurred.



Compromised

Indicates that a victim system has installed malware, connected to a malicious Internet Protocol address, or provided a cyber actor unauthorized access to collect data or execute commands.

Exploited

Indicates that a malicious actor has conducted additional activities on a compromised system, such as collecting data, deploying more malware, or establishing persistent access. Some documents—within both the IC and the private sector—use exploited and compromised synonymously. In practice, however, cyber actors may compromise more accounts and systems than they exploit, in part because of the availability of tools to automate the process of compromising vulnerable systems. Distinguishing whether and how an actor has made use of a compromised system—whenever available intelligence allows—aids in understanding the impact and implications of the malicious cyber activity.

Scanned/Scanning

Scanning a system involves attempting to identify the security vulnerabilities the system may have by sending it specific network traffic and observing its responses. The definition is reasonably specific but can cause confusion—and potentially undue alarm—if it is assumed to include follow-on attempts to exploit any vulnerabilities discovered. Scanning is extremely common on the Internet but may have only a modest success rate, and cyber actors therefore scan far more systems than they actually affect.

Targeted/Targeting

A cyber actor’s targeting of a particular victim can refer to any aspect of the actor’s attempts to select a system to conduct operations against, learn about, find vulnerabilities, gain access, or conduct other malicious activities. The term also connotes an attempt at conducting malicious cyber activity, without indicating the degree of success an actor achieved. We recommend greater specificity and clarification of the specific usage whenever available intelligence allows.

Cyber Deterrence

The prevention of cyber action by credibly demonstrating the ability and willingness to deny benefits or impose costs to convince the adversary that restraint will result in better outcomes than will confrontation.

Cyber Defense

A set of processes and measures to detect, monitor, protect, analyze, and defend against network infiltrations. See Cyber Security.

Cyber Disruption

Activities initiated by the threat actor that temporarily negatively alter or prevent the operation of the victim’s network.

Cyber Effect

The manipulation, disruption, denial, degradation, or destruction of computers, information or communications systems, networks, physical or virtual infrastructure controlled by computers or information systems, or information resident thereon.

Cyber Espionage

The intentional clandestine acquisition of information from targeted networks without altering the information or affecting users’ access.

Cyber Influence

The use of cyber operations to shape the perceptions or behavior of targeted audiences while maintaining plausible deniability.

Cyber Operation

An umbrella term to describe cyber attack, cyber espionage, cyber influence, or cyber defense, and intrusions or activities with unknown intent.

Cyberspace

A global domain within the information environment consisting of the interdependent networks of information technology infrastructures and resident data, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers.

Cyber Security

The protection of information systems against unauthorized access to or modification of information contained therein, and against the denial of service to authorized users, including those measures necessary to detect, document, and counter such threats. Also known as network security. See Cyber Defense.

Cyber Threat

Cyber operations or noncyber actions (intentional or accidental) that compromise the confidentiality, integrity, reliability, or availability of digital devices, systems, networks, or data.

Cyber Threat Intelligence

The collection, processing, analysis, and dissemination of information from all sources of intelligence on foreign actors’ cyber programs, intentions, capabilities, research and development, tactics, operational activities and indicators, and their impact or potential effects on US national security interests. Cyber threat intelligence also includes information on cyber threat actor information systems, infrastructure, and data; and network characterization or insight into the components, structures, use, and vulnerabilities of foreign cyber program information systems.

Experts Warn – Security Problems Inside The Blockchain Technology

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Bildergebnis für blockchain

 

Awareness of blockchain has soared in recent years with the emergence of cryptocurrencies, but the technology has existed for much longer. The linking of blocks, containing cryptographic functions of transactions and data, means that tampering with their contents becomes increasingly difficult as the chain grows – this concept was exploited for document timestamping applications more than a decade before cryptocurrencies became reality. In many implementations, blocks are confirmed by, and stored at, many nodes in different locations, providing a high degree of data integrity. There are, however, many challenges for applying blockchain technologies in tactical networks, particularly due to the constraints of the platforms, the limited bandwidth available among them, and the impact of network partitioning. In this report, the development and principles of blockchains are presented, along with an overview of their weaknesses and vulnerabilities. There is a huge level of interest in this technology across many sectors, and this is reflected in the breadth of the referenced material. Weaknesses in design and implementation can make blockchains vulnerable to attack, and their interfaces are particularly at risk. A range of possible applications in tactical networks is explored, from supply chain management, to network management and application data immutability. Finally, a simple blockchain architecture for mobile tactical networks is developed, to illustrate the potential and challenges of this technology. Overall, it is clear that blockchain technology provides a potential avenue for solving some problems in the tactical network context, but it is not yet clear whether it is the best such solution.

The key feature of blockchain technology is data integrity in a trustless environment: transaction or data records included on the blockchain are timestamped, cryptographically protected and stored by many distributed nodes, reducing the risk of total loss. For a sufficiently long blockchain, with a large number of nodes, the records can be considered immutable, in the sense that any tampering will be evident. This integrity can be exploited in different ways to enhance the robustness and resilience of tactical networks, and some of these are discussed in Section 5.1.

Smart contracts, described in Section 3.2, also provide opportunities for robust resource management in tactical networks, particularly in complex operational conditions where many users interact in the electromagnetic (EM) spectrum. Possible applications of blockchain to resource management are discussed in Section 5.2.

Tactical environments pose particular challenges for the introduction of blockchain technology, as devices are constrained in size, weight and power, and there are physical limitations on node connectivity. These challenges are considered in Section 5.3.

An example architecture for applying blockchain technology to support tactical operations is described in Section 5.4, taking into account the opportunities and challenges outlined thus far.

In this section, network nodes are considered to be the devices or platforms connected to the blockchain network; these are not (just) the radio interfaces themselves, but may be auxiliary equipment such as biometric devices, weapons or communication platforms.

5.4 Example tactical blockchain architecture

Based on the preceding, we propose an example architecture for a tactical blockchain system. The scenario we consider consists of a unit of dismounted soldiers, each carrying several devices connected on a personal network: a weapon, a radio, a camera, a radio frequency (RF) sensor and a computer (similar to a smart phone), sharing a battery and a memory drive such as a flash card. The soldier is also considered a network component, as they are a source and sink of data, and their identity is confirmed using a networked biometric sensor such as a fingerprint or iris scanner. The other devices may be authenticated using a radio frequency identification (RFID) chip or imaging as described in Section 5.1.4; authentication will only be required if the networked component has been disconnected from the personal network and attempts to rejoin.

We assume that the weapon tracks the ammunition it uses, and records the amount remaining. The camera may be continually recording, but to limit memory usage, only a few seconds before and after the weapon is fired are retained. C2 and other messages, either digital voice or data to and from the computer, all passed via the radio, are recorded for post-action analysis. SA in the form of RF sensor data is sampled periodically, and transferred via the radio to other soldiers in the unit and recorded locally. These different sources of data all use the computer’s memory for storage; both the memory and battery usage are tracked.

We use blockchains to provide authentication and identification management for the soldiers and devices engaged in the operation, an auditing function to track cyber SA and C2, resource usage tracking, and a policy management function, which is used to support resource loading decisions across the unit. As noted in Section 5.3.6, the longer the blockchain, the stronger it is, so all these functions use the same blockchain within their cluster (Section 5.4.1).

This is a simplified scenario, intended to give insight into the potential application of blockchain technology in tactical networks. Note that, as discussed in Section 6, the fact that this technology might be used to address these problems does not mean it is the best choice. Note also that the exchange of transactions and blocks among the users is assumed to be secure.

Chinese Cyber Hackers Launch Malicious Bot

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

In March 2018, an identified financial services corporation received a thumb drive infected with the bank credential-stealing Qakbot malware variant, targeting information from networked computers and financial institution web sites. The financial services corporation purchased bulk thumb drives from a US online retailer of computer hardware. The thumb drives were originally manufactured in China. According to FBI forensic analysis, the Qakbot malware was on the infected thumb drive before the drive arrived in the United States. Qakbot is extremely persistent and requires removal of all malware from every device. Failure to remove even one node of malware may result in re-infecting previously sanitized systems possibly costing the victim hundreds of thousands of dollars in malware removal and system downtime.

Threat

Qakbot is an information stealing worm—originally discovered in 2007 with a major update in 2017—that propagates through removable drives, network shares, and Web pages. The most common vector of intrusion for Qakbot is malicious attachments to phishing emails. Once executed, Qakbot spreads to other shared folders and uses Server Message Block (SMB) protocol to infect other machines. Qakbot has keylogging capabilities, and is able to propagate across network environments through a single instance within that network. It is capable of remaining on a device through the use of registry keys and by scheduling recurring tasks to run at timed intervals. Every device connected to the network and every piece of removable media which has been attached needs to be scanned for the malware and cleaned of the infection before it can be reconnected. The most recent updates in 2017 allows Qakbot to lock users out of the active directory, preventing them from being able to work. It also deploys malicious executables into network shares, registering them as services.

Cyber actors have the capability to infect devices with malware at nearly any point in the manufacturing process. The FBI has historically seen cases of infection with malware capable of stealing credentials, gathering data on the users of a computer or network, dropping other types of malware, and serving as a “backdoor” into a secure network. It is difficult to know at which point the malware infection occurred or whether the infection was intentional, due to the international nature of hardware manufacturing.

Recommendations

To mitigate the threat of a potentially infected thumb drive, the following measures should be taken at a minimum:

Ensure the use of approved, trusted vendors for hardware purchases.

Scan all hardware, especially removable storage media, on an external system prior to its insertion into a network environment.

For signature-based intrusion detection systems, ensure that the hash value for known Qakbot variants are included. The MD5 value for the variant identified in this PIN was: ff0e3ec80faafd04c9a8b375be77c6b6. This hash value can change, so be prepared to use other advanced detection systems.

Users should protect themselves and organizations by practicing good browsing habits, ensuring they do not respond to or click on unsolicited email, and to not plug unknown USB devices into
their workstations.

If you don’t have the expertise to properly handle or identify potential cyber threats please seek out an expert who can provide the expertise needed to secure your organization.

 

Top Secret – New Documents Downloadable About JFK Assasination

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

File Name Record Num NARA Release Date Formerly Withheld Agency Doc Date Doc Type File Num To Name From Name Title Num Pages Originator Record Series Review Date Comments Pages Released
docid-32105709.pdf 178-10004-10309 26/10/2017 In Part KISS/SCOW 06/05/1975 NOTES JUNE 1975   SCOWCROFT, BRENT P/K 5 JUNE 75 3 WH SCOWCROFT MEMCONS, HANDWRITTEN août/18/2017 Participants:  Ford, Kissinger, Scowcroft.  Handwritten notes.  For typed transcript see ID# 1781000410297. 4
docid-32105710.pdf 178-10004-10308 26/10/2017 In Part KISS/SCOW 04/12/1975 NOTES APRIL 1975   SCOWCROFT, BRENT P/K 12 APR 75 2 WH SCOWCROFT MEMCONS, HANDWRITTEN août/18/2017 Participants:  Ford, Kissinger, Scowcroft.  Handwritten notes.  For typed transcript see ID# 1781000410296. 3
docid-32105711.pdf 178-10004-10307 26/10/2017 In Part KISS/SCOW 03/05/1975 NOTES JANUARY 1975   SCOWCROFT, BRENT P/K 5 MAR 75 4 WH SCOWCROFT MEMCONS, HANDWRITTEN août/18/2017 Participants:  Ford, Kissinger, Scowcroft.  Handwritten notes.  For typed transcript see ID# 1781000410295. 5
docid-32105718.pdf 178-10004-00 26/10/2017 In Part KISS/SCOW 06/26/1975 MEMORANDUM JUNE 26, 1975     MEMORANDUM OF CONVERSATION 3 WH SCOWCROFT MEMCONS mars/17/2016 Memorandum of conversation, participants:  Ford, Kissinger, Scowcroft 4
docid-32105722.pdf 178-10004-10296 26/10/2017 In Part KISS/SCOW 04/12/1975 MEMORANDUM APRIL 12, 1975     MEMORANDUM OF CONVERSATION 2 WH SCOWCROFT MEMCONS août/18/2017 Memorandum of conversation, participants: Ford, Kissinger, Scowcroft. 3
docid-32105723.pdf 178-10004-10295 26/10/2017 In Part KISS/SCOW 03/05/1975 MEMORANDUM MARCH 5, 1975     MEMORANDUM OF CONVERSATION 4 WH SCOWCROFT MEMCONS août/18/2017 Memorandum of conversation, participants:  Ford, Kissinger, Scowcroft. 5
docid-32105754.pdf 178-10004-10264 26/10/2017 In Part MATHENY 09/06/1962 MEMORANDUM DRAFT REPORT–APPROVAL OF QUOTATIONS (2) RECORD   MINUTES OF MEETING OF SPECIAL GROUP (AUGMENTED) ON MONGOOSE, 9/6/62 5 NSC SSC SERIES août/18/2017 Unmarked but probably TOP SECRET. 6
docid-32105759.pdf 178-10004-10259 26/10/2017 In Part MATHENY 09/14/1962 MEMORANDUM DRAFT REPORT–APPROVAL OF QUOTATIONS (2) RECORD PARROTT, THOMAS A. MINUTES OF MEETING OF THE SPECIAL GROUP (AUGMENTED), 14 SEPT. 1962 2 NSC SSC SERIES août/18/2017 Unmarked but contains classified information. 3
docid-32105780.pdf 178-10004-10238 26/10/2017 In Part MATHENY 11/24/1976 LIST DOCUMENT REQUESTS–COMPUTER PRINTOUT     CHURCH COMMITTEE REPORT 36 NSC SSC SERIES août/18/2017 Computer printout showing documents requested by the Church Committee. Annotated.  Reduced. 37
docid-32112745.pdf 178-10004-10091 26/10/2017 In Part WILDEROTTE 05/30/1975 REPORT RPT. ON INVEST. OF CIA INVOLVE..FOREIGN LEAD.   BELIN, DAVID SUMMARY OF FACTS, INVEST. CIA INVOLVE. IN PLANS TO ASSASS…LEADERS 83 ROCK ASSASSINATION-RELATED MATERIALS août/18/2017 Later draft can be found at 1781000310355. 84
docid-32112987.pdf 178-10003-10318 26/10/2017 In Part DUVAL78-67 06/00/1975 REPORT INTELLIGENCE INVESTIGATION, MISC. (2)   BUCHEN, PHIL CASTRO 37 WH ACCESSION 78-67 (UNPROCESSED) août/18/2017 Unmarked, but TS elsewhere.  Draft.  Pages with revisions taped over paragraphs were copied as originally typed and with changes,for preservation purposes. 37
docid-32113185.pdf 124-10001-10059 26/10/2017 In Part FBI 12/09/1963 PAPER, TEXTUAL DOCUMENT 100-10461-1458 SAC, DL BROWN, W. HARLAN 2 FBI DL sept/19/2017   3
docid-32113207.pdf 124-10001-10081 26/10/2017 In Part FBI 12/13/1963 PAPER, TEXTUAL DOCUMENT 100-10461-1437 DIRECTOR, FBI OFLAHERTY, JOHN JAMES 39 FBI DL sept/19/2017   39
docid-32113221.pdf 124-10001-10095 26/10/2017 In Part FBI 12/16/1963 PAPER, TEXTUAL DOCUMENT 100-10461-1423 DIRECTOR, FBI ESTEP, THOMAS B. 6 FBI DL sept/19/2017   6
docid-32113382.pdf 124-10001-10256 26/10/2017 In Part FBI 12/01/1963 PAPER, TEXTUAL DOCUMENT 100-10461-492 DIRECTOR, FBI TWINER, GROVER C. 10 FBI DL sept/19/2017   10
docid-32113488.pdf 124-10001-10362 26/10/2017 In Part FBI 12/06/1963 PAPER, TEXTUAL DOCUMENT 100-10461-901 DIRECTOR, FBI BROWN, WILLIAM S. 6 FBI DL sept/19/2017   6
docid-32113638.pdf 124-10002-10012 26/10/2017 In Part FBI 04/06/1964 PAPER, TEXTUAL DOCUMENT 100-10461-5056 SAC, NY DIRECTOR, FBI 1 FBI DL août/15/2017   2
docid-32113668.pdf 124-10002-10042 26/10/2017 In Part FBI 12/20/1963 PAPER, TEXTUAL DOCUMENT 100-10461-1824 DIRECTOR, FBI SAC, SF   5 FBI DL sept/19/2017   5
docid-32113682.pdf 124-10002-10056 26/10/2017 In Part FBI 12/18/1963 PAPER, TEXTUAL DOCUMENT 100-10461-1839 DIRECTOR, FBI ESTEP, THOMAS B. 5 FBI DL sept/19/2017   5
docid-32113686.pdf 124-10002-10060 26/10/2017 In Part FBI 12/16/1963 PAPER, TEXTUAL DOCUMENT 100-10461-1844 DIRECTOR, FBI SAC, TP   2 FBI DL sept/19/2017   2
docid-32113908.pdf 124-10002-10282 26/10/2017 In Part FBI 06/03/1964 PAPER, TEXTUAL DOCUMENT 100-10461-6569, 6570 DIRECTOR, FBI SAC, MM   2 FBI DL sept/19/2017 INC LHM 2
docid-32113964.pdf 124-10002-10338 26/10/2017 In Part FBI 06/10/1964 PAPER, TEXTUAL DOCUMENT 100-10461-6633 DIRECTOR, FBI OCONNOR, JAMES J. 24 FBI DL sept/19/2017   24
docid-32114164.pdf 124-10003-10038 26/10/2017 In Part FBI 03/06/1964 PAPER, TEXTUAL DOCUMENT 100-10461-4030 DIRECTOR, FBI SAC, AQ   2 FBI DL août/15/2017   3
docid-32114180.pdf 124-10003-10054 26/10/2017 In Part FBI 03/04/1964 PAPER, TEXTUAL DOCUMENT 100-10461-4012, 4013 SAC, CG MURPHY, ROBERT O. 6 FBI DL sept/19/2017 INC LHM 6
docid-32114232.pdf 124-10003-10106 26/10/2017 In Part FBI 09/30/1964 PAPER, TEXTUAL DOCUMENT 100-10461-8193 DIRECTOR, FBI HURLEY, JOHN D. JR. 8 FBI DL sept/19/2017   8
docid-32114444.pdf 124-10003-10318 26/10/2017 In Part FBI 09/03/1964 PAPER, TEXTUAL DOCUMENT 100-10461-7794 DIRECTOR, FBI CALLENDER, STEPHEN M. 32 FBI DL août/15/2017   32
docid-32114649.pdf 124-10004-10023 26/10/2017 In Part FBI 00/00/0000 PAPER, TEXTUAL DOCUMENT 100-10461-SEE COMMENTS       34 DOS DL août/29/2017 100-10461-9199,9200,9201,9202,9203,9204,9205,9206,9207,9208,9209,9210, INC DOS MEMOS, LIST, AIRGRAMS, CIT LTR 34
docid-32114705.pdf 124-10005-10047 26/10/2017 In Part FBI 07/23/1964 PAPER, TEXTUAL DOCUMENT 100-10461-7304, 7305 DIRECTOR, FBI SAC, NY   3 FBI DL sept/19/2017 INC LTR, A/T 3
docid-32115207.pdf 124-10006-10049 26/10/2017 In Part FBI 06/18/1964 PAPER, TEXTUAL DOCUMENT 100-10461-6723 SAC, DL KUYKENDALL, EDWIN D. 5 FBI DL sept/19/2017   5
docid-32115208.pdf 124-10006-10050 26/10/2017 In Part FBI 06/19/1964 PAPER, TEXTUAL DOCUMENT 100-10461-6724 SAC, DL KUYKENDALL, EDWIN D. 2 FBI DL sept/19/2017   2
docid-32118518.pdf 124-10012-10355 26/10/2017 In Part FBI 11/23/1963 PAPER, TEXTUAL DOCUMENT 62-109060-4TH NR 1275 DIRECTOR, FBI SAC, NK   1 FBI HQ août/23/2017   2
docid-32121519.pdf 124-10018-10356 26/10/2017 In Part FBI 11/27/1963 PAPER, TEXTUAL DOCUMENT 62-109060-342 DIRECTOR, FBI SAC, LA   2 FBI HQ août/23/2017   2
docid-32121528.pdf 124-10018-10365 26/10/2017 In Part FBI 11/24/1963 PAPER, TEXTUAL DOCUM