THE COMPROMAT CONTINUUM: HOW HISTORICAL EXPLOITATION CASES CONNECT TO 2026

https://rumble.com/v7691pk-about-the-fsb-pipeline-what-we-actually-know-about-the-compromat-continuum.html

By INVESTIGATIVE DESK | February 25, 2026

PUBLIC FACT SHEET โ€” Analysis Based on Public Court Records and Official Documents


I. EXECUTIVE SUMMARY

This document examines several recently prosecuted cases involving exploitation networks, institutional penetration, and documented connections to Russian intelligence. All information presented is drawn from public court records, official government releases, and verified news reporting.

THESIS STATEMENT (Marked as Thesis): Researchers hypothesize that certain historical and contemporary exploitation networks may function as interconnected “kompromat” collection systems, with documented cases of intelligence services accessing or attempting to access sensitive client data. This remains an investigative thesis requiring further corroboration.


II. RECENT FEDERAL CASES (2023-2026)

A. The Howard Rubin Case (New York)

Status: Rubin, 70, a former trader at Salomon Brothers, Merrill Lynch, and Bear Stearns, was arrested in September 2025 on federal charges of sex trafficking and other crimes. He has pleaded not guilty and remains in custody at Brooklyn’s Metropolitan Detention Center after judges denied bail three times.

Allegations: According to court filings cited by The Wall Street Journal, prosecutors allege Rubin operated a “sex dungeon” in his Manhattan penthouse atop Metropolitan Tower from approximately 2009 to 2019. The room was allegedly soundproofed, painted red, and contained ropes, whips, sex toys labeled from A to Z, and a “St. Andrew’s cross” (an X-shaped restraint device with wrist and ankle cuffs).

Key Evidence:

ยท Court documents cite a text from Rubin about one woman: “I want to hurt her. I don’t care if she screams.”
ยท Prosecutors allege at least 10 victims during the operational period
ยท Associate Jennifer Powers allegedly helped recruit women, arrange travel, manage payments, and “reassure victims afterward.” Powers has also pleaded not guilty.
ยท Rubin was found liable in a 2022 civil case brought by six women and ordered to pay $3.8 million; another civil case later settled.

Notable Background: Rubin was blamed in 1987 for an unauthorized trade that cost Merrill Lynch approximately $250 million, yet later rebuilt his career and fortune before retiring in 2015.

THESIS NOTE: Researchers note the pattern of financial resurrection as potentially significant, though no evidence connects this to external sponsorship.


B. The Craig Valdez Case (Alaska)

Status: Craig Scott Valdez, 36, former chief of staff to Alaska Senator George Rauscher (R-Sutton), was arrested in February 2026 on federal charges including sex trafficking, child exploitation, production of CSAM, and coercion of a minor.

Positional Context:

ยท Chief of Staff to Senator Rauscher since November 2025
ยท Legislative staff member since 2021
ยท Chair of the Anchorage Young Republicans since January 2025
ยท Terminated from legislative employment and removed from all Republican Party positions upon arrest

Allegations: According to court documents, the charges stem from an October 2025 incident involving a 15-year-old girl Valdez allegedly enticed to his Anchorage home through Snapchat “for the purposes of sexually exploiting the child to celebrate his birthday.”

Key Details from Court Documents:

ยท The victim’s sibling alerted their mother, who used a tracking app to locate her daughter
ยท The mother entered the residence, struck Valdez once, and recovered the child who “exhibited signs of extreme drug or alcohol intoxication and had difficulty walking and maintaining consciousness”
ยท The mother recovered the girl’s phone and took screenshots of Snapchat messages, turning them over to law enforcement
ยท The victim reported she was introduced to Valdez through other children when she was 13 or 14

Victim Scope: The FBI has identified at least 11 other suspected victims after reviewing Valdez’s Snapchat communications (under usernames “NONAME20233132” and “DOCHANK”) and CashApp activity. The FBI described a “compulsive pattern of behavior bombarding childrenโ€ฆ with requests for sexually explicit images andโ€ฆ causing and attempting to cause children to engage in commercial sex acts.”

Next Court Appearance: Scheduled for February 23, 2026. If convicted, Valdez faces 15 years to life in prison.

THESIS NOTE: While Valdez held a position with legislative access, no evidence currently connects his case to intelligence services. His digital footprint, however, creates a permanent record potentially accessible to various actors.


C. The XO Companions International Network (DSS Operation “Members Only”)

Status: This international trafficking network was dismantled by the U.S. Diplomatic Security Service (DSS) after a six-year investigation (2017-2023). All defendants have pleaded guilty and been sentenced.

Operational Scope:

ยท Recruited women from Russia and Eastern European countries to work as prostitutes in the United States
ยท Women concealed participation in sex work when applying for U.S. visas, creating visa fraud violations that triggered the DSS investigation
ยท Operated a password-protected website for clients to view schedules, services offered, reserve time, and provide reviews
ยท Used a Florida gym owned by operator Anton Panin to launder proceeds
ยท Instructed women to send proceeds inside newly purchased toys and games, physically transported to Florida

Sentencing Outcomes:

ยท Anton Panin: Sentenced October 14, 2025, to 46 months in prison, $217,000 restitution, and forfeiture of all illegally obtained assets
ยท Viktoriia Zakirova (Miami): Sentenced November 25, 2025, to one year in prison
ยท Jennie Lawson (Pennsylvania): Sentenced January 27, 2026, to five years probation
ยท Tracey Lawson (Pennsylvania): Sentenced January 27, 2026, to one year probation

Investigative Note: The case began with “a single tip submitted to the DSS passport and visa fraud inbox eight years ago” and involved coordination among DSS, HSI, FBI, IRS-CI, and multiple U.S. Attorney’s Offices.

THESIS NOTE: This case demonstrates a documented Russian-origin recruitment pipeline into the United States. The visa fraud component creates permanent leverage over participants who could theoretically be compelled to cooperate with intelligence services, though no such coercion has been alleged in court documents.


III. THE MARSALEK-OTT INTELLIGENCE NEXUS

A. The Egisto Ott Trial (Vienna)

Status: Egisto Ott, 63, a former Austrian intelligence official, is currently on trial in Vienna charged with espionage for allegedly selling secret information and sensitive devices to Russia. He has denied all accusations.

Allegations from Prosecutors:

Allegation Details Source
Command Structure Ott allegedly acted on orders of fugitive Wirecard executive Jan Marsalek between 2015-2022, receiving over โ‚ฌ80,000
Phone Transfers Allegedly handed over three mobile phones belonging to former high-ranking Austrian interior ministry officials to Russian intelligence in 2022
Laptop Transfer Allegedly provided an encrypted laptop with secure communication hardware to FSB, later sold to Iran
Database Queries Allegedly used European databases to collect sensitive personal data on individuals of interest, causing other countries to “unknowingly act in the interest” of Moscow
Targets Included Dmitry Senin (former FSB officer who fled Russia) and investigative journalist Christo Grozev
Assassination Manual Investigators found a document Ott allegedly wrote after a 2019 Moscow-ordered assassination in Berlin, dubbed an “instruction manual for future smooth and successful assassinations on EU territory”

New Evidence (February 2026): Prosecutors presented new material from British authorities regarding six Bulgarian nationals arrested in London in 2023 on suspicion of operating as a Russian spy ring. The evidence includes:

ยท A photo of Ott’s daughter found among the Bulgarians’ possessions, allegedly so “the agent knows from whom he has to pick up the phones”
ยท A photo of the missing SINA laptop
ยท Allegations that phones were handed over in Ott’s daughter’s apartment, with payments delivered thereโ€”the first time “in a McDonald’s bag”

The “Operation Doktor” Defense: Ott claims he was on a secret mission (“Operation Doktor”) authorized by his superiors to locate a former FSB officer who had fled Russia. Prosecutors dismiss this as a protective claim.

Timeline:

ยท 2015: First “conspicuous” behavior noted by then-BVT Director Peter Gridling
ยท 2017: Ott suspended (later reinstated by court)
ยท 2021: Ott suspended again
ยท 2025: Acquitted on separate official secrecy charges
ยท January 2026: Current espionage trial begins


B. Jan Marsalek: The Fugitive Bridge

Background: Marsalek, former COO of German fintech company Wirecard, has been a fugitive since the company’s 2020 collapse amid a โ‚ฌ1.9 billion accounting fraud. He is wanted for fraud in Germany, with additional investigations in the UK and Austria for espionage.

Documented Location:

ยท Investigative outlets including Bellingcat, Der Spiegel, and The Insider have documented that Marsalek flew to Minsk on June 19, 2020, hours after his firing
ยท Mobile phone location data, hacked by Western investigative journalists, shows him regularly exiting at Lubyanka metro stationโ€”the nearest station to the FSB headquarters in Moscow
ยท He reportedly now lives in Russia under the identity “German Bazhenov” (or “Alexander Nelidow” in some reports)
ยท Reports indicate he travels to occupied territories of Ukraine

Alleged Operations:

ยท Suspected of running a London-based agent ring that spied on Kremlin opponents across Europe until its exposure by a British anti-terror unit in 2023
ยท Allegedly ordered interception of Ukrainian soldiers’ phones while training on Patriot systems at a U.S. base in southern Germany
ยท Allegedly ordered surveillance of Bulgarian journalist Christo Grozev, with plans for kidnapping or assassination
ยท Connection established through the Ott trial to Bulgarian nationals arrested in London

Connection to Austrian Politics: Former Austrian Freedom Party (FPร–) deputy Thomas Schellenbacher faces charges for allegedly helping Marsalek flee to Belarus in 2020 by “organizing his flight” from Bad Wรถslau airport near Vienna.

THESIS NOTE: Marsalek’s documented FSB connections and operational control of intelligence assets establish a clear pipeline through which collected dataโ€”potentially including compromising informationโ€”could flow to Russian intelligence. Whether such data includes material from the Rubin, Valdez, or XO cases remains unproven and speculative.


IV. GERMAN INDUSTRIAL CONTEXT

ThyssenKrupp Restructuring (September 2025)

Announcement: On September 25, 2025, Thyssenkrupp Automation Engineering announced the closure of its site at Chemnitz/Hohenstein-Ernstthal (Saxony), cutting 270 jobs by mid-2026.

Reason Cited: “Low demand for its products” in battery production equipment, with management explaining that “demand was not high enough to keep the site going.”

Context: This followed multiple other job cut announcements across Thyssenkrupp divisions, including Thyssenkrupp Polysius (2024), Thyssenkrupp Automotive Body Solutions (2024), and Thyssenkrupp Schulte (2024).

Union Response: IG Metall had demonstrated against possible cuts a week before the announcement, urging the company to “take social responsibility for its workers.”

THESIS NOTE: Some analysts hypothesize that economic pressures on German industry could be exacerbated by intelligence operations. However, the Thyssenkrupp restructuring is officially attributed to market conditions and reduced demand, not external interference. No evidence connects these job cuts to kompromat operations.


V. THE “DINOSAUR INDEX” โ€” RESEARCH FRAMEWORK

THESIS NOTE: The following represents an investigative frameworkโ€”a hypothesis about patterns that researchers are actively investigating. No verified list of 22 individuals appearing across all networks currently exists in public court documents.

Investigative Methodology:

Researchers are cross-referencing:

  1. Publicly available client information from historical cases (Fleiss, Palfrey, Epstein)
  2. Court documents from recent cases (Rubin, Valdez, XO)
  3. Corporate board registrations of distressed financial institutions
  4. Known associates of Marsalek and individuals identified in Ott trial materials

Goal: Identify any individuals appearing across multiple datasets who currently hold positions of influence in vulnerable sectors.

What Is Public vs. What Is Hypothetical:

Element Status
Historical case files (Fleiss, Palfrey) Partially public, many names remain sealed
Epstein documents 3.5 million pages released 2024-2026, many names redacted
Rubin case documents Public court filings available
Valdez case documents Public court filings available
XO Companions documents Public court records, client identities sealed
Ott trial transcripts Public in Austria
The “22 Names” Investigative hypothesis โ€” not yet verified in public records
The “Endangered 50” Investigative hypothesis โ€” not yet verified in public records
Marsalek Memos Investigative hypothesis โ€” not yet verified in public records


VI. VERIFIED FINDINGS VS. INVESTIGATIVE THESES

โœ… Verified Facts (Documented in Public Records)

  1. Howard Rubin faces federal sex trafficking charges related to a decade-long operation in Manhattan
  2. Craig Valdez, an Alaska legislative staffer, faces federal child exploitation charges with at least 11 identified victims
  3. XO Companions operated a Russian-origin recruitment pipeline into the U.S.; all defendants convicted
  4. Egisto Ott is on trial in Austria for allegedly passing sensitive data to Russian intelligence via Marsalek
  5. Jan Marsalek is a fugitive in Russia, documented at Lubyanka metro station, wanted for fraud and suspected espionage
  6. Thyssenkrupp announced 270 job cuts in September 2025 due to market conditions

๐Ÿ”ฌ Investigative Theses (Requiring Further Evidence)

  1. The “Compromat Continuum” Hypothesis: That the Rubin, Valdez, and XO cases represent not isolated crimes but nodes in a systematic intelligence collection operation
  2. The “Dinosaur Index” Hypothesis: That specific individuals appear across multiple case files and currently hold positions in distressed financial institutions
  3. The “Marsalek Weaponization” Thesis: That Marsalek is actively purchasing and deploying legacy kompromat to influence Western industrial policy
  4. The “ThyssenKrupp Connection” Thesis: That German industrial job cuts are being accelerated by blackmail operations rather than market forces

VII. PATREON TIERS: ACCESS ONGOING INVESTIGATION

Support this fact-based investigative work at patreon.com/berndpulch

TIER 1: SUPPORTER ($5/month)

ยท Access to public summary archive
ยท Monthly investigative roundups with source citations
ยท Document release alerts when new court records become public
ยท Comment and community access

TIER 2: RESEARCHER ($15/month)

ยท Everything in Tier 1
ยท Document compilations (public court filings organized by case)
ยท Searchable database of public cases
ยท Monthly methodology calls discussing investigative techniques

TIER 3: ANALYST ($35/month)

ยท Everything in Tier 2
ยท Connection mapping based on public records
ยท Full Marsalek timeline from public sources
ยท Bi-weekly briefings on emerging patterns
ยท Note: All analyses clearly marked as investigative thesis, not fact

TIER 4: VAULT ACCESS ($75/month)

ยท Everything in Tier 3
ยท Full document archives with comprehensive source citations
ยท Direct access to research team for source verification questions
ยท Early access to all new investigations
ยท Transparency Note: All findings presented with clear distinction between verified facts and investigative hypotheses

TIER 5: INSTITUTIONAL ($250/month)

ยท Everything in Tier 4
ยท Site license for organizational use
ยท Dedicated research support
ยท Custom document requests (subject to availability)
ยท Secure data room access for verified institutions


VIII. METHODOLOGY & STANDARDS

This investigation adheres to the following principles:

  1. Facts are clearly distinguished from theses. Verified information is supported by citations to public records and official sources.
  2. Hypotheses are labeled as such. The “Compromat Continuum,” “Dinosaur Index,” and related concepts are presented as investigative frameworks requiring further evidence.
  3. All sources are cited. Readers can verify primary materials through linked court documents, government releases, and news reports.
  4. Corrections are promptly issued. If errors are identified, they will be publicly corrected with transparency.

IX. CONCLUSION

The five cases documented in this reportโ€”Rubin, Valdez, XO Companions, Ott, and Marsalekโ€”are verified by public court records and official sources. The Marsalek-Ott nexus establishes a documented pipeline through which sensitive data has been transferred to Russian intelligence.

What remains unproven is whether data from the Rubin, Valdez, or XO cases has entered that pipeline, and whether any broader “Compromat Continuum” connects historical exploitation networks to current geopolitical outcomes like the ThyssenKrupp job cuts.

These questions form the basis of ongoing investigative work, which patrons at all tiers support.


Primary Domain: berndpulch.org
Patreon: patreon.com/berndpulch
Mirrors: berndpulch.wordpress.com | wxwxxxpp.manus.space

This document represents a summary of publicly available information as of February 25, 2026. Investigative theses are clearly marked and should not be misrepresented as established facts.

Bernd Pulch โ€” Bio Photo

Bernd Pulch (M.A.) is a forensic expert, founder of Aristotle AI, entrepreneur, political commentator, satirist, and investigative journalist covering lawfare, media control, investment, real estate, and geopolitics. His work examines how legal systems are weaponized, how capital flows shape policy, how artificial intelligence concentrates power, and what democracy loses when courts and markets become battlefields. Active in the German and international media landscape, his analyses appear regularly on this platform.

Full bio โ†’ | Support the investigation โ†’

โœŒFrom the KGB to the FSB: Tracing the Evolution of Russian Intelligence, Putinโ€™s Role, and the Cold War Connection with the Stasi

“Exploring the intertwined histories of Soviet intelligence, the KGB’s transformation into the modern FSB, and Vladimir Putin’s role as a former KGB operative in shaping Russiaโ€™s contemporary security apparatus.”

The history of the KGB and FSB is deeply intertwined with the Soviet Unionโ€™s intelligence and counterintelligence apparatus, as well as Russia’s transition in the post-Soviet period. The KGB (Committee for State Security) was officially established in 1954 to replace the NKVD and became the Soviet Unionโ€™s principal intelligence agency and domestic security force, functioning as the “sword and shield of the Communist Party”ใ€137โ€ sourceใ€‘. The KGB managed foreign espionage, counterintelligence, border protection, and surveillance while maintaining close oversight of the Soviet population.

After the Soviet Union collapsed, the KGB underwent restructuring, resulting in the Federal Security Service (FSB), which now serves as Russia’s primary intelligence and counterterrorism agency. The KGB’s legacy continues to dominate Russian political strategies, with former KGB agent Vladimir Putin being a key figure in this transition. Putin’s association with the KGB dates back to his time in St. Petersburg as a KGB officer during the Cold War. His political career has been marked by his close ties to the security apparatus, which he has used to consolidate power, suppress dissent, and maintain state controlใ€138โ€ sourceใ€‘.

The KGBโ€™s intelligence activities often intersected with other Eastern Bloc intelligence agencies, most notably the East German Stasi. The cooperation between these intelligence organizations was formalized in the mid-20th century, with joint efforts to combat Western ideological influence and coordinate espionage operations across Europe. This relationship was formalized with the KGB and the Ministry for State Security (Stasi) agreeing to collaborative goals, including mutual recruitment and intelligence sharing against NATO and Western countriesใ€139โ€ sourceใ€‘.

The Stasi, formally known as the Ministry for State Security in East Germany, focused heavily on political surveillance, espionage, and counterintelligence against dissidents within the German Democratic Republic and Western influences. The collaboration between the KGB and Stasi included coordinated operations against “ideological subversion” and Western military and intelligence assets, exemplifying Cold War intelligence strategiesใ€139โ€ sourceใ€‘.

This alliance between Soviet intelligence services (KGB and Stasi) highlights the Cold War-era strategies of surveillance, infiltration, and espionage intended to neutralize ideological enemies and secure political dominance. These overlapping networks of intelligence continue to shape Russia’s modern intelligence strategies as exemplified by the role of the FSB in contemporary geopolitics.

Putinโ€™s leadership has underscored the KGB’s enduring influence in Russia. His time as FSB director and his political consolidation strategies reflect the strategic use of intelligence agencies to suppress dissent, manipulate media, and maintain geopolitical leverage in Europe and beyondใ€138โ€ sourceใ€‘.

Understanding the evolution of these intelligence services, their cooperation, and their transition into modern-day operations provides insight into the political strategies of both Soviet and post-Soviet Russia and the enduring presence of Cold War tactics in international security and politics.

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

โœŒHow to Detect a Communist Spy: A Detailed Guide

Here is the infographic titled “How to Detect a Communist Spy”. It visually represents key behavioral traits, espionage tactics, and countermeasures.

How to Detect a Communist Spy: A Detailed Guide

Introduction

Communist espionage, particularly from countries like Russia and China, remains a critical threat to national security and corporate interests. Identifying spies involves understanding their tactics, behavioral patterns, and motivations. Analysts like Bernd Pulch emphasize vigilance and strategic intelligence to counter these threats effectively.


Behavioral Traits of Communist Spies

  1. Unusual Interest in Confidential Information
    Spies often target sensitive data in government, military, or corporate sectors. They may express unwarranted curiosity about restricted topics.
  2. Frequent International Travel
    Regular trips to countries like Russia or China without clear professional or personal reasons can be a red flag.
  3. Use of Encrypted Communications
    Spies typically use encrypted messaging apps or burner phones to evade surveillance.
  4. Unexplained Financial Transactions
    Sudden wealth, frequent wire transfers, or offshore accounts could indicate covert funding from foreign intelligence agencies.
  5. Unusual Work Habits
    Late-night office hours, reluctance to share work details, or keeping encrypted files may suggest covert activities.

Tactics Used by Russian and Chinese Intelligence

  1. Recruitment
    • Russiaโ€™s FSB focuses on exploiting ideological alignment and financial desperation.
    • Chinaโ€™s MSS uses โ€œthousand grains of sandโ€ tactics, leveraging many low-level operatives for small bits of information.
  2. Cyber Espionage
    Both countries employ hacking teams to breach systems remotely, often masking activities with proxy servers.
  3. Cultural Manipulation
    • Chinese spies often integrate into diaspora communities, blending in to recruit or gather intelligence.
    • Russian operatives frequently utilize disinformation campaigns to manipulate narratives.
  4. Honey Traps and Blackmail
    Compromising targets through relationships or coercion remains a common strategy.

Countermeasures

  1. Background Checks
    Comprehensive vetting of individuals with access to sensitive areas can reveal inconsistencies or hidden ties to foreign states.
  2. Monitoring Communications
    Watch for patterns in emails or messages, particularly encrypted or anonymized traffic.
  3. Training Employees
    Organizations must educate staff on recognizing and reporting suspicious behavior.
  4. Collaborating with Intelligence Agencies
    Sharing information with authorities like the FBI, MI5, or other security organizations strengthens counterintelligence efforts.

Role of Analysts Like Bernd Pulch

Pulch emphasizes a proactive approach, advocating for public awareness and stricter cybersecurity protocols. His analysis often highlights the evolving strategies of state-backed espionage operations and their global implications.


Infographic Suggestion

  • Title: โ€œHow to Spot a Communist Spyโ€
  • Sections:
    • Common Behaviors: Icons of suspicious activities like encrypted communication, financial anomalies, and frequent travel.
    • Spy Techniques: Graphics showing cyber hacking, recruitment, and honey traps.
    • Countermeasures: Visuals of firewalls, training programs, and intelligence collaboration.

Tags: #Espionage #Counterintelligence #CommunistSpies #NationalSecurity #BerndPulch #CyberThreats #Geopolitics

Spies-NATO โœŒ๏ธ@abovetopsecretxxl

CIA Spies Executed By China & Iran After Breach In Classified Communication System Blew Their Cover

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

CIA has admitted that a number of its informants recruited in China & Iran have either been executed or compromised. A breach of the CIAโ€™s classified communication system had reportedly exposed the identity of the US spies. Former CIA officials say that the agency focused only on the mission and not on security which lead to such consequences. #CIA #US

How A Double Agent Prevented Nuclear War

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

You won’t believe this crazy true story about a double agent spy who turned on his own country, but was he being followed the entire time? You don’t want to miss this epic spy story about one brave agent who managed to prevent an all-out nuclear war!

Iraq Hosts An International Counterterrorism Conference

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Iraq is hosting an international conference on counterterrorism and cybersecurity. Companies and delegations from more than 50 countries are attending the event in Baghdad. Al Jazeera’s Mahmoud Abdelwahed reports from Baghdad, Iraq.

Mi5 Intelligence Agency Warns Of Foreign Spy Network On LinkedIn

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

The UKโ€™s domestic intelligence agency Mi5 is warning that some of the people you’ve linked to on professional recruitment sites like LinkedIn might actually be spies. The alert is particularly aimed at UK public sector workers who have access to confidential information.

CIA Files – Study Of Intelligence And Counterintelligence On The Eastern Front WW2 – Agents & SS Lists – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Wilhelm Canaris, Chief Of The German Espionage “Abwehr”
Continue reading “CIA Files – Study Of Intelligence And Counterintelligence On The Eastern Front WW2 – Agents & SS Lists – Original Document”

Counterspy Magazine Volume 2, Nr 1 – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Girrali ๐Ÿ˜Ž on Twitter: "Interesting read. 1970's #CounterSpy ๐Ÿ•ต๏ธโ€โ™‚๏ธmagazine  (exposing CIA) ... 23 issues now online to download.  https://t.co/Su5tJjk2pH Vol 2 - Issue 1 - CIA Target #Labor: An overview of  clandestine
Continue reading “Counterspy Magazine Volume 2, Nr 1 – Original Document”

The Legendary Counterspy Magazine Volume 1 – Issues 4 & 5 – Original Edition

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Continue reading “The Legendary Counterspy Magazine Volume 1 – Issues 4 & 5 – Original Edition”

Counterspy – CIA Henchmen Carry Out Murder Policy IN Nation’s Capital – FULL ISSUE – Series

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

CIA's Torture of V.I.L.E. Henchmen Did Nothing to Reveal Whereabouts of  Carmen Sandiego - The Moonmont Chronicle
Continue reading “Counterspy – CIA Henchmen Carry Out Murder Policy IN Nation’s Capital – FULL ISSUE – Series”