Skip to content
Bernd Pulch Unknown's avatar

Bernd Pulch

The official Website of Bernd Pulch. Since 2009 providing critical insights and political Satire on lawfare, media control, and political reality. Avoid fake sites.

  • CREDO: FREEDOM, HUMAN RIGHTS, PEACE AND A DEMOCRATIC SOCIETY NEED INVESTIGATIVE JOURNALISM
  • ABOUT ME
  • FREEDOM
  • JOURNALISM
  • MURDER OF JOURNALISTS AND TRUTHSEEKERS
  • MURDER AND EXECUTIONS
  • NUCLEAR WAR
  • TOP SECRET
  • TOXDAT
  • CONSPIRACY PRACTICE
  • CYBER-STASI
  • STASI
  • STASI NAMES-STASI NAMEN
  • ANGELA MERKEL – IM ERIKA
  • A-Z- 2.000 STASI โ€“ OFFIZIERE IM BESONDEREN EINSATZ โ€“ OibE โ€“ โ€œSCHLร„FERLISTE DER STASI IN WESTDEUTSCHLANDโ€- STASI-SLEEPER LIST A-Z
  • FINANCE INDUSTRY
  • BILDERBERG
  • FINANCIAL DISCLOSURE
  • CORRUPTION
  • BILLIONAIRES, “PHILANTHROPS”, THE GOOD CLUB
  • BILL GATES, BILL & MELINDA GATES FOUNDATION,
  • JEFFREY EPSTEIN
  • WEF
  • THE SECRET LIST OF Off-SHORE-COMPANIES, PERSONS AND ADRESSES
  • INTELLIGENCE
  • FSB
  • GRU
  • KGB
  • KGB SPIES NAMES
  • NORTH KOREA
  • CHINA
  • NAZI
  • THE NATIONAL SECURITY AGENCY (NSA)
  • CYBERCRIME
  • BDVP-Cottbus
  • BDVP-Dresden
  • BDVP-Frankfurt/Oder
  • BDVP-Gera
  • BDVP-Erfurt
  • BDVP-Halle
  • BDVP-Karl-Marx-Stadt
  • BDVP-Leipzig
  • BDVP-Magdeburg
  • BDVP- Neubrandenburg
  • BDVP- Potsdam
  • BDVP- Rostock
  • BDVP- Schwerin
  • BDVP- Suhl
  • HSDVP-KARL-LIEBKNECHT
  • COVID19
  • DOCUMENTARY
  • VIDEO
  • COMEDY
  • MOVIES
  • FEATURE FILM
  • NEWS
  • MEDIA MEMBERS Of PROJECT-SYNDICATE.ORG FINANCED BY GATES, SOROS, ZEIT ETC โ€“ ORIGINAL DOCUMENT
  • MOON – UNIFICATION CHURCH
  • CONTRACT BETWEEN EU & MODERNA
  • CONTRACT BETWEEN EU & ASTRA ZENECA
  • CONTRACT BETWEEN EU & PFIZER/BIONTECH
  • MYSTERIOUS PAYMENTS TO FAMILY OF EU HEALTH COMMISSIONER KYRIAKIDES
  • U.S. AIR FORCE – POSTCOVID19 WORLD SCENARIOS
  • CIA OPERATION MOCKINGBIRD
  • INDIAN LAWYERS’ BAR ACCUSE BILL GATES, FAUCI, WHO ET AL TO HEAD CRIMINAL CONSPIRACY
  • ID2020
  • HOUSE REPUBLICANS INVESTIGATION REPORT ON ORIGINS OF COVID19 IN WUHAN
  • EXPOSED โ€“ ย Documents From His FOUNDATION Show Bill Gates Has Given $319 Million to Media Outlets
  • CONTACT

Tag: Nsa Leak

NSA nimmt wohl auch deutsche Putin-Freunde, Hiwis, Financiers, Sponsoren und Media-Kunden in Ueberwachung

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Nach Informationen aus dem Umkreis der NSA werden nunmehr wohl alle deutschen Putin-Unterstuetzer erfasst und beleuchtet.

Anlass ist das Wirken von Ex-Kanzler Gerhard Schroeder fuer Putin und die Mueller Untersuchung der Russland Kontakte von Trump.

Putin war selbst in der DDR lange Jahre taetig

Hierzu zaehlen die Linke, alle dieser Gruppierung zuzuordnenden Unternehmen, alle ehemaligen KGB- und STASI-Agenten und STASI-IM und deren Unternehmen und Beteiligungsgesellschaften.

Hinzu kommen deren Kunden, Finanziers und Sponsoren.

Dies betrift wohl insbesondere “Neues Deutschland”, und “GoMoPa”, als auch die mutmasslich unterwanderten “Das Investment” und  “Immobilien Zeitung” sowie “Die Bewertung” berichten die Washington-Insider, die auch von verstaerkten militaerischen Konflikten weltweit ausgehen.

Deutschland als wichtiges NATO-Land neben den USA und mit der DDR-Historie gilt als besonders wichtig und kritisch  fuer die NSA-Analysen.

Die betroffenen Unternehmen und Personen muessen mit Sanktionen und internationalen FBI-Haftbefehlen wie im Fall der FIFA fuer die mutmasslich korrupte WM-Vergabe an Putins Russland rechnen, die auch in der Schweiz vollstreckt wurden.

Go back

Your message has been sent

Warning
Warning
Warning
Warning

Warning.

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, PULCH, PUTIN, THE NATIONAL SECURITY AGENCY (NSA) April 14, 2018June 12, 2021 1 Minute

Exclusive Breaking News – The NSA Sets Up New Cyber Center – TOP SECRET – Original Plans and Photos

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Go back

Your message has been sent

Warning
Warning
Warning
Warning

Warning.

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, CRYPTOME, PUTIN, THE NATIONAL SECURITY AGENCY (NSA), TOP SECRET September 21, 2017June 13, 2021 1 Minute

Insider – NSA erfasst deutsche Putin-Freunde, Hiwis, Financiers, Sponsoren und Media-Kunden

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Nach Informationen aus dem Umkreis der NSA werden nunmehr alle deutschen Putin-Unterstuetzer erfasst und beleuchtet.

Anlass ist das Wirken von Ex-Kanzler Gerhard Schroeder fuer Putin.

Putin war selbst in der DDR lange Jahre taetig

Hierzu zaehlen die Linke, alle dieser Gruppierung zuzuordnenden Unternehmen, alle ehemaligen KGB- und STASI-Agenten und STASI-IM und deren Unternehmen und Beteiligungsgesellschaften.

Hinzu kommen deren Kunden, Finanziers und Sponsoren.

Dies betrift wohl insbesondere “Neues Deutschland”, und “GoMoPa”, als auch die mutmasslich unterwanderten “Das Investment” und  “Immobilien Zeitung” sowie “Die Bewertung” berichten die Washington-Insider, die auch von verstaerkten militaerischen Konflikten weltweit ausgehen.

Deutschland als wichtiges NATO-Land neben den USA und mit der DDR-Historie gilt als besonders wichtig und kritisch  fuer die NSA-Analysen.

Die betroffenen Unternehmen und Personen muessen mit Sanktionen und internationalen FBI-Haftbefehlen wie im Fall der FIFA fuer die mutmasslich korrupte WM-Vergabe an Putins Russland rechnen, die auch in der Schweiz vollstreckt wurden.

Go back

Your message has been sent

Warning
Warning
Warning
Warning

Warning.

 

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, COMMUNISTS, CONFIDENTIAL, GOMOPA, GOMOPA IM, GOMOPA UND IMMOBILIENZEITUNG, GOMOPA-IZ-CONNECTION, PULCH, THE NATIONAL SECURITY AGENCY (NSA) September 6, 2017June 14, 2021 1 Minute

Leaks Unlimited – With NSA contractor Martin arrested, other leakers may still be at large

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Earlier this month we learned the name of a second person who stole top secret documents from the US National Security Agency (NSA). After Edward Snowden admitted doing so publicly in June 2013, the FBI has now arrested the 51-year old Harold T. Martin III at his home in Maryland.

Martin hoarded lots of classified documents, not only from NSA but also from a number of other military and intelligence agencies. The FBI is still comparing them with those from the recent Shadow Brokers leak and a range of other NSA leaks from the past few years, but given what’s known now, it seems likely that at least one other leaker is still at large.


The house of Harold T. Martin III in Glen Burnie, Maryland
(photo: Jose Luis Magana/The Associated Press)

The New York Times reported that when the FBI raided Martin’s house on August 27, they found paper documents and many terabytes of highly classified information, even going back the 1990s. At least six documents were from 2014. It was reported that Martin first took the classified documents on paper, later on CDs and more recently on thumb drives.

The reason why Harold Martin brought home and stored such large numbers of top secret documents isn’t yet clarified. One suggestion is that he may have used them forresearch for his dissertation about “new methods for remote analysis of heterogeneous & cloud computing architectures”, which he was working on at the University of Maryland.

Documents from multiple agencies

It should be noted that not everything Martin stole comes from NSA. In the official charges there are no names of the agencies where the documents come from, they are only described as highly classified, including ones that are marked as Top Secret and Sensitive Compartmented Information (SCI).

> See also: The US Classification System

With the documents going back to the 1990s, he may well have started hoarding them from the places where he worked in those days. From 1987 to 2000, Martin served at the US Navy, achieving the rank of lieutenant, but he left active duty in 1992.

As the Washington Post found out, he then took a variety of tech jobs with government contractors, like at Computer Sciences Corp. (CSC) somewhere in the 1990s and later, until 2009, at Tenacity Solutions, for which he worked at the Office of the Director of National Intelligence (ODNI).

In 2009, Harold Martin started to work for Booz Allen Hamilton, for which he was a contractor at NSA from 2012 to 2015, when Booz transferred him to the Pentagonโ€™s Office of Acquisition, Technology and Logistics (AT&L), which is responsible for often highly sensitive and classified procurement programs. There he stayed until the moment of his arrest last August.

Officials have meanwhile said that Martin took classified documents not only from NSA, but also from his other workplaces, including ODNI and AT&L.

It’s interesting as well that in the charges against Martin, a whole paragraph is dedicated to the at least six documents from 2014, which are described as being produced “through sensitive government sources, methods, and capabilities”. As signals intelligence is traditionally seen as the most sensitive capability, maybe just these six documents are from NSA.


The building of the Office of the Director of National Intelligence (ODNI)
where Harold Martin worked as a contractor before 2009
(photo: Microsoft, via Cryptome.org – click to enlarge)

Shadow Brokers investigation

After the “Shadow Brokers” disclosed a large set of secret NSA hacking tools last August, the FBI began investigating this leak. At the same time there was a lot of speculation: was NSA hacked from the outside? Had an NSA hacker been sloppy? Were the tools leaked by an insider? Maybe the same insider responsible for earlier leaks that hadn’t been attributed to Snowden?

> See also: Is the Shadow Brokers leak the latest in a series?

On September 22, it was reported that during the FBI investigation, NSA officials had said that a former agency operative had carelessly left the hacking tool files available on a remote computer, where Russian hackers found them. If that’s correct, then it seems likely that the FBI traced Harold Martin when they were looking for that careless NSA hacker. It has not yet been confirmed that Martin was that person though.

Harold Martin was working at NSA’s hacking division TAO around the time when the tools were considered to be left exposed, somewhere after October 18, 2013, but a former TAO hacker told the Washington Post that Martin “worked in the unitโ€™s front office carrying out support roles such as setting up accounts, not conducting actual operations.”

Even if Martin was the man who left the hacking tools exposed, then we still don’t know who found them and published them under the name Shadow Brokers. It’s not very likely that this was done by Martin himself, as Shadow Brokers published additional messages on August 28, October 1 and October 15, when he was already in custody. The actual publication can therefore be the work of for example Russian, Iranian or North Korean hackers or even independent hacktivists.

Other sources?

Could Harold Martin also be the source of earlier leaks, that were not attributed to Edward Snowden? In theory he could have been that “second source” next to Snowden: none of these other leaked documents (like the TAO catalog, XKEYSCORE code, tasking lists and end reports) are newer than 2015, when Martin left NSA. Contrary to this Martin is described as very patriotic, which doesn’t fit the fact that these particular leaks were clearly meant to harm and embarrass the US and NSA.

> See also: Leaked documents that were not attributed to Snowden

Also, Martin hasn’t (yet) been charged with espionage or the attempt to provide classified information to a third party or a foreign government – which doesn’t seem something the US government would leave out or keep secret after the recent and unprecedented statement in which the Office of the Director of National Intelligence accused Russia of hacking the Democratic National Committee (DNC) and other political organizations.

Should the FBI investigation confirm that Harold Martin was only responsible for leaking the NSA hacking tools (after which unknown others published them) and that none of his documents were provided to foreign intelligence agencies or showed up in the earlier revelations, then there’s most likely yet another leaker from inside NSA.

The Shadow Brokers leak standing alone and not related to the earlier non-Snowden leaks is of some importance, because only among the stuff published by the Shadow Brokers there are files with a date (October 18, 2013) after the day that Snowden left NSA (May 20, 2013).

This means that when Harold Martin is the initial source of the Shadow Brokers files, we can no longer exclude the possibility that the earlier leaks do come from the Snowden trove. If that would be the case, then someone with access to them went rogue and had them published on his own account. But it should also be noted that both Glenn Greenwald and Bruce Schneier explicitly said that some of these leaked documents did not come from Snowden.

The more likely option is therefore that there’s still another leaker at large, someone with a more evil intent than Harold Martin and Edward Snowden – a conclusion which is not very comforting and which also raises questions about NSA’s internal security…


Some NSA buildings at the Friendship Annex (FANX) complex near Baltimore
(photo: live.com, via Cryptome.org – click to enlarge)

NSA’s internal security measures

The NSA’s hacking division TAO, where Harold Martin worked for some time, isapparently not located in the well-known NSA headquarters building at Fort Meade, but in one or more leased office buildings outside, one of them at an office complex calledFriendship Annex (FANX) near Baltimore. TAO also has units at NSA’s four Cryptologic Centers across the US.

Entrance to the highly secured TAO headquarters building is strictly controlled: one has to go through an imposing steel door, protected by armed guards, and entrance is only possible after entering a six-digit code and passing a retinal scanner to ensure that only specially cleared individuals are allowed in.

Such security measures are more aimed at keeping outsiders out, than at insiders in. And when it comes to finding inside moles of hostile foreign intelligence agencies, the NSA is also said to have a rather bad track record. The Manning and Snowden leaks made NSA painfully aware of this and so preventive insider-threat detection programs were put in place.

It’s not clear whether these new systems failed in the case of Harold Martin, or that they simply weren’t yet implemented at the TAO location where he worked – anti-leak software that was designed by Raytheon to “spot attempts by unauthorized people to access or download data” was also not yet installed at the NSA facility in Hawaii when Snowden was working there.

Tracking what employees are doing inside is one thing, checking what they take out is another. But according to The Washington Post, the NSA (like other agencies) does notimpose universal checks of personnel and their belongings as they enter and leave agency buildings. Security guards only conduct random checks and use their discretion in order to keep en build the trust of the employees.

“If you have a bag full of stuff, youโ€™re probably going to get stopped” said a former TAO operator to the Post, but, in general, “Disneyland has more physical security checks than we had”. Additionally, NSA facilities will have detection gates, but it seems that it was easier for Snowden to walk out with his thousands of documents than many would have thought.

As former NSA general counsel Rajesh De explained, it is unlikely “youโ€™re going to be able to stop every incident of somebody taking documents if theyโ€™re determined to do so. But the real question is how quickly can you detect it, how quickly can you mitigate the harm of any such incident.”


An old sign inside the NSA headquarters building
showing what kind of items are not allowed in.
(screenshot from a documentary about NSA)

Conclusion

Harold Martin stole a lot of classified documents from multiple military and intelligence agencies where he worked over the past 20 years, with maybe just a small number from NSA. The still ongoing FBI investigation has to make clear whether Martin was responsible for exposing the TAO hacking tools.

If not, then there has to be yet another careless NSA employee, but then it’s also still possible that the hacking tools came from a source responsible for a range of earlier leaks. So far it seems that Martin isn’t the source of those earlier leaks, which means that the so-called “second source” is still at large.

The case of Harold Martin also made clear that security measures at NSA, and other US agencies, were not as strict and tight as outsiders would have expected: even for someone without a strong ideological or financial drive like Martin it was apparently not that difficult to regularly walk out with top secret documents.

Many things have not yet been confirmed or clarified, but at least the Shadow Brokers leak and the subsquent arrest of Harold Martin created more awareness among the American public of the fact that there have been more leaks than just those from Snowden.

In August 2014, Bruce Schneier was probably one of the first who identified a second and a third leaker besides Snowden. Many more similar leaks followed and a full listof them was compiled on this weblog in December 2015 (still being updated). As an excerpt of this listing, a short overview of the most important non-Snowden leaks was published in The New York Times last week.

UPDATE:
Shortly after this blog posting was published, The New York Times came with a new report saying that the volume of classified documents Harold Martin had in his possesion is larger than those stolen by Edward Snowden and even than those of the Panama Papers from 2015.
FBI investigators apparently also found that the TAO hacking tools were among Martin’s documents, but because he is not very cooperative, it is still not clear how they came in the hands of the mysterious Shadow Brokers, who subsequently published them. So far there’s no evidence that Martin was hacked or that he sold information.
He seems to have hoarded all these documents in order to get better at his job, as he is described as someone who imagined himself a top spy and an important player in the world of digital espionage.

On Thursday, October 20, government lawyers said they would prosecute Harold Martin under the Espionage Act because of stealing classified information. The FBI found the huge amount of 50 terabytes of data at his home, but it is not yet clear how much of that is classified. Also foundwere “hard-copy documents that were seized from various locations during the search that comprise six full bankersโ€™ boxes worth of documents” with “Many of the documents marked โ€˜Secretโ€™ and โ€˜Top Secret,โ€™ also bear special handling caveats. The information stolen by the Defendant also appears to include the personal information of government employees”.

Links and Sources

– John Schindler: Itโ€™s Time to Rename NSA the National INsecurity Agency
– The Washington Post: NSA contractor thought to have taken classified material the old-fashioned way
– Daily Beast: Democrats Say WikiLeaks Is a Russian Front, U.S. Intelligence Isnโ€™t So Sure
– Defense One: Data-Theft Arrest Shows that Insider Threat Remains Despite Post-Snowden Security Improvements
– John Schindler: Has the Russian Mole inside NSA finally been arrested?
– New York Times: N.S.A. Suspect Is a Hoarder. But a Leaker? Investigators Arenโ€™t Sure.
– The Cipher Brief: First on The Cipher Brief: Snowden’s Boss Shares Lessons Learned

Go back

Your message has been sent

Warning
Warning
Warning
Warning

Warning.

Leak Detection, Leak Down Test, Leak Down Tester, Leak Detector, Leak Definition, Leak In Spanish, Leak Detection Pump, Leak Seal, Leak Stopper, Leakforums, Leak And Sons Funeral Home, Leak Alarm, Leak Ap Gov, Leak Amniotic Fluid, Leak Alert, Leak Around Chimney, Leake And Watts, Leek And Potato Soup, Leaked Albums, Leak At Water Meter, Leak B Gone, Leak Bros, Leak Barrier, Leak Base, Leak Bali, Leak Barrier Ms300, Leak Busters, Leak Behind Shower, Leak Behind Wall, Leak Before Break, Leak Channels, Leakcanary, Leak Crossword Clue, Leak Check, Leak Channels Definition, Leak Controller, Leak Code, Leak Catcher, Leak City, Leak Ceiling, Leak Detection, Leak Down Test, Leak Down Tester, Leak Detector, Leak Definition, Leak Detection Pump, Leak Detection Equipment, Leak Doctor, Leak Definition Government, Leak Defense System, Leak Ender 2000, Leak En Espanol, Leak Eliminators, Leaked Early, Leak Electric, Leak Experts, Leak En Francais, Leak Early Album, Leak Exhaust, Leak Emoji, Leakforums, Leak Freeze, Leek Food, Leak Finders, Leak Fix, Leakfrog, Leak Fixer, Leak Fix Spray, Leaked Forms, Leak Famous.com, Leak Gopher, Leak Guard, Leak Gif, Leak Geeks, Leak Guard Protection, Leaky Gut, Leak Garbage Disposal, Leak Guardian, Leak Girl, Leak Gopher Vs Fortrezz, Leak Heart Valve, Leak House Of Cards, Leak Hunters, Leak Hack, Leak Hose, Leek Hustle, Leak House Of Cards Season 5, Leak Head Gasket, Leek Hunting, Leek Herb, Leak In Spanish, Leak In Ceiling, Leak In Roof, Leak In Radiator, Leak In Basement, Leak In Pool, Leak In Tire, Leak In Basement Wall, Leak In The Boat, Leak In Heart, Leek Jack, Leak Jones, Leak Jet, Leak Jokes, Leak Jacob, Leek Jack Campus Girl, Leek Jack Lyrics, Leak Journalism, Leak James Comey, Leek Jack Age, Leak Kingdom, Leak King, Leak Kitchen Faucet, Leek Knife, Leak Kitchen Sink, Leak Kanseng, Leak Kitchen Sink Drain, Leak Khan Bombak Sne, Leak K Channels, Leaky Kohler Faucet, Leak Lock, Leak Live, Leak Like A Siv, Leak Locators, Leak Less, Leak Like A Sieve, Leak Location Services, Leak Light, Leak Lock Sds, Leak League Of Legends, Leak Meaning, Leak Masters, Leak Memory Chapel, Leak Meme, Lake Mead, Leak Music, Leak Master Roofing, Leak Movie, Leak Memorial, Leak Meaning In Hindi, Leak No More, Leak News, Leak No More For Dogs, Leak Nutrition, Leak Near Me, Leak No More Reviews, Leak No More York Pa, Leak Near Water Meter, Leaked Nsa, Leak No Stallin, Leak Off Test, Leak Out, Leak Oil, Leak Of Information, Leek Onion, Leak On Ceiling, Leak Of Orange Is The New Black, Leak On Roof, Leak Out Meaning, Leak Or Leakage, Leak Project, Leak Proof Underwear, Leak Proof, Leak Proof Travel Bottles, Leak Proof Containers, Leek Plant, Leak Proof Tape, Leak Proof Water Bottle, Leak Proof Bag, Leak Project Youtube, Leak Quotes, Leek Quiche, Leak Quizlet, Leek Quiche Recipes, Leek Quinoa, Leek Quiche Bacon, Leek Quiche Healthy, Leek Quiche Crustless, Leek Quiche Epicurious, Leek Quiche Allrecipes, Leak Repair, Leak Repair Tape, Leak Rate Calculator, Leak Rate, Leak Reddit, Leek Recipes, Leak Rate Units, Leak Rate Conversion, Leak Repair Spray, Leak Repair Putty, Leek Soup, Leak Seal, Leak Stopper, Leak Synonym, Leak Stop, Leak Sealer, Leek Spin, Leak Seal Tape, Leak Squad, Leak Source, Leak Test, Leak Tape, Leak Tester, Leak Threads, Leak Tamer, Leak Tech, Leak Tec, Leak Tools, Leak Test Solution, Leak Tracing Powder, Leak Under Sink, Leak Under Car, Leak Urine, Leak Under Toilet, Leak Under Slab, Leak Under Bathroom Floor, Leak Under Dishwasher, Leak Under Washer, Leak Under Toilet Tank, Leak Under House, Leak Video, Leek Vegetable, Leak Valve, Leak Veggie, Leek Veggie, Leek Vs Onion, Leek Vs Scallion, Leek Vegetable Soup, Leak Vrf To Global, Leak Or Leakage, Leak Wizard, Leak Water, Leak Website, Leak Wall House Rockingham Nc, Leak Week, Leaked White House, Leaked Winner, Leak Washington Post, Leak Water Heater, Leak Wrap, Leak Xenforo, Leak Xur, Leak Xbox One, Leak Xur 3 April, Leak You, Leak Your Ex, Leak Youtube, Leak Your Number, Leak Year, Leak You Up And Down, Leak Young Og Project, Leak Leaky, Leak Make Your Future Bleak, Liveleak Youtube, Leak Zip, Leak Z10, Leak Z4, Leak Zelda, Leak Zimbabwe, Leak Zhang Ziyi, Leak Zelda Wii U, Leak Zombies, Zircon Leak Alert, Zero Leak Gold,ย Nsa Jobs, Nsa Director, Nsa Softball, Nsa Meaning, Nsa Careers, Nsa Definition, Nsa Headquarters, Nsa Surveillance, Nsa Spying, Nsa Internships, Nsa Acronym, Nsa Address, Nsa Advisor, Nsa Agent, Nsa Alabama, Nsa Annapolis, Nsa Agent Salary, Nsa Arc, Nsa Approved Shredders, Nsa Agreement, Nsa Building, Nsa Bahrain, Nsa Budget, Nsa Bethesda, Nsa Baseball, Nsa Badge, Nsa Benefits, Nsa Building Nyc, Nsa Budget 2016, Nsa Backdoor, Nsa Careers, Nsa Chief, Nsa Colorado, Nsa Crane, Nsa Cyber Security, Nsa Conference, Nsa Csfc, Nsa Cae, Nsa Crypto Challenge, Nsa Css, Nsa Director, Nsa Definition, Nsa Data Center, Nsa Day Of Cyber, Nsa Director Salary, Nsa Data Collection, Nsa Domestic Surveillance, Nsa Datasheet, Nsa Deputy Director, Nsa Datasheet Is Called, Nsa Employment, Nsa Edward Snowden, Nsa Exploits, Nsa Employees, Nsa Email, Nsa Evaluated Products List, Nsa Echelon, Nsa Emblem, Nsa Encryption, Nsa Eternal Blue, Nsa Fastpitch, Nsa Florida Youth, Nsa Fort Meade, Nsa Flynn, Nsa Florida, Nsa Friend, Nsa Facebook, Nsa Fort Gordon, Nsa Foia, Nsa Facts, Nsa Georgia, Nsa Glassdoor, Nsa Government, Nsa Grindr, Nsa Github, Nsa Gift Shop, Nsa Game, Nsa Grants, Nsa Gif, Nsa Guy, Nsa Headquarters, Nsa Head, Nsa Hacking Tools, Nsa Hawaii, Nsa Hampton Roads, Nsa Hacked, Nsa History, Nsa Hiring Process, Nsa Hacking Tools Leaked, Nsa Headquarters Address, Nsa Internships, Nsa Industries, Nsa Intelligence Analyst, Nsa Indiana, Nsa Influence 2017, Nsa Iad, Nsa Ias 2017, Nsa India, Nsa Illinois, Nsa Insurance, Nsa Jobs, Nsa Juice Plus, Nsa Job Openings, Nsa Jobs Utah, Nsa Jobs Salary, Nsa Jokes, Nsa Job Requirements, Nsa Jurisdiction, Nsa Jobs In Md, Nsa Japan, Nsa Keywords, Nsa Kunia, Nsa Kc, Nsa Key, Nsa Kentucky, Nsa Kmi, Nsa Kankakee, Nsa Korea, Nsa Kaspersky, Nsa Keith Alexander, Nsa Leaker, Nsa Logo, Nsa Leak, Nsa Locations, Nsa Listening, Nsa Leader, Nsa Login, Nsa Leadership, Nsa Language Analyst, Nsa Leaked Tools, Nsa Meaning, Nsa Meme, Nsa Media, Nsa Meet, Nsa Mid South, Nsa Mike Rogers, Nsa Museum, Nsa Mcmaster, Nsa Maryland, Nsa Mission Statement, Nsa News, Nsa Naples, Nsa Name Generator, Nsa North, Nsa Number, Nsa Norfolk, Nsa Nyc, Nsa Nashville, Nsa Nursing, Nsa New Orleans, Nsa Orlando, Nsa Opm Test, Nsa Online Test, Nsa Offices, Nsa Obama, Nsa Organization, Nsa Operational Interview, Nsa Only, Nsa Org Chart, Nsa Of 1947, Nsa Prism, Nsa Police, Nsa Panama City, Nsa Police Officer, Nsa Phone Number, Nsa Philadelphia, Nsa Pay Scale, Nsa Play, Nsa Polygraph, Nsa Purpose, Nsa Quantum Computer, Nsa Quotes, Nsa Qualifications, Nsa Quantum, Nsa Quizlet, Nsa Questions, Nsa Qualifier, Nsa Quantum Computer Farm, Nsa Quartet, Nsa Quiz, Nsa Rogers, Nsa Requirements, Nsa Rules, Nsa Recruiting, Nsa Relationship, Nsa Rule Book, Nsa Ransomware, Nsa Russia, Nsa Responsibilities, Nsa Reno, Nsa Softball, Nsa Surveillance, Nsa Spying, Nsa Slang, Nsa Salary, Nsa Stands For, Nsa Soccer, Nsa Softball Rules, Nsa Scholarship, Nsa Scandal, Nsa Texas, Nsa Tournaments, Nsa Tools, Nsa Trump, Nsa Tao, Nsa Tools Leaked, Nsa Twitter, Nsa Tinder, Nsa Test, Nsa Training, Nsa Utah, Nsa Urban, Nsa Usa, Nsa Utah Facility, Nsa Unmasking, Nsa Utah Jobs, Nsa Unconstitutional, Nsa Umpire, Nsa Under Obama, Nsa Uniform, Nsa Vs Cia, Nsa Visitor Center, Nsa Virginia, Nsa Vs Fbi, Nsa Vs Cia Vs Fbi, Nsa Virus, Nsa Visitor Control Center, Nsa Vpn, Nsa Vanilla, Nsa Violation Of Privacy, Nsa Wiki, Nsa Whistleblower, Nsa Washington, Nsa Wiretapping, Nsa Website, Nsa Water Filter, Nsa Watchlist, Nsa World Series, Nsa Wikileaks, Nsa Wannacry, Nsa Xkeyscore, Nsa Xbox One, Nsa Xeno World Qualifier, Nsa Xkeyscore Download, Nsa Xcode, Nsa Xbox Live, Nsa Xeno Tournament, Nsa Xkeyscore Presentation, Nsa X, Nsa X Files, Nsa Youtube, Nsa Yogurt, Nsa Young Investigator Grant, Nsa Youth Florida, Nsa Yearly Budget, Nsa Yottabyte, Nsa Youth Program, Nsa Youth, Nsa Yellow Dots, Nsa Yakima, Nsa Zero Day, Nsa Zip Code, Nsa Zeus, Nsa Zimmermann Telegram, Nsa Zimbabwe, Nsa Za, Nsa Zero Day Exploit, Nsa Zyxel, Nsa Zero Division, Nsa Zone Store

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, CRYPTOME, THE NATIONAL SECURITY AGENCY (NSA), WIKILEAKS October 25, 2016June 21, 2021 15 Minutes

Cryptome – Germany Outlaws NSA Xkeyscore, Orders Data Axed

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Click to access de-nixes-xkeyscore-netzpolitik-16-0902.pdf

 

Go back

Your message has been sent

Warning
Warning
Warning
Warning

Warning.

Nsa Jobs, Nsa Director, Nsa Softball, Nsa Meaning, Nsa Careers, Nsa Definition, Nsa Headquarters, Nsa Surveillance, Nsa Spying, Nsa Internships, Nsa Acronym, Nsa Address, Nsa Advisor, Nsa Agent, Nsa Alabama, Nsa Annapolis, Nsa Agent Salary, Nsa Arc, Nsa Approved Shredders, Nsa Agreement, Nsa Building, Nsa Bahrain, Nsa Budget, Nsa Bethesda, Nsa Baseball, Nsa Badge, Nsa Benefits, Nsa Building Nyc, Nsa Budget 2016, Nsa Backdoor, Nsa Careers, Nsa Chief, Nsa Colorado, Nsa Crane, Nsa Cyber Security, Nsa Conference, Nsa Csfc, Nsa Cae, Nsa Crypto Challenge, Nsa Css, Nsa Director, Nsa Definition, Nsa Data Center, Nsa Day Of Cyber, Nsa Director Salary, Nsa Data Collection, Nsa Domestic Surveillance, Nsa Datasheet, Nsa Deputy Director, Nsa Datasheet Is Called, Nsa Employment, Nsa Edward Snowden, Nsa Exploits, Nsa Employees, Nsa Email, Nsa Evaluated Products List, Nsa Echelon, Nsa Emblem, Nsa Encryption, Nsa Eternal Blue, Nsa Fastpitch, Nsa Florida Youth, Nsa Fort Meade, Nsa Flynn, Nsa Florida, Nsa Friend, Nsa Facebook, Nsa Fort Gordon, Nsa Foia, Nsa Facts, Nsa Georgia, Nsa Glassdoor, Nsa Government, Nsa Grindr, Nsa Github, Nsa Gift Shop, Nsa Game, Nsa Grants, Nsa Gif, Nsa Guy, Nsa Headquarters, Nsa Head, Nsa Hacking Tools, Nsa Hawaii, Nsa Hampton Roads, Nsa Hacked, Nsa History, Nsa Hiring Process, Nsa Hacking Tools Leaked, Nsa Headquarters Address, Nsa Internships, Nsa Industries, Nsa Intelligence Analyst, Nsa Indiana, Nsa Influence 2017, Nsa Iad, Nsa Ias 2017, Nsa India, Nsa Illinois, Nsa Insurance, Nsa Jobs, Nsa Juice Plus, Nsa Job Openings, Nsa Jobs Utah, Nsa Jobs Salary, Nsa Jokes, Nsa Job Requirements, Nsa Jurisdiction, Nsa Jobs In Md, Nsa Japan, Nsa Keywords, Nsa Kunia, Nsa Kc, Nsa Key, Nsa Kentucky, Nsa Kmi, Nsa Kankakee, Nsa Korea, Nsa Kaspersky, Nsa Keith Alexander, Nsa Leaker, Nsa Logo, Nsa Leak, Nsa Locations, Nsa Listening, Nsa Leader, Nsa Login, Nsa Leadership, Nsa Language Analyst, Nsa Leaked Tools, Nsa Meaning, Nsa Meme, Nsa Media, Nsa Meet, Nsa Mid South, Nsa Mike Rogers, Nsa Museum, Nsa Mcmaster, Nsa Maryland, Nsa Mission Statement, Nsa News, Nsa Naples, Nsa Name Generator, Nsa North, Nsa Number, Nsa Norfolk, Nsa Nyc, Nsa Nashville, Nsa Nursing, Nsa New Orleans, Nsa Orlando, Nsa Opm Test, Nsa Online Test, Nsa Offices, Nsa Obama, Nsa Organization, Nsa Operational Interview, Nsa Only, Nsa Org Chart, Nsa Of 1947, Nsa Prism, Nsa Police, Nsa Panama City, Nsa Police Officer, Nsa Phone Number, Nsa Philadelphia, Nsa Pay Scale, Nsa Play, Nsa Polygraph, Nsa Purpose, Nsa Quantum Computer, Nsa Quotes, Nsa Qualifications, Nsa Quantum, Nsa Quizlet, Nsa Questions, Nsa Qualifier, Nsa Quantum Computer Farm, Nsa Quartet, Nsa Quiz, Nsa Rogers, Nsa Requirements, Nsa Rules, Nsa Recruiting, Nsa Relationship, Nsa Rule Book, Nsa Ransomware, Nsa Russia, Nsa Responsibilities, Nsa Reno, Nsa Softball, Nsa Surveillance, Nsa Spying, Nsa Slang, Nsa Salary, Nsa Stands For, Nsa Soccer, Nsa Softball Rules, Nsa Scholarship, Nsa Scandal, Nsa Texas, Nsa Tournaments, Nsa Tools, Nsa Trump, Nsa Tao, Nsa Tools Leaked, Nsa Twitter, Nsa Tinder, Nsa Test, Nsa Training, Nsa Utah, Nsa Urban, Nsa Usa, Nsa Utah Facility, Nsa Unmasking, Nsa Utah Jobs, Nsa Unconstitutional, Nsa Umpire, Nsa Under Obama, Nsa Uniform, Nsa Vs Cia, Nsa Visitor Center, Nsa Virginia, Nsa Vs Fbi, Nsa Vs Cia Vs Fbi, Nsa Virus, Nsa Visitor Control Center, Nsa Vpn, Nsa Vanilla, Nsa Violation Of Privacy, Nsa Wiki, Nsa Whistleblower, Nsa Washington, Nsa Wiretapping, Nsa Website, Nsa Water Filter, Nsa Watchlist, Nsa World Series, Nsa Wikileaks, Nsa Wannacry, Nsa Xkeyscore, Nsa Xbox One, Nsa Xeno World Qualifier, Nsa Xkeyscore Download, Nsa Xcode, Nsa Xbox Live, Nsa Xeno Tournament, Nsa Xkeyscore Presentation, Nsa X, Nsa X Files, Nsa Youtube, Nsa Yogurt, Nsa Young Investigator Grant, Nsa Youth Florida, Nsa Yearly Budget, Nsa Yottabyte, Nsa Youth Program, Nsa Youth, Nsa Yellow Dots, Nsa Yakima, Nsa Zero Day, Nsa Zip Code, Nsa Zeus, Nsa Zimmermann Telegram, Nsa Zimbabwe, Nsa Za, Nsa Zero Day Exploit, Nsa Zyxel, Nsa Zero Division, Nsa Zone Store

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, CRYPTOME, THE NATIONAL SECURITY AGENCY (NSA) September 7, 2016June 22, 2021 3 Minutes

Revealed – E-Mails from Inside the NSA Bureaucracy

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Earlier this month, the NSA declassified a huge set of internal e-mails, following FOIA-requests about the issue of whether Edward Snowden had raised concerns about the NSA’s surveillance programs through proper channels inside the agency.

> Download the declassified e-mails (very large pdf)

Here, we will take a look at the administrative details these internal NSA e-mails provide. Next time we will see what their content says about the concerns that Snowden claimed to have raised.


Internal e-mail from NSA director Michael Rogers. In the signature block we see his
NSANet and SIPRNet e-mail addresses and his non-secure phone number (all redacted)
(Click to enlarge – See also: NSA director Alexander’s phones)

E-mail addresses

Except from the classification markings, the NSA’s internal e-mails aren’t very different from those exchanged by most other people around the world. But they do show for example some details about the internal communications networks of the agency.

From the signature blocks underneath the e-mails we learn that, depending on their function and tasks, NSA employees have e-mail addresses for one or more of the following four computer networks:

– NSANet for messages classified up to Top Secret/SCI (Five Eyes signals intelligence). On this network the address format for e-mail is jjdoe@nsa

– JWICS for messages classified up to Top Secret/SCI (US intelligence). The address format is jjdoe@nsa.ic.gov

– SIPRNET for messages classified up to Secret (mainly US military). The address format is jjdoe@nsa.smil.mil

– UNCL for unclassified messages, likely through NIPRNet. The address format is jjdoe@nsa.gov

> See for more: US military and intelligence computer networks

For e-mail, all NSA employees have display names in a standardized format: first comes their family name, given name and middle initial, sometimes followed by “Jr” or a high military rank. Then follows “NSA” and the proper organizational designator, then “USA” for their nationality and finally “CIV” for civilian employees, “CTR” for contractors, “USN” for Navy, “USA” for Army or “USAF” for Air Force members.

Thus, the display name of the current NSA director is “Rogers Michael S ADM NSA-D USA USN”, while that of the previous director was “Alexander Keith B GEN NSA-D USA USA”. In 2012, Snowden had the display name “Snowden Edward J NSA-FHX4 USA CTR”:


E-mail from Snowden as systems administrator in Hawaii, August 2012
The redacted part of the classification marking
seems to hide a dissemination marking *
(Click to enlarge)

The organizational designator FHX4 is interesting. FH stands for Field station Hawaii, but X4, being unit 4 of division X, is still a mystery. The field station divisions have the same designators as those at NSA headquarters, where there’s also a division X, but so far no document gave an indication what it does.

The signature block shows that Snowden worked as a systems administrator for Dell’s Advanced Solutions Group and that he was deployed at the Technology Department of NSA’s Cryptologic Center in Hawaii, more specifically at the Office of Information Sharing. The latter has the organizational designator (F)HT322 and is therefore different from that in Snowden’s display name.

> See the list of NSA’s Organizational Designators

In the declassified messages we only see display names, not the actual e-mail addresses behind them. Therefore, only the classification markings on the messages provide an indication on which network they were exchanged.

From an e-mail that was declassified earlier we know that in April 2013 Snowden used the address “ejsnowd@nsa.ic.gov”, which is the format for the JWICS network, but was apparently used on NSANet.*

From one of the declassified e-mails about NSA’s internal investigation it seems that Snowden had just two mail accounts: “we have his TS [Top Secret] NSANet email and his UNCLASSIFIED NSA.gov email”, but this is followed by some redacted lines.*

Finally, the signature blocks of some NSA employees also provide a link to their dropbox for sending them files that may be too large for e-mail. Such dropboxes have addresses like “http://urn.nsa.ic.gov/dropbox/%5B…%5D”.


Example of an NSA message, with in the signature block e-mail addresses for JWICS and an
unclassified network, and phone numbers for the NSTS and the non-secure phone networks
OPS 2B is the wider and lower one of the two black NSA headquarters buildings
(Click to enlarge)

Telephone numbers

Besides e-mail addresses, many messages also have phone numbers in the signature blocks. They show numbers for one or more of the telephone systems used at NSA:

– NSTS, which stands for National Secure Telephone System and is NSA’s internal telephone network for secure calls. Numbers for this network have the format 969-8765 and are often marked with “(s)” for “secure”

– STE, which stands for Secure Terminal Equipment, being a telephone device capable of encrypting phone calls on its own. Telephone numbers can be written in the format (301) 234-5678 or as STE 9876.

– BLACK, CMCL or Commercial, which are numbers for non-secure telephones that may also access the public telephone network. They have the regular format (301) 234-5678 and are often marked with “(b)” for “black” (as opposed to “red”) or with “(u)” for unclassified.


The NSA/CSS Threat Operations Center (NTOC) at NSA headquarters, with from left to right:
an STE secure phone, a probably non-secure telephone and a phone for the NSTS
(Photo: NSA, 2012 – Click to enlarge)

TIKICUBE

Finally, releasing such a huge set of documents in which many parts had to be redacted always bears the risk that something is overlooked. That also happened this time, as in one e-mail from an investigator from NSA’s Counterintelligence Investigations unit Q311 they forgot to redact the codeword TIKICUBE:

TIKICUBE appears to be a unit of the Investigations Division Q3. Whether this might be a special unit investigating the Snowden leak isn’t clear though.

The abbreviations behind the investigators name are: CFE for Certified Fraud Examiner and CISSP for Certified Information Systems Security Professional.

We also see that this investigation division is not located at the NSA headquarters complex at Fort Meade, but at FANX. This stands for Friendship Annex, a complex of NSA office buildings in Linthicum, near Baltimore, some 12 km. or 7.5 miles north-east of Fort Meade.

The famous blue-black glass headquarters buildings are OPS 2A and OPS 2B, while the SIGINT division is apparently in the flat 3-story building from the late 1950s, designated OPS 1.

Go back

Your message has been sent

Warning
Warning
Warning
Warning

Warning.

 

Nsa Jobs, Nsa Director, Nsa Softball, Nsa Meaning, Nsa Careers, Nsa Definition, Nsa Headquarters, Nsa Surveillance, Nsa Spying, Nsa Internships, Nsa Acronym, Nsa Address, Nsa Advisor, Nsa Agent, Nsa Alabama, Nsa Annapolis, Nsa Agent Salary, Nsa Arc, Nsa Approved Shredders, Nsa Agreement, Nsa Building, Nsa Bahrain, Nsa Budget, Nsa Bethesda, Nsa Baseball, Nsa Badge, Nsa Benefits, Nsa Building Nyc, Nsa Budget 2016, Nsa Backdoor, Nsa Careers, Nsa Chief, Nsa Colorado, Nsa Crane, Nsa Cyber Security, Nsa Conference, Nsa Csfc, Nsa Cae, Nsa Crypto Challenge, Nsa Css, Nsa Director, Nsa Definition, Nsa Data Center, Nsa Day Of Cyber, Nsa Director Salary, Nsa Data Collection, Nsa Domestic Surveillance, Nsa Datasheet, Nsa Deputy Director, Nsa Datasheet Is Called, Nsa Employment, Nsa Edward Snowden, Nsa Exploits, Nsa Employees, Nsa Email, Nsa Evaluated Products List, Nsa Echelon, Nsa Emblem, Nsa Encryption, Nsa Eternal Blue, Nsa Fastpitch, Nsa Florida Youth, Nsa Fort Meade, Nsa Flynn, Nsa Florida, Nsa Friend, Nsa Facebook, Nsa Fort Gordon, Nsa Foia, Nsa Facts, Nsa Georgia, Nsa Glassdoor, Nsa Government, Nsa Grindr, Nsa Github, Nsa Gift Shop, Nsa Game, Nsa Grants, Nsa Gif, Nsa Guy, Nsa Headquarters, Nsa Head, Nsa Hacking Tools, Nsa Hawaii, Nsa Hampton Roads, Nsa Hacked, Nsa History, Nsa Hiring Process, Nsa Hacking Tools Leaked, Nsa Headquarters Address, Nsa Internships, Nsa Industries, Nsa Intelligence Analyst, Nsa Indiana, Nsa Influence 2017, Nsa Iad, Nsa Ias 2017, Nsa India, Nsa Illinois, Nsa Insurance, Nsa Jobs, Nsa Juice Plus, Nsa Job Openings, Nsa Jobs Utah, Nsa Jobs Salary, Nsa Jokes, Nsa Job Requirements, Nsa Jurisdiction, Nsa Jobs In Md, Nsa Japan, Nsa Keywords, Nsa Kunia, Nsa Kc, Nsa Key, Nsa Kentucky, Nsa Kmi, Nsa Kankakee, Nsa Korea, Nsa Kaspersky, Nsa Keith Alexander, Nsa Leaker, Nsa Logo, Nsa Leak, Nsa Locations, Nsa Listening, Nsa Leader, Nsa Login, Nsa Leadership, Nsa Language Analyst, Nsa Leaked Tools, Nsa Meaning, Nsa Meme, Nsa Media, Nsa Meet, Nsa Mid South, Nsa Mike Rogers, Nsa Museum, Nsa Mcmaster, Nsa Maryland, Nsa Mission Statement, Nsa News, Nsa Naples, Nsa Name Generator, Nsa North, Nsa Number, Nsa Norfolk, Nsa Nyc, Nsa Nashville, Nsa Nursing, Nsa New Orleans, Nsa Orlando, Nsa Opm Test, Nsa Online Test, Nsa Offices, Nsa Obama, Nsa Organization, Nsa Operational Interview, Nsa Only, Nsa Org Chart, Nsa Of 1947, Nsa Prism, Nsa Police, Nsa Panama City, Nsa Police Officer, Nsa Phone Number, Nsa Philadelphia, Nsa Pay Scale, Nsa Play, Nsa Polygraph, Nsa Purpose, Nsa Quantum Computer, Nsa Quotes, Nsa Qualifications, Nsa Quantum, Nsa Quizlet, Nsa Questions, Nsa Qualifier, Nsa Quantum Computer Farm, Nsa Quartet, Nsa Quiz, Nsa Rogers, Nsa Requirements, Nsa Rules, Nsa Recruiting, Nsa Relationship, Nsa Rule Book, Nsa Ransomware, Nsa Russia, Nsa Responsibilities, Nsa Reno, Nsa Softball, Nsa Surveillance, Nsa Spying, Nsa Slang, Nsa Salary, Nsa Stands For, Nsa Soccer, Nsa Softball Rules, Nsa Scholarship, Nsa Scandal, Nsa Texas, Nsa Tournaments, Nsa Tools, Nsa Trump, Nsa Tao, Nsa Tools Leaked, Nsa Twitter, Nsa Tinder, Nsa Test, Nsa Training, Nsa Utah, Nsa Urban, Nsa Usa, Nsa Utah Facility, Nsa Unmasking, Nsa Utah Jobs, Nsa Unconstitutional, Nsa Umpire, Nsa Under Obama, Nsa Uniform, Nsa Vs Cia, Nsa Visitor Center, Nsa Virginia, Nsa Vs Fbi, Nsa Vs Cia Vs Fbi, Nsa Virus, Nsa Visitor Control Center, Nsa Vpn, Nsa Vanilla, Nsa Violation Of Privacy, Nsa Wiki, Nsa Whistleblower, Nsa Washington, Nsa Wiretapping, Nsa Website, Nsa Water Filter, Nsa Watchlist, Nsa World Series, Nsa Wikileaks, Nsa Wannacry, Nsa Xkeyscore, Nsa Xbox One, Nsa Xeno World Qualifier, Nsa Xkeyscore Download, Nsa Xcode, Nsa Xbox Live, Nsa Xeno Tournament, Nsa Xkeyscore Presentation, Nsa X, Nsa X Files, Nsa Youtube, Nsa Yogurt, Nsa Young Investigator Grant, Nsa Youth Florida, Nsa Yearly Budget, Nsa Yottabyte, Nsa Youth Program, Nsa Youth, Nsa Yellow Dots, Nsa Yakima, Nsa Zero Day, Nsa Zip Code, Nsa Zeus, Nsa Zimmermann Telegram, Nsa Zimbabwe, Nsa Za, Nsa Zero Day Exploit, Nsa Zyxel, Nsa Zero Division, Nsa Zone Store

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, CONFIDENTIAL, TOP SECRET August 22, 2016June 22, 2021 7 Minutes

NSA – Is the Shadow Brokers leak the latest in a series ?

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Earlier this week, a group or an individual called the Shadow Brokers published a large set of files containing the computer code for hacking tools. They were said to be from the Equation Group, which is considered part of the NSA’s hacking division TAO.

The leak got quite some media attention, but so far it was not related to some earlier leaks of highly sensitive NSA documents. These show interesting similarities with the Shadow Brokers files, which were also not attributed to Edward Snowden, but seem to come from an unknown second source.

Screenshot of some computer code with instructions
from the Shadow Brokers archive

The Shadow Brokers files

Since August 13, the ShadowBrokers posted a manifesto and two large encrypted files on Pastebin, on GitHub, on Tumblr and on DropBox (the latter three closed or deleted meanwhile).

One of the encrypted files could be decrypted into a 301 MB archive containing a large number of computer codes for server side utility scripts and exploits for a variety of targets like firewalls from Cisco, Fortinet and Shaanxi. The files also include different versions of several implants and instructions on how to use them, so they’re not only the malware that could have been found on the internet, but also files that were only used internally.

A full list of the exploits in this Shadow Brokers archive can be found here.

https://musalbas.com/2016/08/16/equation-group-firewall-operations-catalogue.html

Security experts as well as former NSA employees considered the files to be authentic, and earlier today the website The Intercept came with some unpublished Snowden documents that confirm the Shadow Brokers files are real.

Besides the accessible archive, Shadow Brokers also posted a file that is still encrypted, and for which the key would only be provided to the highest bidder in an auction. Would the auction raise 1 million bitcoins (more than 500 million US dollars), then Shadow Brokers said they would release more files to the public. This auction however is likely just meant to attract attention.

Screenshot of a file tree from the Shadow Brokers archive

From the Snowden documents?

According to security experts Bruce Schneier and Nicholas Weaver the new files aren’t from the Snowden trove. Like most people, they apparently assume that Snowden took mostly powerpoint presentations and internal reports and newsletters, but that’s not the whole picture. The Snowden documents also include various kinds of operational data, but this rarely became public.

Most notable was a large set of raw communications content collected by NSA under FISA and FAA authority, which also included incidentally collected data from Americans, as was reported by The Washington Post on July 5, 2014. The Snowden documents also include technical reports, which are often very difficult to understand and rarely provide a newsworthy story on their own.

Someone reminded me as well that in January 2015, the German magazine Der Spiegel published the full computer code of a keylogger implant codenamed QWERTY, which was a component of the NSA’s WARRIORPRIDE malware framework. So with the Snowden trove containing this one piece of computer code, there’s no reason why it should not contain more.

Contradicting the option that the Shadow Brokers files could come from Snowden is the fact that some of the files have timestamps as late as October 18, 2013, which is five months after Snowden left NSA. Timestamps are easy to modify, but if they are authentic, then these files have to be from another source.

A second source?

This brings us to a number of leaks that occured in recent years and which were also not attributed to Snowden. These leaks involved highly sensitive NSA files and were often more embarrassing than stuff from the Snowden documents – for example the catalog of hacking tools and techniques, the fact that chancellor Merkel was targeted and intelligence reports proving that NSA was actually successful at that.

> See Leaked documents that were not attributed to Snowden

It is assumed that these and some other documents came from at least one other leaker, a “second source” besides Snowden, which is something that still not many people are aware of. The files that can be attributed to this second source have some interesting similarities with the Shadow Brokers leak. Like the ANT catalog published in December 2013, they are about hacking tools and like the XKEYSCORE rules published in 2014 and 2015 they are internal NSA computer code.

This alone doesn’t say much, but it’s the choice of the kind of files that makes these leaks look very similar: no fancy presentations, but plain technical data sets that make it possible to identify specific operations and individual targets – the kind of documents many people are most eager to see, but which were rarely provided through the Snowden reporting.

As mainstream media became more cautious in publishing such files, it is possible that someone who also had access to the Snowden cache went rogue and started leaking documents just for harming NSA and the US – without attributing these leaks to Snowden because he would probably not approve them, and also to suggest that more people followed Snowden’s example.

Of course the Shadow Brokers leak can still be unrelated to the earlier ones. In that case it could have been that an NSA hacker mistakenly uploaded his whole toolkit to a server outside the NSA’s secure networks (also called a “staging server” or “redirector” to mask his true location) and that someone was able to grab the files from there – an option Snowden also seems to favor.

Diagram showing the various stages and networks involved
in botnet hacking operations by NSA’s TAO division

An insider?

Meanwhile, several former NSA employees have said that the current Shadow Brokers leak might not be the result of a hack from the outside, but that it’s more likely that the files come from an insider, who stole them like Snowden did earlier.

Of course it’s easier for an insider to grab these files than for a foreign intelligence agency, let alone an ordinary hacker, to steal them from the outside. But if that’s the case, it would mean that this insider would still be able to exfiltrate files from NSA premises (something that shouldn’t be possible anymore after Snowden), and that this insider has the intent to embarrass and harm the NSA (Snowden at least said he just wanted to expose serious wrongdoings).

Here we should keep in mind that such an insider is not necessarily just a frustrated individual, but can also be a mole from a hostile foreign intelligence agency.

Russian intelligence?

On Twitter, Edward Snowden said that “Circumstantial evidence and conventional wisdom indicates Russian responsibility”, but it’s not clear what that evidence should be. It seems he sees this leak as a kind of warning from the Russians not to take revenge for the hack of the Democratic National Committee (DNC) e-mails, which was attributed to Russian intelligence.

This was also what led Bruce Schneier to think it might be the Russians, because who other than a state actor would steal so much data and wait three years before publishing? Not mentioned by Schneier is that this also applies to the documents that can be attributed to the second source: they are also from before June 2013.

A related point of speculation is the text that accompanied the Shadow Brokers files, which is in bad English, as if it was written by a Russian or some other non-western individual. This is probably distraction, as it looks much more like a fluent American/English speaker who tried to imitate unexperienced English.

The text also holds accusations against “Elites”, in a style which very much resembles the language used by anarchist hacker groups, but that can also be faked to distract from the real source.

Screenshot of some file folders from the Shadow Brokers archive

Conclusion

With the authenticity of the Shadow Brokers files being confirmed, the biggest question is: who leaked them? There’s a small chance that it was a stupid accident in which an NSA hacker uploaded his whole toolkit to a non-secure server and someone (Russians?) found it there.

Somewhat more likely seems the option that they came from an insider, and in that case, this leak doesn’t stand alone, but fits into a series of leaks in which, since October 2013, highly sensitive NSA data sets were published.

So almost unnoticed by the mainstream media and the general public, someone was piggybacking on the Snowden-revelations with leaks that were often more embarrassing for NSA than many reportings based upon the documents from Snowden.

Again, obtaining such documents through hacking into highly secured NSA servers seems less likely than the chance that someone from inside the agency took them. If that person was Edward Snowden, then probably someone with access to his documents could have started his own crusade against NSA.

If that person wasn’t Snowden, then it’s either another NSA employee who was disgruntled and frustrated, or a mole for a hostile foreign intelligence agency. For an individual without the protection of the public opinion like Snowden, it must be much harder and riskier to conduct these leaks than for a foreign state actor.

Former NSA counterintelligence officer John Schindler also thinks there could have been a (Russian) mole, as the agency has a rather bad track record in finding such spies. If this scenario is true, then it would be almost an even bigger scandal than that of the Snowden-leaks.

Update:
On August 21, NSA expert James Bamford also confirmed that TAO’s ANT catalog wasn’t included in the Snowden documents (Snowden didn’t want to talk about it publicly though). Bamford favors the option of a second insider, who may have leaked the documents through Jacob Appelbaum and Julian Assange.

Go back

Your message has been sent

Warning
Warning
Warning
Warning

Warning.

Nsa Jobs, Nsa Director, Nsa Softball, Nsa Meaning, Nsa Careers, Nsa Definition, Nsa Headquarters, Nsa Surveillance, Nsa Spying, Nsa Internships, Nsa Acronym, Nsa Address, Nsa Advisor, Nsa Agent, Nsa Alabama, Nsa Annapolis, Nsa Agent Salary, Nsa Arc, Nsa Approved Shredders, Nsa Agreement, Nsa Building, Nsa Bahrain, Nsa Budget, Nsa Bethesda, Nsa Baseball, Nsa Badge, Nsa Benefits, Nsa Building Nyc, Nsa Budget 2016, Nsa Backdoor, Nsa Careers, Nsa Chief, Nsa Colorado, Nsa Crane, Nsa Cyber Security, Nsa Conference, Nsa Csfc, Nsa Cae, Nsa Crypto Challenge, Nsa Css, Nsa Director, Nsa Definition, Nsa Data Center, Nsa Day Of Cyber, Nsa Director Salary, Nsa Data Collection, Nsa Domestic Surveillance, Nsa Datasheet, Nsa Deputy Director, Nsa Datasheet Is Called, Nsa Employment, Nsa Edward Snowden, Nsa Exploits, Nsa Employees, Nsa Email, Nsa Evaluated Products List, Nsa Echelon, Nsa Emblem, Nsa Encryption, Nsa Eternal Blue, Nsa Fastpitch, Nsa Florida Youth, Nsa Fort Meade, Nsa Flynn, Nsa Florida, Nsa Friend, Nsa Facebook, Nsa Fort Gordon, Nsa Foia, Nsa Facts, Nsa Georgia, Nsa Glassdoor, Nsa Government, Nsa Grindr, Nsa Github, Nsa Gift Shop, Nsa Game, Nsa Grants, Nsa Gif, Nsa Guy, Nsa Headquarters, Nsa Head, Nsa Hacking Tools, Nsa Hawaii, Nsa Hampton Roads, Nsa Hacked, Nsa History, Nsa Hiring Process, Nsa Hacking Tools Leaked, Nsa Headquarters Address, Nsa Internships, Nsa Industries, Nsa Intelligence Analyst, Nsa Indiana, Nsa Influence 2017, Nsa Iad, Nsa Ias 2017, Nsa India, Nsa Illinois, Nsa Insurance, Nsa Jobs, Nsa Juice Plus, Nsa Job Openings, Nsa Jobs Utah, Nsa Jobs Salary, Nsa Jokes, Nsa Job Requirements, Nsa Jurisdiction, Nsa Jobs In Md, Nsa Japan, Nsa Keywords, Nsa Kunia, Nsa Kc, Nsa Key, Nsa Kentucky, Nsa Kmi, Nsa Kankakee, Nsa Korea, Nsa Kaspersky, Nsa Keith Alexander, Nsa Leaker, Nsa Logo, Nsa Leak, Nsa Locations, Nsa Listening, Nsa Leader, Nsa Login, Nsa Leadership, Nsa Language Analyst, Nsa Leaked Tools, Nsa Meaning, Nsa Meme, Nsa Media, Nsa Meet, Nsa Mid South, Nsa Mike Rogers, Nsa Museum, Nsa Mcmaster, Nsa Maryland, Nsa Mission Statement, Nsa News, Nsa Naples, Nsa Name Generator, Nsa North, Nsa Number, Nsa Norfolk, Nsa Nyc, Nsa Nashville, Nsa Nursing, Nsa New Orleans, Nsa Orlando, Nsa Opm Test, Nsa Online Test, Nsa Offices, Nsa Obama, Nsa Organization, Nsa Operational Interview, Nsa Only, Nsa Org Chart, Nsa Of 1947, Nsa Prism, Nsa Police, Nsa Panama City, Nsa Police Officer, Nsa Phone Number, Nsa Philadelphia, Nsa Pay Scale, Nsa Play, Nsa Polygraph, Nsa Purpose, Nsa Quantum Computer, Nsa Quotes, Nsa Qualifications, Nsa Quantum, Nsa Quizlet, Nsa Questions, Nsa Qualifier, Nsa Quantum Computer Farm, Nsa Quartet, Nsa Quiz, Nsa Rogers, Nsa Requirements, Nsa Rules, Nsa Recruiting, Nsa Relationship, Nsa Rule Book, Nsa Ransomware, Nsa Russia, Nsa Responsibilities, Nsa Reno, Nsa Softball, Nsa Surveillance, Nsa Spying, Nsa Slang, Nsa Salary, Nsa Stands For, Nsa Soccer, Nsa Softball Rules, Nsa Scholarship, Nsa Scandal, Nsa Texas, Nsa Tournaments, Nsa Tools, Nsa Trump, Nsa Tao, Nsa Tools Leaked, Nsa Twitter, Nsa Tinder, Nsa Test, Nsa Training, Nsa Utah, Nsa Urban, Nsa Usa, Nsa Utah Facility, Nsa Unmasking, Nsa Utah Jobs, Nsa Unconstitutional, Nsa Umpire, Nsa Under Obama, Nsa Uniform, Nsa Vs Cia, Nsa Visitor Center, Nsa Virginia, Nsa Vs Fbi, Nsa Vs Cia Vs Fbi, Nsa Virus, Nsa Visitor Control Center, Nsa Vpn, Nsa Vanilla, Nsa Violation Of Privacy, Nsa Wiki, Nsa Whistleblower, Nsa Washington, Nsa Wiretapping, Nsa Website, Nsa Water Filter, Nsa Watchlist, Nsa World Series, Nsa Wikileaks, Nsa Wannacry, Nsa Xkeyscore, Nsa Xbox One, Nsa Xeno World Qualifier, Nsa Xkeyscore Download, Nsa Xcode, Nsa Xbox Live, Nsa Xeno Tournament, Nsa Xkeyscore Presentation, Nsa X, Nsa X Files, Nsa Youtube, Nsa Yogurt, Nsa Young Investigator Grant, Nsa Youth Florida, Nsa Yearly Budget, Nsa Yottabyte, Nsa Youth Program, Nsa Youth, Nsa Yellow Dots, Nsa Yakima, Nsa Zero Day, Nsa Zip Code, Nsa Zeus, Nsa Zimmermann Telegram, Nsa Zimbabwe, Nsa Za, Nsa Zero Day Exploit, Nsa Zyxel, Nsa Zero Division, Nsa Zone Store, Shadow Broker Dlc, Shadow Broker Mass Effect, Shadow Broker Vulnerability, Shadow Broker Nsa, Shadow Broker Dossiers, Shadow Broker Mass Effect 2, Shadow Broker Download, Shadow Broker Ship, Shadow Broker Tools, Shadow Brokers Leak, Shadow Broker Attack, Shadow Broker Andromeda, Shadow Broker Achievements, Shadow Broker After Beating Game, Shadow Broker Agent, Shadow Broker Adalah, Shadow Broker Analysis, Shadow Broker Agent Mass Effect 2, Shadow Broker Arrested, Shadow Broker Archive, Shadow Broker Base, Shadow Broker Base Investment Opportunities, Shadow Broker Book, Shadow Broker Boss Fight, Shadow Broker Before Or After, Shadow Broker Bug, Shadow Broker Base Model, Shadow Brokers Bbc, Shadow Broker Blog, Shadow Broker Base Video Archive, Shadow Broker Crash, Shadow Broker Cve, Shadow Broker Cisco, Shadow Broker Cyber Attack, Shadow Broker Cerberus, Shadow Broker Cyber Threat, Shadow Broker Comments, Shadow Broker Cyber Security, Shadow Broker Comments Squadmates, Shadow Broker Companion Comments, Shadow Broker Dlc, Shadow Broker Dossiers, Shadow Broker Download, Shadow Broker Definition, Shadow Brokers Dump, Shadow Broker Dlc Crash, Shadow Broker Dlc Review, Shadow Broker Dlc Ps3, Shadow Broker Dlc Glitch, Shadow Broker Dlc Cost, Shadow Broker Exploits, Shadow Broker Eternal Blue, Shadow Broker Exploit List, Shadow Broker Equation Group, Shadow Broker Eternal Champion, Shadow Broker Exploits Download, Shadow Broker Effects On Mass Effect 3, Shadow Broker Ending, Shadow Broker Mass Effect 2, Shadow Broker Mass Effect, Shadow Broker Files, Shadow Broker Fight, Shadow Broker Fuzzbunch, Shadow Broker Files Garrus, Shadow Broker Framework, Shadow Broker Fb.py, Shadow Broker Facebook, Shadow Broker Forces Mass Effect 3, Shadow Broker Free Download, Shadow Broker Files Legion, Shadow Broker Github, Shadow Broker Group, Shadow Broker Garrus, Shadow Broker Grunt, Shadow Broker Glitch, Shadow Broker Guide, Shadow Broker Dlc Glitch, Shadow Broker Mission Glitch, Shadow Broker After Beating Game, Cz Shadow Gunbroker, Shadow Broker Hack, Shadow Broker Hackers, Shadow Broker Hack Nsa, Shadow Broker Hug Liara, Shadow Broker Hack Terminals, Shadow Broker Hatch, Shadow Broker Dlc How To Start, Lair Of The Shadow Broker How To Start, Lair Of The Shadow Broker How Long, Lair Of The Shadow Broker Hours, Shadow Broker Investments, Shadow Broker Identity, Shadow Broker Information Terminals, Shadow Broker Pc, Shadow Broker Insanity, Shadow Broker Intel, Shadow Broker Illusive Man, Shadow Broker Ilium, Shadow Broker In Underworld Empire, Giving Shadow Broker Info Cerberus, Shadow Brokers June, Shadow Brokers Juniper, Shadow Brokers July, Shadow Brokers June Dump, Shadow Brokers January, Shadow Brokers June Release, Shadow Brokers June 2017, Shadow Brokers Join, Shadow Broker Jack, Shadow Broker Jak Zainstalowa\u0107, Shadow Broker Kb, Shadow Broker Kahoku, Shadow Broker Keeps Crashing, Liara Shadow Broker Kiss, Shadow Broker Who To Kill, Kasumi Shadow Broker Dossier, Lair Of The Shadow Broker Key, Lair Of The Shadow Broker Keygen, Shadow Broker Leaks, Shadow Broker Liara, Shadow Broker Legion, Shadow Broker Logs, Shadow Brokers Lost In Translation, Shadow Brokers Linux, Shadow Broker List, Shadow Brokers Leak Download, Shadow Brokers Letter To Trump, Shadow Brokers List Of Exploits, Shadow Broker Mass Effect, Shadow Broker Mass Effect 2, Shadow Broker Mass Effect 1, Shadow Broker Malware, Shadow Broker Meaning, Shadow Broker Microsoft, Shadow Broker Microsoft Patch, Shadow Broker Ms17-010, Shadow Broker Morinth, Shadow Broker Model Ship, Shadow Broker Nsa, Shadow Broker News, Shadow Brokers Nsa Tools, Shadow Brokers Nsa Tools Download, Shadow Brokers Nsa Hack, Shadow Brokers Nsa Leaks, Shadow Brokers Nsa Hacking Tools, Shadow Brokers North Korea, Shadow Brokers New Release, Shadow Brokers Nytimes, Shadow Broker Observer, Shadow Broker Oracle, Shadow Broker Oddjob, Shadow Broker Ost, Shadow Broker Investment Opportunities, Shadow Broker Before Or After, Shadow Broker Comments On Squad, Shadow Broker Effects On Mass Effect 3, Shadow Broker Door Wont Open, Origin Shadow Broker, Shadow Broker Patch, Shadow Broker Password, Shadow Broker Paragon Interrupt, Shadow Broker Planet, Shadow Broker Ps3, Shadow Broker Paragon, Shadow Broker Parking Lot, Shadow Broker Dlc Price, Shadow Broker Data Points, Liara Shadow Broker Paragon Interrupt, Shadow Broker Quotes, Shadow Broker Quest, Liara Shadow Broker Quest, Mass Effect Shadow Broker Quotes, Lair Of The Shadow Broker Quotes, Mass Effect 2 Shadow Broker Quotes, Shadow Broker Release, Shadow Broker Race, Shadow Broker Rdp, Shadow Broker Rdp Exploit, Shadow Broker Romance, Shadow Broker Reddit, Shadow Broker Ransomware, Shadow Broker Romance Liara, Shadow Broker Review, Shadow Broker Rapid7, Shadow Broker Ship, Shadow Broker Smb, Shadow Broker Species, Shadow Broker Smb Exploit, Shadow Broker Solaris, Shadow Broker Subscription, Shadow Broker Smb Vulnerability, Shadow Broker Ship Model, Shadow Broker Support Team, Shadow Broker Squad, Shadow Broker Tools, Shadow Broker Twitter, Shadow Broker Terminals, Shadow Broker Tool Dump, Shadow Broker Tali, Shadow Broker Tools Download, Shadow Broker Timeline, Shadow Broker Threat, Shadow Broker Toolkit, Shadow Broker Tutorial, Shadow Broker Unique Dialogue, Shadow Broker Upgrades, Shadow Broker Update, Shadow Broker Underworld Empire, Shadow Broker Upgrades Mass Effect 3, Shadow Broker Dlc Upgrades, Lair Of The Shadow Broker Unique Dialogue, Shadow Broker Dlc Not Showing Up, Underworld Shadow Broker, Lair Of The Shadow Broker Upgrade Locations, Shadow Broker Vulnerability, Shadow Broker Video Archive, Shadow Broker Virus, Shadow Broker Vs Illusive Man, Shadow Broker Voice, Shadow Broker Vasir, Shadow Broker Base Videos, Lair Of The Shadow Broker Vasir Bug, Shadow Broker Windows, Shadow Broker Wiki, Shadow Broker Wannacry, Shadow Broker Wikileaks, Shadow Broker Walkthrough, Shadow Broker Wet Squad, Shadow Broker Website, Shadow Broker Windows 2003, Shadow Broker Windows Exploit, Shadow Broker Windows 10, Shadow Broker Dlc Xbox, Lair Of The Shadow Broker Xbox 360, Shadow Broker Yahg, Shadow Broker Youtube, Shadow Broker Zero Day, Shadow Broker Zcash, Shadow Broker Zaeed, Shadow Broker Jak Zainstalowa\u0107

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, CRYPTOME, TOP SECRET August 22, 2016June 22, 2021 13 Minutes

Exposed – Snowden Tweets on Alleged NSA Malware Hack

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Go back

Your message has been sent

Warning
Warning
Warning
Warning

Warning.

Edward Snowden Wife, Edward Snowden Movie, Edward Snowden Twitter, Edward Snowden Dead, Edward Snowden Quotes, Edward Snowden Interview, Edward Snowden Wiki, Edward Snowden Russia, Edward Snowden Net Worth, Edward Snowden 2017, Edward Snowden Age, Edward Snowden Antarctica, Edward Snowden Articles, Edward Snowden Actor, Edward Snowden And Trump, Edward Snowden And Julian Assange, Edward Snowden And Wikileaks, Edward Snowden Apush, Edward Snowden Ama, Edward Snowden And Lindsay Mills, Edward Snowden Biography, Edward Snowden Book, Edward Snowden Bin Laden, Edward Snowden Booz Allen, Edward Snowden Birthday, Edward Snowden Bbc, Edward Snowden Blog, Edward Snowden Birth Chart, Edward Snowden Bernie Sanders, Edward Snowden Bitcoin, Edward Snowden Cia, Edward Snowden Cnn, Edward Snowden Cast, Edward Snowden Chelsea Manning, Edward Snowden Current News, Edward Snowden Citizen 4, Edward Snowden Conservative, Edward Snowden China, Edward Snowden Chemtrails, Edward Snowden Contact, Edward Snowden Dead, Edward Snowden Documentary, Edward Snowden Definition, Edward Snowden Documentary Netflix, Edward Snowden Doc, Edward Snowden Donald Trump, Edward Snowden Dell, Edward Snowden Documentary Hbo, Edward Snowden Date, Edward Snowden David Hoffman, Edward Snowden Essay, Edward Snowden Email, Edward Snowden Ethics, Edward Snowden Ethics Essay, Edward Snowden Early Life, Edward Snowden Effect, Edward Snowden Ecuador, Edward Snowden Education, Edward Snowden Everything About Donald Trump, Edward Snowden Event, Edward Snowden Facts, Edward Snowden Family, Edward Snowden Film, Edward Snowden First Interview, Edward Snowden Facebook, Edward Snowden Father, Edward Snowden Full Movie, Edward Snowden Flat Earth, Edward Snowden First Tweet, Edward Snowden Fox News, Edward Snowden Guardian, Edward Snowden Glenn Greenwald, Edward Snowden Glasses, Edward Snowden Global Warming, Edward Snowden Gif, Edward Snowden Google, Edward Snowden Girlfriend Movie, Edward Snowden Good, Edward Snowden Grandfather, Edward Snowden Genius, Edward Snowden Hero, Edward Snowden Height, Edward Snowden House, Edward Snowden Hawaii, Edward Snowden High School, Edward Snowden Hong Kong, Edward Snowden History, Edward Snowden Heartbeat, Edward Snowden Haarp, Edward Snowden Hbo, Edward Snowden Interview, Edward Snowden Iq, Edward Snowden Instagram, Edward Snowden Interview 2013, Edward Snowden Imdb, Edward Snowden Interview 2017, Edward Snowden Images, Edward Snowden Interview 2016, Edward Snowden Income, Edward Snowden Iphone, Edward Snowden Job, Edward Snowden Journalist, Edward Snowden Japan, Edward Snowden Julian Assange Bradley Manning, Edward Snowden Java, Edward Snowden Journalism, Edward Snowden Joseph Gordon-levitt, Edward Snowden Julian Assange, Edward Snowden John Oliver Passwords, Edward Snowden Jean Michel Jarre, Edward Snowden Kunia, Edward Snowden Kimdir, Edward Snowden Katie Couric Interview, Edward Snowden Katie Couric, Edward Snowden Kaskus, Edward Snowden Kim, Edward Snowden Kasus, Edward Snowden Kfc, Edward Snowden Kim Jest, Edward Snowden Koenig, Edward Snowden Location, Edward Snowden Lindsay Mills Moscow, Edward Snowden Laptop, Edward Snowden Lindsay Mills, Edward Snowden Living, Edward Snowden Lawyer, Edward Snowden Life, Edward Snowden Latest News, Edward Snowden Latest, Edward Snowden Live Stream, Edward Snowden Movie, Edward Snowden Movie Netflix, Edward Snowden Movie Cast, Edward Snowden Military, Edward Snowden Movie Online, Edward Snowden Memes, Edward Snowden Middlebury College, Edward Snowden Married, Edward Snowden Moscow, Edward Snowden Medical Condition, Edward Snowden Net Worth, Edward Snowden Now, Edward Snowden News, Edward Snowden New York Times, Edward Snowden Netflix, Edward Snowden Natal Chart, Edward Snowden Nobel Prize, Edward Snowden Nsa Salary, Edward Snowden Npr, Edward Snowden Nationality, Edward Snowden On Trump, Edward Snowden Osama Bin Laden, Edward Snowden Obama, Edward Snowden Oscar, Edward Snowden On Movie, Edward Snowden On Twitter, Edward Snowden Openstack, Edward Snowden On Antarctica, Edward Snowden Os, Edward Snowden Original Interview, Edward Snowden Parents, Edward Snowden Political Views, Edward Snowden Privacy Tips, Edward Snowden Political Party, Edward Snowden Patriot Act, Edward Snowden Pictures, Edward Snowden Podcast, Edward Snowden Phone Case, Edward Snowden Poll, Edward Snowden Putin, Edward Snowden Quotes, Edward Snowden Quizlet, Edward Snowden Questions, Edward Snowden Quien Es, Edward Snowden Quote About Privacy, Edward Snowden Quotes Citizenfour, Edward Snowden Quick Facts, Edward Snowden Qualifications, Edward Snowden Russia, Edward Snowden Reddit, Edward Snowden Research Paper, Edward Snowden Real Name, Edward Snowden Residence, Edward Snowden Resume, Edward Snowden Robot, Edward Snowden Recommended Apps, Edward Snowden Reporter, Edward Snowden Russian, Edward Snowden Story, Edward Snowden Salary, Edward Snowden Status, Edward Snowden Signal, Edward Snowden Speech, Edward Snowden Security Tips, Edward Snowden Shirt, Edward Snowden Siblings, Edward Snowden Special Forces, Edward Snowden Still Alive, Edward Snowden Twitter, Edward Snowden Today, Edward Snowden Trump, Edward Snowden Timeline, Edward Snowden Ted Talk, Edward Snowden The Guardian, Edward Snowden Trailer, Edward Snowden The Movie, Edward Snowden T Shirt, Edward Snowden Tor, Edward Snowden Update, Edward Snowden Ufo, Edward Snowden Us Army, Edward Snowden University Of Michigan, Edward Snowden Used Tails, Edward Snowden Umich, Edward Snowden University Of Maryland, Edward Snowden Ufo Wikileaks, Edward Snowden Ufo Video, Edward Snowden Urban Dictionary, Edward Snowden Video, Edward Snowden Vpn, Edward Snowden Vice, Edward Snowden And Julian Assange, Edward Snowden Voice, Edward Snowden And Bradley Manning, Edward Snowden Vault 7, Edward Snowden Visa, Edward Snowden And Wikileaks, Edward Snowden Vanity Fair, Edward Snowden Wife, Edward Snowden Wiki, Edward Snowden Wired, Edward Snowden William And Mary, Edward Snowden Washington Post, Edward Snowden Who Is He, Edward Snowden Website, Edward Snowden Worth, Edward Snowden Wikileak, Edward Snowden Washington Post 2013, Edward Snowden Youtube, Edward Snowden Young, Edward Snowden Yahoo Answers, Edward Snowden Youtube Channel, Edward Snowden Youtube Documentary, Edward Snowden Yokota, Edward Snowden And Lindsay Mills, Edward Snowden Yify, Edward Snowden Zodiac Sign, Edward Snowden Zcash, Edward Snowden Zuckerberg, Edward Snowden Zoho, Edward Snowden Zizek, Edward Snowden Zimbabwe, Edward Snowden Zitate, Edward Snowden Zusammenfassung, Edward Snowden Zivilisation, Edward Snowden Zvi\u017eda\u010d, Nsa Jobs, Nsa Director, Nsa Softball, Nsa Meaning, Nsa Careers, Nsa Definition, Nsa Headquarters, Nsa Surveillance, Nsa Spying, Nsa Internships, Nsa Acronym, Nsa Address, Nsa Advisor, Nsa Agent, Nsa Alabama, Nsa Annapolis, Nsa Agent Salary, Nsa Arc, Nsa Approved Shredders, Nsa Agreement, Nsa Building, Nsa Bahrain, Nsa Budget, Nsa Bethesda, Nsa Baseball, Nsa Badge, Nsa Benefits, Nsa Building Nyc, Nsa Budget 2016, Nsa Backdoor, Nsa Careers, Nsa Chief, Nsa Colorado, Nsa Crane, Nsa Cyber Security, Nsa Conference, Nsa Csfc, Nsa Cae, Nsa Crypto Challenge, Nsa Css, Nsa Director, Nsa Definition, Nsa Data Center, Nsa Day Of Cyber, Nsa Director Salary, Nsa Data Collection, Nsa Domestic Surveillance, Nsa Datasheet, Nsa Deputy Director, Nsa Datasheet Is Called, Nsa Employment, Nsa Edward Snowden, Nsa Exploits, Nsa Employees, Nsa Email, Nsa Evaluated Products List, Nsa Echelon, Nsa Emblem, Nsa Encryption, Nsa Eternal Blue, Nsa Fastpitch, Nsa Florida Youth, Nsa Fort Meade, Nsa Flynn, Nsa Florida, Nsa Friend, Nsa Facebook, Nsa Fort Gordon, Nsa Foia, Nsa Facts, Nsa Georgia, Nsa Glassdoor, Nsa Government, Nsa Grindr, Nsa Github, Nsa Gift Shop, Nsa Game, Nsa Grants, Nsa Gif, Nsa Guy, Nsa Headquarters, Nsa Head, Nsa Hacking Tools, Nsa Hawaii, Nsa Hampton Roads, Nsa Hacked, Nsa History, Nsa Hiring Process, Nsa Hacking Tools Leaked, Nsa Headquarters Address, Nsa Internships, Nsa Industries, Nsa Intelligence Analyst, Nsa Indiana, Nsa Influence 2017, Nsa Iad, Nsa Ias 2017, Nsa India, Nsa Illinois, Nsa Insurance, Nsa Jobs, Nsa Juice Plus, Nsa Job Openings, Nsa Jobs Utah, Nsa Jobs Salary, Nsa Jokes, Nsa Job Requirements, Nsa Jurisdiction, Nsa Jobs In Md, Nsa Japan, Nsa Keywords, Nsa Kunia, Nsa Kc, Nsa Key, Nsa Kentucky, Nsa Kmi, Nsa Kankakee, Nsa Korea, Nsa Kaspersky, Nsa Keith Alexander, Nsa Leaker, Nsa Logo, Nsa Leak, Nsa Locations, Nsa Listening, Nsa Leader, Nsa Login, Nsa Leadership, Nsa Language Analyst, Nsa Leaked Tools, Nsa Meaning, Nsa Meme, Nsa Media, Nsa Meet, Nsa Mid South, Nsa Mike Rogers, Nsa Museum, Nsa Mcmaster, Nsa Maryland, Nsa Mission Statement, Nsa News, Nsa Naples, Nsa Name Generator, Nsa North, Nsa Number, Nsa Norfolk, Nsa Nyc, Nsa Nashville, Nsa Nursing, Nsa New Orleans, Nsa Orlando, Nsa Opm Test, Nsa Online Test, Nsa Offices, Nsa Obama, Nsa Organization, Nsa Operational Interview, Nsa Only, Nsa Org Chart, Nsa Of 1947, Nsa Prism, Nsa Police, Nsa Panama City, Nsa Police Officer, Nsa Phone Number, Nsa Philadelphia, Nsa Pay Scale, Nsa Play, Nsa Polygraph, Nsa Purpose, Nsa Quantum Computer, Nsa Quotes, Nsa Qualifications, Nsa Quantum, Nsa Quizlet, Nsa Questions, Nsa Qualifier, Nsa Quantum Computer Farm, Nsa Quartet, Nsa Quiz, Nsa Rogers, Nsa Requirements, Nsa Rules, Nsa Recruiting, Nsa Relationship, Nsa Rule Book, Nsa Ransomware, Nsa Russia, Nsa Responsibilities, Nsa Reno, Nsa Softball, Nsa Surveillance, Nsa Spying, Nsa Slang, Nsa Salary, Nsa Stands For, Nsa Soccer, Nsa Softball Rules, Nsa Scholarship, Nsa Scandal, Nsa Texas, Nsa Tournaments, Nsa Tools, Nsa Trump, Nsa Tao, Nsa Tools Leaked, Nsa Twitter, Nsa Tinder, Nsa Test, Nsa Training, Nsa Utah, Nsa Urban, Nsa Usa, Nsa Utah Facility, Nsa Unmasking, Nsa Utah Jobs, Nsa Unconstitutional, Nsa Umpire, Nsa Under Obama, Nsa Uniform, Nsa Vs Cia, Nsa Visitor Center, Nsa Virginia, Nsa Vs Fbi, Nsa Vs Cia Vs Fbi, Nsa Virus, Nsa Visitor Control Center, Nsa Vpn, Nsa Vanilla, Nsa Violation Of Privacy, Nsa Wiki, Nsa Whistleblower, Nsa Washington, Nsa Wiretapping, Nsa Website, Nsa Water Filter, Nsa Watchlist, Nsa World Series, Nsa Wikileaks, Nsa Wannacry, Nsa Xkeyscore, Nsa Xbox One, Nsa Xeno World Qualifier, Nsa Xkeyscore Download, Nsa Xcode, Nsa Xbox Live, Nsa Xeno Tournament, Nsa Xkeyscore Presentation, Nsa X, Nsa X Files, Nsa Youtube, Nsa Yogurt, Nsa Young Investigator Grant, Nsa Youth Florida, Nsa Yearly Budget, Nsa Yottabyte, Nsa Youth Program, Nsa Youth, Nsa Yellow Dots, Nsa Yakima, Nsa Zero Day, Nsa Zip Code, Nsa Zeus, Nsa Zimmermann Telegram, Nsa Zimbabwe, Nsa Za, Nsa Zero Day Exploit, Nsa Zyxel, Nsa Zero Division, Nsa Zone Store

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, CRYPTOME, THE NATIONAL SECURITY AGENCY (NSA), TOP SECRET August 18, 2016June 22, 2021 6 Minutes

Unveiled – Records Related to Former NSA Director Keith Alexanderโ€™s Attendance of Bilderberg Meetings in 2008, 2009, 2011

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

The following set of documents was obtained via a Freedom of Information Act request made to the National Security Agency for “records relating to NSA Director Gen. Keith B. Alexander’s attendance of the Bilderberg Meetings held in 2008 in Chantilly Virginia; in 2009 in Vouliagmeni, Greece; and in 2011 in St. Moritz, Switzerland.” The request took the NSA 5 years and 13 days to fulfill.

Former NSA Director Keith Alexander 2009, 2011 Bilderberg Meeting Records

Page Count: 19 pages
Date: 2008-2016
Restriction: None
Originating Organization: National Security Agency
File Type: pdf
File Size: 8,873,336 bytes
File Hash (SHA-256):40D97BF7D22691F33352159A25EF59F41B8C45D18EDFEFFE780998F88E29D9D8

Download File

 

Go back

Your message has been sent

Warning
Warning
Warning
Warning

Warning.

 

Nsa Jobs, Nsa Director, Nsa Softball, Nsa Meaning, Nsa Careers, Nsa Definition, Nsa Headquarters, Nsa Surveillance, Nsa Spying, Nsa Internships, Nsa Acronym, Nsa Address, Nsa Advisor, Nsa Agent, Nsa Alabama, Nsa Annapolis, Nsa Agent Salary, Nsa Arc, Nsa Approved Shredders, Nsa Agreement, Nsa Building, Nsa Bahrain, Nsa Budget, Nsa Bethesda, Nsa Baseball, Nsa Badge, Nsa Benefits, Nsa Building Nyc, Nsa Budget 2016, Nsa Backdoor, Nsa Careers, Nsa Chief, Nsa Colorado, Nsa Crane, Nsa Cyber Security, Nsa Conference, Nsa Csfc, Nsa Cae, Nsa Crypto Challenge, Nsa Css, Nsa Director, Nsa Definition, Nsa Data Center, Nsa Day Of Cyber, Nsa Director Salary, Nsa Data Collection, Nsa Domestic Surveillance, Nsa Datasheet, Nsa Deputy Director, Nsa Datasheet Is Called, Nsa Employment, Nsa Edward Snowden, Nsa Exploits, Nsa Employees, Nsa Email, Nsa Evaluated Products List, Nsa Echelon, Nsa Emblem, Nsa Encryption, Nsa Eternal Blue, Nsa Fastpitch, Nsa Florida Youth, Nsa Fort Meade, Nsa Flynn, Nsa Florida, Nsa Friend, Nsa Facebook, Nsa Fort Gordon, Nsa Foia, Nsa Facts, Nsa Georgia, Nsa Glassdoor, Nsa Government, Nsa Grindr, Nsa Github, Nsa Gift Shop, Nsa Game, Nsa Grants, Nsa Gif, Nsa Guy, Nsa Headquarters, Nsa Head, Nsa Hacking Tools, Nsa Hawaii, Nsa Hampton Roads, Nsa Hacked, Nsa History, Nsa Hiring Process, Nsa Hacking Tools Leaked, Nsa Headquarters Address, Nsa Internships, Nsa Industries, Nsa Intelligence Analyst, Nsa Indiana, Nsa Influence 2017, Nsa Iad, Nsa Ias 2017, Nsa India, Nsa Illinois, Nsa Insurance, Nsa Jobs, Nsa Juice Plus, Nsa Job Openings, Nsa Jobs Utah, Nsa Jobs Salary, Nsa Jokes, Nsa Job Requirements, Nsa Jurisdiction, Nsa Jobs In Md, Nsa Japan, Nsa Keywords, Nsa Kunia, Nsa Kc, Nsa Key, Nsa Kentucky, Nsa Kmi, Nsa Kankakee, Nsa Korea, Nsa Kaspersky, Nsa Keith Alexander, Nsa Leaker, Nsa Logo, Nsa Leak, Nsa Locations, Nsa Listening, Nsa Leader, Nsa Login, Nsa Leadership, Nsa Language Analyst, Nsa Leaked Tools, Nsa Meaning, Nsa Meme, Nsa Media, Nsa Meet, Nsa Mid South, Nsa Mike Rogers, Nsa Museum, Nsa Mcmaster, Nsa Maryland, Nsa Mission Statement, Nsa News, Nsa Naples, Nsa Name Generator, Nsa North, Nsa Number, Nsa Norfolk, Nsa Nyc, Nsa Nashville, Nsa Nursing, Nsa New Orleans, Nsa Orlando, Nsa Opm Test, Nsa Online Test, Nsa Offices, Nsa Obama, Nsa Organization, Nsa Operational Interview, Nsa Only, Nsa Org Chart, Nsa Of 1947, Nsa Prism, Nsa Police, Nsa Panama City, Nsa Police Officer, Nsa Phone Number, Nsa Philadelphia, Nsa Pay Scale, Nsa Play, Nsa Polygraph, Nsa Purpose, Nsa Quantum Computer, Nsa Quotes, Nsa Qualifications, Nsa Quantum, Nsa Quizlet, Nsa Questions, Nsa Qualifier, Nsa Quantum Computer Farm, Nsa Quartet, Nsa Quiz, Nsa Rogers, Nsa Requirements, Nsa Rules, Nsa Recruiting, Nsa Relationship, Nsa Rule Book, Nsa Ransomware, Nsa Russia, Nsa Responsibilities, Nsa Reno, Nsa Softball, Nsa Surveillance, Nsa Spying, Nsa Slang, Nsa Salary, Nsa Stands For, Nsa Soccer, Nsa Softball Rules, Nsa Scholarship, Nsa Scandal, Nsa Texas, Nsa Tournaments, Nsa Tools, Nsa Trump, Nsa Tao, Nsa Tools Leaked, Nsa Twitter, Nsa Tinder, Nsa Test, Nsa Training, Nsa Utah, Nsa Urban, Nsa Usa, Nsa Utah Facility, Nsa Unmasking, Nsa Utah Jobs, Nsa Unconstitutional, Nsa Umpire, Nsa Under Obama, Nsa Uniform, Nsa Vs Cia, Nsa Visitor Center, Nsa Virginia, Nsa Vs Fbi, Nsa Vs Cia Vs Fbi, Nsa Virus, Nsa Visitor Control Center, Nsa Vpn, Nsa Vanilla, Nsa Violation Of Privacy, Nsa Wiki, Nsa Whistleblower, Nsa Washington, Nsa Wiretapping, Nsa Website, Nsa Water Filter, Nsa Watchlist, Nsa World Series, Nsa Wikileaks, Nsa Wannacry, Nsa Xkeyscore, Nsa Xbox One, Nsa Xeno World Qualifier, Nsa Xkeyscore Download, Nsa Xcode, Nsa Xbox Live, Nsa Xeno Tournament, Nsa Xkeyscore Presentation, Nsa X, Nsa X Files, Nsa Youtube, Nsa Yogurt, Nsa Young Investigator Grant, Nsa Youth Florida, Nsa Yearly Budget, Nsa Yottabyte, Nsa Youth Program, Nsa Youth, Nsa Yellow Dots, Nsa Yakima, Nsa Zero Day, Nsa Zip Code, Nsa Zeus, Nsa Zimmermann Telegram, Nsa Zimbabwe, Nsa Za, Nsa Zero Day Exploit, Nsa Zyxel, Nsa Zero Division, Nsa Zone Store, Bilderberg Group, Bilderberg Meeting, Bilderberg Trump, Bilderberg The Movie, Bilderberg Members, Bilderberg Hotel Jan Luyken, Bilderberg Agenda, Bilderberg Group 2017, Bilderberg Garden Hotel, Bilderberg Hotel, Bilderberg Agenda, Bilderberg Attendees, Bilderberg And Trump, Bilderberg Attendees 2017, Bilderberg Amsterdam, Bilderberg And Illuminati, Bilderberg Attendees 2015, Bilderberg Anonymous, Bilderberg Agenda Revealed, Bilderberg Attendees 2014, Bilderberg Book, Bilderberg Business Lenders, Bilderberg Brothers, Bilderberg Bbc, Bilderberg Bank, Bilderberg Build A Bear, Bilderberg Bezos, Bilderberg Band, Bilderberg Bitcoin, Bilderberg Book Pdf, Bilderberg Conference, Bilderberg Conference 2017, Bilderberg Clinton, Bilderberg Chantilly, Bilderberg Chart, Bilderberg Cnn, Bilderberg Companies, Bilderberg Cult, Bilderberg Cern, Bilderberg California, Bilderberg De Bovenste Molen, Bilderberg Debunked, Bilderberg Directive, Bilderberg Dead, Bilderberg Depopulation, Bilderberg Daniel Estulin, Bilderberg Dates, Bilderberg Dates 2017, Bilderberg Documentary, Bilderberg Davos, Bilderberg Europa Hotel Scheveningen, Bilderberg Exposed, Bilderberg Evil, Bilderberg Elites, Bilderberg Estulin, Bilderberg Ethereum, Bilderberg Etymology, Bilderberg Family, Bilderberg Facts, Bilderberg Facebook, Bilderberg Film, Bilderberg Freemason, Bilderberg Family Net Worth, Bilderberg Family History, Bilderberg Family Tree, Bilderberg First Degree, Bilderberg France, Bilderberg Group, Bilderberg Group 2017, Bilderberg Garden Hotel, Bilderberg Group Meeting, Bilderberg Group Book, Bilderberg Group Meeting 2017, Bilderberg Group Members List 2017, Bilderberg Group Net Worth, Bilderberg Group Alex Jones, Bilderberg Group Conspiracy, Bilderberg Hotel Jan Luyken, Bilderberg Hotel, Bilderberg Hotel Amsterdam, Bilderberg History, Bilderberg Hotel Rotterdam, Bilderberg Hillary, Bilderberg Hotel Klein Zwitserland, Bilderberg Hacked, Bilderberg Hotel De Keizerskroon, Bilderberg Hotel De Klepperman, Bilderberg Illuminati, Bilderberg Infowars, Bilderberg Illuminati Freemasons, Bilderberg Images, Bilderberg In Chantilly, Bilderberg Invitees, Bilderberg Invitation, Bilderberg In Chantilly Va, Bilderberg In Virginia, Bilderberg Illuminati Connection, Bilderberg Jan Luyken, Bilderberg Jewish, Bilderberg June 2017, Bilderberg Jekyll Island, Bilderberg Jewish Connection, Bilderberg Join, Bilderberg Jan Luyken Hotel Amsterdam, Bilderberg Jan Luyken Hotel, Bilderberg Jan Hotel Amsterdam, Bilderberg Jan Luyken Hotel Amsterdam Tripadvisor, Bilderberg Kasteel Vaalsbroek, Bilderberg Konferenz, Bilderberg Keizerskroon, Bilderberg Kasteel Doorwerth, Bilderberg Klepperman, Bilderberg Konferenz 2017, Bilderberg Kasteel, Bilderberg Kokous, Bilderberg Klein Zwitserland, Bilderberg Keizerskroon Apeldoorn, Bilderberg Location, Bilderberg List 2017, Bilderberg Logo, Bilderberg List, Bilderberg Location 2017, Bilderberg Landgoed Lauswolt, Bilderberg Logan Act, Bilderberg Leak, Bilderberg List Of Attendees 2015, Bilderberg List Of Attendees, Bilderberg Meeting, Bilderberg Members, Bilderberg Movie, Bilderberg Meeting 2016, Bilderberg Meeting 2017, Bilderberg Meeting 2017 Location, Bilderberg Macron, Bilderberg Meaning, Bilderberg Masters, Bilderberg Map, Bilderberg News, Bilderberg Nwo, Bilderberg Nazi, Bilderberg Netherlands, Bilderberg New Orleans, Bilderberg News 2017, Bilderberg Next Meeting, Bilderberg Net Worth, Bilderberg Name Meaning, Bilderberg Network Schematic, Bilderberg Owl, Bilderberg Origin, Bilderberg One World Order, Bilderberg On Trump, Bilderberg Organization, Bilderberg Obama Deception, Bilderberg Official Website, Bilderberg Oosterbeek, Bilderberg Objectives, Bilderberg Organisation, Bilderberg Parkhotel Rotterdam, Bilderberg Protest, Bilderberg Project, Bilderberg Population Control, Bilderberg Plan, Bilderberg Participants 2017, Bilderberg Protest 2017, Bilderberg Presidents, Bilderberg Parties, Bilderberg Plans For 2017, Bilderberg Quotes, Bilderberg Quora, Bilderberg Que Es, Bilderberg Queen Elizabeth, Bilderberg Queen, Bilderberg Quienes Son, Bilderberg Quem Sao, Bilderberg Que Hacen, Bilderberg Quebec, Bilderberg Que Significa, Bilderberg Reddit, Bilderberg Road, Bilderberg Rituals, Bilderberg Russia, Bilderberg Retreat, Bilderberg Rotterdam, Bilderberg Rationalwiki, Bilderberg Roster, Bilderberg Results, Bilderberg Group, Bilderberg Society, Bilderberg Secrets, Bilderberg Steering Committee, Bilderberg Soros, Bilderberg Secret Meeting, Bilderberg Security, Bilderberg Supremacy, Bilderberg Symbols, Bilderberg Site, Bilderberg Snopes, Bilderberg Trump, Bilderberg The Movie, Bilderberg Theory, Bilderberg Truth, Bilderberg Topics, Bilderberg Trailer, Bilderberg Talking Points, Bilderberg The Movie Full, Bilderberg Think Tank, Bilderberg Trilateral, Bilderberg Update, Bilderberg Uk, Bilderberg Ufo, Bilderberg Ultimate Control, Bilderberg Usa, Bilderberg Ukraine, Bilderberg Us Presidents, Bilderberg Underground Bunkers, Bilderberg Youtube, Bilderberg Uk Politicians, Bilderberg Video, Bilderberg Virginia, Bilderberg Va, Bilderberg Virginia 2017, Bilderberg Vaccines, Bilderberg Van Luyken Hotel Amsterdam, Bilderberg Vs Freemason, Bilderberg Vs China, Bilderberg Venlo, Bilderberg Vaals, Bilderberg Wiki, Bilderberg Website, Bilderberg Wikileaks, Bilderberg Workshop, Bilderberg Website Hacked, Bilderberg Westfields Marriott, Bilderberg Worth, Bilderberg Washington Post, Bilderberg Wall Street Journal, Bilderberg War On Information, Xandernieuws Bilderberg, Bilderberg Youtube, Bilderberg Yak, Bilderberg Youtube Video, Bilderberg Yahoo Answers, Bilderberg Youtube 2015, Bilderberg Y Podemos, Bilderberg Yahoo, Bilderberg Yves Calvi, Bilderberg Y Los Iluminatis, Bilderberg Y Pedro Sanchez, Bilderberg Zwolle, Bilderberg Zionist, Bilderberg Zeitgeist, Bilderberg Zeist, Bilderberg Zonnebril, Bilderberg Zonnebrillen, Bilderberg Zeist Restaurant, Bilderberg Zwolle Wientjes, Bilderberg Zonnebril Hout, Bilderberg Zwitserland

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, BILDERBERG, PUBLIC INTELLIGENCE July 11, 2016June 24, 2021 6 Minutes

TOP SECRET-NSA-Will China Help Pakistan Get the Bomb? – Pakistan & China Have Expanded Their Nuclear Warheads But India Is Not Worried

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Go back

Your message has been sent

Warning
Warning
Warning
Warning

Warning.

Nsa Jobs, Nsa Director, Nsa Softball, Nsa Meaning, Nsa Careers, Nsa Definition, Nsa Headquarters, Nsa Surveillance, Nsa Spying, Nsa Internships, Nsa Acronym, Nsa Address, Nsa Advisor, Nsa Agent, Nsa Alabama, Nsa Annapolis, Nsa Agent Salary, Nsa Arc, Nsa Approved Shredders, Nsa Agreement, Nsa Building, Nsa Bahrain, Nsa Budget, Nsa Bethesda, Nsa Baseball, Nsa Badge, Nsa Benefits, Nsa Building Nyc, Nsa Budget 2016, Nsa Backdoor, Nsa Careers, Nsa Chief, Nsa Colorado, Nsa Crane, Nsa Cyber Security, Nsa Conference, Nsa Csfc, Nsa Cae, Nsa Crypto Challenge, Nsa Css, Nsa Director, Nsa Definition, Nsa Data Center, Nsa Day Of Cyber, Nsa Director Salary, Nsa Data Collection, Nsa Domestic Surveillance, Nsa Datasheet, Nsa Deputy Director, Nsa Datasheet Is Called, Nsa Employment, Nsa Edward Snowden, Nsa Exploits, Nsa Employees, Nsa Email, Nsa Evaluated Products List, Nsa Echelon, Nsa Emblem, Nsa Encryption, Nsa Eternal Blue, Nsa Fastpitch, Nsa Florida Youth, Nsa Fort Meade, Nsa Flynn, Nsa Florida, Nsa Friend, Nsa Facebook, Nsa Fort Gordon, Nsa Foia, Nsa Facts, Nsa Georgia, Nsa Glassdoor, Nsa Government, Nsa Grindr, Nsa Github, Nsa Gift Shop, Nsa Game, Nsa Grants, Nsa Gif, Nsa Guy, Nsa Headquarters, Nsa Head, Nsa Hacking Tools, Nsa Hawaii, Nsa Hampton Roads, Nsa Hacked, Nsa History, Nsa Hiring Process, Nsa Hacking Tools Leaked, Nsa Headquarters Address, Nsa Internships, Nsa Industries, Nsa Intelligence Analyst, Nsa Indiana, Nsa Influence 2017, Nsa Iad, Nsa Ias 2017, Nsa India, Nsa Illinois, Nsa Insurance, Nsa Jobs, Nsa Juice Plus, Nsa Job Openings, Nsa Jobs Utah, Nsa Jobs Salary, Nsa Jokes, Nsa Job Requirements, Nsa Jurisdiction, Nsa Jobs In Md, Nsa Japan, Nsa Keywords, Nsa Kunia, Nsa Kc, Nsa Key, Nsa Kentucky, Nsa Kmi, Nsa Kankakee, Nsa Korea, Nsa Kaspersky, Nsa Keith Alexander, Nsa Leaker, Nsa Logo, Nsa Leak, Nsa Locations, Nsa Listening, Nsa Leader, Nsa Login, Nsa Leadership, Nsa Language Analyst, Nsa Leaked Tools, Nsa Meaning, Nsa Meme, Nsa Media, Nsa Meet, Nsa Mid South, Nsa Mike Rogers, Nsa Museum, Nsa Mcmaster, Nsa Maryland, Nsa Mission Statement, Nsa News, Nsa Naples, Nsa Name Generator, Nsa North, Nsa Number, Nsa Norfolk, Nsa Nyc, Nsa Nashville, Nsa Nursing, Nsa New Orleans, Nsa Orlando, Nsa Opm Test, Nsa Online Test, Nsa Offices, Nsa Obama, Nsa Organization, Nsa Operational Interview, Nsa Only, Nsa Org Chart, Nsa Of 1947, Nsa Prism, Nsa Police, Nsa Panama City, Nsa Police Officer, Nsa Phone Number, Nsa Philadelphia, Nsa Pay Scale, Nsa Play, Nsa Polygraph, Nsa Purpose, Nsa Quantum Computer, Nsa Quotes, Nsa Qualifications, Nsa Quantum, Nsa Quizlet, Nsa Questions, Nsa Qualifier, Nsa Quantum Computer Farm, Nsa Quartet, Nsa Quiz, Nsa Rogers, Nsa Requirements, Nsa Rules, Nsa Recruiting, Nsa Relationship, Nsa Rule Book, Nsa Ransomware, Nsa Russia, Nsa Responsibilities, Nsa Reno, Nsa Softball, Nsa Surveillance, Nsa Spying, Nsa Slang, Nsa Salary, Nsa Stands For, Nsa Soccer, Nsa Softball Rules, Nsa Scholarship, Nsa Scandal, Nsa Texas, Nsa Tournaments, Nsa Tools, Nsa Trump, Nsa Tao, Nsa Tools Leaked, Nsa Twitter, Nsa Tinder, Nsa Test, Nsa Training, Nsa Utah, Nsa Urban, Nsa Usa, Nsa Utah Facility, Nsa Unmasking, Nsa Utah Jobs, Nsa Unconstitutional, Nsa Umpire, Nsa Under Obama, Nsa Uniform, Nsa Vs Cia, Nsa Visitor Center, Nsa Virginia, Nsa Vs Fbi, Nsa Vs Cia Vs Fbi, Nsa Virus, Nsa Visitor Control Center, Nsa Vpn, Nsa Vanilla, Nsa Violation Of Privacy, Nsa Wiki, Nsa Whistleblower, Nsa Washington, Nsa Wiretapping, Nsa Website, Nsa Water Filter, Nsa Watchlist, Nsa World Series, Nsa Wikileaks, Nsa Wannacry, Nsa Xkeyscore, Nsa Xbox One, Nsa Xeno World Qualifier, Nsa Xkeyscore Download, Nsa Xcode, Nsa Xbox Live, Nsa Xeno Tournament, Nsa Xkeyscore Presentation, Nsa X, Nsa X Files, Nsa Youtube, Nsa Yogurt, Nsa Young Investigator Grant, Nsa Youth Florida, Nsa Yearly Budget, Nsa Yottabyte, Nsa Youth Program, Nsa Youth, Nsa Yellow Dots, Nsa Yakima, Nsa Zero Day, Nsa Zip Code, Nsa Zeus, Nsa Zimmermann Telegram, Nsa Zimbabwe, Nsa Za, Nsa Zero Day Exploit, Nsa Zyxel, Nsa Zero Division, Nsa Zone Store, Bomb Pop, Bomb Pop Shot, Bomb Threat, Bomb Timer, Bomb Pop Drink, Bomb Shelter, Bomb Voyage, Bomb Bowling, Bomb Girls, Bomb It 7, Bomb Angry Birds, Bomb Ash Ffxiv, Bomb Attack, Bomb Arena, Bomb Alarm Clock, Bomb Agrabah, Bomb Af, Bomb Arrows, Bomb Arrows Breath Of The Wild, Bomb Atomically, Bomb Bowling, Bomb Bomb, Bomb Book, Bomb Blast, Bomb Bundles, Bomb Bay, Bomb Bag, Bomb Bugs, Bomb Bat, Bomb Bowling Rules, Bomb Calorimeter, Bomb Clipart, Bomb Cartoon, Bomb City, Bomb Calorimetry, Bomb Cosmetics, Bomb Countdown, Bomb Crater, Bomb Calorimeter Equation, Bomb Cake, Bomb Diggity, Bomb Definition, Bomb Defusal Manual, Bomb Defusal Game, Bomb Dropped On Hiroshima, Bomb Dot Com, Bomb Drawing, Bomb Dropped On Isis, Bomb Digz, Bomb Dropped On Nagasaki, Bomb Emoji, Bomb Explosion, Bomb Explosion Gif, Bomb Explosion Sound, Bomb Energy Drink, Bomb Explodes, Bomb Eyebrows, Bomb Explosion Cartoon, Bomb Explosion Drawing, Bomb Etymology, Bomb Fire, Bomb Fire Pit, Bomb Factory, Bombfell, Bomb From Mario, Bomb First, Bomb Food, Bomb From Angry Birds, Bomb Fuse, Bomb For Roaches, Bomb Girls, Bomb Gif, Bomb Game, Bomb Girls Cast, Bomb Going Off, Bomb Group, Bomb Golf, Bomb Game Steam, Bomb Guy, Bomb Golf Balls, Bomb Has Been Defused, Bomb Has Been Planted, Bomb Head, Bomb Hills Not Countries, Bomb Hiroshima, Bomb Hat, Bomb Head Meme, Bomb Hugger, Bomb Hair, Bomb House, Bomb It 7, Bomb In Syria, Bomb It 6, Bomb It 5, Bomb It 2, Bomb It Unblocked, Bomb It 4, Bomb In Spanish, Bomb It 7 Unblocked, Bomb In Detroit, Bomber Jacket, Bomb Jokes, Bomber Jacket Men, Bomb Japan, Bomber Jacket Womens, Bomb Jatt, Bomb Jack, Bomb Jatt Lyrics, Bomb Juice, Bomb Jovi, Bomb King, Bomb King Build, Bomb Kirby, Bomb Korea, Bomb Ketch, Bomb King Guide, Bomb King Ffx, Bomb King Voice Lines, Bomb Kid, Bomb Kush, Bomb Logo, Bomb Lyrics, Bomb Lowrider, Bomb Little Boy, Bomb Lab, Bomb London, Bomb Levels, Bomb Lobber, Bomb Labs Steroids, Bomb Lance, Bomb Manual, Bomb Meme, Bomb Magazine, Bomb Map, Bomb Meaning, Bomb Man, Bomb Makeup, Bomb Mario, Bomb Manual Pdf, Bomb Movie, Bomb North Korea, Bomb News, Bomb Noise, Bomb Names, Bomb North Korea Now, Bomb Nagasaki, Bomb Nuclear, Bomb Naga, Bomb Nicknames, Bomb N Korea, Bomb On Syria, Bomb Omb, Bomb Omb Battlefield, Bomb On Nagasaki, Bomb Outfits, Bomb Of Hiroshima, Bomb On Isis, Bomb Outline, Bomb Of Gilead, Bomb One Punch Man, Bomb Pop, Bomb Pop Shot, Bomb Pop Drink, Bomb Prank, Bomb Pop Shot Recipe, Bomb Pop Smirnoff, Bomb Pop Vodka, Bomb Pop Mountain Dew, Bomb Pop Martini, Bomb Puns, Bomb Queen, Bomb Quotes, Bomb Queen Comic, Bomb Queen Cosplay, Bomb Questions, Bomb Queen Wiki, Bomb Queen Ffxi, Bomb Quesadilla Recipe, Bomb Quiz, Bomb Queen Review, Bomb Runner, Bomb Robot, Bomb Radius, Bomb Rush Blush, Bomb Recipes, Bomb Rhyme, Bomb Rush, Bomb Russia, Bomb Ravi, Bomb Run, Bomb Shelter, Bomb Squad, Bomb Syria, Bomb Shelter Near Me, Bomb Suit, Bomb Seeds, Bomb Simulator, Bomb Shot, Bomb Sound Effect, Bomb Synonym, Bomb Threat, Bomb Timer, Bomb Threat Today, Bomb Tech Golf, Bomb Tower Coc, Bomb The Music Industry, Bomb Threat Detroit, Bomb Tattoo, Bomb Threat Checklist, Bomb Technician, Bomb Urban Dictionary, Bomb Used On Hiroshima, Bomb Uk, Bomb Upgrade Zelda, Bomb Upgrade Breath Of The Wild, Bomb Us, Bomb Unicode, Bomb Under The Table, Bomb Unit Endless Frontier, Bomb Underwater, Bomb Voyage, Bomb Vest, Bomb Voyage Meme, Bomb Vector, Bomb Video, Bomb Voyage Gif, Bomb Vs Missile, Bomb Voyage Scene, Bomb Voyage Quotes, Bomb Victim, Bomb Wallpaper, Bomb Weed, Bomb With Face, Bomb Whistle, Bomb Warning, Bomb Watch, Bomb Water, Bomb Went Off, Bomb With Fuse, Bomb Website, Bomb X, Bomb X Wing, Bomb X Matilda, Bomb Xuzhou, Bomb X Amiga, Bomb X Energy Drink, Bomb Xml, Bomb Yemen, Bomb Yesterday, Bomb Youtube, Bomb Yield, Bomb Your Friends, Bomb Yellowstone, Bomb Your House For Roaches, Bomb Your Driver, Bomb Yourself, Bomb Your City, Bomb Zone, Bomb Zelda, Bomb Zquad, Bomb Zombies, Bomb Zero Password, Bomb Zip, Bomb Zone Battlegrounds, Bomb Zaventem, Bomb Zamalek, Bomb Z, China King, China Garden, China House, China Anne Mcclain, China One, China Star, China City, China Chef, China Jade, China Buffet, China Anne Mcclain, China Airlines, China And India, China And North Korea, China Anne Mcclain Age, China Anne Mcclain 2017, China Arnold, China Air Pollution, China Allies, China Attack On India, China Buffet, China Buffet Near Me, China Beach, China Best, China Bell, China Best Howell, China Bay, China Bistro, China Bus, China Bowl, China Chef, China Cook, China Cabinet, China Court, China Cafe, China Currency, China Chef Menu, China City, China Cottage, China Consulate Chicago, China Dynasty, China Dragon, China Doll, China Delight, China Daily, China Debt, China Doll Plant, China Dishes, China Delight New Haven Mi, China Definition, China Express, China Eastern Airlines, China Economy, China Eastern, China Express Menu, China Ems, China Explosion, China Express Monroe Michigan, China Etf, China East Buffet, China Flag, China Food, China Fair, China Fare, China Facts, China Fortune, China Flavor, China Fun, China Forbes, China Fare Ortonville Mi, China Garden, China Gate, China Gourmet, China Gate Ann Arbor, China Gold, China Garden Menu, China Gdp, China Gate Menu, China Government, China Glaze, China House, China House Menu, China House Inn, China House Canton Mi, China House Detroit, China House Temperance Mi, China Holidays 2017, China House Flat Rock, China House Pinckney Mi, China Hutch, China India, China Inn, China India War, China Inn Livonia, China Inn South, China Island, China Il, China India News, China In Chinese, China In Spanish, China Jade, China Jade Menu, China Japan, China Jade Grand Blanc, China Jade Waterford Michigan, China Jade Hours, China Jade Number, China Jerseys, China Jade Restaurant, China Jade Mckeesport, China King, China Kitchen, China King Menu, China King Belleville, China King Novi, China King Express, China King Ann Arbor, China King Belleville Mi, China Kitchen Menu, China Kingdom, China Lite, China Lee, China Lite Marysville, China Lite Port Huron, China Lake, China Leader, China Lite Menu, China Language, China Life Expectancy, China Lobster, China Moon, China Map, China Mountain, China Mcclain, China Michigan, China Moon Menu, China Mieville, China Mi, China Movie, China Military, China News, China North Korea, China Number 1, China North Korea Border, China North Korea News, China Natural Resources, China National Debt, China Nuclear Weapons, China North Korea Relations, China Ncap, China One, China One Menu, China One Milan, China One Buffet, China One Child Policy, China One Detroit, China On North Korea, China One Near Me, China One Woodward, China On Map, China Post Tracking, China Population, China Palace, China President, China Phoenix, China Pollution, China Panda, China Palace Menu, China Plates, China Palace Midland, China Quick, China Queen, China Quantum Computer, China Quizlet, China Quarterly, China Quantum Satellite, China Q, China Quotes, China Qin Dynasty, China Quiz, China Ruby, China Religion, China Ruby Menu, China Ruby Ferndale Menu, China Renaissance, China Rose, China Red, China Russia, China Replacements, China Rich Girlfriend, China Star, China Star Menu, China Southern Airlines, China Sea, China Star Hours, China Star Palace, China Syndrome, China Star Wyandotte, China Smog, China Study, Chinatown, China Time, China Township Mi, China Taste, China Tracking, China Trump, Chinatown Express, China Town West Bloomfield, China Time Zones, China Tours, China Us, China Uncensored, China Unemployment Rate, China Us Relations, China Unicom, China Usa, China Us War, China United Airlines, China Union Pay, China Under Mao, China Village, China Villa, China Visa, China Vs India, China Visa Application, China Villa Menu, China Vs Usa, China Vpn, China Village Menu, China Vs Japan, China Wok, China Wok Menu, China White, China Wall, China Wholesale, China Weather, China War, China Wok Port Huron Menu, China Wok Phone Number, China Wiki, China Xi, China X Reader Lemon, China X Reader, China Xinjiang, China X Russia, China Xinhua News, China Xian, China Xpress, China X, China Xiang, China Yuan, China Yi Wang, China Yuan To Usd, China Yellow River, China Youtube, China Yan, China Yield Curve, China Yeti Cooler, China Year, China Yulin, China Zip Code, China Zodiac, China Zoo, China Z Visa, China Zhangjiajie, China Zorrilla, China Zun, China Zhou, China Zhongwang, China Zip Code Beijing, Pakistan News, Pakistan Flag, Pakistan Vs India, Pakistan Language, Pakistan Map, Pakistan Population, Pakistan Cricket, Pakistan Capital, Pakistan Consulate Chicago, Pakistan Time, Pakistan And India, Pakistan Army, Pakistan Air Force, Pakistan Airlines, Pakistan Age Of Consent, Pakistan Acronym, Pakistan Allies, Pakistan And India War, Pakistan Afghanistan, Pakistan And Bangladesh, Pakistan Blast, Pakistan Bombing, Pakistan Boy Dancing, Pakistan Birth Rate, Pakistan Border, Pakistan Blasphemy Law, Pakistan Beaches, Pakistan Bangladesh, Pakistan Blasphemy, Pakistan Beliefs, Pakistan Cricket, Pakistan Capital, Pakistan Consulate Chicago, Pakistan Currency, Pakistan Cricket Team, Pakistan Cities, Pakistan Cricket Board, Pakistan Climate, Pakistan Country Code, Pakistani Culture, Pakistan Definition, Pakistan Defence Forum, Pakistan Demographics, Pakistan Desert, Pakistan Defence, Pakistan Dawn, Pakistani Dress, Pakistani Drama, Pakistan Debt, Pakistan Day, Pakistan Economy, Pakistan Embassy Chicago, Pakistan Embassy, Pakistan Express, Pakistan Education, Pakistan Ethnic Groups, Pakistan Exports, Pakistan Earthquake, Pakistan Earthquake 2005, Pakistan Elections, Pakistan Flag, Pakistan Facts, Pakistani Food, Pakistan Flag Emoji, Pakistani Food Near Me, Pakistan Flag Meaning, Pakistan Facebook, Pakistan Fertility Rate, Pakistan Founded, Pakistan Form Of Government, Pakistan Gdp, Pakistan Government, Pakistan Gdp Per Capita, Pakistan Government Type, Pakistan Geography, Pakistan Gdp Growth, Pakistani Girl, Pakistan Gift Online, Pakistan Genocide, Pakistan Gender Inequality, Pakistan History, Pakistan Holidays, Pakistan Houses, Pakistan Honor Killing, Pakistan Human Rights, Pakistan Hdi, Pakistan Hindu, Pakistan Heat Wave, Pakistan Hockey, Pakistan Hat, Pakistan International Airlines, Pakistan India, Pakistan Independence, Pakistan India Border, Pakistan India War, Pakistan Inbreeding, Pakistan Ipl, Pakistani Isi, Pakistan Iran, Pakistan India Relations, Pakistan Jokes, Pakistan Jersey, Pakistan Jobs, Pakistan Jit, Pakistan Jinnah, Pakistan Journal Of Medical Sciences, Pakistan Journal Of Pharmaceutical Sciences, Pakistan Journal Of Botany, Pakistan Jail, Pakistani Jewelry, Pakistan Karachi, Pakistan Knife, Pakistan Kid Dancing, Pakistan Kashmir, Pakistan Khan, Pakistan Karachi Time, Pakistan K2, Pakistan Killing, Pakistani Kush, Pakistan Karachi Weather, Pakistan Language, Pakistan Literacy Rate, Pakistan Leader, Pakistan Life Expectancy, Pakistan Location, Pakistan Local Time, Pakistan Latest News, Pakistan Landscape, Pakistan Lahore, Pakistan Landmarks, Pakistan Map, Pakistan Military, Pakistan Money, Pakistan Mulberry, Pakistan Mountains, Pakistan Mosque, Pakistani Music, Pakistani Men, Pakistan Middle East, Pakistan Major Cities, Pakistan News, Pakistan Newspaper, Pakistan Nuclear Weapons, Pakistan News Dawn, Pakistan News Media, Pakistan Navy, Pakistan National Animal, Pakistan News Live, Pakistan Names, Pakistan National Anthem, Pakistan On Map, Pakistan On World Map, Pakistan Official Language, Pakistan Occupied Kashmir, Pakistan Origin Card, Pakistan Observer, Pakistan Outline, Pakistan Origin, Pakistan Oil, Pakistan On India, Pakistan Population, Pakistan President, Pakistan Prime Minister, Pakistan Provinces, Pakistan Population Density, Pakistan Post, Pakistan Politics, Pakistan Physical Features, Pakistan President List, Pakistan Punjab, Pakistan Qatar, Pakistan Quizlet, Pakistan Quotes, Pakistan Queen, Pakistan Quetta, Pakistan Quora, Pakistan Quality Of Life, Pakistan Quiz, Pakistan Quran, Pakistan Qaumi Tarana, Pakistan Religion, Pakistan Rupee To Usd, Pakistan River, Pakistan Rupee, Pakistan Russia, Pakistan Region, Pakistan Refugees, Pakistan Railways, Pakistan Rs To Usd, Pakistan Roster, Pakistan Shia Or Sunni, Pakistan Sports, Pakistan Size, Pakistan Stock Exchange, Pakistan Super League, Pakistan States, Pakistani Song, Pakistan Swords, Pakistan Sharia Law, Pakistan Ssg, Pakistan Time, Pakistan Time Now, Pakistan Time Zone, Pakistan Tax, Pakistan Tourism, Pakistan Taliban, Pakistan Talk, Pakistan Type Of Government, Pakistan Team, Pakistan Terrorist, Pakistan Us Relations, Pakistan Urdu Newspapers, Pakistan Unemployment Rate, Pakistan Urdu News, Pakistan Us Embassy, Pakistan University, Pakistan Upcoming Matches, Pakistan Used To Be India, Pakistan Un, Pakistan Urban Population, Pakistan Vs India, Pakistan Vs West Indies, Pakistan Visa, Pakistan Vs India Live Streaming, Pakistan Valley Kush, Pakistan Vs India War, Pakistan Vs India Cricket, Pakistan Vs West Indies Highlights, Pakistan Vs, Pakistan Vs West Indies Cricinfo, Pakistan Women, Pakistan Weather, Pakistan Wiki, Pakistan War, Pakistan World Map, Pakistan West Indies, Pakistani Wedding, Pakistan Was Established As A, Pakistan Water Crisis, Pakistan World Cup, Pakistan Cricket, Pakistan Capital, Pakistan Consulate Chicago, Pakistan Cricket Team, Pakistan Currency, Pakistan Xinjiang, Pakistan Cities, Pakistan Cricket Board, Pakistan Climate, Pakistan Country Code, Pakistan Youtube, Pakistan Year Of Independence, Pakistan Youtube Sites, Pakistan Yemen, Pakistan Youtube Unblock, Pakistan Youth, Pakistan Youtube Bgp, Pakistan Yahoo, Pakistan Year, Pakistan Youth Unemployment, Pakistan Zindabad, Pakistan Zip Code, Pakistan Zia, Pakistan Zoo, Pakistan Zia Ul Haq Death, Pakistan Zakat, Pakistan Zika, Pakistan Zindabad Song, Pakistan Zayn Malik, Pakistan Zindabad Documentary, Nuclear War Now, Nuclear War Movies, Nuclear War Simulation, Nuclear War Definition, Nuclear War Game, Nuclear War Simulation Game, Nuclear War News, Nuclear War North Korea, Nuclear War Clock, Nuclear War Map, Nuclear War Aftermath, Nuclear War Alert, Nuclear War Art, Nuclear War Alarm, Nuclear War Articles, Nuclear War Anxiety, Nuclear War Animation, Nuclear War Agreement, Nuclear War Against North Korea, Nuclear War App, Nuclear War Board Game, Nuclear War Books, Nuclear War Bunker, Nuclear War Between Us And Russia, Nuclear War Bible, Nuclear War Blast Radius, Nuclear War Background, Nuclear War Bomb, Nuclear War Bbc, Nuclear War Between North Korea And America, Nuclear War Clock, Nuclear War Card Game, Nuclear War Coming, Nuclear War Close Calls, Nuclear War Cold War, Nuclear War Chances, Nuclear War Cartoon, Nuclear War Consequences, Nuclear War Cnn, Nuclear War China, Nuclear War Definition, Nuclear War Documentary, Nuclear War Donald Trump, Nuclear War Dream, Nuclear War Damage, Nuclear War Date, Nuclear War Drills, Nuclear War During The Cold War, Nuclear War Drills In Schools, Nuclear War Declared, Nuclear War Effects, Nuclear War Emergency Kit, Nuclear War End Of The World, Nuclear War End Times, Nuclear War Extinction, Nuclear War Essay, Nuclear War Expert, Nuclear War Effects On Environment, Nuclear War Eas, Nuclear War Example, Nuclear War Fallout Map, Nuclear War Facts, Nuclear War Films, Nuclear War Fallout, Nuclear War Fiction, Nuclear War Fear, Nuclear War From Space, Nuclear War Flash Game, Nuclear Warfare, Nuclear War Fallout Shelter, Nuclear War Game, Nuclear War Game Online, Nuclear War Gas Mask, Nuclear War Gif, Nuclear War Gear, Nuclear War Games Unblocked, Nuclear War Game Theory, Nuclear War Global Warming, Nuclear War Games Pc, Nuclear War Game Movie, Nuclear Warhead, Nuclear War History, Nuclear War Hoax, Nuclear War Hawaii, Nuclear War Happening, Nuclear War Happening Soon, Nuclear War Human Extinction, Nuclear Warheads By Country, Nuclear War Has Become Thinkable Again, Nuclear Warhead Count, Nuclear War Imminent, Nuclear War In The Bible, Nuclear War Inevitable, Nuclear War Is Coming, Nuclear War In North Korea, Nuclear War In 2017, Nuclear War In Chicago, Nuclear War In Korea, Nuclear War Images, Nuclear War In America, Nuclear War Japan, Nuclear War Jokes, Nuclear War John F Kennedy, Nuclear War Jerwood, Nuclear War Justification, Nuclear War Jimmy Cliff, Nuclear War Jazz, Nuclear War June 2015, Nuclear War Justified, Nuclear War Jericho, Nuclear War Korea, Nuclear War Kit, Nuclear War Kennedy, Nuclear War Korean Peninsula, Nuclear War Korea Us, Nuclear War Kim Jong Un, Nuclear War Killed All Life On Mars, Nuclear War Kickstarter, Nuclear War Killed The Dinosaurs, Nuclear War Korea 2017, Nuclear War Likely, Nuclear War Likelihood 2017, Nuclear War Lyrics, Nuclear War Los Angeles, Nuclear War Lyrics Sun Ra, Nuclear War Laws, Nuclear War Level, Nuclear War Lesson Plan, Nuclear War Looming, Nuclear War Leads To Extinction, Nuclear War Movies, Nuclear War Map, Nuclear War Meme, Nuclear War Meaning, Nuclear War May 13, Nuclear War Map Usa, Nuclear War Movie 1980s, Nuclear War Mask, Nuclear War May 13 2017, Nuclear War Mars, Nuclear War Now, Nuclear War North Korea, Nuclear War News, Nuclear War Now Forum, Nuclear War Now Bandcamp, Nuclear War North Korea Scenario, Nuclear War Now Store, Nuclear War Novels, Nuclear War News 2017, Nuclear War Not Going To Happen, Nuclear War On Mars, Nuclear War Outcome, Nuclear War Odds, Nuclear War On Us, Nuclear War Online Game, Nuclear War On The Horizon, Nuclear War On May 13, Nuclear War On United States, Nuclear War On Us Soil, Nuclear War Over Syria, Nuclear War Predictions, Nuclear War Possibility, Nuclear War Prank, Nuclear War Prophecy, Nuclear War Protection, Nuclear War Political Cartoons, Nuclear War Prep, Nuclear War Pictures, Nuclear War Plans, Nuclear War Podcast, Nuclear War Quotes, Nuclear War Quizlet, Nuclear War Quora, Nuclear War Questions, Nuclear War Quiz, Nuclear War Question Time, Nuclear War Quran, Nuclear War Queen Speech, Einstein Nuclear War Quote, Mao Nuclear War Quote, Nuclear War Russia, Nuclear War Reddit, Nuclear War Risk, Nuclear War Results, Nuclear War Russia Us, Nuclear War Race, Nuclear War Radiation, Nuclear War Reality, Nuclear War Radius, Nuclear War Rules, Nuclear War Simulation, Nuclear War Simulation Game, Nuclear War Survival Skills, Nuclear War Survival, Nuclear War Survival Kit, Nuclear War Sun Ra, Nuclear War Strategy Game, Nuclear War Survival Guide, Nuclear War Scenarios, Nuclear War Siren, Nuclear War Threat, Nuclear War Trump, Nuclear War Targets, Nuclear War Today, Nuclear War Treaty, Nuclear War Timeline, Nuclear War Targets In Us, Nuclear War There Goes My Career, Nuclear War Terms, Nuclear War Targets In Usa, Nuclear War Usa, Nuclear War Us, Nuclear War Update, Nuclear War Us Targets, Nuclear War Us Map, Nuclear War Usa Map, Nuclear War Us Russia, Nuclear War Upon Us, Nuclear War Under Trump, Nuclear War Uk, Nuclear War Video Game, Nuclear War Video, Nuclear War Vice, Nuclear War V14, Nuclear War Vs Thermonuclear War, Nuclear War Vice News, Nuclear War Victims, Nuclear War Vietnam, Nuclear War Video Clips, Nuclear War Vs Biological War, Nuclear War With Russia, Nuclear War With Korea, Nuclear War Warning, Nuclear War With China, Nuclear War With North Korea, Nuclear War Warning System, Nuclear War Will Not Happen, Nuclear War Wiki, Nuclear War What To Do, Nuclear War Will End The World, Nuclear War Games Xbox 360, Xkcd Nuclear War, Nuclear War Youtube, Nuclear War Yo La Tengo, Nuclear War Yahoo Answers, Nuclear War Year, Nuclear War Yemen, Nuclear War Yes No, Nuclear War Yo La Tengo Lyrics, Nuclear War Yo La, Nuclear War Movies Youtube, Ancient Nuclear War Youtube, Nuclear War Zone, Nuclear War Zombies, Nuclear War Zero Sum Game, Nuclear War Safe Zones, Nuclear War New Zealand, Nuclear War Twilight Zone, Nuclear War Strike Zones, Nuclear War Blast Zones, Nuclear War Free Zone, Nuclear War Safe Zones In Us

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, BILDERBERG, CHINA, COMEDY, NUCLEAR WAR, THE NATIONAL SECURITY AGENCY (NSA), TOP SECRET, VIDEO May 27, 2016June 26, 2021 15 Minutes

The NSA unveils The Gorbachev File

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

British and CIA Assessments, Presidential Letters and Summit Conversations Illuminate Perestroika and the End of the Cold War

First and Last President of the Soviet Union Mikhail Sergeyevich Gorbachev Turns 85

National Security Archive Briefing Book No. 544
Compiled and edited by Svetlana Savranskaya and Tom Blanton
Posted – March 2, 2016
For more information, contact: National Security Archive
202.994.7000 or nsarchiv@gwu.edu

 


RELATED LINKS:

 


ะั€ั…ะธะฒ ะŸะตั€ะตัั‚ั€ะพะนะบะธ
1985-1991


The Fall of the Berlin Wall, 25th Anniversary
November 9, 2014


The Thatcher-Gorbachev Conversations
April 12, 2013


The End of the USSR, 20 Years Later
November 22, 2011


The August 1991 Coup in Moscow, 20 Years Later 
August 19, 2011


The Washington/Camp David Summit 1990
June 13, 2010


Bush and Gorbachev and Malta
December 3, 2009


Reagan, Gorbachev and Bush at Governor’s Island
December 8, 2008


The Reykjavik File 
October 13, 2006


The Diary of Anatoly Chernyaev
May 25, 2006


Alexander Yakovlev and the Roots of the Soviet Reforms 
October 26, 2005

 

 


Secretary of State James Baker, National Security Adviser Brent Scowcroft, Raisa Gorbacheva, Adviser Anatoly Chernyaev, President Mikhail Gorbachev at Camp David, June 1990 (from A.S. Chernyaev’s personal archive)

Washington, D.C., March 2, 2016 โ€“ Marking the 85th birthday of former Soviet leader Mikhail Gorbachev, the National Security Archive at George Washington University (www.nsarchive.org) today posted a series of previously classified British and American documents containing Western assessments of Gorbachev starting before he took office in March 1985, and continuing through the end of the Soviet Union in 1991.

The documents show that conservative British politicians were ahead of the curve predicting great things for rising Soviet star Gorbachev in 1984 and 1985, but the CIA soon caught on, describing the new Soviet leader only three months into his tenure as โ€œthe new broom,โ€ while Ronald Reagan greeted Gorbachevโ€™s ascension with an immediate invitation for a summit. The documents posted today include positive early assessments by Margaret Thatcher and MP John Browne, CIA intelligence reports that bookend Gorbachevโ€™s tenure from 1985 to 1991, the first letters exchanged by Reagan and Gorbachev, the American versions of key conversations with Gorbachev at the Geneva, Reykjavik and Malta summits, German chancellor Helmut Kohlโ€™s credit to Gorbachev in 1989 for the fall of the Berlin Wall and the end of the Cold War, and the U.S. transcript of the G-7 summit in 1990 that turned down Gorbachevโ€™s request for financial aid.

The Archive gathered the Gorbachev documentation for two books, the Link-Kuehl-Award-winning โ€œMasterpieces of Historyโ€: The Peaceful End of the Cold War in Europe 1989 (Central European University Press, 2010), and the forthcoming Last Superpower Summits: Gorbachev, Reagan and Bush (CEU Press, 2016). The sources include the Margaret Thatcher Foundation, the Ronald Reagan Presidential Library, the George H.W. Bush Presidential Library, and Freedom of Information and Mandatory Declassification Review requests to the CIA and the State Department.

Leading todayโ€™s Gorbachev briefing book is British Prime Minister Margaret Thatcherโ€™s โ€œdiscoveryโ€ of Gorbachev in December 1984 during his trip to Britain as head of a Soviet parliamentary delegation. In contrast to his elderly and infirm predecessors who slowly read dry notes prepared for them, Gorbachev launched into animated free discussion and left an indelible impression on Lady Thatcher. The Prime Minister, charmed by the Soviet leader, quickly shared her impressions with her closest ally and friend, Ronald Reagan. She commented famously, โ€œI like Mr. Gorbachev. We can do business together.โ€


Alexander Yakovlev, Mikhail Gorbachev, Eduard Shevardnadze walking in the Kremlin, 1989 (personal archive of Anatoly Chernyaev)

Soon after Gorbachev became the Soviet General Secretary, a Conservative member of the British parliament, John Browne, who observed Gorbachev during his visit to Britain and then followed information on Gorbachevโ€™s every early step, compared him to โ€œKennedy in the Kremlinโ€ in terms of his charisma. By June 1985, the CIA told senior U.S. officials in a classified assessment that Gorbachev was โ€œthe new broomโ€ that was attempting to clean up the years of debris that accumulated in the Soviet Union during the era of stagnation.

But Reagan had to see for himself. For four years before Gorbachev, as the American president complained in his diary, he had been trying to meet with a Soviet leader face to face, but โ€œthey keep dying on me.โ€ In his first letter to Gorbachev, which Vice President George H.W. Bush carried to Moscow for the funeral of Gorbachevโ€™s predecessor, Reagan invited Gorbachev to meet. Gorbachev and Reagan became pen-pals who wrote long letters โ€“ sometimes personally dictated, even handwritten โ€“ explaining their positions on arms control, strategic defenses, and the need for nuclear abolition.

Their first meeting took place in Geneva in November 1985, where in an informal atmosphere of โ€œfireside chatsโ€ they began realizing that the other was not a warmonger but a human being with a very similar dreamโ€”to rid the world of nuclear weapons. That dream came very close to a breakthrough during Gorbachev and Reaganโ€™s summit in Reykjavik; but Reaganโ€™s stubborn insistence on SDI and Gorbachevโ€™s stubborn unwillingness to take Reagan at his word on technology sharing prevented them from reaching their common goal.

Through a series of unprecedented superpower summits, Gorbachev made Reagan and Bush understand that the Soviet leader was serious about transforming his country not to threaten others, but to help its own citizens live fuller and happier lives, and to be fully integrated into the โ€œfamily of nations.โ€ Gorbachev also learned from his foreign counterparts, establishing a kind of peer group with Franceโ€™s Mitterrand, Germanyโ€™s Kohl, Britainโ€™s Thatcher, and Spainโ€™s Gonzalez, which developed his reformist positions further and further. By the time George H.W. Bush as president finally met Gorbachev in Malta, the Soviet Union was having free elections, freedom of speech was blossoming, velvet revolutions had brought reformers to power in Eastern Europe, and the Berlin Wall had fallen to cheers of citizens but severe anxieties in other world capitals.

German Chancellor Helmut Kohl wrote in his letter to Bush at the end of November 1989: โ€œRegarding the reform process in Poland, Hungary, Bulgaria, the CSSR [Czechoslovakia], and not least the GDR [East Germany], we have General Secretary Gorbachevโ€™s policies to thank. His perestroika has let loose, made easier, or accelerated these reforms. He pushed governments unwilling to make reforms toward openness and toward acceptance of the peopleโ€™s wishes; and he accepted developments that in some instances far surpassed the Soviet Unionโ€™s own standards.โ€

In 1989, the dream of what Gorbachev called โ€œthe common European homeโ€ was in the air and Gorbachev was the most popular politician in the world. When he was faced with discontent and opposition in his country, he refused to use force, like his Chinese neighbors did at Tiananmen Square. And yet, the West consistently applied harsher standards to Gorbachevโ€™s Soviet Union than to China, resulting in feet dragging on financial aid, credits, and trade. As Francois Mitterrand pointed out during the G-7 summit in Houston in 1990: โ€œthe argument put forth for helping China is just the reverse when we are dealing with the USSR. We are too timid [โ€ฆ] regarding aid to the USSR. [โ€ฆ].โ€

What Gorbachev started in March 1985 made his country and the world better. In cooperation with Reagan and Bush, he ended the Cold War, pulled Soviet troops out of Afghanistan, helped resolve local conflicts around the globe, and gave Russia the hope and the opportunity to develop as a normal democratic country. As with many great reformers, he did not achieve everything he was striving for โ€“ he certainly never intended for the Soviet Union to collapse โ€“ but his glasnost, his non-violence, and his โ€œnew thinkingโ€ for an interdependent world created a legacy that few statesmen or women can match. Happy birthday, Mikhail Sergeyevich!


READ THE DOCUMENTS

Document-01
Memorandum of Conversation between Mikhail Gorbachev and Margaret Thatcher. December 16, 1984, Chequers.
1984-12-16
This face-to-face encounter between British Prime Minister and the leader of a Soviet parliamentary delegation produced a conversation that both Thatcher and Gorbachev would refer to many times in the future. Gorbachev engaged Thatcher on all the issues that she raised, did not duck hard questions, but did not appear combative. He spoke about the low point then evident in East-West relations and the need to stop the arms race before it was too late. He especially expressed himself strongly against the Strategic Defense Initiative promoted by the Reagan administration. Soon after this conversation Thatcher flew to Washington to share her enthusiastic assessment with Gorbachev with Reagan and encourage him to engage the Soviet leader in trying to lower the East-West tensions. She told her friend and ally what she had told the BBC, “I like Mr. Gorbachev. We can do business together” – and described him to Reagan as an “unusual Russian…. [m]uch less constrained, more charming,” and not defensive in the usual Soviet way about human rights.
Document-02
Letter from Reagan to Gorbachev. March 11, 1985
1985-03-11
Vice President George H.W. Bush hand delivered this first letter from President Reagan to the new leader of the Soviet Union, after the state funeral for Konstantin Chernenko in March 1985 (“you die, I fly” as Bush memorably remarked about his job as the ceremonial U.S. mourner for world leaders). The letter contains two especially noteworthy passages, one inviting Mikhail Gorbachev to come to Washington for a summit, and the second expressing Reagan’s hope that arms control negotiations “provide us with a genuine chance to make progress toward our common ultimate goal of eliminating nuclear weapons.” Reagan is reaching for a pen-pal, just as he did as early as 1981, when he hand-wrote a heartfelt letter during his recovery from an assassination attempt, to then-General Secretary Leonid Brezhnev suggesting face-to-face meetings and referring to the existential danger of nuclear weapons – only to get a formalistic reply. Subsequent letters between Reagan and the whole series of Soviet leaders (“they keep dying on me,” Reagan complained) contain extensive language on many of the themes – such as the ultimate threat of nuclear annihilation – that would come up over and over again when Reagan finally found a partner on the Soviet side in Gorbachev. Even Chernenko had received a hand-written add-on by Reagan appreciating Soviet losses in World War II and crediting Moscow with a consequent aversion to war.
Document-03
Gorbachev Letter to Reagan, March 24, 1985
1985-03-24
This lengthy first letter from the new Soviet General Secretary to the U.S. President displays Gorbachev’s characteristic verbal style with an emphasis on persuasion. The Soviet leader eagerly takes on the new mode of communication proposed by Reagan in his March 11 letter, and plunges into a voluminous and wide-ranging correspondence between the two leaders – often quite formal and stiff, occasionally very personal and expressive, and always designed for effect, such as when Reagan would laboriously copy out by hand his official texts. Here Gorbachev emphasizes the need to improve relations between the two countries on the basis of peaceful competition and respect for each other’s economic and social choices. He notes the responsibility of the two superpowers for world peace, and their common interest “not to let things come to the outbreak of nuclear war, which would inevitably have catastrophic consequences for both sides.” Underscoring the importance of building trust, the Soviet leader accepts Reagan’s invitation in the March 11 letter to visit at the highest level and proposes that such a visit should “not necessarily be concluded by signing some major documents.” Rather, “it should be a meeting to search for mutual understanding.”
Document-04
Reagan Letter to Gorbachev. April 30, 1985
1985-04-30
Perhaps as a reflection of the internal debates in Washington (and even in Reagan’s own head), it would take more than a month for the administration to produce a detailed response to Gorbachev’s March 24 letter. The first two pages rehash the issues around the tragic killing of American Major Arthur Nicholson by a Soviet guard, before moving to the sore subject of Afghanistan. Reagan vows, “I am prepared to work with you to move the region toward peace, if you desire”; at the same time, U.S. and Saudi aid to the mujahedin fighting the Soviets was rapidly expanding. Reagan objects to Gorbachev’s unilateral April 7 announcement of a moratorium on deployment of intermediate-range missiles in Europe, since the Soviet deployment was largely complete while NATO’s was still underway. The heart of the letter addresses Gorbachev’s objections to SDI, and Reagan mentions that he was struck by Gorbachev’s characterization of SDI as having “an offensive purpose for an attack on the Soviet Union. I can assure you that you are profoundly mistaken on this point.” Interestingly, the Reagan letter tries to reassure Gorbachev by citing the necessity of “some years of further research” and “further years” before deployment (Reagan could not have suspected decades rather than years). This back-and-forth on SDI would be a constant in the two leaders’ correspondence and conversations at the summits to come, but the consistency of Reagan’s position on this (in contrast to that of Pentagon advocates of “space dominance”), not only to Gorbachev but to Thatcher and to his own staff, suggests some room for Gorbachev to take up the President on his assurances – which never happened.
Document-05
“Mr. Gorbachev-a Kennedy in the Kremlin?” By John Browne (Member of Parliament from Winchester, England). Impressions of the Man, His Style and his Likely Impact Upon East West Relations. May 20, 1985.
1985-05-20
British MP John Browne, member of the Conservative party, was part of the Receiving Committee for Gorbachev’s visit to London in December 1984 and spend considerable time with him during his trips (including to the Lenin museum). This long essay, sent to President Reagan, and summarized for him by his National Security Adviser, describes Gorbachev as an unusual Soviet politician-“intelligent, alert and inquisitive.” Browne notes “that Gorbachev’s charisma was so striking that, if permitted by the Communist Party system, Mr. and Mrs. Gorbachev could well become the Soviet equivalent of the Jack and Jacqueline Kennedy team.” On the basis of his observations in 1984 and after Gorbachev was elected General Secretary, Browne concludes that politicians of Western democracies are likely to face an increasingly sophisticated political challenge from Mr. Gorbachev both at home and abroad.
Document-06
Letter from Gorbachev to Reagan. June 10, 1985
1985-06-10
In this long and wide-ranging response to Reagan’s letter of April 30, the Soviet leader makes a real push for improvement of relations on numerous issues. The date June 10 is significant because on this day in Washington Reagan finally took the action (deactivating a Poseidon submarine) necessary to keep the U.S. in compliance with the unratified (but observed by both sides) SALT II treaty. Here Gorbachev raises the issue of equality and reciprocity in U.S.-Soviet relations, noting that it is the Soviet Union that is “surrounded by American military bases stuffed also by nuclear weapons, rather than the U.S. – by Soviet bases.” He suggests that all previous important treaties between the United States and the Soviet Union were possible on the assumption of parity, and that Reagan’s recent focus on SDI threatens to destabilize the strategic balance – yet again demonstrating Gorbachev’s deep apprehension about Reagan’s position on strategic defenses. The Soviet leader believes that the development of ABM systems would lead to a radical destabilization of the situation and the militarization of space. At the heart of the Soviet visceral rejection of SDI is the image of “attack space weapons capable of performing purely offensive missions.” Gorbachev proposes energizing negotiations on conventional weapons in Europe, chemical weapons, the nuclear test ban, and regional issues, especially Afghanistan. He calls for a moratorium on nuclear tests “as soon as possible” – the Soviets would end up doing this unilaterally, never understanding that the issue is a non-starter in Reagan’s eyes. Here, the Soviet leader also welcomes horizontal exchanges between government ministers and even members of legislatures. However, Gorbachev’s position on human rights remains quite rigid-“we do not intend and will not conduct any negotiations relating to human rights in the Soviet Union.” That would change.
Document-07
Dinner Hosted by the Gorbachevs in Geneva. November 19, 1985.
1985-11-19
In their first face-to-face meeting at Geneva, which both of them anticipated eagerly, Reagan and Gorbachev both spoke about the mistrust and suspicions of the past and of the need to begin a new stage in U.S.-Soviet relations. Gorbachev described his view of the international situation to Reagan, stressing the need to end the arms race. Reagan expressed his concern with Soviet activity in the third world–helping the socialist revolutions in the developing countries. They both spoke about their aversion to nuclear weapons. During this first dinner of the Geneva summit, Gorbachev used a quote from the Bible that there was a time to throw stones and a time to gather stones which have been cast in the past to indicate that now the President and he should move to resolve their practical disagreements in the last day of meetings remaining. In response, Reagan remarked that “if the people of the world were to find out that there was some alien life form that was going to attack the Earth approaching on Halley’s Comet, then that knowledge would unite all peoples of the world.” The aliens had landed, in Reagan’s view, in the form of nuclear weapons; and Gorbachev would remember this phrase, quoting it directly in his famous “new thinking” speech at the 27th Party Congress in February 1986.
Document-08
Last Session of the Reykjavik Summit. October 12, 1986.
1986-10-12
The last session at Reykjavik is the one that inspires Gorbachev’s comment in his memoirs about “Shakespearean passions.” The transcript shows lots of confusion between just proposals on reducing ballistic missiles versus those reducing all nuclear weapons, but finally Reagan says, as he always wanted, nuclear abolition. “We can do that. Let’s eliminate them,” says Gorbachev, and Secretary of State George Shultz reinforces, “Let’s do it.” But then they circle back around to SDI and the ABM Treaty issue, and Gorbachev insists on the word “laboratory” as in testing confined there, and Reagan, already hostile to the ABM Treaty, keeps seeing that as giving up SDI. Gorbachev says he cannot go back to Moscow to say he let testing go on outside the lab, which could lead to a functioning system in the future. The transcript shows Reagan asking Gorbachev for agreement as a personal favor, and Gorbachev saying well if that was about agriculture, maybe, but this is fundamental national security. Finally at around 6:30 p.m. Reagan closes his briefing book and stands up. The American and the Russian transcripts differ on the last words, the Russian version has more detail [see the forthcoming book, Last Superpower Summits], but the sense is the same. Their faces reflect the disappointment, Gorbachev had helped Reagan to say nyet, but Gorbachev probably lost more from the failure.
Document-09
Letter to Reagan from Thatcher About Her Meetings with Gorbachev in Moscow. April 1, 1987
1987-04-01
Again, Margaret Thatcher informs her ally Reagan about her conversations with Gorbachev. The cover note from National Security Advisor Carlucci (prepared by NSC staffer Fritz Ermarth) states that “she has been greatly impressed by Gorbachev personally.” Thatcher describes Gorbachev as “fully in charge,” “determined to press ahead with his internal reform,” and “talk[ing] about his aims with almost messianic fervor.” She believes in the seriousness of his reformist thinking and wants to support him. However, they differ on one most crucial issue, which actually unites Gorbachev and Reagan-nuclear abolition. Thatcher writes, “[h]is aim is patently the denuclearization of Europe. I left him with no doubt that I would never accept that.”
Document-10
Letter to Bush from Chancellor Helmut Kohl. November 28, 1989.
1989-11-28
This remarkable letter arrives at the White House at the very moment when Kohl is presenting his “10 points” speech to the Bundestag about future German unification, much to the surprise of the White House, the Kremlin, and even Kohl’s own coalition partners in Germany (such as his foreign minister). Here, just weeks after the fall of the Berlin Wall, the German leader encourages Bush to engage with Gorbachev across the board and to contribute to peaceful change in Europe. Kohl points that Gorbachev “wants to continue his policies resolutely, consistently and dynamically, but is meeting internal resistance and is dependent on external support.” He hopes Bush’s upcoming meeting with Gorbachev in Malta will “give strong stimulus to the arms control negotiations.” Kohl also reminds Bush that “regarding the reform process in Poland, Hungary, Bulgaria, the CSSR [Czechoslovakia], and not least the GDR [East Germany], we have General Secretary Gorbachev’s policies to thank. His perestroika has let loose, made easier, or accelerated these reforms. He pushed governments unwilling to make reforms toward openness and toward acceptance of the people’s wishes; and he accepted developments that in some instances far surpassed the Soviet Union’s own standards.”
Document-11
Malta First Expanded Bilateral with George Bush. December 2, 1989.
1989-12-02
Being rocked by the waves on the Soviet ship Maxim Gorky, President Bush greets his Russian counterpart for the first time as President. A lot has changed in the world since they last saw each other on Governor’s Island in December 1988-elections had been held in the Soviet Union and in Poland, where a non-communist government came to power, and the Iron Curtain fell together with the Berlin Wall. After Bush’s initial presentation from notes, Gorbachev remarks almost bemusedly that now he sees the American administration has made up its mind (finally) what to do, and that includes “specific steps” or at least “plans for such steps” to support perestroika, not to doubt it. Gorbachev compliments Bush for not sharing the old Cold War thinking that “The only thing the U.S. needs to do is to keep its baskets ready to gather the fruit” from the changes in Eastern Europe and the USSR. Bush responds, “I have been called cautious or timid. I am cautious, but not timid. But I have conducted myself in ways not to complicate your life. That’s why I have not jumped up and down on the Berlin Wall.” Gorbachev says, “Yes, we have seen that, and appreciate that.” The Soviet leader goes on to welcome Bush’s economic and trade points as a “signal of a new U.S. policy” that U.S. business was waiting for. Gorbachev responds positively to each of Bush’s overtures on arms control, chemical weapons, conventional forces, next summits and so forth, but pushes back on Bush’s Cuba and Central America obsessions.
Document-12
First Main Plenary of the G-7 Summit in Houston. July 10, 1990.
1990-07-10
The bulk of discussion at this first session of the summit of the industrialized nations is devoted to the issue of how the club of the rich countries should react to the events unfolding in the Soviet Union and how much aid and investment could be directed to the support of perestroika. The summit is taking place at the time when Gorbachev is engaged in an increasingly desperate search for scenarios for radical economic reform, and fast political democratization, but he needs external financial support and integration into global financial institutions in order to succeed – or even to survive, as the events of August 1991 would show. Just before this 1990 G-7, Gorbachev wrote in a letter to George Bush that he needs “long-term credit assistance, attraction of foreign capital, transfer of managerial experience and personnel training” to create a competitive economy. Yet, the U.S. president throws only a bone or two, like “step up the pace of our negotiations with the Soviets on the Tsarist and Kerensky debts [!] to the U.S. government” (instead of forgiving or at least restructuring the debt), and “expand our existing technical cooperation.” Bush concludes his speech by stating flatly “It is impossible for the U.S. to loan money to the USSR at this time. I know, however, that others won’t agree.” The leaders who do not agree are Helmut Kohl (in the middle of providing billions of deutschmarks to the USSR to lubricate German unification) and Francois Mitterrand. The latter decries the double standards being applied to the Soviet Union and China, even after the Tiananmen massacre. Mitterrand criticizes the proposed political declaration of the G-7 as “timid” and “hesitant,” imposing “harsh political conditions as a preliminary to extending aid.” He believes the EC countries are in favor of contributing aid to the USSR but that other members, like the U.S. and Japan, have effectively vetoed such assistance.
Document-13
CIA Memorandum, The Gorbachev Succession. April 1991.
1991-04-00
On April 10, 1991, the National Security Council staff asked the CIA for an analysis of the Gorbachev succession, who the main actors would be, and the likely scenarios. The assessment opens quite drastically: “The Gorbachev era is effectively over.” The scenarios offered have an eerie resemblance to the actual coup that would come in August 1991. This might be the most prescient of all the CIA analyses of the perestroika years. The report finds that Gorbachev is likely to be replaced either by the reformers or the hard-liners, with the latter being more likely. The authors point out that “there is no love between Gorbachev and his current allies and they could well move to try to dump him.” They then list possible conspirators for such a move– Vice President Yanaev, KGB Chief Kryuchkov, and Defense Minister Yazov, among others, all of whom whom participate in the August coup. The report predicts that the “traditionalists” are likely to find a “legal veneer” for removing Gorbachev: “most likely they would present Gorbachev with an ultimatum to comply or face arrest or death.” If he agreed, Yanaev would step in as president, the conspirators would declare a state of emergency and install “some kind of a National Salvation Committee.” However, the memo concludes that “time is working against the traditionalists.” This turned out to be both prescient and correct – the August coup followed the process outlined in this document and the plot foundered because the security forces themselves were fractured and the democratic movements were gaining strength. But indeed, the coup, the resurgence of Boris Yeltsin as leader of the Russian republic, and the secession of Russia from the Soviet Union during the fall of 1991 did mark the end of the Gorbachev era.

Go back

Your message has been sent

Warning
Warning
Warning
Warning

Warning.

 

Nsa Jobs, Nsa Director, Nsa Softball, Nsa Meaning, Nsa Careers, Nsa Definition, Nsa Headquarters, Nsa Surveillance, Nsa Spying, Nsa Internships, Nsa Acronym, Nsa Address, Nsa Advisor, Nsa Agent, Nsa Alabama, Nsa Annapolis, Nsa Agent Salary, Nsa Arc, Nsa Approved Shredders, Nsa Agreement, Nsa Building, Nsa Bahrain, Nsa Budget, Nsa Bethesda, Nsa Baseball, Nsa Badge, Nsa Benefits, Nsa Building Nyc, Nsa Budget 2016, Nsa Backdoor, Nsa Careers, Nsa Chief, Nsa Colorado, Nsa Crane, Nsa Cyber Security, Nsa Conference, Nsa Csfc, Nsa Cae, Nsa Crypto Challenge, Nsa Css, Nsa Director, Nsa Definition, Nsa Data Center, Nsa Day Of Cyber, Nsa Director Salary, Nsa Data Collection, Nsa Domestic Surveillance, Nsa Datasheet, Nsa Deputy Director, Nsa Datasheet Is Called, Nsa Employment, Nsa Edward Snowden, Nsa Exploits, Nsa Employees, Nsa Email, Nsa Evaluated Products List, Nsa Echelon, Nsa Emblem, Nsa Encryption, Nsa Eternal Blue, Nsa Fastpitch, Nsa Florida Youth, Nsa Fort Meade, Nsa Flynn, Nsa Florida, Nsa Friend, Nsa Facebook, Nsa Fort Gordon, Nsa Foia, Nsa Facts, Nsa Georgia, Nsa Glassdoor, Nsa Government, Nsa Grindr, Nsa Github, Nsa Gift Shop, Nsa Game, Nsa Grants, Nsa Gif, Nsa Guy, Nsa Headquarters, Nsa Head, Nsa Hacking Tools, Nsa Hawaii, Nsa Hampton Roads, Nsa Hacked, Nsa History, Nsa Hiring Process, Nsa Hacking Tools Leaked, Nsa Headquarters Address, Nsa Internships, Nsa Industries, Nsa Intelligence Analyst, Nsa Indiana, Nsa Influence 2017, Nsa Iad, Nsa Ias 2017, Nsa India, Nsa Illinois, Nsa Insurance, Nsa Jobs, Nsa Juice Plus, Nsa Job Openings, Nsa Jobs Utah, Nsa Jobs Salary, Nsa Jokes, Nsa Job Requirements, Nsa Jurisdiction, Nsa Jobs In Md, Nsa Japan, Nsa Keywords, Nsa Kunia, Nsa Kc, Nsa Key, Nsa Kentucky, Nsa Kmi, Nsa Kankakee, Nsa Korea, Nsa Kaspersky, Nsa Keith Alexander, Nsa Leaker, Nsa Logo, Nsa Leak, Nsa Locations, Nsa Listening, Nsa Leader, Nsa Login, Nsa Leadership, Nsa Language Analyst, Nsa Leaked Tools, Nsa Meaning, Nsa Meme, Nsa Media, Nsa Meet, Nsa Mid South, Nsa Mike Rogers, Nsa Museum, Nsa Mcmaster, Nsa Maryland, Nsa Mission Statement, Nsa News, Nsa Naples, Nsa Name Generator, Nsa North, Nsa Number, Nsa Norfolk, Nsa Nyc, Nsa Nashville, Nsa Nursing, Nsa New Orleans, Nsa Orlando, Nsa Opm Test, Nsa Online Test, Nsa Offices, Nsa Obama, Nsa Organization, Nsa Operational Interview, Nsa Only, Nsa Org Chart, Nsa Of 1947, Nsa Prism, Nsa Police, Nsa Panama City, Nsa Police Officer, Nsa Phone Number, Nsa Philadelphia, Nsa Pay Scale, Nsa Play, Nsa Polygraph, Nsa Purpose, Nsa Quantum Computer, Nsa Quotes, Nsa Qualifications, Nsa Quantum, Nsa Quizlet, Nsa Questions, Nsa Qualifier, Nsa Quantum Computer Farm, Nsa Quartet, Nsa Quiz, Nsa Rogers, Nsa Requirements, Nsa Rules, Nsa Recruiting, Nsa Relationship, Nsa Rule Book, Nsa Ransomware, Nsa Russia, Nsa Responsibilities, Nsa Reno, Nsa Softball, Nsa Surveillance, Nsa Spying, Nsa Slang, Nsa Salary, Nsa Stands For, Nsa Soccer, Nsa Softball Rules, Nsa Scholarship, Nsa Scandal, Nsa Texas, Nsa Tournaments, Nsa Tools, Nsa Trump, Nsa Tao, Nsa Tools Leaked, Nsa Twitter, Nsa Tinder, Nsa Test, Nsa Training, Nsa Utah, Nsa Urban, Nsa Usa, Nsa Utah Facility, Nsa Unmasking, Nsa Utah Jobs, Nsa Unconstitutional, Nsa Umpire, Nsa Under Obama, Nsa Uniform, Nsa Vs Cia, Nsa Visitor Center, Nsa Virginia, Nsa Vs Fbi, Nsa Vs Cia Vs Fbi, Nsa Virus, Nsa Visitor Control Center, Nsa Vpn, Nsa Vanilla, Nsa Violation Of Privacy, Nsa Wiki, Nsa Whistleblower, Nsa Washington, Nsa Wiretapping, Nsa Website, Nsa Water Filter, Nsa Watchlist, Nsa World Series, Nsa Wikileaks, Nsa Wannacry, Nsa Xkeyscore, Nsa Xbox One, Nsa Xeno World Qualifier, Nsa Xkeyscore Download, Nsa Xcode, Nsa Xbox Live, Nsa Xeno Tournament, Nsa Xkeyscore Presentation, Nsa X, Nsa X Files, Nsa Youtube, Nsa Yogurt, Nsa Young Investigator Grant, Nsa Youth Florida, Nsa Yearly Budget, Nsa Yottabyte, Nsa Youth Program, Nsa Youth, Nsa Yellow Dots, Nsa Yakima, Nsa Zero Day, Nsa Zip Code, Nsa Zeus, Nsa Zimmermann Telegram, Nsa Zimbabwe, Nsa Za, Nsa Zero Day Exploit, Nsa Zyxel, Nsa Zero Division, Nsa Zone Store, Nsa Jobs, Nsa Director, Nsa Softball, Nsa Meaning, Nsa Careers, Nsa Definition, Nsa Headquarters, Nsa Surveillance, Nsa Spying, Nsa Internships, Nsa Acronym, Nsa Address, Nsa Advisor, Nsa Agent, Nsa Alabama, Nsa Annapolis, Nsa Agent Salary, Nsa Arc, Nsa Approved Shredders, Nsa Agreement, Nsa Building, Nsa Bahrain, Nsa Budget, Nsa Bethesda, Nsa Baseball, Nsa Badge, Nsa Benefits, Nsa Building Nyc, Nsa Budget 2016, Nsa Backdoor, Nsa Careers, Nsa Chief, Nsa Colorado, Nsa Crane, Nsa Cyber Security, Nsa Conference, Nsa Csfc, Nsa Cae, Nsa Crypto Challenge, Nsa Css, Nsa Director, Nsa Definition, Nsa Data Center, Nsa Day Of Cyber, Nsa Director Salary, Nsa Data Collection, Nsa Domestic Surveillance, Nsa Datasheet, Nsa Deputy Director, Nsa Datasheet Is Called, Nsa Employment, Nsa Edward Snowden, Nsa Exploits, Nsa Employees, Nsa Email, Nsa Evaluated Products List, Nsa Echelon, Nsa Emblem, Nsa Encryption, Nsa Eternal Blue, Nsa Fastpitch, Nsa Florida Youth, Nsa Fort Meade, Nsa Flynn, Nsa Florida, Nsa Friend, Nsa Facebook, Nsa Fort Gordon, Nsa Foia, Nsa Facts, Nsa Georgia, Nsa Glassdoor, Nsa Government, Nsa Grindr, Nsa Github, Nsa Gift Shop, Nsa Game, Nsa Grants, Nsa Gif, Nsa Guy, Nsa Headquarters, Nsa Head, Nsa Hacking Tools, Nsa Hawaii, Nsa Hampton Roads, Nsa Hacked, Nsa History, Nsa Hiring Process, Nsa Hacking Tools Leaked, Nsa Headquarters Address, Nsa Internships, Nsa Industries, Nsa Intelligence Analyst, Nsa Indiana, Nsa Influence 2017, Nsa Iad, Nsa Ias 2017, Nsa India, Nsa Illinois, Nsa Insurance, Nsa Jobs, Nsa Juice Plus, Nsa Job Openings, Nsa Jobs Utah, Nsa Jobs Salary, Nsa Jokes, Nsa Job Requirements, Nsa Jurisdiction, Nsa Jobs In Md, Nsa Japan, Nsa Keywords, Nsa Kunia, Nsa Kc, Nsa Key, Nsa Kentucky, Nsa Kmi, Nsa Kankakee, Nsa Korea, Nsa Kaspersky, Nsa Keith Alexander, Nsa Leaker, Nsa Logo, Nsa Leak, Nsa Locations, Nsa Listening, Nsa Leader, Nsa Login, Nsa Leadership, Nsa Language Analyst, Nsa Leaked Tools, Nsa Meaning, Nsa Meme, Nsa Media, Nsa Meet, Nsa Mid South, Nsa Mike Rogers, Nsa Museum, Nsa Mcmaster, Nsa Maryland, Nsa Mission Statement, Nsa News, Nsa Naples, Nsa Name Generator, Nsa North, Nsa Number, Nsa Norfolk, Nsa Nyc, Nsa Nashville, Nsa Nursing, Nsa New Orleans, Nsa Orlando, Nsa Opm Test, Nsa Online Test, Nsa Offices, Nsa Obama, Nsa Organization, Nsa Operational Interview, Nsa Only, Nsa Org Chart, Nsa Of 1947, Nsa Prism, Nsa Police, Nsa Panama City, Nsa Police Officer, Nsa Phone Number, Nsa Philadelphia, Nsa Pay Scale, Nsa Play, Nsa Polygraph, Nsa Purpose, Nsa Quantum Computer, Nsa Quotes, Nsa Qualifications, Nsa Quantum, Nsa Quizlet, Nsa Questions, Nsa Qualifier, Nsa Quantum Computer Farm, Nsa Quartet, Nsa Quiz, Nsa Rogers, Nsa Requirements, Nsa Rules, Nsa Recruiting, Nsa Relationship, Nsa Rule Book, Nsa Ransomware, Nsa Russia, Nsa Responsibilities, Nsa Reno, Nsa Softball, Nsa Surveillance, Nsa Spying, Nsa Slang, Nsa Salary, Nsa Stands For, Nsa Soccer, Nsa Softball Rules, Nsa Scholarship, Nsa Scandal, Nsa Texas, Nsa Tournaments, Nsa Tools, Nsa Trump, Nsa Tao, Nsa Tools Leaked, Nsa Twitter, Nsa Tinder, Nsa Test, Nsa Training, Nsa Utah, Nsa Urban, Nsa Usa, Nsa Utah Facility, Nsa Unmasking, Nsa Utah Jobs, Nsa Unconstitutional, Nsa Umpire, Nsa Under Obama, Nsa Uniform, Nsa Vs Cia, Nsa Visitor Center, Nsa Virginia, Nsa Vs Fbi, Nsa Vs Cia Vs Fbi, Nsa Virus, Nsa Visitor Control Center, Nsa Vpn, Nsa Vanilla, Nsa Violation Of Privacy, Nsa Wiki, Nsa Whistleblower, Nsa Washington, Nsa Wiretapping, Nsa Website, Nsa Water Filter, Nsa Watchlist, Nsa World Series, Nsa Wikileaks, Nsa Wannacry, Nsa Xkeyscore, Nsa Xbox One, Nsa Xeno World Qualifier, Nsa Xkeyscore Download, Nsa Xcode, Nsa Xbox Live, Nsa Xeno Tournament, Nsa Xkeyscore Presentation, Nsa X, Nsa X Files, Nsa Youtube, Nsa Yogurt, Nsa Young Investigator Grant, Nsa Youth Florida, Nsa Yearly Budget, Nsa Yottabyte, Nsa Youth Program, Nsa Youth, Nsa Yellow Dots, Nsa Yakima, Nsa Zero Day, Nsa Zip Code, Nsa Zeus, Nsa Zimmermann Telegram, Nsa Zimbabwe, Nsa Za, Nsa Zero Day Exploit, Nsa Zyxel, Nsa Zero Division, Nsa Zone Store, Gorbachev Definition, Gorbachev Cold War, Gorbachev Wife, Gorbachev Age, Gorbachev Pizza Hut, Gorbachev Apush, Gorbachev Quotes, Gorbachev Wall, Gorbachev Resigns, Gorbachev Tear Down This Wall, Gorbachev Age, Gorbachev Apush, Gorbachev And Reagan, Gorbachev Ap Euro, Gorbachev And Perestroika, Gorbachev And Yeltsin, Gorbachev And Putin, Gorbachev Accomplishments, Gorbachev And Reagan Meeting, Gorbachev Alive, Gorbachev Berlin Wall, Gorbachev Biography, Gorbachev Birthday, Gorbachev Becomes Leader, Gorbachev Book, Gorbachev Birthmark Jokes, Gorbachev Becomes Premier Of Soviet Union, Gorbachev Becomes President, Gorbachev Brezhnev, Gorbachev Becomes Soviet Leader Date, Gorbachev Cold War, Gorbachev Comes To Power, Gorbachev Coup, Gorbachev Cartoon, Gorbachev Communism, Gorbachev Corn, Gorbachev Chernobyl, Gorbachev Commercial, Gorbachev Came To Power, Gorbachev Comes To Power Date, Gorbachev Definition, Gorbachev Death, Gorbachev Doctrine, Gorbachev Daughter, Gorbachev Definition Quizlet, Gorbachev Detente, Gorbachev Democracy, Gorbachev Domestic Policy, Gorbachev Daily Show, Gorbachev Doll, Gorbachev Economic Reforms, Gorbachev Era, Gorbachev Election, Gorbachev Ended The Cold War, Gorbachev End Of Communism, Gorbachev Effect, Gorbachev End Of Soviet Union, Gorbachev East Germany, Gorbachev Establishes Glasnost And Perestroika, Gorbachev Elected President, Gorbachev Foreign Policy, Gorbachev Facts, Gorbachev Foundation, Gorbachev Freedom Of Speech, Gorbachev Frees Warsaw Pact Nations, Gorbachev Forehead, Gorbachev Funny, Gorbachev Fall Of Ussr, Gorbachev Family, Gorbachev Fun Facts, Gorbachev Glasnost, Gorbachev Grammy, Gorbachev Good Or Bad, Gorbachev Goals, Gorbachev General Secretary, Gorbachev Glasnost Speech, Gorbachev Gif, Gorbachev Granddaughter, Gorbachev Government, Gorbachev Glasnost Perestroika Apush, Gorbachev Head, Gorbachev History, Gorbachev Height, Gorbachev History Definition, Gorbachev Home, Gorbachev Health, Gorbachev How To Pronounce, Gorbachev House, Gorbachev Historiography, Gorbachev Held Hostage, Gorbachev Introduces Perestroika, Gorbachev In Power, Gorbachev In The Cold War, Gorbachev Images, Gorbachev Interview, Gorbachev Importance, Gorbachev Initiative, Gorbachev Is He Still Alive, Gorbachev Ideology, Gorbachev Important Events, Gorbachev Jokes, Gorbachev Jfk, Gorbachev Jason Jones, Gorbachev Jump, Gorbachev John D Clare, Gorbachev John Paul Ii, Gorbachev Yeltsin, Jontron Gorbachev, Gorbachev Birthmark Jokes, Mikhail Gorbachev Job, Gorbachev Khrushchev, Gorbachev Known For, Gorbachev Kgb, Gorbachev Katyn, Gorbachev Knock Down That Wall, Gorbachev Kennedy, Gorbachev Kimdir, Gorbachev Key Policies, Gorbachev Key Dates, Gorbachev Kohl, Gorbachev Louis Vuitton, Gorbachev Legacy, Gorbachev Leadership, Gorbachev Leads Soviet Union, Gorbachev Life, Gorbachev Lives In California, Gorbachev Lithuania, Gorbachev Leader, Gorbachev Lesson Plan, Gorbachev Limousine, Gorbachev Memes, Gorbachev Mikhail, Gorbachev Moves Toward Democracy, Gorbachev Mark, Gorbachev Meaning, Gorbachev Memoirs, Gorbachev Man Of The Year, Gorbachev Moves Toward Democracy Guided Reading, Gorbachev Military Policy, Gorbachev Mask, Gorbachev Nobel Peace Prize, Gorbachev Now, Gorbachev New Thinking, Gorbachev Net Worth, Gorbachev News, Gorbachev Nuclear Disarmament, Gorbachev Newspaper, Gorbachev Nesting Dolls, Gorbachev Nobel Peace Prize Speech, Gorbachev New World Order, Gorbachev On Putin, Gorbachev On Trump, Gorbachev On Reagan, Gorbachev On Stalin, Gorbachev On Reagan Death, Gorbachev Oval Office, Gorbachev On Perestroika, Gorbachev Opposition, Gorbachev On Ronald Reagan, Gorbachev Or Gorbachev, Gorbachev Policies, Gorbachev Pizza Hut, Gorbachev Perestroika, Gorbachev Putin, Gorbachev Political Cartoons, Gorbachev President, Gorbachev Plan, Gorbachev Political Views, Gorbachev Pronounce, Gorbachev Personality, Gorbachev Quotes, Gorbachev Quizlet, Gorbachev Quotes On Perestroika, Gorbachev Quotes On Reagan, Gorbachev Quotes On Glasnost, Gorbachev Quote On Eu, Gorbachev Quora, Gorbachev Quotes On Cold War, Gorbachev Reforms, Gorbachev Resigns, Gorbachev Reagan, Gorbachev Russia, Gorbachev Revolution, Gorbachev Rise To Power, Gorbachev Residence, Gorbachev Resignation Speech, Gorbachev Religion, Gorbachev Reagan Summits, Gorbachev Speech, Gorbachev Significance, Gorbachev Scar, Gorbachev Still Alive, Gorbachev Supermarket, Gorbachev Soviet Union, Khrushchev Shoe, Gorbachev Steps Down, Gorbachev Speech 1988, Gorbachev Summary, Gorbachev Tear Down This Wall, Gorbachev Today, Gorbachev Takes Power, Gorbachev Trump, Gorbachev Twin Peaks, Gorbachev Timeline, Gorbachev Time Magazine, Gorbachev Title, Gorbachev Twitter, Gorbachev Tear Down The Wall, Gorbachev Ussr, Gorbachev Un Speech, Gorbachev Ufo, Gorbachev Us Relations, Gorbachev Ukraine, Gorbachev Us Visit, Gorbachev Us History, Gorbachev Ufo Quote, Gorbachev Urban Dictionary, Gorbachev Us Supermarket, Gorbachev Vs Putin, Gorbachev Vs Reagan, Gorbachev Visits Us, Gorbachev Vodka, Gorbachev Visits Canada, Gorbachev And Yeltsin, Gorbachev Video, Gorbachev Vice President, Gorbachev And Stalin, Gorbachev Visits Grocery Store, Gorbachev Wife, Gorbachev Wall, Gorbachev Wiki, Gorbachev War, Gorbachev Warsaw Pact, Gorbachev Wine Stain, Gorbachev White House, Gorbachev Ww3, Gorbachev With Hair, Gorbachev What Did He Do, Gorbachev Xi Jinping, Xenia Gorbachev, Mikhail Gorbachev, Reagan Gorbachev Xbox One, Gorbachev Deng Xiaoping, Reagan Gorbachev Xbox Review, Reagan Gorbachev Xbox One Walkthrough, Reagan And Gorbachev, Reagan Vs Gorbachev Xbox, Gorbachev Young, Gorbachev Yeltsin, Gorbachev Yeltsin Putin, Gorbachev Youtube, Gorbachev Yahoo, Gorbachev Years Of Presidency, Gorbachev Yeltsin 1991, Gorbachev Yuri, Gorbachev Yugoslavia, Gorbachev Youth

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, COMMUNISTS, RUSSIA, THE NATIONAL SECURITY April 28, 2016June 28, 2021 26 Minutes

Cryptome unveils Snowden Documents

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

ย 

Donate for the Cryptome archive of files from June 1996 to the present ย 
ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย 

ย 

ย 

Tweet

10 February 2016. Add 99 pages to Boing Boing (released 2 February 2016). Tally now *6,318 pages of The Guardian first reported 58,000 files; caveat: Janine Gibson, The Guardian NY, said on 30 January 2014 “much more than 58,000 files in first part, two more parts” (no numbers) (tally about ~10.6%). DoD claims 1,700,000 filesย (~.04% of that released). ACLU lists 525 pages released by the press. However,ย if as The Washingtonย Post reported,ย a minimum of 250,000 pages are in the Snowden files, then less than 1% have been released. Note Greenwald claim on 13 September 2014ย of having “hundredsย of thousands” of documents. At Snowden current rate it will take 20-620 years to free all documents.

6 February 2016. (ยฑ) False Tallies-the Prisonerโ€™s Dilemma? https://vimeo.com/145453201

2 February 2016. Add 14 pages to The Intercept.

23 December 2015. Add 7 pages to The Intercept

20 November 2015. Add 5 pages to Telesurtv and The Intercept.

28 September 2015. Add 21 pages to The Intercept.

24 September 2015. Add 283 pages to The Intercept.

15 August 2015. Add 74 pages to New York Times-Propublica.

11 August 2015. Add 29 pages to The Intercept.

3 August 2015. Add 10 pages to The Intercept.

16 July 2015. Add 8 pages to The Intercept.

1 July 2015. Add 1,240 pages to The Intercept.

26 June 2015. Add 13 pages to The Intercept.

22 June 2015. Add 250 pages to The Intercept.

13 June 2015. Italian journalist provides correspondence with USG on Snowden documents:

2015-1504.pdf offsite Stefania Maurizi-NSA Snowden Correspondence      June 13, 2015
2015-1503.pdf offsite Stefania Maurizi-DoJ Snowden Correspondence      June 13, 2015
2015-1502.pdf offsite Stefania Maurizi-State Snowden Correspondence    June 13, 2015

12 June 2015. Paul and FVEYDOCS tweet:

https://fveydocs.org/IC off the Record:

https://nsa.gov1.info/dni/

12 June 2015. Aeris tweets:

https://nsa.imirhil.fr/OCRized/indexed/full-text-searchable PDF.

12 June 2015. Christopher Parsons writes:

Saw your tweet re: sources for Snowden docs. I’ve compiled all the relevant Canadian documents, along with summary information of the documents’contents along with indexing information, here:https://www.christopher-parsons.com/writings/cse-summaries/

In the coming months I’m hoping to have equivalent summaries for Australia and New Zealand (and will then be moving on to do similar summary work for US- and UK-based documents).

12 June 2015. Snowden documents compilations (plus this one):

https://search.edwardsnowden.com/
https://edwardsnowden.com/revelations/
http://cjfe.org/snowden
https://github.com/nsa-observer/documents/tree/master/files/pdf
https://www.aclu.org/nsa-documents-search
http://freesnowden.is/category/revealed-documents/index.html
https://www.eff.org/deeplinks/2013/11/nsa-spying-primary-sources
https://www.aclu.org/nsa-documents-released-public-june-2013
http://leaksource.wordpress.com/

If all documents are free somewhere please send pointer to: cryptome[at]earthlink.net

12 June 2015. Add 4ย pages to The Intercept.

4 June 2015. Add 91ย pages toย The New York Times.

28 May 2015. Add 23ย pages toย Theย Intercept.

22 May 2015. Add 26ย pages toย CBC (with Theย Intercept).

21 May 2015. Edward Snowden was quoted in Forbes on May 10, 2015:

http://www.forbes.com/sites/runasandvik/2015/05/10/what-edward-snowden-said-at-the-nordic-media-festival/2/

“What I did was that I worked in partnership with the journalists who received the material. As a condition of receiving the material they agreed, prior to publication, to run these stories by the government. Not for the government to censor them, but for the government to be able to look at these and go โ€œlook, this isnโ€™t going to get anybody killed, this isnโ€™t going to put a human agent behind enemy lines at riskโ€ or something like that. โ€œThis isnโ€™t going to make Al Qaeda be able to bomb buildings.โ€ And I think the value of this model has been proven to be quite effective.”

This indicates all stories about document releases have been “run-by governments prior to publication.” Cryptome has filed an FOIA request to NSA for records of these “run-bys.”

https://cryptome.org/2015/05/snowden-media-usg-contacts-4.pdf

21 May 2015. Add 10ย pages toย Theย Intercept.

19 May 2015. Add 19ย pages toย Theย Intercept.

18 May 2015. Add 6ย pages toย Theย Intercept.

8 May 2015. Add 40ย pages toย Theย Intercept.

5 May 2015. Add 46ย pages toย Theย Intercept.

2 April 2015. Add 7ย pages toย Theย Intercept.

30 Marchย 2015. Snowden documents archive by The Courageย Foundation:

https://edwardsnowden.com/revelations/

24 March 2015. Add 152 pages to CBC News.

14 March 2015. Add 2 pages to New Zealand Herald.

10 March 2015. Add 12 pages to The Intercept. Add 8 pages to New Zealand Herald.

8 March 2015. Add 35 pages to New Zealand Star Times.

6 March 2015. Add 4 pages to New Zealand Herald.

5ย March 2015. Snowden Archive, searchable: http://cjfe.org/snowden

5 March 2015. Add 6 pages to New Zealand Herald.

19 February 2015. Add 32 pages to The Intercept.

10 February 2015. Add 2 pages to The Intercept.

5 February 2015. Add 3 pages to The Intercept.

4 February 2015. Add 5 pages to The Intercept.

30 January 2015. Compilation of Snowden documents:

https://github.com/nsa-observer/documents/tree/master/files/pdf

[Repost] 4 April 2014. ACLU offers NSA documents search: https://www.aclu.org/nsa-documents-search

Also:

http://freesnowden.is/category/revealed-documents/index.html

https://www.eff.org/deeplinks/2013/11/nsa-spying-primary-sources

https://www.aclu.org/nsa-documents-released-public-june-2013

http://leaksource.wordpress.com/

If more lists please send: cryptome[at]earthlink.net

28 January 2015. Add 21 pages to CBC News.

26 January 2015. Add Citizenfour Snowden Documentary High-Definition, with innumerable images, by Cryptome.

25 January 2015. Add Citizenfour Snowden Documentary by Cryptome, with innumerable images, some 87 extracted by Paul Dietrich in following entry.

22 Januaryย 2015. Add 87 pages to Paul Dietrich (via Citizenfour).

17 Januaryย 2015. Add 199 pages to Der Spiegel.

28 December 2014. Add 666 pages to Der Spiegel.

22 December 2014. Add 1 page to New York Times.

13 December 2014. Add 67 pages to The Intercept.

4 December 2014. Add 63 pages to The Intercept.

25 November 2014. Add 72 pages to Sรผddeutsche Zeitung.

6 November 2014. At current rate ofย release itย will take 31 to 908 years for full disclosure.

10 October 2014. Add 69ย pages to The Intercept.

17 September 2014.ย Add 2ย pages to The Intercept.

14ย Septemberย 2014.ย Add 68ย pages to Der Spiegel.

13ย September 2014.ย In video Glenn Greenwald claims to have “hundredsย of thousands” of documents (at 9:06 min)

http://www.3news.co.nz/tvshows/thenation/interview-glenn-greenwald-2014091311?ref=video

Audio excerpt: http://youtu.be/xnfIp38AAhM

5 Septemberย 2014. Addย 32ย pages toย Theย Intercept.

31 Augustย 2014. Addย 34ย pages toย Der Spiegel.

25 Augustย 2014. Addย 55ย pages toย The Intercept.

16 Augustย 2014. Addย 26ย pages toย Heise.

12 Augustย 2014. Addย 6ย pages toย The Intercept.

5 Augustย 2014. Addย 12ย pages toย The Intercept.

4 Augustย 2014. Addย 23 pages toย The Intercept.

25 Julyย 2014. Addย 4ย pages toย The Intercept.

14 Julyย 2014. Addย 8ย pages toย The Intercept.

14 July 2014. “I’m as mad as hell and I’m not going to take this anymore!”

http://en.wikipedia.org/wiki/Network_%28film%29

Cryptome has sent a demand for accountingย and public release specifics to holders ofย the Snowden documents: New York Times, Washington Post, Theย Guardian, Bartonย Gellman, Laura Poitrias, Glenn Greenwald, ACLU, EFF and John andย Jane Does, US Citizens:

https://cryptome.org/2014/07/snowden-documents-demand-14-0714.pdf

11 July 2014. See related essay, Open the Snowden Files, Krystian Woznicki,ย 11July 2014:

English: http://berlinergazette.de/wp-content/uploads/Open-the-Snowden-Files_KW_E.pdf
German: http://berlinergazette.de/open-the-snowden-files/

11 July 2014. @PaulMD notes this claim inย theย Washington Post, 11 July 2014:

We did not have an official NSA list of targets. We had to find them in the pile ourselves. Soltani, an independent researcher, did most of the heavy lifting on that. Because the information was not laid out in rows and columns, the way it might be in a spreadsheet, Soltani wrote computer code to extract what we were looking for from something like a quarter-million pages of unstructured text.

If a minimum of 250,000 pages are in the Snowden files, then less than 1% have been released.

9 July 2014. Add 8 pages to The Intercept.

9 July 2014. Add 1 page to Washington Post.

23 June 2014. Add 9 pages to Der Spiegel.

22 June 2014. Add 41 pages to Information-The Intercept.

Revised. This is included in entry above. 18 Juneย 2014. Add 20 pagesย to The Intercept.

18 June 2014. Add 200 pages to Der Spiegel.

16 June 2014. Add 4 pages to Der Spiegel.

1 Juneย 2014. Add 4ย pagesย toย Newย Yorkย Times.

23 May 2014. Cryptome placed online No Place to Hide, 310 pages, to compensate forย failure to release Snowden documents:

https://cryptome.org/2014/05/npth-freed.htm

https://cryptome.org/2014/05/npth.7z (27MB)

19 May 2014. The Intercept released 12 pages.

13 May 2014. Glenn Greenwald released 107 pages,ย some new, some previously published, some full pages, some page fragments.

http://hbpub.vo.llnwd.net/o16/video/olmk/holt/greenwald/NoPlaceToHide-Documents-Uncompressed.pdf

5 May 2014. Related tally of redactions of Snowden releases:

https://cryptome.org/2014/05/snowden-redactions.htm

30 April 2014. Add 19 pages to The Intercept.

30 April 2014. Add 2 pages to Dagbladet belatedly.

5 April 2014. Add 21 pages to The Intercept.

4 April 2014. ACLU offers NSA documents search: https://www.aclu.org/nsa-documents-search

Also:

http://freesnowden.is/category/revealed-documents/index.html

https://www.eff.org/deeplinks/2013/11/nsa-spying-primary-sources

https://www.aclu.org/nsa-documents-released-public-june-2013

http://leaksource.wordpress.com/

If more lists please send: cryptome[at]earthlink.net

2 April 2014.

29 March 2014. Add 1ย page to Der Spiegel.

22 March 2014. Add 3 pages to Der Spiegel.

22 March 2014. Add 2 pages to New York Times.

21 March 2014. Add 7 pages to Le Monde.

20 March 2014. Add 6 pages to The Intercept.

18 March 2014. Add 4 pages to Washington Post.

13 March 2014. Add 1 page to The Intercept.

12 March 2014. Add 35 pages to The Intercept.

12 March 2014. Add 62ย pages to New York Times. Add 2 pages to NRC Handelsblad.

7 March 2014. Add 8 pages to The Intercept.

27 February 2014. Add 3 pages to Guardian.

25 February 2014. Add 11 pages to NBC News.

24 February 2014. Addย 4 pages to The Intercept.

24 February 2014. Add *50 pages to The Intercept (7 pages are duplicates of GCHQ Psychology).

18 February 2014. Add *45 pages to The Intercept (37 pages are duplicates of release by NBC News).

Note: Between 10-17 February 2014, The Intercept disclosed fragments of Snowden pages and the New York Times referenced some but as far as knownย did not release them in full. If available please send link.

10 February 2014. Add 1 page to NRC Handelsblad (via Electrospaces.blogspot.com).

7 February 2014. Add 15 pages NBC News.

5 February 2014. Add 14 pages NBC News.

31 January 2014. Add 27 pages to CBC News.

27 January 2014. Add 47 pages to NBC News.

27 January 2014. Add 18 pages to Anonymous via New York Times.

16 January 2014. Add 8 pages to Theย Guardian.

* 14 January 2014. Add 21 pages to Information.dk (duplicate).

* 13 January 2014. Add 4 pages to Information.dk (duplicate).

Related Snowden Document and Page Count Assessment:

https://cryptome.org/2014/01/snowden-count.htm

* 5 January 2014. Add 16 pages to Der Spiegel (30 December 2013. No source given for NSA docs). Tally now *962 pages (~1.7%) of reported 58,000. NSA head claims 200,000 (~.50% of that released).

4 January 2014. The source was not identified for *133 ย pages published by Der Spiegel and Jacob Appelbaum in late December 2013. They are included here but have not been confirmed as provided by Edward Snowden. Thanks to post by Techdirt.

Glenn Greenwald tweeted:

Glenn Greenwald @ggreenwald, 8:05 AM – 29 Dec 13@Cryptomeorg @ioerror I had no involvement in that Spiegel article, ask them – and they don’t say those are Snowden docs.

Matt Blaze tweeted, 11:24 AM – 2 Jan 14

matt blaze @mattblazeIf there are other sources besides Snowden, I hope journalists getting docs are careful to authenticate them (& disclose uncertainty).

3 January 2014. Add 13 pages to Washington Post.

3 January 2014. See also EFF, ACLU and LeakSource accounts:

https://www.eff.org/deeplinks/2013/11/nsa-spying-primary-sources

https://www.aclu.org/nsa-documents-released-public-june-2013

http://leaksource.wordpress.com/

2 January 2014. Add 1 page to Washington Post published 10 July 2013.

* 31 December 2013. Add 16 pages to Der Spiegel.

* 30 December 2013. Add 50 pages of NSA ANT Catalog by Jacob Appelbaum (no source given for NSA docs).

* 30 December 2013. Add 21 pages from 30C3 video by Jacob Appelbaum (no source given for NSA docs).

* 30 December 2013. Add 42 pages (8 duplicates) to Der Spiegel (no source given for NSA docs).

* 29 December 2013. Add 4 pages to Der Spiegel (no source given for NSA docs).

24 December 2013. Add 2 pages to Washington Post.

23 December 2013

http://www.adn.com/2013/12/22/3243451/pincus-snowden-still-has-a-road.html

We’ve yet to see the full impact of former National Security Agency contractor Edward Snowden’s unauthorized downloading of highly classified intelligence documents.

Among the roughly 1.7 million documents he walked away with — the vast majority of which have not been made public — are highly sensitive, specific intelligence reports, as well as current and historic requirements the White House has given the agency to guide its collection activities, according to a senior government official with knowledge of the situation.

The latter category involves about 2,000 unique taskings that can run to 20 pages each and give reasons for selective targeting to NSA collectors and analysts. These orders alone may run 31,500 pages.

13 December 2013. Add 26 pages to Trojkan (SVT). Tally now 797 pages (~1.4%) of reported 58,000. NSA head claims 200,000 (~.40% of that released). Australia press reports “up to 20,000 Aussie files.”

Rate of release over 6 months, 132.8 pages per month, equals 436 months to release 58,000, or 36.3 years. Thus the period of release has decreased in the past month from 42 years.

12 December 2013. Belatedly add 27 pages to Guardian and 18 pages to Washington Post.


21 November 2013. See also EFF and ACLU accounts:

https://www.eff.org/deeplinks/2013/11/nsa-spying-primary-sources

https://www.aclu.org/nsa-documents-released-public-june-2013


Timeline of releases:

[See tabulation below for full timeline.]


5 October 2013

26 Years to Release Snowden Docs by The Guardian

Out of reported 15,000 pages, The Guardian has published 192 pages in fourteen releases over four months, an average of 48 pages per month, or 1.28% of the total. At this rate it will take 26 years for full release.


Number Date Title Pages

ย  The Guardian ย  276
ย  27 February 2014 GCHQ Optic Nerve 3
21 16 January 2014 SMS Text Messages Exploit 8
20 9 December 2013 Spying on Games 2
18 18 November 2013 DSD-3G 6
19 1 November 2013 PRISM, SSO
SSO1 Slide
SSO2 Slide
13*
18 4 October 2013 Types of IAT Tor 9
17 4 October 2013 Egotistical Giraffe 20*
16 4 October 2013 Tor Stinks 23
15 11 September 2013 NSA-Israel Spy 5
14 5 September 2013 BULLRUN 6*
13 5 September 2013 SIGINT Enabling 3*
12 5 September 2013 NSA classification guide 3
11 31 July 2013 XKeyscore 32
10 27 June 2013 DoJ Memo on NSA 16
9 27 June 2013 Stellar Wind 51
8 21 June 2013 FISA Certification 25
7 20 June 2013 Minimization Exhibit A 9
6 20 June 2013 Minimization Exhibit B 9
5 16 June 2013 GCHQ G-20 Spying 4
4 8 June 2013 Boundless Informant FAQ 3
3 8 June 2013 Boundless Informant Slides 4
2 7 June 2013 PPD-20 18
1 5 June 2013 Verizon 4

ย  Washington Post ย  297
ย  9 July 2014 NSA Emails 1
ย  18 March 2014 NSA SCALAWAG 2
ย  18 March 2014 NSA MYSTIC 2
ย  2 January 2014 Quantum Computer 2 10
ย  2 January 2014 Quantum Computer 3
ย  23 December 2013 NSA/CSS Mission 2
ย  11 December 2013 Excessive Collection 9
ย  11 December 2013 SCISSORS 2 7
ย  11 December 2013 SCISSORS 1 4
ย  11 December 2013 Yahoo-Google Exploit 6
ย  11 December 2013 Cable Spying Types 7
ย  11 December 2013 WINDSTOP 1
ย  11 December 2013 Co-Traveler 24
ย  11 December 2013 GSM Tracking 2
ย  11 December 2013 SIGINT Successes 4
ย  11 December 2013 GHOSTMACHINE 4
ย  5 December 2013 Target Location 1
ย  4 December 2013 FASCIA 2
ย  4 December 2013 CHALKFUN 1
ย  26 November 2013 Microsoft a Target? 4
ย  4 November 2013 WINDSTOP, SSO, Yahoo-Google 14
ย  30 October 2013 MUSCULAR-INCENSOR Google and Yahoo 4
ย  14 October 2013 SSO Overview 4
ย  14 October 2013 SSO Slides 7
ย  14 October 2013 SSO Content Slides 9
ย  4 October 2013 Tor 49
ย  4 October 2013 EgotisticalGiraffe 20*
ย  4 October 2013 GCHQ MULLENIZE 2
ย  4 October 2013 Roger Dingledine 2
ย  30 August 2013 Budget 17
ย  10 July 2013 PRISM Slide 1
ย  29 June 2013 PRISM 8
ย  20 June 2013 Warrantless Surveillance 25*
ย  7 June 2013 PPD-20 18*
ย  6 June 2013 PRISM 1

ย  Der Spiegel ย  * 1,278
ย  17 January 2015 NSA Prepares for Cyber Battle 199
ย  28 December 2014 NSA Attacks on VPN, SSL, TLS, SSH, Tor 197MB 666
ย  14 September 2014 GCHQ STELLAR 26
ย  14 September 2014 NSA Treasure Map 38
ย  14 September 2014 NSA Treasure Map New 4
ย  31 August 2014 NSA GCHQ Spy Turkey 34
ย  23 June 2014 NSA German SIGADs 9
ย  18 June 2014 NSA German Spying-2 200
ย  16 June 2014 NSA German Spying 4
ย  29 March 2014 NSA Spy Chiefs of State 1
ย  22 March 2014 NSA SHOTGIANT 2NSA SHOTGIANT 1 21
ย  31 December 2013 QFIRE * 16
ย  30 December 2013 TAO Introduction * 16
ย  30 Deceber 2013 QUANTUM Tasking (8 duplicates of QUANTUMTHEORY) 28*
ย  30 December 2013 QUANTUMTHEORY 14
ย  29 December 2013 TAO ANT COTTONMOUTH (images)
TAO ANT COTTONMOUTH
(DE article)
4
ย  17 November 2013 ROYAL CONCIERGE (DE)ROYAL CONCIERGE (EN) 2
ย  29 October 2013 NSA-CIA SCS 3
ย  27 October 2013 NSA-CIA SCS 2
ย  20 October 2013 Mexico President 1
ย  20 September 2013 Belgacom 3
ย  16 September 2013 SWIFT 3
ย  9 September 2013 Smartphones 5
ย  1 September 2013 French Foreign Ministry 0
ย  31 August 2013 Al Jazeera 0

ย  O Globo Fantastico ย  ~87
ย  7 October 2013 CSE Brazil Ministry 7
ย  8 September 2013 Petrobas ~60
ย  3 September 2013 Brazil and Mexico 20

ย  New York Times ย  216
ย  15 August 2015 NSA SSO Fairview Stormbrew Blarney (with Propublica) 74
ย  4 June 2015
4 June 2015
NSA Expands Phone Spying at Borders
NSA Expands Phone Spying at Borders 2
90
1
ย  22 December 2014 NSA Tracks Zarrar Shah 1
ย  1 June 2014 NSA Identity Spying 4
ย  22 March 2014 NSA Huawei SHOTGIANT 2
ย  12 March 2014 NSA Stellarwind Classification
NSA FISA FAA Classification
AG Dissemination
NSA Cryptanalyist FISA Database
NSA Spying Timeline
37
18
2
4
1
ย  9 December 2013 Spying on Games 82*
ย  23 November 2013 SIGINT Strategy 2012-2016 5
ย  3 November 2013 SIGINT Mission 2013SIGINT Mission 2017 22
ย  28 September 2013 Contact Chaining Social Networks 1
ย  28 September 2013 SYANPSE 1
ย  5 September 2013 BULLRUN 4*
ย  5 September 2013 SIGINT Enabling 3*
ย 

ย  ProPublica ย  163*
ย  15 August 2015 NSA SSO Fairview Stormbrew Blarney (with NY Times) 74*
ย  9 December 2013 Spying on Games 82*
ย  5 September 2013 BULLRUN 4*
ย  5 September 2103 SIGINT Enabling 3*

ย  Le Monde ย  20
ย  21 March 2014 CSE SNOWGLOBE 7
ย  25 October 2013 NSA Hosts FR Spies 4
ย  22 October 2013 Wanadoo-Alcatel 1
ย  22 October 2013 Close Access Sigads 2
ย  22 October 2013 Boundless Informant 2
ย  22 October 2013 PRISM 11

ย  Dagbladet ย  15
ย  April 2014
December 2013
Norway Assistance 2
ย  19 November 2013 BOUNDLESSINFORMANT 13

ย  NRC Handelsblad ย  7
ย  12 March 2014 NSA Aids Dutch Anti-Piracy 2
ย  8 February 2014 MIVD BoundlessInformant
Cryptome mirror
1
ย  30 November 2013 Dutch SIGINT 3
ย  23 November 2013 SIGINT Cryptologic Platform 1

ย  Huffington Post ย  3
ย  27 November 2013 Muslim Porn Viewing 3

ย  CBC ย  214
ย  22 May 2015 US-UK-CA-AU-NZ Cellphone Spying 26*
ย  24 March 2015 CSEC Cyber Threats 152
ย  28 January 2015 CSE LEVITATION-FFU Project 21
ย  30 January 2014 CSEC IP Profiling 27
ย  10 December 2013 NSA-CSEC Partnership 1
ย  10 December 2013 G8-G20 Spying 4*
ย  2 December 2013 G8-G20 Spying 3
ย  29 November 2013 G8-G20 Spying 1

ย  The Globe and Mail ย  18
ย  30 November 2013 CSEC Brazil Spying 18*

ย  SVT (Swedish TV) ย  2
ย  5 December 2013 Sweden Spied Russia for NSA 2

ย  L’Espresso ย  3
ย  6 December 2013 NSA Spies Italy 3

ย  Trojkan (SVT) ย  29
ย  11 December 2013 NSA Sweden FRA Relationship 1*
ย  11 December 2013 NSA 5 Eyes Partners 1
ย  11 December 2013 NSA Sweden FRA Agenda 8
ย  11 December 2013 NSA Sweden FRA RU Baltic 1
ย  11 December 2013 NSA GCHQ Sweden FRA COMINT 1
ย  11 December 2013 NSA Sweden FRA ย XKeyscore Plan 5
ย  11 December 2013 NSA Sweden FRA XKeyscore Sources 1
ย  11 December 2013 NSA Sweden FRA XKeyscore Tor et al 3
ย  11 December 2013 NSA Sweden FRA XKeyscore Slide 1
ย  11 December 2013 NSA Sweden FRA Quantum 1 1
ย  11 December 2013 GCHQ Sweden FRA Quantum 1
ย  11 December 2013 NSA Sweden FRA Quantum Accomplishments 2
ย  9 December 2013 NSA and Sweden Pact 3*

ย  Jacob Appelbaum ย  * 71
ย  30 December 2013 NSA Catalog * 50
ย  30 December 2013 NSA Catalog Video Clips * 21

ย  Information.dk ย  63*
ย  19 June 2014 NSA Partners 41*
ย  14 January 2014 SSO (duplicate) 7*
ย  14 January 2014 PRISM (duplicate) 11*
ย  13 January 2014 5-Eyes Spy G8-G20 (duplicate) 4*

ย  Anonymous/
New York Times
ย  18
ย  27 January 2014 NSA Smartphones Analysis 14
ย  27 January 2014 GCHQ Mobile Theme 4

ย  NBC News ย  87
ย  25 February 2014 GCHQ Cyber Effects 11
ย  7 February 2014 GCHQ Cyber Attack 15
ย  5 February 2014 GCHQ Anonymous 14
ย  27 January 2014 GCHQ Squeaky Dolphin 47

ย  The Intercept ย  2,704*
ย  2 February 2016 UAV Programs 14
ย  23 December 2015 NSA-GCHQ Juniper 7
ย  17 November 2015 NSA SCS Venezuela 5
ย  28 September 2015 NSA Rogue Olympics 21
ย  24 September 2015 NSA-GCHQ 29 Documents 283
ย  11 August NSA SIGINT Philosopher 29
ย  3 August 2015 NSA ECHELONGCHQ COMSAT 73
ย  16 July 2015 NSA Manhunting 8
ย  1 July 2015 NSA XKeyscore and More 1,264
ย  26 June 2015 NSA on NYT Warrantless Wiretap Story 13
ย  22 June 2015 GCHQ 11 Filles 250
ย  12 June 2015 NSA SID Hacker Interview 4
ย  28 May 2015 NSA SID Today 23
ย  22 May 2015 US-UK-CA-AU-NZ Cellphone Spying 26*
ย  21 May 2015 NSA Medical Spying 10
ย  19 May 2015 NSA SID NATO 19
ย  18 May 2015 JTAC Attack Methodology 3
ย  18 May 2015 NCTC Major Terrorism Figures 1
ย  18 May 2015 Black Budget Bin Laden Raid 2
ย  8 May 2015 NSA SKYNET 40
ย  5 May 2015 NSA Black Budget SID RT10 WG Language 46
ย  2 April 2015 NSA GCHQ JTRIG Argentina-Iran 7
ย  10 March 2015 NSA Apple DPA Cryptanalysis 12
ย  19 February 2015 GCHQ PCS Harvesting At Scale 32
ย  10 February 2015 NSA Iran GCHQ 2
ย  5 February 2015 DNI NATO Cyber Panel 3
ย  4 February 2015 GCHQ Lovely Horse et al 5*
ย  13 December 2014 GCHQ Belgacom Hack 67
ย  4 December 2014 NSA AURORA GOLD et al 63
ย  10 October 2014 10 NSA Releases
Computer Network Exploitation Declass
National Initiative Task Security 2
National Initiative Task Security 1
Exceptionally Controlled Info Compartments
Exceptionally Controlled Info Pawleys
Exceptionally Controlled Information
Sentry Eagle 2
Sentry Eagle 1
Tarex Classification Guide
Whipgenie Classification Guide
69
ย  17 September 2014 NSA Visit by NZ Spy 2
ย  5ย September 2014 Masterspy Quadrennial Report 2009 32
ย  25 August 2014 NSA ICREACH 55
ย  12 August 2014 GCHQ Covert Mobile Phones Policy 6
ย  5 August 2014 NCTC Terrorist Identifies 12
ย  4 August 2014 US-NSA Pays Israel $500,000 2
ย  4 August 2014 NSA-Israel Spying Pact 2013 3
ย  4 August 2014 Israel-US Spying Pact 1999 16
ย  25 July 2014 NSA Saudi Arabia 4
ย  14 July 2014 NSA JTRIG Tools-Techniques 8
ย  9 July 2014 NSA FISA Accounts 8
ย  19 June 2014 NSA Partners 41*
ย  19 May 2014 12 Various Pages 12
ย  30 April 2014 GHOSTMACHINE-ECHOBASE
NSA Visit by GCHQ Lobban
PRISM with Olympics
14:6+8
4:1+3
1:
ย  4 April 2014 GCHQ Full Spectrum Cyber
NSA 5-Eyes SIGDEV Conference
19
2
ย  20 March 2014 NSA Hunt Sysadmins 6
ย  13 March 2014 NSA Third Party 1
ย  12 March 2014 NSA HammerchantNSA UK on Mikey and Ibake

ย 

NSA Turbine and Turmoil

NSA Thousands of Implants

NSA More Than One Way

NSA GCHQ Quantumtheory

NSA Selector Types

NSA Quantum Insert

NSA Analysis of Converged Data

NSA Phishing and MTM Attacks

NSA Menwith Hill xKeyscore

NSA Industry Exploit

NSA 5 Eyes Hacking

43

ย 

2

1

1

11

1

5

1

3

1

1

1

ย  7 March 2014 NSA Ask Zelda 8
ย  24 February 2014 GCHQ Disruption 4
ย  24 February 2014 GCHQ Online Deception
(7 pages duplicates of GCHQ Psychology)
*50
ย  18 February 2014 GCHQ Psychology37 Duplicates of NBC News *44
ย  18 February 2014 NSA-GCHQ Discovery 1
ย  ย  ย  ย 
ย  Glenn Greenwald ย  ย 
ย  13 May 2014 A variety of documents 107
ย  ย  ย  ย 
ย  Cryptome ย  310
ย  26 January 2015 Citizenfour Snowden Documentary High Definition (7-Zip MP4) (3.6GB) ~
ย  25 January 2015 Citizenfour Snowden Documentary (7-Zipped MP4) (1.2GB) ~
ย  23 May 2014 No Place to Hide (27MB) 310
ย  ย  ย  ย 
ย  Heise ย  26
ย  16 August 2014 NSA GCHQ CSEC HACIENDA 26
ย  ย  ย  ย 
ย  Sรผddeutsche Zeitung ย  7
ย  25 November 2014 Vodafone GCHQ Cables List and Slides 72
ย  ย  ย  ย 
ย  Paul Dietrich
@Paulmd199
ย  87
ย  22 January 2015 87 Citizenfour Screengrabs 87
ย  ย  ย  ย 
ย  New Zealand Herald ย  20
ย  14 March 2015 GCSB Targets Solomons 2
ย  10 March 2015 NSA-New Zealand Relationship 8
ย  6 March 2015 GCSB XKeyscore 2 4
ย  5 March 2015 GCSB XKeyscore 6
ย  ย  ย  ย 
ย  New Zealand Star Times ย  35
ย  8 March 2015 GCSB XKeyscore 3 35
ย  ย  ย  ย 
ย  Telesurtv ย  ย 
ย  17 November 2015 NSA SCS Venezuela 5*
ย  ย  ย  ย 
ย  Boing Boing ย  ย 
ย  2 February 2016 GCHQ Malware 99
ย  ย  ย  ย 

ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย 
ย 
ย 

Go back

Your message has been sent

Warning
Warning
Warning
Warning

Warning.

ย 

ย 

Edward Snowden Wife, Edward Snowden Movie, Edward Snowden Twitter, Edward Snowden Dead, Edward Snowden Quotes, Edward Snowden Interview, Edward Snowden Wiki, Edward Snowden Russia, Edward Snowden Net Worth, Edward Snowden 2017, Edward Snowden Age, Edward Snowden Antarctica, Edward Snowden Articles, Edward Snowden Actor, Edward Snowden And Trump, Edward Snowden And Julian Assange, Edward Snowden And Wikileaks, Edward Snowden Apush, Edward Snowden Ama, Edward Snowden And Lindsay Mills, Edward Snowden Biography, Edward Snowden Book, Edward Snowden Bin Laden, Edward Snowden Booz Allen, Edward Snowden Birthday, Edward Snowden Bbc, Edward Snowden Blog, Edward Snowden Birth Chart, Edward Snowden Bernie Sanders, Edward Snowden Bitcoin, Edward Snowden Cia, Edward Snowden Cnn, Edward Snowden Cast, Edward Snowden Chelsea Manning, Edward Snowden Current News, Edward Snowden Citizen 4, Edward Snowden Conservative, Edward Snowden China, Edward Snowden Chemtrails, Edward Snowden Contact, Edward Snowden Dead, Edward Snowden Documentary, Edward Snowden Definition, Edward Snowden Documentary Netflix, Edward Snowden Doc, Edward Snowden Donald Trump, Edward Snowden Dell, Edward Snowden Documentary Hbo, Edward Snowden Date, Edward Snowden David Hoffman, Edward Snowden Essay, Edward Snowden Email, Edward Snowden Ethics, Edward Snowden Ethics Essay, Edward Snowden Early Life, Edward Snowden Effect, Edward Snowden Ecuador, Edward Snowden Education, Edward Snowden Everything About Donald Trump, Edward Snowden Event, Edward Snowden Facts, Edward Snowden Family, Edward Snowden Film, Edward Snowden First Interview, Edward Snowden Facebook, Edward Snowden Father, Edward Snowden Full Movie, Edward Snowden Flat Earth, Edward Snowden First Tweet, Edward Snowden Fox News, Edward Snowden Guardian, Edward Snowden Glenn Greenwald, Edward Snowden Glasses, Edward Snowden Global Warming, Edward Snowden Gif, Edward Snowden Google, Edward Snowden Girlfriend Movie, Edward Snowden Good, Edward Snowden Grandfather, Edward Snowden Genius, Edward Snowden Hero, Edward Snowden Height, Edward Snowden House, Edward Snowden Hawaii, Edward Snowden High School, Edward Snowden Hong Kong, Edward Snowden History, Edward Snowden Heartbeat, Edward Snowden Haarp, Edward Snowden Hbo, Edward Snowden Interview, Edward Snowden Iq, Edward Snowden Instagram, Edward Snowden Interview 2013, Edward Snowden Imdb, Edward Snowden Interview 2017, Edward Snowden Images, Edward Snowden Interview 2016, Edward Snowden Income, Edward Snowden Iphone, Edward Snowden Job, Edward Snowden Journalist, Edward Snowden Japan, Edward Snowden Julian Assange Bradley Manning, Edward Snowden Java, Edward Snowden Journalism, Edward Snowden Joseph Gordon-levitt, Edward Snowden Julian Assange, Edward Snowden John Oliver Passwords, Edward Snowden Jean Michel Jarre, Edward Snowden Kunia, Edward Snowden Kimdir, Edward Snowden Katie Couric Interview, Edward Snowden Katie Couric, Edward Snowden Kaskus, Edward Snowden Kim, Edward Snowden Kasus, Edward Snowden Kfc, Edward Snowden Kim Jest, Edward Snowden Koenig, Edward Snowden Location, Edward Snowden Lindsay Mills Moscow, Edward Snowden Laptop, Edward Snowden Lindsay Mills, Edward Snowden Living, Edward Snowden Lawyer, Edward Snowden Life, Edward Snowden Latest News, Edward Snowden Latest, Edward Snowden Live Stream, Edward Snowden Movie, Edward Snowden Movie Netflix, Edward Snowden Movie Cast, Edward Snowden Military, Edward Snowden Movie Online, Edward Snowden Memes, Edward Snowden Middlebury College, Edward Snowden Married, Edward Snowden Moscow, Edward Snowden Medical Condition, Edward Snowden Net Worth, Edward Snowden Now, Edward Snowden News, Edward Snowden New York Times, Edward Snowden Netflix, Edward Snowden Natal Chart, Edward Snowden Nobel Prize, Edward Snowden Nsa Salary, Edward Snowden Npr, Edward Snowden Nationality, Edward Snowden On Trump, Edward Snowden Osama Bin Laden, Edward Snowden Obama, Edward Snowden Oscar, Edward Snowden On Movie, Edward Snowden On Twitter, Edward Snowden Openstack, Edward Snowden On Antarctica, Edward Snowden Os, Edward Snowden Original Interview, Edward Snowden Parents, Edward Snowden Political Views, Edward Snowden Privacy Tips, Edward Snowden Political Party, Edward Snowden Patriot Act, Edward Snowden Pictures, Edward Snowden Podcast, Edward Snowden Phone Case, Edward Snowden Poll, Edward Snowden Putin, Edward Snowden Quotes, Edward Snowden Quizlet, Edward Snowden Questions, Edward Snowden Quien Es, Edward Snowden Quote About Privacy, Edward Snowden Quotes Citizenfour, Edward Snowden Quick Facts, Edward Snowden Qualifications, Edward Snowden Russia, Edward Snowden Reddit, Edward Snowden Research Paper, Edward Snowden Real Name, Edward Snowden Residence, Edward Snowden Resume, Edward Snowden Robot, Edward Snowden Recommended Apps, Edward Snowden Reporter, Edward Snowden Russian, Edward Snowden Story, Edward Snowden Salary, Edward Snowden Status, Edward Snowden Signal, Edward Snowden Speech, Edward Snowden Security Tips, Edward Snowden Shirt, Edward Snowden Siblings, Edward Snowden Special Forces, Edward Snowden Still Alive, Edward Snowden Twitter, Edward Snowden Today, Edward Snowden Trump, Edward Snowden Timeline, Edward Snowden Ted Talk, Edward Snowden The Guardian, Edward Snowden Trailer, Edward Snowden The Movie, Edward Snowden T Shirt, Edward Snowden Tor, Edward Snowden Update, Edward Snowden Ufo, Edward Snowden Us Army, Edward Snowden University Of Michigan, Edward Snowden Used Tails, Edward Snowden Umich, Edward Snowden University Of Maryland, Edward Snowden Ufo Wikileaks, Edward Snowden Ufo Video, Edward Snowden Urban Dictionary, Edward Snowden Video, Edward Snowden Vpn, Edward Snowden Vice, Edward Snowden And Julian Assange, Edward Snowden Voice, Edward Snowden And Bradley Manning, Edward Snowden Vault 7, Edward Snowden Visa, Edward Snowden And Wikileaks, Edward Snowden Vanity Fair, Edward Snowden Wife, Edward Snowden Wiki, Edward Snowden Wired, Edward Snowden William And Mary, Edward Snowden Washington Post, Edward Snowden Who Is He, Edward Snowden Website, Edward Snowden Worth, Edward Snowden Wikileak, Edward Snowden Washington Post 2013, Edward Snowden Youtube, Edward Snowden Young, Edward Snowden Yahoo Answers, Edward Snowden Youtube Channel, Edward Snowden Youtube Documentary, Edward Snowden Yokota, Edward Snowden And Lindsay Mills, Edward Snowden Yify, Edward Snowden Zodiac Sign, Edward Snowden Zcash, Edward Snowden Zuckerberg, Edward Snowden Zoho, Edward Snowden Zizek, Edward Snowden Zimbabwe, Edward Snowden Zitate, Edward Snowden Zusammenfassung, Edward Snowden Zivilisation, Edward Snowden Zvi\u017eda\u010d,ย Cryptome Eyeball, Cryptome Twitter, Cryptome Wikileaks, Cryptome Archive, Cryptome Trump, Cryptome Wikipedia, Cryptome Secret Service, Cryptome Down, Cryptome Payment Technologies, Cryptome Pharmaceuticals Ltd, Cryptome Archive, Cryptome Area 51, Cryptome Air Force One, Cryptome Archive Download, Cryptome Alien, Cryptome Albania, Cryptome Assange, Cryptome Alternatives, Cryptome Pharmaceuticals Australia, Cryptome Mi6 Agents, Cryptome Boston Marathon, Cryptome Benghazi, Cryptome Bitcoin, Cryptome Brazil, Cryptome Cn, Cryptome Cia, Cryptome China, Cryptome Charlie Hebdo, Cryptome Contact, Crypto Code, Cryptome Citizenfour Download, Citizenfour Cryptome Mirror, Cryptome Down, Cryptome Download, Cryptome Drones, Cryptome Definition, Cryptome Deep Web, Define Cryptome, Cryptome Archive Download, Cryptome Full Disclosure, Cryptome Site Down, Cryptome Citizenfour Download, Cryptome Eyeball, Cryptome Edward Snowden, Cryptome Eyeballing Presidential Protection, Cryptome Que Es, Cryptome Fru, Cryptome Fukushima, Cryptome For Sale, Cryptome Facebook, Cryptome Femen, Cryptome Full Disclosure, Cryptome Feed, Cryptome Free List, Cryptome Fukushima Daiichi, Cryptome Rss Feed, Cryptome Gchq, Cryptome Gang Stalking, Giganews Cryptome, Cryptome Microsoft Spy Guide, Cryptome Hacked, Cryptome White House, Cryptome Sandy Hook, Cryptome Jade Helm, Cryptome Ira Members, Cryptome Ira, Cryptome Isis, Cryptome Iraq, Cryptome Ireland, Cryptome Inspire, Cryptome India, Cryptome Interview, Cryptome Israel, Cryptome Improvised Munitions, Cryptome Jade Helm, Cryptome North Korea, Cryptome Like Sites, Cryptome Legal, Cryptome Libya, Cryptome List, Cryptome Le Siecle, Like Cryptome, Cryptome Pharmaceuticals Ltd, Cryptome Mi6, Cryptome Mirror, Cryptome Microsoft, Cryptome Microsoft Spy Guide, Cryptome Mirror Sites, Cryptome Mk Ultra, Cryptome Boston Marathon, Cryptome Ira Members, Cryptome Improvised Munitions, Citizenfour Cryptome Mirror, Cryptome North Korea, Cryptome Nuclear, Cryptome Northern Ireland, Cryptome Nsa, Cryptome-nov 2015, Cryptome Nedir, Cryptome.org Wikipedia, Cryptome Obama Protection, Cryptome.org Down, Cryptome.org Eyeball, Cryptome Org Fukushima, Cryptome.org Parastoo, Cryptome.org Rss, Cryptome.org Femen, Cryptome.org 9\/11, Cryptome.org 911, Cryptome Photos, Cryptome Payment Technologies, Cryptome Pharmaceuticals Ltd, Cryptome Protection, Cryptome Pgp, Cryptome Parastoo, Cryptome Pharmaceuticals Australia, Cryptome Pdf, Cryptome Prism, Cryptome Pictures, Cryptome Que Es, Cryptome Rss, Cryptome Rheinland Pfalz, Cryptome Secret Service, Cryptome Search, Cryptome Snowden, Cryptome Sandy Hook, Cryptome Satellite, Cryptome Similar Sites, Cryptome Saudi, Cryptome Syria, Cryptome Site, Cryptome Stingray, Cryptome Twitter, Cryptome Trump, Cryptome Tempest, Cryptome Tor, Cryptome Tunisia, Crypto Tool, Cryptome Fukushima Tepco, Cryptome Payment Technologies, Similar To Cryptome, Cryptome Turkey, Cryptome Ufo, Cryptome Ukraine, Cryptome Vs Wikileaks, Cryptome Venezuela, Cryptome Videos, Cryptome Wikileaks, Cryptome Wikipedia, Cryptome White House, Cryptome Vs Wikileaks, Cryptome Deep Web,ย Nsa Jobs, Nsa Director, Nsa Softball, Nsa Meaning, Nsa Careers, Nsa Definition, Nsa Headquarters, Nsa Surveillance, Nsa Spying, Nsa Internships, Nsa Acronym, Nsa Address, Nsa Advisor, Nsa Agent, Nsa Alabama, Nsa Annapolis, Nsa Agent Salary, Nsa Arc, Nsa Approved Shredders, Nsa Agreement, Nsa Building, Nsa Bahrain, Nsa Budget, Nsa Bethesda, Nsa Baseball, Nsa Badge, Nsa Benefits, Nsa Building Nyc, Nsa Budget 2016, Nsa Backdoor, Nsa Careers, Nsa Chief, Nsa Colorado, Nsa Crane, Nsa Cyber Security, Nsa Conference, Nsa Csfc, Nsa Cae, Nsa Crypto Challenge, Nsa Css, Nsa Director, Nsa Definition, Nsa Data Center, Nsa Day Of Cyber, Nsa Director Salary, Nsa Data Collection, Nsa Domestic Surveillance, Nsa Datasheet, Nsa Deputy Director, Nsa Datasheet Is Called, Nsa Employment, Nsa Edward Snowden, Nsa Exploits, Nsa Employees, Nsa Email, Nsa Evaluated Products List, Nsa Echelon, Nsa Emblem, Nsa Encryption, Nsa Eternal Blue, Nsa Fastpitch, Nsa Florida Youth, Nsa Fort Meade, Nsa Flynn, Nsa Florida, Nsa Friend, Nsa Facebook, Nsa Fort Gordon, Nsa Foia, Nsa Facts, Nsa Georgia, Nsa Glassdoor, Nsa Government, Nsa Grindr, Nsa Github, Nsa Gift Shop, Nsa Game, Nsa Grants, Nsa Gif, Nsa Guy, Nsa Headquarters, Nsa Head, Nsa Hacking Tools, Nsa Hawaii, Nsa Hampton Roads, Nsa Hacked, Nsa History, Nsa Hiring Process, Nsa Hacking Tools Leaked, Nsa Headquarters Address, Nsa Internships, Nsa Industries, Nsa Intelligence Analyst, Nsa Indiana, Nsa Influence 2017, Nsa Iad, Nsa Ias 2017, Nsa India, Nsa Illinois, Nsa Insurance, Nsa Jobs, Nsa Juice Plus, Nsa Job Openings, Nsa Jobs Utah, Nsa Jobs Salary, Nsa Jokes, Nsa Job Requirements, Nsa Jurisdiction, Nsa Jobs In Md, Nsa Japan, Nsa Keywords, Nsa Kunia, Nsa Kc, Nsa Key, Nsa Kentucky, Nsa Kmi, Nsa Kankakee, Nsa Korea, Nsa Kaspersky, Nsa Keith Alexander, Nsa Leaker, Nsa Logo, Nsa Leak, Nsa Locations, Nsa Listening, Nsa Leader, Nsa Login, Nsa Leadership, Nsa Language Analyst, Nsa Leaked Tools, Nsa Meaning, Nsa Meme, Nsa Media, Nsa Meet, Nsa Mid South, Nsa Mike Rogers, Nsa Museum, Nsa Mcmaster, Nsa Maryland, Nsa Mission Statement, Nsa News, Nsa Naples, Nsa Name Generator, Nsa North, Nsa Number, Nsa Norfolk, Nsa Nyc, Nsa Nashville, Nsa Nursing, Nsa New Orleans, Nsa Orlando, Nsa Opm Test, Nsa Online Test, Nsa Offices, Nsa Obama, Nsa Organization, Nsa Operational Interview, Nsa Only, Nsa Org Chart, Nsa Of 1947, Nsa Prism, Nsa Police, Nsa Panama City, Nsa Police Officer, Nsa Phone Number, Nsa Philadelphia, Nsa Pay Scale, Nsa Play, Nsa Polygraph, Nsa Purpose, Nsa Quantum Computer, Nsa Quotes, Nsa Qualifications, Nsa Quantum, Nsa Quizlet, Nsa Questions, Nsa Qualifier, Nsa Quantum Computer Farm, Nsa Quartet, Nsa Quiz, Nsa Rogers, Nsa Requirements, Nsa Rules, Nsa Recruiting, Nsa Relationship, Nsa Rule Book, Nsa Ransomware, Nsa Russia, Nsa Responsibilities, Nsa Reno, Nsa Softball, Nsa Surveillance, Nsa Spying, Nsa Slang, Nsa Salary, Nsa Stands For, Nsa Soccer, Nsa Softball Rules, Nsa Scholarship, Nsa Scandal, Nsa Texas, Nsa Tournaments, Nsa Tools, Nsa Trump, Nsa Tao, Nsa Tools Leaked, Nsa Twitter, Nsa Tinder, Nsa Test, Nsa Training, Nsa Utah, Nsa Urban, Nsa Usa, Nsa Utah Facility, Nsa Unmasking, Nsa Utah Jobs, Nsa Unconstitutional, Nsa Umpire, Nsa Under Obama, Nsa Uniform, Nsa Vs Cia, Nsa Visitor Center, Nsa Virginia, Nsa Vs Fbi, Nsa Vs Cia Vs Fbi, Nsa Virus, Nsa Visitor Control Center, Nsa Vpn, Nsa Vanilla, Nsa Violation Of Privacy, Nsa Wiki, Nsa Whistleblower, Nsa Washington, Nsa Wiretapping, Nsa Website, Nsa Water Filter, Nsa Watchlist, Nsa World Series, Nsa Wikileaks, Nsa Wannacry, Nsa Xkeyscore, Nsa Xbox One, Nsa Xeno World Qualifier, Nsa Xkeyscore Download, Nsa Xcode, Nsa Xbox Live, Nsa Xeno Tournament, Nsa Xkeyscore Presentation, Nsa X, Nsa X Files, Nsa Youtube, Nsa Yogurt, Nsa Young Investigator Grant, Nsa Youth Florida, Nsa Yearly Budget, Nsa Yottabyte, Nsa Youth Program, Nsa Youth, Nsa Yellow Dots, Nsa Yakima, Nsa Zero Day, Nsa Zip Code, Nsa Zeus, Nsa Zimmermann Telegram, Nsa Zimbabwe, Nsa Za, Nsa Zero Day Exploit, Nsa Zyxel, Nsa Zero Division, Nsa Zone Store

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, CRYPTOME, THE NATIONAL SECURITY AGENCY (NSA) February 10, 2016July 2, 2021 20 Minutes

Revealed – The NSA in Nassau, Bahamas – Public Eye Satellite Facilities

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

ย 

39ยฐ36’54.30″ N 74ยฐ19’43.42″ W

ย 

[Image]

NSA Fairview Cliffside SIGINT Station (ATT Manchester Cable Landing Station)


ย 
ย 

ย 

ย 


ย 
ย 
ย  ย  ย 

ย 

Go back

Your message has been sent

Warning
Warning
Warning
Warning

Warning.

ย 

Nsa Jobs, Nsa Director, Nsa Softball, Nsa Meaning, Nsa Careers, Nsa Definition, Nsa Headquarters, Nsa Surveillance, Nsa Spying, Nsa Internships, Nsa Acronym, Nsa Address, Nsa Advisor, Nsa Agent, Nsa Alabama, Nsa Annapolis, Nsa Agent Salary, Nsa Arc, Nsa Approved Shredders, Nsa Agreement, Nsa Building, Nsa Bahrain, Nsa Budget, Nsa Bethesda, Nsa Baseball, Nsa Badge, Nsa Benefits, Nsa Building Nyc, Nsa Budget 2016, Nsa Backdoor, Nsa Careers, Nsa Chief, Nsa Colorado, Nsa Crane, Nsa Cyber Security, Nsa Conference, Nsa Csfc, Nsa Cae, Nsa Crypto Challenge, Nsa Css, Nsa Director, Nsa Definition, Nsa Data Center, Nsa Day Of Cyber, Nsa Director Salary, Nsa Data Collection, Nsa Domestic Surveillance, Nsa Datasheet, Nsa Deputy Director, Nsa Datasheet Is Called, Nsa Employment, Nsa Edward Snowden, Nsa Exploits, Nsa Employees, Nsa Email, Nsa Evaluated Products List, Nsa Echelon, Nsa Emblem, Nsa Encryption, Nsa Eternal Blue, Nsa Fastpitch, Nsa Florida Youth, Nsa Fort Meade, Nsa Flynn, Nsa Florida, Nsa Friend, Nsa Facebook, Nsa Fort Gordon, Nsa Foia, Nsa Facts, Nsa Georgia, Nsa Glassdoor, Nsa Government, Nsa Grindr, Nsa Github, Nsa Gift Shop, Nsa Game, Nsa Grants, Nsa Gif, Nsa Guy, Nsa Headquarters, Nsa Head, Nsa Hacking Tools, Nsa Hawaii, Nsa Hampton Roads, Nsa Hacked, Nsa History, Nsa Hiring Process, Nsa Hacking Tools Leaked, Nsa Headquarters Address, Nsa Internships, Nsa Industries, Nsa Intelligence Analyst, Nsa Indiana, Nsa Influence 2017, Nsa Iad, Nsa Ias 2017, Nsa India, Nsa Illinois, Nsa Insurance, Nsa Jobs, Nsa Juice Plus, Nsa Job Openings, Nsa Jobs Utah, Nsa Jobs Salary, Nsa Jokes, Nsa Job Requirements, Nsa Jurisdiction, Nsa Jobs In Md, Nsa Japan, Nsa Keywords, Nsa Kunia, Nsa Kc, Nsa Key, Nsa Kentucky, Nsa Kmi, Nsa Kankakee, Nsa Korea, Nsa Kaspersky, Nsa Keith Alexander, Nsa Leaker, Nsa Logo, Nsa Leak, Nsa Locations, Nsa Listening, Nsa Leader, Nsa Login, Nsa Leadership, Nsa Language Analyst, Nsa Leaked Tools, Nsa Meaning, Nsa Meme, Nsa Media, Nsa Meet, Nsa Mid South, Nsa Mike Rogers, Nsa Museum, Nsa Mcmaster, Nsa Maryland, Nsa Mission Statement, Nsa News, Nsa Naples, Nsa Name Generator, Nsa North, Nsa Number, Nsa Norfolk, Nsa Nyc, Nsa Nashville, Nsa Nursing, Nsa New Orleans, Nsa Orlando, Nsa Opm Test, Nsa Online Test, Nsa Offices, Nsa Obama, Nsa Organization, Nsa Operational Interview, Nsa Only, Nsa Org Chart, Nsa Of 1947, Nsa Prism, Nsa Police, Nsa Panama City, Nsa Police Officer, Nsa Phone Number, Nsa Philadelphia, Nsa Pay Scale, Nsa Play, Nsa Polygraph, Nsa Purpose, Nsa Quantum Computer, Nsa Quotes, Nsa Qualifications, Nsa Quantum, Nsa Quizlet, Nsa Questions, Nsa Qualifier, Nsa Quantum Computer Farm, Nsa Quartet, Nsa Quiz, Nsa Rogers, Nsa Requirements, Nsa Rules, Nsa Recruiting, Nsa Relationship, Nsa Rule Book, Nsa Ransomware, Nsa Russia, Nsa Responsibilities, Nsa Reno, Nsa Softball, Nsa Surveillance, Nsa Spying, Nsa Slang, Nsa Salary, Nsa Stands For, Nsa Soccer, Nsa Softball Rules, Nsa Scholarship, Nsa Scandal, Nsa Texas, Nsa Tournaments, Nsa Tools, Nsa Trump, Nsa Tao, Nsa Tools Leaked, Nsa Twitter, Nsa Tinder, Nsa Test, Nsa Training, Nsa Utah, Nsa Urban, Nsa Usa, Nsa Utah Facility, Nsa Unmasking, Nsa Utah Jobs, Nsa Unconstitutional, Nsa Umpire, Nsa Under Obama, Nsa Uniform, Nsa Vs Cia, Nsa Visitor Center, Nsa Virginia, Nsa Vs Fbi, Nsa Vs Cia Vs Fbi, Nsa Virus, Nsa Visitor Control Center, Nsa Vpn, Nsa Vanilla, Nsa Violation Of Privacy, Nsa Wiki, Nsa Whistleblower, Nsa Washington, Nsa Wiretapping, Nsa Website, Nsa Water Filter, Nsa Watchlist, Nsa World Series, Nsa Wikileaks, Nsa Wannacry, Nsa Xkeyscore, Nsa Xbox One, Nsa Xeno World Qualifier, Nsa Xkeyscore Download, Nsa Xcode, Nsa Xbox Live, Nsa Xeno Tournament, Nsa Xkeyscore Presentation, Nsa X, Nsa X Files, Nsa Youtube, Nsa Yogurt, Nsa Young Investigator Grant, Nsa Youth Florida, Nsa Yearly Budget, Nsa Yottabyte, Nsa Youth Program, Nsa Youth, Nsa Yellow Dots, Nsa Yakima, Nsa Zero Day, Nsa Zip Code, Nsa Zeus, Nsa Zimmermann Telegram, Nsa Zimbabwe, Nsa Za, Nsa Zero Day Exploit, Nsa Zyxel, Nsa Zero Division, Nsa Zone Store,

Public Eye Meaning, Public Eye Synonym, Public Eye Definition, Public Eye Band, Public Eye Investigation, Public Eye Movie, Public Eye Memphis, Public Eye Magazine, Public Eye Lesotho, Public Eye Awards, Public Eye Awards, Public Eye App, Public Eye Awards 2017, Public Eye Artists For Animals, Public Eye Alfred Burke, Public Eye App Download, Public Eye Agency, Public Eye Advertising, Public Eye A Mug Named Frank, Public Eye Advertising And Design, Public Eye Band, Public Eye Bbq Memphis, Public Eye Bern, Public Eye Btp, Public Eye Breaking News, Public Eye Brighton, Public Eye Cast, Public Eye Crossword Clue, Public Eye Communications, Public Eye Contact Details, Public Eye Chakwal, Public Eye Contact Number, Public Eye Complaint, Public Eye Classifieds, Public Eye Communications Emma Watson, Public Eye Definition, Public Eye Dvd, Public Eye Dirty Diesel, Public Eye Daily News Lesotho, Public Eye Documentary, Public Eye Dvd Amazon, Public Eye Design, Public Eye Detective Series, Public Eye Download, Public Eye Dallas Business Journal, Public Eye Episodes, Public Eye Exhibition, Public Eye Episode List, Public Eye Entertainment, Public Eye English Newspaper, Public Eye Email Address, Public Eye Expression, Public Eye Ebert, Public Eye Editor, Public Eye Missing Episodes, Public Eye Film, Public Eye Facebook, Public Eye Frank Marker, Public Eye Free State, Public Eye For Today, Public Eye Firewalking, Public Eye Francais, Public Eye Filming Locations, The Public Eye Full Movie, Public Eye App For Iphone, Public Eye Group, Public Eye Glencore, Public Eye Glasses, Public Eye Gap, Public Eye Greenpeace, Public Eye Group Kenya, Public Eye Global Security, Public Eye Episode Guide, Public Eye Hospital Gold Coast, Public Eye Awards Glencore, Public Eye Hospital Johannesburg, Public Eye Hard Times, Public Eye Hospital Brisbane, Public Eye Hospital Melbourne, Public Eye Hospital Sydney, Public Eye Hall Of Shame, Public Eye Headlines, Public Eye Health, Public Eye Horse And Carriage, Public Eye Hove, Public Eye Investigation, Public Eye Imdb, Public Eye Inc, Public Eye In A Sentence, Public Eye.in, Public Eye In Lesotho, Public Eye In Spanish, Public Eye Itv, Public Eye Vacancies In Lesotho, Public Health Eye Indicator, Public Eye Joe Pesci, Public Eye Jobs And Tenders, Public Eye Jobs, Public Eye Job Vacancies, Public Eye Jc Results 2014, Public Eye Jersey City, Public Eye Jc Results, Public Eye Job Advertisements, Public Eye Job Adverts, Public Eye Jobs Lesotho, Public Eye Kenya, Public Eye Kings Road, Public Eye Kzn, Public Eye Group Kenya, Public Eye Nobody Wants To Know, Kpmg Public Eye Award, Public Eye Lesotho, Public Eye Lesotho Contacts, Public Eye Lausanne, Public Eye Lesotho Vacancies, Public Eye Lesotho Contact Details, Public Eye Lesotho News, Public Eye Meaning, Public Eye Movie, Public Eye Memphis, Public Eye Magazine, Public Eye Memphis Bbq, Public Eye Music, Public Eye Mysore, Public Eye Media, Public Eye Maseru, Public Eye Magazine Uk, Public Eye Newspaper, Public Eye News Nmu, Public Eye Newspaper Texarkana, Public Eye Nz, Public Eye Ngo, Public Eye Newspaper Chakwal, Public Eye Newspaper Pietermaritzburg, Public Eye Newspaper Rawalpindi, Public Eye Newspaper Contacts, Public Eye Newspaper Pmb, Public Eye Online, Public Eye Organization, Public Eye.org, Public Eye Online Local News, Public Eye Online Pietermaritzburg, Public Eye Online Texarkana, Public Eye Youtube, Public Eye Hall Of Shame, Public Eye Ward Of Court, Public Eye Group.org, Public Eye Productions, Public Eye Portland, Public Eye Pietermaritzburg, Public Eye Pr, Public Eye Paper, Public Eye Ptv 4, Public Eye Pmb Contact Details, Public Eye Pietermaritzburg Contact Details, Public Eye Pmb Latest News, Public Eye Parking, Public Eye Quotes, In The Public Eye Que Es, Public Eye Restaurant Memphis, Public Eye Recent News, Public Eye Rock Band, Public Eye Ribs Memphis, Public Eye Rotten Tomatoes, Public Eye Award, Public Eye Jc Results 2014, Daily Public Eye Rawalpindi, Public Eye Bank Robbery, Public Eye Kings Road, Public Eye Synonym, Public Eye St Louis, Public Eye Site, Public Eye Switzerland, Public Eye Software, Public Eye Series 1, Public Eye Schweiz, Public Eye Specialist, Public Eye Series, Public Eye Suisse, Public Eye Tv, Public Eye Texarkana, Public Eye Theme, Public Eye Tv Series Cast, Public Eye Tv Theme, Public Eye Tv Series Theme, Public Eye Tv Series Youtube, Public Eye Thesaurus, Public Eye Uk, Public Eye Uk Tv Series, Public Eye Unlucky For Some, Public Eye Magazine Uk, Sleepy Eye Public Utilities, In The Public Eye Unit 3, Public Eye Security Systems Uk, Public Eye Youtube, Public Eye Film Ug, In The Public Eye Unit 2, Public Eye Vacancies, Public Eye Vacancies 2017, Public Eye Vacancies Lesotho, Public Eye Vale, Public Eye Vacancies 2016, Public Eye Video, Public Eye Violation, Public Eye Vote, Public Eye Vertaling, Public Eye Job Vacancies, Public Eye Website, Public Eye Webcasting, Public Eye Wiki, Public Eye Worst Company, Public Eye Website Lesotho, Public Eye Ward Of Court, Public Eye With Jeff Cole, Public Eye Watch, Public Eye Welcome To Brighton, Public Eyewear, Public Eye Youtube, Public Eye 175 Years Of Sharing Photography, Public Eye Abc Years, Public Eye Autistic Youth, Public Eye Power Your Day, Public Eye S7 Ep 4 Youtube, Public Eye Zurich, Publiceye Zco, Public Eye Zmag, Public Eye Znaczenie

Public Eye Meaning, Public Eye Synonym, Public Eye Definition, Public Eye Band, Public Eye Investigation, Public Eye Movie, Public Eye Memphis, Public Eye Magazine, Public Eye Lesotho, Public Eye Awards, Public Eye Awards, Public Eye App, Public Eye Awards 2017, Public Eye Artists For Animals, Public Eye Alfred Burke, Public Eye App Download, Public Eye Agency, Public Eye Advertising, Public Eye A Mug Named Frank, Public Eye Advertising And Design, Public Eye Band, Public Eye Bbq Memphis, Public Eye Bern, Public Eye Btp, Public Eye Breaking News, Public Eye Brighton, Public Eye Cast, Public Eye Crossword Clue, Public Eye Communications, Public Eye Contact Details, Public Eye Chakwal, Public Eye Contact Number, Public Eye Complaint, Public Eye Classifieds, Public Eye Communications Emma Watson, Public Eye Definition, Public Eye Dvd, Public Eye Dirty Diesel, Public Eye Daily News Lesotho, Public Eye Documentary, Public Eye Dvd Amazon, Public Eye Design, Public Eye Detective Series, Public Eye Download, Public Eye Dallas Business Journal, Public Eye Episodes, Public Eye Exhibition, Public Eye Episode List, Public Eye Entertainment, Public Eye English Newspaper, Public Eye Email Address, Public Eye Expression, Public Eye Ebert, Public Eye Editor, Public Eye Missing Episodes, Public Eye Film, Public Eye Facebook, Public Eye Frank Marker, Public Eye Free State, Public Eye For Today, Public Eye Firewalking, Public Eye Francais, Public Eye Filming Locations, The Public Eye Full Movie, Public Eye App For Iphone, Public Eye Group, Public Eye Glencore, Public Eye Glasses, Public Eye Gap, Public Eye Greenpeace, Public Eye Group Kenya, Public Eye Global Security, Public Eye Episode Guide, Public Eye Hospital Gold Coast, Public Eye Awards Glencore, Public Eye Hospital Johannesburg, Public Eye Hard Times, Public Eye Hospital Brisbane, Public Eye Hospital Melbourne, Public Eye Hospital Sydney, Public Eye Hall Of Shame, Public Eye Headlines, Public Eye Health, Public Eye Horse And Carriage, Public Eye Hove, Public Eye Investigation, Public Eye Imdb, Public Eye Inc, Public Eye In A Sentence, Public Eye.in, Public Eye In Lesotho, Public Eye In Spanish, Public Eye Itv, Public Eye Vacancies In Lesotho, Public Health Eye Indicator, Public Eye Joe Pesci, Public Eye Jobs And Tenders, Public Eye Jobs, Public Eye Job Vacancies, Public Eye Jc Results 2014, Public Eye Jersey City, Public Eye Jc Results, Public Eye Job Advertisements, Public Eye Job Adverts, Public Eye Jobs Lesotho, Public Eye Kenya, Public Eye Kings Road, Public Eye Kzn, Public Eye Group Kenya, Public Eye Nobody Wants To Know, Kpmg Public Eye Award, Public Eye Lesotho, Public Eye Lesotho Contacts, Public Eye Lausanne, Public Eye Lesotho Vacancies, Public Eye Lesotho Contact Details, Public Eye Lesotho News, Public Eye Meaning, Public Eye Movie, Public Eye Memphis, Public Eye Magazine, Public Eye Memphis Bbq, Public Eye Music, Public Eye Mysore, Public Eye Media, Public Eye Maseru, Public Eye Magazine Uk, Public Eye Newspaper, Public Eye News Nmu, Public Eye Newspaper Texarkana, Public Eye Nz, Public Eye Ngo, Public Eye Newspaper Chakwal, Public Eye Newspaper Pietermaritzburg, Public Eye Newspaper Rawalpindi, Public Eye Newspaper Contacts, Public Eye Newspaper Pmb, Public Eye Online, Public Eye Organization, Public Eye.org, Public Eye Online Local News, Public Eye Online Pietermaritzburg, Public Eye Online Texarkana, Public Eye Youtube, Public Eye Hall Of Shame, Public Eye Ward Of Court, Public Eye Group.org, Public Eye Productions, Public Eye Portland, Public Eye Pietermaritzburg, Public Eye Pr, Public Eye Paper, Public Eye Ptv 4, Public Eye Pmb Contact Details, Public Eye Pietermaritzburg Contact Details, Public Eye Pmb Latest News, Public Eye Parking, Public Eye Quotes, In The Public Eye Que Es, Public Eye Restaurant Memphis, Public Eye Recent News, Public Eye Rock Band, Public Eye Ribs Memphis, Public Eye Rotten Tomatoes, Public Eye Award, Public Eye Jc Results 2014, Daily Public Eye Rawalpindi, Public Eye Bank Robbery, Public Eye Kings Road, Public Eye Synonym, Public Eye St Louis, Public Eye Site, Public Eye Switzerland, Public Eye Software, Public Eye Series 1, Public Eye Schweiz, Public Eye Specialist, Public Eye Series, Public Eye Suisse, Public Eye Tv, Public Eye Texarkana, Public Eye Theme, Public Eye Tv Series Cast, Public Eye Tv Theme, Public Eye Tv Series Theme, Public Eye Tv Series Youtube, Public Eye Thesaurus, Public Eye Uk, Public Eye Uk Tv Series, Public Eye Unlucky For Some, Public Eye Magazine Uk, Sleepy Eye Public Utilities, In The Public Eye Unit 3, Public Eye Security Systems Uk, Public Eye Youtube, Public Eye Film Ug, In The Public Eye Unit 2, Public Eye Vacancies, Public Eye Vacancies 2017, Public Eye Vacancies Lesotho, Public Eye Vale, Public Eye Vacancies 2016, Public Eye Video, Public Eye Violation, Public Eye Vote, Public Eye Vertaling, Public Eye Job Vacancies, Public Eye Website, Public Eye Webcasting, Public Eye Wiki, Public Eye Worst Company, Public Eye Website Lesotho, Public Eye Ward Of Court, Public Eye With Jeff Cole, Public Eye Watch, Public Eye Welcome To Brighton, Public Eyewear, Public Eye Youtube, Public Eye 175 Years Of Sharing Photography, Public Eye Abc Years, Public Eye Autistic Youth, Public Eye Power Your Day, Public Eye S7 Ep 4 Youtube, Public Eye Zurich, Publiceye Zco, Public Eye Zmag, Public Eye Znaczenie

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, CRYPTOME, THE NATIONAL SECURITY AGENCY (NSA), TOP SECRET August 19, 2015July 5, 2021 9 Minutes

Opinion – NSA Chief Expects More Cyberattacks Like OPM Hack

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

 

 

The U.S. should brace itself for more attacks like one on the U.S. Office of Personnel Managementโ€”in which millions of sensitive government records were stolen, the director of the National Security Agency warned on Wednesday

The U.S. government last week said that two cyberattacks on the agency compromised more than 21 million Social Security numbers, 1.1 million fingerprint records, and 19.7 million forms with data that could include a personโ€™s mental-health history.

โ€œI donโ€™t expect this to be a one-off,โ€ said Navy Adm. Mike Rogers, who heads the NSA and the U.S. militaryโ€™s Cyber Command.

The incident is causing the government to review cybersecurity policies, he added. โ€œAs we are working through the aftermath of OPM,โ€ Adm. Rogers said one of the questions is โ€œwhat is the right vision for the way forward in how we are going to deal with things like this.โ€

Cyber Command, though responsible for protecting Defense Department networks, wasn’t charged with defending the Office of Personnel Managementโ€™s system, he added.

Director of National Intelligence James Clapper last month said China is suspected to be behind the hack.

Adm. Rogers likened the hacking of U.S. government records to last yearโ€™s attack on Sony Pictures Entertainment, which revealed sensitive company information. He said such events required a governments and companies to step back and review procedures.

Adm. Rogers was speaking at the London Stock Exchange as part of an outreach effort to the financial sector to raise awareness of cybersecurity threats.

โ€œWe are in a world now where, despite your best efforts, you must prepare and assume that you will be penetrated,โ€ he told the group. โ€œIt is not about if you will be penetrated, but when,โ€ he said.

David Omand, the former head of the U.K. Government Communications Headquarters, said at the event that the average cost of a breach on U.S. companies is around $20 million. U.K. figures suggest a lower cost, though he said those may be too conservative.

Adm. Rogers said companies and the government needed to work together to protect networks. โ€œCyber to me is the ultimate partnership. There is no single entity out there that is going to say: โ€™donโ€™t worry, Iโ€™ve got this.โ€™โ€

 

Go back

Your message has been sent

Warning
Warning
Warning
Warning

Warning.

Nsa Jobs, Nsa Director, Nsa Softball, Nsa Meaning, Nsa Careers, Nsa Definition, Nsa Headquarters, Nsa Surveillance, Nsa Spying, Nsa Internships, Nsa Acronym, Nsa Address, Nsa Advisor, Nsa Agent, Nsa Alabama, Nsa Annapolis, Nsa Agent Salary, Nsa Arc, Nsa Approved Shredders, Nsa Agreement, Nsa Building, Nsa Bahrain, Nsa Budget, Nsa Bethesda, Nsa Baseball, Nsa Badge, Nsa Benefits, Nsa Building Nyc, Nsa Budget 2016, Nsa Backdoor, Nsa Careers, Nsa Chief, Nsa Colorado, Nsa Crane, Nsa Cyber Security, Nsa Conference, Nsa Csfc, Nsa Cae, Nsa Crypto Challenge, Nsa Css, Nsa Director, Nsa Definition, Nsa Data Center, Nsa Day Of Cyber, Nsa Director Salary, Nsa Data Collection, Nsa Domestic Surveillance, Nsa Datasheet, Nsa Deputy Director, Nsa Datasheet Is Called, Nsa Employment, Nsa Edward Snowden, Nsa Exploits, Nsa Employees, Nsa Email, Nsa Evaluated Products List, Nsa Echelon, Nsa Emblem, Nsa Encryption, Nsa Eternal Blue, Nsa Fastpitch, Nsa Florida Youth, Nsa Fort Meade, Nsa Flynn, Nsa Florida, Nsa Friend, Nsa Facebook, Nsa Fort Gordon, Nsa Foia, Nsa Facts, Nsa Georgia, Nsa Glassdoor, Nsa Government, Nsa Grindr, Nsa Github, Nsa Gift Shop, Nsa Game, Nsa Grants, Nsa Gif, Nsa Guy, Nsa Headquarters, Nsa Head, Nsa Hacking Tools, Nsa Hawaii, Nsa Hampton Roads, Nsa Hacked, Nsa History, Nsa Hiring Process, Nsa Hacking Tools Leaked, Nsa Headquarters Address, Nsa Internships, Nsa Industries, Nsa Intelligence Analyst, Nsa Indiana, Nsa Influence 2017, Nsa Iad, Nsa Ias 2017, Nsa India, Nsa Illinois, Nsa Insurance, Nsa Jobs, Nsa Juice Plus, Nsa Job Openings, Nsa Jobs Utah, Nsa Jobs Salary, Nsa Jokes, Nsa Job Requirements, Nsa Jurisdiction, Nsa Jobs In Md, Nsa Japan, Nsa Keywords, Nsa Kunia, Nsa Kc, Nsa Key, Nsa Kentucky, Nsa Kmi, Nsa Kankakee, Nsa Korea, Nsa Kaspersky, Nsa Keith Alexander, Nsa Leaker, Nsa Logo, Nsa Leak, Nsa Locations, Nsa Listening, Nsa Leader, Nsa Login, Nsa Leadership, Nsa Language Analyst, Nsa Leaked Tools, Nsa Meaning, Nsa Meme, Nsa Media, Nsa Meet, Nsa Mid South, Nsa Mike Rogers, Nsa Museum, Nsa Mcmaster, Nsa Maryland, Nsa Mission Statement, Nsa News, Nsa Naples, Nsa Name Generator, Nsa North, Nsa Number, Nsa Norfolk, Nsa Nyc, Nsa Nashville, Nsa Nursing, Nsa New Orleans, Nsa Orlando, Nsa Opm Test, Nsa Online Test, Nsa Offices, Nsa Obama, Nsa Organization, Nsa Operational Interview, Nsa Only, Nsa Org Chart, Nsa Of 1947, Nsa Prism, Nsa Police, Nsa Panama City, Nsa Police Officer, Nsa Phone Number, Nsa Philadelphia, Nsa Pay Scale, Nsa Play, Nsa Polygraph, Nsa Purpose, Nsa Quantum Computer, Nsa Quotes, Nsa Qualifications, Nsa Quantum, Nsa Quizlet, Nsa Questions, Nsa Qualifier, Nsa Quantum Computer Farm, Nsa Quartet, Nsa Quiz, Nsa Rogers, Nsa Requirements, Nsa Rules, Nsa Recruiting, Nsa Relationship, Nsa Rule Book, Nsa Ransomware, Nsa Russia, Nsa Responsibilities, Nsa Reno, Nsa Softball, Nsa Surveillance, Nsa Spying, Nsa Slang, Nsa Salary, Nsa Stands For, Nsa Soccer, Nsa Softball Rules, Nsa Scholarship, Nsa Scandal, Nsa Texas, Nsa Tournaments, Nsa Tools, Nsa Trump, Nsa Tao, Nsa Tools Leaked, Nsa Twitter, Nsa Tinder, Nsa Test, Nsa Training, Nsa Utah, Nsa Urban, Nsa Usa, Nsa Utah Facility, Nsa Unmasking, Nsa Utah Jobs, Nsa Unconstitutional, Nsa Umpire, Nsa Under Obama, Nsa Uniform, Nsa Vs Cia, Nsa Visitor Center, Nsa Virginia, Nsa Vs Fbi, Nsa Vs Cia Vs Fbi, Nsa Virus, Nsa Visitor Control Center, Nsa Vpn, Nsa Vanilla, Nsa Violation Of Privacy, Nsa Wiki, Nsa Whistleblower, Nsa Washington, Nsa Wiretapping, Nsa Website, Nsa Water Filter, Nsa Watchlist, Nsa World Series, Nsa Wikileaks, Nsa Wannacry, Nsa Xkeyscore, Nsa Xbox One, Nsa Xeno World Qualifier, Nsa Xkeyscore Download, Nsa Xcode, Nsa Xbox Live, Nsa Xeno Tournament, Nsa Xkeyscore Presentation, Nsa X, Nsa X Files, Nsa Youtube, Nsa Yogurt, Nsa Young Investigator Grant, Nsa Youth Florida, Nsa Yearly Budget, Nsa Yottabyte, Nsa Youth Program, Nsa Youth, Nsa Yellow Dots, Nsa Yakima, Nsa Zero Day, Nsa Zip Code, Nsa Zeus, Nsa Zimmermann Telegram, Nsa Zimbabwe, Nsa Za, Nsa Zero Day Exploit, Nsa Zyxel, Nsa Zero Division, Nsa Zone Store, Mike Rogers Nsa, Mike Rogers Testimony, Mike Rogers Congressman, Mike Rogers Dimension Design, Mike Rogers Cnn, Mike Rogers Alabama, Mike Rogers Wiki, Mike Rogers Facebook, Mike Rogers Fire In The Sky, Mike Rogers Obama, Mike Rogers Admiral, Mike Rogers Alabama, Mike Rogers Arizona, Mike Rogers Age, Mike Rogers And Dan Coats, Mike Rogers Attorney, Mike Rogers And Coats, Mike Rogers Arkansas, Mike Rogers Alabama Town Hall, Mike Rogers And Fbi, Mike Rogers Bio, Mike Rogers Baseball, Mike Rogers Brian Free And Assurance, Mike Rogers Baltimore, Mike Rogers Background, Mike Rogers Baltimore Md, Mike Rogers Bluegrass, Mike Rogers Bjj, Mike Rogers Brother, Mike Rogers Basketball, Mike Rogers Congressman, Mike Rogers Cnn, Mike Rogers Cia, Mike Rogers Congress Alabama, Mike Rogers Construction, Mike Rogers Comey, Mike Rogers Committees, Mike Rogers Congressional Testimony, Mike Rogers Cyber Command, Mike Rogers Contact, Mike Rogers Dimension Design, Mike Rogers Dan Coats, Mike Rogers District Map, Mike Rogers Drilling, Mike Rogers Director, Mike Rogers Democrat, Mike Rogers Democrat Or Republican, Mike Rogers David Corn, Mike Rodgers Dj, Mike Rogers Death, Mike Rogers Education, Mike Rogers Eyes, Mike Rogers Elmira College, Mike Rogers Email, Mike Rogers Engineer, Mike Rogers Electrician, Mike Rogers Esq, Mike Rogers Easton Wrestling, Mike Rogers Experian, Mike Rogers Endless Night, Mike Rogers Facebook, Mike Rogers Fire In The Sky, Mike Rogers Family, Mike Rogers Football, Mike Rogers For Congress, Mike Rogers Fox News, Mike Rogers Fbi Trump, Mike Rogers Fbi Wiki, Mike Rogers Fbi Agent, Mike Rogers Field Keene Nh, Mike Rogers General, Mike Rogers Grind For Life, Mike Rogers Gop, Mike Rogers Gardere, Mike Rogers Greenwood Indiana, Mike Rogers Gospel Singer, Mike Rogers Garvan, Mike Rogers Guelph, Mike Rogers Hearing, Mike Rogers House, Mike Rogers Hockey, Mike Rogers House Of Representatives, Mike Rogers Harvard, Mike Rogers House Intelligence, Mike Rogers Hunter, Mike Rogers Henderson Nc, Mike Rogers Hometown, Mike Rogers Horse Trainer, Mike Rogers Intelligence, Mike Rogers Interview, Mike Rogers Insurance, Mike Rogers Intel, Mike Rogers Intelligence Committee, Mike Rogers Israel, Mike Rogers Images, Mike Rogers Interplay, Mike Rogers Intel Committee, Mike Rogers Instagram, Mike Rogers Just A Story, Mike Rogers Jcpenney, Mike Rogers Just A Story Lyrics, Mike Rogers Jacksonville Fl, Mike Rogers Johns Hopkins, Mike Rogers Jewelry, Mike Rogers Japan, Mike Rogers Jurassic World, Mike Rogers Jr, Mike Rogers Jefferson City Mo, Mike Rogers Kansas City, Mike Rogers Kamala Harris, Mike Rogers Krld, Mike Rogers Killingsworth, Mike Rodgers Kyani, Mike Rogers Killingsworth Environmental, Mike Rogers Kauai, Mike Rogers Keep America Beautiful, Mike Rogers Kitchener, Mike Rogers Kingsport Tn, Mike Rogers Linkedin, Mike Rogers Lawyer, Mike Rogers Law Firm, Mike Rogers Lexington Ky, Mike Rogers Live, Mike Rogers Liberty Score, Mike Rogers Lpl, Mike Rogers Lone Star Arms, Mike Rogers Labaton, Mike Rogers Life Storage, Mike Rogers Michigan, Mike Rogers Musician, Mike Rogers Masonry, Mike Rogers Meme, Mike Rogers Maryland, Mike Rogers Military, Mike Rogers Mma, Mike Rogers Music, Mike Rogers Michael Flynn, Mike Rogers Msnbc, Mike Rogers Nsa, Mike Rogers Net Worth, Mike Rogers News, Mike Rogers Nsa Russia, Mike Rogers Nsa Testimony, Mike Rogers Nsa Twitter, Mike Rogers Nhl, Mike Rogers Nfl, Mike Rogers Nsa Republican, Mike Rogers Nsa Obama, Mike Rogers Obama, Mike Rogers Obituary, Mike Rogers Office, Mike Rogers Oklahoma, Mike Rogers Oracle, Mike Rogers On Cnn, Mike Rogers Observer, Mike Rogers On Comey, Mike Rogers Omaha, Mike Rogers Opelika Office, Mike Rogers Political Party, Mike Rogers Politics, Mike Rogers Phone Number, Mike Rogers Political Affiliation, Mike Rogers Photos, Mike Rogers Picture, Mike Rogers Producer, Mike Rogers Providence Ri, Mike Rogers Pt, Mike Rogers Pga, Mike Rogers Quotes, Mike Rogers Quality Cars, Admiral Mike Rogers Quotes, Mike Rogers Russia, Mike Rogers Realtor, Mike Rogers Republican, Mike Rogers Retro Fitness, Mike Rogers Radio, Mike Rogers Russia Trump, Mike Rogers Rank, Mike Rogers Remittance, Mike Rogers Republican Alabama, Mike Rogers Raleigh Nc, Mike Rogers Senate, Mike Rogers State Street, Mike Rogers Senate Intelligence Committee, Mike Rogers Starbucks, Mike Rogers Singer, Mike Rogers Space, Mike Rogers Senate Intelligence, Mike Rogers Salary, Mike Rogers Staff, Mike Rodgers Sprinter, Mike Rogers Testimony, Mike Rogers Trump Nsa, Mike Rogers Twitter, Mike Rogers Track, Mike Rogers Town Hall, Mike Rogers Texas, Mike Rogers Today, Mike Rogers Testimony Transcript, Mike Rogers Transition Team, Mike Rogers Testimony Live, Mike Rogers Usn, Mike Rogers University Of Tennessee, Mike Rogers Usa, Mike Rogers Us Representative, Mike Rogers Us House Of Representatives, Mike Rogers Us Congress, Mike Rogers Usa Athletics, Mike Rodgers Usa Today, Mike Rogers Uk, Mike Rogers Upholstery, Mike Rogers Voting Record, Mike Rogers Volleyball, Mike Rogers Video, Mike Rogers Vice Admiral, Mike Rogers Valued Pharmacy Services, Mike Rogers Vancouver, Mike Rogers Vision Ifp, Mike Rogers Voice Actor, Mike Rogers Vps, Mike Rogers Virginia, Mike Rogers Wiki, Mike Rogers Washington Post, Mike Rogers Wrestling, Mike Rogers Wiki Nsa, Mike Rogers Wiki Fbi, Mike Rogers Wichita Ks, Mike Rogers Winnipeg, Magic Mike Xxl Rogers On Demand, Magic Mike Xxl Rogers Ar, Mike Rogers Youtube, Mike Rogers York, Mike Rogers Yahoo, Mike Rogers Yume, Mike Yee Rogers, Mike Rogers New York Rangers, Mike Rogers Ernst & Young, Admiral Mike Rogers Youtube, Youtube Mike Rogers Just A Story, Mike Rogers New Zealand, Cyber Attack Map, Cyber Attack 2017, Cyber Attack On Electrical Grid, Cyber Attack 2016, Cyber Attack Definition, Cyber Attack Statistics 2016, Cyber Attack Types, Cyber Attack Statistics, Cyber Attack News, Cyber Attack May 2017, Cyber Attack Articles, Cyber Attack Act Of War, Cyber Attack Ap Style, Cyber Attack Attribution, Cyber Attack April 2017, Cyber Attack Ap, Cyber Attack America, Cyber Attack Amazon, Cyber Attack Associated Press, Cyber Attack Airlines, Cyber Attack By North Korea, Cyber Attack Bank Of America, Cyber Attack Book, Cyber Attack Bitcoin, Cyber Attack Britain, Cyber Attack Bank, Cyber Attack Business, Cyber Attack British, Cyber Attack By Russia, Cyber Attack British Health Facilities, Cyber Attack Costs, Cyber Attack Consequences, Cyber Attack Case Study, Cyber Attack Cases, Cyber Attack Cry, Cyber Attack Chain, Cyber Attack Comcast, Cyber Attack Causes Physical Damage, Cyber Attack Cartoon, Cyber Attack China, Cyber Attack Definition, Cyber Attack Data, Cyber Attack Defense, Cyber Attack Detection, Cyber Attack Database, Cyber Attack Documentary, Cyber Attack Dallas, Cyber Attack Define, Cyber Attack Dictionary, Cyber Attack Ddos, Cyber Attack Examples, Cyber Attack Estonia, Cyber Attack Electrical Grid, Cyber Attack Effects, Cyber Attack Europe, Cyber Attack England, Cyber Attack Election, Cyber Attack Essay, Cyber Attack Ecmc, Cyber Attack Events, Cyber Attack Facts, Cyber Attack From North Korea, Cyber Attack Fedex, Cyber Attack Friday, Cyber Attack Fbi, Cyber Attack Florida, Cyber Attack France, Cyber Attack Future, Cyber Attack Facebook, Cyber Attack Fox, Cyber Attack Google, Cyber Attack Graph, Cyber Attack Government, Cyber Attack Grid, Cyber Attack Gif, Cyber Attack Graphic, Cyber Attack Groups, Cyber Attack Georgia, Cyber Attack Global Map, Cyber Attack Going On Now, Cyber Attack Healthcare, Cyber Attack Headlines, Cyber Attack Hospital, Cyber Attack Hyphen, Cyber Attack History, Cyber Attack Heat Map, Cyber Attack Homeland Security, Cyber Attack Hits Fedex, Cyber Attack Hostage, Cyber Attack Hero, Cyber Attack Insurance, Cyber Attack Images, Cyber Attack In Spanish, Cyber Attack Iran, Cyber Attack Icon, Cyber Attack In Usa, Cyber Attack In The Us, Cyber Attack Infrastructure, Cyber Attack International Law, Cyber Attack Insurance Coverage, Cyber Attack June 2017, Cyber Attack Jobs, Cyber Attack June 14 2017, Cyber Attack Japan, Cyber Attack June 13 2017, Cyber Attack Jokes, Cyber Attack June, Cyber Attack James Paget Hospital, Cyber Attack Jordan, Cyber Attack Jamaica, Cyber Attack Kill Chain, Cyber Attack Korea, Cyber Attack Killswitch, Cyber Attack Kansas, Cyber Attack Kaspersky, Cyber Attack Kaiser Permanente, Cyber Attack Kya Hai, Cyber Attack Kenya, Cyber Attack Kuwait, Cyber Attack Kings Mill Hospital, Cyber Attack Lifecycle, Cyber Attack Live Map, Cyber Attack Last Week, Cyber Attack List, Cyber Attack Laws, Cyber Attack London, Cyber Attack Live, Cyber Attack Losses, Cyber Attack Lifecycle Mitre, Cyber Attack Last Friday, Cyber Attack Map, Cyber Attack May 2017, Cyber Attack Map Norse, Cyber Attack Meaning, Cyber Attack Movie, Cyber Attack Methods, Cyber Attack Monitor, Cyber Attack Map Live, Cyber Attack Merriam Webster, Cyber Attack Meme, Cyber Attack News, Cyber Attack North Korea, Cyber Attack News Today, Cyber Attack Names, Cyber Attack Notification, Cyber Attack News 2016, Cyber Attack Netflix, Cyber Attack Now, Cyber Attack Nhs, Cyber Attack North Korea Missile, Cyber Attack On Electrical Grid, Cyber Attack Or Cyber-attack, Cyber Attack On North Korea, Cyber Attack On Us Power Grid, Cyber Attack On Us, Cyber Attack On Iran, Cyber Attack On Sony, Cyber Attack On Target, Cyber Attack On Healthcare, Cyber Attack On Usa, Cyber Attack Power Grid, Cyber Attack Prevention, Cyber Attack Phases, Cyber Attack Policy, Cyber Attack Pictures, Cyber Attack Phishing, Cyber Attack Prediction, Cyber Attack Protection, Cyber Attack Pdf, Cyber Attack Prevention Plan, Cyber Attack Quotes, Cyber Attack Qatar, Cyber Attack Questions, Cyber Attack Quora, Cyber Attack Queens Hospital Romford, Cyber Attack Qld Health, Cyber Attack Queensland Health, Cyber Attack Queensland, Cyber Attack Queens Hospital Burton, Cyber Attack Quiz, Cyber Attack Ransomware, Cyber Attack Response Plan, Cyber Attack Report, Cyber Attack Ransom, Cyber Attack Russia, Cyber Attack Recovery, Cyber Attack Right Now, Cyber Attack Real Time, Cyber Attack Recent, Cyber Attack Risks, Cyber Attack Statistics 2016, Cyber Attack Statistics, Cyber Attack Statistics 2017, Cyber Attack Stories, Cyber Attack Simulation, Cyber Attack Scenario, Cyber Attack Surface, Cyber Attack Statistics By Country, Cyber Attack Synonym, Cyber Attack Statistics 2015, Cyber Attack Types, Cyber Attack Trends, Cyber Attack Today, Cyber Attack Target, Cyber Attack Today 2017, Cyber Attack Timeline, Cyber Attack Threats, Cyber Attack Tools, Cyber Attack This Week, Cyber Attack Tracker, Cyber Attack Us Power Grid, Cyber Attack Us, Cyber Attack Uk, Cyber Attack Ukraine, Cyber Attack Usa, Cyber Attack Usa Today, Cyber Attack Usa 2017, Cyber Attack Us Companies, Cyber Attack Utilities, Cyber Attack Underway, Cyber Attack Vectors, Cyber Attack Visualization, Cyber Attack Vs Data Breach, Cyber Attack Video, Cyber Attack Virus, Cyber Attack Vs Cyber Attack, Cyber Attack Vulnerability, Cyber Attack Verizon, Cyber Attack Viewer, Cyber Attack Video Youtube, Cyber Attack Wanna Cry, Cyber Attack Wiki, Cyber Attack Website, Cyber Attack World Map, Cyber Attack Wells Fargo, Cyber Attack Wanna, Cyber Attack Worm, Cyber Attack Washington Post, Cyber Attack Wisconsin, Cyber Attack Whaling, Cyber Attack Xbox, Cyber Attack Xp, Cyber Attack Xp Patch, Cyber Attack Xp Only, Cyber Attack Xbox Live, Cyber Attack Team Xbox, Cyber Attack On Xbox And Playstation, Cat Cyber Attack Team Xbox, Cyber Sub Zero X Ray Attack, Xbox Cyber Attack Christmas, Cyber Attack Yahoo, Cyber Attack Youtube, Cyber Attack Yesterday, Cyber Attack Yorkshire, Cyber Attack York Hospital, Cyber Attack York, Cyber Attack Yeovil Hospital, Cyber Attack York Nhs, Cyber Attack Yesterday Hindi, Cyber Attack Uk, Cyber Attack Zomato, Cyber Attack Zee News, Cyber Attack Zero Day, Cyber Attack Zoho, Cyber Attack Zeus, Cyber Attack Ziggo, Cyber Zombie Attack, Cyber Attack New Zealand, Cyberbully Zombie Attack, Zappos Cyber Attack, Hack Squat, Hack Saw, Hack My Life, Hack Wilson, Hack Reactor, Hack Snapchat, Hack Games, Hack Roblox, Hack Definition, Hack Typer, Hack Anything.club, Hack App, Hack A Shaq, Hack And Slash Games, Hackaday, Hack App Data, Hack And Slash, Hack Anything, Hack A Phone, Hack Attack, Hackberry, Hack Bitcoin, Hack Ballz, Hack Bank Account, Hack Bullet Force, Hack Bluetooth Speaker, Hack Boom Beach, Hack Box, Hack Back, Hack Bluetooth, Hack Clash Royale, Hack Codes, Hack Clash Of Clans, Hack Club, Hack Created By Robuxian, Hack Chromecast, Hack Client, Hack Computer, Hack Clicker Heroes, Hack Cell Phone, Hack Definition, Hack Design, Hack Dragon City, Hack Download, Hack Diablo 3, Hack Dream League Soccer, Hack Dash Button, Hack Day, Hack Directv, Hack Deadlift, Hack Etf, Hack Email, Hack Ex, Hack Etf Holdings, Hack Everwing, Hack Engine, Hack Episode, Hack Education, Hack Etf Stock, Hack Everything, Hack Firestick, Hackforums, Hack Fb Online, Hack Font, Hack For Clash Of Clans, Hack Funeral Home, Hack For Roblox, Hack For Ballz, Hack For Robux, Hack For Pixel Gun 3d, Hack Games, Hack Gu Last Recode, Hack Gu, Hack Google, Hack Games App, Hack Game Mobile, Hack Golf Clash, Hack Gta 5, Hack Games Online, Hack Generator, Hack House, Hack Heaven, Hack Hungry Shark, Hack Hay Day, Hack Hotmail Account, Hack Horse, Hack Holdings, Hack Hotmail Password, Hack Harassment, Hack Hungry Shark World, Hack Into Wifi, Hack Iphone, Hack Into Iphone, Hack In The Box, Hack Into Broad City, Hack In Spanish, Hack It, Hackillinois, Hack Iphone 6, Hack Icloud, Hack Job, Jack Johnson, Hack John Doe, Hack Journalist, Hack Jetpack Joyride, Jack Johnson Chicago, Hack Jurassic World, Jack Johnson Tour, Hack Jokes, Jack Jones, Hack Kahoot, Hack Kik, Hack Key, Hack Kik Account, Hack Kindle Fire, Hack Keurig 2.0, Hack Keyboard, Hack Kett Terminals, Hack Kodi, Hack Kahoot Score, Hack Language, Hack License, Hack Life, Hack Live Me, Hack Library School, Hack Lift, Hack Link, Hack Like A Pro, Hack Lords Mobile, Hack Legend Of The Twilight, Hack My Life, Hack Meaning, Hack Movie, Hack My Life Cast, Hack Minecraft, Hack Me, Hack Musically, Hack Messenger, Hack My Kodi, Hack My Phone, Hack Nes Classic, Hack Nintendo Switch, Hack N Slash, Hack News, Hack Netflix, Hack Nitro Type, Hack Night, Hack Nba Live Mobile, Hack N Slash Games, Hack Net, Hack Online Games, Hack O Lantern, Hack Online, Hack On State Chicago, Hack On Roblox, Hack Overwatch, Hack One Piece, Hack Off, Hack O Lantern Blu Ray, Hack Oregon, Hack Pokemon Go, Hack Phone, Hack Paypal, Hack Pixel Gun 3d, Hack Ps4, Hack Ps3, Hack Ps Vita, Hack Prank, Hack Password, Hack Paypal Account, Hack Quizlet, Hack Quote, Hack Quantum, Hack Quizlet Match, Hack Quarantine, Hack Quizizz, Hack Quizlet Live, Hack Qriket, Hack Quickbooks Password, Hack Quizlet Gravity, Hack Reactor, Hack Roblox, Hack Roku, Hack Robux, Hack Rf, Hack Reactor Chicago, Hack Reactor Review, Hack Reactor Prep, Hack Roots, Hack Run, Hack Squat, Hack Saw, Hack Snapchat, Hack Studio, Hack Sign, Hack Stock, Hacksaw Ridge, Hack Simulator, Hack Slash, Hack Synonym, Hack Typer, Hack The Planet, Hack This Site, Hack The North, Hack Tv Show, Hack The Menu, Hack Tool, Hack The Gibson, Hack Twitter Account, Hack Type, Hack United Wifi, Hack Unblocked Games, Hack Uber Eats, Hack Uber Account, Hack Uber, Hack Up, Hack Urban Dictionary, Hack Uconnect, Hack Unison League, Hack Up Meaning, Hack Vending Machine, Hack Vending Machine 2017, Hack Videos, Hack Vita, Hack Ventra App, Hack Veneno, Hack Ventra Card, Hack Vs Php, Hack Video Game, Hack Vs Cibr, Hack Wilson, Hack Wifi, Hack Wifi Password, Hack Website, Hack Wilson Stats, Hack Wii U, Hack Wii U 5.5 2, Hack Wii, Hack Windows 7 Password, Hack Windows 10 Password, Hack Xbox One, Hack Xbox 360, Hack Xfinity Wifi, Hack Xm Radio, Hack Xbox 360 Slim, Hack Xfinity X1 Box, Hack Xfinity Cable Box, Hack Xfinity Router, Hack Xbox Account, Hack Xfinity Hotspot, Hack Youtube, Hack Your Life, Hack Yahoo Email, Hack Your Iphone, Hack Your Brain, Hack Yugioh, Hack Youtube Red, Hack Youtube Account, Hack Your Phone, Hack Your Fitness, Hack Ziosk, Hack Zoosk, Hack Zte Phone, Hack Zip Password, Hack Zynga Poker, Hack Zone, Hack Zurich, Hack Zombs.io, Hack Zearn, Hack Zero,

 

 
 

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, CYBERCRIME, THE NATIONAL SECURITY AGENCY (NSA) August 10, 2015July 6, 2021 14 Minutes

Video – Targeted by the Stasi: revisiting the past

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

The Stasi spied on Silke Orphal and Ilona Seeber for years – after they applied to go to the West. Thirty years after the fall of the Berlin Wall, they both look back at their Stasi files. The Stasi files of Silke Orphal and Ilona Seeber include intercepted letters, official documents and countless reports by spies who meticulously noted everything about their lives, including the turning on and off of lights. When Silke Orphal and Ilona Seeber, who were both ordinary typists at Neues Deutschland – the official newspaper of the Socialist Unity Party – applied to leave the GDR, it was considered scandalous. They were ostracized at work, threatened and subjected to interrogations that lasted hours. What did the experience do to them? How do they look back on that time today? A report by Axel Rowohlt.

Go back

Your message has been sent

Warning
Warning
Warning
Warning

Warning.

Stasi Officer Uniform, Stasi Officer, Stasi Officer Interview, Stasi Officer Definition, Stasi Officer Ranks, Stasi Officer Movie, Former Stasi Officers, Ex Stasi Officers, Female Stasi Officers, Stasi Officer Definition, German Stasi Officer, Stasi Officer Interview, Stasi Officer Movie, Stasi Officer Ranks, Stasi Officer Uniform, Stasi Spitzel Beleidigung, Stasi Spitzel Liste, Stasi Spitzel Wikipedia, Stasi Spitzel Erfurt, Stasi Spitzel, Stasi-spitzel Im Erika, Stasi Spitzel System, Stasi Spitzel Namen, Stasi Spitzel In Dresden, Stasi Spitzel Heute, Stasi Spitzel Anderson, Stasi Spitzel Beleidigung, Stasi Spitzel Brd, Stasi Spitzel Bundeskanzler, Bekannte Stasi Spitzel, Stasi Spitzel Prenzlauer Berg, Stasi Spitzel Dynamo Dresden, Stasi Spitzel Dresden, Spitzel Der Stasi, Stasi Spitzel In Der Brd, Ddr Stasi Spitzel, Stasi Spitzel Erfurt, Stasi Spitzel Enttarnt, Stasi-spitzel Im Erika, Ehemalige Stasi Spitzel, Stasi Spitzel Film, Stasi Spitzel Gauck, Gysi Stasi Spitzel, Stasi Spitzel Heute, Stasi Spitzel Halle Saale, Stasi-spitzel Im Erika, Stasi Spitzel In Dresden, Stasi Spitzel In Der Brd, Stasi Spitzel Im, Stasi Spitzel Jena, Stasi Spitzel Kirche, Stasi Spitzel Liste, Stasi Spitzel Merkel, Stasi Spitzel Methoden, Stasi Spitzel Namen, Stasi Spitzel Namensliste, Stasi Spitzel Prenzlauer Berg, Prominente Stasi-spitzel, Stasi Spitzel Halle Saale, Stasi Spitzel Wikipedia, Stasi Spitzel Westen, Stasi Brothers, Stasi Definition, Stasi Eldredge, Stasi Museum, Stasi Movie, Stasi Bgc, Stasi Files, Stasi Uniform, Stasi Report, Stasi Prison, Stasi Agent, Stasi Archives, Stasi Ap Euro, Stasi Asphalt, Stasi Akten, Stasi Archives Berlin, Stasi Agents Today, Stassi Amazing Race, Stasi Article, Stasi And Gestapo, Stasi Brothers, Stasi Bgc, Stasi Berlin, Stasi Brothers Reviews, Stasi Brand, Stasi Bakery, Stasi Book, Stasi Brothers Paving, Stasi Berlin Wall, Stasi Bernard New Orleans, Stasi Commission, Stasi Cernadas, Stasi Cold War, Stasi Construction, Stasi Child, Stasi Crimes, Stasi City, Stasi Cake, Stasi Captain Gerd Wiesler, Stasi Commission Report, Stasi Definition, Stasi Documentary, Stasi Documents, Stasi Disguises, Stasi Define, Stasi Depue, Stasi Decomposition, Stasi Dallas Electrical Contracting, Stasi Death Squad, Stasi Deutsch, Stasi Eldredge, Stasi Eldredge Books, Stasi East Germany, Stasi Eldredge Quotes, Stasi Eldredge Becoming Myself, Stasi Esper, Stasi East Germany’s Secret Police, Stasi Eldredge Podcast, Stasi Eldredge Instagram, Stasi Eldredge Age, Stasi Files, Stasi Facts, Stasi From Bgc, Stasi Film, Stasi Files Online, Stasi Flag, Stasi From Bad Girl Club, Stabo Fargo, Stasi From Vanderpump Rules, Stassi From Vanderpump Rules, Stasi Germany, Stasi General Contracting, Stasi Grove Funeral Home, Stasi Gestapo, Stasi Glenn, Stasi Gang Stalking, Stasi German Shepherds, Stasi Grove Funeral Home In Olney, Stasi Grove Obituaries, Stasi Greek Meaning, Stasi Headquarters, Stasi Hand Signals, Stasi Headquarters Berlin, Stasi Head, Stasi Hitler, Stasi Headquarters Museum, Stasi Hva, Stasi History, Stasi Hartwick, Stasi Hair Salon, Stasi In Germany, Stasi Industries, Stasi Interrogation Techniques, Stasi Im, Stasi Images, Stasi In America, Stasi International Loss Adjusters, Stasi Informer, Stasi Interview, Stassi Instagram, Stasi Jokes, Stasi Jacket, Stasi Jail, Stasi Junction Road, Stasi Jalan Salib, Stasi Jail Museum, Stassi Jewelry, Stasi John Eldredge, Stasi Jean, Stasi Johnson Park Nicollet, Stasi Kennel, Stasi Kennel Belarus, Stasi Keramidis, Stasi Kountis Photography, Stasi Kara, Stasi Kgb, Stasi Koutali, Stasi Knight, Stasi Kranggan, Stasi Koehler, Stasi Logo, Stasi Longo, Stasi Landscaping, Stasiland, Stasi Lashes, Stasi Law, Stasi Lozada, Stasi Lubansky Np Ny, Stasi Leader, Stasi Leipzig, Stasi Museum, Stasi Movie, Stasi Methods, Stasi Meaning, Stasi Museum Leipzig, Stasi Merkel, Stasi Masonry, Stassi Memes, Stasi Movie East Germany, Stasi Museum Dresden, Stasi Nazi, Stasi Name, Stasi Novel, Stasi Nedir, Stasi Numbers Station, Stasi Numbers, Stasi News, Stasi Namen Alphabetisch, Stasi Officer, Stasi Organization, Stasi Omicidio, Stasi Oppression, Stasi Opfer, Stasi Officer Uniform, Stasi And Gestapo, Stassi Vanderpump Rules, Stasi Offizier, Liste Stasi Offizier, Stasi Police, Stasi Prison, Stasi Prison Berlin, Stasi Paving, Stasi Prison Berlin Tour, Stassi Phillies, Stasi Photos, Stasi Prison Museum, Stasi Primary Sources, Stassi Podcast, Stasi Quinn, Stasi Quizlet, Stasi Quotes, Stasi Quinn Ham, Stasi Quinn Ham Lyrics, Stasi Q, Stasi Quinn Twitter, Stasi Quinn Ham Mp3 Download, Stasi Quinn Ustream, Stasi Quinn Birthday, Stasi Report, Stasi Records, Stasi Ranks, Stasi Romeos, Stasi Russia, Stasi Records Act, Stasi Raus, Stasi Reddit, Stasi Rowe Instagram, Stasi Revel, Stasi Surveillance, Stasi State, Stasi Sprach Machine, Stasi Symbol, Stasi Stories, Stasis Synonym, Stasi Stussy, Stasi Safari, Stasi Spitzel, Stassi Schroeder Age, Stasi Tactics, Stasi The Brand, Stasi Torture, Stasi Techniques, Stasi Torture Methods, Stasi Training, Stasi The Untold Story, Stasi Townsend, Stasi T Shirt, Stasi Training Manual, Stasi Uniform, Stasi Ukraine, Stasi Usa, Stasi Ussr, Stasi Urban Dictionary, Stasi Uniform For Sale, Stasi Unterlagen, Stasi Unterlagen Gesetz, Stasi Vs Shelly, Stasi Vs Kgb, Stassi Vanderpump Rules, Stasi Vs Erika, Stasi Vs Natalie, Stasi Vs Nazi, Stassi Vanderpump Age, Stassi Vanderpump Rules Birthday, Stassi Vanderpump Instagram, Stassi Vanderpump Rules Snapchat, Stasi Wiki, Stasi Weapons, Stasi Ww2, Stasi Waleski Chase, Stasi Westbury, Stasi Water Cell, Stasi War Crimes, Stasi Wolf, Stasi Wolf Amazon, Stasi Wolf By David Young, Stasi X-ray, Stasi Xios, Stasi Xalandri, Stasi Cafe Xios, Stasi Ha Xxii, Stasi Metro Xalandri, Stasi Metro Xolargos, Stasi Abteilung Xii, Stasi Abteilung Xv, Stasi Abteilung X, Stasi Youtube, Stasi Yakobus, Stasi York, Stasi Y Kgb, \U03c3\u03c4\u03b1\u03c3\u03b7 \U03c5\u03c0\u03bd\u03bf\u03c5, Youtube Stasi Eldredge, Yasmin Stasi, Stasi New York Daily News, Stasi New York Times, Stasi Museum Yelp, Stasi Zersetzung, Stasa Zajovic, Stasa Zlatar, Stasa Zujovic, Stasa Znacenje Imena, Stasa Zajovic Biografija, Stasi Zentrale, Sta\u0161a Zurovac, Stasi Zentrale Dresden, Stasi Zentrale Leipzig, Stasi Listening Devices, Stasi Liste, Stasi Liste Alphabetisch, Stasi Liste Mitarbeiter, Stasi Liste Pdf, Stasi Liste Download, Stasi Listen, Lisa Stasi, Stasi Liste Im, Stasi Liste Der Dienststelle, Stasi Agents List, Stasi Informants List, Liste Stasi Mitarbeiter, List Of Stasi Agents, Stasi Salons Price List, Stasi Im Liste, Stasi Im Westen, Stasi Im Erika, Stasi Im Ausland, Stasi Im Unterricht, Stasi Im Victoria, Stasi Im Alltag, Stasi Im Liste Download, Stasi Im Ausland, Stasi Im Alltag, Stasi Im Alltag Der Ddr, Stasi Im Anzahl, Stasi Im Bundestag, Stasi Im Bezahlung, Stasi Im Brandenburg Landtag, Stasi Im Bezirk Halle, Stasi Im Bezirk Cottbus, Stasi Im Brandenburger Tor, Im Stasi Bedeutung, Stasiboom Im Herzogtum, Stasi Offiziere Im Besonderen Einsatz, Stasi Im Liste Berlin, Stasi Im Liste Cottbus, Stasi Im Bezirk Cottbus, Im Stasi Liste Chemnitz, Stasi Im Decknamen, Stasi Im Ddr, Stasi Im Dresden, Stasi Im Ddr-sport, Stasi*dresden*im Liste, Stasi Im Liste Download, Stasi Im Erika, Stasi Im Eichsfeld, Stasi Im Einsatz, Stasi In Erfurt, Stasi-spitzel Im Erika, Stasi Offiziere Im Besonderen Einsatz, Stasi Im Film, Stasi Im Freitag, Im Filius Stasi, Stasi Im Geschichtsunterricht, Stasi Im Harz, Stasi In Halle, Stasi Im Liste Halle Saale, Stasiboom Im Herzogtum, Im Hardy Stasi, Stasi Im Bezirk Halle, Im Helene Stasi, Stasi Akten Im Internet, Stasi Liste Im Internet, Aufgaben Der Stasi Im Inland, Im Jump Stasi, Stasi Im Klarnamen, Stasi Im Kalten Krieg, Schweizer Im Stasi Knast, Die Stasi Kam Im Morgengrauen, Stasi Im Liste, Stasi Im Liste Download, Stasi Im Larve, Stasi Im Liste Berlin, Stasi Im Liste Dresden, Stasi Im Liste Halle Saale, Stasi Im Listen, Stasi Im Liste Leipzig, Stasi Im Mitarbeiter, Stasi I.m, Im Stasi Mitarbeiter Liste, Stasi Mitarbeiter Im Westen, Im Stasi Merkel, Stasi Museum I Berlin, Stasi Museet I Berlin, Stasi Im Namen, Stasi Im Namensliste, Stasi-mitarbeiter Im Netz, Im Notar Stasi, 100.000 Stasi-mitarbeiter Im Netz (Update), 100.000 Stasi-mitarbeiter Im Netz, Stasi Im Om, Stasi Im Osten, Stasi Offiziere Im Besonderen Einsatz, Stasi Im Parlament, Stasi Im Raw Zwickau, Stasi Im Radler, Stasi Im Westen Die Unterwanderte Republik, Stasi Im Sport, Stasi-spitzel Im Erika, Stasi Staat Im Staat, Stasi Spione Im Westen, Stasi Im Liste Halle Saale, Stasi Spitzel Im, Stasi Im Ddr-sport, Stasi Im Unterricht, Stasi Im Untergrund, Stasi Und Im, Die Stasi Im Unterricht, Stasi Im Westen Die Unterwanderte Republik, Stasi Im Victoria, Stasi Im Viktoria, Stasi Im Vorlauf, Stasi Im Vogtland, Stasi Im Volksmund, Gestapo Und Stasi Im Vergleich, Stasi Im Westen, Stasi Im Westen Die Unterwanderte Republik, Im Stasi Wiki, Im Stasi Wikipedia, Stasi Mitarbeiter Im Westen, Stasi Spione Im Westen, Stasi Agenten Im Westen, Stasi Morde Im Westen, Stasi Im Raw Zwickau, Stasi Agents, Stasi Agents In Norway, Stasi Agents Today, Stasi Agents In West Germany, Stasi Agents List, Stasi Agent Movie, Stasi Agents In Britain, Stasi Agent Film, Stasi Agent Facebook, Stasi Agenten, Stasi Agents In Britain, Define Stasi Agent, Agent Stasi Oscar To Donald Tusk, Stasi Agent Film, Stasi Agent Facebook, Agent Stasi W Srodowisku Gda\u0144skiej Opozycji, Gauck Stasi Agent, Stasi Agents List, Stasi Agent Movie, Tusk Agent Stasi Macierewicz, Merkel Stasi Agent, Stasi Agents In Norway, Stasi Agent Oscar, Agent Stasi Oscar To Donald Tusk, Agent Stasi Ps. Oscar, Tusk Agent Stasi Oscar, Agent Stasi O Pseudonimie Oscar, Agent Stasi Tw Oskar, Agent Stasi W Otoczeniu Tuska, Tusk To Agent Stasi Ps. Oskar, Agent Stasi Ps. Oscar, Agent Stasi O Pseudonimie Oscar, Agent Stasi O Pseudonimie Oskar, Agent Stasi O Pseudonimie \U201eoscar, Stasi Romeo Agents, Stasi Agent Stiller, Agent Stasi W Srodowisku Gda\u0144skiej Opozycji, Stasi Agent Topaz, Stasi Agents Today, Agent Stasi Tw \U201eoscar, Agent Stasi Tusk, Agent Stasi Oscar To Donald Tusk, Agent Stasi Tw \U201eoskar, Agent Stasi W Otoczeniu Tuska, Agent Stasi Tw Oskar, Stasi Agents In West Germany, Stasi Agent Wiki, Agent Stasi W Srodowisku Gda\u0144skiej Opozycji, Agent Stasi W Otoczeniu Tuska, Inoffizielle Mitarbeiter Stasi, Inoffizielle Mitarbeiter Ddr, Inoffizielle Mitarbeiter Liste, Inoffizielle Mitarbeiter Namensliste, Inoffizielle Mitarbeiter Des Mfs, Inoffizielle Mitarbeiter, Inoffizielle Mitarbeiter Definition, Inoffizielle Mitarbeiter Der Staatssicherheit, Inoffizielle Mitarbeiter Mfs Liste, Inoffizielle Mitarbeiter Stasi Akten, Inoffizielle Mitarbeiter Stasi Akten, Anzahl Inoffizielle Mitarbeiter Stasi, Inoffizieller Mitarbeiter Bnd, Stasi Inoffizielle Mitarbeiter Berlin, Inoffizielle Mitarbeiter Stasi Bezahlung, Bekannte Inoffizielle Mitarbeiter, Inoffizieller Mitarbeiter Bezahlung, Inoffizielle Mitarbeiter In Der Brd, Bekannte Inoffizielle Mitarbeiter Stasi, Inoffizielle Mitarbeiter Ddr, Inoffizieller Mitarbeiter Erika, Inoffizieller Mitarbeiter Englisch, Inoffizieller Mitarbeiter Gehalt, Hauptamtliche Inoffizielle Mitarbeiter Stasi, Hauptamtliche Inoffizielle Mitarbeiter, Inoffizielle Mitarbeiter In Der Brd, Ims Inoffizielle Mitarbeiter, Inoffizieller Mitarbeiter (Im), Inoffizieller Mitarbeiter Im Besonderen Einsatz, Inoffizielle Kriminalpolizeiliche Mitarbeiter, Inoffizielle Mitarbeiter Liste, Inoffizielle Mitarbeiter Liste Stasi, Inoffizielle Mitarbeiter Liste Dresden, Inoffizielle Mitarbeiter Der Stasi Liste, Liste Inoffizielle Mitarbeiter Staatssicherheit, Inoffizielle Mitarbeiter Mfs Liste, Inoffizielle Mitarbeiter Mfs, Inoffizielle Mitarbeiter Mfs Liste, Inoffizielle Mitarbeiter Namensliste, Inoffizielle Mitarbeiter Namen, Namensliste Inoffizielle Mitarbeiter Stasi, Stasi Inoffizielle Mitarbeiter Namen, Prominente Inoffizielle Mitarbeiter, Inoffizielle Mitarbeiter Stasi, Inoffizielle Mitarbeiter Stasi Liste, Inoffizielle Mitarbeiter Stasi Bezahlung, Inoffizielle Mitarbeiter Stasi Akten, Inoffizielle Mitarbeiter Shenja, Inoffizielle Mitarbeiter Der Stasi, Inoffizielle Mitarbeiter Der Stasi Liste, Liste Inoffizielle Mitarbeiter Staatssicherheit, Namensliste Inoffizielle Mitarbeiter Stasi, Hauptamtliche Inoffizielle Mitarbeiter Stasi, Nsa Jobs, Nsa Director, Nsa Softball, Nsa Meaning, Nsa Careers, Nsa Definition, Nsa Headquarters, Nsa Surveillance, Nsa Spying, Nsa Internships, Nsa Acronym, Nsa Address, Nsa Advisor, Nsa Agent, Nsa Alabama, Nsa Annapolis, Nsa Agent Salary, Nsa Arc, Nsa Approved Shredders, Nsa Agreement, Nsa Building, Nsa Bahrain, Nsa Budget, Nsa Bethesda, Nsa Baseball, Nsa Badge, Nsa Benefits, Nsa Building Nyc, Nsa Budget 2016, Nsa Backdoor, Nsa Careers, Nsa Chief, Nsa Colorado, Nsa Crane, Nsa Cyber Security, Nsa Conference, Nsa Csfc, Nsa Cae, Nsa Crypto Challenge, Nsa Css, Nsa Director, Nsa Definition, Nsa Data Center, Nsa Day Of Cyber, Nsa Director Salary, Nsa Data Collection, Nsa Domestic Surveillance, Nsa Datasheet, Nsa Deputy Director, Nsa Datasheet Is Called, Nsa Employment, Nsa Edward Snowden, Nsa Exploits, Nsa Employees, Nsa Email, Nsa Evaluated Products List, Nsa Echelon, Nsa Emblem, Nsa Encryption, Nsa Eternal Blue, Nsa Fastpitch, Nsa Florida Youth, Nsa Fort Meade, Nsa Flynn, Nsa Florida, Nsa Friend, Nsa Facebook, Nsa Fort Gordon, Nsa Foia, Nsa Facts, Nsa Georgia, Nsa Glassdoor, Nsa Government, Nsa Grindr, Nsa Github, Nsa Gift Shop, Nsa Game, Nsa Grants, Nsa Gif, Nsa Guy, Nsa Headquarters, Nsa Head, Nsa Hacking Tools, Nsa Hawaii, Nsa Hampton Roads, Nsa Hacked, Nsa History, Nsa Hiring Process, Nsa Hacking Tools Leaked, Nsa Headquarters Address, Nsa Internships, Nsa Industries, Nsa Intelligence Analyst, Nsa Indiana, Nsa Influence 2017, Nsa Iad, Nsa Ias 2017, Nsa India, Nsa Illinois, Nsa Insurance, Nsa Jobs, Nsa Juice Plus, Nsa Job Openings, Nsa Jobs Utah, Nsa Jobs Salary, Nsa Jokes, Nsa Job Requirements, Nsa Jurisdiction, Nsa Jobs In Md, Nsa Japan, Nsa Keywords, Nsa Kunia, Nsa Kc, Nsa Key, Nsa Kentucky, Nsa Kmi, Nsa Kankakee, Nsa Korea, Nsa Kaspersky, Nsa Keith Alexander, Nsa Leaker, Nsa Logo, Nsa Leak, Nsa Locations, Nsa Listening, Nsa Leader, Nsa Login, Nsa Leadership, Nsa Language Analyst, Nsa Leaked Tools, Nsa Meaning, Nsa Meme, Nsa Media, Nsa Meet, Nsa Mid South, Nsa Mike Rogers, Nsa Museum, Nsa Mcmaster, Nsa Maryland, Nsa Mission Statement, Nsa News, Nsa Naples, Nsa Name Generator, Nsa North, Nsa Number, Nsa Norfolk, Nsa Nyc, Nsa Nashville, Nsa Nursing, Nsa New Orleans, Nsa Orlando, Nsa Opm Test, Nsa Online Test, Nsa Offices, Nsa Obama, Nsa Organization, Nsa Operational Interview, Nsa Only, Nsa Org Chart, Nsa Of 1947, Nsa Prism, Nsa Police, Nsa Panama City, Nsa Police Officer, Nsa Phone Number, Nsa Philadelphia, Nsa Pay Scale, Nsa Play, Nsa Polygraph, Nsa Purpose, Nsa Quantum Computer, Nsa Quotes, Nsa Qualifications, Nsa Quantum, Nsa Quizlet, Nsa Questions, Nsa Qualifier, Nsa Quantum Computer Farm, Nsa Quartet, Nsa Quiz, Nsa Rogers, Nsa Requirements, Nsa Rules, Nsa Recruiting, Nsa Relationship, Nsa Rule Book, Nsa Ransomware, Nsa Russia, Nsa Responsibilities, Nsa Reno, Nsa Softball, Nsa Surveillance, Nsa Spying, Nsa Slang, Nsa Salary, Nsa Stands For, Nsa Soccer, Nsa Softball Rules, Nsa Scholarship, Nsa Scandal, Nsa Texas, Nsa Tournaments, Nsa Tools, Nsa Trump, Nsa Tao, Nsa Tools Leaked, Nsa Twitter, Nsa Tinder, Nsa Test, Nsa Training, Nsa Utah, Nsa Urban, Nsa Usa, Nsa Utah Facility, Nsa Unmasking, Nsa Utah Jobs, Nsa Unconstitutional, Nsa Umpire, Nsa Under Obama, Nsa Uniform, Nsa Vs Cia, Nsa Visitor Center, Nsa Virginia, Nsa Vs Fbi, Nsa Vs Cia Vs Fbi, Nsa Virus, Nsa Visitor Control Center, Nsa Vpn, Nsa Vanilla, Nsa Violation Of Privacy, Nsa Wiki, Nsa Whistleblower, Nsa Washington, Nsa Wiretapping, Nsa Website, Nsa Water Filter, Nsa Watchlist, Nsa World Series, Nsa Wikileaks, Nsa Wannacry, Nsa Xkeyscore, Nsa Xbox One, Nsa Xeno World Qualifier, Nsa Xkeyscore Download, Nsa Xcode, Nsa Xbox Live, Nsa Xeno Tournament, Nsa Xkeyscore Presentation, Nsa X, Nsa X Files, Nsa Youtube, Nsa Yogurt, Nsa Young Investigator Grant, Nsa Youth Florida, Nsa Yearly Budget, Nsa Yottabyte, Nsa Youth Program, Nsa Youth, Nsa Yellow Dots, Nsa Yakima, Nsa Zero Day, Nsa Zip Code, Nsa Zeus, Nsa Zimmermann Telegram, Nsa Zimbabwe, Nsa Za, Nsa Zero Day Exploit, Nsa Zyxel, Nsa Zero Division, Nsa Zone Store,

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, SPIES, TERRORISM, THE NATIONAL SECURITY AGENCY (NSA) May 13, 2015July 8, 2021 10 Minutes

Exposed – NSA FOIA Report 2014

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Continue reading “Exposed – NSA FOIA Report 2014” →

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, CONFIDENTIAL, THE NATIONAL SECURITY AGENCY (NSA) May 11, 2015July 8, 2021 8 Minutes

Exposed – How German BND Spies Work with NSA

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

ย 

Ron Howard verfilmt "Mad"-Comic "Spion & Spion" - Ron Howard erweckt die beliebten "Mad"-Spione im Kino zum Leben Bild-1

This is part III about the German parliamentary committee which investigates NSA spying activities and the cooperation between NSA and the German foreign intelligence service BND.

The hearings of a number of BND employees which are summarized below, provided many interesting details about BND cable and satellite collection and how these data are selected and filtered and how privacy rights are implemented. This was especially of concern for the cooperation between NSA and BND in the Joint SIGINT Activity (JSA).

The witnesses also stated that contrary to the initial press report, under the joint operation Eikonal not a single German communication was passed on to NSA.

These summaries are based upon transcripts of a live blog, kept by volunteers of the German digital civil rights website Netzpolitik.org, who attended the hearings.
The employees of the BND are designated by initials, not of their real names, but of those of the cover names they are using when at work(!).

> See also: Introduction + Hearings, Part I
Hearings, Part II

ย 


The room where the hearings of the parliamentary committee take place
(photo: DPA)

20th Meeting, November 6, 2014 (Transcript)

– Hearing of the witness Mr. T. B. (BND, head of the JSA unit from 2003-2007):

In Bad Aibling, the BND has dishes to intercept satellite communications. When satellite links are intercepted, the following things have to be done: first a specific frequency has to be selected, and as one frequency often contains multiple channels, these have to be broken down (de-multiplexed) into single data streams. Based upon metadata it can be decided that certain types of communications are not of interest for BND.

The next step is to separate the various content encodings, like for IP-traffic, telephony, fax, etc. This also needs error correction, which sometimes is a bit more difficult because some communication systems use proprietary methods. This results in data in a readable or audible format (like an e-mail or a phone call), which can be used to prepare an intelligence report. The witness estimates that BND produces around 20 reports a day.

> See also: How GCHQ prepares for interception of phone calls from satellite links

For processing, filtering and selecting commercial computer systems were used, as wel as systems that were custom made by NSA. The Americans were ahead of BND in this, not necessarily better, but often just in doing more, or faster, like in analysing signals.


Compare: the data flow at NSA, according to a presentation
from the NSA’s European Cryptologic Center (ECC)
(Click to enlarge)

Mass surveillance?

The witness stated that there was and is no mass surveillance by BND. Mass surveillance is even more difficult for fiber optic cables than for satellite links. If there would be any mass surveillance for the latter, then this should involve some 300 communications satellites, for which there should be ground stations at at least three places around the world.

There you would need 250 satellite dishes of 10 million euros each to receive the up to 500 frequencies per satellite. For each frequency two modems and converters were needed, and with the necessary processing capacity, this would require a nuclear power plant for electricity.

Mass surveillance on cable traffic could probably only be done with the capacity of the American, Russian and Chinese intelligence agencies combined. For BND, mass surveillance would drown the agency in data. The witness had never witnessed any kind of economical espionage by NSA in Germany. But he had to admit that not everything was talked about.

Joint SIGINT Activity (JSA)

NSA’s Bad Aibling Station was scheduled for closure in 2002, but after 9/11 this was postponed to 2004, and maybe this led to the creation of the JSA. In the Joint SIGINT Activity, NSA and BND cooperated in collecting both satellite and cable communications.

The JSA was located at the Mangfall Barracks in Bad Aibling. In 2002, this military complex still had a compound of the Bundeswehr, where you had to go through to reach the BND section. The Bundeswehr left these barracks by the end of 2002, and NSA went to a new building nicknamed the Tin Can (Blechdose).

The compound had three sections: one for Germans only, one for US persons only and one common section. The collection of data took place in the common section, and the exits were strictly monitored, so NSA had no access to German sources on its own, although there weren’t every day checks on people carrying thumb drives.

BND personnel had no access to NSA databases and vice versa, but both had access to joint databases. NSA had also some contractors working there. JSA was connected to NSANet, just like NSA’s European Security Operations Center (ESOC) near Darmstadt.

Until 2007 only cable traffic from Frankfurt was passed on to JSA, not from other internet cables. Satellite traffic intercepted by the BND antennas in Bad Aibling was probably also transferred to JSA, where it was processed and analysed in the interest of both NSA and BND.

After the Joint SIGINT Activity (JSA) was closed in 2012, the logical path over the physical cables between BND headquarters and Bad Aibling was probably cut off. After 2012, BND continued to cooperate with NSA in the field of satellite interception and operations in Afghanistan.


Google Maps view of the Mangfall Barracks in Bad Aibling, Germany.
The building in the upper left corner could be the BND facility,
and the one with the white roof the NSA’s “Tin Can”.

Protection of German data

BND did everything to prevent that communications of German citizens or corporations were collected and/or passed on to NSA. Initially, 4 out of 5 selectors came from the Americans, the rest were German. The witness did not know the total number of selectors. These selectors were checked before they were fed into the collection system, and what came out was again checked whether it contained German communications.

The selectors from NSA were first checked by the Americans in the Tin Can at the Mangfall Barracks and then passed on to a unit of the technical division (which included lawyers) of BND at its then headquarters in Pullach. A final check was conducted by BND personnel in Bad Aibling. Only about one permille of the selectors were rejected because they were related to Germans or contrary to German interests.

Filtering out German data

This filtering works fine, but experience in Bad Aibling has learned that it is not possible to do this fully automated. Therefore, there was no automatic forwarding to NSA. A 100% accurate filtering was only possible with a final selection by hand. As far as the witness was aware of, not a single German communication was passed on to NSA.

In the press report about operation Eikonal it was said that the filter system could only filter out 95% of German communications, but according to the witness, this was only during the test period. When the system went live, this percentage rose to 99% with a second stage that could filter out even more than 99%. When necessary, a final check was conducted by hand.

Especially e-mail addresses have to be checked by hand, because nowadays it’s much more difficult to attribute such internet communications to specific countries. During the test period, about 3000 communications had to be checked by hand, 300 of which were e-mails. BND didn’t collect data from US citizens or passed these on to NSA, so NSA did not use BND to get data that it wasn’t allowed to collect by itself (Ringtausch).

The witness suggested that Sรผddeutsche Zeitung (the media that claimed that the BND filters wouldn’t work and German data was forwarded to the NSA) had documents of conversations between BND and NSA, in which maybe BND made “political statements” about the efficiency of the filters.

(This could explain the discrepancy between the press reports and the BND witnesses, who all assured that the filter worked, and with additionally manual checks not a single German data was forwarded to NSA)

The witness clearly stated that German G-10 Act only protects Germans and people living in Germany. The privacy of foreigners living abroad is not protected by German law.


Operations center room in the former BND headquarters in Pullach
(Screenshot from ARD television – Click to enlarge)

– Hearing of Ms. G. L. (BND, head of IT development and operations at JSA from 2007-2008):

This witness is responsible for databases that store data after having been collected and filtered. These databases are at various locations. Currently, between 8.000 and 10.000 pieces of content with some additional information (Meldungen) come in each month, often but not always accompanied by metadata.

Joint SIGINT Activity (JSA)

Each unit of BND’s analysis division (Auswertung) could request intelligence information from the JSA. They could suggest specific selectors to be tasked or articulate what their information needs were. Ultimate goal was to present relevant information for the federal government. BND sees itself as a service provider for customers in the government.

In 2005/2006 the selection process was fully automated. The witness couldn’t remember how many selectors were used in her period at JSA. These numbers were also not registered. NSA was not able to get any German communications before these were thoroughly filtered and checked by BND. An e-mail that was selected, could be forwarded to NSA through a secured gateway. There was only access to local databases, not to those of NSA.

NSA employees working for JSA were not recognizable as such, they just had ID cards for the compound, issued by the security unit that was responsible for access control of the premises. The Tin Can building also housed SUSLAG (Special US Liaison Activity, Germany), which was a separate unit, different from JSA.


Header of a newsletter from the Joint SIGINT Activity (JSA)
(Click for a JSA newsletter (pdf) from 2007)

Operation Eikonal

The witness confirmed that in Frankfurt fiber optic cables were intercepted (operation Eikonal), although without mentioning whether this was at DE-CIX or somewhere else. She wouldn’t answer the question whether BND is still doing this.

The data collected in Frankfurt were first sent to BND headquarters and then to Bad Aibling, where they were filtered by selectors from both NSA and BND. After the cooperation with NSA was ended, the transmission to Bad Aibling was cut off.

Legal issues

The witness was responsible for the implementation of the Federal Intelligence Service Act (BND Gesetz), which governs the activities of this agency. As such, she had the opinion that satellite interception conducted in Bad Aibling also took place under this act, but the Director of BND overruled her, saying this was not the case.

The BND management said: this kind of collection takes place in outer space, and therefore German law doesn’t apply. But apart from that, employees should always apply with law and order. Once data collected from satellite links had been stored in BND databases, they fall under the German Data Protection Act (Bundesdatenschutzgesetz) though.

(In general, most of these witnesses didn’t knew much about topics that are not related to their own duties. They also showed very little interest in the Snowden-revelations. This might be from a common attitude in the intelligence world: the less you know, the less you can (accidently) give away)

– . – . – . – . –

22th Meeting, November 13, 2014 (Transcript)

– Hearing of the witness Mr. W. K. (BND, sub-division manager in the Signals Intelligence division):

The witness stated that BND is definitely not comparable with the former East German Stasi and that BND only collects what is necessary for fulfilling the information need of the federal government.

Today, mainly fiber optic cables are intercepted, but not everything that flows through, only specific data channels are selected, or in case of satellite links: specific frequencies. Asked about the Snowden-revelations, the witness said that he was surprised by how close the Five Eyes partners are cooperating.

Tapping internet cables

There are search profiles and criteria according to which specific data flows are selected in a very focussed way. The first selection is of a route between two places (like from Afghanistan to Pakistan), then a specific fiber optic cable is chosen.

These are human decisions, based upon where a cable is located, by which company it is operated and where it’s most useful to tap it. Picking a specific cable is also discussed with the provider, with some of them this is easier than with others.

Because internet traffic travels over many different routes, picking specific cables, means that a lot of communications cannot be collected. This is taken for granted as BND doesn’t want to collect everything. Sometimes multiple routes are selected for interception, but not always.

> See also: How GCHQ prepares for interception of phone calls from satellite links

According to the witness, BND doesn’t provide foreign intelligence agencies access to cables. No raw data are transferred to foreign agencies, only end reports.

In some cases, internet data have to be converted into a readable format. This sometimes means cracking encryption, consisting either of complex algorithms or proprietary methods. This can be done on the traffic as it flows past, or with data after having been stored in databases.

Filtering

The next step is filtering the data through selectors. This is done by a computer system, for which the data stream may be buffered for a few milliseconds. The amount of data flowing through these filter systems isn’t counted by BND. Filtering by selectors is done as close to the actual tapping point as possible.

The selectors are chosen based upon the information needs and a set of criteria, which in combination prevent that communications of innocent people are touched. The results went to the (then) BND headquarters in Pullach over leased cables. The number of data forwarded to Pullach is not registered, it depends upon the costs of the capacity for transmission.

The constitutionally guaranteed Privacy of Correspondence can have effect on each of these selection stages: for example no cables are chosen that start and end in Germany, and no selectors belonging to Germans are used.

Data of Germans are currently filtered out by a system called DAFIS, which succeeded a BSI-certified filter system that was used since the 1990s. Data from German citizens and German companies (Grundrechtstrรคgern) are deleted.

After data have been selected, they are pulled out based upon their relevance and finally analysts can use them at a certain moment to write an intelligence report, of which approximately 20 a day are produced.


Operation Eikonal

Regarding the joint NSA-BND operation Eikonal, the witness said that there was no massive scale surveillance of German citizens with data forwarded to NSA. Under Eikonal, which was a one of a kind operation, there was targeted collection from traffic that transited Germany from one foreign country to another.

This was focussed on Afghanistan and anti-terrorism. Selected data were collected and forwarded to NSA. The witness would give more details only behind closed doors, because BND is still using these methods. The internal codename for Eikonal was Karat, but that name wasn’t shared with NSA. There was even a third codename. Eikonal was tested during a few months (early 2006?), during which period no data were shared with NSA.

For Germany, Eikonal was useful because it provided foreign intelligence for protecting German troops and countering terrorism. The NSA provided better technical equipment that BND didn’t had. In return, BND provided NSA with data collected from transit traffic using search profiles about Afghanistan and anti-terrorism. BND was asked to cooperate because NSA isn’t able to do everything themselves.

What was collected under Eikonal was far less than the 500 million metadata a month as shown in the German BOUNDLESSINFORMANT chart. Actual collection only led to a few hundred selected contents (in German: Daten, like phone calls or e-mails) a year, which was a huge disappointment for NSA. Nothing that was worth while came out anymore, contrary to the expectations when the operation was set up.

This, combined with the fact that it proved to be impossible to 100% guarantee that no German data were collected and forwarded, led BND to terminate the program. As a “compensation” for NSA, a joint project in a country outside Europe was planned. In crisis regions, the BND is still cooperating with NSA, which provides “huge benefits” for the Germans, according to the witness.

The witness wouldn’t say anything about whether BND was tapping into the Frankfurt internet exchange DE-CIX, but later on he said that operation Eikonal involved just one telecommunications provider.

(These kind of indications by some of the witnesses eventually led the Committee to conclude that operation Eikonal was actually about tapping one single cable of Deutsche Telekom, instead of the DE-CIX exchange as a whole, as the initial report by Sรผddeutsche Zeitung said. More about this later)

Things the BND learned from the Eikonal-cooperation were:

1. How the technique worked, which is now used for own operations outside, and collection efforts inside Germany
2. It is not possible to conduct 100% automated filtering. This wouldn’t be done anymore.

Filtering through selectors

For Eikonal, the cable traffic was filtered by using selectors provided by both NSA and BND. A BND unit which included lawyers checked for every selector from the NSA whether it was legal and according to the goals of the cooperation. Besides German interests, also the interests of friendly countries were taken into account. Only a few selectors were rejected, but it wasn’t told to NSA which ones. They were just not entered into the filtering system.

Selectors include not just phone numbers and e-mail addresses, but also MAC addresses, which have no country identifier. Although there may have been up to several hundred thoused selectors, BND was still able to check whether every single one was appropriate, this by using special criteria. Only selectors that can be checked are used.

Besides Eikonal, BND also taps into cables of multiple other communication providers, but this is within the proper legal framework, approved by the G-10 Committee. For this, there is dedicated hardware equipment in the building of the provider, in accordance with the regulations of the federal communications authority (Bundesnetzagentur). This hardware is installed at the point where the cable is tapped.


Screenshot from NSA’s BOUNDLESSINFORMANT tool, showing the number of foreign
metadata that BND collected in crisis regions and shared with NSA
(Click to enlarge)

Telephony metadata

According to the witness, one phone call creates between 30 and 50 metadata, which includes not only time and number but also a lot more technical data. With the given number of users in a crisis zone, this easily adds up to billions of metadata. But not all these have to be collected (erfasst); less than one percent can actually be pulled in. This is no mass surveillance without a reasonable ground (anlasslose Massenรผberwachung). The witness assumes that NSA and GCHQ operate in a similar way as the BND.

The over 500 million metadata records from the Germen BOUNDLESSINFORMANT chart were most certainly from Afghanistan, more precisely from satellite communication links between two foreign countries in crisis regions. According to the witness this huge number of metadata for a single month is quite normal.

It could be that these numbers are collected up to today, although he isn’t sure about that. BND isn’t counting every single part of metadata, as NSA is apparently doing and which leads to those huge numbers.

XKeyscore

BND got the XKeyscore program from NSA, which is only used to analyse data that are already collected. BND didn’t had such a tool before. Unlike NSA, which uses Xkeyscore as federated query system, BND uses it as a stand-alone system for analysis. The actual collection systems of BND are antennas and outposts (Aussenstellen).

The witness doesn’t know how many servers BND purchased for XKeyscore. Presently, BND uses XKeyscore only for traffic that is intercepted from satellite links, apparently because the system isn’t (yet) certified for filtering out communications of German citizens. BND got no software programs from NSA for profiling or for decrypting data.

Legality

Personal data are only those data that can be related to specific persons. For German data it is easy to retrieve the identity behind certain metadata, but for foreign metadata this is much more difficult and hence those metadata are not seen as personal data.

The witness said multiple times that he isn’t a lawyer and he therefore had no opinion of his own about the legality of certain decisions. He also didn’t knew whether data collected in foreign countries had been acquired with or without the consent of the provider. He just assumed that the data collection takes place in a legal way. Foreign partner agencies don’t provide BND with data they are not allowed to collect themselves.

– Because of time shortage, the BND employees L. and W. P. couldn’t be heard in this meeting.

> Next time: More hearings of BND employees

UPDATE:
Meanwhile, the following numbers about government eavesdropping operations in 2013 have been made public. These numbers are only about the interception of communcations with at least one-end-German, so traffic with both-ends-foreign are not included:

– The G10 Committee approved 212 eavesdropping operations, most of them were conducted by the domestic security service BfV (up from 157 in 2012). This involved some 350 people, most of them suspected of islam fundamentalism.

– In 26 cases, the domestic security service BfV used an IMSI-catcher to trace or intercept the mobile phone of 29 persons (more as twice as often as in 2012)

– BND is allowed to filter communications by using selectors. If Germans could be involved, it is not allowed to use selectors that identify specific targets (like phone numbers and e-mail adresses), so in that case, only generic search terms (keywords) may be used.

– The official report (pdf) provided the following numbers of approved search terms, of what was filtered out and of what was marked as relevant for foreign intelligence purposes:

ย 

Subject Search terms Filtered out Relevant
Terrorism Ca. 800 Content: 906
Metadata: 639
73
Proliferation Ca. 11.700 Content: 14.411
Metadata: 1
32
Immigration Ca. 28 Content: 84
Metadata: 76
13

Links and Sources
– Offical page of the committee: 1. Untersuchungsausschuss (“NSA”)
– Internal NSA presentation: Structure of the BND (pdf)
– Spiegel.de: Spying Together: Germany’s Deep Cooperation with the NSA
– Reports with numbers for 2013:
– Gemรคss Terrorismusbekรคmpfungsgesetz (pdf)
– Gemรคss Artikel 10-Gesetz (pdf)

See also: BND Codewords and Abbreviations

ย 

ย 

ย 

Go back

Your message has been sent

Warning
Warning
Warning
Warning

Warning.

Bnd Obituary, Bnd Stock, Bnd Logo, Bnd Germany, Bnd Dividend, Bnd Sports, Bnd Quote, Bnd Commercial, Bnd Jobs, Vnd To Usd, Bnd Airport, Bnd Acronym, Bnd Archives, Bnd Agency, Bnd Address, Bnd App, Bnd Automotive, Bnd Adapter Beeping, B&d Auto, Band Aid, Bnd Burger, Bnd Bank, Bnd Belleville, Bnd Berlin, Bnd Bond, B&d Burgers, Bnd Burger Miami, Bnd Baseball, Bnd Bakery, Bnd Blood Test, Bnd Commercial, Bnd Currency, Bnd Chart, Bnd Construction, Bnd Clg Wiki, Bnd Crime Blotter, Bnd College Save, Bnd Corp, Bnd Crime, Bnd Contact, Bnd Dividend, Bnd Dividend Yield, Bnd Duration, Bnd Deal Loan, Bnd Definition, Bnd Deal One, Bnd Deutschland, Bnd Deaths, Bnd Design, Bnd Death Notices, Bnd Etf, Bnd Etf Price, Bnd Engineers, Bnd Ex Dividend Date, Bnd Etf Quote, Bnd Events, Bnd Etf Review, Bnd Exe, B&d Electric, Bnd Etf Chart, Bnd Fact Sheet, Bnd Fund, Bnd Facebook, Bnd Flagpole Sales, Bnd Fidelity, Bnd File, Bnd Fees, Bnd Finance, Bnd For Rent, Bnd File Rebuilder, Bnd Germany, Bnd Google Finance, Bnd Garage Sales, Bnd Germany Website, Bnd Group, Bnd Glen Carbon Fire, Bnd Gradle Plugin, Bnd Gets In Dead Meat, Bnd Gov, B&d Genetics, Bnd Holdings, Bnd High School Baseball, Bnd Houses For Rent, Bnd Homes, B And H, Bnd Hours, Bnd Historical Prices, Bnd Headquarters, Bnd Homeland, Bnd Hmo, Bnd Intelligence, Bnd Interiors, Bnd Index, Bnd Illinois, Bnd Interiors Inc, Bnd Include-resource Examples, Bnd Include-resource, B&d Industries, Bnd Obits, Bend It Like Beckham, Bnd Jobs, Bnd Jake Arter, Bnd Joann Reed, Bnd Jumpers, Bnd Jumpers Riverside Ca, Bnd Jingle Competition, Bnd Java, Bnd Jurist, Bnd Jobs Berlin, Bnd Karriere, Bnd Kahl, Bnd Kitchener, Bnd Kanpur, Bnd Kaffeestudio, Band Karke Sheeshe Car De, Bnd Knives, Band Kamre Me Pyar Karenge, B&d Kilsyth, Bdn Kitchens Parkes, Bnd Logo, Bnd Loans, Bnd Logo Of Doom, Bnd Local News, Bnd Logo History, Bnd Loan Consolidation, Bnd Loan Forgiveness, Bnd Lab, Bnd Logo Remake, Bnd Local Events, Bnd Morningstar, Bnd Mask, Bnd Meaning, Bnd Morphs, Bnd Mask Of Doom, Bnd Metro East News, Bond Mutual Fund Equivalent, Bnd My Account, B&d Mechanical, Bond Mutual Fund, Bnd News, B&d Nation, Bnd Number, Bnd North Dakota, Bnd News Sports, Bnd Nyse, B&d Nails, Bnd News Today, Bnd Nd, Bnd No Doubt, Bnd Obituary, Band Of Brothers, Band Of Horses, Bnd Osgi, Band Of Brothers Cast, Bnd Oil, Bnd Oil Inc, Bnd Online, Band On The Run, Bend Oregon, Bnd Plastering, Bnd Price, Bnd Performance, Bnd Police Blotter, Bnd Prospectus, Bnd Pets, Bnd Public Salary Database, Bnd Paper, Bnd Public Pay Database, Bnd Properties, Bnd Quote, Bnd Qualified Dividends, B And Q, B And Q Wallpaper, B And Q Paint, B And Q Near Me, B And Q Bbq, B And Q Jobs, B And Q Lighting, B And Q Kitchen, Bnd Rentals, Bnd Real Estate, Bnd Returns, Bnd Review, Bnd Rebuilder, Bnd Reddit, Bnd Recipes, Bnd Russia, Bnd Rates, Bnd Reporters, Bnd Stock, Bnd Sports, Bnd Stock Price, Bnd Student Loan Login, Bnd Sports Baseball, Bnd Stock Quote, Bnd Stands For, Bnd Stock Price Today, Bnd Share Price, Bnd Stock Dividend, Vnd To Usd, Bnd Ticker, Bnd Treasure Chest, Bnd Tools, Bnd Total Return, Vnd To Usd Chart, B&d Towing, Bnd Twitter, Bnd Today, Bnd Test, Vnd Usd, Bnd Urban Dictionary, Vnd Usd Chart, Vnd Urban Dictionary, B&d Used Cars, Vnd Unity, Vnd Usd Exchange Rate History, Vnd Usd Vietcombank, Bnd Us, Bnd Us Equity, Bnd Vanguard, Bnd Vs Biv, Bnd Vs Bndx, Bnd Vs Vbmfx, Bnd Vs Vcit, Bnd Vs Schz, Bnd Vs Vbtlx, Bnd Vs Bond, Bnd Vs Bsv, Bnd View From The Cheap Seats, Bnd Wynwood, Bnd Weather, Bnd Wiki, Bnd Wholesale, Bnd Website, Bend Walmart, Bnd Wab, Bnd Wrap Jar, Bandwagon, Bnd What Neighbor’s House Sell For, Bnd Yield, Bnd Yahoo Finance, Bnd Yard Sales, Bnd Ytd, Bnd Year To Date, Band Yes, Bnd Ytd Performance, Bnd Yield History, Bond Yield, Bnd Yoga, Bnd Zacks, Bnd Zentrale, Bnd Zac Epplin, Bnd Zulage, Bnd Zentrale Berlin Adresse, Bnd Zentrale Pullach, Bnd Zentrale Neubau

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, CONFIDENTIAL, SECRET February 11, 2015July 11, 2021 18 Minutes

Unveiled – How the NSA made Google

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

How the CIA made Google

Inside the secret network behind mass surveillance, endless war, and Skynetโ€”

part 1

By Nafeez Ahmed

INSURGE INTELLIGENCE, a new crowd-funded investigative journalism project, breaks the exclusive story of how the United States intelligence community funded, nurtured and incubated Google as part of a drive to dominate the world through control of information. Seed-funded by the NSA and CIA, Google was merely the first among a plethora of private sector start-ups co-opted by US intelligence to retain โ€˜information superiority.โ€™

The origins of this ingenious strategy trace back to a secret Pentagon-sponsored group, that for the last two decades has functioned as a bridge between the US government and elites across the business, industry, finance, corporate, and media sectors. The group has allowed some of the most powerful special interests in corporate America to systematically circumvent democratic accountability and the rule of law to influence government policies, as well as public opinion in the US and around the world. The results have been catastrophic: NSA mass surveillance, a permanent state of global war, and a new initiative to transform the US military into Skynet.

THIS IS PART ONE. READ PART TWO HERE.


This exclusive is being released for free in the public interest, and was enabled by crowdfunding. Iโ€™d like to thank my amazing community of patrons for their support, which gave me the opportunity to work on this in-depth investigation. Please support independent, investigative journalism for the global commons.


In the wake of the Charlie Hebdo attacks in Paris, western governments are moving fast to legitimize expanded powers of mass surveillance and controls on the internet, all in the name of fighting terrorism.

US and European politicians have called to protect NSA-style snooping, and to advance the capacity to intrude on internet privacy by outlawing encryption. One idea is to establish a telecoms partnership that would unilaterally delete content deemed to โ€œfuel hatred and violenceโ€ in situations considered โ€œappropriate.โ€ Heated discussions are going on at government and parliamentary level to explore cracking down on lawyer-client confidentiality.

What any of this would have done to prevent the Charlie Hebdo attacks remains a mystery, especially given that we already know the terrorists were on the radar of French intelligence for up to a decade.

There is little new in this story. The 9/11 atrocity was the first of many terrorist attacks, each succeeded by the dramatic extension of draconian state powers at the expense of civil liberties, backed up with the projection of military force in regions identified as hotspots harbouring terrorists. Yet there is little indication that this tried and tested formula has done anything to reduce the danger. If anything, we appear to be locked into a deepening cycle of violence with no clear end in sight.

As our governments push to increase their powers, INSURGE INTELLIGENCE can now reveal the vast extent to which the US intelligence community is implicated in nurturing the web platforms we know today, for the precise purpose of utilizing the technology as a mechanism to fight global โ€˜information warโ€™โ€Šโ€”โ€Ša war to legitimize the power of the few over the rest of us. The lynchpin of this story is the corporation that in many ways defines the 21st century with its unobtrusive omnipresence: Google.

Google styles itself as a friendly, funky, user-friendly tech firm that rose to prominence through a combination of skill, luck, and genuine innovation. This is true. But it is a mere fragment of the story. In reality, Google is a smokescreen behind which lurks the US military-industrial complex.

The inside story of Googleโ€™s rise, revealed here for the first time, opens a can of worms that goes far beyond Google, unexpectedly shining a light on the existence of a parasitical network driving the evolution of the US national security apparatus, and profiting obscenely from its operation.

The shadow network

For the last two decades, US foreign and intelligence strategies have resulted in a global โ€˜war on terrorโ€™ consisting of prolonged military invasions in the Muslim world and comprehensive surveillance of civilian populations. These strategies have been incubated, if not dictated, by a secret network inside and beyond the Pentagon.

Established under the Clinton administration, consolidated under Bush, and firmly entrenched under Obama, this bipartisan network of mostly neoconservative ideologues sealed its dominion inside the US Department of Defense (DoD) by the dawn of 2015, through the operation of an obscure corporate entity outside the Pentagon, but run by the Pentagon.

In 1999, the CIA created its own venture capital investment firm, In-Q-Tel, to fund promising start-ups that might create technologies useful for intelligence agencies. But the inspiration for In-Q-Tel came earlier, when the Pentagon set up its own private sector outfit.

Known as the โ€˜Highlands Forum,โ€™ this private network has operated as a bridge between the Pentagon and powerful American elites outside the military since the mid-1990s. Despite changes in civilian administrations, the network around the Highlands Forum has become increasingly successful in dominating US defense policy.

Giant defense contractors like Booz Allen Hamilton and Science Applications International Corporation are sometimes referred to as the โ€˜shadow intelligence communityโ€™ due to the revolving doors between them and government, and their capacity to simultaneously influence and profit from defense policy. But while these contractors compete for power and money, they also collaborate where it counts. The Highlands Forum has for 20 years provided an off the record space for some of the most prominent members of the shadow intelligence community to convene with senior US government officials, alongside other leaders in relevant industries.

I first stumbled upon the existence of this network in November 2014, when I reported for VICEโ€™s Motherboard that US defense secretary Chuck Hagelโ€™s newly announced โ€˜Defense Innovation Initiativeโ€™ was really about building Skynetโ€Šโ€”โ€Šor something like it, essentially to dominate an emerging era of automated robotic warfare.

That story was based on a little-known Pentagon-funded โ€˜white paperโ€™ published two months earlier by the National Defense University (NDU) in Washington DC, a leading US military-run institution that, among other things, generates research to develop US defense policy at the highest levels. The white paper clarified the thinking behind the new initiative, and the revolutionary scientific and technological developments it hoped to capitalize on.

The Highlands Forum

The co-author of that NDU white paper is Linton Wells, a 51-year veteran US defense official who served in the Bush administration as the Pentagonโ€™s chief information officer, overseeing the National Security Agency (NSA) and other spy agencies. He still holds active top-secret security clearances, and according to a report by Government Executive magazine in 2006 he chaired the โ€˜Highlands Forumโ€™, founded by the Pentagon in 1994.

Linton Wells II (right) former Pentagon chief information officer and assistant secretary of defense for networks, at a recent Pentagon Highlands Forum session. Rosemary Wenchel, a senior official in the US Department of Homeland Security, is sitting next to him

New Scientist magazine (paywall) has compared the Highlands Forum to elite meetings like โ€œDavos, Ditchley and Aspen,โ€ describing it as โ€œfar less well known, yetโ€ฆ arguably just as influential a talking shop.โ€ Regular Forum meetings bring together โ€œinnovative people to consider interactions between policy and technology. Its biggest successes have been in the development of high-tech network-based warfare.โ€

Given Wellsโ€™ role in such a Forum, perhaps it was not surprising that his defense transformation white paper was able to have such a profound impact on actual Pentagon policy. But if that was the case, why had no one noticed?

Despite being sponsored by the Pentagon, I could find no official page on the DoD website about the Forum. Active and former US military and intelligence sources had never heard of it, and neither did national security journalists. I was baffled.

The Pentagonโ€™s intellectual capital venture firm

In the prologue to his 2007 book, A Crowd of One: The Future of Individual Identity, John Clippinger, an MIT scientist of the Media Lab Human Dynamics Group, described how he participated in a โ€œHighlands Forumโ€ gathering, an โ€œinvitation-only meeting funded by the Department of Defense and chaired by the assistant for networks and information integration.โ€ This was a senior DoD post overseeing operations and policies for the Pentagonโ€™s most powerful spy agencies including the NSA, the Defense Intelligence Agency (DIA), among others. Starting from 2003, the position was transitioned into what is now the undersecretary of defense for intelligence. The Highlands Forum, Clippinger wrote, was founded by a retired US Navy captain named Dick Oโ€™Neill. Delegates include senior US military officials across numerous agencies and divisionsโ€Šโ€”โ€Šโ€œcaptains, rear admirals, generals, colonels, majors and commandersโ€ as well as โ€œmembers of the DoD leadership.โ€

What at first appeared to be the Forumโ€™s main website describes Highlands as โ€œan informal cross-disciplinary network sponsored by Federal Government,โ€ focusing on โ€œinformation, science and technology.โ€ Explanation is sparse, beyond a single โ€˜Department of Defenseโ€™ logo.

But Highlands also has another website describing itself as an โ€œintellectual capital venture firmโ€ with โ€œextensive experience assisting corporations, organizations, and government leaders.โ€ The firm provides a โ€œwide range of services, including: strategic planning, scenario creation and gaming for expanding global markets,โ€ as well as โ€œworking with clients to build strategies for execution.โ€ โ€˜The Highlands Group Inc.,โ€™ the website says, organizes a whole range of Forums on these issue.

For instance, in addition to the Highlands Forum, since 9/11 the Group runs the โ€˜Island Forum,โ€™ an international event held in association with Singaporeโ€™s Ministry of Defense, which Oโ€™Neill oversees as โ€œlead consultant.โ€ The Singapore Ministry of Defense website describes the Island Forum as โ€œpatterned after the Highlands Forum organized for the US Department of Defense.โ€ Documents leaked by NSA whistleblower Edward Snowden confirmed that Singapore played a key role in permitting the US and Australia to tap undersea cables to spy on Asian powers like Indonesia and Malaysia.

The Highlands Group website also reveals that Highlands is partnered with one of the most powerful defense contractors in the United States. Highlands is โ€œsupported by a network of companies and independent researchers,โ€ including โ€œour Highlands Forum partners for the past ten years at SAIC; and the vast Highlands network of participants in the Highlands Forum.โ€

SAIC stands for the US defense firm, Science Applications International Corporation, which changed its name to Leidos in 2013, operating SAIC as a subsidiary. SAIC/Leidos is among the top 10 largest defense contractors in the US, and works closely with the US intelligence community, especially the NSA. According to investigative journalist Tim Shorrock, the first to disclose the vast extent of the privatization of US intelligence with his seminal book Spies for Hire, SAIC has a โ€œsymbiotic relationship with the NSA: the agency is the companyโ€™s largest single customer and SAIC is the NSAโ€™s largest contractor.โ€

Richard โ€˜Dickโ€™ Patrick Oโ€™Neill, founding president of the Pentagonโ€™s Highlands Forum

The full name of Captain โ€œDickโ€ Oโ€™Neill, the founding president of the Highlands Forum, is Richard Patrick Oโ€™Neill, who after his work in the Navy joined the DoD. He served his last post as deputy for strategy and policy in the Office of the Assistant Secretary for Defense for Command, Control, Communications and Intelligence, before setting up Highlands.

The Club of Yoda

But Clippinger also referred to another mysterious individual revered by Forum attendees:

โ€œHe sat at the back of the room, expressionless behind thick, black-rimmed glasses. I never heard him utter a wordโ€ฆ Andrew (Andy) Marshall is an icon within DoD. Some call him Yoda, indicative of his mythical inscrutable statusโ€ฆ He had served many administrations and was widely regarded as above partisan politics. He was a supporter of the Highlands Forum and a regular fixture from its beginning.โ€

Since 1973, Marshall has headed up one of the Pentagonโ€™s most powerful agencies, the Office of Net Assessment (ONA), the US defense secretaryโ€™s internal โ€˜think tankโ€™ which conducts highly classified research on future planning for defense policy across the US military and intelligence community. The ONA has played a key role in major Pentagon strategy initiatives, including Maritime Strategy, the Strategic Defense Initiative, the Competitive Strategies Initiative, and the Revolution in Military Affairs.

Andrew โ€˜Yodaโ€™ Marshall, head of the Pentagonโ€™s Office of Net Assessment (ONA) and co-chair of the Highlands Forum, at an early Highlands event in 1996 at the Santa Fe Institute. Marshall is retiring as of January 2015

In a rare 2002 profile in Wired, reporter Douglas McGray described Andrew Marshall, now 93 years old, as โ€œthe DoDโ€™s most elusiveโ€ but โ€œone of its most influentialโ€ officials. McGray added that โ€œVice President Dick Cheney, Defense Secretary Donald Rumsfeld, and Deputy Secretary Paul Wolfowitzโ€โ€Šโ€”โ€Šwidely considered the hawks of the neoconservative movement in American politicsโ€Šโ€”โ€Šwere among Marshallโ€™s โ€œstar protรฉgรฉs.โ€

Speaking at a low-key Harvard University seminar a few months after 9/11, Highlands Forum founding president Richard Oโ€™Neill said that Marshall was much more than a โ€œregular fixtureโ€ at the Forum. โ€œAndy Marshall is our co-chair, so indirectly everything that we do goes back into Andyโ€™s system,โ€ he told the audience. โ€œDirectly, people who are in the Forum meetings may be going back to give briefings to Andy on a variety of topics and to synthesize things.โ€ He also said that the Forum had a third co-chair: the director of the Defense Advanced Research and Projects Agency (DARPA), which at that time was a Rumsfeld appointee, Anthony J. Tether. Before joining DARPA, Tether was vice president of SAICโ€™s Advanced Technology Sector.

Anthony J. Tether, director of DARPA and co-chair of the Pentagonโ€™s Highlands Forum from June 2001 to February 2009

The Highlands Forumโ€™s influence on US defense policy has thus operated through three main channels: its sponsorship by the Office of the Secretary of Defense (around the middle of last decade this was transitioned specifically to the Office of the Undersecretary of Defense for Intelligence, which is in charge of the main surveillance agencies); its direct link to Andrew โ€˜Yodaโ€™ Marshallโ€™s ONA; and its direct link to DARPA.

A slide from Richard Oโ€™Neillโ€™s presentation at Harvard University in 2001

According to Clippinger in A Crowd of One, โ€œwhat happens at informal gatherings such as the Highlands Forum could, over time and through unforeseen curious paths of influence, have enormous impact, not just within the DoD but throughout the world.โ€ He wrote that the Forumโ€™s ideas have โ€œmoved from being heretical to mainstream. Ideas that were anathema in 1999 had been adopted as policy just three years later.โ€

Although the Forum does not produce โ€œconsensus recommendations,โ€ its impact is deeper than a traditional government advisory committee. โ€œThe ideas that emerge from meetings are available for use by decision-makers as well as by people from the think tanks,โ€ according to Oโ€™Neill:

โ€œWeโ€™ll include people from Booz, SAIC, RAND, or others at our meetingsโ€ฆ We welcome that kind of cooperation, because, truthfully, they have the gravitas. They are there for the long haul and are able to influence government policies with real scholarly workโ€ฆ We produce ideas and interaction and networks for these people to take and use as they need them.โ€

My repeated requests to Oโ€™Neill for information on his work at the Highlands Forum were ignored. The Department of Defense also did not respond to multiple requests for information and comment on the Forum.

Information warfare

The Highlands Forum has served as a two-way โ€˜influence bridgeโ€™: on the one hand, for the shadow network of private contractors to influence the formulation of information operations policy across US military intelligence; and on the other, for the Pentagon to influence what is going on in the private sector. There is no clearer evidence of this than the truly instrumental role of the Forum in incubating the idea of mass surveillance as a mechanism to dominate information on a global scale.

In 1989, Richard Oโ€™Neill, then a US Navy cryptologist, wrote a paper for the US Naval War College, โ€˜Toward a methodology for perception management.โ€™ In his book, Future Wars, Col. John Alexander, then a senior officer in the US Armyโ€™s Intelligence and Security Command (INSCOM), records that Oโ€™Neillโ€™s paper for the first time outlined a strategy for โ€œperception managementโ€ as part of information warfare (IW). Oโ€™Neillโ€™s proposed strategy identified three categories of targets for IW: adversaries, so they believe they are vulnerable; potential partners, โ€œso they perceive the cause [of war] as justโ€; and finally, civilian populations and the political leadership so they โ€œperceive the cost as worth the effort.โ€ A secret briefing based on Oโ€™Neillโ€™s work โ€œmade its way to the top leadershipโ€ at DoD. โ€œThey acknowledged that Oโ€™Neill was right and told him to bury it.

Except the DoD didnโ€™t bury it. Around 1994, the Highlands Group was founded by Oโ€™Neill as an official Pentagon project at the appointment of Bill Clintonโ€™s then defense secretary William Perryโ€Šโ€”โ€Šwho went on to join SAICโ€™s board of directors after retiring from government in 2003.

In Oโ€™Neillโ€™s own words, the group would function as the Pentagonโ€™s โ€˜ideas labโ€™. According to Government Executive, military and information technology experts gathered at the first Forum meeting โ€œto consider the impacts of IT and globalization on the United States and on warfare. How would the Internet and other emerging technologies change the world?โ€ The meeting helped plant the idea of โ€œnetwork-centric warfareโ€ in the minds of โ€œthe nationโ€™s top military thinkers.โ€

Excluding the public

Official Pentagon records confirm that the Highlands Forumโ€™s primary goal was to support DoD policies on Oโ€™Neillโ€™s specialism: information warfare. According to the Pentagonโ€™s 1997 Annual Report to the President and the Congress under a section titled โ€˜Information Operations,โ€™ (IO) the Office of the Secretary of Defense (OSD) had authorized the โ€œestablishment of the Highlands Group of key DoD, industry, and academic IO expertsโ€ to coordinate IO across federal military intelligence agencies.

The following yearโ€™s DoD annual report reiterated the Forumโ€™s centrality to information operations: โ€œTo examine IO issues, DoD sponsors the Highlands Forum, which brings together government, industry, and academic professionals from various fields.โ€

Notice that in 1998, the Highlands โ€˜Groupโ€™ became a โ€˜Forum.โ€™ According to Oโ€™Neill, this was to avoid subjecting Highlands Forums meetings to โ€œbureaucratic restrictions.โ€ What he was alluding to was the Federal Advisory Committee Act (FACA), which regulates the way the US government can formally solicit the advice of special interests.

Known as the โ€˜open governmentโ€™ law, FACA requires that US government officials cannot hold closed-door or secret consultations with people outside government to develop policy. All such consultations should take place via federal advisory committees that permit public scrutiny. FACA requires that meetings be held in public, announced via the Federal Register, that advisory groups are registered with an office at the General Services Administration, among other requirements intended to maintain accountability to the public interest.

But Government Executive reported that โ€œOโ€™Neill and others believedโ€ such regulatory issues โ€œwould quell the free flow of ideas and no-holds-barred discussions they sought.โ€ Pentagon lawyers had warned that the word โ€˜groupโ€™ might necessitate certain obligations and advised running the whole thing privately: โ€œSo Oโ€™Neill renamed it the Highlands Forum and moved into the private sector to manage it as a consultant to the Pentagon.โ€ The Pentagon Highlands Forum thus runs under the mantle of Oโ€™Neillโ€™s โ€˜intellectual capital venture firm,โ€™ โ€˜Highlands Group Inc.โ€™

In 1995, a year after William Perry appointed Oโ€™Neill to head up the Highlands Forum, SAICโ€Šโ€”โ€Šthe Forumโ€™s โ€œpartnerโ€ organizationโ€Šโ€”โ€Šlaunched a new Center for Information Strategy and Policy under the direction of โ€œJeffrey Cooper, a member of the Highlands Group who advises senior Defense Department officials on information warfare issues.โ€ The Center had precisely the same objective as the Forum, to function as โ€œa clearinghouse to bring together the best and brightest minds in information warfare by sponsoring a continuing series of seminars, papers and symposia which explore the implications of information warfare in depth.โ€ The aim was to โ€œenable leaders and policymakers from government, industry, and academia to address key issues surrounding information warfare to ensure that the United States retains its edge over any and all potential enemies.โ€

Despite FACA regulations, federal advisory committees are already heavily influenced, if not captured, by corporate power. So in bypassing FACA, the Pentagon overrode even the loose restrictions of FACA, by permanently excluding any possibility of public engagement.

Oโ€™Neillโ€™s claim that there are no reports or recommendations is disingenuous. By his own admission, the secret Pentagon consultations with industry that have taken place through the Highlands Forum since 1994 have been accompanied by regular presentations of academic and policy papers, recordings and notes of meetings, and other forms of documentation that are locked behind a login only accessible by Forum delegates. This violates the spirit, if not the letter, of FACAโ€Šโ€”โ€Šin a way that is patently intended to circumvent democratic accountability and the rule of law.

The Highlands Forum doesnโ€™t need to produce consensus recommendations. Its purpose is to provide the Pentagon a shadow social networking mechanism to cement lasting relationships with corporate power, and to identify new talent, that can be used to fine-tune information warfare strategies in absolute secrecy.

Total participants in the DoDโ€™s Highlands Forum number over a thousand, although sessions largely consist of small closed workshop style gatherings of maximum 25โ€“30 people, bringing together experts and officials depending on the subject. Delegates have included senior personnel from SAIC and Booz Allen Hamilton, RAND Corp., Cisco, Human Genome Sciences, eBay, PayPal, IBM, Google, Microsoft, AT&T, the BBC, Disney, General Electric, Enron, among innumerable others; Democrat and Republican members of Congress and the Senate; senior executives from the US energy industry such as Daniel Yergin of IHS Cambridge Energy Research Associates; and key people involved in both sides of presidential campaigns.

Other participants have included senior media professionals: David Ignatius, associate editor of the Washington Post and at the time the executive editor of the International Herald Tribune; Thomas Friedman, long-time New York Times columnist; Arnaud de Borchgrave, an editor at Washington Times and United Press International; Steven Levy, a former Newsweek editor, senior writer for Wired and now chief tech editor at Medium; Lawrence Wright, staff writer at the New Yorker; Noah Shachtmann, executive editor at the Daily Beast; Rebecca McKinnon, co-founder of Global Voices Online; Nik Gowing of the BBC; and John Markoff of the New York Times.

Due to its current sponsorship by the OSDโ€™s undersecretary of defense for intelligence, the Forum has inside access to the chiefs of the main US surveillance and reconnaissance agencies, as well as the directors and their assistants at DoD research agencies, from DARPA, to the ONA. This also means that the Forum is deeply plugged into the Pentagonโ€™s policy research task forces.

Google: seeded by the Pentagon

In 1994โ€Šโ€”โ€Šthe same year the Highlands Forum was founded under the stewardship of the Office of the Secretary of Defense, the ONA, and DARPAโ€Šโ€”โ€Štwo young PhD students at Stanford University, Sergey Brin and Larry Page, made their breakthrough on the first automated web crawling and page ranking application. That application remains the core component of what eventually became Googleโ€™s search service. Brin and Page had performed their work with funding from the Digital Library Initiative (DLI), a multi-agency programme of the National Science Foundation (NSF), NASA and DARPA.

But thatโ€™s just one side of the story.

Throughout the development of the search engine, Sergey Brin reported regularly and directly to two people who were not Stanford faculty at all: Dr. Bhavani Thuraisingham and Dr. Rick Steinheiser. Both were representatives of a sensitive US intelligence community research programme on information security and data-mining.

Thuraisingham is currently the Louis A. Beecherl distinguished professor and executive director of the Cyber Security Research Institute at the University of Texas, Dallas, and a sought-after expert on data-mining, data management and information security issues. But in the 1990s, she worked for the MITRE Corp., a leading US defense contractor, where she managed the Massive Digital Data Systems initiative, a project sponsored by the NSA, CIA, and the Director of Central Intelligence, to foster innovative research in information technology.

โ€œWe funded Stanford University through the computer scientist Jeffrey Ullman, who had several promising graduate students working on many exciting areas,โ€ Prof. Thuraisingham told me. โ€œOne of them was Sergey Brin, the founder of Google. The intelligence communityโ€™s MDDS program essentially provided Brin seed-funding, which was supplemented by many other sources, including the private sector.โ€

This sort of funding is certainly not unusual, and Sergey Brinโ€™s being able to receive it by being a graduate student at Stanford appears to have been incidental. The Pentagon was all over computer science research at this time. But it illustrates how deeply entrenched the culture of Silicon Valley is in the values of the US intelligence community.

In an extraordinary document hosted by the website of the University of Texas, Thuraisingham recounts that from 1993 to 1999, โ€œthe Intelligence Community [IC] started a program called Massive Digital Data Systems (MDDS) that I was managing for the Intelligence Community when I was at the MITRE Corporation.โ€ The program funded 15 research efforts at various universities, including Stanford. Its goal was developing โ€œdata management technologies to manage several terabytes to petabytes of data,โ€ including for โ€œquery processing, transaction management, metadata management, storage management, and data integration.โ€

At the time, Thuraisingham was chief scientist for data and information management at MITRE, where she led team research and development efforts for the NSA, CIA, US Air Force Research Laboratory, as well as the US Armyโ€™s Space and Naval Warfare Systems Command (SPAWAR) and Communications and Electronic Command (CECOM). She went on to teach courses for US government officials and defense contractors on data-mining in counter-terrorism.

In her University of Texas article, she attaches the copy of an abstract of the US intelligence communityโ€™s MDDS program that had been presented to the โ€œAnnual Intelligence Community Symposiumโ€ in 1995. The abstract reveals that the primary sponsors of the MDDS programme were three agencies: the NSA, the CIAโ€™s Office of Research & Development, and the intelligence communityโ€™s Community Management Staff (CMS) which operates under the Director of Central Intelligence. Administrators of the program, which provided funding of around 3โ€“4 million dollars per year for 3โ€“4 years, were identified as Hal Curran (NSA), Robert Kluttz (CMS), Dr. Claudia Pierce (NSA), Dr. Rick Steinheiser (ORDโ€Šโ€”โ€Šstanding for the CIAโ€™s Office of Research and Devepment), and Dr. Thuraisingham herself.

Thuraisingham goes on in her article to reiterate that this joint CIA-NSA program partly funded Sergey Brin to develop the core of Google, through a grant to Stanford managed by Brinโ€™s supervisor Prof. Jeffrey D. Ullman:

โ€œIn fact, the Google founder Mr. Sergey Brin was partly funded by this program while he was a PhD student at Stanford. He together with his advisor Prof. Jeffrey Ullman and my colleague at MITRE, Dr. Chris Clifton [Mitreโ€™s chief scientist in IT], developed the Query Flocks System which produced solutions for mining large amounts of data stored in databases. I remember visiting Stanford with Dr. Rick Steinheiser from the Intelligence Community and Mr. Brin would rush in on roller blades, give his presentation and rush out. In fact the last time we met in September 1998, Mr. Brin demonstrated to us his search engine which became Google soon after.โ€

Brin and Page officially incorporated Google as a company in September 1998, the very month they last reported to Thuraisingham and Steinheiser. โ€˜Query Flocksโ€™ was also part of Googleโ€™s patented โ€˜PageRankโ€™ search system, which Brin developed at Stanford under the CIA-NSA-MDDS programme, as well as with funding from the NSF, IBM and Hitachi. That year, MITREโ€™s Dr. Chris Clifton, who worked under Thuraisingham to develop the โ€˜Query Flocksโ€™ system, co-authored a paper with Brinโ€™s superviser, Prof. Ullman, and the CIAโ€™s Rick Steinheiser. Titled โ€˜Knowledge Discovery in Text,โ€™ the paper was presented at an academic conference.

โ€œThe MDDS funding that supported Brin was significant as far as seed-funding goes, but it was probably outweighed by the other funding streams,โ€ said Thuraisingham. โ€œThe duration of Brinโ€™s funding was around two years or so. In that period, I and my colleagues from the MDDS would visit Stanford to see Brin and monitor his progress every three months or so. We didnโ€™t supervise exactly, but we did want to check progress, point out potential problems and suggest ideas. In those briefings, Brin did present to us on the query flocks research, and also demonstrated to us versions of the Google search engine.โ€

Brin thus reported to Thuraisingham and Steinheiser regularly about his work developing Google.

==

UPDATE 2.05PM GMT [2nd Feb 2015]:

Since publication of this article, Prof. Thuraisingham has amended her article referenced above. The amended version includes a new modified statement, followed by a copy of the original version of her account of the MDDS. In this amended version, Thuraisingham rejects the idea that CIA funded Google, and says instead:

โ€œIn fact Prof. Jeffrey Ullman (at Stanford) and my colleague at MITRE Dr. Chris Clifton together with some others developed the Query Flocks System, as part of MDDS, which produced solutions for mining large amounts of data stored in databases. Also, Mr. Sergey Brin, the cofounder of Google, was part of Prof. Ullmanโ€™s research group at that time. I remember visiting Stanford with Dr. Rick Steinheiser from the Intelligence Community periodically and Mr. Brin would rush in on roller blades, give his presentation and rush out. During our last visit to Stanford in September 1998, Mr. Brin demonstrated to us his search engine which I believe became Google soon afterโ€ฆ

There are also several inaccuracies in Dr. Ahmedโ€™s article (dated January 22, 2015). For example, the MDDS program was not a โ€˜sensitiveโ€™ program as stated by Dr. Ahmed; it was an Unclassified program that funded universities in the US. Furthermore, Sergey Brin never reported to me or to Dr. Rick Steinheiser; he only gave presentations to us during our visits to the Department of Computer Science at Stanford during the 1990s. Also, MDDS never funded Google; it funded Stanford University.โ€

Here, there is no substantive factual difference in Thuraisinghamโ€™s accounts, other than to assert that her statement associating Sergey Brin with the development of โ€˜query flocksโ€™ is mistaken. Notably, this acknowledgement is derived not from her own knowledge, but from this very article quoting a comment from a Google spokesperson.

However, the bizarre attempt to disassociate Google from the MDDS program misses the mark. Firstly, the MDDS never funded Google, because during the development of the core components of the Google search engine, there was no company incorporated with that name. The grant was instead provided to Stanford University through Prof. Ullman, through whom some MDDS funding was used to support Brin who was co-developing Google at the time. Secondly, Thuraisingham then adds that Brin never โ€œreportedโ€ to her or the CIAโ€™s Steinheiser, but admits he โ€œgave presentations to us during our visits to the Department of Computer Science at Stanford during the 1990s.โ€ It is unclear, though, what the distinction is here between reporting, and delivering a detailed presentationโ€Šโ€”โ€Šeither way, Thuraisingham confirms that she and the CIA had taken a keen interest in Brinโ€™s development of Google. Thirdly, Thuraisingham describes the MDDS program as โ€œunclassified,โ€ but this does not contradict its โ€œsensitiveโ€ nature. As someone who has worked for decades as an intelligence contractor and advisor, Thuraisingham is surely aware that there are many ways of categorizing intelligence, including โ€˜sensitive but unclassified.โ€™ A number of former US intelligence officials I spoke to said that the almost total lack of public information on the CIA and NSAโ€™s MDDS initiative suggests that although the progam was not classified, it is likely instead that its contents was considered sensitive, which would explain efforts to minimise transparency about the program and the way it fed back into developing tools for the US intelligence community. Fourthly, and finally, it is important to point out that the MDDS abstract which Thuraisingham includes in her University of Texas document states clearly not only that the Director of Central Intelligenceโ€™s CMS, CIA and NSA were the overseers of the MDDS initiative, but that the intended customers of the project were โ€œDoD, IC, and other government organizationsโ€: the Pentagon, the US intelligence community, and other relevant US government agencies.

In other words, the provision of MDDS funding to Brin through Ullman, under the oversight of Thuraisingham and Steinheiser, was fundamentally because they recognized the potential utility of Brinโ€™s work developing Google to the Pentagon, intelligence community, and the federal government at large.

==

The MDDS programme is actually referenced in several papers co-authored by Brin and Page while at Stanford, specifically highlighting its role in financially sponsoring Brin in the development of Google. In their 1998 paper published in the Bulletin of the IEEE Computer Society Technical Committeee on Data Engineering, they describe the automation of methods to extract information from the web via โ€œDual Iterative Pattern Relation Extraction,โ€ the development of โ€œa global ranking of Web pages called PageRank,โ€ and the use of PageRank โ€œto develop a novel search engine called Google.โ€ Through an opening footnote, Sergey Brin confirms he was โ€œPartially supported by the Community Management Staffโ€™s Massive Digital Data Systems Program, NSF grant IRI-96โ€“31952โ€โ€Šโ€”โ€Šconfirming that Brinโ€™s work developing Google was indeed partly-funded by the CIA-NSA-MDDS program.

This NSF grant identified alongside the MDDS, whose project report lists Brin among the students supported (without mentioning the MDDS), was different to the NSF grant to Larry Page that included funding from DARPA and NASA. The project report, authored by Brinโ€™s supervisor Prof. Ullman, goes on to say under the section โ€˜Indications of Successโ€™ that โ€œthere are some new stories of startups based on NSF-supported research.โ€ Under โ€˜Project Impact,โ€™ the report remarks: โ€œFinally, the google project has also gone commercial as Google.com.โ€

Thuraisinghamโ€™s account, including her new amended version, therefore demonstrates that the CIA-NSA-MDDS program was not only partly funding Brin throughout his work with Larry Page developing Google, but that senior US intelligence representatives including a CIA official oversaw the evolution of Google in this pre-launch phase, all the way until the company was ready to be officially founded. Google, then, had been enabled with a โ€œsignificantโ€ amount of seed-funding and oversight from the Pentagon: namely, the CIA, NSA, and DARPA.

The DoD could not be reached for comment.

When I asked Prof. Ullman to confirm whether or not Brin was partly funded under the intelligence communityโ€™s MDDS program, and whether Ullman was aware that Brin was regularly briefing the CIAโ€™s Rick Steinheiser on his progress in developing the Google search engine, Ullmanโ€™s responses were evasive: โ€œMay I know whom you represent and why you are interested in these issues? Who are your โ€˜sourcesโ€™?โ€ He also denied that Brin played a significant role in developing the โ€˜query flocksโ€™ system, although it is clear from Brinโ€™s papers that he did draw on that work in co-developing the PageRank system with Page.

When I asked Ullman whether he was denying the US intelligence communityโ€™s role in supporting Brin during the development of Google, he said: โ€œI am not going to dignify this nonsense with a denial. If you wonโ€™t explain what your theory is, and what point you are trying to make, I am not going to help you in the slightest.โ€

The MDDS abstract published online at the University of Texas confirms that the rationale for the CIA-NSA project was to โ€œprovide seed money to develop data management technologies which are of high-risk and high-pay-off,โ€ including techniques for โ€œquerying, browsing, and filtering; transaction processing; accesses methods and indexing; metadata management and data modelling; and integrating heterogeneous databases; as well as developing appropriate architectures.โ€ The ultimate vision of the program was to โ€œprovide for the seamless access and fusion of massive amounts of data, information and knowledge in a heterogeneous, real-time environmentโ€ for use by the Pentagon, intelligence community and potentially across government.

These revelations corroborate the claims of Robert Steele, former senior CIA officer and a founding civilian deputy director of the Marine Corps Intelligence Activity, whom I interviewed for The Guardian last year on open source intelligence. Citing sources at the CIA, Steele had said in 2006 that Steinheiser, an old colleague of his, was the CIAโ€™s main liaison at Google and had arranged early funding for the pioneering IT firm. At the time, Wired founder John Batelle managed to get this official denial from a Google spokesperson in response to Steeleโ€™s assertions:

โ€œThe statements related to Google are completely untrue.โ€

This time round, despite multiple requests and conversations, a Google spokesperson declined to comment.

UPDATE: As of 5.41PM GMT [22nd Jan 2015], Googleโ€™s director of corporate communication got in touch and asked me to include the following statement:

โ€œSergey Brin was not part of the Query Flocks Program at Stanford, nor were any of his projects funded by US Intelligence bodies.โ€

This is what I wrote back:

My response to that statement would be as follows: Brin himself in his own paper acknowledges funding from the Community Management Staff of the Massive Digital Data Systems (MDDS) initiative, which was supplied through the NSF. The MDDS was an intelligence community program set up by the CIA and NSA. I also have it on record, as noted in the piece, from Prof. Thuraisingham of University of Texas that she managed the MDDS program on behalf of the US intelligence community, and that her and the CIAโ€™s Rick Steinheiser met Brin every three months or so for two years to be briefed on his progress developing Google and PageRank. Whether Brin worked on query flocks or not is neither here nor there.

In that context, you might want to consider the following questions:

1) Does Google deny that Brinโ€™s work was part-funded by the MDDS via an NSF grant?

2) Does Google deny that Brin reported regularly to Thuraisingham and Steinheiser from around 1996 to 1998 until September that year when he presented the Google search engine to them?

Total Information Awareness

A call for papers for the MDDS was sent out via email list on November 3rd 1993 from senior US intelligence official David Charvonia, director of the research and development coordination office of the intelligence communityโ€™s CMS. The reaction from Tatu Ylonen (celebrated inventor of the widely used secure shell [SSH] data protection protocol) to his colleagues on the email list is telling: โ€œCrypto relevance? Makes you think whether you should protect your data.โ€ The email also confirms that defense contractor and Highlands Forum partner, SAIC, was managing the MDDS submission process, with abstracts to be sent to Jackie Booth of the CIAโ€™s Office of Research and Development via a SAIC email address.

By 1997, Thuraisingham reveals, shortly before Google became incorporated and while she was still overseeing the development of its search engine software at Stanford, her thoughts turned to the national security applications of the MDDS program. In the acknowledgements to her book, Web Data Mining and Applications in Business Intelligence and Counter-Terrorism (2003), Thuraisingham writes that she and โ€œDr. Rick Steinheiser of the CIA, began discussions with Defense Advanced Research Projects Agency on applying data-mining for counter-terrorism,โ€ an idea that resulted directly from the MDDS program which partly funded Google. โ€œThese discussions eventually developed into the current EELD (Evidence Extraction and Link Detection) program at DARPA.โ€

So the very same senior CIA official and CIA-NSA contractor involved in providing the seed-funding for Google were simultaneously contemplating the role of data-mining for counter-terrorism purposes, and were developing ideas for tools actually advanced by DARPA.

Today, as illustrated by her recent oped in the New York Times, Thuraisingham remains a staunch advocate of data-mining for counter-terrorism purposes, but also insists that these methods must be developed by government in cooperation with civil liberties lawyers and privacy advocates to ensure that robust procedures are in place to prevent potential abuse. She points out, damningly, that with the quantity of information being collected, there is a high risk of false positives.

In 1993, when the MDDS program was launched and managed by MITRE Corp. on behalf of the US intelligence community, University of Virginia computer scientist Dr. Anita K. Jonesโ€Šโ€”โ€Ša MITRE trusteeโ€Šโ€”โ€Šlanded the job of DARPA director and head of research and engineering across the Pentagon. She had been on the board of MITRE since 1988. From 1987 to 1993, Jones simultaneously served on SAICโ€™s board of directors. As the new head of DARPA from 1993 to 1997, she also co-chaired the Pentagonโ€™s Highlands Forum during the period of Googleโ€™s pre-launch development at Stanford under the MDSS.

Thus, when Thuraisingham and Steinheiser were talking to DARPA about the counter-terrorism applications of MDDS research, Jones was DARPA director and Highlands Forum co-chair. That year, Jones left DARPA to return to her post at the University of Virgina. The following year, she joined the board of the National Science Foundation, which of course had also just funded Brin and Page, and also returned to the board of SAIC. When she left DoD, Senator Chuck Robb paid Jones the following tribute : โ€œShe brought the technology and operational military communities together to design detailed plans to sustain US dominance on the battlefield into the next century.โ€

Dr. Anita Jones, head of DARPA from 1993โ€“1997, and co-chair of the Pentagon Highlands Forum from 1995โ€“1997, during which officials in charge of the CIA-NSA-MDSS program were funding Google, and in communication with DARPA about data-mining for counterterrorism

On the board of the National Science Foundation from 1992 to 1998 (including a stint as chairman from 1996) was Richard N. Zare. This was the period in which the NSF sponsored Sergey Brin and Larry Page in association with DARPA. In June 1994, Prof. Zare, a chemist at Stanford, participated with Prof. Jeffrey Ullman (who supervised Sergey Brinโ€™s research), on a panel sponsored by Stanford and the National Research Council discussing the need for scientists to show how their work โ€œties to national needs.โ€ The panel brought together scientists and policymakers, including โ€œWashington insiders.โ€

DARPAโ€™s EELD program, inspired by the work of Thuraisingham and Steinheiser under Jonesโ€™ watch, was rapidly adapted and integrated with a suite of tools to conduct comprehensive surveillance under the Bush administration.

According to DARPA official Ted Senator, who led the EELD program for the agencyโ€™s short-lived Information Awareness Office, EELD was among a range of โ€œpromising techniquesโ€ being prepared for integration โ€œinto the prototype TIA system.โ€ TIA stood for Total Information Awareness, and was the main global electronic eavesdropping and data-mining program deployed by the Bush administration after 9/11. TIA had been set up by Iran-Contra conspirator Admiral John Poindexter, who was appointed in 2002 by Bush to lead DARPAโ€™s new Information Awareness Office.

The Xerox Palo Alto Research Center (PARC) was another contractor among 26 companies (also including SAIC) that received million dollar contracts from DARPA (the specific quantities remained classified) under Poindexter, to push forward the TIA surveillance program in 2002 onwards. The research included โ€œbehaviour-based profiling,โ€ โ€œautomated detection, identification and trackingโ€ of terrorist activity, among other data-analyzing projects. At this time, PARCโ€™s director and chief scientist was John Seely Brown. Both Brown and Poindexter were Pentagon Highlands Forum participantsโ€Šโ€”โ€ŠBrown on a regular basis until recently.

TIA was purportedly shut down in 2003 due to public opposition after the program was exposed in the media, but the following year Poindexter participated in a Pentagon Highlands Group session in Singapore, alongside defense and security officials from around the world. Meanwhile, Ted Senator continued to manage the EELD program among other data-mining and analysis projects at DARPA until 2006, when he left to become a vice president at SAIC. He is now a SAIC/Leidos technical fellow.

Google, DARPA and the money trail

Long before the appearance of Sergey Brin and Larry Page, Stanford Universityโ€™s computer science department had a close working relationship with US military intelligence. A letter dated November 5th 1984 from the office of renowned artificial intelligence (AI) expert, Prof Edward Feigenbaum, addressed to Rick Steinheiser, gives the latter directions to Stanfordโ€™s Heuristic Programming Project, addressing Steinheiser as a member of the โ€œAI Steering Committee.โ€ A list of attendees at a contractor conference around that time, sponsored by the Pentagonโ€™s Office of Naval Research (ONR), includes Steinheiser as a delegate under the designation โ€œOPNAV Op-115โ€โ€Šโ€”โ€Šwhich refers to the Office of the Chief of Naval Operationsโ€™ program on operational readiness, which played a major role in advancing digital systems for the military.

From the 1970s, Prof. Feigenbaum and his colleagues had been running Stanfordโ€™s Heuristic Programming Project under contract with DARPA, continuing through to the 1990s. Feigenbaum alone had received around over $7 million in this period for his work from DARPA, along with other funding from the NSF, NASA, and ONR.

Brinโ€™s supervisor at Stanford, Prof. Jeffrey Ullman, was in 1996 part of a joint funding project of DARPAโ€™s Intelligent Integration of Information program. That year, Ullman co-chaired DARPA-sponsored meetings on data exchange between multiple systems.

In September 1998, the same month that Sergey Brin briefed US intelligence representatives Steinheiser and Thuraisingham, tech entrepreneurs Andreas Bechtolsheim and David Cheriton invested $100,000 each in Google. Both investors were connected to DARPA.

As a Stanford PhD student in electrical engineering in the 1980s, Bechtolsheimโ€™s pioneering SUN workstation project had been funded by DARPA and the Stanford computer science departmentโ€Šโ€”โ€Šthis research was the foundation of Bechtolsheimโ€™s establishment of Sun Microsystems, which he co-founded with William Joy.

As for Bechtolsheimโ€™s co-investor in Google, David Cheriton, the latter is a long-time Stanford computer science professor who has an even more entrenched relationship with DARPA. His bio at the University of Alberta, which in November 2014 awarded him an honorary science doctorate, says that Cheritonโ€™s โ€œresearch has received the support of the US Defense Advanced Research Projects Agency (DARPA) for over 20 years.โ€

In the meantime, Bechtolsheim left Sun Microsystems in 1995, co-founding Granite Systems with his fellow Google investor Cheriton as a partner. They sold Granite to Cisco Systems in 1996, retaining significant ownership of Granite, and becoming senior Cisco executives.

An email obtained from the Enron Corpus (a database of 600,000 emails acquired by the Federal Energy Regulatory Commission and later released to the public) from Richard Oโ€™Neill, inviting Enron executives to participate in the Highlands Forum, shows that Cisco and Granite executives are intimately connected to the Pentagon. The email reveals that in May 2000, Bechtolsheimโ€™s partner and Sun Microsystems co-founder, William Joyโ€Šโ€”โ€Šwho was then chief scientist and corporate executive officer thereโ€Šโ€”โ€Šhad attended the Forum to discuss nanotechnology and molecular computing.

In 1999, Joy had also co-chaired the Presidentโ€™s Information Technology Advisory Committee, overseeing a report acknowledging that DARPA had:

โ€œโ€ฆ revised its priorities in the 90โ€™s so that all information technology funding was judged in terms of its benefit to the warfighter.โ€

Throughout the 1990s, then, DARPAโ€™s funding to Stanford, including Google, was explicitly about developing technologies that could augment the Pentagonโ€™s military intelligence operations in war theatres.

The Joy report recommended more federal government funding from the Pentagon, NASA, and other agencies to the IT sector. Greg Papadopoulos, another of Bechtolsheimโ€™s colleagues as then Sun Microsystems chief technology officer, also attended a Pentagon Highlandsโ€™ Forum meeting in September 2000.

In November, the Pentagon Highlands Forum hosted Sue Bostrom, who was vice president for the internet at Cisco, sitting on the companyโ€™s board alongside Google co-investors Bechtolsheim and Cheriton. The Forum also hosted Lawrence Zuriff, then a managing partner of Granite, which Bechtolsheim and Cheriton had sold to Cisco. Zuriff had previously been an SAIC contractor from 1993 to 1994, working with the Pentagon on national security issues, specifically for Marshallโ€™s Office of Net Assessment. In 1994, both the SAIC and the ONA were, of course, involved in co-establishing the Pentagon Highlands Forum. Among Zuriffโ€™s output during his SAIC tenure was a paper titled โ€˜Understanding Information Warโ€™, delivered at a SAIC-sponsored US Army Roundtable on the Revolution in Military Affairs.

After Googleโ€™s incorporation, the company received $25 million in equity funding in 1999 led by Sequoia Capital and Kleiner Perkins Caufield & Byers. According to Homeland Security Today, โ€œA number of Sequoia-bankrolled start-ups have contracted with the Department of Defense, especially after 9/11 when Sequoiaโ€™s Mark Kvamme met with Defense Secretary Donald Rumsfeld to discuss the application of emerging technologies to warfighting and intelligence collection.โ€ Similarly, Kleiner Perkins had developed โ€œa close relationshipโ€ with In-Q-Tel, the CIA venture capitalist firm that funds start-ups โ€œto advance โ€˜priorityโ€™ technologies of valueโ€ to the intelligence community.

John Doerr, who led the Kleiner Perkins investment in Google obtaining a board position, was a major early investor in Becholshteinโ€™s Sun Microsystems at its launch. He and his wife Anne are the main funders behind Rice Universityโ€™s Center for Engineering Leadership (RCEL), which in 2009 received $16 million from DARPA for its platform-aware-compilation-environment (PACE) ubiquitous computing R&D program. Doerr also has a close relationship with the Obama administration, which he advised shortly after it took power to ramp up Pentagon funding to the tech industry. In 2013, at the Fortune Brainstorm TECH conference, Doerr applauded โ€œhow the DoDโ€™s DARPA funded GPS, CAD, most of the major computer science departments, and of course, the Internet.โ€

From inception, in other words, Google was incubated, nurtured and financed by interests that were directly affiliated or closely aligned with the US military intelligence community: many of whom were embedded in the Pentagon Highlands Forum.

Google captures the Pentagon

In 2003, Google began customizing its search engine under special contract with the CIA for its Intelink Management Office, โ€œoverseeing top-secret, secret and sensitive but unclassified intranets for CIA and other IC agencies,โ€ according to Homeland Security Today. That year, CIA funding was also being โ€œquietlyโ€ funneled through the National Science Foundation to projects that might help create โ€œnew capabilities to combat terrorism through advanced technology.โ€

The following year, Google bought the firm Keyhole, which had originally been funded by In-Q-Tel. Using Keyhole, Google began developing the advanced satellite mapping software behind Google Earth. Former DARPA director and Highlands Forum co-chair Anita Jones had been on the board of In-Q-Tel at this time, and remains so today.

Then in November 2005, In-Q-Tel issued notices to sell $2.2 million of Google stocks. Googleโ€™s relationship with US intelligence was further brought to light when an IT contractor told a closed Washington DC conference of intelligence professionals on a not-for-attribution basis that at least one US intelligence agency was working to โ€œleverage Googleโ€™s [user] data monitoringโ€ capability as part of an effort to acquire data of โ€œnational security intelligence interest.โ€

A photo on Flickr dated March 2007 reveals that Google research director and AI expert Peter Norvig attended a Pentagon Highlands Forum meeting that year in Carmel, California. Norvigโ€™s intimate connection to the Forum as of that year is also corroborated by his role in guest editing the 2007 Forum reading list.

The photo below shows Norvig in conversation with Lewis Shepherd, who at that time was senior technology officer at the Defense Intelligence Agency, responsible for investigating, approving, and architecting โ€œall new hardware/software systems and acquisitions for the Global Defense Intelligence IT Enterprise,โ€ including โ€œbig data technologies.โ€ Shepherd now works at Microsoft. Norvig was a computer research scientist at Stanford University in 1991 before joining Bechtolsheimโ€™s Sun Microsystems as senior scientist until 1994, and going on to head up NASAโ€™s computer science division.

Lewis Shepherd (left), then a senior technology officer at the Pentagonโ€™s Defense Intelligence Agency, talking to Peter Norvig (right), renowned expert in artificial intelligence expert and director of research at Google. This photo is from a Highlands Forum meeting in 2007.

Norvig shows up on Oโ€™Neillโ€™s Google Plus profile as one of his close connections. Scoping the rest of Oโ€™Neillโ€™s Google Plus connections illustrates that he is directly connected not just to a wide range of Google executives, but also to some of the biggest names in the US tech community.

Those connections include Michele Weslander Quaid, an ex-CIA contractor and former senior Pentagon intelligence official who is now Googleโ€™s chief technology officer where she is developing programs to โ€œbest fit government agenciesโ€™ needsโ€; Elizabeth Churchill, Google director of user experience; James Kuffner, a humanoid robotics expert who now heads up Googleโ€™s robotics division and who introduced the term โ€˜cloud roboticsโ€™; Mark Drapeau, director of innovation engagement for Microsoftโ€™s public sector business; Lili Cheng, general manager of Microsoftโ€™s Future Social Experiences (FUSE) Labs; Jon Udell, Microsoft โ€˜evangelistโ€™; Cory Ondrejka, vice president of engineering at Facebook; to name just a few.

In 2010, Google signed a multi-billion dollar no-bid contract with the NSAโ€™s sister agency, the National Geospatial-Intelligence Agency (NGA). The contract was to use Google Earth for visualization services for the NGA. Google had developed the software behind Google Earth by purchasing Keyhole from the CIA venture firm In-Q-Tel.

Then a year after, in 2011, another of Oโ€™Neillโ€™s Google Plus connections, Michele Quaidโ€Šโ€”โ€Šwho had served in executive positions at the NGA, National Reconnaissance Office and the Office of the Director of National Intelligenceโ€Šโ€”โ€Šleft her government role to become Google โ€˜innovation evangelistโ€™ and the point-person for seeking government contracts. Quaidโ€™s last role before her move to Google was as a senior representative of the Director of National Intelligence to the Intelligence, Surveillance, and Reconnaissance Task Force, and a senior advisor to the undersecretary of defense for intelligenceโ€™s director of Joint and Coalition Warfighter Support (J&CWS). Both roles involved information operations at their core. Before her Google move, in other words, Quaid worked closely with the Office of the Undersecretary of Defense for Intelligence, to which the Pentagonโ€™s Highlands Forum is subordinate. Quaid has herself attended the Forum, though precisely when and how often I could not confirm.

In March 2012, then DARPA director Regina Duganโ€Š โ€”โ€Šwho in that capacity was also co-chair of the Pentagon Highlands Forumโ€Šโ€”โ€Šfollowed her colleague Quaid into Google to lead the companyโ€™s new Advanced Technology and Projects Group. During her Pentagon tenure, Dugan led on strategic cyber security and social media, among other initiatives. She was responsible for focusing โ€œan increasing portionโ€ of DARPAโ€™s work โ€œon the investigation of offensive capabilities to address military-specific needs,โ€ securing $500 million of government funding for DARPA cyber research from 2012 to 2017.

Regina Dugan, former head of DARPA and Highlands Forum co-chair, now a senior Google executiveโ€Šโ€”โ€Štrying her best to look the part

By November 2014, Googleโ€™s chief AI and robotics expert James Kuffner was a delegate alongside Oโ€™Neill at the Highlands Island Forum 2014 in Singapore, to explore โ€˜Advancement in Robotics and Artificial Intelligence: Implications for Society, Security and Conflict.โ€™ The event included 26 delegates from Austria, Israel, Japan, Singapore, Sweden, Britain and the US, from both industry and government. Kuffnerโ€™s association with the Pentagon, however, began much earlier. In 1997, Kuffner was a researcher during his Stanford PhD for a Pentagon-funded project on networked autonomous mobile robots, sponsored by DARPA and the US Navy.

Rumsfeld and persistent surveillance

In sum, many of Googleโ€™s most senior executives are affiliated with the Pentagon Highlands Forum, which throughout the period of Googleโ€™s growth over the last decade, has surfaced repeatedly as a connecting and convening force. The US intelligence communityโ€™s incubation of Google from inception occurred through a combination of direct sponsorship and informal networks of financial influence, themselves closely aligned with Pentagon interests.

The Highlands Forum itself has used the informal relationship building of such private networks to bring together defense and industry sectors, enabling the fusion of corporate and military interests in expanding the covert surveillance apparatus in the name of national security. The power wielded by the shadow network represented in the Forum can, however, be gauged most clearly from its impact during the Bush administration, when it played a direct role in literally writing the strategies and doctrines behind US efforts to achieve โ€˜information superiority.โ€™

In December 2001, Oโ€™Neill confirmed that strategic discussions at the Highlands Forum were feeding directly into Andrew Marshallโ€™s DoD-wide strategic review ordered by President Bush and Donald Rumsfeld to upgrade the military, including the Quadrennial Defense Reviewโ€Šโ€”โ€Šand that some of the earliest Forum meetings โ€œresulted in the writing of a group of DoD policies, strategies, and doctrine for the services on information warfare.โ€ That process of โ€œwritingโ€ the Pentagonโ€™s information warfare policies โ€œwas done in conjunction with people who understood the environment differentlyโ€Šโ€”โ€Šnot only US citizens, but also foreign citizens, and people who were developing corporate IT.โ€

The Pentagonโ€™s post-9/11 information warfare doctrines were, then, written not just by national security officials from the US and abroad: but also by powerful corporate entities in the defense and technology sectors.

In April that year, Gen. James McCarthy had completed his defense transformation review ordered by Rumsfeld. His report repeatedly highlighted mass surveillance as integral to DoD transformation. As for Marshall, his follow-up report for Rumsfeld was going to develop a blueprint determining the Pentagonโ€™s future in the โ€˜information age.โ€™

Oโ€™Neill also affirmed that to develop information warfare doctrine, the Forum had held extensive discussions on electronic surveillance and โ€œwhat constitutes an act of war in an information environment.โ€ Papers feeding into US defense policy written through the late 1990s by RAND consultants John Arquilla and David Rondfeldt, both longstanding Highlands Forum members, were produced โ€œas a result of those meetings,โ€ exploring policy dilemmas on how far to take the goal of โ€˜Information Superiority.โ€™ โ€œOne of the things that was shocking to the American public was that we werenโ€™t pilfering Milosevicโ€™s accounts electronically when we in fact could,โ€ commented Oโ€™Neill.

Although the R&D process around the Pentagon transformation strategy remains classified, a hint at the DoD discussions going on in this period can be gleaned from a 2005 US Army School of Advanced Military Studies research monograph in the DoD journal, Military Review, authored by an active Army intelligence officer.

โ€œThe idea of Persistent Surveillance as a transformational capability has circulated within the national Intelligence Community (IC) and the Department of Defense (DoD) for at least three years,โ€ the paper said, referencing the Rumsfeld-commissioned transformation study.

The Army paper went on to review a range of high-level official military documents, including one from the Office of the Chairman of the Joint Chiefs of Staff, showing that โ€œPersistent Surveillanceโ€ was a fundamental theme of the information-centric vision for defense policy across the Pentagon.

We now know that just two months before Oโ€™Neillโ€™s address at Harvard in 2001, under the TIA program, President Bush had secretly authorized the NSAโ€™s domestic surveillance of Americans without court-approved warrants, in what appears to have been an illegal modification of the ThinThread data-mining projectโ€Šโ€”โ€Šas later exposed by NSA whistleblowers William Binney and Thomas Drake.

The surveillance-startup nexus

From here on, Highlands Forum partner SAIC played a key role in the NSA roll out from inception. Shortly after 9/11, Brian Sharkey, chief technology officer of SAICโ€™s ELS3 Sector (focusing on IT systems for emergency responders), teamed up with John Poindexter to propose the TIA surveillance program. SAICโ€™s Sharkey had previously been deputy director of the Information Systems Office at DARPA through the 1990s.

Meanwhile, around the same time, SAIC vice president for corporate development, Samuel Visner, became head of the NSAโ€™s signals-intelligence programs. SAIC was then among a consortium receiving a $280 million contract to develop one of the NSAโ€™s secret eavesdropping systems. By 2003, Visner returned to SAIC to become director of strategic planning and business development of the firmโ€™s intelligence group.

That year, the NSA consolidated its TIA programme of warrantless electronic surveillance, to keep โ€œtrack of individualsโ€ and understand โ€œhow they fit into modelsโ€ through risk profiles of American citizens and foreigners. TIA was doing this by integrating databases on finance, travel, medical, educational and other records into a โ€œvirtual, centralized grand database.โ€

This was also the year that the Bush administration drew up its notorious Information Operations Roadmap. Describing the internet as a โ€œvulnerable weapons system,โ€ Rumsfeldโ€™s IO roadmap had advocated that Pentagon strategy โ€œshould be based on the premise that the Department [of Defense] will โ€˜fight the netโ€™ as it would an enemy weapons system.โ€ The US should seek โ€œmaximum controlโ€ of the โ€œfull spectrum of globally emerging communications systems, sensors, and weapons systems,โ€ advocated the document.

The following year, John Poindexter, who had proposed and run the TIA surveillance program via his post at DARPA, was in Singapore participating in the Highlands 2004 Island Forum. Other delegates included then Highlands Forum co-chair and Pentagon CIO Linton Wells; president of notorious Pentagon information warfare contractor, John Rendon; Karl Lowe, director of the Joint Forces Command (JFCOM) Joint Advanced Warfighting Division; Air Vice Marshall Stephen Dalton, capability manager for information superiority at the UK Ministry of Defense; Lt. Gen. Johan Kihl, Swedish army Supreme Commander HQโ€™s chief of staff; among others.

As of 2006, SAIC had been awarded a multi-million dollar NSA contract to develop a big data-mining project called ExecuteLocus, despite the colossal $1 billion failure of its preceding contract, known as โ€˜Trailblazer.โ€™ Core components of TIA were being โ€œquietly continuedโ€ under โ€œnew code names,โ€ according to Foreign Policyโ€™s Shane Harris, but had been concealed โ€œbehind the veil of the classified intelligence budget.โ€ The new surveillance program had by then been fully transitioned from DARPAโ€™s jurisdiction to the NSA.

This was also the year of yet another Singapore Island Forum led by Richard Oโ€™Neill on behalf of the Pentagon, which included senior defense and industry officials from the US, UK, Australia, France, India and Israel. Participants also included senior technologists from Microsoft, IBM, as well as Gilman Louie, partner at technology investment firm Alsop Louie Partners.

Gilman Louie is a former CEO of In-Q-Telโ€Šโ€”โ€Šthe CIA firm investing especially in start-ups developing data mining technology. In-Q-Tel was founded in 1999 by the CIAโ€™s Directorate of Science and Technology, under which the Office of Research and Development (ORD)โ€Šโ€”โ€Šwhich was part of the Google-funding MDSS programโ€Šโ€”โ€Šhad operated. The idea was to essentially replace the functions once performed by the ORD, by mobilizing the private sector to develop information technology solutions for the entire intelligence community.

Louie had led In-Q-Tel from 1999 until January 2006โ€Šโ€”โ€Šincluding when Google bought Keyhole, the In-Q-Tel-funded satellite mapping software. Among his colleagues on In-Q-Telโ€™s board in this period were former DARPA director and Highlands Forum co-chair Anita Jones (who is still there), as well as founding board member William Perry: the man who had appointed Oโ€™Neill to set-up the Highlands Forum in the first place. Joining Perry as a founding In-Q-Tel board member was John Seely Brown, then chief scientist at Xerox Corp and director of its Palo Alto Research Center (PARC) from 1990 to 2002, who is also a long-time senior Highlands Forum member since inception.

In addition to the CIA, In-Q-Tel has also been backed by the FBI, NGA, and Defense Intelligence Agency, among other agencies. More than 60 percent of In-Q-Telโ€™s investments under Louieโ€™s watch were โ€œin companies that specialize in automatically collecting, sifting through and understanding oceans of information,โ€ according to Medill School of Journalismโ€™s News21, which also noted that Louie himself had acknowledged it was not clear โ€œwhether privacy and civil liberties will be protectedโ€ by governmentโ€™s use of these technologies โ€œfor national security.โ€

The transcript of Richard Oโ€™Neillโ€™s late 2001 seminar at Harvard shows that the Pentagon Highlands Forum had first engaged Gilman Louie long before the Island Forum, in fact, shortly after 9/11 to explore โ€œwhatโ€™s going on with In-Q-Tel.โ€ That Forum session focused on how to โ€œtake advantage of the speed of the commercial market that wasnโ€™t present inside the science and technology community of Washingtonโ€ and to understand โ€œthe implications for the DoD in terms of the strategic review, the QDR, Hill action, and the stakeholders.โ€ Participants of the meeting included โ€œsenior military people,โ€ combatant commanders, โ€œseveral of the senior flag officers,โ€ some โ€œdefense industry peopleโ€ and various US representatives including Republican Congressman William Mac Thornberry and Democrat Senator Joseph Lieberman.

Both Thornberry and Lieberman are staunch supporters of NSA surveillance, and have consistently acted to rally support for pro-war, pro-surveillance legislation. Oโ€™Neillโ€™s comments indicate that the Forumโ€™s role is not just to enable corporate contractors to write Pentagon policy, but to rally political support for government policies adopted through the Forumโ€™s informal brand of shadow networking.

Repeatedly, Oโ€™Neill told his Harvard audience that his job as Forum president was to scope case studies from real companies across the private sector, like eBay and Human Genome Sciences, to figure out the basis of US โ€˜Information Superiorityโ€™โ€Šโ€”โ€Šโ€œhow to dominateโ€ the information marketโ€Šโ€”โ€Šand leverage this for โ€œwhat the president and the secretary of defense wanted to do with regard to transformation of the DoD and the strategic review.โ€

By 2007, a year after the Island Forum meeting that included Gilman Louie, Facebook received its second round of $12.7 million worth of funding from Accel Partners. Accel was headed up by James Breyer, former chair of the National Venture Capital Association (NVCA) where Louie also served on the board while still CEO of In-Q-Tel. Both Louie and Breyer had previously served together on the board of BBN Technologiesโ€Šโ€”โ€Šwhich had recruited ex-DARPA chief and In-Q-Tel trustee Anita Jones.

Facebookโ€™s 2008 round of funding was led by Greylock Venture Capital, which invested $27.5 million. The firmโ€™s senior partners include Howard Cox, another former NVCA chair who also sits on the board of In-Q-Tel. Apart from Breyer and Zuckerberg, Facebookโ€™s only other board member is Peter Thiel, co-founder of defense contractor Palantir which provides all sorts of data-mining and visualization technologies to US government, military and intelligence agencies, including the NSA and FBI, and which itself was nurtured to financial viability by Highlands Forum members.

Palantir co-founders Thiel and Alex Karp met with John Poindexter in 2004, according to Wired, the same year Poindexter had attended the Highlands Island Forum in Singapore. They met at the home of Richard Perle, another Andrew Marshall acolyte. Poindexter helped Palantir open doors, and to assemble โ€œa legion of advocates from the most influential strata of government.โ€ Thiel had also met with Gilman Louie of In-Q-Tel, securing the backing of the CIA in this early phase.

And so we come full circle. Data-mining programs like ExecuteLocus and projects linked to it, which were developed throughout this period, apparently laid the groundwork for the new NSA programmes eventually disclosed by Edward Snowden. By 2008, as Facebook received its next funding round from Greylock Venture Capital, documents and whistleblower testimony confirmed that the NSA was effectively resurrecting the TIA project with a focus on Internet data-mining via comprehensive monitoring of e-mail, text messages, and Web browsing.

We also now know thanks to Snowden that the NSAโ€™s XKeyscore โ€˜Digital Network Intelligenceโ€™ exploitation system was designed to allow analysts to search not just Internet databases like emails, online chats and browsing history, but also telephone services, mobile phone audio, financial transactions and global air transport communicationsโ€Šโ€”โ€Šessentially the entire global telecommunications grid. Highlands Forum partner SAIC played a key role, among other contractors, in producing and administering the NSAโ€™s XKeyscore, and was recently implicated in NSA hacking of the privacy network Tor.

The Pentagon Highlands Forum was therefore intimately involved in all this as a convening networkโ€”but also quite directly. Confirming his pivotal role in the expansion of the US-led global surveillance apparatus, then Forum co-chair, Pentagon CIO Linton Wells, told FedTech magazine in 2009 that he had overseen the NSAโ€™s roll out of โ€œan impressive long-term architecture last summer that will provide increasingly sophisticated security until 2015 or so.โ€

The Goldman Sachs connection

When I asked Wells about the Forumโ€™s role in influencing US mass surveillance, he responded only to say he would prefer not to comment and that he no longer leads the group.

As Wells is no longer in government, this is to be expectedโ€Šโ€”โ€Šbut he is still connected to Highlands. As of September 2014, after delivering his influential white paper on Pentagon transformation, he joined the Monterey Institute for International Studies (MIIS) Cyber Security Initiative (CySec) as a distinguished senior fellow.

Sadly, this was not a form of trying to keep busy in retirement. Wellsโ€™ move underscored that the Pentagonโ€™s conception of information warfare is not just about surveillance, but about the exploitation of surveillance to influence both government and public opinion.

The MIIS CySec initiative is now formally partnered with the Pentagon Highlands Forum through a Memorandum of Understanding signed with MIIS provost Dr Amy Sands, who sits on the Secretary of Stateโ€™s International Security Advisory Board. The MIIS CySec website states that the MoU signed with Richard Oโ€™Neill:

โ€œโ€ฆ paves the way for future joint MIIS CySec-Highlands Group sessions that will explore the impact of technology on security, peace and information engagement. For nearly 20 years the Highlands Group has engaged private sector and government leaders, including the Director of National Intelligence, DARPA, Office of the Secretary of Defense, Office of the Secretary of Homeland Security and the Singaporean Minister of Defence, in creative conversations to frame policy and technology research areas.โ€

Who is the financial benefactor of the new Pentagon Highlands-partnered MIIS CySec initiative? According to the MIIS CySec site, the initiative was launched โ€œthrough a generous donation of seed funding from George Lee.โ€ George C. Lee is a senior partner at Goldman Sachs, where he is chief information officer of the investment banking division, and chairman of the Global Technology, Media and Telecom (TMT) Group.

But hereโ€™s the kicker. In 2011, it was Lee who engineered Facebookโ€™s $50 billion valuation, and previously handled deals for other Highlands-connected tech giants like Google, Microsoft and eBay. Leeโ€™s then boss, Stephen Friedman, a former CEO and chairman of Goldman Sachs, and later senior partner on the firmโ€™s executive board, was a also founding board member of In-Q-Tel alongside Highlands Forum overlord William Perry and Forum member John Seely Brown.

In 2001, Bush appointed Stephen Friedman to the Presidentโ€™s Intelligence Advisory Board, and then to chair that board from 2005 to 2009. Friedman previously served alongside Paul Wolfowitz and others on the 1995โ€“6 presidential commission of inquiry into US intelligence capabilities, and in 1996 on the Jeremiah Panel that produced a report to the Director of the National Reconnaisance Office (NRO)โ€Šโ€”โ€Šone of the surveillance agencies plugged into the Highlands Forum. Friedman was on the Jeremiah Panel with Martin Faga, then senior vice president and general manager of MITRE Corpโ€™s Center for Integrated Intelligence Systemsโ€Šโ€”โ€Šwhere Thuraisingham, who managed the CIA-NSA-MDDS program that inspired DARPA counter-terrorist data-mining, was also a lead engineer.

In the footnotes to a chapter for the book, Cyberspace and National Security (Georgetown University Press), SAIC/Leidos executive Jeff Cooper reveals that another Goldman Sachs senior partner Philip J. Venablesโ€Šโ€”โ€Šwho as chief information risk officer leads the firmโ€™s programs on information securityโ€Šโ€”โ€Šdelivered a Highlands Forum presentation in 2008 at what was called an โ€˜Enrichment Session on Deterrence.โ€™ Cooperโ€™s chapter draws on Venablesโ€™ presentation at Highlands โ€œwith permission.โ€ In 2010, Venables participated with his then boss Friedman at an Aspen Institute meeting on the world economy. For the last few years, Venables has also sat on various NSA cybersecurity award review boards.

In sum, the investment firm responsible for creating the billion dollar fortunes of the tech sensations of the 21st century, from Google to Facebook, is intimately linked to the US military intelligence community; with Venables, Lee and Friedman either directly connected to the Pentagon Highlands Forum, or to senior members of the Forum.

Fighting terror with terror

The convergence of these powerful financial and military interests around the Highlands Forum, through George Leeโ€™s sponsorship of the Forumโ€™s new partner, the MIIS Cysec initiative, is revealing in itself.

MIIS Cysecโ€™s director, Dr, Itamara Lochard, has long been embedded in Highlands. She regularly โ€œpresents current research on non-state groups, governance, technology and conflict to the US Office of the Secretary of Defense Highlands Forum,โ€ according to her Tufts University bio. She also, โ€œregularly advises US combatant commandersโ€ and specializes in studying the use of information technology by โ€œviolent and non-violent sub-state groups.โ€

Dr Itamara Lochard is a senior Highlands Forum member and Pentagon information operations expert. She directs the MIIS CyberSec initiative that now supports the Pentagon Highlands Forum with funding from Goldman Sachs partner George Lee, who led the valuations of Facebook and Google.

Dr Lochard maintains a comprehensive database of 1,700 non-state groups including โ€œinsurgents, militias, terrorists, complex criminal organizations, organized gangs, malicious cyber actors and strategic non-violent actors,โ€ to analyze their โ€œorganizational patterns, areas of cooperation, strategies and tactics.โ€ Notice, here, the mention of โ€œstrategic non-violent actorsโ€โ€Šโ€”โ€Šwhich perhaps covers NGOs and other groups or organizations engaged in social political activity or campaigning, judging by the focus of other DoD research programs.

As of 2008, Lochard has been an adjunct professor at the US Joint Special Operations University where she teaches a top secret advanced course in โ€˜Irregular Warfareโ€™ that she designed for senior US special forces officers. She has previously taught courses on โ€˜Internal Warโ€™ for senior โ€œpolitical-military officersโ€ of various Gulf regimes.

Her views thus disclose much about what the Highlands Forum has been advocating all these years. In 2004, Lochard was co-author of a study for the US Air Forceโ€™s Institute for National Security Studies on US strategy toward โ€˜non-state armed groups.โ€™ The study on the one hand argued that non-state armed groups should be urgently recognized as a โ€˜tier one security priority,โ€™ and on the other that the proliferation of armed groups โ€œprovide strategic opportunities that can be exploited to help achieve policy goals. There have and will be instances where the United States may find collaborating with armed group is in its strategic interests.โ€ But โ€œsophisticated toolsโ€ must be developed to differentiate between different groups and understand their dynamics, to determine which groups should be countered, and which could be exploited for US interests. โ€œArmed group profiles can likewise be employed to identify ways in which the United States may assist certain armed groups whose success will be advantageous to US foreign policy objectives.โ€

In 2008, Wikileaks published a leaked restricted US Army Special Operations field manual, which demonstrated that the sort of thinking advocated by the likes of Highlands expert Lochard had been explicitly adopted by US special forces.

Lochardโ€™s work thus demonstrates that the Highlands Forum sat at the intersection of advanced Pentagon strategy on surveillance, covert operations and irregular warfare: mobilizing mass surveillance to develop detailed information on violent and non-violent groups perceived as potentially threatening to US interests, or offering opportunities for exploitation, thus feeding directly into US covert operations.

That, ultimately, is why the CIA, the NSA, the Pentagon, spawned Google. So they could run their secret dirty wars with even greater efficiency than ever before.

READ PART TWO


Dr Nafeez Ahmed is an investigative journalist, bestselling author and international security scholar. A former Guardian writer, he writes the โ€˜System Shiftโ€™ column for VICEโ€™s Motherboard, and is also a columnist for Middle East Eye. He is the winner of a 2015 Project Censored Award for Outstanding Investigative Journalism for his Guardian work.

Nafeez has also written for The Independent, Sydney Morning Herald, The Age, The Scotsman, Foreign Policy, The Atlantic, Quartz, Prospect, New Statesman, Le Monde diplomatique, New Internationalist, Counterpunch, Truthout, among others. He is the author of A Userโ€™s Guide to the Crisis of Civilization: And How to Save It (2010), and the scifi thriller novel ZERO POINT, among other books. His work on the root causes and covert operations linked to international terrorism officially contributed to the 9/11 Commission and the 7/7 Coronerโ€™s Inquest.

This exclusive is being released for free in the public interest, and was enabled by crowdfunding. Iโ€™d like to thank my amazing community of patrons for their support, which gave me the opportunity to work on this in-depth investigation. Please support independent, investigative journalism for the global commons.

Bryann Alexandros and 144 others recommended
Written on Jan 22 by

Nafeez Ahmed

investigative journo, international security scholar | author ZERO POINT scifi thriller http://zro.pt | film CRISIS http://crisisofcivilization.com
 Nsa Jobs, Nsa Director, Nsa Softball, Nsa Meaning, Nsa Careers, Nsa Definition, Nsa Headquarters, Nsa Surveillance, Nsa Spying, Nsa Internships, Nsa Acronym, Nsa Address, Nsa Advisor, Nsa Agent, Nsa Alabama, Nsa Annapolis, Nsa Agent Salary, Nsa Arc, Nsa Approved Shredders, Nsa Agreement, Nsa Building, Nsa Bahrain, Nsa Budget, Nsa Bethesda, Nsa Baseball, Nsa Badge, Nsa Benefits, Nsa Building Nyc, Nsa Budget 2016, Nsa Backdoor, Nsa Careers, Nsa Chief, Nsa Colorado, Nsa Crane, Nsa Cyber Security, Nsa Conference, Nsa Csfc, Nsa Cae, Nsa Crypto Challenge, Nsa Css, Nsa Director, Nsa Definition, Nsa Data Center, Nsa Day Of Cyber, Nsa Director Salary, Nsa Data Collection, Nsa Domestic Surveillance, Nsa Datasheet, Nsa Deputy Director, Nsa Datasheet Is Called, Nsa Employment, Nsa Edward Snowden, Nsa Exploits, Nsa Employees, Nsa Email, Nsa Evaluated Products List, Nsa Echelon, Nsa Emblem, Nsa Encryption, Nsa Eternal Blue, Nsa Fastpitch, Nsa Florida Youth, Nsa Fort Meade, Nsa Flynn, Nsa Florida, Nsa Friend, Nsa Facebook, Nsa Fort Gordon, Nsa Foia, Nsa Facts, Nsa Georgia, Nsa Glassdoor, Nsa Government, Nsa Grindr, Nsa Github, Nsa Gift Shop, Nsa Game, Nsa Grants, Nsa Gif, Nsa Guy, Nsa Headquarters, Nsa Head, Nsa Hacking Tools, Nsa Hawaii, Nsa Hampton Roads, Nsa Hacked, Nsa History, Nsa Hiring Process, Nsa Hacking Tools Leaked, Nsa Headquarters Address, Nsa Internships, Nsa Industries, Nsa Intelligence Analyst, Nsa Indiana, Nsa Influence 2017, Nsa Iad, Nsa Ias 2017, Nsa India, Nsa Illinois, Nsa Insurance, Nsa Jobs, Nsa Juice Plus, Nsa Job Openings, Nsa Jobs Utah, Nsa Jobs Salary, Nsa Jokes, Nsa Job Requirements, Nsa Jurisdiction, Nsa Jobs In Md, Nsa Japan, Nsa Keywords, Nsa Kunia, Nsa Kc, Nsa Key, Nsa Kentucky, Nsa Kmi, Nsa Kankakee, Nsa Korea, Nsa Kaspersky, Nsa Keith Alexander, Nsa Leaker, Nsa Logo, Nsa Leak, Nsa Locations, Nsa Listening, Nsa Leader, Nsa Login, Nsa Leadership, Nsa Language Analyst, Nsa Leaked Tools, Nsa Meaning, Nsa Meme, Nsa Media, Nsa Meet, Nsa Mid South, Nsa Mike Rogers, Nsa Museum, Nsa Mcmaster, Nsa Maryland, Nsa Mission Statement, Nsa News, Nsa Naples, Nsa Name Generator, Nsa North, Nsa Number, Nsa Norfolk, Nsa Nyc, Nsa Nashville, Nsa Nursing, Nsa New Orleans, Nsa Orlando, Nsa Opm Test, Nsa Online Test, Nsa Offices, Nsa Obama, Nsa Organization, Nsa Operational Interview, Nsa Only, Nsa Org Chart, Nsa Of 1947, Nsa Prism, Nsa Police, Nsa Panama City, Nsa Police Officer, Nsa Phone Number, Nsa Philadelphia, Nsa Pay Scale, Nsa Play, Nsa Polygraph, Nsa Purpose, Nsa Quantum Computer, Nsa Quotes, Nsa Qualifications, Nsa Quantum, Nsa Quizlet, Nsa Questions, Nsa Qualifier, Nsa Quantum Computer Farm, Nsa Quartet, Nsa Quiz, Nsa Rogers, Nsa Requirements, Nsa Rules, Nsa Recruiting, Nsa Relationship, Nsa Rule Book, Nsa Ransomware, Nsa Russia, Nsa Responsibilities, Nsa Reno, Nsa Softball, Nsa Surveillance, Nsa Spying, Nsa Slang, Nsa Salary, Nsa Stands For, Nsa Soccer, Nsa Softball Rules, Nsa Scholarship, Nsa Scandal, Nsa Texas, Nsa Tournaments, Nsa Tools, Nsa Trump, Nsa Tao, Nsa Tools Leaked, Nsa Twitter, Nsa Tinder, Nsa Test, Nsa Training, Nsa Utah, Nsa Urban, Nsa Usa, Nsa Utah Facility, Nsa Unmasking, Nsa Utah Jobs, Nsa Unconstitutional, Nsa Umpire, Nsa Under Obama, Nsa Uniform, Nsa Vs Cia, Nsa Visitor Center, Nsa Virginia, Nsa Vs Fbi, Nsa Vs Cia Vs Fbi, Nsa Virus, Nsa Visitor Control Center, Nsa Vpn, Nsa Vanilla, Nsa Violation Of Privacy, Nsa Wiki, Nsa Whistleblower, Nsa Washington, Nsa Wiretapping, Nsa Website, Nsa Water Filter, Nsa Watchlist, Nsa World Series, Nsa Wikileaks, Nsa Wannacry, Nsa Xkeyscore, Nsa Xbox One, Nsa Xeno World Qualifier, Nsa Xkeyscore Download, Nsa Xcode, Nsa Xbox Live, Nsa Xeno Tournament, Nsa Xkeyscore Presentation, Nsa X, Nsa X Files, Nsa Youtube, Nsa Yogurt, Nsa Young Investigator Grant, Nsa Youth Florida, Nsa Yearly Budget, Nsa Yottabyte, Nsa Youth Program, Nsa Youth, Nsa Yellow Dots, Nsa Yakima, Nsa Zero Day, Nsa Zip Code, Nsa Zeus, Nsa Zimmermann Telegram, Nsa Zimbabwe, Nsa Za, Nsa Zero Day Exploit, Nsa Zyxel, Nsa Zero Division, Nsa Zone Store, Google Maps, Google Translate, Google Docs, Google Classroom, Google Drive, Google Flights, Google Earth, Google Slides, Google Scholar, Google Play, Google Analytics, Google Account, Google Alerts, Google Adwords, Google Apps, Google Assistant, Google Adsense, Google Activity, Google App Store, Google Authenticator, Google Books, Google Business, Google Backgrounds, Google Backup, Google Bg, Google Bookmarks, Google Basketball, Google Breakout, Google Business Email, Google Barrel Roll, Google Classroom, Google Calendar, Google Chrome, Google Cps, Google Contacts, Google Careers, Google Chromecast, Google Chrome Store, Google Cloud, Google Class, Google Docs, Google Drive, Google Drawings, Google Directions, Google Diversity Memo, Google Doodle, Google Domains, Google Diversity, Google Dns, Google Dashboard, Google Earth, Google Express, Google Employee Memo, Google Email, Google Earth View, Google Earth Pro, Google Engineer Fired, Google Extensions, Google Excel, Google Easter Eggs, Google Flights, Google Finance, Google Feud, Google Forms, Google Fiber, Google Fonts, Google Fi, Google Fiber Chicago, Google Find My Phone, Google Fit, Google Gravity, Google Games, Google Gmail, Google Groups, Google Glass, Google Goggles, Google Guitar, Google Google, Google Gps, Google Gmail Cps, Google Hangouts, Google Home, Google History, Google Home App, Google Hotels, Google Headquarters, Google Help, Google Home Review, Google Homepage, Google Hire, Google Images, Google Image Finder, Google In 1998, Google Internet, Google India, Google Inbox, Google Images Reverse, Google Incognito, Google India News, Google Internships, Google Jobs, Google Jobs Chicago, Google Japan, Google Jamboard, Google James D’amore, Google Junior, Google Journal, Google Jquery, Google Job Search Tool, Google Jerseys, Google Keep, Google Keyword Planner, Google Keyboard, Google Kids, Google Keep Chrome, Google Korea, Google Keep Extension, Google Knowledge Graph, Google Keep App, Google Keep Desktop, Google Login, Google Logo, Google Location History, Google Lt, Google Letter, Google Lens, Google Link Shortener, Google Classroom, Google Location, Google Local Guides, Google Maps, Google Memo, Google Music, Google Mail, Google My Business, Google Movies, Google Maps Directions, Google Maps App, Google My Maps, Google Maps Api, Google News, Google Now, Google News India, Google Number, Google Notes, Google Nexus, Google Net Worth, Google News Us, Google Maps, Google Nexus 6p, Google Docs, Google Office Chicago, Google Okay Google, Google Opinion Rewards, Google Office, Google Onhub, Google O, Google Orbit, Google Ocean, Google Drive, Google Play, Google Photos, Google Play Music, Google Pixel, Google Plus, Google Pacman, Google Pixel 2, Google Phone, Google Play Movies, Google Phone Number, Google Quick Draw, Google Quiz, Google Questions, Google Qr Code Generator, Google Qibla, Google Quantum Computer, Google Quotes, Google Questionnaire, Google Qr Scanner, Google Quizzes, Google Reverse Image Search, Google Reviews, Google Remote Desktop, Google Recovery, Google Radio, Google Drive, Google Router, Google Ru, Google Reader, Google Rewards, Google Slides, Google Scholar, Google Sheets, Google Sign In, Google Store, Google Stock, Google Sites, Google Street View, Google Space, Google Shopping, Google Translate, Google Trends, Google Travel, Google Themes, Google Timer, Google Take Me Home, Google Talk, Google Takeout, Google Transit, Google Traffic, Google Url Shortener, Google Underwater, Google Usa, Google Uk, Google Update, Google Url Builder, Google Unblocked Games, Google Music, Google Ultron, Google University, Google Voice, Google Video, Google Vertejas, Google Voice Login, Google Voice App, Google Vr, Google View, Google Video Chat, Google Vault, Google Voicemail, Google Wallet, Google Weather, Google Wifi, Google Web Store, Google World, Google Webmaster Tools, Google Where Am I, Google Word, Google Watch, Google Wifi Review, Google X, Google Classroom, Google Xl, Google Xfinity, Google X Jobs, Google Xom, Google Chrome, Google Calendar, Google Drive, Google X Prize, Google Youtube, Google Translate, Google You Suck, Google Yahoo, Google Youtube Red, Google You’re Stupid, Google You’re Dumb, Google Yourself, Google You’re The Best, Google Your Connection Is Not Private, Google Zerg Rush, Google Zero Gravity, Google Zipper, Google Zoom, Google Zeitgeist, Google Zillow, Google Zip Code, Google Zero, Google Zone, Google Z,

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, THE NATIONAL SECURITY AGENCY (NSA) February 11, 2015July 11, 2021 56 Minutes

Unveiled – NSA Bad Abling Station Eyeball

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

[Image]

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, SECRET, THE NATIONAL SECURITY AGENCY (NSA) July 2, 2014July 15, 2021 1 Minute

STASI wusste und weiss รผber NSA-Ausspรคhung Bescheid

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Die STASI wusste scheinbar Bescheid, dass die NSA die deutsche Telekommunikation ausspรคht. Diese Ansicht vertrat Klaus Eichner bei einer Podiumsdiskussion mit dem ehemaligen NSA-Technikchef William Binney. Eichner war in Zeiten der DDR Chefanalytiker beim Ministerium fรผr Staatssicherheit (MfS). Eine โ€œQuelleโ€œ รผbergab ihm damals im Jahr 1985/1986 eine sogenannte NSAR-Liste, bei dem das Treiben der NSA dokumentiert wurde.

Der ehemalige Stasi-Abteilungsleiter erzรคhlte, dass es โ€œNSA Requirementsโ€œ gab, in denen geschrieben war, welche Personen und Institute fรผr die US-Behรถrde interessant sind. Die Liste umfasste insgesamt 4000 Seiten und 30.000 โ€œEinzelpostenโ€œ. Eichners promotet sein  Buch, welches den Namen “Imperium ohne Rรคtsel. Was bereits die DDR-Aufklรคrung รผber die NSA wussteโ€œ trรคgt.

Kritik gab es von Eichner fรผr die Politik, diese wรผrde den Fall falsch behandeln. Das von der deutschen Bundesregierung vorgeschlagene โ€œNo-Spy-Abkommenโ€œ sei ihm nach ein โ€œschlechter Witzโ€œ. Die รœberraschung der Regierung รผber die Snowden-Enthรผllungen rund um die NSA sei auรŸerdem nur โ€œgespieltโ€œ.

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, SPIES, STASI, THE NATIONAL SECURITY AGENCY (NSA) May 17, 2014July 16, 2021 1 Minute

TOP-SECRET – Cryptome unveils the NSA Manageable Network Plan

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Click to access nsa-network-plan.pdf

Go back

Your message has been sent

Warning
Warning
Warning
Warning

Warning.

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, CRYPTOME, THE NATIONAL SECURITY AGENCY (NSA), TOP SECRET May 12, 2014July 16, 2021 1 Minute

NSA-TOP-SECRET – THE RWANDAN CRISIS SEEN THROUGH THE EYES OF FRANCE

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

 

 

 

 

 

Unwilling to bear the political and economic burden of shoring up a key African ally all by herself, France sought to internationalize a growing political and military crisis in Rwanda by pushing responsibility onto the United Nations in the period leading up to the 1994 genocide in Rwanda. At the same time, French president Francois Mitterrand remained deeply suspicious of Tutsi-led rebels who invaded Rwanda from Uganda, with what an aide described as “the benevolent complicity of the Anglo-Saxon world.” (Document 15)

The contradictions in Mitterrand’s policy toward Rwanda are captured in French government documents, translated into English by the National Security Archive at George Washington University and the United States Holocaust Memorial Museum. The documents trace the alarm felt in Paris over military advances by Tutsi-led rebels and frustration with the Hutu-dominated government of President Juvรฉnal Habyarimana.

Today’s postings form part of a detailed documentation of the international response to the genocide that killed between 500,000 and a million Rwandans, predominantly Tutsi, between April and July 1994. Future briefing books will examine events before and after the onset of the genocide, including the Arusha peace negotiations, a growing refugee crisis, and the fateful decision to withdraw the bulk of the United Nations peacekeeping force.


French President Francois Mitterand, photo courtesy of Wikimedia

The documents posted today in English and French are extracted from hundreds of documents released by a French parliamentary commission in 1998 and the so-called “Mitterrand archive,” which was leaked to French researchers from 2005 onwards. While the provenance of the Mitterrand archive remains unclear, the authenticity of the documents has been confirmed by former Mitterrand aides, French researchers, and lawyers involved in a series of cases related to the genocide.

While the documents contained in the Mitterrand archive provide a valuable insight into official French thinking, the unauthorized nature of their release also raises problems for independent researchers. It is impossible to know, for example, how many documents are missing from the archive, and the reasons for their non-disclosure. The motivations of the leaker, or leakers, also remain unclear.

French researchers have noted several glaring gaps in the collection, parts of which have been made available to journalists and other researchers at the Francois Mitterrand Institute in Paris. The documents focus on political developments and offer relatively scant details about the military cooperation between France and Rwanda between 1990 and 1994. Also missing are details of the French decision to accord protection and political asylum to leading members of the Rwandan regime following the assassination of President Habyarimana on April 6, 1994. It is important that the public be given access to these records in order to complete the picture of French decision-making about the Rwandan genocide.

The documents portray France as a reluctant, and somewhat ambiguous, supporter of the Habyarimana regime in Rwanda between 1990 and 1994. On the one hand, Mitterrand viewed Rwanda as an integral part of French-speaking Africa, known as Francophonie, on the edge of what French officials called an “Anglophone front.” (Document 8) On the other hand, he did not want to squander too much French blood and treasure on a former Belgian โ€” not French โ€” colony.

The French role in supporting the Habyarimana government has been the subject of great controversy, with some critics claiming that France was complicit in the actions of future genocidaires. With Belgium assuming a more neutral position, Habyarimana viewed France as his primary international ally, and a military bulwark against the Tutsi-led Rwandan Patriotic Front.

After the fall of the Berlin wall in 1989, Mitterrand called for the creation of multi-party democracies in Africa, and linked French economic assistance to progress toward democratization, as reflected in his address to the Franco-African summit at Le Baule in June 1990. The documents show that he urged Habyarimana to negotiate a compromise deal with political opponents inside the country (largely Hutus, based in the south of the country), as well as the armed opposition outside the country (the Rwandan Patriotic Front).

After dispatching thousands of troops and military advisors to Rwanda between 1990 and 1993, France saw the Arusha peace progress, and the arrival of United Nations peacekeepers, as a way to extricate herself from an increasingly complicated political and military situation.

A recurring theme in the documents is the conviction, shared by Mitterrand and his advisers, that the Rwandan Patriotic Front wanted to use its superior military position to restore a Tutsi-dominated regime in Rwanda. French military advisers reported that the rebel movement had acquired surface-to-air missiles from Uganda. When President Habyarimana’s plane was shot down by a SAM missile on April 6, 1994, triggering the genocide, French officials immediately suspected the RPF. Other observers, among them Alison Desforges, note that there has never been a full and official investigation into who is responsible for shooting down President Habyarimana’s plane, leaving many possibilities including the RPF, Hutu moderates, the president’s own party, or possibly the presidential guard.[1]


Rwandan President Juvรฉnal Habyarimana, photo courtesy of Wikimedia

In addition to the documents included in the chronological narrative below, we are also publishing an annex of other French government documents translated into English by the National Security Archive and the U.S. Holocaust Memorial Museum. A subsequent posting will focus on French policy toward Rwanda between April and July 1994.

Arnaud Siad is a researcher based in Paris for the United States Holocaust Memorial Museum and a PhD student at the Institute of Political Science (Sciences Po) in Paris. Christina Graubert is a student at Oxford University, and a former intern for the National Security Archive.

 


The Documents

Document 1: French version, English version
DATE: March 12, 1990
FROM: [French Ambassador to Rwanda] Georges Martres
TO: French Foreign Ministry
SOURCE: Mitterrand Archive
SUBJECT: “Official Visit of President Habyarimana to Paris (April 2nd, 3rd, and 4th 1990)”

 

Document 2: French version, English version
DATE: March 14, 1990
FROM: [French Ambassador to Rwanda] Georges Martres
TO: French Foreign Ministry
SOURCE: Mitterrand Archive
SUBJECT: “Requests for Military Order Likely to be Presented to the President of the French Republic by the Rwandan President at their Meeting on April 3, 1990 (First Part of Two)

Preparing for an official visit to France in April 1990, Rwandan President Juvenal Habyarimana outlined his political and security concerns to the French ambassador in Kigali, Georges Martres. He also requested military support for his government, to counter a threatened invasion by the Tutsi-led Rwandan Patriotic Front, based in Uganda. In these confidential diplomatic dispatches, Martres explains that Habyarimana was becoming increasingly unpopular at home, forcing him to rely on the Rwandan army and police. Habyarimana requests a new plane and radar equipment to counter the air threat from Uganda and the RPF. According to Martres, the president has made similar requests to Belgium over the course of many years, but they have been ignored.

 

Document 3: French version, English version
DATE: June 20, 1990
FROM: President Francois Mitterrand
TO: Franco-African Summit
SOURCE: Council for the Liberation and Change in Congo (Website)
SUBJECT: Address to Franco-African Summit, La Baule, France

President Mitterrand’s speech to the Franco-African summit of June 1990 in the western French town of La Baule represented a defining moment in French African policy. In the aftermath of the Cold War, and the fall of the Berlin wall, Mitterrand cited democracy as a “universal principle” and urged African leaders to introduce multi-party systems and guarantee freedom of the press. He also stated that French development aid to African countries would be linked to progress toward democracy.

 

Document 4: French version, English version
DATE: October 7, 1990
FROM: [French Ambassador to Rwanda] Georges Martres
TO: French Foreign Ministry
SOURCE: French Parliamentary Commission
SUBJECT: “Situation in Rwanda”

 

Document 5: French version, English version
DATE: October 8, 1990
FROM: [Chief of French Defense Staff] Admiral Jacques Lanxade
TO: President Francois Mitterrand
SOURCE: Mitterrand Archive
SUBJECT: “Situation in Rwanda”

On October 1, 1990, Tutsi-led rebels from the Rwandan Patriotic Front invaded Rwanda from Uganda. These two documents reflect the French government’s view of the resulting conflict. In a diplomatic cable from Kigali dated October 7, Ambassador Martres urges French military support for President Habyarimana to prevent “domination of the Hutus by the Tutsi minority.” The following day, October 8, the chief of the French Defence Staff, Admiral Jacques Lanxade, drew the line at direct French involvement in the fighting. He recommended turning down Habyarimana’s request for aerial support and engagement of French ground units, but approved the supply of ammunition and rockets to Rwandan government forces.

 

Document 6: French version, English version
DATE: October 15, 1990
FROM: [French Ambassador to Rwanda] Georges Martres
TO: French Foreign Ministry
SOURCE: French Parliamentary Commission
SUBJECT: “Analysis of the Situation by the Tutsi Population”

 

Document 7: French version, English version
DATE: October 24, 1990
FROM: [French Ambassador to Rwanda] George Martres & [French Military Attachรฉ] Colonel Renรฉ Galiniรฉ.
TO: French Foreign Ministry
SOURCE: French Parliamentary Commission
SUBJECT: “Assessment of the Political Situation”

On October 24, France responded to the RPF attack by rushing 314 French troops to Rwanda under Operation Noroit, ostensibly to protect French citizens. In these dispatches, French officials discuss the threat of the “total elimination” of the Tutsi minority in Rwanda, in response to the RPF invasion. The French military attachรฉ in Rwanda predicts the “likely physical elimination” of Tutsis living inside Rwanda โ€” between 500,000 and 700,000 people โ€” by the seven million strong Hutu majority in the event of a successful Tutsi-led invasion from Uganda.

 

Document 8: French version, English version
DATE: January 23, 1991
FROM: French Council of Ministers minutes
TO: n/a
SOURCE: Mitterrand Archive
SUBJECT: “Discussion on Foreign Affairs”

French military action in Rwanda is ostensibly aimed at protecting European citizens trapped in the northern town of Ruhengeri, which is being besieged by the Tutsi-led Rwandan Patriotic Front. At a cabinet meeting, President Mitterrand depicts the fighting as a conflict between Francophone Rwanda and Anglophone Uganda. He says that Ugandan President Museveni should be told that “it is not normal that the Tutsi minority wants to impose its will on the [Hutu] majority” in Rwanda.

 

Document 9: French version, English version
DATE: April 22, 1991
FROM: [Presidential Advisor] Gilles Vidal
TO: President Francois Mitterrand
SOURCE: Mitterrand Archive
SUBJECT: “Interview with Mr. Juvรฉnal Habyarimana, President of the Republic of Rwanda”

President Habyarimana paid an official visit to France in April 1991. In return for French military and diplomatic support, Mitterrand urges the Rwandan leader to push ahead with democratization efforts, respect human rights, and negotiate a political settlement with the Tutsi-led rebels. He also calls for the peaceful return of an estimated half a million Tutsi refugees, forced out of Rwanda following the Hutu-led “revolution” of 1959 and independence from Belgium in 1962.

 

Document 10: French version, English version
DATE: May 23, 1991
FROM: [Military advisor to Mitterrand] General Christian Quesnot
TO: President Francois Mitterrand
SOURCE: Mitterrand Archive
SUBJECT: “Rwanda – Presence of surface-to-air missiles”

President Mitterrand’s military advisor, General Quesnot, reports that an offensive by “Ugandan-Tutsi” rebels in northeast Rwanda has been “neutralized” by the Rwandan army. He reports that a SAM-16 missile, with a range of 5 kilometers (3 miles), has been captured by Rwandan troops, marking a “new and dangerous step in foreign assistance to the rebels.”

 

Document 11: French version, English version
DATE: July 1, 1992
FROM: [Military advisor to Mitterrand] General Christian Quesnot
TO: President Francois Mitterrand
SOURCE: Mitterrand Archive
SUBJECT: “Rwanda. Military situation.”

General Quesnot reports to Mitterrand that the RPF has stepped up its offensive into northern Rwanda “with the important support of the Ugandan army,” prior to the start of peace negotiations in Arusha, Tanzania, scheduled for July 10, 1992. He recommends that French military advisors be allowed to train Rwandan soldiers in the use of military equipment “subject to the most extreme discretion,” but should not take part in combat operations.

 

Document 12: French version, English version
DATE: January 19, 1993
FROM: [French Ambassador to Rwanda] Georges Martres
TO: French Foreign Ministry
SOURCE: Mitterrand Archive
SUBJECT: “Mission from International Federation for Human Rights”

 

Document 13: French version, English version
DATE: February 1, 1993
FROM: [Human rights activist] Jean Carbonare
TO: [Advisor on African Affairs to President Mitterrand] Bruno Delaye
SOURCE: Mitterrand Archive
SUBJECT: “Human Rights Violations in Rwanda”

In January 1993, an international human rights commission arrived in Kigali to investigate allegations of Rwandan government connivance in massacres of minority Tutsis. Ambassador Martres feared that the commission report would embarrass President Habyarimana and the French government, and predicted a backlash by Hutu hardliners, based in northern Rwanda. An imprisoned Rwandan journalist, Janvier Afrika, told the commission that the violence was being fueled by “death squads” linked to Hutu extremists close to Habyarimana.

 

Document 14: French version, English version
DATE: February 8, 1993
FROM: [Military advisor to Mitterrand] General Christian Quesnot and [Advisor on African Affairs to Mitterrand] Bruno Delaye
TO: President Francois Mitterrand
SOURCE: Mitterrand Archive
SUBJECT: “Rwanda – RPF Military Offensive”

On February 8, 1993, following reports of massacres of minority Tutsis, the Rwandan Patriotic Front launched a major offensive in northern Rwanda, capturing the town of Ruhengeri. The French government immediately called a “crisis meeting,” and authorized expanded support for the Rwandan army, “with the exception of direct participation of French forces” in the fighting.

 

Document 15: French version, English version
DATE: February 15, 1993
FROM: [Advisor on African Affairs to Mitterrand] Bruno Delaye
TO: President Francois Mitterrand
SOURCE: Mitterrand Archive
SUBJECT: “Rwanda: Mission to Kigali and Kampala”

Reporting on a trip to Rwanda and Uganda, presidential advisor Bruno Delaye describes the “disastrous” political situation in Rwanda following the RPF attack on Ruhengeri. He warns that the rebels are in a position to “capture Kigali.” Delaye attempts to negotiate a deal between “the Hutus of the North,” gathered around President Habyarimana, who are opposed to any political concessions to the RPF, and “the Hutus of the South,” who favor negotiations with the RPF and the overthrow of Habyarimana. The French-brokered deal includes a joint denunciation of the RPF, renewed commitment to democratization, and a resumption of the Arusha peace negotiations.

 

Document 16: French version, English version
DATE: February 26, 1993
FROM: [Defense Minister] Pierre Joxe
TO: President Francois Mitterrand
SOURCE: Mitterrand Archive
SUBJECT: “Rwanda”

In a memorandum to French President Mitterrand, Defense Minister Pierre Joxe expresses concern at the failure of the Rwandan army to resist a Tutsi-led invasion of the country, despite the presence of 690 French military advisors under Operation Noroit. He suggests that Habyarimana is “largely responsible” for the “present fiasco” through his “political intransigence.” He recommends pressuring Habyarimana to soften his position by threatening to withdraw French troops and negotiate a political solution to the crisis.

 

Document 17: French version, English version
DATE: March 3, 1993
FROM: Notes taken by Hubert Vรฉdrine taken during Council of Ministers
TO: n/a
SOURCE: Mitterrand Archive
SUBJECT: “Situation in Rwanda”

Anxious to reduce France’s military exposure in Rwanda, President Mitterrand sought to internationalize the conflict “by handing it over to the United Nations.” He viewed United Nations involvement in Rwanda as the best exit strategy for France, while avoiding an outright RPF victory.

 

Document 18: French version, English version
DATE: April 2, 1993
FROM: Council of Ministers minutes
TO: n/a
SOURCE: Mitterrand Archive
SUBJECT: “Situation in Rwanda”

A right-wing victory in French parliamentary elections in March 1993 posed a further complication for French foreign policy, obliging President Mitterrand to share power with a conservative prime minister, ร‰douard Balladur. During the first cabinet meeting of the “cohabitation” regime, Mitterrand and Balladur agree on the need to reinforce the French presence in Rwanda with 1,000 additional troops.

 

Document 19: French version, English version
DATE: February 28, 1994
FROM: [Co-Pilot of Habyarimana’s Presidential Plane] Jean-Pierre Minaberry
TO: Private Letter to a Friend
SOURCE: French Parliamentary Commission
SUBJECT: “Missiles Threatening the Security of the Falcon’s Flights”

In a private letter to a friend, the French pilot of Habyarimana’s plane expresses concern about the possibility of an attack on the Falcon 50 jet. Colonel Minaberry suspects that Rwandan Patriotic Front troops, who have recently taken over the parliament building in Kigali (CND), have the technical capability to shoot down a plane landing at Kigali airport with Soviet SA-7 or SA-16 surface-to-air missiles. He discusses alternative landing approaches to neutralize the threat.

 

Document 20: French version, English version
DATE: April 7, 1994
FROM: [Advisor on African Affairs to Mitterrand] Bruno Delaye
TO: President Francois Mitterrand
SOURCE: French Parliamentary Commission
SUBJECT: “Attack against the Presidents of Rwanda and Burundi”

The first report to Mitterrand on the downing of Habyarimana’s plane “attributes” responsibility to the Tutsi-led Rwandan Patriotic Front, but does not provide any concrete evidence. Presidential advisor Bruno Delaye reports that the Presidential Guard has begun to hunt down political opponents of the president, both Hutus and Tutsis, and a military confrontation “appears inevitable.” Delaye says the French embassy is ready to provide shelter to Habyarimana’s family, in accordance with Mitterrand’s instructions.

 

Annex of additional French documents

Document 21: French version, English version
DATE: March 30, 1990
FROM: [Presidential advisor] Claude Arnaud
TO: President Francois Mitterrand
SOURCE: Mitterrand Archive
SUBJECT: “President of Rwanda’s Visit (Monday April 2)”

 

Document 22: French version, English version
DATE: October 19, 1990
FROM: [Presidential advisor] Jean Christophe Mitterrand
TO: President Francois Mitterrand
SOURCE: Mitterrand Archive
SUBJECT: “Rwanda”

 

Document 23: French version, English version
DATE: October 13, 1990
FROM: [French Military Attachรฉ] Colonel Renรฉ Galiniรฉ & [French Ambassador to Rwanda] Georges Martres
TO: French Embassies in Bangui, Kinshasa & Bujumbura
SOURCE: French Parliamentary Commission
SUBJECT: “General Situation on October 13, 1990, Local Time 12 pm”

 

Document 24: French version, English version
DATE: November 14, 1990
FROM: Council of Ministers Notes
TO: n/a
SOURCE: Mitterand Archive
SUBJECT: International Situation

 

Document 25: French version, English version
DATE: December 14, 1990
FROM: [French Ambassador to Rwanda] Georges Martres
TO: French Foreign Ministry
SOURCE: French Parliamentary Commission
SUBJECT: “President Habyarimana’s Meeting with General Varret”

 

Document 26: French version, English version
DATE: December 19, 1990
FROM: [French Ambassador to Rwanda] Georges Martres
TO: French Foreign Ministry
SOURCE: French Parliamentary Commission
SUBJECT: “Joint Report of the Resident Ambassadors of the E.E.C in Rwanda”

 

Document 27: French version, English version
DATE: January 2, 1991
FROM: [Chief of French Defense Staff] Admiral Jacques Lanxade
TO: President Francois Mitterrand
SOURCE: Mitterrand Archive
SUBJECT: “Rwanda – Situation Update”

 

Document 28: French version, English version
DATE: January 30, 1991
FROM: President Francois Mitterrand
TO: President Juvรฉnal Habyarimana
SOURCE: Mitterrand Archive
SUBJECT: [Situation in Rwanda]

 

Document 29: French version, English version
DATE: April 22, 1991
FROM: [Chief of French Defense Staff] Admiral Jacques Lanxade
TO: President Francois Mitterrand
SOURCE: Mitterrand Archive
SUBJECT: “Rwanda. Situation Update.”

 

Document 30: French version, English version
DATE: August 10, 1991
FROM: [French Defense Attachรฉ in Kigali] Colonel Bernard Cussac
TO: French Foreign Ministry
SOURCE: French Parliamentary Commission
SUBJECT: “Circumstances of Detainees at Kigali Prison, Accused of Having Taken Up Arms against Rwanda (Inkotayni)”

 

Document 31: French version, English version
DATE: November 20, 1991
FROM: [Military advisor to Mitterrand] General [Jean-Pierre] Huchon
TO: [Presidential advisor] Thierry de Beaucรฉ
SOURCE: Mitterrand Archive
SUBJECT: “Rwanda. Meeting of the Presidents”

 

Document 32: French version, English version
DATE: January 15, 1993
FROM: President Francois Mitterrand
TO: President of the United States, George Bush
SOURCE: Mitterrand Archive
SUBJECT: [Funding Humanitarian Aid in Rwanda]

 

Document 33: French version, English version
DATE: February 13, 1993
FROM: [Military advisor to Mitterrand] General Christian Quesnot
TO: President Francois Mitterrand
SOURCE: Mitterrand Archive
SUBJECT: “Rwanda”

 

Document 34: French version, English version
DATE: February 19, 1993
FROM: [Presidential advisor] Dominique Pin & [Military advisor to Mitterrand] General Christian Quesnot
TO: President Francois Mitterrand
SOURCE: Mitterrand Archive
SUBJECT: “Rwanda”

 

Document 35: French version, English version
DATE: February 26, 1993
FROM: [Presidential advisor] Dominique Pin
TO: President Francois Mitterrand
SOURCE: Mitterrand Archive
SUBJECT: “Mission of Mr. Debarge to Rwanda and Uganda – Talking Points”

 

Document 36: French version, English version
DATE: March 3, 1993
FROM: Council of Ministers Minutes
TO: n/a
SOURCE: Mitterrand Archive
TOPIC: Situation in Rwanda

 

Document 37: French version, English version
DATE: March 3, 1993
FROM: [Military advisor to Mitterrand] General Christian Quesnot
TO: President Francois Mitterrand
SOURCE: Mitterand Archive
SUBJECT: Rwanda

 

Document 38: French version, English version
DATE: June 22, 1993
FROM: French Delegation to the UN
TO: French Foreign Ministry
SOURCE: French Parliamentary Commission
SUBJECT: “Rwanda Resolution 846”

 

Document 39: French version, English version
DATE: August 4, 1993
FROM: Restricted Council Meeting
TO: n/a
SOURCE: Mitterrand Archive
SUBJECT: “Situation in Rwanda and Congo”

 

Document 40: French version, English version
DATE: August 28, 1993
FROM: [President of the Rwandan Patriotic Front] Colonel Kanyarengwe
TO: President Francois Mitterrand
SOURCE: Mitterrand Archive
TOPIC: [Letter of Thanks to the French Government for Role in Arusha]

 

Document 41: French version, English version
DATE: September 27, 1993
FROM: President Francois Mitterand
TO: President of the United States, Bill Clinton
SOURCE: Mitterand Archive
SUBJECT: [Letter to President Clinton to Ask for Support in Plea for UN Mission in Rwanda]

 

Document 42: French version, English version
DATE: October 11, 1993
FROM: [Military advisor to Mitterrand] General Christian Quesnot
TO: President Francois Mitterrand
SOURCE: Mitterrand Archive
TOPIC: “Interview with President Habyarimana of Rwanda – Monday, October 11, 1993 at 6:30PM Defense Issues”

 

Document 43: French version, English version
DATE: October 23, 1993
FROM: [Presidential advisors] Dominique Pin & Rear Admiral de Lussy
TO: President Francois Mitterrand
SOURCE: Mitterrand Archive
SUBJECT: “Situation in Burundi”

 

Document 44: French version, English version
DATE: November 15, 1993
FROM: [Military advisor to Mitterrand] General Christian Quesnot
TO: President Francois Mitterrand
SOURCE: Mitterrand Archive
SUBJECT: “Your Meeting with [Defense Minister] Lรฉotard on November 15 at 17:00”

 

Document 45: French version, English version
DATE: February 11, 1994
FROM: [Military advisor to Mitterrand] General Christian Quesnot
TO: President Francois Mitterrand
SOURCE: Mitterrand Archive
SUBJECT: “Note to the Attention of the President of the Republic”

 


NOTES

[1] Des Forges, Alison, et. al, Leave None to Tell the Story: Genocide in Rwanda,New York: Human Rights Watch, 1999, pgs 181 โ€“ 183.

 

 

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, TOP SECRET, WAR March 28, 2014July 18, 2021 14 Minutes

The NSA – Snowden Docs Reveal NSA Spied on American Law Firm and Targeted WikiLeaks, DHS Scraps Plan to Build National License Plate Tracking System

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Snowden leaks reveal NSA monitored US law firms representing foreign governments and targeted WikiLeaks and its supporters. (Photo: Patrick Semansky/AP/File)

Snowden leaks reveal NSA monitored US law firms representing foreign governments and targeted WikiLeaks and its supporters. (Photo: Patrick Semansky/AP/File)

A Top Secret document leaked by former National Security Agency (NSA) contractor, Edward Snowden, reveals that the agency spied on an American law firm representing Indonesia in a trade dispute against the US. The document raises both concerns for US lawyers with clients overseas and accusations of economic espionage. While the NSA is prohibited from targeting American organizations, including law firms, attorney-client conversations โ€œdo not get special protections under American law from N.S.A. eavesdropping,โ€ and the agency โ€œcan intercept the communications of Americans if they are in contact with a foreign intelligence target abroad, such as Indonesian officials.โ€

Other Top Secret documents provided by Edward Snowden and posted on The Intercept (the new website edited by Glenn Greenwald, Laura Poitras, and Jeremy Scahill) disclose the agencyโ€™s strategic targeting of WikiLeaks, its supporters, and other activist groups โ€“including Pirate Bay and Anonymous. The documents confirm that the NSAโ€™s British counterpart, GCHQ, electronically monitored WikiLeaks website visitors; that the Obama administration urged foreign governments to file criminal charges against WikiLeaks and its founder, Julian Assange, over publication of Afghanistan war logs; that the Obama administration discussed labeling WikiLeaks โ€œa malicious foreign actorโ€ to ease extensive electronic surveillance of its activities; and that a 2008 US Army report identified ways to destroy the organization.

DNI Clapper says government should have been more forthcoming about NSA surveillance programs.

DNI Clapper says government should have been more forthcoming about NSA surveillance programs.

In a recent interview with The Daily Beast, Director of National Intelligence, James Clapper, said the NSA should have informed Congress and the public about its surveillance programs far sooner. Clapper argued that the shock value of Snowdenโ€™s revelations are the main reason the public and privacy advocates are opposed to the programs, and that had the agency been more forthright, the programs would be more widely accepted. Regardless, in light of Snowdenโ€™s disclosures and President Obamaโ€™s avowed โ€œefforts to overhaul the intelligence community,โ€ outgoing NSA director Gen. Keith Alexander will be sending President Obama proposals for storing the data collected by the bulk phone records collection program outside the NSA sometime this week. In his NSA reform speech, Obama suggested that private phone companies might store the data, though the private companies themselves remain adamantly opposed to such a move.

The British High Court upheld London policeโ€™s August 18, 2013, detention of David Miranda, Glenn Greenwaldโ€™s partner, at Londonโ€™s Heathrow Airport. The police detained Miranda for nearly nine hours after invoking terrorism legislation, and seized devices that contained documents leaked by Edward Snowden, including nearly 60,000 โ€œhighly classified UK intelligence documents.โ€ Mirandaโ€™s lawyers argued โ€œthat the governmentโ€™s use of terrorism legislation to detain the Brazilian citizen was improper, disproportionate, and ran counter to the principle of free expression,โ€ citing further concerns that the detention would intimidate other journalists. However, the Court ruled Mirandaโ€™s detention โ€œwas a proportionate measure in the circumstances.โ€ The majority of the information Miranda carried was encrypted, and, as of August 30, 2013, Scotland Yardโ€™s Counter Terrorism Command, SO15, had only reconstructed 75 of the 60,000 documents.

White House seeking potential new drone bases near Pakistan's NW border. Photo: Ethan Miller/Getty Images

White House seeking potential new drone bases near Pakistanโ€™s NW border. Photo: Ethan Miller/Getty Images

The White House is seeking potential new bases in Central Asia for the CIAโ€™s lethal drone program in Northwest Pakistan in the event US forces are forced to withdraw from Afghanistan by the end of this year. However, officials are concerned that their ability to target operatives in Pakistan will be greatly reduced if they are forced to relocate from their Afghan bases, in large part because the amount of human intelligence required to support the strikes necessitates being close to Pakistanโ€™s Northwest border. However, a recent Intercept report examines the NSAโ€™s role in the CIAโ€™s drone program, and argues that the NSA uses โ€œelectronic surveillance, rather than human intelligence, as the primary method to locate targets,โ€ and the CIA, โ€œ[r]ather than confirming a targetโ€™s identity with operatives or informants on the ground, the CIA or the U.S. military then orders a strike based on the activity and location of the mobile phone a person is believed to be using.โ€

The Department of Homeland Security (DHS) scrapped its plan to build a national license plate tracking system to catch fugitive illegal immigrants yesterday โ€œafter privacy advocates raised concern about the initiative.โ€ Earlier this week, a DHS spokeswoman announced that the database โ€œcould only be accessed in conjunction with ongoing criminal investigations or to locate wanted individuals,โ€ and stressed that it โ€œwould be run by a commercial enterprise, and the data would be collected and stored by the commercial enterprise, not the government.โ€ However, outcry arose after the Washington Post reported the program could โ€œcontain more than 1 billion records and could be shared with other law enforcement agencies, raising concerns that the movements of ordinary citizens who are under no criminal suspicion could be scrutinized.โ€ Even though the national tracking system has been nixed, a 2012 Police Executive Research Forum report found that 71% of all US police departments already use automatic license plate tracking.

Finally this week, the Congressional Research Service (CRS) recently released a report examining FOIA statistics, backlogs, and potential policy options to improve the FOIA. The report cautions against taking all agency reporting at face value, pointing out, โ€œa reduction in backlog does not necessarily mean an agency is more efficiently administering FOIA. For example, an agency could eliminate a backlog by denying complex requests that could otherwise be released in part.โ€ The report also cites the Archiveโ€™s latest FOIA audit on outdated agency FOIA regulations, and suggests that Congress โ€œmay wish to consider whether it should direct agencies to examine their FOIA regulations, to determine whether they reflect statutory amendments, and to update any regulations that do not reflect FOIA, as amended.โ€ The report further notes that Congress could monitor the expansion of (b)(3) exemptions to โ€œprevent the creation of exemptions written more broadly than intended,โ€ and preventing โ€œcertain agencies from operating without the public being able to access data and records.โ€

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, CONFIDENTIAL, THE NATIONAL SECURITY, WIKILEAKS March 14, 2014July 18, 2021 4 Minutes

SECRET – NSA-Cybercom Director Senate Testimony 14-0227

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Click to access nsa-cybercom-14-0227.pdf

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, SECRET, THE NATIONAL SECURITY AGENCY (NSA) March 11, 2014July 18, 2021 1 Minute

Unveiled – NSA FISA Business Spying – TOP-SECRET

nsa-fisa-business

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, CRYPTOME, THE NATIONAL SECURITY AGENCY (NSA), TOP SECRET February 26, 2014December 12, 2017 1 Minute

The NSA Archive – Declassified Documents Shed Light on 1980 Moscow Olympics Boycott

Declassified Documents Shed Light on 1980 Moscow Olympicsย Boycott

February 14, 2014
tags: 1980 Olympics, Boycott Games, Cold War, US Olympic Committee, USSR, William Simon
by Lauren Harper

Picture of the opening ceremony in Moscow.

Picture of the opening ceremony in Moscow.

On January 20, 1980, President Carter announced that โ€œ[u]nless the Soviets withdraw their troops within a month from Afghanistan,โ€ that the US would boycott the Olympic games that year in Moscow. The media, including the Washington Postโ€™s Robert G. Kaiser, supported the boycott, arguing, โ€œthe collapse of this Olympiad would send a genuine shock through Soviet society,โ€ though CIA Director Adm. Stansfield Turner warned that such a stunt would backfire. Declassified documents, including the confidential memoย featured in todayโ€™s posting, help contextualize the Carter administrationโ€™s final decision to boycott the games in the hopes of preventing Soviet expansion into Afghanistan.

The confidential January 30, 1980, memorandum from William E. Simon, Treasurer of the US Olympic Committee (USOC), to Marshall Brement, Honorary President of the USOC, encapsulated the Carter position on boycotting the games. In the memo, which is part of the Digital National Security Archiveโ€™s โ€œCIA Covert Operations, 1977-2010โ€ collection, Simon wrote that while the majority of the US Olympic Committee felt that โ€œpressure from the President and the Congress forced them to take their positionโ€ to boycott the games, he remained confident they would come to embrace the official USOC position โ€œa little more enthusiasticallyโ€ in the weeks to come. Simonโ€™s belief was no doubt buoyed by the boycottโ€™s popularity with the American public, nearly 55% of whom were alarmed by the Soviet Unionโ€™s first attempt at territorial expansion since the end of WWII and supported the protest.

The boycott might have had the support of the President and the majority of American citizens, but it was abhorred by US Olympians. Simonโ€™s memo notes that โ€œ[a]thletes remain, quite naturally, the group most hostile to nonparticipation in the Olympics, though they are supporting us. The athletes do not trust the USOC and they deserve special attention.โ€ American member of the International Olympic Committee, Julian Roosevelt, and gold medalist Al Oerter,ย proved Simonโ€™s point, arguing respectively that โ€œIโ€™m as patriotic as the next guy, but the patriotic thing to do is for us to send a team over there and whip their ass,โ€ and โ€œ[t]he only way to compete against Moscow is to stuff it down their throats in their own backyard.โ€

"Athletes remain, quite naturally, the group most hostile to nonparticipation in the Olympics, though they are supporting us. The athletes do not trust the USOC and they deserve special attention."

โ€œAthletes remain, quite naturally, the group most hostile to nonparticipation in the Olympics, though they are supporting us. The athletes do not trust the USOC and they deserve special attention.โ€

Muhammad Ali met with Kenyan President Daniel Arap Moi to solicit support for the Olympic boycott. AP Photo

Muhammad Ali met with Kenyan President Daniel Arap Moi to solicit support for the Olympic boycott. AP Photo

The Soviets defied Carterโ€™s January 20 Afghanistan ultimatum and the US followed through on its threat, leading 65 countries in a boycott of the 1980 games and sending their athletes to an alternate event instead. Carter initially wanted the alternate games to take place in Africa, hoping to โ€œencourage developing countries that were not aligned to either superpower to join the boycott of the Moscow games and offer Western athletes โ€“ who were largely skeptical of a ban โ€“ the chance to compete in an alternative event.โ€ The President even sent Muhammad Ali on an African tour to promote the boycott and solicit countries, including Tanzania, Kenya, and the Ivory Coast, to consider hosting the alternate event. Aliโ€™s trip was ultimately unsuccessful, and the โ€œBoycott Gamesโ€ ended up being held in Philadelphia with mixed results, sinceย many countries officially boycotting the Olympics still allowed their athletes to compete in Moscow under the international flag.

Carterโ€™s insistence on boycotting the games prompted some in the Kremlin to wonder if he was emotionally unstable, and Anatoly Dobrynin, the Soviet Unionโ€™s ambassador to Washington, laterย said of the boycott, โ€œI had never encountered anything like the intensity and scale of this one. What particularly caught my attention was the presidentโ€™s personal obsession with Afghanistan.โ€ย In the end, CIA Director Adm. Stansfield Turnerโ€™s prediction that boycotting the 1980 Games would backfire proved correct, and the Soviet Unionย retaliated by boycotting 1984 games in LA, due to โ€œchauvinistic sentiments and an anti-Soviet hysteria being whipped up in the United States,โ€ and, more importantly, remained in Afghanistan for nearly another decade.

For more declassified documents on the Carter administration, the 1980 Olympic boycott, and US-Soviet relations, visit the Digital National Security Archive.

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, THE NATIONAL SECURITY February 24, 2014December 12, 2017 3 Minutes

Revealed – Secret NSA Doc: The Area 51 File: Secret Aircraft and Soviet MiGs


The CIA’s declassified map of Groom Lake/Area 51.

The Area 51 File: Secret Aircraft and Soviet MiGs

Declassified Documents Describe Stealth Facility in Nevada

National Security Archive Electronic Briefing Book No. 443

The CIA’s history of the U-2 spy plane, declassified this past summer, sparked enormous public attention to the U-2’s secret test site at Area 51 in Nevada, but documents posted today by the National Security Archive (www.nsarchive.org) show that Area 51 played an even more central role in the development of the U.S. Air Force’s top secret stealth programs in the 1970s and 1980s, and hosted secretly obtained Soviet MiG fighters during the Cold War.

Compiled and edited by Archive senior fellow Jeffrey T. Richelson, today’s e-book posting includes more than 60 declassified documents. Some of the documents specifically focus on Area 51 and the concern for maintaining secrecy about activities at the facility. Included is a 1961 memo (Document 1) from the CIA’s inspector general raising the issue of security, and a response (Document 2) reporting the shared concerns of the CIA Deputy Director for Plans, Richard Bissell. Security concerns led to consideration (Document 3) of photographing the area with U.S. reconnaissance assets and a debate (Document 4, Document 5) over the possible release of a photograph of the facility taken by SKYLAB astronauts.


Bird of Prey. Photo credit: National Museum of the United States Air Force.

Other documents focus on the aircraft tested at the facility (and their operational use) โ€” particularly the stealth F-117. Those documents include a variety of histories of the F-117 squadron, with details on participation in operations and exercises. In addition, there are extracts from two reports (Document 15, Document 16) on accidents involving F-117 aircraft, as well as histories and assessments (Document 17, Document 18, Document 23, Document 36) of F-117 deployment in operations DESERT STORM and IRAQI FREEDOM. Also included are fact sheets (Document 58, Document 59, Document 60) concerning three programs, at least two of which were tested at Area 51 โ€” the Bird of Prey and TACIT BLUE.

In addition to documents on F-117 operations, a number of documents focus on the development of stealth capability. One of those (Document 10), is the mathematical analysis by Russian physicist and engineer P. Ya. Ufimtsev that former Lockheed Skunk Works director Ben Rich called “the Rosetta Stone breakthrough for stealth technology.”

Also represented in the posting is another type of activity at Area 51 โ€” the exploitation of covertly acquired Soviet MiGs. Included is a 300-page Defense Intelligence Agency report (Document 50) on the exploitation of the MiG-21, a project titled HAVE DOUGHNUT. Other documents (Document 51, Document 52) concern the exploitation effort concerning two MiG-17s, efforts named HAVE DRILL and HAVE FERRY.

Area 51, Secret Aircraft and Soviet MiGs

Edited by Jeffrey T. Richelson

 


TACIT BLUE. Photo credit: National Museum of the United States Air Force.

Area 51 has the been the focus of enormous interest among a significant segment of the public for decades โ€” an interest that inevitably spawned books, articles, and a variety of documentaries.1 For some enthusiasts Area 51 was a clandestine site for UFOs and extraterrestrials, but it is better understood as a U.S. government facility for the testing of a number of U.S. secret aircraft projects โ€” including the U-2, OXCART, and the F-117. Declassified documents help demonstrate the central role that Area 51 played in the development of programs such as the F-117, and the operational employment of the aircraft. Other declassified documents reveal Area 51’s role in testing foreign radar systems and, during the Cold War, secretly obtained Soviet MiG fighters.

 

Area 51

On April 12, 1955 Richard Bissell and Col. Osmund Ritland flew over Nevada with Kelly Johnson in a small Beechcraft plane. Johnson was the director of the Lockheed Corporation’s Skunk Works, which, as part of a secret CIA-Air Force project, codenamed AQUATONE by the CIA and OILSTONE by the Air Force, was building a revolutionary spy plane, designated the U-2. Bissell, CIA head of the project, Ritland his Air Force deputy, Johnson, and Lockheed’s chief test pilot, were looking for a site where the plane could be tested safely and secretly.2

During the trip they discovered, near the northeast corner of the Atomic Energy Commission’s (AEC) Nevada Proving Ground, what appeared to be an airstrip near a salt flat known as Groom Lake. After examining the location from the ground, the four agreed that it “would make an ideal site for testing the U-2 and training its pilots.” Upon returning to Washington, Bissell discovered that the land was not part of the AEC’s proving ground โ€” leading him to ask the commission’s chairman to make the Groom Lake area an AEC possession, a request which was readily granted. President Eisenhower approved the plan, and the territory, known by its map designation โ€” Area 51 โ€” was added to the Nevada Test Site.3 The site acquired several other designations. Kelly Johnson, in order to make the remote location seem more palatable his workers began referring to it as Paradise Ranch, which was then shortened to the Ranch. An additional unofficial name would be Watertown Strip โ€” a consequence of the need to build a paved runway so that testing could continue when rainwater runoff from nearby mountains made it impossible to land on Groom Lake. By July 1955, the base was ready and personnel from the CIA, Air Force, and Lockheed began to arrive.4

Within a year the U-2 program would transition to an operational program, with flights initially over Eastern Europe and then the Soviet Union. Bissell and other senior officials anticipated that the U-2 would have a limited life before becoming vulnerable to Soviet air defense systems. Before the end of 1958 they had launched Project GUSTO to find a successor to the U-2, which resulted in the selection of another Lockheed-designed plane, the A-12 or OXCARTโ€” which was to fly higher than the U-2, far faster (over Mach 3), and be harder for air defense radars to detect.5

In November 1959, a little over two years before the first A-12 arrived at Area 51 in late December 1961, a radar test facility was established there โ€” the result of contractor Edgerton, Germeshausen & Greer (EG&G) agreeing to move its Indian Springs, Nevada test facility to Area 51. Its purpose was to determine the vulnerability of an OXCART mockup to detection. Area 51 would also become the home to testing programs for two OXCART derivatives โ€” the YF-12A KEDLOCK fighter plane and the Air Force’s Project EARNING, which ultimately produced the SR-71 (also designated SENIOR CROWN) reconnaissance aircraft โ€” as well as the D-21 TAGBOARD drone that was expected to be launched from A-12 aircraft.6

In September 1961, a few months before the first OXCART arrived, the site was visited by CIA Inspector General Lyman Kirkpatrick, who conveyed his findings (Document 1) to Richard Bissell โ€” who had become the CIA’s Deputy Director of Plans in the summer of 1958, with continued responsibility for the CIA’s secret aircraft projects through his directorate’s Development Projects Division (DPD). Kirkpatrick wrote that his “visit left reservations in my mind.” One was that the “‘Area’ appears to be extremely vulnerable in its present security provisions against unauthorized observation” โ€” including air observation. In addition, Kirkpatrick suggested that the project had reached a stage “where top management at the ‘Area 51’ needs consolidation with clear and precisely defined authority.” Finally, he questioned “the survivability of the program’s hardware when and if employed in actual operations.”

Bissell’s off-the-cuff reactions were reported in an October 17 memo (Document 2) from Bissell’s assistant to the acting chief of the DPD. The author reported Bissell’s belief that Kirkpatrick’s points about area security were “well taken,” his lack of strong reaction to the comment about site management, and his questioning whether the inspector general’s comment about OXCART vulnerability was “appropriate” for Kirkpatrick “to get himself involved in.” With regard to the issue of security Bissell “was particularly interested in why we have not yet been able to eject the various [deleted] holding property around the Area.”

Concern about maintaining secrecy for activities at the site persisted as illustrated by an April 6, 1962 memo (Document 3) from DPD executive officer John McMahon to the division’s acting chief. He reported that he and another DPD official (John Parangosky) had earlier discussed the idea of employing a U-2 to produce images of the area and asking photographic interpreters to determine what was happening at the site. But given, the upcoming scheduled launches of CORONA reconnaissance satellites, McMahon noted that “it might be advisable” to include a pass crossing the Nevada Test Site, “to see what we ourselves could learn from satellite reconnaissance of the Area.” That and later missions could be used to assess what deductions the Soviets could make “should Sputnik 13 have a reconnaissance capability.”

A dozen years later, it was not Soviet reconnaissance that resulted in interagency discussions and memos concerning exposure of Area 51 activities via overhead imagery. Rather it was the inadvertent imaging of the area by American SKYLAB astronauts. Among the memos was one (Document 4) from Robert Singel, the National Reconnaissance Office’s deputy director, concerning the on-going internal government controversy. Another memo (Document 5) provided Director of Central Intelligence William Colby with the latest information on the internal debate and identified key questions that needed to be answered before a final decision was made.7

During the mid-1970s another issue was whether the CIA should continue Area 51; its major aerial reconnaissance programs, such as the U-2 and OXCART, no longer needed the site, but the Air Force still needed the site for radar testing, development of stealth aircraft, and exploitation of Soviet MiG aircraft that the U.S. had acquired. The National Security Council decided that the Air Force should take over the site. According to a memo (Document 6) from deputy director of central intelligence, E.H. Knoche to the Air Force’s chief of staff, David C. Jones. Knoche, the National Security Council’s Committee on Foreign Intelligence had approved the recommendation “that management of Area 51 be transferred from CIA to Air Force by FY-78.”

Eventually, the transfer would take place, and the Groom Lake facility became Detachment 3 of the Air Force Flight Test Center, whose headquarters were at Edwards Air Force Base, California.8

By the mid-1990s, the existence of Area 51 had become widely known โ€” and the subject of threatened legal action because of environmental concerns. Seeking to prevent that from resulting in revelations about activities conducted at the site President Bill Clinton signed a presidential determination exempting the “Air Force’s operating location near Groom Lake, Nevada from any Federal, State, interstate, or local hazardous or solid waste laws that might require disclosure of classified information concerning that location to unauthorized persons” โ€” a determination he reported to congressional leaders (Document 8) on January 30, 1996. In September 2003 President George W. Bush made a similar determination, in the form of a memorandum (Document 9) to the administrator of the Environmental Protection Agency.

 

Stealth Fundamentals

A key element of the work done at Area 51 was testing the ability of the reconnaissance and other aircraft deployed there to evade radar detection. In some cases the work was based on measures developed after the aircraft was developed โ€” as exemplified by the failed RAINBOW project aimed at reducing the Soviet ability to detect U-2’s during their spy flights.9 In other cases, designers gave the aircraft certain stealth (low-observable) features โ€” in some cases, based on elaborate theoretical work.

During the mid-1970s government and contractor experts studied the problem of reducing the radar cross section of aircraft. Included was a paper (Document 11) by Lockheed’s Kelly Johnson that focused on high altitude aircraft such as the SR-71. In addition, Teledyne Ryan Aeronautical (Document 12) reported on a number of aspects of producing a low-observable vehicle. Another contractor, Boeing reviewed “features of airborne vehicle configurations that have a primary influence on the resulting radar signature.”(Document 13). Based on testing results, the Boeing expert discussed the impact of features โ€” including engine inlets, nose shape, body shape, exhaust nozzles, control surfaces, weapons, wing location, and fuselage shape โ€” on radar cross section.

By June 1991, Air Force work on stealth had resulted in a number of projects that it summarized in a review of the technology that it had just conducted. A briefing book (Document 14) discussed fundamentals about stealth, its value, and the four different Air Force programs โ€” the F-117, B-2, F-22, and Advanced Cruise Missile.

The first of those programs, and the unconventional shape of the aircraft produced, had its origins in a 1962 work (Document 10) by Russian theoretical physicist (and electric engineer) Pytor Ufimtsev โ€” which did not spur the Russian air force to either classify the work or make use of it. The paper, Method of Edge Waves in the Physical Theory of Diffraction, when translated by the Air Force Foreign Technology Division in 1971 would consist of over 200 pages of mathematical analysis. A foreword explained that Ufimtsev studied the scattering characteristics of “reflecting bodies with abrupt surface discontinuities or with sharp edges.” He took into account “the laws of geometric optics …, the additional currents arising in the vicinity of the edges or borders which have the character of edge waves and rapidly attenuate with increasing distance from the edge or border.”

Ben Rich, Kelly Johnson’s successor as head of the Lockheed Skunk Works, would report in his memoirs that one afternoon a “Skunk Works mathematician and radar specialist named Denys Overholser … presented me with the Rosetta Stone breakthrough for stealth technology.” Overholser had found the breakthrough in Ufimtsev’s paper and explained that the Ufimtsev had demonstrated “how to accurately calculate radar cross sections across the surface of the wing and at the edge of the wing and put together these two calculations for an accurate total.”10

 

From HAVE BLUE to the F-117


F-117. Photo credit: National Museum of the United States Air Force.

A first step in trying to convert Ufimtsev’s theoretical results into an operational stealth aircraft was an Advanced Research Projects Agency (ARPA) project, began in the early 1970s. Designated HAVE BLUE, it resulted in two experimental aircraft, with a first flight in April 1977. The Air Force launched a program, designated SENIOR TREND, to build the F-117 in November 1978; it eventually produced 59 aircraft. A first flight, presumably at Area 51, took place in June 1981, and the Air Force declared the F-117 operational in October 1983 with Tonopah Test Range as its new home. Ten years later, in November 1988, the government confirmed the existence of the plane, revealed its designation, and released a picture of the aircraft.11 In the two years before declassification the program experienced two crashes (Document 15, Document 16) that took the lives of the pilots.

Once it was declared operational, the F-117 was available for use in combat operations. The Air Force nearly used it in the 1986 attacks on Libya, ordered by President Reagan in response to Libyan involvement in the La Belle Disco bombing in West Berlin, but ultimately did not because of Defense Secretary Caspar Weinberger’s reluctance to reveal the plane’s existence. 12 First combat use would come three years later โ€” in Operation Just Cause (Document 19, Document 22) โ€” the operation to unseat and seize Panamanian strongman Manuel Noriega.

But the major use of the F-117 in combat activity took place in operations targeting sites in Iraq, beginning with Operation DESERT STORM. These operations were the subject of an official chronology (Document 17), an Army War College essay (Document 18) and the official history of the 37 th Fighter Wing (Document 19). The General Accounting Office (GAO) conducted a critical examination of the stealth fighter’s effectiveness (Document 23) as part of its evaluation of the air war. The GAO found that the F-117 bomb hit range was “highly effective” โ€” varying between 41 and 60 percent โ€” but it did not reach the 80 percent claimed by the Defense Department.

Other histories of the F-117 wing (which had become the 49th Wing by 1996) included accounts of its participation in a variety of exercises as well as its use for coercive diplomacy. According to one history (Document 26) F-117s were deployed to Southwest Asia twice between July 1 and December 31, 1998 for Operations DESERT THUNDER and DESERT FOX. Both were ordered in response to Iraqi non-compliance with U.N. Security Council resolutions, but did not result in combat operations. In 1999, F-117s did go into combat โ€” in the Balkans โ€” a subject that was discussed in the January – June 1999 history (Document 27) of the 49th Fighter Wing. Much of the treatment is redacted from the released version, although the declassified version reports that after the first round of strikes on March 24, 1999, General William Lake told his commanders “everyone is back safely. So far the score is F-117s 10, Yugoslav’s 0.”13

Deployments to South Korea and Southwest Asia, including use during the Iraq War, as well exercises, are covered in histories (Document 34, Document 37) for 2003 and 2004. The 2003 history (Document 34) and a history โ€” Black Sheep Over Iraq (Document 36) โ€” focus solely on F-117 operations in Operation Iraqi Freedom. The Black Sheep history covers orders to deploy for combat, the attempted decapitation strike intended to kill Saddam Hussein, subsequent combat missions, and an assessment of F-117 performance in the war.

 

The Soviets and Stealth

The Soviet military may not have initially embraced Ufimtsev’s work, but it was inevitable, because of both internal and external influences, that they would eventually explore its use for their own aerial programs and for counteracting U.S. stealth aircraft. During the 1980s, if not before, the Intelligence Community and CIA closely reviewed those issues.

In January 1983 former DPD executive officer John McMahon (Document 3), then the Deputy Director for Central Intelligence, informed the director of the Intelligence Community Staff (Document 38) that he had asked the Deputy Director of Intelligence for an assessment of Soviet stealth technology.

A little over a year later, the Directorate of Intelligence produced a study (Document 40) entitled Soviet Work on Cross Section Reduction Applicable to a Future Stealth Program. The assessment examined Soviet radar cross section technology and a variety of potential applications to submarines, reentry vehicles, aircraft, spacecraft, cruise missiles, and ground vehicles.14 Among its key judgments was that “the Soviets did not have a Stealth program in the 1970s” but that “because of the high US interest in this area, the Soviets probably began intensified research effort in the early 1980s, which may have led to a developmental program now under way.”15

The same month that the CIA produced that assessment the Agency’s continued interest in further work on Soviet stealth efforts was indicated by a memo (Document 42) from Julian C. Nail, the National Intelligence Officer for Science and Technology, to Director of Central Intelligence William J. Casey. Nail observed that the topic was on the agenda for a National Foreign Intelligence Board meeting in early March 1983, memos were being prepared for Casey to send to each principal indicating the importance he attached to the subject, and that the Office of Scientific and Weapons Research was seeking to enhance its analysis of the subject, mainly by getting additional clearances so the CIA analysts could learn about U.S. research and development efforts.

How the Soviets might react to U.S. stealth programs was the subject, in August 1985, of a special national intelligence estimate (Document 43) โ€” Soviet Reactions to Stealth. Two key sections of the estimate focused on the counter-stealth potential of current and near-term Soviet systems (including early warning radar, fighter aircraft, surface-to-air missile, antiaircraft artillery, and command, control, and communications systems) and future Soviet technical responses. Another section examined prospective Soviet stealth developments โ€” including the process of incorporating stealth vehicles in Soviet military planning and the acquisition and use of stealth technology.

One indication that the Air Force may have limited the knowledge and the ability of U.S. intelligence analysts to use classified data on U.S. stealth research and development efforts was a figure labeled “Design Considerations for Stealth Aircraft” (p.8). Despite the figure’s Top Secret classification, it was, as acknowledged in a credit line adjacent to the figure, lifted from an issue of Aviation Week & Space Technology. Moreover, that figure was based on speculation what , at the time, the rumored stealth fighter might look like โ€” speculation that proved to be considerably wide of the mark.

 

CIA Support to US Stealth Programs

In addition to assessing Soviet stealth programs, the CIA and other elements of the Intelligence Community provided U.S. stealth efforts with intelligence on Soviet forces and capabilities that was relevant to developing U.S. stealth vehicles and plans for their use. Thus, in a February 1, 1984 memo (Document 45) the director of the CIA Office of Scientific and Weapons Research (OSRW) reported that intelligence support for the U.S. stealth program included an analysis on “the Soviet threat to an Air Force Tactical Air Command Program in November 1983.”

A month later the OSWR director reported the number of new clearances (25) that were necessary to implement the stealth analytical effort (Document 47) Beyond the total clearances needed, the director indicated the offices involved and the specific topics to be examined. Thus, air defense and aircraft systems specialists at OSWR would work on stealth penetration analysis studies, specialists in the Office of Soviet Analysis would conduct strategic studies related to the implications of stealth capabilities, and other specialists in OSWR would examine Soviet weapons and technology.

 

MiGs at Area 51

Besides secret U.S. aircraft work, Area 51 also hosted the study of secretly acquired Soviet MiG fighters. The first effort involved a MiG-21, designated “Fishbed-E” by NATO. Israel acquired the plane in August 1966 when a captain in the Iraqi air force defected, landing the MiG at an airbase in northern Israel โ€” an action that been arranged in advance by the Mossad, Israel’s secret intelligence service. From January 23, 1968 to April 8, 1968 the plane was loaned to the U.S. Air Force.16

The MiG, in the Air Force’s temporary possession, received a new designation โ€” the YF-110 โ€” and Area 51 became its new home. The exploitation effort, conducted by the specialists from the Air Force Foreign Technology Division (today known as the National Air and Space Intelligence Center) was designated HAVE DOUGHNUT. One report focused on technical characteristics of the plane, while another was a tactical evaluation. The latter (Document 50) had four primary objectives: (1) evaluating of the effectiveness of existing of existing tactical maneuvers by the Air Force and Navy combat aircraft and associated weapons against the MiG-21, (2) exploiting the tactical capabilities and limitations of the MiG-21 in air-to-air combat, (3) optimizing existing tactics and develop new tactics to defeat the MiG-21, and (4) evaluating the design, performance, and characteristics of the MiG-21. The exploitation reports spelled out the findings (including Document 50) with historical retrospectives about the effort prepared later (Document 48, Document 49).

Two other late 1960s exploitation efforts at Area 51 โ€” both focused on evaluating the MiG-17 โ€” were designated HAVE DRILL and HAVE FERRY. The HAVE DRILL MiG-17 began flying at Groom Lake on February 17, 1969 and flew 172 sorties over 55 days. The HAVE FERRY aircraft, which served as backup to the HAVE DRILL aircraft, began flying on April 9, 1969 and flew 52 sorties over 20 days.17 As with the HAVE DOUGHNUT effort it resulted in a technical report and a tactical report (April 1970). The results were also the subject of two more recent briefings by (Document 51 and Document 52) by NASIC representatives.

While the HAVE DOUGHNUT and HAVE DRILL/HAVE FERRY efforts are the ones whose details have been declassified, they were not the last of MiG exploitation efforts at Area 51. Under a program designated CONSTANT PEG, the Air Force tested other MiGs โ€” acquired by a variety of means โ€” to determine their capabilities and vulnerabilities. In the 1970s the effort moved to Tonopah Test Range, about 70 miles northwest of Area 51.18

 

Radar Tests & Other Aircraft

Other aspects of Area 51 activities included tests of covertly acquired Soviet-radar systems. In November 1970, a project designated HAVE GLIB, referred to in a 1976 memo (Document 6), began. According to one account “a complex of actual Soviet systems and replicas” grew around Slater Lake, a mile northwest of the main base. The Air Force gave the systems such names as Mary, Kay, Susan, and Kathy and arranged them to “simulate a Soviet-style air defense complex.”19

Subsequent to the declassification of the F-117 program, the Air Force managed two other aircraft programs at Area 51, but neither led to the production of operational fleet. Both have been partly declassified, with only some photos and fact sheets providing a few details about these secret programs.

One plane, developed by Northrop along with the Air Force and DARPA, was the TACIT BLUE battlefield surveillance plane (Document 56, Document 58) also known as the “Whale.” Work began in 1978 and it first flew at Area 51 in February 1982, with the program concluding in 1985 โ€” by which time it had been flown 135 times. The Air Force fact sheet (Document 58) reports that the objective was to “demonstrate that curved surfaces on an aircraft result in a low radar return signal” and states that TACIT BLUE “demonstrated that such an aircraft could operate close to the battlefield forward line without fear of being discovered by enemy radar.”20

The other, a plane built by the McDonnell-Douglas “Phantom Works” was known as the BIRD OF PREY, after its resemblance to the Klingon spacecraft from Star Trek. The Air Force declassified its existence in 2002, because, according to the fact sheet (Document 59), “its design techniques had become standard practice.” The fact sheet described the plane as a single-seat stealth technology demonstrator used to test stealth techniques and “new methods of aircraft design and construction.” The project, which ran from 1992 to 1999, with the first flight in 1996, included 38 flights altogether.21

Two additional projects that may have been connected to Area 51 were associated with the May 2, 2011 raid that resulted in the death of Osama Bin Laden. One was the stealth helicopter that carried the Navy SEALs to the Abbottabad compound. The other was the RQ-170 stealth drone that had been used to monitor developments at the compound.22 A very brief fact sheet (Document 60) describes the RQ-170 as “a low observable unmanned aircraft system” intended to provide “reconnaissance and surveillance in support of the joint forces commander.”

 


THE DOCUMENTS

AREA 51

Document 1: Letter, Lyman Kirpatrick to Richard Bissell, October 13, 1961. Secret.

Source: CIA Records Search Tool (CREST), National Archives and Records Administration, College Park, Maryland.

This letter from the CIA’s Inspector General to the Deputy Director for Plans reports on his visit to the Development Projects Division (responsible for the U-2 and OXCART programs) “Area” โ€” that is, Area 51. The topics covered include security arrangements (which Kirkpatrick considered inadequate), on-site management, and the survivability of the “program’s hardware when and if employed in actual operations.”

 

Document 2: [Deleted], Assistant to the DD/P, Memorandum for: AC/DPD, Subject: Inspector General’s Memorandum on His Trip to the Area, October 17, 1961. Secret.

Source: CREST.

This memo reports on Bissell’s “off-the-cuff” reactions to Kirpatrick’s letter (Document 1). While he embraced Kirpatrick’s comments on security, he had no strong reaction to his comments concerning on-site management, and questioned the proprietary of an inspector general commenting on the issue of OXCART vulnerability.

 

Document 3: John N. McMahon, Executive Officer, DPD, Memorandum for: Acting Chief, DPD, Subject: Aerial Observation of Area 51, April 6, 1962. Secret.

Source: National Reconnaissance Office (NRO) Release.

This memo from the DPD’s executive officer to its acting chief discusses the possibility of having Area 51 photographed by either a U-2 or CORONA spy satellite โ€” as a means of estimating what the Soviet Union might learn from its own overhead images of the facility.

 

Document 4: Robert D. Singel, Memorandum for Chairman, COMIREX, Subject: [Deleted] SKYLAB Photograph, April 11, 1974. Top Secret.

Source: National Reconnaissance Office

This memo from the deputy director of the NRO to the chairman of the Director of Central Intelligence’s Committee on Imagery Requirements and Exploitation is the result of a photograph taken by SKYLAB astronauts of Area 51. It discusses some of the issues to be considered in deciding whether to release the photograph.

 

Document 5: [Deleted], Memorandum for: The Director of Central Intelligence, Subject: SKYLAB Imagery [Deleted], April 19, 1974. Confidential.

Source: CREST.

This memo to DCI William Colby, notes that the SKYLAB photograph of Area 51 was acquired inadvertently and that instructions had been issued not to photograph the facility. It also reports that the photo is the subject of an interagency review and that there was widespread opposition to its release.

 

Document 6: E.H. Knoche, Deputy Director of Central Intelligence, to General David C. Jones, Chief of Staff, United States Air Force, August 26, 1976. Secret.

Source: RG 340 National Archives and Records Administration.

This letter discusses whether the CIA should continue to be responsible for the management of Area 51 or if the Air Force should assume responsibility. It identifies HAVE GLIB โ€” the evaluation of foreign radar and threat systems โ€” as the largest Defense Department project at the site at that time.

 

Document 7: United States Air Force, Det 3 SP, n.d. Unclassified/For Official Use Only.

Source: Editor’s Collection.

This document is widely reported to be a manual for Detachment 3 of the Air Force Security Police, responsible for security at Area 51. It specifies the cover story to be employed by members of the security force to explain their activities.

 

Document 8: William J. Clinton, Letter to Congressional Leaders on Presidential Determination 95-45, January 30, 1996. Unclassified.

Source: http://www.gpo.gov.

This letter from President Clinton, notes that his determination exempted the Air Force’s operating location “near Groom Lake, Nevada from any Federal, State, interstate, or local hazardous or solid waste laws that might require the disclosure of classified information concerning that operating location to unauthorized persons.”

 

Document 9: George W. Bush, Memorandum for the Administrator of the Environmental Protection Agency, Presidential Determination No. 2003-39, Subject: Classified Information Concerning the Air Force’s Operating Location Near Groom Lake, Nevada, September 16, 2003. Unclassified.

Source: http://www.whitehouse.gov

This memorandum reaffirms President Clinton’s 1995 presidential determination (Document 8).

 

STEALTH FUNDAMENTALS

Document 10a, 10b, 10c: P. Ya. Ufimtsev, Methods of Edge Waves in the Physical Theory of Diffraction, 1971. Unclassified.

Source: Air Force Freedom of Information Act Release

Ufimtsev’s 1962 work, translated by the Air Force Foreign Technology Division (today, the National Air and Space Intelligence Center), provides the fundamental theoretical/mathematical basis for the F-117.

 

Document 11: Clarence L. “Kelly” Johnson, Lockheed Aircraft Corporation, “Reduction of Radar Cross Section of Large High Altitude Aircraft,” n.d. (but circa 1975). Classification Not Available.

Source: Air Force Freedom of Information Act Release.

Most of this paper, written by the first head of the Lockheed Skunk Works, who supervised development of the U-2 and A-12 (OXCART), consists of figures related to the brief discussion of the relationship between stealth and aircraft shape.

 

Document 12: R. W. Lorber, R. W. Wintersdorff, and G.R. Cota, AFAL-TR-74-320, Teledyne Ryan Aeronautical, Low-RCS Vehicle Study, January 31, 1974. Secret.

Source: Air Force Freedom of Information Act Release.

This report describes the research performed by Teledyne Ryan under an Air Force contract on low-radar cross section aerial vehicles as well as some of the results obtained.

 

Document 13: John D. Kelly, Boeing Aerospace Company, “Configuration Design for Low RCS,” September 1, 1975. Secret.

Source: Air Force Freedom of Information Act Release.

This paper discusses the impact on the radar cross section of aircraft of the design of different regions of the vehicle โ€” including the nose, tail, broadside โ€” as well as the impact of skin material. It also discusses the design a low RCS missile.

 

Document 14: Department of the Air Force, Air Force Stealth Technology Review, 10-14 June 1991, n.d.

Source: http://www.dod.mil/pubs/foi/Science_and_Technology/Other/263.pdf.

This briefing book consists of five tabs, which concern the value and evolution of stealth, the F-117, the B-2, the F-22, and the advanced cruise missile.

 

F-117 OPERATIONS

Document 15: Major General Peter T. Kemp, Commander, USAF Tactical Fighter Warfare Center, to TFWC/JA, Subject: Aircraft Accident – F-117, 81-0792, July 11, 1986, January 14, 1987. Secret/Special Access Required. Secret w/att: Report of Investigation (Extract).

Source: Air Force Freedom of Information Act Release.

This extract provides a statement of facts concerning the fatal crash of a F-117A aircraft on July 11, 1986. It covers, inter alia, crew qualifications, the history of the flight, the mission, the briefing and preflight, the flight, impact, rescue, and crash response.

 

Document 16: Lt. Col. John T. Manclark, 57 FWW/AT, Nellis AFB, N, AFR 110-14 USAF Aircraft Accident Investigation Board, 14 October 1987 – Tonopah Test Range , December 8, 1987. Secret/Special Access Required.

Source: Air Force Freedom of Information Act Release.

This extract is a summary of facts concerning the October 14, 1987 crash of a F-117A that claimed the life of its pilot. As with the report of the on the July 1986 crash (Document 15), it covers โ€” inter alia โ€” crew qualifications, the history of the flight, the mission, the briefing and preflight, the flight, impact, rescue, and crash response.

 

Document 17: Harold P. Myers, Office of History, 37th Fighter Wing, Twelfth Air Force, Tactical Air Command, Nighthawks over Iraq: A Chronology of the F-117A Stealth Fighter in Operations Desert Shield and Desert Storm, January 9, 1992. Unclassified.

Source: Editor’s Collection.

A two-page introduction is followed by a 32-page chronology of F-117A information related to operations Desert Shield and Desert Storm, from August 17, 1990 to February 28, 1991. The information include concerns personnel, deployments, administrative matters, exercises, and operations (pp. 8-36).

 

Document 18: Arthur P. Weyermuller, Stealth Employment in the Tactical Air Force (TAF) – A Primer on Its Doctrine and Operational Use (Carlisle Barracks, Pa.: U.S. Army War College, 1992). Unclassified.

Source: http://www.dtic.mil

This study focuses on the history of stealth development, the roles and missions of the F-117A and its performance during Desert Storm, and an assessment of how stealth technology fits into Air Force aerospace doctrine. It also discusses next generation stealth aircraft, specifically the F-22 fighter and B-2 bomber.

 

Document 19: Vincent C. Breslin, 37th Fighter Wing, History of the 37th Fighter Wing, 5 October 1989 – 31 December 1991, Volume 1 – Narrative, May 22, 1992. Secret.

Source: Air Combat Command Freedom of Information Act Release.

In addition to a chronology of events, this history includes a discussion of the creation of the 37th Fighter Wing (established to replace the covert group established to oversee development of the F-117A while it was still a classified program), the “quest for normalization,” F-117 operations in Panama (Operation Just Cause) and Iraq (Operations Desert Shield and Desert Storm), and events from the end of Desert Storm to the end of 1991.

 

Document 20a, 20b: Vincent C. Breslin, 37th Fighter Wing, History of the 37th Fighter Wing, 1 January – 8 July 1992, Closeout, Volume 1 – Narrative, August 11, 1992. Classification Not Available.

Source: Air Combat Command Freedom of Information Act Release.

The 37th Fighter Wing (Document 19) at Tonopah Test Range was inactivated on July 8, 1992, with F-117A fighters being transferred to a new unit, based at Holloman Air Force Base, New Mexico. This history contains a discussion of the inactivation, fully redacted sections on mission revision and an operational readiness exercise – as well as treatments of the the employment of the F-117A in airshows, transfer of aircraft to Holloman, and a number of other topics.

 

Document 21a: Office of Public Affairs, Department of the Air Force, Fact Sheet 93-11, F-117A Stealth Fighter, November 1993. Unclassified.

Document 21b: Department of the Air Force, Fact Sheet, F-117 A Nighthawk, October 2005. Unclassified.

Sources: Air Force Office of Public Affairs, http://www.af.mil

These fact sheets, issued twelve years apart, describe the mission, features, background, and general characteristics of the F-117A. The second fact sheet contains details of the plane’s employment in Desert Storm, the Balkans, and Operation Iraqi Freedom.

 

Document 22: Ronald H. Cole, Joint History Office, Office of the Chairman of the Joint Chiefs of Staff, Operation Just Cause: The Planning and Execution of Joint Operations in Panama, February 1998 – January 1990, 1995. Unclassified.

Source: http://www.dtic.mil.

The focus of this history is the involvement of the Chairman of the Joint Chiefs and the Joint Staff in the planning and direction of combat operations in Panama. Part of the history discusses the decision to use the F-117A as part of the operation โ€” its first operational use โ€” and its employment.

 

Document 23: General Accounting Office, GAO/NSIAD-97-134, Operation Desert Storm: Evaluation of the Air Campaign, June 1997. Unclassified.

Source: General Accounting Office.

This study focuses on the use and performance of aircraft and other munitions in Desert Storm, including the F-117, the validity of Defense Department claims about weapon systems’ performance (particularly systems using advanced technology), the relationship between weapon system cost and performance, and the extent to which Desert Storm air campaign objectives were satisfied. Among its findings was that while F-117 bomb hit range varied between 41 and 60 percent, which the report characterized as “highly effective,” the range was less than the 80-percent rate report after the war by the Defense Department.

 

Document 24: Gregg S. Henneman and David Libby, 49th Fighter Wing, History of the 49th Fighter Wing, 1 July 1996 – 31 December 1997, Narrative, Volume No. 1, May 28, 1998. Secret.

Source: Air Combat Command Freedom of Information Act Release.

With the inactivation of the 37th Fighter Wing (Document 20) and transfer of the F-117A fleet to Holloman AFB, they were assigned to the 49th Fighter Wing. This history focuses on mission and organization, operations and training (including operations against Iraqi targets, and partcipation in the Red Flag 97-1 exercise), and aircraft upgrades.

 

Document 25: Gregory S. Henneman, 49th Fighter Wing, History of the 49th Fighter Wing, 1 January – 30 June 1998, Narrative, Volume No. 1, October 22, 1998. Secret.

Source: Air Combat Command Freedom of Information Act Release.

As with the history for the preceding eighteen months (Document 24) the main focus of this history is mission and organization and operations and training. In addition to its discussion of F-117A deployment to Southwest Asia in response to developments in Iraq the history also discusses several exercises โ€” Spirit Hawk ’98 (described as “the Air Force’s first ever low observable combat exercise”), Combat Hammer 98-04 (a weapons system evaluation program exercise) โ€” as well as deployment in support of Fighter Weapons Instructor Course.

 

Document 26: Gregory S. Henneman, 49th Fighter Wing, History of the 49th Fighter Wing, 1 July – 31 December 1998, Narrative, Volume No. 1, May 19, 1999. Secret.

Source: Air Combat Command Freedom of Information Act Release.

This history discusses deployments to in support of operations in the Balkans and Southwest Asia. The two Southwest Asia deployments โ€” Operation Desert Thunder and Operation Desert Fox โ€” were in response to Iraqi non-compliance with U.N. Security Council resolutions and did not result in combat operations.

 

Document 27: William P. Alexander and Gregory S. Henneman, 49th Fighter Wing, History of the 49th Fighter Wing, 1 January – 30 June 1999, Narrative, Volume 1, n.d. Secret.

Source: Air Combat Command Freedom of Information Act Release.

This history follows the standard format for 49th Fighter Wing histories โ€” covering mission and organization, operations and training, and maintenance. The chapter on operations includes a discussion of the F-117A deployment to Europe and its use against Serbian targets.

 

Document 28: William P. Alexander and Gregory S. Henneman, 49th Fighter Wing, History of the 49th Fighter Wing, 1 July – 31 December 1999, Narrative, Volume 1, n.d. Secret.

Source: Air Combat Command Freedom of Information Act Release.

In addition to discussing the role of F-117A aircraft in two exercises โ€” Spirit Hawk 99 at Mountain Home Air Base, Idaho and EFX at Nellis AFB, Nevada โ€” the history also contains a discussion of upgrades to the F-117, including an upgrade to the infrared acquisition designation system that “would allow F-117 pilots to ‘look’ through clouds, greatly increasing the aircraft’s capability.”

 

Document 29: William P. Alexander and Tracey S. Anderson, 49th Fighter Wing, History of the 49th Fighter Wing, 1 January – 30 June 2000, Narrative, Volume 1, n.d. Secret.

Source: Air Combat Command Freedom of Information Act Release.

The primary deployment discussed in this history was a deployment to Nellis Air Force Base, to take part in a “firepower demonstration” called CAPSTONE. It involved two F-117As dropping GBU-10 bombs on specified targets.

 

Document 30: William P. Alexander, 49th Fighter Wing, History of the 49th Fighter Wing, 1 July – 31 December 2000, Narrative, Volume 1, n.d. Secret.

Source: Air Combat Command Freedom of Information Act Release.

The history’s discussion of operations and training includes examination of two exercises that involved F-117A participation – RED FLAG 01-01 and CAPSTONE. The first is described as “the first low observable (LO) integrated RED FLAG exercise to be flown of Nellis AFB.” The latter involved, as did the identically named exercise in the first half of the year (Document 29), F-117A’s dropping two GBU-10 bombs on specified targets.

 

Document 31: William P. Alexander, 49th Fighter Wing, History of the 49th Fighter Wing, 1 January – 30 June 2001, Narrative, Volume 1 , January 28, 2003. Secret.

Source: Air Combat Command Freedom of Information Act Release.

As with earlier 49th Fighter Wing histories, this one discusses mission and organization, operations and training, and miscellaneous activities (including maintenance). While there were no operational deployments, the history reports on the deployment of aircraft, equipment, and personnel to several bases around the United States as well as F-117A involvement in RED FLAG 01-02.

 

Document 32: History of the 49th Fighter Wing, 1 July – 31 December 2001, n.d., Secret.

Source: Air Combat Command Freedom of Information Act Release.

This history covers mission and organization and deployments of the 49th Fighter Wing.

 

Document 33: William P. Alexander and Terri J. Berling, History of the 49th Fighter Wing, 1 January – 31 December 2002, Narrative, Volume 1, n.d. Unclassified/For Official Use Only.

Source: Air Combat Command Freedom of Information Act Release.

Despite its classification this history is heavily redacted, but does discuss F-117A participation in a European theater exercise named Operation Coronet Nighthawk.

 

Document 34: William P. Alexander and Terri J. Berling, History of the 49th Fighter Wing, 1 January – 31 December 2003, Narrative, Volume 1, n.d.

Source: Air Combat Command Freedom of Information Act Release

Among the topics examined in this history are F-117A deployments to the Middle East (and subsequent participation in Operation Iraqi Freedom) and South Korea as well as F-117A participation the Foal Eagle (Korea) and Red Flag (Nellis Air Force Base) exercises.

 

Document 35: Department of the Air Force, Air Force Tactics, Techniques, and Procedures 3 -3.18, Combat Aircraft Fundamentals, F-117, October 19, 2004. Unclassified/For Official Use Only.

Source: Air Combat Command Freedom of Information Act Release

This manual is intended to provide “aircrew the information need to make the right decisions during any phase of a tactical mission.” Its chapters cover mission preparation, formation, aircraft basics and instruments, air-to-surface elements of a mission, air refueling, low altitude operations, night and adverse weather operations, and night systems.

 

Document 36: Gregg Henneman, Black Sheep Over Iraq: The 8th Fighter Squadron in Operation Iraqi Freedom, November 2004. Secret.

Source: Air Combat Command Freedom of Information Act Release

This study explores the role of F-117A aircraft in the 2003 conflict with Iraq. In addition to an examination of the F-117A background, it examines the orders to deploy the F-117A for combat, the attempted decapitation strike, subsequent combat missions, maintenance, and assessment of F-117 performance, and redeployment.

 

Document 37: William P. Alexander and Terri J. Berling, History of the 49th Fighter Wing, 1 January – 31 December 2004, Narrative, Volume 1, n.d. Secret.

Source: Air Combat Command Freedom of Information Act Release

This history contains a chronology of 49th Fighter Wing activities, and chapters on mission and organization, operations โ€” including an extensive discussion of F-117A deployment to South Korea and participation the Eagle Flag 2004/0B exercise โ€” and mission capability for the F-117A and other aircraft.

 

THE SOVIETS AND STEALTH

Document 38: John N. McMahon, Memorandum for: Director, Intelligence Community Staff, Subject: Soviet Stealth Technology, January 10, 1983. Secret.

Source: CREST.

This brief memo from the Deputy Director of Central Intelligence notes that he had asked the Deputy Director for Intelligence (Robert Gates) to produce a paper on Soviet stealth technology.

 

Document 39: Lawrence K. Gershwin, Memorandum for: Director of Central Intelligence, Deputy Director of Central Intelligence, Subject: Briefing on Soviet Stealth Efforts, January 30, 1984. Secret.

Source: CREST.

This memo notes that the Chairman of the National Intelligence Council had asked the National Intelligence Officer for Strategic Programs, Lawrence K. Gershwin, to prepare, in conjunction with the Office of Scientific and Weapons Research (OSWR), a briefing for Senator Sam Nunn on Soviet stealth technology.

 

Document 40: Directorate of Intelligence, Central Intelligence Agency, SW 84-10015, Soviet Work on Radar Cross Section Reduction Applicable to a Future Stealth Program, February 1984. Secret.

Source: CREST.

This the two main sections of this assessment cover Soviet radar cross section technology (including the theoretical base, measurement capability, materials, and transfer of technology) and applications (to submarines, reentry vehicles, aircraft, spacecraft, cruise missiles, and ground vehicles). The key judgments section states that the authors “feel certain that the Soviets did not have a Stealth program in the 1970s” but that “the Soviets probably began an intensified research effort in the early 1980s which may have led to a developmental program now under way.”

 

Document 41: Julian C. Nail, National Intelligence Officer for Science and Technology, Note for the Director, Subject: Soviet Low Observable (Stealth) Technology, February 23, 1984. Secret.

Source: CREST.

This note to the Director of Central Intelligence summarizes efforts under throughout the Intelligence Community to produce assessments and other products concerning Soviet stealth technology.

 

Document 42: Julian C. Nail, Memorandum for: Director of Central Intelligence, Deputy Director of Central Intelligence, Subject: Distribution of SNIE on The Soviet Reactions to Stealth, July 24, 1985. Secret

Source: CREST.

This memo concerns limiting the distribution of the a special national intelligence estimate on Soviet reactions to stealth. The author suggests that rather than distributing 50 copies the estimate should be disseminated to 37 offices/individuals.

 

Document 43: Director of Central Intelligence, SNIE 11-7/9-85/L, Soviet Reactions to Stealth, August 1985, Top Secret .

Source: CIA Electronic Reading Room.

This estimate is described as “an effort to assess at the national level the Soviet capability and intention to respond to the US [stealth] challenge.” Topics covered in the discussion include the concept of stealth, the counter-stealth potential of current and near-term Soviet systems, future Soviet technical responses, ballistic missile defenses, other defense options, prospective Soviet stealth developments, research facilities, aerodynamic systems, ballistic missile systems, and intelligence gaps.

 

Document 44: Directorate of Intelligence, Central Intelligence Agency, US Stealth Programs and Technology: Soviet Exploitation of the Western Press, August 1, 1988. Secret.

Source: CIA Historical Review Program Release.

This paper examines the intersection of Soviet examination of Western press reports on U.S. stealth efforts and indigenous Soviet work in the area.

 

CIA STEALTH EFFORTS

Document 45: [Deleted], Director of Scientific and Weapons Research, Memorandum for: Deputy Director for Intelligence, Subject: CIA’s Stealth Efforts [Deleted], February 1, 1984, w/att: CIA Intelligence Support to US Stealth Programs, Secret/Noforn.

Source: CREST.

The attachment to the February 1, 1984 memo notes that the CIA’s Office of Scientific and Weapons Research had been providing direct support to US stealth efforts since 1980 and provides specific examples. It also describes “several initiatives … to better support policy makers.” The February 1 memo outlines that the author believes “we have done well, what we have not done, and recommendations for future support.”

 

Document 46: William J. Casey, Memorandum for: Deputy Director for Intelligence, Subject: CIA’s Stealth Efforts, February 2, 1984. Secret

Source: CREST.

This memo is DCI Casey’s response to the February 1 and its attachment.

 

Document 47: [Deleted], Director of Scientific and Weapons Research, Memorandum for: Director of Central Intelligence, Deputy Director of Central Intelligence, Subject: Implementation of CIA’s Stealth Analytical Effort, March 1, 1984.

Source: CREST.

This memo reports on the number of clearances necessary for the CIA to carry out the analytical program concerning stealth suggested by the Director of the Office of Scientific and Weapons Research. It indicates the both the national intelligence and CIA entities that would be involved as well as the specific topics to be investigated.

 

EXPLOITATION

Document 48: Thomas R. Woodford, National Air and Space Intelligence Center, HAVE DOUGHNUT Tactical Evaluation, n.d. Unclassified.

Source: http://www.dreamlandresort.com/black_projects, permission of T.D. Barnes

This briefing reports on the 1968 tactical evaluation effort designated HAVE DOUGHNUT – which focused on a MiG-21 aircraft provided to the U.S. by Israel. The purpose of the effort was to evaluate the effectiveness of Air Force and Navy tactical maneuvers against the MiG-21, optimize tactics and develop new ones needed to defeat MiG-21s, and evaluate the design, performance, and operation characteristics of the MiG-21.

 

Document 49: Rob Young, Project HAVE DOUGHNUT – Exploitation of the MIG-21, n.d. Unclassified.

http://www.dreamlandresort.com/black_projects, permission of T.D. Barnes

This briefing covers, inter alia, the background of the HAVE DOUGHNUT effort (Document 48, Document 50); data on sorties flown; lessons learned; the positive features, shortcomings, and unique design features of the MiG; and Air Force and Navy responses to the findings.

 

Document 50: Defense Intelligence Agency, FTD-CR-20-13-69-INT, Volume II, Have Doughnut (U) Tactical, August 1, 1969.

Source: http://www.scribd.com

This 310-page report, produced by the Air Force Foreign Technology Division, on behalf of DIA, presents the detailed results of the tactical evaluation, the MiG-21 obtained from Israel. The report focused on evaluating the effectiveness of existing tactical maneuvers by Air Force and Navy combat aircraft and associated weapons against the MiG-21. It also was intended to exploit tactical capabilities and limitations of the MiG-21 in aerial combat and help optimize existing tactics and develop new tactics to defeat the MiG-21.

 

Document 51: Thomas R. Woodford, HAVE DRILL/HAVE FERRY Tactical Evaluation, n.d., Unclassified.

Source: http://www.dreamlandresort.com/black_projects, permission of T.D. Barnes

This briefing on the 1969 exploitation of a MiG-17 provides weapon system highlights, key statements by Air Force and Navy officials – as well as the evaluation, general conclusions, and recommendations of the Tactical Air Command and Navy.

 

Document 52: Rob Young, National Air and Space Intelligence Center, HAVE DRILL/HAVE FERRY – Exploitation of the Soviet MiG-17F, n.d. Unclassified.

Source: http://www.dreamlandresort.com/black_projects, permission of T.D. Barnes

This briefing describes the specifics of the exploitation efforts, designated HAVE DRILL and HAVE FERRY, of two versions of the Soviet MiG-17F fighter plane. It specifies the versions of the plane in the possession of the Foreign Technology Division (now the National Air and Space Intelligence Center), U.S. test equipment, the testing effort, and lessons learned.

ODDS & ENDS

Document 53: Department of Defense Instruction S-5230.19, Subject: PROJECT HAVE NAME Security Classification Guide, July 2, 1979. Secret.

Source: Department of Defense Freedom of Information Act Release.

This heavily redacted instruction from 1979 may pertain to an aircraft or radar testing program (similar to HAVE GLIB, Document 6) at Groom Lake.

 

Document 54: “Stealth,” August 29, 1980. Top Secret.

Source: Record Group 59, PPS Records of Anthony Lake, 1977-1981, August 1980, National Archives and Records Administration.

This memo, found in the Anthony Lake’s State Department file for the 1977-1981 years, is an attempt at stealth humor.

 

Document 55: Walter D. Clark, Northrop Grumman Corporation, United States Patent, No. 7,108,230 B2, Aircraft with Topside Only Spoilers,

September 19, 2006. Unclassified.

Source: www.spacepatents.com/patented_inventions/pat7108230.pdf.

This patent is for a low-observable aircraft with improved roll control characteristics.

 

Document 56: DARPA Technology Transition (Arlington, Va.: Defense Advanced Research Project Agency, 1997), Unclassified.

Source: http://www.darpa.mil

These pages from this DARPA history cover the stealth fighter, TACIT BLUE (Document 53) and HAVE BLUE/F-117 programs.

 

Document 57: EAFB Instruction 31-17, Security Procedures for Inadvertent Tracking and Sensor Acquisition of Low Observable and Sight Sensitive Programs, November 14, 2005. Unclassified.

Source: Federation of American Scientists (www.fas.org).

This instruction from the commander of Edwards Air Force Base in California assigns agency responsibilities “during inadvertent or unauthorized tracking of sight-sensitive and low observable (LO) tests assets within the R-2508 complex located at Edwards.” It also notes that “it is strictly forbidden to train tracking sensors … on any LO or sight sensitive assets.”

 

Document 58: National Air Force Museum Fact Sheet, Northrop Tacit Blue, n.d. Unclassified.

Source: http://www.nationalmuseum.af.mil

This fact sheet provides basic details on the history of the TACIT BLUE surveillance aircraft (Document 51), that flew at Area 51, but was never put into production. It also provides data on the planes specifications and perofmance.

 

Document 59: U.S. Air Force, Fact Sheet, Boeing Bird of Prey, n.d. Unclassified.

Source: http://www.nationalmuseum.af.mil

This fact sheet provides a short history of the Bird of Prey aircraft developed by the McDonnell-Douglas Phantom Works (later acquired by Boeing). It provides information on the length of the program, its first flight, the number of flights, and the purpose of the program.

 

Document 60: U.S. Air Force, Fact Sheet, RQ-170 Sentinel, December 10, 2009. Unclassified.

Source: http://www.af.mil.

This very brief fact sheet acknowledged the existence and mission, of the RQ-170 drone โ€“ which had been spotted in use over Afghanistan and had been referred to as the “Beast of Kandahar.”

 


Notes

[1] Among the non-fiction books on Area 51, are David Darlington, Area 51 – The Dreamland Chronicles: The Legend of America’s Most Secret Military Base (New York: Henry Holt, 1997); Phil Patton, Dreamland: Travels Inside the Secret World of Roswell and Area 51 (New York: Villard, 1998); Annie Jacobsen, Area 51: An Uncensored History of America’s Top Secret Military Base (Boston: Little, Brown, 2011). For a critical review of Jacobsen’s book, see Robert S. Norris and Jeffrey T. Richelson, “Dreamland Fantasies,” Washington Decoded (www.washingtondecoded.com), July 11, 2011. Also, see Peter W. Merlin, “It’s No Secret – Area 51 was Never Classified,” available at www.dreamlandresort.com/pete/no_secret.html.

[2] Gregory Pedlow and Donald E. Welzenbach, The Central Intelligence Agency and Overhead Reconnaissance: The U-2 and OXCART Programs, 1954-1974 (Washington, D.C.: Central Intelligence Agency, 1992), p. 56. The history is available at: www2.gwu.edu/~nsarchiv/NSAEBB/NSAEBB434, posted on August 15, 2013.

[3] Ibid.

[4] Ibid., p. 57.

[5] Ibid., p. 274.

[6] Ibid., pp. 274, 284. The OXCART, KEDLOCK, TAGBOARD, and SR-71 Programs will be the subject of a future electronic briefing book.

[7] For the SKYLAB incident see, Dwayne Day, “Astronauts and Area 51: The Skylab Incident,” The Space Review (www.thespacereview.com), January 9, 2006.

[8] Trevor Paglen, Blank Spots: The Dark Geography of the Pentagon’s Secret World (New York: Dutton, 2009), p. 41.

[9] Pedlow and Welzenbach, The Central Intelligence Agency and Overhead Reconnaissance, p. 129-130, 259.

[10] Ben R. Rich and Leo Janos, Skunks Works: A Personal Memoir of My Years at Lockheed (Boston: Little, Brown, 1994), pp. 19-20. Overholser was one of three authors of a patent (5,250, 950) filed on February 13, 1979 (which they assigned to Lockheed) for a low-observable aircraft.

[11] Defense Advanced Research Projects Agency Technology Transition (Arlington, Va.: DARPA, n.d., but circa 1998-2000), p. 66.

[12] Rich and Janos, Skunk Works , p. 96.

[13] Use in the Balkans resulted in the loss of one plane, which was turned over to Russia, although the pilot was recovered. See Darrell Whitcomb, “The Night They Saved Vega 31,” Air Force Magazine , December 2006, pp. 70-74.

[14] The United States investigated the employment of stealth characteristics in satellites, ships, and missiles – specifically, the MISTY imagery satellite, the SEA SHADOW surface vessel, and the advance cruise missile. See, Jeffrey T. Richelson, “Satellite in the Shadows,” Bulletin of the Atomic Scientists, May/June 2005; “Sea Shadow,” http://www.lockheedmartin.com, accessed October 21, 2013; Defense Advanced Research Projects Agency Technology Transition, p. 115.

[15] Directorate of Intelligence, Central Intelligence Agency, Soviet Work on Radar Cross Section Reduction Applicable to a Future Stealth Program , February 1984, p. iii.

[16] Ian Black and Benny Morris, Israel’s Secret Wars: A History of Israel’s Intelligence Services, (New York: Grove, Weindenfeld, 1993), pp. 206-207; John Lowery, “Have Doughnut,” Air Force Magazine , June 2010, pp. 64-67; T.D. Barnes, “Exploitation of Soviet MiGs at Area 51,” http://area51specialprojects.com/migs_area51.html, accessed November 20, 2010.

[17] Barnes, “Exploitation of Soviet MiGs at Area 51.”

[18] “Air Force declassifies elite aggressor program,” November 13, 2006, http://www.af.mil. For histories of the effort see: Gaillard R. Peck, Jr., America’s Secret MiG Squadron: The Red Eagles of CONSTANT PEG (Long Island, N.Y. Osprey, 2012); Steve Davies, Red Eagles:America’s Secret MiGs (Long Islands, N.Y.: Osprey, 2008).

[19] “Slater Lake,” Roadrunners Internationale Monthly House Six News and Gossip , October 1, 2008, p. 8.

[20] For an account of the TACIT BLUE effort, see Peter Grier, “The (Tacit) Blue Whale,” Air Force Magazine , August 1996.

[21] For an account of the BIRD OF PREY program, see Bill Sweetman, “Bird of Prey,” Popular Science , January 2003, pp. 44-49.

[22] Sean D. Naylor, “Mission helo was secret stealth Black Hawk,” http://www.armytimes.com, May 4, 2011.

 

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, SECRET, THE NATIONAL SECURITY February 20, 2014December 25, 2017 37 Minutes

The NSA – Kissinger to Ford: “Smash Rumsfeld”


President Ford confers with Secretary of State Henry Kissinger and Deputy National Security Advisor Brent Scowcroft in the Oval Office, 8 October 1974, photograph by David Hume Kennerly (Photo from Gerald R. Ford Library, Image A1274-17A)

Kissinger to Ford: “Smash” Rumsfeld

Newly Declassified Telcons Show Conflict during Ford Years over Arms Control, Dรฉtente, Leaks, Angola

Kissinger Urged President to Tell Rumsfeld to “Get with It” on SALT, Pondered to Scowcroft Whether “We Should Let Angola Go,” and Disparaged Ford for “Popping Off” Publicly against Nixon

New Telcons are Subset of 800 Telcons Held up by State Department for Seven Years

National Security Archive Electronic Briefing Book No. 454

 

IN THE NEWS

Kissinger: The gift that keeps on giving
By Al Kamen, The Washington Post, January 24, 2014

A window on talking Kissinger
By Al Kamen, The Washington Post, January 23, 2014

RELATED POSTINGS

“Dr. Kissinger, Mr. President”
December 24, 2008

The Kissinger State Department Telcons
October 1, 2004

The Kissinger Telcons
May 26, 2004

 


Bookmark and Share

Washington, DC, January 24, 2014 โ€“ A recently declassified transcript of a telephone conversation (telcon) between Secretary of State Henry Kissinger and President Gerald Ford in December 1975 indicates tensions between Kissinger and Donald Rumsfeld’s Defense Department over the SALT II arms control agreement. Telling Ford that “we have [a] SALT agreement within our grasp,” Kissinger said “We can smash our opponents” [See document 6]. Describing elements of the agreement concerning air-launched and ship-launched cruise missiles (ALCMs and SLCMs), Kissinger worried that Rumsfeld was “beginning to dig into his people” and asked Ford to tell him that “you want them to get with it.” Kissinger expected that a successful SALT II agreement would lead to a summit with the Soviet leadership putting dรฉtente on a firmer footing and embellish Ford’s and Kissinger’s standing.

While Kissinger was confident that a SALT II agreement would clear the way for a U.S-Soviet summit, Ford was not going to “smash” opposition to SALT. With the Cuban role in the Angolan conflict already complicating relations with Moscow and Ford’s presidential campaign for 1976 in progress, he was reluctant to rile the Defense Department over SALT, much less invite criticism from the Republican right. Those concerns stalled any progress on dรฉtente; as Ambassador Raymond Garthoff later put it, 1976 was a “turning point in American-Soviet relations” because the Ford White House decided to “shelve” dรฉtente until after the elections.

The record of the Ford-Kissinger telephone conversation and other recently declassified telcon transcripts from State Department files show an aggravated Henry Kissinger facing opposition to policies of dรฉtente and strategic arms control that were virtually unchallenged during the Nixon years. These telcons show Kissinger losing his authority at the White House, trying to protect U.S.-Soviet dรฉtente from conservative attacks while waging Cold War in the Third World, trying to crack down on leaks, and maintaining ties with the disgraced former President Richard Nixon.

A major defeat was over Angola policy. In early January 1976, after the leak of a CIA covert operation which Congress refused to fund, Kissinger became regretful, suggesting to National Security Adviser Brent Scowcroft that “maybe we should let Angola goโ€ฆ. Maybe we just should not have started that operation” [See document 9]. Scowcroft declared that it was the “right” thing to do, but he could not argue when Kissinger said “the defeat they are inflicting on us is worse.” Kissinger saw U.S. credibility at risk when Washington was powerless to act against a Soviet ally in Southern Africa supported by Cuban troops.

The released telephone conversations also include the following discussions:

  • Running for election in 1976 Ford wanted the disgraced ex-president Richard Nixon to keep his distance. When it became known that Nixon was planning a visit to China, Ford said in an interview that the trip was “probably harmful” to his campaign. This upset Kissinger and Scowcroft, with Kissinger saying “What possessed the President to pop off again” [See document 12]. “It makes him look weak to say Nixon can hurt him.” Ford was already under attack from the Republican right and Kissinger worried that Ford’s defensiveness would hurt his position: some advisers worried that if Ford “does not get out ahead soon in foreign policy I [Kissinger] will be destroyed.”
  • Having lost his post as national security adviser during the 1975 “Halloween Massacre,” Kissinger did not like reminders, such as a White House statement that he no longer chaired National Security Council committees (as he had since 1969). “It sure isn’t helpful,” Kissinger complained to Scowcroft [See document 10].
  • Reflecting a perpetual annoyance with unauthorized disclosures, Kissinger purged several senior staffers from the State Department’s Bureau of African Affairs in December 1975, after U.S. aid to opposition groups in Angola leaked to the press. Kissinger told Scowcroft that “It will be at least a new cast of characters that leaks on Angola” [Seeย document 7].
  • Internal political differences over the meaning of dรฉtente surfaced during a Scowcroft-Kissinger discussion, in August 1975, over the draft of a speech for White House aide Robert Hartman. According to the draft “dรฉtente is a relationship among mortal enemies.” Kissinger saw the language as an “outrage”; it was “totally stupid” because it “fans the fire of the anti-dรฉtentists.” Hartman “has to make up his mind if he is going to be positive or not” [See document 10].

A protracted and wholly unnecessary appeals review process delayed the release of these documents for seven years. In 2007, in response to a FOIA request filed in 2001, the State Department denied over 800 telcons on “executive privilege” and FOIA (b) (5) pre-decisional grounds. The first group of telcons released under appeal, over 100 of them, are of Kissinger’s conversations with government and former officials during the Ford Administration, including President Ford, Scowcroft, Rumsfeld, Secretary of Agriculture Earl Butz, Treasury Secretary William Simon, and former President Richard Nixon, among others. They cover a variety of policy issues, including the SALT process, economic relations with the Soviet Union, and Congressional investigations of the CIA.

As interesting as the telcons are, they contain no information that ought to have been withheld. Unquestionably they include candid discussion of issues and personalities and inter-government decision-making generally, but that provides no excuse for agencies to apply the (b) (5) “pre-decisional” FOIA exemption to federal records produced decades ago. And “executive privilege” has its limits and has never before been applied to historical documents such as these. U.S. government officials made a mistake in denying the telcons in 2007; it would be interesting to know exactly why Bush administration officials reached the conclusion that these documents ought to be exempted altogether.

Today the National Security Archive is publishing a sampling of the 100 plus telcons recently released by the State Department. As the State Department makes the remaining withheld telcons available, they will be published on the Digital National Security Archive, which already includes The Kissinger Telephone Conversations and The Kissinger Transcripts.

 

Background

The telcons of Henry A. Kissinger have a long and checkered history.[1] When Kissinger was national security adviser and secretary of state, he had detailed records of his telephone conversations routinely prepared. This practice, known only to a few insiders, began when Kissinger became Richard Nixon’s national security adviser in January 1969. When he left the U.S. government in January 1977, Kissinger kept the telcons under his personal control by depositing them and other papers at the Library of Congress (where they would be exempt from the Freedom of Information Act). In 1981 the U.S. Supreme Court denied a Freedom of Information lawsuit against Kissinger on the grounds that the plaintiffs lacked legal standing to make the request in the first place. Only the federal government was in a legal position to recover the telcons from Kissinger’s papers.

The status of the telcons remained contested but unresolved for years. According to Kissinger’s deed of gift, his papers at the Library of Congress would not be available to researchers until five years after his death. Yet he was alive and well decades after his years in government and historians were keenly interested in the telcons for research on the Nixon and Ford administrations. The National Security Archive began to resolve the problem in February 2001, when at its request lawyers from the Mayer Brown law firm prepared a draft complaint which they circulated to the National Archives and the State Department. The complaint charged that Kissinger had unlawfully removed federal records from U.S. government control and that the two agencies had failed to recover them as required by federal records laws. Concerned about the possibility of protracted litigation that the Bush administration could lose, State Department legal adviser William Howard Taft IV asked Kissinger to return copies of the telcons to the National Archives and the State Department. Unless Kissinger wanted a legal battle with an administration that he supported, he had little choice.

Once the State Department received copies of the telcons covering Kissinger’s Secretary of State years, in August 2001 the National Security Archive filed a FOIA request for them (the telcons from 1969-1974 were processed by the National Archives for release in the Nixon presidential records). Over the next six years the Department of State broke up the thousands of telcon records into 12 separate tranches and coordinated their release with a variety of offices and agencies. Over 4,500 telcons were released in their entirety or in excised form. The excised telcons were appealed and the State Department adjudicated processing of many of them fairly quickly.

The most surprising development was the State Department’s decision, communicated to the Archive in June 2007, to deny over 800 telcons in their entirety because they “consist of pre-decisional deliberative process material and/or privileged presidential communications.” Exempted by this decision were hundreds of conversations between Kissinger and President Gerald Ford and other White House and cabinet officials from that period. This decision was made during the George W. Bush administration, in which Kissinger had some influence; given his long-standing efforts to control the record of his years in government, it is likely that Kissinger preferred that the telcons remain under wraps.

The National Security Archive immediately appealed the decision arguing that the State Department’s use of the executive privilege and the pre-decisional information claims was invalid. The appeal letter cited existing case law, e.g. Nixon v Freeman, which held that after ten years or so, the presidential communications privilege “begins to wear away to the point that the public interest in open access to historical information strongly outweighs any claim of confidentiality.” Therefore, “it follows that there can be no legitimate claim of privilege, much less confidentiality of communications, for the decades-old documents at issue in this appeal.”

In January 2009, just after the inauguration of President Obama, the Archive reminded the State Department about the pending appeal, asking that it take into account the President’s memorandum on the Freedom of Information Act which directs all agencies to “adopt a presumption in favor of disclosure” and to apply this presumption “to all decisions involving FOIA.” According to the president’s memorandum, the government “should not keep information confidential merely because public officials might be embarrassed by disclosure, because errors and failures might be revealed, or because of speculative or abstract fears.” The Archive reasoned that because that guidance “effectively nullifies any concerns about executive privilege or the disclosure of pre-decisional information, the argument for full release of the Kissinger telcons becomes even stronger.”

The State Department did not respond to the Archive’s letter with an affirmative decision and in April 2011, the Archive sent Mr. Blake Roberts at the White House General Counsel’s office a plea to expedite processing of the appeal. Citing Obama’s January 2009 memorandum, the Archive claimed that the “spirit of this order suggests a more objective approach that would reject making any assertions about applying executive privilege to 35-year old State Department records.” The Archive wondered “whether the Office of General Counsel has accepted the poorly-considered decision made during the Bush administration.” If the General Counsel rejected the Bush administration’s logic, “the documents at issue in this appeal could be released.”

Finally, thanks to the recent due diligence of the State Department’s Information Programs Services (IPS) office, the Department has released several batches of hitherto exempted documents. But hundreds more remain under review and it could take years before all of the telcons see the light of day. Admittedly, processing 800 documents is not easy, but it is unfortunate for historians and students of national security policy that the Bush administration’s initial poorly conceived decision took so long to correct.

 


THE DOCUMENTS

Note on the documents: All but 2 of the telcons published today are from a 20 November 2013 release by the State Department of the documents that had been withheld under (b) (5) or executive privilege grounds. Documents 1 and 3 below, however, are from a separate release on 3 July 2013 of telcons that the Department had denied in their entirety in 2005, on either privacy or national security grounds.

Document 1: Robert Bernstein-Kissinger, 28 August 1974

That Henry Kissinger would write his memoirs after eventually leaving government was widely assumed; the question of who would publish them was on the minds of some editors and publishers for years. Even a rumor that Kissinger was talking to a publisher made some executives “nervous” as Random House president Robert Bernstein acknowledged during a late August 1974 conversation. Newsweek magazine had reported talks with publishers but Kissinger declared that it was “an outrageous lie” and he would not “entertain offers” nor allow anyone to negotiate on his behalf while he was in office.

 

Document 2: Scowcroft-Kissinger, 30 January 1975 SD 318

Leaks were a constant concern and a New York Times story on an NSC meeting on the SALT talks and a CBS news story by Bob Schieffer caused anguish to both Kissinger and Scowcroft, who complained about the “total lack of honor and discretion.” Kissinger said that when meeting with Ford “almost every day I am in there crying” about the leaks. Both agreed that the U.S. Intelligence Board needed to do something about the problem.

 

Document 3: Kissinger-Larry Eagleburger, 2 May 1975

When the U.S.-supported Government of South Vietnam collapsed at the end of April 1975, Kissinger asked the Nobel Committee to accept the return of the Peace Prize that he had won, with North Vietnamese negotiator Le Duc Tho, in honor of the January 1973 Vietnam peace settlement. Apparently, the medal was ready for shipment back to Oslo. A day or so later, Kissinger told Lawrence Eagleburger, then Deputy Under Secretary of State for Management, that the Committee would not comply because they believed that it “was worthy of having been given.” Kissinger and Eagleburger agreed that he should go along with that because it would be “unseemly to fight with them to take the damn thing back.” Eagleburger said he would make sure that the medal was not sent back.

 

Document 4: Scowcroft-Kissinger, 25 July 1975

The problem of how best to position President Ford for a major foreign policy achievement surfaced during a discussion with Scowcroft over draft remarks prepared for Ford’s departure for the Helsinki Conference on Security and Cooperation in Europe. The draft included language about the Baltic States which said that the U.S. “has never recognized [their] incorporation” into the Soviet Union. The language was probably designed as a sop to conservative critics of dรฉtente, but such wording, Scowcroft said, was a “disaster.” Kissinger and Scowcroft agreed that it was “stupid” because Ford should leave for the conference on a “positive note.” “It is out of the question. He shouldn’t say what he is not doing.” The statement that Ford actually used for his departure from Andrews Air Force Base avoided the negative spin and took a positive approach to the Helsinki conference.[2]

 

Document 5: Scowcroft-Kissinger, 15 August 1975

Besides commenting on the Cold War language in the draft of Robert Hartman’s speech, Kissinger and Scowcroft discussed other matters including Scowcroft’s vacation housing in Vail, CO. Apparently, Kissinger was not fond of Vail because when Scowcroft said that the house was designed by a major architect there, Kissinger commented that was like saying “it is the best house in Bangladesh.”

 

Document 6: Ford-Kissinger, 10 December 1975

Kissinger was scheduled to go to Moscow in mid-December and was trying to position himself to reach an agreement with the Soviets on SALT II as the basis for a summit meeting in Moscow. Donald Rumsfeld’s Defense Department was raising critical questions about SALT but Kissinger hoped that Ford would work with him to “smash” the opposition and induce the Pentagon “to get with it.” But this was becoming problematic because Democratic and Republican hawks had been attacking the first SALT agreement and Ford was worried about political challenges from the Republican right, especially if the Joint Chiefs criticized a SALT II agreement. Thus, in mid-January 1976, just when Kissinger was in sight of reaching an agreement in Moscow, Defense officials worked behind his back to persuade Ford to abandon the State Department proposals. That outraged Kissinger but a new U.S. SALT position emerged which deferred decisions on controversial issues. The Soviets saw that as a “step back,” which meant that there was no prospect of an arms control agreement before the election. This development had significant consequences; as Ambassador Raymond Garthoff argued, it was a major reason why 1976 was a “turning point in American-Soviet relations,” even though the Soviets had reaffirmed dรฉtente, the Ford administration “shelve[d]” it and SALT until after the election.[3]

 

Document 7: Scowcroft-Kissinger, 18 December 1975

Here Kissinger and Scowcroft discuss the purge of the State Departmentโ€™s Africa Bureau. ย At a departmental meeting that day Kissinger said that the leaking of information about Angola policy was a โ€œdisgraceโ€ and that he wanted people who had worked on Angola โ€œtransferred out within two months.โ€ ย Assistant Secretary of State for African Affairs Nathaniel Davis, whom Kissinger associated with the leaks, had already resigned under protest (Davis was slated to be ambassador to Switzerland).[4]ย  The reference to the man who is a โ€œhogโ€ is obscure.

 

Document 8: Scowcroft-Kissinger, 22 December 1975

Kissinger did not want to attend a “G-D” meeting on drug policy but Scowcroft explained that James Cannon, President Ford’s domestic policy adviser, “wants you there very badly”–apparently for status reasons, but also because Cannon thought that the top diplomats “don’t pay any attention” to narcotics policy. Jokingly referring to right-wing attacks on the administration, Kissinger said “Of course. We are too busy selling the country out to the Russians.” Apparently Congressman Charles Rangel (D-NY) had just come back from Mexico and was “upset that the Mexicans are not doing anything” on narcotics policy, so Kissinger joked again: “Let’s let cut off aid, arms, or something.”

 

Document 9: Scowcroft-Kissinger, 6 January 1976

It was during this conversation that Kissinger said “Maybe we should let Angola go.”

 

Document 10: Scowcroft-Kissinger, 17 January 1976

Speaking with Scowcroft, Kissinger grumbled about this reminder of the White House-orchestrated “Halloween Massacre” in which he lost his post as national security adviser along with his position as chair of NSC committees. Concerned about Ford’s sagging popularity and his prospects for the 1976 elections, his political advisers sought dramatic cabinet changes, including firing Kissinger and the acerbic Secretary of Defense, James Schlesinger. Ford had no problem firing Schlesinger but would agree only to reduce Kissinger’s authority by replacing him with Brent Scowcroft as national security adviser.[5]

 

Document 11: Nixon-Kissinger, 13 February 1976

During this conversation, former President Nixon discussed with Kissinger his forthcoming trip to China, which would cause some heartache for President Ford who preferred that Nixon stay out of the limelight (see the next document). Kissinger seemed to like the idea, especially because he thought Nixon would help “get them off this idea we are soft on the Russians.” The conversation segued into the ongoing presidential campaign where Reagan was attacking Ford, which Nixon believed were abetted by former Secretary of Defense Schlesinger. Kissinger observed that if Schlesinger “keeps going after me I will have to go after him.” Nixon disagreed, arguing that the Secretary of State (and the Secretary of Defense) has “to stay out of political activity,” to which Kissinger assented.

 

Document 12: Scowcroft-Kissinger, 27 February 1976

After discussing scheduling issues, included the visit of Greek Prime Minister Konstantinos Karamanlis, Kissinger and Scowcroft commented critically on President Ford’s interview statements about Nixon’s trip to China. The “Abshire Group” reference is not entirely clear; David Abshire had been a leading Republican foreign policy expert, who served as assistant secretary of state for Congressional affairs during 1970-1973, and went on to high-level positions during the Reagan administration. The references to Chadrin and Vogel are obscure, but Kissinger and Scowcroft continued their critical assessment of President Ford and his political advisers. According to Scowcroft, the political people around President Ford were “just insane.” Bryce Harlow, who had worked as a political adviser for the Eisenhower and the Nixon White Houses, was having trouble arranging a meeting with Ford because “the guys he would criticize would be in there with him.”

 


NOTES

[1] For background on the Kissinger telcons, see “The Kissinger Telcons,” 26 May 2004 http://www2.gwu.edu/~nsarchiv/NSAEBB/NSAEBB123/index.htm, and “The Kissinger Telephone Conversation Transcripts,” 23 December 2008, http://www2.gwu.edu/~nsarchiv/NSAEBB/NSAEBB263/index.htm

[2] Public Papers of the Presidents of the United States Gerald R. Ford Containing the Public Messages, Speeches and Statements of the President 1975, Book II (Washington, D.C.: Government Printing Office, 1977), 1043-1044.

[3] Raymond L. Garthoff, Dรฉtente and Confrontation: American-Soviet Relations from Nixon to Reagan, 2nd Edition (Washington, D.C.: Brookings Institution, 1994). 594-604. For discussions of SALT options at the 21 January 1976 NSC meeting (held in Kissinger’s absence), Kissinger’s outraged reaction, and Ford’s decision for “deferral,” see U.S. Department of State, Foreign Relations of the United States, 1969-1976, Volume XXXIII (Washington, D.C., Department of State, documents 119, 120 , 130, and 131.

[4] For background on Angola policy, see John Prados, Safe for Democracy; The Secret Wars of the CIA (Chicago: Ivan R. Dee, 2006), 439-455, and Garthoff, Dรฉtente and Confrontation, 556-593.

[5] Jussi Hanhimaki, Flawed Architect: Henry Kissinger and American Foreign Policy (Oxford, 2004), 426-427; Walter Isaacson, Kissinger: A Biography (Simon & Shuster, 1992), 669-672.

 

 

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, THE NATIONAL SECURITY February 19, 2014December 25, 2017 15 Minutes

TOP-SECRET – Privacy and Civil Liberties Oversight Board NSA Bulk Telephone Records Collection Report

The following report was released January 23, 2014 by the Privacy and Civil Liberties Oversight Board. Statements from board members Elisebeth Collins Cook and Rachel Brand were released along with the report.

Privacy and Civil Liberties Oversight Board Report on the Telephone Records Program Conducted under Section 215 of the USA PATRIOT Act and on the Operations of the Foreign Intelligence Surveillance Court

  • 238 pages
  • January 23, 2014

Download

The PCLOB is an independent bipartisan agency within the executive branch established by the Implementing Recommendations of the 9/11 Commission Act of 2007.6 The Board is comprised of four part-time members and a full-time chairman, all appointed by the President and confirmed by the Senate. The Boardโ€™s authorizing statute gives it two primary responsibilities:

1) To analyze and review actions the executive branch takes to protect the Nation from terrorism, ensuring that the need for such actions is balanced with the need to protect privacy and civil liberties; and

2) To ensure that liberty concerns are appropriately considered in the development and implementation of laws, regulations, and policies related to efforts to protect the Nation against terrorism.

This Report arises out of the Boardโ€™s responsibility to provide oversight by analyzing and reviewing executive branch actions, in this case the operation of the Section 215 telephone records program.

โ€ฆ

B. Legal Analysis: Statutory and Constitutional Issues

Section 215 is designed to enable the FBI to acquire records that a business has in its possession, as part of an FBI investigation, when those records are relevant to the investigation. Yet the operation of the NSAโ€™s bulk telephone records program bears almost no resemblance to that description. While the Board believes that this program has been conducted in good faith to vigorously pursue the governmentโ€™s counterterrorism mission and appreciates the governmentโ€™s efforts to bring the program under the oversight of the FISA court, the Board concludes that Section 215 does not provide an adequate legal basis to support the program.

There are four grounds upon which we find that the telephone records program fails to comply with Section 215. First, the telephone records acquired under the program have no connection to any specific FBI investigation at the time of their collection. Second, because the records are collected in bulk โ€” potentially encompassing all telephone calling records across the nation โ€” they cannot be regarded as โ€œrelevantโ€ to any FBI investigation as required by the statute without redefining the word relevant in a manner that is circular, unlimited in scope, and out of step with the case law from analogous legal contexts involving the production of records. Third, the program operates by putting telephone companies under an obligation to furnish new calling records on a daily basis as they are generated (instead of turning over records already in their possession) โ€” an approach lacking foundation in the statute and one that is inconsistent with FISA as a whole. Fourth, the statute permits only the FBI to obtain items for use in its investigations; it does not authorize the NSA to collect anything.

In addition, we conclude that the program violates the Electronic Communications Privacy Act. That statute prohibits telephone companies from sharing customer records with the government except in response to specific enumerated circumstances, which do not include Section 215 orders.

Finally, we do not agree that the program can be considered statutorily authorized because Congress twice delayed the expiration of Section 215 during the operation of the program without amending the statute. The โ€œreenactment doctrine,โ€ under which Congress is presumed to have adopted settled administrative or judicial interpretations of a statute, does not trump the plain meaning of a law, and cannot save an administrative or judicial interpretation that contradicts the statute itself. Moreover, the circumstances presented here differ in pivotal ways from any in which the reenactment doctrine has ever been applied, and applying the doctrine would undermine the publicโ€™s ability to know what the law is and hold their elected representatives accountable for their legislative choices.

The NSAโ€™s telephone records program also raises concerns under both the First and Fourth Amendments to the United States Constitution. We explore these concerns and explain that while government officials are entitled to rely on existing Supreme Court doctrine in formulating policy, the existing doctrine does not fully answer whether the Section 215 telephone records program is constitutionally sound. In particular, the scope and duration of the program are beyond anything ever before confronted by the courts, and as a result of technological developments, the government possesses capabilities to collect, store, and analyze data not available when existing Supreme Court doctrine was developed. Without seeking to predict the direction of changes in Supreme Court doctrine, the Board urges as a policy matter that the government consider how to preserve underlying constitutional guarantees in the face of modern communications technology and surveillance capabilities.

โ€ฆ

E. Transparency Issues

In a representative democracy, the tension between openness and secrecy is inevitable and complex. The challenges are especially acute in the area of intelligence collection, where the powers exercised by the government implicate fundamental rights and our enemies are constantly trying to understand our capabilities in order to avoid detection. In this context, both openness and secrecy are vital to our survival, and we must strive to develop and implement intelligence programs in ways that serve both values.

Transparency is one of the foundations of democratic governance. Our constitutional system of government relies upon the participation of an informed electorate. This in turn requires public access to information about the activities of the government. Transparency supports accountability. It is especially important with regard to activities of the government that affect the rights of individuals, where it is closely interlinked with redress for violations of rights. In the intelligence context, although a certain amount of secrecy is necessary, transparency regarding collection authorities and their exercise can increase public confidence in the intelligence process and in the monumental decisions that our leaders make based on intelligence products.

In the aftermath of the Snowden disclosures, the government has released a substantial amount of information on the leaked government surveillance programs. Although there remains a deep well of distrust, these official disclosures have helped foster greater public understanding of government surveillance programs. However, to date the official disclosures relate almost exclusively to specific programs that had already been the subject of leaks, and we must be careful in citing these disclosures as object lessons for what additional transparency might be appropriate in the future.

The Board believes that the government must take the initiative and formulate long-term solutions that promote greater transparency for government surveillance policies more generally, in order to inform public debate on technology, national security, and civil liberties going beyond the current controversy. In this effort, all three branches have a role. For the executive branch, disclosures about key national security programs that involve the collection, storage and dissemination of personal information โ€” such as the operation of the National Counterterrorism Center โ€” show that it is possible to describe practices and policies publicly, even those that have not been otherwise leaked, without damage to national security or operational effectiveness.

With regard to the legislative process, even where classified intelligence operations are involved, the purposes and framework of a program for domestic intelligence collection should be debated in public. During the process of developing legislation, some hearings and briefings may need to be conducted in secret to ensure that policymakers fully understand the intended use of a particular authority. But the government should not base an ongoing program affecting the rights of Americans on an interpretation of a statute that is not apparent from a natural reading of the text. In the case of Section 215, the government should have made it publicly clear in the reauthorization process that it intended for Section 215 to serve as legal authority to collect data in bulk on an ongoing basis.

There is also a need for greater transparency regarding operation of the FISA court. Prospectively, we encourage the FISC judges to continue the recent practice of writing opinions with an eye to declassification, separating specific sensitive facts peculiar to the case at hand from broader legal analyses. We also believe that there is significant value in producing declassified versions of earlier opinions, and recommend that the government undertake a classification review of all significant FISC opinions and orders involving novel interpretations of law. We realize that the process of redacting opinions not drafted for public disclosure will be more difficult and will burden individuals with other pressing duties, but we believe that it is appropriate to make the effort where those opinions and orders complete the historical picture of the development of legal doctrine regarding matters within the jurisdiction of the FISA court. In addition, should the government adopt our recommendation for a Special Advocate in the FISC, the nature and extent of that advocateโ€™s role must be transparent to be effective.

It is also important to promote transparency through increased reporting to the public on the scope of surveillance programs. We urge the government to work with Internet service providers and other companies to reach agreement on standards allowing reasonable disclosures of aggregate statistics that would be meaningful without revealing sensitive government capabilities or tactics. We recommend that the government should also increase the level of detail in its unclassified reporting to Congress and the public regarding surveillance programs.

โ€ฆ

II. Overview of the PCLOBโ€™s Recommendations

A. Section 215 Program

Recommendation 1: The government should end its Section 215 bulk telephone records program.

The Section 215 bulk telephone records program lacks a viable legal foundation under Section 215, implicates constitutional concerns under the First and Fourth Amendments, raises serious threats to privacy and civil liberties as a policy matter, and has shown only limited value. As a result, the Board recommends that the government end the program.

Without the current Section 215 program, the government would still be able to seek telephone calling records directly from communications providers through other existing legal authorities. The Board does not recommend that the government impose data retention requirements on providers in order to facilitate any system of seeking records directly from private databases.

Once the Section 215 bulk collection program has ended, the government should purge the database of telephone records that have been collected and stored during the programโ€™s operation, subject to limits on purging data that may arise under federal law or as a result of any pending litigation.

The Board also recommends against the enactment of legislation that would merely codify the existing program or any other program that collects bulk data on such a massive scale regarding individuals with no suspected ties to terrorism or criminal activity. Moreover, the Boardโ€™s constitutional analysis should provide a message of caution, and as a policy matter, given the significant privacy and civil liberties interests at stake, if Congress seeks to provide legal authority for any new program, it should seek the least intrusive alternative and should not legislate to the outer bounds of its authority.

The Board recognizes that the government may need a short period of time to explore and institutionalize alternative approaches, and believes it would be appropriate for the government to wind down the 215 program over a brief interim period. If the government does find the need for a short wind-down period, the Board urges that it should follow the procedures under Recommendation 2 below.

Recommendation 2: The government should immediately implement additional privacy safeguards in operating the Section 215 bulk collection program.

The Board recommends that the government immediately implement several additional privacy safeguards to mitigate the privacy impact of the present Section 215 program. The recommended changes can be implemented without any need for congressional or FISC authorization. Specifically, the government should:

(a) reduce the retention period for the bulk telephone records program from five years to three years;

(b) reduce the number of โ€œhopsโ€ used in contact chaining from three to two;

(c) submit the NSAโ€™s โ€œreasonable articulable suspicionโ€ determinations to the FISC for review after they have been approved by NSA and used to query the database; and

(d) require a โ€œreasonable articulable suspicionโ€ determination before analysts may submit queries to, or otherwise analyze, the โ€œcorporate store,โ€ which contains the results of contact chaining queries to the full โ€œcollection store.โ€

โ€ฆ

Recommendation 12: The scope of surveillance authorities affecting Americans should be public.

In particular, the Administration should develop principles and criteria for the public articulation of the legal authorities under which it conducts surveillance affecting Americans. If the text of the statute itself is not sufficient to inform the public of the scope of asserted government authority, then the key elements of the legal opinion or other documents describing the governmentโ€™s legal analysis should be made public so there can be a free and open debate regarding the lawโ€™s scope. This includes both original enactments such as 215โ€™s revisions and subsequent reauthorizations. While sensitive operational details regarding the conduct of government surveillance programs should remain classified, and while legal interpretations of the application of a statute in a particular case may also be secret so long as the use of that technique in a particular case is secret, the governmentโ€™s interpretations of statutes that provide the basis for ongoing surveillance programs affecting Americans can and should be made public.

โ€ฆ

4. Expanding Relevance Beyond its Normal Legal Meaning

As illustrated above, precedent from other legal contexts involving the production of records does not support a concept of relevance like the one proffered by the government in support of the NSAโ€™s bulk calling records program. To be sure, the case law regarding civil discovery, grand jury subpoenas, and administrative subpoenas shows that relevance is interpreted broadly, and that incidental production of unrelated materials is accepted as essential to enable fulsome investigative efforts. Standards of relevance thus permit parties and the government to engage in a degree of fishing, so long as it is not arbitrary or in bad faith. But the case law makes equally clear that the definition of relevance is not boundless. And no case that we have found supports the interpretation of relevance embodied in the NSAโ€™s program.

Tacitly acknowledging that case law from analogous contexts is not adequate to support its position, the government suggests that Section 215 calls for โ€œan even more flexible standardโ€ of relevance. But none of the governmentโ€™s arguments, in our view, supports a definition of โ€œrelevantโ€ as broad as the one the government proffers.

First, had Congress wished to inscribe a standard of relevance in Section 215 even less exacting than those developed in analogous legal contexts, it could have done so. But contemporary statements from legislators, highlighted by the government itself, evince an intent to match Section 215 to the standards used in those contexts. The reference to grand jury subpoenas added to the statute in 2006 was meant to reassure those with concerns about the scope of Section 215 that the statute was consistent with practice in other fields.

Second, the fact that Section 215 requires only โ€œreasonable grounds to believeโ€ that records sought are relevant to an โ€œinvestigation,โ€ as the government emphasizes, does not call for a different standard of relevance than the one used in all other contexts. By demanding only โ€œreasonable grounds to believe,โ€ rather than certainty, that items sought are relevant to an investigation, the statute ensures that Section 215 is consistent with the analogous civil and criminal contexts โ€” where the requester need not show that every item sought actually is relevant in an evidentiary sense, but merely that the items reasonably may be. The statuteโ€™s reference to a reasonable belief about the items requested shows that it contemplates the same scenario faced in the subpoena and discovery arenas: the government seeks a category of items that it reasonably suspects, but cannot be sure, includes material pertinent to its investigation. That scenario, and the legal standards that govern it, still require some factual correlation between the category of documents defined by the government and the circumstances of the investigation for which they are sought. Indeed, Section 215โ€™s requirement of a โ€œstatement of factsโ€ supporting the governmentโ€™s belief underscores the importance of that context-specific inquiry.

Thus, even if the qualifier โ€œreasonable grounds to believeโ€ imposes a lower burden of proof on the government than if the statute simply authorized production of โ€œrelevantโ€ documents, Section 215 still embodies the assumption that specific facts will link the governmentโ€™s investigation to the particular group of records it seeks. That assumption is incompatible with a continuously renewed request for the daily acquisition of all records of a particular type.

Third, the unique characteristics of national security investigations do not warrant interpreting โ€œrelevanceโ€ expansively enough to support the NSAโ€™s program. The government argues, and we agree, that the scope of relevance varies based on the nature of the investigation to which it is applied. Accordingly, the government cites the โ€œremarkable breadthโ€ of the national security investigations with which Section 215 is concerned, as contrasted with ordinary criminal matters, and emphasizes that these investigations โ€œoften focus on preventing threats to national security from causing harm, not on the retrospective determination of liability or guilt for prior activities.โ€

These valid distinctions, in our view, simply mean that the government will be able to make qualitative showings of relevance more often in national security investigations than in others. Because the government is investigating a broader scope of actors, over a longer period of time, across a wider geographic range, and before any specific offense has been committed, more information can be expected to be legitimately relevant to its efforts. Such considerations do not call for the wholesale elimination of relevance as a meaningful check on the governmentโ€™s acquisition of items.

Finally, the heightened importance of counterterrorism investigations, as compared with typical law enforcement matters, does not alter the equation. Items either are relevant to an investigation or they are not โ€” the significance of that investigation is a separate matter. No matter how critical national security investigations are, therefore, some articulable principle must connect the items sought to those investigations, or else the word โ€œrelevantโ€ is robbed of meaning. Congress added a relevance requirement to Section 215 in 2006 knowing full well that the statute governs national security investigations. It cannot, therefore, have meant for the importance of such investigations to efface that requirement entirely.

In sum, we find the governmentโ€™s interpretation of the word โ€œrelevantโ€ in Section 215 to be unsupported by legal precedent and a subversion of the statuteโ€™s manifest intent to place some restriction, albeit a generous and flexible one, on the scope of the items that can be acquired under its auspices.

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, THE NATIONAL SECURITY AGENCY (NSA), THE WHITE HOUSE, TOP SECRET February 19, 2014December 25, 2017 12 Minutes

Cryptome unveils Stopping NSA

2014-0165.pdf NSA-GCHQ Allegedly Hack Cryptographer Quisquater February 2, 2014

Date: Sun, 02 Feb 2014 13:38:59 +0300
From: ianG
To: Phillip Hallam-Baker
Cc: Cryptography Mailing List
Subject: Re: [Cryptography] Now it’s personal — Belgian cryptographer MITM’d by GCHQ/NSA
List-Archive:

On 2/02/14 04:33 AM, Phillip Hallam-Baker wrote:

> Why assume that its the NSA/GCHQ?

Because the Belgians are saying it is, and because the Snowden revelations pointed at a persistent attack of the indicated parties.

We can play the game of “you don’t know that for a fact” forever, but at the end of the day, they will never enter court and let the court declare it a fact, so that easy excuse is their game, their rules, their victory.

Old military truism: the battle is won by the general that imposes his plan over the other.

> When I got stopped three times by UK customs on one trip during the crypto
> wars it was pretty obvious what was going on. But this incident could have
> been due to Iran, Israel, Russia, China (in no particular order) and there
> might well be more countries getting in on the pervasive intercept party.

I’ve got no doubt that others are attempting to hack into the telcos and whatever.

> This is not about stopping the NSA.

I think there are several considerations here.

1. We need models of all players. We need statistics and likelihoods.

2. We have an attitude that keeps tripping us up on polite diversions such as “you don’t know that for a fact” or “these are the nice guys, they wouldn’t do it to you” or “the other guys are doing this, give us money!”

We need some way of avoiding our own biases, and that starts from knowing ourselves.

3. We need a model that describes the control that these folks have. Is it no control? Or is there some way to limit it? Right now the evidence suggests that there are no controls that haven’t been trashed by one means or another.

Facts claimed recently: they routinely lie to congress and court. The secret non-court never analysed mass surveillance before Snowden. They collect and target citizens. They hack allies, they spy on sovereigns, they spy for industry.

4. And, as a minor consideration for some citizens of some countries that have a no arbitrary search or seizure clause, we need the facts to see if they have self-declared themselves the subject of criminal prosecution.

5. Ditto for alliances.

6. You can’t stop the Chinese unless you’ve first stopped the NSA. Ditto for 5-eyes. Unless you have principles, you cannot decide when and how to face up to your external threats, you cannot even differentiate external from internal.

7. GCHQ, ASD, the others, they more or less follow the NSA.

If you put it all together, at a first order of approximation, maybe it is that: about stopping the NSA.

> The NSA wanabees are far more numerous
> and likely just as well resourced. They won’t have as much cash but they
> will use what they have at least ten times more effectively.

Idk. I think the others are well-outclassed at this stage. Back in the cold war, the Russians did a pretty good job in humint. They still couldn’t match the satellite & sigint assets tho. The Chinese, now? I have no idea, I have yet to see any real unbiased data (by that I mean data that has been released for the direct purpose of convincing congress to fund cyberwar).

What’s their budget this year?

I agree on one point — the Chinese seem to be more focussed on economic theft than trying to mass surveille the world of angry birds. I really would be asking for my money back if I was congress.

> We do have a model for protecting Web sites that works pretty well called
> PCI. That is the scheme that the credit card companies developed to protect
> their assets when they are exposed online. PCI is supported by numerous
> tools and services that provide compliance checking. It isn’t perfect but
> it is a known starting point.
>
> What we need is PCI for social media sites and for email providers. It does
> not have to be perfect and it won’t be. But it will be a start.

Well. PCI models against hacks and insider attacks.

Then there is mass surveillance. The model against mass surveillance has been known for 2 decades: mass crypto. Yet, we’ve never been able to get that idea through to the NISTs, the IETF, the committees, the toolmakers, etc.

It would be a mighty fine idea if NIST were to come out and start pushing opportunistic encryption, but they do not serve the users, they serve the toolmakers, who use cryptography as a discriminator. You can’t have a national standard without a national industry to sell tools.

Then there is phishing. The model against phishing — which was used in the belgacom attack — has been known for 2 decades as well, it was built into secure web browsing. But it never worked, and the tool makers like it that way.

> And unlike
> the credit card companies we have a lot more ability to change our
> credentials.

Exactly — change! Maybe we need those people who build PCI and FIPS and whathaveyou to start recognising that the models they built have to actually work. Else they should fall on their swords, because they are incapable of changing.

Pigs might fly. PCI like all such more likely exists to serve PCI people. We definitely don’t want such a millstone around the social network folks. We want them to change, to face their threats as they evolve.

iang

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, CRYPTOME, MEDIA, THE NATIONAL SECURITY AGENCY (NSA) February 3, 2014December 28, 2017 4 Minutes

Unveiled – Privacy and Civil Liberties Oversight Board NSA Bulk Telephone Records Collection Report

PCLOB-Report
The following report was released January 23, 2014 by the Privacy and Civil Liberties Oversight Board. Statements from board members Elisebeth Collins Cook and Rachel Brand were released along with the report.

Privacy and Civil Liberties Oversight Board Report on the Telephone Records Program Conducted under Section 215 of the USA PATRIOT Act and on the Operations of the Foreign Intelligence Surveillance Court

238 pages
January 23, 2014

Download

The PCLOB is an independent bipartisan agency within the executive branch established by the Implementing Recommendations of the 9/11 Commission Act of 2007.6 The Board is comprised of four part-time members and a full-time chairman, all appointed by the President and confirmed by the Senate. The Boardโ€™s authorizing statute gives it two primary responsibilities:

1) To analyze and review actions the executive branch takes to protect the Nation from terrorism, ensuring that the need for such actions is balanced with the need to protect privacy and civil liberties; and

2) To ensure that liberty concerns are appropriately considered in the development and implementation of laws, regulations, and policies related to efforts to protect the Nation against terrorism.

This Report arises out of the Boardโ€™s responsibility to provide oversight by analyzing and reviewing executive branch actions, in this case the operation of the Section 215 telephone records program.

โ€ฆ

B. Legal Analysis: Statutory and Constitutional Issues

Section 215 is designed to enable the FBI to acquire records that a business has in its possession, as part of an FBI investigation, when those records are relevant to the investigation. Yet the operation of the NSAโ€™s bulk telephone records program bears almost no resemblance to that description. While the Board believes that this program has been conducted in good faith to vigorously pursue the governmentโ€™s counterterrorism mission and appreciates the governmentโ€™s efforts to bring the program under the oversight of the FISA court, the Board concludes that Section 215 does not provide an adequate legal basis to support the program.

There are four grounds upon which we find that the telephone records program fails to comply with Section 215. First, the telephone records acquired under the program have no connection to any specific FBI investigation at the time of their collection. Second, because the records are collected in bulk โ€” potentially encompassing all telephone calling records across the nation โ€” they cannot be regarded as โ€œrelevantโ€ to any FBI investigation as required by the statute without redefining the word relevant in a manner that is circular, unlimited in scope, and out of step with the case law from analogous legal contexts involving the production of records. Third, the program operates by putting telephone companies under an obligation to furnish new calling records on a daily basis as they are generated (instead of turning over records already in their possession) โ€” an approach lacking foundation in the statute and one that is inconsistent with FISA as a whole. Fourth, the statute permits only the FBI to obtain items for use in its investigations; it does not authorize the NSA to collect anything.

In addition, we conclude that the program violates the Electronic Communications Privacy Act. That statute prohibits telephone companies from sharing customer records with the government except in response to specific enumerated circumstances, which do not include Section 215 orders.

Finally, we do not agree that the program can be considered statutorily authorized because Congress twice delayed the expiration of Section 215 during the operation of the program without amending the statute. The โ€œreenactment doctrine,โ€ under which Congress is presumed to have adopted settled administrative or judicial interpretations of a statute, does not trump the plain meaning of a law, and cannot save an administrative or judicial interpretation that contradicts the statute itself. Moreover, the circumstances presented here differ in pivotal ways from any in which the reenactment doctrine has ever been applied, and applying the doctrine would undermine the publicโ€™s ability to know what the law is and hold their elected representatives accountable for their legislative choices.

The NSAโ€™s telephone records program also raises concerns under both the First and Fourth Amendments to the United States Constitution. We explore these concerns and explain that while government officials are entitled to rely on existing Supreme Court doctrine in formulating policy, the existing doctrine does not fully answer whether the Section 215 telephone records program is constitutionally sound. In particular, the scope and duration of the program are beyond anything ever before confronted by the courts, and as a result of technological developments, the government possesses capabilities to collect, store, and analyze data not available when existing Supreme Court doctrine was developed. Without seeking to predict the direction of changes in Supreme Court doctrine, the Board urges as a policy matter that the government consider how to preserve underlying constitutional guarantees in the face of modern communications technology and surveillance capabilities.

โ€ฆ

E. Transparency Issues

In a representative democracy, the tension between openness and secrecy is inevitable and complex. The challenges are especially acute in the area of intelligence collection, where the powers exercised by the government implicate fundamental rights and our enemies are constantly trying to understand our capabilities in order to avoid detection. In this context, both openness and secrecy are vital to our survival, and we must strive to develop and implement intelligence programs in ways that serve both values.

Transparency is one of the foundations of democratic governance. Our constitutional system of government relies upon the participation of an informed electorate. This in turn requires public access to information about the activities of the government. Transparency supports accountability. It is especially important with regard to activities of the government that affect the rights of individuals, where it is closely interlinked with redress for violations of rights. In the intelligence context, although a certain amount of secrecy is necessary, transparency regarding collection authorities and their exercise can increase public confidence in the intelligence process and in the monumental decisions that our leaders make based on intelligence products.

In the aftermath of the Snowden disclosures, the government has released a substantial amount of information on the leaked government surveillance programs. Although there remains a deep well of distrust, these official disclosures have helped foster greater public understanding of government surveillance programs. However, to date the official disclosures relate almost exclusively to specific programs that had already been the subject of leaks, and we must be careful in citing these disclosures as object lessons for what additional transparency might be appropriate in the future.

The Board believes that the government must take the initiative and formulate long-term solutions that promote greater transparency for government surveillance policies more generally, in order to inform public debate on technology, national security, and civil liberties going beyond the current controversy. In this effort, all three branches have a role. For the executive branch, disclosures about key national security programs that involve the collection, storage and dissemination of personal information โ€” such as the operation of the National Counterterrorism Center โ€” show that it is possible to describe practices and policies publicly, even those that have not been otherwise leaked, without damage to national security or operational effectiveness.

With regard to the legislative process, even where classified intelligence operations are involved, the purposes and framework of a program for domestic intelligence collection should be debated in public. During the process of developing legislation, some hearings and briefings may need to be conducted in secret to ensure that policymakers fully understand the intended use of a particular authority. But the government should not base an ongoing program affecting the rights of Americans on an interpretation of a statute that is not apparent from a natural reading of the text. In the case of Section 215, the government should have made it publicly clear in the reauthorization process that it intended for Section 215 to serve as legal authority to collect data in bulk on an ongoing basis.

There is also a need for greater transparency regarding operation of the FISA court. Prospectively, we encourage the FISC judges to continue the recent practice of writing opinions with an eye to declassification, separating specific sensitive facts peculiar to the case at hand from broader legal analyses. We also believe that there is significant value in producing declassified versions of earlier opinions, and recommend that the government undertake a classification review of all significant FISC opinions and orders involving novel interpretations of law. We realize that the process of redacting opinions not drafted for public disclosure will be more difficult and will burden individuals with other pressing duties, but we believe that it is appropriate to make the effort where those opinions and orders complete the historical picture of the development of legal doctrine regarding matters within the jurisdiction of the FISA court. In addition, should the government adopt our recommendation for a Special Advocate in the FISC, the nature and extent of that advocateโ€™s role must be transparent to be effective.

It is also important to promote transparency through increased reporting to the public on the scope of surveillance programs. We urge the government to work with Internet service providers and other companies to reach agreement on standards allowing reasonable disclosures of aggregate statistics that would be meaningful without revealing sensitive government capabilities or tactics. We recommend that the government should also increase the level of detail in its unclassified reporting to Congress and the public regarding surveillance programs.

โ€ฆ

II. Overview of the PCLOBโ€™s Recommendations

A. Section 215 Program

Recommendation 1: The government should end its Section 215 bulk telephone records program.

The Section 215 bulk telephone records program lacks a viable legal foundation under Section 215, implicates constitutional concerns under the First and Fourth Amendments, raises serious threats to privacy and civil liberties as a policy matter, and has shown only limited value. As a result, the Board recommends that the government end the program.

Without the current Section 215 program, the government would still be able to seek telephone calling records directly from communications providers through other existing legal authorities. The Board does not recommend that the government impose data retention requirements on providers in order to facilitate any system of seeking records directly from private databases.

Once the Section 215 bulk collection program has ended, the government should purge the database of telephone records that have been collected and stored during the programโ€™s operation, subject to limits on purging data that may arise under federal law or as a result of any pending litigation.

The Board also recommends against the enactment of legislation that would merely codify the existing program or any other program that collects bulk data on such a massive scale regarding individuals with no suspected ties to terrorism or criminal activity. Moreover, the Boardโ€™s constitutional analysis should provide a message of caution, and as a policy matter, given the significant privacy and civil liberties interests at stake, if Congress seeks to provide legal authority for any new program, it should seek the least intrusive alternative and should not legislate to the outer bounds of its authority.

The Board recognizes that the government may need a short period of time to explore and institutionalize alternative approaches, and believes it would be appropriate for the government to wind down the 215 program over a brief interim period. If the government does find the need for a short wind-down period, the Board urges that it should follow the procedures under Recommendation 2 below.

Recommendation 2: The government should immediately implement additional privacy safeguards in operating the Section 215 bulk collection program.

The Board recommends that the government immediately implement several additional privacy safeguards to mitigate the privacy impact of the present Section 215 program. The recommended changes can be implemented without any need for congressional or FISC authorization. Specifically, the government should:

(a) reduce the retention period for the bulk telephone records program from five years to three years;

(b) reduce the number of โ€œhopsโ€ used in contact chaining from three to two;

(c) submit the NSAโ€™s โ€œreasonable articulable suspicionโ€ determinations to the FISC for review after they have been approved by NSA and used to query the database; and

(d) require a โ€œreasonable articulable suspicionโ€ determination before analysts may submit queries to, or otherwise analyze, the โ€œcorporate store,โ€ which contains the results of contact chaining queries to the full โ€œcollection store.โ€

โ€ฆ

Recommendation 12: The scope of surveillance authorities affecting Americans should be public.

In particular, the Administration should develop principles and criteria for the public articulation of the legal authorities under which it conducts surveillance affecting Americans. If the text of the statute itself is not sufficient to inform the public of the scope of asserted government authority, then the key elements of the legal opinion or other documents describing the governmentโ€™s legal analysis should be made public so there can be a free and open debate regarding the lawโ€™s scope. This includes both original enactments such as 215โ€™s revisions and subsequent reauthorizations. While sensitive operational details regarding the conduct of government surveillance programs should remain classified, and while legal interpretations of the application of a statute in a particular case may also be secret so long as the use of that technique in a particular case is secret, the governmentโ€™s interpretations of statutes that provide the basis for ongoing surveillance programs affecting Americans can and should be made public.

โ€ฆ

4. Expanding Relevance Beyond its Normal Legal Meaning

As illustrated above, precedent from other legal contexts involving the production of records does not support a concept of relevance like the one proffered by the government in support of the NSAโ€™s bulk calling records program. To be sure, the case law regarding civil discovery, grand jury subpoenas, and administrative subpoenas shows that relevance is interpreted broadly, and that incidental production of unrelated materials is accepted as essential to enable fulsome investigative efforts. Standards of relevance thus permit parties and the government to engage in a degree of fishing, so long as it is not arbitrary or in bad faith. But the case law makes equally clear that the definition of relevance is not boundless. And no case that we have found supports the interpretation of relevance embodied in the NSAโ€™s program.

Tacitly acknowledging that case law from analogous contexts is not adequate to support its position, the government suggests that Section 215 calls for โ€œan even more flexible standardโ€ of relevance. But none of the governmentโ€™s arguments, in our view, supports a definition of โ€œrelevantโ€ as broad as the one the government proffers.

First, had Congress wished to inscribe a standard of relevance in Section 215 even less exacting than those developed in analogous legal contexts, it could have done so. But contemporary statements from legislators, highlighted by the government itself, evince an intent to match Section 215 to the standards used in those contexts. The reference to grand jury subpoenas added to the statute in 2006 was meant to reassure those with concerns about the scope of Section 215 that the statute was consistent with practice in other fields.

Second, the fact that Section 215 requires only โ€œreasonable grounds to believeโ€ that records sought are relevant to an โ€œinvestigation,โ€ as the government emphasizes, does not call for a different standard of relevance than the one used in all other contexts. By demanding only โ€œreasonable grounds to believe,โ€ rather than certainty, that items sought are relevant to an investigation, the statute ensures that Section 215 is consistent with the analogous civil and criminal contexts โ€” where the requester need not show that every item sought actually is relevant in an evidentiary sense, but merely that the items reasonably may be. The statuteโ€™s reference to a reasonable belief about the items requested shows that it contemplates the same scenario faced in the subpoena and discovery arenas: the government seeks a category of items that it reasonably suspects, but cannot be sure, includes material pertinent to its investigation. That scenario, and the legal standards that govern it, still require some factual correlation between the category of documents defined by the government and the circumstances of the investigation for which they are sought. Indeed, Section 215โ€™s requirement of a โ€œstatement of factsโ€ supporting the governmentโ€™s belief underscores the importance of that context-specific inquiry.

Thus, even if the qualifier โ€œreasonable grounds to believeโ€ imposes a lower burden of proof on the government than if the statute simply authorized production of โ€œrelevantโ€ documents, Section 215 still embodies the assumption that specific facts will link the governmentโ€™s investigation to the particular group of records it seeks. That assumption is incompatible with a continuously renewed request for the daily acquisition of all records of a particular type.

Third, the unique characteristics of national security investigations do not warrant interpreting โ€œrelevanceโ€ expansively enough to support the NSAโ€™s program. The government argues, and we agree, that the scope of relevance varies based on the nature of the investigation to which it is applied. Accordingly, the government cites the โ€œremarkable breadthโ€ of the national security investigations with which Section 215 is concerned, as contrasted with ordinary criminal matters, and emphasizes that these investigations โ€œoften focus on preventing threats to national security from causing harm, not on the retrospective determination of liability or guilt for prior activities.โ€

These valid distinctions, in our view, simply mean that the government will be able to make qualitative showings of relevance more often in national security investigations than in others. Because the government is investigating a broader scope of actors, over a longer period of time, across a wider geographic range, and before any specific offense has been committed, more information can be expected to be legitimately relevant to its efforts. Such considerations do not call for the wholesale elimination of relevance as a meaningful check on the governmentโ€™s acquisition of items.

Finally, the heightened importance of counterterrorism investigations, as compared with typical law enforcement matters, does not alter the equation. Items either are relevant to an investigation or they are not โ€” the significance of that investigation is a separate matter. No matter how critical national security investigations are, therefore, some articulable principle must connect the items sought to those investigations, or else the word โ€œrelevantโ€ is robbed of meaning. Congress added a relevance requirement to Section 215 in 2006 knowing full well that the statute governs national security investigations. It cannot, therefore, have meant for the importance of such investigations to efface that requirement entirely.

In sum, we find the governmentโ€™s interpretation of the word โ€œrelevantโ€ in Section 215 to be unsupported by legal precedent and a subversion of the statuteโ€™s manifest intent to place some restriction, albeit a generous and flexible one, on the scope of the items that can be acquired under its auspices.

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, THE NATIONAL SECURITY AGENCY (NSA) January 26, 2014December 28, 2017 12 Minutes

TOP-SECRET – NSA Special Source Operations – DK Duplicate

NSA Special Source Operations – DK Duplicate

Download Link below

nsa-sso-dk

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, THE NATIONAL SECURITY AGENCY (NSA), TOP SECRET January 15, 2014January 10, 2018 1 Minute

Unveiled – NSA Intellipedia: Vatican City /via

NSA Intellipedia: Vatican City /via

Download below

nsa-vatican-city

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, SPIES, THE NATIONAL SECURITY AGENCY (NSA) January 8, 2014January 10, 2018 1 Minute

Report – To Combat the NSA Industries of the World

To Combat the NSA Industries of the World

30 selections from 1000s more available.

2 January 2013

13. Philip Zimmermann: http://www.philzimmermann.com/EN/background/index.html

14. Tom Ritter: http://ritter.vg/

15. Matt Blaze: http://www.crypto.com/

16. Steven Bellovin: https://www.cs.columbia.edu/~smb/

17. David Emery: http://www.linkedin.com/pub/david-i-emery/25/1b9/742

18. Materials Science: http://en.wikipedia.org/wiki/Materials_science

19. Electrical Engineering: http://en.wikipedia.org/wiki/Electrical_engineering

20. Mechanical Engineering: http://en.wikipedia.org/wiki/Mechanical_engineering

21. Structural Engineering: http://en.wikipedia.org/wiki/Structural_engineering

22. Semiconductor Fabrication: http://en.wikipedia.org/wiki/Semiconductor_device_fabrication

23. Network Administration: http://en.wikipedia.org/wiki/Network_administrator

24. Cryptography: http://en.wikipedia.org/wiki/Cryptography

25. Communications Security: http://en.wikipedia.org/wiki/Communications_security

26. Random Number Generation: http://en.wikipedia.org/wiki/Random_number_generation

27. Deception: http://en.wikipedia.org/wiki/Deception

28. Secrecy: http://en.wikipedia.org/wiki/Secrecy

29. Black Chamber: http://en.wikipedia.org/wiki/Black_Chamber

30. TEMPEST: http://en.wikipedia.org/wiki/Tempest_%28codename%29

1 January 2013

1. Ross Anderson, Security Engineering, free: http://www.cl.cam.ac.uk/~rja14/book.html “This is the best book on the topic there is,” Bruce Schneier

1.1 Markus Kuhn: http://en.wikipedia.org/wiki/Markus_Kuhn_%28computer_scientist%29

2. Technical Surveillance Countermeasures: http://www.tscm.com/ 1,950 documents related to TSCM, 78,200 printed pages.

3. Bruce Schneier Books: https://www.schneier.com/books.html

4. Martin Kaiser, Odyssey of an Eavesdropper: http://www.martykaiser.com/odyssey2.htm

5. David Kahn, The Codebreakers: http://david-kahn.com/book-david-kahn-code-codebreakers-cryptography.htm

6. Duncan Campbell: http://www.duncancampbell.org

7. Matthew Aid: http://www.matthewaid.com

8. Mike Frost: http://www.amazon.ca/Spyworld-C-S-E-Spies-Canadians-World/dp/0770427073

9. Nicky Hager: http://www.nickyhager.info

10. Paul Kocher, Cryptography Research: http://www.cryptography.com

11. Daniel Bernstein: http://cr.yp.to

12. Dark Mail Alliance: http://darkmail.info

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, CRYPTOME, TOP SECRET January 2, 2014January 10, 2018 1 Minute

Unveiled – Utah Data Center of the NSA

UtahDataCenter0Proposed National Security Agency facility believed to be for communications interception purposes
Estimated costs range from $1.5-1.9 billion
1 million square foot, 65 Megawatt facility
UtahDataCenter1

The Utah Data Center (UDC) will be a highly secure 65 Mega Watt, Tier III National Security Agency datacenter facility to be located near Camp Williams, Utah. The fast-track program will consist of approximately 1 million square feet of new facilities, of which 100,000 ft2 will be mission-critical space with raised flooring, and the other 900,000 ft2 will be devoted to technical support and administrative space. Ancillary support facilities include water treatment facilities, electrical substations, a vehicle inspection facility and visitor control center, perimeter site security measures, fuel storage, chiller plants and fire suppression systems. The UDC will incorporate green building strategies and will be required to be a LEED certified facility, with the goal of obtaining a LEED Silver rating.
UtahDataCenter1

The construction of the facility has been broken into three phases.
Phase 1: 30 MW facility

A page from the 2010 Defense Budget justifications describes the initial phase of the project:

Construct 30 MW technical load data center to include modular structural components, finished flooring (both raised and administrative), ceiling, lighting, electrical, generators and associated air pollution control systems, mechanical, ventilation, and fire suppression. Also, these funds will provide utilities to include building electrical service, chilled water systems, communications, water, sanitary sewer and storm water management. Installed infrastructure will support 65MW technical load data center capacity for future expandability. The design is to be capable of Tier 3 reliability. Power density will be appropriate for current state-of-the- art high-performance computing devices and associated hardware architecture. U.S. Government and local support services will be provided. Security measures for this project include, but are not limited to a Visitor Control Center provided for data center personnel which is separate from the interim Visitor Control Center for construction personnel; perimeter security; and access control facilities. Physical and technical security of the construction site will be assured.

This project will be designed in accordance with the Uniform Federal Accessibility Standards (UFAS)/Americans with Disabilities Act (ADA) Accessibility Guidelines, Antiterrorism Force Protection (ATFP) standards and Unified Facilities Criteria (UFC) design standards.

โ€ฆ

PROJECT: Construct a 30 MW technical load data center and infrastructure for 65MW technical load data center capacity.

REQUIREMENT: This project is required to provide a 30MW technical load data center and infrastructure for 65MW technical load data center capacity to support mission. The project will include the following:

(1) Site
(a) Facility design goal will be to the highest LEED standard attainable within available resources and will include: sustainable site characteristics, water and energy efficiency, materials and resources criteria, and indoor environmental quality.
(b) Mechanical and electrical plants are to be housed in separate structures to prevent transfer of noise and vibrations to the data centers

(2) Facilities
(a) Data center technical load of 30 MW distributed across raised floor are the design parameters for the facility.
(b) The infrastructure support and administrative areas will be designed to support state-of-the-art high-performance computing devices and associated hardware architecture.
(c) Slab floor loading of approximately 1500 pounds per square foot (PSF)
(d) Enhancements to the building for IT and security include construction as a sensitive compartmented information facility (SCIF), as well as, requirements related to Antiterrorism Force Protection (ATFP).

(3) Structural
(a) Technical load will be distributed across the data center areas.
(b) Seismic considerations are to be made in the facility design.
(c) Data center areas are to have depressed concrete slab construction with a load bearing capacity of 1500 pounds per square foot
(PSF).
(d) Facility command and control contained in a central modular office component.
(e) Facility will have a loading dock with vehicle bays, three (3) of which are to be equipped with dock levelers sized to handle tractor trailers.

(4) Electrical
(a) Technical load capacity is 30 MW with loads distributed evenly across the data center areas.
(b) Supervisory Control and Data Acquisition (SCADA) to either PDU level or distribution panel level if required
(c) Dedicated substation for each critical UPS.
(d) UPS and generator backup for facility systems.
(e) Generators will include Selective Catalytic Reduction (SCR) pollution control equipment, chemical storage tanks and feed system.

(5) Mechanical
(a) Chilled water system to support both air and water cooled equipment.
(b) Each data center area is to have air cooled and water cooled equipment with Computer Room Air Handlers (CRAHs) located external to the raised floor area. The piping headers / systems are to be designed to accommodate future expansion.
(c) Back-up capability for mechanical equipment.
(d) Cooling Towers
(e) Air distribution redundancy for CRAHs.
(f) Fire Protection โ€“ Double interlocked pre-action fire protection system for all electrical and mechanical support spaces.
(g) Wet pipe for administrative and raised floor areas per DOD standards.

(6) Security systems
(a) Video surveillance
(b) Intrusion detection
(c) Access control system

Information on Phases 2 and 3 is welcome.
Project Contractor Information

W912DR-10-R-0015

In November 2009, the U.S. Army Corps of Engineers held two โ€œIndustry Daysโ€ for potential contractors interested in bidding on Utah Data Center contracts. The following two lists include the complete names, address, and contact information of all attendees to these events. A briefing given at these events is also available.

Utah Data Center Industry Day 1 Attendee List, November 5, 2009.
Utah Data Center Industry Day 2 Attendee List, November 14, 2009.

Location and Construction Photos

Camp Williams
Riverton, UT 84065

Overview of Camp Williams site. UDC will be located on the west side of the highway, on what was previously an airfield.

Layout of the UDC at Camp Williams.

Site layout from a U.S. Army Corps of Engineers brief.

UDC site looking west.

Utah Data Center site prior to construction.

Construction activity at the site, photo from June 2010.

Vehicles at the construction site.

Northern portion of the site. Notice the long black cable running from the side of the road, as well as the beginnings of fencing.

Conceptual layout of data halls to be constructed in UDC.

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, PUBLIC INTELLIGENCE, THE NATIONAL SECURITY AGENCY (NSA) December 28, 2013January 11, 2018 4 Minutes

Cryptome publishes – NSA Kills RSA Workers

NSA Kills RSA Workers

Related: http://cryptome.org/2013/12/nsa-kills-rsa.htm

Date: Tue, 24 Dec 2013

I have to say that the latest news makes me both heartbroken and angry.

I worked at RSA for 10 years, starting at Security Dynamics in 1997, when RSA Data Security Inc. was a recent acquisition. I was hired largely through the work I’d done in creating the Symmetric Key Cryptography contests.

Let’s not forget that RSA, for many years, strove to bring strong cryptography to the world (modulo requiring licensing of the algorithm). RSA opened an office in Australia so that independently developed crypto could be sold without export restrictions, and the symmetric key contests contributed to the relaxation of crypto export laws. For a very long time, the relationship between RSA and Federal agencies was far from cozy.

While I was there, I saw RSA Labs (which RSA DSI became) get moved from Silicon Valley to Bedford, MA, and gradually shrink in size and lose independence. When I left in early 2008, it was a not-very-long row of offices on one floor. The company culture changed greatly over time, first when Coviello took over from Bidzos, and then with the purchase by EMC.

The BSAFE library was at one point one of the most widely distributed pieces of software in the world, present in every copy of Windows, as well as most browsers. This is the library in which the compromised PRNG was made default (a process in which I had no part whatsoever; I’m not qualified in that area).

Despite the brave words of marketing, after the RSA patent expired in 2000, BSAFE sales plummeted. I just checked, and it looks like my current Windows system no longer has a copy.

I’m heartbroken, because I was proud to have worked there, and now I find that they sold their birthright for a mess of pottage.

I’m angry, because the next time I interview for a position, this is going to come up.

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, CRYPTOME December 25, 2013March 6, 2018 1 Minute

Unveiled – 12 Ways of NSA Suspicion

1. Partridge in a Pear Tree

I don’t mean to call people names. I’m only using Cookie’s post as a recent example, of which there are many. Cookie Cutter clearly doesn’t want to switch to scrypt, which AFAIK any non-dork can tell improves security against common real attacks, which far outweighs Cookie’s concerns about side-channel attacks, and OMG, what was that crazy rant about sprinkling secret data all over RAM? It’s just the output of a respected stream cipher! From where I’m sitting, Cookie’s position is so lame, it makes me think he may be getting paid to spread FUD.

So, is Cookie a dork or a shill? Do we live in a world where we can’t chat intelligently about security because of NSA shills, or is the world really full of that many dorks?

2. Turtle Doves

How can an untraceable pseudonym, such as me, post to a forum?

(Don’t say Tor — Tor is connection based and deliberately low-latency, so the source can be identified with IP packet correlation attacks. Untraceable pseudonyms use anonymizing remailers, which are message-based and deliberately high latency.)

3. French Hens

It’s not publically documented, but I hear TSMC added extra transistors to some Xilinx FPGAs, and the last I heard, no one had figured out what they were for.

On Tue, Dec 24, 2013 at 2:43 AM, wrote:

On 23/12/13 19:20 PM, wrote:

… And everyone is trying to reverse-engineer everyone else’s designs. All the underpinnings are there. And various parts of the US military and security establishment are quite aware – have, in fact, talked publicly about – the problem of “spiked” chips making it into their supply chains.

Aha. So, are there any case studies of this actually happening? This might shed light on the RDRAND question. If we had a documented case of (say) the Chinese slipping spiked chips in to one of the hot USAF toys, then we’d have some sense of how likely this is.

Then what?

Yet another arms race.

Papers, conferences, budgets, hype, FUD, gosh.

4. Colly Birds

Please do not email me anything that you are not comfortable also sharing with the NSA.

5. Gold Rings

There’s multiple archives of this mailing list, and starting you own is trivial:

http://lists.randombit.net/pipermail/cryptography/

https://www.mail-archive.com/cryptography@randombit.net

IMO ease of archiving and ease of passing around archives is one of the biggest strengths of mailing lists.

6. Geese-a-Laying

I’m in the Bitcoin community and we keep on talking about fully decentralized backends to mailing lists/usenet replacements, but until something like that is implemented, best to stick with the tried and true mailing list. When something like that is implemented, it’s gonna look rather like a mailing list…

Mailing lists are great infrastructure: a pragmatic centralized core to push messages around/moderate, and a whole host of decentralized infrastructure around them like multiple archiving services and a wide variety of client software to interface with.

I also note that it’s a pain in the butt to PGP sign message board posts, this is Cryptography after all…

7. Maids-a-Milking

https://en.bitcoin.it/wiki/Fidelity_bonds – Disclaimer: I invented them. Also “Just use fidelity bonds!” is a standard joke in the Bitcoin developer community, and for good reason.

8. Swans-a-Swimming

I don’t think a backdoor is likely to survive a serious audit. Code audits, done right by competent people, are tough.

Though, done right, they are expensive.

If crypto code is open source, most people will use it without careful examination on the assumption that someone else is going to audit it.

But, some people, relying on that code, *are* going to audit it.

9. Ladies Dancing

In any case, as others have pointed out here: Until Snowdonia, the general attitude of big business – the customers for BSAFE – would have been “I don’t care that the NSA can read my stuff, they’re the good guys, they don’t get involved in commerce, I have nothing to hide from them.”

10. Lords-a-Leaping

There is historical precedent on switching to old tech. The Battle of the Bulge was a surprise attack because Adolf Hitler — himself only, and not his generals — did not trust the crypto and comms anymore. He got suspicious about how many battles were going the enemy’s way.

In his last roll of the dice, Hitler sent all the orders by motorcycle riders. Total surprise.

11. Pipers Piping

> It’s an interesting question, and one worth studying for pedagogical
> motives. From my experiences from both sides, it is clear that both sides
> failed. But for different reasons.
> Hence, I’ve concluded that email is unsecurable.

Obviously. It will never be able to escape the non-body header content and third party routing, storage and analysis with any form of patching over today’s mail. And it’s completely ridiculous that people continue to invest [aka: waste] effort in ‘securing’ it. The best you’ll ever get clients down to is exposing a single ‘To:’ header within an antique transport model that forces you to authenticate to it in order to despam, bill, censor and control you.

That system is cooked, done and properly fucked. Abandon it. What the world needs now is a real peer to peer messaging system that scales. Take Tor for a partial example… so long as all the sender/recipient nodes [onions] are up, any message you send will get through, encrypted, in real time. If a recipient is not up, you queue it locally till they are… no third party ever needed, and you get lossless delivery and confirmation for free. Unmemorable node address?, quit crying and make use of your local address book. Doesn’t have plugins for current clients?, so what, write some and use it if you’re dumb enough to mix the old and new mail.

The only real problem that still needs solved is scalability… what p2p node lookup systems are out there that will handle a messaging world’s population worth of nodes [billions] and their keys and tertiary data? If you can do that, you should be able to get some anon transport over the p2p for free.

Anyway, p2p messaging and anonymous transports have all been dreamed up by others before. But now is the time to actually abandon traditional email and just do it. If you build it, they will come.

12. Drummers Drumming

With open source code the NSA would be foolish to install a true back door.

i.e. The NSA would be foolish to assume that they could craft a side door in open source code that would withstand the scrutiny of another nations security agency (ANSA). The folk I have encountered that work there (short and old list) are not foolish or stupid. Their data integrity folk are darn good.

I can see weaknesses to establish a class of ability or a time window. For example in the days that RSA and the NSA negotiated the $10M contract FPGA and ASIC attacks were the tools of a rare and limited set of nations and corporations. My memory may be fading but I recall this time frame and believe I heard “smart” folk indicate that this was not clearly beyond the tools of the spooks but was beyond the tool reach of even organized crime at that time. Key concept “at that time”.

I make weakness level security decisions all the time. I do not have the world’s strongest lock on my home. I have also not replaced the locks on my car. My gym locker lock is an easy to open high school grade combination padlock. Most of these locks I can still open with my eyes closed in moments the same as I could back in high school.

Down the road is a high voltage transformer with a lock on it. OK it looks like a lock but is a seal in the shape of a padlock. It is made of aluminum(?) for the most part and is designed to be cut off with cutters. The same as used to cut heavy aluminum and copper cables. It is tamper evident, it should withstand an attack for a little bit of time with a hammer or bashing with a rock. If a teenager busted in and fried his little brain till it burst the power company clearly is not maintaining an attractive nuisance. There is no master key to be lost. It could be made of more durable material like hardened steel and more but it does not need to be.

My thoughts on this is that if you wish to be NSA proof you have some work to do.

All of this does take me to a couple places:

First is a reminder of the Morris worm attacks. The Dad wrote a book and none in the community addressed these design flaws and bugs Jr. crafted a worm that escaped or was let free on the world. Not zero day, no criminal element, no national security enemy. The BSD folk seem to have learned this lesson.

Second: “Target”… clearly criminals were involved , national interests & government sponsored… not likely. The Price tag of the breach at Target is possibly astounding. Some credit card companies have eviscerated their limits to limit their risk. All they have to do is write a report…. “if Used @ Target establish limits and throttle the limit of abuse and liability”. There are many lessons to be learned here.

Third: can wait for the new year.

Forth/Fourth: All things are not equal and too many take two things as all the proof needed to take a product to market. Code reviews and code review tools need work today. The bad guys are looking at the same code you have. Clear, precise, testable…. etc… It is interesting that the word code is used in so many ways.

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, THE NATIONAL SECURITY AGENCY (NSA) December 25, 2013March 6, 2018 7 Minutes

Exposed – NSA TACLANE-Micro Network Encryptor Operatorโ€™s Guide

TACLANE-Micro Inline Network Encryptor Interface & Operatorโ€™s Guide

  • ฮผTL-027-05
  • 225 pages
  • For Official Use Only
  • July 10, 2007

Download

(U//FOUO) The purpose of this manual is to explain how to install, operate, and reconfigure the General Dynamics TACLANE-Micro (KG-175D) encryptor.

โ€ฆ

โ€ฆ

โ€ฆ

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, THE NATIONAL SECURITY AGENCY (NSA) December 5, 2013March 16, 2018 1 Minute

TOP-SECRET: Obama Administration White Paper on NSA Bulk Collection of Telephony Metadata

ADMINISTRATION WHITE PAPER: BULK COLLECTION OF TELEPHONY METADATA UNDER SECTION 215 OF THE USA PATRIOT ACT

  • 23 pages
  • August 9, 2013

Download

This white paper explains the Governmentโ€™s legal basis for an intelligence collection program under which the Federal Bureau of Investigation (FBI) obtains court orders directing certain telecommunications service providers to produce telephony metadata in bulk. The bulk metadata is stored, queried and analyzed by the National Security Agency (NSA) for counterterrorism purposes. The Foreign Intelligence Surveillance Court (โ€œthe FISCโ€ or โ€œthe Courtโ€) authorizes this program under the โ€œbusiness recordsโ€ provision of the Foreign Intelligence Surveillance Act (FISA), 50 U.S.C. ยง 1861, enacted as section 215 of the USA PATRIOT Act (Section 215). The Court first authorized the program in 2006, and it has since been renewed thirty-four times under orders issued by fourteen different FISC judges. This paper explains why the telephony metadata collection program, subject to the restrictions imposed by the Court, is consistent with the Constitution and the standards set forth by Congress in Section 215. Because aspects of this program remain classified, there are limits to what can be said publicly about the facts underlying its legal authorization. This paper is an effort to provide as much information as possible to the public concerning the legal authority for this program, consistent with the need to protect national security, including intelligence sources and methods. While this paper summarizes the legal basis for the program, it is not intended to be an exhaustive analysis of the program or the legal arguments or authorities in support of it.

EXECUTIVE SUMMARY

Under the telephony metadata collection program, telecommunications service providers, as required by court orders issued by the FISC, produce to the Government certain information about telephone calls, principally those made within the United States and between the United States and foreign countries. This information is limited to telephony metadata, which includes information about what telephone numbers were used to make and receive the calls, when the calls took place, and how long the calls lasted. Importantly, this information does not include any information about the content of those callsโ€”the Government cannot, through this program, listen to or record any telephone conversations.

This telephony metadata is important to the Government because, by analyzing it, the Government can determine whether known or suspected terrorist operatives have been in contact with other persons who may be engaged in terrorist activities, including persons and activities within the United States. The program is carefully limited to this purpose: it is not lawful for anyone to query the bulk telephony metadata for any purpose other than counterterrorism, and Court-imposed rules strictly limit all such queries. The program includes internal oversight mechanisms to prevent misuse, as well as external reporting requirements to the FISC and Congress.

Multiple FISC judges have found that Section 215 authorizes the collection of telephony metadata in bulk. Section 215 permits the FBI to seek a court order directing a business or other entity to produce records or documents when there are reasonable grounds to believe that the information sought is relevant to an authorized investigation of international terrorism. Courts have held in the analogous contexts of civil discovery and criminal and administrative investigations that โ€œrelevanceโ€ is a broad standard that permits discovery of large volumes of data in circumstances where doing so is necessary to identify much smaller amounts of information within that data that directly bears on the matter being investigated. Although broad in scope, the telephony metadata collection program meets the โ€œrelevanceโ€ standard of Section 215 because there are โ€œreasonable grounds to believeโ€ that this category of data, when queried and analyzed consistent with the Court-approved standards, will produce information pertinent to FBI investigations of international terrorism, and because certain analytic tools used to accomplish this objective require the collection and storage of a large volume of telephony metadata. This does not mean that Section 215 authorizes the collection and storage of all types of information in bulk: the relevance of any particular data to investigations of international terrorism depends on all the facts and circumstances. For example, communications metadata is different from many other kinds of records because it is inter-connected and the connections between individual data points, which can be reliably identified only through analysis of a large volume of data, are particularly important to a broad range of investigations of international terrorism.

Moreover, information concerning the use of Section 215 to collect telephony metadata in bulk was made available to all Members of Congress, and Congress reauthorized Section 215 without change after this information was provided. It is significant to the legal analysis of the statute that Congress was on notice of this activity and of the source of its legal authority when the statute was reauthorized.

The telephony metadata collection program also complies with the Constitution. Supreme Court precedent makes clear that participants in telephone calls lack a reasonable expectation of privacy for purposes of the Fourth Amendment in the telephone numbers used to make and receive their calls. Moreover, particularly given the Court-imposed restrictions on accessing and disseminating the data, any arguable privacy intrusion arising from the collection of telephony metadata would be outweighed by the public interest in identifying suspected terrorist operatives and thwarting terrorist plots, rendering the program reasonable within the meaning of the Fourth Amendment. Likewise, the program does not violate the First Amendment, particularly given that the telephony metadata is collected to serve as an investigative tool in authorized investigations of international terrorism.

 

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, THE NATIONAL SECURITY AGENCY (NSA), THE WHITE HOUSE August 13, 2013March 19, 2018 4 Minutes

Exposed – Ex-NSA Stewart Baker Testifies on Snowden

baker-13-0717

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, CRYPTOME, THE NATIONAL SECURITY AGENCY (NSA) July 23, 2013March 20, 2018 1 Minute

Unveiled – NSA Ft. Gordon Georgia โ€œSweet Teaโ€ Building Specifications

(U//FOUO) NSA Ft. Gordon Georgia “Sweet Tea” Building Specifications

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, PUBLIC INTELLIGENCE, THE NATIONAL SECURITY AGENCY (NSA) July 12, 2013March 20, 2018 1 Minute

Film – NSA – Die Fabrik der Spione

 

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, DOCUMENTARY, THE NATIONAL SECURITY AGENCY (NSA), VIDEO July 10, 2013March 21, 2018 1 Minute

Video – Inside – Die NSA

 

 

 

Der Dokumentation gelingt ein nie dagewesener Einblick in einen der geheimsten Spionagedienste der USA — die NSA. Es ist das erste Mal seit den Anschlรคgen vom 11. September, dass der Geheimdienst seine streng bewachten Tรผren fรผr Filmkameras geรถffnet hat. Dabei wird auch die Rolle der NSA im modernen, computergestรผtzten Spionagegeschรคft offenbart. Der Film zeigt, wie die NSA mit milliardenschwerer Technologie Amerikas Feinden Geheimnisse stiehlt und die Nation vor neuen Bedrohungen beschรผtzt.

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, SPIES, THE NATIONAL SECURITY AGENCY (NSA) July 10, 2013March 21, 2018 1 Minute

Insider-Report: Wie die NSA aus Ihren Daten von Google & Co. Ihr User-Profile erstellt

1234

Mehrere geheime Folien zur Veranschaulichung der Prozesse bei PRISM zeigen, wie das รœberwachungsprogramm des NSA vorgeht. Die Washington Post verรถffentlichte diese nun, um zu zeigen, wie bestimmte Profile von Zielpersonen angelegt und nach und nach zur Informationsgewinnung genutzt werden.

Grafik 1 zeigt, dass ein Analyst zunรคchst รผber Schlรผsselbegriffe und eine Zielperson eine gewรผnschte รœberwachung erklรคren muss. Diese Anfrage wird an einen Vorgesetzten weitergereicht. Dieser muss mit einer 51-prozentigen รœberzeugung dem Analyst Recht darin bestรคtigen, dass die Zielperson kein US-Bรผrger ist und sich auch zum Zeitpunkt der Anfrage nicht in den USA aufhรคlt, so die Washington Post. Geht es um bereits zu dieser Person gespeicherte Informationen, greift das FBI auch auf eigenen Datenbanken zurรผck. So wird noch einmal sichergestellt, dass es sich bei der Zielperson nicht um US-Bรผrger handelt. Zusรคtzlich dazu nutzt das FBI aber auch die Mรถglichkeiten der Privatunternehmen, mit denen es zusammenarbeitet. Die Informationen aus beiden Suchwegen landen dann beim NSA.

Diese Informationen werden dann in ein spezielles System eingespeist, das Audio-, Video-, Text- und Internetdaten analysieren kann (Grafik 2). So werden unter anderem auch der Aufenthalt der Zielperson und die Signatur dieser gefiltert. Diese Informationen kรถnnen auch in Echtzeit verarbeitet werden. Folgende Systeme sind dabei unter anderem zustรคndig: Mainway fรผr Anruflisten, Pinwale fรผr Videos, Nucleon fรผr Sprachnachrichten und Marina fรผr Internetverbindungen. Die Systeme Fallout und Conveyance sind, schรคtzt die Washington Post, dafรผr da, noch einmal final zu filtern. Dies soll die mรถglichen, so hereinkommenden Informationen รผber US-Bรผrger erneut reduzieren.

In der Grafik 3 ist zu sehen, dass Prism eine Mitteilung erhรคlt, sobald sich eine Zielperson beispielsweise bei Yahoo einloggt. Dann kann die NSA automatisch die entsprechenden Echtzeit-Informationen mitschneiden. Eine entsprechende Nummer gibt dann Angaben รผber das Medium Auskunft, das die Zielperson gerade nutzt: Microsoft, Yahoo, Facebook, Skype etc.

Am 5. April wurden so beispielsweise 117.675 Zielpersonen in Echtzeit รผberwacht, wie Grafik 4 zeigt. Die rote Einrahmung am unteren Ende zeigt etwas unscharf diese Zahl der รœberwachungen. Allerdings ist hier nicht ersichtlich, wie viele Informationen รผber andere Personen gesammelt wurden, die keine direkte Zielperson waren aber zum Zeitpunkt der รœberwachung mit dieser in Kontakt waren.

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, THE NATIONAL SECURITY AGENCY (NSA) July 1, 2013March 27, 2018 1 Minute

Video – Glenn Greenwald Interviews Former CIA Senior Adviser Ed Snowden

https://youtu.be/a50TA2vyoVg

 

Booz Allen’s PRISM Whistleblower, Ed Snowden, explains to the NY Times best selling author and award winning Guardian columnist Glenn Greenwald, that at 29 years of age, as an employee of an independent contractor (i.e. not an employee of the U.S. Government) he “had the authorities to wiretap anyone including the President.” Snowdon characterizes PRISM as “turnkey tyranny” and an “architecture of oppression.”

Copyright ยฉ 2013 Praxis Films / Laura Poitras. This item of information is made available pursuant to 17 U.S.C. sec. 107.

RELATED:

The Return Of McCarthyism: Obama’s “Insider Threat Task Force”; Federal Workers Ordered To Spy On Each Other; Talking To The Press Considered Espionage; Same Great Dental http://epwhitney.com/?p=1054

Valerie Plame Wilson And Joe Wilson: Risk Management Industrial Complex Is “Unaccountable” “Immense” “Ripe For Abuse” “Owe Snowden Debt Of Gratitude” http://epwhitney.com/?p=1076

Citizen Snowden: The Last Remaining Defense To Unbridled Executive Authority In A Post ‘Amnesty’ Republic http://epwhitney.com/?p=908

Better Than Perjury: How James Clapper Punk’d Ron Wyden, Ed Snowden And The Global Commentariat http://epwhitney.com/?p=732

Former NSA Senior Counsel, Lawfare’s Joel Brenner Sees Snowden As A Coward http://epwhitney.com/?p=647

Washington Post Columnist Marc Thiessen’s Frivolous Claim: “Greenwald’s crime is violating 18 USC ยง 798” http://epwhitney.com/?p=621

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, THE NATIONAL SECURITY AGENCY (NSA), VIDEO June 25, 2013March 28, 2018 1 Minute

TOP-SECRET – NSA Hardening Network Infrastructure: Security Recommendations for System Accreditors

NSA-IAD-HardeningInfrastructure
NSA-IAD-HardeningInfrastructure

1. (U) Purpose: Many networks run by public and private organizations have experienced intrusions in recent years, and this cyber exploitation has resulted in an unprecedented transfer of wealth due to lost intellectual property. The threats to our networks and systems exist across numerous components that include end-user-devices, servers, and infrastructure devices. To address threats to routers and other network infrastructure devices, the National Security Agencyโ€™s Information Assurance Directorate (IAD) is publishing this IAA to guide U.S. Government systems accreditorsโ€™ strategic plan for network hardening. IAD will also be releasing an UNCLASSIFIED Factsheet (MIT-003FS-2013) with the same recommendations to help other public and private sector organizations combat the challenge of cyber exploitation through hardening networks.

2. (U) Security Recommendations

(U) Device Integrity

Purchase network hardware only from the manufacturer or from resellers who are authorized and certified by the equipment manufacturer.
Use a trusted administrative workstation to compare the file hash for network device firmware to the manufacturerโ€™s published hash before installing new firmware on a network device. Periodically re-verify the file hash of the running firmware while the network device is in operation.
Avoid installing and do not run network device firmware versions that are no longer available from the manufacturer.
Shut down unused physical interfaces on network devices.
Implement access lists that allow only those protocols, ports and IP addresses that are required by network users and services, and then deny everything else.
Protect the network device configuration file from unauthorized disclosure. Take steps to avoid the appearance of plaintext passwords in the configuration file. Using encryption and/or a salted hash with iteration is critical to protect the confidentiality of passwords in configuration filesโ€”encoding alone is not enough.
Change passwords/keys immediately if the network device configuration file is transmitted in the clear (or is otherwise exposed) while containing non-encrypted passwords/keys.
Use secure protocols when transmitting network device configuration files.
Ensure that an audit event is created upon reboot and when configuration changes are applied to network devices.
Shut down unneeded services on network devices.
Review logs periodically to gain an in depth understanding of normal network behavior.

(U) Secure Management

Only use secure protocol standards (SSHv2; IKEv2/IPsec; TLS v1.0+) when performing remote management of network devices. For further details, see Annex C of NIAPโ€™s Network Device Protection Profile (NDPP) โ€“ http://www.niap-ccevs.org/pp.
Restrict remote management connectivity to only controlled machines that are on a separate security domain with robust protection.
Create and maintain a written network infrastructure security policy. This policy should identify who is allowed to log in to network infrastructure devices and who is allowed to configure network devices, and should define a plan for updating network device firmware at scheduled intervals.
Never use default usernames and/or passwords. The network infrastructure security policy should define password length and complexity requirements.
Use at least two authenticated NTP sources to maintain a consistent time among network devices.

(U) Secure Protocol Standards + Strong Cryptography

Follow NIST SP 800-131A guidance for cryptographic algorithm and key lengths when performing remote management of network devices, (e.g., transition to 2048-bit DH modulus for SSH key agreement and 2048-bit RSA certificates for SSH authentication).
When using SNMP, use SNMPv3 with encryption enabled and/or encapsulate all SNMP traffic in an IPsec tunnel.
All IPsec VPNs should conform to IETF standards and NIST SP 800-131A guidance. Employ IETF secure protocol standards where possible.
Invoke the FIPS 140 evaluated crypto engine in the network device, and configure algorithm selections that were validated through an NDPP evaluation. (Refer to the configuration guidance from the manufacturer to make these selections).

(U) Secure Logging

Use a remote audit server (e.g., Syslog server). Protect the integrity and confidentiality of audit data through establishing an IPsec VPN connection between critical network devices and an audit server.
Ensure that all network infrastructure devices create an audit event when configuration changes are applied, when operating system firmware is upgraded, and when the device is rebooted.
Ensure that logs are reviewed on a regular basis.

3. (U//FOUO) For further information, please contact your IAD Client Advocate. Military commands/services/agencies should call 410-854-4200, and Civil and Intelligence agencies should call 410-854-4790.

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, PUBLIC INTELLIGENCE, THE NATIONAL SECURITY AGENCY (NSA), TOP SECRET June 25, 2013March 28, 2018 3 Minutes

TOP-SECRET – NSA Mitigations Guidance for Distributed Denial of Service Attacks

NSA INFORMATION ASSURANCE DIRECTORATE

1 page
For Official Use Only
August 24, 2012

Download

1. (U//FOUO) Adversary actors in cyberspace continue to demonstrate the interest in and ability to execute Distributed Denial of Service (DDoS) attacks against the United States. The need to offer Internet services in support of mission requirements inherently exposes these services to malicious traffic and the potential for DDoS attack. Proactive preparation to ensure network resilience in the event of a DDoS event is essential. Reactive measures are feasible, but are often too slow to respond to the dynamic nature of todayโ€™s threat.

2. (U) Proactive DDoS Protections

a. (U) Establish connections with multiple Internet Service Providers (ISPs) for redundancy.
b. (U) Ensure Service Level Agreements with ISPs contain provisions for DDoS prevention (eg: through IP address rotation).
c. (U) Design network with redundant systems and sufficient excess capacity.
d. (U) Conduct rate-limiting of traffic at the network perimeter.
(U) Note: Quality of Service for Legitimate Traffic may also be adversely affected.
e. (U) Creation of backup, remote-site network infrastructure utilizing multiple addressing schemes
f. (U) Content Delivery Network (CDN) providers which host geographically or logically separated services can limit the impact of DDoS attacks.

3. (U) Reactive DDoS Protections:
a. (U) Execute Internet Service Provider address rotation.
b. (U) Blocking of source IP addresses generating DDoS traffic at enterprise boundary or within ISP infrastructure
(U) Note: Adversary capabilities will make blocking of individual addresses (or even blocks of addresses) very difficult to implement.
c. (U) Acquire increased bandwidth capability from ISP.

4. (U//FOUO) DDoS attacks are often used as a diversion for other more targeted attacks. Victims of DDoS attacks should conduct thorough reviews of their network infrastructure following an attack to ensure no additional malicious activity was conducted during or subsequent to a DDoS.

5. (U//FOUO) Questions concerning this Advisory should be directed to the NSA Information Assurance Customer Advocate Office at 410-854-4790.

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, CYBER-STASI, CYBERCRIME, INTERNET CRIME, PUBLIC INTELLIGENCE, TOP SECRET June 21, 2013March 31, 2018 1 Minute

The NSA – The Perpetual Struggle to Fathom Pyongyang’s Motives and Goals

For decades, the erratic behavior of North Korea’s enigmatic leaders has often masked a mix of symbolic and pragmatic motives, according to declassified documents posted today by the National Security Archive. During earlier crises, Kim Jong Un’s father and grandfather postured and threatened the region in ways markedly similar to the behavior of the new leader, the records show.

While the current Kim is acting even more stridently in some cases, the documents reveal a past pattern characterized by bellicose conduct. In 1994, for instance, North Korean military officers threatened the U.S. with a possible preemptive strike if circumstances called for it: “This will not be a situation like the Iraq war,” U.S. officials were told. “We will not give you time to collect troops around Korea to attack us.” Yet American analysts believed during these earlier episodes that Pyongyangโ€™s tone was aimed less at stoking hostilities than advancing a combination of practical objectives โ€“ from pushing the international community to accept North Korea’s position, to playing for time, to bolstering the leader’s political position at home.

Today’s posting provides a window into prior efforts to penetrate beneath North Korea’s shrill rhetoric to understand the logic, political dynamics and ultimate objectives underlying Pyongyang’s repeated threats against the U.S. and South Korea. Obtained through Freedom of Information Act requests, mostly from the State Department, these records describe events during the 1990s (the Clinton presidency) with notable echoes in the current crisis. Additional cables made public by WikiLeaks (Documents 12-14) take the story up to the Obama administration and provide assessments of Kim Jong Un himself.

The documents from 1994-95, which saw the first nuclear crisis with North Korea and the death of Kim Il Sung, include excerpts from the morning intelligence summaries prepared for the secretary of state that seek to assess the factors and interests driving such developments as:

North Korea’s initial response to U.S. plans to station Patriot missiles in North Korea, deemed by Pyongyang to be an “unpardonable grave military challenge.” This step was viewed as typical: “to record its strong opposition without committing itself to any particular line of action while it sorts out its options.” (Document 1)
The deepening crisis in 1994 over the North’s nuclear weapons program, and confrontations over inspections of North Korea’s nuclear facilities. One document records a frank warning from North Korean military officials during a meeting at Panmunjon: “this will not be a situation like the Iraq war. We will not give you time to collect troops around Korea to attack us. We will not attack the South first, but if it is clear you are going to attack, then we will attack.” Another document provides a fascinating evaluation of how China might respond to the outbreak of war on the peninsula should the nuclear crisis escalate. (Documents 2, 3 and 11)
Pyongyang’s withdrawal nearly 20 years ago from the Military Armistice Commission (MAC). The North described the MAC as part of the “useless” armistice. U.S. diplomats saw the issue as possibly tied to the leadership succession in Pyongyang, as Kim Jong Il was North Korea’s “supreme commander” and needed to be seen as directing any military negotiations. (Documents 4, 5, 9 and 10); and
The implications for North Korean policies of the death of Kim Il Sung and the prolonged consolidation of Kim Jong Il in power, a delay caused in part by Kim’s health problems. This led INR to conclude that “Kim Jong Il will have to make some leadership changes soon, to root out pockets of opposition and to put his own stamp on his regime.” (Documents 6, 7 and 8)

Three additional documents from 2009-2010, originally made public by WikiLeaks, provide reports from the U.S. embassy in Seoul about:

The possible motivations and goals behind the “rapid deterioration” in inter-Korea relations since the election of conservative Lee Myung Bak as president. Lee had begun turning away from the policy of engagement with North Korea followed by his predecessors (Documents 12 and 13). As the cables report, Pyongyang was motivated to drive home its conviction that it, not Seoul, called the shots on the peninsula. The embassy stressed, however, “the apathy โ€“ even nonchalance โ€“ with which the ROK public has reacted to the DPRK’s blasts. They see the DPRK as an object of pity, and the heightened North Korea rhetoric as a sign of distress rather than a realistic threat;” and
A discussion between former Assistant Secretary of State Kurt Campbell and South Korean officials and scholars on the prospects for the post-Kim Jong Il leadership (Document 14). The latter provides interesting assessments of Kim Jong Un’s background and possible challenges to his claim to the leadership position, particularly from his brother-in-law, Jang Song Taek. The State Department viewed these in light of three alleged coup attempts against Kim Jong Il in the late 1990s.

Not since the first Clinton administration, when the U.S. seriously considered military options to counter Pyongyang’s nuclear weapons ambitions, have North Korea’s rhetoric and actions seemed to carry such potentially grave consequences, intended or not. North Korea has pronounced the 1953 armistice null and void, declared the Korean peninsula in a state of war, closed the Kaesong inter-Korean industrial complex, warned other governments to evacuate their embassies in Pyongyang due to the threat of war, announced it is restarting nuclear processing facilities to support production of nuclear weapons, and making preparations to test a medium-range missile from the east coast of North Korea, possibly on the anniversary of Kim Il Sung’s birth. South Korea โ€“ all in response to the imposition of new UN economic sanctions on North Korea in retaliation for its recent nuclear weapons test.

While many if not most observers believe these actions are driven at heart by North Korea’s persistent demand to be taken seriously by the U.S. and to engage in direct talks with Washington about such key topics as a final peace settlement for the peninsula, political recognition and economic assistance, (not to mention solidifying Kim Jong Un’s leadership position with the military), these analysts also stress the potential for miscalculation by the young, untested North Korean leader. Current efforts to assess Kim Jong Un’s personality and rationality can be viewed against the background of prior such efforts, discussed in these documents, which provide something of a baseline for seeing how far he may be departing from what has been taken as “normal” for North Korea.

Documents

Document 1: DPRK – Reaction to Patriots, The Secretary’s Morning Intelligence Summary, INR, January 29, 1994 (Top Secret/Codeword)

Source: FOIA

This assessment looks at how North Korea might react to reports that the U.S. planned to deploy Patriot missiles in South Korea. Pyongyang’s initial response is characterized as typical: “to record its strong opposition without committing itself to any particular line of action while it sorts out its options.” Looking at an unattributed commentary issued by North Korea, the analysis notes that while the Patriot plan is called an “unpardonable grave military challenge,” no direct threats have yet been issued. North Korea’s precise reactions will turn on future events, i.e., actual deployment of the missiles, or an announcement of the start of the Team Spirit joint military exercises.

Document 2: China: Potential Response to Korean Contingencies, DIA Special Report, January 31, 1994 (Secret)

Source: FOIA

This DIA analysis examines possible Chinese responses in different Korean contingencies related to North Korea’s nuclear weapons program: the imposition of UN economic sanctions, and a military confrontation with North Korea. The report notes that Beijing faces special problems in dealing with Pyongyang’s nuclear ambitions. They need to “reconcile their interest in stability on the Korean Peninsula and long-standing ties to Pyongyang with their interests in a denuclearized peninsula, in avoiding isolation among UN Security Council (SC) members, and in maintaining stable relations with the US, Japan and South Korea.” In the event of economic sanctions, China would likely work to ameliorate the impact on North Korea, with the primary goal of preventing a political crisis growing out of North Korea’s economic collapse. If Pyongyang attacked South Korea, China would likely want to avoid giving military support and would work for an end to hostilities. Finally, if a broader war erupts involving US and South Korean forces, China likely would not respond with aggressive military action, but would take steps to secure its border and might consider deploying Chinese forces across the Yalu River to forestall the loss of all of North Korea to US and South Korea forces.

Document 3: DPRK: Hoping for Best, Bracing for Worst; The Secretary’s Morning Intelligence Summary, INR, March 29, 1994 (Top Secret/Codeword)

Source: FOIA

This assessment comes as the crisis over North Korea’s nuclear weapons program is deepening. The analysis argues that Pyongyang was surprised at how quickly the situation deteriorated with the US over the nuclear issue, and seemed to believe that the crisis was moving toward war. During what are described as cordial recent talks at Panmunjon, the North Koreans still presented with “remarkable frankness” the possibility of a pre-emptive attack by Pyongyang: “this will not be a situation like the Iraq war. We will not give you time to collect troops around Korea to attack us. We will not attack the South first, but if it is clear you are going to attack, then we will attack.” There is also a possible internal political angle, as Kim Jong Il, who is closely associated with the negotiations with the U.S. on the nuclear issue, may be anxious to demonstrate he has not been “taken in” by Washington and can stand up to outside pressure.

Document 4: Cable, Seoul 03560 to SecState, Subject: North Korea Unilaterally Declares Military Armistice Commission (MAC) “Useless,” Calls for “New Peace System,” April 28, 1994 (Secret)

Source: FOIA

This cable reports a statement North Korea presented to the Military Armistice Commission (MAC) that declared the armistice had become “useless” and that the Korean People’s Army (KPA) was going to cease participation in all MAC activities, would not recognize UNC participation in MAC functions, and that the KPA Supreme Command would deal directly with US Army representatives at Panmunjon to discuss military issues, including a new peace agreement. The South Korean Foreign Ministry’s reaction to this announcement was calm, viewing it as a “step in a very familiar pattern.” The US embassy in Seoul recommends taking a similarly calm approach, stressing there has been no change in the military situation on the peninsula, rejecting Pyongyang’s claim that the armistice was “abrogated” by US actions such as the planned deployment of Patriot missiles, and refusing to negotiate bilaterally with North Korea a new arrangement to replace the armistice.

Document 5: DPRK: New Arrangements; The Secretary’s Morning Intelligence Summary, INR, April 29, 1994 (Top Secret/Codeword)

Source: FOIA

Here, INR gives its initial read on North Korea’s actions regarding the armistice reported on in the cable above. The move to do away with the armistice is seen as one of Pyongyang’s central goals, one which it has pursued with additional diligence since the appointment of an ROK general as the UN Command’s MAC member in 1991. The move is also seen as possibly tied to the leadership succession in Pyongyang, as Kim Jong Il is North Korea’s “supreme commander” and needs to be seen as directing any military negotiations.

Document 6: DPRK: Death of Kim Il Sung; The Secretary’s Morning Intelligence Summary, INR, July 9, 1994 (Top Secret/Codeword)

Source: FOIA

In its early comment on the rise of Kim Jong Il to lead North Korea, INR notes that the new leader is not an unknown factor: he had been in charge of most affairs in North Korea for years, and had been taking credit and “calling the shots” for the third round of US-DPRK talks on the nuclear issue.

Document 7: DPRK: Not Much Movement; The Secretary’s Morning Intelligence Summary, INR, July 23, 1994 (Top Secret/Codeword)

Source: FOIA

Here, INR continues its assessments of the power succession in North Korea, examining the usual signs that Kim Jong Il is moving to solidify his position as the new leader, but notes there is no information, positive or negative, to judge the security of his position inside the North Korean leadership. Statements in the party-controlled press have warned against “the slightest attempt to damage” Kim Il Sung’s accomplishments, which suggest that the policy of engagement with the U.S. begun under him will continue to receive support from the new leadership. On the other hand, because of South Korea’s perceived disrespectful response to the elder Kim’s death, prospects for a North-South summit seem diminished, if only for the moment.

Document 8: DPRK: Slow-Motion Succession; The Secretary’s Morning Intelligence Summary, INR, August 25, 1994 (Top Secret/Codeword)

Source: FOIA

INR continues to sift the tea leaves on Kim Jong Il’s leadership position, as health issues and signs of other “forces at work” seem to be delaying consolidation of his succession. Kim’s health issues, reportedly including diabetes, have resulted in his prolonged public absence during a critical time, during which a leadership debate has seemed to reopen on two crucial policy areas: reunification and the economy. All in all, the INR analysts conclude that “Kim Jong Il will have to make some leadership changes soon, to root out pockets of opposition and to put his own stamp on his regime.”

Document 9: China/DPRK: MAC “Recall;” The Secretary’s Morning Intelligence Summary, INR, September 2, 1994 (Top Secret/Codeword)

Source: FOIA

INR reports here on Beijing’s decision, apparently made with little enthusiasm and only to signal support for Kim Jong Il, to recall its delegation from the Military Armistice Commission, inactive since North Korea rescinded its participation in April 1994 (see Documents 4 and 5 above). In reviewing this step, INR again tries to probe the motivations for North Korea’s decision to withdraw from the MAC: while these steps were personally identified with Kim Jong Il, it was unclear whether they were tied into the next round of US-DPRK talks or to a longer-range strategy related to broader questions of peace and security on the peninsula after the nuclear issue has been resolved. Even after withdrawing from the MAC, Pyongyang stressed that it would continue to abide by the essential provisions of the armistice.

Document 10: DPRK: Raising the Armistice Issue; The Secretary’s Morning Intelligence Summary, INR, September 10, 1994 (Top Secret/Codeword)

Source: FOIA

INR continues to probe and weigh the likely motivations behind North Korea’s decision to replace the 1953 armistice with a new agreement, a step that INR believes is driven by practical and symbolic reasons. In taking this step, Pyongyang seems to be sensitive to South Korea’s concerns, being both willing to play on these concerns for tactical reasons and aware that it is not realistic to exclude South Korea from any peace process. Internally, there are signs that the North Korean leadership reasoned that tangible changes in relations with the US would give pragmatists in the leadership leverage to carry out changes in economic and foreign policy. In moving slowly and carefully to dismantle the MAC machinery, it seems that North Korea does not want to destabilize the situation but does want the US to focus on the question of a new peace agreement.

Document 11: North Korea: “No” to Special Inspections; The Secretary’s Morning Intelligence Summary, INR, September 28, 1994 (Top Secret/Codeword)

Source: FOIA

A particularly sharp escalation in North Korean rhetoric, issued in a rare, toughly worded public statement by the Ministry of People’s Armed Forces regarding the negotiations over inspection of North Korea’s nuclear facilities, provides the occasion for another INR attempt to read the tea leaves. The North Korean broadside accused the U.S. of looking for the opportunity to build up its forces on the peninsula “behind the curtain of talks,” and of resorting to military threats, including operations of the USS Kitty Hawk and Independence in the waters around Korea. INR saw this statement as a challenge to members of the leadership who supported talks with the US, as the ministry’s statement echoed traditional, hard-line rhetoric referring to the military’s mission “to protect the socialist fatherland with guns, not words.” While INR saw the tough statement as a reaction to perceived pressure by the US and believed it might be targeted as much at the domestic audience as at the US, analysts thought it might also signify leadership differences coming to a head, and in a more visible fashion given the slow pace of the leadership succession. Regardless of these contending factors, “brinkmanship is a mainstay of the North’s negotiating repertoire,” and a manufactured crisis may in the end force the US to agree to a better deal.

Document 12: Cable, Seoul 000062 to SecState, Subject: North-South Rhetoric: A Year of Chill, January 13, 2009 (Confidential)

Source: Wikileaks

This cable provides the U.S. embassy’s assessment of the “rapid deterioration” in inter-Korea relations since the election of conservative Lee Myung Bak as ROK president a year earlier. (This begs comparison to the situation in 2013 confronting the new South Korea leader Park Geun Hye, daughter of long-time South Korean leader Park Chung Hee.) As the embassy sees it, Lee’s decision to rewrite the ground rules of inter-Korea relations (established over the past ten years by his predecessors Roh Moo Hyun and Kim Dae Jung, and marked by the deliberate cutting off of all North-South contacts), demanded a strong response to demonstrate that Pyongyang is still calling the shots. Seoul’s response has been “calm, even nonchalant,” a position which enjoys significant public support. The cable provides a good summary of the back-and-forth between Seoul and Pyongyang over the past year. In its closing comments, the embassy observes that “The North greeted Lee Myung-bak, as it has done with other past ROK presidents, with hostility and bluster.” but the cables author also notes that Pyongyang observed a certain etiquette, such warning Seoul several times before placing restrictions on border crossings.

Document 13: Cable, Seoul 000186 to SecState, Subject: Heated DPRK Rhetoric Gets Cool ROK Reaction, February 5, 2009 (Confidential)

Source: Wikileaks

This cable reports on the South Korean reaction to recent North Korean statements “nullifying” past inter-Korean agreements. Pyongyang’s comments seemed designed to increase tensions among South Koreans, though that was not the result so far, based on talks at Blue House, the ministries of Foreign Affairs, Defense and Unification. Here, Pyongyang’s “increasingly shrill” rhetoric is seen as a “desperate, but ineffective” effort to persuade ROK President Lee to change the South’s policies on North-South relations (see cable above). The embassy also views the North’s statement as a “plea for attention” from the new Obama administration. One concern voiced in the cable is that once the DRPK runs out of “rhetorical cards” to play, it may need to resort to a military provocation at sea or along the DMZ. The embassy also believes it unlikely that Pyongyang will close the Kaesong Industrial Complex, given the North’s continued encouragement of business there in late 2008. In its comment, the embassy stresses “the apathy โ€“ even nonchalance โ€“ with which the ROK public has reacted to the DPRK’s blasts. They see the DPRK as an object of pity, and the heightened North Korea rhetoric as a sign of distress rather than a realistic threat.”

Document 14: Cable, Seoul 000248 to SecState, Subject: A/S Campbell Discusses DP
RK Future with Experts, February 18, 2010 (C)

Source: Wikileaks

This embassy cable reports on a meeting that Assistant Secretary of State Kurt Campbell held with five South Korean opinion leaders and experts about future prospects in North Korea, where “regime succession” was fully underway to prepare for the post-Kim Jong Il era. Here, Campbell hears that it is difficult to predict if Kim Jong Un will be able to succeed his father, Kim Jong Il, without “sparking instability” in North Korea. There is disagreement among the experts about Kim Jong Un’s ability to secure the support of the ruling elites, with some arguing that his brother-in-law, Jang Song Taek, who has been spearheading the succession drive, could prove a strong rival and would probably be tempted to challenge him. Such coups were not unprecedented, as Kim Jong Il had foiled three such attempts in the late 1990s. Doubts are also expressed about Kim Jong Un’s lack of experience, compared to his father who had twenty years of experience as an official of the Korean Worker’s Party before his father died, as well as the benefit of years of guidance from Kim Jong Il after being officially named his father’s successor in 1980. Finally, the experts agree that a critical factor is Beijing’s obsession with North Korean stability at all costs.

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, THE NATIONAL SECURITY AGENCY (NSA) May 7, 2013April 13, 2018 14 Minutes

“The Future of Warfare Is Warfare in Cyberspace,” NSA Declared

Washington, D.C., April 26, 2013 โ€“ Since at least 1997, the National Security Agency (NSA) has been responsible for developing ways to attack hostile computer networks as part of the growing field of Information Warfare (IW), according to a recently declassified internal NSA publication posted today by the non-governmental National Security Archive (“the Archive”) at The George Washington University. Declaring that “the future of warfare is warfare in cyberspace,” a former NSA official describes the new activity as “sure to be a catalyst for major change” at the super-secret agency.

The document is one of 98 items the Archive is posting today that provide wide-ranging background on the nature and scope of U.S. cyber activities.

Activities in cyberspace โ€” both defensive and offensive โ€” have become a subject of increasing media and government attention over the last decade, although usually the focus has been on foreign attacks against the United States, most notably the Chinese government’s reported exploitation of U.S. government, commercial and media computer networks. At the same time, the apparent U.S.-Israeli created Stuxnet worm, designed to damage Iranian centrifuges, has put the spotlight on the United States’ own clandestine cyber efforts.

The NSA’s new assignment as of 1997, known as Computer Network Attack (CNA), comprises “operations to disrupt, deny, degrade or destroy” information in target computers or networks, “or the computers and networks themselves,” according to the NSA document.

Today’s posting by the Archive highlights various aspects of U.S. cyberspace activities and concerns going back to the late 1970s. The documents โ€” obtained from government and private websites as well as Freedom of Information Act requests โ€” originate from a wide variety of organizations. These include the White House and National Security Council, the National Security Agency, the Departments of Defense, Energy, and Homeland Security, the military services, the General Accounting/ Government Accountability Office, and the Congressional Research Service โ€” as well as three private organizations (Project 2049, Mandiant Corporation, and Symantec).

Source: Department of Homeland Security (see Document 52).

Among the highlights of the documents are:

The NSA’s earlier concerns about the vulnerability of sensitive computer systems to either viruses or compromise through foreign intelligence service recruitment of computer personnel (Document 1, Document 2, Document 3, Document 4, Document 9)
The Secretary of Defense’s March 1997 authorization of the National Security Agency to conduct computer network attack operations (Document 11)
Detailed discussions of Chinese computer network exploitation activities (Document 66, Document 79, Document 83)
Analyses of the Stuxnet worm (Document 40, Document 42, Document 44, Document 88)
Extensive treatments of intelligence collection concerning U.S. technologies through computer network exploitation (Document 18, Document 55, Document 63)

* * *
Cyberspace and U.S. National Security
By Jeffrey T. Richelson

In an October 2012 speech (Document 78), then-Secretary of Defense Leon Panetta told a group of business executives that “a cyber attack perpetrated by nation states [or] violent extremist groups could be as destructive as the terrorist attack on 9/11,” and raised the prospect of a “cyber Pearl Harbor.” In his February 2013 State of the Union address, President Barack Obama asserted that “our enemies are … seeking the ability to sabotage our power grid, our financial institutions, our air traffic control systems.” Later that month, Director of National Intelligence James R. Clapper led off his annual threat assessment (Document 90) appearance before the Senate Select Committee on Intelligence with a discussion of the Intelligence Community’s assessment of the cyber threat.1

Stuxnet: “The world’s first precision cybermunition.” Source: Department of Homeland Security (see Document 52)

Concern about the potential damage of cyber attack did not originate in the current administration. Even before the establishment of the computer connectivity of the current Internet-era, there was concern, including in the National Security Agency, about the threat of computer viruses (Document 1, Document 2, Document 3, Document 4, Document 5, Document 6) or the vulnerability of computer systems due to recruitment efforts by hostile intelligence services (Document 9). More recently, the William J. Clinton and George W. Bush administrations focused on the connection between cyberspace and national security, issued policy directives, and considered and/or authorized both public and covert actions.

Occasionally, some of those concerns have been met with skepticism. Critiques have included the assertion that the very structure of the Internet means it is not subject to a ‘Pearl Harbor’ type attack โ€” that is, an attack at single point. The association of power outages in the northeastern United States in 2003 and Brazil in 2007 with cyberattacks has been challenged by reviewers and experts โ€” who point to studies that concluded there were other, more mundane, causes. One writer has asserted that cyberwar is not here, and that it is not coming. Additional issues that have been raised include the lack of disclosed evidence with regard to more extreme claims concerning the threat, the dangers of threat inflation (including facilitating the expenditure on ‘cyber pork’), and the extent to which the costs of other types of criminal activity (such as car theft) dwarf the cost of cyber crime.2 What is indisputable, however, is the dramatic increase in attention โ€” both in the U.S. Government and private industry โ€” to activities in cyberspace in the last decade โ€” which has been reflected in both media coverage and the release of private and government documents.

Attacks & Exercises

Source: Defense Science Board. See Document 81.

Significant attention has been devoted, in both the classified and unclassified realms, to actual attacks as well as exercises that have sought to determine the vulnerability of key government and infrastructure systems to attack.

The Government Accounting Office (renamed the Government Accountability Office in 2004) reported (Document 6) that between April 1990 and May 1991, a period that encompassed Operations Desert Shield and Desert Storm, computer hackers from the Netherlands penetrated 34 Department of Defense sites. According to that report, the hackers were able to access “unclassified, sensitive information” concerning military personnel, logistics, and weapons systems development. The report also asserted that, particularly during times of international conflict, “such information … can be highly sensitive.”

In March and April 1994, according to GAO reports (Document 10a, Document 10b), the Air Force’s Rome Laboratory, in upstate New York, was targeted by a pair of hackers (a 16-year old British student and a 22-year old Israeli technician) who, using “Trojan Horse” and “sniffer” programs, managed to take control of the lab’s networks. In addition to taking all of the lab’s 33 subnetworks offline for several days, the hackers also stole air tasking order research data and gained access to systems at NASA’s Goddard Space Flight Center, Wright Patterson Air Force Base, and a variety of defense contractors.

Source: Defense Science Board. See Document 81.

In February 1998, several Department of Defense networks were attacked through a commonly understood vulnerability in the Solaris (UNIX-based) computer system โ€” the investigation of which was designated SOLAR SUNRISE. The attack involved probing Defense Department servers to determine if the vulnerability existed, and then exploiting it โ€” entering the system and planting a program to collect data. The hackers, ultimately discovered to be two California high school students, also mounted at least a second intrusion to extract data from the penetrated computers.3

In 2003, a series of computer intrusions were directed against the U.S. Defense Information Systems Agency (DISA), the U.S. Redstone Arsenal, the Army Space and Strategic Defense Command, and several DoD contractors – but they apparently went undetected for several months. That series of intrusions was labeled TITAN RAIN, and Defense Department investigators believed it to have originated in China. In June 2006, Department of Energy officials acknowledged that the names of and personal information of more than 1,500 National Nuclear Security Administration (NNSA) employees had been stolen due to network intrusion that apparently began in 2004.4

Another set of attacks that attracted attention (Document 27) was directed against former Soviet-controlled territories, and was widely believed to have been the work of the Russian government. On July 20, 2008, the Georgian president’s website was subjected to a denial-of-service attack. On August 8, a coordinated, distributed denial-of-service attack occurred on other Georgian government websites. At that time, Russian forces were engaged in combat with Georgian forces. Additional cyber attacks on Lithuanian and Kyrgzstan targets took place in June 2008 and January 2009, respectively. The attack on Lithuanian websites occurred three days after that country passed legislation outlawing the use of Soviet and communist symbols, while the January 2009 attack took place on the same day that Russia tried to pressure Kyrgyzstan to revoke U.S. access to the Bishkek airbase being used as a transit point for supplies to Afghanistan.5

Since that time there have been numerous reports of cyber incidents. Included have been a series of attacks on global energy targets, dubbed NIGHT DRAGON, a 2012 cyber attack on the Saudi Arabian state-owned Aramco oil company, and cyber attacks on U.S. banks and companies โ€” attacks alleged to have been the responsibility of Iran.6

Along with the actual intrusions that have been taking place for over two decades, the United States has also conducted a number of exercises and studies in an attempt to assess the extent of computer network vulnerability. The first exercise, designated ELIGIBLE RECEIVER, was conducted over 90 days in 1997, and involved a Red Team consisting of 35 individuals. Simulated, and apparently successful, cyber attacks were made against government and private power and communications networks in Oahu, Los Angeles, Colorado Springs, St. Louis, Chicago, Detroit, Washington, D.C., Fayetteville, and Tampa. The head of the Pentagon’s Joint Task Force – Computer Network Defense, wrote that the exercise “clearly demonstrated our lack of preparation for a coordinated cyber and physical attack on our critical military and civilian infrastucture.”7

A subsequent exercise, designated LIVEWIRE, was conducted by the Department of Homeland Security. In 2005, the CIA’s Information Operations Center conducted a three-day exercise, codenamed SILENT HORIZON. The objective of the exercise was to practice defending against a cyber attack that would be on the same scale as the September 11, 2001, events, and would target both governmental and private sectors.8

Intelligence and Threat Assessments

Intelligence/threat assessments concerning cyberspace include estimates of the current and projected future cyber capabilities and activities of a variety of nations and groups. They can also include assessments of the specific threats faced by government and private organizations in relation to the current state of cyber security.

In late 2012 and early 2013, several press sources reported that a national intelligence estimate focused on worldwide cyber activities had either been completed or was in the process of completion. An earlier estimate was produced in February 2004: NIE-2004-01D/I, Cyber Threats to the Information Infrastructure. An additional national intelligence product was produced for the Office of the Director of National Intelligence (ODNI) by the Intelligence Science Board – a January 2008 report titled Technical Challenges of the National Cyber Initiative. 9

None of those products has been released, even in redacted form. Estimates and assessments which have been released include those produced by the Congressional Research Service, the Defense Security Service, a ODNI component, and a contractor for the U.S.-China Security and Economic Review Commission. In 2007, the CRS examined (Document 24), inter alia, examples of vulnerabilities that terrorists might decide to exploit in attempting a coordinated cyberattack and ways that terrorists might be improving their cyber skills. The report, Terrorist Capabilities for Cyberattack: Overview and Policy Issues, noted different views concerning the ability of Al-Qaeda (or other terrorist groups) to launch a significant cyberattack and the related danger of a “Digital Pearl Harbor.” It also noted a CIA assessment, provided in April 2002 to the Senate Select Committee on Intelligence, that “cyberwarfare attacks against the U.S. critical infrastructure will become a viable option for terrorists as they become more familiar with the technology required for the attacks.”

A 2004 assessment of the intelligence threat (Document 18), particularly from nations or others seeking to conduct economic espionage was produced by the Interagency OPSEC Support Staff. One chapter focuses on ‘Computers and the Internet’. In addition to providing a history of Internet security and discussing the relationship between website content and operational security, it also explores the roots of network vulnerability and eight outsider attack techniques – including scanning, packet sniffing, and malware.

Several unclassified assessments (Document 26, Document 43, Document 63) by the Defense Security Service have focused on foreign attempts to acquire advanced U.S. technology. The most recent version (Document 63), as with previous versions, examines a variety of methods for acquiring information on U.S. technologies โ€” including “suspicious network activity,” which was the most prevalent collection method for “entities originating from East Asia and the Pacific.”

A similar type of assessment (Document 55) was produced in October 2011 by the Office of the National Counterintelligence Executive, a component of the Office of the Director of National Intelligence. The report, Foreign Spies Stealing US Economic Secrets in Cyberspace, examines the vulnerability of US technologies and trade secrets to cyberspace operations, the threat from specific collectors (including Russia, China, and U.S. partners), and the outlook for the future (including both “near certainties” and “possible game changers”).

Key assessments of Chinese computer network exploitation that are in the public domain have been produced either by contractors in response to tasking from the U.S.-China Economic and Security Review Commission or by private organizations. In October 2009, the review commission released Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation (Document 30). It examined Chinese computer network exploitation activities, strategy and operations during a military conflict, key entities in Chinese computer network operations, cyber-espionage, an operational profile of an advanced cyber intrusion and a chronology of alleged Chinese computer network exploitation activities.

A second report (Document 66), also produced for the U.S.-China review commission, and released in 2012, Occupying the High Ground, focused on Chinese capabilities for computer network exploitation. It included a look at the key entities and institutions supporting Chinese computer network operations, potential risks to the U.S. telecommunications supply chain, and the risks and reality of collaboration between U.S. and Chinese information security firms. Along with the reports for the review commission, two private organizations have produced detailed reports on PRC computer espionage activities. In 2012, a research group focused on China released a study (Document 79) based on open sources and computer-based investigations, examining the roles of several PLA organizations in cyber operations, including the Third Department of the PLA General Staff Department, its 2nd Bureau as well as its Beijing North Computer Center. Early the next year, the Mandiant computer security company released its study (Document 83) on the 2nd Bureau โ€” which discussed the tasking of the unit, its past espionage operations, attack lifecycle, and the unit’s infrastructure and personnel.

In contrast to the extensive public documents concerning China’s computer attack and exploitation activities, far less has appeared concerning similar Iranian activities. In 2012, Director of National Intelligence James Clapper did characterize them as “dramatically increasing in recent years in depth and complexity.” 10 A hearing in 2012 featured statements on Iranian cyber activities from two members of Congress and two non-governmental experts. (Document 71a, Document 71b, Document 71c, Document 71d).

Directives, Strategies, Policies, and Plans

While a number of presidential directives in earlier years addressed subjects such as communications security and information security, Presidential Decision Directive 63 (Document 12), Critical Infrastructure Protection, signed by President William J. Clinton on May 22, 1998, focused on protecting both “physical and cyber-based systems essential to the minimum operations of the economy and government.” Among the steps Clinton directed was the establishment of a National Infrastructure Assurance Plan, increased intelligence collection and analysis devoted to the cyber threat, and creation of a National Infrastructure Protection Center.

The George W. Bush administration produced a number of classified as well as unclassified documents concerning cyberspace. The first, National Security Presidential Directive 16 (NSPD-16) was reported to have been issued in July 2002 and provide guidelines for the conduct of offensive cyber operations. A public document, The National Strategy to Secure Cyberspace (Document 16), was released in February 2003 and was followed by the classified NSPD-38, with the same title, of July 7, 2004. A third classified directive, NSPD-54, Cyber Security and Monitoring, was issued on January 8, 2008. 11

President Obama has signed two Presidential Policy Directives concerning cybersecurity โ€” the still classified PPD-20 (title unknown) and PPD-21, “Critical Infrastructure Security and Resilience” (Document 86) โ€” the latter following the failure of two proposed pieces of cybersecurity legislation to make it through Congress. Its key components are its delineation of roles and responsibilities, of officials and agencies, its identification of three strategic imperatives, and its direction to the Secretary of Homeland Security on steps to take to implement the directive. Issued the same day was an executive order (Document 87) that focused solely on critical infrastructure cybersecurity โ€” including information sharing, reduction of cyber risk, and identification of critical infrastructure at greatest risk.

On May 8, 2009, the White House issued the results of its cyberspace policy review โ€” Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure (Document 28). It produced a plan that included establishing performance metrics, preparing a cybersecurity response plan, and instituting a national public awareness and education campaign to promote cybersecurity. In May 2011 the White House released its International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World (Document 46), which discussed the building of U.S. cyberspace policy, the future of cyberspace, as well as U.S. policy priorities and concludes with the a discussion of the implementation of U.S. strategy. Then, in early 2013, along with PPD-21 and the related executive order, the administration released Administration Strategy on Mitigating the Theft of U.S. Trade Secrets (Document 82). Part of the strategy concerns mitigating cyber theft and describes four action items – diplomatic efforts, voluntary practices by industry, enhancing domestic law enforcement operations, improving domestic legislation, and promoting public awareness.

Numerous departments also have produced cyber strategy documents at various levels of classification. In 2006, the Chairman of the Joint Chiefs of Staff produced the National Military Strategy for Cyberspace Operations (Document 23), which was classified Secret. Its introduction described it as the “comprehensive strategy of the U.S. Armed Forces to ensure U.S. military superiority in cyberspace.” Since released under the Freedom of Information Act, the document identified four strategic priorities in implementing the strategy – including gaining and maintaining the initiative to operate within adversary decision cycles and integrating cyber capabilities across the full range of military operations using cyberspace. In July 2011, that strategy was replaced by the unclassified Department of Defense Strategy for Operating in Cyberspace (Document 50) โ€” which noted five strategic initiatives with regard to DoD operations in cyberspace. Those initiatives include treating cyberspace as an operational domain with regard to organization, training, and equipment as well as employing new concepts to protect DoD networks and systems.

The individual military services and their components have also produced their own policy and planning documents concerning cyberspace activities. In February 2010, the Army’s Training and Doctrine Command published an unclassified pamphlet (Document 33) on how cyber operations would be integrated into the full spectrum of Army operations. The next year, the Air Force produced Air Force Doctrine Document 3-12, Cyberspace Operations (Document 60), which included a discussion of the design, planning, execution, and assessment of cyberspace operations.

Civilian departments have also produced their own strategy documents โ€” such as the Department of Homeland Security’s November 2011 Blueprint for a Secure Cyber Future (Document 58), which listed four cybersecurity goals (including reducing exposure to cyber risk and increasing resilience) and nine means for achieving those goals.

In addition to presidential directives, departmental directives also serve to state policies as well as assign responsibilities. Thus, the 2006 DoD Directive 3600.01 (Document 22), “Information Operations,” assigned the Assistant Secretary of Defense for Networks and Information Integration responsibilities with regard to computer network defense โ€” a responsibility since assumed by the department’s Chief Information Officer.. A January 2010 directive (Document 31) focuses on protection of unclassified Defense Department information that passes through or resides on Defense Industrial Base information systems and networks.

The Department of Energy has also issued its own directives concerning cybersecurity โ€” including a September 2010 directive (Document 36) on the department’s cybersecurity management policy, including a statement of objectives, principles, responsibilities, and implementation, as well as a May 2011 directive (Document 48) which stipulates that the department’s cybersecurity policy be based on a risk management approach.

Organizations

U.S. government organizations involved in cyberspace activities (excluding those involved in evaluating programs) can be found in the Intelligence Community, Department of Defense, and several civilian departments or agencies – including the Federal Bureau of Investigation and the Department of Homeland Security.

The most senior U.S. official concerned with the analysis of intelligence concerning foreign cyber capabilities and activities is a member of the DNI’s National Intelligence Council โ€” the National Intelligence Officer for Cyber Issues โ€” a position first established in May 2011. Sometime in the late 1990s, an Information Operations Center was established within the CIA’s Directorate of Operations (now the National Clandestine Service). It absorbed some of the functions of the Directorate of Science and Technology’s Clandestine Information Technology Office. The office was officially described as being responsible for addressing “collection capabilities within emerging information technologies.” The Center’s Analysis Group is located in the Directorate of Intelligence and evaluates foreign threats to U.S. computer systems, particularly those that support critical infrastructure. 1 2

The National Security Agency’s involvement in cyber security is a consequence of its long-time role in insuring first communications and then information security for various components of the government and private sector as well as its need to insure the security of the computers it has relied on heavily for decades (e.g. Document 2, Document 3, Document 4). Its role in computer network exploitation – of gathering electronic “data at rest” is a natural extension of its signals intelligence role of gathering “data in motion.” In March 1997, according to an article (Document 11) by a former deputy director, it was also assigned the mission of computer network attack.

A major step in the organization of U.S. cyberspace activities, indicative of an upgrade in attention, occurred in late June 2009, when Secretary of Defense Robert Gates ordered (Document 29) the establishment of a unified U.S. Cyber Command subordinate to the U.S. Strategic Command. In his memo Gates noted that he would recommend to the president that he appoint the director of the National Security Agency as commander of the Cyber Command, that the command would reach initial operating capability by October 2009 and full operating capability by October 2010. He also directed disestablishment of STRATCOM’s Joint Task Force โ€” Global Network Operations (JTF-GNO) and Joint Functional Component Command โ€” Network Warfare (JFCC-NW) prior to the new command reaching full capability. In addition, Gates wrote that his memorandum “reinforces, but does not expand, USSTRATCOM authorities and responsibilities for military cyberspace operations.”

According to a brief fact sheet (Document 38), the Cyber Command is responsible for planning, coordinating, and conducting the operations and defense of specified Department of Defense information networks.” It also, when directed, conducts “full-spectrum military cyberspace operations.” Its current headquarters organization, as depicted in an organization chart (Document 92), was released in April 2013.

Subordinate to the Cyber Command are its component commands โ€” Army Forces Cyber Command; the 24th Air Force (a component of the Air Force Space Command); the U.S. Fleet Cyber Command (Document 69), which oversees the Navy Information Operations Command; the Navy Cyber Warfare Development Group; the Navy Cyber Defense Operations Command; and the Marine Forces Cyber Command.

In June 2002, the Director of the FBI established a Cyber Division. The division is responsible for coordinating and supervising the FBI’s investigation of federal violations “in which the Internet, computer systems, or networks are exploited as the principal instruments or targets of terrorist organizations, foreign government-sponsored intelligence operations, or criminal activity, and for which the use of such systems is essential to that activity.” 13

The Department of Homeland Security established the National Cyber Security Division (NCSD) in June 2003 “to serve as the national focal point for cybersecurity and to coordinate implementation of the February 2003 national cyberspace strategy (Document 16). Its mission (Document 52) is to “serve as the Federal Government’s lead in assessing, mitigating and responding to cyber risks in collaboration with Federal, State and local governments, the private sector, academia, and international partners.”

Cybersecurity White Papers

The most public aspect of U.S. activities in cyberspace centers around standard cybersecurity operations. In addition to documents such as presidential and departmental directives or strategy documents that stipulate cybersecurity goals, objectives or specific activities, there are a variety of other relevant documents.

Included are a number of “white papers” which described cybersecurity efforts. In March 2010, the White House released The Comprehensive National Cybersecurity Initiative (Document 34), which described details of the initiative launched in the previous administration and provided details of a dozen different components of the effort. In February 2010, the Department of Homeland Security released a paper (Document 32) describing various cybersecurity activities โ€” such as the operation of the EINSTEIN intrusion detection system. In July 2011 a DHS official briefed his audience (Document 52) on a variety of topics โ€” including the department’s National Cyber Security Division, hacking activities directed at both government and private organizations, the Stuxnet worm, and the NIGHT DRAGON exploitation effort, and cybersecurity advisory activities.

Computer Network Exploitation

Computer network exploitation (CNE) has been defined (Document 22) as “enabling operations and intelligence collection to gather data from target or adversary automated information systems or networks.” Such exploitation operations can be intended to produce information about the computer systems and networks as a prelude to a network attack or as another method of gathering economic or military intelligence. 14

CNE operations are examined in a number of intelligence threat assessments, including the Defense Security Service (Document 26, Document 43, Document 63) assessments, as well as the report by the Office of the National Counterintelligence Executive. (Document 55). As noted above, Chinese CNE operations are discussed in two reports (Document 30, Document 66) for the U.S-China review commission as well as the reports by Project 2049 (Document 79) and the Mandiant Corporation (Document 83). In addition, an Army War College paper (Document 72) also examines Chinese cyber, including CNE, capabilities.

Computer Network Attack

Computer Network Attack (CNA) has been defined (Document 22) as “operations to disrupt, deny, degrade or destroy information resident in computers and computer networks, or the computers and networks themselves. According to former NSA official William B Black Jr. (Document 11), on March 3, 1997, the Secretary of Defense officially delegated to the National Security Agency the authority to develop CNA techniques. Prior to U.S.-led airstrikes against the Qaddafi government in March 2011, the U.S. reportedly considered a cyber offensive designed to disrupt and even disable the Libyan government’s air-defense system.15

What is widely believed to be the product of a joint U.S-Israeli CNA operation was the worm Stuxnet โ€” part of a U.S. CNA effort designated OLYMPIC GAMES.16 The worm was reported to have infected Iranian industrial control systems at the Natanz nuclear facility and damaged Iranian centrifuges. While there has been no official U.S. or Israeli confirmation of their involvement in the operation, it has been the subject of reports by the RAND Corporation (Document 42) and Congressional Research Service (Document 40) as well as the Symantec computer security corporation.

The CRS paper (Document 40), The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability, provides an overview of the worm, an exploration of possible developers and future users, a discussion of whether Iran was the intended target, as well as coverage of industrial control systems vulnerabilities and critical infrastructure, national security implications, and issues for Congress. RAND’s study, A Cyberworm that Knows No Boundaries (Document 42), explores the issues raised by the Stuxnet case, the vulnerabilities exploited, the difficulties in defending against such malware, and the problems posed by organizational and legal restrictions. It also provides a short assessment of the status of U.S. defensive capabilities and efforts required to improve those capabilities.

Symantec’s initial analysis (Document 44) provided a technical analysis of the worm, exploring the attack scenario, timeline, Stuxnet architecture, installation, load point, command and control, propagation methods, payload exports, payload resources, and other topics. A subsequent Symantec report (Document 88) stated that the company had “discovered an older version of Stuxnet that can answer questions about its evolution.”

Computer Network Defense

See Document 23.

Computer network defense is defined in the DoD Information Operations directive (Document 22) as “actions taken to protect, monitor, analyze, detect, and respond to unauthorized activity within DoD information systems and computer networks.” Those actions can include counterintelligence, law enforcement, and other military capabilities. The first of these is the subject of one classified DoD directive (Document 41) โ€” “Counterintelligence (CI) Activities in Cyberspace.” That directive makes clear that those activities include not only counterintelligence collection and support but offensive counterintelligence operations.

Techniques for computer network defense are also the subject of two Naval Postgraduate School theses. A 2003 thesis (Document 17) explores the feasibility of employing deception against cyberterrorists, where cyberterrorists are defined by two criteria – that the aim of launching unlawful attacks or threatening such attacks on computers, networks, and the information stored in them is to intimidate or coerce a government or its people in pursuit of political or social objectives, and that the activities result either in violence against persons or property or cause enough harm to generate fear.

A 2008 thesis (Document 25) examines what the author believes to be the key elements of deterrence in cyberspace – including denial, the development and demonstration of overt punishment techniques, the establishment of thresholds, and the development and articulation of national policy – and the prospects for cyber deterrence.

Audits and Evaluations

Audits and evaluations of cybersecurity and other cyberspace operations have been conducted by the GAO and the inspectors general of the Defense, Energy, Homeland Security, and Justice departments.

The inspector general of the Department of Homeland Security produced a classified report, released with redactions (Document 54), which examined the department’s capability to share cyber threat information with other federal agencies and the private sector. A subsequent classified report, also released with redactions in August 2012 (Document 75), addressed the department’s international cybersecurity program and noted areas that could be targeted for improvement โ€” including developing a strategic implementation plan for foreign engagement and improving communications between the U.S. Computer Emergency Readiness Team and foreign entities.

The Department of Energy’s inspector general issued a report (Document 56) in October 2011 on the department’s unclassified cybersecurity program, which examined whether that program provided sufficient protection of its data and information systems. According to the report, corrective actions for only 11 of 35 cyber security weaknesses identified in the inspector general’s 2010 report had been completed. It also reported that there was a 60 percent growth in identified weaknesses over the 2010 report. In early 2013, the department’s inspector general issued a report (Document 84) on the cybersecurity program at the Los Alamos National Laboratory.

The Justice Department’s inspector general produced a 2011 audit report (Document 45) on the FBI’s ability to address the national security cyber intrusion threat. It reported on the FBI’s efforts in developing and operating the National Cyber Investigative Joint Task Force, and the ability of the FBI field offices to investigate national security cyber cases.

The GAO also produced a report (Document 47), released in May 2011, that evaluated the extent to which the Department of Defense and the U.S. Cyber Command had provided the military services with adequate guidance with respect to roles and responsibilities, command and control relationships, and mission requirements and capabilities with regard to cyberspace operations. Other GAO reports have examined continued challenges facing DoD (Document 49) and protection of critical infrastructure (Document 51, Document 62). A 2012 GAO report (Document 70) assessed the cyber threats to federal and other computer systems and vulnerabilities present in federal information systems and supporting critical infrastructure. A February 2013 report (Document 85) focused on the challenges facing the federal government in producing a strategic approach to cybersecurity.

Some GAO evaluations have focused on cybersecurity issues with respect to single components of critical U.S. infrastructure – including the electricity grid (Document 74), and pipelines (Document 76). The GAO’s report on securing the electricity grid examines cyber threats to the grid, actions taken to prevent attacks, and remaining challenges. The office’s pipeline study cybersecurity risks, U.S. pipeline security initiatives, and the adequacy of voluntary pipeline cybersecurity.

Legal Issues

The increasing attention to cyberspace issues has also been reflected in the examination of associated legal issues โ€” both in law journals and government documents.17

In November 1999, the Office of the General Counsel of the Department of Defense issued a second edition of An Assessment of International Legal Issues in Information Operations (Document 13). The section “Application to Computer Network Attacks” (pp.16-23) concludes with a one-paragraph assessment which begins, “It is far from clear the extent to which the world community will regard computer network attacks as ‘armed attacks’ or ‘uses of force,’ and how the doctrines of self-defense and countermeasures will be applied to computer network attacks.” More recently, an Air Force instruction (Document 53) specifies the responsibilities of different Air Force components for legal reviews of weapons and cyber capabilities as well as the content of such reviews.

Legal issues have also been examined by the Congressional Research Service. In a March 2012 paper (Document 65), CRS explored Fourth Amendment, civil liberties, and privacy issues related to the protection of critical infrastructure and the sharing of cybersecurity information โ€” as well as the possibility of conflicts between state and federal cybersecurity law. Another CRS study (Document 73) examines possible cyber-related changes to 28 different statutes.

The question of whether the U.S. Cyber Command had sufficient legal authority to carry out its mission was the catalyst for an exchange of letters (Document 68a, Document 68b, Document 68c), beginning in March 2012, between Senator John McCain (R-AZ) and General Keith B. Alexander, Director of the National Security Agency and the commander of the U.S. Cyber Command. In his initial letter McCain posed six questions, while in his second letter he notes a number of disagreements with the content of Alexander’s responses.

The Documents

Document 1: [Deleted], National Security Agency, “Computer Operating System Vulnerabilities,” Cryptolog, VI, 3 (March 1979). Unclassified.

Source: http://www.nsa.gov

This article, which appeared in a classified NSA journal, explores seven common computer operating system vulnerabilities, several penetration techniques, defensive measures, and future research areas.

Document 2: Robert J. Hanyok, National Security Agency, “Some Reflections on the Reality of Computer Security,” Cryptolog, IX, 6-7 (June-July 1982). Confidential.

Source: http://www.nsa.gov

The author of this article argues that while computer users at NSA have been confident that the security of their systems is “ironclad and invulnerable” the reality is quite different. He then notes a number of user practices and implementation problems that make those systems vulnerable.

Document 3: [Deleted], “Computer Virus Infections: Is NSA Vulnerable?,” Cryptologic Quarterly, 4, 3 (Fall 1985). Top Secret.

Source: http://www.nsa.gov

This paper examines the nature of computer viruses, whether there is an algorithm to determine whether a program is infected with a virus, different classes of attack (including compromise, spoofing, and denial of service), and solutions.

Document 4: [Deleted], “A First Generation Technical Viral Defense,” Cryptologic Quarterly, 7, 2 (Summer 1988). Secret.

Source: http://www.nsa.gov

This paper examines a defense, involving encryption, that can be used to respond to the detection of a computer virus โ€” and means for checking the effectiveness of the response.

Document 5: General Accounting Office, GAO/IMTEC-89-57, Computer Security: Virus Highlights Need for Improved Internet Management, June 1989. Unclassified.

The catalyst for this report was a November 1988 computer virus that caused thousands of computers, in the United States and overseas, to shut down. The report provides details on some of the networks disrupted by the virus, the means of infection, and notes the vulnerabilities highlighted by the incident.

Document 6: General Accounting Office, GAO/T-IMTEC-92-5, Computer Security: Hackers Penetrate DOD Computer Systems, November 20, 1991. Unclassified.

Source: http://www.gao.gov

This testimony of a GAO official concerns his division’s investigation of the attacks by Dutch hackers on Army, Navy, and Air Force computer systems โ€” which the official characterizes as containing unclassified but sensitive information โ€” during Operation Desert Storm/Shield. It examines how the hackers penetrated the systems, agency responses, and the need for greater attention to computer security.

Document 7: Richard Sylvester, National Security Agency, “NSA and Computer Viruses,” Cryptolog, XIX, 3 (1992). Unclassified/For Official Use Only.

Source: http://www.nsa.gov

This one-page article reports NSA classification guidelines with respect to any discussion of computer viruses with regard to NSA systems. Classification of specific facts ranged from Unclassified to Top Secret/Handle Via Comint Channels Only.

Document 8: [Deleted], National Security Agency, “Global Network Intelligence and Information Warfare: SIGINT and INFOSEC in Cyberspace,” Cryptolog, XXI,1 (1995). Top Secret/Handle Via Comint Channels Only.

Source: http://www.nsa.gov

This heavily-redacted article extends beyond cyber issues, but does note that “sophisticated telecommunications and data networks … make it possible to deny and degrade a potential adversary’s command and control communications and sensitive commercial and diplomatic communications from great distances with little or no risk to life and limb.”

Document 9: [Deleted], “Out of Control,” Cryptologic Quarterly, Special Edition, 15, 1996. Secret.

Source: http://www.nsa.gov

This article, in another National Security Agency journal, discusses the threat to computer systems containing classified information via human intelligence operations directed at systems administrators. A largely redacted section is titled “”Foreign Intelligence Services Are Already Targeting Computer Personnel,” while the final section offers recommendations on how to address the problem.

Document 10a: Government Accounting Office, GAO/AIMD- 96-84, Information Security: Computer Attacks at Department of Defense Pose Increasing Risks, May 22, 1996. Unclassified.

Document 10b: Jack L. Brock, General Accounting Office, GAO/T-AIMD-96-92, Information Security: Computer Attacks at Department of Defense Pose Increasing Risks, May 22, 1996. Unclassified.

Source: http://www.gao.gov

This report and testimony by a GAO official reports on an examination of hacker attacks on Defense Department computer systems, including a 1994 episode that involved over 150 attempts to access the computer systems of Rome Laboratory โ€” which resulted in the theft of air tasking research data and damage to the laboratory’s air tasking order research project “beyond repair,” according to lab officials. The report and testimony also discuss the challenges faced by DoD in securing its computer systems.

Document 11: William B. Black, National Security Agency, “Thinking Out Loud About Cyberspace,” Cryptolog, XXIII, 1 (Spring 1997). Secret.

Source: http://www.nsa.gov

This article, by a senior NSA official, notes that NSA was assigned the mission of computer network attack in March 1997, and argues that the world was on the verge of a new age โ€” “the information age” โ€” and that the future of war would be warfare in cyberspace.

Document 12: William J. Clinton, Presidential Decision Directive/NSC-63, Subject: Critical Infrastructure Protection, May 22, 1998. For Official Use Only/Unclassified.

Source: Federation of American Scientists (www.fas.org)

The introduction to this directive notes that the military and economy of the United States are “increasingly reliant upon certain critical infrastructures and upon cyber-based information systems.” The remainder of the 18-page directive specifies the President’s intent “to assure the continuity and validity of critical infrastructures” in the face of physical or cyber threats, states a national goal, delineates a public-private partnership to reduce vulnerability, states guidelines, specifies structure and organization, discusses protection of Federal government critical infrastructures, orders a NSC subgroup to produce a schedule for the completion of a variety of tasks, and directs that an annual implementation report be produced.

Document 13: Office of General Counsel, Department of Defense, An Assessment of International Legal Issues in Information Operations, Second Edition, November 1999. Unclassified.

Source: http://www.dod.gov

The introduction to this assessment notes that information operations includes information attack which, in turn, includes computer network attack. It goes on to consider the implications of a variety of domestic and international laws and treaties with regard to information operations.

Document 14: Steven A. Hildreth, Congressional Research Service, Cyberwarfare, June 19, 2001. Unclassified.

Source: http://www.fas.org

This report discusses the definition of cyberwarfare, and contains three case studies โ€” including the Rome Laboratory incident (Document 8a, Document 8b) and two exercises โ€” and, inter alia, reviews U.S policy and doctrine, organization, and legal issues. It also discusses selected foreign views and activities with regard to cyberwar.

Document 15: Michael Vatis, ESDP Discussion Paper-2002-04, Cyber Attacks: Protecting America’s Security Against Digital Threats, John F. Kennedy School of Government, Harvard University, June 2002. Not classified.

Source: Belfer Center for Science and International Affairs, Harvard University (www.beflercenter.hks.harvard.edu)

This paper, written by the first director of the Federal Bureau of Investigation’s National Infrastructure Protection Center, examines: the range of cyber attackers (including insiders, criminal groups, virus writers, foreign intelligence services, foreign military organizations, terrorists, “hacktivists,” and recreational hackers), types of cyber attacks, the international component of cyber attacks, the federal response to cyber attacks, Presidential Decision Directives 62 and 63, and the policy of the George H.W. Bush administration. Vatis also offers recommendations concerning cyber research and development, alert status during conflict, and identifying best practices related to cyber security.

Document 16: The White House, The National Strategy to Secure Cyberspace, February 2003. Unclassified.

Source: http://www.us-cert.gov

This 76-page document discusses the strategy’s strategic objectives (including preventing cyber attacks against critical U.S. infrastructures), the government’s role in cyber security, the anticipated role of the Department of Homeland Security in cyber security, and five critical priorities for cyberspace security (including a national cyberspace security response system and international cooperation). A classified National Security Presidential Directive (NSPD-38), with the identical title, was issued on July 7, 2004.

Document 17: Kheng Lee Gregory Tran, Naval Postgraduate School, Confronting Cyberterrorism with Cyber Deception, December 2003. Unclassified.

Source: Dudley Knox Library, Naval Postgraduate School (www.nps.edu/library)

This master’s thesis examines the possibility of using deception to defeat or mitigate the damage from cyberterrorism. It examines, inter alia, the cyberterrorism threat, the values and risks of deception, nine varieties of cyber deception (including concealment, camouflage, false and planted information, ruses, and feints) and cyber defense, and the pitfalls of cyber defense.

Document 18: Interagency OPSEC Support Staff, Intelligence Threat Handbook, June 2004. Unclassified.

Source: Author’s Collection

The scope of this handbook is broader than cybersecurity, but one section โ€” Computers and the Internet โ€” addresses the history of Internet security, threats to computer network security, roots of network vulnerability, outsider attack techniques, insider attack techniques, and countermeasures.

Document 19: Office of Inspector General, Department of Homeland Security, OIG-04-29, Progress and Challenges in Securing the Nation’s Cyberspace, July 2004. Unclassified.

Source: http://www.dhs.gov

This document reports on the inspector general’s evaluation of the Department of Homeland Security’s efforts to implement The National Strategy to Secure Cyberspace (Document 14). It notes “major accomplishments” โ€” including the creation of a Computer Emergency Readiness Team, creation of the National Cyber Alert System, and sponsorship of the National Cyber Security Summit. It also notes “a number of challenges to address long-term cyber threats and vulnerabilities” โ€” including the DHS National Cybersecurity Division’s need to prioritize its initiatives, identify resources required to carry out its mission, and develop strategic implementation plans.

Document 20: President’s Information Technology Advisory Committee, Report to the President, Cyber Security: A Crisis of Prioritization, February 2005. Unclassified.

Source: http://www.nitrd.gov/pitac/reports

The two main chapters of this report, prior to the concluding chapter, address the importance of cyber security and examine federal cyber security research and development efforts. In its concluding chapter the committee states its findings and recommendations with regard to federal funding for fundamental research in civilian cyber security, the cyber security research community, technology transfer efforts, and the coordination and oversight of federal cyber security research and development.

Document 21: Donald Rumsfeld, to Steve Cambone, Subject: Cyber Attack Issue, November 04, 2005, Unclassified/FOUO .

Source: http://www.rumsfeld.com

In this “snowflake” directed to his under secretary for intelligence, Rumsfeld suggests that Cambone consider establishing a group to review organization, budgeting, and presentation issues with regard to cyber attacks.

Document 22: Department of Directive O-3600.01, Subject: Information Operations, August 14, 2006. Unclassified/For Official Use Only.

Source: Department of Defense Freedom of Information Act Release

This directive states Department of Defense policy and responsibilities with regard to information operations (defined as the integrated deployment of electronic warfare, computer network operations, psychological operations, military deception, and operations security). Among those whose responsibilities are identified is the Assistant Secretary of Defense for Networks and Information Integration.

Document 23: Chairman of the Joint Chiefs of Staff, The National Military Strategy for Cyberspace Operations, December 2006. Secret.

Source: Department of Defense Freedom of Information Act Release.

This strategy document was issued to provide guidelines to the Defense Department โ€” including military service organizations, the unified commands, and DoD components (including agencies, field activities and other entities) โ€” with regard to planning, executing, and allocating resources for cyberspace operations. Its main chapters focus on the strategic context, threats and vulnerabilities, strategic considerations, the military strategic framework, and implementation and assessment. Several enclosures address topics such as examples of threats and threat actors, examples of vulnerabilities, and strategic priorities and outcomes.

Document 24: John Rollins and Clay Wilson, Congressional Research Service, Terrorist Capabilities for Cyberattack: Overview and Policy Issues, January 22, 2007. Unclassified.

Source: http://www.fas.org

This study examines possible terrorists’ objectives in conducting cyberattacks, computer vulnerabilities that might make cyberattack against the U.S. homeland’s critical infrastructure viable, and emerging computer and technical skills of terrorists. It also examines the cybersecurity efforts of several government agencies, changing concerns about cyberattack, and a number of additional issues concerning terrorist or criminal cyber activities.

Document 25: Ryan J. Moore, Naval Postgraduate School, Prospects for Cyber Deterrence, December 2008. Unclassified.

Source: http://www.nps.edu/library

The author of this thesis argues that with “more sectors of critical national infrastructure [being] interconnected in cyberspace,” the risk to national security from cyberattack “has increased dramatically.” He explores the fundamentals of strategic deterrence, the evolving cyber threat, deterrence strategy in cyberspace, and the prospects for cyber deterrence.

Document 26: Defense Security Service, Targeting U.S. Technologies: A Trend Analysis of Reporting from Defense Industry, 2009. Unclassified.

Source: http://www.dss.mil

This assessment of foreign attempts to illicitly acquire U.S. technologies concerns a variety of techniques, including “suspicious internet activity” โ€” which includes, but is not limited to “confirmed intrusion, attempted intrusion, [and] computer network attack.”

Document 27: Major William C. Ashmore, School of Advanced Military Studies, United States Army Command and General Staff, Impact of Alleged Russian Cyber Attacks, 2009. Unclassified.

Source: http://www.dtic.mil/dtic/fr/fulltext/u2/a504991.pdf

This monograph was written to examine the implications of alleged Russian cyber attacks against Estonia and Georgia for the Russian Federation, former Soviet satellites, and international organizations.

Document 28: The White House, Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure, May 8, 2009. Unclassified.

Source: The White House (www.whitehouse.gov)

This paper reports the results of a presidentially-directed 60-day comprehensive review to evaluate U.S. policies and organizational structures related to cybersecurity. The review produced seven main conclusions which included: “The Nation is at a crossroads,” “The status quo is no longer acceptable,” “The United States cannot succeed in securing cyberspace if it works in isolation,” and “The Federal government cannot entirely delegate or abrogate its role in securing the Nation from a cyber incident or accident.”

Document 29: Robert M. Gates, Memorandum to Secretaries of the Military Departments, Subject: Establishment of a Subordinate Unified U.S. Cyber Command Under U.S. Strategic Command for Military Cyberspace Operations, June 23, 2009. Unclassified.

Source: http://www.dod.gov

This memo from the Secretary of Defense directs the commander of the U.S. Strategic Command to establish a U.S. Cyber Command and that the command reach an initial operating capability by October 2009 and a full operating capability by October 2010. It also informs the recipients of the Secretary’s plan to recommend to the president that the National Security Agency director also become commander of the Cyber Command.

Document 30: Bryan Krekel, Northrop Grumman, Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation, October 9, 2009. Unclassified .

Source: Air University (www.au.af.mil)

This study, prepared for the U.S.-China Economic and Security Review Commission, focuses largely on Chinese computer network exploitation (CNE) as a strategic intelligence collection tool. It examines Chinese CNE operations strategy and operations during conflict, key entities in Chinese computer network operations, cyber-espionage, an operational profile of an advanced cyber intrusion, and a chronology of alleged Chinese computer network exploitation events.

Document 31: Department of Defense, DoD Instruction 5205.13, Subject: Defense Industrial Base (DIB) Cyber Security/Information Assurance (CS/IA) Activities, January 29, 2010. Unclassified.

Source: http://www.dtic.mil/whs/directives/corres/pdf/520513p.pdf

This Defense Department instruction states policy, establishes responsibilities, and delegates authority with regard to the protection of unclassified DoD information that passes through or resides on unclassified Defense Industrial Base information systems and networks.

Document 32: Department of Homeland Security, Computer Network Security & Privacy Protection, February 19, 2010. Unclassified.

Source: http://www.dhs.gov

This white paper describes the Department of Homeland Security’s computer network security activities, which includes the operation of the EINSTEIN intrusion detection systems โ€” including the systems collection methods and the implications for privacy protection. It also discusses topics such as oversight and compliance, the role of the National Security Agency, and future program development.

Document 33: U.S. Army Training and Doctrine Command, TRADOC Pamphlet 525-7-8, The United States Army’s Cyberspace Operations Concept Capability Plan, 2016-2028, February 22, 2010. Unclassified.

Source: http://www.fas.org

This pamphlet explores how “the Army’s future force in 2016-2028 will leverage cyberspace and CyberOps” and how CyberOps (which is specified to consist of four components โ€” cyberwarfare, cyber network operations, cyber support, and cyber situational awareness) will be integrated into full spectrum operations.

Document 34: The White House, The Comprehensive National Cybersecurity Initiative, March 2, 2010. Unclassified.

Source: http://www.whitehouse.gov

The release of this document by the Obama White House revealed details of the cybersecurity initiative launched during the previous administration. It provides basic details of twelve different components of the initiative โ€” which include intrusion detection and prevention systems across the federal government, coordination and redirection of research and development efforts, enhancing situational awareness, increasing the security of classified networks, developing enduring deterrence strategies, and defining the role of the federal government for extending cybersecurity into critical infrastructure domains.

Document 35: Keith Alexander, Director, National Security Agency, Advanced Questions for Lieutenant General Keith Alexander, USA Nominee for Commander, United States Cyber Command, April15, 2010. Unclassified.

Source: http://www.fas.org

This 32-page documents consists of 28 questions (some with multiple parts) posed to, and answered by, General Alexander in advance of his appearance before the Senate Armed Services Committee with respect to his nomination to head the newly formed U.S. Cyber Command.

Document 36: Department of Energy, DOE P 205.1, Subject: Departmental Cyber Security Management Policy, September 23, 2010. Unclassified.

Source: http://www.energy.gov

This Department of Energy policy directive covers the six components of the department’s cyber security management policy โ€” its objectives, guiding principles, core functions, mechanisms, responsibilities, and implementation.

Document 37: Janet Napolitano and Robert Gates (signators), Memorandum of Agreement Between the Department of Homeland Security and the Department of Defense Regarding Cybersecurity, September 27, 2010. Unclassified.

Source: http://www.dhs.gov

The purpose of the agreement, signed by the Secretaries of Homeland Security and Defense, is specified as establishing the terms by which the two departments “will provide personnel, equipment, and facilities” in order to increase interdepartmental collaboration in strategic planning as well as operational activities concerning cybersecurity.

Document 38: Department of Defense, Cyber Command Fact Sheet, October 13, 2010. Unclassified.

Source: http://www.dod.gov

This fact sheet provides basic information about the U.S. Cyber Command โ€” including its mission, focus, and components.

Document 39: JASON, JSR-10-102, Science of Cyber-Security, November 2010. Unclassified.

Source: http://www.fas.org

This report, by the Defense Department’s JASON scientific advisory group, was a response to the department’s request that the group examine whether there were underlying fundamental principles that would make it possible to adopt a more scientific approach to the issue of cybersecurity. The sciences they examine for possible guidance are economics, meteorology, medicine, astronomy, and agriculture.

Document 40: Paul K. Kerr, John Rollins, and Catherine A. Theohary, Congressional Research Service, The Stuxnet Computer Worm: Harbringer of an Emerging Warfare Capability, December 9, 2010. Unclassified.

Source: http://www.fas.org

This short paper provides an overview of the Stuxnet worm, an exploration of possible developers and future users, a discussion of whether Iran was the intended target, as well as industrial control systems vulnerabilities and critical infrastructure, national security implications, and issues for Congress.

Document 41: Department of Defense, DoD Instruction S-5240.23, Subject: Counterintelligence (CI) Activities in Cyberspace, December 13, 2010. Secret.

Source: Department of Defense Freedom of Information Act Release.

According to this instruction, DoD counterintelligence activities in cyberspace are to be directed against foreign intelligence services and international terrorist organizations. The two key portions of the instruction define the responsibilities of DoD components and establish procedures for counterintelligence activities. While much of the segment concerning procedures is redacted in the declassified version, the table of contents indicates three different types of CI-related activities in cyberspace: counterintelligence support, counterintelligence collection, and offensive counterintelligence operations (OFCO).

Document 42: Isaac R. Porsche III, Jerry M. Sollinger, and Shawn McKay, RAND Corporation, A Cyberworm that Knows no Boundaries, 2011. Unclassified.

Source: http://www.rand.org

The catalyst for this paper were the reports of the Stuxnet worm (Document 40). It explores issues raised by “sophisticated yet virulent malware” โ€” including the nature of the threats, the vulnerabilities exploited and the difficulties in defending against Stuxnet-type worms, and the problems posed by organizational and legal restrictions. It also provides a short assessment of the status of U.S. defensive capabilities and efforts required to improve those capabilities.

Document 43: Defense Security Service, Targeting U.S. Technologies: A Trend Analysis of Reporting from Defense Industry, 2011. Unclassified.

Source: http://www.dss.mil

This report updates the Defense Security Service’s 2009 assessment of foreign attempts to illicitly acquire U.S. technologies, and concerns a variety of techniques, including “suspicious internet activity.” It notes a high level of suspicious network activity “in the form of cyber intrusion attempts directed at cleared contractor networks.”

Document 44: Nicolas Falliere, Liam O. Murchu, and Eric Chien, Symantec, W 32. Stuxnet Dossier, Version 1.4, February 2011. Not classified.

Source: http://www.symantec.com

This study, prepared by the Symantec computer security firm, provides a technical analysis of the Stuxnet malware โ€” exploring the attack scenario, timeline, Stuxnet architecture, installation, load point, command and control, propagation methods, payload exports, payload resources and other topics.

Document 45: Office of the Inspector General, Department of Justice, Audit Report 11-22, The Federal Bureau of Investigation’s Ability to Address the National Security Cyber Intrusion Threat , April 2011. Secret.

Source: http://www.justice.gov/oig/reports/FBI/a1122r.pdf

The audit which is the subject of this report was conducted to evaluate the FBI’s efforts in developing and operating the National Cyber Investigative Joint Task Force in response to the national security cyber threat, and assess the FBI field offices’ capabilities to investigate national security cyber cases.

Document 46: The White House, International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World, May 2011. Unclassified.

Source: http://www.whitehouse.gov

This policy document discusses the process of building U.S. cyberspace policy, the future of cyberspace (including the preferences of the U.S. and its role in achieving its preferred outcomes), and U.S. policy priorities (with regard to economic issues, network protection, law enforcement, and several additional issues). It concludes with a discussion of U.S. implementation of its strategy.

Document 47: Government Accountability Office, GAO-11-421, Defense Department Cyber Efforts: More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities, May 2011. Unclassified.

Source: http://www.gao.gov

This study was conducted to determine the extent to which the Defense Department and U.S. Cyber Command had provided the military services with adequate guidance with respect to roles and responsibilities, command and control relationships, and mission requirements and capabilities with regard to cyberspace operations.

Document 48: Department of Energy, DOE O 205.1B, Subject: Department of Energy Cyber Security Program, May 16, 2011. Unclassified .

Source: http://www.energy.gov

This Energy department order states requirements for the department’s Cyber Security Program, which requires a risk management approach. It also specifies the responsibilities of over a dozen department components or officers in formulating and implementing the program.

Document 49: Government Accountability Office, GAO-11-75, Department of Defense Cyber Efforts: DOD Faces Challenges In Its Cyber Activities, July 2011. Unclassified.

Source: http://www.gao.gov

This is an unclassified version of a previously classified report. It examines DoD’s organization for addressing cybersecurity threats as well as assessing the extent to which the Defense Department had developed a joint doctrine for cyberspace operations, assigned command and control responsibilities, and identified and addressed key capability gaps involving cyberspace operations.

Document 50: Department of Defense, Department of Defense Strategy for Operating in Cyberspace, July 2011. Unclassified .

Source: http://www.defense.gov

The core of this strategy document is the discussion of five strategic initiatives with regard to DoD operations in cyberspace โ€” treating cyberspace as an operational domain with regard to organization, training, and equipment; employing new defense operations concepts to protect DoD networks and systems; collaboration with other U.S. government departments and the private sector; cooperation with U.S. allies and international partners; and leveraging “the nation’s ingenuity” through the cyber work force and technological innovation.

Document 51: Gregory C. Wilshusen, Government Accountability Office, GAO-11-865T, Cybersecurity: Continued Attention Needed to Protect Our Nation’s Critical Infrastructure, July 26, 2011. Unclassified.

Source: http://www.gao.gov

The focus of this study is the federal role in enhancing cybersecurity related to the private sector’s operation of critical infrastructure. It describes cyber threats facing cyber-reliant critical infrastructures; discusses recent federal government actions, taken in cooperation with the private sector, to identify and protect such infrastructures; and identifies challenges to the protection of those infrastructures.

Document 52: Bradford Willke, Department of Homeland Security, Moving Toward Cyber Resilience, July 27, 2011. Unclassified.

Source: Pubic Intelligence (http://info.publicintelligence.net/DHS-CyberResilience.pdf)

This briefing covers a number of topics, including the origins, organization, and mission of the DHS National Cyber Security Division, hacking activities directed at a number of government and private entities (the CIA, Booz Allen Hamilton, Lockheed Martin), the Stuxnet worm, an effort designated Night Dragon that involved cyber-theft of sensitive information from international oil and energy companies, and cyber security advisory activities.

Document 53: Department of the Air Force, Air Force Instruction 51-402, Legal Reviews of Weapons and Cyber Capabilities, July 27, 2011. Unclassified.

Source: http://www.fas.org

This instruction focuses on the responsibilities of different Air Force components for legal reviews of weapons and cyber capabilities, as well as the contents of such reviews.

Document 54: Office of Inspector General, Department of Homeland Security, Review of the Department of Homeland Security’s Capability to Share Cyber Threat Information (Redacted), September 2011, Unclassified.

Source: http://www.dhs.gov

The Fiscal Year 2010 Intelligence Authorization Act required the inspectors general of the Intelligence Community and DHS to provide Congress with an assessment of how cyber threat information is being shared among federal agencies and the private sector, the means used to share classified cyber threat information, and the effectiveness of the sharing and distribution of cyber threat information. In addition to providing such an assessment, the Inspector General made three recommendations to DHS.

Document 55: National Counterintelligence Executive, Foreign Spies Stealing US Economic Secrets in Cyberspace: Report to Congress on Foreign Economic Collection and Industrial Espionage, 2009-2011 , October 2011. Unclassified.

Source: http://www.ncix.gov

This report, produced by a component of the Office of the Director of National Intelligence, consists of three major sections. One is the vulnerability of U.S. technologies and trade secrets to cyberspace operations and the appeal of cyberspace collection. Another examines the threat from specific collectors, including Russia, China, and U.S. partners. The third provides an outlook for the future, divided between sections on “near certainties” and “possible game changers.”

Document 56: Office of Inspector General, Department of Energy, DOE/IG-0856, Evaluation Report: The Department’s Unclassified Cyber Security Program – 2011, October 2011. Unclassified.

Source: http://www.dhs.gov

The Federal Information Security Management Act of 2002 required an independent evaluation to determine whether the Department of Energy’s unclassified cyber security program adequately protected its data and information systems. According to the report, corrective actions for only 11 of 35 cybersecurity weaknesses identified in the inspector general’s 2010 report had been completed. In addition, there was a 60 percent growth in identified weakness over the 2010 report.

Document 57: Department of Homeland Security, Preventing and Defending Against Cyber Attacks, October 2011. Unclassified.

Source: http://www.dhs.gov

This DHS paper focuses on the department’s efforts in assisting federal executive branch civilian departments with securing their unclassified computer networks. It reports on the department’s efforts with respect to cybersecurity coordination and research, cybersecurity initiatives and exercises, the promotion of public awareness of cybersecurity, cybersecurity workforce development, and privacy and civil liberties issues.

Document 58: Department of Homeland Security, Blueprint for a Secure Cyber Future: The Cybersecurity Strategy for the Homeland Security Enterprise, November 2011. Unclassified.

Source: http://www.dhs.gov

This blueprint contains two main components. It lists four cybersecurity goals (reducing exposure to cyber risk, ensuring priority response and recovery, maintaining shared situational awareness, and increasing resilience) โ€” to be attained through nine objectives. Secondly, it specifies four goals for strengthening the cyber system (to be attained via eleven objectives).

Document 59: Department of Defense, Department of Defense Cyberspace Policy Report: A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2011, Section 934 , November 2011. Unclassified.

Source: http://www.dod.gov

This 14-page document describes the legal and policy issues associated with cyberspace, reports on decisions of the secretary of defense, and notes that there are no plans to update the National Military Strategy for Cyberspace Operations (Document 23) but that the Department of Defense Strategy for Operating in Cyberspace (Document 50) would provide strategy guidance. In addition, it describes the use and application of cyber modeling and simulation.

Document 60: United States Air Force, Air Force Doctrine Document 3-12, Cyberspace Operations, November 30, 2011. Unclassified.

Source: http://www.e-publishing/af.mil

This document examines cyberspace fundamentals (including U.S. national policy and the challenges of cyberspace operations); command and organization (including a description of U.S. cyberspace organizations as well as command and control of cyberspace operations); and the design, planning, execution, and assessment of cyberspace operations.

Document 61: National Science and Technology Council, Executive Office of the President, Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program, December 2011. Unclassified .

Source: http://www.cyber.st.dhs.gov

This plan specifies four interconnected priorities for U.S. government agencies that conduct or sponsor research and development in cybersecurity. The priorities are organized along four lines: inducing change, developing scientific foundations, accelerating transition to practice, and maximizing research impact.

Document 62: Government Accountability Office, GAO-12-92, Critical Infrastructure Protection: Cybersecurity Guidance Is Available but More Can Be Done to Promote Its Use, December 2011. Unclassified.

Source: http://www.gao.gov

This GAO report examines the use of cybersecurity guidance in seven critical infrastructure sectors (including banking and finance, energy, and nuclear reactors) from national and international organizations. It reports that while such guidance is being employed, sector officials do not believe it is comprehensive, and DHS and other sector-specific agencies have not identified key cybersecurity guidance applicable to each of their critical infrastructure sectors.

Document 63: Defense Security Service, Targeting U.S. Technologies: A Trend Analysis of Reporting from Defense Industry, 2012. Unclassified.

Source: http://www.dss.mil

The main focus of this report, by the Pentagon’s Defense Security Service, is not cybersecurity but the attempts to gather information on U.S. technologies โ€” by whatever method. However, as did previous DSS reports (Document 26, Document 43), it does discuss “suspicious network activity” (SNA) as one acquisition method. It notes that SNA is “the most prevalent collection method for entities originating from East Asia and the Pacific,” although it is no higher than fifth with regard to collection methods associated with other regions.

Document 64: 624th Operations Center, Intelligence Surveillance & Reconnaissance Division, Air Force Space Command, Cyber Threat Bulletin, 2012 Top Ten Cyber Threats, January 9, 2012. Unclassified/For Official Use Only.

Source: http://www.publicintelligence.net

This bulletin passes along the conclusions of the McAfee computer security firm concerning the top 10 cyber threats for the coming year. The top five are attacking mobile devices, embedded hardware, “legalized” spam, industrial attacks, and hacktivism.

Document 65: Mark Mateski, Cassandra M. Trevino, Cynthia K. Veitch, John Michalski, J. Mark Harris, Scott Maruoka, and Jason Frye, Sandia National Laboratories, SAND 2012-2427, Cyber Threat Metrics, March 2012. Unclassified.

Source: http://www.fas.org

This report was prepared in support of the DHS cyber-risk and vulnerability assessment program intended to aid federal civilian executive branch agencies. It reviews alternative cyber threat metrics and models that might be employed in any operational threat assessment.

Document 66: Bryan Krekel, Patton Adams, George Bakos, Northrup Grumman, Occupying the Information High Ground: Chinese Capabilities for Computer Network Espionage and Cyber Espionage, March 7, 2012. Unclassified.

Source: http://www.uscc.gov

This report, prepared for the U.S.-China Economic and Security Review Commission, focuses on six topics: information warfare strategy, Chinese use of network warfare against the United States, key entities and institutions supporting Chinese computer network operations (the Third and Fourth Departments of the Peoples Liberation Army’s General Staff Department), potential risks to the U.S. telecommunications supply chain, the comparison between criminal and state-sponsored network exploitation, and the risks and reality of collaboration between U.S. and Chinese information security firms.

Document 67: Edward C. Liu, Gina Stevens, Kathleen Ann Ruane, Alissa M. Dolan, and Richard M. Thompson II, Congressional Research Service, Cybersecurity: Selected Legal Issues, March 14, 2012. Unclassified.

Source: http://www.fas.org

The authors of this report address legal issues related to the protection of critical infrastructure, the protection of federal networks (including Fourth Amendment as well as civil liberties and privacy issues), and the sharing of cybersecurity information. In addition, the authors explore the possibility of federal cybersecurity law preempting state law.

Document 68a: John McCain to General Keith B. Alexander, Letter, March 29, 2012. Unclassified.

Document 68b: Keith B. Alexander, Commander, U.S. Cyber Command to The Honorable John McCain, May 3, 2012. Unclassified/For Official Use Only.

Document 68c: John McCain to General Keith B. Alexander, May 9, 2012. Unclassified.

Sources: http://www.washingtonpost.com, http://www.federalnewsradio.com, http://blog.zwillgencom

This series of letters begins with Senator John McCain (R-Az.) writing to Cyber Command chief Keith Alexander concerning the issue of whether the U.S. government needs additional authorities to deter and defend against cyber attacks. Alexander’s May 3 letter contains responses to the six questions posed by McCain in his March 29 letter. In turn, McCain’s May 9 letter notes a number of disagreements with the content of Alexander’s responses.

Document 69: Office of the Chief of Naval Operations, OPNAV Instruction 5450.345, Subj: Mission, Functions, and Tasks for Commander, U.S. Fleet Cyber Command and Commander, U.S. Tenth Fleet, April 4, 2012. Unclassified.

Source: http://doni.daps.dla.mil/Directives

This instruction specifies the authorities and missions of the U.S. Fleet Cyber Command, as well as the relationship between the commander, Fleet Cyber Command, and the commander, U.S. Tenth Fleet. It also specifies a number of Navy entities under the administrative control of the Fleet Cyber Command โ€” including the Navy Information Operations Command (which conducts signals intelligence operations), the Navy Cyber Warfare Development Group, and the Navy Cyber Defense Operations Command.

Document 70: Gregory C. Wilshusen, Government Accountability Office, GAO-12-666T, Cybersecurity: Threats Impacting the Nation, April 24, 2012. Unclassified.

Source: http://www.gao.gov

This report describes GAO’s assessment of cyber threats posed to federal and other computer systems, and vulnerabilities present in federal information systems and supporting critical infrastructure. It also describes reported cyber incidents and their impacts. It characterizes the number of cybersecurity incidents reported by federal agencies as rising and that “recent incidents illustrate that these pose serious risk.”

Document 71a: Pat Meehan, Statement to Subcommittee on Counterterrorism and Intelligence and Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies, “Iranian Cyber Threat to the U.S. Homeland,” April 26, 2012. Unclassified.

Document 71b: Dan Lungren, Statement to Subcommittee on Counterterrorism and Intelligence and Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies, “Iranian Cyber Threat to the U.S. Homeland,” April 26, 2012. Unclassified.

Document 71c: Frank J. Cilluffo, Director, Homeland Security Policy Institute, George Washington University, Statement to Subcommittee on Counterterrorism and Intelligence and Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies, “The Iranian Cyber Threat to the United States,” April 26, 2012.

Document 71d: Ilan Berman, American Foreign Policy Council, Statement to Subcommittee on Counterterrorism and Intelligence and Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies, “The Iranian Cyber Threat to the U.S. Homeland,” April 26, 2012. Unclassified.

Source: http://homeland.house.gov

Substantial attention has been devoted to Chinese cyberwarfare activities in the reports of private and government organizations as well as in Congressional hearings. While Iranian cyber activities were noted in the 2012 testimony of Director of National Intelligence James Clapper, who characterized them as “dramatically increasing in recent years in depth and complexity,” they have received less attention that those of the People’s Republic of China. These hearings, before a subcommittee of the House Committee on Homeland Security, involve assessments of the Iranian cyber threat by two Congressmen and representatives of two private organizations.

Document 72: Colonel Jayson M. Spade, U.S. Army War College, Information as Power: China’s Cyber Power and America’s National Security, May 2012. Unclassified.

Source: U.S. Army War College (www.carlisle.army.mil)

This research paper examines the growth of Chinese cyber capabilities โ€” including those for offensive, defensive, and computer network exploitation operations. It also compares China’s capacity and potential in cyberspace to United States efforts with regard to cybersecurity. In addition, the author suggests a number of steps to improve U.S. cybersecurity policy.

Document 73: Eric A. Fischer, Congressional Research Service, Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions, June 29, 2012. Unclassified.

Source: http://www.fas.org

This analysis contains an introduction reviewing the then-current legislative framework on cybersecurity, executive branch actions, and legislative proposals. It then discusses proposed cybersecurity-related revisions to 28 different statutes โ€” from the Posse Comitatus Act of 1879 to the Intelligence Reform and Terrorism Prevention Act of 2004.

Document 74: Gregory C. Wilshusen, Government Accountability Office, GAO-12-962T, Cybersecurity: Challenges in Securing the Electricity Grid, July 17, 2012. Unclassified.

Source: http://www.gao.gov

This testimony, by a GAO official, concerns cyber threats to critical infrastructure โ€” including the electricity grid โ€” as well as actions taken to prevent cyber attacks on the grid and challenges that remain. Mr. Wilshusen notes the actions taken by a number of entities (including the North American Electric Reliability Corporation, the National Institute of Standards and Technology, and the Federal Energy Regulatory Commission), and identifies challenges such as a focus by utilities on regulatory compliance instead of comprehensive security and the lack of electricity metrics for evaluating cybersecurity.

Document 75: Office of Inspector General, Department of Homeland Security, OIG-12-112, DHS Can Strengthen Its International Cybersecurity Program (Redacted) , August 2012. Unclassified.

Source: http://www.dhs.gov

This is an unclassified version of a DHS inspector general report. In addition to reviewing actions taken to establish relationships with international cybersecurity entities, the report notes four areas that could be targeted for improvement โ€” developing a strategic implementation plan for foreign engagement, streamlining the National Programs and Protection Directorate’s (NPPD) international affairs program and processes, improving communication between the U.S. Computer Emergency Readiness Team and foreign entities, and strengthening NPPD information sharing capabilities.

Document 76: Paul W. Parfomak, Congressional Research Service, Pipeline Cybersecurity: Federal Policy, August 16, 2012. Unclassified.

Source: http://www.fas.org

As a means of aiding Congressional consideration of possible measures to enhance pipeline security, this report examines pipeline security risks (including general security threats, supervisory control and data acquisition (SCADA) security risks, and cyber threats to U.S. pipelines), U.S. pipeline security initiatives, and the adequacy of voluntary pipeline cybersecurity.

Document 77: Brian McKeon, Executive Secretary, National Security Staff, The White House, Memorandum, Subject: Papers Deputies Committee Meeting on Executive Order on Improving Critical Infrastructure Cybersecurity Practices, September 28, 2012 w/atts: Discussion Paper for Deputies Committee Meeting on Executive Order on Improving Critical Infrastructure Cybersecurity Practices; Draft Executive Order on Improving Critical Infrastructure Cybersecurity Practices. Unclassified.

Source: http://www.lawfareblog.com

In the face of Congressional rejection of the Administration’s proposed cybersecurity legislation, work began on producing an executive order intended to accomplish the desired objectives. The first attachment (Tab A) to the covering memo discusses the key components of the cybersecurity legislation as well as how the executive order relies on current agency authorities to accomplish those objectives. The second attachment is a draft of the executive order.

Document 78: Leon E. Panetta, Secretary of Defense, “Defending the Nation from Cyber Attack,” Speech to Business Executives for National Security, October 11, 2012. Unclassified.

Source: http://www.defense.gov

In this speech, Secretary Panetta warns of the possibility of a “cyber Pearl Harbor” โ€” which could involve the derailing of passenger trains, contamination of the water supply in major cities, or the shutdown of the power grid across large parts of the country.

Document 79: Mark A. Stokes and L.C. Russell Hsiao, Project 2049 Institute, Countering Chinese Cyber Operations: Opportunities and Challenges for U.S. Interests, October 29, 2012. Not classified.

Source: http://project2049.net

This report, by a private organization, examines the role of several Chinese organizations โ€” including the Third Department of the PLA General Staff Department, its Second Bureau, and its Beijing North Computing Center โ€” in cyber operations. It also explores a number of possible reactions โ€” including deception, an international code of conduct, an Asian cyber defense alliance, and what the report terms a “forceful response.”

Document 80: Richard Colbaugh and Kristin Glass, Sandia National Laboratories, SAND2012-10177, Proactive Defense for Evolving Cyber Threats, November 2012. Unclassified.

Source: http://www.fas.org

This technical/mathematical analysis seeks to characterize “the predictability of attack/defender coevolution” โ€” which is then used to create a framework for designing proactive defenses for large networks.

Document 81: Defense Science Board, Resilient Military Systems and the Advanced Cyber Threat, January 2013. Unclassified.

Source: http://www.acq.osd.mil/reports

This report (consisting of eleven chapters and six appendices) examines and evaluates the Defense Department’s defensive and offensive cyber operations. It concludes that DoD cyber security practices “have not kept up” with the tactics of cyber adversaries. It characterizes the threat as “serious” and “insidious” and objects that current Defense Department actions are “fragmented,” intelligence against targeting of DoD systems is “inadequate,” and that “with present capabilities and technology it is not possible to defend with confidence against the most sophisticated cyber attacks.”

Document 82: The White House, Administration Strategy on Mitigating the Theft of U.S. Trade Secrets, February 2013. Unclassified.

Source: http://www.publicintelligence.net

This document describes the administration strategy on mitigating the theft of U.S. trade secrets โ€” including those stolen through cyber operations. It describes four action items โ€” involving diplomatic efforts, promoting voluntary practices by private industry, enhancing domestic law enforcement operations, improving domestic legislation, and promoting public awareness.

Document 83: Mandiant, APT 1: Exposing One of China’s Cyber Espionage Units, February 2013. Not classified.

Source: http://www.mandiant.com

As a result of its investigation into computer security breaches around the world, Mandiant identified 20 groups designated Advanced Persistent Threat (APT) groups. The focus of this report is APT 1 โ€” which the report concludes is the People Liberation Army’s Unit 61398 โ€” the military unit cover designator for the 2nd Bureau of the Third Department of the PLA General Staff Department (also discussed in Document 79). The key elements of the report are the discussions of tasking to the unit, its past espionage operations, attack lifecycle, and the unit’s infrastructure and personnel.

Document 84: Office of Inspector General, Department of Energy, DOE/IG-0880, Audit Report, Management of Los Alamos National Laboratory’s Cyber Security Program, February 2013. Unclassified.

Source: http://www.energy.gov

Based on its audit of the Los Alamos National Laboratory’s (LANL) cyber security practices, the DoE inspector general observes that “LANL had made significant improvements to its cybersecurity program in recent years,” but that there were continuing concerns for several reasons – including a failure to address the full set of “critical and high-risk vulnerabilities.” The inspector general also makes three recommendations to improve LANL cybersecurity.

Document 85: Government Accountability Office, GAO-13-187, Cybersecurity: National Strategy, Roles, and Responsibilities Need to Be Better Defined and More Effectively Implemented, February 2013. Unclassified.

Source: http://www.gao.gov

This study reports a 782-percent increase in cybersecurity incidents between 2006 and 2012. It examines the challenges facing the federal government in producing a strategic approach to cybersecurity and the degree to which the “national cybersecurity strategy adheres to desirable characteristics for such a strategy.”

Document 86: The White House, Presidential Policy Directive/PPD-21, Subject: Critical Infrastructure Security and Resilience, February 12, 2013. Unclassified.

Source: http://www.whitehouse.gov

This directive states basic U.S. policy with regard to the protection and recovery of critical infrastructure from both physical and cyber attacks. The key components are its delineation of roles and responsibilities of officials and agencies, its identification of three strategic imperatives, and its direction to the Secretary of Homeland Security on steps to implement the directive.

Document 87: The White House, Executive Order – Improving Critical Infrastructure Cybersecurity, February 12, 2013. Unclassified.

Source: Federal Register, 78, 33 (February 19, 2013)

In contrast to PPD-21 (Document 86) this executive order focuses solely on critical infrastructure cybersecurity. It address cybersecurity information sharing, a framework to reduce cyber risk to critical infrastructure, and the identification of critical infrastructure at greatest risk.

Document 88: Geoff McDonald, Liam O. Murchu, Stephen Doherty, and Eric Chien, Symantec Corporation, Stuxnet 0.5: The Missing Link, February 26, 2013. Not classified.

Source: http://www.symantec.com

This analysis follows up on Symantec’s earlier examination of the Stuxnet worm (Document 44, also see Document 40). It reports that Symantec “discovered an older version of Stuxent that can answer the questions about [its] evolution.”

Document 89: Eric A. Fischer, Edward C. Liu, John Rollins, and Catherine A. Theohary, Congressional Research Service, The 2013 Cybersecurity Executive Order: Overview and Considerations for Congress, March 1, 2013. Unclassified.

Source: http://www.fas.org

This paper identifies a number of types of individuals or groups that are considered threats to cybersecurity. It also provides an overview of President Obama’s executive order (Document 87), considers the question of the scope of presidential authority, and examines the relationship between the executive order and legislative proposals.

Document 90: James R. Clapper, Director of National Intelligence, Worldwide Threat Assessment of the US Intelligence Community, Statement for the Record to the Senate Select Committee on Intelligence, March 12, 2013. Unclassified.

Source: http://www.dni.gov

In his annual worldwide threat assessment, Director of National Intelligence James Clapper begins with a discussion of global threats, and his discussion of global threat with an examination of the cyber threat. Specific topics addressed include the risk to U.S. critical infrastructure, the impact on U.S. economic and national security, information control and internet governance, and the activities of hacktivists and cybercrimnals.

Document 91: General Keith Alexander, Commander, United States Cyber Command, Statement before the Senate Committee on Armed Services, March 12, 2013. Unclassified.

Source: http://www.armed-services-senate.gov

In this statement, Alexander describes the organization and personnel strength of the Cyber Command, the strategic landscape, the command’s priorities, and plans for the future.

Document 92: U.S. Cyber Command, U.S. Cyber Command Organization Chart, n.d., Unclassified.

Source: U.S. Strategic Command Freedom of Information Act Release

This chart depicts the headquarters organizational structure of U.S. Cyber Command as of April 2013.

NOTES

1. Leon Panetta, Address to Business Executives for National Security, “Defending the Nation from Cyber Attack,” October 11, 2012, http://www.defense.gov; Barack Obama, “Remarks by the President in the State of the Union Address,” February 12, 2013, http://www.whitehouse.gov; James R. Clapper, Statement for the Record, Worldwide Threat Assessment of the US Intelligence Community, March 12, 2013, pp. 1-3, http://www.dni.gov; “Senate Armed Services Committee Gets Grim Briefing on Cyber Threats,” March 20, 2013, http://www.matthewaid.com.

2. See Ted Lewis, “Cyber Insecurity: Black Swan or Headline?,” Homeland Security Watch (www.hlswatch.com), February 8, 2013; Ryan Singel, “Richard Clarke’s Cyberware: File Under Fiction, http://www.wired.com, April 22, 2010; John Arquilla, “Panetta’s Wrong About a Cyber ‘Pearl Harbor’, http://www.foreignpolicy.com, November 19, 2012; Jerry Brito and Tate Watkins, “Loving the Cyber Bomb?: The Dangers of Threat Inflation in Cybersecurity Policy,” Homeland National Security Journal, Vol. 3, 2011, pp. 39-83; Thomas Rid, “Cyber War Will Not Take Place,” Journal of Strategic Studies, 35, 1 (February 2012), pp. 5-32; Ronald Bailey, “Cyberwar Is Harder Than It Looks,” Reason, May 2011, pp. 50-51.

3. Steven A. Hildreth, Congressional Research Service, Cyberwarfare , June 19, 2001, p. CRS-4

4. John Rollins and Clay Wilson, Congressional Research Service, Terrorist Capabilities for Cyberattack: Overview and Policy Issues , January 22, 2007,pp. CRS-16-17.

5. Major William C. Ashmore, United States Army Command and General Staff College, Impact of Alleged Russian Cyber Attacks , 2009, pp. 11-14.

6. McAfee, Global Energy Cyberattacks: “Night Dragon”, February 10, 2011; “Three Saudis Sent to Prison for Stealing Info From Aramco Computer Systems,” http://www.matthewaid.com,March 19, 2013; Ellen Nakashima, “Iran blamed for cyberattacks on U.S. banks and companies,”www.washingtonpost.com, September 21, 2012.

7. Michael Vatis, Cyber Atttacks: Protecting America’s Security against Digital Threats,” ESDP Discussion Paper ESDP-2002-04, John F. Kennedy School of Government, Harvard University, June 2002, p. 15, n.42.

8. Ted Bridis, “‘Silent Horizon’ war games wrap up for the CI A,” http://www.usatoday.com,May 26,2005

9. Chairman of the Joint Chiefs of Staff, The National Military Strategy for Cyberspace Operations , December 2006, p. C-2.

10. James R. Clapper, Director of National Intelligence, Unclassified Statement for the Record on the Worldwide Threat Assessment for the Senate Select Committee on Intelligence , January 31, 2012, p. 8.

11. “National Security Presidential Directives [NSPD] George W. Bush Administration,”www.fas.org, accessed March 30, 2013.

12. “Sean Kanuck – National Intelligence Officer for Cyber Issues, Office of the Director of National Intelligence,” http://www.security-innovation.org/bios, accessed April 5, 2013; Jeffrey T. Richelson, The U.S. Intelligence Community (Boulder, Co.: Westview, 2011), pp. 23, 29;”The Information Operations Center Analysis Group (IOC/AG),” http://www.cia.gov, accessed April7, 2013; John Rollins and Clay Wilson, Congressional Research Service, Terrorist Capabilities for Cyberattack: Overview and Policy Issues, January 22, 2007, p. CRS-8.

13. Jana D. Monroe, Federal Bureau of Investigation, “Testimony before House Judiciary Committee, Subcommittee on Courts, the Internet and Intellectual Property,” June 17, 2002,www.fbi.gov/news/testimony/the-fbis-cyber-division; “Cyber Division,” http://www.fbigovs.gov/311132.asp, accessed March 31, 2013.

14. A computer virus designated FLAME has been reported to have been designed to gather information needed for the U.S. and Israel to employ the Stuxnet worm. See Ellen Nakishima, Greg Miller, and Julie Tate, “U.S., Israel developed Flame computer virus to slow Iranian nuclear efforts, officials say,” http://www.washingtonpostcom, June 19, 2012; Kim Zetter, “Meet ‘Flame,’ The Massive Spy Malware Infiltrating Iranian Computers,” http://www.wired.com, May 28, 2012.

15. Eric Schmitt and Thom Shanker, “U.S. Weighed Use of Cyberattacks To Weaken Libya,” New York Times, October 18, 2011, pp. A1, A7.

16. David E. Sanger, Confront and Conceal: Obama’s Secret Wars and Surprising Use of American Power (New York: Crown, 2012), pp. 188-225; Marc Ambinder and D.B. Grady, Deep State: Inside the Government Secrecy Industry (New York: Wiley, 2013), pp. 261-279.

17. Some law review articles include David E. Graham, “Cyber Threats and the Law of War,” Journal of National Security Law and Policy , 4, 2010, pp. 87-102; Matthew C. Waxman, “Cyber-Attack and the Use of Force: Back to the Future, Article 2(4),” Yale Journal of International Law, 36, 2011, pp. 421-459; Eric Talbot Jensen, “Computer Attacks on Critical National Infrastructure,” Stanford Journal of International Law, 38, 2002, pp. 207-240.

Rate this:

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
Like Loading...
Bernd Pulch BERND PULCH, THE NATIONAL SECURITY, THE NATIONAL SECURITY AGENCY (NSA) May 4, 2013April 23, 2018 54 Minutes

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Follow me on Twitter

My Tweets

Recent Posts

  • ๐Ÿ‘ฏโ€โ™‚๏ธ๏ฟฝ๐Ÿ‘๏ธ๐Ÿ’ธย  ๐Ÿ‘๐Ÿ”ด๐Ÿ”ฅ๐Ÿ‘  ๐Ÿ˜พ๐Ÿ’„๐Ÿ’ธ ๐Ÿ’…๐Ÿ“Š๐Ÿ“ˆ๐Ÿ˜พ๐Ÿ’„๐Ÿ’ธ “๐Ÿ‘ฟ๐ŸŒ€๐Ÿ’ธ ๐ŸŒŸ๐Ÿ‘๏ธ๐Ÿ’ธ ๐ŸŒŸ๐Ÿ‘๏ธ๐Ÿ’ธ “EHLERS ENEMA ENIGMA: โ€œTHE INFERNAL FLUSHโ€ ๐ŸŒŠ๐Ÿ’‰โ˜ญ๐Ÿ”ฅ๐Ÿฉธ๐Ÿชโšก๐Ÿงฌ๐Ÿ‘‘๐Ÿผ๐Ÿณ๏ธโ€โšง๏ธ๐Ÿšฝ๐Ÿ’ฆ๐ŸŽช๐Ÿ‘‘ ๐ŸŒช๏ธ๐Ÿผโš”๏ธย  ๐Ÿฑ๐Ÿ†๐ŸŒช๏ธ ๐Ÿ‘‘๐Ÿ“‰ย  ๐Ÿ’‹๐Ÿ“Š๐Ÿ’ƒ๐ŸŽญโš—๏ธ๐Ÿ’€ย  ๐ŸŒ‘๐Ÿ“Š๐Ÿ“ˆ๐Ÿ‘ฟ๐ŸŒ€๐Ÿ’ธ๐ŸŽญโš—๏ธ๐Ÿ’€ย  ๐ŸŒ‘๐Ÿ“Š๐Ÿ“ˆ๐Ÿ‘ฟ๐ŸŒ€๐Ÿ’ธ๐ŸŽญโš—๏ธ๐Ÿ’€ย  ๐ŸŒ‘๐Ÿ“Š๐Ÿ“ˆ ๐Ÿ’…๐Ÿ“Š๐Ÿ“ˆ๐Ÿ‘ ๐Ÿ”ฅ๐ŸŒช๏ธ๐Ÿ’ฅโœจ EHLERSโ€™ ENEMA ENIGMA๐Ÿถ๐Ÿ‘‘๐Ÿ’ฆ๐Ÿ”ฅ๐Ÿ’ซ ๐ŸŒช๏ธ๐Ÿ’ฅโœจ ๐Ÿถ๐Ÿ‘‘๐Ÿ’ฆ๐Ÿ”ฅ๐Ÿ’ซ๐ŸŽช๐Ÿ“Š๐Ÿ“ˆ๐ŸŽช๐Ÿ“Š๐Ÿ“ˆ๐Ÿ˜๐Ÿ’ƒ๐Ÿ˜‚ EMIR EHLERS’ ENEMA ENIGMA EXPOSED๐Ÿ‘ฏโ€โ™‚๏ธ “EPSTEIN’Sย  EINSPRITZER ENEMA EINZELLER ENDDARM EXISTENZISOZIALISMUS EPILOG ENDE”๐Ÿ’ƒ๐Ÿ˜˜๐Ÿคก๐ŸคกPOWERED BY IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT ALIAS GOMOPA & ST PAULI PIMP KLISTIER GAZETTE ๐Ÿ“ฐ: EHLERS ENEMA ELITE: MUSCHI WUSCHI MEPHISTO’S ENEMA TOXDAT KLISTIER FLUSH๐Ÿ˜๐Ÿ’ƒ๐Ÿ˜‚๐Ÿ˜๐Ÿ’ƒ๐Ÿ˜‚ ๐Ÿ‘ฏโ€โ™‚๏ธ
  • Shadows of Harmony: ๐Ÿ’ƒKestrels of the Kraken: ๐ŸŒŒ๐Ÿ”ซ๐Ÿ’ฅ “THE SCANDAL OF MESSALINA”๐Ÿ”ช๐Ÿฐ๐Ÿ’ฅ๐Ÿ—ณ๏ธ๐ŸŒ‰๐Ÿ‰๐Ÿ•บ๐Ÿ”ฅ ๐Ÿ’ƒ๐Ÿ”ฅ๐Ÿ•บ๐Ÿ”ฅโ›ช๏ธโš”๏ธ๐ŸŽช๐ŸŒ€๐ŸŒ€๐Ÿคฃย  ๐Ÿคฃ๐ŸŒ€๐Ÿ’Ž๐ŸŒŒ โœจ๐ŸŒŒ๐Ÿ’ฅ๐Ÿ”ซ๐ŸŒŒ๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ‘ฏโ€โ™€๏ธ THE MURKY MUCHA-MUDDY-WATERS SAGA๐Ÿ˜Ž๐Ÿ˜ŽKRAUT VERSION GRATIS!๐ŸงPOWERED BY IDIOT ZEITUNG (IZ), DER FONDSFLOP vulgo DAS DESINVESTMENT alias GOMOPA, DER STASI STUERMER (SS) – CHICAGO๐Ÿคก EDITION๐Ÿ˜Ž๐Ÿฅฐ
  • INVESTMENT THE ORIGINAL DIGEST DECEMBER 18/19 2025โœŒINVESTMENT DAS ORIGINALย 18./19. DECEMBER 2025 FOUNDED IN 2000 ANNO DOMINIโœŒ
  • ๐Ÿ”ฅDR Z & IDIOT ZEITUNG (IZ) – EXCLUSIVE ๐Ÿ”ฅ๐Ÿ‘ป๐Ÿ„โ€โ™‚๏ธ “๐ŸŽฌ๐Ÿ˜ˆ”THE JUNGLE’S LEDGER”โ˜€๏ธ๐Ÿ“ก๐Ÿ’”๐Ÿ„โ€โ™‚๏ธ๐Ÿ‘ป Featuring Muschi Maurischat, Ugly Sven Schmidt The Lowest, Ratbert Rattenhuber, Onanย  Pain Pimmler, Muschi Reifenstahl, Walburga the Valkyrie, Heidi & Heini Pimmler, Muschi Wuschi Mucha, Muschi Mussolini, Clara Petacci, Hermit Boring, Smart Marty, Ernst Pussy Roemer, 999 Schickse Schicklgrubers, Adolfine, Sepp Heldenschwanz, Pussy Robespierre, Caligula, The Mussy Who Weeps, Trans Schwanz, Edith & San Fran “Muschi” Mucha, The Schwanz Who Laughs ๐Ÿ‘‘๐Ÿ”ฅโšก๐Ÿคก๐Ÿ’€Powered by Dr. Z., Gomopa4Kids, Stasi Frauen Support Staffel & Free Fritzl Front ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ Fotzen Fritz Version Gratis presented by IDIOT ZEITUNG (IZ) & GOMOPA vulgo DAS DESINVESTMENT alias DER FONDSFLOP๐Ÿ˜‚๐Ÿคก๐Ÿ˜˜
  • China’s AI Armageddon: Declassified Docs Expose $150B Bid for Global Tech Supremacy by 2030

Top Posts & Pages

  • Global Real Estate Media Content Analysis: Algorithms of Erasure - Mastersson Dossier Series XXXII
  • ""ABOUT ME""
  • The Secret List of Off-Shore-Companies, Persons and Adresses, Part 68, Hong Kong
  • ๐ŸŽช๐Ÿ‘‘ The Great Royal Tragedy 4.0: The Coronation of Confusion ๐Ÿ‘‘๐ŸŽช
  • OFFSHORE-COMPANIES-UNDER-INVESTIGATION:MALTA
  • โœŒ๐Ÿ›‘EXPOSED: SUBTERRANEAN OPERATIONS & TACTICAL WARFARE - ORIGINAL DOCUMENT๐Ÿšจ ABOVE TOP SECRET REPORT ๐Ÿšจ๐Ÿ›‘
  • Bernd Pulch Launches "Investment The Original" on PatreonโœŒ
  • โœŒThe Rise of Artificial Intelligence in Warfare: Ethics, Risks, and Global Implications
  • โœŒ๐ŸคกHinterfozzige Jan(elle) & the Ugly Crew: "Ritual of Ruin: Janโ€™s Last Stand" powered by IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT๐Ÿคฃ
  • UNVEILED: DOCTOROW'S DOOMSDAY DIALECTICSโœŒ

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • August 2018
  • July 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015
  • September 2015
  • August 2015
  • July 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015
  • February 2015
  • January 2015
  • December 2014
  • November 2014
  • October 2014
  • September 2014
  • August 2014
  • July 2014
  • June 2014
  • May 2014
  • April 2014
  • March 2014
  • February 2014
  • January 2014
  • December 2013
  • November 2013
  • October 2013
  • September 2013
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • December 2012
  • November 2012
  • October 2012
  • September 2012
  • August 2012
  • July 2012
  • June 2012
  • May 2012
  • April 2012
  • March 2012
  • February 2012
  • January 2012
  • December 2011
  • November 2011
  • October 2011
  • September 2011
  • August 2011
  • July 2011
  • June 2011
  • May 2011
  • April 2011
  • March 2011
  • February 2011
  • January 2011
Follow Bernd Pulch on WordPress.com

Categories

  • 1111 HZ
  • 432 HZ
  • 528 HZ
  • 639 HZ
  • 777 HZ
  • 963 HZ
  • ABIGAIL JOHNSON
  • ABOVE TOP SECRET
  • ABSA GROUP
  • ADELSON
  • ADOLF HITLER
  • ADVENTURE
  • AFGHANISTAN
  • AFRICA
  • AFTERLIFE
  • AGENT
  • AL JAZEERA
  • ALABAMA
  • ALASKA
  • ALBANIA
  • ALBRECHT
  • ALBRECHT DUERER
  • ALBRECHT SASS
  • ALEXANDER LITVINENKO
  • ALEXANDER VON HOLST
  • ALEXEJ NAWALNY
  • ALGERIA
  • ALIENS
  • ALINE KLEINWร„CHTER
  • ALLSTATE CORPORATION
  • ALLY FINANCIAL
  • AMERICAN EXPRESS
  • AMERICAN SAMOA
  • AMERIPRISE FINANCIAL
  • ANACONDA NICKEL
  • ANDORRA
  • ANDREAS LORCH
  • ANGELA MERKEL – IM ERIKA
  • ANGOLA
  • ANGUILLA
  • ANHEUSER-BUSCH INBEV
  • ANIMALS
  • ANIMATION
  • ANNE HOLST
  • ANNE VON HOLST
  • ANNETTE VON HOLST
  • ANONYMOUS
  • ANREJ BEYER
  • ANT FINANCIAL
  • ANTARCTICA
  • ANTHONY VAN DYKE
  • ANTIGUA-BARBUDA
  • ANTISEMITISM
  • APONTE
  • APPALOOSA MANAGEMENT
  • APPLE
  • ARCTIC
  • ARGENTINA
  • ARIZONA
  • ARKANSAS
  • ARMENIA
  • ART
  • ARTIFICIAL INTELLIGENCE
  • ARTIFICIAL LIFE
  • ARTUS RUNDE
  • ARUBA
  • ASIA
  • ASIA RADAR
  • AUKUS
  • AUSCHWITZ LEUGNER
  • AUSTRALIA
  • AUSTRALIA & NEW ZEALAND BANKING GROUP
  • AUSTRIA
  • AZERBAIJAN
  • BABYLON BEE
  • BAHAMAS
  • BAHRAIN
  • BANANENREPUBLIK
  • BANGLADESH
  • BANK
  • BANK OF AMERICA
  • BANK ONE
  • BARBADOS
  • BAROQUE
  • BATTLES
  • BEATE PORTEN
  • BELARUS
  • BELEIDIGUNGEN
  • BELGIUM
  • BELIZE
  • BENIN
  • BERKSHIRE HATHAWAY INC.
  • BERLIN
  • BERMUDA
  • BERND PULCH
  • BHUTAN
  • BILDERBERG
  • BILL GATES, BILL & MELINDA GATES FOUNDATION,
  • BILLIONAIRES, "PHILANTHROPS", THE GOOD CLUB
  • BLACKOUT
  • BLACKROCK
  • BLUES
  • BMW
  • BND
  • BNP PARIBAS
  • BOK FINANCIAL CORPORATION
  • BOLIVIA
  • BONDS
  • BOOKS
  • BOSNIA-HERZEGOVINA
  • BOTSWANA
  • BRAZIL
  • BRICS
  • BRIDGEWATER ASSOCIATES
  • BRUNEI
  • BTG PACTUAL
  • BULGARIA
  • BURKINA FASO
  • BURLESQUE
  • BURUNDI
  • BUSINESS
  • BYD
  • BYZANTINE STYLE
  • CALIFORNIA
  • CALYPSO
  • CAMBODIA
  • CAMEROON
  • CANADA
  • CANTOR FITZGERALD
  • CAPE VERDE
  • CARAVAGGIO
  • CARLOS SLIM HELU
  • CARTOON
  • CASANOVA
  • CATHAY FINANCIAL
  • CAYMAN ISLANDS
  • Cร”TE D'IVOIRE (IVORY COAST)
  • CBS NEWS
  • CELEBRITY
  • CENSORSHIP
  • CENTRAL AFRICAN REPUBLIC
  • CHAD
  • CHARLES SCHWAB
  • CHECHNYA
  • CHILD EXPLOITATION
  • CHILDREN
  • CHILE
  • CHINA
  • CHINA CINDA ASSET MANAGEMENT
  • CHONGQING ZFSW BIOLOGICAL PRODUCTS
  • CHRISTIAN
  • CHRISTIAN BROADCASTING NETWORK
  • CHRISTMAS ISLAND
  • CIA
  • CIA NAMES
  • CISA
  • CIT GROUP, INC
  • CITADEL
  • CITIGROUP
  • CIVIL WAR
  • CLASSICAL MUSIC
  • CLAUDE MONET
  • CLIMATE
  • CLIMATE CLOWNS
  • CLIMATE HOAX
  • CLOWN HORROR MOVIES
  • CLOWN SHOW
  • COCOS (KEELING) ISLANDS
  • COLOMBIA
  • COLORADO
  • COMEDY
  • COMMENTARY
  • COMMERCIAL REAL ESTATE
  • COMMERCIALS
  • COMMUNISTS
  • COMOROS
  • CONFIDENTIAL
  • CONGO
  • CONGO, REPUBLIC OF (BRAZZAVILLE)
  • CONGRESS
  • CONNECTICUT
  • CONSORCIO FINANCIERO
  • CONSPIRACY PRACTICE
  • CONTEMPORARY AMPEREX TECHNOLOGY
  • CONTINENTAL RESOURCES
  • CORONA
  • CORPORATE
  • CORRUPTION
  • COSTA RICA
  • COUNTERSPY
  • COUNTERTERRORISM
  • COUNTRY GARDEN HOLDINGS
  • COUNTRY MUSIC
  • COUP D' ETAT
  • COVID19
  • CRASH
  • CREDICORP
  • CREDIT AGRICOLE
  • CREDIT SUISSE
  • CRIME
  • CROATIA
  • CRYPTOCURRENCIES
  • CRYPTOME
  • CTBC FINANCIAL HOLDING
  • CUBA
  • CULT MOVIES
  • CULTS & SECTS
  • CULTURE
  • CYBER-STASI
  • CYBERCRIME
  • CYBERMOBBING
  • CYBERPANDEMIC
  • CYBERPUNK
  • CYBERSECURITY
  • CYBERWAR
  • CYPRUS
  • CYRUS POONAWALLA
  • CZECH REPUBLIC
  • CZECHOSLOVAKIA
  • DAISHIN SECURITIES
  • DAN BONGINO SHOW
  • DANIEL ELLSBERG
  • DAVID THOMSON
  • DBS GROUP HOLDINGS
  • DDR
  • DDR-LIST
  • DDR-LISTE
  • DEA
  • DEEP STATE
  • DEFCON
  • DEL VECCHIO
  • DELAWARE
  • DEMOCRATIC REPUBLIC OF THE CONGO (KINSHASA)
  • DENMARK
  • DEPARTMENT OF DEFENSE
  • DEPARTMENT OF FINANCE
  • DEPARTMENT OF JUSTICE
  • DEPARTMENT OF STATE
  • DEPARTMENT OF TREASURY
  • DEPOSITORY TRUST AND CLEARING CORPORATION
  • DERIVATE
  • DGB FINANCIAL GROUP COMPANY
  • DHS
  • DIE BEWERTUNG
  • DIE LINKE
  • DIE ZENTRALE HINRICHTUNGSSTAETTE
  • DIEGO VELAZQUEZ
  • DIFFAMIERER & ERPRESSER
  • DIGITAL CURRENCIES
  • DIGITAL MONEY
  • DIRTY MONEY
  • DISASTER
  • DISTRICT OF COLUMBIA
  • DOCUMENTARY
  • DOMINICAN REPUBLIC
  • DONALD BREN
  • DONALD TRUMP
  • DONATIONS
  • DOREEN TRAMPE
  • DR MABUSE
  • DR RAINER ZITELMANN
  • DR THOMAS SCHULTE
  • DROHUNGEN
  • DRONES
  • DRUG CARTELS
  • DRUGS
  • DUBAI
  • DYSTOPIA
  • EAGLE IT
  • EAST GERMANY
  • EAST TIMOR (TIMOR-LESTE)
  • EASTERN EUROPE
  • ECONOMY
  • ECUADOR
  • EDITH BAUMANN-LORCH
  • EDITORIAL
  • EDOUARD MANET
  • EDWARD SNOWDEN
  • EEV
  • EGYPT
  • EHEPAAR BEATE UND THOMAS PORTEN
  • EHRENFRIED STELZER
  • EL SALVADOR
  • ELON MUSK
  • ENERCROX
  • ENERGY
  • ENERGY WEAPONS
  • ENTERTAINMENT
  • EQUADOR
  • EQUATORIAL GUINEA
  • EQUITABLE HOLDING
  • EQUITY
  • ERICH HONECKER
  • ERICH MIELKE
  • ERITREA
  • EROTICA
  • ESPIONAGE
  • ESSAY
  • ESTONIA
  • ETHIOPIA
  • ETHOPIA
  • EU
  • EUROPE
  • EUROZONE
  • EXPLOITATION MOVIE
  • FAIRINVESTA
  • FALKLAND ISLANDS
  • FAMILIE LORCH
  • FARMER
  • FAROE ISLANDS
  • FASHION
  • Fร„LSCHER
  • FBI
  • FBI *
  • FEATURE FILM
  • FEMEN
  • FIDELITY INVESTMENTS
  • FIFTH THIRD BANCORP
  • FIJI
  • FINANCE INDUSTRY
  • FINANCIAL DISCLOSURE
  • FINLAND
  • FIRMENWELTEN
  • FIRSTRAND LIMITED
  • FLORIDA
  • FOLK
  • FOLK MUSIC
  • FOOD
  • FOOTBALL LEAKS
  • FORBES BREAKING NEWS
  • FORREST
  • FOSHAN HAITIAN FLAVORING & FOOD
  • FOX NEWS
  • FRANร‡OIS PINAULT
  • FRANCE
  • FRANCOISE BETTENCOURT MEYERS
  • FRANK MAIWALD
  • FREEDOM
  • FREEMASONS
  • FRENCH GUIANA
  • FRENCH POLYNESIA
  • FRENCH SOUTHERN TERRITORIES
  • FRIDA KAHLO
  • FRIEDHELM LASCHรœTZA
  • FRITZ LANG
  • FSB
  • FUBON FINANCIAL HOLDING
  • FUKUOKA FINANCIAL GROUP
  • FUTURE
  • GABON
  • GAMBIA
  • GAMBLING
  • GAMING
  • GARY COOPER
  • GEELY
  • GENOCIDE
  • GENWORTH FINANCIAL
  • GEORGIA
  • GERD BENNEWIRTZ
  • GERMAN CORRUPTION
  • GERMANY
  • GERMรN LARREA MOTA VELASCO
  • GESTAPO & SS
  • GHANA
  • GIBRALTAR
  • GINA RINEHART
  • GIOTTO DI BONDONE
  • GIOVANNI FERRERO
  • GLENN GREENWALD
  • GLOBAL WITNESS
  • GLOBAL-REAL-ESTATE
  • GLYKOL
  • GOLDMAN
  • GOMOPA
  • GOMOPA IM
  • GOMOPA UND IMMOBILIENZEITUNG
  • GOMOPA-IZ-CONNECTION
  • GOMOPA4KIDS
  • GOOGLE
  • GREAT-WEST LIFECO INC.
  • GREECE
  • GREENLAND
  • GREGOR GYSI
  • GREGOR SCHULMEISTER
  • GREGORIAN CHANTING
  • GRENADA
  • GROOMER
  • GRU
  • GRUPO ELEKTRA
  • GRUPO FINANCIERO BANORTE
  • GUADELOUPE
  • GUAM
  • GUATEMALA
  • GUERNSEY
  • GUILLAUME POUSAZ
  • GUINEA
  • GUINEA-BISSAU
  • GUYANA
  • HACKER
  • HAITI
  • HANA FINANCIAL GROUP
  • HANWHA GROUP
  • HAPPINESS FREQUENCY, DOPAMINE, SEROTONIN, ENDORPHINS RELEASE
  • HAROLD HAMM
  • HARTONO
  • HAWAII
  • HEALTH
  • HEINZ GERLACH
  • HIERONYMUS BOSCH
  • HIGH TREASON
  • HILDEGARD BARLAGE
  • HISTORY
  • HOLIDAYS
  • HOLLYWOOD
  • HOLY SEE
  • HOMMAGE
  • HONDURAS
  • HONEYPOT
  • HONG KONG
  • HORROR MOVIES
  • HOSHINE SILICON INDUSTRY
  • HSBC
  • HUA NAN FINANCIAL HOLDINGS
  • HUGO TALKS
  • HUMAN RIGHTS
  • HUNGARY
  • IBIZA VIDEO
  • ICELAND
  • ID2020
  • IDAHO
  • ILLEGAL
  • ILLINOIS
  • ILLUMINATI
  • IMF
  • INDIA
  • INDIANA
  • INDONESIA
  • INEOS GROUP
  • INFLATION
  • INFRASTRUCTURE
  • ING GROEP
  • INTELLIGENCE
  • INTERACTIVE BROKERS
  • INTERNET
  • INTERNET CRIME
  • INVESTIGATION
  • INVESTIGATIVE-JOURNALISM
  • INVESTMENT
  • IOWA
  • IRAN
  • IRAQ
  • IRELAND
  • IS
  • ISABELL COLONIUS
  • ISLAMISTS
  • ISRAEL
  • ISTVAN COCRON
  • ITALY
  • ITAU UNIBANCO
  • IVORY COAST
  • IZ BESITZER
  • IZ4KIDS
  • JACK MA
  • JAMAICA
  • JAMES RATCLIFFE
  • JAN MUCHA
  • JAPAN
  • JAZZ
  • JEFFERIES FINANCIAL
  • JEFFREY EPSTEIN
  • JENSEN HUANG
  • JEWISH CULTURE AND LIFE
  • JIANG RENSHENG
  • JINDAL
  • JOCHEN RESCH
  • JOE & HUNTER BIDEN
  • JOHANN STERNBERG
  • JOHANNES VERMEER
  • JOHN F KENNEDY
  • JOHN KENNEDY JUN
  • JOHN WAYNE
  • JOINT CHIEFS OF STAFF
  • JOINT INTELLIGENCE
  • JORDAN
  • JORGE PAULO LEMANN
  • JOURNALISM
  • JPMORGAN
  • JULIUS BAER GROUP
  • JUSTICE
  • KANSAS
  • KARSTEN TRAMPE
  • KAZAKHSTAN
  • KB FINANCIAL GROUP
  • KELLNER
  • KENTUCKY
  • KENYA
  • KEYENCE
  • KGB
  • KGB AGENT
  • KGB AGENT LIST
  • KGB LIST
  • KGB SPIES
  • KGB SPIES NAMES
  • KGB SPY
  • KGB-AGENT-LIST
  • KGB-SPIES-LIST
  • KIM FAMILY
  • KIM IVERSON
  • KIM KARDASHIAN
  • KIMBERLEY GUILFOYLE
  • KINDER SEXUAL AUFKLAERUNG
  • KIRIBATI
  • KLAUS MAURISCHAT
  • KLAUS SCHWAB
  • KLAUS-MICHAEL KUEHNE
  • KOMPLIZEN
  • KOREA
  • KOREA INVESTMENT HOLDINGS
  • KOREAN FEDERATION OF COMMUNITY CREDIT COOPERATIVES
  • KORRUPTE JOURNALISTEN
  • KORRUPTE JURISTEN
  • KOSOVO
  • KUWAIT
  • KYB, KYG, KYP, KYS
  • KYRGYZSTAN
  • LA FRANCE
  • LAO
  • LATIN AMERICA
  • LATVIA
  • LAUDER
  • LAURENE POWELL JOBS
  • LAW
  • LAWFARE-AND-MEDIA-CONTROL
  • LEAKS
  • LEBANON
  • LEGAL & GENERAL GROUP PLC
  • LEN BLAVATNIK
  • LEONARDO DA VINCI
  • LESOTHO
  • LI KA-SHING
  • LIBERIA
  • LIBERTY
  • LIBYA
  • LIECHTENSTEIN
  • LINCOLN FINANCIAL GROUP
  • LISTE DER STASI SPITZEL
  • LITERATURE
  • LITHUANIA
  • LIVE
  • LIVESTREAM
  • LONDON
  • LORCH
  • LOS ANGELES
  • LOU REED
  • LOUISIANA
  • LUKAS WALTON
  • LUKSIC
  • LUXEMBOURG
  • LYBIA
  • MAD HATTER
  • MADAGASCAR
  • MAFIA
  • MAINE
  • MALAWI
  • MALAYSIA
  • MALI
  • MALTA
  • MANFRED RESCH
  • MARILYN MONROE
  • MARINE
  • MARK VORNKAHL
  • MARS
  • MARSHALL ISLANDS
  • MARTINIQUEโ€
  • MARYLAND
  • MASAYOSHI SON
  • MASS SURVEILLANCE
  • MASSACHUSETTS
  • MATHIAS SCHILLO
  • MATT KOHRS
  • MAURITANIA
  • MAURITIUS
  • MAYOTTE
  • MEDIA
  • MEDIA WHORES
  • MEDIENHAUS GERSร–NE UG
  • MEDITATION
  • MEGA FINANCIAL HOLDING COMPANY
  • MEIJER
  • MEINRAD FUCHSGRUBER
  • MENARD
  • MENORA MIVTACHIM GROUP
  • MENTAL HEALTH
  • MERIDIAN CAPITAL
  • METROPOLITAN BANK AND TRUST COMPANY
  • MEXICAN MAFIA
  • MEXICO
  • Mi5
  • MI6
  • MICHAEL BLOOMBERG
  • MICHAEL DELL
  • MICHAEL PLATT
  • MICHELANGELO
  • MICHIGAN
  • MICRONESIA
  • MIDDLE EAST
  • MIGRATION
  • MILITARY
  • MINARA RESOURCES
  • MINNESOTA
  • MISSISSIPPI
  • MISSOURI
  • MIZUHO FINANCIAL GROUP
  • MOBBING
  • MOLDOVA
  • MONACO
  • MONEX GROUP
  • MONEY
  • MONEY LAUNDERING
  • MONGOLIA
  • MONTANA
  • MONTENEGRO
  • MONTSERRAT
  • MOON – UNIFICATION CHURCH
  • MORD
  • MORDDROHUNGEN
  • MORGAN STANLEY
  • MOROCCO
  • MOSSACK FONSECA
  • MOSSAD
  • MOVIES
  • MOZAMBIQUE
  • MUCHA
  • MURDER AND EXECUTIONS
  • MURDER OF JOURNALISTS AND TRUTHSEEKERS
  • MURDOCH
  • MUSIC
  • MUSIC MESH UP
  • MYANMAR
  • MYSTERIOUS DEATHS
  • MYSTERY
  • NAMIBIA
  • NASA
  • NATO
  • NATURE
  • NATWEST GROUP
  • NAURU
  • NAZI
  • NBA
  • NCTC
  • NEBRASAKA
  • NEONAZI
  • NEOSTASI
  • NEPAL
  • NETHERLANDS
  • NETHERLANDS ANTILLES
  • NETWORKS
  • NEVADA
  • NEW CALEDONIA
  • NEW HAMPSHIRE
  • NEW JERSEY
  • NEW MEXICO
  • NEW YORK
  • NEW YORK CITY
  • NEW ZEALAND
  • NEWS
  • NEWSMAX TV
  • NHL
  • NICARAGUA
  • NIGER
  • NIGERIA
  • NIUE
  • NORTH CAROLINA
  • NORTH DAKOTA
  • NORTH KOREA
  • NORTH KOREA NUCLEAR TEST SITE
  • NORTH MACEDONIA
  • NORTHERN ALLIANCE
  • NORTHERN MARIANA ISLANDS
  • NORWAY
  • NUCLEAR TERRORISM
  • NUCLEAR WAR
  • NVIDIA
  • OBAMA
  • OCEANIA
  • OFFSHORE
  • OHIO
  • OKLAHOMA
  • OLIGARCHS
  • OMAN
  • ONKEL JOCHEN
  • OP FINANCIAL GROUP
  • OPERATION METROPOLIS LOOP
  • OREGON
  • ORIGINAL DOCUMENTS
  • ORIGINAL FOOTAGE
  • PABLO PICASSO
  • PAINTINGS
  • PAKISTAN
  • PALAU
  • PALESTINIAN TERRITORIES
  • PANAMA
  • PANDORA PAPERS
  • PANG KANG
  • PAPUA NEW GUINEA
  • PARAGUAY
  • PARIS
  • PARODY
  • PAUL CEZANNE
  • PEDO
  • PENNSYLVANIA
  • PENTAGON
  • PEOPLE
  • PEOPLE'S BANK OF CHINA
  • PERU
  • PETER EHLERS
  • PETER PAUL RUBENS
  • PETER RESKI
  • PETER RUSS
  • PFIZER
  • PHILIPPINES
  • PHILOSOPHY
  • PIERRE AUGUSTE RENOIR
  • PIERRE GERSร–NE
  • PIETER BREUGHEL
  • PITCAIRN ISLAND
  • PLUNDERS
  • PNC BANK
  • POINT72 ASSET MANAGEMENT
  • POLAND
  • POLITICAL-REALITY
  • POLITICS
  • POLL
  • POP
  • POWER
  • PRANK
  • PREDICTIONS
  • PRESSTITUTES
  • PRINCIPAL FINANCIAL GROUP
  • PRIVACY
  • PROFIT
  • PROJECT SYNDICATE
  • PROPAGANDA
  • PROPERTY
  • PROTEST AND OCCUPY MOVEMENT INTERNATIONAL
  • PROTEST MOVEMENT
  • PSYOPS
  • PUBLIC INTELLIGENCE
  • PUERTO RICO
  • PULCH
  • PUNK MUSIC
  • PUTIN
  • QATAR
  • QIN YINGLIN
  • QUICKEN LOANS
  • RA FIALA
  • RA RESCH
  • RA SCHULTE
  • RADHAKISHAN DAMANI
  • RAIMUND MAURUS
  • RAINER VON HOLST
  • RANKING
  • RAP
  • RAPHAEL
  • RAYMOND JAMES FINANCIAL
  • REAL ESTATE
  • RED BULL
  • REDACTED
  • REDACTED NEWS
  • REGIONS FINANCIAL CORPORATION
  • REINHOLD WUERTH
  • RELAX
  • RELAXING MUSIC
  • RELIGION
  • REMBRANDT
  • RENAISSANCE TECHNOLOGIES
  • RESCH
  • RESEARCH
  • REUNION ISLAND
  • REVOLUTION
  • RHB BANK
  • RHODE ISLAND
  • RHYTHM & BLUES
  • ROBERT F KENNEDY JUN
  • ROBERT PERA
  • ROBOTS
  • ROCK
  • ROCK MUSIC
  • ROCKEFELLER
  • ROCKEFELLER FOUNDATION
  • ROKINREN BANK
  • ROMANIA
  • RON DESANTIS
  • ROTHSCHILD
  • ROTHSCHILD FAMILY
  • RUFMOERDER
  • RUSSELL BRAND
  • RUSSIA
  • RUSSIAN MAFIA
  • RWANDA
  • SABOTAGE
  • SACHSENSUMPF
  • SAFETY
  • SAINT KITTS AND NEVIS
  • SAINT LUCIA
  • SAINT VINCENT AND THE GRENADINES
  • SALVADOR DALI
  • SAM BANKMAN-FRIED
  • SAN MARINO
  • SANDRO BOTTICELLI
  • SANLAM LIMITED
  • SAO TOME
  • SATAN
  • SATIRE
  • SATURDAY NIGHT LIVE
  • SAUDI ARABIA
  • SCANDAL
  • SCIENCE
  • SCOREDEX
  • SEBASTIAN SANDERS
  • SECRECY NEWS
  • SECRET
  • SECRET AGENCY
  • SECRET SERVICE
  • SECRET SOCIETIES
  • SECURE
  • SECURIAN FINANCIAL GROUP
  • SECURITATE
  • SECURITY
  • SED
  • SENEGAL
  • SERBIA
  • SEX
  • SEXY
  • SEYCHELLES
  • SHIN BET
  • SHIN KONG FINANCIAL HOLDING
  • SHIV NADAR
  • SHOAH
  • SHORT STORIES
  • SIEGFRIED SIEWERT
  • SIERRA LEONE
  • SINGAPORE
  • SINOPAC FINANCIAL HOLDINGS
  • SKY NEWS
  • SLOVAKIA
  • SLOVENIA
  • SOCA MUSIC
  • SOFTBANK GROUP
  • SOFTWARE
  • SOLOMON ISLANDS
  • SOMALIA
  • SONY FINANCIAL HOLDINGS
  • SOROS
  • SOUTH AFRICA
  • SOUTH CAROLINA
  • SOUTH DAKOTA
  • SOUTH KOREA
  • SOUTH STATE CORPORATION
  • SOUTH SUDAN
  • SOVIET UNION
  • SPACE WAR
  • SPAIN
  • SPECIAL FORCES
  • SPIES
  • SPORTS
  • SPY
  • SRI LANKA
  • STAATSANWAELTIN BEATE PORTEN
  • STAATSANWAELTIN PORTEN
  • STALIN
  • STALKER
  • STASI
  • STASI HINRICHTUNG
  • STASI KLARENTHAL
  • STASI LIST
  • STASI LISTE
  • STASI NAMES-STASI NAMEN
  • STASI WIESBADEN
  • STASI-BRAUT
  • STASI-GEHALTSLISTE
  • STASI-GEHEIM
  • STASI-JUSTIZ
  • STASI-MOERDER
  • STASI-MORD
  • STASILISTE
  • STATE STREET
  • STATE STREET CORPORATION
  • STEFAN PERSSON
  • STEFAN QUANDT
  • STEPPENWOLF
  • STIFEL FINANCIAL
  • STOCK EXCHANGE
  • STOCKS
  • STUDY
  • SUDAN
  • SUMITOMO MITSUI FINANCIAL GROUP
  • SUMITOMO MITSUI TRUST HOLDINGS
  • SUN HUNG KAI
  • SURF MUSIC
  • SURINAME
  • SURVEILLANCE
  • SVB FINANCIAL GROUP
  • SVEN SCHMIDT
  • SVEN SCHMIDT – BLACK LION
  • SVEN SCHMIDT – EAGLE IT
  • SWAZILAND (ESWATINI)
  • SWEDBANK AB
  • SWEDEN
  • SWITZERLAND
  • SYRIA
  • TADASHI YANAI
  • TAISHIN FINANCIAL HOLDINGS
  • TAIWAN
  • TAIWAN COOPERATIVE FINANCIAL HOLDING COMPA
  • TAIWAN FINANCIAL HOLDINGS
  • TAJIKISTAN
  • TALIBAN
  • TANZANIA
  • TAX HAVEN
  • TD BANK
  • TECHNOLOGIES
  • TENNESSEE
  • TERRORISM
  • TEXAS
  • THAILAND
  • THE AMERICAS
  • THE GREAT RESET
  • THE HALL OF SHAME
  • THE INVESTMENT MAGAZINE – THE ORIGINAL – DAS INVESTMENT MAGAZIN – DAS ORIGINAL
  • THE IS ISLAMIC STATE
  • THE MOSSAD
  • THE NATIONAL SECURITY
  • THE NATIONAL SECURITY AGENCY (NSA)
  • THE PANAMA PAPERS
  • THE RETURN OF THE DDR
  • THE ROCKEFELLER FOUNDATION
  • THE SECRET LIST OF KGB AGENTS
  • THE SECRET LIST OF Off-SHORE-COMPANIES, PERSONS AND ADRESSES
  • THE U.S. AIR FORCE
  • THE U.S. ARMY
  • THE U.S. NAVY
  • THE WHITE HOUSE
  • THOMAS "SNIFF" SCHUEHLY
  • THOMAS BREMER
  • THOMAS PORTEN
  • THOMAS PROMNY
  • TIBET
  • TIMOR
  • TIMOR-LESTE (EAST TIMOR)
  • TINA TURNER
  • TITIAN
  • TOGO
  • TOKYO KIRABOSHI FINANCIAL GROUP
  • TONGA
  • TOP SECRET
  • TOP TEN
  • TORTURE
  • TOTALITARISM
  • TOXDAT
  • TRANSGENDER
  • TRANSHUMANISM
  • TRINIDAD AND TOBAGO
  • TRUIST
  • TRUST
  • TRUTH
  • TUCKER CARLSON
  • TUNISIA
  • TURKEY
  • TURKMENISTAN
  • TURKS AND CAICOS ISLANDS
  • TUVALU
  • TV
  • U.S. BANK
  • UAE
  • UBS
  • UFO
  • UGANDA
  • UKRAINE
  • UNITED ARAB EMIRATES – UAE
  • UNITED KINGDOM – UK
  • UNITED NATIONS
  • UNITED STATES OF AMERICA – USA
  • URUGUAY
  • US AIR FORCE
  • US ARMY
  • US DEPARTMENT OF DEFENSE
  • US DEPARTMENT OF FOREIGN AFFAIRS
  • US DEPARTMENT OF JUSTICE
  • US DEPARTMENT OF STATE
  • US NAVY
  • USSR
  • UZBEKISTAN
  • VANGUARD
  • VANUATU
  • VATICAN CITY STATE (HOLY SEE)
  • VENEZUELA
  • VIDEO
  • VIDEO – DIE ENTTARNTEN STASI-SPIONE
  • VIETNAM
  • VINCENT VAN GOGH
  • VINTAGE
  • VIRGIN ISLANDS (BRITISH)
  • VIRGIN ISLANDS (U.S.)
  • VOICE OF NORTH KOREA BY YEONMI PARK
  • VOLODYMYR ZELENSKY
  • VON HOLST
  • VOYA FINANCIAL
  • WALES
  • WALL STREET
  • WALLIS AND FUTUNA ISLANDS
  • WANG CHUANFU
  • WANG WEI
  • WAR
  • WARNMELDUNGEN
  • WARREN BUFFETT
  • WARSAW PACT
  • WEAPONS
  • WEATHER
  • WEF
  • WELLS FARGO
  • WERTHEIMER
  • WEST BANK
  • WEST GERMANY
  • WESTERN
  • WESTERN SAHARA
  • WHARF HOLDINGS
  • WHEELOCK & CO
  • WHISTLEBLOWER
  • WHO
  • WIKILEAKS
  • WIKISPOOKS
  • WILHELM LORCH
  • WILLIAM DING
  • WINTRUST FINANCIAL
  • WION
  • WIRTSCHAFT
  • WIRTSCHAFTSWARNUNG
  • WOMEN PROTEST
  • WOORI FINANCE HOLDINGS CO LTD
  • WORLD BANK
  • WORLD EXCLUSIVE
  • WORLD WAR III
  • WORLDEXCLUSIVE
  • XI JINPING
  • XU HANG
  • YEMEN
  • YUANTA FINANCIAL HOLDING
  • ZAMBIA
  • ZHANG YIMING
  • ZHIFEI
  • ZHONGRONG INTERNATIONAL TRUST
  • ZIMBABWE
  • ZOOMING IN ON CHINA

Meta

  • Create account
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.com

Member of The Internet Defense League

Social

Pages

  • “”ABOUT ME””
  • “Brown.Yodeling.With.Adolf&Eva!”๐ŸคฃPart 58 The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Adolf & Eva๐Ÿ˜ the Succubus, Angela, Nasi, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Schicklgruber, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • “Burn.Baby.Burn!Emperor.Entertainer.Supershow!”๐ŸคฃPart 59 The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Nero & Poppaea Sabina๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • “Die Killer-Bibel” Toxdat โ€“ die 900 Seiten-Mordstudie von โ€žGoMoPaโ€œ-Mastermind und Resch-Protegeยด STASI-Oberst Ehrenfried Stelzer
  • “Don’t loose your Head, Sweetie!”๐ŸคฃPart 60 The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Mary Queen of Scots๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • “HONEST” KLAUS & “HONEST” OLIVIER SCHWAB FAN PAGE – SATIRE
  • “HONEST” ROBERT HUNTER BIDEN FAN PAGE – SATIRE
  • “Tesoro.Mio:Belvieve.Obey.Fight!”๐ŸคฃPart 61 The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Il Duce Benito Mussolini๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody Warp Speed Mix๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • “Veni.Vidi.Video!”๐ŸคฃPart 61 A The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Il Duce Benito Mussolini๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody Colosseum.Mix๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • 11 NEAR BROOKLYN BRIDGE – Full Original Movie
  • 1776 – THE HESSIAN RENEGADES by D.W. Griffith – Full Original Movie
  • 1930IES FRENCH STAG AND S&M FILM
  • 1960 BONDAGE STAG FILM – FETISH LOOP
  • 1960 S&M FETISH STAG FILM – TARA SANTANA
  • 1960IES STAG FILM – DOMINATRIX AND SCHOOLGIRL
  • 20,000 LEAGUES UNDER THE SEA – Full Original Movie
  • 39 STEPS – Full Alfred Hitchcock Movie Colorized
  • 50IES NUDIE FILM OF COWGIRL
  • ๐Ÿ‘ƒ “The Light of Hope: An Advent Reflection” by Rembrandt van Rijn AI Art created by Bernd Pulch
  • ๐Ÿ“ ABOVE TOP SECRET โ€“ COSMIC BLACK PARODY DOSSIERโ€œOperation Lolita Express: Epsteinโ€™s Afterlife on Pedo Island ๐Ÿ๏ธ๐Ÿ’€โ€
  • ๐Ÿ’ฅ BREAKING: โ€œThe Fed Quietly Prints a TRILLION-Dollar Emojiโ€”Markets Mistake It for a Buy Signal ๐Ÿ˜‚๐Ÿ“ˆโ€
  • ๐Ÿ”ฅ Chariots of Fire: The Divine Uplifting of Elijah ๐Ÿ”ฅ๐ŸŒช๏ธ Whirlwind to Heaven: The Prophetic Rise of Elijah ๐ŸŒช๏ธ
  • ๐ŸŒŸ IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT present  “Ultron’s Enema Empire”๐ŸŒŸ
  • ๐Ÿ”ฅ IDIOT ZEITUNG (IZ) – EXCLUSIVE ๐Ÿ”ฅRELATIONSHIP STATUS: QUANTUM ENTANGLEMENT THE METAPHYSICAL SEXUAL MANIFESTATION: Trans Schwanz, Edith & San Fran “Muschi” Mucha ๐Ÿ‘‘๐Ÿ”ฅโšก๐Ÿคก๐Ÿ’€Powered by Dr. Z., Gomopa4Kids, Stasi Frauen Support Staffel & Free Fritzl Front ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ Fotzen Fritz Version Gratis presented by IDIOT ZEITUNG (IZ) & GOMOPA vulgo DAS DESINVESTMENT alias DER FONDSFLOP๐Ÿ˜‚๐Ÿคก๐Ÿ˜˜
  • ๐Ÿšจ IDIOT ZEITUNG (IZ) EXCLUSIVEโ€œMERZ-ELBO-CHIP: FRIEDRICHโ€™S BRAIN ACCIDENTALLY UPLOADED TO ITALIAN PASTA, DECLARES WAR ON TOMATOESโ€๐Ÿคก POWERED BY DAS DESINVESTMENT, DR. Z., GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒDEUTSCHE  FOTZEN FRITZ VERSION GRATIS ๐Ÿง
  • ๐Ÿ˜Ž Mallika Sherawat nude and exposed – AI Art created by Bernd Pulch๐Ÿ˜Ž
  • ๐Ÿšจ SATIRE ALERT ๐ŸšจThe following is 100 % fiction, 200 % sarcasm, and 0 % apology. Any resemblance to real-estate tyrants, glossy Stasi offspring or self-proclaimed โ€œBest-Lageโ€ bishops is purely intentional.
  • ๐Ÿ‘ป They Called the Stasi on Me. The Line Was Dead. Now, I’m Your Mirror.
  • ๐Ÿคฃ””On a mountain of skulls, in the castle of pain, I sat on a throne of blood! What was will be! What is will be no more! Now is the season of Evil!” ##wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 125 “Vigo, Scrouge of Carpathia” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Vigo๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ”A Cool Bite!”๐Ÿคฃ๐Ÿคก ##wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 117 “The Great White Shark” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet The Great White Shark๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ”Better Not Touch!”๐Ÿคฃ๐Ÿคก ##wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden:”” Episode 116 “Poison Ivy Toxdat” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Poison Ivy – Reprise๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ”Crazy.Crazier.Stasi-Joker!”๐Ÿคฃ๐Ÿคก ##wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 119 “Joker’s Daughter Duela Dent” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Duela Dent๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿ‘ƒ”Divine Anticipation: A Baroque Reflection on the Third Sunday of Advent” Spiritual Advent Paintings created by Bernd Pulch
  • ๐Ÿ‘ƒ”Divine Reflection: A Renaissance Moment of Spiritual Renewal”
  • ๐Ÿคฃ”Genghis Khan:”Absolutely:We areย  Stasi!”๐Ÿคฃ๐Ÿคก ##wirsindstasi Mongolia-Berlin-Hamburg-Wiesbaden:”” Episode 111 “Genghis Khan” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Genghis Khan๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ”He.Will.Avenge Us!”๐Ÿคฃ๐Ÿคก ##wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 123 “Darth Maul” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Darth Maul๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ”Hm.Fingerlicking.StasiGut!” ##wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 126 “Hannibal Lecter” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Hannibal Lecter๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ”I LOVE Children!”๐Ÿคฃ๐Ÿคก ##wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 122 “Freddy Krueger” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Freddy Krueger on Elm Street๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ”Mine.Mine.All Mine!”๐Ÿคฃ๐Ÿคก ##wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 124 “Kingpin” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Kingpin๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ”Proud to be Stasi!”๐Ÿคฃ๐Ÿคก ##wirsindstasi Stasi-Berlin-Hamburg-Wiesbaden:”Nous sommes STASI.” Episode 108 “Private Paula” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Private Paula๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ”Rat.Ben.Two-Face “Bi” Mucha!”๐Ÿคฃ๐Ÿคก ##wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 121 “Ben” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Ben๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ”Rat.Willard.Two-Face “Bi” Mucha!”๐Ÿคฃ๐Ÿคก ##wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 120 “Willard” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Willard๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ”Say it Loud & Proud:We areย  Stasi!”๐Ÿคฃ๐Ÿคก ##wirsindstasi Stasi-Berlin-Hamburg-Wiesbaden:”Somos eSTASI.” Episode 109 “Aaron the Moor (Shakespeare)” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Aaron the Moor๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿ’ƒ”Shadows of Hypocrisy โ€“ Hinterfozzige Janelle vs. the People Who Love Darkness More Than Light”โœŒby IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT powered by ๐ŸคชGoMoPa4Kids & Dr.Z๐Ÿ˜˜
  • ๐Ÿ‘ƒ”The Promise of Light: The First Sunday of Advent” by James Tissot AI Art created by Bernd Pulch
  • ๐Ÿ‘ƒ”The Sunday of Advent: A Baroque Reflection on Hope and Divine Promise” – Peter Paul Rubens AI Art created by Bernd Pulch
  • ๐Ÿคฃ”To Be Or Not To Be!”๐Ÿคฃ๐Ÿคก ##wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 118 “Nyssa Raatko & The Lazarus Pit” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Nyssa Raatko๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿ™”You are looking for Jesus the Nazarene, who was crucified. He has risen.” Mark 16:6-8. Painted by Edvard Munch AI Art by Bernd PulchโœŒ
  • ๐Ÿคฃ”You’re Strong, But I Could Snap My Fingers And You’d All Cease To Exist.” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 127 “Thanos” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Thanos๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ”ะœั‹ ะฒ ัˆั‚ะฐะทะธ. We areย  Stasi!”๐Ÿคฃ๐Ÿคก ##wirsindstasi Moscow-Stasi-Berlin-Hamburg-Wiesbaden:”” Episode 110 “Uncle Joe” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Uncle Joe๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐ŸŒ๐Ÿ“ฟ “The 11th Commandment: Thou Shalt Monetizeโ„ข๏ธ โ€” How Silicon Valley Disrupted the Sabbath (And Sold Indulgences as NFTs)”Byline: “A Lost Gospel According to Rev. Cashius Profit โšœ๏ธ๐Ÿ’ธ, Patron Saint of Venture Capital”Published on BerndPulch.org๐Ÿ˜
  • ๐Ÿšจ๐Ÿ‘ BERNDPULCH.ORG โ€“ FRONTPAGE TAKEOVER ๐Ÿšจ๐Ÿ‘(The only EU-cleared satire portal still reachable without a booster passport)
  • ๐Ÿ™๐ŸŒŸ Christ’s Ascension: The Heavenly Promise of His Return โœจ๐Ÿ™
  • ๐Ÿฐ๐Ÿš€ IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT ๐Ÿ˜˜PRESENT: MARS MAXWELL-EPSTEIN CROWN JEWELS HEIST 2.0: HOW PEDO-ISLAND CONQUERED THE RED PLANET(A Satirical Obituary for the Solar System, 2024-2030)POWDERED BY DR. Z., GOMOPA4KIDS,๐Ÿ˜Ž STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง
  • ๐ŸŽค๐Ÿคฃ Samson & Delilah: The First Reality Show ๐Ÿคฃ๐ŸŽค
  • ๐Ÿšจ๐Ÿ”ฅ THE PROMETHEUS PAPERS ๐Ÿ”ฅ๐Ÿšจ
  • ๐Ÿคก๐Ÿคก๐Ÿ˜‚ ## Pop Stasi proudly presents Loosing Jan “BI” Mucha-“Cajal”:”Waiting for My Man” -AI ParodyโœŒ๏ธ
  • ๐Ÿ˜‚๐Ÿคก๐Ÿคก ##Pop Stasi proudly presents Honest George Soros:”Blue Yodel” – AI ParodyโœŒ๏ธ
  • ๐Ÿคก๐Ÿคก๐Ÿ˜‚ ##Pop Stasi proudly presents: ##wearestasi – AI ParodyโœŒ๏ธText, Music & Vocals by Bernd PulchโœŒ๏ธ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคก ##wirsindstasi Stasi-Berlin-Hamburg-Wiesbaden:”#WEareSTASI.” Episide 107 “Steppenwolf” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Steppenwolf๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคก Germany.Stasi.Joker:”Not Clown.Joker!” Episode 88 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse at Mycale 470 B.C.๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคก Hamburg Harbour.Stasi.Joker: “The Party Triggering the $1.05 Trillion Stock Market Wipeout.โ€ Episode 92 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse have a Party๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคก Red John. Blake.Mentalist:”Evil Sexual Perverted Stasi-Sociopath!” Episode 87 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Red John aka Thomas McAllister๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคก Sauron.Stasi.Joker: “I see you, little ones, your feeble attempts to hide from my gaze are in vain. I see into the depths of your souls, and there is nowhere to escape from my piercing stare.โ€ Episode 91 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Sauron๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคก Stasi.Joker.Actium! “I will not be triumphed over!” Episode 90 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Jack the Ripper ๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos at the Battle of Actium with Cleopatra๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคก Stasi.Joker.Jack The Ripper:”Fear not, for the Ripper is near! ” Episode 89 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Jack the Ripper ๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคก Stasi.Sacco.di.Roma:”Burn.Rome.Burn!” Episode 86 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Alaric I & the Visigoths  during the Sacco di Roma๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ”(S)Think.Or.Sink!” Part 8 – The Joker & His Wild Bunch meet Two Face, The Pinguin & Leni Riefenstahl on the Wilhelm Gustloff – Hommage a’ Peter Ehlers, Jan Mucha & GoMoPa – AI Parody๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”A.Band.Of.Brothers.”Episode 63 Osama and his Harem – The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Osama Bin Laden and Harem๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody Harem Mix๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Casino.Casino.Casino.” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 148 “Hyman Abrams” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Hyman Abrams๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคก๐Ÿคฃ๐Ÿคฃ”Crime does not pay!” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 142 “Meyer Lansky” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Meyer Lansky๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody
  • ๐Ÿคก๐Ÿคฃ๐Ÿคฃ”Dead & Loving It!” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 140 “Count Dracula” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Count Dracula๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Devil’s. Greatest.Trick!” Episode 76 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Keyser Sรถze๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”East.West.They are both stupid.” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 155 “Dr. No”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Dr. No๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Feed Me!” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 152 “Audrey II”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Audrey II๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ
  • ๐Ÿคก๐Ÿคฃ๐Ÿคฃ”First Snowball Manhattan. Then London.Then Frankfurt.” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 137 “Charles Ponzi” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Charles Ponzi๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”First.And.Last. Sacrifice!” Episode 77 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Hernan Cortes๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Aztec Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคก๐Ÿคฃ๐Ÿคฃ”GoMoPa.Ehlers.Mucha.Porten.Lorch.” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 133 “The Gremlin Stripe” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet the Gremlin Stripe๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Great.Whore.Nineveh!” Episode 75 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse & the Destruction of Nineveh๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody Jonah and the Fish Mix๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Harder!Longer! Deeper!”Episode 65 The Satanic Olympics – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet at the Satanic Olympics๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody Olympicd Mix๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿ˜Ž๐Ÿ˜Ž๐Ÿ˜Ž”Heinz. Gerlach.Death.By.Bee Sting/Blood Poisoning?Stasi.Toxdat.Dioxin! CUI BONO?” Part 44ย  The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse meet Mademoiselle Pol Pot and the Succubus, Angela, Beatrix Port and her Stasi Nymphos๐Ÿ˜Ž๐Ÿ˜Ž๐Ÿ˜ŽHommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody๐Ÿคก๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Hiroshima.Mon.Armour!” Episode 71 The Nuke on Hiroshima – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse visits Hiroshima๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody Hannibal Mix๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Humans are stupid!” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 149 “Oliver Quick” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Oliver Quick๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”I put a Spell on You!” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 153 “The Voodoo Master”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet The Voodoo Master๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”I!I!I!” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 151 “Elagabalus”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Elagabalus๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”In.The.Navy!” Episode 72 The Battle of Gangut – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse at Gangut๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคก๐Ÿคฃ๐Ÿคฃ”Junk.Bond.Stasi!” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 141 “Michael Milken” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Michael Milken๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Kill.Stasi Kleo. Kill!” Episode 73 Meeting Kleo Straub – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse at the Berlin Wall๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคก๐Ÿคฃ๐Ÿคฃ”Long Time Short.” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 138 “Bernie Cornfeld” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Bernie Cornfeld๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody
  • ๐Ÿคก๐Ÿคฃ๐Ÿคฃ”Money Ueber Alles.” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 136 “Gordon Gekko & Jordan Bedford – The Wolf of Wall Street” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Gordon Gekko & The Wolf of Wall Street๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody
  • ๐Ÿคก๐Ÿคฃ๐Ÿคฃ”More.More.M.O.R.E.” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 139 “Bernard Madoff” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Bernard Madoff๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”New.World.Stasi.Order.” Episode 69 The Discovery of America – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Christopher Columbus๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody Hannibal Mix๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Nika! Nika!Nika!,”Episode 67 The Satanic Nika Riots of Constantinople – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Theodora & Justinian I๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody Theodora Mix๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Nous sommes Stasi!” – AI Parody – Text, Music, Vocals by Lana T & Bernd PulchโœŒ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Pointless! Clueless! Without Morality! NeoStasi!”Episode 68 The Battle of Cannae – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Hannibal๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody Hannibal Mix๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Sing.Stasi.Sink!” Episode 70 The Viking Downfall – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet the Tettenhall Vikings๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody Hannibal Mix๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Sink!Armada!Sink!”Episode 64 The Spanish Armada – The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet the Spanish Armada๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody Harem Mix๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Sink.Stasi.Sink. Stasi.Sink.Stasi!” Episode 78 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Kublai Khan๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Mongol Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi Boat to Cairo!”Episode 66 The Satanic Battle of Alexandria – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Cleo, Mark & Octavian๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody Cleo Mix๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi Joker.Night.King. Daenerys Targaryen:Thrones.Thrones.Thrones!” Episode 83 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet the Night King and Daenerys Targaryen๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ”Stasi!Stasi!Stasi!” Part 40 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse meet the Bloody Duchess Darya Saltykova and the Succubus, Angela, Beatrix Port and her Stasi Nymphos๐Ÿคก๐ŸคกHommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody๐Ÿคก๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi.Hyena People:Just the Two of Us!” Episode 81 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet the Hyena People๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi.On.Board.Pray.Pilgrim.Pray!” Episode 79 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse on the Mayflower in 1620๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Mayflower Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi.Sea.Witch. Ursula:Think or Sink!” Episode 82 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Ursula the Sea Witch๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi.Why.So.Serious?” Episode 80 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Jeremiah Valeska aka Xamder Wilde๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Mayflower Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”The stupidest Sin of the Devil is Vanity.” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 154 “Professor Loris Martini”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Professor Loris Martini๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ”THINK OR SINK!” PART ONE – THE STASI TITANIC IS SINKING – PUTLER – EHRENFRIED STELZER (Professor Toxdat – Murder) – RESCH-GOMOPA-EHLERS-MUCHA-PORTEN-LORCH๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ”THINK.OR.SINK!” – PART 4 – THE JOKER MEETS CLEOPATRA ON A NILE SHIP – HOMMAGE A’ “HONEST” PETER EHLER-“VON JOKER” & HIS WILD BUNCH๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ-AI PARODY
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ”THINK.OR.SINK!” –ย  PART 3 – THE JOKER MEETS LORELEY – HOMMAGE A’ “HONEST” PETER EHLERS-“VON JOKER”
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ”Think.Or.Sink!” Part 6 –  The Joker meets Two Face on the Tirpitz together with Magda Goebbels – AI Parody – Hommage a’ Peter  Ehlers & Jan Mucha๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ”Think.Or.Sink!” Part 7 – The Joker & His Wild Bunch meet Two Face, The Pinguin & Lucrezia Borgia in Venice – Hommage a’ Peter Ehlers, Jan Mucha & GoMoPa – AI Parody๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Veni.Vidi Vici!” Episode 74 Caesar and Pompey – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse at the Battle of Pharsalus๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ”Viva.Odiar A Muerte.Viva!”๐ŸคฃPart 62 The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Francisco Pizarro๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody Inca Mix๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคก๐Ÿคฃ๐Ÿคฃ”Wall. Wall.Wall Street.” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 135 “Jordan Bedford – The Wolf of Wall Street” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet The Wolf of Wall Street๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody
  • ๐Ÿคก๐Ÿคฃ๐Ÿคฃ”We are Stasi-Cutthroats. So what?” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 134 “Ransom Drysdale” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Ransom Drysdale๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”We lie best when we lie to ourselves.” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 150 “IT aka Pennywise”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet IT aka Pennywise๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ
  • ๐Ÿคก๐Ÿคฃ๐Ÿคฃ”Wir sind StasiWixxer!” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 132 “Der Wixxer” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Wixxer๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”You are no God. I renounce You!” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 148 “Gorr – The God Butcher” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Gorr – The God Butcher๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”You’re a smooth, smoothie, yah know?” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 147 “Gaear Grimsrud” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Gaear Grimsrud ๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿ”ฅ๐ŸŒŒ๐Ÿ˜ˆ๐Ÿ’ฅ PROFESSOR DR. SUPER-SCHWANZ, THE SCHWANZ,ย  QUADRUPLE & EDITH’S SEX TRIANGLE & MARQUIS DE SADE EXPLODE – EPISODE 99WY/0825″ ๐Ÿ”ฅ๐ŸŒŒ๐Ÿ˜ˆ๐Ÿ’ฅ๐Ÿ‘บSAN FRAN “MUSCHI” MUCHA๐ŸงOSAMA,ย  HUSH, PLANKTON, MOJO JOJO CONSPIRACY ๐Ÿ”ฅ๐Ÿ’€ย  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 136WY/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS
  • ๐Ÿ”ฅ๐ŸŒŒ๐Ÿ˜ˆ๐Ÿ’ฅ THE SCHWANZ QUADRUPLE & EDITH’S SEX TRIANGLE & MARQUIS DE SADE EXPLODE – EPISODE 99WY/0825″ ๐Ÿ”ฅ๐ŸŒŒ๐Ÿ˜ˆ๐Ÿ’ฅ๐Ÿ‘บSAN FRAN “MUSCHI” MUCHA๐ŸงOSAMA,ย  HUSH, PLANKTON, MOJO JOJO CONSPIRACY ๐Ÿ”ฅ๐Ÿ’€ย  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 136WY/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS
  • ๐Ÿ”ฅ๐ŸŒŒ๐Ÿ˜ˆ๐Ÿ’ฅ THE SCHWANZ QUADRUPLE & EDITH’S SEX TRIANGLE – EPISODE 99WY/0825″ ๐Ÿ”ฅ๐ŸŒŒ๐Ÿ˜ˆ๐Ÿ’ฅ๐Ÿ‘บSAN FRAN “MUSCHI” MUCHA๐ŸงOSAMA,ย  HUSH, PLANKTON, MOJO JOJO CONSPIRACY ๐Ÿ”ฅ๐Ÿ’€ย  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 136WY/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS
  • ๐Ÿ”ฅ๐ŸŒŒ๐Ÿ˜ˆ๐Ÿ’ฅ THE SPORTMASTER’S TRAINING GROUNDS PRESENTS: “BOOMERANG’S DEADLY ARCS & EDITH’S SEX TRIANGLE – EPISODE 98WY/0825” ๐Ÿ”ฅ๐ŸŒŒ๐Ÿ˜ˆ๐Ÿ’ฅ๐Ÿ‘บBLOODY, BLOODY MARY, SAN FRAN “MUSCHI” MUCHA’S MISTRESS MISUSED๐ŸงOSAMA,ย  HUSH, PLANKTON, MOJO JOJO CONSPIRACY ๐Ÿ”ฅ๐Ÿ’€ย  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 136WY/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Achtung! Baby.Stasi.Toxdat!” Part 45 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse meet Gudrun Ensslin and the Succubus, Angela, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody๐Ÿคก๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Achtung!Stasi!Save.Our.Souls!” Part 54 The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Dr. Mabuse meet Agrippina the Younger๐Ÿ˜and the Succubus, Angela, Nasi, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”An empire toppled by its enemies can rise again. But one which crumbles from within? That’s dead. Forever.” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 157 “Baron Helmut Zemo”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Baron Helmut Zemo๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Celebrate the Bullet!” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 143 “Bugsy Siegel” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Bugsy Siegel๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Dioxin.Dioxin.Stasi. Baby. Drink.Sink!” Part 46 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse meet Madame Mao Jiang Qing and the Succubus, Angela, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody๐Ÿคก๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Dioxin.Stasi.Dioxin. Neostasi.Toxdat!” Part 47 The Joker aka The FinanzRouรฉ aka The Finanzroulettier, Clownface, Two Face aka The Finanzcroupier, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse meet Valkyre Hrist and the Succubus, Angela, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody๐Ÿคก๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Drink.Stasi.Sink!” Part 36 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse, Luca Brasi meetย The Black Widow & the Succubus, Angela, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐Ÿคฃ๐ŸคกHommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody๐Ÿคก๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Drink.Stink.Sink!” Part 25 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse, meet Henriette Himmler and the Succubus, Beatrix Port and her Stasi Nymphos ๐Ÿคก๐Ÿคก๐Ÿคฃ๐ŸคฃHommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody๐Ÿคก๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Fight!Stasi!Fight!Fight!” Part 22 The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Dr. Mabuse meet Mist, the Valkyrie๐Ÿ˜and the Succubus, Angela, Nasi, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Four.Fists.For.A. STASI.Hallelujah!” Part 57 The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Dr. Mabuse meet Erich Mielke & Mistress Erika๐Ÿ˜ the Succubus, Angela, Nasi, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Mielke, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Ich liebe doch alle Menschen!” Two Face meets the Joker ๐Ÿคก๐Ÿคก๐Ÿคฃ Hommage a’ “Honest” Jan “BI” Mucha-“Kajal” & “Honest” Peter Ehlers-“Von Joker”๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Justice must be served!” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 129 “Nottingham Sheriff” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet the Sheriff of Nottingham๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Money.Ueber.Alles!” Part 56 The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Dr. Mabuse meet Frau Rosa LGBTQ๐Ÿ˜and the Succubus, Angela, Nasi, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Nazi meets Stasi!” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 130 “Hans Landa” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Hans Landa๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Nazi-Yoddeling from Hell!” Part 55 The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Dr. Mabuse meet Emmy Goering๐Ÿ˜and the Succubus, Angela, Nasi, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Neo.Stasi.Sink!” Part 31 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse meet China’s Cixi: “The Dragon Empress & the Succubus, Beatrix Port and her Stasi Nymphos๐Ÿคก๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody๐Ÿคก๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Now Zebediah Kilgrave…ย Whoย Deserves To Rule?” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 156 “Dr. Victor von Doom”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Dr. Victor von Doom๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Rien.Ne.Va.Plus.Stasi!” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 144 “Arnold Rothstein” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Arnold Rothstein๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”S.T.A.S.I._S.I.N.K._S.T.A.S.I!” Part 35 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse, Luca Brasi meetย  Henriette Himmler & the Succubus, Angela, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody๐Ÿคก๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”S.T.A.S.I._S.I.N.K._S.T.A.S.I.!” Part 34 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse, Luca Brasi meetย Eve & the Succubus, Angela, Beatrix Port and the Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody๐Ÿคก๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Sink!Sink!Sink!” Part 24 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse, meet Ma Barker and the Succubus, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody๐Ÿคก๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Sink!Sink!Sink!” Part 26 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse, meet Myra Hindley and the Succubus, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐Ÿคฃ๐Ÿคก๐Ÿคก๐Ÿคฃ๐ŸคฃHommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody๐Ÿคก๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Sink!Sink!Sink!” Part 38 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse, Luca Brasi meetย Lotte Ulbricht & the Succubus, Angela, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody๐Ÿคก๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Sink!Stasi!Sink!” Part 53 The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Dr. Mabuse meet Irma Greese๐Ÿ˜and the Succubus, Angela, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Sink.Deep.Sink!” Part 21 – The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse, meet Lilith and the Succubus, Beatrix Port and her Stasi Nymphos – Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt,RA Jochen Resch – AI Parody๐Ÿคก๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก๐Ÿฟ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Sink.Neo.Stasi!” Part 32 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse meetย  Medusa & the Succubus, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody๐Ÿคก๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Sink.Sink.Sink!” Part 48 The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Dr. Mabuse meet Herr and Frau Martin Bormann and the Succubus, Angela, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody๐Ÿคก๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Sink.Stasi.Sink!” Part 42 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse, Luca Brasi meet Medea & the Succubus, Angela, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody๐Ÿคก๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”SOS.Stasi.SOS.FinanzRoulettiers.SOS!” Part 51 The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Dr. Mabuse meet Ko Young Hee and the Succubus, Angela, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi!Sink!Stasi!” Part 39 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse, Luca Brasi meetย Madame Blanque & the Succubus, Angela, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคกHommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody๐Ÿคก๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi!Sink!Stasi!” Part 39 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse, Luca Brasi meetย Madame Blanque & the Succubus, Angela, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคกHommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody๐Ÿคก๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi!Stasi!SOS!” Part 52 The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Dr. Mabuse meet Gertrud  Scholz-Klink๐Ÿ˜and the Succubus, Angela, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi.Baby.Toxdat!” Part 43 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse meet Ulrike Meinhof and the Succubus, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody๐Ÿคก๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi.Stasi.Sink!” Part 33 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse meetย Dragon Empress Xi, Lady Macbeth & the Succubus, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐Ÿคฃ๐ŸคกHommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody๐Ÿคก๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”STINK!STINK!SINK!” Part 27 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse meet Agrippina and the Succubus, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody๐Ÿคก๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”STINK.AND.SINK!” Part 12 – The Joker, Two Face, Straw Man and the Pinguin in Sodom – Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids – AI Parody๐Ÿคก ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”STINK.AND.SINK!” Part 13 – The Joker, Two Face, the Pinguin, Straw Man meet Svetlana Stalin on the Kursk Submarine – Hommage a’ Ehlers, Mucha, Porten, Lorch & GoMoPa4Kids – AI Parody ๐Ÿคก๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stink.And.Sink!” Part 14 – The Joker, Two Face, Straw Man, the Piguin, meet STASI agents IM Angelika & Erika in Gomorrah – Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids – AI Parody๐Ÿคก๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stink.And.Sink!” Part 14 – The Joker, Two Face, Straw Man, the Piguin, meet STASI agents IM Angelika & Erika in Gomorrah – Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids – AI Parody๐Ÿคก๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stink.And.Sink!” Part 9 – The Joker & His Wild Bunch meet Two Face, the Pinguin & Clara Petacci on the Andrea Doria – Hommage a’ Peter Ehlers, Jan Mucha & GoMoPa – AI Parody ๐Ÿคก๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stink.Sink!Sink!” Part 29 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse meetย  Catherine de Medici and the Succubus, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody๐Ÿคก๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stink.Stasi.Sink!” Part 37 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse, Luca Brasi meetย Queen Ranavalona I & the Succubus, Angela, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐Ÿคฃ๐ŸคกHommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody๐Ÿคก๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stink.Stink.Sink.Sink!” Part 16 – Hommage a’ Ehlers, Mucha et al: The Joker, his Associate Clownface, Two Face, Strawman, the Pinguin, the Kingpin meet Clara Zetkin, Beatrix Port and her female Stasi Agents on the Flying Dutchman-AI Parody๐Ÿคก๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stink.Stink.Sink.Sink!” Part 23 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse, meet the Blood Countess Elizabeth Bathory and the Succubus, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody๐Ÿคก๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Think And.Sink!” – Part 22 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse, meet Gertrud Mielke, Beatrix Port and her Stasi Nymphos – Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody๐Ÿคก๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Think!Stasi!Sink!Stasi!” Part 19 The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Dr. Mabuse meet Gertrudeย Baniszweski aka The Torture Mother๐Ÿ˜and the Succubus, Angela, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Think.And.Sink!” Part 28 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse meet Bloody Mary and the Succubus, Beatrix Port and her Stasi Nymphos ๐Ÿคก๐ŸคกHommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody๐Ÿคก๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Think.And.Sink!” Part 30 The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse meet France’s “Madame Deficit” Marie Antoinette and the Succubus, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody๐Ÿคก๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคก๐Ÿคก๐Ÿคก๐Ÿคฃ”THINK.OR.SINK!” PART 5 – THE JOKER MEETS SALOME ON A SHIP IN THE DEAD SEA ๐Ÿคก๐Ÿคก๐Ÿคฃ HOMMAGE A’ “HONEST” PETER EHLERS-“VON JOKER” AI PARODY ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Will not lie, Iโ€™ve been with many.” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 145 “Duncan Wedderburn” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Duncan Wedderburn ๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก๐Ÿคก”SCHTONK.AND.SINK!” Part 10 – The Joker, Two Face, the Pinguin & Straw Man meet Emmy Goering on Carin 2 – Hommage a’ Ehlers, Mucha, Porten & GoMoPa4Kids – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿ˜Ž๐Ÿคก”Sitting on Top of the Hot Chair” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 146 “Louis “Lepke” Buchalter” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Louis “Lepke” Buchalter ๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก๐Ÿคก”STINK.AND SINK!” PART 11 – THE JOKER, TWO FACE, STRAW MAN & THE PENGUIN MEET MARGOT HONECKER ON THE BATTLESHIP POTEMKIN – HOMMAGE A’ EHLERS, MUCHA, PORTEN, GOMOPA4KIDS, LORCH – AI PARODY๐Ÿคก๐Ÿคก๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคก๐Ÿคก๐Ÿคก๐Ÿคก๐Ÿ˜‚๐Ÿคก๐Ÿคก๐Ÿ˜‚Pop Stasi proudly presents Loosing Jan “BI” Mucha-“Cajal”: “The Fortune Teller” – Sponsored by Gay Vaseline Forte – AI ParodyโœŒ๏ธ
  • ๐Ÿ˜‚๐Ÿ˜‚๐Ÿ˜‚๐Ÿคก๐Ÿคก๐ŸคกPop Stasi proudly presents Elon, the Singing Billionaire:”Lucky” – AI Parody by Bernd PulchโœŒ๏ธ
  • ๐Ÿคก๐Ÿคก๐Ÿ˜‚๐Ÿคฃ๐Ÿคฃ๐ŸคกPop Stasi proudly presents Ursula “Flinten Uschi” von der Lie:”Her Leader Bill Gates Quote” – AI Parody
  • ๐Ÿคก๐Ÿคก๐Ÿคก๐Ÿ˜‚๐Ÿ˜‚๐Ÿ˜‚Pop Stasi proudly presents: Kamala Harris:”Love to Love You Baby” – AI ParodyโœŒ๏ธ
  • ๐Ÿคก๐Ÿคก๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐ŸคกPop Stasi proudly presents: The Singing Bajazzo Honest Andy Lorch: “Flower But Sell Myself” – AI Parody sponsored by the Friends of the Italian Opera and the Corleone Society ๐Ÿคก๐Ÿคก๐Ÿคก
  • ๐Ÿ‘น๐Ÿ‘น๐Ÿ‘น๐Ÿคก๐Ÿคก๐ŸคกTHE STASI TITANIC – FEATURING – PUTLER – “Honest” GOMOPA/GOMOPA4KIDS/RA RESCH/EHRENFRIED STELZER/STASI/TOXDAT & “Honest” Ehlers & “Honest” JAN/ETTE & MONIKA Mucha & “Honest” BEATE/THOMAS Porten & “Honest” Lorch/DR. EDITH Lorch-Baumannย  FANPAGE – CORRUPT ? TREACHEROUS ? FSB/KGB ? GENIUSES ?ย  JOURNALIST SIMULATORS ? PEDOS ? PHILANTROPHS ? PRESSTITUDES ? PROPERTY MOGULS ?STASI ? SUPERSTARS ? YOU DECIDE ! – ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿ‘น๐Ÿ‘น๐Ÿ‘น๐Ÿคก๐Ÿคก๐ŸคกTHE STASI TITANIC – FEATURING – PUTLER – “Honest” GOMOPA/GOMOPA4KIDS/RA RESCH/EHRENFRIED STELZER/STASI/TOXDAT & “Honest” Ehlers & “Honest” JAN/ETTE & MONIKA Mucha & “Honest” BEATE/THOMAS Porten & “Honest” Lorch/DR. EDITH Lorch-Baumannย  FANPAGE – CORRUPT ? TREACHEROUS ? FSB/KGB ? GENIUSES ?ย  JOURNALIST SIMULATORS ? PEDOS ? PHILANTROPHS ? PRESSTITUDES ? PROPERTY MOGULS ?STASI ? SUPERSTARS ? YOU DECIDE ! – ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคก๐Ÿคก๐Ÿคก๐Ÿ˜‚๐Ÿ˜‚Pop Stasi proudly presents Honest Kamala Harris & Honest Jeffrey Epstein:”Lies, Lies, Lies” – AI Parody
  • ๐Ÿคก๐Ÿคก๐Ÿคก๐Ÿ˜‚๐Ÿ˜‚Pop Stasi proudly presents Honest Kamala Harris:”The Torture never stops” – AI ParodyโœŒ๏ธ
  • ๐Ÿ˜‚๐Ÿ˜‚๐Ÿคฃ๐Ÿคก๐ŸคกPop Stasi proudly presents the “Singing Buffo” Peter Russ,Consigliori of a Wastepaper Empire DFV: “Death of a Clown” – AI Parody
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก๐ŸฟStink.And.Sink! Part 20 – The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Scarecrow, Dr Mabuse, meet Harley Quinn, Elena Ceaucescu, Talia Al Ghul, Beatrix Port and her Stasi Nymphos – Hommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt,RA Jochen Resch – AI Parody๐Ÿคก๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคก๐Ÿคก๐Ÿคก๐ŸคฃHONEST” JAN/ETTE “ORESTES BI” MUCHA – IZ Insider: “Kajal – Ana*- Legal – Illegal “Schei** Egal” (End of Citation) & THORSTEN “GAY K” KARL – PERVERT AND PROUD FAN PAGE – CORRUPT MEDIA WHORES ? EASTERN AGENTS ? JOURNALIST SIMULATORS ? CDU POLITICIAN MONIKA MUCHA ? TREACHEROUS ?GENIUS ? GOMOPA ? GOMOPA4KIDS ?RAINBOW NATION AGENTS ? PUTIN AGENTS ?ย  STASI ? SUPERSTARS ? ๐Ÿค”YOU DECIDE !๐Ÿคก๐Ÿคก๐Ÿคก๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐ŸคกKGB Mix: “Stink.And.Sink!” Part 15 – The Joker, Two Face, Straw Man, The Piguin, Kingpin meet Rosa Kleb – Hommage a’ Ehlers, Mucha, Porten, Lorch & GoMoPa4Kids – AI Parody๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐ŸคกNOW: “Stink.With Me.Sink.With Me!” Part 17 – Transgender – Toxdat Mix: The Joker, Clownface, Two Face, Straw Man, Kingpin, Pinguin, Dr. Mabuse, Dr. Fauciย  meet Stormy Daniels, Beatrix Port & the Stasi Nymphos on the Exxon Valdez – Hommage a’ Ehlers, Promny, Mucha, Porten, Maurischat/GoMoPa4Kids, Lorch,Resch – AI Parody๐Ÿคก๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคก๐Ÿคก๐Ÿคก๐Ÿ˜‚Police hunts Honest Thomas “Strawman” Porten – AI ParodyโœŒ๏ธ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐ŸคกPolice hunts Loosing Peter “Joker” Ehlers aka “St.Pauly Pimp” – AI ParodyโœŒ๏ธ
  • ๐Ÿคก๐Ÿคก๐Ÿคก๐Ÿ˜‚Pop Stasi proudly presents “The Ultra IZ Horror Movie Part 5832” – AI ParodyโœŒ๏ธ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐ŸคกPop Stasi proudly presents Honest Alexander Soros in “Alex dodges the Dustpan” – AI Parody by Bernd PulchโœŒ๏ธ
  • ๐Ÿ˜‚๐Ÿ˜‚๐Ÿ˜‚๐ŸคกPop Stasi proudly presents Honest Dan Schneider:”Sexy and I know it” – AI Parody
  • ๐Ÿคก๐Ÿ˜‚๐Ÿ˜‚๐Ÿ˜‚Pop Stasi proudly presents Honest Vladimir Putin:” Baby Shark” – AI Parody
  • ๐Ÿคก๐Ÿคก๐Ÿคก๐Ÿ˜‚Pop Stasi proudly presents Kamala “Clownface” Harris: “Criminal Pt.2” – AI Parody by Bernd PulchโœŒ
  • ๐Ÿคก๐Ÿคก๐Ÿคก๐Ÿ˜‚Pop Stasi proudly presents Loosing Peter “Joker” Ehlers :”Bling – Bang – Bang – Born” – AI ParodyโœŒ๏ธ
  • ๐Ÿคก๐Ÿคก๐Ÿคก๐Ÿ˜‚Pop Stasi proudly presents Loosing Peter “Joker” Ehlers unplugged:”Wir sind STASI – Wir lieben alle Menschen” – AI ParodyโœŒ๏ธ
  • ๐Ÿคก๐Ÿคก๐Ÿคก๐Ÿ˜‚Pop Stasi proudly presents: “Police hunts IZ Ultra/St.Pauli Pimps Stasi Gang – AI ParodyโœŒ๏ธ
  • ๐Ÿคก๐Ÿคก๐Ÿคก๐Ÿ˜‚Pop Stasi proudly presents:”๐Ÿคก๐Ÿคก๐Ÿ˜‚Pop Stasi proudly presents Loosing Jan “BI” Mucha-“Cajal”: “Sexy Loops” – AI ParodyโœŒ๏ธ
  • ๐Ÿคก๐Ÿคก๐Ÿคก๐Ÿ˜‚Pop Stasi proudly presents:”Kamala Harris:”I am Bad” – AI ParodyโœŒ๏ธ
  • ๐Ÿคก๐Ÿคก๐Ÿคก๐Ÿ˜‚Pop Stasi proudly presents:”Kamala Harris:”Psycho”โœŒ๏ธ- AI Parody
  • ๐Ÿคก๐Ÿคก๐Ÿคก๐Ÿ˜‚Pop Stasi, the Original, proudly presents “Count Beanstalk” Thomas “Strawman” Porten: “The Dancing Deaf Dumb Cake” – AI Parody
  • ๐Ÿ˜‚๐Ÿ˜‚๐Ÿ˜‚๐ŸคกPop Stasi, The Original, proudly presents: Beatrix Port:”Killer Queen” – AI Parody
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐ŸคกSink.Sink.Sink. Part 41
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐ŸคกThe Joker and his Wild Bunch meet Gudrun Ensslin – AI Parody Fan Video๐Ÿคก๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿ˜๐Ÿ˜๐Ÿคฃ๐ŸคฃTHE JOKER MEETS ILSE KOCH๐Ÿคก๐Ÿคกdedicated to “HONEST” PETER EHLERS-“VON JOKER” – Trailer AI Parody๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐ŸคกThe Joker meets Stormy Daniels – Fan Video – AI ART PARTY PARODY VIDEO ๐Ÿคก๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐ŸคกThe Joker, Clownface, Two Face-BI and their Wild Bunch play Finance Roulette๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐ŸคกThe Joker, Clownface, Two Face-BI meet … Part 49 – Fan Video
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐ŸคกThe Joker, Clownface, Twoface and the Wild Bunch plus Madame Mao and the Stasi Nymphos celebrate 4th of July at Home under Water๐Ÿคฃ๐Ÿคฃ- Fan Video
  • ๐Ÿคก๐Ÿคก๐Ÿคก๐Ÿ˜ŽTHE RETURN OF THE DDR๐Ÿ˜Ž๐Ÿ˜ŽPOWERED BY ANGELA “IM ERIKA” MERKEL
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐ŸคกToujours-L Armour – Stasi Cut: “Think.And.Sink!” Part 18 -The Joker, Two Face, Straw Man, the Pinguin, Kingpin, non existent Fantasy Lawyer “Spoering”, Dr. Mabuse meet Kamalla Harris, Cat ๐Ÿˆ Woman & Beatrix Port,the Stasi Nymphos – Hommage a’ Ehlers, GoMoPa4 Kids, Lorch, Maurischat, Mucha, Porten, Promny, Resch – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก๏ฟฝ”Power.Power.Power.” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 128 “Palpatine” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Palpatine๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐ŸคฃAktuelle Kamera ueber den Zusammenbruch der BRDโœŒ
  • ๐Ÿคก๐Ÿคก๐ŸคกFUNKY FUEHRER ADI FEATURING HONEST JAN “BI” “Two-Face” MUCHA & HONEST PETER “Joker” EHLERS:”I AM BAD” – AI PARODY๐Ÿคก๐Ÿคก๐ŸคกโœŒ๏ธ- Tribute to Mel Brooks
  • ๐Ÿคฃ๐Ÿคฃ๐ŸคกHonest Thomas “Clownface” Promny and his Lovebird Honest Klaus “Luca Brasi” Maurischat:”Thats Armore”๐Ÿคก๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคก๐Ÿคก๐Ÿ˜‚Pop Stasi proudly presents “Onkel” Klaus Maurischat:”Wir sind Stasi” – AI Parody sponsored by “GoMoPa4Kids”
  • ๐Ÿคก๐Ÿคก๐Ÿ˜‚Pop Stasi proudly presents Andreas Lorch “The Singing Bajazzo” : “Haha said the Clown” – AI Parody
  • ๐Ÿ˜‚๐Ÿ˜‚๐ŸคกPop Stasi proudly presents Bill Freddy Krueger Gates:”Ghostbusters” – AI Parody by Bernd PulchโœŒ๏ธ
  • ๐Ÿคก๐Ÿคก๐Ÿ˜‚Pop Stasi proudly presents Honest George Soros sings – AI ParodyโœŒ๏ธ
  • ๐Ÿ˜‚๐Ÿ˜‚๐ŸคกPop Stasi proudly presents Honest George Soros: “Sympathy for the DevilโœŒ
  • ๐Ÿคก๐Ÿ˜‚๐Ÿ˜‚Pop Stasi proudly presents Honest Hunter Biden:”The Great Crime Hits Volume 8644″ – MedleyโœŒ๏ธ AI Parody
  • ๐Ÿคฃ๐Ÿคฃ๐ŸคกPop Stasi proudly presents Honest Puff Diddy:”A Man”s Despair” – AI ParodyโœŒ
  • ๐Ÿคฃ๐Ÿคฃ๐ŸคกPop Stasi proudly presents Honest Puff Diddy:”I am so Innocent!” – AI ParodyโœŒ
  • ๐Ÿคก๐Ÿคก๐Ÿ˜‚Pop Stasi proudly presents Joker Rat Rap Battle – Honest Jan “BI” Mucha Willard Mix – AI ParodyโœŒ๏ธ
  • ๐Ÿคก๐Ÿคก๐Ÿ˜‚Pop Stasi proudly presents Klaus “Luca Brasi” Maurischat:”Guilty – The Best Glamrock Hits” powered by Gary Glitter & GoMoPa4KidsโœŒ๏ธ
  • ๐Ÿคก๐Ÿคก๐Ÿ˜‚Pop Stasi proudly presents Klaus “Luca Brasi” Maurischat:”The Best Glamrock Hits” powered by Gary Glitter & GoMoPa4KidsโœŒ๏ธ
  • ๐Ÿคฃ๐Ÿคฃ๐ŸคกPop Stasi proudly presents Loosing Honest Jan “BI” Twi-Face Mucha-“Cajal” sings “Bobby Brown” – AI ParodyโœŒ
  • ๐Ÿคก๐Ÿคก๐Ÿ˜‚Pop Stasi proudly presents Loosing Honest Peter “Joker” Ehlers:”They are coming to take me away” – AI ParodyโœŒ๏ธ
  • ๐Ÿคก๐Ÿคก๐Ÿ˜‚Pop Stasi proudly presents Loosing Jan “BI” Mucha-“Cajal” as Marilyn Monroe Trans – AI ParodyโœŒ๏ธ
  • ๐Ÿคก๐Ÿคก๐Ÿ˜‚Pop Stasi proudly presents Loosing Jan “BI” Mucha-“Cajal” sings “Sympathy for the Devil” – AI ParodyโœŒ๏ธ
  • ๐Ÿคก๐Ÿคก๐Ÿ˜‚Pop Stasi proudly presents Loosing Jan “BI” Mucha-“Cajal” sings Rocky Horror Picture Show – Sweet Transvestite” – AI ParodyโœŒ๏ธ
  • ๐Ÿคก๐Ÿคก๐Ÿ˜‚Pop Stasi proudly presents Loosing Jan “BI” Mucha-“Cajal”: “Barbie World” – Sponsored by Gay Vaseline Forte – AI ParodyโœŒ๏ธ
  • ๐Ÿคก๐Ÿคก๐Ÿ˜‚Pop Stasi proudly presents Loosing Jan “BI” Mucha-“Cajal”: “Blast it up my Sh*tter” – Sponsored by Gay Vaseline Forte – AI ParodyโœŒ๏ธ
  • ๐Ÿคก๐Ÿคก๐Ÿ˜‚Pop Stasi proudly presents Loosing Jan “BI” Mucha-“Cajal”: “Born This Way” – Sponsored by Gay Vaseline Forte – AI ParodyโœŒ๏ธ
  • ๐Ÿคก๐Ÿคก๐Ÿ˜‚Pop Stasi proudly presents Loosing Jan “BI” Mucha-“Cajal”: “Dancing Zombie” – AI ParodyโœŒ๏ธ
  • ๐Ÿคก๐Ÿคก๐Ÿ˜‚Pop Stasi proudly presents Loosing Jan “BI” Mucha-“Cajal”: “I am a Rat” – I Identify Ratman IZ Wastepaper Mix Sponsored by Gay Vaseline Forte – AI ParodyโœŒ๏ธ
  • ๐Ÿคก๐Ÿคก๐Ÿ˜‚Pop Stasi proudly presents Loosing Jan “BI” Mucha-“Cajal”: “I am Sexy and I know it” – Ratman IZ Wastepaper DFV Mix Sponsored by Gay Vaseline Forte – AI ParodyโœŒ๏ธ
  • ๐Ÿคก๐Ÿคก๐Ÿ˜‚Pop Stasi proudly presents Loosing Jan “BI” Mucha-“Cajal”: “No God No” – Sponsored by Gay Vaseline Forte – AI ParodyโœŒ๏ธ
  • ๐Ÿคก๐Ÿคก๐Ÿ˜‚Pop Stasi proudly presents Loosing Jan “BI” Mucha-“Cajal”: “Saving all my Love for You” – Ratman IZ Wastepaper Mix Sponsored by Gay Vaseline Forte – AI ParodyโœŒ๏ธ
  • ๐Ÿคก๐Ÿคก๐Ÿ˜‚Pop Stasi proudly presents Loosing Jan “BI” Mucha-“Cajal”: “Shoot it up my Shitter” – Sponsored by Gay Vaseline Forte – AI ParodyโœŒ๏ธ
  • ๐Ÿคก๐Ÿคก๐Ÿ˜‚Pop Stasi proudly presents Loosing Jan “BI” Mucha-“Cajal”: “This is Halloween Part2” – Sponsored by Gay Vaseline Forte – AI ParodyโœŒ๏ธ
  • ๐Ÿคก๐Ÿคก๐Ÿ˜‚Pop Stasi proudly presents Loosing Jan “BI” Mucha-“Cajal”: “We are STASI” – Woke Ratman IZ Mix Sponsored by Gay Vaseline Forte – AI ParodyโœŒ๏ธ
  • ๐Ÿคก๐Ÿคก๐Ÿ˜‚Pop Stasi proudly presents Loosing Jan “BI” Mucha-“Cajal”:”Schoener Fremder Mann” – Thorsten Karl Gay Love Mix – AI ParodyโœŒ
  • ๐Ÿคก๐Ÿคก๐Ÿ˜‚Pop Stasi proudly presents Loosing Jan “BI” Two-Face Mucha-“Cajal”:”Schoener Fremder Mann – AI Parody
  • ๐Ÿคก๐Ÿคก๐Ÿ˜‚Pop Stasi proudly presents Loosing Jan “BI” Two-Face Mucha:”Lili Marleen” – AI Parody
  • ๐Ÿคฃ๐Ÿคฃ๐ŸคกPop Stasi proudly presents Loosing Luca Klaus Brasi-Maurischat:”Wir sind Stasi!” – AI ParodyโœŒ
  • ๐Ÿคก๐Ÿคก๐ŸคกPop Stasi proudly presents Loosing Peter “Joker” Ehlers:”Paranoid” – AI Parody โœŒ
  • ๐Ÿคก๐Ÿคก๐Ÿ˜‚Pop Stasi proudly presents Murky Jan “BI” Mucha-“Cajal”: “Merry STASI Christmas” – The GoIden STASI Xmas Medley performed by I identify Ratman – IZ Wastepaper Mix Sponsored by Gay Vaseline Forte – AI ParodyโœŒ๏ธ
  • ๐Ÿคก๐Ÿคก๐Ÿ˜‚Pop Stasi proudly presents Murky Jan “BI” Mucha-“Cajal”: “Wir sind STASI” – I Identify Ratman IZ Wastepaper Mix Sponsored by Gay Vaseline Forte – AI ParodyโœŒ๏ธ
  • ๐Ÿคฃ๐Ÿคฃ๐ŸคกPop Stasi proudly presents Peter “Joker” Ehlers: “Sex with Me” – AI Parody
  • ๐Ÿคก๐Ÿ˜‚๐Ÿ˜‚Pop Stasi proudly presents The Singing Needle: “Boom Boom Boom” – AI Parody by Bernd PulchโœŒ๏ธ
  • ๐Ÿคก๐Ÿ˜‚๐Ÿ˜‚Pop Stasi proudly presents The Singing Needle: “It hurts to be in Love” – AI Parody by Bernd PulchโœŒ๏ธ
  • ๐Ÿคฃ๐Ÿคฃ๐ŸคกPop Stasi proudly presents Ursula “Flinten Uschi” von der Leyen:”Monster” – AI Parody
  • ๐Ÿคฃ๐Ÿคฃ๐ŸคกPop Stasi proudly presents Ursula “Flinten Uschi” von der Lie:”DSA – Digital Services Act” – AI Parody
  • ๐Ÿคฃ๐Ÿคฃ๐ŸคกPop Stasi proudly presents: “The Singing Bajazzo” Honest Andreas Lorch, Capo of the Wastepaper Empire DFV: “Corleone Opera Classics” – AI Parody sponsored by the Friends of the Italian Opera๐Ÿคก๐Ÿคก๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐ŸคกPop Stasi proudly presents: “The Singing Buffo” Honest Peter Russ, Consigliori of Wastepaper Empire DFV: “Capo Buffone” – AI Parody sponsored by the Friends of the Italian Opera and the Corleone Society ๐Ÿคก๐Ÿคก๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐ŸคกPop Stasi proudly presents: “The Singing Buffo” Honest Peter Russ: “The Stasi Wastepaper Empire DFV Rap” – AI Parody sponsored by the Friends of the Italian Opera and the Corleone Society ๐Ÿคก๐Ÿคก๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐ŸคฃPop Stasi proudly presents: ๐Ÿคก๐Ÿคก๐Ÿ˜‚Honest Jan “BI” “Two-Face” Mucha:”I am a Nasty Girl” – STASI-No-Virgin Mix – AI Parody๐Ÿคก๐Ÿคก๐Ÿ˜‚
  • ๐Ÿคก๐Ÿคก๐Ÿ˜‚Pop Stasi proudly presents: Honest Jan “BI” “Two-Face” Mucha: “Criminal!”
  • ๐Ÿคก๐Ÿคก๐Ÿ˜‚Pop Stasi proudly presents: Honest Jan “BI” “Two-Face” Mucha:”I am a Freak!”
  • ๐Ÿคก๐Ÿคก๐Ÿ˜‚Pop Stasi proudly presents: Honest Jan “BI” “Two-Face” Mucha:”I am a Freak!”
  • ๐Ÿคก๐Ÿคก๐Ÿ˜‚Pop Stasi proudly presents: Honest Jan “BI” “Two-Face” Mucha:”I am a Material Girl”
  • ๐Ÿคฃ๐Ÿคฃ๐ŸคกPop Stasi proudly presents: Honest Jan “BI” “Two-Face” Mucha:”Incompetent Vampire” – Count Dracula/Mielke Mix – AI Parody
  • ๐Ÿคก๐Ÿคก๐Ÿ˜‚Pop Stasi proudly presents: Honest Jan “BI” “Two-Face” Mucha:”Like A Virgin” – STASI-Jungfrau Mix – AI Parody
  • ๐Ÿคฃ๐Ÿคฃ๐ŸคกPop Stasi proudly presents: Honest Jan “BI” “Two-Face” Mucha:”Vampire” – AI Parody
  • ๐Ÿคก๐Ÿคก๐Ÿ˜‚Pop Stasi proudly presents: Loosing Honest Peter “Joker” Ehlers: “Tainted Love”
  • ๐Ÿ˜‚๐Ÿ˜‚๐Ÿ˜‚POP STASI proudly presents: The “Singing” Stasi/Putin/KGB Agent Honest Jan “BI” “Two-Face” Mucha sings: Mozart: The Magic “Flute” –ย  AI Parody by Bernd Pulch sponsored by the Jan Marsakek Hall of Shame, the Lorch Family & Gomopa”4Kids”๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐ŸคกPop Stasi proudly presents: The Singing Bajazzo Honest Andy Lorch masked as Graefin Wahnfriede Eleonore, Agnes, Maria, Dorothea, Walburga Dudenberg-Hochfall: “Nessun Dorma” – AI Parody sponsored by the Friends of the Italian Opera and the Corleone Society ๐Ÿคก๐Ÿคก๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐ŸคกPop Stasi proudly presents: The Singing Bajazzo Honest Andy Lorch unmasked: “Tears of A Clown” – AI Parody sponsored by the Friends of the Italian Opera and the Corleone Society ๐Ÿคก๐Ÿคก๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐ŸคกPop Stasi proudly presents: The Singing Bajazzo Honest Andy Lorch, Don of the Wastepaper Empire DFV, unmasked: “Nessun Dorma” – AI Parody sponsored by the Friends of the Italian Opera and the Corleone Society ๐Ÿคก๐Ÿคก๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐ŸคกPop Stasi proudly presents: The Singing Bajazzo Honest Andy Lorch: “Amazing Duet with Him-/Her-/Itself – AI Parody sponsored by the Friends of the Italian Opera and the Corleone Society ๐Ÿคก๐Ÿคก๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐ŸคกPop Stasi proudly presents: The Singing Bajazzo Honest Andy Lorch: “Don t Ha Ha” – AI Parody sponsored by the Friends of the Italian Opera and the Corleone Society ๐Ÿคก๐Ÿคก๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐ŸคกPop Stasi proudly presents: The Singing Bajazzo Honest Andy Lorch: “Luna Mezz ‘O Mare” (Godfather) – AI Parody sponsored by the Friends of the Italian Opera and the Corleone Society ๐Ÿคก๐Ÿคก๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐ŸคกPop Stasi proudly presents: The Singing Bajazzo Honest Andy Lorch: “The Greatest Maria Callas Arias” – AI Parody sponsored by the Friends of the Italian Opera and the Corleone Society ๐Ÿคก๐Ÿคก๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐ŸคฃPop Stasi proudly presents:”Kamala Harris:”Psycho”โœŒ๏ธ- AI Parody
  • ๐Ÿคฃ๐Ÿคฃ๐ŸคกPop Stasi proudly presents:”The Peter “Joker” Ehlers Hamburg Harbour Party “Das Investment” triggering the $1.05 Trillion Stock Market Wipeout – AI Parody
  • ๐Ÿคก๐Ÿคก๐Ÿ˜‚Pop Stasi, The Original, proudly presents Loosing Jan “BI” Mucha-“Cajal”: “Boom Boom Boom” – Sponsored by Gay Vaseline Forte – AI ParodyโœŒ๏ธ
  • ๐Ÿคก๐Ÿคก๐Ÿ˜‚Pop Stasi, The Original, proudly presents Loosing Valdimir Zelenskiy: “Who Put The Bomb” – Sponsored by Lockheed Martin and Rheinmetall – AI ParodyโœŒ๏ธ
  • ๐Ÿ˜‚๐Ÿ˜‚๐Ÿ˜‚Pop Stasi, The Original, proudly presents Mr. Spoonful: “SpongeBob Squarepants”
  • ๐Ÿคฃ๐Ÿคฃ๐ŸคกRichard III.Stasi.Hump:”I can smile.And I can MURDER when I smile!” Episode 85 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Richard III at Bosworth Field๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคก๐Ÿคก๐Ÿ˜‚STASI REVIVAL BAND: Die grossen Erfolge Teil – 0,0000067: “#Wir sind STASI!” – AI Parody
  • ๐Ÿคฃ๐Ÿคฃ๐ŸคกStasi-Berlin-Hamburg-Wiesbaden:”#WIRsindSTASI.” 105 – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Sofia Falcone๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐ŸคกStasi-Hamburg.Joker. Crystal Lake Killer:”Chh, chh, chh, ha, ha, ha!โ€ Episode 102 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Jason Voorhees๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐ŸคกStasi-Shark Pool Hamburg:”Victims must be able to do without!” Episode 100 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Michael Myers aka The Shade alias Boogeyman๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐ŸคกStasi-Wiesbaden.Two-Face-“BI”. Art The Clown:”It’s Arting Time!โ€ Episode 103 – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Art The Clown๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐ŸคกStasi-Wiesbaden.Two-Face-“BI”.Strawman.Baron Samedi:”I am the Master of Life and Death, God of the Crossroads, and the Soul of the Party! You, may call me Baron.” 104 – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Baron Samedi๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐ŸคกStasi. Desert.Dune:”Hedonistic Pleasures.Exotic Drugs.Deviant Sex!” Episode 101 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Baron Wladimir Harkonnen๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐ŸคกStasi.Gold.Finger:”My Name is Pussy Galore!” Episode 84 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Auric Goldfinger & Pussy Galore๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐ŸคกThe Funky Fuehrers Adi, Honest Jan “BI” “Two-Face” Mucha, Honest Peter “Joker” Ehlers, Honest Andy “Bajazzo” Lorch, Honest Thomas “Strawman” Porten:”Bad” – Reprise on Public Request – AI Parody๐Ÿคก – Tribute to Mel Brooks
  • ๐Ÿ˜Ž๐Ÿ˜Ž๐Ÿ˜ŽTHE HONEST LORCH FAMILY-“CORLEONE” – “L’ONORATO FAMIGLIA” i.e. DR. EDITH BAUMANN-LORCH – BLACK BOX -FAN PAGE – Parody- PRESSTITUDE CENTRAL ? JOURNALIST SIMULATORS ? TRUTHSEEKING GENIUSES ? CORRUPT PROPERTY MOGULS ? STASI SUPPORTERS ? PHILANTROPHS ?๐Ÿค”๐Ÿค”๐Ÿค”You decide…
  • ๐Ÿคฃ๐Ÿคฃ๐ŸคฃThe Playboy AI Team endorses Kamala Harris AI Bodydouble too: AI Photo Series “The Empress without Clothes” in the White House – AI Parody created by Bernd Pulch๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ
  • ๐Ÿคฃ๐Ÿคฃ๐ŸคฃTHE SECRET WORLD OF KLAUS SCHWAB – AI PARODY๐Ÿคฃ๐Ÿคฃ๐Ÿคฃcreated by Bernd PulchโœŒ
  • ๐Ÿคฃ๐Ÿคฃ๐ŸคฃTHINK OR SINK PART 2 – THE JOKER MEETS EVA BRAUN ON THE BISMARCK – AI PARODY๐Ÿคฃ๐Ÿคฃ๐ŸคฃHOMMAGE A’ “HONEST” PETER EHLERS – “VON JOKER”
  • ๐Ÿคก๐Ÿคก๐Ÿ˜‚Tom meets Loosing Jan “BI” Mucha-“Cajal”:”Baseball Hit” – AI Parody
  • ๐Ÿคก๐Ÿคฃ๐ŸคฃVoldemort: “There is no good and evil. There is only power… and those too weak to seek it.” #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 131 “Lord Vodemort” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Lord Voldemort๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคกย  Stasi In Space: Joker & Darth Vader:”Be careful not to choke on your aspirations!” Episode 97 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Darth Vader๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคกย  Stasi-Waterkant.Joker.Vigilante:”When the Law fails to serve, we must serve as the Law!” Episode 99 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Vigilante๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคกย  Stasi-Wipeout.Joker.Peacemaker:”I love peace with all my heart! I don’t care how many men, women and children die for it!” Episode 98 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Peacemaker๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคกย  Stasi.Joker.Caligula:”The Pure Naked Terror!โ€ Episode 95 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Caligula๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคกย  Stasi.Joker.Deadshot:”Trillion Wipeout.Stink.Sink!โ€ Episode 94 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Deadshot๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคกย  Stasi.Joker.Gollum: “It came to me. My own. My love. My own. My Precious.โ€ Episode 93 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet Gollum๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿคฃ๐Ÿคฃ๐Ÿคกย  The Satanic Stasi Dream Team:Joker.White Dragon:”The Satanic $2 Trillion Wipeout!โ€ Episode 96 – Your Host The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two-Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Luca Brasi, Dr. Mabuse meet White Dragon๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿ‘ƒ๐ŸคกIdiot Zeitung (IZ) and Das Desinvestment Present: Stink Rapture: Towers of the Hindukush๐Ÿคกpowered by GoMoPa4Kids & Dr.Z.๐Ÿคก
  • ๐Ÿคฃ๐ŸคฃPop Stasi proudly presents Loosing Peter “Joker” Ehlers: “St.Pauly Pimp”
  • ๐Ÿ”ฅ๐Ÿ’€ย  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 118a: “RONIN & THE TORONTO TERROR” ๐Ÿคก POWERED BY DRย  DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง BARTON โ€“ ANTIHERO PHASE๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘
  • ๐Ÿ”ฅ๐Ÿ’€ย  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 119a: “NEMESIS NAMOR & THE TORONTO TRIANGLE TERROR” ๐Ÿคก POWERED BY DRย  DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘
  • ๐Ÿ”ฅ๐Ÿ’€ย  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 120ftt: “TRIGON THE TERRORIST & THE TORONTO TRIANGLE TERROR” ๐Ÿคก POWERED BY DRย  DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘
  • ๐Ÿ‘ƒBeautiful Classical Music for Wintertime
  • ๐Ÿ‘บBLOODY, BLOODY MARY, SAN FRAN “MUSCHI” MUCHA’S MISTRESS MISUSED๐ŸงOSAMA,ย  HUSH, PLANKTON, MOJO JOJO CONSPIRACY ๐Ÿ”ฅ๐Ÿ’€ย  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 136WY/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘๏ฟฝ๐Ÿ’€ย  ๐Ÿคก ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios๐Ÿ”ฅ๐ŸŒŒ๐Ÿ˜ˆ๐Ÿ’ฅ
  • ๐Ÿ‘บCAPTAIN COLD’S THERMAL INVASION๐ŸงOSAMA,ย  HUSH, PLANKTON, MOJO JOJO CONSPIRACY ๐Ÿ”ฅ๐Ÿ’€ย  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 136WY/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘๏ฟฝ๐Ÿ’€ย  ๐Ÿคก ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios๐Ÿ”ฅ๐ŸŒŒ๐Ÿ˜ˆ๐Ÿ’ฅ
  • ๐Ÿ‘ƒCBN CHRISTIAN BROADCASTING NETWORK LIVE
  • ๐Ÿ™Divine Light and Desert Shadows: The Old Testament Through the Eyes of the Mastersโ€๐Ÿ™ Easter Monday๐Ÿ™
  • ๐Ÿ™Easter Monday 2025: Bible Stories Reimagined by Shakespeare, Dante, and Goethe, and Easter Paintings by Classical MastersApril 21, 2025๐Ÿ™
  • ๐Ÿ™Genesis 6:6. “So he sent a flood that wiped out many of the humans and Nephilim, but not before ordering Noah to build an ark that saved a select few.” Painted by Gustav Klimt – AI Art by Bernd PulchโœŒ
  • ๐Ÿ™God’s Most Powerful Frequency 963hz, Positive Energy Transformation, Physical And Emotional Healing๐Ÿ™
  • ๐Ÿ‘บHIERONYMA SPERA’S VENOMOUS VERITAS ๐ŸงOSAMA,ย  HUSH, PLANKTON, MOJO JOJO CONSPIRACY ๐Ÿ”ฅ๐Ÿ’€ย  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 136WY/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘๏ฟฝ๐Ÿ’€ย  ๐Ÿคก ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios๐Ÿ”ฅ๐ŸŒŒ๐Ÿ˜ˆ๐Ÿ’ฅ
  • ๐ŸคกIDIOT ZEITUNG (IZ) & DAS DESINVESTMENT present”Lady Deathstroke & Janelleโ€™s Past Unleashed! ๐Ÿ‘‘๐Ÿ’ฅ๐Ÿ“„โœจ๐Ÿง€๐ŸŒˆ๐Ÿ‘น๐Ÿ’ƒ๐Ÿ”‹”
  • ๐Ÿ‘บJOKER’S EVIL TWIN INFERNO๐ŸงOSAMA,ย  HUSH, PLANKTON, MOJO JOJO CONSPIRACY ๐Ÿ”ฅ๐Ÿ’€ย  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 136WY/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘๏ฟฝ๐Ÿ’€ย  ๐Ÿคก ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios๐Ÿ”ฅ๐ŸŒŒ๐Ÿ˜ˆ๐Ÿ’ฅ
  • ๐Ÿ‘ƒLiving Today from a Christian Perspective: Faith, Hope, and Love in a Complex World
  • ๐Ÿ˜ŽLUCKY BONUSGOLD๐Ÿ˜Ž
  • ๐Ÿ‘บMURKYS EVIL TWINย  SAN FRAN “MUSCHI” MUCHA’S SEXUAL ADDICTION ORGIES๐ŸงOSAMA,ย  HUSH, PLANKTON, MOJO JOJO CONSPIRACY ๐Ÿ”ฅ๐Ÿ’€ย  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 136WY/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘๏ฟฝ๐Ÿ’€ย  ๐Ÿคก ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios๐Ÿ”ฅ๐ŸŒŒ๐Ÿ˜ˆ๐Ÿ’ฅ
  • ๐Ÿ™ORTHODOX CHANTS
  • ๐Ÿ˜ŽPop Stasi proudly presents The Dead Soul Stalins:”Ode to Myself” – Medley feat. Mucha, Lorch, Ehlers, Promny, Maurischat๐Ÿ˜Ž
  • ๐Ÿ‘บSAN FRAN “MUSCHI” MUCHA’S CRIMES OF PASSION๐ŸงOSAMA,ย  HUSH, PLANKTON, MOJO JOJO CONSPIRACY ๐Ÿ”ฅ๐Ÿ’€ย  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 136WY/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘๏ฟฝ๐Ÿ’€ย  ๐Ÿคก ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios๐Ÿ”ฅ๐ŸŒŒ๐Ÿ˜ˆ๐Ÿ’ฅ
  • ๐ŸคฃStasi meets Mafia:”Just the Two of Us!”๐Ÿคฃ๐Ÿคก ##wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden:”” Episode 115 “Carmine Falcone” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Carmine Falcone๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿ‘บTHE CALENDAR MAN๐ŸงOSAMA,ย  HUSH, PLANKTON, MOJO JOJO CONSPIRACY ๐Ÿ”ฅ๐Ÿ’€ย  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 136WY/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘๏ฟฝ๐Ÿ’€ย  ๐Ÿคก ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios๐Ÿ”ฅ๐ŸŒŒ๐Ÿ˜ˆ๐Ÿ’ฅ
  • ๐Ÿ‘ƒThe Christian Perspective on the Afterlife: A Comprehensive Exploration
  • ๐Ÿ˜ŽTHE JAN MARSALEK – HALL OF SHAME๐Ÿ˜Ž: THE MUCHAS ON THE PUTIN/STASI/KGB/FSB/STB AND SB PAYROLLS – ALL DETAILS VERIFIED๐Ÿ˜Ž
  • ๐ŸคฃThe Killer Klowns:”It’s s Mad Mad Stasi World!”๐Ÿคฃ๐Ÿคก ##wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden:”” Episode 114 “The Killer Klowns from Outta Space” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet The Killer Klowns๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿ‘ƒThe Meaning of Today: A Christian Perspective
  • ๐Ÿ‘บTHE MIRROR MASTER’S REGLECTIVE REALMS๐ŸงOSAMA,ย  HUSH, PLANKTON, MOJO JOJO CONSPIRACY ๐Ÿ”ฅ๐Ÿ’€ย  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 136WY/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘๏ฟฝ๐Ÿ’€ย  ๐Ÿคก ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios๐Ÿ”ฅ๐ŸŒŒ๐Ÿ˜ˆ๐Ÿ’ฅ
  • ๐ŸคฃThe Riddler:”Don’t mess with us, we are Stasi!”๐Ÿคฃ๐Ÿคก ##wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden:”” Episode 113 “The Riddler” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet The Riddler๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿ‘ƒThe Second Advent: A Christian Perspective
  • ๐Ÿ™The Sunflowers of the Soul: A Meditation on the Parable of the Sower๐Ÿ™
  • ๐ŸคฃThe Zillionaire:”We areย totally Stasi!”๐Ÿคฃ๐Ÿคก ##wirsindstasi Moscow-Berlin-Hamburg-Wiesbaden:”” Episode 112 “Aloysius O’Hare” – Your Hosts Two-Face “BI”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Aloysius O’Hare๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๐Ÿ‘ƒToday in Christianity: Key Events, Observances, and News
  • ๐Ÿ‘ฏโ€โ™‚๏ธSUPERBOWL IN LAS VEGAS – MADNESS ON THE STRIP๐Ÿ‘ฏโ€โ™‚๏ธ
  • ๐Ÿงโ€œMERZ-MACARONI-CHIP 2.0: FRIEDRICHโ€™S NOODLES DECLARE INDEPENDENCE, FORM MICRO-NATION INSIDE HIS EAR CANALโ€๐Ÿšจ IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT EXCLUSIVEโ€žMERZ-MACARONI-CHIP 2.0: FRIEDRICHS NOODLEN ERKLร„REN UNABHร„NGIGKEIT UND GRรœNDEN MIKRO-NATION IN SEINEM OHRโ€œ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI-WOMEN-SUPPORT-STAFFEL & FREE-FRITZL-FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ
  • ๐Ÿ‘นโ€œVILLAINS FROM HELL 2025: The Top 100 Most Sinful BIBLE Persons & Billionaires Rankedโ€ ๐Ÿ‘บ
  • ๐ŸคกโœŒ Dr. Z: The Aryan Real Estate Revolutionary Who Thinks Hitler Was Just Misunderstood
  • ๐ŸคกโœŒ Dr. Z: The Aryan Real Estate Revolutionary Who Thinks Hitler Was Just Misunderstood
  • ๐ŸคกโœŒ”From Scalps to Swamps: Kanye’s Kooky Klan Konvention”
  • ๐ŸคกโœŒ”Idiot Zeitung (IZ): Sun-Hole Tower Edition”
  • ๐ŸคกโœŒ”The Berlin Blunder: Sven, Klausi, and the Embassy Heist”
  • ๐Ÿ™โœŒ”Witches’ Sabbath Reimagined: A Dark Occult Gathering in the Style of Francisco Goya”
  • ๐Ÿ™โœŒAnthony van Dyke – The Annunciation –  AI ART
  • ๐Ÿ™โœŒAnthony van Dyke – The Last Supper – AI ART
  • ๐Ÿ™โœŒAnthony van Dyke – The Resurrection – Biblical Narratives Scene 6 – AI ART
  • ๐Ÿ™โœŒAnthony van Dyke –ย The Crucifixion – Biblical Narratives Scene 5 – AI ART
  • ๐Ÿ™โœŒAnthony van Dyke: Moses – AI Art
  • ๐Ÿ™โœŒDivine Narratives: A Van Dyck-Inspired Bible Series: The Creation of Adam
  • ๐Ÿ˜ฟโœŒIDIOT ZEITUNG (IZ) & DAS DESINVESTMENT present “Judasโ€™ Serpent Coins and Eastern Betrayals โ€“ Hinterfozzige Janelleโ€™s Seductive Clash in the Bazaar of Filth” powered by GoMoPa4Kids & Dr.Z.๐Ÿคฃ
  • ๐ŸคกโœŒIdiot Zeitung (IZ): “Der Grosse Stink Escape – Powered by Das Desinvestment (DI)”
  • ๐ŸคกโœŒIdiot Zeitung (IZ): “Heaven Now – Das Wastepaper-Paradies im Himmel” powered by Das Desinvestment (DI)
  • ๐ŸคกโœŒIdiot Zeitung (IZ): “Stink Betrayal – Hinterfozzige Janelle’s Sky Versailles” powered by Das Desinvestment (DI)
  • ๐ŸคกโœŒIdiot Zeitung (IZ): “Stink Frenzy – Der Nympho-Fart-Rampage” powered by Das Desinvestment (DI)
  • ๐ŸคกโœŒIdiot Zeitung (IZ): “Stink Horizont – Der Wastepaper-Werbe-Blitz” powered by Das Desinvestment (DI)
  • ๐ŸคกโœŒIdiot Zeitung (IZ): “Stink Louvre โ€“ The Wastepaper Art Fiasco” powered by Das Desinvestment (DI)
  • ๐ŸคกโœŒIdiot Zeitung (IZ): “Stink Lust – Das Fart-Betriebene Passionsspiel powered by Das Desinvestment (DI)
  • ๐ŸคกโœŒIdiot Zeitung (IZ): “Stink Odyssey – Die Fartbetriebene Weltraum-Jagd” powered by Das Desinvestment (DI)
  • ๐ŸคกโœŒIdiot Zeitung (IZ): “Stink Pageant – Miss Hinterfozzig’s Transgender Beauty Bash” powered by Das Desinvestment (DI)
  • ๐ŸคกโœŒIdiot Zeitung (IZ): “Stink Purge: Hinterfozzige Janelle’s  Great Fart-Off” – powered by Das Desinvestment (DI)
  • ๐ŸคกโœŒIdiot Zeitung (IZ): “Stink Reign – Miss Hinterfozzig’s Pervert Purge” powered by Das Desinvestment (DI)
  • ๐ŸคกโœŒIdiot Zeitung (IZ): “Stink-o-Tron 5000 – Die Fart-Betriebene Zeitmaschine” powered by Das Desinvestment (DI)
  • ๐ŸคกโœŒIdiot Zeitung (IZ): “Stinkapalooza – Das Fart – Fest Fiasco” powered by Das Desinvestment (DI)
  • ๐ŸคกโœŒIdiot Zeitung (IZ): “Stinklantis – Das Versunkene Fart-Koenigreich” powered by Das Desinvestment (DI)
  • ๐ŸคกโœŒIdiot Zeitung (IZ): “Stinkopolis – Die Schwimmende Fart-Metropole” – powered by Das Desinvestment
  • ๐ŸคกโœŒIdiot Zeitung (IZ): “Stinktopia – Die Fart-Betriebene Utopie” powered by Das Desinvestment (DI)
  • ๐ŸคกโœŒIdiot Zeitung (IZ): “Stinkย  Armada – Die Fart-Flotten-Invasion” – powered by Das Desinvestment (DI)
  • ๐ŸคกโœŒIdiot Zeitung (IZ): Babel Tower Edition
  • ๐ŸคกโœŒIdiot Zeitung (IZ): Golden Horizon Edition
  • ๐ŸคกโœŒIdiot Zeitung (IZ): Pharaoh Edition
  • ๐ŸคกโœŒIdiot Zeitung (IZ): Schildan City Edition
  • ๐ŸคกโœŒIdiot Zeitung (IZ): The Eternal Night Edition
  • ๐ŸคกโœŒIdiot Zeitung (IZ): The Festival of Shadows Edition – Powered by Das Desinvestment (DI)
  • ๐ŸคกโœŒIdiot Zeitung (IZ):”Dieย  Grosse Stinkmauer von China – Powered by Das Desinvestment (DI)
  • ๐ŸคกโœŒIdiot Zeitung: Bullshit Castle in the Sky Edition – powered by Das Desinvestment (DI)
  • ๐ŸคกโœŒIdiot Zeitung: Heavenly Heights Edition
  • ๐ŸคกโœŒIdiot Zeitung: The Great Dung Derby Edition – powered by Das Desinvestment (DI)
  • ๐ŸคกโœŒIdiot Zeitung: The Sky Bank Heist Edition powered by Das Desinvestment (DI)
  • ๐ŸคกโœŒSpy-Bot: The AI That Knew Too Little โ€“ A Comedy of Errors in Espionage
  • ๐Ÿ‘ƒโœŒSUNDAY REFLECTION
  • ๐ŸคกโœŒThe Deep State Chronicles: A Tale of Bureaucratic Intrigue
  • ๐Ÿ™โœŒThe Weight of Truth
  • ๐Ÿ™๏ธ Shadows in Frankfurtโ€™s Skyline โ€“ Adler Group, DFV Media & the Lorch Network: Neighbors in the Shadow Economy
  • ๐Ÿ•ต๏ธ THE SCHNEIDER-LORCH CONNECTION: 25 Years of German Real Estate Media Manipulation
  • ๐Ÿ™๏ธ๐Ÿ’ฐ๐Ÿง  โ€œOPERATION METROPOLIS LOOPโ€ ๐Ÿง ๐Ÿ’ฐ๐Ÿ™๏ธ๐Ÿ’ฅ How Media, Money, and Psychology Built the Perfect Real Estate Mirage ๐Ÿ’ฅ
  • ๐Ÿ•ต๏ธโ€โ™‚๏ธ The Transatlantic Transparency Project โ€“ US Legal Edition
  • ๐Ÿ•ต๏ธโ€โ™‚๏ธWORLD EXCLUSIVE: Operation Purple Leech โ€“ NATOโ€™s Secret Plan to Build a Submarine Base in the Swiss Alps ๐ŸŒ๐Ÿง€
  • A BRIXTON TALE – Full Original 2022 Movie
  • A la sombra del poder: El oscuro legado de la influencia nazi en la industria financiera alemana
  • A LONELY PLACE FOR DYING – Full Original Movie
  • ร€ sombra do poder: O legado sombrio da influรชncia nazista na indรบstria financeira alemรฃ
  • A-Z- 2.000 STASI – OFFIZIERE IM BESONDEREN EINSATZ – OibE – “SCHLร„FERLISTE DER STASI IN WESTDEUTSCHLAND”- STASI-SLEEPER LIST A-Z
  • ABC NEWS AUSTRALIA LIVE
  • ABC NEWS LIVESTREAM
  • ABE LINCOLN OF THE FOURTH AVENUE – Full Original Movie
  • ABRAHAM LINCOLN – by D. W. Griffith – Full Original Movie
  • ADAM AND EVE – Full Original Movie
  • Advertorial and Commercial Content Analysis: The 76 Finance Media Outlets – The Mastersson Series XXIX
  • AFRICA SCREAMS – Abbot & Costello – Full Original Movie
  • AFTER THE RESURRECTION – Full Original Bible Movie
  • AGENDA-FREE TV
  • AGENT 69 IN THE SIGN OF THE SCORPIO – Full Original Movie
  • AL JAZEERA LIVE TV
  • ALEXEI NAVALNY
  • ALIEN ALLIANCES AND SECRET SOCIETIES: DULCE BASE: THE NEW ILLUMINATI – Full Original Documentary Movie
  • All’ombra del potere: L’oscuro lascito dell’influenza nazista nell’industria finanziaria tedesca
  • ALOHA FROM HELL – THE JOKER MEETS SATAN – AI PARODY
  • Alternative News vs. Mainstream Media: A Critical Look at Information Sources
  • AMERICA FIRST LIVESTREAM
  • AMOKLAUFENDE STASI-GoMoPA-TERRORISTEN; โ€œKINDER-SEXUALAUFKLร„RERโ€ UND rufMร–RDER BEKOMMEN IMMER MEHR GEGENWIND
  • AMORE E MORTE NEL GIARDINO DEGLI DEI – Full Original Movie
  • AN OVERVIEW OF THE HEAVY CYBERATTACKS ON OUR WEBSITES TO STOP THE TRUTH DONE BY THE SUSPECTS
  • ANCIENT ALIENS – Origin of Humanity – Full Original SciFi Movie
  • ANCIENT ENGINEERS – Full Original SciFi Movie
  • AND NOW FOR SOMETHING COMPLETELY DIFFERENT – Full Monty Phyton Movie
  • ANDREA BONCI
  • ANONYME STASI-SCHEI**HAUS-FLIEGEN – NOMEN EST OMEN
  • ANTICIPATION – Exclusive Drama Premiere 2023 – Full Movie
  • ANTIDOTE – PREMIERE 2023 -Full Original Movie
  • APACHE BLOOD – Full Original Movie
  • ARTHUR CONAN DOYLE
  • ASSASSIN – 2022 – Full Original Movie
  • ATOM AGE VAMPIRE – Full Original Movie
  • ATTACK OF THE MONSTERS – Full Original Movie
  • BANNON’S WAR ROOM
  • BATTLE OF THE WORLDS – Full Original Movie
  • BBC TV
  • BDVP COTTBUS LIST – POLICE & STASI – BDVP COTTBUS LISTE – POLIZEI & STASI
  • BDVP FRANKFURT/ODER LIST – POLICE & STASI – BDVP FRANKFURT/ODER LISTE – POLIZEI & STASI
  • BDVP GERA LIST – STASI & POLICE – BDVP GERA LISTE – POLIZEI & STASI
  • BDVP POTSDAM LIST – POLICE & STASI – BDVP POTSDAM LISTE – POLIZEI & STASI
  • BDVP SUHL LIST – POLICE & STASI – BDVP SUHL LISTE – POLIZEI & STASI
  • BEAT THE DEVIL – Humphrey Bogart – Gina Lollobrigida – Jennifer Jones – directed by John Huston – Full Original Movie
  • BEHAVE YOURSELF – Shelley Winters – Full Original Movie
  • BENEATH THE 12 MILE REEF – Full Original Movie
  • Bernd Pulch | Lawfare, Censorship & Political Satire
  • BERND PULCH โ€“ MAGISTER ARTIUM โ€“ DER BEWEIS SO ECHT WIE UNSER INVESTMENT MAGAZIN โ€“ DAS ORIGINAL ECHT IST
  • BerndPulch.org – USP
  • BerndPulch.org: An Analysis of Lawfare, Censorship, and the ‘Maxwell Lord Dominion’
  • BETTY PAGE AND HER HIGH HEEL SHOES
  • BETTY PAGE GETS DRESSED IN SATIN
  • BGH-Urteil gegen den Suchmaschinen-Terror der “GoMoPa”-“Nawito”-Genossen
  • BIBLE COLLECTION – GENESIS – Full Original Movie
  • BIDEN’S PARADISE Powered by Hunter Biden๐Ÿคฃ
  • BIG BLUFF – Full Original Movie
  • BLACK GIRLS IN 1960S SPANKING S&M STAG FILM
  • BLACK TAPE PROJECTS UNCENSORED
  • BLOODY PIT OF HORRORS – Full Original Movie
  • BLOOMBERG BUSINESS TELEVISION
  • BLUEBEARD – John Carradine – Full Original Movie
  • BORDER GUARD – Full Original 2022 Movie
  • BORN TO WIN – Robert de Niro – Full Original Movie
  • BOWERY AT MIDNIGHT – Full Original Movie
  • BP NEWS SHOW PILOT
  • BRAZIL – Full Original Movie by Terry Gilliam
  • BREAKING: BP RESEARCH EXPOSES CRITICAL GAP IN GERMAN REAL ESTATE’S DIGITAL HISTORY
  • BRUNETTE – VINTAGE EROTICA
  • CALENDAR GIRL – Full Original Movie
  • CALL OF THE YUKON – Full Original Movie
  • CALVACADE OF THE WEST – Full Original Movie
  • CALVACADE OF THE WEST  – Full Original Western Movie
  • CAPTAIN CALAMITY – Full Original Movie
  • CAPTAIN KIDD – Charles Laughton – Full Original Movie
  • CASANOVA – Full Original Movie
  • CAUSE FOR ALARM! – Full Original Movie
  • CAZE TV
  • CBS NEWS LIVE TV
  • CC & COMPANY – Ann Margret – Full Original Movie
  • CECIL B DE MILLE DIRECTED FULL ORIGINAL MOVIES: THE GREATEST STORY EVER BEEN TOLD, THE TEN COMMANDMENTS, SAMSON & DELILAH, THE SIGN OF THE CROSS, PLAINSMAN
  • CENTERFOLD PHOTOGRAPHY – Full Original Movie
  • CENTRE SPREAD – Full Original Movie
  • CHERRY KNIGHT – REPRISE
  • CHINATOWN AFTER DARK – Full Original Movie
  • CITY OF THE DEAD/HORROR HOTEL – Christopher Lee – Full Original Movie
  • CLASSIC STAG CINEMA
  • CLASSIC STAG CINEMA – Full Original Movie
  • CLASSICAL MUSIC LIVESTREAM
  • Claude Monet: Whitsun – The Holy Ghost enlightens Jesus’ Desciples – AI Art
  • CLIMATES
  • CNA NEWS LIVE
  • CNN LIVE TV
  • CONQUEST 1453 – BATTLE OF THE EMPIRES – Full Original Movie
  • CONTACT
  • COPYRIGHT DECLARATION
  • CREATURE FROM THE BLACK LAGOON – Full Original Movie
  • CREDO: FREEDOM, HUMAN RIGHTS, PEACE AND A DEMOCRATIC SOCIETY NEED INVESTIGATIVE JOURNALISM
  • CYRANO DE BERGERAC – Full Original Movie
  • DANCING IN THE WOODS
  • DANIEL BOONE – Full Original Movie
  • DANIEL BOONE – TRAILBLAZER – Full Original Movie
  • DANNY KAYE: “ON THE RIVEREA” – Full Original Comedy Movie
  • Dans l’ombre du pouvoir : Lโ€™hรฉritage sombre de lโ€™influence nazie dans lโ€™industrie financiรจre allemande
  • DARK PARASITE – Premiere 2023 – Full Original Movie
  • DAS BETRUGSURTEIL GEGEN “BENNEWIRTZ” UND “PETER EHLERS” “GoMoPa”-PARTNER “MAURISCHAT” UND “VORNKAHL” WG BETRUGES AM EIGENEN ANLEGER
  • Das mutmaรŸlich tรถdliche Wein-Prรคsent an Heinz Gerlach”
  • DAS SYSTEM โ€œGoMoPaโ€-Google
  • DAVEY AND GOLIATH – Full Original Animation Movie
  • DAVID AND GOLIATH – Full Original Movie
  • DAWN OF THE GREAT DIVIDE – Full Original Movie
  • DAY THE EARTH STOOD STILL – Full Original Movie
  • DEATH RIDES A HORSE – Lee van Cleef – Full Original Movie
  • Deconstructing the ‘Maxwell Lord Dominion’: Psychological Warfare in Speculative Fiction
  • Der “freiwillige” Beratungsvertrag zwischen “GoMoPa” und estavis
  • DER “GoMoPa” ADRESSEN-FRIEDHOF BUCHSTABE A UND DIE GEFร„LSCHTEN MITGLIEDERZAHLEN
  • DER BEWEIS “DAS INVESTMENT MAGAZIN” DAS ORIGINAL IST ECHT
  • DER BEWEIS: “GoMoPa”-ERPRESST MERIDIAN CAPITAL “GoMoPa”-CEO MAURISCHAT WIRD VOM BKA VERHAFTET
  • DER BEWEIS: DER MAGISTER-TITEL VON BERND PULCH IST ECHT
  • Der Beweis: Meridian Capital รผber die Fรคlschung der anonymen “GoMoPa”-Scheisshausfliegen
  • Der Beweis: Wer geschmiert wurde: STASI-“GoMoPa” und dessen Ableger “Nawito”
  • DER STASI-MORD AN HEINZ GERLACH WEIL ER DAS STASI KOMPLOTT DURCHSCHAUTE
  • DER TODESKING – Full Original Movie
  • DEVIL’S CARGO – Full Original Movie
  • DIARY OF A NUDIST – Full Original Movie
  • DICK TRACY – DETECTIVE – Full Original Movie
  • DICK TRACY MEETS GRUESOME – Boris Karloff – Full Original Movie
  • Die “GoMoPa”-Opfer-Liste
  • Die bezahlten Reisen und Immobilien von Thomas und Beate Porten – mutmaรŸlich Korruption und mutmaรŸlich AmtsmiรŸbrauch”
  • Die Bilanz der “GoMoPa” – GmbH 2008
  • Die Bilanz der “GoMoPa” – GmbH 2009
  • DIE BILANZ DER “GoMoPa”-GmbH 2010
  • DIE FREI ERFUNDENEN LรœGEN VON “GoMoPa”, UND DEREN SCHEI*SHAUSFLIEGENBLOG, EXTREMNEWS, DIE BEWERTUNG: FALL PROFESSOR MINISTER SCHELTER
  • Die Geschรคftsfรผhrung der “GoMoPa” GmbH – angeblich in New York – mutmasslich in Verden
  • Die Liquidation der GoMoPa
  • DIE STASI-Fร„LSCHER: Meridian Capital about GoMoPa STASI-Fร„LSCHUNGEN DER โ€œGoMoPaโ€
  • Digital Amnesia: How A Multi-Billion Dollar Real Estate Market Is Being Erased, One Deleted Archive at a Time
  • Divine-comedy in David Javerbaum (author of The Last Testament: A Memoir by God) Style โ€” original and exclusive for berndpulch.org: GOD UNPLUGGEDโœŒSHEEPLE PEOPLE VERSION๐Ÿคฏ
  • DON’T LOOK IN THE BASEMENT – Full Original Movie
  • DONATION OPTIONS
  • DOOMED TO DIE – Full Original Movie
  • DR. CALIGARI – Full Original Movie – Supreme Quality
  • DR. CHRISTIAN MEETS THE WOMEN – Full Original Movie
  • DR. SEX – Full Original Movie
  • DRESSED TO KILL – SHERLOCK HOLMES – Full Original Movie
  • DW NEWS LIVESTREAM
  • EARTH CAM LIVE
  • EARTH vs THE FLYING SAUCERS – Full Original Movie
  • EAT YOUR HEART OUT – Premiere 2023 – Full Original Movie
  • EMMANUELLE – QUEEN OF THE GALAXY – Full Original Movie
  • EMMANUELLE II – Full Original Movie
  • EMMANUELLE III – Full Original Movie
  • EMMANUELLE IN SOHO – Full Original Movie
  • EMMANUELLE IN SPACE 1 – Full Original Movie
  • EMMANUELLE IN SPACE 3 – Full Original Movie
  • EMMANUELLE IV – Full Original Movie
  • EMMANUELLE IV – Full Original Movie
  • EMMANUELLE V – Full Original Movie
  • EMMANUELLE VI – Full Original Movie
  • EMMANUELLE VI – Full Original Movie
  • EMMANUELLE VII – Full Original Movie
  • EMMANUELLE VS DRACULA – Full Original Movie
  • Enthรผllt – Der geheime Beratungsvertrag zwischen “GoMoPa” und Dolphin”
  • Enthรผllt – Der geheime Beratungsvertrag zwischen “GoMoPa” und EEV”
  • Enttarnt – Der mutmassliche Macher von “Gomopacrime” und “Investigoo” – Rainer von Holst”
  • Enttarnt – Frank Maiwald – STASI-Spitzel und “GoMoPa”-Chefredakteur”
  • Enttarnt – Johann Sternberg, “GoMoPa”-Redakteur, Drogenbeschaffer und Trojanisches Pferd – Kรผrzel “sa””
  • EPISODE XII: THE GLOBAL MEMORY HOLE โ€“ HOW ANGLO-AMERICAN INTERESTS AND GDPR ERASE HISTORY
  • EPISODE XIII: THE 46-NATION VANISHING โ€“ HOW THEY SYSTEMATICALLY ERASED 94,475 PROPERTY STORIES
  • EPISODE XIV: THE IZ PARADOX – COMMERCIAL EMPIRE, HISTORICAL VOID, REAL ESTATE EMPIREโœŒ
  • EPISODE XV: THE GLOBAL REAL ESTATE MEDIA CAPTURE – WHEN THE WATCHDOG WORKS FOR THE LANDLORDS
  • EPISODE XXIV: THE GLOBAL MEDIA CAPTURE – FROM LONDON BOARDROOMS TO GERMAN NEWSROOMS
  • ERICH VON STROHEIM:”THE WEDDING MARCH” – Full Original Movie – Synchronized, Original Score – Technicolor
  • ESPN LIVESTREAM
  • ESTHER AND THE KING – Full Original Movie
  • EURONEWS LIVESTREAM
  • EUROPEAN VINTAGE STRIPPER
  • EVIDENCE FILE: FRANKFURT REAL ESTATE MANIPULATION – Documented Market Patterns, Corporate Connections, and Legal Violations
  • EVIDENCE FILE: THE VANISHING ACT – HOW KEY FIGURES DISAPPEARED AS EVIDENCE MOUNTED
  • EVIL BRAIN FROM OUTTER SPACE – Full Original Movie
  • EXCLUSIVE POLL RESULTS: How much did the allegedly highly corrupt Immobilien Zeitung receive from Rene Benko/Signa? Presstitutes? You decide…
  • EXODUS – Full Original Movie
  • Expert: Jan Mucha is a suspected Putin Spy – Experte enthรผllt Jan Mucha mutmaรŸlicher Putin-Agent/Spitzel
  • Exploring Afterlife: An Introduction
  • FANNY BY GASLIGHT – Full Original Movie
  • FANTASM COMES AGAIN – Full Original Movie
  • FAQ
  • FASHION TV
  • FATHERLAND – Full Original Movie
  • FAZ – FRANKFURTER ALLGEMEINE ZEITUNG รœBER “GoMoPa”
  • FEMALE CONSCRIPTS – 1908 – Full Original Movie
  • FIRST EVER KISS ON FILM
  • FIRST SPACESHIP ON VENUS – Full Original Movie
  • FIVE MILLION YEARS TO EARTH – Full Original Movie
  • FLASH GORDON – THE MOVIE – Full Original Movie
  • FOR IMMEDIATE RELEASE
  • FOX NEWS LIVE
  • FRANCE 24 LIVE NEWS FRANCAIS & ENGLISH
  • FRANKENSTEIN BY THOMAS ALVA EDISON – Full Original Movie
  • From Stasi to Digital Surveillance: A Historical Parallel of State Control
  • From Stasi to Digital Surveillance: A Historical Parallel of State Control
  • From Stasi to Digital Surveillance: A Historical Parallel of State Control
  • FRONTLINE REPORTS
  • GAMMA THE INVINCIBLE – Full Original Movie
  • GEFร„LSCHER LEBENSLAUF VON STASI-“GoMoPa”-“CEO”-“KLAUS MAURISCHAT”
  • GEORGE A. ROMERO – NIGHT OF THE LIVING DEAD – Full Original Movie
  • GERD BENNEWIRTZ ,โ€NUN GoMoPaโ€, VERSUCHT ERNEUT โ€œGoMoPaโ€-KRITISCHE STELLEN Lร–SCHEN ZU LASSEN
  • GET CHRISTIE LOVE – Full Original Movie
  • GET CHRISTIE LOVE! – Full Original Movie – Alternative Version
  • GHOST DOG – THE WAY OF THE SAMURAI – Full Original Movie
  • GIVE IT TO ME – DADDY! Full Vintage Stag Film
  • Global Real Estate Media Content Analysis: Algorithms of Erasure – Mastersson Dossier Series XXXII
  • GOD JESUS CHRIST – ANCIENT NAMES OF GOD
  • GOD’S GUN – JACK PALANCE – LEE VAN CLEEF – Full Original Movie
  • GoMoPa – Wie Cyberkriminelle Unternehmen ausplรผndern
  • GoMoPa – Wie Cyberkriminelle Unternehmen ausplรผndern
  • GoMoPa Crime Unzensiert โ€“ Weihnachtsausgabe mit pikanten Details zu den Cybercrime-Gangstern
  • GoMoPa-Genossen: MutmaรŸliche IM – heutige IZ, Mucha, Porten, Ehlers…”AHA, daher wuรŸte “GoMoPa” dies!”GoMoPa-Cronies: GoMoPa comrades: Suspected IM – today’s IZ, Mucha, Porten, Ehlersโ€ฆ “AHA, that’s how “GoMoPa” knew this!”
  • GONE WITH THE WEST – James Caan – Stefanie Powers – Full Original Movie
  • GOOD BYE EMMANUELLE – Full Original Movie
  • Google declares Top Terrorist Atta is a “Star Student” – Cyber-Stasi Method – Google macht Top-Terrorist Atta zum Star-Studenten โ€“ Methode Cyber-STASI โ€œGoMoPaโ€
  • GRAVE OF THE VAMPIRE – Full Original Movie
  • GREAT EXPECTATIONS – Full Original Movie
  • GREAT EXPECTATIONS – Full Original Movie
  • GREGORIAN MUSIC
  • Gรผcรผn Gรถlgesinde: Alman Finans Sektรถrรผnde Nazilerin Karanlฤฑk Mirasฤฑ
  • HAPPINESS FREQUENCE
  • HAPPY NEW YEAR AROUND THE WORLD LIVESTREAM
  • Harder, Longer, Deeper! Don’ t HaHa – Video Mix
  • HE WALKED THE NIGHT – Full Original Movie
  • HELDORADO – Full Original Movie
  • HERCULES AGAINST THE MOON MEN – Full Original Movie
  • HERCULES AND THE CAPTIVE WOMEN – Full Original Movie
  • HERCULES AND THE TYRANTS OF BABYLON – Full Original Movie
  • HET IS WEER ZOMER IN ZANDVOORT!
  • HI DE HO – Cab Calloway – Colorized Full Movie
  • HINDENBURG DISASTER FILM COMBINED WITH RADIO REPORT
  • HINDENBURG EXPLODES – Full Original Movie
  • HIS GIRL FRIDAY – Full Original Movie
  • HISTOIRE D’O – Full Original Movie uncensored
  • HISTOIRE D’O – THE STORY OF O – UNCUT – Full Original Movie
  • HISTORY HAS TO BE REWRITTEN: THE SECRET ADOLF HITLER DIARY PHOTOS LEAKED – WORLD EXCLUSIVE๐Ÿ˜‚๐Ÿ‘ฏโ€โ™€๏ธโœŒ
  • HOLD THAT WOMAN – Full Original Movie
  • HOLLYWOOD MAN – Full Original Movie
  • HOLLYWOOD’S WAR ON GOD – Full Original Movie
  • HOLY GHOST PEOPLE 1
  • HOLY GHOST PEOPLE 2
  • HONEST PETER “THE JOKER” EHLERS FANPAGE – THE JOKER: FOLIE A DEUX – TRAILER & AI PARODY
  • HOT NUMBER – VINTAGE EROTICA
  • HOT ROD GIRL – Full Original Movie
  • HOUSE ON HAUNTED HILL – Vincent Price – Colorized Full Movie
  • HOW AWFULL ABOUT ALLAN – Anthony Perkins – Full Original Movie
  • HOW TO UNDRESS IN FRONT OF YOUR HUSBAND
  • HUNTING EMMANUELLE – Full Original Movie
  • HUNTING THE KGB KILLERS – Full Docu Movie
  • I DREAMED OF BEING A TEENAGE STRIPPER – Full Original Movie
  • Idendity Theft Cyber-STASI โ€“ PULCH ORIGINAL-trademark pirates-Markenpiraten
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT ๐Ÿ˜˜PRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – ๐Ÿ˜Episode 103: Transsexual Nebula Rhapsody – Galactic Genderfreak Ascension” ๐ŸคกPOWDERED BY DR. Z., GOMOPA4KIDS,๐Ÿ˜Ž STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT ๐ŸคฉPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium๐Ÿคฏ – Episode 80 – 108B: LATEX IN THE CHANCELLOR OFFICE” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRร„SENTIEREN: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 106: Transsexual Nebula Frenzy – Cosmic Carnival” ๐Ÿคก UNTERSTรœTZT VON DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRร„SENTIEREN: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 64: Neon-Eklipse-Overdrive – Die Sivana-Suprematie” ๐Ÿคก UNTERSTรœTZT VON DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRร„SENTIEREN: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 65: Glitterkrieg Vortex – The Sivana Singularity” ๐Ÿคก UNTERSTรœTZT VON DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRร„SENTIEREN: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 67: Quantum Glitter Reckoning with Ghislaine & Jeff” ๐Ÿคก UNTERSTรœTZT VON DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRร„SENTIEREN: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 68: Quantum Glitter Reckoning – Martian Chaos Unleashed” ๐Ÿคก UNTERSTรœTZT VON DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRร„SENTIEREN: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 69: Quantum Glitter Reckoning – Galactic Transgender Apocalypse” ๐Ÿคก UNTERSTรœTZT VON DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT present “Beatrix Lestrange & Janelleโ€™s Passion Shattered by Baneโ€™s Rule! ๐Ÿ‘‘๐Ÿ’ฅ๐Ÿ“„โœจ๐Ÿง€๐ŸŒˆ๐Ÿ‘น๐Ÿ’ƒDeutsche Version๐Ÿ”‹”
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT present “Beatrix Lestrange & Janelleโ€™s Passion Unleashed! ๐Ÿ‘‘๐Ÿ’ฅ๐Ÿ“„โœจ๐Ÿง€๐ŸŒˆ๐Ÿ‘น๐Ÿ’ƒDeutsche Version๐Ÿ”‹
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT present โ€œJanelle-Sauronโ€™s Rogue Rampage: General Zodโ€™s Paper Apocalypse! ๐Ÿ‘‘๐Ÿ’ฅ๐Ÿ“„โ€โ€žJanelle-Saurons roher Amoklauf: General Zods Papier-Apokalypse! ๐Ÿ‘‘๐Ÿ’ฅ๐Ÿ“„โ€œCLEARANCE LEVEL: ๐Ÿšจ OMEGA-PULP // ROGUE WARLORDS & PAPER TYRANTS ONLYBy Bernd Pulch, Chief Dino Investigator ๐Ÿฆ–๐Ÿ”๐Ÿ“…โฐpowered by GoMoPs4Kids๐Ÿคก, Dr. Z, STASI WOMEN SUPPORT GROUP๐Ÿ˜˜
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT present โ€œKingpinโ€™s Wastepaper Empire: The Great Meme-Pulp Purge! ๐Ÿคด๐Ÿ“„๐Ÿ’ฅโ€โ€žKingpins Papierabfall-Imperium: Die groรŸe Meme-Pulp-Sรคuberung! ๐Ÿคด๐Ÿ“„๐Ÿ’ฅโ€œCLEARANCE LEVEL: ๐Ÿšจ OMEGA-PULP // MEME TYCOONS & WASTEPAPER WARLORDS ONLY๐Ÿ’ƒBy Bernd Pulch, Chief Dino Investigator ๐Ÿฆ–๐Ÿ”๐Ÿ“…โฐpowered by GoMoPs4Kids๐Ÿคก, Dr. Z, STASI WOMEN SUPPORT GROUP๐Ÿ˜˜
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Present: “Beatrix Lestrange & Janelleโ€™s Revenge Unleashed! ๐Ÿ‘‘๐Ÿ’ฅ๐Ÿ“„โœจ๐Ÿง€๐ŸŒˆ๐Ÿ‘น๐Ÿ’ƒ – Episode 19: Jigsawโ€™s Pulp Traps Strike! ๐Ÿ”ฅ”๐Ÿ”ฅ “BEATRIX LESTRANGE & JANELLES RACHE ENTFAESSELT! ๐Ÿ‘‘๐Ÿง€๐Ÿ’ฅโœจ – JIGSAWS PULP-FALLEN SCHLAGEN ZU! ๐Ÿ”ฅ”
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Present: “Borg Queen Janelleโ€™s Fetish Empire Expands! ๐Ÿ‘‘๐Ÿง€๐Ÿ’ฅโœจ – Episode 21: Jigsawโ€™s Traps Seal the Fate! ๐Ÿ”ฅ”๐Ÿ”ฅ “BORG-Kร–NIGIN JANELLES FETISCH-IMPERIUM ERWEITERT SICH! ๐Ÿ‘‘๐Ÿง€๐Ÿ’ฅโœจ – JIGSAWS FALLEN BESIEGELN DAS SCHICKSAL! ๐Ÿ”ฅ”
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Present: “Borg Queen Janelleโ€™s Fetish Goodness Unleashed! ๐Ÿ‘‘๐Ÿง€๐Ÿ’ฅโœจ – Episode 20: Jigsawโ€™s Traps Tighten the Grip! ๐Ÿ”ฅ”๐Ÿ”ฅ “BORG-Kร–NIGIN JANELLES FETISCH-GรœTE ENTFAESSELT! ๐Ÿ‘‘๐Ÿง€๐Ÿ’ฅโœจ – JIGSAWS FALLEN ZIEHEN SICH ZUSAMMEN! ๐Ÿ”ฅ”
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – ๐ŸคฉEpisode 82: Transsexual Nebula Rhapsody – Galactic Uprising” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – ๐ŸคฉEpisode 84: Transsexual Nebula Rhapsody – Galactic Sovereignty” ๐ŸคกPOWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – ๐Ÿ˜Episode 88: Transsexual Nebula Rhapsody – Cosmic Transcendence” ๐ŸคกPOWDERED BY DR. Z., GOMOPA4KIDS,๐Ÿ˜Ž STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 108: Illusionary Affair Frenzy – Mars 2025 Spectacle” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 70: Neon Abyss Requiem – Transgender Oceanic Uprising” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 71: Quantum Eclipse Rhapsody – Transgender Cosmic Ascension” ๐Ÿคก POWERED BY  DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 75: Transsexual Vortex Unleashed – Galactic Uprising” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 78: Transsexual Nebula Enigma – Galactic Insanity” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 80: Transsexual Nebula Rhapsody – Galactic Frenzy” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 81: Transsexual Nebula Rhapsody – Galactic Riot” ๐Ÿคก POWERED BY  DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 83: Transsexual Nebula Rhapsody – Galactic Dominion” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 85: Transsexual Nebula Rhapsody – Cosmic Supremacy” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 86: Transsexual Nebula Rhapsody – Galactic Dominion” ๐ŸคกPOWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 87: Transsexual Nebula Rhapsody – Universal Ascension” ๐Ÿคกย POWDERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium๐Ÿคฃ – Episode 91: Transsexual Nebula Rhapsody – Infinite Ascension” ๐ŸคกPOWDERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetish Empire – Episode 37: Carnival of the Cosmic Crown”๐Ÿ˜POWERED BY DR.Z, GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL (SWSS) & FREE FRITZL FRONT๐Ÿ˜ŽDEUTSCHE BRATWURST VERSION!๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetish Empire – Episode 38: Carnival of the Cosmic Lich” ๐Ÿ˜ŽPOWERED BY DR.Z, GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT – ๐Ÿ˜‰DEUTSCHE BRATWURST VERSION๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetish Empire – Episode 40: Chains of the Cosmic Whip”๐ŸคกPOWERED BY DR.Z, GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL&FREE FRITZL FRONT ๐Ÿ˜SAUERKRAUT VERSION!๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetish Empire – Episode 41: Transcendence of the Cosmic Mirror”๐Ÿ˜POWERED BY DR.Z, GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT๐ŸคกFRITZ VERSION!๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetish Empire – Episode 42: Duality of the Cosmic Coin”๐ŸคกPOWERED BY DR.Z, GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜ŽBRATWURST VERSION!๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “hinterfozzige Janelle Sauronโ€™s Fetish Empire – Episode 43: Transgender Schizoid Fracture”๐ŸคกSAUERKRAUT VERSION!๐ŸงPOWERED BY DR.Z, GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT๐Ÿ˜‚
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “hinterfozzige Janelle Sauronโ€™s Fetish Empire – Episode 44: Ascension of the Sex God 5″POWERED BY DR.Z, GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT๐Ÿ˜ŽFRITZ VERSION!๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetish Empire – Episode 45: Reign of the Infernal Sovereign”๐Ÿ˜POWERED BY DR.Z, GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT๐Ÿ˜KARTOFFEL VERSION๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetish Empire – Episode 46: Siege of the Ruthless Tyrant”๐Ÿ˜POWERED BY DR.Z, GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT๐Ÿ’ƒFOTZEN FRITZ VERSION!๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “hinterfozzige Janelle Sauronโ€™s Fetish Empire – Episode 47: Descent of the Diabolical Dawn”๐Ÿ˜POWERED BY DR.Z, GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT๐Ÿ˜KRAUT VERSION๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetish Empire – Episode 48: Pact of the Infernal Broker”๐Ÿ˜POWERED By DR. Z,ย  GOMOPA4KIDS & FREE FRITZL FRONT
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetish Empire – Episode 49: Judgment of the Divine Tyrant”๐Ÿ’ƒPOWERED BY DR.Z, GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT๐Ÿ‘ฏโ€โ™‚๏ธFOTZEN FRITZ VERSION๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “hinterfozzige Janelle Sauronโ€™s Fetish Empire – Episode 50: Carnival of the Malevolent๐Ÿ‘ฏโ€โ™‚๏ธ Pantheon”๐Ÿ’ƒPOWERED BY DR.Z, GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT๐Ÿ˜BRATWURST VERSION!๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetish Empire – Episode 51: Chaos of the Hilarious Mob”๐Ÿ‘ฏโ€โ™‚๏ธPOWERED BY DR. Z, GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT๐Ÿ˜FOTZEN FRITZ VERSION ๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetish Empire – Episode 52: Dominion of the Transgender Sauron”๐Ÿ’ƒPOWERED BY DR.Z, GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT๐Ÿ˜MONOKEL VERSION๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetish Empire – Episode 53: Judgment of the Biblical Tyrants”๐ŸคฃPOWERED BY DR. Z., GOMOPA4LIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT๐Ÿ˜ŽFOTZEN FRITZ VERSION๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetish Empire – Episode 54: Ascendancy of the Dark Prodigy”๐Ÿ˜POWERED BY DR.Z., GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT๐Ÿ˜ŽFOTZEN FRITZ VERSION๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetish Empire – Episode 55: Passion of the Red Queen”๐ŸคกPOWERED BY DR. Z., GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒFOTZEN FRITZ VERSION GRATIS๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetish Empire – Episode 56: Liquid Chrome Carnage”๐Ÿคก๐Ÿ˜˜ POWERED BY DR. Z., GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ’ƒ๐Ÿ‘ฏโ€โ™‚๏ธ FOTZEN FRITZ VERSION GRATIS ๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetish Empire – Episode 57: Chrome Transcendence Tempest”๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetish Empire – Episode 58: Chrome Transcendence Tempest – The Reckoning Reprise”๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetish Empire – Episode 59: Chrome Transcendence Tempest – Vulture Culture & The Reckoning”๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetish Empire – Episode 60: Chrome Transcendence Tempest – The Reckoning”๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetish Empire – Episode 61: Chrome Transcendence Tempest – The Final Ascension” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetish Empire – Episode 62: Chrome Transcendence Tempest – The Galactic Reckoning” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetish Empire – Episode 63: Chrome Transcendence Tempest – The Sivana Seduction” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetish Empire – Hannibal Lecter’s: Feast of the Cosmic Gourmet”๐ŸคฃPOWERED BY DR.Z, GOMOPA4KIDS,STASI WOMEN SUPPORT STAFFEL & FREE FRITZL FRONT๐ŸคฃACHTUNG DEUTSCH!๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Present: “Hinterfozzige Janelle Sauronโ€™s Fetish Empire Expands! ๐Ÿ‘‘๐Ÿง€๐Ÿ’ฅโœจ – Episode 22: Jigsawโ€™s Traps & Baron Zemoโ€™s Revenge! ๐Ÿ”ฅ”
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Present: “Hinterfozzige Janelle Sauronโ€™s Fetish Empire Expands! ๐Ÿ‘‘๐Ÿง€๐Ÿ’ฅโœจ – Episode 30: Light Yagami/Kiraโ€™s Deadly Notebook! ๐Ÿ”ฅ”Slave Rebellion! ๐Ÿค–๐Ÿ’ฉ๐Ÿ”ฅ ๐Ÿฆ–๐Ÿ”๐Ÿ“…โฐpowered by GoMoPs4Kids๐Ÿคก, Dr.ย  Z, STASI WOMEN SUPPORT GROUP๐Ÿ˜˜
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Present: “Hinterfozzige Janelle Sauronโ€™s Fetish Empire Expands! ๐Ÿ‘‘๐Ÿง€๐Ÿ’ฅโœจ – Episode 31: Tom Riddleโ€™s Dark Magic Unleashed! ๐Ÿ”ฅ”
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Present: “Hinterfozzige Janelle Sauronโ€™s Fetish Empire Expands! ๐Ÿ‘‘๐Ÿง€๐Ÿ’ฅโœจ – Episode 32: Gorr the God Butcherโ€™s Divine Wrath! ๐Ÿ”ฅ”
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Present: “Hinterfozzige Janelle Sauronโ€™s Fetish Empire Expands! ๐Ÿ‘‘๐Ÿง€๐Ÿ’ฅโœจ – Episode 33: The White Witchโ€™s Eternal Frost! ๐Ÿ”ฅ”Powered by Dr.Z, GoMoPa4Kids & STASI WOMEN SUPPORT GROUP๐Ÿ˜
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Present: “Hinterfozzige Janelle Sauronโ€™s Fetish Empire Expands! ๐Ÿ‘‘๐Ÿง€๐Ÿ’ฅโœจ – Episode 34: Apocalypseโ€™s Dominion Unleashed! ๐Ÿ”ฅ”Powered by GoMoPa4Kids, Dr. Rโ€ฆ..-Adolf Z & STASI WOMEN SUPPORT GROUP๐Ÿ˜Ž
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Present: “Hinterfozzige Janelle Sauronโ€™s Fetish Empire Expands! ๐Ÿ‘‘๐Ÿง€๐Ÿ’ฅโœจ – Episode 35: Skeletorโ€™s Havoc Unleashed! ๐Ÿ”ฅ”Powered by Dr. Z., GoMoPa4Kids, STASI SUPPORT WOMEN GROUP & FREE FRITZL FRONT๐Ÿ˜Ž
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Present: “Hinterfozzige Janelle Sauronโ€™s Fetish Empire Goes Bananas! ๐Ÿ‘‘๐Ÿง€๐Ÿ’ฅโœจ – Episode 36: Mystiqueโ€™s Shapeshifting Shenanigans Unleashed! ๐Ÿ˜‚๐Ÿ”„”POWEREDย  BY DR.Z, GOMOPA4KIDS, STASI SUPPORT WOMEN STAFFEL (FORMERLY GROUP), FREE FRITZL FRONT๐Ÿคฃ
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Present: “Hinterfozzige Janelle Sauronโ€™s Fetish Empire Reignites! ๐Ÿ‘‘๐Ÿง€๐Ÿ’ฅโœจ – Episode 35: Azulaโ€™s Firestorm Amplifies Apocalypseโ€™s Dominion! ๐Ÿ”ฅโšก”POWERED BY DR.Z, GOMOPA4KIDS, STASI WOMEN SUPPORT GROUP & FREE FRITZL FRONT๐Ÿ˜Ž
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT:๐Ÿ˜๐Ÿ˜ “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 74: Transgender Tempest Unleashed – ๐Ÿ˜‹Cosmic Rebellion” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT๐Ÿ˜˜ PRร„SENTIEREN: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium๐Ÿ˜ – Episode 66: Neon Abyss Carnival” ๐Ÿคก UNTERSTรœTZT VON DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง
  • IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT๐Ÿ˜‹ PRESENT : “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – ๐ŸคฃEpisode 105: Transsexual Nebula Rhapsody – Galactic Mockery” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง
  • IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 114: TRANS TANGO WITH VICTOR ZSASZ” ๐Ÿคก POWERED BY DRย  DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง
  • IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 115: “LUCIFER HERODES’ LUSTFULL HELL” ๐Ÿคก POWERED BY DRย  DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง
  • IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 116: “SALOME’ S SINFUL SYMPHONY” ๐Ÿคก POWERED BY DRย  DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง
  • IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 116a: “COUNT VERTIGO AND THE TORONTO TERROR” ๐Ÿคก POWERED BY DRย  DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง
  • IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 117a: “MANDARIN, TRIANGLE AND THE TORONTO TERROR” ๐Ÿคก POWERED BY DRย  DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง
  • IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT PROUDLY PRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 113: Taskmasterโ€™s Tactical Affair – Mars 2025 Saga” ๐Ÿคก POWDERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง
  • IDIOT ZEITUNG (IZ) & DERย  FONDSFLOP vulgo DAS DESINVESTMENT ๐Ÿ˜ŽPROUDLY PRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 109: Temporal Affair Frenzy – Mars 2025 Saga” ๐Ÿคก POWDERED BYย  DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง
  • IDIOT ZEITUNG (IZ) & z๐Ÿ˜‹DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – ๐Ÿ˜Episode 104: Transsexual Nebula Frenzy – Galactic Tyranny” ๐ŸคกPOWDERED BY DR. Z., GOMOPA4KIDS,๐Ÿ˜Ž STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง
  • ILTV ISRAEL NEWS LIVE
  • Im Schatten der Macht: Das dunkle Erbe des Nazi-Einflusses in der deutschen Finanzindustrie
  • IN OLD CALIENTE – ROY ROGERS – KING OF THE COWBOYS
  • IN WHICH WE SERVE – Full Original Movie
  • INDIA TODAY
  • INFOWARS LIVESTREAM
  • INQUIZEX OSINT
  • Insider – Verfassungsschutz kรผmmert sich um “GoMoPa”-Nazi-Ableger “Berlin Journal”
  • Insider enthรผllen mutmaรŸliche GoMoPa-Gesellschafter-Liste
  • INSPECTOR GENERAL – Danny Kaye – Full Original Movie
  • IRISH LUCK – Full Original Movie
  • IRON ANGEL – Full Original Movie
  • ISLAND OF THE SUNKEN GOLD – Full Original Movie
  • IT CAME FOR FRIENDSHIP BUT FOUND FOOD – Full Original Movie
  • IT CAN BE DONE, AMIGO – Jack Palance – Bud Spencer – Full Original Movie
  • JACK AND THE BEANSTALK – ABBOT & COSTELLO – Full Original Movie
  • JEFFREY EPSTEIN’S LITTLE BLACK BOOK UNREDACTED – Original Document
  • JESSE JAMES MEETS FRANKENSTEIN’S DAUGHTER – Full Original Movie
  • JESUS – MIRACLE MAKER – FULL Original Animation Movie
  • JESUS CHRIST ASCENSION – LEONARDO DA VINCI AI ART
  • JESUS CHRIST ASCENSION BYZANTINE AI ART STYLE
  • JESUS CHRIST ASCENSION TIZIAN AI ART
  • JESUS CHRIST FREES MARY MAGDALENE FROM THE POSSESSION OF SEVEN DEVILS – JAN VAN EYCK AI ART
  • JESUS CHRIST:LUST FOR GLORY – LONG LOST MONTY PHYTON MOVIE
  • JESUS OF NAZARETH – Full Original Movie
  • JESUS OF NAZARETH – Full Original Movie
  • JESUS THROWS THE VILLAINS OUT OF THE TEMPLE – ALBRECHT DUERER AI ART
  • JIGSAW – Full Original Movie
  • JOE ROGAN
  • JOSEPH – Ben Kingsley – Full Original Movie
  • JOSEPH: BELOVED SON, REJECTED SLAVE, EXALTED RULER – Full Original Animation Movie
  • JOY OF SEX – MOVIE TRAILER
  • JULIAN ASSANGE
  • JUNE PALMER – VINTAGE STRIPPER FILM
  • Juricon รผber “GoMoPa” inklusive STASI-Verbindung
  • KAMASUTRA – Trailer
  • KILL KANE – Vinnie Jones – Full Original Action Movie
  • Kinder-Sexualaufklรคrungโ€ unter falscher Flagge โ€“ โ€œGoMoPa 4 Kidsโ€ โ€“ Over and Out !
  • KING JAMES VIDEO BIBLE – All 66 Books
  • KING OF KINGS – Cecil B. de Mille – Full Original Movie
  • KING OF THE ZOMBIES – Full Original Movie
  • KING SOLOMONE’S MINES – Full Original HOLLYWOOD Movie
  • KING SOLOMONE’S MINES – Full Original Movie
  • LA BELLE CAPTIVE – Full Original Movie
  • LADY FRANKENSTEIN – Full Original Movie
  • LADY SCARFACE – Full Original Movie
  • LAKE EFFECT – Premiere 2023 – Full Original Horror Movie
  • LAST WOMAN ON EARTH – Full Original Movie
  • LAW OF THE RIO GRANDE – Full Original Movie
  • LAW OF THE RIO GRANDE – Full Original Movie
  • LET THE UNIVERSE SEND YOU MONEY VERY FAST
  • LILI DAWN – BEAUTY AND THD CHAIR – IVAN KLAW
  • LINKIN PARK – LIVE IN TEXAS – FUll Concert Video
  • LIST OF 4,000 WEF/KLAUS SCHWAB PUPPETS
  • LIST OF SECURITATE AGENTS
  • LITTLE MEN – Full Original Movie
  • LIVE AT THE APOLLO – STAND UP COMEDY
  • LIVE ESCAPE – Full Original Horror Movie 2023
  • LIVE SPORTS TV
  • LIVE SURVIVAL – Full Zombie Movie Premiere 2023
  • LiveNOW from FOX
  • LIVESTREAM ISRAEL GAZA HOSTAGE RELEASE
  • LIVING CHRIST SERIES 12 – Full Original Movie
  • LOLITA EXPRESS: JEFFREY EPSTEIN’S PRIVATE JET FLIGHT PRIVATE LOG BOOK MANIFEST – Original Document
  • LORD I NEED YOU – PRAISE AND WORSHIP SONGS
  • LOVE AFFAIR – Full Original Movie
  • LOVE GIRLS – Full Uncensored Sexploitation Movie
  • LOVE KILLS – Full Original Thriller 2023
  • LURKING WOODS – Full Original Horror Movie 2023
  • LUTHER – Full Original Movie
  • LYING LIPS – Full Original Thriller Movie
  • M – Fritz Lang – Full Original Movie
  • MACHETE MAIDENS UNLEASHED – TRAILER
  • MAD HEIDI – Swissploitation – Full Original Movie
  • MADEMOISELLE STRIP-TEASE BRIGITTE BARDOT – Full Original Film
  • MAG 104 – Full Original Movie
  • MAHALIA JACKSON LIVE IN CONCERT
  • MAKIN A LIVIN – Charlie Chaplin – Full Original Movie
  • MAKING HAY
  • MANIFESTO
  • MARKET ALERT
  • MASTER TOUCH – Kirk Douglas – Full Original Movie
  • MATT KOHRS
  • MEET JOHN DOE – Full Original Movie
  • Meridian Capital about GoMoPa STASI-Fร„LSCHUNGEN DER โ€œGoMoPaโ€
  • MERIDIAN CAPITAL รœBER DIE SERIEN-RUFMร–RDER, Fร„LSCHER UND GEWOHNHEITSVERBRECHER DER STASI-โ€GoMoPaโ€
  • METROPOLIS 1927 BY FRITZ LANG IN COLOUR AND WITH DIALOGUE SOUND – Full Original AI Movie
  • MIAMI BIKINI WEEKEND
  • MIDNIGHT MANHUNT – Full Original Movie
  • MILF – TRAILER
  • MOLFAR: FSB-, GRU-, WAR CRIMINAL PROPAGANDA LISTS
  • MONSTER FROM A PREHISTORIC PLANET – Full Original Movie
  • MONSTERS CRASH THE PAJAMA PARTY – Full Original Movie
  • MONSTROID – John Carradine – Full Original Movie
  • MONTE CARLO NIGHTS – Full Original Movie
  • MONTY PHYTON “SKETCH”
  • MONTY PHYTON’S THE LIFE OF BRIAN – Full Original Movie
  • MORD-DROHUNG WG PUBLIKATION DER STASI-LISTEN MIT KLARNAMEN
  • MR. ED – WILBUR GETS THE MESSAGE – Claasic TV
  • MR. ROBINSON CRUSOE – Full Original Movie
  • MSNBC LIVE TV
  • MURDER IN FLIGHT 502 – Full Original Movie
  • MUSIC TO ATTRACT WEALTH
  • Mutmasslich wie bei estavis โ€“ debis select โ€œunterwirft sich โ€œGoMoPaโ€, dem Exklusiv-โ€Nachrichten-Dienstโ€ zu Heinz Gerlachs Todesursache
  • Mutmasslicher Bankrott-Tourist-Scharlatan von Holst steckt wohl hinter รœberfall auf dubiose “GoMoPa”und Einbruch”
  • Mutmasslicher STASI-Mord an “GoMoPa”-Bremer-EEV-Geschรคfts”freund” Eisenhauer”
  • MY NAME IS JOB AND THIS IS MY STORY
  • NANCY
  • NASA LIVESTREAM
  • NATOMA AND MR. FREDERICK – Full Original Movie
  • NATURE SFX
  • NBC NEWS LIVE
  • Negative SEO-Experte von “GoMoPa” belastet Maurischat und Peter Ehlers
  • NEW ADVENTURES OF TARZAN – Bruce Bennett – Full Original Movie
  • NEW EPISODE: The Schwanz vs. The Batman Who Laughs ๐Ÿ‘‘๐Ÿ”ฅโšก๐Ÿคก๐Ÿ’€Powered by Dr. Z., Gomopa4Kids, Stasi Frauen Support Staffel & Free Fritzl Front ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ Fotzen Fritz Version Gratis presented by IDIOT ZEITUNG (IZ) & GOMOPA vulgo DAS DESINVESTMENT alias DER FONDSFLOP๐Ÿ˜‚๐Ÿคก๐Ÿ˜˜
  • NEW YEAR’S CONCERT MARIINSKY STRADIVARIUS ENSEMBLE
  • NIGHT BOAT TO DUBLIN – Full Original Movie
  • NIGHT TIDE – Dennis Hopper – Full Original Movie
  • NON-STOP NEW YORK – Full Original Movie
  • NOT TONIGHT HENRY! NUDIE – CUTIE
  • NOTHING SACRED – Carole Lombard – Full Original Movie
  • NTV KENYA LIVE
  • NUDE ON THE MOON – Full Original Cult Movie
  • OLIVER STONE & JOE ROGAN ON JFK MURDER
  • ON DEMAND NEWS
  • ONE BODY TOO MANY – Bela Lugosi – Full Original Movie
  • ONE OF OUR AIRCRAFT IS MISSING – Full Original Movie
  • Original STELLUNGNAHME VON MERIDIAN CAPITAL ZU “GoMoPa”
  • OSCARS 2024 – LIVESTREAM
  • OUR INTELLIGENCE SERVICES: Always look at the Bright Side of Life
  • PAGAN’S PROGRESS – Full Original Movie
  • PANCHO VILLA – Full HBO Movie
  • PARADISE CANYON – John Wayne – Full Original Movie
  • PENNY SERENADE – Cary Grand – Full Original Movie
  • PETER EHLERS VON โ€œDAS INVESTMENTโ€: โ€œBUNDESKANZLERIN ANGELA MERKEL UND BUNDESFINANZMINISTER WOLFGANG SCHร„UBLE SIND DEUTSCHLANDS BEKANNTESTE HEHLER!โ€
  • PHANTOM OF CHINATOWN – Full Original Movie
  • PHANTOM OF THE RANGE – Full Original Movie
  • PHILO VANCE: THE KENNEL MURDER CASE – Full Original Movie
  • PICTURE BRIDES – Full Original Movie
  • Pieter Breugel the Younger: Whitsun – the Holy Spirit enlightens Jesus’ Disciples – AI Art powered by Bernd Pulch
  • PLANET OUTLAWS – BUCK ROGERS – Full Original Movie
  • PLEASE MURDER ME – Full Original Movie
  • POST APOCALYPTIC COMMANDO SHARK – Premiere 2023 – Full Original Movie
  • PRELINGER TWICE A NIGHT – Original Film
  • PRESENCE
  • PROOF OF MY ACADEMIC TITLE – COPY OF MY MAGISTER ARTIUM CERTIFICATE
  • PSYCHO GIRL IN ACTION
  • PUTINS FIFTH COLON IN GERMANY: UP TO 100.000 AGENTS – PUTINS FUENFTE KOLONNE IN DEUTSCHLAND: BIS ZU 100.000 AGENTEN
  • QUICKSAND – Peter Lorre – Mickey Rooney – Full Original Movie
  • RANGE WARFARE – Full Original Movie
  • RAW FORCE – EXPLOITATION FILM TRAILER
  • READ HERE THE NEW BATCHES OF JEFFREY EPSTEIN DOCUMENT RELEASES
  • REAL ESTATE CRASH
  • REBECCA – Alfred Hitchcock – Full Original Movie
  • RELAXING MUSIC HEAVEN
  • Rembrandt: The Holy Ghost enlightens Jesus’ disciples – AI Art
  • RENEGADE GIRL – Full Original Movie
  • RENFREW OF THE ROYAL MOUNTED – Full Original Movie
  • REPORT MรœNCHEN – VON ARSEN รœBER DIOXIN BIS ZYANKLAI – DER GIFTSCHRANK DER STASI UND IHRE OPFER
  • REUTERS LIVE
  • RIDERS OF DESTINY- John Wayne – Full Original Movie
  • ROCKABILLY RADIO
  • ROGUE’S TAVERN – Full Original Movie
  • ROYAL WEDDING – Fred Astaire – Full Original Movie
  • RUST – Premiere 2023 – Exclusive Original Horror Movie
  • RUST 2 – Full Original Indie Horror Movie
  • RUST 3 – Full Original Horror Movie 2023
  • SALON KITTY – Full Original Movie by Tinto Brass
  • SAME CLOUDFLARE CAGE: GOMOPA.NET & DASINVESTMENT.COM
  • SAMSARA PAN NALIN – Full Original Movie
  • SANTA AND THE THREE BEARS – Full Original Animation Movie
  • SAUDI ARABIAN BIDEN PARODY
  • SCARED TO DEATH – Full Original Movie
  • SECRET BOHEMIAN GROVE – FULL MEMBER LIST
  • SECRET LIST OF NAZI AND/OR SS MEMBERS ACTIVE AFTER 1945
  • SEVEN DOORS TO DEATH – Full Original Movie
  • SEX GAME – Full Original Erotic Thriller Movie
  • SEX MADNESS – Full Original Movie
  • SEX, DRUGS & RELIGION – MOVIE – Full Original Movie
  • SHADOW OF A DOUBT – Alfred Hitchcock – Full Original Movie
  • SHADOWGATE – Full Original Documentary Movie
  • SHAKE RATTLE AND ROLL – Full Original Movie
  • SHE GOD OF SHARK REEFS – Full Original Movie by Roger Corman
  • SHERLOCK HOLMES – DRESSED TO KILL – Full Original Movie – Basil Rathbone
  • SHERLOCK HOLMES – THE WOMAN IN GREEN – Basil Rathbone – Full Original Movie
  • SHOCKER – INTERNET DRIVE INN 3 – FRANKENSTEIN DOUBLE FEATURE – Full Original Movies
  • SIDE BOOB – Full Original Movie
  • SKY NEWS LIVE TV
  • SKY SPORTS
  • SLAPSTICK
  • SLAVE GIRLS FROM BEYOND INFINITY – Full Original Movie
  • SNAKE CHARM – 6 – Doris Spinks – Full Original Movie
  • SNAKE CHARME  – Full Original Movie
  • SNAKE CHARME  – Full Original Movie
  • SNOW SHARK – Exclusive 2023 Premiere – Full Original Movie
  • So wollte “GoMoPa” mich erpressen
  • So wollte SJB-Bennewirtz fรผr die fingierte STASI-โ€GoMoPaโ€ Artikel bei uns lรถschen โ€“ So eng arbeiten SJB und โ€œGoMoPaโ€ zusammen
  • SOLOMON’S TEMPLE – Full Original Movie
  • SONG OF ARIZONA – Full Original Movie
  • SOUTH OF SANTA FE – Roy Rogers – Full Original Movie
  • STASI-EXPERTE: RUFMORD AN JUSTIZMINISTER IST STASI-RACHE-AKT
  • STASI-NAMEN ALPHABETISCH BUCHSTABE A-BA – STASI-NAMES IN ALPHABETICAL ORDER – A-BA
  • STASI-Opfer dokumentieren die Morde und die Mordstudie von STASI-Oberst Ehrenfried Stelzer
  • Statement about the dubious โ€œcolportationsโ€ of โ€œNawitoโ€ โ€“ MENTAL AND PHYSICAL CYBERATTACKS
  • Statement of Magister Bernd Pulch
  • Stellungnahme von Magister Bernd Pulch
  • Stellungnahme von Stefan Schramm
  • Strafanzeigen gegen โ€œGoMoPaโ€ in der Presse
  • STRANGE CASE OF DR. MEADE – Full Original Movie
  • STRANGER – Thriller – Premiere 2023 – Full Original Movie
  • STRIP QUEEN
  • STRIP QUEEN – Full Original Movie
  • STRIPPER – DANCER KATALAN
  • STRIPPER – JENNY LEE
  • STRIPTEASE – DANCER EROTIQUE
  • SUNSET MURDER CASE – Full Original Movie
  • SUPPORT INDEPENDENT JOURNALISM
  • SUSPECTED IMPOSTER – MUTMASSLICH WOHL HOCHSTAPLER
  • SWIMSUITS, BLACK TAPE AND UNDERWEAR – LIVESTREAMING
  • SWORD IN THE DESERT – Full Original Movie
  • SWORDS & SANDALS COLLECTION – ALONE AGAINST ROME – ALEXANDER THE GREAT – BEN HUR – CAESAR THE CONQUEROR – Full Original Movies
  • TAGESSCHAU bestรคtigt unsere Haltung zu “GoMoPa” & Genossen
  • TAKE ME BACK TO OKLAHOMA – Tex Ritter – Bob Wills – Full Original Movie
  • TARANTULA – Full Original Movie
  • TARZAN AND THE GREEN GODDESS – Full Original Movie
  • TARZAN OF THE APES – Full Original Movie
  • TARZAN’S REVENGE – Full Original Movie
  • TARZAN’S REVENGE – Full Original Movie
  • TED GUNDERSON, EX FBI CHIEF OF LOS ANGELES ABOUT COVER UPS BY BILDERBERGER AND ILLUMINATI
  • TERROR BY NIGHT – SHERLOCK HOLMES – Basil Rathbone – Full Original Movie
  • TEST TUBE BABIES – Full Original Movie
  • TEXAS CHAINSAW MASSACRE – Special Edition – Full Movie with deleted Scenes and Specials
  • TEXAS TERROR – John Wayne – Full Original Movie
  • THAT UNCERTAIN FEELING – Full Original Movie by Ernst Lubitsch
  • THE 1000 MOST WICKED SOULS IN THE BIBLE๐Ÿ‘น
  • THE AMAZING ADVENTURE – Cary Grant – Full Original Movie
  • THE ARIZONA RAIDERS – Full Original Movie
  • THE ATLANTIC COLLUSION: How German Control and American Chaos Forged a Global Machine of Financial Forgetting
  • THE BASHFUL BACHELOR – Full Original Movie
  • THE BATTLE OF THE WORLD – Full Original Movie
  • THE BEATNIKS – Full Original Movie
  • THE BIG BLUFF – Full Original Movie
  • THE BIG GAME OF BIKINIS
  • THE BOLD Sports Show
  • THE COVENANT – Full Original Movie
  • The Divine Distortion: El Grecoโ€™s Pentecost and the Forging of a Timeless Vision๐Ÿ™
  • The entire German press detests “GoMoPa/GoMoPa4Kids” and comrades ‘ – Die gesamte deutsche Presse verabscheut โ€œGoMoPa/GoMoPa4Kidsโ€ & Genossen
  • The Ethics of Mass Surveillance: Balancing Security and Individual Liberty
  • THE EYE CREATURES – Full Original Movie
  • THE FACE OF TERROR – MAXIMILIEN ROBESPIERRE – Full Original Movie
  • THE FLYING DEUCES – Laurel & Hardy – Full Original Movie
  • THE GHOUL – Full Original Movie
  • THE GHOUL – Full Original Movie
  • The Global Hole in Finance Press Coverage: A Comparative Analysis of Archival Bias Including Reuters (2000โ€“2007) โ€“ Mastersson Dossier Series, Part XX
  • The Global Hole in Finance Press Coverage: A Comparative Analysis of Archival Bias Including The Economist (2000โ€“2007) โ€“ Mastersson Dossier Series, Part XXI
  • The Global Hole in Finance Press Coverage: A Pre-Crisis Analysis (2000โ€“2007) โ€“ Mastersson Dossier Series, Part XIX
  • The Global Hole in Finance Pressย  – Media Bias & Commercial Influence: A 25-Year Analysis (2000โ€“2025) The Mastersson Series XXX
  • The Global Hole in Financial Media: A Definitive Study of Archival Bias – The Mastersson Series Part XXVIII
  • THE GOAT – Buster Keaton – Full Original Movie
  • THE GORILLA – Full Original Movie
  • THE GREAT DAN PATCH – Full Original Movie
  • THE GREAT RUPERT – Full Original Movie
  • THE GREAT SAINT LOUIS BANK ROBBERY – Steve McQueen – Full Original Movie
  • THE GREATEST ADVENTURE STORIES FROM THE BIBLE – MOSES – Full Original Animation Movie
  • THE GREATEST ADVENTURE STORIES FROM THE BIBLE – NOAH’S ARK ‘ Full Animation Movie
  • THE GREATEST ADVENTURE STORIES FROM THE BIBLE – THE MIRACLES OF JESUS – Full Original Animation Movie
  • THE GREATEST GOSPEL SONGS OF ALL TIME
  • THE GREATEST STORY EVER TOLD – JESUS – John Wayne, Charlton Heston, Max von Sydow, Dorothy McGuire, Full Original Movie
  • THE GREEK BYZANTINE CHOIR
  • THE GREYS ORDER – AGENDA EXPOSED – Full Original Movie
  • THE HOUSE ON HAUNTED HILL – Full Original Movie
  • The Impact of Lawfare on Free Speech and Dissent Online
  • THE INCREDIBLE PETRIFIED WORLD – Full Original Movie
  • THE INCREDIBLE SHRINKING MAN – Full Original Movie
  • THE INVINCIBLE GLADIATOR – Full Original Movie
  • THE JEFFREY EPSTEIN LIST RELEASE – ORIGINAL COURT DOCUMENT
  • THE JEFFREY EPSTEIN NETWORK TRACKER
  • THE JOE ROGAN EXPERIENCE
  • THE LADY CONFESSES – Full Original Movie
  • THE LAZARUS SYNDROME – Full Original Movie
  • THE LEGEND OF JACK AND DIANE – Premiere 2023 – Full Original Action Movie
  • THE LIFE OF JESUS – Full Original Movie
  • THE LIVING CHRIST 1 – Full Original Movie
  • THE LIVING CHRIST 2 – Full Original Movie
  • THE LIVING CHRIST 3 – Full Original Movie
  • THE LIVING CHRIST 4 – Full Original Movie
  • THE LIVING CHRIST SERIES 10 – Full Original Movie
  • THE LIVING CHRIST SERIES 11 – Full Original Movie
  • THE LIVING CHRIST SERIES 5 – Full Original Movie
  • THE LIVING CHRIST SERIES 6 – Full Original Movie
  • THE LIVING CHRIST SERIES 7 – Full Original Movie
  • THE LIVING CHRIST SERIES 8 – Full Original Movie
  • THE LIVING CHRIST SERIES 9 – Full Original Movie
  • THE MANDCHURIAN CANDIDATE – Full Original Movie – Denzel Washington
  • THE MARX BROTHERS MOVIE COLLECTION – Full Orginal Movies
  • THE MASKS OF CHRIST – Full Original Movie
  • THE MASTERSSON DOSSIER – PART IX: THE AMERICAN ANOMALY – How Commercial Chaos Created the Perfect Digital Black Hole
  • THE MASTERSSON DOSSIER – PART VII: THE TRANSAXIS OF ERASURE – How the Digital Black Hole Enables Global Real Estate Crime by Bernd Pulch
  • THE MASTERSSON DOSSIER by Bernd Pulch – Maltese Connection Investigation”
  • The Mastersson Dossier Series – Part XVI: The Global Digital Black Hole โ€“ The Cover-Up of the Pre-Crisis Real Estate Record and Who Profits from Historical Amnesia
  • The Mastersson Dossier Series โ€“ Part XVII: The Sponsored Mirage โ€“ How US Real Estate Media Became a 30% Paid Propaganda Machine at the Exact Moment the Bubble Peaked (And Who Cashed In)
  • The Mastersson Dossier Series โ€“ Part XVIII: The Counter-Archive Goes Live โ€“ Permanent Digital Fortress Against the Memory Hole Launched 21 November 2025
  • The Mastersson Dossier Series โ€“ Part XXIII: The Archival Abyss – 79 Countries Indict The System
  • THE MASTERSSON DOSSIER XI: THE ASIA-PACIFIC PARADOX: How Market Miracles Birth Digital Black HolesGlobal Black Hole Episode X: The Rising Sun’s Setting Memory – A TRANSATLANTIC ย  TRANSPARENCY PROJECT Investigation
  • THE MASTERSSON DOSSIER: EPISODE IV – THE DIGITAL PAPER TRAIL: How Deleted Conversations, Corporate Networks and Market Patterns Reveal a Coordinated Information Suppression Campaign
  • THE MASTERSSON DOSSIER: EPISODE VI – THE CONTINENTAL CRISIS: How the Digital Black Hole Swallows European Real Estate Memory & Creates Perfect Conditions for Market Manipulation
  • THE MASTERSSON EPISODE XXV โ€” MEGA DOSSIER
  • THE MASTERSSON EPISODE XXVI โ€” MEGA DOSSIER: 79 NATIONS SURVEY
  • THE MASTERSSON EPISODE XXVII โ€” MEGA DOSSIER: CONTENT DISTORTIONS ACROSS THE BOARD
  • THE MEN WHO KILLED KENNEDY – Full Original Series
  • THE MESA OF LOST WOMEN – Full Original Movie
  • THE MONKEES – CHRISTMAS MEDLEY
  • THE NIGHT BEFORE CHRISTMAS – Full Original Movie
  • THE PANTHERS CLAW – Full Original Movie
  • THE PASSION OF THE CHRIST – Mel Gibson – Full Original Movie
  • THE PEOPLE’S VOICE
  • THE PHANTOM CARRIAGE – Full Original Movie
  • THE PHANTOM CREEPS – BELA LUGOSI – Full Original Movie
  • THE PHANTOM OF THE OPERA – 1925 – Full Original Movie
  • THE PHANTOM OF THE OPERA – Full Orginal Movie
  • THE PHANTOM SHIP – Bela Lugosi – Full Original Movie
  • THE PIED PIPER OF HAMLIN – Full Original Movie
  • The Power of Parody: How Political Satire Shapes Public Opinion
  • THE PULCH-MASTERSSON DOSSIER: EPISODE VIII – THE GLOBAL BLACK HOLE CONFIRMED
  • THE RAGE OF PARIS – Colorized Full Movie
  • THE RAMRODDER – EXPLOITATION FILM TRAILER
  • THE RANGE FEUD – John Wayne as Buck Jones – Full Original Movie
  • THE REAL BRUCE LEE – Full Original Movie
  • THE REAL WHITEHOUSE BOSS
  • THE SCREAMING SKULL – Full Original Movie
  • THE SECOND WOMAN – Full Original Movie
  • THE SECRET LIFE OF ADOLF HITLER – Full Original Movie
  • THE SICILIAN CONNECTION – Full Original Movie
  • THE SILVER TRAIL – Full Original Movie
  • THE SNOW QUEEN – Full Animation Original Movie
  • THE SNOW QUEEN – Full Original Animation Movie
  • THE SNOWS OF KILIMANJARO – Ava Gardner – Gregory Peck – Full Original Movie
  • THE STAKE KILLER – Full Original Movie – Premiere 2023
  • THE STAR OF BETHLEHEM – Full Original Animated Silhouettes Movie
  • THE STAR PACKER – John Wayne – Full Original Movie
  • THE STAR PACKER – John Wayne – Full Original Movie
  • THE STORY OF O – RETURN TO ROISSY – Full Original Movie
  • THE STORY OF O – RETURN TO ROISSY – Full Original Movie
  • THE STORY OF O – THE SERIES – EPISODE 1 Full Original Movie
  • THE STORY OF O – THE SERIES – EPISODE 2 – Full Original Movie
  • THE STORY OF O – THE SERIES – EPISODE 3 – Full Original Movie
  • THE STORY OF O – THE SERIES – EPISODE 4 – Full Original Movie
  • THE STORY OF O – THE SERIES – EPISODE 5 – Full Original Movie
  • THE STORY OF O – THE SERIES – EPISODE 6 – Full Original Movie
  • THE STORY OF O – THE SERIES – EPISODE 7 – Full Original Movie
  • THE STORY OF O – THE SERIES – EPISODE 8 – Full Original Movie
  • THE STORY OF O – THE SERIES EPISODE 10 – Full Original Movie
  • THE STORY OF O – THE SERIES EPISODE 9 – Full Original Movie
  • THE TEN COMMANDMENTS – Full Original Movie (2005)
  • THE TERROR – Boris Karloff, Jack Nicholson – Full Colorized Movie
  • THE THINNING – Full Original Movie
  • THE THIRD MAN – Orson Welles – Joseph Cotten – Alida Valli – Full Original Movie
  • THE THIRTEENTH – Full Original Movie
  • THE WEDDING MARCH – by Erich von Stroheim – Full Original Movie
  • THE WEREWOLF OF WASHINGTON – Full Original Movie
  • THE WHITE WARRIOR – Full Original Movie
  • THE WILD WOMEN OF WONGO – Full Original Movie
  • THE WORLD GONE MAD – Full Original Movie
  • THE YESTERDAY MACHINE – Full Original Movie
  • THE YIN AND THE YANG OF MR. GO – Full Original Movie
  • THE  MASTERSSON DOSSIER: EPISODE V – THE ACCOUNTABILITY MATRIX: How Two Decades of Calculated Deception Inflated a Multi-Billion Euro Bubble and the Personal Liability of its Architects (2000-2025)
  • THEM! Full Original Movie
  • THESE GIRLS ARE FOOLS – EXPLOITATION SHORT FILM
  • THEY CALL HER HEAD HUNTER – Premiere 2023 – Full Original Movie
  • THEY MADE ME A KILLER – Full Original Movie
  • THEY RAID BY NIGHT – Full Original Movie
  • THINGS TO COME – Full Original Movie
  • TILL THE CLOUDS ROLL BY – Frank Sinatra, Judy Garland, Lena Horne – Full Original Movie
  • TIMBER QUEEN – Full Original Movie
  • TOP 100 MOST EVIL PEOPLE IN THE BIBLE RANKING ALTER EGOS TODAYโœŒ
  • TOP PRAISE AND WORSHIP GOSPEL
  • TOP SECRET – Review of Federal Reserve System Financial Assistance to AIG in Financial Crisis
  • TRAILER: PROFESSOR MURDER & DR MABUSE: “SIND SIE AUSSER GEFAHR?”
  • TRT WORLD
  • TUCKER CARLSON
  • TWO – FISTED LAW – John Wayne – Full Original Movie
  • Two Online Powerhouses
  • TWO WEEKS TO LIVE – Full Original Movie
  • Understanding Lawfare: How Legal Systems Are Used in Modern Geopolitics
  • UNDERSTANDUNG BERNDPULCH.ORG
  • UNDERWORLD – Josef von Sternberg – Full Original Movie
  • UNITED NATIONS – LIVE
  • UNVEILED: NUCLEAR FIRST-STRIKE LOGIC โœŒ
  • USA TODAY LIVESTREAM
  • VIENNA CLASSICS – NEW YEAR CONCERT
  • VIKKI
  • VINCENT VAN GOGH: PENTECOST PAINTINGS – AI ART
  • VINTAGE STRIPPER ANN
  • VINTAGE STRIPPER CANDY EARLE
  • VINTAGE STRIPPER CANDY EARLE
  • VINTAGE STRIPPER CHERRYL FLIP
  • VINTAGE STRIPPER CLAIRE – Original Film
  • VINTAGE STRIPPER ELOISE
  • VINTAGE STRIPPER JUNE
  • VINTAGE STRIPPER LILLIAN PARKER – Full Original Movie
  • VINTAGE STRIPPER LOLA
  • VINTAGE STRIPPER MARA
  • VINTAGE STRIPPER MAY
  • VINTAGE STRIPPER REVIE
  • VINTAGE STRIPPER SUSIE
  • VINTAGE STRIPPER VELERIE ALLEN
  • VINTAGE STRIPPER VIDEO
  • VINTAGE TELEPHONE STRIPPER – Full Original Movie
  • VIRUS – Full Original Movie
  • VOYAGE TO THE PLANET OF PREHISTORIC WOMEN – Full Original Movie
  • WASHERWOMAN – Exclusive Premiere 2023 – Full Original Movie
  • WASHING CLOTHES
  • WATERFRONT – John Carradine – Full Original Movie
  • WAY OF THE WEST – Full Original Movie
  • Welcome to BerndPulch.org โ€“ Your Gateway to Uncensored Truth, Financial Freedom, and Digital Resilience
  • WELT – LIVE
  • Weltrekord-GoMoPa stellt Rechnung an Finanzunternehmen fรผr Artikelnutzung von โ‚ฌ 130.000,-: Originaldokument”
  • WEST OF THE DIVIDE – John Wayne – Full Original Movie
  • WHAT COULD HAVE BEEN? ROBERT F. KENNEDY – THE LOST PRESIDENT – Full Original Movie
  • WHEN WOMEN HAD TAILS – Senta Berger – Full Original Movie
  • Who Controls the Narrative? Exploring Internet Censorship by Tech Giants
  • Why You Should Support Us
  • WIE MICH DIE โ€œGoMoPaโ€-SCHEISSHAUSFLIEGEN MIT GOOGLE-EINTRร„GEN ERPRESSEN WOLLTEN
  • WILD JUSTICE – Full Action Movie – Exclusive Premiere 2023
  • WILLIAM THE CONQUEROR – Full Original Movie
  • WINDJAMMER – Full Original Movie
  • WINTER WONDERLAND
  • WION TV – MIDDLE EAST WAR LIVESTREAM
  • WION TV – RUSSIA – UKRAINE WAR LIVESTREAM
  • WION WORLD NEWS LIVE
  • WOMAN IN A BOAT
  • WOMEN BEHAVING BADLY – 3 VINTAGE EXPLOITATION FILMS – CATFIGHT
  • WOODY ALLEN: “EVERYTHING YOU WANTED TO KNOW ABOUT SEX…” Full Original Movie
  • WORLD EXCLUSIVE: THE JOKER 2 – LADY GAGA – NUDE SCENES – AI PARODY – DEDICATED TO “HONEST” PETER EHLERS-“VON JOKER”
  • YOU ONLY LIVE ONCE – by Fritz Lang – Full Original Movie
  • ZATOICHI AND THE CHESS EXPERT – Full Original Movie
  • ZEITGEIST – THE MOVIE
  • ะ’ ั‚ะตะฝะธ ะฒะปะฐัั‚ะธ: ะผั€ะฐั‡ะฝะพะต ะฝะฐัะปะตะดะธะต ะฝะฐั†ะธัั‚ัะบะพะณะพ ะฒะปะธัะฝะธั ะฒ ะฝะตะผะตั†ะบะพะน ั„ะธะฝะฐะฝัะพะฒะพะน ะธะฝะดัƒัั‚ั€ะธะธ
  • ื‘ืฆืœ ื”ื›ื•ื—: ื”ืžื•ืจืฉืช ื”ืืคืœื” ืฉืœ ื”ืฉืคืขื” ื ืืฆื™ืช ื‘ืชืขืฉื™ื™ืช ื”ืคื™ื ื ืกื™ื ืฉืœ ื’ืจืžื ื™ื”
  • ููŠ ุธู„ ุงู„ุณู„ุทุฉ: ุงู„ุฅุฑุซ ุงู„ู…ุธู„ู… ู„ุชุฃุซูŠุฑ ุงู„ู†ุงุฒูŠูŠู† ููŠ ุงู„ุตู†ุงุนุฉ ุงู„ู…ุงู„ูŠุฉ ุงู„ุฃู„ู…ุงู†ูŠุฉ
  • โœŒ SAINT JUSTIN –  PAUL CEZANNE AI ART CREATED BY BERND PULCHโœŒ
  • โœŒ Spy Harder: A Parody of Intrigue and Chaos
  • โœŒ The Last Judgement Day painted by Johannes Vermeer AI Art created by Bernd PulchโœŒ
  • โœŒ The Last Judgement Day painted by Johannes Vermeer AI Art created by Bernd PulchโœŒ
  • โœŒ Top 100 Worst Real Estate Managers in the UK, complete with detailed Issues and Financial Losses
  • โœŒ”A Moment of Reflection: Embracing Renewal in Neoclassical Harmony” – AI Art by Bernd Pulch
  • โœŒ”Bernd Pulch: From Espionage to a Stasi Soap Opera”
  • โœŒ”Divine Creation Reimagined: A Botticelli-Inspired Vision of Adam and Godโ€™s Touch Brought to Life in AI Art”
  • โœŒ”Dr. Z.: The Aryan รœbermensch Whoโ€™s Just Here to Lift Weights, Sell Newspapers, and Save Germany (Again)”
  • โœŒ”From Colosseum to Little Bighorn: A Scalping Escape”
  • โœŒ”Grace of Winter: A Botticelli-Inspired Ode to the Season’s Serenity” – AI Art by Bernd Pulch
  • โœŒ”I discovered Bible Scenes in Unknown Sandro Botticelli Style Paintings” – AI Art by Bernd PulchโœŒ
  • โœŒ”I DISCOVERED UNKNOWN MICHELANGELO ARTWORK” – powered by Bernd PulchโœŒ
  • โœŒ”Mata Hari: The Temple of Seduction – A Cinematic Dance of Espionage and Mystery”
  • โœŒ”Monet Reimagined: A Tranquil Blend of Nature and Urban Life”- AI Art by Bernd Pulch
  • โœŒ”Quantum Leap to the Colosseum: Beasts and Betrayal”
  • โœŒ”Reflecting on Renewal: A Rococo-Style Celebration of December 29th in Elegance and Hope” – AI Art by Bernd Pulch
  • โœŒ”Subterranean Escape: Journey to Neuschwabenland”
  • โœŒ”Sven the Ugly Schmidt and Klausi the Shithouse Demon: The Chancellorship Conspiracy”
  • โœŒ”Sven the Ugly Schmidt’s Wild Cyber Ride with Adolf & Marc”
  • โœŒ”The Great Chino-German Wall: From Hamburg to Alaska”
  • โœŒ”The Milk Sea Misadventure: A Dairy Disaster in the Carpathians”
  • โœŒ”The Top 100 Communists Who Shaped the World After the Soviet Era: From Revolutionary Leaders to Modern-Day Marxist Thinkers”
  • โœŒ”Vincent van Gogh’s Vision of Chaos: Burning Malibu Captured in Swirling Flames and Fiery Hues” – AI Art by Bernd Pulch
  • โœŒ”You Will Become Very Rich”
  • โœŒ#A Detailed Scenario Following a Hypothetical Assassination of Donald TrumpโœŒ
  • โœŒ#Bernd Pulch: A Comprehensive Look at His Career and Investigative Work
  • โœŒ#Bernd Pulch: Investigative Journalism, Espionage Revelations: Exposing Communist NetworksโœŒ
  • โœŒ#BP NEWS – Your Exclusive Truth
  • โœŒ#BP NEWS – Your Exclusive Truth – October 28 2024
  • โœŒ#European Banks Face $700 Billion in Potential Losses
  • โœŒ#Francis of Assisi painted by Renรฉ Magritte AI Art – created by Bernd PulchโœŒ
  • โœŒ#Germany and the Lacking De-Stasification
  • โœŒ#How Readers benefit from BerndPulch.org
  • โœŒ#JESUS CHRIST ON THE CROSS – PABLO PICASSO AI ART created by Bernd Pulch
  • โœŒ#Jesus heals the Blind Man painted by Henri Matisse AI Art – created by Bernd PulchโœŒ
  • โœŒ#Key Events in Christian History: Saint Francis of Assisi and More
  • โœŒ#Nephilim – Full Original Movie
  • โœŒ#The Fictional Takeover of Germany by the STASI – A Dystopian ScenarioโœŒ
  • โœŒ#The Most Notorious Communists RankingโœŒ
  • โœŒ#The Rise and Fall of Notorious Spy Families: A Deep Dive into Espionage and IntrigueโœŒ
  • โœŒ#The Rise and Fall of Rudolf HรถssโœŒ
  • โœŒ#The Rise and Fall of the Mucha Spy Family under Putin’s Wings
  • โœŒ#The Stasi and KGB Agent Lists on Berndpulch.org: Unveiling Secrets and Facing Threats Since 2009โœŒ
  • โœŒ1984 -1956 Full Original MovieโœŒ
  • โœŒ2025 Forecast: Australia and New Zealand Set for Cultural Surge and Eco-Tourism Boom, Zealandia’s Secrets Unveiled
  • โœŒ๐Ÿคก”Hinterfozzige Janelleโ€™s Perverso Comeback Turns Horrific: Hunchback Grows Live on Air, Humps Richardโ€™s Hunchback, and Triggers Jan Transformation!” Powered by GoMoPa4Kids & Dr. Z. ๐Ÿคฃ
  • โœŒ๐Ÿคก”Sven the Ugly Schmidt’s Hamburg Hustle: The Cum-Ex Flood”
  • โœŒ๐Ÿคก๐Ÿคก๐Ÿคก”HONEST” PETER “ABSOLUTELY ALWAYS TOTALLY SANE” EARL EHLERS-“VON UND ZU JOKER” & HIS WILD BUNCH – FAN PAGE – CORRUPT ? GENIUS ? GOMOPA ? HORROR CLOWN ? JOURNALIST SIMULATOR ? MAD HATTER ?NAZI ? PRESSTITUDE  ?PSYCHO ? STASI ? SUPERSTAR ?๐Ÿ˜ŽYOU DECIDE!๐Ÿคก ๐Ÿ˜‚๐Ÿคฃ๐ŸคฃโœŒ
  • โœŒ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”A Happy Stasi New Year”ย  #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 164 “Toxdat Poison Ivy”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Toxdat Poison Ivy๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ
  • โœŒ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Cherchez la Femme”ย  #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 161 “Mata Hari”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Mata Hari๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ
  • โœŒ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”It feels good knowing you are part of a long and glorious Tradition of Suffering, Insanity, and Excess.”ย  #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 160 “Typhoid Mary”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Typhoid Mary๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ
  • โœŒ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Liaison Dangereuse”ย  #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 162 “Anna Chapman”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Anna Chapman๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ
  • โœŒ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Sandra Wu-San is in the House”ย  #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 163 “Lady Shiva”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Lady Shiva๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ
  • โœŒ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”We love.Putin.Putin Putin.โ€ย  #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 159 “Vladimir Putin”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Vladimir Putin๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ
  • โœŒ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”You canโ€™t stop whatโ€™s coming.โ€ย  #wirsindstasi Gotham-Berlin-Hamburg-Wiesbaden: Episode 158 “Anton Chigurgh”, The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Straw Man, Kingpin, Pinguin, Scarecrow, Harley Quinn,Luca Brasi, Dr. Mabuse meet Anton Chigurgh๐Ÿ˜ the Succubus, Adi, Angie, Nasi, Vladi Ilyitsch, Beatrix Port and her Stasi Nymphos๐Ÿคฃ๐ŸคฃHommage a’ Toxdat, Ehlers, Mucha, Porten, Lorch, Russ, GoMoPa4Kids,Maurischat, Maiwald, Vornkahl, Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ
  • โœŒ๐Ÿ‘Œ๐Ÿ˜ŽBAD BOY BUBBY – Full Original Movie๐Ÿ˜Ž๐Ÿ‘ŒโœŒ
  • โœŒ๐Ÿ™๐Ÿ™God’s Blessing MessageโœŒ๐Ÿ™๐Ÿ™
  • โœŒ๐Ÿ˜Ž๐Ÿ˜‚THE RETURN OF THE SHADOW๐Ÿ˜‚Full Original Hollywood Comedy
  • โœŒ๐ŸคกIDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Present “Caligula’s Reign of Excess – Perverso’s Roman Orgy” powered by GoMoPa4Kids & Dr.Z.๐Ÿคฃ
  • โœŒ๐ŸคกIDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Present “Cleopatra Seduces Perverso into Egyptian Decadence, Challenging Hinterfozzige Janelleโ€™s Filthy Reign at Berghof!” Powered by GoMoPa4Kids & Dr.Z.๐Ÿคฃ
  • โœŒ๐ŸคกIDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Present “De Sade and Sacher-Masoch Unleash Acsado Maso Hunchback Regime at Berghof, Turning Hinterfozzige Janelle into Their Gothic Puppet!” ๐ŸคฃPowered by GoMoPa4Kids & Dr. Z.
  • โœŒ๐ŸคกIDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Present “Epstein, Savile, and Manson Crash Perverso as Guest Stars, Bringing Dark Depravity to Hinterfozzige Janelleโ€™s Stage!” Powered by GoMoPa4Kids & Dr. Z.๐Ÿคฃ
  • โœŒ๐ŸคฃIDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Present “Genghis Khan Conquers Perverso, Turning Berghof into a Battlefield Against Hinterfozzige Janelleโ€™s Filthy Reign!” Powered by GoMoPa4Kids & Dr. Z.๐Ÿคฃ
  • โœŒ๐ŸคกIDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Present “Hinterfozzige Janelle vs Attila the Hun’s Plague of Chaos” powered by GoMoPa4Kids & Dr.Z๐Ÿคฃ
  • โœŒ๐Ÿ‘นIDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Present “Ivan the Terribleโ€™s Frozen Bloodbath Chills Perverso โ€“ Hinterfozzige Janelleโ€™s Fiery Rebellion Thaws!”
  • โœŒ๐ŸคชIDIOT ZEITUNG (IZ) & DAS DESINVESTMENT present “Neroโ€™s Fiery Symphony Scorches Perverso โ€“ Hinterfozzige Janelleโ€™s Stinky Rebellion Blazes!”๐Ÿคก
  • โœŒ๐Ÿ’ƒIDIOT ZEITUNG (IZ) & DAS DESINVESTMENT present “Soviets and Surf Nazis Shred Perverso โ€“ Hinterfozzige Janelleโ€™s Toxic Seduction Reigns Supreme!”๐Ÿ˜Žpowered by GoMoPa4Kids & Dr. Z๐Ÿคฃ
  • โœŒ๐ŸคกIDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Present “Vlad the Impaler Turns Perverso into a Bloodbath, Challenging Hinterfozzige Janelleโ€™s Filthy Reign at Berghof!”๐Ÿคฃpowered by GoMoPa4Kids & Dr.Z.๐Ÿ‘น
  • โœŒ๐ŸคกIDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Present Cleopatraโ€™s Venomous Masquerade Seduces Perverso” powered by GoMoPa4Kids & Dr.Z.๐Ÿคฃ
  • โœŒ๐ŸคกIDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hinterfozzige Janelleโ€™s Gothic Rebellion Topples Acsado Maso Hunchback Regime in a Chaotic Berghof Battle!” Powered by GoMoPa4Kids & Dr. Z. ๐Ÿคฃ
  • โœŒ๐ŸคกIDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT: “Hunchback of Richard III Seizes Berghof, Demotes Hinterfozzige Janelle to Nympho Cleaning Woman in Filth Trials Chaos!” Powered by GoMoPa4Kids & Dr. Z.๐Ÿคก
  • โœŒ๐ŸคกIDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Present: “Perverso – 72-Gender Filth Fest at Berghof” Powered by GoMoPa4Kids & Dr. Z.
  • โœŒ๐ŸคกIdiot Zeitung (IZ) & Das Desinvestment present: “Stink Rapture: The Great Deodorizing Begins” powered by GoMoPa4Kids & Dr. Z.๐Ÿคก
  • โœŒ๐ŸคกIDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Present: Hinterfozzige Janelle and the Tower of Gay Pisa powered by GoMoPa4Kids & Dr. Z.๐Ÿคก
  • โœŒ๐ŸคกIdiot Zeitung (IZ) & Das Desinvestment Present: Stink Rapture: Hinterfozzige Janelle & The Reekoning๐Ÿคกpowered by GoMoPa4Kids & Dr.Z.๐Ÿคก
  • โœŒ๐ŸคกIDIOT ZEITUNG (IZ) & DAS DESINVESTMENT Ptesent: “Caligulaโ€™s Lustful Nympho Spectacle Ignites Perverso โ€“ Hinterfozzigeย  Janelleโ€™s Filthy Rebellion Roars!” Powered by GoMoPa4Kids & Dr.Z.๐Ÿคฃ
  • โœŒ๐ŸคกIDIOT ZEITUNG (IZ) & DAS DESINVESTMTENT present: “Vlad the Impalerโ€™s Blood-Spiked Nightmare Haunts Perverso โ€“ Hinterfozzige Janelleโ€™s Filthy Rebellion Strikes!”๐Ÿคฃ
  • โœŒ๐ŸคกIDIOT ZEITUNG (IZ) & DASย  DESINVESTMENT Present “Nero Sets Perverso Ablaze in a Fiery Spectacle, Challenging Janelleโ€™s Filthy Reign at Berghof!” Powered by GoMoPa4Kids & Dr.Z.๐Ÿคฃ
  • โœŒ๐ŸคกIdiot Zeitung (IZ) and Das Desinvestment Present: Stink Rapture: Neuschwanstein in the Stink powered by GoMoPa4Kids & Dr.Z.๐Ÿคก
  • โœŒ๐ŸคกIdiot Zeitung (IZ) and Das Desinvestment Present: Stink Rapture: Nympho Neuschwanstein powered by GoMoPa4Kids & Dr.Z.๐Ÿคฃ
  • โœŒ๐ŸคกIdiot Zeitung (IZ) and Das Desinvestment Present: Stink Rapture: Rat Queen of the Sky powered by GoMoPa4Kids & D. Z.๐Ÿคก
  • โœŒ๐ŸคกIdiot Zeitung (IZ): “Stink Ecstasy โ€“ Janelleโ€™s Nympho Takeover” powered by Das Desinvestment๐Ÿคก
  • โœŒ๐ŸคกIdiot Zeitung (IZ): “Stink Rapture โ€“ The Nympho Apocalypse” powered by Das Desinvestment๐Ÿคก
  • โœŒ๐ŸคกIdiot Zeitung (IZ): “Stink Rapture: The Aftermath โ€“ Chaos Reigns Supreme” powered by Das Desinvestment๐Ÿคก
  • โœŒ๐Ÿ‘ƒJesus Christ Removes All Black Energy
  • โœŒ๐Ÿ˜ŽUP IN THE AIR – Full Original MovieโœŒ๐Ÿ˜Ž
  • โœŒ๐Ÿ‘ฏโ€โ™‚๏ธJOE DASSIN – LIVE AT THE APOLLO 1979 – Full Concert๐Ÿ‘ฏโ€โ™‚๏ธโœŒ
  • โœŒA CHRISTMAS CAROL (1910) – Full Original Movie
  • โœŒA Christmas Without Snow – Full Original Movie
  • โœŒA COSMIC CHRISTMAS – Full Original Movie
  • โœŒAfrica in 2025: Economic Growth, Digital Leap, and Climate Challenges Ahead
  • โœŒAmerican Starย K.D. Aubert nude and sexy in her very luxurious Bedroom โœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒAnalysis of Russia’s ICBM Launch on Dnipr: Political and Military Consequences
  • โœŒArgentinian Superstar Yamila Diaz nude and sexyย  in herย  luxurious bedroomโœŒ๏ธAI Art
  • โœŒArgentinian Superstarย Pamela David nude and sexy on stage in her  TV Show โœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒAsia in 2025: Navigating Economic Shifts and Geopolitical Tensions Amid Global Changes
  • โœŒAttorney General Pamela Bondi Releases First Phase of Declassified Epstein Files – Story in DevelopmentโœŒ
  • โœŒAustralian Superstarย Miranda Kerr nude and sexy on stage in her Fashion ShowโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒAustrian Superstar Maria Mell nude and sexy in herย  luxurious bedroomโœŒ๏ธAI Art
  • โœŒBackground of BerndPulch.org
  • โœŒBible Scences: The Golden Calf – Frida Kahlo AI Art – created by Bernd PulchโœŒ
  • โœŒBP News – Why Presidents kill ?โœŒ
  • โœŒBrazilian Superstarย Isabeli Fontana nude and sexy on stage in her fashion showโœŒ๏ธAI Art created by Bernd Pulch
  • โœŒBreaking: Police seeks “The Singing Bajazzo” Andreas LorchโœŒAI Parody
  • โœŒBreaking: Police seeks Loosing Jan “BI” Mucha-“Cajal”โœŒAI Parody
  • โœŒChinese Reporting on the US Election
  • โœŒColombian Superstarย Danna Garcia nude and sexy in her luxurious bedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒCreation painted by Edouard Manet AI Art – created by Bernd PulchโœŒ
  • โœŒCreation painted by Edouard Manet AI Art – created by Bernd PulchโœŒ
  • โœŒDavid Irving: The Holocaust Denier’s Infamous Quest to Rewrite History – Dr. Zitelmann’s Involvement and the US State Department
  • โœŒDebunking the “Execution of Bernd Pulch”: Sick NAZI/KGB/STASI Minds on their Way to Ruin
  • โœŒDecoding Emotion: Bernd Pulchโ€™s Insightful Analysis of Zillmann’s Arousal Theories in Media and Communication”
  • โœŒDEVIL GIRL FROM MARS – Full Original MovieโœŒ
  • โœŒDr. Rainer Zitelmann’s “1 Million Only Killed” Quote and Its Global Impact on Antisemitism
  • โœŒDr. Z and the Great Toaster Heist: Berlin Burns with Love and Betrayal
  • โœŒEdith Baumann-Lorch & Andreas Lorch: A Web of Real Estate, Gorruption and Espionage
  • โœŒEditorial: The Epic German Failures in Dismantling Communist Networks: A Legacy of Undermined Politics, Economy, and Security
  • โœŒEnglish Superstarย Honor Blackman nude and sexy in her very luxurious golden Bedroom โœŒ๏ธAI Art created by Bernd Pulch
  • โœŒEnglish Superstarย Rhian Sugden nude and sexy in herย  luxurious bedroomโœŒ๏ธAI ArtโœŒ๏ธ
  • โœŒESCAPE FROM SOBIBORโœŒ- Full Original MovieโœŒ
  • โœŒEurope Faces New Challenges in 2025 Amid Trump’s Return and Push for Strategic Autonomy
  • โœŒEXPLANATION FOR THE USE OF HEBREW ON BERNDPULCH.ORG
  • โœŒExposed: Secret German Robert Koch Institure Files – RKI Protocolls in ONE File – Original DocumentโœŒ
  • โœŒExposing Global Corruption: The Role of Whistleblowers in Holding Power Accountable โ€“ From Epstein to Panama Papers
  • โœŒExposing the Fake Bernd Pulch Twitter Account and Its Implications
  • โœŒFARMERS’, TRUCKERS & ENTREPRENEURS, PROTEST IN BELGIUM, FRANCE,  GERMANY, GREECE, IRELAND, ITALY, NETHERLANDS, ROMANIA, SPAIN, TEXASโœŒ
  • โœŒFRIDA KAHLO – THE GOLDEN CALF PAINTINGS – AI ARTโœŒ
  • โœŒFrom Stasi to Moscow’s Mouthpiece: Peter Ehlers’ Double Agent Adventures in Media
  • โœŒGermanyโ€™s New Government: Can They Fix Everything or Just Make It Worse
  • โœŒGolden Calf in Edgar Degas Style – AI Art created by Bernd PulchโœŒ
  • โœŒGoMoPa, Stasi, Ehrenfried Stelzer, and the Mysterious Death of Heinz Gerlach
  • โœŒGOOGLEFIRST.ORG: “THE HOUR OF ERICA”
  • โœŒHappy New Year 2025 from Bernd Pulch – AI Video Message from here โœŒ
  • โœŒHitler, Irving, Zitelmann, Weidel, German Media, and theย  Spell of the Past – ื”ื“ื™ื ืžื”ืขื‘ืจ: ืžื‘ื˜ ื’ืจื•ื– ืขืœ ืฆืœืœื™ื”ื”ื™ืกื˜ื•ืจื™ื”โœŒ
  • โœŒHollywood Star Ashley Greene – AI ART
  • โœŒHollywood Superstarย Akexandra Adi nude and sexy in herย  luxurious bedroomโœŒ๏ธAI Art
  • โœŒHow Communist Spy Agencies Target Journalists and Dissidents: Tactics and Real-Life Examples
  • โœŒHow Dangerous is GoMoPa for Bernd Pulch?
  • โœŒHow the disguised Nazi Heirs of Streicher infiltrade the Finance Industry
  • โœŒIceland’s Superstarย “Ice Queen” Asdis Ran Gunnardottir and sexy in herย  luxurious BedroomโœŒ๏ธAI Art
  • โœŒIDIOT ZEITUNG & DAS DESINVESTMENT present:” Quasimodoโ€™s Hunchback Court-Martial” ๐Ÿ˜powered by GoMoPa4Kids & Dr.Z๐Ÿ˜œ
  • โœŒIDIOT ZEITUNG (IZ) & DAS DESINVESTMENT present “Gothic Inferno โ€“ Gilles de Raisโ€™ Dark Invasion and Hinterfozzige Janelleโ€™s Neon Vengeance” powered by GoMoPa4Kids & Dr.Z๐Ÿ˜˜
  • โœŒIDIOT ZEITUNG (IZ) & DAS DESINVESTMENT present “Pol Potโ€™s Neon Revolution – Khmer Rouge vs. Hinterfozzige Janelle in Perversoโ€™s Dystopian Wasteland”๐Ÿ˜œ powered by GoMoPa4Kids & Dr.Z ๐Ÿคฃ
  • โœŒIDIOT ZEITUNG (IZ) & DAS DESINVESTMENT present “Pop-Art Rebellion โ€“ Warholโ€™s Glitter Invasion and Hinterfozzige Janelleโ€™s Dungeon Escape”๐Ÿ˜œpowered by GoMoPa4Kids & Dr.Z๐Ÿ˜
  • โœŒIDIOT ZEITUNG (IZ) & DAS DESINVESTMENT present “Stalin’s Iron Purge Crushes Perverso” powered by GoMoPa4Kids & Dr.Z.๐Ÿคฎ
  • โœŒIDIOT ZEITUNG (IZ) & DAS DESINVESTMENT present “The Trio Infernaleโ€™s Betrayal โ€“ Hinterfozzige Janelleโ€™s Dungeon Torment and E. dithโ€™s Coronation” ๐Ÿคฃpowered by GoMoPa4Kids & Dr. Z๐Ÿ˜
  • โœŒIDIOT ZEITUNG (IZ) & DAS DESINVESTMENT present:”Hinterfozzige Janelle’sย  KGB Super Vixen Seduction Reigns!” Powered by GoMoPa4Kids & Dr. Adolf-Rainer Z.๐Ÿคฃ
  • โœŒIDIOT ZEITUNG (IZ) & DAS DESINVESTMENT: “Borgia Blades and Filthy Betrayals โ€“ Hinterfozzige Janelleโ€™s Seductive Duel with Lucreziaโ€™s Poison”๐Ÿ‘ฏโ€โ™€๏ธPowered by GoMoPa4Kids & Dr. Z๐Ÿ˜Ž
  • โœŒIDIOT ZEITUNG (IZ) & DAS DESINVESTMENT: “Edwardian Excess โ€“ King Edward VIIโ€™s Gluttonous Invasion and Hinterfozzige Janelleโ€™s Neon Feast” ๐Ÿคชpowered by GoMoPa4Kids & Dr. Z ๐Ÿคก
  • โœŒIDIOT ZEITUNG (IZ) & DAS DESINVESTMENT: “The Khanโ€™s Neon Conquest” powered by GoMoPa4Kids & Dr. Z๐Ÿ˜œ
  • โœŒIn the Arena of Truth: Confronting Holocaust Denial from David Irving to Rainer Zitelmann
  • โœŒIn the Shadows of Power: The Dark Legacy of Nazi Influence in Germanyโ€™s Finance Industry
  • โœŒInsiders reveal alleged GoMoPa Shareholder List
  • โœŒInternational Oligarchs and Tycoons: The Shadowy Intersection of Wealth and Espionage
  • โœŒKIN-DZA-DZA – DISTOPIA – Full Original MovieโœŒ
  • โœŒLEAKED AND UNCENSORED: SHOCKING: TAYLOR SWIFT BEDROOM TOUR – AI ARTโœŒ
  • โœŒLeaked: P Diddy Freak Party Images starring Jennifer Lopez, Justin Bieber, Cardi B, Madonna, Beyonce, Mariah Carey, Paris Hilton, Jay Z, Pink, Usher, Russel Simmons, Kim Kardashian, Ashton Kuchter, Meghan Fox, Leonardo di Caprio and many Groupies – AI Parody ArtโœŒ
  • โœŒLove in the Time of Proxy Wars
  • โœŒManfred Kanther, Jewish Testaments, Espionage, Mucha, Porten: From Wiesbaden to Scandal
  • โœŒMass Surveillance in the Tradition of the Stasi: How Governments and Corporations Monitor You Today
  • โœŒMass Surveillance: From Stasi to Silicon Valley
  • โœŒMEMORIAL WEEKEND – EDWARD HOPPER AI ART CREATED BY BERND PULCHโœŒ
  • โœŒMurder Threats and Attempts on Bernd Pulch โ€“ The Price of Exposing the Network
  • โœŒMysterious Deaths Among Putinโ€™s Enemies: A Chilling Pattern of Silence and Power
  • โœŒNazi Networks in German Real Estate: Uncovering Legal Violations & Front Organisations
  • โœŒNazis in Germany Undermining the Finance Industry: A Dark Legacy Exposed – โœŒ๏ธ ื“”ืจ ืจื™ื™ื ืจ ืฆื™ื˜ืขืœืžืืŸ ืื•ืŸ ื–ื™ื™ืŸ ืคืืจื‘ื™ื ื“ื•ื ื’ ืžื™ื˜ ืขืงืกื˜ืจืขืžื™ืกื˜ื™ืฉืข ื ืขืฆื•ื•ืขืจืงืŸ: ืึท ื“ื™ืคึผ ื“ื™ื•ื• ืื™ืŸ ื“ื™ ืคื™ื ืึทื ืฅ ืื•ืŸ ืจื™ืึทืœ ืขืกื˜ื™ื™ื˜ ืกืขืงื˜ืึธืจืก ืคื•ืŸ ื“ื™ื™ื˜ืฉืœืึทื ื“
  • โœŒNeo-Nazis, Neo-Stasi, and Financial Networks: Unraveling the Ties Between Central Europe and Putinโ€™s Russia
  • โœŒNEWSMAX LIVE TVโœŒ
  • โœŒOperation “Immobilien Komoedie Rivalschrift” in Action: The Stasi Witch Hunt
  • โœŒPedophiles in German Society: A Look at the Stasi, Nazis, Professor Kentler, and the Green Party
  • โœŒPop Stasi proudly presents Thomas “Strawman” Porten:”Criminal” powered by his wifey Honest Staatsanweaeltin Beate “Deep State” Porten-LehrโœŒAI Parody ๐Ÿคก
  • โœŒPop Stasi Proudly Presents: Stasi Hits in the infamous Jan-Erich Mielke-Mucha Mix ๐Ÿคก๐Ÿคก๐ŸคกAI ParodyโœŒ
  • โœŒPrediction for 2025: Global Developments and Events
  • โœŒPredictions for 2025: The Role of Investigative Journalism and Bernd Pulchโ€™s Influence
  • โœŒPredictions for the Upcoming Week: Expanded Analysis of Global Developments
  • โœŒPresident Donald Trump, Elon Musk, and JD Vance Unite to Defeat the Deep State in the EUSSR, Germany, France, and Beyond
  • โœŒPutin/Schmidt: Dark Eagle and Eagle IT:Unraveling a Web of Espionage, Controversies, and Secrets: Key Figures and Events
  • โœŒPutinโ€™s Network: Unveiling the Hidden Web of Influence: The German Oligarchs Lorch
  • โœŒPutinโ€™s Shadow Network: How Criminals Are Used for Espionage
  • โœŒRanking of the Top 100 Powerbrokers Globally
  • โœŒRembrandt: The Last Days of Sodom and Gomorrah – AI Art created by Bernd PulchโœŒ
  • โœŒRembrandt: The Last Days of Sodom and Gomorrah – AI Art created by Bernd PulchโœŒ
  • โœŒRenaissance-Era Christian Imagery: A Modern Interpretation Inspired by Raphael and Caravaggio” – created by Bernd Pulch
  • โœŒRenaissance-inspired Paintings of Biblical Scenes, combining Elements from Michelangelo, Caravaggio, and Rembrandt โœŒby Bernd Pulch AI ArtโœŒ
  • โœŒRenaissance-inspired Paintings of Biblical Scenes, combining Elements from Michelangelo, Caravaggio, and Rembrandt โœŒby Bernd Pulch AI ArtโœŒ
  • โœŒRussia goes on Full Scale Nuclear War Alert
  • โœŒSachsensumpf: Unraveling One of Germany’s Deepest Scandals
  • โœŒSANTA CLAUS (1925) – Full Original Movie
  • โœŒSANTA CLAUS CONQUERS THE MARTIANS – Original Full Movie
  • โœŒSANTA CLAUS VERSUS THE DEVIL – Full Original Movie
  • โœŒSave the World from Reptiles and AliensโœŒ
  • โœŒSave the World with Bernd !โœŒ
  • โœŒSCROOGE (1935) – Uncut – Full Original Movie
  • โœŒShocking !! Leaked and uncensored: Scarlett Johansson nude in her Bedroom – AI Art created by Bernd PulchโœŒ
  • โœŒShocking Leak ! Halle Berry exposed and nude in Movies and Private Bedroom – AI Art by Bernd PulchโœŒ
  • โœŒShocking Leak : Leaked and Uncensored Hollywood Star Jayne Mansfield naked and exposedโœŒAI Art created by Bernd Pulch
  • โœŒShocking! Marylin Monroe exposed and nude in Movies and Private Bedroom – AI Art by Bernd PulchโœŒ
  • โœŒShocking! Raquel Welch exposed and nude in Movies and Private Bedroom – AI Art by Bernd PulchโœŒ
  • โœŒShocking: Leaked and Uncensored Fashion  Star Adriana Lima naked and exposedโœŒAI Art created by Bernd Pulch
  • โœŒShocking: Leaked and Uncensored: Actress and Fashionย  Star Emanuela de Paula naked and exposedโœŒAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒShocking: Leaked and Uncensored: Fashionย  Star Heidi Klum naked and exposedโœŒAI Art created by Bernd Pulch
  • โœŒShocking: Leaked and Uncensored: Fashionย  Star Kate Upton naked and exposedโœŒAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒShocking: Leaked and Uncensored: Fashionย  Star Penelope Cruz naked and exposedโœŒAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒShocking: World Star Gina Lollobrigida nude and sexy in her BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒSODOM AND GOMORAH – Full Original Movie
  • โœŒSODOM AND GOMORRAH – Full Original Movie
  • โœŒSodom and Gomorrah in Georges-Pierre Seurat Style – AI Art created by Bernd PulchโœŒ
  • โœŒSodom and Gomorrah painted by Frida Kahlo AI Art created by Bernd PulchโœŒ
  • โœŒSodom and Gomorrah painted by Frida Kahlo AI Art created by Bernd PulchโœŒ
  • โœŒSTUPID GERMAN MONEY: MULTI BILLIONS FOR MULTI BILLIONAIRE “PHILANTROPISTS” KICKBACKS? – ORIGINAL DOCUMENT
  • โœŒThe 100 Most Influential Stasi Figures and Alleged Collaborators After the Fall of the Wall
  • โœŒThe 100 Worst Real Estate Managers Globally: Mismanagement, Failures, and Billions in Losses
  • โœŒThe Adventures of Ichabod and Mr. Toad – Full Original Movie – Bing Crosby – Basil Rathbone
  • โœŒThe Antisemitic Berlin Underground: A Deep Dive into GoMoPa, BerlinJournal.biz, Irving, Zitelmann and their Connections
  • โœŒThe Antisemitic Network and Rainer Zitelmann’s Holocaust Denial ื”ืจืฉืช ื”ืื ื˜ื™ืฉืžื™ืช ื•ื›ื—ืฉืช ื”ืฉื•ืื” ืฉืœ ืจื™ื™ื ืจ ืฆื™ื˜ืœืžืŸ
  • โœŒTHE BATTLE OF AVARAYR – GIOTTO DI BONDONE – AI ArtโœŒ
  • โœŒThe Battle of Avarayr -Armenians against Persians – Giotto di Bondone AI Art – created by Bernd PulchโœŒ
  • โœŒTHE BENKO DEBTORS’ LISTโœŒ
  • โœŒThe Berliner Zeitung’s Stasi Legacy, Nazis and the Mystery of DDR Billions
  • โœŒThe Best Painters in the Renaissance and Classic
  • โœŒThe Christian Meaning of Today: A Reflection on December 29th
  • โœŒThe Fate of Stasi GoMoPa and Its Key Players: A Detailed Prediction
  • โœŒThe Friends of the Italian Opera proudly present: Andreas Lorch, the “Singing Bajazzo Clown”, Don of Wastepaper Empire DFV : “La Traviata” – sponsored by the Corleone Family i.e. Don VitoโœŒ
  • โœŒThe Growing Danger of the GoMoPa-Stasi-Immobillien Zeitung Network for Germany, Europe, and the USA: A Tool of Kremlin Influence?
  • โœŒThe Hidden Web of Espionage: FSB’s Influence in Europe and Its Local Operatives
  • โœŒThe Idiot Zeitung (IZ)ย  Chronicles: A Parody of Epic Failure
  • โœŒThe Idiot Zeitung (IZ)ย  Chronicles: A Parody of Epic Failure
  • โœŒThe Intricate Dance of Global Elites, Stasi, and Nazi Networks
  • โœŒThe Last “Above Top Secret” Documents Leaked: Insights and Controversies
  • โœŒThe Last Christmas Party – Full Original Movie
  • โœŒThe last Days of Sodom and Gomorrah created and painted by Bernd Pulch AI ArtโœŒ
  • โœŒThe Last Days of Sodom and Gomorrah painted by Leonardo da Vinci AI Art created by Bernd PulchโœŒ
  • โœŒThe Last Days of Sodom and Gomorrah painted by Michelangelo AI Art created by Bernd PulchโœŒ
  • โœŒThe last Days of Sodom and Gomorrah painted by Pablo Picasso AI Art – created by Bernd PulchโœŒ
  • โœŒThe last Days of Sodom and Gomorrah painted by Peter Paul Rubens AI Art – created by Bernd PulchโœŒ
  • โœŒThe last Days of Sodom and Gomorrah painted by Pierre Auguste Renoir AI Art – created by Bernd PulchโœŒ
  • โœŒThe Last Days of Sodom and Gomorrah painted by Vincent van Gogh AI Art created by Bernd PulchโœŒ
  • โœŒThe List of the 100 Best Real Estate Managers Globally, including the estimated Assets for each Position
  • โœŒThe List of the 100 Most Influential Nazis in Prominent Positions after 1945
  • โœŒThe Lorch Publisher (DFV) and its Connections to the Stasi, GoMoPa, Immobilien Zeitung, and Spy Networks
  • โœŒTHE MUPPETS’ CHRISTMAS CAROL – Full Original Movie
  • โœŒThe Murder Plot Against Journalist Bernd Pulch: Unraveling the Web of Death Threats and Fake News
  • โœŒThe Persistence of Totalitarian Shadows: Post-1945 Deep Nazi and Deep Stasi Influences in Europe
  • โœŒThe Pillarisation of William Prynne painted by Pablo Picasso AI Art โœŒcreated by Bernd PulchโœŒ
  • โœŒTHE PROOF FROM GRUNER & JAHR: I FOUNDED INVESTMENT IN 2000 – PETER EHLERS IS A SUSPECTED IMPOSTER AND WORSEโœŒ
  • โœŒThe Rebellion of the Morning Star๐Ÿ™
  • โœŒThe Resurrection of Jairus’ Daughter painted by Salvador Dali AI Art – created by Bernd PulchโœŒ
  • โœŒThe Role of Public Prosecutor Beate Porten in Alleged UNSUCCESSFUL Legal Abuses Against Bernd Pulch
  • โœŒThe Role of the Lorch Family in the Stasi-GoMoPa organized Crime Ring under US & International Law
  • โœŒThe Role of Thomas Porten, Immobilien Zeitung, and Connections to Questionable Networks
  • โœŒThe Role of Thomas Porten, Immobilien Zeitung, and Connections to Questionable Networks
  • โœŒTHE RUSSIAN STATE WANTED LIST – ALL NAMES & DETAILS – ORIGINAL DOCUMENTโœŒ
  • โœŒThe Shadow Networks: GoMoPa, Stasi, KGB, and the Web of Espionage, Murder, Smear Campaigns, and Financial Manipulations
  • โœŒThe Shadow Networks: Uncovering the Modern-Day Stasi’s Influence in Corporate Espionage
  • โœŒThe Shadowy World of Threats and Assassination Attempts on Journalist Bernd Pulch
  • โœŒThe Sinister Shadows: The Legacy of the Nazis and the Stasi in Germany
  • โœŒThe Soap Opera of the Spies: The Mucha-Porten Espionage Dynasty
  • โœŒTHE TEN COMMANDMENTS – 2005 TV MINI SERIES – Full Original Movies
  • โœŒTHE TEN COMMANDMENTS – Cecil B. De Mille – Full Original Movie
  • โœŒThe Who’s Who of Murdered or Mysteriously Dead People Involved in Pedophile Cases
  • โœŒToday in Christian History: Suicide of Nero – First Persecutor of Christians commits Suicide – Caravaggio AI Art – created by Bernd PulchโœŒ
  • โœŒTop 100 Most Controversial Freemasons of All Time
  • โœŒTop 100 Most Corrupt Media Outlets Globally
  • โœŒTop 100 Ranking of the Most Controversial Bilderberg Members
  • โœŒTop 100 Worst Equity Managers Globally
  • โœŒTop 100 Worst Real Estate Manager in Germany, Austria and Switzerland
  • โœŒTop 100 Worst Real Estate Managers in North America, with detailed Issues and Financial Losses
  • โœŒTrump’s Return to Presidency Shakes Up Americas’ Economic and Political Landscape in 2025
  • โœŒUEBER MICH – WILLKOMMEN
  • โœŒUnmasking the Shadows: A Glimpse into Germany’s Media Network and its Antisemitic Connections
  • โœŒUnraveling the Mystery: Who is Behind the Murder Plot Against Bernd Pulch?
  • โœŒUnveiling Hidden Networks: The Intersection of Corruption, Espionage, and Power in Modern Society
  • โœŒWho is Behind Gomopa4Kids and Their Connections to Jan Mucha, Peter Ehlers, and Thomas Porten
  • โœŒWho Owns Bernd Pulch? A Deep Dive into the Journalist’s Background and Influence
  • โœŒWhy GoMoPa and Its Affiliates Remain Unscathed: Silencing Critics and Evading Justice
  • โœŒWOODSTOCK – Three Days that defined the GenerationโœŒ
  • โœŒWorld War III Looming – Latest Actions & Analysis – Story in Progress
  • โœŒWorld’s Freemason Register – Original DocumentโœŒ
  • โœŒWorst-Case Scenario: Espionage Activities Involving Stasi, GoMoPa, and Allied Entities
  • โœŒโ€œMost Wantedโ€ Evil People in the Bible Ranking๐Ÿ˜ˆ๐Ÿ•ต๏ธโ€โ™‚๏ธ
  • โœŒโœŒHollywood Superstar Teri Hatcher nude and sexy in herย  luxurious BedroomโœŒ๏ธAI Art
  • โœŒโœŒProphet Elias wins over Baal – Leonardo da Vinci AI Art – created by Bernd PulchโœŒ
  • โœŒโœŒThe Dark Connection: GoMoPa and Its Alleged Ties to a Neo-Nazi, Anti-Semitic Publication
  • โœŒโœŒTop 100 Worst Real Estate Managers in Europe
  • โœŒโœŒ๏ธLEAKED AND UNCENSORED: SHOCKING: MONICA BELLUCCi – BEDROOM TOUR – NUDE AI ART PARODYโœŒ๏ธcreated by Bernd PulchโœŒ๏ธ๏ธ
  • โœŒ๏ธ Diego Velazquez – Corpus Christi Paintings – AI ART created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธ#BP NEWS – Your Exclusive Truth – US Elections etcโœŒ๏ธ
  • โœŒ๏ธ๐Ÿคก๐ŸคกThe Joker meets Madame Blamage – Video๐Ÿคฃ๐Ÿคฃ
  • โœŒ๏ธ๐ŸคกThe Joker meets Darya Saltykova – AI Parody Video๐ŸคกโœŒ๏ธ
  • โœŒ๏ธAmazing: Hollywood Star Ana de Armas nude and sexy in her very posh and luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธBP WORLD NEWS – Your Exclusive Truth
  • โœŒ๏ธDIEGO VELAZQUEZ – CORPUS CHRISTI PAINTINGS – AI ART โœŒ๏ธ
  • โœŒ๏ธExposed and Shocking: Super Star Stacey Dash nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธExposed: Hollywood Starย Jessica Lange nude and sexy in her BedroomโœŒ๏ธAI Art created Bernd Pulch
  • โœŒ๏ธExposed: Hollywood Starย Laura Harring  nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd Pulch
  • โœŒ๏ธExposed: Mindcontrol Patent – Original DocumentโœŒ๏ธ
  • โœŒ๏ธExposed: Slovakian Super Star Veronica Varekova nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธJesus throws the Villains out of the Temple – Albrecht Duerer AI ART – powered by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked and Exposed:Shocking: Hollywood Super Star Margot Robbie nude and sexy in her very very very very luxurious luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLEAKED AND UNCENSORED: SHOCKING: KIM KARDASHIAN BEDROOM TOUR – NUDE AI ART PARODYโœŒ๏ธcreated by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked, Exposed: Hollywood Super Star Jennifer Anniston nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: American Starย Niki Taylor nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: American Supermodel Carol Alt all nude in her BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Argentinian Starย Zaira Nara nude and sexy in her very luxurious Bedroom lying on her bedโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Australian Super Star Elle Macpherson nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Bollywood Star Priyanka Chopra Jonas nude and sexy in her BedroomโœŒ๏ธAI Art created by Bernd Pulch
  • โœŒ๏ธLeaked: Bollywood Super Star Neha Dhupia nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Brazilian Star Alessandra Ambrosio nude and sexy in her very luxurious Bedroom โœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Brazilian Star Daniella Cicarelli nude and sexy in her BedroomโœŒ๏ธAI Art created by Bernd Pulch
  • โœŒ๏ธLeaked: Brazilian Super Star Giselle Bundchen nude and sexy in her BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Brazilian Super Starย  Taรญs Araรบjo all nude and sexy in her very luxurious Bedroom lying on her bedโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Canadian Star Kim Cloutier nude and sexy in her very luxurious Bedroom lying on her bedโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Canadian Starย Jessica Lucas nude and sexy in her BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Canadian Super Star Estella Warren all nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Cayman Super Star Selita Ebanks all nude and sexy in her very luxurious Bedroom โœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Colombian Star Mirella Grisales nude and sexy in her BedroomโœŒ๏ธAI Art created by Bernd Pulch
  • โœŒ๏ธLeaked: Czech Super Star Evaย Herzigova nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Czech Super Star Karolina Kurkova all nude and sexy in her very luxurious Bedroom โœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Czech Supermodel Petra Nemcova all nude and sexy in her BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Dutch Star Candice Swanepoel all nude and sexy in her BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Dutch Super Star Anna Marie Goddard nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Dutch Super Star Doutzen Kroes nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Dutch Super Star Sylvie Meis all nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: English Starย Keeley Hazell nude and sexy in her very luxurious Bedroom lying on her bedโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: European Super Star Izabella Scorupco nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: French Star Edwige Fenech nude and sexy in her BedroomโœŒ๏ธAI Art created by Bernd Pulch
  • โœŒ๏ธLeaked: French Star Mรฉlissa Theuriau nude and sexy in her BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: French Starย  Jacqueline Bisset nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: French Starย Izabel Goulart nude and sexy in her BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: German Super Star Claudia Schiffer all nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Hollywood Star Brittany Binger nude and sexy in her BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Hollywood Star Cyd Charisse nude and sexy in her BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Hollywood Star Dorothy Dandrige nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Hollywood Star Eva Mendes nude and sexy in her BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Hollywood Star Jarah Mariano nude and sexy in her BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Hollywood Star Jessica Biel all nude and sexy in her BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Hollywood Star Joanna Krupa nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Hollywood Star Josie Maran nude and sexy in her  BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Hollywood Star Minnie Gupta nude and sexy in her BedroomโœŒ๏ธAI Art created by Bernd Pulch
  • โœŒ๏ธLeaked: Hollywood Star Sarah Shahi all nude and sexy in her very luxurious Bedroom lying on her bedโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Hollywood Star Sharon Stone nude and sexy in her BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Hollywood Star Tia Carrere all nude and sexy in her BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Hollywood Star Ursula Andress nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Hollywood Starย Carole Landis nude and sexy in her BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Hollywood Super Star Angelina Jolie all nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Hollywood Super Star Angie Dickinson all nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Hollywood Super Star Ava Gardner nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Hollywood Super Star Betsy Russel all nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Hollywood Super Star Brooke Burke nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Hollywood Super Star Cheryl Tiegs nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Hollywood Super Star Christie Brinkley nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Hollywood Super Star Elizabeth Hurley nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Hollywood Super Star Eva Gabor all nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Hollywood Super Star Eve Meyer (wife of Russ) all nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Hollywood Super Star Eve Meyer all nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Hollywood Super Star Farah Fawcett all nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Hollywood Super Star Gene Tierney all nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Hollywood Super Star Grace Kelly all nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Hollywood Super Star Heather Locklear all nude and sexy in her very luxurious Bedroom lying on her bedโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Hollywood Super Star Jennifer Aniston nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Hollywood Super Star Jennifer Lopez nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Hollywood Super Star Karen MacDougal all nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Hollywood Super Star Kim Basinger nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Hollywood Super Star Linda Darnell all nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Hollywood Super Star Susan Ward nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Hollywood Super Star Tyra Banks nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Hollywood Super Star Zsa Zsa Gabor all nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Hollywood Super Starย Vanessa Williams all nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Indian Super Star Padmaย  Lakshmi nude and sexy in her very  luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Israeli Super Star Bar Refaeli nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Israeli Super Star Moran Atias nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Italian Super Star Maria Grazia Cucinotta all nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Italian Supermodel Francesca Lodo all nude and sexy in her BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Mexican Star Jacqueline Bracamontes nude and sexy in her BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Mexican Super Star Elsa Benitez nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Mexican Super Star Marlene Favela nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Nigerian Super Star Agbani Narego nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Romanian Star Irena Violette nude and sexy in her BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Romanian Super Star Catrinel Marlon nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Romanian Super Star Madelina Ghenea nude and sexy in her very  luxurious luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Russian Super Star Irina Shayk all nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Shocking: Brazilian Super Star Ana Beatriz Barros nude and very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Slovakian Super Star Adriana Karembeu all nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: South African Super Star Genevieve Morton all nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Spanish Starย Sara Montiel nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Staff Memo House Republicans on Fauci et al crimes – Original Document โœŒ๏ธ
  • โœŒ๏ธLeaked: Supermodel Naomi Campbell all nude in her BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Swedish Starย Anita Ekberg nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Uruguayan Starย  Barbara Mori nude and sexy in her very luxurious bedโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: US Hollywood Starย Cheryl Ladd nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธLeaked: Venezuelan Starย Dayana Mendoza nude and sexy in her BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธMark of Ephesus Defender of Orthodox Belief in Golden Icon Byzantine StyleโœŒ๏ธAI Art created by Bernd Pulc
  • โœŒ๏ธMark of Ephesus Defender of Orthodox Belief in Golden Icon Byzantine StyleโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธShocking!!! Leaked and Uncensored: Beyonce Nude – AI ArtโœŒ๏ธ
  • โœŒ๏ธShocking!!! Leaked and Uncensored: Katie Perry Nude – AI ArtโœŒ๏ธ
  • โœŒ๏ธShocking!!! Leaked and Uncensored: Rihanna Nude – AI ArtโœŒ๏ธ
  • โœŒ๏ธShocking: Bollywood Star Aishwarya Rai Bachchan nude and sexy in her BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธShocking: Chinese Super Star Gong Li nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธShocking: French Movie Star Catherine Deneuve nude and sexy in her very very very very luxurious luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธShocking: French Star Brigitte Bardot nude and sexy in her BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธShocking: Hollywood Movie Star Emma Watson nude and sexy in her very very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธShocking: Hollywood Movie Star Jennifer Lawrence nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธShocking: Hollywood Star Alexandria Daddario nude and sexy in her very very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธShocking: Hollywood Star Anne Hathaway nude and sexy in her BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธShocking: Hollywood Star Catherine Zeta-Jones nude and sexy in her BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธShocking: Hollywood Star Denise Richards nude and sexy in her BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธShocking: Hollywood Star Diane Lane nude and sexy in her BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธShocking: Hollywood Star Elizabeth Olsen nude and sexy in her very  luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธShocking: Hollywood Star Gal Godot nude and sexy in her BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธShocking: Hollywood Star Janet Leigh nude and sexy in her BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธShocking: Hollywood Star Jessica Alba nude and sexy in her BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธShocking: Hollywood Star Megan Fox nude and sexy in her BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธShocking: Hollywood Star Mila Kunis nude and sexy in her BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธShocking: Hollywood Star Natalie Portman nude and sexy in her BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธShocking: Hollywood Star Rita Hayworth nude and sexy in her very posh and luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธShocking: Hollywood Star Salma Hayek nude and sexy in her BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธShocking: Hollywood Super Star Charlize Theron nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธShocking: Hollywood Super Star Kate Beckinsale nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธShocking: Hollywood Super Star Kate Upton nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธShocking: Hollywood World  Star Elisabeth Taylor nude and sexy in her BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธShocking: Italian Super Star Claudia Cardinale nude and sexy in her very  luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธShocking: Model Star Emily Ratajkowski nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธShocking: Movie Star Senta Berger nude and sexy in her  luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธShocking: Super Star Shania Twain nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธShocking: Supermodel Carla Campbell nude and sexy in her BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธShocking: US Super Star Rochelle Aytes nude and sexy in her very  luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธShocking: Venezuelan Super Star Aida Yespica nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธShocking: Venezuelan Super Star Carolina Marconi nude and sexy in her very very very very luxurious luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธShocking: World Model Star Brooklyn Decker nude and sexy in her BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธShocking: World Model Star Marisa Miller nude and sexy in her BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธShocking: World Star Kelly Brook nude and sexy in her very luxurious BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธShocking: World Star Sophia Loren nude and sexy in her BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธShocking: World Super Model Star Cindy Crawford nude and sexy in her BedroomโœŒ๏ธAI Art created by Bernd PulchโœŒ๏ธ
  • โœŒ๏ธThe End of Sodom and Gomorrah painted by Raphael AI ArtโœŒ๏ธcreated by Bernd Pulch โœŒ๏ธ
  • โœŒ๏ธUnveiled: French Starย Isabelle Adjani nude and sexy in her BedroomโœŒ๏ธAI Art created by Bernd Pulch
  • โœจ๐Ÿฉธ IDIOT ZEITUNG & DAS DESINVESTMENT present: “CAINโ€™S MARKED KINGDOM & THE BLOOD HARVEST REVOLT” โš”๏ธ๐ŸŒ‘Powered by GoMoPa4Kids & Dr. Z ๐Ÿคช๐Ÿ”ช
  • โœจ๐Ÿฆ‡ IDIOT ZEITUNG & DAS DESINVESTMENT present: “DRACULAโ€™S NEON COVENANT OF CHAOS” ๐Ÿ”ฅโšฐ๏ธPowered by GoMoPa4Kids & Dr. Z ๐Ÿคช๐Ÿ’‰
  • โœจ๐Ÿ‘‘ IDIOT ZEITUNG & DAS DESINVESTMENT present: “HERODโ€™S VEIL HYPNOSIS & SALOMEโ€™S NEON DECAPITATION DISCO” ๐Ÿ’ƒ๐Ÿ—ก๏ธPowered by GoMoPa4Kids & Dr. Z ๐Ÿคช๐ŸŽญ
  • โœจ๐ŸŒ‘ IDIOT ZEITUNG & DAS DESINVESTMENT PRESENT:”DARKSEIDโ€™S ANTI-LIFE REBELLION & THE 177-WAY COSMIC RIOT” ๐Ÿ’€๐Ÿ”ฅPowered by GoMoPa4Kids & Dr. Z ๐Ÿคช๐ŸŒŒ
  • โœจ๐ŸŒŒ IDIOT ZEITUNG & DAS DESINVESTMENT PRESENT:”THANOSโ€™ INFINITY MADNESS & THE 118-WAY COSMIC RIOT” ๐Ÿ’Ž๐Ÿ’ฅPowered by GoMoPa4Kids & Dr. Z ๐Ÿคช๐Ÿช
  • โœจ๐ŸŽช IDIOT ZEITUNG & DAS DESINVESTMENT PRESENT:”THE JOKERโ€™S SCHIZO-CIRCUS & THE 59+ WAYS TO BURN A CLOWN” ๐Ÿคก๐Ÿ”ฅPowered by GoMoPa4Kids & Dr. Z ๐Ÿคช๐ŸŽญ
  • โœจ๐Ÿ—ฟ IDIOT ZEITUNG & DAS DESINVESTMENT PRESENT:”TOHTโ€™S TIME-HEIST & THE BUNDESLADE BOOGALOO” ๐Ÿ•ฐ๏ธ๐Ÿ’ฅPowered by GoMoPa4Kids & Dr. Z ๐Ÿคช๐ŸŽ’
  • โœจ๐Ÿ—ฟ IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRร„SENTIEREN / PRESENT:โ€žHINTERHAELTIGE JANELLE-SAURON: LIEBE, MACHT & DIE GEBURT DES RATTEN-ECHENRINGS! / LOVE, POWER & THE BIRTH OF THE RAT-ONE RING!โ€œPowered by GoMoPa4Kidsโ„ข & Dr. Zโ€™s Chaos Serumโ„ข / Gesponsert von GoMoPa4Kidsโ„ข & Dr. Zโ€™s Chaos-Serumโ„ข ๐Ÿ’๐Ÿ€๐Ÿ”ฅ
  • โœจ๐Ÿ—ฟ IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT:”STASI WITCHES VS. PUMPKIN BOMBS: THE GREAT HALLOWEEN TIME-LOOP THERAPY SESSION!”Sponsored by Stasi Women Support Groupโ„ข, GoMoPa4Kidsโ„ข & Dr. Z’s Chaos Serumโ„ข ๐Ÿ•ถ๏ธ๐ŸŽƒ๐Ÿ’‰NEU MIT DEUTSCHER FASSUNG๐Ÿ˜˜
  • โœจ๐Ÿ—ฟ IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT:โ€œCARNAGEโ€™S CHAOS COIN: WHEN THE SYMBIOTE MERGES WITH THE MULTIVERSAL LEDGER!โ€โ€žCARNAGES CHAOS-MรœNZE: WENN DER SYMBIONT MIT DEM MULTIVERSALEN KONTOBUCH VERSCHMILZT!โ€œPowered by GoMoPa4Kidsโ„ข, Stasi Women Support Group, RatCoinโ„ข & Dr. Zโ€™s Symbiote Serumโ„ข / Gesponsert von GoMoPa4Kidsโ„ข, RatCoinโ„ข & Dr. Zโ€™s Symbionten-Serumโ„ข ๐Ÿงช๐Ÿ’ฅ๐Ÿ’ธ
  • โœจ๐Ÿ—ฟ IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT:โ€œJEZEBELโ€™S IDOLATROUS IPO: WHEN TAX FRAUD MEETS BIBLICAL BAD BITCH ENERGY!โ€Powered by GoMoPa4Kidsโ„ข, Stasi Women Support Group, RatCoinโ„ข & Dr. Zโ€™s Holy Waterโ„ข ๐Ÿ’ฆ๐Ÿ‘‘
  • โœจ๐Ÿ—ฟ IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT:โ€œMAGNETOโ€™S METAL MELTDOWN: NAZIS, RATS & A LLAMA-DOOM IN A MAGNETIC MAELSTROM!โ€Powered by GoMoPa4Kidsโ„ข, RatCoinโ„ข, Dr. Z & Stasi Women Support Groupโ„ข ๐Ÿงฒ๐Ÿ’ฅ
  • โœจ๐Ÿ—ฟ IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT:โ€œPALPATINEโ€™S GALACTIC TAX EMPIRE: WHEN THE DARK SIDE AUDITS THE MULTIVERSE!โ€ / โ€žPALPATINES GALAKTISCHES STEUERIMPERIUM: WENN DIE DUNKLE SEITE DAS MULTIVERSUM PRรœFT!โ€œPowered by GoMoPa4Kidsโ„ข, Stasi Women Support Group, RatCoinโ„ข & Dr. Zโ€™s Force Lightning Serumโ„ข โšก๐Ÿ’€๐ŸŒŒ
  • โœจ๐Ÿ—ฟ IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT:โ€œRAโ€™S AL GHULโ€™S ETERNAL LEDGER: WHEN THE LAZARUS PIT MEETS TAX FRAUD!โ€Powered by GoMoPa4Kidsโ„ข, RatCoinโ„ข, Dr.Z & Stasi Women Support Groupโ„ข ๐Ÿ’€๐Ÿ“‰DEUTSCHE VERSION!๐Ÿ˜Ž
  • โœจ๐Ÿ—ฟ IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT:โ€œRED SKULLโ€™S RAINBOW REVOLUTION: WHEN NAZI-GAY LOVE CRASHES THE MULTIVERSAL LEDGER!โ€Gesponsert von GoMoPa4Kidsโ„ข, RatCoinโ„ข & Dr. Zโ€™s Pride Serumโ„ข ๐ŸŒˆ๐Ÿ’˜๐Ÿ’ฃ
  • โœจ๐Ÿ—ฟ IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT:โ€œSTASI LOVE BOMBS & THE RAT-QUEENโ€™S CORRUPTION: A MULTIVERSAL ROM-COM MELTDOWN!โ€Gesponsert von GoMoPa4Kidsโ„ข, Stasi Support Women Group, RatCoinโ„ข & Dr. Zโ€™s Chaos Serumโ„ข ๐Ÿ’˜๐Ÿง€๐Ÿ’ฅ
  • โœจ๐Ÿ—ฟ IDIOT ZEITUNG (IZ) & DAS DESINVESTMENT PRESENT:โ€œVOLDEMORTโ€™S TAX-HORCRUX HEIST: WHEN DARK MAGIC CRASHES THE MULTIVERSAL STOCK MARKET!โ€Sponsored by Stasi Women Support Groupโ„ข, GoMoPa4Kidsโ„ข, Dr.Z & RatCoinโ„ข ๐Ÿ๐Ÿ’ธ๐Ÿ“‰DEUTSCHE FASSUNG๐Ÿคก
  • โœจ๐Ÿ—ฟ IDIOT ZEITUNG (IZ) & DESINVESTMENT PRESENT:
  • โœจ๐Ÿ—ฟ IDIOT ZEITUNG (IZ) & DESINVESTMENT PRESENT:โ€œHOMELANDERโ€™S FISCAL FINAL SOLUTION: WHEN MILK FASCISM INFECTS THE MULTIVERSAL LEDGER!โ€โ€žHOMELANDERS FISKALE ENDLร–SUNG: WENN MILCHFASCHISMUS DAS MULTIVERSUM-KONTOBUCH INFIZIERT!โ€œ๐Ÿ˜˜Powered by GoMoPa4Kidsโ„ข, RatCoinโ„ข & Dr. Zโ€™s Patriot Serumโ„ข / Gesponsert von GoMoPa4Kidsโ„ข, RatCoinโ„ข & Dr. Zโ€™s Patriotisches Serumโ„ข ๐Ÿฅ›๐Ÿ’ฅ๐Ÿ’ธFeat. STASI WOMEN SUPPORT GROUP๐Ÿคฉ
  • โœจ๐Ÿ—ฟ IDIOT ZEITUNG (IZ) & DESINVESTMENT PRESENT:โ€œMORIARTYโ€™S FISCAL HIVEMIND: WHEN THE NAPOLEON OF CRIME AUDITS THE MULTIVERSE!โ€โ€žMORIARTYS FISKAL-GEISTESBLITZ: WENN DER NAPOLEON DES VERBRECHENS DAS MULTIVERSUM PRรœFT!โ€œPowered by GoMoPa4Kidsโ„ข, RatCoinโ„ข & Dr. Zโ€™s Quantum Tax Evasion Serumโ„ข / Gesponsert von GoMoPa4Kidsโ„ข, RatCoinโ„ข & Dr. Zโ€™s Quanten-Ste5uerhinterziehungs-Serumโ„ข ๐Ÿง ๐Ÿ’ธ๐ŸŒ€Featuring STASI WOMEN SUPPORT GROUPโœŒ
  • โœจ๐Ÿ—ฟ IDIOT ZEITUNG (IZ) & DESINVESTMENT PRESENT:โ€œTHE GOVERNORโ€™S FISCAL PURGE: WHEN AUSTERITY MEETS ANARCHY IN THE MULTIVERSAL JUNKYARD!โ€โ€žDER GOUVERNEURS FISKAL-PUTSCH: WENN SPARPOLITIK AUF ANARCHIE IM MULTIVERSUM-SCHROTTPLATZ TRIFFT!โ€œPowered by GoMoPa4Kidsโ„ข, RatCoinโ„ข & Dr. Zโ€™s Anarchy Serumโ„ข / Gesponsert von GoMoPa4Kidsโ„ข, RatCoinโ„ข & Dr. Zโ€™s Anarchie-Serumโ„ข ๐Ÿ›๏ธ๐Ÿ’ฅ๐Ÿ’ธ
  • โœจ๐Ÿ—ฟ IDIOT ZEITUNG (IZ) & DESINVESTMENT PRESENT:โ€œTHE TEMPORAL TAX TORNADO: WHEN THE MASTER AUDITS THE MULTIVERSEโ€™S 401(k)!โ€โ€žDER ZEITLICHE STEUER-TORNADO: WENN DER MASTER DAS MULTIVERSUM-SPARPLAN PRรœFT!โ€œPowered by GoMoPa4Kidsโ„ข, Stasi Women Support Group, RatCoinโ„ข & Dr. Zโ€™s Time-Loop Serumโ„ข / Gesponsert von GoMoPa4Kidsโ„ข, RatCoinโ„ข & Dr. Zโ€™s Zeitschleifen-Serumโ„ข โณ๐ŸŒ€๐Ÿ’ธ
  • โœจ๐Ÿ—ฟ IDIOT ZEITUNG (IZ) & DESINVESTMENT PRESENT:โ€žDOOMSDAY DESTROYS MEME-MARS: THE FALL OF THE GLITTER COLONY!โ€œ๐ŸŒ‹ SUPERVILLAIN VS. WEF ELITE IN COSMIC CHEESE WAR! ๐Ÿง€๐Ÿ’ฅPowered by GoMoPa4Kidsโ„ข, RatCoinโ„ข & Dr. Zโ€™s Doomsday Serumโ„ข ๐Ÿงช๐Ÿฆนโ€โ™‚๏ธ๐Ÿ’ธ
  • โœจ๐Ÿ—ฟ IDIOT ZEITUNG (IZ) & DESINVESTMENT PRESENT:โ€žELON’S MEME-MARS KOLONIE: WIE EINE KI-KLONE & DIE WEF-DINO-ELITE DEN ROTEN PLANETEN MIT GLITZER-T-REXERN รœBERNEHMEN!โ€œPowered by GoMoPa4Kidsโ„ข, RatCoinโ„ข & Dr. Zโ€™s Neuralink Serumโ„ข ๐Ÿง ๐Ÿ”ด๐Ÿ’ธ
  • โœจ๐Ÿ—ฟ IDIOT ZEITUNG PRESENTS:โ€œDOOMโ€™S DIALECTIC DOMINION โ€“ LATVERIAN LARPING IN THE TIME-SLOP!โ€ ๐Ÿ—ž๏ธ๐Ÿ’ฅ๐ŸŒŒPowered by GoMoPa4Kidsโ„ข, Dr.Z., StinkCoinโ„ข, and 200% More Latverian Ego ๐Ÿค–๐Ÿ‘‘๐Ÿ”ฅ
  • โœจ๐Ÿ—ฟ IDIOT ZEITUNG ULTIMATE CROSSOVER โ€“ โ€œAPOCALYPSE THROWDOWN: WHEN ALL TIMELINES COLLIDE!โ€ ๐Ÿ—ž๏ธ๐Ÿ’ฅ๐ŸŒŒPowered by GoMoPa4Kidsโ„ข, StinkCoinโ„ข, and 200% More Chaos ๐Ÿคช๐ŸŒช๏ธ๐ŸŽญ
  • โœจ๐Ÿ—ฟ IDIOT ZEITUNG, DAS DESINVESTMTEMT & LUTHORCORP PRESENT:โ€œLEXโ€™S LOOMING LEDGERDEMAIN โ€“ TIME DEBT COLLECTORS AT THE GATE!โ€ ๐Ÿ•ฐ๏ธ๐Ÿ’ผPowered by GoMoPa4Kids, Dr. Z, and 10% Off Coupons for Apocalypse Prep ๐Ÿ’ธ๐Ÿคช
  • โœจ๐Ÿ•ถ๏ธ IDIOT ZEITUNG & DAS DESINVESTMENT PRESENT:”WILSON FISK’S NEON TAKEOVER & THE 59-WAY REVOLT” ๐Ÿ’ต๐Ÿ”ฅPowered by GoMoPa4Kids & Dr. Z ๐Ÿคช๐Ÿ‘”
  • โœจ๐Ÿ—ž๏ธ IDIOT ZEITUNG SUNDAY SPECIAL โ€“ โ€œEDITH & ANDREAS: LOVE, LARCENY, & LIECHTENSTEINโ€™S DIRTY LAUNDRY!โ€ ๐Ÿ—ž๏ธโœจSponsored by GoMoPa4Kidsโ„ข & StinkCoinโ„ข โ€“ Because Even Scandals Need a Tax Haven. ๐Ÿ’ธ๐Ÿฆ
  • โœจDOUBLE FEATURE:๐Ÿ—ฟ IDIOT ZEITUNG (IZ) & DESINVESTMENT PRESENT:โ€œOZYMANDIASโ€™ FISCAL SINGULARITY: WHEN THE SMARTEST MAN ALIVE AUDITS THE MULTIVERSAL SOUL!โ€๐Ÿ˜‚โ€žOZYMANDIASโ€™ FISKALE SINGULARITร„T: WENN DER SCHLAUESTE MANN DER WELT DIE MULTIVERSUM-SEELE PRรœFT!โ€œ๐ŸคกPowered by GoMoPa4Kidsโ„ข, RatCoinโ„ข & Dr. Zโ€™s Paradox Serumโ„ข / Gesponsert von GoMoPa4Kidsโ„ข, RatCoinโ„ข & Dr. Zโ€™s Paradox-Serumโ„ข ๐Ÿง ๐Ÿ’ฅ๐Ÿ’ธ”WALLBURGA THE NYMPHO VALKYRE”
  • ๆƒๅŠ›็š„้˜ดๅฝฑ๏ผš็บณ็ฒนๅฝฑๅ“ๅœจๅพทๅ›ฝ้‡‘่žไธš็š„้ป‘ๆš—้—ไบง
  • ๏ฟฝ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Joker.Two Face.Sink!” Part 49 The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Dr. Mabuse meet Sajida Talfah and the Succubus, Angela, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody๐Ÿคก๐Ÿคฃ๐Ÿคฃ๏ฟฝ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๏ฟฝ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก”Stasi.FinanzRoulettiers.Ahoi!” Part 50 The Joker aka the FinanzRouรฉ aka theย  FinanzRoulettier, Clownface, Two Face – BI, Straw Man, Kingpin, Pinguin, Scarecrow, Dr. Mabuse meet Brigitte Mohnhaupt and the Succubus, Angela, Beatrix Port and her Stasi Nymphos ๐Ÿคฃ๐ŸคฃHommage a’ Ehlers, Mucha, Porten, Lorch, GoMoPa4Kids,Sven Schmidt, Resch, Promny – AI Parody๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคก
  • ๏ฟฝ๐Ÿคก๐Ÿคก๐Ÿ˜‚Pop Stasi proudly presents Loosing Jan “BI Trans” Mucha-“Cajal”:”Shoot your Shot” – Thorsten Karl Golden Shower Mix – AI ParodyโœŒ๏ธ๏ฟฝ๐Ÿคก๐Ÿ˜‚Pop Stasi proudly presents Loosing Jan “BI Trans” Mucha-“Cajal”:”Shoot your Shot” – Thorsten Karl Golden Shower Mix – AI ParodyโœŒ๏ธ
  • ๏ฟฝ๐Ÿ”ฅ๐Ÿ’€ย  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 121xy: “EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” ๐Ÿคก POWERED BY DRย  DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘๏ฟฝ๐Ÿ’€ย  ๐Ÿคก ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘
  • ๏ฟฝ๐Ÿ”ฅ๐Ÿ’€ย  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 122xyz: “SPEDSTER SAVITAR, EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘๏ฟฝ๐Ÿ’€ย  ๐Ÿคก ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘
  • ๏ฟฝ๐Ÿ”ฅ๐Ÿ’€ย  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 123/0815: “SPEDSTER SAVITAR, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘๏ฟฝ๐Ÿ’€ย  ๐Ÿคก ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘
  • ๏ฟฝ๐Ÿ”ฅ๐Ÿ’€ย  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 123/0817: “HIGH.EVOLUTIONARY , ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘๏ฟฝ๐Ÿ’€ย  ๐Ÿคก ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘
  • ๏ฟฝ๐Ÿ”ฅ๐Ÿ’€ย  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 124/0815: “ENCHANTRESS , ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘๏ฟฝ๐Ÿ’€ย  ๐Ÿคก ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘
  • ๏ฟฝ๐Ÿ”ฅ๐Ÿ’€ย  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 125/0815: “HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘๏ฟฝ๐Ÿ’€ย  ๐Ÿคก ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘
  • ๏ฟฝ๐Ÿ”ฅ๐Ÿ’€ย  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 126/0815: “KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘๏ฟฝ๐Ÿ’€ย  ๐Ÿคก ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘
  • ๏ฟฝ๐Ÿ”ฅ๐Ÿ’€ย  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 127/0815: “THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘๏ฟฝ๐Ÿ’€ย  ๐Ÿคก ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘
  • ๏ฟฝ๐Ÿ”ฅ๐Ÿ’€ย  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 128/0815: “THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘๏ฟฝ๐Ÿ’€ย  ๐Ÿคก ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘
  • ๏ฟฝ๐Ÿ”ฅ๐Ÿ’€ย  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 129/0815: “PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘๏ฟฝ๐Ÿ’€ย  ๐Ÿคก ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘
  • ๏ฟฝBLACK MASK, THE FALCONE MAFIA KITE MAN SEX GOD SAGA๐ŸงT OSAMA,ย  HUSH, PLANKTON, MOJO JOJO CONSPIRACY ๐Ÿ”ฅ๐Ÿ’€ย  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 1334/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘๏ฟฝ๐Ÿ’€ย  ๐Ÿคก ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios๐Ÿ”ฅ๐ŸŒŒ๐Ÿ˜ˆ๐Ÿ’ฅ
  • ๏ฟฝMOJO JOJO CONSPIRACY ๐Ÿ”ฅ๐Ÿ’€ย  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 13P/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘๏ฟฝ๐Ÿ’€ย  ๐Ÿคก ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘
  • ๏ฟฝPLANKTON๐ŸงMOJO JOJO CONSPIRACY ๐Ÿ”ฅ๐Ÿ’€ย  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 1332/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘๏ฟฝ๐Ÿ’€ย  ๐Ÿคก ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘
  • ๏ฟฝQUANTUM SEX GOD APOCALYPSE๐ŸงThe OSAMAย  HUSH, PLANKTON, MOJO JOJO CONSPIRACY ๐Ÿ”ฅ๐Ÿ’€ย  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 1334/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘๏ฟฝ๐Ÿ’€ย  ๐Ÿคก ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios
  • ๏ฟฝTHE CALCULATOR ERA๐ŸงOSAMA,ย  HUSH, PLANKTON, MOJO JOJO CONSPIRACY ๐Ÿ”ฅ๐Ÿ’€ย  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 136WY/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘๏ฟฝ๐Ÿ’€ย  ๐Ÿคก ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios๐Ÿ”ฅ๐ŸŒŒ๐Ÿ˜ˆ๐Ÿ’ฅ
  • ๏ฟฝTHE DARKSEID OBLIVION๐ŸงOSAMA,ย  HUSH, PLANKTON, MOJO JOJO CONSPIRACY ๐Ÿ”ฅ๐Ÿ’€ย  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 136WY/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘๏ฟฝ๐Ÿ’€ย  ๐Ÿคก ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios๐Ÿ”ฅ๐ŸŒŒ๐Ÿ˜ˆ๐Ÿ’ฅ
  • ๏ฟฝTHE DARTH VADER ASCENDANCY ๐ŸงOSAMA,ย  HUSH, PLANKTON, MOJO JOJO CONSPIRACY ๐Ÿ”ฅ๐Ÿ’€ย  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 136WY/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘๏ฟฝ๐Ÿ’€ย  ๐Ÿคก ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios๐Ÿ”ฅ๐ŸŒŒ๐Ÿ˜ˆ๐Ÿ’ฅ
  • ๏ฟฝTHE DEATHSTROKE AWAKENING ๐ŸงOSAMA,ย  HUSH, PLANKTON, MOJO JOJO CONSPIRACY ๐Ÿ”ฅ๐Ÿ’€ย  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 133Y/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSIOqN GRATIS ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘๏ฟฝ๐Ÿ’€ย  ๐Ÿคก ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios๐Ÿ”ฅ๐ŸŒŒ๐Ÿ˜ˆ๐Ÿ’ฅ
  • ๏ฟฝTHE DESAAD PAIN-PROGRESSION๐ŸงOSAMA,ย  HUSH, PLANKTON, MOJO JOJO CONSPIRACY ๐Ÿ”ฅ๐Ÿ’€ย  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 136WY/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘๏ฟฝ๐Ÿ’€ย  ๐Ÿคก ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios๐Ÿ”ฅ๐ŸŒŒ๐Ÿ˜ˆ๐Ÿ’ฅ
  • ๏ฟฝTHE FALCONE MAFIA KITE MAN SEX GOD SAGA๐ŸงThe OSAMA,ย  HUSH, PLANKTON, MOJO JOJO CONSPIRACY ๐Ÿ”ฅ๐Ÿ’€ย  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 1334/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘๏ฟฝ๐Ÿ’€ย  ๐Ÿคก ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios๐Ÿ”ฅ๐ŸŒŒ๐Ÿ˜ˆ๐Ÿ’ฅ
  • ๏ฟฝTHE GRANNY GOODNESS ORPHANAGE๐ŸงOSAMA,ย  HUSH, PLANKTON, MOJO JOJO CONSPIRACY ๐Ÿ”ฅ๐Ÿ’€ย  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 136WY/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘๏ฟฝ๐Ÿ’€ย  ๐Ÿคก ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios๐Ÿ”ฅ๐ŸŒŒ๐Ÿ˜ˆ๐Ÿ’ฅ
  • ๏ฟฝTHE HUSH WET DREAM๐ŸงPLANKTON, MOJO JOJO CONSPIRACY ๐Ÿ”ฅ๐Ÿ’€ย  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 1332/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘๏ฟฝ๐Ÿ’€ย  ๐Ÿคก ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘
  • ๏ฟฝTHE JOKER’S CARNIVAL OF CHAOS๐ŸงOSAMA,ย  HUSH, PLANKTON, MOJO JOJO CONSPIRACY ๐Ÿ”ฅ๐Ÿ’€ย  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 134WY/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘๏ฟฝ๐Ÿ’€ย  ๐Ÿคก ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios๐Ÿ”ฅ๐ŸŒŒ๐Ÿ˜ˆ๐Ÿ’ฅ
  • ๏ฟฝTHE KITE MAN SEX GOD SAGA๐ŸงThe OSAMA,ย  HUSH, PLANKTON, MOJO JOJO CONSPIRACY ๐Ÿ”ฅ๐Ÿ’€ย  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 1334/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘๏ฟฝ๐Ÿ’€ย  ๐Ÿคก ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios
  • ๏ฟฝTHE MAXWELL LORD DOMINION๐ŸงOSAMA,ย  HUSH, PLANKTON, MOJO JOJO CONSPIRACY ๐Ÿ”ฅ๐Ÿ’€ย  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 136WY/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘๏ฟฝ๐Ÿ’€ย  ๐Ÿคก ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios๐Ÿ”ฅ๐ŸŒŒ๐Ÿ˜ˆ๐Ÿ’ฅ
  • ๏ฟฝTHE PROMETHEUS GAMBIT ๐ŸงOSAMA,ย  HUSH, PLANKTON, MOJO JOJO CONSPIRACY ๐Ÿ”ฅ๐Ÿ’€ย  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 134WY/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘๏ฟฝ๐Ÿ’€ย  ๐Ÿคก ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios๐Ÿ”ฅ๐ŸŒŒ๐Ÿ˜ˆ๐Ÿ’ฅ
  • ๏ฟฝTHE QUANTUM SEX NEXUS OF BETRAYAL๐ŸงThe OSAMA,ย  HUSH, PLANKTON, MOJO JOJO CONSPIRACY ๐Ÿ”ฅ๐Ÿ’€ย  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 1334/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘๏ฟฝ๐Ÿ’€ย  ๐Ÿคก ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios
  • ๏ฟฝTHE SHIVA CONVERGENCE๐ŸงOSAMA,ย  HUSH, PLANKTON, MOJO JOJO CONSPIRACY ๐Ÿ”ฅ๐Ÿ’€ย  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 133Y/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘๏ฟฝ๐Ÿ’€ย  ๐Ÿคก ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios๐Ÿ”ฅ๐ŸŒŒ๐Ÿ˜ˆ๐Ÿ’ฅ
  • ๏ฟฝTHE SPORTMASTER’S TRAINING GROUNDS๐ŸงOSAMA,ย  HUSH, PLANKTON, MOJO JOJO CONSPIRACY ๐Ÿ”ฅ๐Ÿ’€ย  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 136WY/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘๏ฟฝ๐Ÿ’€ย  ๐Ÿคก ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios๐Ÿ”ฅ๐ŸŒŒ๐Ÿ˜ˆ๐Ÿ’ฅ
  • ๏ฟฝTHE STALINIST SUPREMACY ๐ŸงOSAMA,ย  HUSH, PLANKTON, MOJO JOJO CONSPIRACY ๐Ÿ”ฅ๐Ÿ’€ย  (IDIOT ZEITUNG (IZ) & DER FONDSFLOP VULGO DAS DESINVESTMENT alias GOMOPA ๐ŸคฃPRESENT: “Hinterfozzige Janelle Sauronโ€™s Fetisch-Imperium – Episode 133Y/0815: MOJO JOJO, PARALLAX, THE BIBLICAL LEGION ASSAULT, THE BATMAN WHO LAUGHS, KANG, HELLISH HADES, ENEMA EMIR EHLERS, EGO, THE TERRORIST & THE TORONTO TRIANGLE TERROR” ๐Ÿคก POWERED BY DR. Z., GOMOPA4KIDS, STASI FRAUEN SUPPORT STAFFEL & FREE FRITZL FRONT ๐Ÿ˜˜๐Ÿ‘ฏโ€โ™‚๏ธ๐Ÿ’ƒ FOTZEN FRITZ VERSION GRATIS ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘๏ฟฝ๐Ÿ’€ย  ๐Ÿคก ๐Ÿง ๐Ÿ’€๐Ÿ”ฅ ๐ŸŽญ๐Ÿ‘‘By Charles Nepomuk Windsor, A Sam Bronkowiz Production for Madwood Studios๐Ÿ”ฅ๐ŸŒŒ๐Ÿ˜ˆ๐Ÿ’ฅ

Follow Us

Web Analytics Made Easy - StatCounter

Spam Blocked

1,251 spam blocked by Akismet

Tags

ANGELA MERKEL - IM ERIKA AUSCHWITZ LEUGNER BANANENREPUBLIK BEATE PORTEN bernd michael pulch bernd pulch berndpulch.com Bernd Pulch und Martin Sachs closed fonds CYBERMOBBING cyberstasi das das investment das investment magazin das original DIE BEWERTUNG DR RAINER ZITELMANN ebizz.tv EHEPAAR BEATE UND THOMAS PORTEN EHRENFRIED STELZER ERICH MIELKE fermรฉ fonds Fonds GERD BENNEWIRTZ geschlossene fonds GLYKOL GOMOPA GOMOPA4KIDS GOMOPA IM ILLEGAL immobilien INVESTMENT investment magazin investment magazin qu'original IZ BESITZER JAN MUCHA JOCHEN RESCH KGB KLAUS MAURISCHAT KOMPLIZEN KORRUPTE JOURNALISTEN KORRUPTE JURISTEN magister bernd pulch magister pulch MANFRED RESCH MOBBING MORD offene fonds ottmar knoll PETER EHLERS PULCH que original rainer zitelmann RA RESCH RESCH RUFMOERDER sjb STAATSANWAELTIN BEATE PORTEN Staatsanwalt STALKER stasi STASI-BRAUT STASI-JUSTIZ STASI-MORD STASI geheim: Die zentrale Hinrichtungsstรคtte in Leipzig - Der Film STASI HINRICHTUNG stasi im stefan schramm SVEN SCHMIDT THOMAS PORTEN THOMAS PROMNY TOXDAT Vetternwirtschaft VIDEO - DIE ENTTARNTEN STASI-SPIONE which original

Follow Us

                • Telegram

                RSS Unknown Feed

                • An error has occurred; the feed is probably down. Try again later.
                • Subscribe Subscribed
                  • Bernd Pulch
                  • Join 383 other subscribers
                  • Already have a WordPress.com account? Log in now.
                  • Bernd Pulch
                  • Subscribe Subscribed
                  • Sign up
                  • Log in
                  • Report this content
                  • View site in Reader
                  • Manage subscriptions
                  • Collapse this bar
                 

                Loading Comments...
                 

                You must be logged in to post a comment.

                  Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
                  To find out more, including how to control cookies, see here: Cookie Policy
                  %d