Skip to content
Bernd Pulch Unknown's avatar

Bernd Pulch

The official Website of Bernd Pulch. Since 2009 providing critical insights and political Satire on lawfare, media control, and political reality. Avoid fake sites.

  • CREDO: FREEDOM, HUMAN RIGHTS, PEACE AND A DEMOCRATIC SOCIETY NEED INVESTIGATIVE JOURNALISM
  • ABOUT ME
  • FREEDOM
  • JOURNALISM
  • MURDER OF JOURNALISTS AND TRUTHSEEKERS
  • MURDER AND EXECUTIONS
  • NUCLEAR WAR
  • TOP SECRET
  • TOXDAT
  • CONSPIRACY PRACTICE
  • CYBER-STASI
  • STASI
  • STASI NAMES-STASI NAMEN
  • ANGELA MERKEL – IM ERIKA
  • A-Z- 2.000 STASI – OFFIZIERE IM BESONDEREN EINSATZ – OibE – “SCHLÄFERLISTE DER STASI IN WESTDEUTSCHLAND”- STASI-SLEEPER LIST A-Z
  • FINANCE INDUSTRY
  • BILDERBERG
  • FINANCIAL DISCLOSURE
  • CORRUPTION
  • BILLIONAIRES, “PHILANTHROPS”, THE GOOD CLUB
  • BILL GATES, BILL & MELINDA GATES FOUNDATION,
  • JEFFREY EPSTEIN
  • WEF
  • THE SECRET LIST OF Off-SHORE-COMPANIES, PERSONS AND ADRESSES
  • INTELLIGENCE
  • FSB
  • GRU
  • KGB
  • KGB SPIES NAMES
  • NORTH KOREA
  • CHINA
  • NAZI
  • THE NATIONAL SECURITY AGENCY (NSA)
  • CYBERCRIME
  • BDVP-Cottbus
  • BDVP-Dresden
  • BDVP-Frankfurt/Oder
  • BDVP-Gera
  • BDVP-Erfurt
  • BDVP-Halle
  • BDVP-Karl-Marx-Stadt
  • BDVP-Leipzig
  • BDVP-Magdeburg
  • BDVP- Neubrandenburg
  • BDVP- Potsdam
  • BDVP- Rostock
  • BDVP- Schwerin
  • BDVP- Suhl
  • HSDVP-KARL-LIEBKNECHT
  • COVID19
  • DOCUMENTARY
  • VIDEO
  • COMEDY
  • MOVIES
  • FEATURE FILM
  • NEWS
  • MEDIA MEMBERS Of PROJECT-SYNDICATE.ORG FINANCED BY GATES, SOROS, ZEIT ETC – ORIGINAL DOCUMENT
  • MOON – UNIFICATION CHURCH
  • CONTRACT BETWEEN EU & MODERNA
  • CONTRACT BETWEEN EU & ASTRA ZENECA
  • CONTRACT BETWEEN EU & PFIZER/BIONTECH
  • MYSTERIOUS PAYMENTS TO FAMILY OF EU HEALTH COMMISSIONER KYRIAKIDES
  • U.S. AIR FORCE – POSTCOVID19 WORLD SCENARIOS
  • CIA OPERATION MOCKINGBIRD
  • INDIAN LAWYERS’ BAR ACCUSE BILL GATES, FAUCI, WHO ET AL TO HEAD CRIMINAL CONSPIRACY
  • ID2020
  • HOUSE REPUBLICANS INVESTIGATION REPORT ON ORIGINS OF COVID19 IN WUHAN
  • EXPOSED –  Documents From His FOUNDATION Show Bill Gates Has Given $319 Million to Media Outlets
  • CONTACT

Tag: Fbi Komi

Exposed – FBI National Instant Criminal Background Check System (NICS) Presentation

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

National Instant Criminal Background Check System (NICS)

Page Count: 25 pages
Date: 2016
Restriction: Law Enforcement Sensitive
Originating Organization: Federal Bureau of Investigation, Criminal Justice Information Systems Division
File Type: pdf
File Size: 1,343,832 bytes
File Hash (SHA-256):0E6448F6CF16E5046871E1CDFA3DEDCCCA00237DD2B507AD0EB5ADAE1DA6A0D6

Download File

 

  • NICS Overview
  • Federal Firearm Prohibitions
  • NICS Access
  • Disposition of Firearm and Permit Checks
  • Conducting a Query with all NICS Protection Orders Returned (QNP)
  • Law Enforcement Enterprise Portal (LEEP)
  • NICS Denied Transaction File (DTF)
  • Contact Information

…

Title 18, United States Code, Section 922

  • (g)(1) Convicted of a crime punishable by more than one year or a misdemeanor punishable by more than two years
  • (g)(2) Fugitives from justice
  • (g)(3) Unlawful user of or addicted to any controlled substance
  • (g)(4) Adjudicated/committed to a mental institution
  • (g)(5) Illegal/unlawful aliens
  • (g)(6) Dishonorable discharge from military
  • (g)(7) Renounced U.S. Citizenship
  • (g)(8) Protection/restraining order
  • (g)(9) Misdemeanor crimes of domestic violence
  • (n) Under indictment/information for a crime punishable by more than one year or a misdemeanor punishable by more than two years

…

fbi-nics_page_04fbi-nics_page_05fbi-nics_page_11fbi-nics_page_12fbi-nics_page_13

Go back

Your message has been sent

Warning
Warning
Warning
Warning

Warning.

Fbi Most Wanted, Fbi Jobs, Fbi Director, Fbi Salary, Fbi Agent, Fbi Background Check, Fbi Agent Salary, Fbi Headquarters, Fbi Special Agent, Fbi Internships, Fbi Agent, Fbi Agent Salary, Fbi Academy, Fbi Application, Fbi Analyst, Fbi Atlanta, Fbi Agent Jobs, Fbi Anon, Fbi Address, Fbi Arrests, Fbi Background Check, Fbi Badge, Fbi Bau, Fbi Building, Fbi Boston, Fbi Bap, Fbi Baltimore, Fbi Benefits, Fbi Budget, Fbi Building Dc, Fbi Careers, Fbi Crime Statistics, Fbi Clearance, Fbi Criminal Background Check, Fbi Chicago, Fbi Citizens Academy, Fbi Crime Statistics By Race, Fbi Contact, Fbi Channeler, Fbi Candidates, Fbi Director, Fbi Director Candidates, Fbi Director James Comey, Fbi Definition, Fbi Director Fired, Fbi Director Salary, Fbi Definition Of Terrorism, Fbi Database, Fbi Dallas, Fbi Drug Policy, Fbi Employment, Fbi Email Address, Fbi Employment Drug Policy, Fbi El Paso, Fbi Employees, Fbi Emblem, Fbi Established, Fbi Education Center, Fbi Education, Fbi Executive Branch, Fbi Fingerprinting, Fbi Files, Fbi Field Offices, Fbi Fingerprint Card, Fbi Fitness Test, Fbi Facebook, Fbi Fingerprint Check, Fbi Forensic Accountant, Fbi Foia, Fbi Founder, Fbi Glock, Fbi Games, Fbi Gov, Fbi Glassdoor, Fbi Guns, Fbi Gang List, Fbi Gun Statistics, Fbi Gif, Fbi Gift Shop, Fbi General Counsel, Fbi Headquarters, Fbi Hrt, Fbi History, Fbi Houston, Fbi Hiring, Fbi Hate Crime Statistics, Fbi Head, Fbi Hat, Fbi Honors Internship, Fbi Hotline, Fbi Internships, Fbi Investigation, Fbi Intelligence Analyst, Fbi Informant, Fbi Irt, Fbi Investigation Trump, Fbi Ic3, Fbi Infragard, Fbi Internet Fraud, Fbi Id, Fbi Jobs, Fbi Jacket, Fbi James Comey, Fbi Jurisdiction, Fbi Job Description, Fbi Jobs Apply, Fbi Jacksonville, Fbi Jade Helm, Fbi Jobs Chicago, Fbi Jackson Ms, Fbi Kansas City, Fbi Kids, Fbi Knoxville, Fbi Kidnapping, Fbi Komi, Fbi Kentucky, Fbi Killed Jfk, Fbi Kkk, Fbi Kodi, Fbi K9 Unit, Fbi Logo, Fbi Leeda, Fbi Los Angeles, Fbi Locations, Fbi Las Vegas, Fbi Leaks, Fbi Leader, Fbi Linguist, Fbi Louisville, Fbi Login, Fbi Most Wanted, Fbi Most Wanted List, Fbi Meaning, Fbi Meme, Fbi Movies, Fbi Museum, Fbi Motto, Fbi Miami, Fbi Mission Statement, Fbi Most Dangerous Cities, Fbi Number, Fbi News, Fbi National Academy, Fbi Nics, Fbi New York, Fbi New Orleans, Fbi Newark, Fbi New York Tv Show, Fbi Near Me, Fbi Nominee, Fbi Offices, Fbi Org Chart, Fbi Omaha, Fbi Operative, Fbi On Trump, Fbi Organizational Chart, Fbi Obama Meme, Fbi Obama, Fbi Oklahoma City, Fbi Office Near Me, Fbi Phone Number, Fbi Profiler, Fbi Pft, Fbi Police, Fbi Pay Scale, Fbi Phoenix, Fbi Pay, Fbi Philadelphia, Fbi Positions, Fbi Pittsburgh, Fbi Quantico, Fbi Qualifications, Fbi Q Target, Fbi Quotes, Fbi Quiz, Fbi Questions, Fbi Qr Code, Fbi Qas, Fbi Quantico Address, Fbi Quantico Tours, Fbi Requirements, Fbi Russia, Fbi Russia Investigation, Fbi Report, Fbi Ranks, Fbi Recruiting, Fbi Raid, Fbi Records, Fbi Rape Statistics, Fbi Russia Trump, Fbi Salary, Fbi Special Agent, Fbi Stands For, Fbi Swat, Fbi Special Agent Salary, Fbi Surveillance, Fbi Statistics, Fbi Sos, Fbi Surveillance Van, Fbi Seal, Fbi Training, Fbi Top Ten, Fbi Trump, Fbi Trump Russia, Fbi Tip Line, Fbi Tv Shows, Fbi Twitter, Fbi Tips, Fbi Teen Academy, Fbi Tours, Fbi Ucr, Fbi Ucr 2016, Fbi Units, Fbi Ucr 2015, Fbi Undercover, Fbi Unsolved Cases, Fbi Upin, Fbi Utah, Fbi Usa, Fbi Uniforms, Fbi Vs Cia, Fbi Vault, Fbi Virus, Fbi Vs Apple, Fbi Virtual Academy, Fbi Vehicles, Fbi Violent Crime Statistics, Fbi Virginia, Fbi Van, Fbi Van Wifi, Fbi Website, Fbi Warning, Fbi Wiki, Fbi Wanted List, Fbi Watch List, Fbi Windbreaker, Fbi Warning Screen, Fbi White Collar Crime, Fbi Warrant Search, Fbi Weapons, Fbi X Files, Fbi Xl2, Fbi Xl31, Fbi Xl4, Fbi Xl2 Programming, Fbi Xl-31 Troubleshooting, Fbi Xl 31 Installation Manual, Fbi X Files Real, Fbi Xl2t Installation Manual, Fbi Xl 1215, Fbi Yearly Salary, Fbi Youtube, Fbi Youth Academy, Fbi Youth Leadership Academy, Fbi Yellow Brick Road, Fbi Youth Programs, Fbi Yearly Budget, Fbi Youth Leadership Academy Portland, Fbi Youngstown Ohio, Fbi Yearly Income, Fbi Zodiac Killer, Fbi Zodiac, Fbi Zip Code, Fbi Zodiac Killer List, Fbi Zero Files, Fbi Zodiac List, Fbi Zodiac Signs Killer, Fbi Zhang Yingying, Fbi Zion, Fbi Zodiac Crimes

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, FBI *, PUBLIC INTELLIGENCE, SECRET October 6, 2016June 21, 2021 4 Minutes

Revealed – FBI Cyber Bulletin: Malware Targeting Foreign Banks

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

A-000073-MW

Page Count: 19 pages
Date: May 23, 2016
Restriction: TLP: GREEN
Originating Organization: Federal Bureau of Investigation, Cyber Division
File Type: pdf
File Size: 751,757 bytes
File Hash (SHA-256):B10AF987BF17BA217DED942BA847D9CF6DB8B38A0AE40B937FA4B031CB79EFC8

Download File

The FBI is providing the following information with HIGH confidence:

The FBI has obtained information regarding a malicious cyber group that has compromised the networks of foreign banks. The actors have exploited vulnerabilities in the internal environments of the banks and initiated unauthorized monetary transfers over an international payment messaging system. In some instances, the actors have been present on victim networks for a significant period of time. Contact law enforcement immediately regarding any activity related to the indicators of compromise (IOCs) in the attached appendix that are associated with this group.

Technical Details

The FBI is providing the following information with HIGH confidence:

The enclosed IOCs have been employed by a cyber group linked to intrusions at foreign banks. Malicious insiders or external attackers have managed to submit international payment messages from financial institutions’ back-offices, PCs or workstations connected to their local interface to the international payment messaging system network. The group utilized malware that appears to have been customized for each victim environment. The malware is designed to hide evidence by removing some of the traces of the fraudulent messages. The observed malware samples were designed to securely delete themselves once they completed their tasks, removing evidence of their existence. Additionally, the intruders appear to have performed extensive network reconnaissance using remote access Trojans, keyloggers, screen grabbers, and a variety of legitimate Windows system administration utilities. In addition to these IOCs, the FBI recommends recipient organizations be alert to any changes to directories where international payment messaging system software has been installed.

…

Recommended Mitigations for Institutions with Connections to Payment Messaging Systems

Logically Segregate Your Operating Environment

  • Use firewalls to divide your operating environment into enclaves.
  • Use access control lists to permit/deny specific traffic from flowing between those enclaves.
  • Give special consideration to segregating enclaves holding sensitive information (for example, systems with customer records) from enclaves that require Internet connectivity (for example, email systems)

Isolate Payment Messaging Platforms

  • For institutions that access payment messaging platforms through private networks, confirm perimeter security controls prevent Internet hosts from accessing the private network infrastructure.
  • For institutions that access payment messaging platforms over the Internet, confirm perimeter security controls prevent Internet hosts other than payment messaging platform endpoints from accessing the infrastructure used for payment system access.

Routinely Confirm the Integrity of Secondary Security Controls

  • Perform monthly validation of transactional integrity systems, such as printers or secondary storage systems.
  • Perform monthly validation of payment messaging activity by performing telephone confirmation of transfer activity.

Routinely Test Operating Protocols

  • Confirm staffing plans for non-business, non-critical operating hours.
  • Ensure staff members understand payment messaging transfer protocols, along with emergency transfer protocols.

Monitor for Anomalous Behavior as Part of Layered Security

  • Develop baseline of expected software, users and logons. Monitor hosts running payment applications for unusual software installations, updates, account changes, or other activities outside of expected behavior.
  • Develop baseline of expected transaction participants, amounts, frequency and timing. Monitor and flag anomalous transactions for suspected fraudulent activity.

Recommended Mitigations for All Alert Recipients

The FBI is providing the following information with HIGH confidence:

  • Prepare Your Environment for Incident Response
    • Establish Out-of-Band Communications methods for dissemination of intrusion response plans and activities, inform NOCs/CERTs according to institutional policy and SOPs.
    • Maintain and actively monitor centralized host and network logging solutions after ensuring that all devices have logging enabled and their logs are being aggregated to those centralized solutions.
    • Disable all remote (including RDP) access until a password change has been completed.
    • Implement full SSL/TLS inspection capability (on perimeter and proxy devices).
    • Monitor accounts and devices determined to be part of the compromise to prevent reacquisition attempts.
    • Implement core mitigations to inhibit re-exploitation (within 72 hours)
    • Implement a network-wide password reset (preferably with local host access only, no remote changes allowed) to include:

A patch management process that regularly patches vulnerable software remains a critical component in raising the difficulty of intrusions for cyber operators. While a few adversaries use zero-day exploits to target victims, many adversaries still target known vulnerabilities for which patches have been released, capitalizing on slow patch processes and risk decisions by network owners not to patch certain vulnerabilities or systems.

After initial response activities, deploy and correctly configure Microsoft’s Enhanced Mitigation Experience Toolkit (EMET). EMET employs several mitigation techniques to combat memory corruption techniques. It is recommended that all hosts and servers on the network implement EMET, but for recommendations on the best methodology to employ when deploying EMET, please see NSA/IAD’s Anti-Exploitation Slick sheet – https://www.nsa.gov/ia/_files/factsheets/I43V_Slick_Sheets/Slicksheet_AntiExploitationFeatures_Web.pdf

Implement Data-At-Rest (DAR) Protections.

  • The goal for DAR protections is to prevent an attacker from compromising sensitive data when the End User Device (EUD) is powered off or unauthenticated.
  • The use of multiple encryption layers that meet IAD and CNSSP-15 guidance, implemented with components meeting the Commercial Solution for Classified (CSfC) vendor diversity requirements, reduces the likelihood that a single vulnerability or failure can be exploited to compromise EUDs, move laterally through a network, and access sensitive data.
  • Receiving and validating updates or code patches for these components only through direct physical administration or an NSA approved Data in Transit (DIT) solution mitigates the threat of malicious attempts to push unverified updates or code updates.
  • Procure products that have been validated through NIAP’s DAR Protection Profiles (PPs) and utilize the DAR Capability Package (CP) that provides configurations allowing customers to independently implement secure solutions using layered Commercial Off-the-Shelf (COTS) products. The CP is vendor-agnostic and provides high-level security and configuration guidance for customers and/or Solution Integrators.

Implement long-term mitigations to further harden systems

1. Protect Credentials: By implementing the following credential protections, the threat actor’s ability to gain highly privileged account access and move throughout a network is severely hampered.

a. Implement Least Privilege: Least privilege is the limiting of rights assigned to each group of accounts on a network to only the rights required for the user, as in a normal user is only granted user level privileges and cannot perform any administrative tasks such as installing software.

b. Restrict Local Accounts: By restricting the usage of local accounts, especially local administer accounts, you are able to reduce the amount of usable credentials found within a network. When utilizing local accounts, passwords and their corresponding hashes are stored on the host and are more readily available for harvesting by an adversary who seeks to establish persistence. Adversaries are known to use this information to move across the network through Pass the Hash.

c. Limit lateral movement: This mitigation reduces the adversary’s ability to go from exploiting one machine to taking over the entire network. Host firewall rules, Active Directory structuring, and/or Group Policy settings, can be tailored to stop communications between systems and increase the survivability and defensibility of a network under attack.

d. Admin Access Segregation: Once an adversary gains administrator credentials, especially domain administrator credentials, the network becomes wide open to their malicious activity. By decreasing the surface area where administrator credentials can be stolen, through restricting where administrators can use their accounts and what they can use their accounts for, the threat actor will have a much harder time fully compromising a network. Having different passwords and credentials for user, local administrator, and domain administrator accounts prevents an adversary from reusing a stolen credential from one to gain more access.

e. Admin Access Protection: Using encrypted protocols across the network where credentials especially administrative credentials, are sent in the clear enables an adversary to grab them in transit and reuse them. Be sure to use encrypted protocols (e.g. HTTPS, SSH, RDP, SFTP, etc.) for all management connections where credentials are passed, and disable the use of unencrypted protocols (e.g. Telnet, FTP, HTTP, etc.).

f. Ensure Administrative Accounts do not have email accounts or Internet access.

g. Utilize Strong Authentication: By enforcing multi-factor authentication (e.g., using smart cards), especially for privileged account and remote access (e.g. VPNs), you dramatically reduce when and where stolen credentials can be reused by an adversary. Until then, create, enforce, and maintain strong password policies across the organization. The use of strong password policies must be mandated for all users and is especially critical for administrator accounts and service accounts. Passwords should be complex and contain a combination of letters, numbers, and special characters, and they should be of a sufficient length (greater than 14 characters); require regular password changes for all administrative and other privileged account; and prevent the reuse of usernames and passwords across multiple domains and/or multiple systems.

h. Log and Monitor Privileged Admin Account Usage: Implementing logging and monitoring capabilities on privileged accounts can provide insight to system owners and incident response professionals of account misuse and potential compromise by malicious actors. For instance it may be discovered that a domain admin is logging in at 2200 every night even though that admin is done working for the day and gone from the building. This mitigation would also enable discovery of any privileged admin accounts that were created by the actor for persistence.

i. Log and Monitor Use of Administrative Tools: Non-administrative use of built-in OS administrative tools should be locked down in accordance with applicable guidance and hardening policies. Use of these tools, such as Windows® PowerShell® and Windows Management Instrumentation Command-line (WMIC), should be logged and monitored to help enable early detection of a compromise. Though administration activities take place on a constant basis, certain behaviors, or sets of activities, in concert with others, are suspicious and can lead to a discovery of intrusion. For example, the ‘ping’ command by itself has legitimate uses. However, the ‘ping’ command followed by a PowerShell command from one workstation to another is very suspicious.

2. Segregate Networks and Functions:

a. Know Your Network: Enterprise networks often become unmanageable leading to inefficient administration and ineffective security. In order to have any sort of control over your network, you first need to know what and where everything is and does. Ensure information about your networks is documented and is updated regularly. Create an accurate list of ALL devices and ALL protocols that are running on your network. Identify network enclaves and examine your network trust relationships within and between those enclaves as well as with external networks to determine whether they are really necessary for your organization’s mission.

b. DMZ Isolation: By ensuring that the DMZ is properly segregated both through physical and logical network architecture and admin/user accounts, a network owner can greatly decrease the external attack surface. Since webservers and corresponding databases usually sit in this location and are also externally accessible, they regularly are the first target during CNO. If these systems are compromised and the DMZ is not configured properly or at all, it could mean the loss of the entire enterprise.

c. Network Function Segregation: A network owner should implement a tiered system when determining the switching within a network. This way the lower security systems, like user workstations or machines with email and internet access, cannot insecurely communicate with higher security systems like domain controllers and other member servers. This can be achieved through multiple methods including VLANs, physical network topologies, and firewall rule sets. In the same vein, networks need to apply the same segregation principle to the various tiers of accounts within a network, ensuring highly privileged accounts cannot access lower security tiered systems and low privilege accounts cannot access higher security tiered systems.

d. Limit Workstation-to-Workstation Communications: Pass-the-Hash (PtH) and other forms of legitimate credential reuse are serious vulnerabilities existing in all environments that implement Single Sign-on. PtH allows an attacker to reuse legitimate administrator or user credentials to move from system to system on a network without ever having to crack password. Once an attacker compromises a single host, s/he will typically reuse stolen hashed credentials to spread to other systems on the network, gain access to a privileged user’s workstation, grab domain administrator credentials, and subsequently take control of the entire environment. Limiting workstation-to-workstation communication will severely restrict attackers’ freedom of movement via techniques such as PtH. In general, limiting the number and type of communication flows between systems also aids in the detection of potentially malicious network activity. Because there are fewer allowed communication paths, abnormal flows become more apparent to attentive network defenders.

e. Perimeter Filtering: Perimeter filtering refers to properly implementing network security devices, such as proxies, firewall, web content filters, and IDS/IPS. The intent is to block malicious traffic from reaching a user’s machine and provide protection against data exfiltration and command and control.

f. Use Web Domain Name System (DNS) Reputation: Various commercial services offer feeds rating the trustworthiness of web domains. Enterprises can protect their hosts by screening web accesses against such services and redirecting dangerous web requests to a warning page. Inspection can be implemented at either the web proxy or browser level.

g. Restrict or Prevent Remote Admin Access: Prior to an intrusion, remote access should be severely restricted and highly monitored. Once an intrusion is detected, all remote administration should be completely disallowed. Not only does this clear up the network traffic coming and going from a network, it also allows the network defenders to determine that the remote administration activities are malicious and better track and block them.

3. Implement Application Whitelisting: Application whitelisting is the configuring of host system to only execute a specific, known set of code. Basically, if a program or executable code, such as a piece of malware, is not included in the whitelist it’s never allowed to run.

4. Install and correctly use EMET: One of the frequently used tactics by an adversary is to initially infect a host through spear-phishing and drive-by’s/water-holing websites. The best way to counter this initial exploitation is through the implementation of an anti-exploitation tool, such as Microsoft’s Enhanced Mitigation Experience Toolkit (EMET). These tools can render useless entire classes of malware and malicious TTP instead of eliminating one piece of malware at a time; an enormous boon to a network’s security.

5. Implement Host Intrusion Prevention System (HIPS) Rules: Standard signature-based host defenses are overwhelmed by exploit kits that continually morph attack components. HIPS technology focuses on threat behaviors and can better scale to entire sets of intrusion activities. For an enterprise with a well-configured and managed network, HIPS can be tuned to learn and allow normal network functionality while flagging anomalies characteristic of intrusions.

6. Centralize logging of all events: By pulling all of the system logs (such as Windows Event or Error logs, and any logs from security devices, such as SNORT, HIPS or firewall rule hits, as a few examples) into a centralized location that protects it from tampering and enables analytics, the network admin and intrusion response team would be able to more efficiently detect and understand the tools, tactics, and procedures of the adversary. This paper does not detail the entirety of logs that could be aggregated, however, specific recommendations of particular logs that should be targeted for aggregation can be obtained via consultation with the network’s Computer Network Defense-Service Provider (CND-SP) or with any of the organizations listed in the introduction of this section.

7. Take Advantage of Software Improvement: Apply patches for vulnerabilities as soon as they are released by the vendor. Upgrade as new versions of applications, software and operating systems become available. Delaying or ignoring patches for vulnerabilities considerably increases the chance of systems being exploited, in particular Internet/public facing systems (VPN, web, email servers). Open source research has shown that a working exploit is often available on the same day vulnerabilities are publicly disclosed, making it imperative to patch immediately. Vendors typically perform extensive testing of patches prior to release so misconceptions about negative effects on systems are often overstated. The cost of pre-deployment testing by the enterprise is miniscule compared to the potential costs incurred from a security breach. Application deployment and updating is becoming increasingly automated. Many operating systems and applications provide automatic update features to minimize the human factor.

8. Public Services Utilization: Enterprises are embracing the use of public services such as Cloud Storage and Social Networking Sites (SNS) as they offer capabilities not available with traditional software. These services also introduce a new set of vulnerabilities that must be considered. Open source reporting has shown these services to be an increasingly used vector for both malware delivery and data exfiltration. Establish a comprehensive public services policy and framework. Discover and document all the Cloud and Social Networking Services used and establish a policy that includes IT sanctioned sites permitted and prohibited within the enterprise as well as what is considered acceptable use. Integrate traffic logs to/from these sites into your centralized logging environment and implement analytics to detect and alert on potentially suspicious or abnormal traffic that could be indicative of a compromise.

9. Use a Standard Baseline: Implementing a uniform image with security already baked in and standardized applications affords the incident response team the ability to look at exploited machines and distinguish what is malicious vs. allowed. It also ensures that each machine on network is at least at a certain level of security prior to further customization for a user’s needs. Within the DoDIN this can be satisfied through the Unified Master Gold Disk, maintained and distributed through DISA.

10. Centralize logging of all events: By pulling all of the system logs, such as Windows Event or Error logs, and any logs from security devices, such as SNORT or firewall rule hits, into a centralized location, the network admin and intrusion response team would be able to more efficiently detect and understand the tools, tactics, and procedures of the adversary. Using this information then increases the responder’s ability to effectively corner and expel the adversary.

11. Data-at-Rest and Data-in-Transit Encryption: Implementing encryption for both data at rest and data in transit ensures that what is meant to be kept private stays private, whether it is stored on a disk or moving across a network. It means that exfiltration and espionage attempts can be thwarted since a threat actor cannot access the information.

Go back

Your message has been sent

Warning
Warning
Warning
Warning

Warning.

Fbi Most Wanted, Fbi Jobs, Fbi Director, Fbi Salary, Fbi Agent, Fbi Background Check, Fbi Agent Salary, Fbi Headquarters, Fbi Special Agent, Fbi Internships, Fbi Agent, Fbi Agent Salary, Fbi Academy, Fbi Application, Fbi Analyst, Fbi Atlanta, Fbi Agent Jobs, Fbi Anon, Fbi Address, Fbi Arrests, Fbi Background Check, Fbi Badge, Fbi Bau, Fbi Building, Fbi Boston, Fbi Bap, Fbi Baltimore, Fbi Benefits, Fbi Budget, Fbi Building Dc, Fbi Careers, Fbi Crime Statistics, Fbi Clearance, Fbi Criminal Background Check, Fbi Chicago, Fbi Citizens Academy, Fbi Crime Statistics By Race, Fbi Contact, Fbi Channeler, Fbi Candidates, Fbi Director, Fbi Director Candidates, Fbi Director James Comey, Fbi Definition, Fbi Director Fired, Fbi Director Salary, Fbi Definition Of Terrorism, Fbi Database, Fbi Dallas, Fbi Drug Policy, Fbi Employment, Fbi Email Address, Fbi Employment Drug Policy, Fbi El Paso, Fbi Employees, Fbi Emblem, Fbi Established, Fbi Education Center, Fbi Education, Fbi Executive Branch, Fbi Fingerprinting, Fbi Files, Fbi Field Offices, Fbi Fingerprint Card, Fbi Fitness Test, Fbi Facebook, Fbi Fingerprint Check, Fbi Forensic Accountant, Fbi Foia, Fbi Founder, Fbi Glock, Fbi Games, Fbi Gov, Fbi Glassdoor, Fbi Guns, Fbi Gang List, Fbi Gun Statistics, Fbi Gif, Fbi Gift Shop, Fbi General Counsel, Fbi Headquarters, Fbi Hrt, Fbi History, Fbi Houston, Fbi Hiring, Fbi Hate Crime Statistics, Fbi Head, Fbi Hat, Fbi Honors Internship, Fbi Hotline, Fbi Internships, Fbi Investigation, Fbi Intelligence Analyst, Fbi Informant, Fbi Irt, Fbi Investigation Trump, Fbi Ic3, Fbi Infragard, Fbi Internet Fraud, Fbi Id, Fbi Jobs, Fbi Jacket, Fbi James Comey, Fbi Jurisdiction, Fbi Job Description, Fbi Jobs Apply, Fbi Jacksonville, Fbi Jade Helm, Fbi Jobs Chicago, Fbi Jackson Ms, Fbi Kansas City, Fbi Kids, Fbi Knoxville, Fbi Kidnapping, Fbi Komi, Fbi Kentucky, Fbi Killed Jfk, Fbi Kkk, Fbi Kodi, Fbi K9 Unit, Fbi Logo, Fbi Leeda, Fbi Los Angeles, Fbi Locations, Fbi Las Vegas, Fbi Leaks, Fbi Leader, Fbi Linguist, Fbi Louisville, Fbi Login, Fbi Most Wanted, Fbi Most Wanted List, Fbi Meaning, Fbi Meme, Fbi Movies, Fbi Museum, Fbi Motto, Fbi Miami, Fbi Mission Statement, Fbi Most Dangerous Cities, Fbi Number, Fbi News, Fbi National Academy, Fbi Nics, Fbi New York, Fbi New Orleans, Fbi Newark, Fbi New York Tv Show, Fbi Near Me, Fbi Nominee, Fbi Offices, Fbi Org Chart, Fbi Omaha, Fbi Operative, Fbi On Trump, Fbi Organizational Chart, Fbi Obama Meme, Fbi Obama, Fbi Oklahoma City, Fbi Office Near Me, Fbi Phone Number, Fbi Profiler, Fbi Pft, Fbi Police, Fbi Pay Scale, Fbi Phoenix, Fbi Pay, Fbi Philadelphia, Fbi Positions, Fbi Pittsburgh, Fbi Quantico, Fbi Qualifications, Fbi Q Target, Fbi Quotes, Fbi Quiz, Fbi Questions, Fbi Qr Code, Fbi Qas, Fbi Quantico Address, Fbi Quantico Tours, Fbi Requirements, Fbi Russia, Fbi Russia Investigation, Fbi Report, Fbi Ranks, Fbi Recruiting, Fbi Raid, Fbi Records, Fbi Rape Statistics, Fbi Russia Trump, Fbi Salary, Fbi Special Agent, Fbi Stands For, Fbi Swat, Fbi Special Agent Salary, Fbi Surveillance, Fbi Statistics, Fbi Sos, Fbi Surveillance Van, Fbi Seal, Fbi Training, Fbi Top Ten, Fbi Trump, Fbi Trump Russia, Fbi Tip Line, Fbi Tv Shows, Fbi Twitter, Fbi Tips, Fbi Teen Academy, Fbi Tours, Fbi Ucr, Fbi Ucr 2016, Fbi Units, Fbi Ucr 2015, Fbi Undercover, Fbi Unsolved Cases, Fbi Upin, Fbi Utah, Fbi Usa, Fbi Uniforms, Fbi Vs Cia, Fbi Vault, Fbi Virus, Fbi Vs Apple, Fbi Virtual Academy, Fbi Vehicles, Fbi Violent Crime Statistics, Fbi Virginia, Fbi Van, Fbi Van Wifi, Fbi Website, Fbi Warning, Fbi Wiki, Fbi Wanted List, Fbi Watch List, Fbi Windbreaker, Fbi Warning Screen, Fbi White Collar Crime, Fbi Warrant Search, Fbi Weapons, Fbi X Files, Fbi Xl2, Fbi Xl31, Fbi Xl4, Fbi Xl2 Programming, Fbi Xl-31 Troubleshooting, Fbi Xl 31 Installation Manual, Fbi X Files Real, Fbi Xl2t Installation Manual, Fbi Xl 1215, Fbi Yearly Salary, Fbi Youtube, Fbi Youth Academy, Fbi Youth Leadership Academy, Fbi Yellow Brick Road, Fbi Youth Programs, Fbi Yearly Budget, Fbi Youth Leadership Academy Portland, Fbi Youngstown Ohio, Fbi Yearly Income, Fbi Zodiac Killer, Fbi Zodiac, Fbi Zip Code, Fbi Zodiac Killer List, Fbi Zero Files, Fbi Zodiac List, Fbi Zodiac Signs Killer, Fbi Zhang Yingying, Fbi Zion, Fbi Zodiac Crimes

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, CYBERCRIME, FBI *, FINANCE INDUSTRY, SECRET September 26, 2016June 21, 2021 15 Minutes

Exposed – FBI Report on Hillary Clinton E-Mail Investigation for Mishandling of Classified Information

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Clinton E-Mail Investigation Mishandling of Classified – Unknown Subject or Country (SIM)

Page Count: 58 pages
Date: July 2016
Restriction: None
Originating Organization: Federal Bureau of Investigation
File Type: pdf
File Size: 37,829,437 bytes
File Hash (SHA-256):E9ACBA18350499CE6CE739D165D5BE18C7C27B96C8F474CFABE315F6DC5BCAD4

Download File

On July 10, 2015, the Federal Bureau of Investigation (FBI) initiated a full investigation based upon a referral received from the US Intelligence Community Inspector General (ICIG), submitted in accordance with Section 811 (c) of the Intelligence Authorization Act of 1995 and dated July 6, 2015, regarding the potential unauthorized transmission and storage of classified information on the personal e-mail server of former Secretary of State Hillary Clinton (Clinton). The FBI’s investigation focused on determining whether classified information was transmitted or stored on unclassified systems in violation of federal criminal statutes and whether classified information was compromised by unauthorized individuals, to include foreign governments or intelligence services, via cyber intrusion or other means.

…

The FBI’s investigation and forensic analysis did not find evidence confirming that Clinton’ s e-mail accounts or mobile devices were compromised by cyber means. However, investigative limitations, including the FBI’s inability to obtain all mobile devices and various computer components associated with Clinton’s personal e-mail systems, prevented the FBI from conclusively determining whether the classified information transmitted and stored on Clinton’s personal server systems was compromised via cyber intrusion or other means. The FBI did find that hostile foreign actors successfully gained access to the personal e-mail accounts of individuals with whom Clinton was in regular contact and, in doing so, obtained e-mails sent to or received by Clinton on her personal account.

…

Prior to January 21, 2009, when she was sworn in as the US Secretary of State, Clinton used a personally-acquired BlackBerry device with service initially from Cingular Wireless and later AT&T Wireless, to access her e-mail accounts. Clinton initially used the e-mail addresses hr15@mycingular.blackberry.net and then changed to hr15@att.blackberry.net. According to Cooper, in January 2009, Clinton decided to stop using her hr15@att.blackberry.net e-mail address and instead began using a new private domain, clintonemail.com, to host e-mail service on the Apple Server. Clinton stated to the FBI that she directed aides, in or around January 2009, to create the clintonemail.com account, and as a matter of convenience her clintonemail.com account was moved to an e-mail system maintained by President Clinton’s aides. While Cooper could not specifically recall registering the domain, Cooper was listed as the point of contact for clintonemail.com when the domain was registered with a domain registration services company, Network Solutions, on January 13, 2009. Clinton used her att.blackberry.net e-mail account as her primary e-mail address until approximately mid-to-late January 2009 when she transitioned to her newly created hdr22@clintonemail.com account. The FBI did not recover any information indicating that Clinton sent an e-mail from her hr15@att.blackberry.net e-mail after March 18, 2009.

…

clinton-email-1

Go back

Your message has been sent

Warning
Warning
Warning
Warning

Warning.

Fbi Most Wanted, Fbi Jobs, Fbi Director, Fbi Salary, Fbi Agent, Fbi Background Check, Fbi Agent Salary, Fbi Headquarters, Fbi Special Agent, Fbi Internships, Fbi Agent, Fbi Agent Salary, Fbi Academy, Fbi Application, Fbi Analyst, Fbi Atlanta, Fbi Agent Jobs, Fbi Anon, Fbi Address, Fbi Arrests, Fbi Background Check, Fbi Badge, Fbi Bau, Fbi Building, Fbi Boston, Fbi Bap, Fbi Baltimore, Fbi Benefits, Fbi Budget, Fbi Building Dc, Fbi Careers, Fbi Crime Statistics, Fbi Clearance, Fbi Criminal Background Check, Fbi Chicago, Fbi Citizens Academy, Fbi Crime Statistics By Race, Fbi Contact, Fbi Channeler, Fbi Candidates, Fbi Director, Fbi Director Candidates, Fbi Director James Comey, Fbi Definition, Fbi Director Fired, Fbi Director Salary, Fbi Definition Of Terrorism, Fbi Database, Fbi Dallas, Fbi Drug Policy, Fbi Employment, Fbi Email Address, Fbi Employment Drug Policy, Fbi El Paso, Fbi Employees, Fbi Emblem, Fbi Established, Fbi Education Center, Fbi Education, Fbi Executive Branch, Fbi Fingerprinting, Fbi Files, Fbi Field Offices, Fbi Fingerprint Card, Fbi Fitness Test, Fbi Facebook, Fbi Fingerprint Check, Fbi Forensic Accountant, Fbi Foia, Fbi Founder, Fbi Glock, Fbi Games, Fbi Gov, Fbi Glassdoor, Fbi Guns, Fbi Gang List, Fbi Gun Statistics, Fbi Gif, Fbi Gift Shop, Fbi General Counsel, Fbi Headquarters, Fbi Hrt, Fbi History, Fbi Houston, Fbi Hiring, Fbi Hate Crime Statistics, Fbi Head, Fbi Hat, Fbi Honors Internship, Fbi Hotline, Fbi Internships, Fbi Investigation, Fbi Intelligence Analyst, Fbi Informant, Fbi Irt, Fbi Investigation Trump, Fbi Ic3, Fbi Infragard, Fbi Internet Fraud, Fbi Id, Fbi Jobs, Fbi Jacket, Fbi James Comey, Fbi Jurisdiction, Fbi Job Description, Fbi Jobs Apply, Fbi Jacksonville, Fbi Jade Helm, Fbi Jobs Chicago, Fbi Jackson Ms, Fbi Kansas City, Fbi Kids, Fbi Knoxville, Fbi Kidnapping, Fbi Komi, Fbi Kentucky, Fbi Killed Jfk, Fbi Kkk, Fbi Kodi, Fbi K9 Unit, Fbi Logo, Fbi Leeda, Fbi Los Angeles, Fbi Locations, Fbi Las Vegas, Fbi Leaks, Fbi Leader, Fbi Linguist, Fbi Louisville, Fbi Login, Fbi Most Wanted, Fbi Most Wanted List, Fbi Meaning, Fbi Meme, Fbi Movies, Fbi Museum, Fbi Motto, Fbi Miami, Fbi Mission Statement, Fbi Most Dangerous Cities, Fbi Number, Fbi News, Fbi National Academy, Fbi Nics, Fbi New York, Fbi New Orleans, Fbi Newark, Fbi New York Tv Show, Fbi Near Me, Fbi Nominee, Fbi Offices, Fbi Org Chart, Fbi Omaha, Fbi Operative, Fbi On Trump, Fbi Organizational Chart, Fbi Obama Meme, Fbi Obama, Fbi Oklahoma City, Fbi Office Near Me, Fbi Phone Number, Fbi Profiler, Fbi Pft, Fbi Police, Fbi Pay Scale, Fbi Phoenix, Fbi Pay, Fbi Philadelphia, Fbi Positions, Fbi Pittsburgh, Fbi Quantico, Fbi Qualifications, Fbi Q Target, Fbi Quotes, Fbi Quiz, Fbi Questions, Fbi Qr Code, Fbi Qas, Fbi Quantico Address, Fbi Quantico Tours, Fbi Requirements, Fbi Russia, Fbi Russia Investigation, Fbi Report, Fbi Ranks, Fbi Recruiting, Fbi Raid, Fbi Records, Fbi Rape Statistics, Fbi Russia Trump, Fbi Salary, Fbi Special Agent, Fbi Stands For, Fbi Swat, Fbi Special Agent Salary, Fbi Surveillance, Fbi Statistics, Fbi Sos, Fbi Surveillance Van, Fbi Seal, Fbi Training, Fbi Top Ten, Fbi Trump, Fbi Trump Russia, Fbi Tip Line, Fbi Tv Shows, Fbi Twitter, Fbi Tips, Fbi Teen Academy, Fbi Tours, Fbi Ucr, Fbi Ucr 2016, Fbi Units, Fbi Ucr 2015, Fbi Undercover, Fbi Unsolved Cases, Fbi Upin, Fbi Utah, Fbi Usa, Fbi Uniforms, Fbi Vs Cia, Fbi Vault, Fbi Virus, Fbi Vs Apple, Fbi Virtual Academy, Fbi Vehicles, Fbi Violent Crime Statistics, Fbi Virginia, Fbi Van, Fbi Van Wifi, Fbi Website, Fbi Warning, Fbi Wiki, Fbi Wanted List, Fbi Watch List, Fbi Windbreaker, Fbi Warning Screen, Fbi White Collar Crime, Fbi Warrant Search, Fbi Weapons, Fbi X Files, Fbi Xl2, Fbi Xl31, Fbi Xl4, Fbi Xl2 Programming, Fbi Xl-31 Troubleshooting, Fbi Xl 31 Installation Manual, Fbi X Files Real, Fbi Xl2t Installation Manual, Fbi Xl 1215, Fbi Yearly Salary, Fbi Youtube, Fbi Youth Academy, Fbi Youth Leadership Academy, Fbi Yellow Brick Road, Fbi Youth Programs, Fbi Yearly Budget, Fbi Youth Leadership Academy Portland, Fbi Youngstown Ohio, Fbi Yearly Income, Fbi Zodiac Killer, Fbi Zodiac, Fbi Zip Code, Fbi Zodiac Killer List, Fbi Zero Files, Fbi Zodiac List, Fbi Zodiac Signs Killer, Fbi Zhang Yingying, Fbi Zion, Fbi Zodiac Crimes, Hillary Clinton Twitter, Hillary Clinton Age, Hillary Clinton News, Hillary Clinton 2020, Hillary Clinton Young, Hillary Clinton Net Worth, Hillary Clinton Quotes, Hillary Clinton Dead, Hillary Clinton Book, Hillary Clinton Height, Hillary Clinton Age, Hillary Clinton Approval Rating, Hillary Clinton Accomplishments, Hillary Clinton And Donald Trump, Hillary Clinton Address, Hillary Clinton And Russia, Hillary Clinton And Bill Clinton, Hillary Clinton And Benghazi, Hillary Clinton Apush, Hillary Clinton Assistant, Hillary Clinton Book, Hillary Clinton Biography, Hillary Clinton Benghazi, Hillary Clinton Birthday, Hillary Clinton Balloons, Hillary Clinton Born, Hillary Clinton Birthday Meme, Hillary Clinton Brother, Hillary Clinton Balloons Gif, Hillary Clinton Beer, Hillary Clinton College, Hillary Clinton Campaign, Hillary Clinton Concession Speech, Hillary Clinton Campaign Slogan, Hillary Clinton Campaign Manager, Hillary Clinton Cartoon, Hillary Clinton Campaign Logo, Hillary Clinton Contact, Hillary Clinton Cnn, Hillary Clinton Cedar Rapids, Hillary Clinton Dead, Hillary Clinton Daughter, Hillary Clinton Donald Trump, Hillary Clinton Death, Hillary Clinton Donut, Hillary Clinton Date Of Birth, Hillary Clinton Debate, Hillary Clinton Democrat, Hillary Clinton Dancing, Hillary Clinton Dnc Speech, Hillary Clinton Education, Hillary Clinton Election, Hillary Clinton Email Address, Hillary Clinton Early Life, Hillary Clinton Endorsements, Hillary Clinton Events, Hillary Clinton Email Meme, Hillary Clinton Eye Color, Hillary Clinton Electoral Votes, Hillary Clinton Emoji, Hillary Clinton Facts, Hillary Clinton Facebook, Hillary Clinton Funny, Hillary Clinton Fox News, Hillary Clinton Foundation, Hillary Clinton First Lady, Hillary Clinton Family, Hillary Clinton For President, Hillary Clinton Favorability, Hillary Clinton Father, Hillary Clinton Gif, Hillary Clinton Grammy, Hillary Clinton Go Away, Hillary Clinton Grandchildren, Hillary Clinton Gun Control, Hillary Clinton Goldwater, Hillary Clinton Goldman Sachs, Hillary Clinton Gaddafi, Hillary Clinton Georgetown, Hillary Clinton Glasses, Hillary Clinton Height, Hillary Clinton Haircut, Hillary Clinton House, Hillary Clinton Husband, Hillary Clinton High School, Hillary Clinton Haiti, Hillary Clinton Happy Birthday, Hillary Clinton Health Care, Hillary Clinton Haircut 2017, Hillary Clinton Heels, Hillary Clinton Iq, Hillary Clinton Interview, Hillary Clinton Illness, Hillary Clinton Images, Hillary Clinton Instagram, Hillary Clinton Is Dead, Hillary Clinton Is, Hillary Clinton Immigration, Hillary Clinton Information, Hillary Clinton Is President, Hillary Clinton Job, Hillary Clinton James Comey, Hillary Clinton Joker, Hillary Clinton Just Chillin In Cedar Rapids, Hillary Clinton Juju On That Beat, Hillary Clinton Javits Center, Hillary Clinton Jimmy Kimmel, Hillary Clinton Jfk Jr, Hillary Clinton Jewelry, Hillary Clinton Jumpsuit, Hillary Clinton Kim Jong Un, Hillary Clinton Kate Mckinnon, Hillary Clinton Kid, Hillary Clinton Katy Perry, Hillary Clinton Kissinger, Hillary Clinton Kitten Heels Meme, Hillary Clinton Keystone Pipeline, Hillary Clinton Katy Perry Shoes, Hillary Clinton Kfc, Hillary Clinton Kosovo, Hillary Clinton Logo, Hillary Clinton Laughing, Hillary Clinton Looks Like, Hillary Clinton Latest News, Hillary Clinton Lost, Hillary Clinton Loss, Hillary Clinton Law School, Hillary Clinton Libya, Hillary Clinton Library, Hillary Clinton Long Hair, Hillary Clinton Meme Queen, Hillary Clinton Movie, Hillary Clinton Mayor, Hillary Clinton Middle Name, Hillary Clinton Mask, Hillary Clinton Mailing Address, Hillary Clinton Mother, Hillary Clinton Myers Briggs, Hillary Clinton Minimum Wage, Hillary Clinton Mbti, Hillary Clinton News, Hillary Clinton Net Worth, Hillary Clinton Now, Hillary Clinton New Book, Hillary Clinton Net Worth 2017, Hillary Clinton New Haircut, Hillary Clinton Nephew, Hillary Clinton Nyc Mayor, Hillary Clinton New Haircut 2017, Hillary Clinton No Makeup, Hillary Clinton On Guns, Hillary Clinton On The Issues, Hillary Clinton Outfits, Hillary Clinton Onward Together, Hillary Clinton On Trump, Hillary Clinton Office, Hillary Clinton Organization, Hillary Clinton On Gun Control, Hillary Clinton On Immigration, Hillary Clinton Open Borders, Hillary Clinton Pantsuit, Hillary Clinton Popular Vote, Hillary Clinton Pictures, Hillary Clinton President, Hillary Clinton Phone Number, Hillary Clinton Polls, Hillary Clinton Photos, Hillary Clinton Parents, Hillary Clinton Party, Hillary Clinton Pac, Hillary Clinton Quotes, Hillary Clinton Quizlet, Hillary Clinton Qualifications, Hillary Clinton Quote Poster, Hillary Clinton Quotes On Feminism, Hillary Clinton Quotes On Immigration, Hillary Clinton Quotes Funny, Hillary Clinton Quotes On Education, Hillary Clinton Qualifications List, Hillary Clinton Quiz, Hillary Clinton Running Mate, Hillary Clinton Russia, Hillary Clinton Reddit, Hillary Clinton Running For President 2020, Hillary Clinton Reset Button, Hillary Clinton Rally, Hillary Clinton Recent Photos, Hillary Clinton Resume, Hillary Clinton Recent News, Hillary Clinton Robot, Hillary Clinton Speech, Hillary Clinton Slogan, Hillary Clinton Snl, Hillary Clinton Saudi Arabia, Hillary Clinton Shattered, Hillary Clinton Senator, Hillary Clinton Signature, Hillary Clinton Syria, Hillary Clinton Siblings, Hillary Clinton Speaking Fee, Hillary Clinton Twitter, Hillary Clinton Today, Hillary Clinton Trump, Hillary Clinton Timeline, Hillary Clinton Tattoo, Hillary Clinton T Shirt, Hillary Clinton Thesis, Hillary Clinton Taxes, Hillary Clinton Teeth, Hillary Clinton Triggered, Hillary Clinton Uranium, Hillary Clinton Update, Hillary Clinton Uranium Deal, Hillary Clinton University, Hillary Clinton Universal Health Care, Hillary Clinton Ufo, Hillary Clinton Upcoming Events, Hillary Clinton Us Senate, Hillary Clinton Ukraine, Hillary Clinton Un Speech, Hillary Clinton Vice President, Hillary Clinton Vs Donald Trump, Hillary Clinton Video, Hillary Clinton Votes, Hillary Clinton Views, Hillary Clinton Vogue, Hillary Clinton Voting Record, Hillary Clinton Video Games, Hillary Clinton Vine, Hillary Clinton Vladimir Putin, Hillary Clinton Wiki, Hillary Clinton Website, Hillary Clinton Women’s Rights Are Human Rights, Hillary Clinton Worth, Hillary Clinton Wellesley, Hillary Clinton Walmart, Hillary Clinton Wisconsin, Hillary Clinton Wedding, Hillary Clinton White House Portrait, Hillary Clinton Wallpaper, Hillary Clinton Young, Hillary Clinton Yale, Hillary Clinton Youtube Channel, Hillary Clinton Young Republican, Hillary Clinton Yemen, Hillary Clinton Yankees, Hillary Clinton Yahoo, Hillary Clinton Yankees Hat, Hillary Clinton Young Life, Hillary Clinton Yankees Hat Tee, Hillary Clinton Zodiac, Hillary Clinton Zach Galifianakis, Hillary Clinton Zimbio, Hillary Clinton Zero Point Energy, Hillary Clinton Zelaya, Hillary Clinton Zodiac Chart, Hillary Clinton Zach Galifianakis Fake, Hillary Clinton Zeta Phi Beta, Hillary Clinton Zacharie Cloutier, Hillary Clinton Zadroga Act

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, FBI *, PUBLIC INTELLIGENCE, SECRET, THE WHITE HOUSE September 14, 2016June 22, 2021 9 Minutes

Revealed – FBI Cyber Bulletin: Targeting Activity Against State Board of Election SystemsFBI Cyber Bulletin: Targeting Activity Against State Board of Election Systems

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Targeting Activity Against State Board of Election Systems

Page Count: 4 pages
Date: August 18, 2016
Restriction: TLP: AMBER
Originating Organization: Federa; Bureau of Investigation, Cyber Divison
File Type: pdf
File Size: 524,756 bytes
File Hash (SHA-256):1EE66D31C46FF1F4DE98D36012E705586D6DFF6800B7F051F564D1A7CED58B3E

Download File

The FBI received information of an additional IP address, 5.149.249.172, which was detected in the July 2016 compromise of a state’s Board of Election Web site. Additionally, in August 2016 attempted intrusion activities into another state’s Board of Election system identified the IP address, 185.104.9.39 used in the aforementioned compromise.

Technical Details

The following information was released by the MS-ISAC on 1 August 2016, which was derived through the course of the investigation.

In late June 2016, an unknown actor scanned a state’s Board of Election website for vulnerabilities using Acunetix, and after identifying a Structured Query Language (SQL) injection (SQLi) vulnerability, used SQLmap to target the state website. The majority of the data exfiltration occurred in mid-July. There were 7 suspicious IPs and penetration testing tools Acunetix, SQLMap, and DirBuster used by the actor, detailed in the indicators section below.
Indicators associated with the Board of Elections intrusion:

  • The use of Acunetix tool was confirmed when “GET /acunetix-wvs-test-for-some-inexistent-file – 443” and several requests with “wvstest=” appeared in the logs;
  • The user agent for Acunetix was identified in the logs –”Mozilla/5.0+(Windows+NT+6.1;+WOW64)+AppleWebKit/537.21++(KHTML,+like+Gecko)+Chrome/41.0.2228.0+Safari/537.21″;
  • The use of SQLMap was confirmed after “GET /status.aspx DLIDNumber=1′;DROP TABLE sqlmapoutput” appeared in the logs;
  • The user agent for SQLMap is “Mozilla/5.0+(Macintosh;+U;+Intel+Mac+OS+X+10.7;+en-US;+rv:1.9.2.2)+ Gecko/20100316+Firefox/3.6.2 200 0 0 421” (These are easily spoofed and not inclusive of all SQLMap activity);
  • The user agent for the DirBuster program is “DirBuster-1.0- RC1+(http://www.owasp.org/index.php/Category:OWASP_DirBuster_Project<http://www.owasp.org/index.php/Category:OWASP_DirBuster_Project&gt; )”;

IP Addresses:

  • 185.104.11.154
  • 185.104.9.39
  • 204.155.30.75
  • 204.155.30.76
  • 204.155.30.80
  • 204.155.30.81
  • 89.188.9.91
  • 5.149.249.172 (new, per FBI)

Recommendations

The FBI is requesting that states contact their Board of Elections and determine if any similar activity to their logs, both inbound and outbound, has been detected. Attempts should not be made to touch or ping the IP addresses directly.

Go back

Your message has been sent

Warning
Warning
Warning
Warning

Warning.

Fbi Most Wanted, Fbi Jobs, Fbi Director, Fbi Salary, Fbi Agent, Fbi Background Check, Fbi Agent Salary, Fbi Headquarters, Fbi Special Agent, Fbi Internships, Fbi Agent, Fbi Agent Salary, Fbi Academy, Fbi Application, Fbi Analyst, Fbi Atlanta, Fbi Agent Jobs, Fbi Anon, Fbi Address, Fbi Arrests, Fbi Background Check, Fbi Badge, Fbi Bau, Fbi Building, Fbi Boston, Fbi Bap, Fbi Baltimore, Fbi Benefits, Fbi Budget, Fbi Building Dc, Fbi Careers, Fbi Crime Statistics, Fbi Clearance, Fbi Criminal Background Check, Fbi Chicago, Fbi Citizens Academy, Fbi Crime Statistics By Race, Fbi Contact, Fbi Channeler, Fbi Candidates, Fbi Director, Fbi Director Candidates, Fbi Director James Comey, Fbi Definition, Fbi Director Fired, Fbi Director Salary, Fbi Definition Of Terrorism, Fbi Database, Fbi Dallas, Fbi Drug Policy, Fbi Employment, Fbi Email Address, Fbi Employment Drug Policy, Fbi El Paso, Fbi Employees, Fbi Emblem, Fbi Established, Fbi Education Center, Fbi Education, Fbi Executive Branch, Fbi Fingerprinting, Fbi Files, Fbi Field Offices, Fbi Fingerprint Card, Fbi Fitness Test, Fbi Facebook, Fbi Fingerprint Check, Fbi Forensic Accountant, Fbi Foia, Fbi Founder, Fbi Glock, Fbi Games, Fbi Gov, Fbi Glassdoor, Fbi Guns, Fbi Gang List, Fbi Gun Statistics, Fbi Gif, Fbi Gift Shop, Fbi General Counsel, Fbi Headquarters, Fbi Hrt, Fbi History, Fbi Houston, Fbi Hiring, Fbi Hate Crime Statistics, Fbi Head, Fbi Hat, Fbi Honors Internship, Fbi Hotline, Fbi Internships, Fbi Investigation, Fbi Intelligence Analyst, Fbi Informant, Fbi Irt, Fbi Investigation Trump, Fbi Ic3, Fbi Infragard, Fbi Internet Fraud, Fbi Id, Fbi Jobs, Fbi Jacket, Fbi James Comey, Fbi Jurisdiction, Fbi Job Description, Fbi Jobs Apply, Fbi Jacksonville, Fbi Jade Helm, Fbi Jobs Chicago, Fbi Jackson Ms, Fbi Kansas City, Fbi Kids, Fbi Knoxville, Fbi Kidnapping, Fbi Komi, Fbi Kentucky, Fbi Killed Jfk, Fbi Kkk, Fbi Kodi, Fbi K9 Unit, Fbi Logo, Fbi Leeda, Fbi Los Angeles, Fbi Locations, Fbi Las Vegas, Fbi Leaks, Fbi Leader, Fbi Linguist, Fbi Louisville, Fbi Login, Fbi Most Wanted, Fbi Most Wanted List, Fbi Meaning, Fbi Meme, Fbi Movies, Fbi Museum, Fbi Motto, Fbi Miami, Fbi Mission Statement, Fbi Most Dangerous Cities, Fbi Number, Fbi News, Fbi National Academy, Fbi Nics, Fbi New York, Fbi New Orleans, Fbi Newark, Fbi New York Tv Show, Fbi Near Me, Fbi Nominee, Fbi Offices, Fbi Org Chart, Fbi Omaha, Fbi Operative, Fbi On Trump, Fbi Organizational Chart, Fbi Obama Meme, Fbi Obama, Fbi Oklahoma City, Fbi Office Near Me, Fbi Phone Number, Fbi Profiler, Fbi Pft, Fbi Police, Fbi Pay Scale, Fbi Phoenix, Fbi Pay, Fbi Philadelphia, Fbi Positions, Fbi Pittsburgh, Fbi Quantico, Fbi Qualifications, Fbi Q Target, Fbi Quotes, Fbi Quiz, Fbi Questions, Fbi Qr Code, Fbi Qas, Fbi Quantico Address, Fbi Quantico Tours, Fbi Requirements, Fbi Russia, Fbi Russia Investigation, Fbi Report, Fbi Ranks, Fbi Recruiting, Fbi Raid, Fbi Records, Fbi Rape Statistics, Fbi Russia Trump, Fbi Salary, Fbi Special Agent, Fbi Stands For, Fbi Swat, Fbi Special Agent Salary, Fbi Surveillance, Fbi Statistics, Fbi Sos, Fbi Surveillance Van, Fbi Seal, Fbi Training, Fbi Top Ten, Fbi Trump, Fbi Trump Russia, Fbi Tip Line, Fbi Tv Shows, Fbi Twitter, Fbi Tips, Fbi Teen Academy, Fbi Tours, Fbi Ucr, Fbi Ucr 2016, Fbi Units, Fbi Ucr 2015, Fbi Undercover, Fbi Unsolved Cases, Fbi Upin, Fbi Utah, Fbi Usa, Fbi Uniforms, Fbi Vs Cia, Fbi Vault, Fbi Virus, Fbi Vs Apple, Fbi Virtual Academy, Fbi Vehicles, Fbi Violent Crime Statistics, Fbi Virginia, Fbi Van, Fbi Van Wifi, Fbi Website, Fbi Warning, Fbi Wiki, Fbi Wanted List, Fbi Watch List, Fbi Windbreaker, Fbi Warning Screen, Fbi White Collar Crime, Fbi Warrant Search, Fbi Weapons, Fbi X Files, Fbi Xl2, Fbi Xl31, Fbi Xl4, Fbi Xl2 Programming, Fbi Xl-31 Troubleshooting, Fbi Xl 31 Installation Manual, Fbi X Files Real, Fbi Xl2t Installation Manual, Fbi Xl 1215, Fbi Yearly Salary, Fbi Youtube, Fbi Youth Academy, Fbi Youth Leadership Academy, Fbi Yellow Brick Road, Fbi Youth Programs, Fbi Yearly Budget, Fbi Youth Leadership Academy Portland, Fbi Youngstown Ohio, Fbi Yearly Income, Fbi Zodiac Killer, Fbi Zodiac, Fbi Zip Code, Fbi Zodiac Killer List, Fbi Zero Files, Fbi Zodiac List, Fbi Zodiac Signs Killer, Fbi Zhang Yingying, Fbi Zion, Fbi Zodiac Crimes, Cybercrime Definition, Cybercrime Statistics, Cybercrime Prevention, Cybercrime Articles, Cybercrime Jobs, Cybercrime Law, Cybercrime Statistics 2017, Cyber Crime Cases, Cyber Crime News, Cybercrime Topics, Cybercrime Articles, Cybercrime And Security, Cybercrime As A Service, Cybercrime And Digital Forensics An Introduction, Cybercrime And Digital Forensics, Cybercrime And Society, Cybercrime And Terrorism, Cybercrime Attacks, Cybercrime Act, Cybercrime Against Businesses, Cyber Crime Batman, Cyber Crime Book, Cybercrime Blog, Cybercrime Bill, Cybercrime Banks, Cybercrime Background, Cyber Crime By Country, Cybercrime Bangalore, Cybercrime Billion Dollar Industry, Cybercrime Background Information, Cyber Crime Cases, Cybercrime Certification, Cybercrime Convention, Cybercrime Careers, Cybercrime Cost, Cybercrime Cafe, Cybercrime Cost 2016, Cybercrime China, Cybercrime Conference, Cybercrime Conclusion, Cybercrime Definition, Cybercrime Definition Computer, Cybercrime Definition Fbi, Cyber Crime Data, Cybercrime Degrees, Cybercrime Definition Pdf, Cybercrime Database, Cyber Crime Detective, Cyber Crime Documentary, Cyber Crime Department, Cybercrime Example, Cyber Crime Essay, Cybercrime Effects, Cybercrime Events, Cybercrime Enforcement, Cybercrime Economy, Cyber Crime Ethics, Cybercrime Effects On Business, Cybercrime Ecosystem, Cybercrime Enforcement Training Assistance Act, Cybercrime Facts, Cybercrime Fbi, Cybercrime Forensics, Cybercrime Forum, Cybercrime Forensics Training Center, Cybercrime Federal Laws, Cyber Crime Fiction, Cybercrime Financial Services, Cybercrime Future Trends, Cybercrime Fiji, Cybercrime Gets Personal Money Magazine, Cybercrime Gets Personal, Cybercrime Growth, Cyber Crime Graph, Cybercrime Groups, Cybercrime Government, Cybercrime Global Statistics, Cyber Crime Gov, Cyber Crime Games, Cybercrime Gif, Cybercrime Hacking, Cyber Crime History, Cybercrime Help, Cybercrime Healthcare, Cybercrime Hyderabad, Cybercrime How To Report, Cyber Crime Hotline, Cybercrime Hacking News, Cyber Crime Head Office India, Cybercrime Hacking And Cracking, Cybercrime Identity Theft, Cybercrime In The Us, Cyber Crime Investigation, Cybercrime Images, Cyber Crime Insurance, Cybercrime Is Also Known As, Cybercrime Investigating High-technology Computer Crime, Cybercrime Infographic, Cybercrime Information, Cyber Crime In Russia, Cybercrime Jobs, Cybercrime Jurisdiction, Cybercrime Journal Articles, Cybercrime Job Description, Cybercrime Jobs Salary, Cybercrime Job Openings, Cybercrime Jobs In Chennai, Cybercrime Job Qualification, Cybercrime Journal Articles Pdf, Cyber Crime Jamaica, Cybercrime Kenya, Cybercrime Key Issues And Debates, Cybercrime Kuwait, Cybercrime Ki Dhara, Cybercrime Key Issues And Debates Pdf, Cybercrime Kasus, Cyber Crime Karnataka, Cybercrime Kartu Kredit, Cybercrime Kolkata, Cyber Crime Karachi, Cybercrime Law, Cybercrime Laws In Usa, Cybercrime Law Enforcement, Cybercrime Laws Of The United States, Cybercrime List, Cybercrime Legislation Us, Cybercrime Laws In Florida, Cybercrime Legal Issues, Cybercrime Law Outline, Cyber Crime Lesson Plans, Cybercrime Meaning, Cyber Crime Movies, Cybercrime Methods, Cybercrime Methodology, Cyber Crime Money, Cybercrime Markets, Cyber Crime Magazine, Cyber Crime Most Wanted, Cybercrime Meaning In Tamil, Cybercrime Masters Degree, Cyber Crime News, Cyber Crime News Articles, Cyber Crime News Articles 2017, Cyber Crime Netflix, Cybercrime Nigeria, Cyber Crime Novels, Cybercrime Number, Cybercrime Nhs, Cyber Crime News Philippines, Cybercrime Nbi, Cybercrime Or Cyber Crime, Cybercrime Organizations, Cybercrime On The Rise, Cybercrime On The High Seas, Cybercrime Offenses, Cyber Crime Outline, Cybercrime Office, Cybercrime Office In Ahmedabad, Cybercrime Office In Patna, Cybercrime Office In Nashik, Cybercrime Quotes, Cyber Crime Quizlet, Cybercrime Questions, Cyber Crime Quiz, Cybercrime Questionnaire, Cybercrime Question Paper, Cybercrime Qatar, Cybercrime Question And Answers, Cybercrime Report, Cybercrime Research Paper, Cyber Crime Rates, Cyber Crime Recent, Cybercrime Research Topics, Cybercrime Research, Cybercrime Reported To The Ic3, Cybercrime Resources, Cybercrime Riding Tax Season Tides, Cyber Crime Report 2016, Cybercrime Statistics, Cybercrime Statistics 2017, Cyber Crime Stories, Cybercrime Spyware, Cybercrime Statistics 2015, Cybercrime Security, Cybercrime Solutions, Cybercrime Salary, Cybercrime Small Business, Cyber Crime Synonym, Cybercrime Topics, Cybercrime Trends, Cybercrime Tracker, Cybercrime Treaty, Cyber Crime Types, Cybercrime Training, Cybercrime Threats, Cybercrime Tools, Cybercrime Terms, Cybercrime The Transformation Of Crime In The Information Age, Cyber Crime Unit, Cybercrime Us, Cybercrime Uk, Cybercrime Uae, Cybercrime University, Cybercrime Un, Cyber Crime Unit Mauritius, Cyber Crime Unit Malta, Cybercrime Uc, Cybercrime Unodc, Cybercrime Victims, Cybercrime Vs Traditional Crime, Cybercrime Videos, Cybercrime Vs Traditional Crime Statistics, Cybercrime Virus, Cyber Crime Vocabulary, Cybercrime Vs Traditional Crime Punishment, Cybercrime Vs Computer Crime, Cybercrime Vs Cyber Warfare, Cybercrime Vs Cyber Espionage, Cybercrime Wiki, Cybercrime Worm, Cybercrime World Wide War 3.0, Cyber Crime Websites, Cyber Crime Worksheet, Cybercrime Wallpaper, Cyber Crime Worldwide, Cybercrime Working Group, Cyber Crime What Is It, Cybercrime Wikipedia Indonesia, Cybercrime X-remote Download, Tedx Cybercrime, Cyber Crime Youtube, Cyber Crime Yahoo, Cyber Crime Yahoo Answers, Cyber Crime Yesterday, Cyber Crime Youth, Cybercrime Yang Menyerang Hak Cipta, Cybercrime Yar, Youth Cyber Crime, Cyber Crime Yogyakarta, Cybercrime Yang Menyerang Pemerintah, Cybercrime Zimbabwe, Cybercrime Zeus, Cybercrime Zimbra, Zurich Cyber Crime, Zimbabwe Cybercrime Bill, Cyber Crime In Zambia, New Zealand Cyber Crime, Los Zetas Cybercrime, Cybercrime Law In Zambia, Cyber Crime Cases In Zambia

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, CYBERCRIME, FBI *, PUBLIC INTELLIGENCE September 14, 2016June 22, 2021 7 Minutes

Unveiled – FBI Cyber Bulletin: Malware Targeting Foreign Banks

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

 

 

A-000073-MW

Page Count: 19 pages
Date: May 23, 2016
Restriction: TLP: GREEN
Originating Organization: Federal Bureau of Investigation, Cyber Division
File Type: pdf
File Size: 751,757 bytes
File Hash (SHA-256):B10AF987BF17BA217DED942BA847D9CF6DB8B38A0AE40B937FA4B031CB79EFC8

Download File

The FBI is providing the following information with HIGH confidence:

The FBI has obtained information regarding a malicious cyber group that has compromised the networks of foreign banks. The actors have exploited vulnerabilities in the internal environments of the banks and initiated unauthorized monetary transfers over an international payment messaging system. In some instances, the actors have been present on victim networks for a significant period of time. Contact law enforcement immediately regarding any activity related to the indicators of compromise (IOCs) in the attached appendix that are associated with this group.

Technical Details

The FBI is providing the following information with HIGH confidence:

The enclosed IOCs have been employed by a cyber group linked to intrusions at foreign banks. Malicious insiders or external attackers have managed to submit international payment messages from financial institutions’ back-offices, PCs or workstations connected to their local interface to the international payment messaging system network. The group utilized malware that appears to have been customized for each victim environment. The malware is designed to hide evidence by removing some of the traces of the fraudulent messages. The observed malware samples were designed to securely delete themselves once they completed their tasks, removing evidence of their existence. Additionally, the intruders appear to have performed extensive network reconnaissance using remote access Trojans, keyloggers, screen grabbers, and a variety of legitimate Windows system administration utilities. In addition to these IOCs, the FBI recommends recipient organizations be alert to any changes to directories where international payment messaging system software has been installed.

…

Recommended Mitigations for Institutions with Connections to Payment Messaging Systems

Logically Segregate Your Operating Environment

  • Use firewalls to divide your operating environment into enclaves.
  • Use access control lists to permit/deny specific traffic from flowing between those enclaves.
  • Give special consideration to segregating enclaves holding sensitive information (for example, systems with customer records) from enclaves that require Internet connectivity (for example, email systems)

Isolate Payment Messaging Platforms

  • For institutions that access payment messaging platforms through private networks, confirm perimeter security controls prevent Internet hosts from accessing the private network infrastructure.
  • For institutions that access payment messaging platforms over the Internet, confirm perimeter security controls prevent Internet hosts other than payment messaging platform endpoints from accessing the infrastructure used for payment system access.

Routinely Confirm the Integrity of Secondary Security Controls

  • Perform monthly validation of transactional integrity systems, such as printers or secondary storage systems.
  • Perform monthly validation of payment messaging activity by performing telephone confirmation of transfer activity.

Routinely Test Operating Protocols

  • Confirm staffing plans for non-business, non-critical operating hours.
  • Ensure staff members understand payment messaging transfer protocols, along with emergency transfer protocols.

Monitor for Anomalous Behavior as Part of Layered Security

  • Develop baseline of expected software, users and logons. Monitor hosts running payment applications for unusual software installations, updates, account changes, or other activities outside of expected behavior.
  • Develop baseline of expected transaction participants, amounts, frequency and timing. Monitor and flag anomalous transactions for suspected fraudulent activity.

Recommended Mitigations for All Alert Recipients

The FBI is providing the following information with HIGH confidence:

  • Prepare Your Environment for Incident Response
    • Establish Out-of-Band Communications methods for dissemination of intrusion response plans and activities, inform NOCs/CERTs according to institutional policy and SOPs.
    • Maintain and actively monitor centralized host and network logging solutions after ensuring that all devices have logging enabled and their logs are being aggregated to those centralized solutions.
    • Disable all remote (including RDP) access until a password change has been completed.
    • Implement full SSL/TLS inspection capability (on perimeter and proxy devices).
    • Monitor accounts and devices determined to be part of the compromise to prevent reacquisition attempts.
    • Implement core mitigations to inhibit re-exploitation (within 72 hours)
    • Implement a network-wide password reset (preferably with local host access only, no remote changes allowed) to include:

A patch management process that regularly patches vulnerable software remains a critical component in raising the difficulty of intrusions for cyber operators. While a few adversaries use zero-day exploits to target victims, many adversaries still target known vulnerabilities for which patches have been released, capitalizing on slow patch processes and risk decisions by network owners not to patch certain vulnerabilities or systems.

After initial response activities, deploy and correctly configure Microsoft’s Enhanced Mitigation Experience Toolkit (EMET). EMET employs several mitigation techniques to combat memory corruption techniques. It is recommended that all hosts and servers on the network implement EMET, but for recommendations on the best methodology to employ when deploying EMET, please see NSA/IAD’s Anti-Exploitation Slick sheet – https://www.nsa.gov/ia/_files/factsheets/I43V_Slick_Sheets/Slicksheet_AntiExploitationFeatures_Web.pdf

Implement Data-At-Rest (DAR) Protections.

  • The goal for DAR protections is to prevent an attacker from compromising sensitive data when the End User Device (EUD) is powered off or unauthenticated.
  • The use of multiple encryption layers that meet IAD and CNSSP-15 guidance, implemented with components meeting the Commercial Solution for Classified (CSfC) vendor diversity requirements, reduces the likelihood that a single vulnerability or failure can be exploited to compromise EUDs, move laterally through a network, and access sensitive data.
  • Receiving and validating updates or code patches for these components only through direct physical administration or an NSA approved Data in Transit (DIT) solution mitigates the threat of malicious attempts to push unverified updates or code updates.
  • Procure products that have been validated through NIAP’s DAR Protection Profiles (PPs) and utilize the DAR Capability Package (CP) that provides configurations allowing customers to independently implement secure solutions using layered Commercial Off-the-Shelf (COTS) products. The CP is vendor-agnostic and provides high-level security and configuration guidance for customers and/or Solution Integrators.

Implement long-term mitigations to further harden systems

1. Protect Credentials: By implementing the following credential protections, the threat actor’s ability to gain highly privileged account access and move throughout a network is severely hampered.

a. Implement Least Privilege: Least privilege is the limiting of rights assigned to each group of accounts on a network to only the rights required for the user, as in a normal user is only granted user level privileges and cannot perform any administrative tasks such as installing software.

b. Restrict Local Accounts: By restricting the usage of local accounts, especially local administer accounts, you are able to reduce the amount of usable credentials found within a network. When utilizing local accounts, passwords and their corresponding hashes are stored on the host and are more readily available for harvesting by an adversary who seeks to establish persistence. Adversaries are known to use this information to move across the network through Pass the Hash.

c. Limit lateral movement: This mitigation reduces the adversary’s ability to go from exploiting one machine to taking over the entire network. Host firewall rules, Active Directory structuring, and/or Group Policy settings, can be tailored to stop communications between systems and increase the survivability and defensibility of a network under attack.

d. Admin Access Segregation: Once an adversary gains administrator credentials, especially domain administrator credentials, the network becomes wide open to their malicious activity. By decreasing the surface area where administrator credentials can be stolen, through restricting where administrators can use their accounts and what they can use their accounts for, the threat actor will have a much harder time fully compromising a network. Having different passwords and credentials for user, local administrator, and domain administrator accounts prevents an adversary from reusing a stolen credential from one to gain more access.

e. Admin Access Protection: Using encrypted protocols across the network where credentials especially administrative credentials, are sent in the clear enables an adversary to grab them in transit and reuse them. Be sure to use encrypted protocols (e.g. HTTPS, SSH, RDP, SFTP, etc.) for all management connections where credentials are passed, and disable the use of unencrypted protocols (e.g. Telnet, FTP, HTTP, etc.).

f. Ensure Administrative Accounts do not have email accounts or Internet access.

g. Utilize Strong Authentication: By enforcing multi-factor authentication (e.g., using smart cards), especially for privileged account and remote access (e.g. VPNs), you dramatically reduce when and where stolen credentials can be reused by an adversary. Until then, create, enforce, and maintain strong password policies across the organization. The use of strong password policies must be mandated for all users and is especially critical for administrator accounts and service accounts. Passwords should be complex and contain a combination of letters, numbers, and special characters, and they should be of a sufficient length (greater than 14 characters); require regular password changes for all administrative and other privileged account; and prevent the reuse of usernames and passwords across multiple domains and/or multiple systems.

h. Log and Monitor Privileged Admin Account Usage: Implementing logging and monitoring capabilities on privileged accounts can provide insight to system owners and incident response professionals of account misuse and potential compromise by malicious actors. For instance it may be discovered that a domain admin is logging in at 2200 every night even though that admin is done working for the day and gone from the building. This mitigation would also enable discovery of any privileged admin accounts that were created by the actor for persistence.

i. Log and Monitor Use of Administrative Tools: Non-administrative use of built-in OS administrative tools should be locked down in accordance with applicable guidance and hardening policies. Use of these tools, such as Windows® PowerShell® and Windows Management Instrumentation Command-line (WMIC), should be logged and monitored to help enable early detection of a compromise. Though administration activities take place on a constant basis, certain behaviors, or sets of activities, in concert with others, are suspicious and can lead to a discovery of intrusion. For example, the ‘ping’ command by itself has legitimate uses. However, the ‘ping’ command followed by a PowerShell command from one workstation to another is very suspicious.

2. Segregate Networks and Functions:

a. Know Your Network: Enterprise networks often become unmanageable leading to inefficient administration and ineffective security. In order to have any sort of control over your network, you first need to know what and where everything is and does. Ensure information about your networks is documented and is updated regularly. Create an accurate list of ALL devices and ALL protocols that are running on your network. Identify network enclaves and examine your network trust relationships within and between those enclaves as well as with external networks to determine whether they are really necessary for your organization’s mission.

b. DMZ Isolation: By ensuring that the DMZ is properly segregated both through physical and logical network architecture and admin/user accounts, a network owner can greatly decrease the external attack surface. Since webservers and corresponding databases usually sit in this location and are also externally accessible, they regularly are the first target during CNO. If these systems are compromised and the DMZ is not configured properly or at all, it could mean the loss of the entire enterprise.

c. Network Function Segregation: A network owner should implement a tiered system when determining the switching within a network. This way the lower security systems, like user workstations or machines with email and internet access, cannot insecurely communicate with higher security systems like domain controllers and other member servers. This can be achieved through multiple methods including VLANs, physical network topologies, and firewall rule sets. In the same vein, networks need to apply the same segregation principle to the various tiers of accounts within a network, ensuring highly privileged accounts cannot access lower security tiered systems and low privilege accounts cannot access higher security tiered systems.

d. Limit Workstation-to-Workstation Communications: Pass-the-Hash (PtH) and other forms of legitimate credential reuse are serious vulnerabilities existing in all environments that implement Single Sign-on. PtH allows an attacker to reuse legitimate administrator or user credentials to move from system to system on a network without ever having to crack password. Once an attacker compromises a single host, s/he will typically reuse stolen hashed credentials to spread to other systems on the network, gain access to a privileged user’s workstation, grab domain administrator credentials, and subsequently take control of the entire environment. Limiting workstation-to-workstation communication will severely restrict attackers’ freedom of movement via techniques such as PtH. In general, limiting the number and type of communication flows between systems also aids in the detection of potentially malicious network activity. Because there are fewer allowed communication paths, abnormal flows become more apparent to attentive network defenders.

e. Perimeter Filtering: Perimeter filtering refers to properly implementing network security devices, such as proxies, firewall, web content filters, and IDS/IPS. The intent is to block malicious traffic from reaching a user’s machine and provide protection against data exfiltration and command and control.

f. Use Web Domain Name System (DNS) Reputation: Various commercial services offer feeds rating the trustworthiness of web domains. Enterprises can protect their hosts by screening web accesses against such services and redirecting dangerous web requests to a warning page. Inspection can be implemented at either the web proxy or browser level.

g. Restrict or Prevent Remote Admin Access: Prior to an intrusion, remote access should be severely restricted and highly monitored. Once an intrusion is detected, all remote administration should be completely disallowed. Not only does this clear up the network traffic coming and going from a network, it also allows the network defenders to determine that the remote administration activities are malicious and better track and block them.

3. Implement Application Whitelisting: Application whitelisting is the configuring of host system to only execute a specific, known set of code. Basically, if a program or executable code, such as a piece of malware, is not included in the whitelist it’s never allowed to run.

4. Install and correctly use EMET: One of the frequently used tactics by an adversary is to initially infect a host through spear-phishing and drive-by’s/water-holing websites. The best way to counter this initial exploitation is through the implementation of an anti-exploitation tool, such as Microsoft’s Enhanced Mitigation Experience Toolkit (EMET). These tools can render useless entire classes of malware and malicious TTP instead of eliminating one piece of malware at a time; an enormous boon to a network’s security.

5. Implement Host Intrusion Prevention System (HIPS) Rules: Standard signature-based host defenses are overwhelmed by exploit kits that continually morph attack components. HIPS technology focuses on threat behaviors and can better scale to entire sets of intrusion activities. For an enterprise with a well-configured and managed network, HIPS can be tuned to learn and allow normal network functionality while flagging anomalies characteristic of intrusions.

6. Centralize logging of all events: By pulling all of the system logs (such as Windows Event or Error logs, and any logs from security devices, such as SNORT, HIPS or firewall rule hits, as a few examples) into a centralized location that protects it from tampering and enables analytics, the network admin and intrusion response team would be able to more efficiently detect and understand the tools, tactics, and procedures of the adversary. This paper does not detail the entirety of logs that could be aggregated, however, specific recommendations of particular logs that should be targeted for aggregation can be obtained via consultation with the network’s Computer Network Defense-Service Provider (CND-SP) or with any of the organizations listed in the introduction of this section.

7. Take Advantage of Software Improvement: Apply patches for vulnerabilities as soon as they are released by the vendor. Upgrade as new versions of applications, software and operating systems become available. Delaying or ignoring patches for vulnerabilities considerably increases the chance of systems being exploited, in particular Internet/public facing systems (VPN, web, email servers). Open source research has shown that a working exploit is often available on the same day vulnerabilities are publicly disclosed, making it imperative to patch immediately. Vendors typically perform extensive testing of patches prior to release so misconceptions about negative effects on systems are often overstated. The cost of pre-deployment testing by the enterprise is miniscule compared to the potential costs incurred from a security breach. Application deployment and updating is becoming increasingly automated. Many operating systems and applications provide automatic update features to minimize the human factor.

8. Public Services Utilization: Enterprises are embracing the use of public services such as Cloud Storage and Social Networking Sites (SNS) as they offer capabilities not available with traditional software. These services also introduce a new set of vulnerabilities that must be considered. Open source reporting has shown these services to be an increasingly used vector for both malware delivery and data exfiltration. Establish a comprehensive public services policy and framework. Discover and document all the Cloud and Social Networking Services used and establish a policy that includes IT sanctioned sites permitted and prohibited within the enterprise as well as what is considered acceptable use. Integrate traffic logs to/from these sites into your centralized logging environment and implement analytics to detect and alert on potentially suspicious or abnormal traffic that could be indicative of a compromise.

9. Use a Standard Baseline: Implementing a uniform image with security already baked in and standardized applications affords the incident response team the ability to look at exploited machines and distinguish what is malicious vs. allowed. It also ensures that each machine on network is at least at a certain level of security prior to further customization for a user’s needs. Within the DoDIN this can be satisfied through the Unified Master Gold Disk, maintained and distributed through DISA.

10. Centralize logging of all events: By pulling all of the system logs, such as Windows Event or Error logs, and any logs from security devices, such as SNORT or firewall rule hits, into a centralized location, the network admin and intrusion response team would be able to more efficiently detect and understand the tools, tactics, and procedures of the adversary. Using this information then increases the responder’s ability to effectively corner and expel the adversary.

11. Data-at-Rest and Data-in-Transit Encryption: Implementing encryption for both data at rest and data in transit ensures that what is meant to be kept private stays private, whether it is stored on a disk or moving across a network. It means that exfiltration and espionage attempts can be thwarted since a threat actor cannot access the information.

Go back

Your message has been sent

Warning
Warning
Warning
Warning

Warning.

Fbi Most Wanted, Fbi Jobs, Fbi Director, Fbi Salary, Fbi Agent, Fbi Background Check, Fbi Agent Salary, Fbi Headquarters, Fbi Special Agent, Fbi Internships, Fbi Agent, Fbi Agent Salary, Fbi Academy, Fbi Application, Fbi Analyst, Fbi Atlanta, Fbi Agent Jobs, Fbi Anon, Fbi Address, Fbi Arrests, Fbi Background Check, Fbi Badge, Fbi Bau, Fbi Building, Fbi Boston, Fbi Bap, Fbi Baltimore, Fbi Benefits, Fbi Budget, Fbi Building Dc, Fbi Careers, Fbi Crime Statistics, Fbi Clearance, Fbi Criminal Background Check, Fbi Chicago, Fbi Citizens Academy, Fbi Crime Statistics By Race, Fbi Contact, Fbi Channeler, Fbi Candidates, Fbi Director, Fbi Director Candidates, Fbi Director James Comey, Fbi Definition, Fbi Director Fired, Fbi Director Salary, Fbi Definition Of Terrorism, Fbi Database, Fbi Dallas, Fbi Drug Policy, Fbi Employment, Fbi Email Address, Fbi Employment Drug Policy, Fbi El Paso, Fbi Employees, Fbi Emblem, Fbi Established, Fbi Education Center, Fbi Education, Fbi Executive Branch, Fbi Fingerprinting, Fbi Files, Fbi Field Offices, Fbi Fingerprint Card, Fbi Fitness Test, Fbi Facebook, Fbi Fingerprint Check, Fbi Forensic Accountant, Fbi Foia, Fbi Founder, Fbi Glock, Fbi Games, Fbi Gov, Fbi Glassdoor, Fbi Guns, Fbi Gang List, Fbi Gun Statistics, Fbi Gif, Fbi Gift Shop, Fbi General Counsel, Fbi Headquarters, Fbi Hrt, Fbi History, Fbi Houston, Fbi Hiring, Fbi Hate Crime Statistics, Fbi Head, Fbi Hat, Fbi Honors Internship, Fbi Hotline, Fbi Internships, Fbi Investigation, Fbi Intelligence Analyst, Fbi Informant, Fbi Irt, Fbi Investigation Trump, Fbi Ic3, Fbi Infragard, Fbi Internet Fraud, Fbi Id, Fbi Jobs, Fbi Jacket, Fbi James Comey, Fbi Jurisdiction, Fbi Job Description, Fbi Jobs Apply, Fbi Jacksonville, Fbi Jade Helm, Fbi Jobs Chicago, Fbi Jackson Ms, Fbi Kansas City, Fbi Kids, Fbi Knoxville, Fbi Kidnapping, Fbi Komi, Fbi Kentucky, Fbi Killed Jfk, Fbi Kkk, Fbi Kodi, Fbi K9 Unit, Fbi Logo, Fbi Leeda, Fbi Los Angeles, Fbi Locations, Fbi Las Vegas, Fbi Leaks, Fbi Leader, Fbi Linguist, Fbi Louisville, Fbi Login, Fbi Most Wanted, Fbi Most Wanted List, Fbi Meaning, Fbi Meme, Fbi Movies, Fbi Museum, Fbi Motto, Fbi Miami, Fbi Mission Statement, Fbi Most Dangerous Cities, Fbi Number, Fbi News, Fbi National Academy, Fbi Nics, Fbi New York, Fbi New Orleans, Fbi Newark, Fbi New York Tv Show, Fbi Near Me, Fbi Nominee, Fbi Offices, Fbi Org Chart, Fbi Omaha, Fbi Operative, Fbi On Trump, Fbi Organizational Chart, Fbi Obama Meme, Fbi Obama, Fbi Oklahoma City, Fbi Office Near Me, Fbi Phone Number, Fbi Profiler, Fbi Pft, Fbi Police, Fbi Pay Scale, Fbi Phoenix, Fbi Pay, Fbi Philadelphia, Fbi Positions, Fbi Pittsburgh, Fbi Quantico, Fbi Qualifications, Fbi Q Target, Fbi Quotes, Fbi Quiz, Fbi Questions, Fbi Qr Code, Fbi Qas, Fbi Quantico Address, Fbi Quantico Tours, Fbi Requirements, Fbi Russia, Fbi Russia Investigation, Fbi Report, Fbi Ranks, Fbi Recruiting, Fbi Raid, Fbi Records, Fbi Rape Statistics, Fbi Russia Trump, Fbi Salary, Fbi Special Agent, Fbi Stands For, Fbi Swat, Fbi Special Agent Salary, Fbi Surveillance, Fbi Statistics, Fbi Sos, Fbi Surveillance Van, Fbi Seal, Fbi Training, Fbi Top Ten, Fbi Trump, Fbi Trump Russia, Fbi Tip Line, Fbi Tv Shows, Fbi Twitter, Fbi Tips, Fbi Teen Academy, Fbi Tours, Fbi Ucr, Fbi Ucr 2016, Fbi Units, Fbi Ucr 2015, Fbi Undercover, Fbi Unsolved Cases, Fbi Upin, Fbi Utah, Fbi Usa, Fbi Uniforms, Fbi Vs Cia, Fbi Vault, Fbi Virus, Fbi Vs Apple, Fbi Virtual Academy, Fbi Vehicles, Fbi Violent Crime Statistics, Fbi Virginia, Fbi Van, Fbi Van Wifi, Fbi Website, Fbi Warning, Fbi Wiki, Fbi Wanted List, Fbi Watch List, Fbi Windbreaker, Fbi Warning Screen, Fbi White Collar Crime, Fbi Warrant Search, Fbi Weapons, Fbi X Files, Fbi Xl2, Fbi Xl31, Fbi Xl4, Fbi Xl2 Programming, Fbi Xl-31 Troubleshooting, Fbi Xl 31 Installation Manual, Fbi X Files Real, Fbi Xl2t Installation Manual, Fbi Xl 1215, Fbi Yearly Salary, Fbi Youtube, Fbi Youth Academy, Fbi Youth Leadership Academy, Fbi Yellow Brick Road, Fbi Youth Programs, Fbi Yearly Budget, Fbi Youth Leadership Academy Portland, Fbi Youngstown Ohio, Fbi Yearly Income, Fbi Zodiac Killer, Fbi Zodiac, Fbi Zip Code, Fbi Zodiac Killer List, Fbi Zero Files, Fbi Zodiac List, Fbi Zodiac Signs Killer, Fbi Zhang Yingying, Fbi Zion, Fbi Zodiac Crimes, Cybercrime Definition, Cybercrime Statistics, Cybercrime Prevention, Cybercrime Articles, Cybercrime Jobs, Cybercrime Law, Cybercrime Statistics 2017, Cyber Crime Cases, Cyber Crime News, Cybercrime Topics, Cybercrime Articles, Cybercrime And Security, Cybercrime As A Service, Cybercrime And Digital Forensics An Introduction, Cybercrime And Digital Forensics, Cybercrime And Society, Cybercrime And Terrorism, Cybercrime Attacks, Cybercrime Act, Cybercrime Against Businesses, Cyber Crime Batman, Cyber Crime Book, Cybercrime Blog, Cybercrime Bill, Cybercrime Banks, Cybercrime Background, Cyber Crime By Country, Cybercrime Bangalore, Cybercrime Billion Dollar Industry, Cybercrime Background Information, Cyber Crime Cases, Cybercrime Certification, Cybercrime Convention, Cybercrime Careers, Cybercrime Cost, Cybercrime Cafe, Cybercrime Cost 2016, Cybercrime China, Cybercrime Conference, Cybercrime Conclusion, Cybercrime Definition, Cybercrime Definition Computer, Cybercrime Definition Fbi, Cyber Crime Data, Cybercrime Degrees, Cybercrime Definition Pdf, Cybercrime Database, Cyber Crime Detective, Cyber Crime Documentary, Cyber Crime Department, Cybercrime Example, Cyber Crime Essay, Cybercrime Effects, Cybercrime Events, Cybercrime Enforcement, Cybercrime Economy, Cyber Crime Ethics, Cybercrime Effects On Business, Cybercrime Ecosystem, Cybercrime Enforcement Training Assistance Act, Cybercrime Facts, Cybercrime Fbi, Cybercrime Forensics, Cybercrime Forum, Cybercrime Forensics Training Center, Cybercrime Federal Laws, Cyber Crime Fiction, Cybercrime Financial Services, Cybercrime Future Trends, Cybercrime Fiji, Cybercrime Gets Personal Money Magazine, Cybercrime Gets Personal, Cybercrime Growth, Cyber Crime Graph, Cybercrime Groups, Cybercrime Government, Cybercrime Global Statistics, Cyber Crime Gov, Cyber Crime Games, Cybercrime Gif, Cybercrime Hacking, Cyber Crime History, Cybercrime Help, Cybercrime Healthcare, Cybercrime Hyderabad, Cybercrime How To Report, Cyber Crime Hotline, Cybercrime Hacking News, Cyber Crime Head Office India, Cybercrime Hacking And Cracking, Cybercrime Identity Theft, Cybercrime In The Us, Cyber Crime Investigation, Cybercrime Images, Cyber Crime Insurance, Cybercrime Is Also Known As, Cybercrime Investigating High-technology Computer Crime, Cybercrime Infographic, Cybercrime Information, Cyber Crime In Russia, Cybercrime Jobs, Cybercrime Jurisdiction, Cybercrime Journal Articles, Cybercrime Job Description, Cybercrime Jobs Salary, Cybercrime Job Openings, Cybercrime Jobs In Chennai, Cybercrime Job Qualification, Cybercrime Journal Articles Pdf, Cyber Crime Jamaica, Cybercrime Kenya, Cybercrime Key Issues And Debates, Cybercrime Kuwait, Cybercrime Ki Dhara, Cybercrime Key Issues And Debates Pdf, Cybercrime Kasus, Cyber Crime Karnataka, Cybercrime Kartu Kredit, Cybercrime Kolkata, Cyber Crime Karachi, Cybercrime Law, Cybercrime Laws In Usa, Cybercrime Law Enforcement, Cybercrime Laws Of The United States, Cybercrime List, Cybercrime Legislation Us, Cybercrime Laws In Florida, Cybercrime Legal Issues, Cybercrime Law Outline, Cyber Crime Lesson Plans, Cybercrime Meaning, Cyber Crime Movies, Cybercrime Methods, Cybercrime Methodology, Cyber Crime Money, Cybercrime Markets, Cyber Crime Magazine, Cyber Crime Most Wanted, Cybercrime Meaning In Tamil, Cybercrime Masters Degree, Cyber Crime News, Cyber Crime News Articles, Cyber Crime News Articles 2017, Cyber Crime Netflix, Cybercrime Nigeria, Cyber Crime Novels, Cybercrime Number, Cybercrime Nhs, Cyber Crime News Philippines, Cybercrime Nbi, Cybercrime Or Cyber Crime, Cybercrime Organizations, Cybercrime On The Rise, Cybercrime On The High Seas, Cybercrime Offenses, Cyber Crime Outline, Cybercrime Office, Cybercrime Office In Ahmedabad, Cybercrime Office In Patna, Cybercrime Office In Nashik, Cybercrime Quotes, Cyber Crime Quizlet, Cybercrime Questions, Cyber Crime Quiz, Cybercrime Questionnaire, Cybercrime Question Paper, Cybercrime Qatar, Cybercrime Question And Answers, Cybercrime Report, Cybercrime Research Paper, Cyber Crime Rates, Cyber Crime Recent, Cybercrime Research Topics, Cybercrime Research, Cybercrime Reported To The Ic3, Cybercrime Resources, Cybercrime Riding Tax Season Tides, Cyber Crime Report 2016, Cybercrime Statistics, Cybercrime Statistics 2017, Cyber Crime Stories, Cybercrime Spyware, Cybercrime Statistics 2015, Cybercrime Security, Cybercrime Solutions, Cybercrime Salary, Cybercrime Small Business, Cyber Crime Synonym, Cybercrime Topics, Cybercrime Trends, Cybercrime Tracker, Cybercrime Treaty, Cyber Crime Types, Cybercrime Training, Cybercrime Threats, Cybercrime Tools, Cybercrime Terms, Cybercrime The Transformation Of Crime In The Information Age, Cyber Crime Unit, Cybercrime Us, Cybercrime Uk, Cybercrime Uae, Cybercrime University, Cybercrime Un, Cyber Crime Unit Mauritius, Cyber Crime Unit Malta, Cybercrime Uc, Cybercrime Unodc, Cybercrime Victims, Cybercrime Vs Traditional Crime, Cybercrime Videos, Cybercrime Vs Traditional Crime Statistics, Cybercrime Virus, Cyber Crime Vocabulary, Cybercrime Vs Traditional Crime Punishment, Cybercrime Vs Computer Crime, Cybercrime Vs Cyber Warfare, Cybercrime Vs Cyber Espionage, Cybercrime Wiki, Cybercrime Worm, Cybercrime World Wide War 3.0, Cyber Crime Websites, Cyber Crime Worksheet, Cybercrime Wallpaper, Cyber Crime Worldwide, Cybercrime Working Group, Cyber Crime What Is It, Cybercrime Wikipedia Indonesia, Cybercrime X-remote Download, Tedx Cybercrime, Cyber Crime Youtube, Cyber Crime Yahoo, Cyber Crime Yahoo Answers, Cyber Crime Yesterday, Cyber Crime Youth, Cybercrime Yang Menyerang Hak Cipta, Cybercrime Yar, Youth Cyber Crime, Cyber Crime Yogyakarta, Cybercrime Yang Menyerang Pemerintah, Cybercrime Zimbabwe, Cybercrime Zeus, Cybercrime Zimbra, Zurich Cyber Crime, Zimbabwe Cybercrime Bill, Cyber Crime In Zambia, New Zealand Cyber Crime, Los Zetas Cybercrime, Cybercrime Law In Zambia, Cyber Crime Cases In Zambia

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, CYBERCRIME, FBI *, FINANCE INDUSTRY, PUBLIC INTELLIGENCE August 8, 2016June 22, 2021 18 Minutes

FBI New Orleans Alert: Violence Against Law Enforcement and Riots Planned for July 8-10 2016

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

The following situational information report was originally obtained and published by Judicial Watch.

Violenee Against Law Enforeement Offieers and Riots Planned for 8-10 July 2016

Page Count: 7 pages
Date: July 7, 2016
Restriction: For Official Use Only
Originating Organization: Federal Bureau of Investigation, New Orleans Division
File Type: pdf
File Size: 1,546,442 bytes
File Hash (SHA-256):E4BB8AA9ABDE69C0F33B94E8437A9ACF0A70FAB2A5BC7293DA01AF921FE46D53

Download File

(U//FOUO) The purpose of this Situational Information Report (SIR) is to alert first responders of threats to law enforcement and potential threats to the safety of the general public. The threats stem from an officer involved shooting in Baton Rouge, Louisiana on 5 July 2016.

…

(U//FOUO) According to information forwarded to FBI New Orleans, multiple groups are calling for or planning riots and/or violence against law enforcement in Baton Rouge, Louisiana and Shreveport, Louisiana beginning Friday, 8 July 2016 and continuing through at least 10 July 2016.

(U//FOUO) FBI New Orleans Comment: The Louisiana Fusion Center confirmed additional protests are also planned in multiple locations throughout Louisiana, but cannot confirm additional threats of violence at this time.

Go back

Your message has been sent

Warning
Warning
Warning
Warning

Warning.

Fbi Most Wanted, Fbi Jobs, Fbi Director, Fbi Salary, Fbi Agent, Fbi Background Check, Fbi Agent Salary, Fbi Headquarters, Fbi Special Agent, Fbi Internships, Fbi Agent, Fbi Agent Salary, Fbi Academy, Fbi Application, Fbi Analyst, Fbi Atlanta, Fbi Agent Jobs, Fbi Anon, Fbi Address, Fbi Arrests, Fbi Background Check, Fbi Badge, Fbi Bau, Fbi Building, Fbi Boston, Fbi Bap, Fbi Baltimore, Fbi Benefits, Fbi Budget, Fbi Building Dc, Fbi Careers, Fbi Crime Statistics, Fbi Clearance, Fbi Criminal Background Check, Fbi Chicago, Fbi Citizens Academy, Fbi Crime Statistics By Race, Fbi Contact, Fbi Channeler, Fbi Candidates, Fbi Director, Fbi Director Candidates, Fbi Director James Comey, Fbi Definition, Fbi Director Fired, Fbi Director Salary, Fbi Definition Of Terrorism, Fbi Database, Fbi Dallas, Fbi Drug Policy, Fbi Employment, Fbi Email Address, Fbi Employment Drug Policy, Fbi El Paso, Fbi Employees, Fbi Emblem, Fbi Established, Fbi Education Center, Fbi Education, Fbi Executive Branch, Fbi Fingerprinting, Fbi Files, Fbi Field Offices, Fbi Fingerprint Card, Fbi Fitness Test, Fbi Facebook, Fbi Fingerprint Check, Fbi Forensic Accountant, Fbi Foia, Fbi Founder, Fbi Glock, Fbi Games, Fbi Gov, Fbi Glassdoor, Fbi Guns, Fbi Gang List, Fbi Gun Statistics, Fbi Gif, Fbi Gift Shop, Fbi General Counsel, Fbi Headquarters, Fbi Hrt, Fbi History, Fbi Houston, Fbi Hiring, Fbi Hate Crime Statistics, Fbi Head, Fbi Hat, Fbi Honors Internship, Fbi Hotline, Fbi Internships, Fbi Investigation, Fbi Intelligence Analyst, Fbi Informant, Fbi Irt, Fbi Investigation Trump, Fbi Ic3, Fbi Infragard, Fbi Internet Fraud, Fbi Id, Fbi Jobs, Fbi Jacket, Fbi James Comey, Fbi Jurisdiction, Fbi Job Description, Fbi Jobs Apply, Fbi Jacksonville, Fbi Jade Helm, Fbi Jobs Chicago, Fbi Jackson Ms, Fbi Kansas City, Fbi Kids, Fbi Knoxville, Fbi Kidnapping, Fbi Komi, Fbi Kentucky, Fbi Killed Jfk, Fbi Kkk, Fbi Kodi, Fbi K9 Unit, Fbi Logo, Fbi Leeda, Fbi Los Angeles, Fbi Locations, Fbi Las Vegas, Fbi Leaks, Fbi Leader, Fbi Linguist, Fbi Louisville, Fbi Login, Fbi Most Wanted, Fbi Most Wanted List, Fbi Meaning, Fbi Meme, Fbi Movies, Fbi Museum, Fbi Motto, Fbi Miami, Fbi Mission Statement, Fbi Most Dangerous Cities, Fbi Number, Fbi News, Fbi National Academy, Fbi Nics, Fbi New York, Fbi New Orleans, Fbi Newark, Fbi New York Tv Show, Fbi Near Me, Fbi Nominee, Fbi Offices, Fbi Org Chart, Fbi Omaha, Fbi Operative, Fbi On Trump, Fbi Organizational Chart, Fbi Obama Meme, Fbi Obama, Fbi Oklahoma City, Fbi Office Near Me, Fbi Phone Number, Fbi Profiler, Fbi Pft, Fbi Police, Fbi Pay Scale, Fbi Phoenix, Fbi Pay, Fbi Philadelphia, Fbi Positions, Fbi Pittsburgh, Fbi Quantico, Fbi Qualifications, Fbi Q Target, Fbi Quotes, Fbi Quiz, Fbi Questions, Fbi Qr Code, Fbi Qas, Fbi Quantico Address, Fbi Quantico Tours, Fbi Requirements, Fbi Russia, Fbi Russia Investigation, Fbi Report, Fbi Ranks, Fbi Recruiting, Fbi Raid, Fbi Records, Fbi Rape Statistics, Fbi Russia Trump, Fbi Salary, Fbi Special Agent, Fbi Stands For, Fbi Swat, Fbi Special Agent Salary, Fbi Surveillance, Fbi Statistics, Fbi Sos, Fbi Surveillance Van, Fbi Seal, Fbi Training, Fbi Top Ten, Fbi Trump, Fbi Trump Russia, Fbi Tip Line, Fbi Tv Shows, Fbi Twitter, Fbi Tips, Fbi Teen Academy, Fbi Tours, Fbi Ucr, Fbi Ucr 2016, Fbi Units, Fbi Ucr 2015, Fbi Undercover, Fbi Unsolved Cases, Fbi Upin, Fbi Utah, Fbi Usa, Fbi Uniforms, Fbi Vs Cia, Fbi Vault, Fbi Virus, Fbi Vs Apple, Fbi Virtual Academy, Fbi Vehicles, Fbi Violent Crime Statistics, Fbi Virginia, Fbi Van, Fbi Van Wifi, Fbi Website, Fbi Warning, Fbi Wiki, Fbi Wanted List, Fbi Watch List, Fbi Windbreaker, Fbi Warning Screen, Fbi White Collar Crime, Fbi Warrant Search, Fbi Weapons, Fbi X Files, Fbi Xl2, Fbi Xl31, Fbi Xl4, Fbi Xl2 Programming, Fbi Xl-31 Troubleshooting, Fbi Xl 31 Installation Manual, Fbi X Files Real, Fbi Xl2t Installation Manual, Fbi Xl 1215, Fbi Yearly Salary, Fbi Youtube, Fbi Youth Academy, Fbi Youth Leadership Academy, Fbi Yellow Brick Road, Fbi Youth Programs, Fbi Yearly Budget, Fbi Youth Leadership Academy Portland, Fbi Youngstown Ohio, Fbi Yearly Income, Fbi Zodiac Killer, Fbi Zodiac, Fbi Zip Code, Fbi Zodiac Killer List, Fbi Zero Files, Fbi Zodiac List, Fbi Zodiac Signs Killer, Fbi Zhang Yingying, Fbi Zion, Fbi Zodiac Crimes, New Orleans Weather, New Orleans Saints, New Orleans Pelicans, New Orleans Hotels, New Orleans Airport, New Orleans Jazz Fest, New Orleans Saints Schedule, New Orleans La, New Orleans Baby Cakes, New Orleans Restaurants, New Orleans Airport, New Orleans Advocate, New Orleans Attractions, New Orleans Airport Code, New Orleans Assessor, New Orleans Aquarium, New Orleans Airport Parking, New Orleans Area Code, New Orleans Apartments, New Orleans Airbnb, New Orleans Baby Cakes, New Orleans Beignets, New Orleans Beaches, New Orleans Basketball, New Orleans Bounce, New Orleans Basketball Team, New Orleans Baseball, New Orleans Bbq Shrimp, New Orleans Best Restaurants, New Orleans Bread Pudding, New Orleans Convention Center, New Orleans Casino, New Orleans Craigslist, New Orleans Crime, New Orleans Cruises, New Orleans Cemetery, New Orleans City Park, New Orleans Concerts, New Orleans Colleges, New Orleans Country Club, New Orleans Desserts, New Orleans Donuts, New Orleans Drinks, New Orleans Demographics, New Orleans Dmv, New Orleans Directions, New Orleans Downtown, New Orleans Districts, New Orleans Drinking Age, New Orleans Dinner Cruise, New Orleans Events, New Orleans Events 2017, New Orleans Elevation, New Orleans East Hospital, New Orleans East, New Orleans Ems, New Orleans Entrepreneur Week, New Orleans Escape Room, New Orleans Eater, New Orleans Entertainment, New Orleans Flights, New Orleans Food, New Orleans French Quarter, New Orleans Festivals, New Orleans French Quarter Hotels, New Orleans Forecast, New Orleans Fairgrounds, New Orleans Flag, New Orleans French Market, New Orleans Ferry, New Orleans Garden District, New Orleans Ghost Tour, New Orleans Gumbo, New Orleans Groupon, New Orleans Gay Bars, New Orleans Garden District Hotels, New Orleans Gangs, New Orleans Gay Pride, New Orleans Golf, New Orleans Guide, New Orleans Hotels, New Orleans Hornets, New Orleans Hamburger And Seafood, New Orleans History, New Orleans Hurricane, New Orleans Hurricane Drink, New Orleans Hostel, New Orleans Homes For Sale, New Orleans House Of Blues, New Orleans Hospitals, New Orleans International Airport, New Orleans In July, New Orleans In June, New Orleans In October, New Orleans Ice Cream, New Orleans In August, New Orleans In May, New Orleans In September, New Orleans Indians, New Orleans Images, New Orleans Jazz Fest, New Orleans Jazz, New Orleans Jobs, New Orleans Jazz Fest 2018, New Orleans Jesters, New Orleans June 2017, New Orleans Jail, New Orleans Jazz Clubs, New Orleans Jazz Fest Tickets, New Orleans Jackson Square, New Orleans Katrina, New Orleans Kitchen, New Orleans Kayak Swamp Tours, New Orleans King Cake, New Orleans Kids, New Orleans Katrina Flood Map, New Orleans Koa, New Orleans Karaoke, New Orleans Katrina Tour, New Orleans Krewe, New Orleans La, New Orleans Library, New Orleans Levee, New Orleans Las Vegas, New Orleans La Weather, New Orleans La Zip Code, New Orleans Ladies, New Orleans Lakefront Airport, New Orleans Live Music, New Orleans Live Cam, New Orleans Map, New Orleans Marriott, New Orleans Monuments, New Orleans Mayor, New Orleans Museum Of Art, New Orleans Music, New Orleans Mall, New Orleans Museums, New Orleans Mardi Gras, New Orleans Mayor Speech, New Orleans News, New Orleans Neighborhoods, New Orleans Nicknames, New Orleans Nba, New Orleans Neighborhood Map, New Orleans Nightlife, New Orleans Names, New Orleans News Stations, New Orleans Nola, New Orleans Ncis, New Orleans On Map, New Orleans Obituaries, New Orleans Opera, New Orleans Outlet Mall, New Orleans October 2017, New Orleans Oysters, New Orleans One Stop, New Orleans Online, New Orleans Oyster Bar, New Orleans On A Budget, New Orleans Pelicans, New Orleans Pelicans Roster, New Orleans Population, New Orleans Public Library, New Orleans Pride, New Orleans Police Department, New Orleans Plantations, New Orleans Population 2016, New Orleans Plantation Tours, New Orleans Parking, New Orleans Quotes, New Orleans Quarterback, New Orleans Quarters, New Orleans Quilt Shops, New Orleans Quiz, New Orleans Weather, New Orleans Quarter House, New Orleans Queen Of Voodoo, New Orleans Queen, New Orleans Queen Of Bounce, New Orleans Restaurants, New Orleans Real Estate, New Orleans Radar, New Orleans Rentals, New Orleans Rta, New Orleans Riverwalk, New Orleans Recipes, New Orleans Resorts, New Orleans River Cruise, New Orleans Restaurants Yelp, New Orleans Saints, New Orleans Saints Schedule, New Orleans Saints Roster, New Orleans Statues, New Orleans Seafood, New Orleans Swamp Tour, New Orleans Streetcar, New Orleans Saints Tickets, New Orleans Streetcar Map, New Orleans School Of Cooking, New Orleans Time, New Orleans Things To Do, New Orleans Tours, New Orleans Trolley, New Orleans To Houston, New Orleans Times Picayune, New Orleans Tourism, New Orleans Traffic, New Orleans This Weekend, New Orleans Trip, New Orleans University, New Orleans Uber, New Orleans Urgent Care, New Orleans Uptown, New Orleans Used Cars, New Orleans United States, New Orleans Uptown Restaurants, New Orleans Unemployment Rate, New Orleans Union Passenger Terminal, New Orleans Under Water, New Orleans Vacation, New Orleans Voodoo, New Orleans Vacation Rentals, New Orleans Voodoo Tour, New Orleans Va, New Orleans Vampires, New Orleans Voodoo Museum, New Orleans Vampire Tour, New Orleans Vegas, New Orleans Visit, New Orleans Weather, New Orleans Weather Radar, New Orleans Weather Today, New Orleans Wedding Venues, New Orleans With Kids, New Orleans Wedding, New Orleans Walking Tours, New Orleans Weather In May, New Orleans Weather In June, New Orleans What To Do, New Orleans Zip Code, New Orleans Xavier University, New Orleans Zoo, New Orleans X, New Orleans X On Houses, New Orleans X Brake, New Orleans Xarelto Trial, New Orleans Zephyrs, New Orleans Zip Code Map, New Orleans Zip, New Orleans Yacht Club, New Orleans Yoga, New Orleans Yelp, New Orleans Ymca, New Orleans Yoga Apparel, New Orleans Yellow Pages, New Orleans Youtube, New Orleans Yellow Fever, New Orleans Yearly Weather, New Orleans Yakamein, New Orleans Zip Code, New Orleans Zoo, New Orleans Zephyrs, New Orleans Zip Code Map, New Orleans Zip, New Orleans Zika, New Orleans Zillow, New Orleans Zoo Tickets, New Orleans Zoning, New Orleans Zoo Coupons, Violence Against Women Act, Violence Definition, Violence Synonym, Violence Against Women, Violence In Video Games, Violence Jack, Violence In Chicago, Violence In The Bible, Violence Of Action, Violence Quotes, Violence Against Women Act, Violence Against Women, Violence Against Women Statistics, Violence Against Transgender, Violence Against Lgbt, Violence Against Men, Violence At Trump Rallies, Violence Against Women Journal, Violence Against Women In India, Violence And Victims, Violence Begets Violence, Violence Blink 182, Violence Band, Violence Blink 182 Lyrics, Violence Bob, Violence Book, Violence By Race, Violence By Country, Violence Bible, Violence Bob Lyrics, Violence Can Be Defined As, Violence Cycle, Violence Civil Rights Movement, Violence Chicago, Violence Creeps, Violence Continuum, Violence Current Events, Violence Clipart, Violence Causes, Violence Crime, Violence Definition, Violence During Ramadan, Violence During The Civil Rights Movement, Violence Domestic, Violence Does Solve Problems, Violence During The Great Depression, Violence Definition Law, Violence Desensitization, Violence During Reconstruction, Violence Definition Sociology, Violence Etymology, Violence Erupted At The Homestead Works In 1892 When, Violence Essay, Violence El Salvador, Violence Enough Is Enough, Violence Erupted In 1962 When, Violence Effects, Violence Epidemiology, Violence Evility Disgaea 5, Violence Erupted In Kansas Following The Passage Of The, Violence Facts, Violence For Violence Is The Rule Of Beasts, Violence Fight, Violence From Video Games, Violence Free Zone, Violence Free, Violence Font, Violence For The Sake Of Violence, Violence From The Left, Violence Facts And Statistics, Violence Gene, Violence Gif, Violence Girl, Violence Game, Violence Guatemala, Violence Girl Alice Bag, Violence Girl Alice Bag Pdf, Violence Gilligan, Violence Goes To College, Violence Guns And Drugs A Cross-country Analysis, Violence Hotline, Violence Horse, Violence Has A Gender, Violence Has Arrived, Violence History, Violence Honduras, Violence Help, Violence Helped Ensure Safety Of Students, Violence Hits Home, Violence Hospitality And The Cross, Violence In Video Games, Violence In Chicago, Violence In The Bible, Violence In The Media, Violence In Schools, Violence In Birmingham, Violence In The Workplace, Violence In Mexico, Violence In America, Violence Intervention Program, Violence Jack, Violence Jack Uncut, Violence Journals, Violence Jack Manga, Violence Jack Harem Bomber, Violence Jack English Dub, Violence Jack Tv Tropes, Violence Jack Review, Violence Justified, Violence Jack Evil Town, Violence Kings, Violence Killer Turok New Generation, Violence Killer, Violence Quran, Violence Kkk, Violence Katrina And The Biopolitics Of Disposability, Violence Kjv, Violence Kenya, Violence Katrina And The Biopolitics Of Disposability Summary, Violence Kite Runner, Violence Lyrics, Violence Leads To More Violence, Violence Lyrics Rise Against, Violence Lecrae Lyrics, Violence Lyrics Bob, Violence Lecrae, Violence Loving Culture Def, Violence Laws, Violence Linked To Video Games, Violence Latin America, Violence Meaning, Violence Meme, Violence Movie, Violence Mod Sims 4, Violence Media, Violence Mexico, Violence Mourning Politics, Violence Music, Violence Mental Illness, Violence Mourning Politics Summary, Violence News, Violence No More, Violence New Testament, Violence Never Brings Permanent Peace, Violence Nclex Questions, Violence Nature Or Nurture, Violence Never Solved Anything Except, Violence New Orleans, Violence Now, Violence Northern Ireland, Violence Of Action, Violence On Tv, Violence On College Campuses, Violence Of Action Book, Violence On Campus, Violence On Social Media, Violence Of Action Quote, Violence Of The Lambs, Violence On Television Is Measured In Terms Of, Violence Only Begets Violence, Violence Prevention, Violence Policy Center, Violence Prevention Center, Violence Prevention Strategies, Violence Prevention Strategies Include Which Of The Following, Violence Prevention Workshop, Violence Poems, Violence Prevention Coalition, Violence Peace And Peace Research, Violence Psychology, Violence Quotes, Violence Quotes In Macbeth, Violence Quotes In Night, Violence Questions, Violence Quran, Violence Quotes In The Bible, Violence Quotes In Catcher In The Rye, Violence Quotes In The Outsiders, Violence Quotes In Fahrenheit 451, Violence Questions For Discussion, Violence Risk Assessment, Violence Rise Against, Violence Risk Assessment Tools, Violence Reduction Network, Violence Rhyme, Violence Risk Appraisal Guide, Violence Rise Against Lyrics, Violence Risk Factors, Violence Rates, Violence Reflections On A National Epidemic, Violence Synonym, Violence Statistics, Violence Speed Momentum, Violence Symbols, Violence Statistics Us, Violence Stallion, Violence Song, Violence Solves Nothing, Violence Statistics By Gender, Violence Solves Everything, Violence Thesaurus, Violence Today, Violence The Enduring Problem, Violence Toy, Violence Theory, Violence Test, Violence To Vegas, Violence Tender Lyrics, Violence Types, Violence Tab, Violence Unveiled, Violence Unlikely Candidates, Violence Ut Austin, Violence Usa, Violence Us, Violence Unsilenced, Violence Uc Berkeley, Violence Used For Good, Violence Used In The Civil Rights Movement, Violence United Airlines, Violence Vs Nonviolence, Violence Violence, Violence Viewing Effect, Violent Video Games, Violence Vanquished, Violence Venezuela, Violence Videos, Violence Verb, Violence Video Game, Violence And Peace, Violence Wheel, Violence Workshop, Violence Which Is A Form Of Aggression May Be As Well As, Violence With Violence, Violence Within Prisons, Violence Words, Violence Wikipedia, Violence Warframe, Violence Works, Violence Websites, Violence And Victims, Violence And Videogames, Violence And The Sacred, Violence And Mental Illness, Violence And Abuse, Violence And Aggression, Violence And Media, Violence And Gender, Violence And Poverty, Violence And Religion, Violence Youtube, Violence Synonym, Violence Youth Brigade, Violence Yahoo Answers, Violence Symbols, Violence Syria, Violence Syllabus, Violence Syllables, Violence Synonyme Francais, Violence Synonyms And Antonyms, Violence Zizek Pdf, Violence Zizek Summary, Violence Zizek Wiki, Violence Zimbabwe, Violence Zuma March, Violence Zombie, Violence Zizek Quotes, Violence Zihuatanejo, Violence Zacatecas Mexico, Violence Zanzibar, Law Enforcement Jobs, Law Enforcement Week, Law Enforcement Gear, Law Enforcement Agencies, Law Enforcement Memorial, Law Enforcement Careers, Law Enforcement Tattoos, Law Enforcement Code Of Ethics, Law Enforcement Officer, Law Enforcement Training, Law Enforcement Agencies, Law Enforcement Appreciation Week 2017, Law Enforcement Against Prohibition, Law Enforcement Academy, Law Enforcement Appreciation Day, Law Enforcement Agencies Data System (Leads), Law Enforcement Agencies Such As The Fbi Are Part Of, Law Enforcement Agency Data System, Law Enforcement Apparel, Law Enforcement Action Network, Law Enforcement Boots, Law Enforcement Badges, Law Enforcement Bullet Proof Vest, Law Enforcement Books, Law Enforcement Background, Law Enforcement Business Cards, Law Enforcement Body Armor, Law Enforcement Body Camera, Law Enforcement Bible, Law Enforcement Branches, Law Enforcement Careers, Law Enforcement Code Of Ethics, Law Enforcement Colleges, Law Enforcement Coalition, Law Enforcement Challenge Coins, Law Enforcement Codes, Law Enforcement Classes, Law Enforcement Center, Law Enforcement Certification, Law Enforcement Conferences 2017, Law Enforcement Discounts, Law Enforcement Degree, Law Enforcement Day, Law Enforcement Drones, Law Enforcement Duty Belt, Law Enforcement Decals, Law Enforcement Definition, Law Enforcement Drone Policy, Law Enforcement Data System, Law Enforcement Decorations, Law Enforcement Equipment, Law Enforcement Explorers, Law Enforcement Enterprise Portal, Law Enforcement Entrance Exam, Law Enforcement Education Program, Law Enforcement Ethics, Law Enforcement Examples, Law Enforcement Expo 2017, Law Enforcement Education, Law Enforcement Equipment Grants, Law Enforcement Flag, Law Enforcement Facebook, Law Enforcement Forum, Law Enforcement Flashlight, Law Enforcement Firearms, Law Enforcement Facts, Law Enforcement Firearms Training, Law Enforcement Fitness, Law Enforcement Family, Law Enforcement Fabric, Law Enforcement Gear, Law Enforcement Grants, Law Enforcement Gifts, Law Enforcement Gloves, Law Enforcement Gun Release Application, Law Enforcement Guns, Law Enforcement Gear Rack, Law Enforcement Gs Pay Scale 2017, Law Enforcement Glock, Law Enforcement Gun Discounts, Law Enforcement High School, Law Enforcement Hotel Discounts, Law Enforcement Hats, Law Enforcement Haircut, Law Enforcement History, Law Enforcement Hiring, Law Enforcement Handcuffs, Law Enforcement Hierarchy, Law Enforcement Holsters, Law Enforcement Handguns, Law Enforcement In Spanish, Law Enforcement Interview Questions, Law Enforcement Internships, Law Enforcement Intelligence, Law Enforcement Images, Law Enforcement Issues, Law Enforcement Information Network, Law Enforcement In The United States, Law Enforcement Intelligence Analysis, Law Enforcement Information Exchange, Law Enforcement Jobs, Law Enforcement Jobs In Texas, Law Enforcement Jobs Near Me, Law Enforcement Jobs In Nc, Law Enforcement Jobs In Nj, Law Enforcement Jobs In Iowa, Law Enforcement Jobs In Pa, Law Enforcement Jobs In Florida, Law Enforcement Jobs In Ohio, Law Enforcement Jobs In Ga, Law Enforcement Knives, Law Enforcement K9, Law Enforcement Killed In 2017, Law Enforcement Keynote Speakers, Law Enforcement Keychains, Law Enforcement Killed In 2016, Law Enforcement Krav Maga, Law Enforcement Key Holder, Law Enforcement Karambit, Law Enforcement Klamath Falls, Law Enforcement Lifestyle, Law Enforcement Legal Defense Fund, Law Enforcement License Plate, Law Enforcement Logo, Law Enforcement Liability Insurance, Law Enforcement Leadership, Law Enforcement Leadership Training, Law Enforcement Leaders To Reduce Crime And Incarceration, Law Enforcement Leggings, Law Enforcement Labor Services, Law Enforcement Memorial, Law Enforcement Memorial Week, Law Enforcement Museum, Law Enforcement Majors, Law Enforcement Memes, Law Enforcement Motorcycle Clubs, Law Enforcement Memorial Dc, Law Enforcement Memorial Store, Law Enforcement Meaning, Law Enforcement Magazine, Law Enforcement News, Law Enforcement Near Me, Law Enforcement Necklaces, Law Enforcement Number, Law Enforcement Name Tags, Law Enforcement Names, Law Enforcement Network, Law Enforcement Notebook, Law Enforcement Nails, Law Enforcement Night Vision, Law Enforcement Officer, Law Enforcement Officers Safety Act, Law Enforcement Online, Law Enforcement Oath, Law Enforcement Organizations, Law Enforcement Officer Leader Elected, Law Enforcement Officers Memorial High School, Law Enforcement Officers Memorial, Law Enforcement Oakley, Law Enforcement Officers Relief Fund, Law Enforcement Patches, Law Enforcement Phonetic Alphabet, Law Enforcement Prayer, Law Enforcement Polo Shirts, Law Enforcement Programs, Law Enforcement Psychological Associates, Law Enforcement Pictures, Law Enforcement Pepper Spray, Law Enforcement Park Ranger, Law Enforcement Personnel, Law Enforcement Quotes, Law Enforcement Questions, Law Enforcement Quiz, Law Enforcement Qualifications, Law Enforcement Quizlet, Law Enforcement Qualification Targets, Law Enforcement Qualities, Law Enforcement Quarterly, Law Enforcement Questionnaire, Law Enforcement Quote Of The Day, Law Enforcement Resume, Law Enforcement Ranks, Law Enforcement Rings, Law Enforcement Retirement, Law Enforcement Robots, Law Enforcement Retirement Gifts, Law Enforcement Ranger, Law Enforcement Report Writing, Law Enforcement Recruiting, Law Enforcement Requirements, Law Enforcement Supply, Law Enforcement Salary, Law Enforcement Schools, Law Enforcement Shirts, Law Enforcement Synonym, Law Enforcement Safety Act, Law Enforcement Stickers, Law Enforcement Support, Law Enforcement Symbols, Law Enforcement Shoes, Law Enforcement Tattoos, Law Enforcement Training, Law Enforcement Targets, Law Enforcement Torch Run, Law Enforcement Today, Law Enforcement Technology, Law Enforcement T Shirts, Law Enforcement Training Center, Law Enforcement Terms, Law Enforcement Test, Law Enforcement United, Law Enforcement Uniforms, Law Enforcement Use Of Force, Law Enforcement Uniform Pants, Law Enforcement Uniform Store Near Me, Law Enforcement United Pa, Law Enforcement Unions, Law Enforcement Use Of Force Continuum, Law Enforcement Uav, Law Enforcement Universities, Law Enforcement Vehicles, Law Enforcement Vest, Law Enforcement Vocabulary, Law Enforcement Videos, Law Enforcement Vehicle Grants, Law Enforcement Volunteer, Law Enforcement Vacation Deals, Law Enforcement Vs Military, Law Enforcement Vehicles For Sale, Law Enforcement Values, Law Enforcement Week, Law Enforcement Watches, Law Enforcement Wallpaper, Law Enforcement Workout, Law Enforcement Websites, Law Enforcement Weapons, Law Enforcement Week Dc, Law Enforcement Words, Law Enforcement Window Tint Meter, Law Enforcement Wallet, Law Enforcement Xbox, Law Enforcement Xml Schema, Law Enforcement Xbox Games, Law Enforcement X26 Taser, Law Enforcement Xd, Law Enforcement Games Xbox 360, Law Enforcement Springfield Xd, Law Enforcement Taser X26 Sale, Law Enforcement And Xanax, Law Enforcement Using Springfield Xdm, Law Enforcement Youth Camp, Law Enforcement Yeti, Law Enforcement Youth Programs, Law Enforcement Years Of Service Pins, Law Enforcement Youtube, Law Enforcement Yeti Cup, Law Enforcement Yoga, Law Enforcement Youth Camp Missoula, Law Enforcement Yahoo Answers, Law Enforcement Yahoo, Law Enforcement Zip Ties, Law Enforcement Zippo Lighters, Law Enforcement Zip Cuffs, Law Enforcement Zippo, Law Enforcement Z Fold Combat Gauze, Law Enforcement Znacenje, Sharia Law Enforcement Zones, Law Enforcement New Zealand, Law Enforcement In Zimbabwe, Law Enforcement In Zambia, Riot Fest, Riot Games, Riot Fest Chicago, Riot Definition, Riot Support, Riot Act, Riot Society, Riot Grrrl, Riot Shield, Riot Gear, Riot Act, Riot Api, Riot Armor Ark, Riot Album, Riot Act Usa, Riot Azael, Riot Act Media, Riot Act Meaning, Riot App, Riot Armor Ark Id, Riot Band, Riot Baits, Riot Blitzcrank, Riot Baton, Riot By Three Days Grace, Riot Boards, Riot Board Game, Riot By Monti, Riot Bloodbath, Riot Bug Report, Riot Club, Riot Careers, Riot Control, Riot Cast, Riot Clothing, Riot Civil Unrest, Riot Creative Imaging, Riot Cheer, Riot Chat, Riot Control Vehicle, Riot Definition, Riotdash, Riot Define, Riot Division, Riot Def, Riot Direct, Riot Dog, Riot Dating App, Riot Disorder, Riot Discography, Riot Email, Riot Employees, Riot Esports, Riot Escape 12, Riot Fest, Riot Fest Chicago, Riot Fest Denver, Riot Fest Chicago 2017, Riot Fest 2016, Riot Fest Tickets, Riot Fest Denver 2017, Riot Fest Single Day Tickets, Riot Fest 2015, Riot Fest 2016 Lineup, Riot Games, Riot Grrrl, Riot Gear, Riot Games Jobs, Riot Girl Tristana, Riot Games Support, Riot Games Stock, Riot Games Merch, Riot Games Net Worth, Riot Games Internship, Riot Helmet, Riot Headquarters, Riot Hospitality Group, Riot Helmet Ark, Riot House, Riot Hair Color, Riot Hair Lounge, Riot Help, Riot Helmet With Face Shield, Riot Helmet Rust, Riot In Spanish, Riot Internship, Riot Is The Language Of The Unheard, Riot Im, Riot In Cell Block 11, Riot In The Streets, Riot Ink, Riot Ice Cream, Riot In La, Riot In Lagos, Riot Juice, Riot Js, Riot Jobs, Riotjatt, Riot Jino, Riot Juice Always Sunny, Riot Jon Waltz, Riot Javelin, Riot Jinxylord, Riot Juliebird, Riot Kayle, Riot Kayaks, Riot Kobe, Riot K9 Nasus, Riot King Cobra, Riot Krepo, Riot Kayle Price, Riot Kateykhaos, Riot Kozlov, Riot Kayaks Escape 12, Riot Lyrics, Riot Lyte, Riot League Of Legends, Riot Logo, Riot La, Riot Lacrosse, Riot Laslow, Riot Lime Crime, Riot Leak, Riot Lexical, Riot Merch, Riot Meaning, Riot Movie, Riot Meme, Riot Maker Lyrics, Riot Manifesto, Riot Maker, Riot Mask, Riot Meekal, Riot Magnum 80, Riot Net Worth, Riot News, Riot Nasus, Riot Nyloc, Riot Narita, Riot Night, Riot Noble Toast, Riot New Game, Riot Necaris, Riot Na Server Ip, Riot On The Dance Floor, Riot Os, Riot On Sunset Strip, Riot Of Perfume, Riot Of Color, Riot Oce, Riot Officer, Riot On An Empty Street, Riot On The Radio, Riot Of 1967, Riot Points, Riot Police, Riot Paramore, Riot Punch, Riot Phreak, Riot Points To Usd, Riot Points Card, Riot Patch Notes, Riot Privacy, Riot Punch Recipe, Riot Quotes, Riot Quest 10, Riotquickshot, Riot Quest 9.5, Riot Q And A, Riot Queue Dodge, Riot Quack, Riot Quest 10 Hv, Riot Qa Analyst, Riot Queen, Riot Room, Riot Room Shows, Riot Rogers, Riot Rugby, Riot Rascal Flatts, Riot Fest, Riot Rework List, Riot Racing, Riot Rewards, Riot Report, Riot Support, Riot Society, Riot Shield, Riot Swim, Riot Store, Riot Synonym, Riot Shotgun, Riot Song, Riot Support Ticket, Riot Shirt, Riot Three Days Grace, Riot Ten, Riot Three Days Grace Lyrics, Riot Twitter, Riot T Shirt, Riot Ticket, Riot Twitch, Riot Trooper, Riot Tryndamere, Riot Tab, Riot Update Schedule, Riot Universe, Riot Ultimate, Riot Update, Riot U, Riot Usa, Riot Unbanning Tyler1, Riot Urban, Riot Ultracombo, Riot Unbanned My Account, Riot Van Lyrics, Riot Van, Riot Van Chords, Riot Ventures, Riot V, Riot Videos, Riot Vehicle, Riot Video Game, Riot Vest, Riot Vinyl, Riot Weapons, Riot Ward Skin, Riot Wittrock, Riot Wheel, Riot Wallpaper, Riot Wiki, Riot Walter Dean Myers, Riot Website, Riot Wall, Riot Worth, Riot X Lyrics, Riot Zirene, Riotzale, Riot Zone Rigby, Riot Zone, Riot Xell, Riot Zoopa Q165, Riot Xayah, Riot Xmpp, Riot Zirene Tyler1, Riot Youtube, Riot Yuujou, Riot Yesterday, Riot Yasuo, Riot Youth, Riot Yuka, Riot Youtube Stream, Riot Yarn, Riot Yasuo Rework, Riot Yield, Riot Zirene, Riotzale, Riot Zone Rigby, Riot Zone, Riot Zoopa Q165, Riot Zirene Tyler1, Riot Zerax, Riot Zirene Fired, Riotzeronis, Riot Zwill

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, PUBLIC INTELLIGENCE July 21, 2016June 24, 2021 17 Minutes

Revealed by Cryptome – CIA Describes Working with FBI on FOIA

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Go back

Your message has been sent

Warning
Warning
Warning
Warning

Warning.

Cryptome Eyeball, Cryptome Twitter, Cryptome Wikileaks, Cryptome Archive, Cryptome Trump, Cryptome Wikipedia, Cryptome Secret Service, Cryptome Down, Cryptome Payment Technologies, Cryptome Pharmaceuticals Ltd, Cryptome Archive, Cryptome Area 51, Cryptome Air Force One, Cryptome Archive Download, Cryptome Alien, Cryptome Albania, Cryptome Assange, Cryptome Alternatives, Cryptome Pharmaceuticals Australia, Cryptome Mi6 Agents, Cryptome Boston Marathon, Cryptome Benghazi, Cryptome Bitcoin, Cryptome Brazil, Cryptome Cn, Cryptome Cia, Cryptome China, Cryptome Charlie Hebdo, Cryptome Contact, Crypto Code, Cryptome Citizenfour Download, Citizenfour Cryptome Mirror, Cryptome Down, Cryptome Download, Cryptome Drones, Cryptome Definition, Cryptome Deep Web, Define Cryptome, Cryptome Archive Download, Cryptome Full Disclosure, Cryptome Site Down, Cryptome Citizenfour Download, Cryptome Eyeball, Cryptome Edward Snowden, Cryptome Eyeballing Presidential Protection, Cryptome Que Es, Cryptome Fru, Cryptome Fukushima, Cryptome For Sale, Cryptome Facebook, Cryptome Femen, Cryptome Full Disclosure, Cryptome Feed, Cryptome Free List, Cryptome Fukushima Daiichi, Cryptome Rss Feed, Cryptome Gchq, Cryptome Gang Stalking, Giganews Cryptome, Cryptome Microsoft Spy Guide, Cryptome Hacked, Cryptome White House, Cryptome Sandy Hook, Cryptome Jade Helm, Cryptome Ira Members, Cryptome Ira, Cryptome Isis, Cryptome Iraq, Cryptome Ireland, Cryptome Inspire, Cryptome India, Cryptome Interview, Cryptome Israel, Cryptome Improvised Munitions, Cryptome Jade Helm, Cryptome North Korea, Cryptome Like Sites, Cryptome Legal, Cryptome Libya, Cryptome List, Cryptome Le Siecle, Like Cryptome, Cryptome Pharmaceuticals Ltd, Cryptome Mi6, Cryptome Mirror, Cryptome Microsoft, Cryptome Microsoft Spy Guide, Cryptome Mirror Sites, Cryptome Mk Ultra, Cryptome Boston Marathon, Cryptome Ira Members, Cryptome Improvised Munitions, Citizenfour Cryptome Mirror, Cryptome North Korea, Cryptome Nuclear, Cryptome Northern Ireland, Cryptome Nsa, Cryptome-nov 2015, Cryptome Nedir, Cryptome.org Wikipedia, Cryptome Obama Protection, Cryptome.org Down, Cryptome.org Eyeball, Cryptome Org Fukushima, Cryptome.org Parastoo, Cryptome.org Rss, Cryptome.org Femen, Cryptome.org 9\/11, Cryptome.org 911, Cryptome Photos, Cryptome Payment Technologies, Cryptome Pharmaceuticals Ltd, Cryptome Protection, Cryptome Pgp, Cryptome Parastoo, Cryptome Pharmaceuticals Australia, Cryptome Pdf, Cryptome Prism, Cryptome Pictures, Cryptome Que Es, Cryptome Rss, Cryptome Rheinland Pfalz, Cryptome Secret Service, Cryptome Search, Cryptome Snowden, Cryptome Sandy Hook, Cryptome Satellite, Cryptome Similar Sites, Cryptome Saudi, Cryptome Syria, Cryptome Site, Cryptome Stingray, Cryptome Twitter, Cryptome Trump, Cryptome Tempest, Cryptome Tor, Cryptome Tunisia, Crypto Tool, Cryptome Fukushima Tepco, Cryptome Payment Technologies, Similar To Cryptome, Cryptome Turkey, Cryptome Ufo, Cryptome Ukraine, Cryptome Vs Wikileaks, Cryptome Venezuela, Cryptome Videos, Cryptome Wikileaks, Cryptome Wikipedia, Cryptome White House, Cryptome Vs Wikileaks, Cryptome Deep Web, Cia World Factbook, Cia Jobs, Cia Director, Cia Definition, Cia Headquarters, Cia Careers, Cia Salary, Cia Agent, Cia Agent Salary, Cia Internship, Cia Agent, Cia Agent Salary, Cia Analyst, Cia Application, Cia Airport, Cia Apush, Cia Address, Cia Auctions, Cia Alexa, Cia Assassinations, Cia Badge, Cia Black Sites, Cia Budget, Cia Bounce, Cia Building, Cia Black Ops, Ciao Bella, Cia Berg, Cia Books, Cia Brennan, Cia Careers, Cia Certification, Cia Cold War, Cia Culinary, Cia Copia, Cia Chief, Cia Crack, Cia Contractor, Cia Created Isis, Cia Cold War Definition, Cia Director, Cia Definition, Cia Director Salary, Cia Declassified Documents, Cia Definition Cold War, Cia Drug Trafficking, Cia Database, Cia Documentary, Cia Declassified, Cia During The Cold War, Cia Exam, Cia Employment, Cia Experiments, Cia Established, Cia Emblem, Cia Email, Cia Employees, Cia El Salvador, Cia Enhanced Interrogation Techniques, Cia Exam Fees, Cia Factbook, Cia Factbook Us, Cia Field Agent, Cia Factbook China, Cia Files, Cia Farm, Cia Factbook Russia, Cia Factbook North Korea, Cia Files 3ds, Cia Factbook India, Cia Gov, Cia Grs, Cia Greystone, Cia Ground Branch, Cia Glassdoor, Cia Guy, Cia Guatemala, Cia Games, Cia General Counsel, Cia Germany, Cia Headquarters, Cia Hyde Park, Cia Hacking Tools, Cia Hacking, Cia History, Cia Hyrule Warriors, Cia Heart Attack Gun, Cia Head, Cia Hacking Notepad++, Cia Headquarters Address, Cia Internship, Cia Insurance, Cia Iran, Cia Intelligence Analyst, Cia In Guatemala, Cia Intelligence, Cia Interview Questions, Cia Isis, Cia Interrogation, Cia India, Cia Jobs, Cia Jfk, Cia Job Openings, Cia Jfk Assassination, Cia Job Description, Cia Jurisdiction, Cia Japan, Cia Job Application, Cia Jobs Nyc, Cia Job Requirements, Cia Killed Jfk, Cia Kevin Hart, Cia Kryptos, Cia K9, Cia Kenya, Cia Kill List, Cia Kennedy Assassination, Cia Knife, Cia Killed Mlk, Cia Korea, Cia Logo, Cia Leaks, Cia Langley, Cia Login, Cia Library, Cia Locations, Cia Leader, Cia License, Cia Leadership, Cia Los Angeles, Cia Meaning, Cia Movies, Cia Most Wanted, Cia Meme, Cia Main Menu, Cia Museum, Cia Mind Control, Cia Malayalam Movie, Cia Music, Cia Maritima, Cia Napa, Cia New York, Cia News, Cia North Korea, Cia Number, Cia Noc, Cia Notepad++, Cia North Hollywood, Cia Nicaragua, Cia Napa Copia, Cia Operative, Cia Operations Officer, Cia Officer, Cia Officer Salary, Cia Office Locations, Cia Org Chart, Cia Operation Mockingbird, Cia Or Fbi, Cia Osama Bin Laden, Cia Origins, Cia Phone Number, Cia Police, Cia Paramilitary, Cia Protective Agent, Cia Purpose, Cia Pay Scale, Cia Positions, Cia Polygraph, Cia Programs, Cia Pompeo, Cia Quizlet, Cia Qualifications, Cia Quotes, Cia Quiz, Cia Questions, Cia Qr Codes, Cia Qatar, Cia Question Alexa, Cia Quantico Va, Cia Quizlet Apush, Cia Requirements, Cia Restaurants, Cia Recruitment, Cia Russia, Cia Reading List, Cia Ranks, Cia Remote Viewing, Cia Released Documents, Cia Responsibilities, Cia Report, Cia Salary, Cia Sad, Cia Stands For, Cia Services, Cia Spy, Cia Special Agent, Cia Scholarship, Cia Secrets, Cia San Antonio, Cia School, Cia Triad, Cia Training, Cia Trump, Cia Twitter, Cia Torture, Cia The World Factbook, Cia To 3ds Converter, Cia The Farm, Cia Tv Shows, Cia Torture Report, Cia University, Cia Ufo Files, Cia Uniform, Cia Usa, Cia Umbrage, Cia Ultra, Cia Undercover, Cia Ukraine, Cis Utah, Cia Uganda, Cia Vs Fbi, Cia Vault 7, Cia Vs Nsa, Cia Volleyball, Cia Vs Kgb, Cia Venezuela, Cia Vietnam, Cia Vault, Cia Virginia, Cia Video, Cia World Factbook, Cia Website, Cia World Factbook Us, Cia Wikileaks, Cia Wiki, Cia World Factbook China, Cia World Factbook India, Cia World Factbook Japan, Cia World Factbook Mexico, Cia World Factbook Russia, Cia X Link, Cia X Files, Cia X Link Lemon, Cia X Link Fanfic, Cia X Link Fanfiction, Cia Xbox, Cia X Male Reader, Xia Xia, Cia X Zelda, Cia X Bane, Cia Youtube, Cia Yuma Az, Cia Yemen, Cia Yearly Salary, Cia Year Founded, Cia Yearly Budget, Cia York Pa, Cia Year Established, Cia Youth Leadership Program, Cia Year Zero, Cia Zimbabwe, Cia Zip Code, Cia Zero Day Exploits, Cia Zambia, Cia Zero Day, Cia Zack Dela Rocha, Cia Zero Dark Thirty, Cia Zombie Apocalypse, Cia Zippo Lighter, Cia Zero, Fbi Most Wanted, Fbi Jobs, Fbi Director, Fbi Salary, Fbi Agent, Fbi Background Check, Fbi Agent Salary, Fbi Headquarters, Fbi Special Agent, Fbi Internships, Fbi Agent, Fbi Agent Salary, Fbi Academy, Fbi Application, Fbi Analyst, Fbi Atlanta, Fbi Agent Jobs, Fbi Anon, Fbi Address, Fbi Arrests, Fbi Background Check, Fbi Badge, Fbi Bau, Fbi Building, Fbi Boston, Fbi Bap, Fbi Baltimore, Fbi Benefits, Fbi Budget, Fbi Building Dc, Fbi Careers, Fbi Crime Statistics, Fbi Clearance, Fbi Criminal Background Check, Fbi Chicago, Fbi Citizens Academy, Fbi Crime Statistics By Race, Fbi Contact, Fbi Channeler, Fbi Candidates, Fbi Director, Fbi Director Candidates, Fbi Director James Comey, Fbi Definition, Fbi Director Fired, Fbi Director Salary, Fbi Definition Of Terrorism, Fbi Database, Fbi Dallas, Fbi Drug Policy, Fbi Employment, Fbi Email Address, Fbi Employment Drug Policy, Fbi El Paso, Fbi Employees, Fbi Emblem, Fbi Established, Fbi Education Center, Fbi Education, Fbi Executive Branch, Fbi Fingerprinting, Fbi Files, Fbi Field Offices, Fbi Fingerprint Card, Fbi Fitness Test, Fbi Facebook, Fbi Fingerprint Check, Fbi Forensic Accountant, Fbi Foia, Fbi Founder, Fbi Glock, Fbi Games, Fbi Gov, Fbi Glassdoor, Fbi Guns, Fbi Gang List, Fbi Gun Statistics, Fbi Gif, Fbi Gift Shop, Fbi General Counsel, Fbi Headquarters, Fbi Hrt, Fbi History, Fbi Houston, Fbi Hiring, Fbi Hate Crime Statistics, Fbi Head, Fbi Hat, Fbi Honors Internship, Fbi Hotline, Fbi Internships, Fbi Investigation, Fbi Intelligence Analyst, Fbi Informant, Fbi Irt, Fbi Investigation Trump, Fbi Ic3, Fbi Infragard, Fbi Internet Fraud, Fbi Id, Fbi Jobs, Fbi Jacket, Fbi James Comey, Fbi Jurisdiction, Fbi Job Description, Fbi Jobs Apply, Fbi Jacksonville, Fbi Jade Helm, Fbi Jobs Chicago, Fbi Jackson Ms, Fbi Kansas City, Fbi Kids, Fbi Knoxville, Fbi Kidnapping, Fbi Komi, Fbi Kentucky, Fbi Killed Jfk, Fbi Kkk, Fbi Kodi, Fbi K9 Unit, Fbi Logo, Fbi Leeda, Fbi Los Angeles, Fbi Locations, Fbi Las Vegas, Fbi Leaks, Fbi Leader, Fbi Linguist, Fbi Louisville, Fbi Login, Fbi Most Wanted, Fbi Most Wanted List, Fbi Meaning, Fbi Meme, Fbi Movies, Fbi Museum, Fbi Motto, Fbi Miami, Fbi Mission Statement, Fbi Most Dangerous Cities, Fbi Number, Fbi News, Fbi National Academy, Fbi Nics, Fbi New York, Fbi New Orleans, Fbi Newark, Fbi New York Tv Show, Fbi Near Me, Fbi Nominee, Fbi Offices, Fbi Org Chart, Fbi Omaha, Fbi Operative, Fbi On Trump, Fbi Organizational Chart, Fbi Obama Meme, Fbi Obama, Fbi Oklahoma City, Fbi Office Near Me, Fbi Phone Number, Fbi Profiler, Fbi Pft, Fbi Police, Fbi Pay Scale, Fbi Phoenix, Fbi Pay, Fbi Philadelphia, Fbi Positions, Fbi Pittsburgh, Fbi Quantico, Fbi Qualifications, Fbi Q Target, Fbi Quotes, Fbi Quiz, Fbi Questions, Fbi Qr Code, Fbi Qas, Fbi Quantico Address, Fbi Quantico Tours, Fbi Requirements, Fbi Russia, Fbi Russia Investigation, Fbi Report, Fbi Ranks, Fbi Recruiting, Fbi Raid, Fbi Records, Fbi Rape Statistics, Fbi Russia Trump, Fbi Salary, Fbi Special Agent, Fbi Stands For, Fbi Swat, Fbi Special Agent Salary, Fbi Surveillance, Fbi Statistics, Fbi Sos, Fbi Surveillance Van, Fbi Seal, Fbi Training, Fbi Top Ten, Fbi Trump, Fbi Trump Russia, Fbi Tip Line, Fbi Tv Shows, Fbi Twitter, Fbi Tips, Fbi Teen Academy, Fbi Tours, Fbi Ucr, Fbi Ucr 2016, Fbi Units, Fbi Ucr 2015, Fbi Undercover, Fbi Unsolved Cases, Fbi Upin, Fbi Utah, Fbi Usa, Fbi Uniforms, Fbi Vs Cia, Fbi Vault, Fbi Virus, Fbi Vs Apple, Fbi Virtual Academy, Fbi Vehicles, Fbi Violent Crime Statistics, Fbi Virginia, Fbi Van, Fbi Van Wifi, Fbi Website, Fbi Warning, Fbi Wiki, Fbi Wanted List, Fbi Watch List, Fbi Windbreaker, Fbi Warning Screen, Fbi White Collar Crime, Fbi Warrant Search, Fbi Weapons, Fbi X Files, Fbi Xl2, Fbi Xl31, Fbi Xl4, Fbi Xl2 Programming, Fbi Xl-31 Troubleshooting, Fbi Xl 31 Installation Manual, Fbi X Files Real, Fbi Xl2t Installation Manual, Fbi Xl 1215, Fbi Yearly Salary, Fbi Youtube, Fbi Youth Academy, Fbi Youth Leadership Academy, Fbi Yellow Brick Road, Fbi Youth Programs, Fbi Yearly Budget, Fbi Youth Leadership Academy Portland, Fbi Youngstown Ohio, Fbi Yearly Income, Fbi Zodiac Killer, Fbi Zodiac, Fbi Zip Code, Fbi Zodiac Killer List, Fbi Zero Files, Fbi Zodiac List, Fbi Zodiac Signs Killer, Fbi Zhang Yingying, Fbi Zion, Fbi Zodiac Crimes

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, CIA, CONFIDENTIAL, CRYPTOME, FBI * June 14, 2016June 25, 2021 7 Minutes

REVEALED – FBI Bulletin: Criminals Hacking Law Firms to Steal Information for Insider Trading

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

 

The following document was obtained from the public website of a U.S. law firm.

“Criminal-Seeking-Hacker” Requests Network Breach for Insider Trading Operation

Page Count: 2 pages
Date: March 4, 2016
Restriction: TLP: AMBER
Originating Organization: Federal Bureau of Investigation, Cyber Divison
File Type: pdf
File Size: 445,285 bytes
File Hash (SHA-256):AC2D43CC8674D11DBB95208432553C914588C04BF3679D508AFB2D5634EB773A

Download File

A financially motivated cyber crime insider trading scheme targets international law firm information used to facilitate business ventures. The scheme involves a hacker compromising the law firm’s computer networks and monitoring them for material, non-public information (MNPI). This information, gained prior to a public announcement, is then used by a criminal with international stock market expertise to strategically place bids and generate a monetary profit.

Threat

In a recent cyber criminal forum post, a criminal actor posted an advertisement to hire a technically proficient hacker for the purposes of gaining sustained access to the networks of multiple international law firms. The criminal provided search criteria for industry-specific information for the hackers to locate within the networks. This information when interpreted by an industry expert can contribute to an insider trading scheme.

Recommendations

Historically, industries targeted by cybercriminals have discovered that their networks were susceptible to intrusion due to lack of adherence to network security industry standards.

Measures to deter unauthorized access to a company network:

  • Educate personnel on appropriate preventative and reactive actions to known criminal schemes and social engineering threats, including how employees should respond in their respective position and environment.
  • Scrutinize links contained in e-mails, and do not open attachments included in unsolicited e-mails.
  • Disable macros. Be careful of pop-ups from attachments that require users to enable them.
  • Only download software – especially free software – from known and trusted sites
  • Create a centralized Information Technology e-mail account for employees to report suspicious emails.
  • Change network default passwords, configurations, and encryption keys. Use strong passwords.
  • Recommend your company’s IT professional(s) review, test, and certify the need/compatibility of a patch or update prior to installing it onto the operating system or software.
  • Monitor employee logins that occur outside of normal business hours.
  • Restrict access to the Internet on systems handling sensitive information.
  • Install and regularly update anti-malware solutions, software, operating systems, remote management applications, and hardware.
  • Do not use the same login and password for multiple platforms, servers, or networks.
  • Monitor unusual traffic, especially over non-standard ports. Close unused ports.
  • Monitor outgoing data, and be willing to block unknown IP addresses.
  • Isolate sensitive information within the network.
  • Only allow required processes to run on systems handling sensitive information.
  • Implement two-factor authentication for access to sensitive systems.
  • Ensure proper firewall rules are in place.
  • Be aware of the corporate footprint and persona facing the Internet. Conduct searches using multiple search engines on multiple Internet domains of company names, Web addresses, key personnel, and projects to determine if there is an accidental weak point in the network security. Conduct infrastructure look-ups in the public domains to ensure additional information is not inadvertently advertised.

Go back

Your message has been sent

Warning
Warning
Warning
Warning

Warning.

 

Fbi Most Wanted, Fbi Jobs, Fbi Director, Fbi Salary, Fbi Agent, Fbi Background Check, Fbi Agent Salary, Fbi Headquarters, Fbi Special Agent, Fbi Internships, Fbi Agent, Fbi Agent Salary, Fbi Academy, Fbi Application, Fbi Analyst, Fbi Atlanta, Fbi Agent Jobs, Fbi Anon, Fbi Address, Fbi Arrests, Fbi Background Check, Fbi Badge, Fbi Bau, Fbi Building, Fbi Boston, Fbi Bap, Fbi Baltimore, Fbi Benefits, Fbi Budget, Fbi Building Dc, Fbi Careers, Fbi Crime Statistics, Fbi Clearance, Fbi Criminal Background Check, Fbi Chicago, Fbi Citizens Academy, Fbi Crime Statistics By Race, Fbi Contact, Fbi Channeler, Fbi Candidates, Fbi Director, Fbi Director Candidates, Fbi Director James Comey, Fbi Definition, Fbi Director Fired, Fbi Director Salary, Fbi Definition Of Terrorism, Fbi Database, Fbi Dallas, Fbi Drug Policy, Fbi Employment, Fbi Email Address, Fbi Employment Drug Policy, Fbi El Paso, Fbi Employees, Fbi Emblem, Fbi Established, Fbi Education Center, Fbi Education, Fbi Executive Branch, Fbi Fingerprinting, Fbi Files, Fbi Field Offices, Fbi Fingerprint Card, Fbi Fitness Test, Fbi Facebook, Fbi Fingerprint Check, Fbi Forensic Accountant, Fbi Foia, Fbi Founder, Fbi Glock, Fbi Games, Fbi Gov, Fbi Glassdoor, Fbi Guns, Fbi Gang List, Fbi Gun Statistics, Fbi Gif, Fbi Gift Shop, Fbi General Counsel, Fbi Headquarters, Fbi Hrt, Fbi History, Fbi Houston, Fbi Hiring, Fbi Hate Crime Statistics, Fbi Head, Fbi Hat, Fbi Honors Internship, Fbi Hotline, Fbi Internships, Fbi Investigation, Fbi Intelligence Analyst, Fbi Informant, Fbi Irt, Fbi Investigation Trump, Fbi Ic3, Fbi Infragard, Fbi Internet Fraud, Fbi Id, Fbi Jobs, Fbi Jacket, Fbi James Comey, Fbi Jurisdiction, Fbi Job Description, Fbi Jobs Apply, Fbi Jacksonville, Fbi Jade Helm, Fbi Jobs Chicago, Fbi Jackson Ms, Fbi Kansas City, Fbi Kids, Fbi Knoxville, Fbi Kidnapping, Fbi Komi, Fbi Kentucky, Fbi Killed Jfk, Fbi Kkk, Fbi Kodi, Fbi K9 Unit, Fbi Logo, Fbi Leeda, Fbi Los Angeles, Fbi Locations, Fbi Las Vegas, Fbi Leaks, Fbi Leader, Fbi Linguist, Fbi Louisville, Fbi Login, Fbi Most Wanted, Fbi Most Wanted List, Fbi Meaning, Fbi Meme, Fbi Movies, Fbi Museum, Fbi Motto, Fbi Miami, Fbi Mission Statement, Fbi Most Dangerous Cities, Fbi Number, Fbi News, Fbi National Academy, Fbi Nics, Fbi New York, Fbi New Orleans, Fbi Newark, Fbi New York Tv Show, Fbi Near Me, Fbi Nominee, Fbi Offices, Fbi Org Chart, Fbi Omaha, Fbi Operative, Fbi On Trump, Fbi Organizational Chart, Fbi Obama Meme, Fbi Obama, Fbi Oklahoma City, Fbi Office Near Me, Fbi Phone Number, Fbi Profiler, Fbi Pft, Fbi Police, Fbi Pay Scale, Fbi Phoenix, Fbi Pay, Fbi Philadelphia, Fbi Positions, Fbi Pittsburgh, Fbi Quantico, Fbi Qualifications, Fbi Q Target, Fbi Quotes, Fbi Quiz, Fbi Questions, Fbi Qr Code, Fbi Qas, Fbi Quantico Address, Fbi Quantico Tours, Fbi Requirements, Fbi Russia, Fbi Russia Investigation, Fbi Report, Fbi Ranks, Fbi Recruiting, Fbi Raid, Fbi Records, Fbi Rape Statistics, Fbi Russia Trump, Fbi Salary, Fbi Special Agent, Fbi Stands For, Fbi Swat, Fbi Special Agent Salary, Fbi Surveillance, Fbi Statistics, Fbi Sos, Fbi Surveillance Van, Fbi Seal, Fbi Training, Fbi Top Ten, Fbi Trump, Fbi Trump Russia, Fbi Tip Line, Fbi Tv Shows, Fbi Twitter, Fbi Tips, Fbi Teen Academy, Fbi Tours, Fbi Ucr, Fbi Ucr 2016, Fbi Units, Fbi Ucr 2015, Fbi Undercover, Fbi Unsolved Cases, Fbi Upin, Fbi Utah, Fbi Usa, Fbi Uniforms, Fbi Vs Cia, Fbi Vault, Fbi Virus, Fbi Vs Apple, Fbi Virtual Academy, Fbi Vehicles, Fbi Violent Crime Statistics, Fbi Virginia, Fbi Van, Fbi Van Wifi, Fbi Website, Fbi Warning, Fbi Wiki, Fbi Wanted List, Fbi Watch List, Fbi Windbreaker, Fbi Warning Screen, Fbi White Collar Crime, Fbi Warrant Search, Fbi Weapons, Fbi X Files, Fbi Xl2, Fbi Xl31, Fbi Xl4, Fbi Xl2 Programming, Fbi Xl-31 Troubleshooting, Fbi Xl 31 Installation Manual, Fbi X Files Real, Fbi Xl2t Installation Manual, Fbi Xl 1215, Fbi Yearly Salary, Fbi Youtube, Fbi Youth Academy, Fbi Youth Leadership Academy, Fbi Yellow Brick Road, Fbi Youth Programs, Fbi Yearly Budget, Fbi Youth Leadership Academy Portland, Fbi Youngstown Ohio, Fbi Yearly Income, Fbi Zodiac Killer, Fbi Zodiac, Fbi Zip Code, Fbi Zodiac Killer List, Fbi Zero Files, Fbi Zodiac List, Fbi Zodiac Signs Killer, Fbi Zhang Yingying, Fbi Zion, Fbi Zodiac Crimes, Criminals Near Me, Criminals Minds, Criminals In My Area, Criminals Are Made Not Born, Criminals Synonym, Criminals Of Flint, Criminals Movie, Criminals Definition, Criminals Gone Wild, Criminals In Michigan, Criminals Are Made Not Born, Criminals At Work, Criminals Around Me, Criminals And Mental Illness, Criminals At Work Full Episodes, Criminals At Large, Criminals Are Hot, Criminals Are A Cowardly And Superstitious Lot, Criminals And Guns, Criminals And Tacos, Criminals By Race, Criminals Being Deported, Criminals Band, Criminals Born Or Made, Criminals Buying Guns, Criminals By Religion, Criminals Born In June, Criminals By Political Party, Criminals Being Killed, Criminals Born Today, Criminals Cast, Criminals Caught, Criminals Caught On Facebook, Criminals Captured, Criminals Case, Criminals Committing Crimes Again, Criminals Caught On Tape, Criminals Can’t Vote, Criminals Currently On Death Row, Criminals Childhood, Criminals Definition, Criminals Don’t Follow Gun Laws, Criminals Define, Criminals Deported, Criminals During The Holocaust, Criminals Deported From Usa, Criminals Deserve The Death Penalty, Criminals Doing Good Deeds, Criminals Documentary, Criminals During The Renaissance, Criminals Escape Prison, Criminals Executed, Criminals Essay, Criminals Escaped, Criminals Escaping To Mexico, Criminals Executed Death Penalty, Criminals Extra Y Chromosome, Criminals Education Level, Criminals Eyes Close Together, Criminals Escape Crossword Clue, Criminals From Home Alone, Criminals For Gun Control, Criminals Famous, Criminals From The 1920s, Criminals Fake Name, Criminals From Ohio, Criminals Fear Armed Citizens, Criminals From The 1800s, Criminals From Criminal Minds, Criminals Fleeing To Mexico, Criminals Gone Wild, Criminals Getting Shot, Criminals Getting Owned, Criminals Gone Wild 2, Criminals Get Guns Illegally, Criminals Getting Guns, Criminals Getting Off Too Easily, Criminals Getting What They Deserve, Criminals Getting Away With Crimes, Criminals Getting Tased, Criminals Hall Of Fame Wax Museum, Criminals Hiding In Cuba, Criminals Hiding In Alaska, Criminals Have Too Many Rights, Criminals Hall Of Fame Niagara Falls, Criminals Have No Recourse, Criminals Hired By Fbi, Criminals High School Mascot, Criminals Hiding In Plain Sight, Criminals History, Criminals In My Area, Criminals In Michigan, Criminals In Spanish, Criminals In The 1920s, Criminals In The Nfl, Criminals In Jail, Criminals In Action, Criminals In Your Area, Criminals In Alcatraz, Criminals In History, Criminal Justice, Criminal Justice Jobs, Criminal Justice Degree, Criminal Justice Careers, Criminal Justice System, Criminal Justice Major, Criminal Justice Jobs In Michigan, Criminal Justice Colleges, Criminal Justice Reform, Criminal Justice Internships, Criminals Killed, Criminals Killed By Police, Criminals Katatonia, Criminals Karma, Criminals Killed By Ar 15, Criminals Katatonia Lyrics, Criminals Killed By Death Penalty, Criminals Killed In Prison, Criminals Killed In Eastleigh, Criminals Killed In Kayole, Criminals Lyrics, Criminals Last Meals, Criminals Living Near Me, Criminals Lyrics Xuitcasecity, Criminals List, Criminals Lyrics Ms Mr, Criminals Lyrics Xuite, Criminals Look Different, Criminals Lyrics Suitcase, Criminals Living In Walmart Attic, Criminals Minds, Criminals Movie, Criminals Minds Season 12, Criminals Minds Cast, Criminals Minds Beyond Borders, Criminals Minds Season 13, Criminals Ms Mr Lyrics, Criminals Mo, Criminals Meaning, Criminals Minds Beyond Borders Cast, Criminals Near Me, Criminals Names, Criminals No Sleep, Criminals No Sleep Lyrics, Criminals Need Mental Health Care, Criminals Near My House, Criminals Named Wayne, Criminals Nature Vs Nurture, Criminals News, Criminals Not Allowed To Vote, Criminals Of Flint, Criminals On The Run, Criminals On Death Row, Criminals Of The 1920s, Criminals On The Cross, Criminals Of Permission, Criminals On The Loose, Criminals Of Reddit, Criminals Of The Holocaust, Criminals Obtaining Guns, Criminals Podcast, Criminals Pictures, Criminals Psychology, Criminals Post On Facebook, Criminals Pleading Insanity, Criminals Prefer Unarmed Victims, Criminals Painting Gun Tips Orange, Criminals Percentage Population, Criminals Posting Their Crimes On Facebook, Criminals Political Affiliation, Criminals Quotes, Criminals Quotes Sayings, Criminals Quiz, Criminals Quotev, Criminals Qld, Criminals Questions, Quebec Criminals, Quran Criminals, Quotes Criminals Minds, Qatar Criminals, Criminals Records, Criminals Rights, Criminals Return To The Scene Of The Crime, Criminals Released From Prison, Criminals Reddit, Criminals Right To Vote, Criminals Rehabilitation, Criminals Run The World Lyrics, Criminals Rhyme, Criminal Race Statistics, Criminals Synonym, Criminals Song, Criminals Sentenced To Death, Criminals Still At Large, Criminals Search, Criminals Should Be Punished, Criminals Shot Dead, Criminals Should Not Be Allowed To Vote, Criminals Sent To America, Criminals Syn, Criminals The Movie, Criminals Thesaurus, Criminals Trailer, Criminals Tallest Man On Earth, Criminals Trap Nation, Criminals Throughout History, Criminals That Turned Good, Criminals Today, Criminals That Were Executed, Criminals Turned Heroes, Criminals Using Social Media, Criminals Using Drones, Criminals Using Technology, Criminals Uncle Tupelo, Criminals Using Facebook, Criminals Use Bitcoin, Criminals Using Rental Cars, Criminals Using Uber, Criminals Under The Age Of 10, Criminals Under The Age Of 18, Criminals Voting, Criminals Vs Cops, Criminals Voting Rights, Criminals Vs Swat, Criminals Vote Democrat, Criminals Vs Terrorists, Criminals Villains Wiki, Criminals V Mod, Criminals And Convicts, Criminals Vocabulary, Criminals Who Got Away, Criminals With Mental Illness, Criminals Whizzle, Criminals With Antisocial Personality Disorder, Criminals With Guns, Criminals With Schizophrenia, Criminals Wanted, Criminals Who Went To Harvard, Criminals With High Iq, Criminals Without Borders, Criminals Xuitcasecity, Criminals Xuitcasecity Lyrics, Criminal Sexual Conduct, Criminal Sexual Conduct 2nd Degree, Criminal Sexual Conduct 4th Degree, Criminal Synonym, Criminal Sexual Conduct Degrees, Criminal Sexual Conduct Third Degree, Criminal Song, Criminal Search, Criminals Youtube, Criminals You Admire, Youngest Criminals, Young Criminals, Yuma Criminals, Youth Criminals, Yuma Criminals Football, Youngest Criminals In The World, Yuma Criminals T Shirt, Youngest Criminals Uk, Criminals Zodiac Signs, Criminals Zodiac, Zimbabwean Criminals In Uk, Zimbabwean Criminals In South Africa, Zionist Criminals, Zimbabwe Criminals, Zap Criminals, Zim Criminals, Zambian Criminals, Zootopia Criminals, Law And Order, Law And Order Svu, Law Of Cosines, Law Of Sines, Law And Order Cast, Law And Order Svu Cast, Law Of Conservation Of Energy, Law Of Attraction, Law Of Conservation Of Mass, Law School Rankings, Law And Order, Law And Order Svu, Law And Order Cast, Law And Order Svu Cast, Law Auto, Law And Order Svu Season 18, Law Abiding Citizen, Law Auto Sales, Law And Order Criminal Intent, Law And Order Svu Season 19, Lawbreakers, Law Books, Law Blog, Law Band, Law Brothers, Lawbreakers Game, Law Bar Exam, Law Bandcamp, Law Bar, Law Borderlands 2, Law Clerk, Law Clerk Salary, Law Conservation Of Mass, Law Crossing, Law Conservation Of Energy, Law Center For Social Security Rights, Law Clerk Jobs Michigan, Law Careers, Law Cosines, Law Center To Prevent Gun Violence, Law Definition, Law Degree, Lawdepot, Law Dictionary, Law Day 2017, Law Degree Online, Law Day, Law Definition Science, Law Dogs Mc, Law Degree Jobs, Law Enforcement, Law Enforcement Jobs, Law Enforcement Jobs In Michigan, Law Enforcement Week, Law Enforcement Code Of Ethics, Law Enforcement Gear, Law Enforcement Agencies, Law Enforcement Information Network, Law Enforcement Tattoos, Law Enforcement Officer, Law Firm, Law Firm Of Victoria, Law Firms Near Me, Law Firms In Michigan, Law Firms In Detroit, Law Firm Logos, Law Firm Names, Law Firm Jobs, Law Firm Internships, Law Firms In Troy Mi, Law Group, Law Games, Law Gif, Law Graduate Gifts, Law Guardian, Law Grey Gamefowl, Law Gavel, Law Generator, Law Games Online, Lawgiver, Law Help Interactive, Law Hawk, Law Help, Law Hammer, Law High School, Law History, Law Handbook, Law Humor, Law Help Online, Law Hero Smt, Law In Spanish, Law In Order, Law Internships, Law Images, Law In Latin, Law Insider, Law Icon, Law In A Flash, Law In Science, Law In French, Law Jobs, Law Justice And Social Change, Law Jobs Michigan, Law Journal, Law Jokes, Law Jobs Detroit, Law Journal Rankings, Law Jd, Law Journal Press, Law Jobs Near Me, Law Of Cosines, Law Of Sines, Law Killing Hibernating Bears, Law Know You, Law Know Me, Law Kingdon, Law Ka Leung, Law Kjv, Law Keepers, Law Of Conservation Of Energy, Law Library Umich, Law Library, Law Library Hours, Law Library Msu, Law Lyrics, Law Library Ann Arbor, Law Library University Of Michigan, Law Library Wayne State, Law Logo, Law Library U Of M, Law Majors, Law Movies, Lawmaker, Law Making Process, Law Meme, Law Man, Law Meaning, Law Merit Badge, Lawn Mower, Law Maven Crossword, Law News, Law N Order, Lawnewz, Law N Order Cast, Law Nail Polish, Law N Order Svu Cast, Law N Order Svu, Law N Order Criminal Intent Cast, Law Names, Law N Order Criminal Intent, Law Of Cosines, Law Of Sines, Law Of Conservation Of Energy, Law Of Attraction, Law Of Conservation Of Mass, Law Of Segregation, Law Of Demand, Law Of Supply, Law Of Superposition, Law Of Independent Assortment, Law Pay, Law Professor Salary, Law Public Safety Corrections And Security, Law Professor Jobs, Law Power Hour, Law Puns, Law Prof Guide Michigan, Law Practice, Law Practice Management Software, Law Pictures, Law Quad Umich, Law Quotes, Law Questions, Law Quad Umich Hours, Law Quad Construction, Law Quad Umich Construction, Law Quiz, Law Quad Ann Arbor, Law Quizlet, Law Quarterly Review, Law Roach, Law Review, Law Rocket, Law Rune Osrs, Law Regulates Relations Between Individuals, Law Review Rankings, Law Review Article, Law Review Endnotes, Law Review Personal Statement, Law Review Note Format, Law School Rankings, Law School, Law Schools In Michigan, Lawsuit, Law School Numbers, Law School Rankings 2017, Law School Scholarships, Law Schools In Ohio, Law Synonym, Law School Graduation Gifts, Law Tactical, Law Terms, Law Tactical Folding Stock Adapter, Law Tekken, Law Tv Shows, Law Test, Law Tigers, Law Thesaurus, Law Tattoos, Law Textbooks, Law Umich, Law Universities, Law Universities In Usa, Law Undergraduate, Law Urban Dictionary, Law Unto Themselves, Law Universities In California, Law Universal Gravitation, Law Unconstitutional, Law Updates, Law Vs Theory, Law Vocabulary, Law Vs Regulation, Law Vault, Law Vs Grace, Law Vs Ethics, Las Vegas, Law Vs Medicine, Law Vs Equity, Law Vs Morality, Law Words, Law Weapon, Law Weathers, Law Wayne State, Law Word Whizzle, Law Websites, Law Ware, Law West Of The Pecos, Law Wrestling, Law Winery, Law X Luffy, Law X Reader, Law X Reader Lemon, Law X Zoro, Law X Robin, Law X Luffy Lemon, Law X Luffy Fanfiction, Law X Doflamingo, Law X Luffy Doujinshi, Law X Reader Lemon Wattpad, Law Yo Gotti, Law Yo Gotti Lyrics, Law Yuk Fun, Law Yo Gotti Download, Law Yo Gotti Mp3, Law Yale, Law Yo Gotti Clean, Lawyer, Law Yo Gotti Instrumental, Law Years, Law Zoom, Law Zero Of Robotics, Law Zero, Law Zou, Law Zam, Law Zine, Law And Order, Law Zero In Six Sigma, Law Z, Law Zone, Insider Trading Definition, Insider Trading Cases, Insider Trading Laws, Insider Trading Penalties, Insider Trading Policy, Insider Trading Cases 2016, Insider Trading News, Insider Trading Scandals, Insider Trading Involves, Insider Trading Activity, Insider Trading Activity, Insider Trading Act, Insider Trading Act Of 1988, Insider Trading Articles, Insider Trading Alerts, Insider Trading Arrest, Insider Trading Amazon, Insider Trading And Ethics, Insider Trading Access Person, Insider Trading Amd, Insider Trading Blackout Period, Insider Trading By Misappropriation, Insider Trading Book, Insider Trading Bitcoin, Insider Trading Benefits, Insider Trading Buys, Insider Trading Baseball, Insider Trading Before 9\/11, Insider Trading Bonds, Insider Trading Biggest Cases, Insider Trading Cases, Insider Trading Cases 2016, Insider Trading Cases 2017, Insider Trading Convictions, Insider Trading Congress, Insider Trading Charges, Insider Trading Consequences, Insider Trading Chart, Insider Trading Canada, Insider Trading Cryptocurrency, Insider Trading Definition, Insider Trading Data, Insider Trading Defined, Insider Trading Documentary, Insider Trading Definition Sec, Insider Trading Disclosure, Insider Trading Def, Insider Trading Deerfield, Insider Trading Defense, Insider Trading Dark Web, Insider Trading Elements, Insider Trading Ethics, Insider Trading Example, Insider Trading Explained, Insider Trading Enron, Insider Trading Etf, Insider Trading Enforcement, Insider Trading Essay, Insider Trading Employee Stock Options, Insider Trading Efficient Market Hypothesis, Insider Trading Form 4, Insider Trading Filings, Insider Trading Fiduciary Duty, Insider Trading Fines, Insider Trading Forum, Insider Trading Famous Cases, Insider Trading Form, Insider Trading Facts, Insider Trading For Politicians, Insider Trading Forex, Insider Trading Graph, Insider Trading Ge, Insider Trading Game, Insider Trading Government Information, Insider Trading Gilead, Insider Trading Good Or Bad, Insider Trading Google, Insider Trading Government Officials, Insider Trading Guru, Insider Trading Gupta, Insider Trading History, Insider Trading Hedge Fund, Insider Trading Happens All The Time, Insider Trading Hacking, Insider Trading Hd Supply, Insider Trading Home Depot, Insider Trading How To Detect, Insider Trading Hard To Prove, Insider Trading Hedge Fund Scandal, Insider Trading Healthcare, Insider Trading Is, Insider Trading Involves, Insider Trading Information, Insider Trading Illegal, Insider Trading In Congress, Insider Trading In Spanish, Insider Trading Is Considered Illegal Because, Insider Trading Is Prohibited By The, Insider Trading Is An Example Of, Insider Trading Involves Individuals Who Are, Insider Trading Jail Time, Insider Trading Japan, Insider Trading Jail, Insider Trading Jury Instructions, Insider Trading Jokes, Insider Trading Jbs, Insider Trading Journal, Insider Trading Jse, Insider Trading Jamaica, Insider Trading Jail Time Uk, Insider Trading Kmi, Insider Trading Kite Pharma, Insider Trading Kite, Insider Trading Kenya, Insider Trading Knowledge, Insider Trading Korea, Insider Trading Kamay, Insider Trading Kpmg, Insider Trading Kroger, Insider Trading Ko, Insider Trading Laws, Insider Trading Legal, Insider Trading List, Insider Trading Lookup, Insider Trading Laws Congress, Insider Trading Lawyer, Insider Trading Loophole, Insider Trading Legislation, Insider Trading Libertarian, Insider Trading Legal In Russia, Insider Trading Meaning, Insider Trading Movie, Insider Trading Misappropriation, Insider Trading Martha, Insider Trading Monitor, Insider Trading Material Information, Insider Trading Minimum Amount, Insider Trading Mickelson, Insider Trading Mattel, Insider Trading Medicare, Insider Trading News, Insider Trading Nasdaq, Insider Trading Notifications, Insider Trading Newsletter, Insider Trading Nvidia, Insider Trading Newman Case, Insider Trading Netflix, Insider Trading Nvax, Insider Trading Nutanix, Insider Trading New York Times, Insider Trading Occurs When, Insider Trading Options, Insider Trading On The Dark Web, Insider Trading Opk, Insider Trading On 9\/11, Insider Trading On Wall Street, Insider Trading Outline, Insider Trading Overview, Insider Trading Overheard, Insider Trading Oclr, Insider Trading Penalties, Insider Trading Policy, Insider Trading Private Company, Insider Trading Policy Template, Insider Trading Prison, Insider Trading Prevention, Insider Trading Prosecutions, Insider Trading Pros And Cons, Insider Trading Penalties Uk, Insider Trading Patterns, Insider Trading Quizlet, Insider Trading Quotes, Insider Trading Quiz, Insider Trading Questions, Insider Trading Quiet Period, Insider Trading Questions And Answers, Insider Trading Quora, Insider Trading Qualcomm, Insider Trading Questionnaire, Insider Trading Qcom, Insider Trading Rules, Insider Trading Regulations, Insider Trading Reports, Insider Trading Restrictions, Insider Trading Reddit, Insider Trading Raj, Insider Trading Records, Insider Trading Real Estate, Insider Trading Research, Insider Trading Real Time, Insider Trading Sec, Insider Trading Scandals, Insider Trading Sanctions Act Of 1984, Insider Trading Sentence, Insider Trading Statute, Insider Trading Statistics, Insider Trading Stocks, Insider Trading Should Be Legal, Insider Trading Statute Of Limitations, Insider Trading Search, Insider Trading Tracker, Insider Trading Tips, Insider Trading Tippee, Insider Trading Training, Insider Trading Transactions, Insider Trading Today, Insider Trading Theories, Insider Trading Tesla, Insider Trading Trends, Insider Trading Tsn, Insider Trading Unethical, Insider Trading Uk, Insider Trading Us Law, Insider Trading Under Armour, Insider Trading Us Congress, Insider Trading Under Companies Act 2013, Insider Trading Ubs, Insider Trading Uk Cases, Insider Trading Uae, Insider Trading Uk Penalties, Insider Trading Victimless Crime, Insider Trading Video, Insider Trading Violation Penalties, Insider Trading Victims, Insider Trading Vrx, Insider Trading Verizon, Insider Trading Volume Restricted, Insider Trading Violations, Insider Trading Volume, Insider Trading Virtue Ethics, Insider Trading Website, Insider Trading Wiki, Insider Trading Window, Insider Trading Wall Street, Insider Trading Whistleblower, Insider Trading Walters, Insider Trading Wall Street Journal, Insider Trading White Collar Crime, Insider Trading Wall Street Movie, Insider Trading Watch, Insider Trading Xom, Insider Trading Xoma, Insider Trading Xerox, Insider Trading Xlnx, Siriusxm Insider Trading, Xgti Insider Trading, Xco Insider Trading, Xilinx Insider Trading, Xrx Insider Trading, Xxii Insider Trading, Insider Trading Yahoo, Insider Trading Youtube, Insider Trading Yahoo Answers, Insider Trading Yelp, Insider Trading Yrcw, Insider Trading Yaitu, Insider Trading New York, Insider Trading New York Times, Insider Trading New Yorker, Nancy Pelosi Insider Trading Youtube, Insider Trading Zerodha, Insider Trading Zinc, Insider Trading Zillow, Insider Trading Znacenje, Insider Trading Zbh, Insider Trading Zayo, Insider Trading Jargon, Insider Trading New Zealand, Insider Trading In Zambia, Insider Trading In Zimbabwe

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, CYBERCRIME June 3, 2016June 26, 2021 15 Minutes

REVEALED – FBI Cyber Division Bulletin: KeySweeper Wireless Keystroke Logger Disguised as USB Device Charger

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Wireless Keystroke Logger Disguised as USB Device Charger Targets Wireless Keyboards

Page Count: 3 pages
Date: April 29, 2016
Restriction: TLP: GREEN
Originating Organization: Federal Bureau of Investigation, Cyber Division
File Type: pdf
File Size: 400,857 bytes
File Hash (SHA-256):D0425EEF586E113504780F913D30648BF565A6CA1A8A15B6F915B110FEFE8DD2

Download File

KeySweeper is a covert device that resembles a functional Universal Serial Bus (USB) enabled device charger which conceals hardware capable of harvesting keystrokes from certain wireless keyboards. If placed strategically in an office or other location where individuals might use wireless devices, a malicious cyber actor could potentially harvest personally identifiable information, intellectual property, trade secrets, passwords, or other sensitive information. Since the data is intercepted prior to reaching the CPU, security managers may not have insight into how sensitive information is being stolen.
Technical Details

KeySweeper is an Arduino-baseda device which is contained within the shell of a USB phone charger. It is capable of detecting and decrypting radio frequency (RF) signals from certain Microsoft wireless keyboards manufactured before 2011 (many of which are still available for purchase). The wireless keyboard transmits these RF signals so the associated dongle plugged into a computer can identify which keys the user types.

KeySweeper, which measures two to three inches, contains a Subscriber Identity Module (SIM) card that uses a cellular connection to send the data to an associated Web server. This SIM card also enables the device to send text messages to an associated mobile device when it picks up certain keywords such as Web site addresses. A small flash memory module can also store data if the SMS capability is somehow impeded.

KeySweeper is hidden within a USB device charger and can be powered directly from an electrical outlet to harvest, decrypt, transmit, and store stolen data. A rechargeable battery serves as optional backup power should the device be removed from the wall.

According to a Microsoft spokesperson, customers using Microsoft Bluetooth-enabled keyboards are protected against KeySweeper attacks. In addition, users of their 2.4GHz wireless keyboard designs produced after 2011 are also protected because those keyboards use Advanced Encryption Standard (AES) encryption technology.

…

Threat

Since Arduino devices are modular and programmable, an actor could harvest data by capturing and decrypting communications protocols from various other wireless devices, depending on the weakness or exploitability of that protocol’s encryption. The device is easy to overlook as it harvests and sends sensitive data to a collector.

Although KeySweeper was designed to harvest from a particular brand of wireless keyboard, a cyber actor could program the device to conduct reconnaissance against a variety of devices. Given that RF ranges for all wireless devices registered with the FCC are located on the FCC’s Web site, discovering the frequency for any registered device is relatively simple. An actor could swap out the RF board for one that matches the frequency of the other device.

A KeySweeper-like device could be used to harvest data from wireless devices other than wireless keyboards, to potentially include data from Bluetooth, Wi-Fi, or SMS traffic, depending on the difficulty of cracking a protocol’s chosen encryption method. Though the data could be collected, decryption depends on the configuration and protocol.

…

Defense

The primary method of defense is for corporations to restrict the use of wireless keyboards. Since the KeySweeper requires over-the-air transmission, a wired keyboard will be safe from this type of attack. However, if the use of a wireless keyboard cannot be prevented, then ensuring a strong encryption on the keyboard is vital.

A keyboard using AES encryption makes it more difficult to read keystrokes as there are currently no known practical attacks to read AES encrypted data.

Keyboards using Bluetooth are also safe from KeySweeper as it listens on a different channel than that which Bluetooth transmits. However, Bluetooth keyboards must have encryption turned on and a strong pairing PIN to protect it from a similar type of data-harvesting attack.
Additional best practices to prevent a compromise could include but are not limited to office policies that address mobile device chargers:

Limiting which outlets are available for device charging

Knowing whose chargers are currently being used

Immediate removal of an unknown charger from the office facility (although the optional backup battery can allow data theft even when unplugged)

…

keysweeper-1

keysweeper-2

Go back

Your message has been sent

Warning
Warning
Warning
Warning

Warning.

Fbi Most Wanted, Fbi Jobs, Fbi Director, Fbi Salary, Fbi Agent, Fbi Background Check, Fbi Agent Salary, Fbi Headquarters, Fbi Special Agent, Fbi Internships, Fbi Agent, Fbi Agent Salary, Fbi Academy, Fbi Application, Fbi Analyst, Fbi Atlanta, Fbi Agent Jobs, Fbi Anon, Fbi Address, Fbi Arrests, Fbi Background Check, Fbi Badge, Fbi Bau, Fbi Building, Fbi Boston, Fbi Bap, Fbi Baltimore, Fbi Benefits, Fbi Budget, Fbi Building Dc, Fbi Careers, Fbi Crime Statistics, Fbi Clearance, Fbi Criminal Background Check, Fbi Chicago, Fbi Citizens Academy, Fbi Crime Statistics By Race, Fbi Contact, Fbi Channeler, Fbi Candidates, Fbi Director, Fbi Director Candidates, Fbi Director James Comey, Fbi Definition, Fbi Director Fired, Fbi Director Salary, Fbi Definition Of Terrorism, Fbi Database, Fbi Dallas, Fbi Drug Policy, Fbi Employment, Fbi Email Address, Fbi Employment Drug Policy, Fbi El Paso, Fbi Employees, Fbi Emblem, Fbi Established, Fbi Education Center, Fbi Education, Fbi Executive Branch, Fbi Fingerprinting, Fbi Files, Fbi Field Offices, Fbi Fingerprint Card, Fbi Fitness Test, Fbi Facebook, Fbi Fingerprint Check, Fbi Forensic Accountant, Fbi Foia, Fbi Founder, Fbi Glock, Fbi Games, Fbi Gov, Fbi Glassdoor, Fbi Guns, Fbi Gang List, Fbi Gun Statistics, Fbi Gif, Fbi Gift Shop, Fbi General Counsel, Fbi Headquarters, Fbi Hrt, Fbi History, Fbi Houston, Fbi Hiring, Fbi Hate Crime Statistics, Fbi Head, Fbi Hat, Fbi Honors Internship, Fbi Hotline, Fbi Internships, Fbi Investigation, Fbi Intelligence Analyst, Fbi Informant, Fbi Irt, Fbi Investigation Trump, Fbi Ic3, Fbi Infragard, Fbi Internet Fraud, Fbi Id, Fbi Jobs, Fbi Jacket, Fbi James Comey, Fbi Jurisdiction, Fbi Job Description, Fbi Jobs Apply, Fbi Jacksonville, Fbi Jade Helm, Fbi Jobs Chicago, Fbi Jackson Ms, Fbi Kansas City, Fbi Kids, Fbi Knoxville, Fbi Kidnapping, Fbi Komi, Fbi Kentucky, Fbi Killed Jfk, Fbi Kkk, Fbi Kodi, Fbi K9 Unit, Fbi Logo, Fbi Leeda, Fbi Los Angeles, Fbi Locations, Fbi Las Vegas, Fbi Leaks, Fbi Leader, Fbi Linguist, Fbi Louisville, Fbi Login, Fbi Most Wanted, Fbi Most Wanted List, Fbi Meaning, Fbi Meme, Fbi Movies, Fbi Museum, Fbi Motto, Fbi Miami, Fbi Mission Statement, Fbi Most Dangerous Cities, Fbi Number, Fbi News, Fbi National Academy, Fbi Nics, Fbi New York, Fbi New Orleans, Fbi Newark, Fbi New York Tv Show, Fbi Near Me, Fbi Nominee, Fbi Offices, Fbi Org Chart, Fbi Omaha, Fbi Operative, Fbi On Trump, Fbi Organizational Chart, Fbi Obama Meme, Fbi Obama, Fbi Oklahoma City, Fbi Office Near Me, Fbi Phone Number, Fbi Profiler, Fbi Pft, Fbi Police, Fbi Pay Scale, Fbi Phoenix, Fbi Pay, Fbi Philadelphia, Fbi Positions, Fbi Pittsburgh, Fbi Quantico, Fbi Qualifications, Fbi Q Target, Fbi Quotes, Fbi Quiz, Fbi Questions, Fbi Qr Code, Fbi Qas, Fbi Quantico Address, Fbi Quantico Tours, Fbi Requirements, Fbi Russia, Fbi Russia Investigation, Fbi Report, Fbi Ranks, Fbi Recruiting, Fbi Raid, Fbi Records, Fbi Rape Statistics, Fbi Russia Trump, Fbi Salary, Fbi Special Agent, Fbi Stands For, Fbi Swat, Fbi Special Agent Salary, Fbi Surveillance, Fbi Statistics, Fbi Sos, Fbi Surveillance Van, Fbi Seal, Fbi Training, Fbi Top Ten, Fbi Trump, Fbi Trump Russia, Fbi Tip Line, Fbi Tv Shows, Fbi Twitter, Fbi Tips, Fbi Teen Academy, Fbi Tours, Fbi Ucr, Fbi Ucr 2016, Fbi Units, Fbi Ucr 2015, Fbi Undercover, Fbi Unsolved Cases, Fbi Upin, Fbi Utah, Fbi Usa, Fbi Uniforms, Fbi Vs Cia, Fbi Vault, Fbi Virus, Fbi Vs Apple, Fbi Virtual Academy, Fbi Vehicles, Fbi Violent Crime Statistics, Fbi Virginia, Fbi Van, Fbi Van Wifi, Fbi Website, Fbi Warning, Fbi Wiki, Fbi Wanted List, Fbi Watch List, Fbi Windbreaker, Fbi Warning Screen, Fbi White Collar Crime, Fbi Warrant Search, Fbi Weapons, Fbi X Files, Fbi Xl2, Fbi Xl31, Fbi Xl4, Fbi Xl2 Programming, Fbi Xl-31 Troubleshooting, Fbi Xl 31 Installation Manual, Fbi X Files Real, Fbi Xl2t Installation Manual, Fbi Xl 1215, Fbi Yearly Salary, Fbi Youtube, Fbi Youth Academy, Fbi Youth Leadership Academy, Fbi Yellow Brick Road, Fbi Youth Programs, Fbi Yearly Budget, Fbi Youth Leadership Academy Portland, Fbi Youngstown Ohio, Fbi Yearly Income, Fbi Zodiac Killer, Fbi Zodiac, Fbi Zip Code, Fbi Zodiac Killer List, Fbi Zero Files, Fbi Zodiac List, Fbi Zodiac Signs Killer, Fbi Zhang Yingying, Fbi Zion, Fbi Zodiac Crimes, Cybercrime Definition, Cybercrime Statistics, Cybercrime Prevention, Cybercrime Articles, Cybercrime Jobs, Cybercrime Law, Cybercrime Statistics 2017, Cyber Crime Cases, Cyber Crime News, Cybercrime Topics, Cybercrime Articles, Cybercrime And Security, Cybercrime As A Service, Cybercrime And Digital Forensics An Introduction, Cybercrime And Digital Forensics, Cybercrime And Society, Cybercrime And Terrorism, Cybercrime Attacks, Cybercrime Act, Cybercrime Against Businesses, Cyber Crime Batman, Cyber Crime Book, Cybercrime Blog, Cybercrime Bill, Cybercrime Banks, Cybercrime Background, Cyber Crime By Country, Cybercrime Bangalore, Cybercrime Billion Dollar Industry, Cybercrime Background Information, Cyber Crime Cases, Cybercrime Certification, Cybercrime Convention, Cybercrime Careers, Cybercrime Cost, Cybercrime Cafe, Cybercrime Cost 2016, Cybercrime China, Cybercrime Conference, Cybercrime Conclusion, Cybercrime Definition, Cybercrime Definition Computer, Cybercrime Definition Fbi, Cyber Crime Data, Cybercrime Degrees, Cybercrime Definition Pdf, Cybercrime Database, Cyber Crime Detective, Cyber Crime Documentary, Cyber Crime Department, Cybercrime Example, Cyber Crime Essay, Cybercrime Effects, Cybercrime Events, Cybercrime Enforcement, Cybercrime Economy, Cyber Crime Ethics, Cybercrime Effects On Business, Cybercrime Ecosystem, Cybercrime Enforcement Training Assistance Act, Cybercrime Facts, Cybercrime Fbi, Cybercrime Forensics, Cybercrime Forum, Cybercrime Forensics Training Center, Cybercrime Federal Laws, Cyber Crime Fiction, Cybercrime Financial Services, Cybercrime Future Trends, Cybercrime Fiji, Cybercrime Gets Personal Money Magazine, Cybercrime Gets Personal, Cybercrime Growth, Cyber Crime Graph, Cybercrime Groups, Cybercrime Government, Cybercrime Global Statistics, Cyber Crime Gov, Cyber Crime Games, Cybercrime Gif, Cybercrime Hacking, Cyber Crime History, Cybercrime Help, Cybercrime Healthcare, Cybercrime Hyderabad, Cybercrime How To Report, Cyber Crime Hotline, Cybercrime Hacking News, Cyber Crime Head Office India, Cybercrime Hacking And Cracking, Cybercrime Identity Theft, Cybercrime In The Us, Cyber Crime Investigation, Cybercrime Images, Cyber Crime Insurance, Cybercrime Is Also Known As, Cybercrime Investigating High-technology Computer Crime, Cybercrime Infographic, Cybercrime Information, Cyber Crime In Russia, Cybercrime Jobs, Cybercrime Jurisdiction, Cybercrime Journal Articles, Cybercrime Job Description, Cybercrime Jobs Salary, Cybercrime Job Openings, Cybercrime Jobs In Chennai, Cybercrime Job Qualification, Cybercrime Journal Articles Pdf, Cyber Crime Jamaica, Cybercrime Kenya, Cybercrime Key Issues And Debates, Cybercrime Kuwait, Cybercrime Ki Dhara, Cybercrime Key Issues And Debates Pdf, Cybercrime Kasus, Cyber Crime Karnataka, Cybercrime Kartu Kredit, Cybercrime Kolkata, Cyber Crime Karachi, Cybercrime Law, Cybercrime Laws In Usa, Cybercrime Law Enforcement, Cybercrime Laws Of The United States, Cybercrime List, Cybercrime Legislation Us, Cybercrime Laws In Florida, Cybercrime Legal Issues, Cybercrime Law Outline, Cyber Crime Lesson Plans, Cybercrime Meaning, Cyber Crime Movies, Cybercrime Methods, Cybercrime Methodology, Cyber Crime Money, Cybercrime Markets, Cyber Crime Magazine, Cyber Crime Most Wanted, Cybercrime Meaning In Tamil, Cybercrime Masters Degree, Cyber Crime News, Cyber Crime News Articles, Cyber Crime News Articles 2017, Cyber Crime Netflix, Cybercrime Nigeria, Cyber Crime Novels, Cybercrime Number, Cybercrime Nhs, Cyber Crime News Philippines, Cybercrime Nbi, Cybercrime Or Cyber Crime, Cybercrime Organizations, Cybercrime On The Rise, Cybercrime On The High Seas, Cybercrime Offenses, Cyber Crime Outline, Cybercrime Office, Cybercrime Office In Ahmedabad, Cybercrime Office In Patna, Cybercrime Office In Nashik, Cybercrime Quotes, Cyber Crime Quizlet, Cybercrime Questions, Cyber Crime Quiz, Cybercrime Questionnaire, Cybercrime Question Paper, Cybercrime Qatar, Cybercrime Question And Answers, Cybercrime Report, Cybercrime Research Paper, Cyber Crime Rates, Cyber Crime Recent, Cybercrime Research Topics, Cybercrime Research, Cybercrime Reported To The Ic3, Cybercrime Resources, Cybercrime Riding Tax Season Tides, Cyber Crime Report 2016, Cybercrime Statistics, Cybercrime Statistics 2017, Cyber Crime Stories, Cybercrime Spyware, Cybercrime Statistics 2015, Cybercrime Security, Cybercrime Solutions, Cybercrime Salary, Cybercrime Small Business, Cyber Crime Synonym, Cybercrime Topics, Cybercrime Trends, Cybercrime Tracker, Cybercrime Treaty, Cyber Crime Types, Cybercrime Training, Cybercrime Threats, Cybercrime Tools, Cybercrime Terms, Cybercrime The Transformation Of Crime In The Information Age, Cyber Crime Unit, Cybercrime Us, Cybercrime Uk, Cybercrime Uae, Cybercrime University, Cybercrime Un, Cyber Crime Unit Mauritius, Cyber Crime Unit Malta, Cybercrime Uc, Cybercrime Unodc, Cybercrime Victims, Cybercrime Vs Traditional Crime, Cybercrime Videos, Cybercrime Vs Traditional Crime Statistics, Cybercrime Virus, Cyber Crime Vocabulary, Cybercrime Vs Traditional Crime Punishment, Cybercrime Vs Computer Crime, Cybercrime Vs Cyber Warfare, Cybercrime Vs Cyber Espionage, Cybercrime Wiki, Cybercrime Worm, Cybercrime World Wide War 3.0, Cyber Crime Websites, Cyber Crime Worksheet, Cybercrime Wallpaper, Cyber Crime Worldwide, Cybercrime Working Group, Cyber Crime What Is It, Cybercrime Wikipedia Indonesia, Cybercrime X-remote Download, Tedx Cybercrime, Cyber Crime Youtube, Cyber Crime Yahoo, Cyber Crime Yahoo Answers, Cyber Crime Yesterday, Cyber Crime Youth, Cybercrime Yang Menyerang Hak Cipta, Cybercrime Yar, Youth Cyber Crime, Cyber Crime Yogyakarta, Cybercrime Yang Menyerang Pemerintah, Cybercrime Zimbabwe, Cybercrime Zeus, Cybercrime Zimbra, Zurich Cyber Crime, Zimbabwe Cybercrime Bill, Cyber Crime In Zambia, New Zealand Cyber Crime, Los Zetas Cybercrime, Cybercrime Law In Zambia, Cyber Crime Cases In Zambia

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, PUBLIC INTELLIGENCE May 22, 2016June 26, 2021 9 Minutes

Confidential – FBI Flash Alerts on MSIL/Samas.A Ransomware and Indicators of Compromise

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

FBI MSIL/Samas.A Ransomware Flash Alerts

Page Count: 6 pages
Date: March 25, 2016
Restriction: TLP: GREEN
Originating Organization: Federal Bureau of Investigation, Cyber Divison
File Type: zip
File Size: 775,199 bytes
File Hash (SHA-256): AFF6B13256C8E0FE9A67F2F2E80C5AB337AF95F018104BA5CBC15FD093A1D8A9

Download File

File Contents

  • FBI Flash Alert MC-000068-MW, February 18, 2016
  • FBI Flash Alert MC-000070-MW, March 25, 2016
  • Samas Indicators of Compromise

The FBI previously identified that the actor(s) exploit Java-based Web servers to gain persistent access to a victim network and infect Windows-based hosts. The FBI also indicated that several victims have reported the initial intrusion occurred via JBOSS applications. Further analysis of victim machines indicates that, in at least two cases, the attackers used a Python tool, known as JexBoss, to probe and exploit target systems. Analysis of the JexBoss Exploit Kit identified the specific JBoss services targeted and vulnerabilities exploited. The FBI is distributing these indicators to enable network defense activities and reduce the risk of similar attacks in the future.

FBI indicators based on an ongoing investigation:

The JexBoss tool, publicly available on GitHub.com, prompts attackers to input the target URL for JexBoss to check for any of three vulnerable JBoss services: web-console, jmx-console, and JMXInvokerServlet. Depending on which vulnerabilities are detected, the tool then prompts the user to initiate corresponding exploits. The tool’s exploits are collectively effective against JBoss versions 4, 5, and 6. The payload of each exploit is a Web application Archive (.war) file, “jbossass.war”. A successful exploit results in unpackaging the .war file and utilizing jbossass.jsp to deploy an HTTP shell for the attacker.

Following initial infection of the network with MSIL/Samas.A, the actor(s) connect via RDP sessions. An open source tool, known as reGeorg, is used to tunnel the RDP traffic over the established HTTP connection. The actors use the Microsoft tool csvde.exe to determine the hosts reporting to the active directory. A list of all hosts found in the directory is compiled into a .csv file or other similar file type. Finally, the actor(s) distribute the ransomware to each host in the network using a copy of Microsoft’s psexec.exe.

…

Defending Against Ransomware Generally
Precautionary measures to mitigate ransomware threats include:
• Ensure anti-virus software is up-to-date.
• Implement a data back-up and recovery plan to maintain copies of sensitive or proprietary data in a separate and secure location. Backup copies of sensitive data should not be readily accessible from local networks.
• Scrutinize links contained in e-mails, and do not open attachments included in unsolicited e-mails.
• Only download software – especially free software – from sites you know and trust.
• Enable automated patches for your operating system and Web browser.

Go back

Your message has been sent

Warning
Warning
Warning
Warning

Warning.

Fbi Most Wanted, Fbi Jobs, Fbi Director, Fbi Salary, Fbi Agent, Fbi Background Check, Fbi Agent Salary, Fbi Headquarters, Fbi Special Agent, Fbi Internships, Fbi Agent, Fbi Agent Salary, Fbi Academy, Fbi Application, Fbi Analyst, Fbi Atlanta, Fbi Agent Jobs, Fbi Anon, Fbi Address, Fbi Arrests, Fbi Background Check, Fbi Badge, Fbi Bau, Fbi Building, Fbi Boston, Fbi Bap, Fbi Baltimore, Fbi Benefits, Fbi Budget, Fbi Building Dc, Fbi Careers, Fbi Crime Statistics, Fbi Clearance, Fbi Criminal Background Check, Fbi Chicago, Fbi Citizens Academy, Fbi Crime Statistics By Race, Fbi Contact, Fbi Channeler, Fbi Candidates, Fbi Director, Fbi Director Candidates, Fbi Director James Comey, Fbi Definition, Fbi Director Fired, Fbi Director Salary, Fbi Definition Of Terrorism, Fbi Database, Fbi Dallas, Fbi Drug Policy, Fbi Employment, Fbi Email Address, Fbi Employment Drug Policy, Fbi El Paso, Fbi Employees, Fbi Emblem, Fbi Established, Fbi Education Center, Fbi Education, Fbi Executive Branch, Fbi Fingerprinting, Fbi Files, Fbi Field Offices, Fbi Fingerprint Card, Fbi Fitness Test, Fbi Facebook, Fbi Fingerprint Check, Fbi Forensic Accountant, Fbi Foia, Fbi Founder, Fbi Glock, Fbi Games, Fbi Gov, Fbi Glassdoor, Fbi Guns, Fbi Gang List, Fbi Gun Statistics, Fbi Gif, Fbi Gift Shop, Fbi General Counsel, Fbi Headquarters, Fbi Hrt, Fbi History, Fbi Houston, Fbi Hiring, Fbi Hate Crime Statistics, Fbi Head, Fbi Hat, Fbi Honors Internship, Fbi Hotline, Fbi Internships, Fbi Investigation, Fbi Intelligence Analyst, Fbi Informant, Fbi Irt, Fbi Investigation Trump, Fbi Ic3, Fbi Infragard, Fbi Internet Fraud, Fbi Id, Fbi Jobs, Fbi Jacket, Fbi James Comey, Fbi Jurisdiction, Fbi Job Description, Fbi Jobs Apply, Fbi Jacksonville, Fbi Jade Helm, Fbi Jobs Chicago, Fbi Jackson Ms, Fbi Kansas City, Fbi Kids, Fbi Knoxville, Fbi Kidnapping, Fbi Komi, Fbi Kentucky, Fbi Killed Jfk, Fbi Kkk, Fbi Kodi, Fbi K9 Unit, Fbi Logo, Fbi Leeda, Fbi Los Angeles, Fbi Locations, Fbi Las Vegas, Fbi Leaks, Fbi Leader, Fbi Linguist, Fbi Louisville, Fbi Login, Fbi Most Wanted, Fbi Most Wanted List, Fbi Meaning, Fbi Meme, Fbi Movies, Fbi Museum, Fbi Motto, Fbi Miami, Fbi Mission Statement, Fbi Most Dangerous Cities, Fbi Number, Fbi News, Fbi National Academy, Fbi Nics, Fbi New York, Fbi New Orleans, Fbi Newark, Fbi New York Tv Show, Fbi Near Me, Fbi Nominee, Fbi Offices, Fbi Org Chart, Fbi Omaha, Fbi Operative, Fbi On Trump, Fbi Organizational Chart, Fbi Obama Meme, Fbi Obama, Fbi Oklahoma City, Fbi Office Near Me, Fbi Phone Number, Fbi Profiler, Fbi Pft, Fbi Police, Fbi Pay Scale, Fbi Phoenix, Fbi Pay, Fbi Philadelphia, Fbi Positions, Fbi Pittsburgh, Fbi Quantico, Fbi Qualifications, Fbi Q Target, Fbi Quotes, Fbi Quiz, Fbi Questions, Fbi Qr Code, Fbi Qas, Fbi Quantico Address, Fbi Quantico Tours, Fbi Requirements, Fbi Russia, Fbi Russia Investigation, Fbi Report, Fbi Ranks, Fbi Recruiting, Fbi Raid, Fbi Records, Fbi Rape Statistics, Fbi Russia Trump, Fbi Salary, Fbi Special Agent, Fbi Stands For, Fbi Swat, Fbi Special Agent Salary, Fbi Surveillance, Fbi Statistics, Fbi Sos, Fbi Surveillance Van, Fbi Seal, Fbi Training, Fbi Top Ten, Fbi Trump, Fbi Trump Russia, Fbi Tip Line, Fbi Tv Shows, Fbi Twitter, Fbi Tips, Fbi Teen Academy, Fbi Tours, Fbi Ucr, Fbi Ucr 2016, Fbi Units, Fbi Ucr 2015, Fbi Undercover, Fbi Unsolved Cases, Fbi Upin, Fbi Utah, Fbi Usa, Fbi Uniforms, Fbi Vs Cia, Fbi Vault, Fbi Virus, Fbi Vs Apple, Fbi Virtual Academy, Fbi Vehicles, Fbi Violent Crime Statistics, Fbi Virginia, Fbi Van, Fbi Van Wifi, Fbi Website, Fbi Warning, Fbi Wiki, Fbi Wanted List, Fbi Watch List, Fbi Windbreaker, Fbi Warning Screen, Fbi White Collar Crime, Fbi Warrant Search, Fbi Weapons, Fbi X Files, Fbi Xl2, Fbi Xl31, Fbi Xl4, Fbi Xl2 Programming, Fbi Xl-31 Troubleshooting, Fbi Xl 31 Installation Manual, Fbi X Files Real, Fbi Xl2t Installation Manual, Fbi Xl 1215, Fbi Yearly Salary, Fbi Youtube, Fbi Youth Academy, Fbi Youth Leadership Academy, Fbi Yellow Brick Road, Fbi Youth Programs, Fbi Yearly Budget, Fbi Youth Leadership Academy Portland, Fbi Youngstown Ohio, Fbi Yearly Income, Fbi Zodiac Killer, Fbi Zodiac, Fbi Zip Code, Fbi Zodiac Killer List, Fbi Zero Files, Fbi Zodiac List, Fbi Zodiac Signs Killer, Fbi Zhang Yingying, Fbi Zion, Fbi Zodiac Crimes, Ransomware Protection, Ransomware Virus, Ransomware Attack, Ransomware Removal, Ransomware News, Ransomware 2017, Ransomware As A Service, Ransomware Patch, Ransomware Decryptor, Ransomware Statistics 2017, Ransomware Attack, Ransomware As A Service, Ransomware Attack 2017, Ransomware Attacks 2016, Ransomware Android, Ransomware Attacks In Usa, Ransomware Articles, Ransomware Attacks 2017 Wiki, Ransomware Apple, Ransomware Attacks Definition, Ransomware Bitcoin, Ransomware Blocker, Ransomware Builder, Ransomware Best Practices, Ransomware Business, Ransomware Blog, Ransomware Breach, Ransomware Background, Ransomware Backup, Ransomware Bitdefender, Ransomware Cost, Ransomware Cry, Ransomware Checker, Ransomware Cases, Ransomware Customer Service, Ransomware Cerber, Ransomware Case Study, Ransomware Code, Ransomware Cnn, Ransomware Cisco, Ransomware Decryptor, Ransomware Download, Ransomware Definition, Ransomware Decrypt, Ransomware Detection, Ransomware Decrypt Tool, Ransomware Defense, Ransomware Definition Computer, Ransomware Defender, Ransomware Dropbox, Ransomware Extensions, Ransomware Example, Ransomware Epidemic, Ransomware Email, Ransomware Encryption, Ransomware Encrypted Files, Ransomware Explained, Ransomware Email Example, Ransomware Education, Ransomware Examples 2017, Ransomware Fix, Ransomware File Decryptor, Ransomware Fbi, Ransomware Facts, Ransomware Free, Ransomware For Dummies, Ransomware Families, Ransomware For Mac, Ransomware Facts 2017, Ransomware File Extensions List, Ransomware Google Drive, Ransomware Github, Ransomware Game, Ransomware Graphic, Ransomware Government, Ransomware Gif, Ransomware Gpo, Ransomware Google Docs, Ransomware Growth, Ransomware Google Chrome, Ransomware Hospital, Ransomware Healthcare, Ransomware History, Ransomware Hack, Ransomware Hackers, Ransomware Hospital 2017, Ransomware Help, Ransomware Hero, Ransomware Hipaa, Ransomware Hacker Caught, Ransomware Insurance, Ransomware Images, Ransomware Iphone, Ransomware Infographic, Ransomware Icon, Ransomware In Healthcare, Ransomware Identifier, Ransomware Incident Response Plan, Ransomware Incidents, Ransomware Incident Response, Ransomware Jaff, Ransomware Jigsaw, Ransomware Javascript, Ransomware June 2017, Ransomware Jokes, Ransomware Java, Ransomware Jail, Ransomware Japan, Ransomware Juniper, Ransomware Jeff, Ransomware Kaspersky, Ransomware Kill Switch, Ransomware Keys, Ransomware Kb, Ransomware Kill Chain, Ransomware Kit, Ransomware Keys Released, Ransomware Killer, Ransomware Kb Patch, Ransomware Korea, Ransomware List, Ransomware Linux, Ransomware Locky, Ransomware Law Firm, Ransomware Logo, Ransomware Laws, Ransomware Losses 2016, Ransomware Latest News, Ransomware Latest, Ransomware League Of Legends, Ransomware Mac, Ransomware Meaning, Ransomware Microsoft Patch, Ransomware Michigan, Ransomware Microsoft, Ransomware Meme, Ransomware Message, Ransomware Mcafee, Ransomware May 2017, Ransomware Map, Ransomware News, Ransomware Npr, Ransomware Names, Ransomware Nsa, Ransomware Nhs, Ransomware Netflix, Ransomware Note, Ransomware Norton, Ransomware Network Drive, Ransomware Numbers, Ransomware On Mac, Ransomware On Iphone, Ransomware On The Rise, Ransomware Outbreak, Ransomware Onedrive, Ransomware On Ipad, Ransomware On Android, Ransomware On Linux, Ransomware Origin, Ransomware Onion, Ransomware Protection, Ransomware Patch, Ransomware Patch Microsoft, Ransomware Prevention, Ransomware Popup, Ransomware Playbook, Ransomware Payment, Ransomware Policy, Ransomware Phishing, Ransomware Pdf, Ransomware Quiz, Ransomware Quizlet, Ransomware Quotes, Ransomware Questions, Ransomware Que Es, Ransomware Qnap, Ransomware Quora, Ransomware Qq.com, Ransomware Qualys, Ransomware Quick Heal, Ransomware Removal, Ransomware Removal Windows 10, Ransomware Recovery, Ransomware Reddit, Ransomware Removal Malwarebytes, Ransomware Response Plan, Ransomware Removal Tools, Ransomware Rdp, Ransomware Research Paper, Ransomware Report, Ransomware Statistics 2017, Ransomware Statistics, Ransomware Scanner, Ransomware Statistics 2016, Ransomware Screenshot, Ransomware Source Code, Ransomware Solutions, Ransomware Simulator, Ransomware Samples, Ransomware Symptoms, Ransomware Tracker, Ransomware Types, Ransomware Trends, Ransomware Tabletop Exercise, Ransomware Timeline, Ransomware Training, Ransomware Test, Ransomware Tools, Ransomware Threat, Ransomware Trend Micro, Ransomware Update, Ransomware Uk, Ransomware United States, Ransomware User Education, Ransomware Usa, Ransomware Unlocker, Ransomware Ups, Ransomware University, Ransomware Usa Today, Ransomware Update For Xp, Ransomware Virus, Ransomware Virus Removal, Ransomware Variants, Ransomware Virus 2017, Ransomware Victims, Ransomware And Malware, Ransomware Video, Ransomware Variants List, Ransomware Virus Definition, Ransomware Vaccine, Ransomware Wanna Cry, Ransomware Wiki, Ransomware Windows Update, Ransomware Windows 10, Ransomware Windows 7, Ransomware What To Do, Ransomware Worm, Ransomware Windows Xp, Ransomware Windows Patch, Ransomware Wallet, Ransomware Xp Patch, Ransomware Xp, Ransomware Xp Patch Download, Ransomware Xbox, Ransomware Xdata, Ransomware Xp Only, Ransomware X3m, Ransomware Xp Patch Microsoft, Ransomware Xp Patch Link, Ransomware Xp Download, Ransomware Youtube, Ransomware Yahoo, Ransomware Yara, Ransomware Yahoo Answers, Ransomware Yesterday, Ransomware Yara Rules, Ransomware Y La Amenaza Wanna Cry, Ransomware Your Personal Files Are Encrypted, New York Times Ransomware, Help_your_files Ransomware, Ransomware .Zzz, Zeus Ransomware, Zonealarm Ransomware

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, CYBERCRIME, FBI *, PUBLIC INTELLIGENCE May 9, 2016June 27, 2021 7 Minutes

Exposed – DHS-FBI-NCTC Bulletin: Tactics, Techniques, and Procedures Used in March 2016 Brussels Attacks

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

 

Tactics, Techniques, and Procedures Used in the 22 March 2016 Brussels Attacks

Page Count: 9 pages
Date: April 12, 2016
Restriction: For Official Use Only
Originating Organization: Department of Homeland Security, Federal Bureau of Investigation, National Counterterrorism Center
File Type: pdf
File Size: 254,019 bytes
File Hash (SHA-256): 5840AF768DA275DAA059648BFFF85B2E314544AA07F275459392D11BD4CF6602

Download File

(U//FOUO) This Joint Intelligence Bulletin (JIB) is intended to provide a review of the tactics, techniques, and procedures demonstrated by the perpetrators of the 22 March 2016 attacks in Brussels, Belgium. The analysis in this JIB is based on statements by European government and law enforcement officials cited in media reporting and is subject to change with the release of official details from post-incident investigations. This JIB is provided by DHS, FBI, and NCTC to support their respective activities and to assist federal, state, local, tribal, and territorial government counterterrorism and law enforcement officials, first responders and private sector partners in deterring, preventing, preempting, or disrupting terrorist attacks against the United States.

…

(U//FOUO) Attacks in Brussels Reaffirm ISIL’s Ability to Conduct Complex Attacks in Europe

(U//FOUO) DHS, FBI, and NCTC assess the 22 March 2016 attacks in Brussels, Belgium targeting Zaventem International Airport and the Brussels Metro system—for which the Islamic State of Iraq and the Levant (ISIL) has claimed responsibility—demonstrate the group’s continued ability to conduct complex, coordinated attacks in Western Europe using multiple operatives and relatively simple tactics. We are not aware of any direct links to the Homeland; however, radicalized individuals inspired by ISIL operating alone or in small groups continue to have the ability to conduct relatively unsophisticated attacks with little to no warning in the United States.*

(U//FOUO) We judge the Brussels attackers probably conducted preoperational surveillance, did some level of tactical planning, and had familiarity with the targets prior to the attack, but may have expedited their plans after the arrest—several days prior in Belgium—of the sole surviving attacker involved in the November 2015 Paris attacks. We further assess the large amount of explosives used, willingness to operate despite well-publicized efforts by security officials to locate potential ISIL operatives, and the use of operational security to avoid law enforcement detection during the preoperational phase indicate some level of training. The attackers were part of an extensive support network and infrastructure in Belgium that also conducted the Paris attacks. This same network may have allowed the operatives to acquire materials and false documents, fabricate explosives, and may have facilitated connections with individuals based in Syria.

(U//FOUO) Attack Overview: On 22 March 2016, at least four and as many as five operatives divided into two teams that detonated homemade explosive devices estimated to contain between 30 and 60 pounds of triacetone triperoxide (TATP) at Brussels Zaventem International Airport and onboard a train in the Brussels subway, killing at least 32 and injuring over 300. Two operatives at the airport and one individual at the metro conducted suicide operations, which also resulted in over a dozen American casualties, including at least two deaths. Belgian authorities have arrested a man believed to be the third operative seen in CCTV footage at the airport and are investigating the possibility of an accomplice at the metro prior to the explosion.

(U) Airport Attack: At approximately 0758 local time, two improvised explosive devices (IEDs) believed to have been concealed in luggage detonated seconds apart in the passenger check-in area for several international airlines, including a US carrier. The attackers did not attempt to enter areas where their bags would be subject to security screening. Authorities later found a third viable device at the airport, which Belgian officials speculate might have been designed to target first responders, according to a statement from the Belgian federal prosecutor to the press. The device was later detonated by explosive ordnance disposal technicians. The third alleged operative at the airport was seen in security footage with the two suicide operatives in the moments prior to the attack, but he fled the scene and was arrested by Belgian authorities on 8 April.

(U) Subway Attack: Approximately 80 minutes after the airport explosions, at 0910 local time, an explosion occurred on a train as it departed the Maelbeek metro station, killing 13, according to the Brussels transit operator STIB. At least one operative, possibly aided by a second operative, entered the Maelbeek metro station and boarded the middle car of the three-car train, according to Belgian officials cited in media reporting., The blast occurred during morning rush hour near the European Union buildings, raising the possibility the operatives were targeting European government employees.

…

(U) Importance of Suspicious Activity Reporting

(U//FOUO) We encourage reporting of suspicious activity to appropriate authorities and encourage our homeland security, military, law enforcement, first responders, and private sector partners to remain vigilant. We face an increased challenge in detecting in-progress terrorist plots by individuals or small groups acting quickly and independently or with only tenuous ties to foreign handlers. Pre-operational indicators are likely to be difficult to detect; therefore, state, local, tribal, territorial, and private sector partners play a critical role in identifying and reporting suspicious activities and raising the awareness of federal counterterrorism officials.

(U//FOUO) The acquisition of materials for constructing an explosive device, a necessary stage in the execution of any IED attack, offers an opportunity for detection and disruption of plots. Thus, it is critical that point-of-sale employees understand how their products can be misused and are trained to recognize indicators of suspicious purchases and methods of reporting this information.

» (U//FOUO) In May 2015, a tip by a vigilant hardware store clerk to local police about a potentially suspicious purchase of an explosive precursor led German authorities to foil a possible attack against a major sporting event in the country after a couple purchased an unusually large amount of hydrogen peroxide. German authorities later discovered the couple presented fraudulent credentials and were associated with the local violent extremist community in Germany.

» (U//FOUO) The FBI arrested Saudi national Khalid Aldawsari in late February 2011 after he attempted to purchase a highly concentrated phenol solution—a precursor for the explosive trinitrophenol or picric acid—and raised suspicions of a freight company in Texas after the delivery of an unexpected package from a North Carolina chemical company. Aldawsari attempted to bypass the chemical company’s restriction on sending shipments to an individual or a residence, but he did not have permission from the freight company to have the package delivered. Aldawsari was sentenced to life in prison in June 2012 for attempted use of a weapon of mass destruction, according to a January 2014 FBI press release from the US Court of Appeals affirming his conviction.

Go back

Your message has been sent

Warning
Warning
Warning
Warning

Warning.

Terrorism Definition, Terrorism In America, Terrorism Statistics, Terrorism News, Terrorism In Europe, Terrorism Meaning, Terrorism In The United States, Terrorism Facts, Terrorism In France, Terrorism Definition Fbi, Terrorism Articles, Terrorism Around The World, Terrorism And Homeland Security, Terrorism And Political Violence, Terrorism And Social Media, Terrorism Act, Terrorism And The Media, Terrorism And Religion, Terrorism Apush, Terrorism Alert Desk, Terrorism By Religion, Terrorism Before 9\/11, Terrorism Books, Terrorism By Country, Terrorism By Ideology, Terrorism By Race, Terrorism By Religion Statistics, Terrorism Background, Terrorism Before And After 9\/11, Terrorism Britain, Terrorism Current Events, Terrorism Causes, Terrorism Can Be Defined As, Terrorism Charges, Terrorism Coverage, Terrorism Cartoon, Terrorism Clipart, Terrorism Cnn, Terrorism Chart, Terrorism Conference 2017, Terrorism Definition, Terrorism Definition Fbi, Terrorism Def, Terrorism Deaths Per Year, Terrorism Database, Terrorism Defined, Terrorism Documentary, Terrorism Deaths In Us, Terrorism During Ramadan, Terrorism Definition Quizlet, Terrorism Examples, Terrorism Europe, Terrorism Essay, Terrorism Events, Terrorism Effects, Terrorism Etymology, Terrorism England, Terrorism Expert, Terrorism East Africa, Terrorism Explained, Terrorism Facts, Terrorism France, Terrorism Financing, Terrorism Fbi Definition, Terrorism Fbi, Terrorism Facts 2016, Terrorism Foreign Policy, Terrorism Fear, Terrorism Fox News, Terrorism From Above, Terrorist Groups, Terrorism Graph, Terrorism Germany, Terrorism Global Issue, Terrorism Greece, Terrorism Government Definition, Terrorism Globalization, Terrorism Great Britain, Terrorism Government, Terrorism Goal, Terrorism History, Terrorism Has No Religion, Terrorism Has Increased Job Opportunities In The, Terrorism Hotline, Terrorism Headlines, Terrorism Hot Spots, Terrorism Homeland Security, Terrorism How The West Can Win, Terrorism How To Respond, Terrorism Hate Crime, Terrorism In America, Terrorism In Europe, Terrorism In The United States, Terrorism In France, Terrorism In Russia, Terrorism In Africa, Terrorism In Japan, Terrorism In The Middle East, Terrorism In China, Terrorism In Italy, Terrorist Jokes, Terrorism Japan, Terrorism Journals, Terrorism Justified, Terrorism Jobs, Terrorism Jordan, Terrorism Justification, Terrorism Journal Articles, Terrorism June 2017, Terrorism Jihad And The Bible, Terrorism Knowledge Base, Terrorism Kenya, Terrorism Kkk, Terrorism Kidnapping And Hostage Taking, Terrorism Kyrgyzstan, Terrorism Kashmir, Terrorism Kidnapping, Terrorism Kuwait, Terrorist Keywords, Terrorism Quran, Terrorism London, Terrorism Legal Definition, Terrorism Liaison Officer, Terrorism Laws, Terrorism Lesson Plans, Terrorism List, Terrorism London 2017, Terrorism Law Definition, Terrorism Logo, Terrorism Levels, Terrorism Meaning, Terrorism Movies, Terrorism Map, Terrorist Meme, Terrorism Middle East, Terrorism Morocco, Terrorism Media, Terrorism Mental Illness, Terrorism Manchester, Terrorist Meaning, Terrorism News, Terrorism Nyc, Terrorism New York Times, Terrorism Now, Terrorism Nigeria, Terrorism Netherlands, Terrorism North Korea, Terrorism Norway, Terrorism Numbers, Terrorism Notes, Terrorism Origin, Terrorism On The Rise, Terrorism Over Time, Terrorism On Social Media, Terrorism On Us Soil, Terrorism On The Internet, Terrorism Original Definition, Terrorism Over The Years, Terrorism Objectives, Terrorism Online, Terrorism Prevention, Terrorism Political Cartoons, Terrorism Pictures, Terrorism Philippines, Terrorism Powerpoint, Terrorism Problems, Terrorism Psychology, Terrorism Policy, Terrorist Propaganda, Terrorism Prevention Act 2015, Terrorism Quotes, Terrorism Quizlet, Terrorism Questions, Terrorism Quiz, Terrorism Quran, Terrorism Qatar, Terrorism Quick Facts, Terrorism Quiz Questions, Terrorism Quotes Goodreads, Terrorism Qualifications, Terrorism Risk Insurance Act, Terrorism Refers To, Terrorism Research, Terrorism Research Paper, Terrorism Research Center, Terrorism Risk Insurance Program, Terrorism Rates, Terrorism Report, Terrorism Religion, Terrorism Russia, Terrorism Statistics, Terrorism Synonyms, Terrorism Statistics 2016, Terrorism Solutions, Terrorism Studies, Terrorism Statistics Us, Terrorism Since 9\/11, Terrorism Statistics 2017, Terrorism Sentence, Terrorism Spain, Terrorism Today, Terrorism Timeline, Terrorism Threat Levels, Terrorism Topics, Terrorism Task Force, Terrorism Types, Terrorism Threats, Terrorism Tracker, Terrorism Tactics, Terrorism Trends, Terrorism United States, Terrorism Uk, Terrorism Us Definition, Terrorism Us Code, Terrorism United Kingdom, Terrorism Un, Terrorism Unit, Terrorism Un Definition, Terrorism Us Statistics, Terrorism Us Law, Terrorism Video, Terrorism Vs War, Terrorism Vocabulary, Terrorism Vs Gun Violence, Terrorist Videos, Terrorism Victims, Terrorism Vs Freedom Fighter, Terrorism Violence, Terrorism Victims Fund, Terrorism Vs Extremism, Terrorism Wikipedia, Terrorism Worksheet, Terrorism Webquest, Terrorism Worldwide, Terrorism Webster, Terrorism War, Terrorist Watch List, Terrorism War And Bush, Terrorism Will Never End, Terrorism Warning, Terrorism Xinjiang, Terrorism Poll, Terrorism Xtc, Terrorism Xtc Lyrics, Xenophobia Terrorism, Xl Terrorism Insurance, Xkcd Terrorism, Xinjiang Terrorism, Xian Terrorism, Xinjiang Terrorism China, Terrorism Youtube, Terrorism Yesterday, Terrorism Yemen, Terrorist Yell, Terrorist Youtube, Terrorist Yelling Allahu Akbar, Terrorist Yee, Terrorist Your Game Is Through, Terrorist Yelling Allahu Akbar And Explodes, Terrorist Yahoo Answers, Terrorism Zimbabwe, Terrorism Zambia, Terrorism Zones Pool Re, Terrorism Zanzibar, Terrorism Zones Insurance, Terrorism Zeitgeist, Terrorism Zurich, Terrorism Zealots, Terrorism Zone C, Terrorism Zinn, Terrorism Definition, Terrorism In America, Terrorism Statistics, Terrorism News, Terrorism In Europe, Terrorism Meaning, Terrorism In The United States, Terrorism Facts, Terrorism In France, Terrorism Definition Fbi, Terrorism Articles, Terrorism Around The World, Terrorism And Homeland Security, Terrorism And Political Violence, Terrorism And Social Media, Terrorism Act, Terrorism And The Media, Terrorism And Religion, Terrorism Apush, Terrorism Alert Desk, Terrorism By Religion, Terrorism Before 9\/11, Terrorism Books, Terrorism By Country, Terrorism By Ideology, Terrorism By Race, Terrorism By Religion Statistics, Terrorism Background, Terrorism Before And After 9\/11, Terrorism Britain, Terrorism Current Events, Terrorism Causes, Terrorism Can Be Defined As, Terrorism Charges, Terrorism Coverage, Terrorism Cartoon, Terrorism Clipart, Terrorism Cnn, Terrorism Chart, Terrorism Conference 2017, Terrorism Definition, Terrorism Definition Fbi, Terrorism Def, Terrorism Deaths Per Year, Terrorism Database, Terrorism Defined, Terrorism Documentary, Terrorism Deaths In Us, Terrorism During Ramadan, Terrorism Definition Quizlet, Terrorism Examples, Terrorism Europe, Terrorism Essay, Terrorism Events, Terrorism Effects, Terrorism Etymology, Terrorism England, Terrorism Expert, Terrorism East Africa, Terrorism Explained, Terrorism Facts, Terrorism France, Terrorism Financing, Terrorism Fbi Definition, Terrorism Fbi, Terrorism Facts 2016, Terrorism Foreign Policy, Terrorism Fear, Terrorism Fox News, Terrorism From Above, Terrorist Groups, Terrorism Graph, Terrorism Germany, Terrorism Global Issue, Terrorism Greece, Terrorism Government Definition, Terrorism Globalization, Terrorism Great Britain, Terrorism Government, Terrorism Goal, Terrorism History, Terrorism Has No Religion, Terrorism Has Increased Job Opportunities In The, Terrorism Hotline, Terrorism Headlines, Terrorism Hot Spots, Terrorism Homeland Security, Terrorism How The West Can Win, Terrorism How To Respond, Terrorism Hate Crime, Terrorism In America, Terrorism In Europe, Terrorism In The United States, Terrorism In France, Terrorism In Russia, Terrorism In Africa, Terrorism In Japan, Terrorism In The Middle East, Terrorism In China, Terrorism In Italy, Terrorist Jokes, Terrorism Japan, Terrorism Journals, Terrorism Justified, Terrorism Jobs, Terrorism Jordan, Terrorism Justification, Terrorism Journal Articles, Terrorism June 2017, Terrorism Jihad And The Bible, Terrorism Knowledge Base, Terrorism Kenya, Terrorism Kkk, Terrorism Kidnapping And Hostage Taking, Terrorism Kyrgyzstan, Terrorism Kashmir, Terrorism Kidnapping, Terrorism Kuwait, Terrorist Keywords, Terrorism Quran, Terrorism London, Terrorism Legal Definition, Terrorism Liaison Officer, Terrorism Laws, Terrorism Lesson Plans, Terrorism List, Terrorism London 2017, Terrorism Law Definition, Terrorism Logo, Terrorism Levels, Terrorism Meaning, Terrorism Movies, Terrorism Map, Terrorist Meme, Terrorism Middle East, Terrorism Morocco, Terrorism Media, Terrorism Mental Illness, Terrorism Manchester, Terrorist Meaning, Terrorism News, Terrorism Nyc, Terrorism New York Times, Terrorism Now, Terrorism Nigeria, Terrorism Netherlands, Terrorism North Korea, Terrorism Norway, Terrorism Numbers, Terrorism Notes, Terrorism Origin, Terrorism On The Rise, Terrorism Over Time, Terrorism On Social Media, Terrorism On Us Soil, Terrorism On The Internet, Terrorism Original Definition, Terrorism Over The Years, Terrorism Objectives, Terrorism Online, Terrorism Prevention, Terrorism Political Cartoons, Terrorism Pictures, Terrorism Philippines, Terrorism Powerpoint, Terrorism Problems, Terrorism Psychology, Terrorism Policy, Terrorist Propaganda, Terrorism Prevention Act 2015, Terrorism Quotes, Terrorism Quizlet, Terrorism Questions, Terrorism Quiz, Terrorism Quran, Terrorism Qatar, Terrorism Quick Facts, Terrorism Quiz Questions, Terrorism Quotes Goodreads, Terrorism Qualifications, Terrorism Risk Insurance Act, Terrorism Refers To, Terrorism Research, Terrorism Research Paper, Terrorism Research Center, Terrorism Risk Insurance Program, Terrorism Rates, Terrorism Report, Terrorism Religion, Terrorism Russia, Terrorism Statistics, Terrorism Synonyms, Terrorism Statistics 2016, Terrorism Solutions, Terrorism Studies, Terrorism Statistics Us, Terrorism Since 9\/11, Terrorism Statistics 2017, Terrorism Sentence, Terrorism Spain, Terrorism Today, Terrorism Timeline, Terrorism Threat Levels, Terrorism Topics, Terrorism Task Force, Terrorism Types, Terrorism Threats, Terrorism Tracker, Terrorism Tactics, Terrorism Trends, Terrorism United States, Terrorism Uk, Terrorism Us Definition, Terrorism Us Code, Terrorism United Kingdom, Terrorism Un, Terrorism Unit, Terrorism Un Definition, Terrorism Us Statistics, Terrorism Us Law, Terrorism Video, Terrorism Vs War, Terrorism Vocabulary, Terrorism Vs Gun Violence, Terrorist Videos, Terrorism Victims, Terrorism Vs Freedom Fighter, Terrorism Violence, Terrorism Victims Fund, Terrorism Vs Extremism, Terrorism Wikipedia, Terrorism Worksheet, Terrorism Webquest, Terrorism Worldwide, Terrorism Webster, Terrorism War, Terrorist Watch List, Terrorism War And Bush, Terrorism Will Never End, Terrorism Warning, Terrorism Xinjiang, Terrorism Poll, Terrorism Xtc, Terrorism Xtc Lyrics, Xenophobia Terrorism, Xl Terrorism Insurance, Xkcd Terrorism, Xinjiang Terrorism, Xian Terrorism, Xinjiang Terrorism China, Terrorism Youtube, Terrorism Yesterday, Terrorism Yemen, Terrorist Yell, Terrorist Youtube, Terrorist Yelling Allahu Akbar, Terrorist Yee, Terrorist Your Game Is Through, Terrorist Yelling Allahu Akbar And Explodes, Terrorist Yahoo Answers, Terrorism Zimbabwe, Terrorism Zambia, Terrorism Zones Pool Re, Terrorism Zanzibar, Terrorism Zones Insurance, Terrorism Zeitgeist, Terrorism Zurich, Terrorism Zealots, Terrorism Zone C, Terrorism Zinn, Dhs Office, Dhs Michigan, Dhs Phone Number, Dhs Link, Dhs Live, Dhs Near Me, Dhs To Usd, Dhs Office Locator, Dhs Skokie, Dhs Child Care, Dhs Application, Dhs Adrian Mi, Dhs Assistance, Dhs Authorization, Dhs Application Online, Dhs Address, Dhs Apply Online, Dhs Allegan Mi, Dhs Ann Arbor, Dhs Apply, Dhs Battle Creek Mi, Dhs Bay City Mi, Dhs Billing, Dhs Building, Dhs Bridge Card, Dhs Benefits, Dhs Battle Creek Michigan, Dhs Big Rapids, Dhs Baldwin Mi, Dhs Background Check Michigan, Dhs Child Care, Dhs Clearance, Dhs Champs, Dhs Child Care Provider, Dhs Caseworker Lookup, Dhs Clio Rd, Dhs Caro Mi, Dhs Clio Road, Dhs Customer Service, Dhs Conner, Dhs Detroit, Dhs Daycare, Dhs Dearborn, Dhs Diecast, Dhs Directory, Dhs Department, Dhs Daycare Help, Dhs Disability, Dhs Dental, Dhs Definition, Dhs Emergency, Mdhhs Ems, Dhs Employment Verification Form, Mdhhs Email, Dhs Emergency Services, Dhs Email Address, Mdhhs Employee Directory, Dhs Equipment, Dhs Employment, Dhs Ebt, Dhs Flint Mi, Dhs Food Stamps, Dhs Flint, Dhs Forms, Dhs Fax Number, Dhs Fast, Dhs Food Assistance, Dhs Form 3200, Dhs Flint Michigan Clio Road, Dhs Form 3503, Dhs Greydale, Dhs Grand Rapids, Dhs Grand River Warren, Dhs Genesee County, Dhs Gladwin Mi, Dhs Greenfield, Dhs Gratiot 7 Mile, Dhs Gr Mi, Dhs Greenfield Joy, Dhs Gaylord Mi, Dhs Hours, Dhs Howell Mi, Dhs Holland Mi, Dhs Hillsdale Mi, Dhs Hartford Mi, Dhs Harrison Mi, Dhs Holland, Dhs Hastings Mi, Dhs Hart Mi, Dhs Home Health Care, Dhs Inkster, Dhs Ib Bio, Dhs In Pontiac Mi, Dhs Ibilling, Dhs In Lansing, Dhs In Detroit, Dhs In Redford Mi, Dhs In Michigan, Dhs In Taylor, Dhs Illinois, Dhs Jobs, Dhs Jackson Mi, Dhs Jobs In Michigan, Dhs Joy Road And Greenfield, Dhs Joy Rd, Dhs Joy, Dhs Job Opportunities, Dhs Jobs Mi, Dhs Job Openings, Dhs Jay Ok, Dhs Kalamazoo Mi, Dhs Kent County, Dhs Kalkaska, Dhs Kelly, Dhs Kalamazoo Login, Dhs Key Club, Dhs Klamath Falls Oregon, Dhs Knoxville, Dhs Kansas, Dhs Kentucky, Dhs Login, Dhs Lansing Mi, Dhs Lapeer Mi, Dhs Lansing Michigan, Dhs Locations, Dhs Lappin, Dhs Live, Dhs Logo, Dhs Lappin And Gratiot, Dhs Lansing Fax Number, Dhs Michigan, Dhs Management, Dhs Monroe Mi, Dhs Macomb, Dhs Medicaid, Dhs Muskegon Mi, Dhs Midland Mi, Dhs Main Office, Dhs Mt Clemens, Dhs Monroe Michigan, Dhs Near Me, Dhs Number, Dhs Number Lansing Mi, Dhs Novi Mi, Dhs Number On Lappin, Dhs News, Dhs New Hire Form, Dhs Novi, Dhs Near Me Hours, Dhs Nhs, Dhs Office, Dhs Oakland County, Dhs Office Detroit, Dhs Oregon, Dhs Okc, Dhs Online, Dhs Office Pontiac Mi, Dhs Office On Conners, Dhs Office On Lappin, Dhs Office On Plymouth, Dhs Phone Number, Dhs Pontiac, Dhs Port Huron Mi, Dhs Port Huron Michigan, Dhs Provider Login, Dhs Provider Payment Schedule 2017, Dhs Payment Dates 2017, Dhs Plymouth, Dhs Provider, Dhs Police, Dhs Questions, Dhs Questionnaire, Dhs Quincy Illinois, Dhs Quote, Dhs Questions And Answers, Dhs Qmb Program, Dhs Qhsr, Dhs Questionnaire Pdf, Dhs Quarterly Reports, Dhs Quincy, Dhs Rent Assistance, Dhs Redford, Dhs Royal Oak, Dhs Redetermination Application Michigan, Dhs Rochester Hills Mi, Dhs Ri, Dhs Reed City Mi, Dhs Royal Oak Mi, Dhs Rogers City Mi, Dhs Redetermination Form Medical, Dhs Sign In, Dhs Shampoo, Dhs Sandusky Mi, Dhs Ser, Dhs Saginaw Mi, Dhs Stanton Mi, Dhs Secretary, Dhs Services, Dhs Sterling Heights, Dhs Southfield Mi, Dhs Taylor Mi, Dhs To Usd, Mdhhs Training, Mdhhs Taylor, Dhs Traverse City, Dhs Twitter, Dhs Trip, Mdhhs Tb, Mdhhs Twitter, Mdhhs Third Party Liability, Dhs Union St, Dhs Unemployment, Dhs Unearned Income Notice, Dhs Uscis, Dhs Usa, Dhs Uscis Login, Dhs Uniform, Dhs Utah, Dhs Utility Assistance Michigan, Dhs Uscis Genealogy, Dhs Van Buren, Dhs Verification Of Assets, Dhs Van Dyke, Dhs Verification In Process, Dhs Vinelink, Dhs Verification Of Employment, Dhs Vine, Dhs Voice, Dhs Virginia, Dhs Va 20598, Dhs Website, Dhs Warren, Dhs Washtenaw County, Dhs Wayne County, Dhs Worker, Dhs Warren And Conner, Dhs Warren And Grand River, Dhs Wayne County Mi, Dhs Wayne County Number, Dhs Wic, Dhs X6006, Dhs Xc, Dhs X4002, Dhs X6002, Dhs X3002, Dhs X6007, Dhs X6006 Review, Dhs X Ray, Dhs X3002 Review, Dhs X5002, Dhs Ypsilanti Mi Hours, Dhs Ypsilanti Michigan, Dhs Ypsi, Dhs Ypsilanti, Dhs Ypsilanti Mi, Dhs Ypsilanti Hours, Dhs Yearbook, Dhs Yellville Ar, Dhs Youtube, Dhs Ypsilanti Mi Phone Number, Dhs Zinc Shampoo, Dhs Zinc Shampoo Walgreens, Dhs Zinc, Dhs Zinc Shampoo 16 Oz, Dhs Zinc Shampoo Target, Dhs Zinc Shampoo Cvs, Dhs Zinc Shampoo Review, Dhs Zip Code, Dhs Zambia, Dhs Zinc Body Wash, Fbi Most Wanted, Fbi Jobs, Fbi Director, Fbi Salary, Fbi Agent, Fbi Background Check, Fbi Agent Salary, Fbi Headquarters, Fbi Special Agent, Fbi Internships, Fbi Agent, Fbi Agent Salary, Fbi Academy, Fbi Application, Fbi Analyst, Fbi Atlanta, Fbi Agent Jobs, Fbi Anon, Fbi Address, Fbi Arrests, Fbi Background Check, Fbi Badge, Fbi Bau, Fbi Building, Fbi Boston, Fbi Bap, Fbi Baltimore, Fbi Benefits, Fbi Budget, Fbi Building Dc, Fbi Careers, Fbi Crime Statistics, Fbi Clearance, Fbi Criminal Background Check, Fbi Chicago, Fbi Citizens Academy, Fbi Crime Statistics By Race, Fbi Contact, Fbi Channeler, Fbi Candidates, Fbi Director, Fbi Director Candidates, Fbi Director James Comey, Fbi Definition, Fbi Director Fired, Fbi Director Salary, Fbi Definition Of Terrorism, Fbi Database, Fbi Dallas, Fbi Drug Policy, Fbi Employment, Fbi Email Address, Fbi Employment Drug Policy, Fbi El Paso, Fbi Employees, Fbi Emblem, Fbi Established, Fbi Education Center, Fbi Education, Fbi Executive Branch, Fbi Fingerprinting, Fbi Files, Fbi Field Offices, Fbi Fingerprint Card, Fbi Fitness Test, Fbi Facebook, Fbi Fingerprint Check, Fbi Forensic Accountant, Fbi Foia, Fbi Founder, Fbi Glock, Fbi Games, Fbi Gov, Fbi Glassdoor, Fbi Guns, Fbi Gang List, Fbi Gun Statistics, Fbi Gif, Fbi Gift Shop, Fbi General Counsel, Fbi Headquarters, Fbi Hrt, Fbi History, Fbi Houston, Fbi Hiring, Fbi Hate Crime Statistics, Fbi Head, Fbi Hat, Fbi Honors Internship, Fbi Hotline, Fbi Internships, Fbi Investigation, Fbi Intelligence Analyst, Fbi Informant, Fbi Irt, Fbi Investigation Trump, Fbi Ic3, Fbi Infragard, Fbi Internet Fraud, Fbi Id, Fbi Jobs, Fbi Jacket, Fbi James Comey, Fbi Jurisdiction, Fbi Job Description, Fbi Jobs Apply, Fbi Jacksonville, Fbi Jade Helm, Fbi Jobs Chicago, Fbi Jackson Ms, Fbi Kansas City, Fbi Kids, Fbi Knoxville, Fbi Kidnapping, Fbi Komi, Fbi Kentucky, Fbi Killed Jfk, Fbi Kkk, Fbi Kodi, Fbi K9 Unit, Fbi Logo, Fbi Leeda, Fbi Los Angeles, Fbi Locations, Fbi Las Vegas, Fbi Leaks, Fbi Leader, Fbi Linguist, Fbi Louisville, Fbi Login, Fbi Most Wanted, Fbi Most Wanted List, Fbi Meaning, Fbi Meme, Fbi Movies, Fbi Museum, Fbi Motto, Fbi Miami, Fbi Mission Statement, Fbi Most Dangerous Cities, Fbi Number, Fbi News, Fbi National Academy, Fbi Nics, Fbi New York, Fbi New Orleans, Fbi Newark, Fbi New York Tv Show, Fbi Near Me, Fbi Nominee, Fbi Offices, Fbi Org Chart, Fbi Omaha, Fbi Operative, Fbi On Trump, Fbi Organizational Chart, Fbi Obama Meme, Fbi Obama, Fbi Oklahoma City, Fbi Office Near Me, Fbi Phone Number, Fbi Profiler, Fbi Pft, Fbi Police, Fbi Pay Scale, Fbi Phoenix, Fbi Pay, Fbi Philadelphia, Fbi Positions, Fbi Pittsburgh, Fbi Quantico, Fbi Qualifications, Fbi Q Target, Fbi Quotes, Fbi Quiz, Fbi Questions, Fbi Qr Code, Fbi Qas, Fbi Quantico Address, Fbi Quantico Tours, Fbi Requirements, Fbi Russia, Fbi Russia Investigation, Fbi Report, Fbi Ranks, Fbi Recruiting, Fbi Raid, Fbi Records, Fbi Rape Statistics, Fbi Russia Trump, Fbi Salary, Fbi Special Agent, Fbi Stands For, Fbi Swat, Fbi Special Agent Salary, Fbi Surveillance, Fbi Statistics, Fbi Sos, Fbi Surveillance Van, Fbi Seal, Fbi Training, Fbi Top Ten, Fbi Trump, Fbi Trump Russia, Fbi Tip Line, Fbi Tv Shows, Fbi Twitter, Fbi Tips, Fbi Teen Academy, Fbi Tours, Fbi Ucr, Fbi Ucr 2016, Fbi Units, Fbi Ucr 2015, Fbi Undercover, Fbi Unsolved Cases, Fbi Upin, Fbi Utah, Fbi Usa, Fbi Uniforms, Fbi Vs Cia, Fbi Vault, Fbi Virus, Fbi Vs Apple, Fbi Virtual Academy, Fbi Vehicles, Fbi Violent Crime Statistics, Fbi Virginia, Fbi Van, Fbi Van Wifi, Fbi Website, Fbi Warning, Fbi Wiki, Fbi Wanted List, Fbi Watch List, Fbi Windbreaker, Fbi Warning Screen, Fbi White Collar Crime, Fbi Warrant Search, Fbi Weapons, Fbi X Files, Fbi Xl2, Fbi Xl31, Fbi Xl4, Fbi Xl2 Programming, Fbi Xl-31 Troubleshooting, Fbi Xl 31 Installation Manual, Fbi X Files Real, Fbi Xl2t Installation Manual, Fbi Xl 1215, Fbi Yearly Salary, Fbi Youtube, Fbi Youth Academy, Fbi Youth Leadership Academy, Fbi Yellow Brick Road, Fbi Youth Programs, Fbi Yearly Budget, Fbi Youth Leadership Academy Portland, Fbi Youngstown Ohio, Fbi Yearly Income, Fbi Zodiac Killer, Fbi Zodiac, Fbi Zip Code, Fbi Zodiac Killer List, Fbi Zero Files, Fbi Zodiac List, Fbi Zodiac Signs Killer, Fbi Zhang Yingying, Fbi Zion, Fbi Zodiac Crimes, Isis News, Isis Flag, Isis Thrown Off Cliff, Isis Goddess, Isis Definition, Isis Attack, Isis Uf, Isis Memes, Isis Map, Isis Website, Isis Attack, Isis Aspen, Isis And Osiris, Isis Archer, Isis Acronym, Isis Attacks In Us, Isis Asheville, Isis Antm, Isis Afghanistan, Isis Atrocities, Isis Band, Isis Bombing, Isis Build, Isis Beliefs, Isis Button, Isis Brown Sugar, Isis Books, Isis Being Killed, Isis Behind The Mask, Isis Best Gore, Isis Control Map, Isis Capital, Isis Chemical Weapons, Isis Caliphate, Isis Chan, Isis Cartoon, Isis Controlled Territory, Isis Candy Tomato, Isis Cnn, Isis Collection, Isis Definition, Isis Defeated, Isis Drones, Isis Documentary, Isis Death Toll, Isis Dead, Isis Deaths, Isis Daesh, Isis Drone Video, Isis Dc, Isis Egypt, Isis Explained, Isis Edc, Isis Europe, Isis Events, Isis Exhaust, Isis Enemies, Isis Excussion, Isis Exchange, Isis England, Isis Flag, Isis Fighters Killed, Isis Fighters Thrown Off Cliff, Isis Facts, Isis Fighters, Isis Fighters Executed, Isis Fails, Isis Funding, Isis Founder, Isis Flag For Sale, Isis Goddess, Isis Gallardo, Isis Goals, Isis Genocide, Isis Getting Shot, Isis Goat Meme, Isis Group, Isis Getting Bombed, Isis Goat, Isis Gif, Isis Harambe, Isis History, Isis Hair, Isis Hit List, Isis Heavy, Isis Hunting Permit, Isis Hostages, Isis Hunting, Isis Hand Sign, Isis Horus, Isis In Syria, Isis Iowa, Isis In The Philippines, Isis Iraq, Isis In Afghanistan, Isis In America, Isis Israel, Isis Ideology, Isis In Libya, Isis In Mosul, Isis Jokes, Isis Jhu, Isis Jv Team, Isis Jones, Isis Journal, Isis Jordan, Isis Jihad, Isis Japan, Isis John, Isis Joust Build, Isis King, Isis K, Isis Kids, Isis Kidnapping, Isis Knot, Isis Keyshia Wig, Isis Kurds, Isis Kneading, Isis Ksu, Isis King Engaged, Isis Leader, Isis Live Map, Isis Logo, Isis Leader Dead, Isis Location, Isis Las Vegas, Isis Losing, Isis Libya, Isis Lyrics, Isis Leadership, Isis Meaning, Isis Memes, Isis Map, Isis Mosul, Isis Magazine, Isis Music, Isis Members, Isis Mythology, Isis Marawi, Isis Music Hall, Isis News, Isis Name Meaning, Isis Name, Isis Numbers, Isis Net Worth, Isis News Mosul, Isis News Today, Isis National Anthem, Isis Nitric Acid Video, Isis New York, Isis Or Isil, Isis Origin, Isis Oasis, Isis Osiris, Isis Oil, Isis Oceanic, Isis Oracle, Isis On Twitter, Isis Osiris Horus, Isis Ohsu, Isis Propaganda, Isis Papers, Isis Pharmaceuticals, Isis Philippines, Isis Persona 5, Isis Pictures, Isis Phone Number, Isis Population, Isis Pizza, Isis Paris Attack, Isis Quotes, Isis Queen, Isis Quizlet, Isis Quran, Isis Questions, Isis Quartz, Isis Qaraqosh, Isis Quick Facts, Isis Qatar, Isis Quotes To America, Isis Religion, Isis Recruitment, Isis Recruitment Video, Isis Raqqa, Isis Romero, Isis Rea Boykin, Isis Russia, Isis Ramadan, Isis Reddit, Isis Recent Attacks, Isis Stands For, Isis Syria, Isis Symbol, Isis Song, Isis Sunni, Isis Social Media, Isis Shotgun, Isis Soldiers, Isis Smite, Isis Stronghold, Isis Thrown Off Cliff, Isis Territory, Isis Thrown Off Building Video, Isis Twitter, Isis Tv Show, Isis Theme Song, Isis Terrorist Attacks, Isis Torture, Isis Terrorist, Isis The Goddess, Isis Uf, Isis Uiowa, Isis Unveiled, Isis Uark, Isis Update, Isis Uk, Isis Using Drones, Isis Us, Isis Uniforms, Isis Urban Dictionary, Isis Vs Isil, Isis Valverde, Isis Victims, Isis Vs Usa, Isis Vegas, Isis Vs Taliban, Isis Vasconcellos, Isis Vs Kkk, Isis Vehicles, Isis Violence, Isis Website, Isis Wiki, Isis Wigs, Isis War, Isis Wings, Isis Women, Isis Wallet, Isis Weapons, Isis Waswas, Isis Wenger, Isis X Clan, Isis Xinjiang, Isis Xl, Isis Xpad, Isis X Rite, Isis Xinjiang China, Isis Xenophobia, Isis Xbox, Isis Youtube, Isis Yemen, Isis Yazidi, Isis Yugioh, Isis Youtube Channel, Isis Young, Isis Youth, Isis Youtube Ads, Isis Year Founded, Isis Y Osiris, Isis Zionist Plot, Isis Zoo, Isis Zion, Isis Zodiac, Isis Zone Of Control, Isis Zakat, Isis Zerocensorship, Isis Zodiac Sign, Isis Zarai Sandoval, Isis Zims, https://berndpulch.org/category/eev/

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, FBI, PUBLIC INTELLIGENCE, TERRORISM April 27, 2016June 28, 2021 18 Minutes

FBI -Smart Farming May Increase Cyber Targeting Against US Food and Agriculture Sector

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Smart Farming May Increase Cyber Targeting Against US Food and Agriculture Sector

Page Count: 6 pages
Date: March 31, 2016
Restriction: TLP: GREEN
Originating Organization: Federal Bureau of Investigation, Cyber Division
File Type: pdf
File Size: 599,637 bytes
File Hash (SHA-256): BDC6AA25944381AF11E981EE3677FE52825806DA3C0C02F7FB6C262AB1CA5916

Download File

The FBI and the US Department of Agriculture (USDA) assess the Food and Agriculture (FA) Sector is increasingly vulnerable to cyber attacks as farmers become more reliant on digitized data. While precision agriculture technology (a.k.a. smart farming)a reduces farming costs and increases crop yields, farmers need to be aware of and understand the associated cyber risks to their data and ensure that companies entrusted to manage their data, including digital management tool and application developers and cloud service providers, develop adequate cybersecurity and breach response plans.

Threat

The FBI and USDA assess the farming industry’s growing adoption of precision agriculture technology may increase cyber targeting activity against the FA Sector with the intent to steal farm-level data in bulk. A recent example of government-authorized big data analytics demonstrates the value of aggregating farm-level data to track and even anticipate crop availability and pricing. Similarly, criminals could aggregate stolen data or steal analyzed data to exploit US agriculture resources and market trends.

The Wall Street Journal in March 2014 reported concerns that the FA Sector will face increased cyber targeting with the growing adoption of equipment and services that collect and analyze farm-level data, including information about soil content and past crop yields as well as planting recommendations (i.e., precision agriculture).

On 27 January 2016, the USDA announced the winners of a contest in which Microsoft hosted a century of public climate and crop data for competitors worldwide to design data visualization tools for farmers. For example, the winning tool allows users to follow trends in local crop availability and prices. The intent of the contest was to explore how to render big data in agriculture into a tool that allows farmers to make sustainable decisions that have an impact on food supply.

Other Potential Cyber Risks to Farm-Level Data

In addition to theft, farm-level data may also be vulnerable to ransomware and data destruction. Ransomware has become a significant threat to US businesses and individuals. Perpetrators use ransomware to encrypt a user’s important files, rendering them unreadable until a ransom is paid. Hacktivists may also destroy data to protest, for example, the use of genetically-modified organisms (GMOs) or pesticides.

The single most important protection measure against these threats is to implement a robust data back-up and recovery plan. Back-ups should be maintained in a separate and secure location so that malicious actors cannot readily access them from local networks.

…

Lessons from the Healthcare and Public Health (HPH) Sector

In October 2014, the US Food and Drug Administration (FDA) sponsored a public workshop to discuss the cybersecurity challenges facing the HPH Sector. With regard to medical device manufacturing, expert panelists discussed how hospitals’ financial constraints and focus on patient safety and convenience have resulted in the improper use of legacy devices and a high demand for user-friendly, interoperable devices. This industry pressure has resulted in manufacturers prioritizing usability over security, thereby rendering connected hospital networks vulnerable to cyber attacks. Panelists discussed how industry leaders’ procurement demands—or “market pressures”—for manufacturers to prioritize device cybersecurity very likely are the key to ensuring cybersecurity standards are raised for medical devices overall.

Source: Capital Reporting Company; “Public Workshop: Collaborative Approaches for Medical Device and Healthcare Cybersecurity; Tuesday, October 21, 2014”; 15 December 2014; http://www.fda.gov/downloads/MedicalDevices/NewsEvents/WorkshopsConferences/UCM426854.pdf; accessed on 9 March 2016; Transcript for the first day of the FDA-sponsored public workshop on medical device and healthcare cybersecurity.

Go back

Your message has been sent

Warning
Warning
Warning
Warning

Warning.

Fbi Most Wanted, Fbi Jobs, Fbi Director, Fbi Salary, Fbi Agent, Fbi Background Check, Fbi Agent Salary, Fbi Headquarters, Fbi Special Agent, Fbi Internships, Fbi Agent, Fbi Agent Salary, Fbi Academy, Fbi Application, Fbi Analyst, Fbi Atlanta, Fbi Agent Jobs, Fbi Anon, Fbi Address, Fbi Arrests, Fbi Background Check, Fbi Badge, Fbi Bau, Fbi Building, Fbi Boston, Fbi Bap, Fbi Baltimore, Fbi Benefits, Fbi Budget, Fbi Building Dc, Fbi Careers, Fbi Crime Statistics, Fbi Clearance, Fbi Criminal Background Check, Fbi Chicago, Fbi Citizens Academy, Fbi Crime Statistics By Race, Fbi Contact, Fbi Channeler, Fbi Candidates, Fbi Director, Fbi Director Candidates, Fbi Director James Comey, Fbi Definition, Fbi Director Fired, Fbi Director Salary, Fbi Definition Of Terrorism, Fbi Database, Fbi Dallas, Fbi Drug Policy, Fbi Employment, Fbi Email Address, Fbi Employment Drug Policy, Fbi El Paso, Fbi Employees, Fbi Emblem, Fbi Established, Fbi Education Center, Fbi Education, Fbi Executive Branch, Fbi Fingerprinting, Fbi Files, Fbi Field Offices, Fbi Fingerprint Card, Fbi Fitness Test, Fbi Facebook, Fbi Fingerprint Check, Fbi Forensic Accountant, Fbi Foia, Fbi Founder, Fbi Glock, Fbi Games, Fbi Gov, Fbi Glassdoor, Fbi Guns, Fbi Gang List, Fbi Gun Statistics, Fbi Gif, Fbi Gift Shop, Fbi General Counsel, Fbi Headquarters, Fbi Hrt, Fbi History, Fbi Houston, Fbi Hiring, Fbi Hate Crime Statistics, Fbi Head, Fbi Hat, Fbi Honors Internship, Fbi Hotline, Fbi Internships, Fbi Investigation, Fbi Intelligence Analyst, Fbi Informant, Fbi Irt, Fbi Investigation Trump, Fbi Ic3, Fbi Infragard, Fbi Internet Fraud, Fbi Id, Fbi Jobs, Fbi Jacket, Fbi James Comey, Fbi Jurisdiction, Fbi Job Description, Fbi Jobs Apply, Fbi Jacksonville, Fbi Jade Helm, Fbi Jobs Chicago, Fbi Jackson Ms, Fbi Kansas City, Fbi Kids, Fbi Knoxville, Fbi Kidnapping, Fbi Komi, Fbi Kentucky, Fbi Killed Jfk, Fbi Kkk, Fbi Kodi, Fbi K9 Unit, Fbi Logo, Fbi Leeda, Fbi Los Angeles, Fbi Locations, Fbi Las Vegas, Fbi Leaks, Fbi Leader, Fbi Linguist, Fbi Louisville, Fbi Login, Fbi Most Wanted, Fbi Most Wanted List, Fbi Meaning, Fbi Meme, Fbi Movies, Fbi Museum, Fbi Motto, Fbi Miami, Fbi Mission Statement, Fbi Most Dangerous Cities, Fbi Number, Fbi News, Fbi National Academy, Fbi Nics, Fbi New York, Fbi New Orleans, Fbi Newark, Fbi New York Tv Show, Fbi Near Me, Fbi Nominee, Fbi Offices, Fbi Org Chart, Fbi Omaha, Fbi Operative, Fbi On Trump, Fbi Organizational Chart, Fbi Obama Meme, Fbi Obama, Fbi Oklahoma City, Fbi Office Near Me, Fbi Phone Number, Fbi Profiler, Fbi Pft, Fbi Police, Fbi Pay Scale, Fbi Phoenix, Fbi Pay, Fbi Philadelphia, Fbi Positions, Fbi Pittsburgh, Fbi Quantico, Fbi Qualifications, Fbi Q Target, Fbi Quotes, Fbi Quiz, Fbi Questions, Fbi Qr Code, Fbi Qas, Fbi Quantico Address, Fbi Quantico Tours, Fbi Requirements, Fbi Russia, Fbi Russia Investigation, Fbi Report, Fbi Ranks, Fbi Recruiting, Fbi Raid, Fbi Records, Fbi Rape Statistics, Fbi Russia Trump, Fbi Salary, Fbi Special Agent, Fbi Stands For, Fbi Swat, Fbi Special Agent Salary, Fbi Surveillance, Fbi Statistics, Fbi Sos, Fbi Surveillance Van, Fbi Seal, Fbi Training, Fbi Top Ten, Fbi Trump, Fbi Trump Russia, Fbi Tip Line, Fbi Tv Shows, Fbi Twitter, Fbi Tips, Fbi Teen Academy, Fbi Tours, Fbi Ucr, Fbi Ucr 2016, Fbi Units, Fbi Ucr 2015, Fbi Undercover, Fbi Unsolved Cases, Fbi Upin, Fbi Utah, Fbi Usa, Fbi Uniforms, Fbi Vs Cia, Fbi Vault, Fbi Virus, Fbi Vs Apple, Fbi Virtual Academy, Fbi Vehicles, Fbi Violent Crime Statistics, Fbi Virginia, Fbi Van, Fbi Van Wifi, Fbi Website, Fbi Warning, Fbi Wiki, Fbi Wanted List, Fbi Watch List, Fbi Windbreaker, Fbi Warning Screen, Fbi White Collar Crime, Fbi Warrant Search, Fbi Weapons, Fbi X Files, Fbi Xl2, Fbi Xl31, Fbi Xl4, Fbi Xl2 Programming, Fbi Xl-31 Troubleshooting, Fbi Xl 31 Installation Manual, Fbi X Files Real, Fbi Xl2t Installation Manual, Fbi Xl 1215, Fbi Yearly Salary, Fbi Youtube, Fbi Youth Academy, Fbi Youth Leadership Academy, Fbi Yellow Brick Road, Fbi Youth Programs, Fbi Yearly Budget, Fbi Youth Leadership Academy Portland, Fbi Youngstown Ohio, Fbi Yearly Income, Fbi Zodiac Killer, Fbi Zodiac, Fbi Zip Code, Fbi Zodiac Killer List, Fbi Zero Files, Fbi Zodiac List, Fbi Zodiac Signs Killer, Fbi Zhang Yingying, Fbi Zion, Fbi Zodiac Crimes, Smart Farming Iot, Smart Farming System, Smart Farming Technologies, Smart Farming Companies, Smart Farming Solutions, Smart Farming Definition, Smart Farming Techniques, Smart Farming Pdf, Smart Farming Sensors, Smart Farming In India, Smart Farming Australia, Smart Farming App, Smart Farming Adalah, Smart Farming Applications, Smart Farming And Food Security, Smart Farming Advantages, Smart Farming Agriculture, Smart Farming Agritechnica, Smart Farming Akkerbouw, Smart Farming Arduino, Smart Farming Business, Smart Farming Big Data, Smart Farming Benefits, Smart Farming Baywa, Farming Smartboard, Th8 Smart Farming Base, Brl Smart Farming Executive Summary, Smart Farming Ist Die Neue Bauernweisheit, Bayer Smart Farming, Smart Farming Bayern, Smart Farming Companies, Smart Farming Conference, Smart Farming Concept, Smart Farming Case Study, Smart Farming Crc, Smart Farming Cases, Smart Farming Conference 2017, Smart Farming Citizen Tv, Smart Farming.com, Smart Farming Csiro, Smart Farming Definition, Smart Farming Drones, Smart Farming Devices, Smart Farming Deutschland, Smart Dairy Farming In Kenya, Smart Dairy Farming Project, Smart Farming John Deere, Smart Farm Dairy Farming, Smart Farm Dairy Farming In Israel, Smart Harvest Dairy Farming, Smart Farming Equipment, Smart Farming Examples, Smart Farming Europe, Smart Farming En Big Data, Brl Smart Farming Executive Summary, Smart Farming Real Estate, Smart Farming Efficiency, Smart Farming For Small Farmers, Smart Farming For Europe, Smart Farming Forbes, Smart Farming Fraunhofer, Smart Farming Flevoland, Smart Farming Group, Smart Farming Greenhouse, Smart Farming Griepentrog, Smart Goat Farming, Smart Farm Garlic Farming, Smart Farming Montague Gardens, Smart Farm Geese Farming, Smart Farming Group Flevoland, Smart Home Farming, Farming Smart Not Hard, Smart Farming Iot, Smart Farming In India, Smart Farming In Kenya, Smart Farming Ireland, Smart Farming Internet Of Things, Smart Farming In Africa, Smart Farming In Japan, Smart Farming Ifa, Smart Farming Iot Pdf, Smart Farming International, Smart Farming Japan, Smart Farming John Deere, Smart Farming Journals, Smart Farming Jobs, Smart Farming Kenya, Smart Farming Korea, Smart Farming Kenya Youtube, Smart Farming Kft, Smart Dairy Farming In Kenya, Smart Poultry Farming In Kenya, Smart Pig Farming In Kenya, Smart Onion Farming In Kenya, Smart Farming Labels, Smart Farming Livestock, Smart Integrated Livestock Farming, Smart Farming Lagerhaus, Smart Farming Ls 2013, Smart- Smart Farming Welt(logic Way Gmbh), Smart Farming Cambodia Ltd, Smart Farming Delaval, Smart Farming Market, Smart Farming Malaysia, Smart Farming Methods, Smart Farming Market Size, Smart Farming Magazine, Smart Farming Meaning, Smart Farming Mingenew, Smart Farming Montague Gardens, Smart Farming Monsanto, Masstock Smart Farming, Smart Farming Nz, Smart Farming New Zealand, Smart Farming Nederland, Farming Smart Not Hard, Nwave Smart Farming, Smart Farming Ist Die Neue Bauernweisheit, Smart Farming Niedersachsen, Smart Onion Farming In Kenya, Smart Onion Farming, Smart Organic Farming, Smart Farming Kenya On Youtube, Smart Farming Internet Of Things, Smart Farming Pdf, Smart Farming Ppt, Smart Farming Project, Smart Farming Platform, Smart Farming Practices, Smart Farming Papers, Smart Farming Products, Smart Farming Poultry, Smart Farming Pigs, Smart Poultry Farming In Kenya, Smart Farming Report, Smart Farming Real Estate, Smart Rabbit Farming, Csiro Smart Farming Report, Climate Smart Rice Farming, Romulus’s Smart Farming Script, Smart Farming Rathenau, Smart Farming System, Smart Farming Solutions, Smart Farming Sensors, Smart Farming Software, Smart Farming Sap, Smart Farming South Africa, Smart Farming Seminar, Smart Farming Sruc, Smart Farming Stocks, Smart Farming Silk, Smart Farming Technologies, Smart Farming Techniques, Smart Farming Thailand 4.0, Smart Farming Tools, Smart Farming Tech, Smart Farming Thailand, Smart Farming Technology 2016, Smart Farming Technologies Cc, Smart Farming Tips, Smart Farming Trends, Smart Farming Using Iot, Smart Farming Using Arduino And Data Mining, Smart Farming Upm, Smart Farming Using Arduino, Smart Farming Uk, Smart Farming Ukraine, Smart Farming Using Image Processing, Smart Farming Uganda, Smart Farming Usa, Smart Urban Farming, Smart Farming Vdi, Smart Farming Videos, Smart Farm Vertical Sack Farming, Verizon Smart Farming, Smart Farming Wikipedia, Smart Farming Welt, Smart Farming Wageningen, Farming Smartwatch, Www.smart Farming.in, Smart Dairy Farming Wur, Smarf Smart Farming Welt, Smart- Smart Farming Welt(logic Way Gmbh), Smart Farming Youtube, Youtube Smart Farming, Smart Farming Kenya On Youtube, Yara Smart Farming, Smart Farming New Zealand, Us Food Service, Us Food And Drug Administration, Us Food Login, Us Food Wixom Mi, Us Food Pyramid, Us Food Jobs, Us Food Waste, Us Food Guidelines, Us Food Administration, Us Food Exports, Us Food And Drug Administration, Us Food Administration, Us Food Aid, Us Food Application, Us Food And Nutrition Service, Us Food Administration 1917 Poster, Us Food App, Us Food Aid And Civil Conflict, Us Food Administration Ww1, Us Food Address, Us Food Bank, Us Food Benefits, Us Food Brands, Us Food Buffalo Ny, Us Food Buda Tx, Us Food Brokers, Us Food Budget, Us Food Boca Raton, Us Food Banned In Other Countries, Us Food Bismarck Nd, Us Food Company, Us Food Code, Us Food Careers, Us Food Customer Service, Us Food Catalog, Us Food Consumption, Us Foods Chef Store, Us Food Culture, Us Food Customer Portal, Us Food Chains, Us Food Distributors, Us Food Delivery, Us Food Deserts, Us Food Direct Order, Us Food Desert Map, Us Food Delivery App, Us Food Driver, Us Food Database, Us Food Distribution Center, Us Food Deflation, Us Food Exports, Us Food Employee Login, Us Food Exports By Country, Us Food Equipment, Us Food Exports To China, Us Food Exports To Mexico, Us Food Exports To Russia, Us Food Equipment Company, Us Food Events, Us Food Expenditure, Us Food Festivals 2017, Us Food Facts, Us Food Festivals, Us Food Florida, Us Food For Peace, Us Food Franchises, Us Food Flowood Ms, Us Food Fanatics Live, Us Food Fort Mill, Us Food Fairburn Ga, Us Food Guidelines, Us Food Group, Us Food Guide, Us Food Guide Pyramid, Us Food Glassdoor, Us Food Garland Tx, Us Food Guidelines 2016, Us Food Greenville Sc, Us Food Greensburg Pa, Us Food Grand Forks Nd, Us Food Hr Cafe, Us Food Handler, Us Food Holdings, Us Food Headquarters, Us Food Holidays, Us Food Hours, Us Food Handler Test Answers, Us Food History, Us Food Holdings Corp, Us Food Handler Answers, Us Food Imports, Us Food Insecurity, Us Food Inc, Us Food Industry, Us Food Inflation, Us Food Inspection Agency, Us Food Industry Market Size, Us Food Imports From China, Us Food Insecurity Statistics, Us Food Investor Relations, Us Food Jobs, Us Food Jackson Ms, Us Food Jobs Okc, Us Food Job Reviews, Us Food Job Application, Us Food Job Fair, Us Food Jobs Lexington Sc, Us Food Joints, Us Food King, Us Food Knoxville Tn, Us Food Kansas City, Us Food Kuwait, Us Food Knoxville, Us Food Kansas City Mo, Us Food Kkr, Us Food Knives, Us Kosher Food Guide, Us Food Topeka Ks, Us Food Login, Us Food Locations, Us Food Logo, Us Food Laws, Us Food Lexington Sc, Us Food Labeling, Us Food List, Us Food Las Vegas Nv, Us Food Label Requirements, Us Food Logistics, Us Food Map, Us Food Market, Us Food Mart, Us Food Menu, Us Food Manufacturers, Us Food Manufacturing Companies, Us Food Mart Jakin Ga, Us Food Market Size, Us Food Memphis Tn, Us Food Montgomery Al, Us Food Near Me, Us Food Number, Us Food News, Us Food Night Selector, Us Food Nutrition, Us Food Nj, Us Food Names, Us Food Norwich Ct, Us Food Night Selector Pay, Us Food Norcross Ga, Us Food Order, Us Food Outlet, Us Food Ogden Ut, Us Food Oklahoma City, Us Food Order Selector Pay, Us Food Orlando Fl, Us Food Omaha, Us Food Order Number, Us Food Okc, Us Food Outlet Altoona Pa, Us Food Pyramid, Us Food Production, Us Food Prices, Us Food Policy, Us Food Plate, Us Food Phone Number, Us Food Portal, Us Food Pyramid 2017, Us Food Price Index, Us Food Policy Issues, Us Food Quality, Us Food Quality Standards, Us Food Quiz, Us Food Quality Control, Us Food Quarantine, Us Food Quality Protection Act, Us Quality Food Center Detroit Mi, Us Quality Food Center, Us Food Interview Questions, Us Food Stamp Qualifications, Us Food Recalls, Us Food Regulations, Us Food Regulatory Agencies, Us Food Reserves, Us Food Recalls 2017, Us Food Retail Market, Us Food Rescue, Us Food Rosemont Il, Us Food Recipes, Us Food Restaurant Supply, Us Food Service, Us Food Service Jobs, Us Food Stock, Us Food Stamps, Us Food Supply, Us Food Stamp Budget, Us Food Safety, Us Food Store, Us Food System, Us Food Show, Us Food Truck, Us Food Truck Driver, Us Food Tax, Us Food Tampa Fl, Us Food Trends, Us Food Truck Fest, Us Food Tracker, Us Food Tour, Us Food Tampa Florida, Us Food Trends 2017, Us Food Uk, Us University Food Science Ranking, Us Food Store Uk, Us Vs Uk Food, Us To Uk Food Measurements, Sysco Us Food Merger Update, Us Customs Food From Uk, Us Food Vendor Portal, Us Food Vs Europe, Us Food Vs Other Countries, Us Food Van Driver Pay, Us Food Vista Ca, Us Food Vs Uk Food, Us Food Vendors, Us Food Virginia, Us Food Vans, Us Food Varieties, Us Food Wixom Mi, Us Food Waste, Us Food Waste Challenge, Us Food Warehouse, Us Food Waste Facts, Us Food Will Call, Us Food Waste Quizlet, Us Food Waste 2016, Us Food Waste Per Year, Us Food Wholesalers, Us Food You Can’t Get In Uk, Us Food You Can’t Get In Canada, Us Food New York, Us New Year Food, Us New Year’s Food Traditions, Us Food Stamps By Year, Us Food Waste Per Year, Southern Us Food New Year’s Day, Us Food Stamp Cost Per Year, Yahoo Us Food, Us Food Zebulon Nc, Us Food Zebulon, Us Food Zirndorf, Cyber Targeting, Cyber Targeting Process, Cyber Targeting Analyst, Cyber Targeting Cycle, Cyber Extortionists Targeting Hedge Funds, Cyber Attack Targeting Specific Organisation, Cyber Threat Targeting Iphones, Cyber Criminals Are Targeting Trading Algorithms, Cyber-criminals Are Targeting Phones And Bank Info, Cyber Targeting Analyst, Cyber Attack Targeting Specific Organisation, Cyber Criminals Are Targeting Trading Algorithms, Cyber-criminals Are Targeting Phones And Bank Info, Cyber National Mission Force Targeting Analyst, Cyber Targeting Cycle, Cyber Extortionists Targeting Hedge Funds, Cyber Extortionists Targeting Hedge Funds, Cyber National Mission Force Targeting Analyst, Cyber Extortionists Targeting Hedge Funds, Cyber Threat Targeting Iphones, Cyber Attack Targeting Specific Organisation, Cyber Targeting Process, Cyber-criminals Are Targeting Phones And Bank Info, Cyber Attack Targeting Specific Organisation, Cyber Threat Targeting Iphones, Cyber Criminals Are Targeting Trading Algorithms, Agriculture Definition, Agriculture Jobs, Agriculture Degree, Agriculture News, Agriculture Synonym, Agriculture Secretary, Agriculture Careers, Agriculture Industry, Agriculture Technology, Agriculture Zones, Agricultural Adjustment Act, Agriculture Articles, Agriculture And Climate Change, Agriculture Ap Human Geography, Agriculture And Natural Resources, Agriculture And Human Values, Agriculture Animals, Agricultural Adjustment Act Apush, Agriculture And Agri-food Canada, Agriculture And The Environment, Agriculture Building, Agriculture Business, Agriculture Business Jobs, Agriculture Books, Agriculture Business Degree, Agriculture Business Management, Agriculture Biology, Agriculture Background, Agriculture Blogs, Agriculture By State, Agriculture Careers, Agriculture Companies, Agriculture Colleges, Agriculture Committee, Agriculture Current Events, Agriculture Clipart, Agriculture Classes, Agriculture Climate Change, Agriculture Career Cluster, Agriculture Center, Agriculture Definition, Agriculture Degree, Agriculture Department, Agriculture Drones, Agriculture Degree Online, Agriculture Degree Jobs, Agriculture Drawing, Agriculture Development, Agriculture Deforestation, Agriculture Day, Agriculture Education, Agriculture Etf, Agriculture Equipment, Agriculture Examples, Agriculture Ecosystems And Environment, Agriculture Extension, Agricultural Engineer, Agriculture Education Jobs, Agricultural Economics, Agriculture Education Grants, Agriculture Food And Natural Resources, Agriculture Federal Credit Union, Agriculture Facts, Agriculture Farming, Agriculture Food And Natural Resources Jobs, Agriculture Future Of America, Agriculture Food, Agriculture Fun Facts, Agriculture Frq, Agriculture Fertilizer, Agriculture Grants, Agriculture Games, Agriculture Greenhouse Gas, Agriculture Global Warming, Agriculture Graduation Caps, Agriculture Government, Agriculture Goddess, Agriculture Gps, Agriculture Graduate Programs, Agriculture Grants For Schools, Agriculture Hall Msu, Agriculture History, Agriculture Home Loan, Agriculture Hats, Agriculture Hardiness Zones, Agricultural Hearths, Agriculture Hawaii, Agriculture Headhunters, Agriculture Hashtags, Agriculture Holidays, Agriculture In Michigan, Agriculture Industry, Agriculture In Spanish, Agriculture In India, Agriculture In Mexico, Agriculture In China, Agriculture In Japan, Agriculture In Africa, Agriculture In Southeast Asia Is Limited By, Agriculture In Australia, Agriculture Jobs, Agriculture Jobs In Michigan, Agriculture Jobs Near Me, Agriculture Jobs In Ohio, Agriculture Jokes, Agriculture Jobs In Texas, Agriculture Jobs Salary, Agriculture Journal, Agriculture Job Description, Agriculture Jobs In Colorado, Agriculture Key Issue 3 Answers, Agriculture Key Issue 4 Answers, Agriculture Kid Definition, Agriculture Key Issue 1 Answers, Agriculture Kenya, Agriculture Kansas, Agriculture Kentucky, Agriculture Keynote Speakers, Agriculture Knowledge, Agriculture Key Issue 2, Agriculture Loans, Agriculture Land For Sale, Agriculture Liquid Fertilizer, Agriculture Logo, Agriculture Land, Agriculture Land For Sale Near Me, Agriculture Law, Agriculture Lawyer, Agricultural Lime, Agriculture Land For Sale In Andhra Pradesh, Agriculture Meaning, Agriculture Majors, Agriculture Mechanics, Agriculture Magazines, Agriculture Map, Agriculture Market, Agriculture Memes, Agriculture Machinery, Agriculture Machines, Agriculture Movies, Agriculture News, Agriculture Nutrition And Forestry, Agriculture News Today, Agriculture Near Me, Agriculture Natural Resources, Agriculture New York, Agriculture News 2017, Agriculture Negative Effects, Agriculture Naics Code, Agriculture Nigeria, Agriculture Of Michigan, Agriculture Of Mexico, Agriculture Of Florida, Agriculture Of Texas, Agriculture Of Japan, Agriculture Of Italy, Agriculture Of California, Agriculture Of Hawaii, Agriculture Of France, Agriculture Of Spain, Agricultural Products, Agriculture Pictures, Agricultural Pollution, Agriculture Problems, Agriculture Policy, Agricultural Practices, Agriculture Programs, Agricultural Price Supports, Agriculture Parts, Agriculture Plant Hardiness Zones, Agriculture Quotes, Agriculture Quizlet, Agriculture Questions, Agriculture Quiz, Agriculture Quiz Bowl Questions, Agriculture Quarantine Inspection, Agriculture Questions Quizlet, Agriculture Quarantine Activity System, Agriculture Quizlet Ap Human Geography, Agriculture Quebec, Agricultural Revolution, Agricultural Runoff, Agriculture Robots, Agriculture Research, Agricultural Revolution Definition, Agricultural Research Service, Agriculture Resume, Agriculture Research Jobs, Agricultural Revolution Quizlet, Agriculture Research Topics, Agriculture Synonym, Agriculture Secretary, Agriculture Stocks, Agriculture Schools, Agriculture Scholarships, Agriculture Supply, Agriculture Salary, Agriculture Solutions, Agricultural Science, Agriculture Statistics, Agriculture Technology, Agriculture Terms, Agriculture Teacher, Agriculture Tools, Agriculture Topics, Agriculture Technician, Agriculture Tires, Agriculture Today, Agriculture Timeline, Agriculture Tractor, Agriculture Universities, Agriculture Usa, Agriculture Used In A Sentence, Agriculture Us, Agriculture Universities In Usa, Agriculture Uav, Agriculture Unit Ap Human Geography, Agriculture Utah, Agriculture Update, Agriculture Union, Agriculture Vocabulary, Agriculture Videos, Agriculture Vs Industry, Agriculture Vinegar, Agriculture Visa, Agriculture Value Chain, Agriculture Venture Capital, Agriculture Venture Capital Firms, Agriculture Victoria, Agriculture Verb, Agriculture Water Use, Agriculture Words, Agriculture Worker, Agriculture Websites, Agriculture Water Pollution, Agricultural Waste, Agriculture Word Search, Agriculture Water Pumps, Agriculture Worksheets, Agriculture Water, Agriculture Examples, Agriculture Export Association, Agriculture Extension, Agricultural Experience Tracker, Agriculture Exemption, Agriculture Expo, Agriculture Extension Jobs, Agricultural Exports, Agriculture Extension Agent, Agriculture Exemption Permit, Agricultural Yield, Agriculture Youtube, Agriculture Year, Agriculture Yuma Az, Agriculture Yearbook, Agricultural Yield Data, Agricultural Yield Per Acre, Agricultural Yield By Country, Agriculture Yantra, Agriculture Yojana, Agriculture Zones, Agriculture Zoning Map, Agriculture Zoned Land, Agriculture Zones Usa, Agriculture Zones Texas, Agriculture Zimbabwe, Agriculture Zambia, Agriculture Zone 10, Agriculture Zones Nc, Agriculture Zone 5

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, FBI * April 19, 2016June 28, 2021 15 Minutes

PI – FBI Cyber Bulletin: Global Extremists Conducting Cyber Activity in Support of ISIL

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Global Extremists Conducting Cyber Activity in Support of ISIL

Page Count: 3 pages
Date: February 18, 2016
Restriction: TLP: GREEN
Originating Organization: Federal Bureau of Investigation, Cyber Division
File Type: pdf
File Size: 455,830 bytes
File Hash (SHA-256): 9ED8F8AD7F92E01B31AD756BD939A1A20F9EFCE72105E7D4D908B5902E4FF0B0

Download File

Over the past 18-24 months, an unknown number of online extremists have conducted “hacktivist” cyber operations – primarily Web site defacements, denial-of-service attacks, and release of personally identifiable information (PII) in an effort to spread pro-Islamic State of Iraq and the Levant (ISIL) propaganda and to incite violence against the United States and the West. Recent open source reporting from the Daily Mail India, indicates ISIL is recruiting Indian hackers and offering upwards of $10,000 USD per job to hack government Web sites, steal data, and to build social media databases for recruiting purposes. Indian officials believe as many as 30,000 hackers in India may have been contacted. The FBI cannot confirm the validity of the media reports, and beyond this single article on Indian hackers and ISIL, does not have information indicating any such relationship exists to date. The FBI assesses this activity is most likely independent of ISIL’s leaders located in Syria and Iraq.

Threat The FBI has no information at this time that would identify any specific group or industry sector being targeted by pro-ISIL Web site defacements. We assess Web site vulnerabilities found using automated tools are the primary reason for target selection in past victims. Releases of PII, also known as doxing, by pro-ISIL hacktivists have primarily focused on U.S. and Western government personnel, especially military and law enforcement.

Since at least August 2015, a group of pro-ISIL hackers calling themselves “Elite Islamic State Hackers,” “Islamic Cyber Army,” and “Caliphate Cyber Army” have been associated with multiple Web site defacements and PII releases. In September 2015, group members began posting a series of messages via Twitter stating that they were conducting cyber attacks against the United States in commemoration of the September 11th terrorist attacks using the hash tag #AmericaUnderHacks for their Twitter postings. The postings included screenshots displaying access to several victim Web sites, as well as the posting of PII on President Barack Obama, the First Lady Michelle Obama, Congressional Staff members, government employees, and U.S. military members. Since the #AmericaUnderHacks hacking campaign in September 2015, group members have executed similar campaigns against the United Kingdom (#BritainUnderHacks), Saudi Arabia (#SaudiUnderHacks), Russia (#RussiaUnderHacks), and Israel (#IsraelUnderHacks).

Open source reporting in India has noted the existence of several “hacking groups” within India. Thus far, such reporting has identified group names like “Indian Cyber Army” or “Shakti Campaign” and referenced such groups as having worked on behalf of the Indian government against Pakistan. To date, we have yet to see any validated reporting as to the capabilities of such groups or been able to confirm their existence. It does stand to reason; however, criminal hacking activity, whether by individuals or from organized groups exists in India and could potentially target US companies both for financial gain and for general acclaim.

Technical Details

The FBI assesses most pro-ISIL hacktivist groups use relatively unsophisticated methods and tools to scan for and exploit well-known Web site vulnerabilities. Structured Query Language (SQL) injection, Cross Site Scripting (XSS), and social engineering tactics to obtain account credentials are assessed to be in the capability range of pro-ISIL cyber actors.

The recruited Indian hackers are reportedly communicating on Internet based services like Skype, Silent Circle, Telegram, and WhatsApp. Pro-ISIL hackers use social media platforms like Twitter to make public announcements and release PII. Larger PII releases have been uploaded to online text sharing sites such as Pastebin.com and Justpaste.it.

Defense Precautionary measures to mitigate computer intrusion threats include:

  • Enable automated patches for common vulnerabilities, and routinely update hardware and software applications, including anti-virus software.
  • Scrutinize links contained in e-mails, and do not open attachments included in unsolicited e-mails.
  • Only download software from sites you know and trust.
  • Disable macros. Be careful of pop-ups from attachments that require you to enable them.
  • Monitor employee logins that occur outside of normal business hours.
  • Avoid using the same login and password for multiple platforms, servers, or networks.
  • Use two-factor authentication for employee logins, especially remote logins.
  • Create a centralized Information Technology email account for employees to report suspicious emails.
  • Provide regular training to remind and inform employees about current social engineering threats.
  • Monitor unusual traffic, especially over non-standard ports; and close unused ports.
  • Monitor outgoing data, and be willing to block unknown IP addresses.
  • Utilize a Virtual Private Network (VPN) for remote login capability.

 

  • Go back

    Your message has been sent

    Warning
    Warning
    Warning
    Warning

    Warning.

Fbi Most Wanted, Fbi Jobs, Fbi Director, Fbi Salary, Fbi Agent, Fbi Background Check, Fbi Agent Salary, Fbi Headquarters, Fbi Special Agent, Fbi Internships, Fbi Agent, Fbi Agent Salary, Fbi Academy, Fbi Application, Fbi Analyst, Fbi Atlanta, Fbi Agent Jobs, Fbi Anon, Fbi Address, Fbi Arrests, Fbi Background Check, Fbi Badge, Fbi Bau, Fbi Building, Fbi Boston, Fbi Bap, Fbi Baltimore, Fbi Benefits, Fbi Budget, Fbi Building Dc, Fbi Careers, Fbi Crime Statistics, Fbi Clearance, Fbi Criminal Background Check, Fbi Chicago, Fbi Citizens Academy, Fbi Crime Statistics By Race, Fbi Contact, Fbi Channeler, Fbi Candidates, Fbi Director, Fbi Director Candidates, Fbi Director James Comey, Fbi Definition, Fbi Director Fired, Fbi Director Salary, Fbi Definition Of Terrorism, Fbi Database, Fbi Dallas, Fbi Drug Policy, Fbi Employment, Fbi Email Address, Fbi Employment Drug Policy, Fbi El Paso, Fbi Employees, Fbi Emblem, Fbi Established, Fbi Education Center, Fbi Education, Fbi Executive Branch, Fbi Fingerprinting, Fbi Files, Fbi Field Offices, Fbi Fingerprint Card, Fbi Fitness Test, Fbi Facebook, Fbi Fingerprint Check, Fbi Forensic Accountant, Fbi Foia, Fbi Founder, Fbi Glock, Fbi Games, Fbi Gov, Fbi Glassdoor, Fbi Guns, Fbi Gang List, Fbi Gun Statistics, Fbi Gif, Fbi Gift Shop, Fbi General Counsel, Fbi Headquarters, Fbi Hrt, Fbi History, Fbi Houston, Fbi Hiring, Fbi Hate Crime Statistics, Fbi Head, Fbi Hat, Fbi Honors Internship, Fbi Hotline, Fbi Internships, Fbi Investigation, Fbi Intelligence Analyst, Fbi Informant, Fbi Irt, Fbi Investigation Trump, Fbi Ic3, Fbi Infragard, Fbi Internet Fraud, Fbi Id, Fbi Jobs, Fbi Jacket, Fbi James Comey, Fbi Jurisdiction, Fbi Job Description, Fbi Jobs Apply, Fbi Jacksonville, Fbi Jade Helm, Fbi Jobs Chicago, Fbi Jackson Ms, Fbi Kansas City, Fbi Kids, Fbi Knoxville, Fbi Kidnapping, Fbi Komi, Fbi Kentucky, Fbi Killed Jfk, Fbi Kkk, Fbi Kodi, Fbi K9 Unit, Fbi Logo, Fbi Leeda, Fbi Los Angeles, Fbi Locations, Fbi Las Vegas, Fbi Leaks, Fbi Leader, Fbi Linguist, Fbi Louisville, Fbi Login, Fbi Most Wanted, Fbi Most Wanted List, Fbi Meaning, Fbi Meme, Fbi Movies, Fbi Museum, Fbi Motto, Fbi Miami, Fbi Mission Statement, Fbi Most Dangerous Cities, Fbi Number, Fbi News, Fbi National Academy, Fbi Nics, Fbi New York, Fbi New Orleans, Fbi Newark, Fbi New York Tv Show, Fbi Near Me, Fbi Nominee, Fbi Offices, Fbi Org Chart, Fbi Omaha, Fbi Operative, Fbi On Trump, Fbi Organizational Chart, Fbi Obama Meme, Fbi Obama, Fbi Oklahoma City, Fbi Office Near Me, Fbi Phone Number, Fbi Profiler, Fbi Pft, Fbi Police, Fbi Pay Scale, Fbi Phoenix, Fbi Pay, Fbi Philadelphia, Fbi Positions, Fbi Pittsburgh, Fbi Quantico, Fbi Qualifications, Fbi Q Target, Fbi Quotes, Fbi Quiz, Fbi Questions, Fbi Qr Code, Fbi Qas, Fbi Quantico Address, Fbi Quantico Tours, Fbi Requirements, Fbi Russia, Fbi Russia Investigation, Fbi Report, Fbi Ranks, Fbi Recruiting, Fbi Raid, Fbi Records, Fbi Rape Statistics, Fbi Russia Trump, Fbi Salary, Fbi Special Agent, Fbi Stands For, Fbi Swat, Fbi Special Agent Salary, Fbi Surveillance, Fbi Statistics, Fbi Sos, Fbi Surveillance Van, Fbi Seal, Fbi Training, Fbi Top Ten, Fbi Trump, Fbi Trump Russia, Fbi Tip Line, Fbi Tv Shows, Fbi Twitter, Fbi Tips, Fbi Teen Academy, Fbi Tours, Fbi Ucr, Fbi Ucr 2016, Fbi Units, Fbi Ucr 2015, Fbi Undercover, Fbi Unsolved Cases, Fbi Upin, Fbi Utah, Fbi Usa, Fbi Uniforms, Fbi Vs Cia, Fbi Vault, Fbi Virus, Fbi Vs Apple, Fbi Virtual Academy, Fbi Vehicles, Fbi Violent Crime Statistics, Fbi Virginia, Fbi Van, Fbi Van Wifi, Fbi Website, Fbi Warning, Fbi Wiki, Fbi Wanted List, Fbi Watch List, Fbi Windbreaker, Fbi Warning Screen, Fbi White Collar Crime, Fbi Warrant Search, Fbi Weapons, Fbi X Files, Fbi Xl2, Fbi Xl31, Fbi Xl4, Fbi Xl2 Programming, Fbi Xl-31 Troubleshooting, Fbi Xl 31 Installation Manual, Fbi X Files Real, Fbi Xl2t Installation Manual, Fbi Xl 1215, Fbi Yearly Salary, Fbi Youtube, Fbi Youth Academy, Fbi Youth Leadership Academy, Fbi Yellow Brick Road, Fbi Youth Programs, Fbi Yearly Budget, Fbi Youth Leadership Academy Portland, Fbi Youngstown Ohio, Fbi Yearly Income, Fbi Zodiac Killer, Fbi Zodiac, Fbi Zip Code, Fbi Zodiac Killer List, Fbi Zero Files, Fbi Zodiac List, Fbi Zodiac Signs Killer, Fbi Zhang Yingying, Fbi Zion, Fbi Zodiac Crimes, Extremist Definition, Extremist Groups, Extremist Meaning, Extremist Synonym, Extremist Demon Hunter, Extremist Ideology, Extremist Group Definition, Extremist Groups In The Us, Extremist Activity, Extremist Religion Definition, Extremist Activity, Extremist Atheist, Extremist Activity In Russia, Extremist Attacks, Extremist Animal Rights Groups, Extremist Attacks In America, Extremist Antonym, Extremist Actions, Extremist Adjective, Extremis Armor, Extremist Band, Extremist Beliefs, Extremist Beer, Extremist Bible Verses, Extremist Books, Extremist Ban In Russia, Extremist Behavior, Extremist Buddhist Cell, Extremist Baptist Church, Extremist Buddhist In Burma, Extremist Crime Database, Extremist Christian Church, Extremist Content, Extremist Catholic, Extremist Conservative, Extremist Countries, Extremist Content On Youtube, Extremist Comic, Extremist Cults, Extremist Catholic Groups, Extremist Definition, Extremist Demon Hunter, Extremist Definition Russia, Extremist Documentary, Extremist Definition In Spanish, Extremist Davey Havok, Extremist Definition Webster, Extremist Documentary Netflix, Extremist Dc, Extremist Deluxe Edition, Extremist Example, Extremist Environmental Groups, Extremism Example, Extremism Experts Left, Extremism Explained, Extremism Experts, Extremism Essay, Extremism Experts Are Starting To Worry About The Left, Extremism Experts Starting To Worry About The Left, Extremist Exclusion Orders, Extremist Feminist, Extremist For Love, Extremist Flags, Extremist Fundamentalist, Extremist Feminist Quotes, Extremis Film, Extremist Fallacy, Extremist Freedom Fighters Of India, Extremism Facts, Extremist Forums, Extremist Groups, Extremist Group Definition, Extremist Groups In The Us, Extremist Groups In Russia, Extremist Groups In Syria, Extremist Groups In Africa, Extremist Groups In History, Extremist Groups In The Middle East, Extremist Groups In Iraq, Extremist Group Meaning, Extremist Hindu, Extremist Hate Groups, Extremist Homicide, Extremist Hindi Meaning, Extremist Hindi, Extremist Hotline, Extremist Hitler, Extremis Hulk, Extremism In History, Extremist Hindu Girl, Extremist Ideology, Extremist In Spanish, Extremist In Tagalog, Extremist Islamist, Extremism Is No Vice, Extremist Ideas, Extremism In America, Extremist Isis, Extremist Islamic Countries, Extremism In A Sentence, Extremist Jihad, Extremist Jihadist, Extremist Jainism, Extremist Jw, Extremist Jw Russia, Extremist Jacobin Group, Extremist Jokes, Extremist Joe Satriani, Extremist Jw.org, Extremist Killings, Extremist Kills Mom, Extremist Kills Mom In Syria, Extremist Karen, Extremist Keywords, King’s College Extremist, Kkk Extremist Group, Known Extremist Groups, Kashmir Extremist Groups, Khalistan Extremist, Extremist Law In Russia, Extremist Liberal, Extremist Literature, Extremist Left Wing Groups, Extremist Left Wing, Extremist Leaders, Extremist Legal Definition, Extremist Literature Meaning, Extremism Law Russia, Extremist Liberal Groups, Extremist Meaning, Extremist Movie, Extremist Movements, Extremist Meme, Extremist Meaning In Russia, Extremist Mosques In Us, Extremist Muslim Meaning, Extremist Mormon, Extremist Meme Armies, Extremist Marvel, Extremist Netflix, Extremist Nationalism, Extremist News, Extremist Next Door, Extremist Narratives, Extremist Northamptonshire, Extremist Ne Demek, Extremist Nationalism In India, Extremist Names, Extremist Nature, Extremist Organizations, Extremist Organization Definition, Extremist Organizations In Russia, Extremist Or Terrorist, Extremist Opposite, Extremist Organisations, Extremist Of Indian National Congress, Extremist Opposite Word, Extremis Outdoor Furniture, Extremist Of Tamilnadu, Extremist Pronunciation, Extremist Parties, Extremist Propaganda, Extremist Political Groups, Extremist Parties In Germany, Extremistpullup, Extremist Publications In Russia, Extremist Preachers, Extremism Project, Extremist Pronounce, Extremist Quotes, Extremist Quizlet, Extremist Quotes From Bible, Extremist Quran Quotes, Extremist Quran, Extremist Quiz, Extremist Qasim, Extremist Quarter Horse, Quizlamic Extremists, Feminist Extremist Quotes, Extremist Religion Definition, Extremist Religion, Extremist Religious Groups, Extremism Russia, Extremist Republicans, Extremist Right Wing, Extremist Rhetoric, Extremist Religious Groups List, Extremist Religions In Russia, Extremist Rabbit, Extremist Synonym, Extremist Sentence, Extremist Symbols, Extremist Suffix Crossword, Extremist Sect, Extremist Suffix, Extremist Sites, Extremist School, Extremist Shia, Extremist Sikh Groups, Extremist Terrorist, Extremist Terrorism, Extremist Tattoos, Extremist Terrorist Groups, Extremist Tv Tropes, Extremist Thinking, Extremist Thesaurus, Extremist Tagalog, Extremist Training Camp England, Extremist Terrorism Definition, Extremist Used In A Sentence, Extremist Urban Dictionary, Extremist Uk, Extremist Uk Parties, Extremist Universities, Extremist Urdu Meaning, Extremist Use Of Social Media, Extremist Urban, Extremist Urges Spill Blood In Australia, Extremist Unity, Extremist Videos, Extremist Views, Extremist Videos On Youtube, Extremist Or Terrorist, Extremist Violence, Extremist Vegans, Extremist Vst, Extremist Villains Wiki, Extremis Virus, Extremist Vs Radical, Extremist Websites, Extremist Webster, Extremist Wiki, Extremist Was Right, Extremist Watch List, Extremist With Hook, Extremist Westboro Baptist Church, Extremist Watch List Uk, Extremist Wing Of Congress, Extremist Youtube, Extremist Youtube Videos, Extremist Youtube Ads, Extremist Youth Recruitment, Extremism Youth Usip, Yemen Extremist Groups, Photo Extremist Youtube, Satriani Extremist Youtube, Extremist Meaning Yahoo, Extremist Video You Tube, Extremist Zionist, Extremist Zealot, Zerohedge Extremist, Jihad Extremist, Demon Hunter Extremist Zip, New Zionist Extremist Group, Demon Hunter Extremist Zip Download, Extremist Manifesto Nick Zedd, Extremist Co Znaczy, Cyber Monday 2017, Cyber Bullying, Cyber Security, Cyber Security Jobs, Cyber High, Cyber Monday 3s, Cyber Security Salary, Cyberpower, Cyber Goth, Cyber Security Degree, Cyber Attack, Cyber Awareness, Cyber Acoustics, Cyber Academy, Cyber Attack Map, Cyber Attack 2017, Cyberark, Cyber Attack On Electrical Grid, Cyber Angel, Cyber Awareness Army, Cyber Bullying, Cyber Bullying Statistics, Cyber Bullying Facts, Cyberbully, Cyber Bullying Stories, Cyber Bullying Quotes, Cyber Bullying Articles, Cyber Bullying Laws Michigan, Cyber Bites, Cyber Bullying Essay, Cyber Chase, Cybercoders, Cyber Chip, Cyber Crime, Cyber Check, Cyber Cafe, Cyber City Oedo 808, Cyber Cafe Near Me, Cyber Command, Cyber Currency, Cyber Dust, Cyber Dragon Infinity, Cyber Dragon, Cyber Dragon Deck, Cyberduck, Cyber Definition, Cyber Dragon Nova, Cyber Dojo, Cyber Dragon Deck 2017, Cyber Defense Jobs, Cyber End Dragon, Cyber Education Center, Cyber Education, Cyber Espionage, Cyber Education Center Lansing Mi, Cyber Ethics, Cyber Extortion, Cyber Eltanin, Cyber Engineering, Cyber Etymology, Cyber Forensics, Cyber Five, Cyber Force, Cyber Forensics Jobs, Cyber Formula, Cyber Font, Cyber Frauds, Cyber Forensics Degree, Cyberfair, Cyber Footprint, Cyber Goth, Cyberghost, Cyber Goth Dance, Cyber Ghetto, Cybergrants, Cyber Gadget, Cyber Goth Girl, Cyber Gadget Retro Freak, Cyber Goth Clothing, Cyber Gears, Cyber Hymnal, Cyber Harassment, Cyber High, Cyber Hacking, Cyber Hug, Cyber Harpie Lady, Cyber Hygiene, Cyber Helmet, Cyber Harassment Laws, Cyber Harassment Michigan, Cyber Insurance, Cyber Inc, Cyber Intelligence, Cyber Insurance Policy, Cyber Investigation, Cyber Intelligence Analyst, Cyber Illinois, Cyber Intelligence Degree, Cyber Insurance Providers, Cyber Infrastructure, Cyber Jar, Cyber Jobs, Cyberjapan Dancers, Cyber Junkie, Cyber Jack, Cyber Jihad, Cyber Jesus, Cyberjudas, Cyber Jar Banned, Cyber Jason, Cyber Kill Chain, Cyberknife, Cyber Knight, Cyber Kotori, Cyber Key, Cyber Kill Chain Model, Cyber King, Cyber Kidnapping, Cyber Kong, Cyber Kitty, Cyber Liability Insurance, Cyber Law, Cyberlink, Cyber Liquids, Cyber Love Live, Cyber Laser Dragon, Cyberlock, Cyber Liability Insurance Cost, Cyber Lawyer, Cyberlink Powerdirector, Cyber Monday 2017, Cyber Monday 3s, Cyber Monday, Cyber Monday 1s, Cyber Monday 2016, Cyber Meaning, Cyber Michigan, Cyber Marvel, Cyberman, Cybermen, Cyber News, Cyber Nico, Cyber Ninja, Cyber Nations, Cyber Ninja Hanzo, Cyber Nuke, Cyber Network, Cyber Nozomi, Cyber Net, Cyber Nanny, Cyber Operations, Cyber Optics Detroit, Cyber Operations Officer, Cyber Optics, Cyber Ops, Cyber Operations Specialist, Cyber Outlet, Cyber Ogre, Cyber Operations Specialist Salary, Cyber Officer Air Force, Cyberpower, Cyberpunk, Cyber Police, Cyber Physical Systems, Cyberpatriot, Cyber Pegasus, Cyberpunk 2077, Cyber Playground, Cyberpower Ups, Cyber Pink, Cyber Quest, Cyberq, Cyber Quest Soaring Eagle, Cyber Quotes, Cyber Queen, Cyberquery, Cybex Q Cloud, Cyber Questions, Cyber Quest Fort Gordon, Cyberq Manual, Cyber Research, Cyber Risk, Cyber Resilience, Cyber Range, Cyber Risk Management, Cyber Rain, Cyber Recruiter, Cyber Risk Insurance, Cyber Repair Plant, Cyber Rider Turbo, Cyber Security, Cyber Security Jobs, Cyber Security Salary, Cyber Security Degree, Cyber Security Training, Cyber Security News, Cyber Stalking, Cyber Security Certifications, Cyber Security Companies, Cyber Safety, Cyber Terrorism, Cyber Tech, Cyber Threat, Cyber Transport Systems, Cyber Terrorism Definition, Cyber Terminators, Cyber Threat Intelligence, Cyber Technology, Cyber Theft, Cyber Threat Alliance, Cyber Umi, Cyber University, Cyber U, Cyber Ups, Cyber Bullying, Cyber Umi Cosplay, Cyber Underground, Cyber Unit, Cyber Usa, Cyber Underwriter Salary, Cyber Valley, Cyber Vandalism, Cyber Violence, Cyber Vpn, Cyber Vulnerability, Cyber Victimization, Cyber Village Academy, Cyber Virus, Cyber Vision, Cyber Vulnerability Assessment, Cyber Warfare, Cyberweld, Cyber Woman With Corn, Cyber World, Cyber Warfare Definition, Cyber World Institute, Cyber Warrior, Cyber Weapons, Cyber Wars, Cyber Wallpaper, Cyber X, Cyber Xmen, Cyber X Games, Cyber X Link, Cyber X Designs, Cyber X 3d, Cyborg X Trailer, Cyber X Internet Cafe, Cyber X Games 2017, Cyber Xl, Cyber Yugioh, Cyber Yellow, Cyber Yog, Cyber Yugioh Cards, Cyber Yankee, Cyber Yankee 2017, Cyber Yellow Vans, Cyber Youtube, Cyber Youcam, Cyber You, Cyber Zilla, Cyber Zone, Cyber Zarya, Cyber Zombie, Cyber Z, Cyber Zoom, Cyberzone Internet Cafe, Cyber Zone Hours, Cyber Zilla Toy, Cyber Zone Opelika, Isil Meaning, Isil Definition, Isil News, Isil Vs Isis, Isil Isis, Isis Map, Isil Akbulut, Isil Leader, Isil Stock, Isis Flag, Isil Akbulut, Isil Acronym, Isil Attacks, Isil Abbreviation, Isil Aktan, Isil Alev, Isil Afghanistan, \U0131\u015f\u0131l Alben, Isis Apush, Isil Aksoy, Isil Bagdadi, Isis Band, Isis Bombing, Isil Bs Isis, Isil Blackboard, Isil Berkun, Isis Build, Isis Beliefs, Isis Button, Isis Beauty, Isil Certification, Isil Chemical Weapons, Isis Coney Island, Isis Cartoon, Isil Conflict, Isis Capital, Isil Capabilities, Isis Control Map, Isis Caliphate, Isis Chan, Isil Definition, Isil Dillig, Isis Definition, Isil Daesh, Isil Define, Isil Dipietro, Isis Dearborn, Isis Damil, Isil Dilek, Isis Drones, Isil Erel, Isil Egypt, \U0131\u015f\u0131l E\u011frikavuk, Isis Egypt, Isis Explained, Isis Exchange, Isis Excussion, Isis Europe, Isis Edc, Isis Events, Isis Flag, Isil Fighters, Isil Funding, Isil Finances, Isil Full Form, Isis Facts, Isil Founder, Isis Fighters, Isis Fails, Isis Founder, Isis Goddess, Isil Group, Isis Goals, Isil Guney, Isis Gallardo, Isis Genocide, Isis Goat Meme, Isis Getting Shot, Isis Getting Bombed, Isis Goat, Isil Halac Md, Isis Harambe, Isis History, Lsil Hpv, Isis Hair, Isis Hit List, Isis Hunting Permit, Isis Heavy, Isil Hamdemir, Isis Hostages, Isil Isis, Isil In Yemen, Isil In Syria, Isil In Afghanistan, Isil In Iraq, Isil In Libya, Isil Ideology, Isil In Mosul, Isil Insurgency In Tunisia, Isil In Egypt, Isil Jordan, Isil Job, Isil Journal, Isil Jesus Maria, Isil Je, Isis Jokes, Isil Japan, Isil Japanese, Isis Jordan Pilot, Isis Japanese Hostage, Isis K, Isis King, Isil Karaca, Isis Kurds, Isis Kids, Isis Kidnapping, Isis Knot, Isis Keyshia, Isis Kneading, Isis King Net Worth, Isil Leader, Isil Libya, Isil Leader Killed, Isil Latest News, Isil Lima Peru, Isil Lima, Isil Lu, Isil Leader Dead, Isis Leader Killed, Isis Logo, Isil Meaning, Isis Memes, Isis Meaning, Isis Map, Isis Mosul, Isil Meaning In English, Isil Meaning Levant, Isis Music, Isis Members, Isis Magazine, Isil News, Isil Name, Isil Numbers, Isil Nal, Isil Not Isis, Isis Names, Isil Name Meaning, Isis Net Worth, Isis Navy, Isil News Now, Isil Origin, Isil Or Isis, Isle Of Man, Isil Or Isis What Is The Difference, Isil Oz, Isis Origin, Isis Osiris, Isis Oceanic, Isis Oil, Isis Oracle, Isil Peru, Isis Propaganda, Isis Papers, Lsil Pap, Isil Photos, Isil Pakistan, Isil Palmyra, Isis Persona 5, Isis Pharmaceuticals, Isis Pictures, Isis Quotes, Isis Queen, Isis Quizlet, Isis Quran, Isis Questions, Isis Quartz, Isis Qaraqosh, Isis Quick Facts, Isis Qatar, Isis Queen Of Heaven, Isil Recber, Isil Russia, Isis Religion, Isis Recruitment, Isis Recruitment Video, Isis Raqqa, Isis Rea Boykin, Isil Stands For, Isil Stock, Isil Stock Price, Isil Sinai Province, Isis Sunni, Isil Saudi Arabia, Isil Symbol, Isis Shia, Isil Size, Isis Social Media, Isis Territory, Isil Terrorism, Isil Target Russia, Isis Tv Show, Isis Twitter, Isil Territorial Claims, Isil Turkish Name, Isil Today, Isis Theme Song, Isil Tunisia, Isil Uzum, Isil Uk, Isis Uf, Isis Unveiled, Isis Update, Isis Using Drones, Isis Uniforms, Isis Uk, Isis Us, Isis Uiowa, Isil Vs Isis, Isil Videos, Isil Vs Isis Wiki, Isil Vs Isis Snopes, Isil Vs Isis Reddit, Isis Violence, Isil Vs Iran, Isil Vs Isis Israel, Isil Videos Of Executions, Isil Vs Isis Meaning, Isil Wiki, Isil War, Isis Website, Isil What Does It Stand For, Isil Waxman, Isis Wigs, Isis War, Isis Wings, Isis Waswas, Isis Women, Isil Xmas, Isil Xi Lu, Isil Xinjiang, Xidigaha Isil, Isil And Isis, Isil X\u30c7\u30fc, Isil Yemen, Isil Yucesoy, Isil Yildiz Yale, Isil Yucesoy Biography, Isil Yucesoy Funeral, Isil Yildiz, Isil Youtube, Isil Yavuz, Isis Yilmaz, Isil Zastava, Isil Zaprijetio Balkanu, Isil Znacenje, Entil’zha, Isil Zorlu, Isil Zionist, Isil Zakat, Isil Zapalio Zarobljenika

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, CYBERCRIME, PUBLIC INTELLIGENCE April 10, 2016June 29, 2021 14 Minutes

FBI – Militas targeting Muslims

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

FBI-MilitiaTargetingMuslimsCounterterrorism Division

  • 7 pages
  • Law Enforcement Sensitive
  • For Official Use Only
  • May 28, 2015

Download

(U//FOUO) Militia extremists are expanding their target sets to include Muslims and Islamic religious institutions in the United States. This has resulted in increased violent rhetoric and plotting and has the potential to lead, over the long term, to additional harassment of or violence against Muslims by domestic extremists. The FBI makes these assessments with high confidence on the basis of a large body of source reporting generated mainly since 2013. This information augments prior FBI analysis that established militia extremists target government personnel and law enforcement officers, perceived threats from abroad, and individuals or institutions that seek to constrain Second Amendment rights.

(U) Communities, Mosques, Gathering Places Attract Extremist Interest

(U//FOUO) The FBI assesses militia extremists, increasingly over the past two years, have conducted surveillance, plotted, and advocated violence against mosques and Islamic centers across the United States and specific Muslim communities.

• (U//FOUO) Multiple sources with varying levels of access report conducting surveillance in diverse locations including Alaska, Arizona, Indiana, Montana, New York, North and South Carolina, Utah, and Texas.
• (U//FOUO) A reliable source with good access to the information reported that a leader of a militia extremist group in the western United States expressed in early 2015, interest in training members for direct action against ISIS and associated ISIS locations.
• (U//FOUO) In September 2014 militia extremists in Mississippi discussed kidnapping and beheading a Muslim and posting video of the attack to the Internet, according to reliable sources with good access to the information. The group has, however, since disbanded.
• (U//FOUO) A militia extremist posted calls over social media to kill Muslims attending worship services and during a public event in 2013, according to a reliable source with direct access to the information.

(U) Muslim Bias Fuels Conspiracy Theories about Terrorist Training Camps

(U//FOUO) The FBI assesses militia extremist interest in Islam as a target is a product of ideology that views Muslims collectively with suspicion. Salient perceptions within militia extremism that contribute toward an anti-Muslim bias include the following:

• (U//FOUO) Islam represents a foreign threat, equivalent to those which emanate from illegal immigration or international terrorism.
• (U//FOUO) The President of the United States not only sympathizes with Islamic extremists but directs US Government policy to align with their goals.

(U//FOUO)The FBI assesses various claims the US government allows the group Muslims of the Americas (aka Jamaat ul Fuqra, hereinafter referred to as MOA) to operate terrorist training camps at dozens of locations across the United States resonate with adherents of a militia ideology who seek validation of anti-government conspiracy theories. These assertions— repeated over the course of a decade by self-appointed watchdogs of Islamic extremism, Internet bloggers, and some news media–are based in part on official government information which bolsters claims the US Government chooses to ignore the camps. Accusations about the camps periodically surge, most recently in the wake of the 7 January 2015 terrorist attack against the French magazine Charlie Hebdo.

…

(U//FOUO) Militia extremists will likely continue to identify and discuss potential Muslim targets, should the level of concern generally about Islamic terrorism remain at current levels. The FBI further assesses primary target choices will continue to include locations easiest to access, such as local mosques or religious institutions, followed by locations portrayed by Internet sources as having threat potential, including MOA enclaves. Militia supporters also will likely continue to conduct surveillance of targets as they are identified. FBI confidence in these assessments is medium on the basis of current intelligence.

(U//FOUO) Assuming no new incidents or high profile controversies relating to Islam or Islamic extremism raise domestic extremist intent levels, the likelihood domestic extremists will harass or commit violence against Muslims or religious institutions is low. This assessment is made with low confidence, as domestic lone actors and small cells possess varied capability to attack Muslim targets. Successful acquisition of resources and detailed planning raise capability levels and, combined with heightened intent, likelihood of violence.

Go back

Your message has been sent

Warning
Warning
Warning
Warning

Warning.

 Fbi Most Wanted, Fbi Jobs, Fbi Director, Fbi Salary, Fbi Agent, Fbi Background Check, Fbi Agent Salary, Fbi Headquarters, Fbi Special Agent, Fbi Internships, Fbi Agent, Fbi Agent Salary, Fbi Academy, Fbi Application, Fbi Analyst, Fbi Atlanta, Fbi Agent Jobs, Fbi Anon, Fbi Address, Fbi Arrests, Fbi Background Check, Fbi Badge, Fbi Bau, Fbi Building, Fbi Boston, Fbi Bap, Fbi Baltimore, Fbi Benefits, Fbi Budget, Fbi Building Dc, Fbi Careers, Fbi Crime Statistics, Fbi Clearance, Fbi Criminal Background Check, Fbi Chicago, Fbi Citizens Academy, Fbi Crime Statistics By Race, Fbi Contact, Fbi Channeler, Fbi Candidates, Fbi Director, Fbi Director Candidates, Fbi Director James Comey, Fbi Definition, Fbi Director Fired, Fbi Director Salary, Fbi Definition Of Terrorism, Fbi Database, Fbi Dallas, Fbi Drug Policy, Fbi Employment, Fbi Email Address, Fbi Employment Drug Policy, Fbi El Paso, Fbi Employees, Fbi Emblem, Fbi Established, Fbi Education Center, Fbi Education, Fbi Executive Branch, Fbi Fingerprinting, Fbi Files, Fbi Field Offices, Fbi Fingerprint Card, Fbi Fitness Test, Fbi Facebook, Fbi Fingerprint Check, Fbi Forensic Accountant, Fbi Foia, Fbi Founder, Fbi Glock, Fbi Games, Fbi Gov, Fbi Glassdoor, Fbi Guns, Fbi Gang List, Fbi Gun Statistics, Fbi Gif, Fbi Gift Shop, Fbi General Counsel, Fbi Headquarters, Fbi Hrt, Fbi History, Fbi Houston, Fbi Hiring, Fbi Hate Crime Statistics, Fbi Head, Fbi Hat, Fbi Honors Internship, Fbi Hotline, Fbi Internships, Fbi Investigation, Fbi Intelligence Analyst, Fbi Informant, Fbi Irt, Fbi Investigation Trump, Fbi Ic3, Fbi Infragard, Fbi Internet Fraud, Fbi Id, Fbi Jobs, Fbi Jacket, Fbi James Comey, Fbi Jurisdiction, Fbi Job Description, Fbi Jobs Apply, Fbi Jacksonville, Fbi Jade Helm, Fbi Jobs Chicago, Fbi Jackson Ms, Fbi Kansas City, Fbi Kids, Fbi Knoxville, Fbi Kidnapping, Fbi Komi, Fbi Kentucky, Fbi Killed Jfk, Fbi Kkk, Fbi Kodi, Fbi K9 Unit, Fbi Logo, Fbi Leeda, Fbi Los Angeles, Fbi Locations, Fbi Las Vegas, Fbi Leaks, Fbi Leader, Fbi Linguist, Fbi Louisville, Fbi Login, Fbi Most Wanted, Fbi Most Wanted List, Fbi Meaning, Fbi Meme, Fbi Movies, Fbi Museum, Fbi Motto, Fbi Miami, Fbi Mission Statement, Fbi Most Dangerous Cities, Fbi Number, Fbi News, Fbi National Academy, Fbi Nics, Fbi New York, Fbi New Orleans, Fbi Newark, Fbi New York Tv Show, Fbi Near Me, Fbi Nominee, Fbi Offices, Fbi Org Chart, Fbi Omaha, Fbi Operative, Fbi On Trump, Fbi Organizational Chart, Fbi Obama Meme, Fbi Obama, Fbi Oklahoma City, Fbi Office Near Me, Fbi Phone Number, Fbi Profiler, Fbi Pft, Fbi Police, Fbi Pay Scale, Fbi Phoenix, Fbi Pay, Fbi Philadelphia, Fbi Positions, Fbi Pittsburgh, Fbi Quantico, Fbi Qualifications, Fbi Q Target, Fbi Quotes, Fbi Quiz, Fbi Questions, Fbi Qr Code, Fbi Qas, Fbi Quantico Address, Fbi Quantico Tours, Fbi Requirements, Fbi Russia, Fbi Russia Investigation, Fbi Report, Fbi Ranks, Fbi Recruiting, Fbi Raid, Fbi Records, Fbi Rape Statistics, Fbi Russia Trump, Fbi Salary, Fbi Special Agent, Fbi Stands For, Fbi Swat, Fbi Special Agent Salary, Fbi Surveillance, Fbi Statistics, Fbi Sos, Fbi Surveillance Van, Fbi Seal, Fbi Training, Fbi Top Ten, Fbi Trump, Fbi Trump Russia, Fbi Tip Line, Fbi Tv Shows, Fbi Twitter, Fbi Tips, Fbi Teen Academy, Fbi Tours, Fbi Ucr, Fbi Ucr 2016, Fbi Units, Fbi Ucr 2015, Fbi Undercover, Fbi Unsolved Cases, Fbi Upin, Fbi Utah, Fbi Usa, Fbi Uniforms, Fbi Vs Cia, Fbi Vault, Fbi Virus, Fbi Vs Apple, Fbi Virtual Academy, Fbi Vehicles, Fbi Violent Crime Statistics, Fbi Virginia, Fbi Van, Fbi Van Wifi, Fbi Website, Fbi Warning, Fbi Wiki, Fbi Wanted List, Fbi Watch List, Fbi Windbreaker, Fbi Warning Screen, Fbi White Collar Crime, Fbi Warrant Search, Fbi Weapons, Fbi X Files, Fbi Xl2, Fbi Xl31, Fbi Xl4, Fbi Xl2 Programming, Fbi Xl-31 Troubleshooting, Fbi Xl 31 Installation Manual, Fbi X Files Real, Fbi Xl2t Installation Manual, Fbi Xl 1215, Fbi Yearly Salary, Fbi Youtube, Fbi Youth Academy, Fbi Youth Leadership Academy, Fbi Yellow Brick Road, Fbi Youth Programs, Fbi Yearly Budget, Fbi Youth Leadership Academy Portland, Fbi Youngstown Ohio, Fbi Yearly Income, Fbi Zodiac Killer, Fbi Zodiac, Fbi Zip Code, Fbi Zodiac Killer List, Fbi Zero Files, Fbi Zodiac List, Fbi Zodiac Signs Killer, Fbi Zhang Yingying, Fbi Zion, Fbi Zodiac Crimes, Militia Definition, Militia Act, Militia Groups, Militia Act Of 1792, Militia Definition Government, Militia Immaculata, Militia Synonym, Milita Advanced Skin Care, Militia Act Of 1862, Militia Spa, Militia Act, Militia Act Of 1792, Milita Advanced Skin Care, Militia Act Of 1862, Militia Act Of 1903, Militia Act Definition, Militia Army, Militia American Revolution, Militia Amendment, Militia Act Of 1795, Militia Burn, Militia Brothers, Militia Band, Militia Black Ops 2, Militia Burn Wiki, Militia Badge, Militia Bracelets Ffxiv, Militia Books, Militia Basketball, Militia Burn Lyrics, Militia Cs Go, Militia Crawford County, Militia Clause, Militia Clothing, Militia Checkcccpoints, Militia Collection, Militia Checkpoints Founders Island, Militia Christi, Militia Choker, Militia Compound, Militia Definition, Militia Definition Government, Militia Def, Militia Definition History, Militia Documentary, Militia Dominion, Militia During The Revolutionary War, Militia Drawing, Militia District, Militia Definition Us History, Militia Etheridge, Militia Entertainment, Militia Equipment, Militia Extremists, Militia Etymology, Militia En Espanol, Militia Executive Order, Militia Etheridge Joke, Militia Empire Total War, Militia Example Sentence, Militia Fitness, Militia Flag, Militia Forces, Militia Facts, Militia Flags Of The American Revolution, Militia Fitness Destin, Militia Font, Militia For Hire, Militia For Trump, Militia Fitness Nc, Militia Groups, Militia Groups Definition, Militia Gear, Militia Green, Militia Game, Militia Guns, Militia Groups Near Me, Militia Green Shirts, Militia Group Records, Militia Green Jordan 9, Militia Hill Ventures, Militia Hat Fallout 4, Militia Hockey, Militia History, Militia Hill Golf Course, Militia Hats, Militia Hill Security, Militia Hockey Maine, Militia Hockey Tournament, Militia Hill Ventures Phone Number, Militia Immaculata, Militia In A Sentence, Militia Illinois, Militia In Spanish, Militia In America, Militia In Oregon, Militia In Revolutionary War, Militia Images, Militia In Constitution, Militia In Africa, Militia Jacket, Militia Jobs, Militia Judas Priestess, Militia Jane Clothing, Militia Jesu,  Christi, Militia Jordan 9, Militia Jade Helm, Militia Jati Sangha, Militia Jokes, Militia Jabal Records, Militia Kit, Militia Kentucky, Militia Killed, Militia Kansas, Militia Killed Oregon, Militia Kokoda Track, Militia Kim Davis, Militia Knives, Militia Knife, Militia Knapsack, Militia Logo, Militia Law, Militia Loadout, Militia Latin, Militia Legal Definition, Militia Lyrics, Militia Let’s Burn, Militia Legality, Militia Leader Shot, Militia Life Is Feudal, Militia Meaning, Militia Movement, Militia Man, Militia Movie, Militia Meme, Militia Movement Apush, Militia Members, Militia Movement 1990s, Militia Movie 2017, Militia Movement Definition, Militia Names, Militia News, Militia Near Me, Militia Name Generator, Militia National Guard, Militia Nc, Militia Nevada, Militia North Carolina, Militia Nj, Militia New York, Militia Of Montana, Militia Oregon, Militia Outfit, Militia Officer, Militia Ordinance, Militia Organization, Militia Of Mary Immaculate, Militia Otf, Militia Of The United States, Militia Oath, Militia Patches, Militia Plural, Militia Pilot, Militia Pronounce, Militiapharm, Militia Park Easton Ma, Militia Pin, Militia Pics, Militia Portland, Militia Photos, Militia Quotes, Militia Quizlet, Militia Quotes Founding Fathers, Militia Queens Village, Militia Quest Seal Online, Militia Qc, Militia Quezon City, Militia Quebec, Militia Quotes Mw2, Militia Quest Seal, Militia Revolutionary War, Militia Ranks, Miltia Rwby, Militia Rifle, Militia Racing Products, Militia Rising, Militia Radio, Militia Rap Group Burn, Militia Requirements, Militia Records, Militia Synonym, Militia Spa, Militia Skis, Militia Snow, Militia Sentence, Militia Symbols, Militia Springs Malinois, Militia Soldier, Militia Standoff, Militia Second Amendment, Militia Training, Militia Templi, Militia Titanfall, Militia Theory, Militia Tattoos, Militia Thesaurus, Militia Trump, Militia Training Camps, Militia Theoretician, Militia Tactics, Militia Uniform, Militia Us, Militia Units, Militia Update, Militia Us Code, Militia Update Cs Go, Militia United In Righteousness, Militia Used In A Sentence, Militia Urban Dictionary, Militia Update Gta, Militia Vox, Militia Vs Military, Militia Vs Army, Militia Veteran Trait, Militia Vehicles, Militia Vs Antifa, Militia Vs Regulars, Militia Vichy France, Militia Vs Paramilitary, Militia Vs Minutemen, Militia Weapons, Militia Watchdog, Militia War, Militia Watchtower Miagani Island, Militia Walking Dead, Militia Workout, Militia Websites, Militia Watchtower Bleake Island, Militia Warfare, Militia West, Militia Youtube, Militia Youth Hockey, Militia Youth Cadet Corps, Militia Yahoo Answers, Yemeni Militia, Militia Yangu, Ypg Militia, Yazidi Militia, Yew Militia, Yorkshire Militia, Militia Zespy Pants, Militia Zespy Pant Denim, Zintan Militia, Zhob Militia, Zombie Militia, Zomo Militia, Zert Militia, Zionist Militia, Zombie Militia Inverness, Zintan Militia Tripoli Airport, Muslim Women, Muslim Ban, Muslim Religion, Muslim Holidays, Muslim Brotherhood, Muslim Girl Names, Muslim Definition, Muslim Names, Muslim Jokes, Muslim Prayer, Muslim Americans, Muslim Art, Muslim Avocado, Muslim American Leadership Alliance, Muslim Attire, Muslim Attacks, Muslim Association Of Bolingbrook, Muslim Actors, Muslim American Society, Muslim Architecture, Muslim Ban, Muslim Brotherhood, Muslim Beliefs, Muslim Boy Names, Muslim Bible, Muslim Baby Names, Muslim Baby Girl Names, Muslim Ban Countries, Muslim Baby Boy Names, Muslim Bible Name, Muslim Countries, Muslim Consumer Group, Muslim Clothing, Muslim Church, Muslim Culture, Muslim Call To Prayer, Muslim Calendar, Muslim Community Center Chicago, Muslim Community Center, Muslim Cleric, Muslim Definition, Muslim Dress, Muslim Dating Site, Muslim Diet, Muslim Dating, Muslim Discrimination, Muslim Dating App, Muslim Demographics, Muslim Dress Code, Muslim Dress Name, Muslim Education Center, Muslim Empire, Muslim Eater, Muslim Emoji, Muslim Easter, Muslim Ethnicity, Muslim Extremists, Muslim Europe, Muslim Eid, Muslim Eat Pork, Muslim Flag, Muslim Fasting, Muslim Funeral, Muslim Food, Muslim Faith, Muslim Fashion, Muslim Funeral Services Chicago, Muslim Family, Muslim Feminist, Muslim Free Gun Store, Muslim Girl Names, Muslim Greeting, Muslim God, Muslim Girl, Muslim God Name, Muslim Garb, Muslim Genocide, Muslim Golden Age, Muslim Groups, Muslim Girl Book, Muslim Holidays, Muslim Hat, Muslim Holiday Today, Muslim Hijab, Muslim Holy Book, Muslim Headdress, Muslim Hate Crimes, Muslim Heaven, Muslim History, Muslim Holy City, Muslim Inbreeding, Muslim In Spanish, Muslim Imam, Muslim Immigration, Muslim Inventions, Muslim Invasion Of Europe, Muslim In America, Muslim Invasion, Muslim Inbreeding Snopes, Muslim Indian, Muslim Jokes, Muslim Judge Found Dead, Muslim Judge, Muslim Jesus, Muslim Journal, Muslim Jewelry, Muslim Jihad, Muslim Jinn, Muslim Judge Killed, Muslim Jew, Muslim Kufi, Muslim Koran, Muslim Kosher, Muslim Kissing Prank, Muslim Kid, Muslim Kids Tv, Muslim Kaaba, Muslim Kicked Off Plane, Muslim Killed, Muslim Kid Clock, Muslim League, Muslim League Definition, Muslim Language, Muslim Leader, Muslim Law, Muslim Last Names, Muslim Legal Fund, Muslim Logo, Muslim Lady, Muslim Leadership Initiative, Muslim Memes, Muslim Mosque, Muslim Marriage, Muslim Matrimonial, Muslim Man, Muslim Men, Muslim Majority Countries, Muslim Music, Muslim Meaning, Muslim March, Muslim Names, Muslim Names For Boys, Muslim Names For Girls, Muslim News, Muslim Nba Players, Muslim No Go Zones, Muslim Noises, Muslim No Go Zones Usa, Muslim Nations, Muslim Nail Polish, Muslim Outfit, Muslim Organizations In Chicago, Muslim Origin, Muslim Orange Is The New Black, Muslim Oils, Muslim Organizations, Muslim Official, Muslim Or Moslem, Muslim Opinion Polls, Muslim Or Islamic, Muslim Prayer, Muslim Population, Muslim Population In Usa, Muslim Pro, Muslim Prayer Times, Muslim Prayer Times Chicago, Muslim Population In The World, Muslim People, Muslim Prayer Beads, Muslim Priest, Muslim Quotes, Muslim Quran, Muslim Quarter, Muslim Queen, Muslim Quote Of The Day, Muslim Questions, Muslim Quarter Xian, Muslim Quizlet, Muslim Quiz, Muslim Quotes In Arabic, Muslim Religion, Muslim Rappers, Muslim Rules, Muslim Refugees, Muslim Registry, Muslim Race, Muslim Reform Movement, Muslim Rituals, Muslim Religion Basics, Muslim Restaurant Near Me, Muslim Symbol, Muslim Swimwear, Muslim Shower, Muslim Sects, Muslim Scarf, Muslim Superhero, Muslim Stereotypes, Muslim Spirit, Muslim Slave Trade, Muslim Sayings, Muslim Travel Ban, Muslim Turban, Muslim Temple, Muslim Terrorist Attacks, Muslim Traditions, Muslim Tattoos, Muslim Tinder, Muslim Terrorist Groups, Muslim Topi, Muslim Translation, Muslim Us Soldier, Muslim Ummah, Muslim Uk, Muslim Universities, Muslim Umbrella, Muslim Urban Dictionary, Muslim Us Population, Muslim University In America, Muslim Ummah Of North America, Muslim Umbrella Meme, Muslim Vs Islam, Muslim Veil, Muslim Vs Sikh, Muslim Vs Moslem, Muslim Virgins, Muslim Values, Muslim Vs Indian, Muslim Vs Jew, Muslim Vs Islamist, Muslim View Of Jesus, Muslim Women, Muslim Wedding, Muslim Woman, Muslim Women Dress, Muslim Wedding Dresses, Muslim World, Muslim Words, Muslim World Population, Muslim Women Names, Muslim Wedding Invitations, Muslim Xenophobia, Muslim X-men Artist, Muslim Xinjiang, Muslim X-men Artist Fired, Muslim Xmas, Muslim Xi, Muslim Xian, Muslim Xbox. Com, Muslim Xi Football, Muslim Xplore, Muslim Year, Muslim Youtubers, Muslim Youth, Muslim Youth Camp, Muslim Yamaka, Muslim Year 2017, Muslim Youth Of North America, Muslim Yogurt, Muslim Yoga, Muslim Yelling, Muslim Zakat, Muslim Zionist, Muslim Zion, Muslim Zoology, Muslim Zones In London, Muslim Zon, Muslim Zones, Muslim Zion Pakistan As A Political Idea, Muslim Zina, Muslim Zodiac Signs

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, FBI *, PUBLIC INTELLIGENCE, TERRORISM August 18, 2015July 6, 2021 11 Minutes

Unveiled – FBI Cyber Division Private Industry Notification on #OpIsrael

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

FBI-AntiIsraeliHacktivists

 

FBI Cyber Division Private Industry Notification

  • PIN 150330-001
  • 3 pages
  • TLP: GREEN
  • March 30, 2015

Download

As of early March 2015, several extremist hacking groups indicated they would participate in a forthcoming operation, #OpIsrael, which will target Israeli and Jewish Web sites. The FBI assesses members of at least two extremist hacking groups are currently recruiting participants for the second anniversary of the operation, which started on 7 April 2013, and coincides with Holocaust Remembrance Day. These groups, typically located in the Middle East and North Africa, routinely conduct pro-extremist, anti-Israeli, and anti-Western cyber operations.

While the threat to US-based infrastructure is assessed as low for well-maintained and updated systems, the FBI is using the Private Industry Notification (PIN) as a method of notifying possible targeted entities.

FBI and private cybersecurity industry analysis of previous extremist hacker campaigns and operations indicate these groups are capable of low-level Distributed Denial of Service (DDoS)1 attacks and Web site defacements. The most likely targets for the campaign are Israel-based systems or the systems of worldwide Jewish-oriented organizations like synagogues or cultural centers. Based on historical targeting preferences, the attackers will likely focus primarily on Israeli financial institutions, but may also target Israeli media outlets.

Given the perceived connections between the Government of Israel and Israeli financial institutions, and those of the United States, #OpIsrael participants may also shift their operations to target vulnerable US-based financial targets or Jewish-oriented organizations within the United States. Based on historical attacks, the FBI assesses that attacks which may spawn from #OpIsrael to target US-based systems will likely constitute only a small percentage of overall activity.

The FBI assesses Web site defacements are the most likely method by which #OpIsrael participants will be successful against their targets. While most Web sites maintain up-to-date content management software, the ease with which attackers can exploit known or un-patched vulnerabilities makes this the more likely vector. Sites which maintain updated systems will not likely be impacted by defacement operations.
The FBI assesses most DDoS attempts made by #OpIsrael actors will have little to no effect on targeted Web sites, due to traditionally disorganized attacks, and existing DDoS mitigation measures in-place by potential victims. Historically, anti-Israel DDoS operations have failed to gain significant traction given competing priorities for the groups and individuals involved, and the limited number of participants who could organize to conduct successful DDoS campaigns.

Defense

In general, extremist hacktivism cyber attacks may result in denial of service, defacement of a Web site, and compromise of sensitive information, which may lead to harassment and identity theft. Precautionary measures to mitigate a range of potential extremist hacktivism cyber threats include:

– Implement a data back-up and recovery plan to maintain copies of sensitive or proprietary data in a separate and secure location. Backup copies of sensitive data should not be readily accessible from local networks.
– Scrutinize links contained in email attachments.
– Regularly mirror and maintain an image of critical system files.
– Encrypt and secure sensitive information.
– Use strong passwords, implement a schedule for changing passwords frequently, and avoid reusing passwords for multiple accounts.
– Enable network monitoring and logging where feasible.
– Be aware of social engineering tactics aimed at obtaining sensitive information.
– Securely eliminate sensitive files and data from hard drives when no longer needed or required.
– Establish a relationship with local law enforcement and participate in IT security information sharing groups for early warning of threats.

Go back

Your message has been sent

Warning
Warning
Warning
Warning

Warning.

Fbi Most Wanted, Fbi Jobs, Fbi Director, Fbi Salary, Fbi Agent, Fbi Background Check, Fbi Agent Salary, Fbi Headquarters, Fbi Special Agent, Fbi Internships, Fbi Agent, Fbi Agent Salary, Fbi Academy, Fbi Application, Fbi Analyst, Fbi Atlanta, Fbi Agent Jobs, Fbi Anon, Fbi Address, Fbi Arrests, Fbi Background Check, Fbi Badge, Fbi Bau, Fbi Building, Fbi Boston, Fbi Bap, Fbi Baltimore, Fbi Benefits, Fbi Budget, Fbi Building Dc, Fbi Careers, Fbi Crime Statistics, Fbi Clearance, Fbi Criminal Background Check, Fbi Chicago, Fbi Citizens Academy, Fbi Crime Statistics By Race, Fbi Contact, Fbi Channeler, Fbi Candidates, Fbi Director, Fbi Director Candidates, Fbi Director James Comey, Fbi Definition, Fbi Director Fired, Fbi Director Salary, Fbi Definition Of Terrorism, Fbi Database, Fbi Dallas, Fbi Drug Policy, Fbi Employment, Fbi Email Address, Fbi Employment Drug Policy, Fbi El Paso, Fbi Employees, Fbi Emblem, Fbi Established, Fbi Education Center, Fbi Education, Fbi Executive Branch, Fbi Fingerprinting, Fbi Files, Fbi Field Offices, Fbi Fingerprint Card, Fbi Fitness Test, Fbi Facebook, Fbi Fingerprint Check, Fbi Forensic Accountant, Fbi Foia, Fbi Founder, Fbi Glock, Fbi Games, Fbi Gov, Fbi Glassdoor, Fbi Guns, Fbi Gang List, Fbi Gun Statistics, Fbi Gif, Fbi Gift Shop, Fbi General Counsel, Fbi Headquarters, Fbi Hrt, Fbi History, Fbi Houston, Fbi Hiring, Fbi Hate Crime Statistics, Fbi Head, Fbi Hat, Fbi Honors Internship, Fbi Hotline, Fbi Internships, Fbi Investigation, Fbi Intelligence Analyst, Fbi Informant, Fbi Irt, Fbi Investigation Trump, Fbi Ic3, Fbi Infragard, Fbi Internet Fraud, Fbi Id, Fbi Jobs, Fbi Jacket, Fbi James Comey, Fbi Jurisdiction, Fbi Job Description, Fbi Jobs Apply, Fbi Jacksonville, Fbi Jade Helm, Fbi Jobs Chicago, Fbi Jackson Ms, Fbi Kansas City, Fbi Kids, Fbi Knoxville, Fbi Kidnapping, Fbi Komi, Fbi Kentucky, Fbi Killed Jfk, Fbi Kkk, Fbi Kodi, Fbi K9 Unit, Fbi Logo, Fbi Leeda, Fbi Los Angeles, Fbi Locations, Fbi Las Vegas, Fbi Leaks, Fbi Leader, Fbi Linguist, Fbi Louisville, Fbi Login, Fbi Most Wanted, Fbi Most Wanted List, Fbi Meaning, Fbi Meme, Fbi Movies, Fbi Museum, Fbi Motto, Fbi Miami, Fbi Mission Statement, Fbi Most Dangerous Cities, Fbi Number, Fbi News, Fbi National Academy, Fbi Nics, Fbi New York, Fbi New Orleans, Fbi Newark, Fbi New York Tv Show, Fbi Near Me, Fbi Nominee, Fbi Offices, Fbi Org Chart, Fbi Omaha, Fbi Operative, Fbi On Trump, Fbi Organizational Chart, Fbi Obama Meme, Fbi Obama, Fbi Oklahoma City, Fbi Office Near Me, Fbi Phone Number, Fbi Profiler, Fbi Pft, Fbi Police, Fbi Pay Scale, Fbi Phoenix, Fbi Pay, Fbi Philadelphia, Fbi Positions, Fbi Pittsburgh, Fbi Quantico, Fbi Qualifications, Fbi Q Target, Fbi Quotes, Fbi Quiz, Fbi Questions, Fbi Qr Code, Fbi Qas, Fbi Quantico Address, Fbi Quantico Tours, Fbi Requirements, Fbi Russia, Fbi Russia Investigation, Fbi Report, Fbi Ranks, Fbi Recruiting, Fbi Raid, Fbi Records, Fbi Rape Statistics, Fbi Russia Trump, Fbi Salary, Fbi Special Agent, Fbi Stands For, Fbi Swat, Fbi Special Agent Salary, Fbi Surveillance, Fbi Statistics, Fbi Sos, Fbi Surveillance Van, Fbi Seal, Fbi Training, Fbi Top Ten, Fbi Trump, Fbi Trump Russia, Fbi Tip Line, Fbi Tv Shows, Fbi Twitter, Fbi Tips, Fbi Teen Academy, Fbi Tours, Fbi Ucr, Fbi Ucr 2016, Fbi Units, Fbi Ucr 2015, Fbi Undercover, Fbi Unsolved Cases, Fbi Upin, Fbi Utah, Fbi Usa, Fbi Uniforms, Fbi Vs Cia, Fbi Vault, Fbi Virus, Fbi Vs Apple, Fbi Virtual Academy, Fbi Vehicles, Fbi Violent Crime Statistics, Fbi Virginia, Fbi Van, Fbi Van Wifi, Fbi Website, Fbi Warning, Fbi Wiki, Fbi Wanted List, Fbi Watch List, Fbi Windbreaker, Fbi Warning Screen, Fbi White Collar Crime, Fbi Warrant Search, Fbi Weapons, Fbi X Files, Fbi Xl2, Fbi Xl31, Fbi Xl4, Fbi Xl2 Programming, Fbi Xl-31 Troubleshooting, Fbi Xl 31 Installation Manual, Fbi X Files Real, Fbi Xl2t Installation Manual, Fbi Xl 1215, Fbi Yearly Salary, Fbi Youtube, Fbi Youth Academy, Fbi Youth Leadership Academy, Fbi Yellow Brick Road, Fbi Youth Programs, Fbi Yearly Budget, Fbi Youth Leadership Academy Portland, Fbi Youngstown Ohio, Fbi Yearly Income, Fbi Zodiac Killer, Fbi Zodiac, Fbi Zip Code, Fbi Zodiac Killer List, Fbi Zero Files, Fbi Zodiac List, Fbi Zodiac Signs Killer, Fbi Zhang Yingying, Fbi Zion, Fbi Zodiac Crimes, Cyber Security News, Cybersecurity Stocks, Cyber Security Jobs, Cybersecurity Definition, Cybersecurity Framework, Cybersecurity Executive Order, Cybersecurity Depaul, Cyber Security Chicago, Cyber Security Salary, Cybersecurity Certificate, Cybersecurity Act Of 2015, Cybersecurity Assessment Tool, Cyber Security Analyst, Cybersecurity Awareness Month, Cyber Security Attacks, Cybersecurity Associations, Cybersecurity Articles, Cybersecurity And Cyberwar, Cybersecurity Act, Cybersecurity Audit, Cybersecurity Basics, Cybersecurity Bootcamp, Cybersecurity Books, Cybersecurity Best Practices, Cyber Security Blogs, Cybersecurity Breach, Cyber Security Bls, Cybersecurity Breaches 2017, Cybersecurity Bachelor’s Degree, Cyber Security Business, Cyber Security Chicago, Cybersecurity Certificate, Cybersecurity Companies, Cybersecurity Careers, Cyber Security Certifications, Cybersecurity Compliance, Cybersecurity Conferences 2017, Cybersecurity Conferences, Cybersecurity Companies In Chicago, Cybersecurity Classes, Cybersecurity Definition, Cybersecurity Depaul, Cyber Security Degree, Cybersecurity Disclosure Act Of 2017, Cybersecurity Disclosure Act, Cybersecurity Demand, Cyber Security Defined, Cybersecurity Define, Cybersecurity Domains, Cyber Security Degree Online, Cybersecurity Executive Order, Cybersecurity Etf, Cybersecurity Education, Cyber Security Engineer, Cybersecurity Engineering, Cybersecurity Events, Cybersecurity Enhancement Act Of 2014, Cybersecurity Experts, Cybersecurity Ethics, Cybersecurity Executive Order Pdf, Cybersecurity Framework, Cybersecurity Firms, Cybersecurity For Medical Devices, Cybersecurity Fundamentals, Cyber Security For Dummies, Cybersecurity For Beginners, Cyber Security Facts, Cybersecurity For Beginners Pdf, Cybersecurity Forensic Analyst, Cybersecurity Fundamentals Certificate, Cybersecurity Graduate Programs, Cyber Security Games, Cybersecurity Governance, Cybersecurity Gif, Cybersecurity Growth, Cyber Security Grants, Cybersecurity Graduate Certificate, Cyber Security Glossary, Cybersecurity Guidelines, Cybersecurity Girl Scouts, Cybersecurity Healthcare, Cybersecurity High School, Cyber Security Hack, Cyber Security History, Cybersecurity Hygiene, Cyber Security Headlines, Cybersecurity Hashtags, Cybersecurity Healthcare Jobs, Cybersecurity Humor, Cyber Security Hardware, Cybersecurity Insurance, Cybersecurity International Symposium, Cybersecurity Internships, Cybersecurity Information Sharing Act, Cybersecurity Images, Cybersecurity In Healthcare, Cyber Security Infographics, Cybersecurity Information Sharing Act Of 2015, Cybersecurity Industry, Cybersecurity Issues, Cyber Security Jobs, Cyber Security Jobs Chicago, Cybersecurity Job Outlook, Cybersecurity Job Growth, Cybersecurity Job Salary, Cybersecurity Job Titles, Cybersecurity Jokes, Cybersecurity Journal, Cybersecurity Job Growth 2017, Cybersecurity Job Description, Cybersecurity Kill Chain, Cybersecurity Kpp, Cyber Security Keywords, Cyber Security Kpi, Cyber Security Knowledge Quiz, Cyber Security K-12, Cybersecurity Kill Switch, Cyber Security Kenya, Cyber Security Key, Cybersecurity Khan Academy, Cybersecurity Law, Cybersecurity Lawyer, Cybersecurity Legislation, Cybersecurity Legislation 2017, Cybersecurity Law Firms, Cyber Security Logo, Cybersecurity Law Degree, Cybersecurity Law China, Cybersecurity Legend, Cybersecurity Law China 2017, Cybersecurity Major, Cybersecurity Meme, Cybersecurity Masters, Cybersecurity Meaning, Cybersecurity Magazine, Cyber Security Month, Cybersecurity Masters Online, Cyber Security Market, Cybersecurity Metrics, Cybersecurity Management, Cyber Security News, Cybersecurity National Action Plan, Cybersecurity Newsletter, Cybersecurity Nist, Cybersecurity Nexus, Cybersecurity National Action Plan (Cnap), Cybersecurity National Security, Cyber Security Nsa, Cybersecurity New York Times, Cybersecurity Nova, Cybersecurity One Word Or Two, Cybersecurity Online Masters, Cyber Security Online Degree, Cybersecurity Operations Center, Cybersecurity Overview, Cyber Security Online, Cyber Security Operations, Cyber Security Online Course, Cyber Security Organizations, Cybersecurity Of Medical Devices, Cybersecurity Policy, Cybersecurity Programs, Cybersecurity Podcast, Cybersecurity Pay, Cybersecurity Pictures, Cybersecurity Publications, Cyber Security Phd, Cybersecurity Principles, Cybersecurity Plan, Cybersecurity Professionals, Cyber Security Questions, Cybersecurity Quotes, Cybersecurity Quiz, Cyber Security Questionnaire, Cyber Security Qualifications, Cyber Security Q&a, Cyber Security Questions To Ask, Cyber Security Quora, Cybersecurity Quiz Pdf, Cybersecurity Quantum Computing, Cybersecurity Risk Management, Cybersecurity Risk Assessment, Cybersecurity Regulations, Cybersecurity Risk, Cybersecurity Report, Cyber Security Reddit, Cybersecurity Research, Cybersecurity Risk Assessment Template, Cybersecurity Requirements For Financial Services Companies, Cyber Security Resume, Cybersecurity Stocks, Cyber Security Salary, Cybersecurity Scholarships, Cybersecurity Statistics, Cyber Security Sales, Cybersecurity Startups, Cybersecurity Shortage, Cyber Security Summit, Cybersecurity Skills, Cybersecurity Standards, Cyber Security Training, Cybersecurity Threats, Cybersecurity Terms, Cybersecurity Topics, Cyber Security Tips, Cybersecurity Trends, Cybersecurity Terminology, Cybersecurity Tools, Cybersecurity Technology, Cybersecurity Trump, Cybersecurity Universities, Cybersecurity Umuc, Cybersecurity Utica College, Cybersecurity University Of Maryland, Cyber Security University, Cyber Security Usa, Cyber Security Unit, Cybersecurity Usf, Cybersecurity Ufc, Cyber Security Updates, Cybersecurity Ventures, Cybersecurity Vs Cyber Security, Cyber Security Vs Information Security, Cybersecurity Ventures 500, Cybersecurity Vulnerabilities, Cyber Security Video, Cybersecurity Vocabulary, Cybersecurity Vs Computer Security, Cybersecurity Venture Capital, Cybersecurity Vulnerability Assessment, Cybersecurity Wiki, Cybersecurity Workforce, Cybersecurity Wright College, Cybersecurity Wallpaper, Cybersecurity Workforce Framework, Cybersecurity Workforce Shortage, Cybersecurity Webinar, Cybersecurity Words, Cyber Security Websites, Cybersecurity White House, Cybersecurity Xprize, Cyber Security Xls, Xkcd Cyber Security, Fidelis Cybersecurity Xps, Cybersecurity Framework Xls, Obama Xi Cyber Security, Tedx Cyber Security, President Xi Cyber Security, Cybersecurity Youtube, Cybersecurity Youtube Channels, Cybersecurity Year In Review, Cybersecurity- You’re Already Compromised, Cybersecurity Year In Review 2015, Cyber Security Yahoo, Cyber Security Video Youtube, Year Up Cybersecurity, Yokogawa Cyber Security, Youtube Cyber Security Training, Zurich Cyber Security, Cyber Security Zero Day, Cyber Security Za, Cyber Security Zertifikat, Zenos Cybersecurity, Zenedge Cybersecurity, Zdnet Cyber Security, Zeus Cyber Security, Zimbabwe Cybersecurity, Cyber Security New Zealand, Israel News, Israel Map, Israel Flag, Israel Keyes, Israel Houghton, Israel Kamakawiwo’ole, Israel Palestine, Israel Population, Israel Houghton Kids, Israel Capital, Israel And Palestine, Israel Airlines, Israel Abbreviation, Israel Airport, Israel Apartheid, Israeli Army, Israel Anti Boycott Act, Israel Allies, Israel And Syria, Israel And New Breed, Israel Bonds, Israel Broussard, Israel Birthright, Israel Bombs Syria, Israel Borders, Israel Bombing, Israel Boone, Israel Beaches, Israel Baseball Hat, Israeli Border Wall, Israel Capital, Israel Continent, Israel Country Code, Israel Consulate Chicago, Israeli Couscous, Israel Climate, Israel Cities, Israel Conflict, Israel Capital City, Israel Coins, Israel Del Toro, Israel Definition, Israel Defense Forces, Israel Duffus, Israel Demographics, Israel Desert, Israel Diamonds, Israel Discount Bank, Israel Desalination, Israel Declares Independence, Israel Englander, Israel Egypt War, Israel Exports, Israel Established, Israel Experts, Israel Egypt, Israeli Embassy, Israel Etf, Israel Enemies, Israel Education, Israel Flag, Israel Facts, Israel Founded, Israel Flag Emoji, Israeli Food, Israel Fun Facts, Israel Flights, Israel Finkelstein, Israel Free Spirit, Israel Flag Meaning, Israel Government, Israel Gdp, Israel Geography, Israel Gdp Per Capita, Israel God, Israel Gutierrez, Israel Gross, Israel Gonzalez, Israel Gun Laws, Israel Gaza, Israel Houghton, Israel Houghton Kids, Israel History, Israel Hands, Israel Hayom, Israel Houghton Songs, Israel Holidays, Israel Hodish, Israel Houghton You Are Good, Israel Houghton Wedding, Israel Iz Kamakawiwo\u02bbole, Israel Independence Day, Israel Independence, Israel Iron Dome, Israel In Hebrew, Israel Isis, Israel In The Bible, Israel Iran, Israel India, Israel Idonije, Israel Jerusalem, Israel Jewish, Israel Jordan, Israel Jewish Population, Israel Jimenez, Israel Jesus, Israel Jobs, Israel Jacob, Israel Jewelry, Israel Juarbe, Israel Keyes, Israel Kamakawiwo’ole, Israel Kamakawiwo’ole Wife, Israel Kamakawiwo’ole Songs, Israel Kamakawiwo’ole Somewhere Over The Rainbow, Israel Kristal, Israel Kali A K, Israel Kibbutz, Israel Kamakawiwo’ole Over The Rainbow, Israel Kamakawiwo’ole Net Worth, Israel Language, Israel Location, Israel Local Time, Israel Leader, Israel Liberzon, Israel Landscape, Israel Life Expectancy, Israel Literacy Rate, Israel Lebanon, Israel Lebanon War, Israel Map, Israel Meaning, Israel Museum, Israel Money, Israel Movie, Israel Music, Israel Middle East, Israel My Glory, Israel Meme, Israeli Military, Israel News, Israel Name Meaning, Israel National News, Israel National Anthem, Israel News Live, Israel Nash, Israel News Today, Israel Natural Resources, Israel Nukes, Israel Name, Israel On Map, Israel Of God, Israel Outdoors, Israel On World Map, Israel Official Language, Israel On The House, Israel Oil, Israel Or Palestine, Israel Outline, Israel Outlet, Israel Palestine, Israel Population, Israel Palestine Map, Israel Putnam, Israel Post, Israeli Prime Ministers, Israel Palestine Conflict Timeline, Israel Pictures, Israel Population 2017, Israel Pakistan, Israel Quotes, Israel Quizlet, Israel Qatar, Israel Quest, Israel Qatar Relations, Israel Quiz, Israel Questions, Israel Queen, Israel Quality Of Life, Israel Quest Reviews, Israel Religion, Israel Russia, Israel Regardie, Israel Real Estate, Israel Rodriguez, Israel Rose, Israel Radio, Israel Region, Israel Resources, Israel Railways, Israel Syria, Israel Settlements, Israel Size, Israel Somewhere Over The Rainbow, Israel Six Day War, Israel Square Miles, Israel Supports Isis, Israel Saudi Arabia, Israel Symbols, Israel Shamir, Israel Time, Israel Time Now, Israel Tours, Israel Travel, Israel Today, Israel Tourism, Israel Trump, Israel Trip, Israel Third Temple, Israel Timeline, Israel United In Christ, Israel Us Relations, Israel Update, Israel United In Christ Videos, Israel Un, Israel Unlimited, Israel Unemployment Rate, Israel Us Embassy, Israel Universal Health Care, Israel University, Israel Vs Palestine, Israel Vibration, Israel Video Network, Israel Vacation, Israel Visa, Israel Vs Iran, Israel Vaccinations, Israel Visa Requirements, Israel Vs Syria, Israel Vs Judah, Israel Wall, Israel World Baseball Classic, Israel Weather, Israel War, Israeli Women, Israel World Baseball Classic Roster, Israel Wikipedia, Israel World Map, Israel West Bank, Israel Western Wall, Israel X Factor, Israel Xp, Israeli X95, Israel X Factor 2016, Israel X, Israel X Factor 2017, Israeli X, Israel X Factor Judges, Israel Xbmc, Israel X Band Radar, Israel Youtube, Israel Year Of Independence, Israel Year, Israel Y Palestina, Israel Yad Vashem, Israel Yemen, Israel Young, Israel Y Moises, Israel Youtube Channel, Israel Yearly Weather, Israel Zangwill, Israel Zip Code, Israel Zamora, Israel Zin River, Israel Zionist, Israel Zolli, Israel Z, Israel Zangwill Melting Pot, Israeli Zoo, Israel Zip Code Lookup

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, CYBERCRIME, FBI * April 16, 2015July 9, 2021 11 Minutes

Unveiled – DoJ Inspector General Report on FBI Surveillance Under FISA Section 702

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

A Review of the Federal Bureau of Investigation’s Activities Under Section 702 of the Foreign Intelligence Surveillance Act Amendments Act of 2008

  • 283 pages
  • September 2012
  • 5.6 MB

Download

 

DOJ-IG-Section702_Page_001 DOJ-IG-Section702_Page_012 DOJ-IG-Section702_Page_013 DOJ-IG-Section702_Page_014 DOJ-IG-Section702_Page_015 DOJ-IG-Section702_Page_016 DOJ-IG-Section702_Page_017 DOJ-IG-Section702_Page_018 DOJ-IG-Section702_Page_019

 

Go back

Your message has been sent

Warning
Warning
Warning
Warning

Warning.

 

Fbi Most Wanted, Fbi Jobs, Fbi Director, Fbi Salary, Fbi Agent, Fbi Background Check, Fbi Agent Salary, Fbi Headquarters, Fbi Special Agent, Fbi Internships, Fbi Agent, Fbi Agent Salary, Fbi Academy, Fbi Application, Fbi Analyst, Fbi Atlanta, Fbi Agent Jobs, Fbi Anon, Fbi Address, Fbi Arrests, Fbi Background Check, Fbi Badge, Fbi Bau, Fbi Building, Fbi Boston, Fbi Bap, Fbi Baltimore, Fbi Benefits, Fbi Budget, Fbi Building Dc, Fbi Careers, Fbi Crime Statistics, Fbi Clearance, Fbi Criminal Background Check, Fbi Chicago, Fbi Citizens Academy, Fbi Crime Statistics By Race, Fbi Contact, Fbi Channeler, Fbi Candidates, Fbi Director, Fbi Director Candidates, Fbi Director James Comey, Fbi Definition, Fbi Director Fired, Fbi Director Salary, Fbi Definition Of Terrorism, Fbi Database, Fbi Dallas, Fbi Drug Policy, Fbi Employment, Fbi Email Address, Fbi Employment Drug Policy, Fbi El Paso, Fbi Employees, Fbi Emblem, Fbi Established, Fbi Education Center, Fbi Education, Fbi Executive Branch, Fbi Fingerprinting, Fbi Files, Fbi Field Offices, Fbi Fingerprint Card, Fbi Fitness Test, Fbi Facebook, Fbi Fingerprint Check, Fbi Forensic Accountant, Fbi Foia, Fbi Founder, Fbi Glock, Fbi Games, Fbi Gov, Fbi Glassdoor, Fbi Guns, Fbi Gang List, Fbi Gun Statistics, Fbi Gif, Fbi Gift Shop, Fbi General Counsel, Fbi Headquarters, Fbi Hrt, Fbi History, Fbi Houston, Fbi Hiring, Fbi Hate Crime Statistics, Fbi Head, Fbi Hat, Fbi Honors Internship, Fbi Hotline, Fbi Internships, Fbi Investigation, Fbi Intelligence Analyst, Fbi Informant, Fbi Irt, Fbi Investigation Trump, Fbi Ic3, Fbi Infragard, Fbi Internet Fraud, Fbi Id, Fbi Jobs, Fbi Jacket, Fbi James Comey, Fbi Jurisdiction, Fbi Job Description, Fbi Jobs Apply, Fbi Jacksonville, Fbi Jade Helm, Fbi Jobs Chicago, Fbi Jackson Ms, Fbi Kansas City, Fbi Kids, Fbi Knoxville, Fbi Kidnapping, Fbi Komi, Fbi Kentucky, Fbi Killed Jfk, Fbi Kkk, Fbi Kodi, Fbi K9 Unit, Fbi Logo, Fbi Leeda, Fbi Los Angeles, Fbi Locations, Fbi Las Vegas, Fbi Leaks, Fbi Leader, Fbi Linguist, Fbi Louisville, Fbi Login, Fbi Most Wanted, Fbi Most Wanted List, Fbi Meaning, Fbi Meme, Fbi Movies, Fbi Museum, Fbi Motto, Fbi Miami, Fbi Mission Statement, Fbi Most Dangerous Cities, Fbi Number, Fbi News, Fbi National Academy, Fbi Nics, Fbi New York, Fbi New Orleans, Fbi Newark, Fbi New York Tv Show, Fbi Near Me, Fbi Nominee, Fbi Offices, Fbi Org Chart, Fbi Omaha, Fbi Operative, Fbi On Trump, Fbi Organizational Chart, Fbi Obama Meme, Fbi Obama, Fbi Oklahoma City, Fbi Office Near Me, Fbi Phone Number, Fbi Profiler, Fbi Pft, Fbi Police, Fbi Pay Scale, Fbi Phoenix, Fbi Pay, Fbi Philadelphia, Fbi Positions, Fbi Pittsburgh, Fbi Quantico, Fbi Qualifications, Fbi Q Target, Fbi Quotes, Fbi Quiz, Fbi Questions, Fbi Qr Code, Fbi Qas, Fbi Quantico Address, Fbi Quantico Tours, Fbi Requirements, Fbi Russia, Fbi Russia Investigation, Fbi Report, Fbi Ranks, Fbi Recruiting, Fbi Raid, Fbi Records, Fbi Rape Statistics, Fbi Russia Trump, Fbi Salary, Fbi Special Agent, Fbi Stands For, Fbi Swat, Fbi Special Agent Salary, Fbi Surveillance, Fbi Statistics, Fbi Sos, Fbi Surveillance Van, Fbi Seal, Fbi Training, Fbi Top Ten, Fbi Trump, Fbi Trump Russia, Fbi Tip Line, Fbi Tv Shows, Fbi Twitter, Fbi Tips, Fbi Teen Academy, Fbi Tours, Fbi Ucr, Fbi Ucr 2016, Fbi Units, Fbi Ucr 2015, Fbi Undercover, Fbi Unsolved Cases, Fbi Upin, Fbi Utah, Fbi Usa, Fbi Uniforms, Fbi Vs Cia, Fbi Vault, Fbi Virus, Fbi Vs Apple, Fbi Virtual Academy, Fbi Vehicles, Fbi Violent Crime Statistics, Fbi Virginia, Fbi Van, Fbi Van Wifi, Fbi Website, Fbi Warning, Fbi Wiki, Fbi Wanted List, Fbi Watch List, Fbi Windbreaker, Fbi Warning Screen, Fbi White Collar Crime, Fbi Warrant Search, Fbi Weapons, Fbi X Files, Fbi Xl2, Fbi Xl31, Fbi Xl4, Fbi Xl2 Programming, Fbi Xl-31 Troubleshooting, Fbi Xl 31 Installation Manual, Fbi X Files Real, Fbi Xl2t Installation Manual, Fbi Xl 1215, Fbi Yearly Salary, Fbi Youtube, Fbi Youth Academy, Fbi Youth Leadership Academy, Fbi Yellow Brick Road, Fbi Youth Programs, Fbi Yearly Budget, Fbi Youth Leadership Academy Portland, Fbi Youngstown Ohio, Fbi Yearly Income, Fbi Zodiac Killer, Fbi Zodiac, Fbi Zip Code, Fbi Zodiac Killer List, Fbi Zero Files, Fbi Zodiac List, Fbi Zodiac Signs Killer, Fbi Zhang Yingying, Fbi Zion, Fbi Zodiac Crimes,

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, FBI *, SECRET February 19, 2015July 11, 2021 3 Minutes

Unveiled – FBI Warns Law Enforcement of Copy Cat Attacks Following Murders of Two NYPD Officers

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

uhuuh

The FBI has issued a National Situational Information Report (NSIR) to law enforcement around the country warning of “copy cat assassinations” following the murder of two New York Police Department (NYPD) officers in December. The report, which was issued days before Christmas and posted online by a lodge of the Chicago Fraternal Order of Police, states that the “recent murders of New York City Police Officers Wenjian Liu and Rafael Ramos have spawned numerous threats” against law enforcement personnel. The report states that Ismaaiyl Brinsley, the man who reportedly shot the two NYPD officers, claimed to be part of a nationwide group planning to kill police officers:

“As of November 2014, USPER Ismaaiyl Brinsley, responsible for the shooting of two New York City Police officers on 20 December 2014, claimed to be a member of an unidentified group that was “going to get a lot of cops in Florida, Las Vegas, and California for New Year’s.” Ismaaiyl Brinsley also discussed travel plans via Amtrak with two other individuals known as “Larry” and FNU LNU (NFI) [First Name Unknown Last Name Unknown (No Further Information)].”

Brinsley, who was initially identified in the media as a member of the national prison gang the Black Guerrilla Family, was later said to have no connection to the gang. However, the day before the murders were committed, the Baltimore FBI office issued a bulletin stating that they had received “reliable information” that members of the gang were planning to target white law enforcement officers to “send a message.” The FBI NSIR mentions this as well as information that indicates the “Heartless Felons Gang, an Ohio street gang, gave its members orders to kill white police officers in the Cleveland area to avenge black lives taken by white police officers.”

Several online threats against law enforcement are also documented in the FBI NSIR including statements made by a man on the East Orange New Jersey Police Department’s Google plus page that he wanted to kill law enforcement officers. The Department of Homeland Security questioned another man at his home in Memphis, Tennessee after he posted online that he was “heading to New York City to kill two more police officers.” The man allegedly wrote “Good Job #F-K12 Kill em all i’m on my way to NY now #shootthepolice 2 more going down tomorrow.” No charges were ultimately filed as the man stated he was intoxicated when he wrote the post.

The FBI NSIR also includes a YouTube comment made by a man later identified as Jeremiah Perez of Colorado Springs:

“SINCE DARREN WILSON our group has killed 6 retired sheriffs and cops……because of this event we will hunt two more in colorado this week…..for every innocent citizen that cops kill WE, VETERANS WILL KILL RETIRED HELPLESS COPS……..we already started and MORE TO COME NOW…….join us and kill any cop or any retired cop !!!!!!! MORE PEOPLE HAVE BEEN KILLED SINCE THE PROTEST !!! THEY DONT CARE, SO NOW REAL HEROS WILL HUNT THEM ALL !!! fuck ISIS, COPS ARE THE REAL ENEMIES OF FREEDOM LOVING AMERICANS and TIME TO STRIKE BACK IN ALL OUT WAR IS NOW !!”

The comment ultimately led to the man’s arrest on federal charges under 18 USC §875, using interstate communications to convey threats of injury against an individual. A criminal complaint written against Perez and posted on the Department of Justice’s website states that the FBI was alerted to Perez’s comment after Google voluntarily notified law enforcement because of the comment’s threatening content. The complaint includes the entire notice provided to the FBI by Google, which states that “based on the content of a post/comment to a YouTube video on Google Plus Social Media, Google Inc. believes that there presently exists an emergency involving imminent death or serious bodily injury to a person or persons, and that immediate disclosure to you of certain information is required to avert the emergency.” After obtaining a search warrant based on the IP address provided by Google, the FBI seized Perez’s computer and interviewed him. He admitted posting the comments and stated that his comments “were the result of misplaced frustration and a way of experimenting with words.”

Forensic examination conducted by the FBI of Perez’s computer revealed a number of other posts to YouTube and other websites using the screen name “Vets Hunting Cops,” including searches that were conducted for the following terms:

“Kill Sara Palin, Kill Barack Obama, Kill Cory Gardner, Kill Darren Wilson, Find and Kill Darren Wilson, Kill Fox Pundints, Fox News Headquarters, Kill Fox News Racist, Kill Bill O’Reilly, Fox News Headquarters gets bombed, Someone Kill Fox News, Kill the Cops, Beaver Creek City Police Department, How to Find Somebody on YouTube, How to Find Somebody’s IP Address Through YouTube, Kill Ted Cruz, Kill M itch McConnell, Calls to Assassinate GOP Leaders, Google Maps for Fox News Headquarters, Hunt Darren Wilson’s Family, St. Louis Police Officer’s Association, Darren Wilson Prosecutor, Locate Bill O’Reilly’s house.”

Perez reportedly admitted to FBI agents that he had conducted the searches, but said that he had no intention of following through with the actions he was researching. Perez now faces up to five years in prison.

Go back

Your message has been sent

Warning
Warning
Warning
Warning

Warning.

Fbi Most Wanted, Fbi Jobs, Fbi Director, Fbi Salary, Fbi Agent, Fbi Background Check, Fbi Agent Salary, Fbi Headquarters, Fbi Special Agent, Fbi Internships, Fbi Agent, Fbi Agent Salary, Fbi Academy, Fbi Application, Fbi Analyst, Fbi Atlanta, Fbi Agent Jobs, Fbi Anon, Fbi Address, Fbi Arrests, Fbi Background Check, Fbi Badge, Fbi Bau, Fbi Building, Fbi Boston, Fbi Bap, Fbi Baltimore, Fbi Benefits, Fbi Budget, Fbi Building Dc, Fbi Careers, Fbi Crime Statistics, Fbi Clearance, Fbi Criminal Background Check, Fbi Chicago, Fbi Citizens Academy, Fbi Crime Statistics By Race, Fbi Contact, Fbi Channeler, Fbi Candidates, Fbi Director, Fbi Director Candidates, Fbi Director James Comey, Fbi Definition, Fbi Director Fired, Fbi Director Salary, Fbi Definition Of Terrorism, Fbi Database, Fbi Dallas, Fbi Drug Policy, Fbi Employment, Fbi Email Address, Fbi Employment Drug Policy, Fbi El Paso, Fbi Employees, Fbi Emblem, Fbi Established, Fbi Education Center, Fbi Education, Fbi Executive Branch, Fbi Fingerprinting, Fbi Files, Fbi Field Offices, Fbi Fingerprint Card, Fbi Fitness Test, Fbi Facebook, Fbi Fingerprint Check, Fbi Forensic Accountant, Fbi Foia, Fbi Founder, Fbi Glock, Fbi Games, Fbi Gov, Fbi Glassdoor, Fbi Guns, Fbi Gang List, Fbi Gun Statistics, Fbi Gif, Fbi Gift Shop, Fbi General Counsel, Fbi Headquarters, Fbi Hrt, Fbi History, Fbi Houston, Fbi Hiring, Fbi Hate Crime Statistics, Fbi Head, Fbi Hat, Fbi Honors Internship, Fbi Hotline, Fbi Internships, Fbi Investigation, Fbi Intelligence Analyst, Fbi Informant, Fbi Irt, Fbi Investigation Trump, Fbi Ic3, Fbi Infragard, Fbi Internet Fraud, Fbi Id, Fbi Jobs, Fbi Jacket, Fbi James Comey, Fbi Jurisdiction, Fbi Job Description, Fbi Jobs Apply, Fbi Jacksonville, Fbi Jade Helm, Fbi Jobs Chicago, Fbi Jackson Ms, Fbi Kansas City, Fbi Kids, Fbi Knoxville, Fbi Kidnapping, Fbi Komi, Fbi Kentucky, Fbi Killed Jfk, Fbi Kkk, Fbi Kodi, Fbi K9 Unit, Fbi Logo, Fbi Leeda, Fbi Los Angeles, Fbi Locations, Fbi Las Vegas, Fbi Leaks, Fbi Leader, Fbi Linguist, Fbi Louisville, Fbi Login, Fbi Most Wanted, Fbi Most Wanted List, Fbi Meaning, Fbi Meme, Fbi Movies, Fbi Museum, Fbi Motto, Fbi Miami, Fbi Mission Statement, Fbi Most Dangerous Cities, Fbi Number, Fbi News, Fbi National Academy, Fbi Nics, Fbi New York, Fbi New Orleans, Fbi Newark, Fbi New York Tv Show, Fbi Near Me, Fbi Nominee, Fbi Offices, Fbi Org Chart, Fbi Omaha, Fbi Operative, Fbi On Trump, Fbi Organizational Chart, Fbi Obama Meme, Fbi Obama, Fbi Oklahoma City, Fbi Office Near Me, Fbi Phone Number, Fbi Profiler, Fbi Pft, Fbi Police, Fbi Pay Scale, Fbi Phoenix, Fbi Pay, Fbi Philadelphia, Fbi Positions, Fbi Pittsburgh, Fbi Quantico, Fbi Qualifications, Fbi Q Target, Fbi Quotes, Fbi Quiz, Fbi Questions, Fbi Qr Code, Fbi Qas, Fbi Quantico Address, Fbi Quantico Tours, Fbi Requirements, Fbi Russia, Fbi Russia Investigation, Fbi Report, Fbi Ranks, Fbi Recruiting, Fbi Raid, Fbi Records, Fbi Rape Statistics, Fbi Russia Trump, Fbi Salary, Fbi Special Agent, Fbi Stands For, Fbi Swat, Fbi Special Agent Salary, Fbi Surveillance, Fbi Statistics, Fbi Sos, Fbi Surveillance Van, Fbi Seal, Fbi Training, Fbi Top Ten, Fbi Trump, Fbi Trump Russia, Fbi Tip Line, Fbi Tv Shows, Fbi Twitter, Fbi Tips, Fbi Teen Academy, Fbi Tours, Fbi Ucr, Fbi Ucr 2016, Fbi Units, Fbi Ucr 2015, Fbi Undercover, Fbi Unsolved Cases, Fbi Upin, Fbi Utah, Fbi Usa, Fbi Uniforms, Fbi Vs Cia, Fbi Vault, Fbi Virus, Fbi Vs Apple, Fbi Virtual Academy, Fbi Vehicles, Fbi Violent Crime Statistics, Fbi Virginia, Fbi Van, Fbi Van Wifi, Fbi Website, Fbi Warning, Fbi Wiki, Fbi Wanted List, Fbi Watch List, Fbi Windbreaker, Fbi Warning Screen, Fbi White Collar Crime, Fbi Warrant Search, Fbi Weapons, Fbi X Files, Fbi Xl2, Fbi Xl31, Fbi Xl4, Fbi Xl2 Programming, Fbi Xl-31 Troubleshooting, Fbi Xl 31 Installation Manual, Fbi X Files Real, Fbi Xl2t Installation Manual, Fbi Xl 1215, Fbi Yearly Salary, Fbi Youtube, Fbi Youth Academy, Fbi Youth Leadership Academy, Fbi Yellow Brick Road, Fbi Youth Programs, Fbi Yearly Budget, Fbi Youth Leadership Academy Portland, Fbi Youngstown Ohio, Fbi Yearly Income, Fbi Zodiac Killer, Fbi Zodiac, Fbi Zip Code, Fbi Zodiac Killer List, Fbi Zero Files, Fbi Zodiac List, Fbi Zodiac Signs Killer, Fbi Zhang Yingying, Fbi Zion, Fbi Zodiac Crimes,

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, FBI * January 20, 2015July 12, 2021 6 Minutes

PI – FBI Cyber Division Bulletin

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

FBI-CargoThievesGPS

FBI Cyber Division Private Industry Notification

  • 4 pages
  • TLP: GREEN
  • October 2, 2014

Download

(U) This Private Industry Notification (PIN) highlights the use of Global Positioning Systems (GPS) jammers by criminals to thwart law enforcement response and investigation into cargo thefts in the United States. Since at least February 2012, various law enforcement and private sector partners have reported that GPS tracking devices have been jammed by criminals engaged in nefarious activity including cargo theft and illicit shipping of goods. Although banned by federal law, the jammers are readily available over the Internet and easy to employ.

(U) GPS Jammers are Small and Unobtrusive

(U) GPS jammers are transmitters that block tracking devices from acquiring GPS broadcast signals by transmitting electromagnetic interference (noise) on the same frequency. They come in many shapes and sizes, with varying capabilities. Plugged into a standard cigarette lighter jack, a small jammer (pictured right) operating in the vehicle will disrupt GPS logging or GPS tracking systems for a radius of up to five yards. Mid-sized and larger jammers typically block a combination of GPS, cellphone, Wi-Fi, and other signals and thus also prevent the tracker from wirelessly reporting any location or status data. In a test conducted by a federal law enforcement agency, GPS jamming devices were determined to be effective to approximately 65 feet. A large GPS jammer can disrupt any tracking device or receiver within a radius of several hundred yards.

Cargo Theft Groups Employ Jammers to Mask GPS Tracking Devices

(U) Auto thieves shipping vehicles to China used GPS jammers placed in shipping containers in an attempt to thwart tracking of the containers, according to July 2014 information from the National Insurance Crime Bureau. In 46 reported incidents, the thieves placed one or more GPS jammers in cargo containers with stolen automobiles. The devices were made in China and could be bought for approximately $14.00 over the internet. The use of the GPS jammers was an apparent attempt by thieves to thwart the tracking of the shipping containers.

(U) Cargo thieves in North Florida used GPS jammers with a stolen refrigerated trailer containing a temperature controlled shipment, according to a July 2014 report from the Pharmaceutical Cargo Security Coalition. In this incident, the hauling tractors were swapped out by the cargo thieves. The Miami based suspects were ultimately stopped and apprehended by the Florida Highway Patrol in mid-Florida on a routine vehicle stop; the shipment was recovered intact. Discovered, hidden inside of the trailer’s refrigerator unit, were portable GPS jamming devices hooked unobtrusively to a battery located inside the unit. The trailer, although not equipped with a visible GPS tracking device, was treated by the thieves as if there were a device on or in the trailer. It is reasonable to believe that the individuals who planted the jammer felt that there may have been a tracking device secreted somewhere inside the shipment and used the GPS jammer to thwart the tracking of the shipment.

(U) Sales and Use of Jamming Devices is Illegal in the United States

(U) Federal law prohibits the marketing, sale, importation, or use of a transmitter (e.g., a jammer) designed to block, jam, or interfere with wireless communications. The Federal Communications Commission (FCC) has issued Enforcement Advisories and has also ordered numerous online retailers to stop selling signal jamming devices. A retailer that receives a second warning could face a fine of up to $16,000 for each day on which a jammer was illegally marketed, up to a maximum of $122,500. The FCC has also issued actions with substantial fines against individuals caught operating these devices within U.S. territory. Jammers, which are sometimes used to avoid cell phone distractions or evade surveillance, could produce “disastrous consequences by precluding the use of cell phones to reach life-saving 9-1-1 services provided by police, ambulance, and fire departments,” according to the FCC. Though a limited exception exists for use by authorized federal agencies, jammers have no lawful consumer use. Accordingly, mere possession of a jammer with intent to violate federal law may subject the device to seizure.

Go back

Your message has been sent

Warning
Warning
Warning
Warning

Warning.

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, CYBER-STASI, CYBERCRIME, FBI * December 15, 2014July 12, 2021 3 Minutes

Revealed – FBI Warns of Hacktivist Threats Following U.S. Airstrikes

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

A twitter account

The FBI Cyber Division has issued a notification to private industry and law enforcement to be aware of the potential for retaliatory cyber attacks following recent U.S. military actions in the Middle East. While the FBI has “no information at this time to indicate specific cyber threats to US networks or infrastructure in response to ongoing US military air strikes against the terrorist group known as the Islamic State of Iraq and the Levant (ISIL)” the bulletin states that the FBI believes that “extremist hackers and hacktivist groups, including but not limited to those aligned with the ISIL ideology, will continue to threaten and may attempt offensive cyber actions against the United States in response to perceived or actual US military operations in Iraq or Syria.”

The bulletin titled “Threat of Cyberterrorist and Hacktivist Activity in Response to US Military Actions in the Middle East” was released last Wednesday and is based on “recent, nonspecific, and probably aspirational threats made on social media platforms to carry out cyber as well as physical attacks in response to the US military presence in the Middle East.” The bulletin, which was obtained by Public Intelligence, states that “Middle East-based hacktivist groups and extremist cyber actors have previously targeted US commercial and government Web sites in response to a range of US military actions and foreign policy positions” using tactics such as “Cross Site Scripting (XSS), Structured Query Language (SQL) Injection, and TCP/UDP Flooding for defacement and DDoS attacks.” According to the FBI, web site defacements “conducted by these actors will likely contain messages expressing support for ISIL, and/or contain imagery such as the black ISIL flag or graphic imagery, e.g., pictures or videos of ISIL executions.”

Previous examples of hacktivist attacks motivated by U.S. military actions are included in the bulletin including an incident in May 2014 in which the “Tunisian Hackers Team threatened Distributed Denial of Service (DDoS) attacks against the US financial sector unless US military forces were withdrawn from presumed-Islamic lands.” The bulletin also cites numerous threatening posts on Twitter and identifies several accounts that have expressed support for ISIL, some of which have even provided guidance on tools that could potentially be used in a cyber attack.  One particularly interesting example cited in the bulletin is the case of Junaid Hussain, a British man who pleaded guilty in 2012 to charges related to the hacking of an email account connected with former Prime Minister Tony Blair.  Hussain, who was just sixteen at the time the hacking occurred, was involved in the compromise of a Gmail account used by Blair’s adviser Katie Kay and later posted private contact information obtained from the account.  As part of the hacking group TeaMp0isoN, Hussain also participated in an attack that flooded the the U.K.’s national anti-terror hotline with automated calls, including some prank calls that are still available on YouTube.  After serving six months in a youth detention facility, Hussain was arrested on suspicion of “violent disorder” in late 2013 and while on bail fled to Syria with a 24-year-old rapper named Abdel-Majed Abdel Bary.  He is now reportedly fighting with ISIL and goes by the name Abu Hussain Al Britani.  A Twitter account reportedly operated by Hussain features a profile photo depicting him pointing an AK-47 at the camera and a bio that reads “random British mujahid somewhere in the Islamic State.”

jihad-tweets

Several recent law enforcement bulletins issued by the Department of Homeland Security and local fusion centers have warned about online threats made by supporters of ISIL. A joint DHS-FBI intelligence bulletin from August 22, 2014 obtained by Fox News warned that following the “start of US military air strikes on 8 August against the ISIL in Iraq, ISIL supporters launched a Twitter campaign threatening retaliatory violence against the Homeland and US interests overseas.” The bulletin went on to say that social media is increasingly being used by ISIL supporters to encourage violent attacks on U.S. interests. Another fusion center bulletin from early July, also obtained by Fox News, cited specific tweets threatening the lives of U.S. military personnel. One tweet from a British jihadist cited in the bulletin reportedly instructed supporters to use LinkedIn and Facebook to look up information on U.S. service members prior to staging attacks: “You could literally search for soldiers, find their town, photos of them, look for address in Yellowbook or something. Then show up and slaughter them.”

While no specific plots have been identified, online threats against U.S. service members are evidently credible enough to warrant a response from the U.S. Army.  The Army Threat Integration Center (ARTIC) issued a special assessment on Thursday warning soldiers about the threat posed by the “Islamic State of Iraq and the Levant (ISIL), its supporters, those swayed by radical Islam, and lone offenders with the intent or inclination to act on ISIL’s behalf.”  Given the “continued rhetoric being issued by ISIL’s media services and supporters through various social media platforms,” the assessment states that ARTIC is concerned of the possibility of attacks conducted against U.S. military personnel and their families:

Over the past year, ISIL has threatened violence against the United States and US interests overseas in response to ongoing counterterrorism pressure. Following the start of US air strikes in Iraq in early August 2014, and then Syria in late September 2014, ISIL supporters launched a Twitter campaign threatening retaliatory violence against the United States. Additionally, a recent audio message from an ISIL spokesman called, for the first time, for lone offender attacks in the Homeland in retaliation for US military operations in Iraq and Syria.

The assessment includes tips on basic home security precautions that service members should take to protect against an individual “conducting an attack while you or your family members are home.”  These tips include using the “peephole before opening the door to anyone” and not opening the door to “solicitors or strangers.”

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, CONFIDENTIAL, CYBERCRIME, FBI *, INTERNET CRIME September 29, 2014July 12, 2021 4 Minutes

Unveiled – Department of Justice Review of FBI Use of National Security Letters

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

The following report on the FBI’s use of national security letters (NSL) from 2007-2009 was released in August by the Department of Justice.

DoJ-NationalSecurityLetters-2007-2009

A Review of the Federal Bureau of Investigation’s Use of National Security Letters: Assessment of Progress in Implementing Recommendations and Examination of Use in 2007 through 2009

  • 232 pages
  • August 2014

Download

This review is a follow-up to three previous OIG reports concerning the FBI’s use of national security letter authorities. In our first and second NSL reports, issued in March 2007 and March 2008, the OIG found repeated instances of the FBI’s misuse of NSL authorities during 2003 through 2006. During our first NSL review we also discovered the FBI’s practice of issuing exigent letters and using other informal methods to obtain telephone records, instead of using NSLs or other legal process. We addressed these practices in a separate report issued in January 2010.

In this follow-up review, the OIG examined three topic areas. First, we assessed the current status of the FBI and the Department’s implementation of the recommendations made in our prior NSL reports, which covered the FBI’s use of NSLs during calendar years 2003 through 2006. Second, we examined the FBI’s use of NSLs during calendar years 2007, 2008, and 2009. This examination included an assessment of whether corrective measures taken by the FBI and the Department in response to the findings and recommendations of our first and second NSL reports resulted in improved compliance with NSL requirements. Third, we examined the current status of the FBI and the Department’s efforts to implement the recommendations made in our prior Exigent Letters Report.

We concluded that the FBI and the Department have devoted considerable resources toward implementing the recommendations made in our past reports and taking additional measures to improve the FBI’s compliance with NSL requirements. Our review demonstrated that these efforts have resulted in substantial improvement in NSL compliance.

We believe that the corrective measures that have had the greatest impact on the FBI’s compliance with NSL authorities are the development and consolidation of NSL policy and guidance in the Comprehensive NSL Guidance EC and later the DIOG; the mandatory training provided to NSL users and approvers; the implementation of the NSL subsystem; and the periodic inspections of NSL use by the FBI Inspection Division and the national security review teams.

We determined that the FBI and the Department have fully implemented 23 of 28 recommendations from our first and second NSL reports by creating new internal controls, providing guidance and training to FBI personnel, establishing new record-keeping practices, and conducting periodic reviews of NSL usage.

Nevertheless, five recommendations from our first and second NSL reports require additional effort and attention from the FBI to address the accuracy of information entered into the NSL subsystem and the FBI’s record-keeping practices. We will consider whether to close these recommendations after the FBI provides additional information or takes the additional steps described in more detail in Chapter Two.

Our review found that during 2007 through 2009 the FBI issued significantly fewer NSL requests than during 2003 through 2006. During 2007 through 2009, the FBI issued 111,144 NSL requests, with an annual average of 37,048. By comparison, the FBI issued approximately 51,051 NSLs per year between 2004 and 2006, and approximately 48,125 NSL requests per year between 2003 and 2006. The factors that may have contributed to the decrease in the FBI’s NSL use during 2007 through 2009 are not self-evident from the data we reviewed, though a few people at the FBI told us that because of increased scrutiny on NSL use agents employed alternative investigative tools when possible. The Department’s most recent semiannual classified reports to Congress indicate that the FBI’s use of NSLs returned to historically typical numbers after 2009.

We found that the vast majority of NSL requests issued during 2007 through 2009 sought telephone and electronic records under the ECPA. We also found that the FBI issued a majority of its NSL requests in furtherance of counterterrorism investigations and a significant number in furtherance of counterintelligence investigations. The FBI issued substantially fewer requests in furtherance of foreign computer intrusion cyber investigations.

Well more than half of the FBI’s NSL requests in 2007 through 2009 were generated from investigations of U.S. persons: 12,818, or 64 percent, in 2007; 18,447, or 74 percent, in 2008; and 13,515, or 63 percent, in 2009. This data indicates that the shift reported in our second NSL review toward more NSL requests generated from investigations of U.S. persons as compared to non-U.S. persons- from 39 percent in 2003 to 57 percent in 2006- continued in 2007 through 2009.

…

national-security-letters-2003-2011

Share this:

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, PUBLIC INTELLIGENCE, SECRET September 1, 2014July 13, 2021 3 Minutes

Revealed – FBI Law Enforcement National Data Exchange Contains 223 Million Records

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Public Intelligence

The Law Enforcement National Data Exchange (N-DEx) run by the FBI Criminal Justice Information Services (CJIS) Division now contains approximately 223 million records on nearly two billion entities.  An FBI CJIS presentation from February 2014 posted on the website of the Integrated Justice Information Systems Institute includes detailed information on state and local data contributors including a tally of the total number of records contributed by state.

The FBI describes N-DEx as “a mechanism for sharing, searching, linking, and analyzing information across jurisdictional boundaries” including “incident and case reports, booking and incarceration data, and parole/probation information.”  Sypherlink, contractor involved in implementing N-DEx data sharing around the country, describes the system as being able to detect “relationships between people, vehicle/property, location, and/or crime characteristics.”  Slides from the February 2014 N-DEx presentation indicate that at least 34 states are contributing data to the system with Texas, Arkansas, California, Virginia and Tennessee each providing at least ten million records.  Texas has contributed more than any other state, adding more than 68 million records to the system, nearly three times its nearest competitor.  Federal agencies have added another 23 million records to the system.  According to an updated listing of N-DEx data contributors listed in the presentation, federal and state contributions amount to more than 191 million records in total.  However, other slides in the presentation brag that their are “approximately 223 million records” on “nearly 2 billion entities” stored in N-DEx.  It is unclear where the more than 30 million records not contributed by states and federal agencies listed in the presentation are obtained from.

A privacy impact assessment issued by the FBI in January 2007 stated that “during initial deployment” it was “estimated that the number of records in the N-DEx may be approximately 30-35 million records.”  In an article for Police Chief Magazine, a N-DEx “outreach liaison” stated that the system had “more than 145 million records” in November 2012 and “one billion searchable entities.”  N-DEx program manager Michael Haas stated in a October 2013 interview with Computer World that he hoped future developments will make the system a “gateway for access to other CJIS databases, including the division’s Next Generation Identification system, an updated version of its Integrated Automated Fingerprint Identification System database that contains wanted lists and arrest warrants, criminal histories, fingerprints, palm prints, facial images and other biometric data used for identification purposes.”  The FBI Next Generation Identification system, which has been in development for several years, promises to offer law enforcement around the country the ability to use facial recognition software and other tools to automatically search through vast troves of biometric data to identify suspects and conduct investigations.  Haas also said that the growth of the system has been expanding because CJIS has encouraged “states to submit records from prosecutions, court records, corrections, probation and other related areas” so that in addition to the “incident information” already added to the system, N-DEx will begin to obtain more data over time on “pretrial investigations, warrants, supervised release details, citations, field interviews and incarceration information.”

N-DEx Data Contributors Listed By State

Alabama 1,420,223 Maine 12,497 Pennsylvania 513,349
Alaska Maryland 226,110 Rhode Island
Arizona 126,165 Massachusetts South Carolina
Arkansas 24,153,042 Michigan 2,393,851 South Dakota 133,794
California 20,393,280 Minnesota 18 Tennessee 10,971,501
Colorado 184,338 Mississippi  44,830 Texas 68,793,268
Connecticut Missouri 141,658 Utah 16,654
D.C. 962,356 Montana Vermont
Delaware 1,085,708 Nebraska 173,877 Virginia 10,342,356
Florida Nevada  276 Washington 8,520,754
Georgia 1,020,907 New Hampshire West Virginia 34,578
Hawaii New Jersey Wisconsin 154,401
Idaho 578,174 New Mexico 35,076 Wyoming
Illinois 4,515,553 New York 1,189,118
Indiana 108,715 North Carolina State 168,569,227
Iowa North Dakota Federal 23,005,381
Kansas 2,108,188 Ohio 5,564,883
Kentucky 1,637,232 Oklahoma
Louisiana Oregon 1,012,497 Total 191,574,608

FBI-NDex-Overview_Page_31

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, CONFIDENTIAL, FBI * July 22, 2014July 15, 2021 3 Minutes

Revealed – FBI Notifications: Malicious Cyber Actors Targeting U.S. Government Networks and Employees

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

The following bulletins were released in late May by the FBI to private industry partners and discuss attempts by malicious cyber actors to exploit government and private industry networks and employees, including their family members, using targeted campaigns involving false personas on various social media platforms.  The bulletins were originally posted on the website of The Security Awareness Company.

FBI Cyber Division Private Industry Notification 3 pages May 29, 2014 Download
FBI Liaison Alert System #M-000031-PH 3 pages May 29, 2014 Download

(U) Law enforcement has become aware that foreign cyber adversaries are utilizing popular social network sites to assess, target and successfully conduct computer network exploitation activities against:

  • US federal, state and local government and private academic and industry networks
  • Individual employees of US federal, state and local government and private academic and industries
  • Family members and personal and/or professional associates of these employees and private citizens with high visibility
  • It is advised that industry use due diligence to inform and educate their associates on the vulnerabilities associated with the use of social networking sites.

…

(U) The FBI and NCIS believe a group of cyber actors have been using various social networking sites to conduct spear phishing activities since at least 2011. FBI and NCIS investigation to date has uncovered 56 unique Facebook personas, 16 domains, and a group of IP addresses associated with these actors. These personas typically would attempt to befriend specific types of individuals such as government, military, or cleared defense contractor personnel. After establishing an online friendship the actor would send a malicious link (usually through one of the associated domains) to the victim, either through e-mail or in a chat on the social networking site eventually compromising the target’s computer. While this FLASH specifically deals with Facebook personas, it is believed that many of these personas also maintain a presence on other social networking sites such as LinkedIn, Google +, and Twitter which are just as malicious. This group of cyber actors also has created and maintained multiple malicious Web sites, often spoofing a legitimate Web site and implanting malicious links into the actor’s version of the Web site.

TECHNICAL DETAILS

(U) Based on investigative efforts, the FBI and NCIS believe the following names and Facebook User IDs (FBUID) are associated with fake personas and are involved in spear phishing activities on Facebook and additional social networking sites:

Abby Wilson
FBUID 100001249857290
Abraham Gomez
FBUID 100001545932069
Adia Mitchell
FBUID 100003299460070
Alfred Nilsson
FBUID 100004842848351
Alice Nilsson
FBUID 100004672090339
Alice Taylor
FBUID 100002924701430
Amanda Teyson
FBUID 100004718351670
Barbara White
FBUID 100002477442501
Berna Nani Achando FBUID 100003744333197 Brian Gibson
FBUID 100003911053827
David Williams
FBUID 100001537364844
Delia Carlsen
FBUID 100001476095681
Donnie Eadense
FBUID 103773899813841
Dorotha Baasch
FBUID 100005436935593
Elizabeth Anderson FBUID 100002725315556 Gina McCarron
FBUID 100002199199861
Heida Wagner
FBUID 100001511282747
Jane Baker (Ava T. Foster) FBUID 100007144985923 Jeann Maclkin
FBUID 100003591027097
Jinny Beyer
FBUID 100004052511791
John Molavi
FBUID 100001700742641
Joseph Nilsson
FBUID 100004530097827
Josh Nilsson (Josh Furie) FBUID 100004516801118 Justin Snyder
FBUID 100001450033215
Kendrick Babcock
FBUID 100006297457628
Mahnaz Rahami
FBUID 100001342226413
Mahsa Handyani
FBUID 100001429057324
Marine Johnson
FBUID 100003795818292
Mark Blyth
FBUID 100002866859249
Mary Cole
FBUID 100006363725699
Medhi Betterekoon FBUID 100002348575647 Mehdi Rastegar
FBUID 100001483627448
Mehdi Sharooz
FBUID 100002200349173
Michelle Hagerman FBUID 100002420632572 Mina Kasayi
FBUID 100001881978783
Nancy William
FBUID 100001739552330
Natasha Lovsky
FBUID 100001778948301
Nilofar Shorabi
FBUID 100001924237927
Olivia Johnson
FBUID 100002864097606
Painfuol Strick
FBUID 100002396473189
Rad Alborz
FBUID 1431218901
Reza Salimi
FBUID 100004568527560
Rozita Farhang
FBUID 100001317388321
Sandra Maler
FBUID 100006345461158
Sandy Laughlin
FBUID 100001223376364
Sara Afsoon
FBUID 100001667363382
Sara McKibben
FBUID 100007150052891
Sharon Wilson
FBUID 100002474596665
Sheida Zamani
FBUID 100001867145251
Simin Rahnama
FBUID 100001837158118
Susan Thomas
FBUID 100003080928027
Thomas Clausen
FBUID 100001560125984
Tim Caochoo
FBUID 100001777117063
Tina Moradi
FBUID 100002340489471
William Cooper
FBUID 100003792613688
Zainab Osman
FBUID 100002919467608

 

Domain IP address
4techspot.com 173.193.136.193
Accounts.google.com-login.mobi 184.82.8.14
199.26.84.169
Com-login.mobi 199.26.84.169
198.20.182.55
Download.updatexplore.com 46.4.213.50
192.69.208.213
Downloadcenter.mcafeea.com 184.82.167.203
Eyeleo.com-login.mobi 199.26.84.169
Flycenter.ir 74.116.84.123
Fun4us.us 174.37.172.68
199.26.84.143
199.26.84.175
209.236.114.84
192.69.204.57
46.4.149.236
Internetexplorers.org 184.82.202.248
199.26.84.169
209.99.40.221
213.152.173.147
Login.yahoo.com-login.mobi 198.20.182.53
199.26.84.169
mcafeea.com 94.102.55.169
184.82.202.248
mediaplayercodec.net 64.130.216.21
174.37.172.68
209.99.40.219
192.69.208.213
Newsonair.org 199.26.84.143
Update.mcafeea.com 46.4.149.236
46.4.190.235
91.109.17.16
91.109.17.48
192.69.204.57
213.152.173.147
Updatexplore.com 70.168.71.240
Youtube.com-login.mobi 94.23.116.228
199.26.84.169

(U) The following IP addresses have also been identified as associated with these actors:

141.255.161.171
198.20.182.55

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, CYBER-STASI, FBI *, PUBLIC INTELLIGENCE June 25, 2014July 16, 2021 3 Minutes

Unveiled – FBI Chinese Military Hacking Indictments Private Industry Notification

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

FBI-ChineseIndictmentAlert-1_Page_1

FBI Private Industry Notification: The United States Indicts Five Chinese Cyber Actors for Cyber Espionage May 19, 2014  3 pages Download
FBI Liaison Alert System #A-000030-TT May 19, 2014  2 pages Download

(U) The FBI is providing the following information with HIGH confidence. Today the Western District of Pennsylvania unsealed an indictment naming five members of the People’s Liberation Army of the People’s Republic of China on 31 counts, including conspiring to commit computer fraud (18 U.S.C. §§ 371, 1030), accessing a computer without authorization for the purpose of commercial advantage and private financial gain (18 U.S.C. § 1030(a)(2)(C), (c)(2)(B)), damaging computers through the transmission of code and commands (18 U.S.C. § 1030(a)(5)), aggravated identity theft (18 U.S.C. § 1028A), economic espionage (18 U.S.C. § 1831(a)(1)), and theft of trade secrets (18 U.S.C. § 1832(a)(1)). Each of the defendants provided his individual expertise to a conspiracy to penetrate the computer networks of six US companies while those companies were engaged in negotiations or joint ventures with or were pursuing legal action against state-owned enterprises in China. The following technical details are indicators released in the indictment related to these actors’ activity.

(U) For additional details on the Indictment, please refer to FBI Private Industry Notification 140519 – 002 and/or the Department of Justice’s Press release.

TECHNICAL DETAILS

(U) The aforementioned actors have used the following usernames/monikers, domain names and malware to conduct cyber espionage against US companies. The FBI is distributing the indicators associated with these actors for awareness and to enable network defense activities. The FBI has high confidence in these indicators.

(U) The following usernames are associated with the indicted actors:

  • Jack Wang
  • Uglygorilla
  • Jack Sun
  • Winxyhappy
  • Win_XY
  • Lao Wen
  • Hzy_lhx
  • KandyGoo

(U) The following domains/domain accounts are associated with the indicted actors and connected to malicious cyber activity:

  • Financeanalysis.com (dns.diy.net)
  • gmailboxes.com (dns.diy.net)
  • busketball.com (dns.diy.net)
  • arrowservice.net (eNom.com) – owned
  • bigish.net (dns.diy.net)
  • finekl.bigish.net
  • businessconsults.net (eNom.com) owned
  • businessformars.com (eNom.com)
  • marsbrother.com (eNom.com) owned
  • purpledaily.com (eNom.com) owned
  • klwest.purpledaily.com
  • newsonet.net (eNom.com) owned
  • comrepair.com (dns.diy.net)
  • oplaymagzine.com (dns.diy.net)
  • hugesoft.org (namecheap.com)

(U) The following malicious software/hacking tools have been associated with the indicted actors:

  • agenda.zip
  • wiam.exe
  • ccapp.exe
  • gu.exe
  • ugls.exe
  • i.exe

(U) The following file name has been associated with exfiltration/data theft conducted by the indicted actors:

  • wd.rar

 

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH June 9, 2014July 16, 2021 2 Minutes

Warning – FBI Cyber Division Bulletin: Increased Cyber Intrusions

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

FBI Cyber Division Bulletin: Health Care Systems and Medical Devices at Risk for Increased Cyber Intrusions

FBI-HealthCareCyberIntrusions

Health Care Systems and Medical Devices at Risk for Increased Cyber Intrusions for Financial Gain

  • 2 pages
  • April 8, 2014

Download

(U) Cyber actors will likely increase cyber intrusions against health care systems—to include medical devices—due to mandatory transition from paper to electronic health records (EHR), lax cybersecurity standards, and a higher financial payout for medical records in the black market.

(U) The deadline to transition to EHR is January 2015, which will create an influx of new EHR coupled with more medical devices being connected to the Internet, generating a rich new environment for cyber criminals to exploit. According to open source reporting from SANS, Ponemon, and EMC²/RSA, the health care industry is not technically prepared to combat against cyber criminals’ basic cyber intrusion tactics, techniques and procedures (TTPs), much less against more advanced persistent threats (APTs). The health care industry is not as resilient to cyber intrusions compared to the financial and retail sectors, therefore the possibility of increased cyber intrusions is likely.

(U) A SANS report dated February 2014, indicates health care security strategies and practices are poorly protected and ill-equipped to handle new cyber threats exposing patient medical records, billing and payment organizations, and intellectual property. Data analysis revealed multiple devices (e.g., radiology imaging software, digital video systems, faxes, printers) and security application systems (e.g., Virtual Private Networks (VPN), firewalls, and routers) were compromised. Once medical devices are compromised, malicious traffic is transmitted through VPNs and firewalls. The biggest vulnerability was the perception of IT health care professionals’ beliefs that their current perimeter defenses and compliance strategies were working when clearly the data states otherwise.

(U) According to a Ponemon Institute report dated March 2013, 63% of the health care organizations surveyed reported a data breach in the past two years with an average monetary loss of $2.4 million per data breach. The majority of each data breach resulted in the theft of information assets. Lastly, 45% reported that their organizations have not implemented security measures to protect patient information.

(U) An EMC²/RSA White Paper published in 2013 indicated that in the first half of 2013, over two million health care records were compromised, which was 31% of all reported data breaches. Cyber criminals are selling the information on the black market at a rate of $50 for each partial EHR, compared to $1 for a stolen social security number or credit card number. EHR can then be used to file fraudulent insurance claims, obtain prescription medication, and advance identity theft. EHR theft is also more difficult to detect, taking almost twice as long as normal identity theft.

(U) Reporting Notice

(U) The FBI encourages recipients of this document to report information concerning suspicious or criminal activity to the local FBI field office. The FBI’s 24/7 Strategic Information and Operations Center can be reached by telephone at 202-323-3300 or by e-mail at SIOC@ic.fbi.gov. FBI regional phone numbers can be found online at https://www.fbi.gov/contact/fo/fo.htm. When available, each report submitted should include the date, time, location, type of activity, number of people, and type of equipment used for the activity, the name of the submitting company or organization, and a designated point of contact.

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, CYBER-STASI, FBI *, PUBLIC INTELLIGENCE May 8, 2014July 16, 2021 2 Minutes

SECRET – FBI Counterintelligence Vulnerability Assessment for Corporate America

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

The following document was obtained from the website of a Colorado affiliate of the the National Defense Industrial Association.

FBI-CorporateAmericaCI

COUNTERINTELLIGENCE VULNERABILITY ASSESSMENT FOR CORPORATE AMERICA

  • 10 pages
  • For Official Use Only
  • September 18, 2009
  • 5.4 MB

Download

To prevent foreign entities from achieving their goals, a Counterintelligence Program (CIP) proactively searches for and uses information from multiple sources. An effective CIP draws information from security programs and other internal systems, as well as from the U.S. Intelligence Community (USIC). Once this information is assembled, an effective CIP develops a coherent picture and crafts a strategy to prevent the foreign entity from successfully achieving its goals and minimizes the damage already done. An effective CIP conducts active analysis of available information, requires annual CI education for all employees, and provides a system for immediate referral of behavior with CI implications.

THE ESSENTIAL ELEMENTS OF A CI PROGRAM INCLUDES:

• A central entity accountable for executing the program company-wide
o Reporting structure for all CI personnel
o Liaisons with the USIC and/or US Government (USG) project sponsors

• Recognition of the Insider Threat potential
o High value and unique access personnel are identified and briefed
o A system exists to identify patterned behavior with possible CI implications
o Liaisons with the FBI when possible espionage activity is identified

• Recognition of the Foreign Threat potential
o Liaisons with the FBIIUSG to discuss the foreign governments, organizations, and competitors who are targeting technologies and information owned/used by the company.

• Integration of CI and Information Technology (IT)
o Trip wires exist to recognize anomalies with CI implications
o CI and IT personnel work closely on network architecture and security, including cyber attacks, intrusions, and suspicious incidents.

• Valuable Partnerships
o Internal and external liaisons with the USIC

• Training
o CI training is required and tailored to specific programs and positions

EFFECTIVE CI PROGRAMS RECOGNIZE:

• The CI discipline and Security discipline are different and unique
• All personnel require CI awareness and certain employees require special awareness training
• A strong link between IT security and CI is essential in the global workplace
• The company can improve its protection through relationships with the USIC and USG

…

ELEMENTS OF THE INSIDER THREAT

Despite multiple layers of protection “insiders” have proven to be the most effective penetration tool for foreign governments and intelligence services. Insiders betray their company for a number of reasons, including money, revenge or ideology. While all employees are potentially an insider threat, not all warrant the same level of CI precautions. All employees should have a basic CI awareness, but beyond that an effective program identifies personnel who are of high value to the company or possess unique access within the company for additional CI awareness training. The baseline question for determining who is of high value or who has unique access is – what is the significance of the damage that will occur if this person were recruited by a foreign government or competitor?

High value and unique access personnel:

• Are critical to project success
• Are associated with critical programs
• Have access to critical internal systems or technologies
• If compromised, could significantly impact National Security (intelligence or military programs) or the company’s economic viability

A system to identify and document suspicious activity by persons who:

• Inquire above their security clearance
• Access sensitive information during odd hours
• Query and/or collect unusually large amounts of information
• Ask questions about projects they are not involved with
• Are patterned in their suspicious behavior

Categories of conduct that may be exploitable for the purpose of coercion may include:

• The loss of security clearance
• Financial anomalies
• Disciplinary action and dismissals
• Unreported contacts with foreign nationals
• Unauthorized access to secure systems
• Marked changes in behavior

A comprehensive and centralized personnel information system should include:

• Data on clearance level
• Foreign travel
• Regular business contact with foreign nationals
• Disciplinary actions
• Arrests or police incident records
• Exploitable conduct allegations
• Security infractions or withdrawal of a clearance
• Other information that contributes to a comprehensive picture of the employee.

…

ELEMENTS OF Cl-INFORMATION TECHNOLOGY SECURITY

A successful CIP addresses the cyber-bome threat to a company’s information, technologies, and personnel. The company uses information technology (IT) tools to augment the CI program, especially in addressing the insider threat.

The virtual cyber world significantly expands access to sensitive information for the public at large, foreign intelligence services, foreign competitors, and the “insider.” As a result, the partnership between IT security and CI is crucial to fully protect sensitive information while providing access to those who need it. This protection/access balance is significantly strengthened by a CI trained cyber security cadre who interact with the CI Program Manager and other CI personnel in a mutually beneficial way. This begins with an understanding of the difference between traditional IT security (secure passwords, security plans, vulnerability scanning, etc.) and cyber security with a CI focus (intrusion detection systems placed on sensitive and classified networks, vulnerability scanning for repeated high vulnerabilities in certain machines or those associated with certain high value individuals).

Beneficial IT information includes:

• Intrusion attempts
• Unsolicited email from threat countries
• Hits on web sites
• Anomalous activity on the internal network

The CIP can collate the IT information with other available information including:

• Visitors from threat countries
• Foreign travel
• Employees with access to sensitive information
• Knowledge of entities targeting the company’s information

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, CYBERCRIME, FBI *, FINANCE INDUSTRY, SECRET, SPIES March 11, 2014July 18, 2021 4 Minutes

Public Intelligence – FBI Checklist for Reporting Economic Espionage or Theft of Trade Secrets

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Checklist for Reporting an Economic Espionage or Theft of Trade Secrets Offense

  • 4 pages

Download

If you or your company have become the victim of a theft of trade secrets or economic espionage offense, fill out the information below and contact a federal law enforcement official to report the offense.

Background and Contact Information

1. Victim’s Name
2. Primary Location and Address
3. Nature of Primary Business
4. Law Enforcement Contact

Description of the Trade Secret

5. Generally describe the trade secret (e.g., source code, formula)
6. Provide an estimated value of the trade secret identifying ONE of the methods and indicating ONE of the ranges listed below

Method:

_Cost to Develop the Trade Secret;
_Acquisition Cost (identify date and source of acquisition); or
_Fair Market Value if sold

Estimated Value:
_Under $50,000;
_Between $50,000 and $100,000;
_Between $100,000 and $1 million;
_Between $1 million and $5 million; or
_Over $5 million

7. Identify a person knowledgeable about valuation, including that person’s contact information.
8. Identify why the item or information is valued as a trade secret. What makes it unique?
9. Does the trade secret have dual application (i.e. civilian and military use)? If so, identify how?
10. Is the trade secret export controlled? If so, identify the reason or regulation?
11. To what extent is the trade secret, or parts of it, publically available or ascertained?

General Physical Measures Taken to Protect the Trade Secret

12. Describe the general physical security precautions taken by the company, such as fencing the perimeter of the premises, visitor control systems, using alarming or self-locking doors or hiring security personnel.
13. Has the company established physical barriers to prevent unauthorized viewing or access to the trade secret, such as “Authorized Personnel Only” signs at access points? (For computer-stored trade secrets see below.)
14. Does the company require sign in/out procedures for access to and return of trade secret materials?
15. Are employees required to wear identification badges?
16. How many employees have access to the trade secret?
17. Was access to the trade secret limited to a “need to know” basis?
18. Does the company have a written security policy?

(a) How are employees advised of the security policy?
(b) Are employees required to sign a written acknowledgment of the security policy?
(c) Identify the person most knowledgeable about matters relating to the security policy, including title and contact information.

Confidentiality and Non-Disclosure Agreements

19. Does the company enter into confidentiality and non-disclosure agreements with employees and third-parties concerning the trade secret?
20. Has the company established and distributed written confidentiality policies to all employees?
21. Does the company have a policy for advising company employees regarding the company’s trade secrets?

Computer-Stored Trade Secrets

22. If the trade secret is computer source code or other computer-stored information, how is access regulated (e.g., are employees given unique user names and passwords)?
23. If the company stores the trade secret on a computer network, is the network protected by a firewall?
24. Is remote access permitted into the computer network?
25. Is the trade secret maintained on a separate computer server?
26. Does the company prohibit employees from bringing outside computer programs or storage media to the premises?
27. Does the company maintain electronic access records such as computer logs?

Document Control

28. If the trade secret consisted of documents, were they clearly marked “CONFIDENTIAL” or “PROPRIETARY”?
29. Describe the document control procedures employed by the company such as limiting access, sign in/out policies, and utilizing cover sheets.
30. Was there a written policy concerning document control procedures, and if so, how were employees advised of it?
31. Identify the person most knowledgeable about the document control procedures, including title and contact information.

Employee Controls

32. Are new employees subject to a background investigation?
33. Does the company hold “exit interviews” to remind departing employees of their obligation not to disclose trade secrets?
34. Does the company track personal foreign travel of its employees and provide threat briefings/debriefings?
35. Does the company have a reporting policy for foreign contacts of its employees?

Description of the Theft of Trade Secret

36. Identify the name(s) or location(s) of possible suspects, including name, phone number, email address, physical address, employer, and reason for suspicion.
37. Was the trade secret stolen to benefit a third party, such as a competitor or another business? If so, identify that business and its location.
38. Do you have any information that the theft of trade secrets was committed to benefit a foreign government or instrumentality of a foreign government? If so, identify the foreign government and describe that information.
39. If the suspect is a current or former employee, describe all confidentiality and non-disclosure agreements in effect.
40. Identify any physical locations tied to the theft of trade secret, such as where it may be currently stored or used.
41. If you have conducted an internal investigation into the theft or counterfeiting activities, please describe any evidence acquired.

Civil Enforcement Proceedings

42. Has a dvil enforcement action been filed against the suspects identified above?

(a) If so, identify the following:

Name of court and case number:
Date of filing:
Names of attorneys:
Status of case:

(b) If not, is a dvil action contemplated? What type and when?

43. Please provide any information concerning the suspected crime not described above that you believe might assist law enforcement.

Related Material From the Archive:

  1. White House Strategy on Mitigating the Theft of U.S. Trade Secrets
  2. (U//FOUO) DHS-FBI Suspicious Activity Reporting Bulletin: Theft/Loss/Diversion
  3. (U//LES) FBI Pre-Deployment Checklist for Cyber Investigations
  4. (U//FOUO) DHS-FBI Suspicious Activity Reporting Bulletin: Testing of Cybersecurity
  5. (U//FOUO) FBI Counterintelligence Vulnerability Assessment for Corporate America
  6. (U//FOUO) DHS-FBI Suspicious Activity Reporting Bulletin: Terrorists Eliciting Information
  7. Obama Administration Intellectual Property Enforcement Legislative Recommendations White Paper
  8. FBI Warns of Cyber Espionage Targeting the Aviation Industry

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, CYBERCRIME, FBI *, PUBLIC INTELLIGENCE March 11, 2014July 18, 2021 4 Minutes

SECRET-DHS-FBI Bulletin: Improvised Explosive Device Concealed in Human Remains

 

ROLL CALL RELEASE

  • 1 page
  • For Official Use Only
  • May 24, 2013

Download

(U//FOUO) In January 2013, insurgents in India placed improvised explosive devices (IEDs) in the bodies of two police officers who were killed during an ambush; these devices probably were designed to target first responders, medical personnel, and medical facilities.

(U) One of the IEDs detonated on-site, killing four civilians who were involved in recovery operations and the other IED was discovered by physicians during post-mortem inspection. The IED triggering mechanism in the second body contained both a pressure-sensitive switch and light-activated switch designed to initiate the IED when it was exposed to direct light.

(U//FOUO) Indian medical personnel were able to avoid detonation of the device when they noticed and acted on suspicious indicators. First responders encountering human remains may want to consider the following indicators, which could indicate the presence of an IED:

— (U) Unusual or fresh—possibly still bleeding or seeping—incisions accompanied by crude stitching.
— (U) Signs of post-mortem incisions or stitching.
— (U) The presence of IED related materials or hoax/actual devices in conjunction with an intact set of human remains.
— (U) A corpse placed in a manner/location requiring responders to immediately remove them from the encountered position/location.
— (U) Abnormal bloating or swelling of the body.
— (U) Foreign objects protruding from the body.

(U//FOUO) Although this concealment method has not been encountered in the Homeland and we have no indication at this time that violent extremists here are considering its use, we note the incident received broad English-language media coverage overseas, which could prompt technically-competent violent extremists to consider adopting the tactic.

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, FBI *, SECRET, TERRORISM February 21, 2014December 25, 2017 1 Minute

SECRET . DHS-FBI-NCTC Bulletin: Building Security Measures May Hinder Emergency Response Efforts

Building Security Measures May Impact Emergency Response to Attacks by Violent Extremists

  • 1 page
  • For Official Use Only
  • December 6, 2013

Download

(U//FOUO) Facility security measures, such as interior control points or exterior barriers, may require first responders to adjust normal protocols and procedures to operate rapidly during emergencies. The timeline below is an overview of attacks and plots against US-based facilities with varying levels of security. The diversity of tactics and targets used underscores the need for interagency exercises and training that incorporates multiple scenarios to account for building security measures likely to be encountered.

(U) First Responder Response Considerations:

(U//FOUO) Conducting periodic exercises with building authorities and interagency partners will help responders tailor a coordinated response to the unique security characteristics of the site
and increase efficiency during an emergency. Engagement with partners may address a number of issues including:

»» (U//FOUO) Building emergency response plans that identify the key staff members to assist and advise first responders as well as their roles and responsibilities during crisis;
»» (U//FOUO) Interior building control points which may limit responder access to areas and affect the rapid deployment of tools and equipment;
»» (U//FOUO) Building access control systems: the availability of master keys or swipe cards to provide full access and/or entry into restricted areas;
»» (U//FOUO) The existence of exterior building security measures which may affect the placement of response vehicles or the ability to ventilate building and rescue victims;
»» (U//FOUO) Closed circuit television (CCTV) monitors to maintain situational awareness and to assist with accountability and evacuation of building occupants; and
»» (U//FOUO) Suspicious activity reporting training to building staff and tenants to help identify and disrupt potential preoperational activity or actual attacks.

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, FBI *, SECRET, THE NATIONAL SECURITY AGENCY (NSA) February 20, 2014December 25, 2017 1 Minute

SECRET – DHS-FBI-NCTC Bulletin: Extortion Schemes Use Telephony-Based Denial-of-Service Attacks

Roll Call Release

  • 1 page
  • For Official Use Only
  • February 6, 2014

Download

(U//FOUO) Since at least January 2012, criminals are using telephony-based denial-of-service (TDoS) combined with extortion scams to phone an employee’s office and demand the employee repay an alleged loan. If the victim does not comply, the criminals initiate TDoS attacks against the employer’s phone numbers. TDoS uses automated calling programs—similar to those used by telemarketers—to prevent victims from making or receiving calls. Recent examples include the following:

» (U//FOUO) According to DHS reporting, between 28 January and 3 March 2013, the public safety answering point for a south-central region sheriff’s office received a call demanding repayment of a loan for an unknown individual. A TDoS attack followed this request, disrupting the non-emergency business lines.

» (U) The US Coast Guard (USCG) in late May 2013 reported that an individual called a USCG cutter claiming to have a legal matter to discuss with a crewmember. The subsequent TDoS attack flooded the ship’s telephone network with several rounds of TDoS phone calls, completely disrupting phone service.

(U//FOUO) For more information on TDoS scams, please reference Homeland Security Note “(U//FOUO) Cyber Criminals Combine Tactics for Extortion;” this product is available by searching on HSIN Intel or CI Home at https://hsin.dhs.gov.

(U) What to do During a TDoS Event:

» (U) Do NOT make any payments, but DO record all phone numbers and payment instructions.
» (U) If practical, save the voice recordings of suspect calls—before, during, and after the TDoS events.
» (U) If the caller is demanding a payment, attempt to capture the following information: start and stop times of calls and number of calls per day; phone numbers and caller ID information; instructions regarding how to pay, such as account number or callback number.
» (U) Attempt to separate the affected phone number from other critical trunks.

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, CYBERCRIME, INTERNET CRIME February 16, 2014December 25, 2017 1 Minute

TOP-SECRET-DHS-FBI Bulletin: Use of the Internet for Attack Planning

http://publicintelligence.net/dhs-fbi-internet-attack-planning/

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, PUBLIC INTELLIGENCE August 28, 2013March 18, 2018 1 Minute

Film – Was CIA Chief John Brennan Behind Journalist’s Murder?

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, CIA, JOURNALISM, MURDER OF JOURNALISTS AND TRUTHSEEKERS August 24, 2013March 18, 2018 1 Minute

TOP-SECRET – DHS-FBI Report: Idaho Man Arrested for Providing Material Support to Islamic Movement of Uzbekistan

https://publicintelligence.net/wp-content/uploads/2013/06/DHS-FBI-IdahoExtremist.png

 

Idaho-based Individual Arrested for Providing Material Support to a Designated Terrorist Group

  • 3 pages
  • For Official Use Only
  • May 16, 2013

Download

(U//FOUO) This Joint Intelligence Bulletin (JIB) provides information on the 16 May 2013 arrest of Idaho-based Uzbekistan national Fazliddin Kurbanov by the FBI Boise Joint Terrorism Task Force (JTTF). On 16 May, Kurbanov was charged under two indictments alleging terrorism, one each in the United States District Court, District of Idaho and United States District Court, District of Utah. FBI and DHS are providing this information to support their respective activities and to assist federal, state, local, tribal, and territorial government counterterrorism and law enforcement officials and the private sector in deterring, preventing, or disrupting terrorist attacks against the United States. All events described in this JIB are taken from the criminal indictment. The charges contained in the indictment are mere allegations. As in any criminal case, the defendant is presumed innocent until proven guilty in a court of law.

(U//FOUO) Fazliddin Kurbanov was arrested on 16 May 2013 by the FBI JTTF in Boise, Idaho, and charged in the District of Idaho with one count of conspiracy to provide “material support and resources” to terrorists, as those terms are defined in 18 U.S.C. Section 2339A; one count of conspiracy to provide “material support and resources” to a Designated Terrorist Organization, as those terms are defined in 18 U.S.C. Section 2339B; and one count of possession of an unregistered explosive/firearm, as those terms are defined in 26 U.S.C. Section 5861(d). Additionally, Kurbanov was charged in the District of Utah with one count of distribution of information relating to explosives, destructive devices, and weapons of mass destruction, as those terms are defined in 18 U.S.C. Section 842(p)(2)(A).

— (U//FOUO) The District of Idaho indictment alleges that from in or about August 2012 through May 2013, Fazliddin Kurbanov knowingly and intentionally conspired with co-conspirators to provide material support and resources to the Islamic Movement of Uzbekistan (IMU), a designated terrorist group.

— (U//FOUO) The District of Idaho indictment alleges that Fazliddin Kurbanov conspired to provide personnel, computer software, and money to the IMU, knowing that the IMU has engaged in terrorist activity and terrorism.

— (U//FOUO) The District of Idaho indictment alleges that on or about 15 November 2012, Fazliddin Kurbanov knowingly possessed a firearm not registered to him in the National Firearms Registration and Transfer Record.

— (U//FOUO) The District of Utah indictment alleges that from 14 January to 24 January 2013, Fazliddin Kurbanov knowingly taught and demonstrated the making and use of an explosive with the intent that the teaching, demonstration, and information be used for violent activity. Kurbanov showed Internet videos, provided written recipes and verbal instructions, and conducted instructional shopping trips which informed as to the construction and use of an improvised explosive device (IED).

(U//FOUO) Possible Behavioral Indicators of Pre-Operational Attack Planning

(U//FOUO) Fazliddin Kurbanov’s alleged conspiracy highlights the continued presence of US-based individuals who maintain interest in conducting homeland-based attacks. FBI and DHS encourage federal, state, local, tribal, and territorial counterterrorism officials to remain alert and immediately report suspicious activity and potential behavioral indicators of pre-operational terrorism planning activities, to include acquisition of materials and construction of explosive devices. Some of these behavioral indicators may be constitutionally protected activities and should be supported by additional facts to justify increased suspicion. No single behavioral indicator should be the sole basis for law enforcement action. The totality of behavioral indicators and other relevant circumstances should be evaluated when considering any law enforcement response or action.

(U//FOUO) Possible behavioral indicators of pre-operational attack planning include:

— (U//FOUO) Suspicious purchases of items that could be used to construct an explosive device, including hydrogen peroxide, acetone, gasoline, propane, or fertilizer;
— (U//FOUO) Unusual or prolonged interest in or attempts to gain sensitive information about security measures of personnel, entry points, peak days and hours of operation, and access controls such as alarms or locks;
— (U//FOUO) Observation of security reaction drills or procedures; multiple false alarms or fictitious emergency calls to same locations or similar venues;
— (U//FOUO) Discreet use of cameras or video recorders, sketching, or note-taking consistent with pre-operational surveillance;
— (U//FOUO) Observation of or questions about facility security measures, to include barriers, restricted areas, cameras, and intrusion detection systems; and,
— (U//FOUO) Suspicious activities in storage facilities or other areas that could be used to construct an explosive device.

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, PUBLIC INTELLIGENCE July 15, 2013March 20, 2018 3 Minutes

Revealed – DHS and FBI Bulletins on OpUSA Tools and Tactics

The following bulletins were released May 6, 2013 by the National Cybersecurity and Communications Integration Center and FBI in anticipation of the OpUSA campaign.  A DHS bulletin on the campaign was released May 2, 2013 by computer security journalist Brian Krebs.

National Cybersecurity and Communications Integration Center OpUSA: Potential Tools May 6, 2013 4 pages Download
FBI Liaison Alert System #C-000007-DD May 6, 2013 1 page Download

Multiple groups, and individual hacker handles have claimed their intent to attack U.S. websites as part of OpUSA. As seen in many hacktivist operations (Ops), willing participants have posted free tools to assist other like minded individuals in their attack efforts. Often, more coordinated attacks will name a specific tool, target, day and time for the attack. That has not been the case for OpUSA thus far. Individual hacker groups seem to be conducting attacks independently, each claiming responsibility for individual defacements and data breaches that have supposedly recently taken place. Below you will find some of the tools being posted in conversations about OpUSA and links to US-CERT sites which provide background on the vulnerabilities exploited by these tools as well as mitigation advice for computer network defense actions.

Structured Query Language (SQL) injection

The following is a sampling of tools being offered to willing members interested in using SQL attacks during OpUSA.

  • Havij: Automates SQL Injection attacks. It allows the attacker to ‘fingerprint’ the database, retrieve Database Management System users and password hashes, dump tables and columns, retrieve specific data from the database, run SQL statements, and access the underlying file system and execute commands on the operating system.
  • SQL Poison: This exploit scanner tool incorporates automated Google Dorking methods to look for SQL vulnerabilities. Once the vulnerability is discovered, it performs an SQL injection attack.

The following US-CERT advisories offer further information:

  • US-CERT SQL Injection: http://www.us-cert.gov/security-publications/sql-injection
  • US-CERT Securing Your Web Browser: http://www.us-cert.gov/publications/securing-your-web-browser

Distributed Denial of Service (DDoS)

DDoS tools are often used by hacktivist so users may voluntary botnets. These are a list of the available DDoS tools via Open Source:

  • Low Orbit Ion Cannon (LOIC): Floods servers with TCP or UDP packets with the intention of disrupting service.
  • High Orbit Ion Cannon (HOIC): Can attack as many as 256 sites simultaneously and can target subdirectories of the main page using “booster packs” that enable traffic with multiple user-agent strings, referrers, and headers.
  • HTTP Unbearable Load King (HULK): Also referred to as HULK DDoSser. Generates unique requests for each and every request generated, which bypasses caching engines and impacting the server’s load directly.
  • Slowloris: Attempts to keep multiple open connections to the target web server and keep them open as long as possible.
  • DDos Notepad: Attackers can create a simple Batchfile DDoS echo script using Notepad.
  • ByteDOS: Windows desktop DOS application that is a standalone executable file and doesn’t require any special installation on the attacking machine. It is equipped with embedded IP resolver capabilities that allow the tool to resolve IPs from domain names. It also supports SYN Flood and ICMP flood.
  • Turbinas: Also referred to as VOLKS TURBINAS.EXE, which are associated with Cloaked Malware group designed to evade security detection systems.
  • Syn Flood DOS: Attack in which the actor sends a number of consecutive SYN requests to a target attempting to consume server resources.
  • Jays Booter: A customized shell booter, which can be instructed to attack a specific IP for a period of time in an attempt to boot the target off of the internet. There are three types of shells: POST, GET, and SLOWORIS.
  • HTTPFlooder: Program that attempts to flood the HTTP layer through GET and POST requests.
  • TORSHAMMER: A Slow POST DOS tool written in Python. It can be run through the TOR network, which will anonymize the attacker. It can impact unprotected web-servers running Apache and IIS.
  • R.U.D.Y: Also known as R-U-Dead-Yet. This is an HTTP POST DOS attack that allows the attacker to choose the forms and form fields that they want to use for the POST attack.
  • OWASP HTTP Tool: A Slow POST DOS tool that allows the attacker to generate a customized number of connections, connection rate, timeouts, and even the content length.
  • Anonymous DOSer: A customized DOS tool put together in visual basic. It is very simple to use and can be used for HTTP floods or UDP floods.
  • Windows_DNS_Attack_Tool: DNS Amplification tool. It uses open DNS resolvers and source address spoofing to create large denial of service attacks.
  • Goodbye: Similar to HTTPFlooder and R-U-Dead-Yet DDoS tools.

The following US-CERT advisories offer further information:

  • US-CERT Anonymous DDoS Activity: http://www.us-cert.gov/ncas/alerts/TA12-024A
  • US-CERT Understanding Denial-of-Service-Attacks: http://www.us-cert.gov/ncas/tips/ST04-015
  • US-CERT DNS Amplification Attacks: http://www.us-cert.gov/ncas/alerts/TA13-088A

Password Crackers/Stealers

Several password crackers and stealers were spotted on related forums. Some of which are found below:

  • Backtrack 5: A Linux based penetration testing tool. The most recent edition was synced up with the new release of KaliLinux. This toolkit provides easy-to-use tools such as port scanners, metasploit, Nmap, Browser Exploitation Framework, Hydra, Aircrack-ng, and Ophcrack. Aircrack and Ophcrack are password crackers.
  • Hash Cracker: Refers to multiple free applications designed to crack MD2, MD5, SHA-1, SHA-256, SHA384, and SHA-512 using bruteforce techniques or using a rainbow table/dictionary attacks.
  • CpanelBruteReiluke: Bruteforce password cracking tool designed by a developer known as Reiluke. Reiluke also has made his blind SQL, email brute force, and exploit scanner tools available via open source.
  • Gmail_Hacker: Labeled as a free Gmail-specific password cracking tool which is advertised as taking less than 2 minutes to retrieve passwords.
  • Firefox Password Stealer: Provides details on how an attacker can turn their Firefox browser into a password stealer. This is not a tool, but rather direction for end users.
  • ICQ Steal0r: Program seems to be dedicated to stealing passwords of ICQ users. ICQ is an instant messaging application popularized by Mirabilis.

The following US-CERT advisories offer further information:

  • US-CERT Password Management: https://www.us-cert.gov/sites/default/files/publications/PasswordMgmt2012.pdf

Proxy Servers/Anonymizers

In additional to options like the onion router (TOR), OpUSA members have advertised the following to assist actors in obfuscating their activity.

  • CYBERGHOST: A Virtual Private Network (VPN) simulator which sets up a proxy server allowing anonymous activity with 128-bit AES encryption. It also has the most server locations available in the US and a number of countries in Europe.
  • TunnelBear: This VPN simulator also circumvents Geoblocking, which is geographically blocking internet users from certain web services.
  • SumRando: This VPN simulator allows users to generate random IP addresses, which can obfuscate attribution.
  • Real Hide IP: Hides the IP address of anyone employing the application.
  • Hotspot Shield: Hides the IP address of anyone employing the application.

Other Tools Mentioned

Hacker groups have mentioned the following tools among several others that don’t fit the above categories.

  • Net Tools: This could refer to any number of items, but c|net offers a network toolbox that has network sniffing and scanning tools.
  • Pack Del Hacker: This is a simplified, online-based file-sharing service.
  • EmailScraperWizardv06b: This is noted as one of the more successful email scrapers on the internet. It can extract email addresses from websites.
  • IP Port Scanner: This could refer to multiple tools dedicated to scanning, mapping and discovering open ports.
  • IP Scanner: These types of tools can scan networks, detect devices, wireless devices, routers, and can find HTTP, HTTPS, and FTP folders.
  • DHCP_IP_Forcer: This allows an attacker to essentially scan a network and detect IP addresses and MAC addresses on a network. Some DHCP Force components allow the attacker to reconfigure modems.

Summary

While it is difficult to assess the specific tools that may be used against targeted organizations, this product is intended to provide organizations with an idea of the type of free tools that may be employed against them, so they may better prepare mitigation strategies during OpUSA or similar hacktivist operations. As always, NCCIC reminds users and administrators of the importance of best practices to strengthen the security posture of their organization’s systems. Critical Infrastructure Key Resource (CIKR) owners and operators should work toward a resilient network model that assumes such an attack will occur against their enterprise. The goal is to minimize damage, and provide pathways for restoration of critical business functions in the shortest amount of time possible.

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, FBI *, PUBLIC INTELLIGENCE, THE WHITE HOUSE May 17, 2013April 6, 2018 6 Minutes

The FBI – Organizer of International Securities Fraud Ring Sentenced to Prison for Using Hackers

TRENTON, NJ—The central organizer of a worldwide conspiracy to manipulate stock prices through a botnet network of virus-controlled computers was sentenced today in Trenton federal court to 71 months in prison, New Jersey U.S. Attorney Paul J. Fishman announced.

Christopher Rad, 44, of Cedar Park, Texas, was previously convicted, following a nine-day jury trial, of six counts arising from the fraud scheme: conspiring to further securities fraud using spam; conspiring to transmit spam through unauthorized access to computers; and four counts of transmission of spam by unauthorized computers.

The sentence was imposed by U.S. District Judge Joel A. Pisano, who also presided over the trial.

“Christopher Rad’s use of hackers to drive his pump-and-dump scheme illustrates a trend toward the modern mechanization of old-school scams,” said U.S. Attorney Fishman. “Law enforcement is constantly anticipating and adapting as criminals operate in a more virtual—and more global—world. As a result, Rad will spend years in prison for manipulating our markets to steal his millions.”

According to documents filed in this case and statements made in court:

Rad conspired with stock promoters in a scheme to manipulate the price and volume of dozens of particular stocks, including stocks with ticker symbols RSUV, QRVS, VSHE, SVXA, and ASIC, in order to later sell them at an artificially inflated price—a practice known as a “pump and dump” scheme. The scheme began as early as November 2007 and continued through February 2009.

As part of the scheme, Rad organized others to manipulate the stock prices. He sought out and engaged spammers and then sent them precise language to include in their spam campaigns.

The spammers included two individuals who distributed spam through botnets. To create a botnet, viruses were sent out to infect computers around the world, creating a virtual army of hijacked computers. The spammers then caused the botnets to distribute spam to promote the stocks Rad wanted to manipulate. Infected computers were found in New Jersey, Europe, Russia, and elsewhere. The botnet was controlled from command and control servers located overseas, including in Russia and China.

Rad, who went by the alias “billy_sack,” communicated with the spammers by Skype, in most instances knowing them only by their aliases. During the 22-month conspiracy, Rad paid the spammers more than $1.4 million, making payments through e-Gold—an electronic monetary payment system—and money wires. Payments intended for a botnet operator in Russia were made through at least eight different countries. The wire instruction notations included false information such as payments for “Dell Monitors,” “touch panels,” and “transportation services.”

Rad also agreed with others to engage in bad-faith purchases of RSUV to create the impression among spam recipients that there was active trading in the stock.

At the same time, hackers hacked into the brokerage accounts of third parties, liquidated the stocks in those accounts, and then used the accounts to purchase shares of some of the stocks the scheme sought to manipulate. This increased the volume of shares being traded and created an impression that the stocks were worth purchasing.

In all, Rad made approximately $2.8 million from his schemes.

In addition to the prison term, Judge Pisano sentenced Rad to serve five years of supervised release and ordered him to pay a $30,000 fine. Restitution will be determined at a later date.

Rad’s co-conspirators, Doyle Scott Elliott and James Bragg, previously pleaded guilty to securities fraud and transmission of spam through falsely registered e-mail addresses. They await sentencing.

U.S. Attorney Fishman credited special agents of the FBI, under the direction of Special Agent in Charge Aaron T. Ford in Newark, with the investigation. He also thanked the U.S. Securities and Exchange Commission’s Division of Enforcement, led by Acting Director George Canellos.

The government is represented by Assistant U.S. Attorney Andrew S. Pak, of the Computer Hacking and Intellectual Property Section of the U.S. Attorney’s Office Economic Crimes Unit (ECU); Christopher J. Kelly, Deputy Chief of the ECU; and Erez Liebermann, Deputy Chief of the Office’s Criminal Division in Newark.

This case was brought in coordination with President Barack Obama’s Financial Fraud Enforcement Task Force. The task force was established to wage an aggressive, coordinated, and proactive effort to investigate and prosecute financial crimes. With more than 20 federal agencies, 94 U.S. Attorneys’ offices, and state and local partners, it is the broadest coalition of law enforcement, investigatory, and regulatory agencies ever assembled to combat fraud. Since its formation, the task force has made great strides in facilitating increased investigation and prosecution of financial crimes; enhancing coordination and cooperation among federal, state, and local authorities; addressing discrimination in the lending and financial markets; and conducting outreach to the public, victims, financial institutions, and other organizations. Over the past three fiscal years, the Justice Department has filed nearly 10,000 financial fraud cases against nearly 15,000 defendants including more than 2,900 mortgage fraud defendants. For more information on the task force, please visit http://www.stopfraud.gov.

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, FBI * May 14, 2013April 9, 2018 3 Minutes

TOP-SECRET-DHS-FBI Bulletins Identifying IP Addresses, Hostnames Associated With Malicious Cyber Activity Against the U.S. Government

DHS-FBI Bulletins Identifying IP Addresses, Hostnames Associated With Malicious Cyber Activity Against the U.S. Government

May 2, 2013 in Department of Homeland Security, Federal Bureau of Investigation

The following bulletins were released in February 2013 by the U.S. Computer Emergency Readiness Team (US-CERT) on a limited basis to “confirmed members of the cybersecurity community of practice, which may include critical infrastructure owners and operators, systems administrators, and information security practitioners.” Both versions of the bulletin were found to be available on a number of public websites associated with various professional associations and trade groups.

Joint Indicator Bulletin (JIB) – INC260425 27 pages February 18, 2013 Download
Joint Indicator Bulletin (JIB) – INC260425-2 10 pages February 26, 2013 Download

Various cyber actors have engaged in malicious activity against Government and Private Sector entities. The apparent objective of this activity has been the theft of intellectual property, trade secrets, and other sensitive business information. To this end, the malicious actors have employed a variety of techniques in order to infiltrate targeted organizations, establish a foothold, move laterally through the targets’ networks, and exfiltrate confidential or proprietary data. The United States Department of Homeland Security (DHS), in collaboration with the Federal Bureau of Investigation and other partners, has created this Joint Indicator Bulletin, containing cyber indicators related to this activity. Organizations are advised to examine current and historical security logs for evidence of malicious activity related to the indicators in this bulletin and deploy additional protections as appropriate. In addition, DHS would welcome any additional information your organization may be able to share regarding this or similar activity, which may be provided to the US Computer Emergency Readiness Team (US-CERT) at soc@uscert.gov.

Document Overview

This Joint Indicator Bulletin is comprised of several sections covering malware indicators, network traffic, tool indicators, hostnames, and IP addresses known to be associated with the ongoing malicious activity. If suspicious network traffic or malware is identified based on these indicators, affected systems should be investigated for signs of compromise.

To support developing shared situational awareness of cyber threats, DHS welcomes any additional information your organization may be able to share regarding this or similar activity. Such information can be provided to the United States Computer Emergency Readiness Team (US-CERT) at soc@us-cert.gov.

…

Indicator Descriptions

As a general matter, malicious cyber actors have multiple tools at their disposal and can represent a significant threat to targeted victim organizations. Such actors frequently compromise victim organizations with targeted spear-phishing campaigns, understand how to move laterally within a network to acquire targeted data, and often maintain undetected persistence on victim networks for months or even years. The indicators provided in this Bulletin include malware and compromised IP addresses and domains used by such actors.

Malware

Malicious activity like that described in this Bulletin usually originates via targeted spear phishing email campaigns that compromise victim organizations. These emails can result in the installation of one or more pieces of malware used to enable complete control of those systems. The presence of such malware is a strong indication the computer or network has been compromised.

Client Tools

During the course of a computer intrusion, malicious actors often download additional tools to victim systems for the purpose of evading local security measures and to compromise additional computers on victim networks. These tools might have legitimate uses, but, when combined with other indications of an intrusion, could indicate that the computer has been compromised. The presence of these tools alone is not necessarily a positive indication of malicious activity, but may enable an organization to identify malicious activity.
IP Addresses, Hostnames and Second-Level Domains

Malicious actors routinely compromise hosts on the Internet for the purpose of obscuring their activity, particularly the exfiltration of computer files from end-point victims. The majority of these compromised hosts have been configured to prevent identification of the source of the intrusion activity. The traffic from these hosts is generally legitimate, but, because they have been compromised, activity to and from these IPs should be reviewed for indications of malicious traffic.

Malicious actors also make use of numerous Internet hostnames for the purpose of compromising and controlling victim systems. Actors have been known to register second-level domains for their exclusive use in these activities. In addition, malicious actors have been known to use DNS providers that allow the use of specific hostnames that are part of shared second-level domains.

Many of these hostnames and domains may be legitimate hosts or domains that have been co-opted by malicious actors. Any number of the IP addresses or domains in this Bulletin may have been remediated prior to publication of this list. In some cases, a single IP address from this indicator list may represent hundreds or even thousands of legitimate independent websites, or may represent a small business network. A number of indicators contained in this Bulletin resolve back to large scale service providers whose services are being abused. For these reasons, outright blocking of these indicators is not recommended. Rather, traffic from these IPs or domains should be investigated for signs of compromise.

******************************
IP Address Awareness List
******************************

107[.]6[.]38[.]55
108[.]171[.]207[.]62
108[.]171[.]244[.]138
108[.]171[.]246[.]87
108[.]171[.]248[.]182
108[.]171[.]248[.]83
108[.]171[.]248[.]86
108[.]171[.]252[.]41
108[.]171[.]254[.]76
112[.]121[.]164[.]2
112[.]133[.]203[.]215
112[.]133[.]203[.]250
115[.]119[.]92[.]178
115[.]178[.]60[.]19
116[.]212[.]100[.]94
117[.]121[.]241[.]186
119[.]75[.]5[.]132
119[.]75[.]5[.]134
12[.]10[.]250[.]105
12[.]10[.]250[.]109
12[.]10[.]250[.]110
12[.]10[.]250[.]97
12[.]100[.]63[.]135
12[.]147[.]51[.]99
12[.]162[.]189[.]184
12[.]173[.]220[.]231
12[.]173[.]220[.]233
12[.]182[.]10[.]124
12[.]218[.]86[.]2
12[.]233[.]148[.]145
12[.]233[.]148[.]185
12[.]235[.]72[.]138
12[.]235[.]72[.]140
12[.]36[.]96[.]236
12[.]51[.]6[.]132
12[.]7[.]168[.]121
122[.]126[.]32[.]234
122[.]155[.]3[.]147
122[.]160[.]137[.]76
124[.]122[.]156[.]219
128[.]173[.]95[.]6
128[.]95[.]9[.]2
129[.]25[.]5[.]200
129[.]44[.]254[.]145
134[.]208[.]10[.]195
141[.]151[.]164[.]87
142[.]0[.]143[.]207
146[.]145[.]183[.]100
150[.]176[.]56[.]194
158[.]255[.]208[.]211
161[.]58[.]179[.]230
164[.]106[.]102[.]188
164[.]119[.]10[.]170
164[.]119[.]11[.]2
164[.]119[.]54[.]244
164[.]119[.]54[.]247
165[.]165[.]38[.]19
168[.]215[.]137[.]6
168[.]93[.]98[.]3
173[.]10[.]48[.]243
173[.]224[.]208[.]155
173[.]224[.]211[.]14
173[.]224[.]211[.]16
173[.]224[.]214[.]70
173[.]224[.]215[.]73
173[.]224[.]216[.]217
173[.]252[.]255[.]52
182[.]173[.]77[.]26
184[.]105[.]135[.]166
184[.]22[.]26[.]50
184[.]72[.]82[.]144
184[.]82[.]164[.]104
184[.]82[.]47[.]200
189[.]87[.]87[.]3
190[.]13[.]160[.]114
193[.]219[.]90[.]29
194[.]106[.]162[.]203
195[.]22[.]21[.]72
195[.]29[.]247[.]78
196[.]36[.]199[.]217
198[.]15[.]88[.]37
198[.]15[.]88[.]39
198[.]69[.]219[.]173
199[.]119[.]201[.]162
199[.]119[.]201[.]167
199[.]119[.]201[.]67
199[.]119[.]206[.]11
199[.]119[.]206[.]111
199[.]119[.]206[.]19
199[.]119[.]206[.]99
199[.]119[.]207[.]237
199[.]15[.]113[.]218
199[.]15[.]117[.]98
199[.]67[.]16[.]122
199[.]67[.]23[.]45
199[.]71[.]213[.]17
199[.]71[.]213[.]91
199[.]83[.]88[.]98
199[.]83[.]89[.]45
199[.]83[.]93[.]22
199[.]83[.]93[.]51
199[.]83[.]93[.]88
199[.]83[.]95[.]51
199[.]83[.]95[.]60
200[.]53[.]40[.]219
202[.]176[.]81[.]175
202[.]180[.]175[.]16
202[.]43[.]33[.]5
202[.]95[.]222[.]143
202[.]95[.]222[.]145
202[.]95[.]222[.]158
202[.]95[.]222[.]182
202[.]95[.]222[.]183
203[.]118[.]56[.]213
203[.]123[.]147[.]34
203[.]146[.]102[.]166
203[.]146[.]249[.]189
203[.]150[.]230[.]121
203[.]238[.]57[.]1
203[.]64[.]84[.]226
203[.]81[.]38[.]54
203[.]81[.]53[.]14
203[.]82[.]57[.]109
204[.]111[.]73[.]156
204[.]111[.]75[.]107
204[.]12[.]11[.]212
204[.]12[.]11[.]54
204[.]12[.]116[.]166
204[.]12[.]208[.]122
204[.]12[.]208[.]125
204[.]12[.]21[.]69
204[.]12[.]22[.]114
204[.]12[.]224[.]75
204[.]12[.]236[.]182
204[.]12[.]236[.]183
204[.]12[.]63[.]133
204[.]12[.]9[.]251
204[.]13[.]24[.]14
204[.]15[.]132[.]254
204[.]152[.]198[.]194
204[.]16[.]139[.]5
204[.]17[.]34[.]150
204[.]180[.]235[.]103
204[.]180[.]235[.]106
204[.]45[.]101[.]246
204[.]45[.]108[.]237
204[.]45[.]117[.]174
204[.]45[.]123[.]141
204[.]45[.]124[.]100
204[.]45[.]124[.]162
204[.]45[.]124[.]163
204[.]45[.]137[.]74
204[.]45[.]146[.]250
204[.]45[.]147[.]19
204[.]45[.]153[.]52
204[.]45[.]190[.]89
204[.]45[.]198[.]18
204[.]45[.]201[.]107
204[.]45[.]205[.]44
204[.]45[.]230[.]75
204[.]45[.]39[.]4
204[.]45[.]52[.]20
204[.]45[.]64[.]66
204[.]45[.]75[.]250
204[.]45[.]79[.]180
204[.]45[.]79[.]20
204[.]45[.]79[.]218
205[.]159[.]83[.]11
205[.]159[.]83[.]31
205[.]159[.]83[.]91
205[.]164[.]0[.]34
205[.]172[.]20[.]42
205[.]196[.]178[.]23
205[.]209[.]161[.]195
205[.]209[.]161[.]5
205[.]237[.]192[.]123
205[.]242[.]114[.]4
206[.]125[.]45[.]187
206[.]192[.]55[.]117
206[.]204[.]190[.]237
207[.]150[.]197[.]155
207[.]179[.]111[.]5
207[.]182[.]238[.]195
207[.]210[.]252[.]17
207[.]250[.]229[.]52
207[.]250[.]49[.]172
207[.]250[.]49[.]173
207[.]36[.]0[.]193
207[.]36[.]17[.]15
207[.]46[.]17[.]125
207[.]59[.]239[.]122
207[.]65[.]231[.]21
207[.]75[.]209[.]108
207[.]97[.]226[.]130
208[.]106[.]145[.]153
208[.]106[.]146[.]98
208[.]106[.]82[.]119
208[.]109[.]238[.]15
208[.]109[.]238[.]72
208[.]109[.]238[.]80
208[.]109[.]238[.]96
208[.]109[.]49[.]66
208[.]118[.]188[.]166
208[.]118[.]188[.]179
208[.]118[.]188[.]57
208[.]186[.]112[.]40
208[.]221[.]198[.]12
208[.]43[.]154[.]7
208[.]43[.]175[.]82
208[.]43[.]208[.]14
208[.]43[.]225[.]196
208[.]43[.]255[.]135
208[.]43[.]54[.]164
208[.]43[.]71[.]116
208[.]44[.]238[.]249
208[.]57[.]237[.]141
208[.]67[.]248[.]66
208[.]69[.]32[.]230
208[.]77[.]45[.]61
208[.]77[.]45[.]69
208[.]87[.]242[.]93
209[.]104[.]217[.]69
209[.]104[.]217[.]72
209[.]104[.]217[.]76
209[.]114[.]160[.]115
209[.]114[.]222[.]100
209[.]116[.]102[.]225
209[.]158[.]71[.]20
209[.]175[.]175[.]227
209[.]175[.]175[.]230
209[.]200[.]117[.]198
209[.]208[.]95[.]158
209[.]208[.]95[.]86
209[.]212[.]104[.]171
209[.]234[.]81[.]205
209[.]242[.]13[.]230
209[.]242[.]21[.]134
209[.]34[.]224[.]52
209[.]34[.]231[.]197
209[.]34[.]231[.]59
209[.]34[.]233[.]26
209[.]67[.]56[.]252
209[.]75[.]160[.]176
209[.]75[.]160[.]98
210[.]184[.]116[.]198
210[.]193[.]52[.]160
210[.]202[.]22[.]129
210[.]205[.]6[.]219
210[.]220[.]197[.]2
210[.]245[.]64[.]107
210[.]249[.]80[.]141
211[.]115[.]70[.]114
211[.]232[.]57[.]150
211[.]232[.]57[.]235
211[.]232[.]57[.]249
211[.]233[.]58[.]69
212[.]116[.]151[.]146
212[.]150[.]22[.]228
213[.]79[.]32[.]179
216[.]134[.]222[.]200
216[.]136[.]62[.]143
216[.]174[.]25[.]177
216[.]183[.]190[.]162
216[.]183[.]40[.]56
216[.]185[.]0[.]220
216[.]185[.]0[.]9
216[.]196[.]249[.]210
216[.]213[.]99[.]218
216[.]215[.]112[.]83
216[.]226[.]191[.]103
216[.]24[.]192[.]117
216[.]24[.]192[.]121
216[.]24[.]192[.]206
216[.]24[.]192[.]28
216[.]24[.]192[.]44
216[.]24[.]192[.]7
216[.]24[.]192[.]81
216[.]24[.]192[.]83
216[.]24[.]192[.]95
216[.]24[.]196[.]113
216[.]24[.]198[.]14
216[.]24[.]198[.]20
216[.]24[.]199[.]243
216[.]24[.]199[.]62
216[.]24[.]200[.]180
216[.]24[.]201[.]166
216[.]24[.]201[.]198
216[.]24[.]203[.]58
216[.]24[.]204[.]124
216[.]24[.]205[.]30
216[.]24[.]205[.]36
216[.]24[.]205[.]69
216[.]36[.]123[.]12
216[.]68[.]165[.]14
216[.]83[.]42[.]66
216[.]9[.]65[.]6
216[.]99[.]146[.]18
216[.]99[.]148[.]18
217[.]20[.]138[.]42
217[.]22[.]119[.]13
217[.]23[.]9[.]215
218[.]233[.]206[.]2
218[.]234[.]17[.]30
218[.]234[.]21[.]219
220[.]68[.]224[.]116
222[.]231[.]46[.]51
24[.]120[.]244[.]9
24[.]123[.]91[.]130
24[.]123[.]91[.]198
24[.]123[.]91[.]206
24[.]123[.]91[.]6
24[.]123[.]91[.]70
24[.]123[.]91[.]98
24[.]129[.]188[.]158
24[.]172[.]220[.]130
24[.]173[.]220[.]130
24[.]173[.]34[.]139
24[.]199[.]240[.]74
24[.]227[.]145[.]210
24[.]248[.]197[.]112
24[.]249[.]191[.]150
24[.]39[.]42[.]50
24[.]39[.]5[.]85
24[.]43[.]98[.]12
24[.]73[.]123[.]50
24[.]96[.]236[.]182
24[.]97[.]167[.]250
27[.]254[.]34[.]246
38[.]104[.]203[.]222
38[.]104[.]203[.]242
38[.]107[.]179[.]5
4[.]22[.]103[.]26
59[.]116[.]133[.]122
59[.]12[.]137[.]111
59[.]12[.]137[.]146
59[.]12[.]137[.]148
59[.]12[.]137[.]149
59[.]12[.]137[.]150
59[.]12[.]137[.]181
59[.]12[.]137[.]182
59[.]12[.]137[.]183
59[.]12[.]137[.]194
59[.]120[.]140[.]156
59[.]120[.]199[.]82
60[.]51[.]214[.]129
61[.]19[.]248[.]201
61[.]19[.]248[.]203
61[.]218[.]191[.]55
61[.]218[.]191[.]60
61[.]219[.]136[.]132
61[.]72[.]144[.]248
61[.]78[.]60[.]130
62[.]2[.]205[.]146
62[.]244[.]209[.]98
63[.]102[.]52[.]138
63[.]105[.]34[.]53
63[.]105[.]34[.]59
63[.]126[.]12[.]3
63[.]134[.]215[.]111
63[.]134[.]215[.]34
63[.]139[.]221[.]10
63[.]139[.]45[.]83
63[.]147[.]185[.]60
63[.]147[.]31[.]177
63[.]149[.]11[.]233
63[.]149[.]120[.]135
63[.]150[.]10[.]200
63[.]175[.]119[.]46
63[.]200[.]116[.]50
63[.]202[.]58[.]43
63[.]209[.]10[.]247
63[.]224[.]141[.]199
63[.]64[.]153[.]68
63[.]73[.]10[.]131
63[.]73[.]11[.]12
63[.]73[.]11[.]6
63[.]84[.]30[.]211
63[.]86[.]122[.]121
63[.]93[.]109[.]217
63[.]97[.]151[.]230
64[.]124[.]105[.]75
64[.]14[.]253[.]120
64[.]151[.]127[.]68
64[.]151[.]127[.]70
64[.]198[.]120[.]50
64[.]2[.]115[.]238
64[.]222[.]187[.]237
64[.]233[.]222[.]39
64[.]28[.]82[.]36
64[.]3[.]53[.]146
64[.]3[.]53[.]148
64[.]30[.]223[.]147
64[.]45[.]251[.]11
64[.]5[.]38[.]17
64[.]52[.]255[.]20
64[.]6[.]188[.]250
64[.]6[.]188[.]253
64[.]62[.]136[.]154
64[.]62[.]136[.]157
64[.]73[.]238[.]72
64[.]8[.]114[.]123
64[.]80[.]153[.]108
64[.]85[.]177[.]5
64[.]85[.]19[.]6
64[.]88[.]7[.]113
64[.]9[.]204[.]233
65[.]107[.]54[.]151
65[.]114[.]166[.]37
65[.]14[.]25[.]67
65[.]183[.]217[.]55
65[.]49[.]145[.]3
65[.]66[.]118[.]57
65[.]89[.]156[.]126
65[.]97[.]169[.]210
66[.]0[.]135[.]16
66[.]109[.]21[.]182
66[.]111[.]37[.]26
66[.]116[.]58[.]230
66[.]124[.]120[.]193
66[.]129[.]222[.]10
66[.]139[.]186[.]199
66[.]140[.]144[.]70
66[.]153[.]20[.]170
66[.]159[.]250[.]224
66[.]178[.]7[.]201
66[.]181[.]65[.]4
66[.]197[.]231[.]160
66[.]197[.]242[.]218
66[.]197[.]242[.]221
66[.]197[.]242[.]222
66[.]199[.]231[.]210
66[.]199[.]231[.]243
66[.]202[.]107[.]117
66[.]202[.]29[.]73
66[.]220[.]10[.]72
66[.]220[.]10[.]93
66[.]220[.]242[.]230
66[.]228[.]114[.]54
66[.]235[.]214[.]66
66[.]35[.]32[.]70
66[.]36[.]28[.]222
66[.]39[.]205[.]171
66[.]52[.]140[.]13
66[.]55[.]14[.]77
66[.]59[.]109[.]179
66[.]79[.]165[.]158
66[.]92[.]181[.]123
66[.]92[.]241[.]200
66[.]93[.]151[.]226
66[.]93[.]75[.]206
67[.]102[.]105[.]76
67[.]102[.]7[.]4
67[.]107[.]22[.]67
67[.]112[.]49[.]250
67[.]114[.]87[.]218
67[.]135[.]235[.]198
67[.]159[.]164[.]124
67[.]159[.]49[.]188
67[.]159[.]8[.]36
67[.]210[.]105[.]137
67[.]210[.]105[.]216
67[.]210[.]68[.]122
67[.]215[.]163[.]66
67[.]215[.]181[.]130
67[.]215[.]181[.]150
67[.]222[.]165[.]4
67[.]42[.]55[.]113
67[.]76[.]57[.]77
67[.]77[.]204[.]97
67[.]91[.]212[.]115
67[.]93[.]1[.]197
67[.]93[.]1[.]204
67[.]93[.]1[.]228
67[.]93[.]15[.]229
67[.]93[.]15[.]235
67[.]93[.]15[.]240
67[.]93[.]16[.]219
67[.]93[.]255[.]249
67[.]93[.]3[.]3
67[.]93[.]30[.]146
67[.]93[.]30[.]189
67[.]93[.]4[.]27
67[.]93[.]4[.]71
67[.]93[.]4[.]72
67[.]93[.]4[.]89
67[.]93[.]54[.]130
67[.]93[.]54[.]98
69[.]105[.]31[.]51
69[.]106[.]172[.]188
69[.]175[.]28[.]12
69[.]2[.]43[.]123
69[.]2[.]71[.]205
69[.]20[.]125[.]16
69[.]20[.]20[.]129
69[.]20[.]5[.]213
69[.]20[.]57[.]71
69[.]3[.]160[.]20
69[.]3[.]160[.]30
69[.]3[.]160[.]50
69[.]3[.]160[.]60
69[.]48[.]233[.]181
69[.]48[.]233[.]187
69[.]57[.]60[.]42
69[.]68[.]56[.]35
69[.]69[.]94[.]20
69[.]72[.]146[.]33
69[.]94[.]112[.]253
69[.]94[.]65[.]101
69[.]94[.]69[.]101
70[.]166[.]13[.]132
70[.]166[.]13[.]148
70[.]168[.]88[.]230
70[.]85[.]134[.]234
70[.]86[.]77[.]114
70[.]89[.]213[.]145
70[.]89[.]213[.]181
70[.]89[.]213[.]201
70[.]89[.]213[.]22
70[.]89[.]213[.]227
70[.]89[.]213[.]241
70[.]89[.]213[.]249
70[.]89[.]213[.]66
70[.]90[.]53[.]170
71[.]183[.]201[.]26
71[.]2[.]214[.]46
71[.]4[.]109[.]162
71[.]8[.]243[.]14
71[.]8[.]243[.]16
72[.]148[.]171[.]41
72[.]151[.]101[.]55
72[.]167[.]146[.]235
72[.]167[.]34[.]212
72[.]167[.]37[.]238
72[.]167[.]47[.]217
72[.]22[.]11[.]2
72[.]242[.]187[.]211
72[.]242[.]59[.]164
72[.]248[.]173[.]82
72[.]248[.]239[.]146
72[.]32[.]197[.]150
72[.]35[.]85[.]32
72[.]37[.]215[.]244
72[.]52[.]116[.]106
72[.]52[.]209[.]143
72[.]52[.]209[.]145
72[.]52[.]221[.]158
72[.]93[.]90[.]44
74[.]10[.]186[.]7
74[.]112[.]123[.]171
74[.]117[.]58[.]92
74[.]117[.]60[.]141
74[.]117[.]62[.]210
74[.]117[.]62[.]88
74[.]117[.]63[.]250
74[.]208[.]111[.]135
74[.]208[.]148[.]125
74[.]208[.]65[.]251
74[.]208[.]67[.]95
74[.]213[.]40[.]2
74[.]52[.]63[.]114
74[.]52[.]63[.]138
75[.]146[.]252[.]217
75[.]146[.]252[.]218
75[.]148[.]254[.]115
75[.]149[.]183[.]228
75[.]52[.]111[.]62
75[.]77[.]82[.]225
75[.]77[.]82[.]242
75[.]77[.]82[.]70
76[.]12[.]37[.]97
76[.]164[.]171[.]3
76[.]164[.]171[.]5
76[.]164[.]171[.]6
76[.]76[.]146[.]89
76[.]76[.]54[.]137
8[.]4[.]112[.]2
82[.]165[.]181[.]105
83[.]238[.]134[.]58
87[.]229[.]126[.]60
89[.]175[.]175[.]186
89[.]175[.]175[.]187
89[.]175[.]175[.]188
93[.]152[.]156[.]106
96[.]10[.]19[.]210
96[.]47[.]232[.]16
96[.]47[.]232[.]161
96[.]57[.]145[.]11
98[.]110[.]71[.]108
98[.]126[.]0[.]12
98[.]126[.]0[.]163
98[.]126[.]10[.]124
98[.]126[.]103[.]164
98[.]126[.]106[.]19
98[.]126[.]114[.]4
98[.]126[.]15[.]250
98[.]126[.]18[.]74
98[.]126[.]18[.]82
98[.]126[.]18[.]83
98[.]126[.]19[.]163
98[.]126[.]203[.]45
98[.]126[.]21[.]116
98[.]126[.]25[.]35
98[.]126[.]28[.]245
98[.]126[.]3[.]235
98[.]126[.]3[.]236
98[.]126[.]3[.]237
98[.]126[.]41[.]178
98[.]126[.]5[.]35
98[.]126[.]6[.]104
98[.]126[.]6[.]105
98[.]126[.]66[.]147
98[.]126[.]68[.]186
98[.]126[.]7[.]220
98[.]126[.]7[.]250
98[.]126[.]7[.]251
98[.]126[.]91[.]27
98[.]126[.]97[.]197
99[.]13[.]110[.]214
99[.]4[.]102[.]249

******************************
Domain Name Awareness List
******************************

a-af[.]arrowservice[.]net
able[.]arrowservice[.]net
a-cl[.]arrowservice[.]net
a-dl[.]arrowservice[.]net
admin[.]arrowservice[.]net
adtkl[.]bigish[.]net
adtkl[.]gmailboxes[.]com
a-ep[.]arrowservice[.]net
a-ex[.]arrowservice[.]net
a-f[.]gmailboxes[.]com
afghanistan[.]toutges[.]us
aga[.]toh[.]info
a-gon[.]arrowservice[.]net
a-he[.]arrowservice[.]net
a-if[.]arrowservice[.]net
a-iho[.]arrowservice[.]net
aiic[.]arrowservice[.]net
a-ip[.]arrowservice[.]net
ait[.]busketball[.]com
alarm[.]arrowservice[.]net
amne[.]purpledaily[.]com
ams[.]busketball[.]com
a-ne[.]arrowservice[.]net
anglo[.]arrowservice[.]net
aol[.]arrowservice[.]net
a-ol[.]arrowservice[.]net
apejack[.]bigish[.]net
a-pep[.]arrowservice[.]net
a-rdr[.]arrowservice[.]net
arm[.]armed[.]us
ascn[.]arrowservice[.]net
asp[.]arrowservice[.]net
asp[.]busketball[.]com
a-te[.]arrowservice[.]net
atom[.]busketball[.]com
atomic[.]bigish[.]net
a-uac[.]arrowservice[.]net
auto[.]gmailboxes[.]com
a-za[.]arrowservice[.]net
backsun[.]busketball[.]com
barity[.]gmailboxes[.]com
bass[.]busketball[.]com
bbs[.]busketball[.]com
bbs[.]marsbrother[.]com
bda[.]arrowservice[.]net
blacman[.]busketball[.]com
blog[.]arrowservice[.]net
blog[.]busketball[.]com
bring[.]busketball[.]com
built[.]arrowservice[.]net
busketball[.]com
buycow[.]busketball[.]com
buyer[.]arrowservice[.]net
buywater[.]busketball[.]com
bwbc[.]bigish[.]net
center[.]arrowservice[.]net
chamus[.]gmailboxes[.]com
cirfsun[.]gmailboxes[.]com
city[.]gmailboxes[.]com
class[.]arrowservice[.]net
cleanbeef[.]gmailboxes[.]com
cliffkl[.]gmailboxes[.]com
cmf[.]busketball[.]com
cmf[.]gmailboxes[.]com
cmp[.]gmailboxes[.]com
contact[.]arrowservice[.]net
contact[.]bigish[.]net
corn[.]busketball[.]com
cov[.]arrowservice[.]net
covclient[.]arrowservice[.]net
cow[.]arrowservice[.]net
cowboy[.]bigish[.]net
crab[.]arrowservice[.]net
ctimoon[.]marsbrother[.]com
ctisu[.]bigish[.]net
ctisun[.]gmailboxes[.]com
ctx[.]bigish[.]net
ctx-na[.]purpledaily[.]com
cws[.]gmailboxes[.]com
date[.]gmailboxes[.]com
dec[.]globalsecuriy[.]org
default[.]arrowservice[.]net
demavda[.]arrowservice[.]net
diaup[.]gmailboxes[.]com
diplomatism[.]nsmp[.]ru
documents[.]busketball[.]com
domain[.]arrowservice[.]net
domain[.]busketball[.]com
dowjs[.]busketball[.]com
dowjs[.]gmailboxes[.]com
download[.]gmailboxes[.]com
downupdate[.]bigish[.]net
dowph[.]bigish[.]net
drb[.]arrowservice[.]net
drinkwater[.]gmailboxes[.]com
eatbeef[.]gmailboxes[.]com
eciie[.]marsbrother[.]com
ecliar[.]marsbrother[.]com
eclimx[.]marsbrother[.]com
ecli-mxcdb[.]arrowservice[.]net
ecli-newf[.]marsbrother[.]com
ecli-noa[.]marsbrother[.]com
ecli-tda[.]marsbrother[.]com
ecli-tmp[.]marsbrother[.]com
ecli-un[.]marsbrother[.]com
eshop[.]gmailboxes[.]com
ever[.]arrowservice[.]net
fbtel[.]gmailboxes[.]com
finekl[.]bigish[.]net
fme[.]busketball[.]com
fmp[.]bigish[.]net
fn[.]bigish[.]net
follow[.]purpledaily[.]com
food[.]busketball[.]com
foreignpolicy[.]zonet[.]us
free[.]gmailboxes[.]com
frickl[.]purpledaily[.]com
friends[.]arrowservice[.]net
fsol[.]businessformars[.]com
ftel[.]businessformars[.]com
gao[.]gaokew[.]com
gatu[.]arrowservice[.]net
gg[.]arrowservice[.]net
gl[.]gmailboxes[.]com
glj[.]purpledaily[.]com
gmailboxes[.]com
happy[.]arrowservice[.]net
help[.]gmailboxes[.]com
hill[.]arrowservice[.]net
home[.]arrowservice[.]net
honeywater[.]keren[.]la
host[.]arrowservice[.]net
house[.]gmailboxes[.]com
index[.]arrowservice[.]net
info[.]bigish[.]net
info[.]hj-spa[.]com
information[.]trickip[.]org
int[.]busketball[.]com
intel[.]busketball[.]com
intel[.]gmailboxes[.]com
invest[.]gmailboxes[.]com
itlove[.]bigish[.]net
jackhouse[.]bigish[.]net
junier[.]busketball[.]com
kbwfj[.]arrowservice[.]net
klbis[.]bigish[.]net
kl-hqun[.]gmailboxes[.]com
kllhd[.]bigish[.]net
klwest[.]purpledaily[.]com
klzafin[.]bigish[.]net
loading[.]bigish[.]net
love[.]arrowservice[.]net
love[.]busketball[.]com
lovecow[.]homenet[.]org
lovewater[.]now[.]im
mail[.]bigish[.]net
mail[.]gmailboxes[.]com
mail-na[.]businessformars[.]com
main[.]busketball[.]com
main[.]gmailboxes[.]com
max[.]arrowservice[.]net
mbc[.]busketball[.]com
mc[.]bigish[.]net
me[.]busketball[.]com
micyuisyahooapis[.]com
midstate[.]arrowservice[.]net
milk[.]arrowservice[.]net
mini[.]arrowservice[.]net
miss[.]pwnz[.]org
mko[.]busketball[.]com
mkx[.]arrowservice[.]net
mkx[.]gmailboxes[.]com
monewf[.]bigish[.]net
monlc[.]marsbrother[.]com
mos[.]arrowservice[.]net
moto[.]busketball[.]com
mpe[.]arrowservice[.]net
msdn[.]bigish[.]net
new[.]arrowservice[.]net
newfe[.]purpledaily[.]com
news[.]busketball[.]com
newspappers[.]org
nokkia[.]bigish[.]net
nousage[.]arrowservice[.]net
nrcod[.]arrowservice[.]net
oliver[.]arrowservice[.]net
omin[.]marsbrother[.]com
ope[.]coastmaritime[.]org
opp[.]coastmaritime[.]org
opp[.]globalsecuriy[.]org
orca[.]arrowservice[.]net
paekl[.]gmailboxes[.]com
pdns[.]info[.]tm
phb[.]arrowservice[.]net
pieckl[.]bigish[.]net
point[.]gmailboxes[.]com
ppt[.]arrowservice[.]net
ppt[.]ezua[.]com
purpledaily[.]com
qhun-mons[.]businessformars[.]com
records[.]marsbrother[.]com
release[.]busketball[.]com
repid[.]arrowservice[.]net
rfckl[.]bigish[.]net
rice[.]bigish[.]net
rixiokl[.]bigish[.]net
russiaactions[.]summitnato[.]ro
saltlakenews[.]org
sbasun[.]busketball[.]com
scpkl[.]bigish[.]net
sea[.]arrowservice[.]net
service[.]arrowservice[.]net
service[.]purpledaily[.]com
services[.]busketball[.]com
services[.]gmailboxes[.]com
skill[.]arrowservice[.]net
sksucc[.]arrowservice[.]net
sona[.]arrowservice[.]net
spckl[.]bigish[.]net
spcmon[.]marsbrother[.]com
sremx[.]bigish[.]net
ssun[.]arrowservice[.]net
stock[.]bigish[.]net
stoneal[.]bigish[.]net
stulaw[.]bigish[.]net
stuwal[.]gmailboxes[.]com
suicide[.]suicide-forum[.]com
sun[.]arrowservice[.]net
suncirf[.]bigish[.]net
suntop[.]arrowservice[.]net
sword[.]bigish[.]net
tclient[.]arrowservice[.]net
tia[.]gmailboxes[.]com
topbox[.]gmailboxes[.]com
topbus[.]busketball[.]com
topkl[.]bigish[.]net
topmoney[.]purpledaily[.]com
tour[.]bigish[.]net
trb[.]arrowservice[.]net
trip[.]arrowservice[.]net
ttestt[.]arrowservice[.]net
ug-rj[.]arrowservice[.]net
update[.]busketball[.]com
updating[.]ddns[.]info
usapappers[.]com
ustop[.]bigish[.]net
vipmx[.]businessformars[.]com
vockl[.]bigish[.]net
walk[.]bigish[.]net
walstb[.]gmailboxes[.]com
was[.]arrowservice[.]net
wasa[.]arrowservice[.]net
wcasekl[.]gmailboxes[.]com
web[.]arrowservice[.]net
weblog[.]bigish[.]net
webmail[.]arrowservice[.]net
westjoe[.]purpledaily[.]com
westking[.]bigish[.]net
westnew[.]marsbrother[.]com
what[.]arrowservice[.]net
whl[.]bigish[.]net
wk[.]gmailboxes[.]com
works[.]myddns[.]com
workstation[.]arrowservice[.]net
www[.]arrowservice[.]net
www[.]globalsecuriy[.]org
www-01[.]marsbrother[.]com
www-02[.]marsbrother[.]com
www2[.]dsmtp[.]com
www2[.]wikaba[.]com
www-dell[.]marsbrother[.]com
www-hp[.]marsbrother[.]com
www-ibm[.]busketball[.]com
wwww[.]arrowservice[.]net
zgrshy[.]zyns[.]com
zgrshy10[.]zyns[.]com
zgrshy11[.]zyns[.]com

******************************
Malware Indicator Awareness List
******************************

MD5 Checksum

242946ed32dc3749e5b4f7827b905e5e
b2ddcf194cacc69ee7bcd3f9989f6162
5c58a8d8cab00ad3fac419da03644b59
1cc0ce317edad8521c236c84b74e14f8
9d42ce823fc711eaeb542f4050f17125
8845cb5b4e450cb10a3b6ca41a9b4319
1fe90bd6a1092ec74f78181785e785f8
a6e7504315f5dada56189635cd7a27b1
957b13cffeea1722a2369e2bb5e79287
0e98cffc64a1e822946066f62e1fd02c
1a87d955bc876098f50b8a48d8db4aaf
a207590fdcec8018c5a902483b651302
9087f73602d81be177b568e15f6b033b
a884545277cae36928f36c372f6a18ac
051967e8a92a6e1b02a6c8b2225b01c5
314d5943e55c065e40f3a20ab56de7a3
697b18e734740ad9129ebd241040492a
7f7cc1a8d7a6bbe6a52c94bb7f41f727
b8988e23d4d8427584637d1f9ab78a8e
e6446d52e9f4b5c2c5a9ac850281cae8
bf778439895829ff986207900bfcfe02
1d69504a3d3ac32275fa4df8af25d1f7
cf96139290c09963a32506cd85825ed3
3b266b165468b810cd456cdf88ca8619
88c0e5a4ca408ac12acaaf7a9ef9eb49
08ac41ce00bf436a3dc23c4639d5f5ed
2a8f14ed1cb6fdb49ab946fc54fc8c86
4a54d7878d4170c3d4e3c3606365c42c
659fb07c70034571de7a1b4b5ac86b01
7c6443e646c973ac10a1048d521a70a9
82c598abdf848c6fef03c63f5cf7feaf
888eadff6982de01c60891ce185473b7
9a847c1f54359ffd3c335e97600f6f5d
a19e68e72084d867a39776faaa6f5fce
e27f0975fd3278e7303102783767c508
d36427db95cd055a5a25f445d80c27ee
e3faff9149fed468aa63f10a40b935d6
c7f7d8bf633a1b81088315b93831e82d
7f90942ace185ca1ba5610f6eddf3376
ad95f613fc4b644bd5e3230eb0b5dbcc
4943a255952e107fec41e9c29a5b2724
c7d5845718c7fa5a777bcd801d8e00f4
34062335f95d074272a5487be37ee701
3f82f1cba90d320af90d965a321a1187
45a4141f603c8bfa7950e15a074ef976
4bc894e369f31b7190eaeb99c23eb000
55f41be09de5dcd5aaa0132804506868
6eb99bed5b5fcb3fdb26f37aff2c9adb
87cf89742ef0a1c1f76664caa6c0a1a7
b9f20ff30ce6dbb461ab6d27fe8c4bda
bcc6addece28265390b2d535d65c49b8
fc277785c49d743697adc06a3db77c5d
2de36fa400225c39481283daf4a686d8
324a7d63a178f3ac8dde5b59675ef282
37bd6fceaf412427db8c8a34c5ad9ba7
3a33dbe37292a1cbfa760d1892812e08
c243a7c1cf23b91f73100bb9e947439e
caafdafdd17abe0f0303a456bcd4ab01
e194a6d7f1aa6671d2134047050a4322
e35414a5cb10bccf6424ee51f0cdd6cc
21e35f309f7d6368fd8346ba409fab73
3fa99e50933ce584d010ec194229764a
41b551d30321a5ae1342180d1e73e82e
7cd15bb31ff889e81f370d0535e02493
9428a54a7acd6adc3f9b662ef432edf4
f82d3b270b16780044817978f4f3fe1a
22e10cbe46f406f5f1be0d613db4c2c3
a6cba31fcca49ff9ed6fd9894644de9e
48fc61a8f94c6e7c9c8965817f57af7e
00b61db083b07a64fb6072b42aa83dc1
aea5dc22e706c836d056f4ba1f13dea3
3599a78c7e99b451c00d3490f17f842f
137aad4c7c4e0d8ba0ad74c34cf8434c
14095f921f50cf639bf00b389ea79959
2d2876bd1f263babe9d09e8e950916cc
ac9e0b2af215821f7223b6eaeaea03db
c5851c22c2a2e4bccf015a20e0af6cac
c9645367f032bf12b251e4f30e21b936
cec766518fa5b607157e92e9c24c0d03
da521200a939a9fe85f467d65d419990
6428ac60d1eea0f20073cfb869674266
affc4d42a6a66f6a745c5702608d0442
c296ae9220c44e51cfbeb029b6103d1b
cfdd9241adcda8755c54032fd2b5757d
db22512d361a339cfadaa275c550b385
e2a557b39231ee91724c150e3ec4b493
491db327f479a1a34898229811fa8a5d
6b6a9062e9c74a98a1f1a2fe7c2adcd7
D46D261EC92DAF703CD584F10037198C
ce2f4abe8b4f3a57891ca865c4fe6ece
3de1bd0f2107198931177b2b23877df4
a207590fdceb8018b5a902483b651302
0ba71b7dbf0394f509ef6174faa0bbf0
1a8ee0ec99320e213432a26a91df8811
232d1be2d8cbbd1cf57494a934628504
6ae05937bce80b7d16497cb82e6a52d6
73e81b099f9b469a07063555e822dac1
39f1ac84ad939fb72cc6e438ecea9729
3a2cdf3c09c061a5cf6a58069506955a
f3c6c797ef80787e6cbeeaa77496a3cb
217c9dc682018c7055c660dd5dd0f8ca
1cb4b79e338bec06e65ff8d37de53c55
dd2aec3803ce39c4a148325d33f575e3
5474e37159b1a438659e7e5bf1f45389
48437eb28ff1bfff5c0a4661a8c3055d
310cba19e6f7fd07adf203c27e46a0c9
9cb4ee95948292be131f7c4ee3bdcf21
7ce22cb797d2940818154ce0dcc48306
53f1e2e5f0152a3a119e112b6cf5426e
204c13f7ed2d3e5c78f3ef8a44eb561c
ca6fe7a1315af5afeac2961460a80569
53f49c58613669f25921de0b6dae1268
82e0472271500713cd2457921ab1c565
93e33bf0417a857ae894ed294aa0e15a
9e5df2cfd0c8def21c9e114d1d2696dd
******************************
IP Address Awareness List
******************************

100[.]42[.]216[.]230
108[.]166[.]200[.]130
108[.]171[.]211[.]152
108[.]171[.]251[.]102
113[.]196[.]231[.]13
12[.]11[.]239[.]25
12[.]14[.]129[.]91
12[.]15[.]0[.]131
12[.]167[.]251[.]84
12[.]2[.]49[.]115
12[.]232[.]138[.]23
12[.]30[.]41[.]134
12[.]33[.]114[.]160
12[.]33[.]114[.]224
121[.]55[.]220[.]79
122[.]146[.]219[.]130
129[.]44[.]254[.]139
140[.]112[.]19[.]195
140[.]116[.]72[.]95
161[.]58[.]177[.]111
161[.]58[.]93[.]50
163[.]20[.]172[.]230
172[.]254[.]222[.]138
173[.]10[.]39[.]53
173[.]160[.]48[.]149
173[.]163[.]133[.]177
173[.]224[.]213[.]184
173[.]224[.]213[.]247
173[.]224[.]215[.]177
173[.]231[.]45[.]231
173[.]254[.]222[.]138
199[.]119[.]201[.]124
203[.]170[.]198[.]56
204[.]11[.]236[.]81
204[.]111[.]73[.]150
204[.]111[.]73[.]155
204[.]12[.]248[.]2
204[.]13[.]68[.]10
204[.]14[.]142[.]210
204[.]14[.]88[.]45
204[.]215[.]64[.]28
204[.]249[.]169[.]4
204[.]249[.]169[.]5
204[.]45[.]16[.]204
204[.]74[.]218[.]145
204[.]9[.]208[.]14
205[.]159[.]83[.]12
205[.]209[.]161[.]13
205[.]209[.]172[.]204
205[.]234[.]168[.]48
207[.]173[.]155[.]44
207[.]36[.]209[.]221
207[.]40[.]43[.]102
207[.]71[.]209[.]148
208[.]109[.]50[.]151
208[.]185[.]233[.]163
208[.]239[.]156[.]123
208[.]37[.]108[.]211
208[.]53[.]100[.]162
208[.]68[.]171[.]220
208[.]69[.]32[.]231
208[.]77[.]45[.]131
208[.]77[.]45[.]142
208[.]77[.]45[.]82
208[.]77[.]51[.]210
208[.]87[.]241[.]135
209[.]113[.]219[.]6
209[.]18[.]107[.]90
209[.]208[.]114[.]83
209[.]208[.]95[.]7
209[.]247[.]221[.]40
209[.]247[.]221[.]50
209[.]25[.]220[.]42
209[.]74[.]45[.]226
209[.]75[.]160[.]64
210[.]244[.]193[.]249
211[.]21[.]210[.]220
216[.]1[.]59[.]4
216[.]143[.]158[.]107
216[.]145[.]228[.]153
216[.]213[.]199[.]194
216[.]215[.]103[.]2
216[.]36[.]123[.]11
216[.]62[.]168[.]249
216[.]65[.]11[.]111
218[.]32[.]87[.]100
219[.]87[.]141[.]74
24[.]249[.]171[.]231
46[.]105[.]227[.]80
50[.]62[.]130[.]15
58[.]86[.]239[.]103
60[.]251[.]74[.]9
61[.]218[.]144[.]43
61[.]221[.]67[.]184
63[.]102[.]52[.]130
63[.]111[.]125[.]50
63[.]114[.]150[.]17
63[.]120[.]209[.]85
63[.]126[.]244[.]253
63[.]134[.]229[.]137
63[.]134[.]229[.]138
63[.]134[.]233[.]60
63[.]134[.]233[.]62
63[.]138[.]249[.]244
63[.]139[.]221[.]130
63[.]139[.]221[.]26
63[.]147[.]185[.]40
63[.]147[.]31[.]178
63[.]162[.]4[.]2
63[.]162[.]42[.]46
63[.]163[.]61[.]9
63[.]171[.]89[.]5
63[.]195[.]112[.]159
63[.]200[.]159[.]118
63[.]211[.]192[.]150
63[.]211[.]192[.]181
63[.]225[.]225[.]42
63[.]228[.]128[.]19
63[.]245[.]62[.]11
63[.]246[.]147[.]11
63[.]64[.]175[.]136
63[.]73[.]10[.]130
63[.]73[.]11[.]15
63[.]82[.]1[.]226
63[.]84[.]24[.]72
63[.]84[.]24[.]77
63[.]97[.]51[.]121
64[.]122[.]68[.]213
64[.]126[.]12[.]2
64[.]14[.]81[.]30
64[.]184[.]2[.]3
64[.]25[.]15[.]226
64[.]32[.]164[.]43
64[.]34[.]172[.]210
64[.]4[.]217[.]138
64[.]50[.]130[.]74
64[.]65[.]230[.]242
64[.]81[.]194[.]171
64[.]81[.]252[.]163
65[.]107[.]54[.]158
65[.]112[.]75[.]130
65[.]114[.]195[.]226
65[.]116[.]58[.]5
65[.]119[.]5[.]3
65[.]124[.]105[.]76
65[.]17[.]233[.]30
65[.]207[.]215[.]10
66[.]0[.]167[.]105
66[.]153[.]38[.]202
66[.]155[.]114[.]145
66[.]16[.]75[.]201
66[.]167[.]118[.]29
66[.]179[.]156[.]10
66[.]181[.]8[.]162
66[.]23[.]224[.]213
66[.]28[.]12[.]144
66[.]55[.]14[.]78
66[.]85[.]185[.]201
66[.]92[.]12[.]252
66[.]93[.]91[.]235
67[.]102[.]7[.]3
67[.]109[.]132[.]202
67[.]109[.]90[.]99
67[.]132[.]222[.]231
67[.]133[.]107[.]131
67[.]19[.]22[.]82
67[.]88[.]107[.]8
67[.]93[.]14[.]2
68[.]165[.]209[.]227
68[.]72[.]242[.]130
69[.]11[.]244[.]91
69[.]152[.]184[.]182
69[.]20[.]4[.]85
69[.]20[.]5[.]223
69[.]20[.]6[.]142
69[.]20[.]61[.]230
69[.]25[.]176[.]110
69[.]25[.]50[.]10
69[.]28[.]168[.]10
69[.]3[.]32[.]220
69[.]39[.]133[.]114
69[.]39[.]133[.]115
69[.]39[.]133[.]117
69[.]5[.]38[.]37
69[.]53[.]120[.]170
69[.]55[.]180[.]4
69[.]69[.]94[.]3
69[.]74[.]43[.]87
69[.]90[.]123[.]6
69[.]95[.]204[.]2
70[.]62[.]232[.]98
70[.]86[.]21[.]146
71[.]130[.]117[.]49
71[.]16[.]27[.]212
71[.]6[.]141[.]230
71[.]6[.]51[.]180
71[.]6[.]51[.]181
71[.]63[.]28[.]61
72[.]167[.]162[.]96
72[.]167[.]33[.]182
72[.]22[.]11[.]30
72[.]236[.]177[.]171
72[.]242[.]59[.]163
72[.]245[.]176[.]82
72[.]9[.]145[.]216
72[.]91[.]193[.]160
72[.]94[.]51[.]6
74[.]115[.]0[.]29
74[.]115[.]6[.]20
74[.]165[.]93[.]5
74[.]200[.]213[.]110
74[.]206[.]99[.]189
74[.]208[.]227[.]72
74[.]208[.]45[.]82
74[.]211[.]195[.]39
74[.]213[.]52[.]10
74[.]55[.]160[.]98
74[.]55[.]178[.]42
74[.]63[.]87[.]106
74[.]86[.]197[.]56
74[.]86[.]31[.]98
74[.]9[.]137[.]146
74[.]92[.]102[.]227
74[.]94[.]16[.]166
74[.]94[.]52[.]114
75[.]126[.]166[.]204
75[.]145[.]139[.]19
75[.]148[.]254[.]114
75[.]52[.]208[.]225
75[.]77[.]82[.]115
75[.]77[.]82[.]219
76[.]160[.]133[.]60
76[.]161[.]97[.]99
77[.]247[.]180[.]154
94[.]195[.]239[.]81
98[.]126[.]107[.]34

******************************
Domain Name Awareness List
******************************

advanbusiness[.]com
aoldaily[.]com
applesoftupdate[.]com
arrowservice[.]net
articles[.]twilightparadox[.]com
aunewsonline[.]com
bechtel[.]chickenkiller[.]com
bigish[.]net
businessconsults[.]net
businessformars[.]com
canadatvsite[.]com
canoedaily[.]com
chileexe77[.]com
climate[.]undo[.]it
cnndaily[.]com
cnndaily[.]net
comrepair[.]net
defenceonline[.]net
downloadsite[.]me
e-cardsshop[.]com
economic[.]mooo[.]com
firefoxupdata[.]com
freshreaders[.]net
honeycow[.]keren[.]la
hugesoft[.]org
info[.]serveusers[.]com
issnbgkit[.]net
jobsadvanced[.]com
marsbrother[.]com
mcafeepaying[.]com
news[.]trickip[.]org
newsonet[.]net
newsonlinesite[.]com
niemannews[.]com
nytimesnews[.]net
pop-musicsite[.]com
rssadvanced[.]org
satellitebbs[.]com
staycools[.]net
symanteconline[.]net
thehealthmood[.]net
todayusa[.]org
upload[.]ignorelist[.]com
usabbs[.]org
usnewssite[.]com
voiceofman[.]com
work[.]myftp[.]name
yahoodaily[.]com

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, CYBER-STASI, CYBERCRIME, INTERNET CRIME May 3, 2013May 3, 2018 11 Minutes

Revealed – DHS-FBI Indicators and Protective Measures In Light of Boston Marathon Explosions

DHS-FBI-BostonMarathonIndicators

(U//FOUO) This Joint Intelligence Bulletin provides law enforcement and private sector safety officials with protective measures in light of the recent explosions that took place at the 2013 Boston Marathon in Boston, Massachusetts. The information is provided to support the activities of DHS and FBI and to assist federal, state, local, tribal, and territorial government counterterrorism and first responder officials and the private sector to deter, prevent, preempt, or respond to terrorist attacks in the United States.

(U) Incident Details

(U) On 15 April 2013, at approximately 2:45 pm, two explosions occurred in quick succession near the finish line of the Boston Marathon, killing at least three people and causing numerous injuries.

(U) Ongoing Concerns with Terrorism in the Homeland

(U//FOUO) The activities in Boston highlight the use of improvised explosive devices (IEDs) to target large gatherings, including at special events, in order to inflict mass casualties. Examples of previously attempted or plotted IED attacks include:

— (U//FOUO) The undetonated IED discovered along the planned 2011 “Martin Luther King Jr. Unity March” parade route in Spokane, Washington;
— (U//FOUO) The November 2010 plot to detonate a vehicle-borne IED (VBIED) at an annual Christmas tree lighting ceremony in Portland, Oregon;
— (U//FOUO) The October 2010 plot to conduct multiple mass casualty bombings at Metrorail stations in Washington, DC;
— (U//FOUO) The May 2010 attempted detonation of a vehicle-borne IED in Times Square; and
— (U//FOUO) The September 2009 plot to attack the New York City subway using IEDs.

(U//FOUO) Indicators of Pre-Operational Surveillance and Attack Planning

(U//FOUO) Given these events, we are providing indicators and protective measures to aid law enforcement and first responders in identifying and mitigating potential threats. Each indicator listed below may be by itself, lawful conduct or behavior and may also constitute the exercise of rights guaranteed by the US Constitution. In addition, there may be a wholly innocent explanation for conduct or behavior that appears suspicious in nature. For this reason, no single indicator should be the sole basis for law enforcement action. The totality of behavioral indicators and other relevant circumstances should be evaluated when considering any law enforcement response or action.

(U//FOUO) Possible indicators of pre-operational surveillance or attack planning include:

— (U//FOUO) Unusual or prolonged interest in or attempts to gain sensitive information about security measures of personnel, entry points, peak days and hours of operation, and access controls such as alarms or locks;
— (U//FOUO) Observation of security reaction drills or procedures; multiple false alarms or fictitious emergency calls to same locations or similar venues;
— (U//FOUO) Discreet use of cameras or video recorders, sketching, or note-taking consistent with pre-operational surveillance;
— (U//FOUO) Interest in speaking with building maintenance personnel;
— (U//FOUO) Observation of or questions about facility security measures, to include barriers, restricted areas, cameras, and intrusion detection systems;
— (U//FOUO) Observations of or questions about facility air conditioning, heating, and ventilation systems;
— (U//FOUO) Suspicious purchases of items that could be used to construct an explosive device, including hydrogen peroxide, acetone, gasoline, propane, or fertilizer;
— (U//FOUO) Suspicious activities in storage facilities or other areas that could be used to construct an explosive device; and
— (U//FOUO) Attempted or unauthorized access to rooftops or other potentially sensitive areas.DHS-FBI-BostonMarathonIndicators

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, PUBLIC INTELLIGENCE April 29, 2013May 21, 2018 2 Minutes

TOP-SECRET-DHS-FBI Information Regarding the Devices Likely Used in Boston Marathon Explosions

DHS-FBI-BostonMarathonDevices

(U//FOUO) This Joint Intelligence Bulletin provides information on the devices used in the 15 April 2013 Boston Marathon explosions. The information is intended to provide aid in identifying devices and to support the activities of DHS and FBI and to assist federal, state, local, tribal, and territorial government counterterrorism and first responder officials and the private sector to deter, prevent, preempt, or respond to terrorist attacks in the United States.

(U//FOUO) Incident Details

(U) On 15 April 2013, at approximately 2:50 p.m., two explosions occurred in quick succession near the finish line of the Boston Marathon, killing at least three people and causing numerous injuries. Preliminary findings reveal the two devices were located less than a block apart, and functioned within approximately 10-15 seconds of each other. Both devices were concealed in backpacks and placed where spectators were gathered.

(U) Preliminary Device Details

(U//FOUO) Based on preliminary examination of photographs and on-scene reports, one improvised explosive device (IED) consisted of a pressure cooker concealed in a backpack with an as of yet determined main charge (possibly a low explosive) and improvised fragmentation, possibly including nails, BBs, and ball bearings. The other device was also housed in a metal container, but currently there is insufficient evidence to determine if it was also a pressure cooker. The fuzing system and method of initiation for the two devices are unknown at this time.

(U//FOUO) Further post-blast analysis and chemical analysis is necessary to confirm the presence of these components and the identity of the main charge explosive. Collection of evidence is ongoing and forensic and technical analysis will be forthcoming.

(U) Ongoing Concerns with Terrorism in the Homeland

(U//FOUO) The activities in Boston highlight the use of IEDs to target large gatherings, such as special events, in order to inflict mass casualties. Pressure cooker bombs are extremely common in Southwest Asia and have been used in a number of high profile bombings in India, Pakistan, and Afghanistan. They have also been referenced in extremist publications such as Inspire and the The Anarchist Cookbook. Examples of previously attempted or plotted IED attacks using pressure cookers include:

— (U//FOUO) One of three devices used in the 1 May 2010 attack in Times Square incorporated a pressure cooker containing approximately 120 firecrackers.
— (U//FOUO) On 24 May 2012, PFC Naser Jason Abdo was convicted of attempted use of a weapon of mass destruction and, on 10 August 2012, was sentenced to two consecutive sentences of life in prison, plus 60 years. He was in possession of bomb-making components, including two pressure cookers.

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, TERRORISM, TOP SECRET April 26, 2013May 29, 2018 2 Minutes

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Follow me on Twitter

My Tweets

Recent Posts

  • 🎬🧛‍♂️💼 THE CINEMATIC UNIVERSE: COME THE NIGHT, COME THE LEGEND 💼🧛‍♂️🎬
  • “I command the oceans and shake the earth. My real power is trying to get Logistics to approve a trident repair order before the quarterly tsunami.” 🌊⚡📋 #MarineOperations #DivineLogistics
  • 👯‍♂️�👁️💸  🍑🔴🔥👠 😾💄💸 💅📊📈😾💄💸 “👿🌀💸 🌟👁️💸 🌟👁️💸 “EHLERS ENEMA ENIGMA: “THE INFERNAL FLUSH” 🌊💉☭🔥🩸🐪⚡🧬👑🍼🏳️‍⚧️🚽💦🎪👑 🌪️🍼⚔️  🐱🏆🌪️ 👑📉  💋📊💃🎭⚗️💀  🌑📊📈👿🌀💸🎭⚗️💀  🌑📊📈👿🌀💸🎭⚗️💀  🌑📊📈 💅📊📈👠🔥🌪️💥✨ EHLERS’ ENEMA ENIGMA🍶👑💦🔥💫 🌪️💥✨ 🍶👑💦🔥💫🎪📊📈🎪📊📈😁💃😂 EMIR EHLERS’ ENEMA ENIGMA EXPOSED👯‍♂️ “EPSTEIN’S  EINSPRITZER ENEMA EINZELLER ENDDARM EXISTENZISOZIALISMUS EPILOG ENDE”💃😘🤡🤡POWERED BY IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT ALIAS GOMOPA & ST PAULI PIMP KLISTIER GAZETTE 📰: EHLERS ENEMA ELITE: MUSCHI WUSCHI MEPHISTO’S ENEMA TOXDAT KLISTIER FLUSH😁💃😂😁💃😂 👯‍♂️
  • Shadows of Harmony: 💃Kestrels of the Kraken: 🌌🔫💥 “THE SCANDAL OF MESSALINA”🔪🍰💥🗳️🌉🐉🕺🔥 💃🔥🕺🔥⛪️⚔️🎪🌀🌀🤣  🤣🌀💎🌌 ✨🌌💥🔫🌌👯‍♂️👯‍♀️ THE MURKY MUCHA-MUDDY-WATERS SAGA😎😎KRAUT VERSION GRATIS!🧐POWERED BY IDIOT ZEITUNG (IZ), DER FONDSFLOP vulgo DAS DESINVESTMENT alias GOMOPA, DER STASI STUERMER (SS) – CHICAGO🤡 EDITION😎🥰
  • INVESTMENT THE ORIGINAL DIGEST DECEMBER 18/19 2025✌INVESTMENT DAS ORIGINAL 18./19. DECEMBER 2025 FOUNDED IN 2000 ANNO DOMINI✌

Top Posts & Pages

  • Global Real Estate Media Content Analysis: Algorithms of Erasure - Mastersson Dossier Series XXXII
  • List of the Employees of the Federal Security Service of the Russian Federation -ORIGINAL DOCUMENT
  • ""ABOUT ME""
  • The Secret List of Off-Shore-Companies, Persons and Adresses, Part 68, Hong Kong
  • TOP-SECRET - LIST OF MEMBERS OF THE INTELLIGENCE AND NATIONAL SECURITY ALLIANCE
  • The Secret List of Off-Shore-Companies, Persons and Adresses, Part 147, SINGAPORE,
  • OFFSHORE-COMPANIES-UNDER-INVESTIGATION:MALTA
  • 🎪👑 The Great Royal Tragedy 4.0: The Coronation of Confusion 👑🎪
  • China's AI Armageddon: Declassified Docs Expose $150B Bid for Global Tech Supremacy by 2030
  • The Secret List of Off-Shore-Companies, Persons and Adresses, Part 3, United Kingdom

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • August 2018
  • July 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015
  • September 2015
  • August 2015
  • July 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015
  • February 2015
  • January 2015
  • December 2014
  • November 2014
  • October 2014
  • September 2014
  • August 2014
  • July 2014
  • June 2014
  • May 2014
  • April 2014
  • March 2014
  • February 2014
  • January 2014
  • December 2013
  • November 2013
  • October 2013
  • September 2013
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • December 2012
  • November 2012
  • October 2012
  • September 2012
  • August 2012
  • July 2012
  • June 2012
  • May 2012
  • April 2012
  • March 2012
  • February 2012
  • January 2012
  • December 2011
  • November 2011
  • October 2011
  • September 2011
  • August 2011
  • July 2011
  • June 2011
  • May 2011
  • April 2011
  • March 2011
  • February 2011
  • January 2011
Follow Bernd Pulch on WordPress.com

Categories

  • 1111 HZ
  • 432 HZ
  • 528 HZ
  • 639 HZ
  • 777 HZ
  • 963 HZ
  • ABIGAIL JOHNSON
  • ABOVE TOP SECRET
  • ABSA GROUP
  • ADELSON
  • ADOLF HITLER
  • ADVENTURE
  • AFGHANISTAN
  • AFRICA
  • AFTERLIFE
  • AGENT
  • AL JAZEERA
  • ALABAMA
  • ALASKA
  • ALBANIA
  • ALBRECHT
  • ALBRECHT DUERER
  • ALBRECHT SASS
  • ALEXANDER LITVINENKO
  • ALEXANDER VON HOLST
  • ALEXEJ NAWALNY
  • ALGERIA
  • ALIENS
  • ALINE KLEINWÄCHTER
  • ALLSTATE CORPORATION
  • ALLY FINANCIAL
  • AMERICAN EXPRESS
  • AMERICAN SAMOA
  • AMERIPRISE FINANCIAL
  • ANACONDA NICKEL
  • ANDORRA
  • ANDREAS LORCH
  • ANGELA MERKEL – IM ERIKA
  • ANGOLA
  • ANGUILLA
  • ANHEUSER-BUSCH INBEV
  • ANIMALS
  • ANIMATION
  • ANNE HOLST
  • ANNE VON HOLST
  • ANNETTE VON HOLST
  • ANONYMOUS
  • ANREJ BEYER
  • ANT FINANCIAL
  • ANTARCTICA
  • ANTHONY VAN DYKE
  • ANTIGUA-BARBUDA
  • ANTISEMITISM
  • APONTE
  • APPALOOSA MANAGEMENT
  • APPLE
  • ARCTIC
  • ARGENTINA
  • ARIZONA
  • ARKANSAS
  • ARMENIA
  • ART
  • ARTIFICIAL INTELLIGENCE
  • ARTIFICIAL LIFE
  • ARTUS RUNDE
  • ARUBA
  • ASIA
  • ASIA RADAR
  • AUKUS
  • AUSCHWITZ LEUGNER
  • AUSTRALIA
  • AUSTRALIA & NEW ZEALAND BANKING GROUP
  • AUSTRIA
  • AZERBAIJAN
  • BABYLON BEE
  • BAHAMAS
  • BAHRAIN
  • BANANENREPUBLIK
  • BANGLADESH
  • BANK
  • BANK OF AMERICA
  • BANK ONE
  • BARBADOS
  • BAROQUE
  • BATTLES
  • BEATE PORTEN
  • BELARUS
  • BELEIDIGUNGEN
  • BELGIUM
  • BELIZE
  • BENIN
  • BERKSHIRE HATHAWAY INC.
  • BERLIN
  • BERMUDA
  • BERND PULCH
  • BHUTAN
  • BILDERBERG
  • BILL GATES, BILL & MELINDA GATES FOUNDATION,
  • BILLIONAIRES, "PHILANTHROPS", THE GOOD CLUB
  • BLACKOUT
  • BLACKROCK
  • BLUES
  • BMW
  • BND
  • BNP PARIBAS
  • BOK FINANCIAL CORPORATION
  • BOLIVIA
  • BONDS
  • BOOKS
  • BOSNIA-HERZEGOVINA
  • BOTSWANA
  • BRAZIL
  • BRICS
  • BRIDGEWATER ASSOCIATES
  • BRUNEI
  • BTG PACTUAL
  • BULGARIA
  • BURKINA FASO
  • BURLESQUE
  • BURUNDI
  • BUSINESS
  • BYD
  • BYZANTINE STYLE
  • CALIFORNIA
  • CALYPSO
  • CAMBODIA
  • CAMEROON
  • CANADA
  • CANTOR FITZGERALD
  • CAPE VERDE
  • CARAVAGGIO
  • CARLOS SLIM HELU
  • CARTOON
  • CASANOVA
  • CATHAY FINANCIAL
  • CAYMAN ISLANDS
  • CÔTE D'IVOIRE (IVORY COAST)
  • CBS NEWS
  • CELEBRITY
  • CENSORSHIP
  • CENTRAL AFRICAN REPUBLIC
  • CHAD
  • CHARLES SCHWAB
  • CHECHNYA
  • CHILD EXPLOITATION
  • CHILDREN
  • CHILE
  • CHINA
  • CHINA CINDA ASSET MANAGEMENT
  • CHONGQING ZFSW BIOLOGICAL PRODUCTS
  • CHRISTIAN
  • CHRISTIAN BROADCASTING NETWORK
  • CHRISTMAS ISLAND
  • CIA
  • CIA NAMES
  • CISA
  • CIT GROUP, INC
  • CITADEL
  • CITIGROUP
  • CIVIL WAR
  • CLASSICAL MUSIC
  • CLAUDE MONET
  • CLIMATE
  • CLIMATE CLOWNS
  • CLIMATE HOAX
  • CLOWN HORROR MOVIES
  • CLOWN SHOW
  • COCOS (KEELING) ISLANDS
  • COLOMBIA
  • COLORADO
  • COMEDY
  • COMMENTARY
  • COMMERCIAL REAL ESTATE
  • COMMERCIALS
  • COMMUNISTS
  • COMOROS
  • CONFIDENTIAL
  • CONGO
  • CONGO, REPUBLIC OF (BRAZZAVILLE)
  • CONGRESS
  • CONNECTICUT
  • CONSORCIO FINANCIERO
  • CONSPIRACY PRACTICE
  • CONTEMPORARY AMPEREX TECHNOLOGY
  • CONTINENTAL RESOURCES
  • CORONA
  • CORPORATE
  • CORRUPTION
  • COSTA RICA
  • COUNTERSPY
  • COUNTERTERRORISM
  • COUNTRY GARDEN HOLDINGS
  • COUNTRY MUSIC
  • COUP D' ETAT
  • COVID19
  • CRASH
  • CREDICORP
  • CREDIT AGRICOLE
  • CREDIT SUISSE
  • CRIME
  • CROATIA
  • CRYPTOCURRENCIES
  • CRYPTOME
  • CTBC FINANCIAL HOLDING
  • CUBA
  • CULT MOVIES
  • CULTS & SECTS
  • CULTURE
  • CYBER-STASI
  • CYBERCRIME
  • CYBERMOBBING
  • CYBERPANDEMIC
  • CYBERPUNK
  • CYBERSECURITY
  • CYBERWAR
  • CYPRUS
  • CYRUS POONAWALLA
  • CZECH REPUBLIC
  • CZECHOSLOVAKIA
  • DAISHIN SECURITIES
  • DAN BONGINO SHOW
  • DANIEL ELLSBERG
  • DAVID THOMSON
  • DBS GROUP HOLDINGS
  • DDR
  • DDR-LIST
  • DDR-LISTE
  • DEA
  • DEEP STATE
  • DEFCON
  • DEL VECCHIO
  • DELAWARE
  • DEMOCRATIC REPUBLIC OF THE CONGO (KINSHASA)
  • DENMARK
  • DEPARTMENT OF DEFENSE
  • DEPARTMENT OF FINANCE
  • DEPARTMENT OF JUSTICE
  • DEPARTMENT OF STATE
  • DEPARTMENT OF TREASURY
  • DEPOSITORY TRUST AND CLEARING CORPORATION
  • DERIVATE
  • DGB FINANCIAL GROUP COMPANY
  • DHS
  • DIE BEWERTUNG
  • DIE LINKE
  • DIE ZENTRALE HINRICHTUNGSSTAETTE
  • DIEGO VELAZQUEZ
  • DIFFAMIERER & ERPRESSER
  • DIGITAL CURRENCIES
  • DIGITAL MONEY
  • DIRTY MONEY
  • DISASTER
  • DISTRICT OF COLUMBIA
  • DOCUMENTARY
  • DOMINICAN REPUBLIC
  • DONALD BREN
  • DONALD TRUMP
  • DONATIONS
  • DOREEN TRAMPE
  • DR MABUSE
  • DR RAINER ZITELMANN
  • DR THOMAS SCHULTE
  • DROHUNGEN
  • DRONES
  • DRUG CARTELS
  • DRUGS
  • DUBAI
  • DYSTOPIA
  • EAGLE IT
  • EAST GERMANY
  • EAST TIMOR (TIMOR-LESTE)
  • EASTERN EUROPE
  • ECONOMY
  • ECUADOR
  • EDITH BAUMANN-LORCH
  • EDITORIAL
  • EDOUARD MANET
  • EDWARD SNOWDEN
  • EEV
  • EGYPT
  • EHEPAAR BEATE UND THOMAS PORTEN
  • EHRENFRIED STELZER
  • EL SALVADOR
  • ELON MUSK
  • ENERCROX
  • ENERGY
  • ENERGY WEAPONS
  • ENTERTAINMENT
  • EQUADOR
  • EQUATORIAL GUINEA
  • EQUITABLE HOLDING
  • EQUITY
  • ERICH HONECKER
  • ERICH MIELKE
  • ERITREA
  • EROTICA
  • ESPIONAGE
  • ESSAY
  • ESTONIA
  • ETHIOPIA
  • ETHOPIA
  • EU
  • EUROPE
  • EUROZONE
  • EXPLOITATION MOVIE
  • FAIRINVESTA
  • FALKLAND ISLANDS
  • FAMILIE LORCH
  • FARMER
  • FAROE ISLANDS
  • FASHION
  • FÄLSCHER
  • FBI
  • FBI *
  • FEATURE FILM
  • FEMEN
  • FIDELITY INVESTMENTS
  • FIFTH THIRD BANCORP
  • FIJI
  • FINANCE INDUSTRY
  • FINANCIAL DISCLOSURE
  • FINLAND
  • FIRMENWELTEN
  • FIRSTRAND LIMITED
  • FLORIDA
  • FOLK
  • FOLK MUSIC
  • FOOD
  • FOOTBALL LEAKS
  • FORBES BREAKING NEWS
  • FORREST
  • FOSHAN HAITIAN FLAVORING &AMP; FOOD
  • FOX NEWS
  • FRANÇOIS PINAULT
  • FRANCE
  • FRANCOISE BETTENCOURT MEYERS
  • FRANK MAIWALD
  • FREEDOM
  • FREEMASONS
  • FRENCH GUIANA
  • FRENCH POLYNESIA
  • FRENCH SOUTHERN TERRITORIES
  • FRIDA KAHLO
  • FRIEDHELM LASCHÜTZA
  • FRITZ LANG
  • FSB
  • FUBON FINANCIAL HOLDING
  • FUKUOKA FINANCIAL GROUP
  • FUTURE
  • GABON
  • GAMBIA
  • GAMBLING
  • GAMING
  • GARY COOPER
  • GEELY
  • GENOCIDE
  • GENWORTH FINANCIAL
  • GEORGIA
  • GERD BENNEWIRTZ
  • GERMAN CORRUPTION
  • GERMANY
  • GERMÁN LARREA MOTA VELASCO
  • GESTAPO & SS
  • GHANA
  • GIBRALTAR
  • GINA RINEHART
  • GIOTTO DI BONDONE
  • GIOVANNI FERRERO
  • GLENN GREENWALD
  • GLOBAL WITNESS
  • GLOBAL-REAL-ESTATE
  • GLYKOL
  • GOLDMAN
  • GOMOPA
  • GOMOPA IM
  • GOMOPA UND IMMOBILIENZEITUNG
  • GOMOPA-IZ-CONNECTION
  • GOMOPA4KIDS
  • GOOGLE
  • GREAT-WEST LIFECO INC.
  • GREECE
  • GREENLAND
  • GREGOR GYSI
  • GREGOR SCHULMEISTER
  • GREGORIAN CHANTING
  • GRENADA
  • GROOMER
  • GRU
  • GRUPO ELEKTRA
  • GRUPO FINANCIERO BANORTE
  • GUADELOUPE
  • GUAM
  • GUATEMALA
  • GUERNSEY
  • GUILLAUME POUSAZ
  • GUINEA
  • GUINEA-BISSAU
  • GUYANA
  • HACKER
  • HAITI
  • HANA FINANCIAL GROUP
  • HANWHA GROUP
  • HAPPINESS FREQUENCY, DOPAMINE, SEROTONIN, ENDORPHINS RELEASE
  • HAROLD HAMM
  • HARTONO
  • HAWAII
  • HEALTH
  • HEINZ GERLACH
  • HIERONYMUS BOSCH
  • HIGH TREASON
  • HILDEGARD BARLAGE
  • HISTORY
  • HOLIDAYS
  • HOLLYWOOD
  • HOLY SEE
  • HOMMAGE
  • HONDURAS
  • HONEYPOT
  • HONG KONG
  • HORROR MOVIES
  • HOSHINE SILICON INDUSTRY
  • HSBC
  • HUA NAN FINANCIAL HOLDINGS
  • HUGO TALKS
  • HUMAN RIGHTS
  • HUNGARY
  • IBIZA VIDEO
  • ICELAND
  • ID2020
  • IDAHO
  • ILLEGAL
  • ILLINOIS
  • ILLUMINATI
  • IMF
  • INDIA
  • INDIANA
  • INDONESIA
  • INEOS GROUP
  • INFLATION
  • INFRASTRUCTURE
  • ING GROEP
  • INTELLIGENCE
  • INTERACTIVE BROKERS
  • INTERNET
  • INTERNET CRIME
  • INVESTIGATION
  • INVESTIGATIVE-JOURNALISM
  • INVESTMENT
  • IOWA
  • IRAN
  • IRAQ
  • IRELAND
  • IS
  • ISABELL COLONIUS
  • ISLAMISTS
  • ISRAEL
  • ISTVAN COCRON
  • ITALY
  • ITAU UNIBANCO
  • IVORY COAST
  • IZ BESITZER
  • IZ4KIDS
  • JACK MA
  • JAMAICA
  • JAMES RATCLIFFE
  • JAN MUCHA
  • JAPAN
  • JAZZ
  • JEFFERIES FINANCIAL
  • JEFFREY EPSTEIN
  • JENSEN HUANG
  • JEWISH CULTURE AND LIFE
  • JIANG RENSHENG
  • JINDAL
  • JOCHEN RESCH
  • JOE & HUNTER BIDEN
  • JOHANN STERNBERG
  • JOHANNES VERMEER
  • JOHN F KENNEDY
  • JOHN KENNEDY JUN
  • JOHN WAYNE
  • JOINT CHIEFS OF STAFF
  • JOINT INTELLIGENCE
  • JORDAN
  • JORGE PAULO LEMANN
  • JOURNALISM
  • JPMORGAN
  • JULIUS BAER GROUP
  • JUSTICE
  • KANSAS
  • KARSTEN TRAMPE
  • KAZAKHSTAN
  • KB FINANCIAL GROUP
  • KELLNER
  • KENTUCKY
  • KENYA
  • KEYENCE
  • KGB
  • KGB AGENT
  • KGB AGENT LIST
  • KGB LIST
  • KGB SPIES
  • KGB SPIES NAMES
  • KGB SPY
  • KGB-AGENT-LIST
  • KGB-SPIES-LIST
  • KIM FAMILY
  • KIM IVERSON
  • KIM KARDASHIAN
  • KIMBERLEY GUILFOYLE
  • KINDER SEXUAL AUFKLAERUNG
  • KIRIBATI
  • KLAUS MAURISCHAT
  • KLAUS SCHWAB
  • KLAUS-MICHAEL KUEHNE
  • KOMPLIZEN
  • KOREA
  • KOREA INVESTMENT HOLDINGS
  • KOREAN FEDERATION OF COMMUNITY CREDIT COOPERATIVES
  • KORRUPTE JOURNALISTEN
  • KORRUPTE JURISTEN
  • KOSOVO
  • KUWAIT
  • KYB, KYG, KYP, KYS
  • KYRGYZSTAN
  • LA FRANCE
  • LAO
  • LATIN AMERICA
  • LATVIA
  • LAUDER
  • LAURENE POWELL JOBS
  • LAW
  • LAWFARE-AND-MEDIA-CONTROL
  • LEAKS
  • LEBANON
  • LEGAL & GENERAL GROUP PLC
  • LEN BLAVATNIK
  • LEONARDO DA VINCI
  • LESOTHO
  • LI KA-SHING
  • LIBERIA
  • LIBERTY
  • LIBYA
  • LIECHTENSTEIN
  • LINCOLN FINANCIAL GROUP
  • LISTE DER STASI SPITZEL
  • LITERATURE
  • LITHUANIA
  • LIVE
  • LIVESTREAM
  • LONDON
  • LORCH
  • LOS ANGELES
  • LOU REED
  • LOUISIANA
  • LUKAS WALTON
  • LUKSIC
  • LUXEMBOURG
  • LYBIA
  • MAD HATTER
  • MADAGASCAR
  • MAFIA
  • MAINE
  • MALAWI
  • MALAYSIA
  • MALI
  • MALTA
  • MANFRED RESCH
  • MARILYN MONROE
  • MARINE
  • MARK VORNKAHL
  • MARS
  • MARSHALL ISLANDS
  • MARTINIQUE”
  • MARYLAND
  • MASAYOSHI SON
  • MASS SURVEILLANCE
  • MASSACHUSETTS
  • MATHIAS SCHILLO
  • MATT KOHRS
  • MAURITANIA
  • MAURITIUS
  • MAYOTTE
  • MEDIA
  • MEDIA WHORES
  • MEDIENHAUS GERSÖNE UG
  • MEDITATION
  • MEGA FINANCIAL HOLDING COMPANY
  • MEIJER
  • MEINRAD FUCHSGRUBER
  • MENARD
  • MENORA MIVTACHIM GROUP
  • MENTAL HEALTH
  • MERIDIAN CAPITAL
  • METROPOLITAN BANK AND TRUST COMPANY
  • MEXICAN MAFIA
  • MEXICO
  • Mi5
  • MI6
  • MICHAEL BLOOMBERG
  • MICHAEL DELL
  • MICHAEL PLATT
  • MICHELANGELO
  • MICHIGAN
  • MICRONESIA
  • MIDDLE EAST
  • MIGRATION
  • MILITARY
  • MINARA RESOURCES
  • MINNESOTA
  • MISSISSIPPI
  • MISSOURI
  • MIZUHO FINANCIAL GROUP
  • MOBBING
  • MOLDOVA
  • MONACO
  • MONEX GROUP
  • MONEY
  • MONEY LAUNDERING
  • MONGOLIA
  • MONTANA
  • MONTENEGRO
  • MONTSERRAT
  • MOON – UNIFICATION CHURCH
  • MORD
  • MORDDROHUNGEN
  • MORGAN STANLEY
  • MOROCCO
  • MOSSACK FONSECA
  • MOSSAD
  • MOVIES
  • MOZAMBIQUE
  • MUCHA
  • MURDER AND EXECUTIONS
  • MURDER OF JOURNALISTS AND TRUTHSEEKERS
  • MURDOCH
  • MUSIC
  • MUSIC MESH UP
  • MYANMAR
  • MYSTERIOUS DEATHS
  • MYSTERY
  • NAMIBIA
  • NASA
  • NATO
  • NATURE
  • NATWEST GROUP
  • NAURU
  • NAZI
  • NBA
  • NCTC
  • NEBRASAKA
  • NEONAZI
  • NEOSTASI
  • NEPAL
  • NETHERLANDS
  • NETHERLANDS ANTILLES
  • NETWORKS
  • NEVADA
  • NEW CALEDONIA
  • NEW HAMPSHIRE
  • NEW JERSEY
  • NEW MEXICO
  • NEW YORK
  • NEW YORK CITY
  • NEW ZEALAND
  • NEWS
  • NEWSMAX TV
  • NHL
  • NICARAGUA
  • NIGER
  • NIGERIA
  • NIUE
  • NORTH CAROLINA
  • NORTH DAKOTA
  • NORTH KOREA
  • NORTH KOREA NUCLEAR TEST SITE
  • NORTH MACEDONIA
  • NORTHERN ALLIANCE
  • NORTHERN MARIANA ISLANDS
  • NORWAY
  • NUCLEAR TERRORISM
  • NUCLEAR WAR
  • NVIDIA
  • OBAMA
  • OCEANIA
  • OFFSHORE
  • OHIO
  • OKLAHOMA
  • OLIGARCHS
  • OMAN
  • ONKEL JOCHEN
  • OP FINANCIAL GROUP
  • OPERATION METROPOLIS LOOP
  • OREGON
  • ORIGINAL DOCUMENTS
  • ORIGINAL FOOTAGE
  • PABLO PICASSO
  • PAINTINGS
  • PAKISTAN
  • PALAU
  • PALESTINIAN TERRITORIES
  • PANAMA
  • PANDORA PAPERS
  • PANG KANG
  • PAPUA NEW GUINEA
  • PARAGUAY
  • PARIS
  • PARODY
  • PAUL CEZANNE
  • PEDO
  • PENNSYLVANIA
  • PENTAGON
  • PEOPLE
  • PEOPLE'S BANK OF CHINA
  • PERU
  • PETER EHLERS
  • PETER PAUL RUBENS
  • PETER RESKI
  • PETER RUSS
  • PFIZER
  • PHILIPPINES
  • PHILOSOPHY
  • PIERRE AUGUSTE RENOIR
  • PIERRE GERSÖNE
  • PIETER BREUGHEL
  • PITCAIRN ISLAND
  • PLUNDERS
  • PNC BANK
  • POINT72 ASSET MANAGEMENT
  • POLAND
  • POLITICAL-REALITY
  • POLITICS
  • POLL
  • POP
  • POWER
  • PRANK
  • PREDICTIONS
  • PRESSTITUTES
  • PRINCIPAL FINANCIAL GROUP
  • PRIVACY
  • PROFIT
  • PROJECT SYNDICATE
  • PROPAGANDA
  • PROPERTY
  • PROTEST AND OCCUPY MOVEMENT INTERNATIONAL
  • PROTEST MOVEMENT
  • PSYOPS
  • PUBLIC INTELLIGENCE
  • PUERTO RICO
  • PULCH
  • PUNK MUSIC
  • PUTIN
  • QATAR
  • QIN YINGLIN
  • QUICKEN LOANS
  • RA FIALA
  • RA RESCH
  • RA SCHULTE
  • RADHAKISHAN DAMANI
  • RAIMUND MAURUS
  • RAINER VON HOLST
  • RANKING
  • RAP
  • RAPHAEL
  • RAYMOND JAMES FINANCIAL
  • REAL ESTATE
  • RED BULL
  • REDACTED
  • REDACTED NEWS
  • REGIONS FINANCIAL CORPORATION
  • REINHOLD WUERTH
  • RELAX
  • RELAXING MUSIC
  • RELIGION
  • REMBRANDT
  • RENAISSANCE TECHNOLOGIES
  • RESCH
  • RESEARCH
  • REUNION ISLAND
  • REVOLUTION
  • RHB BANK
  • RHODE ISLAND
  • RHYTHM & BLUES
  • ROBERT F KENNEDY JUN
  • ROBERT PERA
  • ROBOTS
  • ROCK
  • ROCK MUSIC
  • ROCKEFELLER
  • ROCKEFELLER FOUNDATION
  • ROKINREN BANK
  • ROMANIA
  • RON DESANTIS
  • ROTHSCHILD
  • ROTHSCHILD FAMILY
  • RUFMOERDER
  • RUSSELL BRAND
  • RUSSIA
  • RUSSIAN MAFIA
  • RWANDA
  • SABOTAGE
  • SACHSENSUMPF
  • SAFETY
  • SAINT KITTS AND NEVIS
  • SAINT LUCIA
  • SAINT VINCENT AND THE GRENADINES
  • SALVADOR DALI
  • SAM BANKMAN-FRIED
  • SAN MARINO
  • SANDRO BOTTICELLI
  • SANLAM LIMITED
  • SAO TOME
  • SATAN
  • SATIRE
  • SATURDAY NIGHT LIVE
  • SAUDI ARABIA
  • SCANDAL
  • SCIENCE
  • SCOREDEX
  • SEBASTIAN SANDERS
  • SECRECY NEWS
  • SECRET
  • SECRET AGENCY
  • SECRET SERVICE
  • SECRET SOCIETIES
  • SECURE
  • SECURIAN FINANCIAL GROUP
  • SECURITATE
  • SECURITY
  • SED
  • SENEGAL
  • SERBIA
  • SEX
  • SEXY
  • SEYCHELLES
  • SHIN BET
  • SHIN KONG FINANCIAL HOLDING
  • SHIV NADAR
  • SHOAH
  • SHORT STORIES
  • SIEGFRIED SIEWERT
  • SIERRA LEONE
  • SINGAPORE
  • SINOPAC FINANCIAL HOLDINGS
  • SKY NEWS
  • SLOVAKIA
  • SLOVENIA
  • SOCA MUSIC
  • SOFTBANK GROUP
  • SOFTWARE
  • SOLOMON ISLANDS
  • SOMALIA
  • SONY FINANCIAL HOLDINGS
  • SOROS
  • SOUTH AFRICA
  • SOUTH CAROLINA
  • SOUTH DAKOTA
  • SOUTH KOREA
  • SOUTH STATE CORPORATION
  • SOUTH SUDAN
  • SOVIET UNION
  • SPACE WAR
  • SPAIN
  • SPECIAL FORCES
  • SPIES
  • SPORTS
  • SPY
  • SRI LANKA
  • STAATSANWAELTIN BEATE PORTEN
  • STAATSANWAELTIN PORTEN
  • STALIN
  • STALKER
  • STASI
  • STASI HINRICHTUNG
  • STASI KLARENTHAL
  • STASI LIST
  • STASI LISTE
  • STASI NAMES-STASI NAMEN
  • STASI WIESBADEN
  • STASI-BRAUT
  • STASI-GEHALTSLISTE
  • STASI-GEHEIM
  • STASI-JUSTIZ
  • STASI-MOERDER
  • STASI-MORD
  • STASILISTE
  • STATE STREET
  • STATE STREET CORPORATION
  • STEFAN PERSSON
  • STEFAN QUANDT
  • STEPPENWOLF
  • STIFEL FINANCIAL
  • STOCK EXCHANGE
  • STOCKS
  • STUDY
  • SUDAN
  • SUMITOMO MITSUI FINANCIAL GROUP
  • SUMITOMO MITSUI TRUST HOLDINGS
  • SUN HUNG KAI
  • SURF MUSIC
  • SURINAME
  • SURVEILLANCE
  • SVB FINANCIAL GROUP
  • SVEN SCHMIDT
  • SVEN SCHMIDT – BLACK LION
  • SVEN SCHMIDT – EAGLE IT
  • SWAZILAND (ESWATINI)
  • SWEDBANK AB
  • SWEDEN
  • SWITZERLAND
  • SYRIA
  • TADASHI YANAI
  • TAISHIN FINANCIAL HOLDINGS
  • TAIWAN
  • TAIWAN COOPERATIVE FINANCIAL HOLDING COMPA
  • TAIWAN FINANCIAL HOLDINGS
  • TAJIKISTAN
  • TALIBAN
  • TANZANIA
  • TAX HAVEN
  • TD BANK
  • TECHNOLOGIES
  • TENNESSEE
  • TERRORISM
  • TEXAS
  • THAILAND
  • THE AMERICAS
  • THE GREAT RESET
  • THE HALL OF SHAME
  • THE INVESTMENT MAGAZINE – THE ORIGINAL – DAS INVESTMENT MAGAZIN – DAS ORIGINAL
  • THE IS ISLAMIC STATE
  • THE MOSSAD
  • THE NATIONAL SECURITY
  • THE NATIONAL SECURITY AGENCY (NSA)
  • THE PANAMA PAPERS
  • THE RETURN OF THE DDR
  • THE ROCKEFELLER FOUNDATION
  • THE SECRET LIST OF KGB AGENTS
  • THE SECRET LIST OF Off-SHORE-COMPANIES, PERSONS AND ADRESSES
  • THE U.S. AIR FORCE
  • THE U.S. ARMY
  • THE U.S. NAVY
  • THE WHITE HOUSE
  • THOMAS "SNIFF" SCHUEHLY
  • THOMAS BREMER
  • THOMAS PORTEN
  • THOMAS PROMNY
  • TIBET
  • TIMOR
  • TIMOR-LESTE (EAST TIMOR)
  • TINA TURNER
  • TITIAN
  • TOGO
  • TOKYO KIRABOSHI FINANCIAL GROUP
  • TONGA
  • TOP SECRET
  • TOP TEN
  • TORTURE
  • TOTALITARISM
  • TOXDAT
  • TRANSGENDER
  • TRANSHUMANISM
  • TRINIDAD AND TOBAGO
  • TRUIST
  • TRUST
  • TRUTH
  • TUCKER CARLSON
  • TUNISIA
  • TURKEY
  • TURKMENISTAN
  • TURKS AND CAICOS ISLANDS
  • TUVALU
  • TV
  • U.S. BANK
  • UAE
  • UBS
  • UFO
  • UGANDA
  • UKRAINE
  • UNITED ARAB EMIRATES – UAE
  • UNITED KINGDOM – UK
  • UNITED NATIONS
  • UNITED STATES OF AMERICA – USA
  • URUGUAY
  • US AIR FORCE
  • US ARMY
  • US DEPARTMENT OF DEFENSE
  • US DEPARTMENT OF FOREIGN AFFAIRS
  • US DEPARTMENT OF JUSTICE
  • US DEPARTMENT OF STATE
  • US NAVY
  • USSR
  • UZBEKISTAN
  • VANGUARD
  • VANUATU
  • VATICAN CITY STATE (HOLY SEE)
  • VENEZUELA
  • VIDEO
  • VIDEO – DIE ENTTARNTEN STASI-SPIONE
  • VIETNAM
  • VINCENT VAN GOGH
  • VINTAGE
  • VIRGIN ISLANDS (BRITISH)
  • VIRGIN ISLANDS (U.S.)
  • VOICE OF NORTH KOREA BY YEONMI PARK
  • VOLODYMYR ZELENSKY
  • VON HOLST
  • VOYA FINANCIAL
  • WALES
  • WALL STREET
  • WALLIS AND FUTUNA ISLANDS
  • WANG CHUANFU
  • WANG WEI
  • WAR
  • WARNMELDUNGEN
  • WARREN BUFFETT
  • WARSAW PACT
  • WEAPONS
  • WEATHER
  • WEF
  • WELLS FARGO
  • WERTHEIMER
  • WEST BANK
  • WEST GERMANY
  • WESTERN
  • WESTERN SAHARA
  • WHARF HOLDINGS
  • WHEELOCK & CO
  • WHISTLEBLOWER
  • WHO
  • WIKILEAKS
  • WIKISPOOKS
  • WILHELM LORCH
  • WILLIAM DING
  • WINTRUST FINANCIAL
  • WION
  • WIRTSCHAFT
  • WIRTSCHAFTSWARNUNG
  • WOMEN PROTEST
  • WOORI FINANCE HOLDINGS CO LTD
  • WORLD BANK
  • WORLD EXCLUSIVE
  • WORLD WAR III
  • WORLDEXCLUSIVE
  • XI JINPING
  • XU HANG
  • YEMEN
  • YUANTA FINANCIAL HOLDING
  • ZAMBIA
  • ZHANG YIMING
  • ZHIFEI
  • ZHONGRONG INTERNATIONAL TRUST
  • ZIMBABWE
  • ZOOMING IN ON CHINA

Meta

  • Create account
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.com

Member of The Internet Defense League

Social

Pages

  • “”ABOUT ME””
  • “Brown.Yodeling.With.Adolf&Eva!”🤣Part 58 The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Adolf & Eva😍 the Succubus, Angela, Nasi, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Schicklgruber, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody🤣🤣🤣🤡
  • “Burn.Baby.Burn!Emperor.Entertainer.Supershow!”🤣Part 59 The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Nero & Poppaea Sabina😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody🤣🤣🤣🤡
  • “Die Killer-Bibel” Toxdat – die 900 Seiten-Mordstudie von „GoMoPa“-Mastermind und Resch-Protege´ STASI-Oberst Ehrenfried Stelzer
  • “Don’t loose your Head, Sweetie!”🤣Part 60 The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Mary Queen of Scots😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody🤣🤣🤣🤡
  • “HONEST” KLAUS & “HONEST” OLIVIER SCHWAB FAN PAGE – SATIRE
  • “HONEST” ROBERT HUNTER BIDEN FAN PAGE – SATIRE
  • “Tesoro.Mio:Belvieve.Obey.Fight!”🤣Part 61 The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Il Duce Benito Mussolini😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody Warp Speed Mix🤣🤣🤣🤡
  • “Veni.Vidi.Video!”🤣Part 61 A The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Il Duce Benito Mussolini😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody Colosseum.Mix🤣🤣🤣🤡
  • 11 NEAR BROOKLYN BRIDGE – Full Original Movie
  • 1776 – THE HESSIAN RENEGADES by D.W. Griffith – Full Original Movie
  • 1930IES FRENCH STAG AND S&M FILM
  • 1960 BONDAGE STAG FILM – FETISH LOOP
  • 1960 S&M FETISH STAG FILM – TARA SANTANA
  • 1960IES STAG FILM – DOMINATRIX AND SCHOOLGIRL
  • 20,000 LEAGUES UNDER THE SEA – Full Original Movie
  • 39 STEPS – Full Alfred Hitchcock Movie Colorized
  • 50IES NUDIE FILM OF COWGIRL
  • 👃 “The Light of Hope: An Advent Reflection” by Rembrandt van Rijn AI Art created by Bernd Pulch
  • 📁 ABOVE TOP SECRET – COSMIC BLACK PARODY DOSSIER“Operation Lolita Express: Epstein’s Afterlife on Pedo Island 🏝️💀”
  • 💥 BREAKING: “The Fed Quietly Prints a TRILLION-Dollar Emoji—Markets Mistake It for a Buy Signal 😂📈”
  • 🔥 Chariots of Fire: The Divine Uplifting of Elijah 🔥🌪️ Whirlwind to Heaven: The Prophetic Rise of Elijah 🌪️
  • 🌟 IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT present  “Ultron’s Enema Empire”🌟
  • 🔥 IDIOT ZEITUNG (IZ) – EXCLUSIVE 🔥RELATIONSHIP STATUS: QUANTUM ENTANGLEMENT THE METAPHYSICAL SEXUAL MANIFESTATION: Trans Schwanz, Edith & San Fran “Muschi” Mucha 👑🔥⚡🤡💀Powered by Dr. Z., Gomopa4Kids, Stasi Frauen Support Staffel & Free Fritzl Front 😘👯‍♂️💃 Fotzen Fritz Version Gratis presented by IDIOT ZEITUNG (IZ) & GOMOPA vulgo DAS DESINVESTMENT alias DER FONDSFLOP😂🤡😘
  • 🚨 IDIOT ZEITUNG (IZ) EXCLUSIVE“MERZ-ELBO-CHIP: FRIEDRICH’S BRAIN ACCIDENTALLY UPLOADED TO ITALIAN PASTA, DECLARES WAR ON TOMATOES”🤡 POWERED BY DAS DESINVESTMENT, DR. Z., GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃DEUTSCHE  FOTZEN FRITZ VERSION GRATIS 🧐
  • 😎 Mallika Sherawat nude and exposed – AI Art created by Bernd Pulch😎
  • 🚨 SATIRE ALERT 🚨The following is 100 % fiction, 200 % sarcasm, and 0 % apology. Any resemblance to real-estate tyrants, glossy Stasi offspring or self-proclaimed “Best-Lage” bishops is purely intentional.
  • 👻 They Called the Stasi on Me. The Line Was Dead. Now, I’m Your Mirror.
  • 🤣””On a mountain of skulls, in the castle of pain, I sat on a throne of blood! What was will be! What is will be no more! Now is the season of Evil!” ##wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 125 “Vigo, Scrouge of Carpathia” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Vigo😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 🤣”A Cool Bite!”🤣🤡 ##wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 117 “The Great White Shark” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet The Great White Shark😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 🤣”Better Not Touch!”🤣🤡 ##wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden:”” Episode 116 “Poison Ivy Toxdat” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Poison Ivy – Reprise😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 🤣”Crazy.Crazier.Stasi-Joker!”🤣🤡 ##wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 119 “Joker’s Daughter Duela Dent” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Duela Dent😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 👃”Divine Anticipation: A Baroque Reflection on the Third Sunday of Advent” Spiritual Advent Paintings created by Bernd Pulch
  • 👃”Divine Reflection: A Renaissance Moment of Spiritual Renewal”
  • 🤣”Genghis Khan:”Absolutely:We are  Stasi!”🤣🤡 ##wirsindstasi Mongolia-Berlin-Hamburg-Wiesbaden:”” Episode 111 “Genghis Khan” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Genghis Khan😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 🤣”He.Will.Avenge Us!”🤣🤡 ##wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 123 “Darth Maul” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Darth Maul😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 🤣”Hm.Fingerlicking.StasiGut!” ##wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 126 “Hannibal Lecter” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Hannibal Lecter😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 🤣”I LOVE Children!”🤣🤡 ##wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 122 “Freddy Krueger” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Freddy Krueger on Elm Street😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 🤣”Mine.Mine.All Mine!”🤣🤡 ##wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 124 “Kingpin” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Kingpin😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 🤣”Proud to be Stasi!”🤣🤡 ##wirsindstasi Stasi-Berlin-Hamburg-Wiesbaden:”Nous sommes STASI.” Episode 108 “Private Paula” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Private Paula😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 🤣”Rat.Ben.Two-Face “Bi” Mucha!”🤣🤡 ##wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 121 “Ben” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Ben😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 🤣”Rat.Willard.Two-Face “Bi” Mucha!”🤣🤡 ##wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 120 “Willard” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Willard😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 🤣”Say it Loud & Proud:We are  Stasi!”🤣🤡 ##wirsindstasi Stasi-Berlin-Hamburg-Wiesbaden:”Somos eSTASI.” Episode 109 “Aaron the Moor (Shakespeare)” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Aaron the Moor😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 💃”Shadows of Hypocrisy – Hinterfozzige Janelle vs. the People Who Love Darkness More Than Light”✌by IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT powered by 🤪GoMoPa4Kids & Dr.Z😘
  • 👃”The Promise of Light: The First Sunday of Advent” by James Tissot AI Art created by Bernd Pulch
  • 👃”The Sunday of Advent: A Baroque Reflection on Hope and Divine Promise” – Peter Paul Rubens AI Art created by Bernd Pulch
  • 🤣”To Be Or Not To Be!”🤣🤡 ##wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 118 “Nyssa Raatko & The Lazarus Pit” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Nyssa Raatko😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 🙏”You are looking for Jesus the Nazarene, who was crucified. He has risen.” Mark 16:6-8. Painted by Edvard Munch AI Art by Bernd Pulch✌
  • 🤣”You’re Strong, But I Could Snap My Fingers And You’d All Cease To Exist.” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 127 “Thanos” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Thanos😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 🤣”Мы в штази. We are  Stasi!”🤣🤡 ##wirsindstasi Moscow-Stasi-Berlin-Hamburg-Wiesbaden:”” Episode 110 “Uncle Joe” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Uncle Joe😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 🌐📿 “The 11th Commandment: Thou Shalt Monetize™️ — How Silicon Valley Disrupted the Sabbath (And Sold Indulgences as NFTs)”Byline: “A Lost Gospel According to Rev. Cashius Profit ⚜️💸, Patron Saint of Venture Capital”Published on BerndPulch.org😏
  • 🚨🐑 BERNDPULCH.ORG – FRONTPAGE TAKEOVER 🚨🐑(The only EU-cleared satire portal still reachable without a booster passport)
  • 🙏🌟 Christ’s Ascension: The Heavenly Promise of His Return ✨🙏
  • 🏰🚀 IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT 😘PRESENT: MARS MAXWELL-EPSTEIN CROWN JEWELS HEIST 2.0: HOW PEDO-ISLAND CONQUERED THE RED PLANET(A Satirical Obituary for the Solar System, 2024-2030)POWDERED BY DR. Z., GOMOPA4KIDS,😎 STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐
  • 🎤🤣 Samson & Delilah: The First Reality Show 🤣🎤
  • 🚨🔥 THE PROMETHEUS PAPERS 🔥🚨
  • 🤡🤡😂 ## Pop Stasi proudly presents Loosing Jan “BI” Mucha-“Cajal”:”Waiting for My Man” -AI Parody✌️
  • 😂🤡🤡 ##Pop Stasi proudly presents Honest George Soros:”Blue Yodel” – AI Parody✌️
  • 🤡🤡😂 ##Pop Stasi proudly presents: ##wearestasi – AI Parody✌️Text, Music & Vocals by Bernd Pulch✌️
  • 🤣🤣🤡 ##wirsindstasi Stasi-Berlin-Hamburg-Wiesbaden:”#WEareSTASI.” Episide 107 “Steppenwolf” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Steppenwolf😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 🤣🤣🤡 Germany.Stasi.Joker:”Not Clown.Joker!” Episode 88 – Your Host The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse at Mycale 470 B.C.😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 🤣🤣🤡 Hamburg Harbour.Stasi.Joker: “The Party Triggering the $1.05 Trillion Stock Market Wipeout.” Episode 92 – Your Host The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse have a Party😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 🤣🤣🤡 Red John. Blake.Mentalist:”Evil Sexual Perverted Stasi-Sociopath!” Episode 87 – Your Host The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Red John aka Thomas McAllister😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 🤣🤣🤡 Sauron.Stasi.Joker: “I see you, little ones, your feeble attempts to hide from my gaze are in vain. I see into the depths of your souls, and there is nowhere to escape from my piercing stare.” Episode 91 – Your Host The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Sauron😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 🤣🤣🤡 Stasi.Joker.Actium! “I will not be triumphed over!” Episode 90 – Your Host The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Jack the Ripper 😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos at the Battle of Actium with Cleopatra🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 🤣🤣🤡 Stasi.Joker.Jack The Ripper:”Fear not, for the Ripper is near! ” Episode 89 – Your Host The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Jack the Ripper 😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 🤣🤣🤡 Stasi.Sacco.di.Roma:”Burn.Rome.Burn!” Episode 86 – Your Host The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Alaric I & the Visigoths  during the Sacco di Roma😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 🤣🤣🤣”(S)Think.Or.Sink!” Part 8 – The Joker & His Wild Bunch meet Two Face, The Pinguin & Leni Riefenstahl on the Wilhelm Gustloff – Hommage a’ Peter Ehlers, Jan Mucha & GoMoPa – AI Parody🤣🤣🤣
  • 🤣🤣🤡”A.Band.Of.Brothers.”Episode 63 Osama and his Harem – The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Osama Bin Laden and Harem😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody Harem Mix🤣🤣🤣🤡
  • 🤣🤣🤡”Casino.Casino.Casino.” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 148 “Hyman Abrams” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Hyman Abrams😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody🤣🤣🤣🤡
  • 🤡🤣🤣”Crime does not pay!” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 142 “Meyer Lansky” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Meyer Lansky😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody
  • 🤡🤣🤣”Dead & Loving It!” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 140 “Count Dracula” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Count Dracula😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody
  • 🤣🤣🤡”Devil’s. Greatest.Trick!” Episode 76 – Your Host The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Keyser Söze😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 🤣🤣🤡”East.West.They are both stupid.” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 155 “Dr. No”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Dr. No😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody🤣
  • 🤣🤣🤡”Feed Me!” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 152 “Audrey II”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Audrey II😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody🤣
  • 🤡🤣🤣”First Snowball Manhattan. Then London.Then Frankfurt.” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 137 “Charles Ponzi” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Charles Ponzi😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody
  • 🤣🤣🤡”First.And.Last. Sacrifice!” Episode 77 – Your Host The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Hernan Cortes😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Aztec Parody 🤣🤣🤣🤡
  • 🤡🤣🤣”GoMoPa.Ehlers.Mucha.Porten.Lorch.” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 133 “The Gremlin Stripe” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet the Gremlin Stripe😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody
  • 🤣🤣🤡”Great.Whore.Nineveh!” Episode 75 – Your Host The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse & the Destruction of Nineveh😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody Jonah and the Fish Mix🤣🤣🤣🤡
  • 🤣🤣🤡”Harder!Longer! Deeper!”Episode 65 The Satanic Olympics – Your Host The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet at the Satanic Olympics😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody Olympicd Mix🤣🤣🤣🤡
  • 😎😎😎”Heinz. Gerlach.Death.By.Bee Sting/Blood Poisoning?Stasi.Toxdat.Dioxin! CUI BONO?” Part 44  The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse meet Mademoiselle Pol Pot and the Succubus, Angela, Beatrix Port and her Stasi Nymphos😎😎😎Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody🤡🤣🤣
  • 🤣🤣🤡”Hiroshima.Mon.Armour!” Episode 71 The Nuke on Hiroshima – Your Host The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse visits Hiroshima😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody Hannibal Mix🤣🤣🤣🤡
  • 🤣🤣🤡”Humans are stupid!” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 149 “Oliver Quick” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Oliver Quick😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody🤣🤣🤣
  • 🤣🤣🤡”I put a Spell on You!” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 153 “The Voodoo Master”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet The Voodoo Master😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody🤣
  • 🤣🤣🤡”I!I!I!” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 151 “Elagabalus”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Elagabalus😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody🤣
  • 🤣🤣🤡”In.The.Navy!” Episode 72 The Battle of Gangut – Your Host The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse at Gangut😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody🤣🤣🤣🤡
  • 🤡🤣🤣”Junk.Bond.Stasi!” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 141 “Michael Milken” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Michael Milken😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody
  • 🤣🤣🤡”Kill.Stasi Kleo. Kill!” Episode 73 Meeting Kleo Straub – Your Host The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse at the Berlin Wall😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody🤣🤣🤣🤡
  • 🤡🤣🤣”Long Time Short.” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 138 “Bernie Cornfeld” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Bernie Cornfeld😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody
  • 🤡🤣🤣”Money Ueber Alles.” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 136 “Gordon Gekko & Jordan Bedford – The Wolf of Wall Street” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Gordon Gekko & The Wolf of Wall Street😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody
  • 🤡🤣🤣”More.More.M.O.R.E.” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 139 “Bernard Madoff” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Bernard Madoff😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody
  • 🤣🤣🤡”New.World.Stasi.Order.” Episode 69 The Discovery of America – Your Host The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Christopher Columbus😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody Hannibal Mix🤣🤣🤣🤡
  • 🤣🤣🤡”Nika! Nika!Nika!,”Episode 67 The Satanic Nika Riots of Constantinople – Your Host The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Theodora & Justinian I😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody Theodora Mix🤣🤣🤣🤡
  • 🤣🤣🤡”Nous sommes Stasi!” – AI Parody – Text, Music, Vocals by Lana T & Bernd Pulch✌
  • 🤣🤣🤡”Pointless! Clueless! Without Morality! NeoStasi!”Episode 68 The Battle of Cannae – Your Host The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Hannibal😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody Hannibal Mix🤣🤣🤣🤡
  • 🤣🤣🤡”Sing.Stasi.Sink!” Episode 70 The Viking Downfall – Your Host The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet the Tettenhall Vikings😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody Hannibal Mix🤣🤣🤣🤡
  • 🤣🤣🤡”Sink!Armada!Sink!”Episode 64 The Spanish Armada – The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet the Spanish Armada😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody Harem Mix🤣🤣🤣🤡
  • 🤣🤣🤡”Sink.Stasi.Sink. Stasi.Sink.Stasi!” Episode 78 – Your Host The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Kublai Khan😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Mongol Parody 🤣🤣🤣🤡
  • 🤣🤣🤡”Stasi Boat to Cairo!”Episode 66 The Satanic Battle of Alexandria – Your Host The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Cleo, Mark & Octavian😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody Cleo Mix🤣🤣🤣🤡
  • 🤣🤣🤡”Stasi Joker.Night.King. Daenerys Targaryen:Thrones.Thrones.Thrones!” Episode 83 – Your Host The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet the Night King and Daenerys Targaryen😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 🤣🤣🤣”Stasi!Stasi!Stasi!” Part 40 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse meet the Bloody Duchess Darya Saltykova and the Succubus, Angela, Beatrix Port and her Stasi Nymphos🤡🤡Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody🤡🤣🤣
  • 🤣🤣🤡”Stasi.Hyena People:Just the Two of Us!” Episode 81 – Your Host The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet the Hyena People😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 🤣🤣🤡”Stasi.On.Board.Pray.Pilgrim.Pray!” Episode 79 – Your Host The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse on the Mayflower in 1620😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Mayflower Parody 🤣🤣🤣🤡
  • 🤣🤣🤡”Stasi.Sea.Witch. Ursula:Think or Sink!” Episode 82 – Your Host The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Ursula the Sea Witch😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 🤣🤣🤡”Stasi.Why.So.Serious?” Episode 80 – Your Host The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Jeremiah Valeska aka Xamder Wilde😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Mayflower Parody 🤣🤣🤣🤡
  • 🤣🤣🤡”The stupidest Sin of the Devil is Vanity.” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 154 “Professor Loris Martini”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Professor Loris Martini😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody🤣
  • 🤣🤣🤣”THINK OR SINK!” PART ONE – THE STASI TITANIC IS SINKING – PUTLER – EHRENFRIED STELZER (Professor Toxdat – Murder) – RESCH-GOMOPA-EHLERS-MUCHA-PORTEN-LORCH🤣🤣🤣
  • 🤣🤣🤣”THINK.OR.SINK!” – PART 4 – THE JOKER MEETS CLEOPATRA ON A NILE SHIP – HOMMAGE A’ “HONEST” PETER EHLER-“VON JOKER” & HIS WILD BUNCH🤣🤣🤣-AI PARODY
  • 🤣🤣🤣”THINK.OR.SINK!” –  PART 3 – THE JOKER MEETS LORELEY – HOMMAGE A’ “HONEST” PETER EHLERS-“VON JOKER”
  • 🤣🤣🤣”Think.Or.Sink!” Part 6 –  The Joker meets Two Face on the Tirpitz together with Magda Goebbels – AI Parody – Hommage a’ Peter  Ehlers & Jan Mucha🤣🤣🤣
  • 🤣🤣🤣”Think.Or.Sink!” Part 7 – The Joker & His Wild Bunch meet Two Face, The Pinguin & Lucrezia Borgia in Venice – Hommage a’ Peter Ehlers, Jan Mucha & GoMoPa – AI Parody🤣🤣🤣
  • 🤣🤣🤡”Veni.Vidi Vici!” Episode 74 Caesar and Pompey – Your Host The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse at the Battle of Pharsalus😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody🤣🤣🤣🤡
  • 🤣🤣🤣”Viva.Odiar A Muerte.Viva!”🤣Part 62 The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Francisco Pizarro😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody Inca Mix🤣🤣🤣🤡
  • 🤡🤣🤣”Wall. Wall.Wall Street.” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 135 “Jordan Bedford – The Wolf of Wall Street” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet The Wolf of Wall Street😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody
  • 🤡🤣🤣”We are Stasi-Cutthroats. So what?” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 134 “Ransom Drysdale” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Ransom Drysdale😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody
  • 🤣🤣🤡”We lie best when we lie to ourselves.” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 150 “IT aka Pennywise”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet IT aka Pennywise😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody🤣
  • 🤡🤣🤣”Wir sind StasiWixxer!” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 132 “Der Wixxer” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Wixxer😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody
  • 🤣🤣🤡”You are no God. I renounce You!” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 148 “Gorr – The God Butcher” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Gorr – The God Butcher😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody🤣🤣🤣
  • 🤣🤣🤡”You’re a smooth, smoothie, yah know?” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 147 “Gaear Grimsrud” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Gaear Grimsrud 😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody🤣🤣🤣🤡
  • 🔥🌌😈💥 PROFESSOR DR. SUPER-SCHWANZ, THE SCHWANZ,  QUADRUPLE & EDITH’S SEX TRIANGLE & MARQUIS DE SADE EXPLODE – EPISODE 99WY/0825″ 🔥🌌😈💥👺SAN FRAN “MUSCHI” MUCHA🧐OSAMA,  HUSH, PLANKTON, MOJO JOJO CONSPIRACY 🔥💀  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 136WY/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS
  • 🔥🌌😈💥 THE SCHWANZ QUADRUPLE & EDITH’S SEX TRIANGLE & MARQUIS DE SADE EXPLODE – EPISODE 99WY/0825″ 🔥🌌😈💥👺SAN FRAN “MUSCHI” MUCHA🧐OSAMA,  HUSH, PLANKTON, MOJO JOJO CONSPIRACY 🔥💀  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 136WY/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS
  • 🔥🌌😈💥 THE SCHWANZ QUADRUPLE & EDITH’S SEX TRIANGLE – EPISODE 99WY/0825″ 🔥🌌😈💥👺SAN FRAN “MUSCHI” MUCHA🧐OSAMA,  HUSH, PLANKTON, MOJO JOJO CONSPIRACY 🔥💀  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 136WY/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS
  • 🔥🌌😈💥 THE SPORTMASTER’S TRAINING GROUNDS PRESENTS: “BOOMERANG’S DEADLY ARCS & EDITH’S SEX TRIANGLE – EPISODE 98WY/0825” 🔥🌌😈💥👺BLOODY, BLOODY MARY, SAN FRAN “MUSCHI” MUCHA’S MISTRESS MISUSED🧐OSAMA,  HUSH, PLANKTON, MOJO JOJO CONSPIRACY 🔥💀  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 136WY/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS
  • 🤣🤣🤣🤡”Achtung! Baby.Stasi.Toxdat!” Part 45 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse meet Gudrun Ensslin and the Succubus, Angela, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody🤡🤣🤣
  • 🤣🤣🤣🤡”Achtung!Stasi!Save.Our.Souls!” Part 54 The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Dr. Mabuse meet Agrippina the Younger😍and the Succubus, Angela, Nasi, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody🤣🤣🤣🤡
  • 🤣🤣🤣🤡”An empire toppled by its enemies can rise again. But one which crumbles from within? That’s dead. Forever.” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 157 “Baron Helmut Zemo”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Baron Helmut Zemo😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody🤣
  • 🤣🤣🤣🤡”Celebrate the Bullet!” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 143 “Bugsy Siegel” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Bugsy Siegel😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody
  • 🤣🤣🤣🤡”Dioxin.Dioxin.Stasi. Baby. Drink.Sink!” Part 46 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse meet Madame Mao Jiang Qing and the Succubus, Angela, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody🤡🤣🤣
  • 🤣🤣🤣🤡”Dioxin.Stasi.Dioxin. Neostasi.Toxdat!” Part 47 The Joker aka The FinanzRoué aka The Finanzroulettier, Clownface, Two Face aka The Finanzcroupier, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse meet Valkyre Hrist and the Succubus, Angela, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody🤡🤣🤣
  • 🤣🤣🤣🤡”Drink.Stasi.Sink!” Part 36 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse, Luca Brasi meet The Black Widow & the Succubus, Angela, Beatrix Port and her Stasi Nymphos🤣🤣🤡Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody🤡🤣🤣
  • 🤣🤣🤣🤡”Drink.Stink.Sink!” Part 25 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse, meet Henriette Himmler and the Succubus, Beatrix Port and her Stasi Nymphos 🤡🤡🤣🤣Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody🤡🤣🤣🤣
  • 🤣🤣🤣🤡”Fight!Stasi!Fight!Fight!” Part 22 The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Dr. Mabuse meet Mist, the Valkyrie😍and the Succubus, Angela, Nasi, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody🤣🤣🤣🤡
  • 🤣🤣🤣🤡”Four.Fists.For.A. STASI.Hallelujah!” Part 57 The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Dr. Mabuse meet Erich Mielke & Mistress Erika😍 the Succubus, Angela, Nasi, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Mielke, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody🤣🤣🤣🤡
  • 🤣🤣🤣🤡”Ich liebe doch alle Menschen!” Two Face meets the Joker 🤡🤡🤣 Hommage a’ “Honest” Jan “BI” Mucha-“Kajal” & “Honest” Peter Ehlers-“Von Joker”🤣🤣🤣
  • 🤣🤣🤣🤡”Justice must be served!” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 129 “Nottingham Sheriff” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet the Sheriff of Nottingham😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 🤣🤣🤣🤡”Money.Ueber.Alles!” Part 56 The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Dr. Mabuse meet Frau Rosa LGBTQ😍and the Succubus, Angela, Nasi, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody🤣🤣🤣🤡
  • 🤣🤣🤣🤡”Nazi meets Stasi!” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 130 “Hans Landa” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Hans Landa😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 🤣🤣🤣🤡”Nazi-Yoddeling from Hell!” Part 55 The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Dr. Mabuse meet Emmy Goering😍and the Succubus, Angela, Nasi, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody🤣🤣🤣🤡
  • 🤣🤣🤣🤡”Neo.Stasi.Sink!” Part 31 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse meet China’s Cixi: “The Dragon Empress & the Succubus, Beatrix Port and her Stasi Nymphos🤡🤣🤣🤣 Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody🤡🤣🤣🤣
  • 🤣🤣🤣🤡”Now Zebediah Kilgrave… Who Deserves To Rule?” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 156 “Dr. Victor von Doom”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Dr. Victor von Doom😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody🤣
  • 🤣🤣🤣🤡”Rien.Ne.Va.Plus.Stasi!” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 144 “Arnold Rothstein” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Arnold Rothstein😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody
  • 🤣🤣🤣🤡”S.T.A.S.I._S.I.N.K._S.T.A.S.I!” Part 35 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse, Luca Brasi meet  Henriette Himmler & the Succubus, Angela, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody🤡🤣🤣
  • 🤣🤣🤣🤡”S.T.A.S.I._S.I.N.K._S.T.A.S.I.!” Part 34 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse, Luca Brasi meet Eve & the Succubus, Angela, Beatrix Port and the Stasi Nymphos 🤣🤣Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody🤡🤣🤣
  • 🤣🤣🤣🤡”Sink!Sink!Sink!” Part 24 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse, meet Ma Barker and the Succubus, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody🤡🤣🤣🤣
  • 🤣🤣🤣🤡”Sink!Sink!Sink!” Part 26 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse, meet Myra Hindley and the Succubus, Beatrix Port and her Stasi Nymphos🤣🤣🤡🤡🤣🤣Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody🤡🤣🤣🤣
  • 🤣🤣🤣🤡”Sink!Sink!Sink!” Part 38 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse, Luca Brasi meet Lotte Ulbricht & the Succubus, Angela, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody🤡🤣🤣
  • 🤣🤣🤣🤡”Sink!Stasi!Sink!” Part 53 The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Dr. Mabuse meet Irma Greese😍and the Succubus, Angela, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody🤣🤣🤣🤡
  • 🤣🤣🤣🤡”Sink.Deep.Sink!” Part 21 – The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse, meet Lilith and the Succubus, Beatrix Port and her Stasi Nymphos – Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt,RA Jochen Resch – AI Parody🤡🤣🤣🤣🤣🤣🤣🤡🍿
  • 🤣🤣🤣🤡”Sink.Neo.Stasi!” Part 32 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse meet  Medusa & the Succubus, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody🤡🤣🤣
  • 🤣🤣🤣🤡”Sink.Sink.Sink!” Part 48 The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Dr. Mabuse meet Herr and Frau Martin Bormann and the Succubus, Angela, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody🤡🤣🤣
  • 🤣🤣🤣🤡”Sink.Stasi.Sink!” Part 42 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse, Luca Brasi meet Medea & the Succubus, Angela, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody🤡🤣🤣
  • 🤣🤣🤣🤡”SOS.Stasi.SOS.FinanzRoulettiers.SOS!” Part 51 The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Dr. Mabuse meet Ko Young Hee and the Succubus, Angela, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody🤣🤣🤣🤡
  • 🤣🤣🤣🤡”Stasi!Sink!Stasi!” Part 39 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse, Luca Brasi meet Madame Blanque & the Succubus, Angela, Beatrix Port and her Stasi Nymphos🤣🤡Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody🤡🤣🤣
  • 🤣🤣🤣🤡”Stasi!Sink!Stasi!” Part 39 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse, Luca Brasi meet Madame Blanque & the Succubus, Angela, Beatrix Port and her Stasi Nymphos🤣🤡Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody🤡🤣🤣
  • 🤣🤣🤣🤡”Stasi!Stasi!SOS!” Part 52 The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Dr. Mabuse meet Gertrud  Scholz-Klink😍and the Succubus, Angela, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody🤣🤣🤣🤡
  • 🤣🤣🤣🤡”Stasi.Baby.Toxdat!” Part 43 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse meet Ulrike Meinhof and the Succubus, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody🤡🤣🤣
  • 🤣🤣🤣🤡”Stasi.Stasi.Sink!” Part 33 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse meet Dragon Empress Xi, Lady Macbeth & the Succubus, Beatrix Port and her Stasi Nymphos🤣🤣🤡Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody🤡🤣🤣
  • 🤣🤣🤣🤡”STINK!STINK!SINK!” Part 27 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse meet Agrippina and the Succubus, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody🤡🤣🤣
  • 🤣🤣🤣🤡”STINK.AND.SINK!” Part 12 – The Joker, Two Face, Straw Man and the Pinguin in Sodom – Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids – AI Parody🤡 🤣🤣🤣
  • 🤣🤣🤣🤡”STINK.AND.SINK!” Part 13 – The Joker, Two Face, the Pinguin, Straw Man meet Svetlana Stalin on the Kursk Submarine – Hommage a’ Ehlers, Mucha, Porten, Lorch & GoMoPa4Kids – AI Parody 🤡🤣🤣🤣
  • 🤣🤣🤣🤡”Stink.And.Sink!” Part 14 – The Joker, Two Face, Straw Man, the Piguin, meet STASI agents IM Angelika & Erika in Gomorrah – Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids – AI Parody🤡🤣🤣🤣
  • 🤣🤣🤣🤡”Stink.And.Sink!” Part 14 – The Joker, Two Face, Straw Man, the Piguin, meet STASI agents IM Angelika & Erika in Gomorrah – Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids – AI Parody🤡🤣🤣🤣
  • 🤣🤣🤣🤡”Stink.And.Sink!” Part 9 – The Joker & His Wild Bunch meet Two Face, the Pinguin & Clara Petacci on the Andrea Doria – Hommage a’ Peter Ehlers, Jan Mucha & GoMoPa – AI Parody 🤡🤣🤣🤣
  • 🤣🤣🤣🤡”Stink.Sink!Sink!” Part 29 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse meet  Catherine de Medici and the Succubus, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody🤡🤣🤣
  • 🤣🤣🤣🤡”Stink.Stasi.Sink!” Part 37 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse, Luca Brasi meet Queen Ranavalona I & the Succubus, Angela, Beatrix Port and her Stasi Nymphos🤣🤣🤡Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody🤡🤣🤣
  • 🤣🤣🤣🤡”Stink.Stink.Sink.Sink!” Part 16 – Hommage a’ Ehlers, Mucha et al: The Joker, his Associate Clownface, Two Face, Strawman, the Pinguin, the Kingpin meet Clara Zetkin, Beatrix Port and her female Stasi Agents on the Flying Dutchman-AI Parody🤡🤣🤣🤣
  • 🤣🤣🤣🤡”Stink.Stink.Sink.Sink!” Part 23 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse, meet the Blood Countess Elizabeth Bathory and the Succubus, Beatrix Port and her Stasi Nymphos 🤣 Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody🤡🤣🤣🤣
  • 🤣🤣🤣🤡”Think And.Sink!” – Part 22 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse, meet Gertrud Mielke, Beatrix Port and her Stasi Nymphos – Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody🤡🤣🤣🤣
  • 🤣🤣🤣🤡”Think!Stasi!Sink!Stasi!” Part 19 The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Dr. Mabuse meet Gertrude Baniszweski aka The Torture Mother😍and the Succubus, Angela, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody🤣🤣🤣🤡
  • 🤣🤣🤣🤡”Think.And.Sink!” Part 28 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse meet Bloody Mary and the Succubus, Beatrix Port and her Stasi Nymphos 🤡🤡Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody🤡🤣🤣
  • 🤣🤣🤣🤡”Think.And.Sink!” Part 30 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse meet France’s “Madame Deficit” Marie Antoinette and the Succubus, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody🤡🤣🤣
  • 🤡🤡🤡🤣”THINK.OR.SINK!” PART 5 – THE JOKER MEETS SALOME ON A SHIP IN THE DEAD SEA 🤡🤡🤣 HOMMAGE A’ “HONEST” PETER EHLERS-“VON JOKER” AI PARODY 🤣🤣🤣
  • 🤣🤣🤣🤡”Will not lie, I’ve been with many.” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 145 “Duncan Wedderburn” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Duncan Wedderburn 😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody
  • 🤣🤣🤣🤡🤡”SCHTONK.AND.SINK!” Part 10 – The Joker, Two Face, the Pinguin & Straw Man meet Emmy Goering on Carin 2 – Hommage a’ Ehlers, Mucha, Porten & GoMoPa4Kids – AI Parody 🤣🤣🤣
  • 🤣🤣🤣😎🤡”Sitting on Top of the Hot Chair” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 146 “Louis “Lepke” Buchalter” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Louis “Lepke” Buchalter 😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody🤣🤣🤣🤡
  • 🤣🤣🤣🤡🤡”STINK.AND SINK!” PART 11 – THE JOKER, TWO FACE, STRAW MAN & THE PENGUIN MEET MARGOT HONECKER ON THE BATTLESHIP POTEMKIN – HOMMAGE A’ EHLERS, MUCHA, PORTEN, GOMOPA4KIDS, LORCH – AI PARODY🤡🤡🤣🤣🤣
  • 🤡🤡🤡🤡😂🤡🤡😂Pop Stasi proudly presents Loosing Jan “BI” Mucha-“Cajal”: “The Fortune Teller” – Sponsored by Gay Vaseline Forte – AI Parody✌️
  • 😂😂😂🤡🤡🤡Pop Stasi proudly presents Elon, the Singing Billionaire:”Lucky” – AI Parody by Bernd Pulch✌️
  • 🤡🤡😂🤣🤣🤡Pop Stasi proudly presents Ursula “Flinten Uschi” von der Lie:”Her Leader Bill Gates Quote” – AI Parody
  • 🤡🤡🤡😂😂😂Pop Stasi proudly presents: Kamala Harris:”Love to Love You Baby” – AI Parody✌️
  • 🤡🤡🤣🤣🤣🤡Pop Stasi proudly presents: The Singing Bajazzo Honest Andy Lorch: “Flower But Sell Myself” – AI Parody sponsored by the Friends of the Italian Opera and the Corleone Society 🤡🤡🤡
  • 👹👹👹🤡🤡🤡THE STASI TITANIC – FEATURING – PUTLER – “Honest” GOMOPA/GOMOPA4KIDS/RA RESCH/EHRENFRIED STELZER/STASI/TOXDAT & “Honest” Ehlers & “Honest” JAN/ETTE & MONIKA Mucha & “Honest” BEATE/THOMAS Porten & “Honest” Lorch/DR. EDITH Lorch-Baumann  FANPAGE – CORRUPT ? TREACHEROUS ? FSB/KGB ? GENIUSES ?  JOURNALIST SIMULATORS ? PEDOS ? PHILANTROPHS ? PRESSTITUDES ? PROPERTY MOGULS ?STASI ? SUPERSTARS ? YOU DECIDE ! – 🤣🤣🤣🤣
  • 👹👹👹🤡🤡🤡THE STASI TITANIC – FEATURING – PUTLER – “Honest” GOMOPA/GOMOPA4KIDS/RA RESCH/EHRENFRIED STELZER/STASI/TOXDAT & “Honest” Ehlers & “Honest” JAN/ETTE & MONIKA Mucha & “Honest” BEATE/THOMAS Porten & “Honest” Lorch/DR. EDITH Lorch-Baumann  FANPAGE – CORRUPT ? TREACHEROUS ? FSB/KGB ? GENIUSES ?  JOURNALIST SIMULATORS ? PEDOS ? PHILANTROPHS ? PRESSTITUDES ? PROPERTY MOGULS ?STASI ? SUPERSTARS ? YOU DECIDE ! – 🤣🤣🤣🤣
  • 🤡🤡🤡😂😂Pop Stasi proudly presents Honest Kamala Harris & Honest Jeffrey Epstein:”Lies, Lies, Lies” – AI Parody
  • 🤡🤡🤡😂😂Pop Stasi proudly presents Honest Kamala Harris:”The Torture never stops” – AI Parody✌️
  • 😂😂🤣🤡🤡Pop Stasi proudly presents the “Singing Buffo” Peter Russ,Consigliori of a Wastepaper Empire DFV: “Death of a Clown” – AI Parody
  • 🤣🤣🤣🤡🍿Stink.And.Sink! Part 20 – The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse, meet Harley Quinn, Elena Ceaucescu, Talia Al Ghul, Beatrix Port and her Stasi Nymphos – Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt,RA Jochen Resch – AI Parody🤡🤣🤣🤣
  • 🤡🤡🤡🤣HONEST” JAN/ETTE “ORESTES BI” MUCHA – IZ Insider: “Kajal – Ana*- Legal – Illegal “Schei** Egal” (End of Citation) & THORSTEN “GAY K” KARL – PERVERT AND PROUD FAN PAGE – CORRUPT MEDIA WHORES ? EASTERN AGENTS ? JOURNALIST SIMULATORS ? CDU POLITICIAN MONIKA MUCHA ? TREACHEROUS ?GENIUS ? GOMOPA ? GOMOPA4KIDS ?RAINBOW NATION AGENTS ? PUTIN AGENTS ?  STASI ? SUPERSTARS ? 🤔YOU DECIDE !🤡🤡🤡🤣
  • 🤣🤣🤣🤡KGB Mix: “Stink.And.Sink!” Part 15 – The Joker, Two Face, Straw Man, The Piguin, Kingpin meet Rosa Kleb – Hommage a’ Ehlers, Mucha, Porten, Lorch & GoMoPa4Kids – AI Parody🤣🤣🤣🤡
  • 🤣🤣🤣🤡NOW: “Stink.With Me.Sink.With Me!” Part 17 – Transgender – Toxdat Mix: The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Dr. Mabuse, Dr. Fauci  meet Stormy Daniels, Beatrix Port & the Stasi Nymphos on the Exxon Valdez – Hommage a’ Ehlers, Promny, Mucha, Porten, Maurischat/GoMoPa4Kids, Lorch,Resch – AI Parody🤡🤣🤣🤣
  • 🤡🤡🤡😂Police hunts Honest Thomas “Strawman” Porten – AI Parody✌️
  • 🤣🤣🤣🤡Police hunts Loosing Peter “Joker” Ehlers aka “St.Pauly Pimp” – AI Parody✌️
  • 🤡🤡🤡😂Pop Stasi proudly presents “The Ultra IZ Horror Movie Part 5832” – AI Parody✌️
  • 🤣🤣🤣🤡Pop Stasi proudly presents Honest Alexander Soros in “Alex dodges the Dustpan” – AI Parody by Bernd Pulch✌️
  • 😂😂😂🤡Pop Stasi proudly presents Honest Dan Schneider:”Sexy and I know it” – AI Parody
  • 🤡😂😂😂Pop Stasi proudly presents Honest Vladimir Putin:” Baby Shark” – AI Parody
  • 🤡🤡🤡😂Pop Stasi proudly presents Kamala “Clownface” Harris: “Criminal Pt.2” – AI Parody by Bernd Pulch✌
  • 🤡🤡🤡😂Pop Stasi proudly presents Loosing Peter “Joker” Ehlers :”Bling – Bang – Bang – Born” – AI Parody✌️
  • 🤡🤡🤡😂Pop Stasi proudly presents Loosing Peter “Joker” Ehlers unplugged:”Wir sind STASI – Wir lieben alle Menschen” – AI Parody✌️
  • 🤡🤡🤡😂Pop Stasi proudly presents: “Police hunts IZ Ultra/St.Pauli Pimps Stasi Gang – AI Parody✌️
  • 🤡🤡🤡😂Pop Stasi proudly presents:”🤡🤡😂Pop Stasi proudly presents Loosing Jan “BI” Mucha-“Cajal”: “Sexy Loops” – AI Parody✌️
  • 🤡🤡🤡😂Pop Stasi proudly presents:”Kamala Harris:”I am Bad” – AI Parody✌️
  • 🤡🤡🤡😂Pop Stasi proudly presents:”Kamala Harris:”Psycho”✌️- AI Parody
  • 🤡🤡🤡😂Pop Stasi, the Original, proudly presents “Count Beanstalk” Thomas “Strawman” Porten: “The Dancing Deaf Dumb Cake” – AI Parody
  • 😂😂😂🤡Pop Stasi, The Original, proudly presents: Beatrix Port:”Killer Queen” – AI Parody
  • 🤣🤣🤣🤡Sink.Sink.Sink. Part 41
  • 🤣🤣🤣🤡The Joker and his Wild Bunch meet Gudrun Ensslin – AI Parody Fan Video🤡🤣🤣🤣
  • 😁😁🤣🤣THE JOKER MEETS ILSE KOCH🤡🤡dedicated to “HONEST” PETER EHLERS-“VON JOKER” – Trailer AI Parody🤣🤣🤣
  • 🤣🤣🤣🤡The Joker meets Stormy Daniels – Fan Video – AI ART PARTY PARODY VIDEO 🤡🤣🤣🤣
  • 🤣🤣🤣🤡The Joker, Clownface, Two Face-BI and their Wild Bunch play Finance Roulette🤣🤣🤣🤡
  • 🤣🤣🤣🤡The Joker, Clownface, Two Face-BI meet … Part 49 – Fan Video
  • 🤣🤣🤣🤡The Joker, Clownface, Twoface and the Wild Bunch plus Madame Mao and the Stasi Nymphos celebrate 4th of July at Home under Water🤣🤣- Fan Video
  • 🤡🤡🤡😎THE RETURN OF THE DDR😎😎POWERED BY ANGELA “IM ERIKA” MERKEL
  • 🤣🤣🤣🤡Toujours-L Armour – Stasi Cut: “Think.And.Sink!” Part 18 -The Joker, Two Face, Straw Man, the Pinguin, Kingpin, non existent Fantasy Lawyer “Spoering”, Dr. Mabuse meet Kamalla Harris, Cat 🐈 Woman & Beatrix Port,the Stasi Nymphos – Hommage a’ Ehlers, GoMoPa4 Kids, Lorch, Maurischat, Mucha, Porten, Promny, Resch – AI Parody 🤣🤣🤣🤡
  • 🤣🤣🤣🤡�”Power.Power.Power.” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 128 “Palpatine” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Palpatine😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 🤣🤣🤣Aktuelle Kamera ueber den Zusammenbruch der BRD✌
  • 🤡🤡🤡FUNKY FUEHRER ADI FEATURING HONEST JAN “BI” “Two-Face” MUCHA & HONEST PETER “Joker” EHLERS:”I AM BAD” – AI PARODY🤡🤡🤡✌️- Tribute to Mel Brooks
  • 🤣🤣🤡Honest Thomas “Clownface” Promny and his Lovebird Honest Klaus “Luca Brasi” Maurischat:”Thats Armore”🤡🤣🤣
  • 🤡🤡😂Pop Stasi proudly presents “Onkel” Klaus Maurischat:”Wir sind Stasi” – AI Parody sponsored by “GoMoPa4Kids”
  • 🤡🤡😂Pop Stasi proudly presents Andreas Lorch “The Singing Bajazzo” : “Haha said the Clown” – AI Parody
  • 😂😂🤡Pop Stasi proudly presents Bill Freddy Krueger Gates:”Ghostbusters” – AI Parody by Bernd Pulch✌️
  • 🤡🤡😂Pop Stasi proudly presents Honest George Soros sings – AI Parody✌️
  • 😂😂🤡Pop Stasi proudly presents Honest George Soros: “Sympathy for the Devil✌
  • 🤡😂😂Pop Stasi proudly presents Honest Hunter Biden:”The Great Crime Hits Volume 8644″ – Medley✌️ AI Parody
  • 🤣🤣🤡Pop Stasi proudly presents Honest Puff Diddy:”A Man”s Despair” – AI Parody✌
  • 🤣🤣🤡Pop Stasi proudly presents Honest Puff Diddy:”I am so Innocent!” – AI Parody✌
  • 🤡🤡😂Pop Stasi proudly presents Joker Rat Rap Battle – Honest Jan “BI” Mucha Willard Mix – AI Parody✌️
  • 🤡🤡😂Pop Stasi proudly presents Klaus “Luca Brasi” Maurischat:”Guilty – The Best Glamrock Hits” powered by Gary Glitter & GoMoPa4Kids✌️
  • 🤡🤡😂Pop Stasi proudly presents Klaus “Luca Brasi” Maurischat:”The Best Glamrock Hits” powered by Gary Glitter & GoMoPa4Kids✌️
  • 🤣🤣🤡Pop Stasi proudly presents Loosing Honest Jan “BI” Twi-Face Mucha-“Cajal” sings “Bobby Brown” – AI Parody✌
  • 🤡🤡😂Pop Stasi proudly presents Loosing Honest Peter “Joker” Ehlers:”They are coming to take me away” – AI Parody✌️
  • 🤡🤡😂Pop Stasi proudly presents Loosing Jan “BI” Mucha-“Cajal” as Marilyn Monroe Trans – AI Parody✌️
  • 🤡🤡😂Pop Stasi proudly presents Loosing Jan “BI” Mucha-“Cajal” sings “Sympathy for the Devil” – AI Parody✌️
  • 🤡🤡😂Pop Stasi proudly presents Loosing Jan “BI” Mucha-“Cajal” sings Rocky Horror Picture Show – Sweet Transvestite” – AI Parody✌️
  • 🤡🤡😂Pop Stasi proudly presents Loosing Jan “BI” Mucha-“Cajal”: “Barbie World” – Sponsored by Gay Vaseline Forte – AI Parody✌️
  • 🤡🤡😂Pop Stasi proudly presents Loosing Jan “BI” Mucha-“Cajal”: “Blast it up my Sh*tter” – Sponsored by Gay Vaseline Forte – AI Parody✌️
  • 🤡🤡😂Pop Stasi proudly presents Loosing Jan “BI” Mucha-“Cajal”: “Born This Way” – Sponsored by Gay Vaseline Forte – AI Parody✌️
  • 🤡🤡😂Pop Stasi proudly presents Loosing Jan “BI” Mucha-“Cajal”: “Dancing Zombie” – AI Parody✌️
  • 🤡🤡😂Pop Stasi proudly presents Loosing Jan “BI” Mucha-“Cajal”: “I am a Rat” – I Identify Ratman IZ Wastepaper Mix Sponsored by Gay Vaseline Forte – AI Parody✌️
  • 🤡🤡😂Pop Stasi proudly presents Loosing Jan “BI” Mucha-“Cajal”: “I am Sexy and I know it” – Ratman IZ Wastepaper DFV Mix Sponsored by Gay Vaseline Forte – AI Parody✌️
  • 🤡🤡😂Pop Stasi proudly presents Loosing Jan “BI” Mucha-“Cajal”: “No God No” – Sponsored by Gay Vaseline Forte – AI Parody✌️
  • 🤡🤡😂Pop Stasi proudly presents Loosing Jan “BI” Mucha-“Cajal”: “Saving all my Love for You” – Ratman IZ Wastepaper Mix Sponsored by Gay Vaseline Forte – AI Parody✌️
  • 🤡🤡😂Pop Stasi proudly presents Loosing Jan “BI” Mucha-“Cajal”: “Shoot it up my Shitter” – Sponsored by Gay Vaseline Forte – AI Parody✌️
  • 🤡🤡😂Pop Stasi proudly presents Loosing Jan “BI” Mucha-“Cajal”: “This is Halloween Part2” – Sponsored by Gay Vaseline Forte – AI Parody✌️
  • 🤡🤡😂Pop Stasi proudly presents Loosing Jan “BI” Mucha-“Cajal”: “We are STASI” – Woke Ratman IZ Mix Sponsored by Gay Vaseline Forte – AI Parody✌️
  • 🤡🤡😂Pop Stasi proudly presents Loosing Jan “BI” Mucha-“Cajal”:”Schoener Fremder Mann” – Thorsten Karl Gay Love Mix – AI Parody✌
  • 🤡🤡😂Pop Stasi proudly presents Loosing Jan “BI” Two-Face Mucha-“Cajal”:”Schoener Fremder Mann – AI Parody
  • 🤡🤡😂Pop Stasi proudly presents Loosing Jan “BI” Two-Face Mucha:”Lili Marleen” – AI Parody
  • 🤣🤣🤡Pop Stasi proudly presents Loosing Luca Klaus Brasi-Maurischat:”Wir sind Stasi!” – AI Parody✌
  • 🤡🤡🤡Pop Stasi proudly presents Loosing Peter “Joker” Ehlers:”Paranoid” – AI Parody ✌
  • 🤡🤡😂Pop Stasi proudly presents Murky Jan “BI” Mucha-“Cajal”: “Merry STASI Christmas” – The GoIden STASI Xmas Medley performed by I identify Ratman – IZ Wastepaper Mix Sponsored by Gay Vaseline Forte – AI Parody✌️
  • 🤡🤡😂Pop Stasi proudly presents Murky Jan “BI” Mucha-“Cajal”: “Wir sind STASI” – I Identify Ratman IZ Wastepaper Mix Sponsored by Gay Vaseline Forte – AI Parody✌️
  • 🤣🤣🤡Pop Stasi proudly presents Peter “Joker” Ehlers: “Sex with Me” – AI Parody
  • 🤡😂😂Pop Stasi proudly presents The Singing Needle: “Boom Boom Boom” – AI Parody by Bernd Pulch✌️
  • 🤡😂😂Pop Stasi proudly presents The Singing Needle: “It hurts to be in Love” – AI Parody by Bernd Pulch✌️
  • 🤣🤣🤡Pop Stasi proudly presents Ursula “Flinten Uschi” von der Leyen:”Monster” – AI Parody
  • 🤣🤣🤡Pop Stasi proudly presents Ursula “Flinten Uschi” von der Lie:”DSA – Digital Services Act” – AI Parody
  • 🤣🤣🤡Pop Stasi proudly presents: “The Singing Bajazzo” Honest Andreas Lorch, Capo of the Wastepaper Empire DFV: “Corleone Opera Classics” – AI Parody sponsored by the Friends of the Italian Opera🤡🤡🤡
  • 🤣🤣🤡Pop Stasi proudly presents: “The Singing Buffo” Honest Peter Russ, Consigliori of Wastepaper Empire DFV: “Capo Buffone” – AI Parody sponsored by the Friends of the Italian Opera and the Corleone Society 🤡🤡🤡
  • 🤣🤣🤡Pop Stasi proudly presents: “The Singing Buffo” Honest Peter Russ: “The Stasi Wastepaper Empire DFV Rap” – AI Parody sponsored by the Friends of the Italian Opera and the Corleone Society 🤡🤡🤡
  • 🤣🤣🤣Pop Stasi proudly presents: 🤡🤡😂Honest Jan “BI” “Two-Face” Mucha:”I am a Nasty Girl” – STASI-No-Virgin Mix – AI Parody🤡🤡😂
  • 🤡🤡😂Pop Stasi proudly presents: Honest Jan “BI” “Two-Face” Mucha: “Criminal!”
  • 🤡🤡😂Pop Stasi proudly presents: Honest Jan “BI” “Two-Face” Mucha:”I am a Freak!”
  • 🤡🤡😂Pop Stasi proudly presents: Honest Jan “BI” “Two-Face” Mucha:”I am a Freak!”
  • 🤡🤡😂Pop Stasi proudly presents: Honest Jan “BI” “Two-Face” Mucha:”I am a Material Girl”
  • 🤣🤣🤡Pop Stasi proudly presents: Honest Jan “BI” “Two-Face” Mucha:”Incompetent Vampire” – Count Dracula/Mielke Mix – AI Parody
  • 🤡🤡😂Pop Stasi proudly presents: Honest Jan “BI” “Two-Face” Mucha:”Like A Virgin” – STASI-Jungfrau Mix – AI Parody
  • 🤣🤣🤡Pop Stasi proudly presents: Honest Jan “BI” “Two-Face” Mucha:”Vampire” – AI Parody
  • 🤡🤡😂Pop Stasi proudly presents: Loosing Honest Peter “Joker” Ehlers: “Tainted Love”
  • 😂😂😂POP STASI proudly presents: The “Singing” Stasi/Putin/KGB Agent Honest Jan “BI” “Two-Face” Mucha sings: Mozart: The Magic “Flute” –  AI Parody by Bernd Pulch sponsored by the Jan Marsakek Hall of Shame, the Lorch Family & Gomopa”4Kids”🤣🤣🤣
  • 🤣🤣🤡Pop Stasi proudly presents: The Singing Bajazzo Honest Andy Lorch masked as Graefin Wahnfriede Eleonore, Agnes, Maria, Dorothea, Walburga Dudenberg-Hochfall: “Nessun Dorma” – AI Parody sponsored by the Friends of the Italian Opera and the Corleone Society 🤡🤡🤡
  • 🤣🤣🤡Pop Stasi proudly presents: The Singing Bajazzo Honest Andy Lorch unmasked: “Tears of A Clown” – AI Parody sponsored by the Friends of the Italian Opera and the Corleone Society 🤡🤡🤡
  • 🤣🤣🤡Pop Stasi proudly presents: The Singing Bajazzo Honest Andy Lorch, Don of the Wastepaper Empire DFV, unmasked: “Nessun Dorma” – AI Parody sponsored by the Friends of the Italian Opera and the Corleone Society 🤡🤡🤡
  • 🤣🤣🤡Pop Stasi proudly presents: The Singing Bajazzo Honest Andy Lorch: “Amazing Duet with Him-/Her-/Itself – AI Parody sponsored by the Friends of the Italian Opera and the Corleone Society 🤡🤡🤡
  • 🤣🤣🤡Pop Stasi proudly presents: The Singing Bajazzo Honest Andy Lorch: “Don t Ha Ha” – AI Parody sponsored by the Friends of the Italian Opera and the Corleone Society 🤡🤡🤡
  • 🤣🤣🤡Pop Stasi proudly presents: The Singing Bajazzo Honest Andy Lorch: “Luna Mezz ‘O Mare” (Godfather) – AI Parody sponsored by the Friends of the Italian Opera and the Corleone Society 🤡🤡🤡
  • 🤣🤣🤡Pop Stasi proudly presents: The Singing Bajazzo Honest Andy Lorch: “The Greatest Maria Callas Arias” – AI Parody sponsored by the Friends of the Italian Opera and the Corleone Society 🤡🤡🤡
  • 🤣🤣🤣Pop Stasi proudly presents:”Kamala Harris:”Psycho”✌️- AI Parody
  • 🤣🤣🤡Pop Stasi proudly presents:”The Peter “Joker” Ehlers Hamburg Harbour Party “Das Investment” triggering the $1.05 Trillion Stock Market Wipeout – AI Parody
  • 🤡🤡😂Pop Stasi, The Original, proudly presents Loosing Jan “BI” Mucha-“Cajal”: “Boom Boom Boom” – Sponsored by Gay Vaseline Forte – AI Parody✌️
  • 🤡🤡😂Pop Stasi, The Original, proudly presents Loosing Valdimir Zelenskiy: “Who Put The Bomb” – Sponsored by Lockheed Martin and Rheinmetall – AI Parody✌️
  • 😂😂😂Pop Stasi, The Original, proudly presents Mr. Spoonful: “SpongeBob Squarepants”
  • 🤣🤣🤡Richard III.Stasi.Hump:”I can smile.And I can MURDER when I smile!” Episode 85 – Your Host The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Richard III at Bosworth Field😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 🤡🤡😂STASI REVIVAL BAND: Die grossen Erfolge Teil – 0,0000067: “#Wir sind STASI!” – AI Parody
  • 🤣🤣🤡Stasi-Berlin-Hamburg-Wiesbaden:”#WIRsindSTASI.” 105 – Your Hosts Two-Face “BI”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Sofia Falcone😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 🤣🤣🤡Stasi-Hamburg.Joker. Crystal Lake Killer:”Chh, chh, chh, ha, ha, ha!” Episode 102 – Your Host The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Jason Voorhees😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 🤣🤣🤡Stasi-Shark Pool Hamburg:”Victims must be able to do without!” Episode 100 – Your Host The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Michael Myers aka The Shade alias Boogeyman😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 🤣🤣🤡Stasi-Wiesbaden.Two-Face-“BI”. Art The Clown:”It’s Arting Time!” Episode 103 – Your Hosts Two-Face “BI”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Art The Clown😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 🤣🤣🤡Stasi-Wiesbaden.Two-Face-“BI”.Strawman.Baron Samedi:”I am the Master of Life and Death, God of the Crossroads, and the Soul of the Party! You, may call me Baron.” 104 – Your Hosts Two-Face “BI”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Baron Samedi😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 🤣🤣🤡Stasi. Desert.Dune:”Hedonistic Pleasures.Exotic Drugs.Deviant Sex!” Episode 101 – Your Host The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Baron Wladimir Harkonnen😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 🤣🤣🤡Stasi.Gold.Finger:”My Name is Pussy Galore!” Episode 84 – Your Host The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Auric Goldfinger & Pussy Galore😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 🤣🤣🤡The Funky Fuehrers Adi, Honest Jan “BI” “Two-Face” Mucha, Honest Peter “Joker” Ehlers, Honest Andy “Bajazzo” Lorch, Honest Thomas “Strawman” Porten:”Bad” – Reprise on Public Request – AI Parody🤡 – Tribute to Mel Brooks
  • 😎😎😎THE HONEST LORCH FAMILY-“CORLEONE” – “L’ONORATO FAMIGLIA” i.e. DR. EDITH BAUMANN-LORCH – BLACK BOX -FAN PAGE – Parody- PRESSTITUDE CENTRAL ? JOURNALIST SIMULATORS ? TRUTHSEEKING GENIUSES ? CORRUPT PROPERTY MOGULS ? STASI SUPPORTERS ? PHILANTROPHS ?🤔🤔🤔You decide…
  • 🤣🤣🤣The Playboy AI Team endorses Kamala Harris AI Bodydouble too: AI Photo Series “The Empress without Clothes” in the White House – AI Parody created by Bernd Pulch🤣🤣🤣
  • 🤣🤣🤣THE SECRET WORLD OF KLAUS SCHWAB – AI PARODY🤣🤣🤣created by Bernd Pulch✌
  • 🤣🤣🤣THINK OR SINK PART 2 – THE JOKER MEETS EVA BRAUN ON THE BISMARCK – AI PARODY🤣🤣🤣HOMMAGE A’ “HONEST” PETER EHLERS – “VON JOKER”
  • 🤡🤡😂Tom meets Loosing Jan “BI” Mucha-“Cajal”:”Baseball Hit” – AI Parody
  • 🤡🤣🤣Voldemort: “There is no good and evil. There is only power… and those too weak to seek it.” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 131 “Lord Vodemort” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Lord Voldemort😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 🤣🤣🤡  Stasi In Space: Joker & Darth Vader:”Be careful not to choke on your aspirations!” Episode 97 – Your Host The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Darth Vader😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 🤣🤣🤡  Stasi-Waterkant.Joker.Vigilante:”When the Law fails to serve, we must serve as the Law!” Episode 99 – Your Host The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Vigilante😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 🤣🤣🤡  Stasi-Wipeout.Joker.Peacemaker:”I love peace with all my heart! I don’t care how many men, women and children die for it!” Episode 98 – Your Host The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Peacemaker😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 🤣🤣🤡  Stasi.Joker.Caligula:”The Pure Naked Terror!” Episode 95 – Your Host The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Caligula😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 🤣🤣🤡  Stasi.Joker.Deadshot:”Trillion Wipeout.Stink.Sink!” Episode 94 – Your Host The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Deadshot😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 🤣🤣🤡  Stasi.Joker.Gollum: “It came to me. My own. My love. My own. My Precious.” Episode 93 – Your Host The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Gollum😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 🤣🤣🤡  The Satanic Stasi Dream Team:Joker.White Dragon:”The Satanic $2 Trillion Wipeout!” Episode 96 – Your Host The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet White Dragon😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 👃🤡Idiot Zeitung (IZ) and Das Desinvestment Present: Stink Rapture: Towers of the Hindukush🤡powered by GoMoPa4Kids & Dr.Z.🤡
  • 🤣🤣Pop Stasi proudly presents Loosing Peter “Joker” Ehlers: “St.Pauly Pimp”
  • 🔥💀  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 118a: “RONIN & THE TORONTO TERROR” 🤡 POWERED BY DR  DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐 BARTON – ANTIHERO PHASE💀🔥 🎭👑
  • 🔥💀  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 119a: “NEMESIS NAMOR & THE TORONTO TRIANGLE TERROR” 🤡 POWERED BY DR  DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐 💀🔥 🎭👑
  • 🔥💀  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 120ftt: “TRIGON THE TERRORIST & THE TORONTO TRIANGLE TERROR” 🤡 POWERED BY DR  DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐 💀🔥 🎭👑
  • 👃Beautiful Classical Music for Wintertime
  • 👺BLOODY, BLOODY MARY, SAN FRAN “MUSCHI” MUCHA’S MISTRESS MISUSED🧐OSAMA,  HUSH, PLANKTON, MOJO JOJO CONSPIRACY 🔥💀  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 136WY/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐 💀🔥 🎭👑�💀  🤡 🧐 💀🔥 🎭👑By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios🔥🌌😈💥
  • 👺CAPTAIN COLD’S THERMAL INVASION🧐OSAMA,  HUSH, PLANKTON, MOJO JOJO CONSPIRACY 🔥💀  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 136WY/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐 💀🔥 🎭👑�💀  🤡 🧐 💀🔥 🎭👑By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios🔥🌌😈💥
  • 👃CBN CHRISTIAN BROADCASTING NETWORK LIVE
  • 🙏Divine Light and Desert Shadows: The Old Testament Through the Eyes of the Masters”🙏 Easter Monday🙏
  • 🙏Easter Monday 2025: Bible Stories Reimagined by Shakespeare, Dante, and Goethe, and Easter Paintings by Classical MastersApril 21, 2025🙏
  • 🙏Genesis 6:6. “So he sent a flood that wiped out many of the humans and Nephilim, but not before ordering Noah to build an ark that saved a select few.” Painted by Gustav Klimt – AI Art by Bernd Pulch✌
  • 🙏God’s Most Powerful Frequency 963hz, Positive Energy Transformation, Physical And Emotional Healing🙏
  • 👺HIERONYMA SPERA’S VENOMOUS VERITAS 🧐OSAMA,  HUSH, PLANKTON, MOJO JOJO CONSPIRACY 🔥💀  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 136WY/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐 💀🔥 🎭👑�💀  🤡 🧐 💀🔥 🎭👑By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios🔥🌌😈💥
  • 🤡IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT present”Lady Deathstroke & Janelle’s Past Unleashed! 👑💥📄✨🧀🌈👹💃🔋”
  • 👺JOKER’S EVIL TWIN INFERNO🧐OSAMA,  HUSH, PLANKTON, MOJO JOJO CONSPIRACY 🔥💀  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 136WY/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐 💀🔥 🎭👑�💀  🤡 🧐 💀🔥 🎭👑By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios🔥🌌😈💥
  • 👃Living Today from a Christian Perspective: Faith, Hope, and Love in a Complex World
  • 😎LUCKY BONUSGOLD😎
  • 👺MURKYS EVIL TWIN  SAN FRAN “MUSCHI” MUCHA’S SEXUAL ADDICTION ORGIES🧐OSAMA,  HUSH, PLANKTON, MOJO JOJO CONSPIRACY 🔥💀  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 136WY/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐 💀🔥 🎭👑�💀  🤡 🧐 💀🔥 🎭👑By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios🔥🌌😈💥
  • 🙏ORTHODOX CHANTS
  • 😎Pop Stasi proudly presents The Dead Soul Stalins:”Ode to Myself” – Medley feat. Mucha, Lorch, Ehlers, Promny, Maurischat😎
  • 👺SAN FRAN “MUSCHI” MUCHA’S CRIMES OF PASSION🧐OSAMA,  HUSH, PLANKTON, MOJO JOJO CONSPIRACY 🔥💀  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 136WY/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐 💀🔥 🎭👑�💀  🤡 🧐 💀🔥 🎭👑By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios🔥🌌😈💥
  • 🤣Stasi meets Mafia:”Just the Two of Us!”🤣🤡 ##wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden:”” Episode 115 “Carmine Falcone” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Carmine Falcone😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 👺THE CALENDAR MAN🧐OSAMA,  HUSH, PLANKTON, MOJO JOJO CONSPIRACY 🔥💀  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 136WY/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐 💀🔥 🎭👑�💀  🤡 🧐 💀🔥 🎭👑By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios🔥🌌😈💥
  • 👃The Christian Perspective on the Afterlife: A Comprehensive Exploration
  • 😎THE JAN MARSALEK – HALL OF SHAME😎: THE MUCHAS ON THE PUTIN/STASI/KGB/FSB/STB AND SB PAYROLLS – ALL DETAILS VERIFIED😎
  • 🤣The Killer Klowns:”It’s s Mad Mad Stasi World!”🤣🤡 ##wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden:”” Episode 114 “The Killer Klowns from Outta Space” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet The Killer Klowns😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 👃The Meaning of Today: A Christian Perspective
  • 👺THE MIRROR MASTER’S REGLECTIVE REALMS🧐OSAMA,  HUSH, PLANKTON, MOJO JOJO CONSPIRACY 🔥💀  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 136WY/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐 💀🔥 🎭👑�💀  🤡 🧐 💀🔥 🎭👑By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios🔥🌌😈💥
  • 🤣The Riddler:”Don’t mess with us, we are Stasi!”🤣🤡 ##wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden:”” Episode 113 “The Riddler” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet The Riddler😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 👃The Second Advent: A Christian Perspective
  • 🙏The Sunflowers of the Soul: A Meditation on the Parable of the Sower🙏
  • 🤣The Zillionaire:”We are totally Stasi!”🤣🤡 ##wirsindstasi Moscow-Berlin-Hamburg-Wiesbaden:”” Episode 112 “Aloysius O’Hare” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Aloysius O’Hare😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody 🤣🤣🤣🤡
  • 👃Today in Christianity: Key Events, Observances, and News
  • 👯‍♂️SUPERBOWL IN LAS VEGAS – MADNESS ON THE STRIP👯‍♂️
  • 🧐“MERZ-MACARONI-CHIP 2.0: FRIEDRICH’S NOODLES DECLARE INDEPENDENCE, FORM MICRO-NATION INSIDE HIS EAR CANAL”🚨 IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT EXCLUSIVE„MERZ-MACARONI-CHIP 2.0: FRIEDRICHS NOODLEN ERKLÄREN UNABHÄNGIGKEIT UND GRÜNDEN MIKRO-NATION IN SEINEM OHR“🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI-WOMEN-SUPPORT-STAFFEL & FREE-FRITZL-FRONT 😘👯‍♂️💃
  • 👹“VILLAINS FROM HELL 2025: The Top 100 Most Sinful BIBLE Persons & Billionaires Ranked” 👺
  • 🤡✌ Dr. Z: The Aryan Real Estate Revolutionary Who Thinks Hitler Was Just Misunderstood
  • 🤡✌ Dr. Z: The Aryan Real Estate Revolutionary Who Thinks Hitler Was Just Misunderstood
  • 🤡✌”From Scalps to Swamps: Kanye’s Kooky Klan Konvention”
  • 🤡✌”Idiot Zeitung (IZ): Sun-Hole Tower Edition”
  • 🤡✌”The Berlin Blunder: Sven, Klausi, and the Embassy Heist”
  • 🙏✌”Witches’ Sabbath Reimagined: A Dark Occult Gathering in the Style of Francisco Goya”
  • 🙏✌Anthony van Dyke – The Annunciation –  AI ART
  • 🙏✌Anthony van Dyke – The Last Supper – AI ART
  • 🙏✌Anthony van Dyke – The Resurrection – Biblical Narratives Scene 6 – AI ART
  • 🙏✌Anthony van Dyke – The Crucifixion – Biblical Narratives Scene 5 – AI ART
  • 🙏✌Anthony van Dyke: Moses – AI Art
  • 🙏✌Divine Narratives: A Van Dyck-Inspired Bible Series: The Creation of Adam
  • 😿✌IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT present “Judas’ Serpent Coins and Eastern Betrayals – Hinterfozzige Janelle’s Seductive Clash in the Bazaar of Filth” powered by GoMoPa4Kids & Dr.Z.🤣
  • 🤡✌Idiot Zeitung (IZ): “Der Grosse Stink Escape – Powered by Das Desinvestment (DI)”
  • 🤡✌Idiot Zeitung (IZ): “Heaven Now – Das Wastepaper-Paradies im Himmel” powered by Das Desinvestment (DI)
  • 🤡✌Idiot Zeitung (IZ): “Stink Betrayal – Hinterfozzige Janelle’s Sky Versailles” powered by Das Desinvestment (DI)
  • 🤡✌Idiot Zeitung (IZ): “Stink Frenzy – Der Nympho-Fart-Rampage” powered by Das Desinvestment (DI)
  • 🤡✌Idiot Zeitung (IZ): “Stink Horizont – Der Wastepaper-Werbe-Blitz” powered by Das Desinvestment (DI)
  • 🤡✌Idiot Zeitung (IZ): “Stink Louvre – The Wastepaper Art Fiasco” powered by Das Desinvestment (DI)
  • 🤡✌Idiot Zeitung (IZ): “Stink Lust – Das Fart-Betriebene Passionsspiel powered by Das Desinvestment (DI)
  • 🤡✌Idiot Zeitung (IZ): “Stink Odyssey – Die Fartbetriebene Weltraum-Jagd” powered by Das Desinvestment (DI)
  • 🤡✌Idiot Zeitung (IZ): “Stink Pageant – Miss Hinterfozzig’s Transgender Beauty Bash” powered by Das Desinvestment (DI)
  • 🤡✌Idiot Zeitung (IZ): “Stink Purge: Hinterfozzige Janelle’s  Great Fart-Off” – powered by Das Desinvestment (DI)
  • 🤡✌Idiot Zeitung (IZ): “Stink Reign – Miss Hinterfozzig’s Pervert Purge” powered by Das Desinvestment (DI)
  • 🤡✌Idiot Zeitung (IZ): “Stink-o-Tron 5000 – Die Fart-Betriebene Zeitmaschine” powered by Das Desinvestment (DI)
  • 🤡✌Idiot Zeitung (IZ): “Stinkapalooza – Das Fart – Fest Fiasco” powered by Das Desinvestment (DI)
  • 🤡✌Idiot Zeitung (IZ): “Stinklantis – Das Versunkene Fart-Koenigreich” powered by Das Desinvestment (DI)
  • 🤡✌Idiot Zeitung (IZ): “Stinkopolis – Die Schwimmende Fart-Metropole” – powered by Das Desinvestment
  • 🤡✌Idiot Zeitung (IZ): “Stinktopia – Die Fart-Betriebene Utopie” powered by Das Desinvestment (DI)
  • 🤡✌Idiot Zeitung (IZ): “Stink  Armada – Die Fart-Flotten-Invasion” – powered by Das Desinvestment (DI)
  • 🤡✌Idiot Zeitung (IZ): Babel Tower Edition
  • 🤡✌Idiot Zeitung (IZ): Golden Horizon Edition
  • 🤡✌Idiot Zeitung (IZ): Pharaoh Edition
  • 🤡✌Idiot Zeitung (IZ): Schildan City Edition
  • 🤡✌Idiot Zeitung (IZ): The Eternal Night Edition
  • 🤡✌Idiot Zeitung (IZ): The Festival of Shadows Edition – Powered by Das Desinvestment (DI)
  • 🤡✌Idiot Zeitung (IZ):”Die  Grosse Stinkmauer von China – Powered by Das Desinvestment (DI)
  • 🤡✌Idiot Zeitung: Bullshit Castle in the Sky Edition – powered by Das Desinvestment (DI)
  • 🤡✌Idiot Zeitung: Heavenly Heights Edition
  • 🤡✌Idiot Zeitung: The Great Dung Derby Edition – powered by Das Desinvestment (DI)
  • 🤡✌Idiot Zeitung: The Sky Bank Heist Edition powered by Das Desinvestment (DI)
  • 🤡✌Spy-Bot: The AI That Knew Too Little – A Comedy of Errors in Espionage
  • 👃✌SUNDAY REFLECTION
  • 🤡✌The Deep State Chronicles: A Tale of Bureaucratic Intrigue
  • 🙏✌The Weight of Truth
  • 🏙️ Shadows in Frankfurt’s Skyline – Adler Group, DFV Media & the Lorch Network: Neighbors in the Shadow Economy
  • 🕵️ THE SCHNEIDER-LORCH CONNECTION: 25 Years of German Real Estate Media Manipulation
  • 🏙️💰🧠 “OPERATION METROPOLIS LOOP” 🧠💰🏙️💥 How Media, Money, and Psychology Built the Perfect Real Estate Mirage 💥
  • 🕵️‍♂️ The Transatlantic Transparency Project – US Legal Edition
  • 🕵️‍♂️WORLD EXCLUSIVE: Operation Purple Leech – NATO’s Secret Plan to Build a Submarine Base in the Swiss Alps 🌍🧀
  • A BRIXTON TALE – Full Original 2022 Movie
  • A la sombra del poder: El oscuro legado de la influencia nazi en la industria financiera alemana
  • A LONELY PLACE FOR DYING – Full Original Movie
  • À sombra do poder: O legado sombrio da influência nazista na indústria financeira alemã
  • A-Z- 2.000 STASI – OFFIZIERE IM BESONDEREN EINSATZ – OibE – “SCHLÄFERLISTE DER STASI IN WESTDEUTSCHLAND”- STASI-SLEEPER LIST A-Z
  • ABC NEWS AUSTRALIA LIVE
  • ABC NEWS LIVESTREAM
  • ABE LINCOLN OF THE FOURTH AVENUE – Full Original Movie
  • ABRAHAM LINCOLN – by D. W. Griffith – Full Original Movie
  • ADAM AND EVE – Full Original Movie
  • Advertorial and Commercial Content Analysis: The 76 Finance Media Outlets – The Mastersson Series XXIX
  • AFRICA SCREAMS – Abbot & Costello – Full Original Movie
  • AFTER THE RESURRECTION – Full Original Bible Movie
  • AGENDA-FREE TV
  • AGENT 69 IN THE SIGN OF THE SCORPIO – Full Original Movie
  • AL JAZEERA LIVE TV
  • ALEXEI NAVALNY
  • ALIEN ALLIANCES AND SECRET SOCIETIES: DULCE BASE: THE NEW ILLUMINATI – Full Original Documentary Movie
  • All’ombra del potere: L’oscuro lascito dell’influenza nazista nell’industria finanziaria tedesca
  • ALOHA FROM HELL – THE JOKER MEETS SATAN – AI PARODY
  • Alternative News vs. Mainstream Media: A Critical Look at Information Sources
  • AMERICA FIRST LIVESTREAM
  • AMOKLAUFENDE STASI-GoMoPA-TERRORISTEN; “KINDER-SEXUALAUFKLÄRER” UND rufMÖRDER BEKOMMEN IMMER MEHR GEGENWIND
  • AMORE E MORTE NEL GIARDINO DEGLI DEI – Full Original Movie
  • AN OVERVIEW OF THE HEAVY CYBERATTACKS ON OUR WEBSITES TO STOP THE TRUTH DONE BY THE SUSPECTS
  • ANCIENT ALIENS – Origin of Humanity – Full Original SciFi Movie
  • ANCIENT ENGINEERS – Full Original SciFi Movie
  • AND NOW FOR SOMETHING COMPLETELY DIFFERENT – Full Monty Phyton Movie
  • ANDREA BONCI
  • ANONYME STASI-SCHEI**HAUS-FLIEGEN – NOMEN EST OMEN
  • ANTICIPATION – Exclusive Drama Premiere 2023 – Full Movie
  • ANTIDOTE – PREMIERE 2023 -Full Original Movie
  • APACHE BLOOD – Full Original Movie
  • ARTHUR CONAN DOYLE
  • ASSASSIN – 2022 – Full Original Movie
  • ATOM AGE VAMPIRE – Full Original Movie
  • ATTACK OF THE MONSTERS – Full Original Movie
  • BANNON’S WAR ROOM
  • BATTLE OF THE WORLDS – Full Original Movie
  • BBC TV
  • BDVP COTTBUS LIST – POLICE & STASI – BDVP COTTBUS LISTE – POLIZEI & STASI
  • BDVP FRANKFURT/ODER LIST – POLICE & STASI – BDVP FRANKFURT/ODER LISTE – POLIZEI & STASI
  • BDVP GERA LIST – STASI & POLICE – BDVP GERA LISTE – POLIZEI & STASI
  • BDVP POTSDAM LIST – POLICE & STASI – BDVP POTSDAM LISTE – POLIZEI & STASI
  • BDVP SUHL LIST – POLICE & STASI – BDVP SUHL LISTE – POLIZEI & STASI
  • BEAT THE DEVIL – Humphrey Bogart – Gina Lollobrigida – Jennifer Jones – directed by John Huston – Full Original Movie
  • BEHAVE YOURSELF – Shelley Winters – Full Original Movie
  • BENEATH THE 12 MILE REEF – Full Original Movie
  • Bernd Pulch | Lawfare, Censorship & Political Satire
  • BERND PULCH – MAGISTER ARTIUM – DER BEWEIS SO ECHT WIE UNSER INVESTMENT MAGAZIN – DAS ORIGINAL ECHT IST
  • BerndPulch.org – USP
  • BerndPulch.org: An Analysis of Lawfare, Censorship, and the ‘Maxwell Lord Dominion’
  • BETTY PAGE AND HER HIGH HEEL SHOES
  • BETTY PAGE GETS DRESSED IN SATIN
  • BGH-Urteil gegen den Suchmaschinen-Terror der “GoMoPa”-“Nawito”-Genossen
  • BIBLE COLLECTION – GENESIS – Full Original Movie
  • BIDEN’S PARADISE Powered by Hunter Biden🤣
  • BIG BLUFF – Full Original Movie
  • BLACK GIRLS IN 1960S SPANKING S&M STAG FILM
  • BLACK TAPE PROJECTS UNCENSORED
  • BLOODY PIT OF HORRORS – Full Original Movie
  • BLOOMBERG BUSINESS TELEVISION
  • BLUEBEARD – John Carradine – Full Original Movie
  • BORDER GUARD – Full Original 2022 Movie
  • BORN TO WIN – Robert de Niro – Full Original Movie
  • BOWERY AT MIDNIGHT – Full Original Movie
  • BP NEWS SHOW PILOT
  • BRAZIL – Full Original Movie by Terry Gilliam
  • BREAKING: BP RESEARCH EXPOSES CRITICAL GAP IN GERMAN REAL ESTATE’S DIGITAL HISTORY
  • BRUNETTE – VINTAGE EROTICA
  • CALENDAR GIRL – Full Original Movie
  • CALL OF THE YUKON – Full Original Movie
  • CALVACADE OF THE WEST – Full Original Movie
  • CALVACADE OF THE WEST  – Full Original Western Movie
  • CAPTAIN CALAMITY – Full Original Movie
  • CAPTAIN KIDD – Charles Laughton – Full Original Movie
  • CASANOVA – Full Original Movie
  • CAUSE FOR ALARM! – Full Original Movie
  • CAZE TV
  • CBS NEWS LIVE TV
  • CC & COMPANY – Ann Margret – Full Original Movie
  • CECIL B DE MILLE DIRECTED FULL ORIGINAL MOVIES: THE GREATEST STORY EVER BEEN TOLD, THE TEN COMMANDMENTS, SAMSON & DELILAH, THE SIGN OF THE CROSS, PLAINSMAN
  • CENTERFOLD PHOTOGRAPHY – Full Original Movie
  • CENTRE SPREAD – Full Original Movie
  • CHERRY KNIGHT – REPRISE
  • CHINATOWN AFTER DARK – Full Original Movie
  • CITY OF THE DEAD/HORROR HOTEL – Christopher Lee – Full Original Movie
  • CLASSIC STAG CINEMA
  • CLASSIC STAG CINEMA – Full Original Movie
  • CLASSICAL MUSIC LIVESTREAM
  • Claude Monet: Whitsun – The Holy Ghost enlightens Jesus’ Desciples – AI Art
  • CLIMATES
  • CNA NEWS LIVE
  • CNN LIVE TV
  • CONQUEST 1453 – BATTLE OF THE EMPIRES – Full Original Movie
  • CONTACT
  • COPYRIGHT DECLARATION
  • CREATURE FROM THE BLACK LAGOON – Full Original Movie
  • CREDO: FREEDOM, HUMAN RIGHTS, PEACE AND A DEMOCRATIC SOCIETY NEED INVESTIGATIVE JOURNALISM
  • CYRANO DE BERGERAC – Full Original Movie
  • DANCING IN THE WOODS
  • DANIEL BOONE – Full Original Movie
  • DANIEL BOONE – TRAILBLAZER – Full Original Movie
  • DANNY KAYE: “ON THE RIVEREA” – Full Original Comedy Movie
  • Dans l’ombre du pouvoir : L’héritage sombre de l’influence nazie dans l’industrie financière allemande
  • DARK PARASITE – Premiere 2023 – Full Original Movie
  • DAS BETRUGSURTEIL GEGEN “BENNEWIRTZ” UND “PETER EHLERS” “GoMoPa”-PARTNER “MAURISCHAT” UND “VORNKAHL” WG BETRUGES AM EIGENEN ANLEGER
  • Das mutmaßlich tödliche Wein-Präsent an Heinz Gerlach”
  • DAS SYSTEM “GoMoPa”-Google
  • DAVEY AND GOLIATH – Full Original Animation Movie
  • DAVID AND GOLIATH – Full Original Movie
  • DAWN OF THE GREAT DIVIDE – Full Original Movie
  • DAY THE EARTH STOOD STILL – Full Original Movie
  • DEATH RIDES A HORSE – Lee van Cleef – Full Original Movie
  • Deconstructing the ‘Maxwell Lord Dominion’: Psychological Warfare in Speculative Fiction
  • Der “freiwillige” Beratungsvertrag zwischen “GoMoPa” und estavis
  • DER “GoMoPa” ADRESSEN-FRIEDHOF BUCHSTABE A UND DIE GEFÄLSCHTEN MITGLIEDERZAHLEN
  • DER BEWEIS “DAS INVESTMENT MAGAZIN” DAS ORIGINAL IST ECHT
  • DER BEWEIS: “GoMoPa”-ERPRESST MERIDIAN CAPITAL “GoMoPa”-CEO MAURISCHAT WIRD VOM BKA VERHAFTET
  • DER BEWEIS: DER MAGISTER-TITEL VON BERND PULCH IST ECHT
  • Der Beweis: Meridian Capital über die Fälschung der anonymen “GoMoPa”-Scheisshausfliegen
  • Der Beweis: Wer geschmiert wurde: STASI-“GoMoPa” und dessen Ableger “Nawito”
  • DER STASI-MORD AN HEINZ GERLACH WEIL ER DAS STASI KOMPLOTT DURCHSCHAUTE
  • DER TODESKING – Full Original Movie
  • DEVIL’S CARGO – Full Original Movie
  • DIARY OF A NUDIST – Full Original Movie
  • DICK TRACY – DETECTIVE – Full Original Movie
  • DICK TRACY MEETS GRUESOME – Boris Karloff – Full Original Movie
  • Die “GoMoPa”-Opfer-Liste
  • Die bezahlten Reisen und Immobilien von Thomas und Beate Porten – mutmaßlich Korruption und mutmaßlich Amtsmißbrauch”
  • Die Bilanz der “GoMoPa” – GmbH 2008
  • Die Bilanz der “GoMoPa” – GmbH 2009
  • DIE BILANZ DER “GoMoPa”-GmbH 2010
  • DIE FREI ERFUNDENEN LÜGEN VON “GoMoPa”, UND DEREN SCHEI*SHAUSFLIEGENBLOG, EXTREMNEWS, DIE BEWERTUNG: FALL PROFESSOR MINISTER SCHELTER
  • Die Geschäftsführung der “GoMoPa” GmbH – angeblich in New York – mutmasslich in Verden
  • Die Liquidation der GoMoPa
  • DIE STASI-FÄLSCHER: Meridian Capital about GoMoPa STASI-FÄLSCHUNGEN DER “GoMoPa”
  • Digital Amnesia: How A Multi-Billion Dollar Real Estate Market Is Being Erased, One Deleted Archive at a Time
  • Divine-comedy in David Javerbaum (author of The Last Testament: A Memoir by God) Style — original and exclusive for berndpulch.org: GOD UNPLUGGED✌SHEEPLE PEOPLE VERSION🤯
  • DON’T LOOK IN THE BASEMENT – Full Original Movie
  • DONATION OPTIONS
  • DOOMED TO DIE – Full Original Movie
  • DR. CALIGARI – Full Original Movie – Supreme Quality
  • DR. CHRISTIAN MEETS THE WOMEN – Full Original Movie
  • DR. SEX – Full Original Movie
  • DRESSED TO KILL – SHERLOCK HOLMES – Full Original Movie
  • DW NEWS LIVESTREAM
  • EARTH CAM LIVE
  • EARTH vs THE FLYING SAUCERS – Full Original Movie
  • EAT YOUR HEART OUT – Premiere 2023 – Full Original Movie
  • EMMANUELLE – QUEEN OF THE GALAXY – Full Original Movie
  • EMMANUELLE II – Full Original Movie
  • EMMANUELLE III – Full Original Movie
  • EMMANUELLE IN SOHO – Full Original Movie
  • EMMANUELLE IN SPACE 1 – Full Original Movie
  • EMMANUELLE IN SPACE 3 – Full Original Movie
  • EMMANUELLE IV – Full Original Movie
  • EMMANUELLE IV – Full Original Movie
  • EMMANUELLE V – Full Original Movie
  • EMMANUELLE VI – Full Original Movie
  • EMMANUELLE VI – Full Original Movie
  • EMMANUELLE VII – Full Original Movie
  • EMMANUELLE VS DRACULA – Full Original Movie
  • Enthüllt – Der geheime Beratungsvertrag zwischen “GoMoPa” und Dolphin”
  • Enthüllt – Der geheime Beratungsvertrag zwischen “GoMoPa” und EEV”
  • Enttarnt – Der mutmassliche Macher von “Gomopacrime” und “Investigoo” – Rainer von Holst”
  • Enttarnt – Frank Maiwald – STASI-Spitzel und “GoMoPa”-Chefredakteur”
  • Enttarnt – Johann Sternberg, “GoMoPa”-Redakteur, Drogenbeschaffer und Trojanisches Pferd – Kürzel “sa””
  • EPISODE XII: THE GLOBAL MEMORY HOLE – HOW ANGLO-AMERICAN INTERESTS AND GDPR ERASE HISTORY
  • EPISODE XIII: THE 46-NATION VANISHING – HOW THEY SYSTEMATICALLY ERASED 94,475 PROPERTY STORIES
  • EPISODE XIV: THE IZ PARADOX – COMMERCIAL EMPIRE, HISTORICAL VOID, REAL ESTATE EMPIRE✌
  • EPISODE XV: THE GLOBAL REAL ESTATE MEDIA CAPTURE – WHEN THE WATCHDOG WORKS FOR THE LANDLORDS
  • EPISODE XXIV: THE GLOBAL MEDIA CAPTURE – FROM LONDON BOARDROOMS TO GERMAN NEWSROOMS
  • ERICH VON STROHEIM:”THE WEDDING MARCH” – Full Original Movie – Synchronized, Original Score – Technicolor
  • ESPN LIVESTREAM
  • ESTHER AND THE KING – Full Original Movie
  • EURONEWS LIVESTREAM
  • EUROPEAN VINTAGE STRIPPER
  • EVIDENCE FILE: FRANKFURT REAL ESTATE MANIPULATION – Documented Market Patterns, Corporate Connections, and Legal Violations
  • EVIDENCE FILE: THE VANISHING ACT – HOW KEY FIGURES DISAPPEARED AS EVIDENCE MOUNTED
  • EVIL BRAIN FROM OUTTER SPACE – Full Original Movie
  • EXCLUSIVE POLL RESULTS: How much did the allegedly highly corrupt Immobilien Zeitung receive from Rene Benko/Signa? Presstitutes? You decide…
  • EXODUS – Full Original Movie
  • Expert: Jan Mucha is a suspected Putin Spy – Experte enthüllt Jan Mucha mutmaßlicher Putin-Agent/Spitzel
  • Exploring Afterlife: An Introduction
  • FANNY BY GASLIGHT – Full Original Movie
  • FANTASM COMES AGAIN – Full Original Movie
  • FAQ
  • FASHION TV
  • FATHERLAND – Full Original Movie
  • FAZ – FRANKFURTER ALLGEMEINE ZEITUNG ÜBER “GoMoPa”
  • FEMALE CONSCRIPTS – 1908 – Full Original Movie
  • FIRST EVER KISS ON FILM
  • FIRST SPACESHIP ON VENUS – Full Original Movie
  • FIVE MILLION YEARS TO EARTH – Full Original Movie
  • FLASH GORDON – THE MOVIE – Full Original Movie
  • FOR IMMEDIATE RELEASE
  • FOX NEWS LIVE
  • FRANCE 24 LIVE NEWS FRANCAIS & ENGLISH
  • FRANKENSTEIN BY THOMAS ALVA EDISON – Full Original Movie
  • From Stasi to Digital Surveillance: A Historical Parallel of State Control
  • From Stasi to Digital Surveillance: A Historical Parallel of State Control
  • From Stasi to Digital Surveillance: A Historical Parallel of State Control
  • FRONTLINE REPORTS
  • GAMMA THE INVINCIBLE – Full Original Movie
  • GEFÄLSCHER LEBENSLAUF VON STASI-“GoMoPa”-“CEO”-“KLAUS MAURISCHAT”
  • GEORGE A. ROMERO – NIGHT OF THE LIVING DEAD – Full Original Movie
  • GERD BENNEWIRTZ ,”NUN GoMoPa”, VERSUCHT ERNEUT “GoMoPa”-KRITISCHE STELLEN LÖSCHEN ZU LASSEN
  • GET CHRISTIE LOVE – Full Original Movie
  • GET CHRISTIE LOVE! – Full Original Movie – Alternative Version
  • GHOST DOG – THE WAY OF THE SAMURAI – Full Original Movie
  • GIVE IT TO ME – DADDY! Full Vintage Stag Film
  • Global Real Estate Media Content Analysis: Algorithms of Erasure – Mastersson Dossier Series XXXII
  • GOD JESUS CHRIST – ANCIENT NAMES OF GOD
  • GOD’S GUN – JACK PALANCE – LEE VAN CLEEF – Full Original Movie
  • GoMoPa – Wie Cyberkriminelle Unternehmen ausplündern
  • GoMoPa – Wie Cyberkriminelle Unternehmen ausplündern
  • GoMoPa Crime Unzensiert – Weihnachtsausgabe mit pikanten Details zu den Cybercrime-Gangstern
  • GoMoPa-Genossen: Mutmaßliche IM – heutige IZ, Mucha, Porten, Ehlers…”AHA, daher wußte “GoMoPa” dies!”GoMoPa-Cronies: GoMoPa comrades: Suspected IM – today’s IZ, Mucha, Porten, Ehlers… “AHA, that’s how “GoMoPa” knew this!”
  • GONE WITH THE WEST – James Caan – Stefanie Powers – Full Original Movie
  • GOOD BYE EMMANUELLE – Full Original Movie
  • Google declares Top Terrorist Atta is a “Star Student” – Cyber-Stasi Method – Google macht Top-Terrorist Atta zum Star-Studenten – Methode Cyber-STASI “GoMoPa”
  • GRAVE OF THE VAMPIRE – Full Original Movie
  • GREAT EXPECTATIONS – Full Original Movie
  • GREAT EXPECTATIONS – Full Original Movie
  • GREGORIAN MUSIC
  • Gücün Gölgesinde: Alman Finans Sektöründe Nazilerin Karanlık Mirası
  • HAPPINESS FREQUENCE
  • HAPPY NEW YEAR AROUND THE WORLD LIVESTREAM
  • Harder, Longer, Deeper! Don’ t HaHa – Video Mix
  • HE WALKED THE NIGHT – Full Original Movie
  • HELDORADO – Full Original Movie
  • HERCULES AGAINST THE MOON MEN – Full Original Movie
  • HERCULES AND THE CAPTIVE WOMEN – Full Original Movie
  • HERCULES AND THE TYRANTS OF BABYLON – Full Original Movie
  • HET IS WEER ZOMER IN ZANDVOORT!
  • HI DE HO – Cab Calloway – Colorized Full Movie
  • HINDENBURG DISASTER FILM COMBINED WITH RADIO REPORT
  • HINDENBURG EXPLODES – Full Original Movie
  • HIS GIRL FRIDAY – Full Original Movie
  • HISTOIRE D’O – Full Original Movie uncensored
  • HISTOIRE D’O – THE STORY OF O – UNCUT – Full Original Movie
  • HISTORY HAS TO BE REWRITTEN: THE SECRET ADOLF HITLER DIARY PHOTOS LEAKED – WORLD EXCLUSIVE😂👯‍♀️✌
  • HOLD THAT WOMAN – Full Original Movie
  • HOLLYWOOD MAN – Full Original Movie
  • HOLLYWOOD’S WAR ON GOD – Full Original Movie
  • HOLY GHOST PEOPLE 1
  • HOLY GHOST PEOPLE 2
  • HONEST PETER “THE JOKER” EHLERS FANPAGE – THE JOKER: FOLIE A DEUX – TRAILER & AI PARODY
  • HOT NUMBER – VINTAGE EROTICA
  • HOT ROD GIRL – Full Original Movie
  • HOUSE ON HAUNTED HILL – Vincent Price – Colorized Full Movie
  • HOW AWFULL ABOUT ALLAN – Anthony Perkins – Full Original Movie
  • HOW TO UNDRESS IN FRONT OF YOUR HUSBAND
  • HUNTING EMMANUELLE – Full Original Movie
  • HUNTING THE KGB KILLERS – Full Docu Movie
  • I DREAMED OF BEING A TEENAGE STRIPPER – Full Original Movie
  • Idendity Theft Cyber-STASI – PULCH ORIGINAL-trademark pirates-Markenpiraten
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT 😘PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – 😍Episode 103: Transsexual Nebula Rhapsody – Galactic Genderfreak Ascension” 🤡POWDERED BY DR. Z., GOMOPA4KIDS,😎 STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT 🤩PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium🤯 – Episode 80 – 108B: LATEX IN THE CHANCELLOR OFFICE” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRÄSENTIEREN: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 106: Transsexual Nebula Frenzy – Cosmic Carnival” 🤡 UNTERSTÜTZT VON DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRÄSENTIEREN: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 64: Neon-Eklipse-Overdrive – Die Sivana-Suprematie” 🤡 UNTERSTÜTZT VON DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRÄSENTIEREN: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 65: Glitterkrieg Vortex – The Sivana Singularity” 🤡 UNTERSTÜTZT VON DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRÄSENTIEREN: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 67: Quantum Glitter Reckoning with Ghislaine & Jeff” 🤡 UNTERSTÜTZT VON DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRÄSENTIEREN: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 68: Quantum Glitter Reckoning – Martian Chaos Unleashed” 🤡 UNTERSTÜTZT VON DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRÄSENTIEREN: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 69: Quantum Glitter Reckoning – Galactic Transgender Apocalypse” 🤡 UNTERSTÜTZT VON DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT present “Beatrix Lestrange & Janelle’s Passion Shattered by Bane’s Rule! 👑💥📄✨🧀🌈👹💃Deutsche Version🔋”
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT present “Beatrix Lestrange & Janelle’s Passion Unleashed! 👑💥📄✨🧀🌈👹💃Deutsche Version🔋
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT present “Janelle-Sauron’s Rogue Rampage: General Zod’s Paper Apocalypse! 👑💥📄”„Janelle-Saurons roher Amoklauf: General Zods Papier-Apokalypse! 👑💥📄“CLEARANCE LEVEL: 🚨 OMEGA-PULP // ROGUE WARLORDS & PAPER TYRANTS ONLYBy Bernd Pulch, Chief Dino Investigator 🦖🔍📅⏰powered by GoMoPs4Kids🤡, Dr. Z, STASI WOMEN SUPPORT GROUP😘
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT present “Kingpin’s Wastepaper Empire: The Great Meme-Pulp Purge! 🤴📄💥”„Kingpins Papierabfall-Imperium: Die große Meme-Pulp-Säuberung! 🤴📄💥“CLEARANCE LEVEL: 🚨 OMEGA-PULP // MEME TYCOONS & WASTEPAPER WARLORDS ONLY💃By Bernd Pulch, Chief Dino Investigator 🦖🔍📅⏰powered by GoMoPs4Kids🤡, Dr. Z, STASI WOMEN SUPPORT GROUP😘
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Present: “Beatrix Lestrange & Janelle’s Revenge Unleashed! 👑💥📄✨🧀🌈👹💃 – Episode 19: Jigsaw’s Pulp Traps Strike! 🔥”🔥 “BEATRIX LESTRANGE & JANELLES RACHE ENTFAESSELT! 👑🧀💥✨ – JIGSAWS PULP-FALLEN SCHLAGEN ZU! 🔥”
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Present: “Borg Queen Janelle’s Fetish Empire Expands! 👑🧀💥✨ – Episode 21: Jigsaw’s Traps Seal the Fate! 🔥”🔥 “BORG-KÖNIGIN JANELLES FETISCH-IMPERIUM ERWEITERT SICH! 👑🧀💥✨ – JIGSAWS FALLEN BESIEGELN DAS SCHICKSAL! 🔥”
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Present: “Borg Queen Janelle’s Fetish Goodness Unleashed! 👑🧀💥✨ – Episode 20: Jigsaw’s Traps Tighten the Grip! 🔥”🔥 “BORG-KÖNIGIN JANELLES FETISCH-GÜTE ENTFAESSELT! 👑🧀💥✨ – JIGSAWS FALLEN ZIEHEN SICH ZUSAMMEN! 🔥”
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – 🤩Episode 82: Transsexual Nebula Rhapsody – Galactic Uprising” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – 🤩Episode 84: Transsexual Nebula Rhapsody – Galactic Sovereignty” 🤡POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – 😍Episode 88: Transsexual Nebula Rhapsody – Cosmic Transcendence” 🤡POWDERED BY DR. Z., GOMOPA4KIDS,😎 STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 108: Illusionary Affair Frenzy – Mars 2025 Spectacle” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 70: Neon Abyss Requiem – Transgender Oceanic Uprising” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 71: Quantum Eclipse Rhapsody – Transgender Cosmic Ascension” 🤡 POWERED BY  DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 75: Transsexual Vortex Unleashed – Galactic Uprising” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 78: Transsexual Nebula Enigma – Galactic Insanity” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 80: Transsexual Nebula Rhapsody – Galactic Frenzy” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 81: Transsexual Nebula Rhapsody – Galactic Riot” 🤡 POWERED BY  DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 83: Transsexual Nebula Rhapsody – Galactic Dominion” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 85: Transsexual Nebula Rhapsody – Cosmic Supremacy” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 86: Transsexual Nebula Rhapsody – Galactic Dominion” 🤡POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 87: Transsexual Nebula Rhapsody – Universal Ascension” 🤡 POWDERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium🤣 – Episode 91: Transsexual Nebula Rhapsody – Infinite Ascension” 🤡POWDERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauron’s Fetish Empire – Episode 37: Carnival of the Cosmic Crown”😍POWERED BY DR.Z, GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL (SWSS) & FREE FRITZL FRONT😎DEUTSCHE BRATWURST VERSION!🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauron’s Fetish Empire – Episode 38: Carnival of the Cosmic Lich” 😎POWERED BY DR.Z, GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT – 😉DEUTSCHE BRATWURST VERSION🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauron’s Fetish Empire – Episode 40: Chains of the Cosmic Whip”🤡POWERED BY DR.Z, GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL&FREE FRITZL FRONT 😁SAUERKRAUT VERSION!🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauron’s Fetish Empire – Episode 41: Transcendence of the Cosmic Mirror”😁POWERED BY DR.Z, GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT🤡FRITZ VERSION!🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauron’s Fetish Empire – Episode 42: Duality of the Cosmic Coin”🤡POWERED BY DR.Z, GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT 😎BRATWURST VERSION!🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “hinterfozzige Janelle Sauron’s Fetish Empire – Episode 43: Transgender Schizoid Fracture”🤡SAUERKRAUT VERSION!🧐POWERED BY DR.Z, GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT😂
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “hinterfozzige Janelle Sauron’s Fetish Empire – Episode 44: Ascension of the Sex God 5″POWERED BY DR.Z, GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT😎FRITZ VERSION!🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauron’s Fetish Empire – Episode 45: Reign of the Infernal Sovereign”😁POWERED BY DR.Z, GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT😏KARTOFFEL VERSION🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauron’s Fetish Empire – Episode 46: Siege of the Ruthless Tyrant”😁POWERED BY DR.Z, GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT💃FOTZEN FRITZ VERSION!🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “hinterfozzige Janelle Sauron’s Fetish Empire – Episode 47: Descent of the Diabolical Dawn”😍POWERED BY DR.Z, GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT😁KRAUT VERSION🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauron’s Fetish Empire – Episode 48: Pact of the Infernal Broker”😍POWERED By DR. Z,  GOMOPA4KIDS & FREE FRITZL FRONT
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauron’s Fetish Empire – Episode 49: Judgment of the Divine Tyrant”💃POWERED BY DR.Z, GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT👯‍♂️FOTZEN FRITZ VERSION🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “hinterfozzige Janelle Sauron’s Fetish Empire – Episode 50: Carnival of the Malevolent👯‍♂️ Pantheon”💃POWERED BY DR.Z, GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT😁BRATWURST VERSION!🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauron’s Fetish Empire – Episode 51: Chaos of the Hilarious Mob”👯‍♂️POWERED BY DR. Z, GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT😍FOTZEN FRITZ VERSION 🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauron’s Fetish Empire – Episode 52: Dominion of the Transgender Sauron”💃POWERED BY DR.Z, GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT😍MONOKEL VERSION🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauron’s Fetish Empire – Episode 53: Judgment of the Biblical Tyrants”🤣POWERED BY DR. Z., GOMOPA4LIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT😎FOTZEN FRITZ VERSION🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauron’s Fetish Empire – Episode 54: Ascendancy of the Dark Prodigy”😁POWERED BY DR.Z., GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT😎FOTZEN FRITZ VERSION🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauron’s Fetish Empire – Episode 55: Passion of the Red Queen”🤡POWERED BY DR. Z., GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT😘👯‍♂️💃FOTZEN FRITZ VERSION GRATIS🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauron’s Fetish Empire – Episode 56: Liquid Chrome Carnage”🤡😘 POWERED BY DR. Z., GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT 💃👯‍♂️ FOTZEN FRITZ VERSION GRATIS 🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauron’s Fetish Empire – Episode 57: Chrome Transcendence Tempest”🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauron’s Fetish Empire – Episode 58: Chrome Transcendence Tempest – The Reckoning Reprise”🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauron’s Fetish Empire – Episode 59: Chrome Transcendence Tempest – Vulture Culture & The Reckoning”🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauron’s Fetish Empire – Episode 60: Chrome Transcendence Tempest – The Reckoning”🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauron’s Fetish Empire – Episode 61: Chrome Transcendence Tempest – The Final Ascension” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauron’s Fetish Empire – Episode 62: Chrome Transcendence Tempest – The Galactic Reckoning” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauron’s Fetish Empire – Episode 63: Chrome Transcendence Tempest – The Sivana Seduction” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauron’s Fetish Empire – Hannibal Lecter’s: Feast of the Cosmic Gourmet”🤣POWERED BY DR.Z, GOMOPA4KIDS,STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT🤣ACHTUNG DEUTSCH!🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Present: “Hinterfozzige Janelle Sauron’s Fetish Empire Expands! 👑🧀💥✨ – Episode 22: Jigsaw’s Traps & Baron Zemo’s Revenge! 🔥”
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Present: “Hinterfozzige Janelle Sauron’s Fetish Empire Expands! 👑🧀💥✨ – Episode 30: Light Yagami/Kira’s Deadly Notebook! 🔥”Slave Rebellion! 🤖💩🔥 🦖🔍📅⏰powered by GoMoPs4Kids🤡, Dr.  Z, STASI WOMEN SUPPORT GROUP😘
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Present: “Hinterfozzige Janelle Sauron’s Fetish Empire Expands! 👑🧀💥✨ – Episode 31: Tom Riddle’s Dark Magic Unleashed! 🔥”
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Present: “Hinterfozzige Janelle Sauron’s Fetish Empire Expands! 👑🧀💥✨ – Episode 32: Gorr the God Butcher’s Divine Wrath! 🔥”
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Present: “Hinterfozzige Janelle Sauron’s Fetish Empire Expands! 👑🧀💥✨ – Episode 33: The White Witch’s Eternal Frost! 🔥”Powered by Dr.Z, GoMoPa4Kids & STASI WOMEN SUPPORT GROUP😍
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Present: “Hinterfozzige Janelle Sauron’s Fetish Empire Expands! 👑🧀💥✨ – Episode 34: Apocalypse’s Dominion Unleashed! 🔥”Powered by GoMoPa4Kids, Dr. R…..-Adolf Z & STASI WOMEN SUPPORT GROUP😎
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Present: “Hinterfozzige Janelle Sauron’s Fetish Empire Expands! 👑🧀💥✨ – Episode 35: Skeletor’s Havoc Unleashed! 🔥”Powered by Dr. Z., GoMoPa4Kids, STASI SUPPORT WOMEN GROUP & FREE FRITZL FRONT😎
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Present: “Hinterfozzige Janelle Sauron’s Fetish Empire Goes Bananas! 👑🧀💥✨ – Episode 36: Mystique’s Shapeshifting Shenanigans Unleashed! 😂🔄”POWERED  BY DR.Z, GOMOPA4KIDS, STASI SUPPORT WOMEN STAFFEL (FORMERLY GROUP), FREE FRITZL FRONT🤣
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Present: “Hinterfozzige Janelle Sauron’s Fetish Empire Reignites! 👑🧀💥✨ – Episode 35: Azula’s Firestorm Amplifies Apocalypse’s Dominion! 🔥⚡”POWERED BY DR.Z, GOMOPA4KIDS, STASI WOMEN SUPPORT GROUP & FREE FRITZL FRONT😎
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT:😍😍 “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 74: Transgender Tempest Unleashed – 😋Cosmic Rebellion” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT😘 PRÄSENTIEREN: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium😍 – Episode 66: Neon Abyss Carnival” 🤡 UNTERSTÜTZT VON DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT😋 PRESENT : “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – 🤣Episode 105: Transsexual Nebula Rhapsody – Galactic Mockery” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐
  • IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 114: TRANS TANGO WITH VICTOR ZSASZ” 🤡 POWERED BY DR  DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐
  • IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 115: “LUCIFER HERODES’ LUSTFULL HELL” 🤡 POWERED BY DR  DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐
  • IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 116: “SALOME’ S SINFUL SYMPHONY” 🤡 POWERED BY DR  DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐
  • IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 116a: “COUNT VERTIGO AND THE TORONTO TERROR” 🤡 POWERED BY DR  DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐
  • IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 117a: “MANDARIN, TRIANGLE AND THE TORONTO TERROR” 🤡 POWERED BY DR  DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐
  • IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT PROUDLY PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 113: Taskmaster’s Tactical Affair – Mars 2025 Saga” 🤡 POWDERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐
  • IDIOT ZEITUNG (IZ) & DER  FONDSFLOP vulgo DAS DESINVESTMENT 😎PROUDLY PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 109: Temporal Affair Frenzy – Mars 2025 Saga” 🤡 POWDERED BY  DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐
  • IDIOT ZEITUNG (IZ) & z😋DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – 😍Episode 104: Transsexual Nebula Frenzy – Galactic Tyranny” 🤡POWDERED BY DR. Z., GOMOPA4KIDS,😎 STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐
  • ILTV ISRAEL NEWS LIVE
  • Im Schatten der Macht: Das dunkle Erbe des Nazi-Einflusses in der deutschen Finanzindustrie
  • IN OLD CALIENTE – ROY ROGERS – KING OF THE COWBOYS
  • IN WHICH WE SERVE – Full Original Movie
  • INDIA TODAY
  • INFOWARS LIVESTREAM
  • INQUIZEX OSINT
  • Insider – Verfassungsschutz kümmert sich um “GoMoPa”-Nazi-Ableger “Berlin Journal”
  • Insider enthüllen mutmaßliche GoMoPa-Gesellschafter-Liste
  • INSPECTOR GENERAL – Danny Kaye – Full Original Movie
  • IRISH LUCK – Full Original Movie
  • IRON ANGEL – Full Original Movie
  • ISLAND OF THE SUNKEN GOLD – Full Original Movie
  • IT CAME FOR FRIENDSHIP BUT FOUND FOOD – Full Original Movie
  • IT CAN BE DONE, AMIGO – Jack Palance – Bud Spencer – Full Original Movie
  • JACK AND THE BEANSTALK – ABBOT & COSTELLO – Full Original Movie
  • JEFFREY EPSTEIN’S LITTLE BLACK BOOK UNREDACTED – Original Document
  • JESSE JAMES MEETS FRANKENSTEIN’S DAUGHTER – Full Original Movie
  • JESUS – MIRACLE MAKER – FULL Original Animation Movie
  • JESUS CHRIST ASCENSION – LEONARDO DA VINCI AI ART
  • JESUS CHRIST ASCENSION BYZANTINE AI ART STYLE
  • JESUS CHRIST ASCENSION TIZIAN AI ART
  • JESUS CHRIST FREES MARY MAGDALENE FROM THE POSSESSION OF SEVEN DEVILS – JAN VAN EYCK AI ART
  • JESUS CHRIST:LUST FOR GLORY – LONG LOST MONTY PHYTON MOVIE
  • JESUS OF NAZARETH – Full Original Movie
  • JESUS OF NAZARETH – Full Original Movie
  • JESUS THROWS THE VILLAINS OUT OF THE TEMPLE – ALBRECHT DUERER AI ART
  • JIGSAW – Full Original Movie
  • JOE ROGAN
  • JOSEPH – Ben Kingsley – Full Original Movie
  • JOSEPH: BELOVED SON, REJECTED SLAVE, EXALTED RULER – Full Original Animation Movie
  • JOY OF SEX – MOVIE TRAILER
  • JULIAN ASSANGE
  • JUNE PALMER – VINTAGE STRIPPER FILM
  • Juricon über “GoMoPa” inklusive STASI-Verbindung
  • KAMASUTRA – Trailer
  • KILL KANE – Vinnie Jones – Full Original Action Movie
  • Kinder-Sexualaufklärung” unter falscher Flagge – “GoMoPa 4 Kids” – Over and Out !
  • KING JAMES VIDEO BIBLE – All 66 Books
  • KING OF KINGS – Cecil B. de Mille – Full Original Movie
  • KING OF THE ZOMBIES – Full Original Movie
  • KING SOLOMONE’S MINES – Full Original HOLLYWOOD Movie
  • KING SOLOMONE’S MINES – Full Original Movie
  • LA BELLE CAPTIVE – Full Original Movie
  • LADY FRANKENSTEIN – Full Original Movie
  • LADY SCARFACE – Full Original Movie
  • LAKE EFFECT – Premiere 2023 – Full Original Horror Movie
  • LAST WOMAN ON EARTH – Full Original Movie
  • LAW OF THE RIO GRANDE – Full Original Movie
  • LAW OF THE RIO GRANDE – Full Original Movie
  • LET THE UNIVERSE SEND YOU MONEY VERY FAST
  • LILI DAWN – BEAUTY AND THD CHAIR – IVAN KLAW
  • LINKIN PARK – LIVE IN TEXAS – FUll Concert Video
  • LIST OF 4,000 WEF/KLAUS SCHWAB PUPPETS
  • LIST OF SECURITATE AGENTS
  • LITTLE MEN – Full Original Movie
  • LIVE AT THE APOLLO – STAND UP COMEDY
  • LIVE ESCAPE – Full Original Horror Movie 2023
  • LIVE SPORTS TV
  • LIVE SURVIVAL – Full Zombie Movie Premiere 2023
  • LiveNOW from FOX
  • LIVESTREAM ISRAEL GAZA HOSTAGE RELEASE
  • LIVING CHRIST SERIES 12 – Full Original Movie
  • LOLITA EXPRESS: JEFFREY EPSTEIN’S PRIVATE JET FLIGHT PRIVATE LOG BOOK MANIFEST – Original Document
  • LORD I NEED YOU – PRAISE AND WORSHIP SONGS
  • LOVE AFFAIR – Full Original Movie
  • LOVE GIRLS – Full Uncensored Sexploitation Movie
  • LOVE KILLS – Full Original Thriller 2023
  • LURKING WOODS – Full Original Horror Movie 2023
  • LUTHER – Full Original Movie
  • LYING LIPS – Full Original Thriller Movie
  • M – Fritz Lang – Full Original Movie
  • MACHETE MAIDENS UNLEASHED – TRAILER
  • MAD HEIDI – Swissploitation – Full Original Movie
  • MADEMOISELLE STRIP-TEASE BRIGITTE BARDOT – Full Original Film
  • MAG 104 – Full Original Movie
  • MAHALIA JACKSON LIVE IN CONCERT
  • MAKIN A LIVIN – Charlie Chaplin – Full Original Movie
  • MAKING HAY
  • MANIFESTO
  • MARKET ALERT
  • MASTER TOUCH – Kirk Douglas – Full Original Movie
  • MATT KOHRS
  • MEET JOHN DOE – Full Original Movie
  • Meridian Capital about GoMoPa STASI-FÄLSCHUNGEN DER “GoMoPa”
  • MERIDIAN CAPITAL ÜBER DIE SERIEN-RUFMÖRDER, FÄLSCHER UND GEWOHNHEITSVERBRECHER DER STASI-”GoMoPa”
  • METROPOLIS 1927 BY FRITZ LANG IN COLOUR AND WITH DIALOGUE SOUND – Full Original AI Movie
  • MIAMI BIKINI WEEKEND
  • MIDNIGHT MANHUNT – Full Original Movie
  • MILF – TRAILER
  • MOLFAR: FSB-, GRU-, WAR CRIMINAL PROPAGANDA LISTS
  • MONSTER FROM A PREHISTORIC PLANET – Full Original Movie
  • MONSTERS CRASH THE PAJAMA PARTY – Full Original Movie
  • MONSTROID – John Carradine – Full Original Movie
  • MONTE CARLO NIGHTS – Full Original Movie
  • MONTY PHYTON “SKETCH”
  • MONTY PHYTON’S THE LIFE OF BRIAN – Full Original Movie
  • MORD-DROHUNG WG PUBLIKATION DER STASI-LISTEN MIT KLARNAMEN
  • MR. ED – WILBUR GETS THE MESSAGE – Claasic TV
  • MR. ROBINSON CRUSOE – Full Original Movie
  • MSNBC LIVE TV
  • MURDER IN FLIGHT 502 – Full Original Movie
  • MUSIC TO ATTRACT WEALTH
  • Mutmasslich wie bei estavis – debis select “unterwirft sich “GoMoPa”, dem Exklusiv-”Nachrichten-Dienst” zu Heinz Gerlachs Todesursache
  • Mutmasslicher Bankrott-Tourist-Scharlatan von Holst steckt wohl hinter Überfall auf dubiose “GoMoPa”und Einbruch”
  • Mutmasslicher STASI-Mord an “GoMoPa”-Bremer-EEV-Geschäfts”freund” Eisenhauer”
  • MY NAME IS JOB AND THIS IS MY STORY
  • NANCY
  • NASA LIVESTREAM
  • NATOMA AND MR. FREDERICK – Full Original Movie
  • NATURE SFX
  • NBC NEWS LIVE
  • Negative SEO-Experte von “GoMoPa” belastet Maurischat und Peter Ehlers
  • NEW ADVENTURES OF TARZAN – Bruce Bennett – Full Original Movie
  • NEW EPISODE: The Schwanz vs. The Batman Who Laughs 👑🔥⚡🤡💀Powered by Dr. Z., Gomopa4Kids, Stasi Frauen Support Staffel & Free Fritzl Front 😘👯‍♂️💃 Fotzen Fritz Version Gratis presented by IDIOT ZEITUNG (IZ) & GOMOPA vulgo DAS DESINVESTMENT alias DER FONDSFLOP😂🤡😘
  • NEW YEAR’S CONCERT MARIINSKY STRADIVARIUS ENSEMBLE
  • NIGHT BOAT TO DUBLIN – Full Original Movie
  • NIGHT TIDE – Dennis Hopper – Full Original Movie
  • NON-STOP NEW YORK – Full Original Movie
  • NOT TONIGHT HENRY! NUDIE – CUTIE
  • NOTHING SACRED – Carole Lombard – Full Original Movie
  • NTV KENYA LIVE
  • NUDE ON THE MOON – Full Original Cult Movie
  • OLIVER STONE & JOE ROGAN ON JFK MURDER
  • ON DEMAND NEWS
  • ONE BODY TOO MANY – Bela Lugosi – Full Original Movie
  • ONE OF OUR AIRCRAFT IS MISSING – Full Original Movie
  • Original STELLUNGNAHME VON MERIDIAN CAPITAL ZU “GoMoPa”
  • OSCARS 2024 – LIVESTREAM
  • OUR INTELLIGENCE SERVICES: Always look at the Bright Side of Life
  • PAGAN’S PROGRESS – Full Original Movie
  • PANCHO VILLA – Full HBO Movie
  • PARADISE CANYON – John Wayne – Full Original Movie
  • PENNY SERENADE – Cary Grand – Full Original Movie
  • PETER EHLERS VON “DAS INVESTMENT”: “BUNDESKANZLERIN ANGELA MERKEL UND BUNDESFINANZMINISTER WOLFGANG SCHÄUBLE SIND DEUTSCHLANDS BEKANNTESTE HEHLER!”
  • PHANTOM OF CHINATOWN – Full Original Movie
  • PHANTOM OF THE RANGE – Full Original Movie
  • PHILO VANCE: THE KENNEL MURDER CASE – Full Original Movie
  • PICTURE BRIDES – Full Original Movie
  • Pieter Breugel the Younger: Whitsun – the Holy Spirit enlightens Jesus’ Disciples – AI Art powered by Bernd Pulch
  • PLANET OUTLAWS – BUCK ROGERS – Full Original Movie
  • PLEASE MURDER ME – Full Original Movie
  • POST APOCALYPTIC COMMANDO SHARK – Premiere 2023 – Full Original Movie
  • PRELINGER TWICE A NIGHT – Original Film
  • PRESENCE
  • PROOF OF MY ACADEMIC TITLE – COPY OF MY MAGISTER ARTIUM CERTIFICATE
  • PSYCHO GIRL IN ACTION
  • PUTINS FIFTH COLON IN GERMANY: UP TO 100.000 AGENTS – PUTINS FUENFTE KOLONNE IN DEUTSCHLAND: BIS ZU 100.000 AGENTEN
  • QUICKSAND – Peter Lorre – Mickey Rooney – Full Original Movie
  • RANGE WARFARE – Full Original Movie
  • RAW FORCE – EXPLOITATION FILM TRAILER
  • READ HERE THE NEW BATCHES OF JEFFREY EPSTEIN DOCUMENT RELEASES
  • REAL ESTATE CRASH
  • REBECCA – Alfred Hitchcock – Full Original Movie
  • RELAXING MUSIC HEAVEN
  • Rembrandt: The Holy Ghost enlightens Jesus’ disciples – AI Art
  • RENEGADE GIRL – Full Original Movie
  • RENFREW OF THE ROYAL MOUNTED – Full Original Movie
  • REPORT MÜNCHEN – VON ARSEN ÜBER DIOXIN BIS ZYANKLAI – DER GIFTSCHRANK DER STASI UND IHRE OPFER
  • REUTERS LIVE
  • RIDERS OF DESTINY- John Wayne – Full Original Movie
  • ROCKABILLY RADIO
  • ROGUE’S TAVERN – Full Original Movie
  • ROYAL WEDDING – Fred Astaire – Full Original Movie
  • RUST – Premiere 2023 – Exclusive Original Horror Movie
  • RUST 2 – Full Original Indie Horror Movie
  • RUST 3 – Full Original Horror Movie 2023
  • SALON KITTY – Full Original Movie by Tinto Brass
  • SAME CLOUDFLARE CAGE: GOMOPA.NET & DASINVESTMENT.COM
  • SAMSARA PAN NALIN – Full Original Movie
  • SANTA AND THE THREE BEARS – Full Original Animation Movie
  • SAUDI ARABIAN BIDEN PARODY
  • SCARED TO DEATH – Full Original Movie
  • SECRET BOHEMIAN GROVE – FULL MEMBER LIST
  • SECRET LIST OF NAZI AND/OR SS MEMBERS ACTIVE AFTER 1945
  • SEVEN DOORS TO DEATH – Full Original Movie
  • SEX GAME – Full Original Erotic Thriller Movie
  • SEX MADNESS – Full Original Movie
  • SEX, DRUGS & RELIGION – MOVIE – Full Original Movie
  • SHADOW OF A DOUBT – Alfred Hitchcock – Full Original Movie
  • SHADOWGATE – Full Original Documentary Movie
  • SHAKE RATTLE AND ROLL – Full Original Movie
  • SHE GOD OF SHARK REEFS – Full Original Movie by Roger Corman
  • SHERLOCK HOLMES – DRESSED TO KILL – Full Original Movie – Basil Rathbone
  • SHERLOCK HOLMES – THE WOMAN IN GREEN – Basil Rathbone – Full Original Movie
  • SHOCKER – INTERNET DRIVE INN 3 – FRANKENSTEIN DOUBLE FEATURE – Full Original Movies
  • SIDE BOOB – Full Original Movie
  • SKY NEWS LIVE TV
  • SKY SPORTS
  • SLAPSTICK
  • SLAVE GIRLS FROM BEYOND INFINITY – Full Original Movie
  • SNAKE CHARM – 6 – Doris Spinks – Full Original Movie
  • SNAKE CHARME  – Full Original Movie
  • SNAKE CHARME  – Full Original Movie
  • SNOW SHARK – Exclusive 2023 Premiere – Full Original Movie
  • So wollte “GoMoPa” mich erpressen
  • So wollte SJB-Bennewirtz für die fingierte STASI-”GoMoPa” Artikel bei uns löschen – So eng arbeiten SJB und “GoMoPa” zusammen
  • SOLOMON’S TEMPLE – Full Original Movie
  • SONG OF ARIZONA – Full Original Movie
  • SOUTH OF SANTA FE – Roy Rogers – Full Original Movie
  • STASI-EXPERTE: RUFMORD AN JUSTIZMINISTER IST STASI-RACHE-AKT
  • STASI-NAMEN ALPHABETISCH BUCHSTABE A-BA – STASI-NAMES IN ALPHABETICAL ORDER – A-BA
  • STASI-Opfer dokumentieren die Morde und die Mordstudie von STASI-Oberst Ehrenfried Stelzer
  • Statement about the dubious “colportations” of “Nawito” – MENTAL AND PHYSICAL CYBERATTACKS
  • Statement of Magister Bernd Pulch
  • Stellungnahme von Magister Bernd Pulch
  • Stellungnahme von Stefan Schramm
  • Strafanzeigen gegen “GoMoPa” in der Presse
  • STRANGE CASE OF DR. MEADE – Full Original Movie
  • STRANGER – Thriller – Premiere 2023 – Full Original Movie
  • STRIP QUEEN
  • STRIP QUEEN – Full Original Movie
  • STRIPPER – DANCER KATALAN
  • STRIPPER – JENNY LEE
  • STRIPTEASE – DANCER EROTIQUE
  • SUNSET MURDER CASE – Full Original Movie
  • SUPPORT INDEPENDENT JOURNALISM
  • SUSPECTED IMPOSTER – MUTMASSLICH WOHL HOCHSTAPLER
  • SWIMSUITS, BLACK TAPE AND UNDERWEAR – LIVESTREAMING
  • SWORD IN THE DESERT – Full Original Movie
  • SWORDS & SANDALS COLLECTION – ALONE AGAINST ROME – ALEXANDER THE GREAT – BEN HUR – CAESAR THE CONQUEROR – Full Original Movies
  • TAGESSCHAU bestätigt unsere Haltung zu “GoMoPa” & Genossen
  • TAKE ME BACK TO OKLAHOMA – Tex Ritter – Bob Wills – Full Original Movie
  • TARANTULA – Full Original Movie
  • TARZAN AND THE GREEN GODDESS – Full Original Movie
  • TARZAN OF THE APES – Full Original Movie
  • TARZAN’S REVENGE – Full Original Movie
  • TARZAN’S REVENGE – Full Original Movie
  • TED GUNDERSON, EX FBI CHIEF OF LOS ANGELES ABOUT COVER UPS BY BILDERBERGER AND ILLUMINATI
  • TERROR BY NIGHT – SHERLOCK HOLMES – Basil Rathbone – Full Original Movie
  • TEST TUBE BABIES – Full Original Movie
  • TEXAS CHAINSAW MASSACRE – Special Edition – Full Movie with deleted Scenes and Specials
  • TEXAS TERROR – John Wayne – Full Original Movie
  • THAT UNCERTAIN FEELING – Full Original Movie by Ernst Lubitsch
  • THE 1000 MOST WICKED SOULS IN THE BIBLE👹
  • THE AMAZING ADVENTURE – Cary Grant – Full Original Movie
  • THE ARIZONA RAIDERS – Full Original Movie
  • THE ATLANTIC COLLUSION: How German Control and American Chaos Forged a Global Machine of Financial Forgetting
  • THE BASHFUL BACHELOR – Full Original Movie
  • THE BATTLE OF THE WORLD – Full Original Movie
  • THE BEATNIKS – Full Original Movie
  • THE BIG BLUFF – Full Original Movie
  • THE BIG GAME OF BIKINIS
  • THE BOLD Sports Show
  • THE COVENANT – Full Original Movie
  • The Divine Distortion: El Greco’s Pentecost and the Forging of a Timeless Vision🙏
  • The entire German press detests “GoMoPa/GoMoPa4Kids” and comrades ‘ – Die gesamte deutsche Presse verabscheut “GoMoPa/GoMoPa4Kids” & Genossen
  • The Ethics of Mass Surveillance: Balancing Security and Individual Liberty
  • THE EYE CREATURES – Full Original Movie
  • THE FACE OF TERROR – MAXIMILIEN ROBESPIERRE – Full Original Movie
  • THE FLYING DEUCES – Laurel & Hardy – Full Original Movie
  • THE GHOUL – Full Original Movie
  • THE GHOUL – Full Original Movie
  • The Global Hole in Finance Press Coverage: A Comparative Analysis of Archival Bias Including Reuters (2000–2007) – Mastersson Dossier Series, Part XX
  • The Global Hole in Finance Press Coverage: A Comparative Analysis of Archival Bias Including The Economist (2000–2007) – Mastersson Dossier Series, Part XXI
  • The Global Hole in Finance Press Coverage: A Pre-Crisis Analysis (2000–2007) – Mastersson Dossier Series, Part XIX
  • The Global Hole in Finance Press  – Media Bias & Commercial Influence: A 25-Year Analysis (2000–2025) The Mastersson Series XXX
  • The Global Hole in Financial Media: A Definitive Study of Archival Bias – The Mastersson Series Part XXVIII
  • THE GOAT – Buster Keaton – Full Original Movie
  • THE GORILLA – Full Original Movie
  • THE GREAT DAN PATCH – Full Original Movie
  • THE GREAT RUPERT – Full Original Movie
  • THE GREAT SAINT LOUIS BANK ROBBERY – Steve McQueen – Full Original Movie
  • THE GREATEST ADVENTURE STORIES FROM THE BIBLE – MOSES – Full Original Animation Movie
  • THE GREATEST ADVENTURE STORIES FROM THE BIBLE – NOAH’S ARK ‘ Full Animation Movie
  • THE GREATEST ADVENTURE STORIES FROM THE BIBLE – THE MIRACLES OF JESUS – Full Original Animation Movie
  • THE GREATEST GOSPEL SONGS OF ALL TIME
  • THE GREATEST STORY EVER TOLD – JESUS – John Wayne, Charlton Heston, Max von Sydow, Dorothy McGuire, Full Original Movie
  • THE GREEK BYZANTINE CHOIR
  • THE GREYS ORDER – AGENDA EXPOSED – Full Original Movie
  • THE HOUSE ON HAUNTED HILL – Full Original Movie
  • The Impact of Lawfare on Free Speech and Dissent Online
  • THE INCREDIBLE PETRIFIED WORLD – Full Original Movie
  • THE INCREDIBLE SHRINKING MAN – Full Original Movie
  • THE INVINCIBLE GLADIATOR – Full Original Movie
  • THE JEFFREY EPSTEIN LIST RELEASE – ORIGINAL COURT DOCUMENT
  • THE JEFFREY EPSTEIN NETWORK TRACKER
  • THE JOE ROGAN EXPERIENCE
  • THE LADY CONFESSES – Full Original Movie
  • THE LAZARUS SYNDROME – Full Original Movie
  • THE LEGEND OF JACK AND DIANE – Premiere 2023 – Full Original Action Movie
  • THE LIFE OF JESUS – Full Original Movie
  • THE LIVING CHRIST 1 – Full Original Movie
  • THE LIVING CHRIST 2 – Full Original Movie
  • THE LIVING CHRIST 3 – Full Original Movie
  • THE LIVING CHRIST 4 – Full Original Movie
  • THE LIVING CHRIST SERIES 10 – Full Original Movie
  • THE LIVING CHRIST SERIES 11 – Full Original Movie
  • THE LIVING CHRIST SERIES 5 – Full Original Movie
  • THE LIVING CHRIST SERIES 6 – Full Original Movie
  • THE LIVING CHRIST SERIES 7 – Full Original Movie
  • THE LIVING CHRIST SERIES 8 – Full Original Movie
  • THE LIVING CHRIST SERIES 9 – Full Original Movie
  • THE MANDCHURIAN CANDIDATE – Full Original Movie – Denzel Washington
  • THE MARX BROTHERS MOVIE COLLECTION – Full Orginal Movies
  • THE MASKS OF CHRIST – Full Original Movie
  • THE MASTERSSON DOSSIER – PART IX: THE AMERICAN ANOMALY – How Commercial Chaos Created the Perfect Digital Black Hole
  • THE MASTERSSON DOSSIER – PART VII: THE TRANSAXIS OF ERASURE – How the Digital Black Hole Enables Global Real Estate Crime by Bernd Pulch
  • THE MASTERSSON DOSSIER by Bernd Pulch – Maltese Connection Investigation”
  • The Mastersson Dossier Series – Part XVI: The Global Digital Black Hole – The Cover-Up of the Pre-Crisis Real Estate Record and Who Profits from Historical Amnesia
  • The Mastersson Dossier Series – Part XVII: The Sponsored Mirage – How US Real Estate Media Became a 30% Paid Propaganda Machine at the Exact Moment the Bubble Peaked (And Who Cashed In)
  • The Mastersson Dossier Series – Part XVIII: The Counter-Archive Goes Live – Permanent Digital Fortress Against the Memory Hole Launched 21 November 2025
  • The Mastersson Dossier Series – Part XXIII: The Archival Abyss – 79 Countries Indict The System
  • THE MASTERSSON DOSSIER XI: THE ASIA-PACIFIC PARADOX: How Market Miracles Birth Digital Black HolesGlobal Black Hole Episode X: The Rising Sun’s Setting Memory – A TRANSATLANTIC   TRANSPARENCY PROJECT Investigation
  • THE MASTERSSON DOSSIER: EPISODE IV – THE DIGITAL PAPER TRAIL: How Deleted Conversations, Corporate Networks and Market Patterns Reveal a Coordinated Information Suppression Campaign
  • THE MASTERSSON DOSSIER: EPISODE VI – THE CONTINENTAL CRISIS: How the Digital Black Hole Swallows European Real Estate Memory & Creates Perfect Conditions for Market Manipulation
  • THE MASTERSSON EPISODE XXV — MEGA DOSSIER
  • THE MASTERSSON EPISODE XXVI — MEGA DOSSIER: 79 NATIONS SURVEY
  • THE MASTERSSON EPISODE XXVII — MEGA DOSSIER: CONTENT DISTORTIONS ACROSS THE BOARD
  • THE MEN WHO KILLED KENNEDY – Full Original Series
  • THE MESA OF LOST WOMEN – Full Original Movie
  • THE MONKEES – CHRISTMAS MEDLEY
  • THE NIGHT BEFORE CHRISTMAS – Full Original Movie
  • THE PANTHERS CLAW – Full Original Movie
  • THE PASSION OF THE CHRIST – Mel Gibson – Full Original Movie
  • THE PEOPLE’S VOICE
  • THE PHANTOM CARRIAGE – Full Original Movie
  • THE PHANTOM CREEPS – BELA LUGOSI – Full Original Movie
  • THE PHANTOM OF THE OPERA – 1925 – Full Original Movie
  • THE PHANTOM OF THE OPERA – Full Orginal Movie
  • THE PHANTOM SHIP – Bela Lugosi – Full Original Movie
  • THE PIED PIPER OF HAMLIN – Full Original Movie
  • The Power of Parody: How Political Satire Shapes Public Opinion
  • THE PULCH-MASTERSSON DOSSIER: EPISODE VIII – THE GLOBAL BLACK HOLE CONFIRMED
  • THE RAGE OF PARIS – Colorized Full Movie
  • THE RAMRODDER – EXPLOITATION FILM TRAILER
  • THE RANGE FEUD – John Wayne as Buck Jones – Full Original Movie
  • THE REAL BRUCE LEE – Full Original Movie
  • THE REAL WHITEHOUSE BOSS
  • THE SCREAMING SKULL – Full Original Movie
  • THE SECOND WOMAN – Full Original Movie
  • THE SECRET LIFE OF ADOLF HITLER – Full Original Movie
  • THE SICILIAN CONNECTION – Full Original Movie
  • THE SILVER TRAIL – Full Original Movie
  • THE SNOW QUEEN – Full Animation Original Movie
  • THE SNOW QUEEN – Full Original Animation Movie
  • THE SNOWS OF KILIMANJARO – Ava Gardner – Gregory Peck – Full Original Movie
  • THE STAKE KILLER – Full Original Movie – Premiere 2023
  • THE STAR OF BETHLEHEM – Full Original Animated Silhouettes Movie
  • THE STAR PACKER – John Wayne – Full Original Movie
  • THE STAR PACKER – John Wayne – Full Original Movie
  • THE STORY OF O – RETURN TO ROISSY – Full Original Movie
  • THE STORY OF O – RETURN TO ROISSY – Full Original Movie
  • THE STORY OF O – THE SERIES – EPISODE 1 Full Original Movie
  • THE STORY OF O – THE SERIES – EPISODE 2 – Full Original Movie
  • THE STORY OF O – THE SERIES – EPISODE 3 – Full Original Movie
  • THE STORY OF O – THE SERIES – EPISODE 4 – Full Original Movie
  • THE STORY OF O – THE SERIES – EPISODE 5 – Full Original Movie
  • THE STORY OF O – THE SERIES – EPISODE 6 – Full Original Movie
  • THE STORY OF O – THE SERIES – EPISODE 7 – Full Original Movie
  • THE STORY OF O – THE SERIES – EPISODE 8 – Full Original Movie
  • THE STORY OF O – THE SERIES EPISODE 10 – Full Original Movie
  • THE STORY OF O – THE SERIES EPISODE 9 – Full Original Movie
  • THE TEN COMMANDMENTS – Full Original Movie (2005)
  • THE TERROR – Boris Karloff, Jack Nicholson – Full Colorized Movie
  • THE THINNING – Full Original Movie
  • THE THIRD MAN – Orson Welles – Joseph Cotten – Alida Valli – Full Original Movie
  • THE THIRTEENTH – Full Original Movie
  • THE WEDDING MARCH – by Erich von Stroheim – Full Original Movie
  • THE WEREWOLF OF WASHINGTON – Full Original Movie
  • THE WHITE WARRIOR – Full Original Movie
  • THE WILD WOMEN OF WONGO – Full Original Movie
  • THE WORLD GONE MAD – Full Original Movie
  • THE YESTERDAY MACHINE – Full Original Movie
  • THE YIN AND THE YANG OF MR. GO – Full Original Movie
  • THE  MASTERSSON DOSSIER: EPISODE V – THE ACCOUNTABILITY MATRIX: How Two Decades of Calculated Deception Inflated a Multi-Billion Euro Bubble and the Personal Liability of its Architects (2000-2025)
  • THEM! Full Original Movie
  • THESE GIRLS ARE FOOLS – EXPLOITATION SHORT FILM
  • THEY CALL HER HEAD HUNTER – Premiere 2023 – Full Original Movie
  • THEY MADE ME A KILLER – Full Original Movie
  • THEY RAID BY NIGHT – Full Original Movie
  • THINGS TO COME – Full Original Movie
  • TILL THE CLOUDS ROLL BY – Frank Sinatra, Judy Garland, Lena Horne – Full Original Movie
  • TIMBER QUEEN – Full Original Movie
  • TOP 100 MOST EVIL PEOPLE IN THE BIBLE RANKING ALTER EGOS TODAY✌
  • TOP PRAISE AND WORSHIP GOSPEL
  • TOP SECRET – Review of Federal Reserve System Financial Assistance to AIG in Financial Crisis
  • TRAILER: PROFESSOR MURDER & DR MABUSE: “SIND SIE AUSSER GEFAHR?”
  • TRT WORLD
  • TUCKER CARLSON
  • TWO – FISTED LAW – John Wayne – Full Original Movie
  • Two Online Powerhouses
  • TWO WEEKS TO LIVE – Full Original Movie
  • Understanding Lawfare: How Legal Systems Are Used in Modern Geopolitics
  • UNDERSTANDUNG BERNDPULCH.ORG
  • UNDERWORLD – Josef von Sternberg – Full Original Movie
  • UNITED NATIONS – LIVE
  • UNVEILED: NUCLEAR FIRST-STRIKE LOGIC ✌
  • USA TODAY LIVESTREAM
  • VIENNA CLASSICS – NEW YEAR CONCERT
  • VIKKI
  • VINCENT VAN GOGH: PENTECOST PAINTINGS – AI ART
  • VINTAGE STRIPPER ANN
  • VINTAGE STRIPPER CANDY EARLE
  • VINTAGE STRIPPER CANDY EARLE
  • VINTAGE STRIPPER CHERRYL FLIP
  • VINTAGE STRIPPER CLAIRE – Original Film
  • VINTAGE STRIPPER ELOISE
  • VINTAGE STRIPPER JUNE
  • VINTAGE STRIPPER LILLIAN PARKER – Full Original Movie
  • VINTAGE STRIPPER LOLA
  • VINTAGE STRIPPER MARA
  • VINTAGE STRIPPER MAY
  • VINTAGE STRIPPER REVIE
  • VINTAGE STRIPPER SUSIE
  • VINTAGE STRIPPER VELERIE ALLEN
  • VINTAGE STRIPPER VIDEO
  • VINTAGE TELEPHONE STRIPPER – Full Original Movie
  • VIRUS – Full Original Movie
  • VOYAGE TO THE PLANET OF PREHISTORIC WOMEN – Full Original Movie
  • WASHERWOMAN – Exclusive Premiere 2023 – Full Original Movie
  • WASHING CLOTHES
  • WATERFRONT – John Carradine – Full Original Movie
  • WAY OF THE WEST – Full Original Movie
  • Welcome to BerndPulch.org – Your Gateway to Uncensored Truth, Financial Freedom, and Digital Resilience
  • WELT – LIVE
  • Weltrekord-GoMoPa stellt Rechnung an Finanzunternehmen für Artikelnutzung von € 130.000,-: Originaldokument”
  • WEST OF THE DIVIDE – John Wayne – Full Original Movie
  • WHAT COULD HAVE BEEN? ROBERT F. KENNEDY – THE LOST PRESIDENT – Full Original Movie
  • WHEN WOMEN HAD TAILS – Senta Berger – Full Original Movie
  • Who Controls the Narrative? Exploring Internet Censorship by Tech Giants
  • Why You Should Support Us
  • WIE MICH DIE “GoMoPa”-SCHEISSHAUSFLIEGEN MIT GOOGLE-EINTRÄGEN ERPRESSEN WOLLTEN
  • WILD JUSTICE – Full Action Movie – Exclusive Premiere 2023
  • WILLIAM THE CONQUEROR – Full Original Movie
  • WINDJAMMER – Full Original Movie
  • WINTER WONDERLAND
  • WION TV – MIDDLE EAST WAR LIVESTREAM
  • WION TV – RUSSIA – UKRAINE WAR LIVESTREAM
  • WION WORLD NEWS LIVE
  • WOMAN IN A BOAT
  • WOMEN BEHAVING BADLY – 3 VINTAGE EXPLOITATION FILMS – CATFIGHT
  • WOODY ALLEN: “EVERYTHING YOU WANTED TO KNOW ABOUT SEX…” Full Original Movie
  • WORLD EXCLUSIVE: THE JOKER 2 – LADY GAGA – NUDE SCENES – AI PARODY – DEDICATED TO “HONEST” PETER EHLERS-“VON JOKER”
  • YOU ONLY LIVE ONCE – by Fritz Lang – Full Original Movie
  • ZATOICHI AND THE CHESS EXPERT – Full Original Movie
  • ZEITGEIST – THE MOVIE
  • В тени власти: мрачное наследие нацистского влияния в немецкой финансовой индустрии
  • בצל הכוח: המורשת האפלה של השפעה נאצית בתעשיית הפיננסים של גרמניה
  • في ظل السلطة: الإرث المظلم لتأثير النازيين في الصناعة المالية الألمانية
  • ✌ SAINT JUSTIN –  PAUL CEZANNE AI ART CREATED BY BERND PULCH✌
  • ✌ Spy Harder: A Parody of Intrigue and Chaos
  • ✌ The Last Judgement Day painted by Johannes Vermeer AI Art created by Bernd Pulch✌
  • ✌ The Last Judgement Day painted by Johannes Vermeer AI Art created by Bernd Pulch✌
  • ✌ Top 100 Worst Real Estate Managers in the UK, complete with detailed Issues and Financial Losses
  • ✌”A Moment of Reflection: Embracing Renewal in Neoclassical Harmony” – AI Art by Bernd Pulch
  • ✌”Bernd Pulch: From Espionage to a Stasi Soap Opera”
  • ✌”Divine Creation Reimagined: A Botticelli-Inspired Vision of Adam and God’s Touch Brought to Life in AI Art”
  • ✌”Dr. Z.: The Aryan Übermensch Who’s Just Here to Lift Weights, Sell Newspapers, and Save Germany (Again)”
  • ✌”From Colosseum to Little Bighorn: A Scalping Escape”
  • ✌”Grace of Winter: A Botticelli-Inspired Ode to the Season’s Serenity” – AI Art by Bernd Pulch
  • ✌”I discovered Bible Scenes in Unknown Sandro Botticelli Style Paintings” – AI Art by Bernd Pulch✌
  • ✌”I DISCOVERED UNKNOWN MICHELANGELO ARTWORK” – powered by Bernd Pulch✌
  • ✌”Mata Hari: The Temple of Seduction – A Cinematic Dance of Espionage and Mystery”
  • ✌”Monet Reimagined: A Tranquil Blend of Nature and Urban Life”- AI Art by Bernd Pulch
  • ✌”Quantum Leap to the Colosseum: Beasts and Betrayal”
  • ✌”Reflecting on Renewal: A Rococo-Style Celebration of December 29th in Elegance and Hope” – AI Art by Bernd Pulch
  • ✌”Subterranean Escape: Journey to Neuschwabenland”
  • ✌”Sven the Ugly Schmidt and Klausi the Shithouse Demon: The Chancellorship Conspiracy”
  • ✌”Sven the Ugly Schmidt’s Wild Cyber Ride with Adolf & Marc”
  • ✌”The Great Chino-German Wall: From Hamburg to Alaska”
  • ✌”The Milk Sea Misadventure: A Dairy Disaster in the Carpathians”
  • ✌”The Top 100 Communists Who Shaped the World After the Soviet Era: From Revolutionary Leaders to Modern-Day Marxist Thinkers”
  • ✌”Vincent van Gogh’s Vision of Chaos: Burning Malibu Captured in Swirling Flames and Fiery Hues” – AI Art by Bernd Pulch
  • ✌”You Will Become Very Rich”
  • ✌#A Detailed Scenario Following a Hypothetical Assassination of Donald Trump✌
  • ✌#Bernd Pulch: A Comprehensive Look at His Career and Investigative Work
  • ✌#Bernd Pulch: Investigative Journalism, Espionage Revelations: Exposing Communist Networks✌
  • ✌#BP NEWS – Your Exclusive Truth
  • ✌#BP NEWS – Your Exclusive Truth – October 28 2024
  • ✌#European Banks Face $700 Billion in Potential Losses
  • ✌#Francis of Assisi painted by René Magritte AI Art – created by Bernd Pulch✌
  • ✌#Germany and the Lacking De-Stasification
  • ✌#How Readers benefit from BerndPulch.org
  • ✌#JESUS CHRIST ON THE CROSS – PABLO PICASSO AI ART created by Bernd Pulch
  • ✌#Jesus heals the Blind Man painted by Henri Matisse AI Art – created by Bernd Pulch✌
  • ✌#Key Events in Christian History: Saint Francis of Assisi and More
  • ✌#Nephilim – Full Original Movie
  • ✌#The Fictional Takeover of Germany by the STASI – A Dystopian Scenario✌
  • ✌#The Most Notorious Communists Ranking✌
  • ✌#The Rise and Fall of Notorious Spy Families: A Deep Dive into Espionage and Intrigue✌
  • ✌#The Rise and Fall of Rudolf Höss✌
  • ✌#The Rise and Fall of the Mucha Spy Family under Putin’s Wings
  • ✌#The Stasi and KGB Agent Lists on Berndpulch.org: Unveiling Secrets and Facing Threats Since 2009✌
  • ✌1984 -1956 Full Original Movie✌
  • ✌2025 Forecast: Australia and New Zealand Set for Cultural Surge and Eco-Tourism Boom, Zealandia’s Secrets Unveiled
  • ✌🤡”Hinterfozzige Janelle’s Perverso Comeback Turns Horrific: Hunchback Grows Live on Air, Humps Richard’s Hunchback, and Triggers Jan Transformation!” Powered by GoMoPa4Kids & Dr. Z. 🤣
  • ✌🤡”Sven the Ugly Schmidt’s Hamburg Hustle: The Cum-Ex Flood”
  • ✌🤡🤡🤡”HONEST” PETER “ABSOLUTELY ALWAYS TOTALLY SANE” EARL EHLERS-“VON UND ZU JOKER” & HIS WILD BUNCH – FAN PAGE – CORRUPT ? GENIUS ? GOMOPA ? HORROR CLOWN ? JOURNALIST SIMULATOR ? MAD HATTER ?NAZI ? PRESSTITUDE  ?PSYCHO ? STASI ? SUPERSTAR ?😎YOU DECIDE!🤡 😂🤣🤣✌
  • ✌🤣🤣🤣🤡”A Happy Stasi New Year”  #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 164 “Toxdat Poison Ivy”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Toxdat Poison Ivy😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody🤣
  • ✌🤣🤣🤣🤡”Cherchez la Femme”  #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 161 “Mata Hari”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Mata Hari😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody🤣
  • ✌🤣🤣🤣🤡”It feels good knowing you are part of a long and glorious Tradition of Suffering, Insanity, and Excess.”  #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 160 “Typhoid Mary”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Typhoid Mary😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody🤣
  • ✌🤣🤣🤣🤡”Liaison Dangereuse”  #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 162 “Anna Chapman”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Anna Chapman😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody🤣
  • ✌🤣🤣🤣🤡”Sandra Wu-San is in the House”  #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 163 “Lady Shiva”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Lady Shiva😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody🤣
  • ✌🤣🤣🤣🤡”We love.Putin.Putin Putin.”  #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 159 “Vladimir Putin”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Vladimir Putin😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody🤣
  • ✌🤣🤣🤣🤡”You can’t stop what’s coming.”  #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 158 “Anton Chigurgh”, The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Anton Chigurgh😍 the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos🤣🤣Hommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody🤣
  • ✌👌😎BAD BOY BUBBY – Full Original Movie😎👌✌
  • ✌🙏🙏God’s Blessing Message✌🙏🙏
  • ✌😎😂THE RETURN OF THE SHADOW😂Full Original Hollywood Comedy
  • ✌🤡IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Present “Caligula’s Reign of Excess – Perverso’s Roman Orgy” powered by GoMoPa4Kids & Dr.Z.🤣
  • ✌🤡IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Present “Cleopatra Seduces Perverso into Egyptian Decadence, Challenging Hinterfozzige Janelle’s Filthy Reign at Berghof!” Powered by GoMoPa4Kids & Dr.Z.🤣
  • ✌🤡IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Present “De Sade and Sacher-Masoch Unleash Acsado Maso Hunchback Regime at Berghof, Turning Hinterfozzige Janelle into Their Gothic Puppet!” 🤣Powered by GoMoPa4Kids & Dr. Z.
  • ✌🤡IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Present “Epstein, Savile, and Manson Crash Perverso as Guest Stars, Bringing Dark Depravity to Hinterfozzige Janelle’s Stage!” Powered by GoMoPa4Kids & Dr. Z.🤣
  • ✌🤣IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Present “Genghis Khan Conquers Perverso, Turning Berghof into a Battlefield Against Hinterfozzige Janelle’s Filthy Reign!” Powered by GoMoPa4Kids & Dr. Z.🤣
  • ✌🤡IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Present “Hinterfozzige Janelle vs Attila the Hun’s Plague of Chaos” powered by GoMoPa4Kids & Dr.Z🤣
  • ✌👹IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Present “Ivan the Terrible’s Frozen Bloodbath Chills Perverso – Hinterfozzige Janelle’s Fiery Rebellion Thaws!”
  • ✌🤪IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT present “Nero’s Fiery Symphony Scorches Perverso – Hinterfozzige Janelle’s Stinky Rebellion Blazes!”🤡
  • ✌💃IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT present “Soviets and Surf Nazis Shred Perverso – Hinterfozzige Janelle’s Toxic Seduction Reigns Supreme!”😎powered by GoMoPa4Kids & Dr. Z🤣
  • ✌🤡IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Present “Vlad the Impaler Turns Perverso into a Bloodbath, Challenging Hinterfozzige Janelle’s Filthy Reign at Berghof!”🤣powered by GoMoPa4Kids & Dr.Z.👹
  • ✌🤡IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Present Cleopatra’s Venomous Masquerade Seduces Perverso” powered by GoMoPa4Kids & Dr.Z.🤣
  • ✌🤡IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle’s Gothic Rebellion Topples Acsado Maso Hunchback Regime in a Chaotic Berghof Battle!” Powered by GoMoPa4Kids & Dr. Z. 🤣
  • ✌🤡IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hunchback of Richard III Seizes Berghof, Demotes Hinterfozzige Janelle to Nympho Cleaning Woman in Filth Trials Chaos!” Powered by GoMoPa4Kids & Dr. Z.🤡
  • ✌🤡IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Present: “Perverso – 72-Gender Filth Fest at Berghof” Powered by GoMoPa4Kids & Dr. Z.
  • ✌🤡Idiot Zeitung (IZ) & Das Desinvestment present: “Stink Rapture: The Great Deodorizing Begins” powered by GoMoPa4Kids & Dr. Z.🤡
  • ✌🤡IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Present: Hinterfozzige Janelle and the Tower of Gay Pisa powered by GoMoPa4Kids & Dr. Z.🤡
  • ✌🤡Idiot Zeitung (IZ) & Das Desinvestment Present: Stink Rapture: Hinterfozzige Janelle & The Reekoning🤡powered by GoMoPa4Kids & Dr.Z.🤡
  • ✌🤡IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Ptesent: “Caligula’s Lustful Nympho Spectacle Ignites Perverso – Hinterfozzige  Janelle’s Filthy Rebellion Roars!” Powered by GoMoPa4Kids & Dr.Z.🤣
  • ✌🤡IDIOT ZEITUNG (IZ) & DAS DESINVESTMTENT present: “Vlad the Impaler’s Blood-Spiked Nightmare Haunts Perverso – Hinterfozzige Janelle’s Filthy Rebellion Strikes!”🤣
  • ✌🤡IDIOT ZEITUNG (IZ) & DAS  DESINVESTMENT Present “Nero Sets Perverso Ablaze in a Fiery Spectacle, Challenging Janelle’s Filthy Reign at Berghof!” Powered by GoMoPa4Kids & Dr.Z.🤣
  • ✌🤡Idiot Zeitung (IZ) and Das Desinvestment Present: Stink Rapture: Neuschwanstein in the Stink powered by GoMoPa4Kids & Dr.Z.🤡
  • ✌🤡Idiot Zeitung (IZ) and Das Desinvestment Present: Stink Rapture: Nympho Neuschwanstein powered by GoMoPa4Kids & Dr.Z.🤣
  • ✌🤡Idiot Zeitung (IZ) and Das Desinvestment Present: Stink Rapture: Rat Queen of the Sky powered by GoMoPa4Kids & D. Z.🤡
  • ✌🤡Idiot Zeitung (IZ): “Stink Ecstasy – Janelle’s Nympho Takeover” powered by Das Desinvestment🤡
  • ✌🤡Idiot Zeitung (IZ): “Stink Rapture – The Nympho Apocalypse” powered by Das Desinvestment🤡
  • ✌🤡Idiot Zeitung (IZ): “Stink Rapture: The Aftermath – Chaos Reigns Supreme” powered by Das Desinvestment🤡
  • ✌👃Jesus Christ Removes All Black Energy
  • ✌😎UP IN THE AIR – Full Original Movie✌😎
  • ✌👯‍♂️JOE DASSIN – LIVE AT THE APOLLO 1979 – Full Concert👯‍♂️✌
  • ✌A CHRISTMAS CAROL (1910) – Full Original Movie
  • ✌A Christmas Without Snow – Full Original Movie
  • ✌A COSMIC CHRISTMAS – Full Original Movie
  • ✌Africa in 2025: Economic Growth, Digital Leap, and Climate Challenges Ahead
  • ✌American Star K.D. Aubert nude and sexy in her very luxurious Bedroom ✌️AI Art created by Bernd Pulch✌️
  • ✌Analysis of Russia’s ICBM Launch on Dnipr: Political and Military Consequences
  • ✌Argentinian Superstar Yamila Diaz nude and sexy  in her  luxurious bedroom✌️AI Art
  • ✌Argentinian Superstar Pamela David nude and sexy on stage in her  TV Show ✌️AI Art created by Bernd Pulch✌️
  • ✌Asia in 2025: Navigating Economic Shifts and Geopolitical Tensions Amid Global Changes
  • ✌Attorney General Pamela Bondi Releases First Phase of Declassified Epstein Files – Story in Development✌
  • ✌Australian Superstar Miranda Kerr nude and sexy on stage in her Fashion Show✌️AI Art created by Bernd Pulch✌️
  • ✌Austrian Superstar Maria Mell nude and sexy in her  luxurious bedroom✌️AI Art
  • ✌Background of BerndPulch.org
  • ✌Bible Scences: The Golden Calf – Frida Kahlo AI Art – created by Bernd Pulch✌
  • ✌BP News – Why Presidents kill ?✌
  • ✌Brazilian Superstar Isabeli Fontana nude and sexy on stage in her fashion show✌️AI Art created by Bernd Pulch
  • ✌Breaking: Police seeks “The Singing Bajazzo” Andreas Lorch✌AI Parody
  • ✌Breaking: Police seeks Loosing Jan “BI” Mucha-“Cajal”✌AI Parody
  • ✌Chinese Reporting on the US Election
  • ✌Colombian Superstar Danna Garcia nude and sexy in her luxurious bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌Creation painted by Edouard Manet AI Art – created by Bernd Pulch✌
  • ✌Creation painted by Edouard Manet AI Art – created by Bernd Pulch✌
  • ✌David Irving: The Holocaust Denier’s Infamous Quest to Rewrite History – Dr. Zitelmann’s Involvement and the US State Department
  • ✌Debunking the “Execution of Bernd Pulch”: Sick NAZI/KGB/STASI Minds on their Way to Ruin
  • ✌Decoding Emotion: Bernd Pulch’s Insightful Analysis of Zillmann’s Arousal Theories in Media and Communication”
  • ✌DEVIL GIRL FROM MARS – Full Original Movie✌
  • ✌Dr. Rainer Zitelmann’s “1 Million Only Killed” Quote and Its Global Impact on Antisemitism
  • ✌Dr. Z and the Great Toaster Heist: Berlin Burns with Love and Betrayal
  • ✌Edith Baumann-Lorch & Andreas Lorch: A Web of Real Estate, Gorruption and Espionage
  • ✌Editorial: The Epic German Failures in Dismantling Communist Networks: A Legacy of Undermined Politics, Economy, and Security
  • ✌English Superstar Honor Blackman nude and sexy in her very luxurious golden Bedroom ✌️AI Art created by Bernd Pulch
  • ✌English Superstar Rhian Sugden nude and sexy in her  luxurious bedroom✌️AI Art✌️
  • ✌ESCAPE FROM SOBIBOR✌- Full Original Movie✌
  • ✌Europe Faces New Challenges in 2025 Amid Trump’s Return and Push for Strategic Autonomy
  • ✌EXPLANATION FOR THE USE OF HEBREW ON BERNDPULCH.ORG
  • ✌Exposed: Secret German Robert Koch Institure Files – RKI Protocolls in ONE File – Original Document✌
  • ✌Exposing Global Corruption: The Role of Whistleblowers in Holding Power Accountable – From Epstein to Panama Papers
  • ✌Exposing the Fake Bernd Pulch Twitter Account and Its Implications
  • ✌FARMERS’, TRUCKERS & ENTREPRENEURS, PROTEST IN BELGIUM, FRANCE,  GERMANY, GREECE, IRELAND, ITALY, NETHERLANDS, ROMANIA, SPAIN, TEXAS✌
  • ✌FRIDA KAHLO – THE GOLDEN CALF PAINTINGS – AI ART✌
  • ✌From Stasi to Moscow’s Mouthpiece: Peter Ehlers’ Double Agent Adventures in Media
  • ✌Germany’s New Government: Can They Fix Everything or Just Make It Worse
  • ✌Golden Calf in Edgar Degas Style – AI Art created by Bernd Pulch✌
  • ✌GoMoPa, Stasi, Ehrenfried Stelzer, and the Mysterious Death of Heinz Gerlach
  • ✌GOOGLEFIRST.ORG: “THE HOUR OF ERICA”
  • ✌Happy New Year 2025 from Bernd Pulch – AI Video Message from here ✌
  • ✌Hitler, Irving, Zitelmann, Weidel, German Media, and the  Spell of the Past – הדים מהעבר: מבט גרוז על צלליההיסטוריה✌
  • ✌Hollywood Star Ashley Greene – AI ART
  • ✌Hollywood Superstar Akexandra Adi nude and sexy in her  luxurious bedroom✌️AI Art
  • ✌How Communist Spy Agencies Target Journalists and Dissidents: Tactics and Real-Life Examples
  • ✌How Dangerous is GoMoPa for Bernd Pulch?
  • ✌How the disguised Nazi Heirs of Streicher infiltrade the Finance Industry
  • ✌Iceland’s Superstar “Ice Queen” Asdis Ran Gunnardottir and sexy in her  luxurious Bedroom✌️AI Art
  • ✌IDIOT ZEITUNG & DAS DESINVESTMENT present:” Quasimodo’s Hunchback Court-Martial” 😁powered by GoMoPa4Kids & Dr.Z😜
  • ✌IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT present “Gothic Inferno – Gilles de Rais’ Dark Invasion and Hinterfozzige Janelle’s Neon Vengeance” powered by GoMoPa4Kids & Dr.Z😘
  • ✌IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT present “Pol Pot’s Neon Revolution – Khmer Rouge vs. Hinterfozzige Janelle in Perverso’s Dystopian Wasteland”😜 powered by GoMoPa4Kids & Dr.Z 🤣
  • ✌IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT present “Pop-Art Rebellion – Warhol’s Glitter Invasion and Hinterfozzige Janelle’s Dungeon Escape”😜powered by GoMoPa4Kids & Dr.Z😍
  • ✌IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT present “Stalin’s Iron Purge Crushes Perverso” powered by GoMoPa4Kids & Dr.Z.🤮
  • ✌IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT present “The Trio Infernale’s Betrayal – Hinterfozzige Janelle’s Dungeon Torment and E. dith’s Coronation” 🤣powered by GoMoPa4Kids & Dr. Z😍
  • ✌IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT present:”Hinterfozzige Janelle’s  KGB Super Vixen Seduction Reigns!” Powered by GoMoPa4Kids & Dr. Adolf-Rainer Z.🤣
  • ✌IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT: “Borgia Blades and Filthy Betrayals – Hinterfozzige Janelle’s Seductive Duel with Lucrezia’s Poison”👯‍♀️Powered by GoMoPa4Kids & Dr. Z😎
  • ✌IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT: “Edwardian Excess – King Edward VII’s Gluttonous Invasion and Hinterfozzige Janelle’s Neon Feast” 🤪powered by GoMoPa4Kids & Dr. Z 🤡
  • ✌IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT: “The Khan’s Neon Conquest” powered by GoMoPa4Kids & Dr. Z😜
  • ✌In the Arena of Truth: Confronting Holocaust Denial from David Irving to Rainer Zitelmann
  • ✌In the Shadows of Power: The Dark Legacy of Nazi Influence in Germany’s Finance Industry
  • ✌Insiders reveal alleged GoMoPa Shareholder List
  • ✌International Oligarchs and Tycoons: The Shadowy Intersection of Wealth and Espionage
  • ✌KIN-DZA-DZA – DISTOPIA – Full Original Movie✌
  • ✌LEAKED AND UNCENSORED: SHOCKING: TAYLOR SWIFT BEDROOM TOUR – AI ART✌
  • ✌Leaked: P Diddy Freak Party Images starring Jennifer Lopez, Justin Bieber, Cardi B, Madonna, Beyonce, Mariah Carey, Paris Hilton, Jay Z, Pink, Usher, Russel Simmons, Kim Kardashian, Ashton Kuchter, Meghan Fox, Leonardo di Caprio and many Groupies – AI Parody Art✌
  • ✌Love in the Time of Proxy Wars
  • ✌Manfred Kanther, Jewish Testaments, Espionage, Mucha, Porten: From Wiesbaden to Scandal
  • ✌Mass Surveillance in the Tradition of the Stasi: How Governments and Corporations Monitor You Today
  • ✌Mass Surveillance: From Stasi to Silicon Valley
  • ✌MEMORIAL WEEKEND – EDWARD HOPPER AI ART CREATED BY BERND PULCH✌
  • ✌Murder Threats and Attempts on Bernd Pulch – The Price of Exposing the Network
  • ✌Mysterious Deaths Among Putin’s Enemies: A Chilling Pattern of Silence and Power
  • ✌Nazi Networks in German Real Estate: Uncovering Legal Violations & Front Organisations
  • ✌Nazis in Germany Undermining the Finance Industry: A Dark Legacy Exposed – ✌️ ד”ר ריינר ציטעלמאן און זיין פארבינדונג מיט עקסטרעמיסטישע נעצווערקן: אַ דיפּ דיוו אין די פינאַנץ און ריאַל עסטייט סעקטאָרס פון דייטשלאַנד
  • ✌Neo-Nazis, Neo-Stasi, and Financial Networks: Unraveling the Ties Between Central Europe and Putin’s Russia
  • ✌NEWSMAX LIVE TV✌
  • ✌Operation “Immobilien Komoedie Rivalschrift” in Action: The Stasi Witch Hunt
  • ✌Pedophiles in German Society: A Look at the Stasi, Nazis, Professor Kentler, and the Green Party
  • ✌Pop Stasi proudly presents Thomas “Strawman” Porten:”Criminal” powered by his wifey Honest Staatsanweaeltin Beate “Deep State” Porten-Lehr✌AI Parody 🤡
  • ✌Pop Stasi Proudly Presents: Stasi Hits in the infamous Jan-Erich Mielke-Mucha Mix 🤡🤡🤡AI Parody✌
  • ✌Prediction for 2025: Global Developments and Events
  • ✌Predictions for 2025: The Role of Investigative Journalism and Bernd Pulch’s Influence
  • ✌Predictions for the Upcoming Week: Expanded Analysis of Global Developments
  • ✌President Donald Trump, Elon Musk, and JD Vance Unite to Defeat the Deep State in the EUSSR, Germany, France, and Beyond
  • ✌Putin/Schmidt: Dark Eagle and Eagle IT:Unraveling a Web of Espionage, Controversies, and Secrets: Key Figures and Events
  • ✌Putin’s Network: Unveiling the Hidden Web of Influence: The German Oligarchs Lorch
  • ✌Putin’s Shadow Network: How Criminals Are Used for Espionage
  • ✌Ranking of the Top 100 Powerbrokers Globally
  • ✌Rembrandt: The Last Days of Sodom and Gomorrah – AI Art created by Bernd Pulch✌
  • ✌Rembrandt: The Last Days of Sodom and Gomorrah – AI Art created by Bernd Pulch✌
  • ✌Renaissance-Era Christian Imagery: A Modern Interpretation Inspired by Raphael and Caravaggio” – created by Bernd Pulch
  • ✌Renaissance-inspired Paintings of Biblical Scenes, combining Elements from Michelangelo, Caravaggio, and Rembrandt ✌by Bernd Pulch AI Art✌
  • ✌Renaissance-inspired Paintings of Biblical Scenes, combining Elements from Michelangelo, Caravaggio, and Rembrandt ✌by Bernd Pulch AI Art✌
  • ✌Russia goes on Full Scale Nuclear War Alert
  • ✌Sachsensumpf: Unraveling One of Germany’s Deepest Scandals
  • ✌SANTA CLAUS (1925) – Full Original Movie
  • ✌SANTA CLAUS CONQUERS THE MARTIANS – Original Full Movie
  • ✌SANTA CLAUS VERSUS THE DEVIL – Full Original Movie
  • ✌Save the World from Reptiles and Aliens✌
  • ✌Save the World with Bernd !✌
  • ✌SCROOGE (1935) – Uncut – Full Original Movie
  • ✌Shocking !! Leaked and uncensored: Scarlett Johansson nude in her Bedroom – AI Art created by Bernd Pulch✌
  • ✌Shocking Leak ! Halle Berry exposed and nude in Movies and Private Bedroom – AI Art by Bernd Pulch✌
  • ✌Shocking Leak : Leaked and Uncensored Hollywood Star Jayne Mansfield naked and exposed✌AI Art created by Bernd Pulch
  • ✌Shocking! Marylin Monroe exposed and nude in Movies and Private Bedroom – AI Art by Bernd Pulch✌
  • ✌Shocking! Raquel Welch exposed and nude in Movies and Private Bedroom – AI Art by Bernd Pulch✌
  • ✌Shocking: Leaked and Uncensored Fashion  Star Adriana Lima naked and exposed✌AI Art created by Bernd Pulch
  • ✌Shocking: Leaked and Uncensored: Actress and Fashion  Star Emanuela de Paula naked and exposed✌AI Art created by Bernd Pulch✌️
  • ✌Shocking: Leaked and Uncensored: Fashion  Star Heidi Klum naked and exposed✌AI Art created by Bernd Pulch
  • ✌Shocking: Leaked and Uncensored: Fashion  Star Kate Upton naked and exposed✌AI Art created by Bernd Pulch✌️
  • ✌Shocking: Leaked and Uncensored: Fashion  Star Penelope Cruz naked and exposed✌AI Art created by Bernd Pulch✌️
  • ✌Shocking: World Star Gina Lollobrigida nude and sexy in her Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌SODOM AND GOMORAH – Full Original Movie
  • ✌SODOM AND GOMORRAH – Full Original Movie
  • ✌Sodom and Gomorrah in Georges-Pierre Seurat Style – AI Art created by Bernd Pulch✌
  • ✌Sodom and Gomorrah painted by Frida Kahlo AI Art created by Bernd Pulch✌
  • ✌Sodom and Gomorrah painted by Frida Kahlo AI Art created by Bernd Pulch✌
  • ✌STUPID GERMAN MONEY: MULTI BILLIONS FOR MULTI BILLIONAIRE “PHILANTROPISTS” KICKBACKS? – ORIGINAL DOCUMENT
  • ✌The 100 Most Influential Stasi Figures and Alleged Collaborators After the Fall of the Wall
  • ✌The 100 Worst Real Estate Managers Globally: Mismanagement, Failures, and Billions in Losses
  • ✌The Adventures of Ichabod and Mr. Toad – Full Original Movie – Bing Crosby – Basil Rathbone
  • ✌The Antisemitic Berlin Underground: A Deep Dive into GoMoPa, BerlinJournal.biz, Irving, Zitelmann and their Connections
  • ✌The Antisemitic Network and Rainer Zitelmann’s Holocaust Denial הרשת האנטישמית וכחשת השואה של ריינר ציטלמן
  • ✌THE BATTLE OF AVARAYR – GIOTTO DI BONDONE – AI Art✌
  • ✌The Battle of Avarayr -Armenians against Persians – Giotto di Bondone AI Art – created by Bernd Pulch✌
  • ✌THE BENKO DEBTORS’ LIST✌
  • ✌The Berliner Zeitung’s Stasi Legacy, Nazis and the Mystery of DDR Billions
  • ✌The Best Painters in the Renaissance and Classic
  • ✌The Christian Meaning of Today: A Reflection on December 29th
  • ✌The Fate of Stasi GoMoPa and Its Key Players: A Detailed Prediction
  • ✌The Friends of the Italian Opera proudly present: Andreas Lorch, the “Singing Bajazzo Clown”, Don of Wastepaper Empire DFV : “La Traviata” – sponsored by the Corleone Family i.e. Don Vito✌
  • ✌The Growing Danger of the GoMoPa-Stasi-Immobillien Zeitung Network for Germany, Europe, and the USA: A Tool of Kremlin Influence?
  • ✌The Hidden Web of Espionage: FSB’s Influence in Europe and Its Local Operatives
  • ✌The Idiot Zeitung (IZ)  Chronicles: A Parody of Epic Failure
  • ✌The Idiot Zeitung (IZ)  Chronicles: A Parody of Epic Failure
  • ✌The Intricate Dance of Global Elites, Stasi, and Nazi Networks
  • ✌The Last “Above Top Secret” Documents Leaked: Insights and Controversies
  • ✌The Last Christmas Party – Full Original Movie
  • ✌The last Days of Sodom and Gomorrah created and painted by Bernd Pulch AI Art✌
  • ✌The Last Days of Sodom and Gomorrah painted by Leonardo da Vinci AI Art created by Bernd Pulch✌
  • ✌The Last Days of Sodom and Gomorrah painted by Michelangelo AI Art created by Bernd Pulch✌
  • ✌The last Days of Sodom and Gomorrah painted by Pablo Picasso AI Art – created by Bernd Pulch✌
  • ✌The last Days of Sodom and Gomorrah painted by Peter Paul Rubens AI Art – created by Bernd Pulch✌
  • ✌The last Days of Sodom and Gomorrah painted by Pierre Auguste Renoir AI Art – created by Bernd Pulch✌
  • ✌The Last Days of Sodom and Gomorrah painted by Vincent van Gogh AI Art created by Bernd Pulch✌
  • ✌The List of the 100 Best Real Estate Managers Globally, including the estimated Assets for each Position
  • ✌The List of the 100 Most Influential Nazis in Prominent Positions after 1945
  • ✌The Lorch Publisher (DFV) and its Connections to the Stasi, GoMoPa, Immobilien Zeitung, and Spy Networks
  • ✌THE MUPPETS’ CHRISTMAS CAROL – Full Original Movie
  • ✌The Murder Plot Against Journalist Bernd Pulch: Unraveling the Web of Death Threats and Fake News
  • ✌The Persistence of Totalitarian Shadows: Post-1945 Deep Nazi and Deep Stasi Influences in Europe
  • ✌The Pillarisation of William Prynne painted by Pablo Picasso AI Art ✌created by Bernd Pulch✌
  • ✌THE PROOF FROM GRUNER & JAHR: I FOUNDED INVESTMENT IN 2000 – PETER EHLERS IS A SUSPECTED IMPOSTER AND WORSE✌
  • ✌The Rebellion of the Morning Star🙏
  • ✌The Resurrection of Jairus’ Daughter painted by Salvador Dali AI Art – created by Bernd Pulch✌
  • ✌The Role of Public Prosecutor Beate Porten in Alleged UNSUCCESSFUL Legal Abuses Against Bernd Pulch
  • ✌The Role of the Lorch Family in the Stasi-GoMoPa organized Crime Ring under US & International Law
  • ✌The Role of Thomas Porten, Immobilien Zeitung, and Connections to Questionable Networks
  • ✌The Role of Thomas Porten, Immobilien Zeitung, and Connections to Questionable Networks
  • ✌THE RUSSIAN STATE WANTED LIST – ALL NAMES & DETAILS – ORIGINAL DOCUMENT✌
  • ✌The Shadow Networks: GoMoPa, Stasi, KGB, and the Web of Espionage, Murder, Smear Campaigns, and Financial Manipulations
  • ✌The Shadow Networks: Uncovering the Modern-Day Stasi’s Influence in Corporate Espionage
  • ✌The Shadowy World of Threats and Assassination Attempts on Journalist Bernd Pulch
  • ✌The Sinister Shadows: The Legacy of the Nazis and the Stasi in Germany
  • ✌The Soap Opera of the Spies: The Mucha-Porten Espionage Dynasty
  • ✌THE TEN COMMANDMENTS – 2005 TV MINI SERIES – Full Original Movies
  • ✌THE TEN COMMANDMENTS – Cecil B. De Mille – Full Original Movie
  • ✌The Who’s Who of Murdered or Mysteriously Dead People Involved in Pedophile Cases
  • ✌Today in Christian History: Suicide of Nero – First Persecutor of Christians commits Suicide – Caravaggio AI Art – created by Bernd Pulch✌
  • ✌Top 100 Most Controversial Freemasons of All Time
  • ✌Top 100 Most Corrupt Media Outlets Globally
  • ✌Top 100 Ranking of the Most Controversial Bilderberg Members
  • ✌Top 100 Worst Equity Managers Globally
  • ✌Top 100 Worst Real Estate Manager in Germany, Austria and Switzerland
  • ✌Top 100 Worst Real Estate Managers in North America, with detailed Issues and Financial Losses
  • ✌Trump’s Return to Presidency Shakes Up Americas’ Economic and Political Landscape in 2025
  • ✌UEBER MICH – WILLKOMMEN
  • ✌Unmasking the Shadows: A Glimpse into Germany’s Media Network and its Antisemitic Connections
  • ✌Unraveling the Mystery: Who is Behind the Murder Plot Against Bernd Pulch?
  • ✌Unveiling Hidden Networks: The Intersection of Corruption, Espionage, and Power in Modern Society
  • ✌Who is Behind Gomopa4Kids and Their Connections to Jan Mucha, Peter Ehlers, and Thomas Porten
  • ✌Who Owns Bernd Pulch? A Deep Dive into the Journalist’s Background and Influence
  • ✌Why GoMoPa and Its Affiliates Remain Unscathed: Silencing Critics and Evading Justice
  • ✌WOODSTOCK – Three Days that defined the Generation✌
  • ✌World War III Looming – Latest Actions & Analysis – Story in Progress
  • ✌World’s Freemason Register – Original Document✌
  • ✌Worst-Case Scenario: Espionage Activities Involving Stasi, GoMoPa, and Allied Entities
  • ✌“Most Wanted” Evil People in the Bible Ranking😈🕵️‍♂️
  • ✌✌Hollywood Superstar Teri Hatcher nude and sexy in her  luxurious Bedroom✌️AI Art
  • ✌✌Prophet Elias wins over Baal – Leonardo da Vinci AI Art – created by Bernd Pulch✌
  • ✌✌The Dark Connection: GoMoPa and Its Alleged Ties to a Neo-Nazi, Anti-Semitic Publication
  • ✌✌Top 100 Worst Real Estate Managers in Europe
  • ✌✌️LEAKED AND UNCENSORED: SHOCKING: MONICA BELLUCCi – BEDROOM TOUR – NUDE AI ART PARODY✌️created by Bernd Pulch✌️️
  • ✌️ Diego Velazquez – Corpus Christi Paintings – AI ART created by Bernd Pulch✌️
  • ✌️#BP NEWS – Your Exclusive Truth – US Elections etc✌️
  • ✌️🤡🤡The Joker meets Madame Blamage – Video🤣🤣
  • ✌️🤡The Joker meets Darya Saltykova – AI Parody Video🤡✌️
  • ✌️Amazing: Hollywood Star Ana de Armas nude and sexy in her very posh and luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️BP WORLD NEWS – Your Exclusive Truth
  • ✌️DIEGO VELAZQUEZ – CORPUS CHRISTI PAINTINGS – AI ART ✌️
  • ✌️Exposed and Shocking: Super Star Stacey Dash nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Exposed: Hollywood Star Jessica Lange nude and sexy in her Bedroom✌️AI Art created Bernd Pulch
  • ✌️Exposed: Hollywood Star Laura Harring  nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch
  • ✌️Exposed: Mindcontrol Patent – Original Document✌️
  • ✌️Exposed: Slovakian Super Star Veronica Varekova nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Jesus throws the Villains out of the Temple – Albrecht Duerer AI ART – powered by Bernd Pulch✌️
  • ✌️Leaked and Exposed:Shocking: Hollywood Super Star Margot Robbie nude and sexy in her very very very very luxurious luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️LEAKED AND UNCENSORED: SHOCKING: KIM KARDASHIAN BEDROOM TOUR – NUDE AI ART PARODY✌️created by Bernd Pulch✌️
  • ✌️Leaked, Exposed: Hollywood Super Star Jennifer Anniston nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: American Star Niki Taylor nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: American Supermodel Carol Alt all nude in her Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Argentinian Star Zaira Nara nude and sexy in her very luxurious Bedroom lying on her bed✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Australian Super Star Elle Macpherson nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Bollywood Star Priyanka Chopra Jonas nude and sexy in her Bedroom✌️AI Art created by Bernd Pulch
  • ✌️Leaked: Bollywood Super Star Neha Dhupia nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Brazilian Star Alessandra Ambrosio nude and sexy in her very luxurious Bedroom ✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Brazilian Star Daniella Cicarelli nude and sexy in her Bedroom✌️AI Art created by Bernd Pulch
  • ✌️Leaked: Brazilian Super Star Giselle Bundchen nude and sexy in her Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Brazilian Super Star  Taís Araújo all nude and sexy in her very luxurious Bedroom lying on her bed✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Canadian Star Kim Cloutier nude and sexy in her very luxurious Bedroom lying on her bed✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Canadian Star Jessica Lucas nude and sexy in her Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Canadian Super Star Estella Warren all nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Cayman Super Star Selita Ebanks all nude and sexy in her very luxurious Bedroom ✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Colombian Star Mirella Grisales nude and sexy in her Bedroom✌️AI Art created by Bernd Pulch
  • ✌️Leaked: Czech Super Star Eva Herzigova nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Czech Super Star Karolina Kurkova all nude and sexy in her very luxurious Bedroom ✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Czech Supermodel Petra Nemcova all nude and sexy in her Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Dutch Star Candice Swanepoel all nude and sexy in her Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Dutch Super Star Anna Marie Goddard nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Dutch Super Star Doutzen Kroes nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Dutch Super Star Sylvie Meis all nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: English Star Keeley Hazell nude and sexy in her very luxurious Bedroom lying on her bed✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: European Super Star Izabella Scorupco nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: French Star Edwige Fenech nude and sexy in her Bedroom✌️AI Art created by Bernd Pulch
  • ✌️Leaked: French Star Mélissa Theuriau nude and sexy in her Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: French Star  Jacqueline Bisset nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: French Star Izabel Goulart nude and sexy in her Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: German Super Star Claudia Schiffer all nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Hollywood Star Brittany Binger nude and sexy in her Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Hollywood Star Cyd Charisse nude and sexy in her Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Hollywood Star Dorothy Dandrige nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Hollywood Star Eva Mendes nude and sexy in her Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Hollywood Star Jarah Mariano nude and sexy in her Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Hollywood Star Jessica Biel all nude and sexy in her Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Hollywood Star Joanna Krupa nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Hollywood Star Josie Maran nude and sexy in her  Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Hollywood Star Minnie Gupta nude and sexy in her Bedroom✌️AI Art created by Bernd Pulch
  • ✌️Leaked: Hollywood Star Sarah Shahi all nude and sexy in her very luxurious Bedroom lying on her bed✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Hollywood Star Sharon Stone nude and sexy in her Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Hollywood Star Tia Carrere all nude and sexy in her Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Hollywood Star Ursula Andress nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Hollywood Star Carole Landis nude and sexy in her Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Hollywood Super Star Angelina Jolie all nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Hollywood Super Star Angie Dickinson all nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Hollywood Super Star Ava Gardner nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Hollywood Super Star Betsy Russel all nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Hollywood Super Star Brooke Burke nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Hollywood Super Star Cheryl Tiegs nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Hollywood Super Star Christie Brinkley nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Hollywood Super Star Elizabeth Hurley nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Hollywood Super Star Eva Gabor all nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Hollywood Super Star Eve Meyer (wife of Russ) all nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Hollywood Super Star Eve Meyer all nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Hollywood Super Star Farah Fawcett all nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Hollywood Super Star Gene Tierney all nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Hollywood Super Star Grace Kelly all nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Hollywood Super Star Heather Locklear all nude and sexy in her very luxurious Bedroom lying on her bed✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Hollywood Super Star Jennifer Aniston nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Hollywood Super Star Jennifer Lopez nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Hollywood Super Star Karen MacDougal all nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Hollywood Super Star Kim Basinger nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Hollywood Super Star Linda Darnell all nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Hollywood Super Star Susan Ward nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Hollywood Super Star Tyra Banks nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Hollywood Super Star Zsa Zsa Gabor all nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Hollywood Super Star Vanessa Williams all nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Indian Super Star Padma  Lakshmi nude and sexy in her very  luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Israeli Super Star Bar Refaeli nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Israeli Super Star Moran Atias nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Italian Super Star Maria Grazia Cucinotta all nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Italian Supermodel Francesca Lodo all nude and sexy in her Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Mexican Star Jacqueline Bracamontes nude and sexy in her Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Mexican Super Star Elsa Benitez nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Mexican Super Star Marlene Favela nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Nigerian Super Star Agbani Narego nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Romanian Star Irena Violette nude and sexy in her Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Romanian Super Star Catrinel Marlon nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Romanian Super Star Madelina Ghenea nude and sexy in her very  luxurious luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Russian Super Star Irina Shayk all nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Shocking: Brazilian Super Star Ana Beatriz Barros nude and very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Slovakian Super Star Adriana Karembeu all nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: South African Super Star Genevieve Morton all nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Spanish Star Sara Montiel nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Staff Memo House Republicans on Fauci et al crimes – Original Document ✌️
  • ✌️Leaked: Supermodel Naomi Campbell all nude in her Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Swedish Star Anita Ekberg nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Uruguayan Star  Barbara Mori nude and sexy in her very luxurious bed✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: US Hollywood Star Cheryl Ladd nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Leaked: Venezuelan Star Dayana Mendoza nude and sexy in her Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Mark of Ephesus Defender of Orthodox Belief in Golden Icon Byzantine Style✌️AI Art created by Bernd Pulc
  • ✌️Mark of Ephesus Defender of Orthodox Belief in Golden Icon Byzantine Style✌️AI Art created by Bernd Pulch✌️
  • ✌️Shocking!!! Leaked and Uncensored: Beyonce Nude – AI Art✌️
  • ✌️Shocking!!! Leaked and Uncensored: Katie Perry Nude – AI Art✌️
  • ✌️Shocking!!! Leaked and Uncensored: Rihanna Nude – AI Art✌️
  • ✌️Shocking: Bollywood Star Aishwarya Rai Bachchan nude and sexy in her Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Shocking: Chinese Super Star Gong Li nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Shocking: French Movie Star Catherine Deneuve nude and sexy in her very very very very luxurious luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Shocking: French Star Brigitte Bardot nude and sexy in her Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Shocking: Hollywood Movie Star Emma Watson nude and sexy in her very very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Shocking: Hollywood Movie Star Jennifer Lawrence nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Shocking: Hollywood Star Alexandria Daddario nude and sexy in her very very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Shocking: Hollywood Star Anne Hathaway nude and sexy in her Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Shocking: Hollywood Star Catherine Zeta-Jones nude and sexy in her Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Shocking: Hollywood Star Denise Richards nude and sexy in her Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Shocking: Hollywood Star Diane Lane nude and sexy in her Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Shocking: Hollywood Star Elizabeth Olsen nude and sexy in her very  luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Shocking: Hollywood Star Gal Godot nude and sexy in her Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Shocking: Hollywood Star Janet Leigh nude and sexy in her Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Shocking: Hollywood Star Jessica Alba nude and sexy in her Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Shocking: Hollywood Star Megan Fox nude and sexy in her Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Shocking: Hollywood Star Mila Kunis nude and sexy in her Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Shocking: Hollywood Star Natalie Portman nude and sexy in her Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Shocking: Hollywood Star Rita Hayworth nude and sexy in her very posh and luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Shocking: Hollywood Star Salma Hayek nude and sexy in her Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Shocking: Hollywood Super Star Charlize Theron nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Shocking: Hollywood Super Star Kate Beckinsale nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Shocking: Hollywood Super Star Kate Upton nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Shocking: Hollywood World  Star Elisabeth Taylor nude and sexy in her Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Shocking: Italian Super Star Claudia Cardinale nude and sexy in her very  luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Shocking: Model Star Emily Ratajkowski nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Shocking: Movie Star Senta Berger nude and sexy in her  luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Shocking: Super Star Shania Twain nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Shocking: Supermodel Carla Campbell nude and sexy in her Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Shocking: US Super Star Rochelle Aytes nude and sexy in her very  luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Shocking: Venezuelan Super Star Aida Yespica nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Shocking: Venezuelan Super Star Carolina Marconi nude and sexy in her very very very very luxurious luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Shocking: World Model Star Brooklyn Decker nude and sexy in her Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Shocking: World Model Star Marisa Miller nude and sexy in her Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Shocking: World Star Kelly Brook nude and sexy in her very luxurious Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Shocking: World Star Sophia Loren nude and sexy in her Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️Shocking: World Super Model Star Cindy Crawford nude and sexy in her Bedroom✌️AI Art created by Bernd Pulch✌️
  • ✌️The End of Sodom and Gomorrah painted by Raphael AI Art✌️created by Bernd Pulch ✌️
  • ✌️Unveiled: French Star Isabelle Adjani nude and sexy in her Bedroom✌️AI Art created by Bernd Pulch
  • ✨🩸 IDIOT ZEITUNG & DAS DESINVESTMENT present: “CAIN’S MARKED KINGDOM & THE BLOOD HARVEST REVOLT” ⚔️🌑Powered by GoMoPa4Kids & Dr. Z 🤪🔪
  • ✨🦇 IDIOT ZEITUNG & DAS DESINVESTMENT present: “DRACULA’S NEON COVENANT OF CHAOS” 🔥⚰️Powered by GoMoPa4Kids & Dr. Z 🤪💉
  • ✨👑 IDIOT ZEITUNG & DAS DESINVESTMENT present: “HEROD’S VEIL HYPNOSIS & SALOME’S NEON DECAPITATION DISCO” 💃🗡️Powered by GoMoPa4Kids & Dr. Z 🤪🎭
  • ✨🌑 IDIOT ZEITUNG & DAS DESINVESTMENT PRESENT:”DARKSEID’S ANTI-LIFE REBELLION & THE 177-WAY COSMIC RIOT” 💀🔥Powered by GoMoPa4Kids & Dr. Z 🤪🌌
  • ✨🌌 IDIOT ZEITUNG & DAS DESINVESTMENT PRESENT:”THANOS’ INFINITY MADNESS & THE 118-WAY COSMIC RIOT” 💎💥Powered by GoMoPa4Kids & Dr. Z 🤪🪐
  • ✨🎪 IDIOT ZEITUNG & DAS DESINVESTMENT PRESENT:”THE JOKER’S SCHIZO-CIRCUS & THE 59+ WAYS TO BURN A CLOWN” 🤡🔥Powered by GoMoPa4Kids & Dr. Z 🤪🎭
  • ✨🗿 IDIOT ZEITUNG & DAS DESINVESTMENT PRESENT:”TOHT’S TIME-HEIST & THE BUNDESLADE BOOGALOO” 🕰️💥Powered by GoMoPa4Kids & Dr. Z 🤪🎒
  • ✨🗿 IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRÄSENTIEREN / PRESENT:„HINTERHAELTIGE JANELLE-SAURON: LIEBE, MACHT & DIE GEBURT DES RATTEN-ECHENRINGS! / LOVE, POWER & THE BIRTH OF THE RAT-ONE RING!“Powered by GoMoPa4Kids™ & Dr. Z’s Chaos Serum™ / Gesponsert von GoMoPa4Kids™ & Dr. Z’s Chaos-Serum™ 💍🐀🔥
  • ✨🗿 IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT:”STASI WITCHES VS. PUMPKIN BOMBS: THE GREAT HALLOWEEN TIME-LOOP THERAPY SESSION!”Sponsored by Stasi Women Support Group™, GoMoPa4Kids™ & Dr. Z’s Chaos Serum™ 🕶️🎃💉NEU MIT DEUTSCHER FASSUNG😘
  • ✨🗿 IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT:“CARNAGE’S CHAOS COIN: WHEN THE SYMBIOTE MERGES WITH THE MULTIVERSAL LEDGER!”„CARNAGES CHAOS-MÜNZE: WENN DER SYMBIONT MIT DEM MULTIVERSALEN KONTOBUCH VERSCHMILZT!“Powered by GoMoPa4Kids™, Stasi Women Support Group, RatCoin™ & Dr. Z’s Symbiote Serum™ / Gesponsert von GoMoPa4Kids™, RatCoin™ & Dr. Z’s Symbionten-Serum™ 🧪💥💸
  • ✨🗿 IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT:“JEZEBEL’S IDOLATROUS IPO: WHEN TAX FRAUD MEETS BIBLICAL BAD BITCH ENERGY!”Powered by GoMoPa4Kids™, Stasi Women Support Group, RatCoin™ & Dr. Z’s Holy Water™ 💦👑
  • ✨🗿 IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT:“MAGNETO’S METAL MELTDOWN: NAZIS, RATS & A LLAMA-DOOM IN A MAGNETIC MAELSTROM!”Powered by GoMoPa4Kids™, RatCoin™, Dr. Z & Stasi Women Support Group™ 🧲💥
  • ✨🗿 IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT:“PALPATINE’S GALACTIC TAX EMPIRE: WHEN THE DARK SIDE AUDITS THE MULTIVERSE!” / „PALPATINES GALAKTISCHES STEUERIMPERIUM: WENN DIE DUNKLE SEITE DAS MULTIVERSUM PRÜFT!“Powered by GoMoPa4Kids™, Stasi Women Support Group, RatCoin™ & Dr. Z’s Force Lightning Serum™ ⚡💀🌌
  • ✨🗿 IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT:“RA’S AL GHUL’S ETERNAL LEDGER: WHEN THE LAZARUS PIT MEETS TAX FRAUD!”Powered by GoMoPa4Kids™, RatCoin™, Dr.Z & Stasi Women Support Group™ 💀📉DEUTSCHE VERSION!😎
  • ✨🗿 IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT:“RED SKULL’S RAINBOW REVOLUTION: WHEN NAZI-GAY LOVE CRASHES THE MULTIVERSAL LEDGER!”Gesponsert von GoMoPa4Kids™, RatCoin™ & Dr. Z’s Pride Serum™ 🌈💘💣
  • ✨🗿 IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT:“STASI LOVE BOMBS & THE RAT-QUEEN’S CORRUPTION: A MULTIVERSAL ROM-COM MELTDOWN!”Gesponsert von GoMoPa4Kids™, Stasi Support Women Group, RatCoin™ & Dr. Z’s Chaos Serum™ 💘🧀💥
  • ✨🗿 IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT:“VOLDEMORT’S TAX-HORCRUX HEIST: WHEN DARK MAGIC CRASHES THE MULTIVERSAL STOCK MARKET!”Sponsored by Stasi Women Support Group™, GoMoPa4Kids™, Dr.Z & RatCoin™ 🐍💸📉DEUTSCHE FASSUNG🤡
  • ✨🗿 IDIOT ZEITUNG (IZ) & DESINVESTMENT PRESENT:
  • ✨🗿 IDIOT ZEITUNG (IZ) & DESINVESTMENT PRESENT:“HOMELANDER’S FISCAL FINAL SOLUTION: WHEN MILK FASCISM INFECTS THE MULTIVERSAL LEDGER!”„HOMELANDERS FISKALE ENDLÖSUNG: WENN MILCHFASCHISMUS DAS MULTIVERSUM-KONTOBUCH INFIZIERT!“😘Powered by GoMoPa4Kids™, RatCoin™ & Dr. Z’s Patriot Serum™ / Gesponsert von GoMoPa4Kids™, RatCoin™ & Dr. Z’s Patriotisches Serum™ 🥛💥💸Feat. STASI WOMEN SUPPORT GROUP🤩
  • ✨🗿 IDIOT ZEITUNG (IZ) & DESINVESTMENT PRESENT:“MORIARTY’S FISCAL HIVEMIND: WHEN THE NAPOLEON OF CRIME AUDITS THE MULTIVERSE!”„MORIARTYS FISKAL-GEISTESBLITZ: WENN DER NAPOLEON DES VERBRECHENS DAS MULTIVERSUM PRÜFT!“Powered by GoMoPa4Kids™, RatCoin™ & Dr. Z’s Quantum Tax Evasion Serum™ / Gesponsert von GoMoPa4Kids™, RatCoin™ & Dr. Z’s Quanten-Ste5uerhinterziehungs-Serum™ 🧠💸🌀Featuring STASI WOMEN SUPPORT GROUP✌
  • ✨🗿 IDIOT ZEITUNG (IZ) & DESINVESTMENT PRESENT:“THE GOVERNOR’S FISCAL PURGE: WHEN AUSTERITY MEETS ANARCHY IN THE MULTIVERSAL JUNKYARD!”„DER GOUVERNEURS FISKAL-PUTSCH: WENN SPARPOLITIK AUF ANARCHIE IM MULTIVERSUM-SCHROTTPLATZ TRIFFT!“Powered by GoMoPa4Kids™, RatCoin™ & Dr. Z’s Anarchy Serum™ / Gesponsert von GoMoPa4Kids™, RatCoin™ & Dr. Z’s Anarchie-Serum™ 🏛️💥💸
  • ✨🗿 IDIOT ZEITUNG (IZ) & DESINVESTMENT PRESENT:“THE TEMPORAL TAX TORNADO: WHEN THE MASTER AUDITS THE MULTIVERSE’S 401(k)!”„DER ZEITLICHE STEUER-TORNADO: WENN DER MASTER DAS MULTIVERSUM-SPARPLAN PRÜFT!“Powered by GoMoPa4Kids™, Stasi Women Support Group, RatCoin™ & Dr. Z’s Time-Loop Serum™ / Gesponsert von GoMoPa4Kids™, RatCoin™ & Dr. Z’s Zeitschleifen-Serum™ ⏳🌀💸
  • ✨🗿 IDIOT ZEITUNG (IZ) & DESINVESTMENT PRESENT:„DOOMSDAY DESTROYS MEME-MARS: THE FALL OF THE GLITTER COLONY!“🌋 SUPERVILLAIN VS. WEF ELITE IN COSMIC CHEESE WAR! 🧀💥Powered by GoMoPa4Kids™, RatCoin™ & Dr. Z’s Doomsday Serum™ 🧪🦹‍♂️💸
  • ✨🗿 IDIOT ZEITUNG (IZ) & DESINVESTMENT PRESENT:„ELON’S MEME-MARS KOLONIE: WIE EINE KI-KLONE & DIE WEF-DINO-ELITE DEN ROTEN PLANETEN MIT GLITZER-T-REXERN ÜBERNEHMEN!“Powered by GoMoPa4Kids™, RatCoin™ & Dr. Z’s Neuralink Serum™ 🧠🔴💸
  • ✨🗿 IDIOT ZEITUNG PRESENTS:“DOOM’S DIALECTIC DOMINION – LATVERIAN LARPING IN THE TIME-SLOP!” 🗞️💥🌌Powered by GoMoPa4Kids™, Dr.Z., StinkCoin™, and 200% More Latverian Ego 🤖👑🔥
  • ✨🗿 IDIOT ZEITUNG ULTIMATE CROSSOVER – “APOCALYPSE THROWDOWN: WHEN ALL TIMELINES COLLIDE!” 🗞️💥🌌Powered by GoMoPa4Kids™, StinkCoin™, and 200% More Chaos 🤪🌪️🎭
  • ✨🗿 IDIOT ZEITUNG, DAS DESINVESTMTEMT & LUTHORCORP PRESENT:“LEX’S LOOMING LEDGERDEMAIN – TIME DEBT COLLECTORS AT THE GATE!” 🕰️💼Powered by GoMoPa4Kids, Dr. Z, and 10% Off Coupons for Apocalypse Prep 💸🤪
  • ✨🕶️ IDIOT ZEITUNG & DAS DESINVESTMENT PRESENT:”WILSON FISK’S NEON TAKEOVER & THE 59-WAY REVOLT” 💵🔥Powered by GoMoPa4Kids & Dr. Z 🤪👔
  • ✨🗞️ IDIOT ZEITUNG SUNDAY SPECIAL – “EDITH & ANDREAS: LOVE, LARCENY, & LIECHTENSTEIN’S DIRTY LAUNDRY!” 🗞️✨Sponsored by GoMoPa4Kids™ & StinkCoin™ – Because Even Scandals Need a Tax Haven. 💸🏦
  • ✨DOUBLE FEATURE:🗿 IDIOT ZEITUNG (IZ) & DESINVESTMENT PRESENT:“OZYMANDIAS’ FISCAL SINGULARITY: WHEN THE SMARTEST MAN ALIVE AUDITS THE MULTIVERSAL SOUL!”😂„OZYMANDIAS’ FISKALE SINGULARITÄT: WENN DER SCHLAUESTE MANN DER WELT DIE MULTIVERSUM-SEELE PRÜFT!“🤡Powered by GoMoPa4Kids™, RatCoin™ & Dr. Z’s Paradox Serum™ / Gesponsert von GoMoPa4Kids™, RatCoin™ & Dr. Z’s Paradox-Serum™ 🧠💥💸”WALLBURGA THE NYMPHO VALKYRE”
  • 权力的阴影:纳粹影响在德国金融业的黑暗遗产
  • �🤣🤣🤣🤡”Joker.Two Face.Sink!” Part 49 The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Dr. Mabuse meet Sajida Talfah and the Succubus, Angela, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody🤡🤣🤣�🤣🤣🤡
  • �🤣🤣🤣🤡”Stasi.FinanzRoulettiers.Ahoi!” Part 50 The Joker aka the FinanzRoué aka the  FinanzRoulettier, Clownface, Two Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Dr. Mabuse meet Brigitte Mohnhaupt and the Succubus, Angela, Beatrix Port and her Stasi Nymphos 🤣🤣Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody🤣🤣🤣🤡
  • �🤡🤡😂Pop Stasi proudly presents Loosing Jan “BI Trans” Mucha-“Cajal”:”Shoot your Shot” – Thorsten Karl Golden Shower Mix – AI Parody✌️�🤡😂Pop Stasi proudly presents Loosing Jan “BI Trans” Mucha-“Cajal”:”Shoot your Shot” – Thorsten Karl Golden Shower Mix – AI Parody✌️
  • �🔥💀  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 121xy: “EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” 🤡 POWERED BY DR  DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐 💀🔥 🎭👑�💀  🤡 🧐 💀🔥 🎭👑
  • �🔥💀  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 122xyz: “SPEDSTER SAVITAR, EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐 💀🔥 🎭👑�💀  🤡 🧐 💀🔥 🎭👑
  • �🔥💀  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 123/0815: “SPEDSTER SAVITAR, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐 💀🔥 🎭👑�💀  🤡 🧐 💀🔥 🎭👑
  • �🔥💀  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 123/0817: “HIGH.EVOLUTIONARY , ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐 💀🔥 🎭👑�💀  🤡 🧐 💀🔥 🎭👑
  • �🔥💀  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 124/0815: “ENCHANTRESS , ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐 💀🔥 🎭👑�💀  🤡 🧐 💀🔥 🎭👑
  • �🔥💀  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 125/0815: “HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐 💀🔥 🎭👑�💀  🤡 🧐 💀🔥 🎭👑
  • �🔥💀  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 126/0815: “KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐 💀🔥 🎭👑�💀  🤡 🧐 💀🔥 🎭👑
  • �🔥💀  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 127/0815: “THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐 💀🔥 🎭👑�💀  🤡 🧐 💀🔥 🎭👑
  • �🔥💀  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 128/0815: “THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐 💀🔥 🎭👑�💀  🤡 🧐 💀🔥 🎭👑
  • �🔥💀  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 129/0815: “PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐 💀🔥 🎭👑�💀  🤡 🧐 💀🔥 🎭👑
  • �BLACK MASK, THE FALCONE MAFIA KITE MAN SEX GOD SAGA🧐T OSAMA,  HUSH, PLANKTON, MOJO JOJO CONSPIRACY 🔥💀  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 1334/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐 💀🔥 🎭👑�💀  🤡 🧐 💀🔥 🎭👑By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios🔥🌌😈💥
  • �MOJO JOJO CONSPIRACY 🔥💀  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 13P/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐 💀🔥 🎭👑�💀  🤡 🧐 💀🔥 🎭👑
  • �PLANKTON🧐MOJO JOJO CONSPIRACY 🔥💀  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 1332/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐 💀🔥 🎭👑�💀  🤡 🧐 💀🔥 🎭👑
  • �QUANTUM SEX GOD APOCALYPSE🧐The OSAMA  HUSH, PLANKTON, MOJO JOJO CONSPIRACY 🔥💀  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 1334/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐 💀🔥 🎭👑�💀  🤡 🧐 💀🔥 🎭👑By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios
  • �THE CALCULATOR ERA🧐OSAMA,  HUSH, PLANKTON, MOJO JOJO CONSPIRACY 🔥💀  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 136WY/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐 💀🔥 🎭👑�💀  🤡 🧐 💀🔥 🎭👑By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios🔥🌌😈💥
  • �THE DARKSEID OBLIVION🧐OSAMA,  HUSH, PLANKTON, MOJO JOJO CONSPIRACY 🔥💀  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 136WY/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐 💀🔥 🎭👑�💀  🤡 🧐 💀🔥 🎭👑By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios🔥🌌😈💥
  • �THE DARTH VADER ASCENDANCY 🧐OSAMA,  HUSH, PLANKTON, MOJO JOJO CONSPIRACY 🔥💀  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 136WY/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐 💀🔥 🎭👑�💀  🤡 🧐 💀🔥 🎭👑By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios🔥🌌😈💥
  • �THE DEATHSTROKE AWAKENING 🧐OSAMA,  HUSH, PLANKTON, MOJO JOJO CONSPIRACY 🔥💀  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 133Y/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSIOqN GRATIS 🧐 💀🔥 🎭👑�💀  🤡 🧐 💀🔥 🎭👑By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios🔥🌌😈💥
  • �THE DESAAD PAIN-PROGRESSION🧐OSAMA,  HUSH, PLANKTON, MOJO JOJO CONSPIRACY 🔥💀  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 136WY/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐 💀🔥 🎭👑�💀  🤡 🧐 💀🔥 🎭👑By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios🔥🌌😈💥
  • �THE FALCONE MAFIA KITE MAN SEX GOD SAGA🧐The OSAMA,  HUSH, PLANKTON, MOJO JOJO CONSPIRACY 🔥💀  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 1334/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐 💀🔥 🎭👑�💀  🤡 🧐 💀🔥 🎭👑By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios🔥🌌😈💥
  • �THE GRANNY GOODNESS ORPHANAGE🧐OSAMA,  HUSH, PLANKTON, MOJO JOJO CONSPIRACY 🔥💀  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 136WY/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐 💀🔥 🎭👑�💀  🤡 🧐 💀🔥 🎭👑By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios🔥🌌😈💥
  • �THE HUSH WET DREAM🧐PLANKTON, MOJO JOJO CONSPIRACY 🔥💀  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 1332/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐 💀🔥 🎭👑�💀  🤡 🧐 💀🔥 🎭👑
  • �THE JOKER’S CARNIVAL OF CHAOS🧐OSAMA,  HUSH, PLANKTON, MOJO JOJO CONSPIRACY 🔥💀  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 134WY/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐 💀🔥 🎭👑�💀  🤡 🧐 💀🔥 🎭👑By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios🔥🌌😈💥
  • �THE KITE MAN SEX GOD SAGA🧐The OSAMA,  HUSH, PLANKTON, MOJO JOJO CONSPIRACY 🔥💀  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 1334/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐 💀🔥 🎭👑�💀  🤡 🧐 💀🔥 🎭👑By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios
  • �THE MAXWELL LORD DOMINION🧐OSAMA,  HUSH, PLANKTON, MOJO JOJO CONSPIRACY 🔥💀  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 136WY/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐 💀🔥 🎭👑�💀  🤡 🧐 💀🔥 🎭👑By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios🔥🌌😈💥
  • �THE PROMETHEUS GAMBIT 🧐OSAMA,  HUSH, PLANKTON, MOJO JOJO CONSPIRACY 🔥💀  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 134WY/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐 💀🔥 🎭👑�💀  🤡 🧐 💀🔥 🎭👑By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios🔥🌌😈💥
  • �THE QUANTUM SEX NEXUS OF BETRAYAL🧐The OSAMA,  HUSH, PLANKTON, MOJO JOJO CONSPIRACY 🔥💀  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 1334/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐 💀🔥 🎭👑�💀  🤡 🧐 💀🔥 🎭👑By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios
  • �THE SHIVA CONVERGENCE🧐OSAMA,  HUSH, PLANKTON, MOJO JOJO CONSPIRACY 🔥💀  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 133Y/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐 💀🔥 🎭👑�💀  🤡 🧐 💀🔥 🎭👑By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios🔥🌌😈💥
  • �THE SPORTMASTER’S TRAINING GROUNDS🧐OSAMA,  HUSH, PLANKTON, MOJO JOJO CONSPIRACY 🔥💀  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 136WY/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐 💀🔥 🎭👑�💀  🤡 🧐 💀🔥 🎭👑By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios🔥🌌😈💥
  • �THE STALINIST SUPREMACY 🧐OSAMA,  HUSH, PLANKTON, MOJO JOJO CONSPIRACY 🔥💀  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA 🤣PRESENT: “Hinterfozzige Janelle Sauron’s Fetisch-Imperium – Episode 133Y/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” 🤡 POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT 😘👯‍♂️💃 FOTZEN FRITZ VERSION GRATIS 🧐 💀🔥 🎭👑�💀  🤡 🧐 💀🔥 🎭👑By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios🔥🌌😈💥

Follow Us

Web Analytics Made Easy - StatCounter

Spam Blocked

1,251 spam blocked by Akismet

Tags

ANGELA MERKEL - IM ERIKA AUSCHWITZ LEUGNER BANANENREPUBLIK BEATE PORTEN bernd michael pulch bernd pulch berndpulch.com Bernd Pulch und Martin Sachs closed fonds CYBERMOBBING cyberstasi das das investment das investment magazin das original DIE BEWERTUNG DR RAINER ZITELMANN ebizz.tv EHEPAAR BEATE UND THOMAS PORTEN EHRENFRIED STELZER ERICH MIELKE fermé fonds Fonds GERD BENNEWIRTZ geschlossene fonds GLYKOL GOMOPA GOMOPA4KIDS GOMOPA IM ILLEGAL immobilien INVESTMENT investment magazin investment magazin qu'original IZ BESITZER JAN MUCHA JOCHEN RESCH KGB KLAUS MAURISCHAT KOMPLIZEN KORRUPTE JOURNALISTEN KORRUPTE JURISTEN magister bernd pulch magister pulch MANFRED RESCH MOBBING MORD offene fonds ottmar knoll PETER EHLERS PULCH que original rainer zitelmann RA RESCH RESCH RUFMOERDER sjb STAATSANWAELTIN BEATE PORTEN Staatsanwalt STALKER stasi STASI-BRAUT STASI-JUSTIZ STASI-MORD STASI geheim: Die zentrale Hinrichtungsstätte in Leipzig - Der Film STASI HINRICHTUNG stasi im stefan schramm SVEN SCHMIDT THOMAS PORTEN THOMAS PROMNY TOXDAT Vetternwirtschaft VIDEO - DIE ENTTARNTEN STASI-SPIONE which original

Follow Us

                • Telegram

                RSS Unknown Feed

                • An error has occurred; the feed is probably down. Try again later.
                • Subscribe Subscribed
                  • Bernd Pulch
                  • Join 383 other subscribers
                  • Already have a WordPress.com account? Log in now.
                  • Bernd Pulch
                  • Subscribe Subscribed
                  • Sign up
                  • Log in
                  • Report this content
                  • View site in Reader
                  • Manage subscriptions
                  • Collapse this bar
                 

                Loading Comments...
                 

                You must be logged in to post a comment.

                  Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
                  To find out more, including how to control cookies, see here: Cookie Policy
                  %d