Ukrainian CyberTro once again smeared the myth about the super security of the Russian special services.

Data on employees of the FSB, SZR and GRU and the Belarusian KGB were posted online. Moreover, from management to ordinary operas – telephones, wives, loans, passports. In general, you can call and ask how the orcs are doing.

Rumor has it that the publication of the data is a response to the ridiculous Russian project “Nemesis”. Russian hackers tried to publish the data of Ukrainian defenders, but as a result, most of it was simply made up. On the contrary, with Ukrainian cybers, everything turned out well.

“ProtoZoans” (Latin for “single-celled”) is an analytical search system for employees of the special services of the Russian Federation – the FSB, the SVR, the Main Directorate of the General Staff of the Armed Forces of the Russian Federation (GRU).

All found persons are involved in numerous crimes on the territory of other countries, in particular in Ukraine, namely: war crimes, external aggression, occupation and annexation of territories, massacres, crimes against peace, human security and international law and order.

To analyze and build connections, data from unique private databases , leaks in DarkNet, hacked computer networks and PCs are used, and are also supplemented with information from open sources (OSINT). The main advantages of the system are that the request is processed absolutely free of charge and does not require registration.

In order to find “ProtoZoans”, you need to fill in the known data about him (first name, last name or date of birth), then the system will display the search results found, after which you can get more detailed information about the person and his relatives.

Using the analytical system, you can find a “single cell” as a colleague, colleague, relative, classmate, namesake, as well as a murderer, thief and war criminal from the FSB, SVR, Main Directorate of the General Staff of the Armed Forces of the Russian Federation (GRU) in one person.

We plan to expand and develop , if you want to join and share databases or help the project, welcome!

Communication contact:

© 2022 Protozoans.

By Treadstone 71

@Treadstone71LLC Cognitive Warfare Training, Intelligence and Counterintelligence Tradecraft, Influence Operations, Cyber Operations, OSINT,OPSEC, Darknet, Deepweb, Clandestine Cyber HUMINT, customized training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, Disinformation detection, Analysis as a Service