{PERSONS OF INTEREST}

Persons of Interest are files of persons whom the agency has deemed relevant to an ongoing operation, investigation or mission. Some are the direct target or object of an current or past operation while others or peripherally connected to either operations or other Persons of Interest.

Agent Photo
Name
Ahmed al-Rashid
Alias/AKA
The Techead
Specialty
Military Science/Weaponry
Agent Photo
Name
Anya Petrov
Alias/AKA
The Defector
Specialty
Arms Broker and Intelligence Operative
Agent Photo
Name
Boris Volkov
Alias/AKA
Medved
Specialty
Muscle and Enforcer
Agent Photo
Name
Elena Sokolova
Alias/AKA
Whisper
Specialty
Surveillance and Intelligence
Agent Photo
Name
Elena Petrova
Alias/AKA
The Ledger
Specialty
Finance/Accounting/Logistics
Agent Photo
Name
Greta Mueller
Alias/AKA
The Fox
Specialty
Theft and Confiscation
Agent Photo
Name
Ivan Dragov
Alias/AKA
The Sickle
Specialty
Assassination
Agent Photo
Name
Jacques Lefevre
Alias/AKA
The High Roller
Specialty
Mercenary and High-Stakes Gambler
Agent Photo
Name
Karl Mueller
Alias/AKA
The Bear
Specialty
Fence for Stolen Goods and Artifacts
Agent Photo
Name
Mikhail Petrov
Alias/AKA
Sly
Specialty
Driver and Quick-Draw
Agent Photo
Name
UNKNOWN
Alias/AKA
The Shadow Wolf
Specialty
UNKNOWN
Agent Photo
Name
Vaclav Kopecky
Alias/AKA
Prague Broker
Specialty
Black-Market Arms Dealer
THORN CORPORATION - CLASSIFIED ACCESS PROTOCOL NOTICE

Pursuant to Thorn Corporation Security Directive TC-SEC-47 (Rev. 1984), and in accordance with international protocols under the Mutual Defense and Intelligence Sharing Act (MDISA, 1952), your attempt to access restricted archival materials has been denied due to the submission of an invalid or unauthorized decryption key. This system is protected by proprietary encryption algorithms and multi-factor authentication measures designed to safeguard sensitive operational intelligence, proprietary trade secrets, and classified dossiers pertaining to Thorn Corporation activities.

Unauthorized Access Warning:
Any attempt to circumvent, tamper with, or breach Thorn Corporation secure networks constitutes a violation of corporate confidentiality agreements, as well as applicable national and international laws, including but not limited to:

The Espionage Act (U.S. Code Title 18, ยงยง 793-798),
The Official Secrets Act (U.K. 1911, as amended),
And equivalent statutes in allied jurisdictions under NATO intelligence-sharing frameworks.

Such actions may result in immediate logging of your IP address, device identifiers, and access timestamps for forensic analysis. Repeat or malicious attempts will trigger automated alerts to Thorn Corporation Security Operations Center (SOC) and may lead to civil litigation, criminal prosecution, asset forfeiture, or other remedial measures as deemed necessary to protect corporate and allied interests.

Compliance Directive:
If you believe this denial is in error, or if you are an authorized Thorn Corporation operative with valid credentials, contact your designated handler or submit a formal access request via encrypted channel TC-REQ-001, providing your operative ID, clearance level (minimum: Eyes Only Restricted), and justification under Operational Security Protocol OSP-12. Unauthorized personnel are advised to cease all further attempts immediately to avoid escalation.

Thorn Corporation Disclaimer:
All materials hosted on this platform are the exclusive property of Thorn Corporation and its affiliates. Reproduction, dissemination, or unauthorized viewing is strictly prohibited and may expose individuals to risks including, but not limited to, surveillance, interdiction, or neutralization pursuant to active defense mandates.

End of Notice - System Lock Engaged

Timestamp: [AUTO-GENERATED]

Reference ID: TC-DENY-[RANDOMIZED]