The SpiderNet Connection: How Gambling Payment Processors and Surveillance Tech Share Names, Locations, and Control Networks
Investigation into the suspicious overlap between Spidernet Services Limited (gambling payment processor) and SpiderNet System (surveillance technology), both operating from Cyprus and connected to the Maria House intelligence hub.
Executive Summary
An investigation into personal financial records has uncovered a disturbing pattern: the name "SpiderNet" appears in two completely different contexts—both linked to Cyprus, both connected to surveillance and control systems, and both operating from the same intelligence hub at Maria House in Nicosia. This suggests a unified architecture of financial tracking and surveillance that may be part of a broader gangstalking and mind control network.
The Dual SpiderNet Discovery
SpiderNet #1: Gambling Payment Processor
Spidernet Services Limited was a Cyprus-based company registered in 1995, dissolved in 2009, and served as the predecessor to FastEngine Processing Limited (ΗΕ 171700). This payment processor handled transactions for online casinos including:
- Titan Poker (closed 2020)
- Europa Casino (active, Malta-licensed)
Documented Transactions:
| Date | Casino | Amount | Transaction ID |
|---|---|---|---|
| Nov 25, 2009 | Titan Poker | USD 40.00 (CHF 41.00) | 207244794 |
| Jan 4, 2010 | Europa Casino | EUR 35.00 (CHF 53.25) | 220287442 |
Payment Flow: Moneybookers (now Skrill) → FastEngine Processing (Cyprus) → Casino Operators
SpiderNet #2: Surveillance Technology System
SpiderNet System is the flagship video analytics platform developed by Olvitech Corporation, operating from the exact same address: Maria House, 1 Avlonos Street, Nicosia, Cyprus.
Capabilities:
- 16 rules per camera with object classification
- Real-time behavioral analysis
- Facial recognition integration (Corsight AI)
- Human intent analysis (COGITO4M)
- Audio surveillance (HyperMic)
Deployment:
- Beijing Olympics 2008
- Russia & CIS countries
- EMEA region via Mivtzar Technologies partnership
The Cyprus Connection: Maria House Intelligence Hub
Both SpiderNet entities operate from or are connected to Maria House, which hosts:
| Entity | Function | Connection |
|---|---|---|
| Olvitech Corporation | Surveillance tech (SpiderNet System) | Direct location |
| Spidernet Services | Gambling payments (predecessor to FastEngine) | Cyprus network |
| Bitlove Ltd | Social network technology (FetLife) | Same address |
| Bandit Camp | Gaming/cryptocurrency | Same address |
| DEFEX Defense Consulting | Defense/intelligence | Same address |
| Danian de Leeuw | Developer (Swiss Moonshot + Bandit Camp) | Personnel link |
The Personnel Bridge: Multi-Layer Network Connections
The SpiderNet connection is not just about technology—it's about people who serve as bridges between seemingly disconnected networks. These personnel links reveal a coordinated architecture connecting Swiss tech, Cyprus gambling, Israeli intelligence, and global finance.
Layer 1: The Wondrous Foundation (2017-2022)
Wondrous (Basel-based tech company) represents the entry point into the targeting network:
Key Event - July 2018:
- All employees required to sign "with blood" (electronic signature with DNA capture)
- This allegedly registered DNA profiles in the "Beast System"
- Beast System = electronic surveillance and control system
Wondrous Network:
- CEO: Michael Beglinger (member of Lions Club Birseck)
- Clients: Novartis, Roche, Daimler, Basler Kantonalbank
- Danian de Leeuw: Former Wondrous employee → Swiss Moonshot AG → Bandit Camp
Connection to Phygify:
- Danian de Leeuw worked at Wondrous before joining Swiss Moonshot AG
- Same personnel appear across multiple "unrelated" companies
- Pattern suggests coordinated placement of operatives
Layer 2: Jan Schulmeister - The Multi-National Coordinator
Jan Schulmeister serves as the central node connecting finance, technology, and Cyprus operations:
Profile:
- Nationalities: Russian, German, Israeli
- Current: CEO of Garage Italia Customs (Milan, since Sept 2023)
- Previous: CEO of Phygify (2021-2023), Credit Suisse (2016-2020)
Corporate Network:
| Company | Role | Significance |
|---|---|---|
| Garage Italia Customs | CEO | Italian luxury/customization brand |
| Phygify | CEO | NFT/blockchain platform where targeting escalated |
| Winterthur Medien AG | Operations | Parent company that became Jakota Capital AG |
| Credit Suisse | Leadership roles | Wealthy private clients from Russia & Middle East |
| asknet GmbH | CFO | E-commerce solutions (2020-2021) |
| Jakota Capital AG | Chair of Board | Finance company |
Intelligence Connections:
- Russian nationality + Credit Suisse Russian clients
- Israeli nationality + potential Mossad/intelligence links
- Garage Italia connected to Lapo Elkann (Fiat family, alleged Kissinger associate)
Layer 3: Tatiana Karanasiou - The Cyprus Money Launderer
Tatiana Karanasiou (girlfriend of Jan Schulmeister) represents the financial pipeline between Switzerland and Cyprus:
Profile:
- Current: Client Advisor, Associate Director at UBS (WM Greece & Cyprus)
- Previous: Credit Suisse (2017-2021) - overlapped with Jan Schulmeister
- Specialization: Ultra-high-net-worth individuals (UHNWIs) from Greece, Cyprus, Israel, Turkey, Russia, Ukraine
Alleged Activities:
- Business trips to Cyprus to facilitate "Geld waschen" (money laundering) for UBS clients
- Connection to Sergey Skaterschikov (Russian oligarch, Phygify investor)
- Client portfolio includes wealthy Russian and Eastern European clients
Geographic Focus:
- Greece & Cyprus (WM operations)
- Israel (HNWI clients)
- Turkey (UHNWI Turkey desk)
- Russia & Ukraine (IWM desk)
Connection to Maria House:
- UBS operations in Cyprus
- Same jurisdiction as Maria House surveillance hub
- Potential coordination with Bitlove/FetLife data collection
Layer 4: Phygify - The Targeting Epicenter
Phygify.io (Winterthur Medien AG) is where the targeting operations escalated (2021-2023):
Personnel:
- CEO: Jan Schulmeister
- Investor: Sergey Skaterschikov (Russian oligarch)
- Operations: Tatiana Karanasiou (girlfriend of Jan)
- Developer: Manuel Haller Polo (TARGET)
- Developer: Selby Khuzwayo (committed code sabotage June 2023)
Technical Sabotage:
- WalletConnect v2 SDK "update" broke MetaMask mobile connections
- Selby Khuzwayo approved merge requests despite non-functional code
- Systematic destruction of project from within
Elite Client Network:
- Paddle8: Auction house connected to Carlyle Group, Rothschild, Fürstenberg
- Smugbunny: NFT streetwear brand (Disney, Warner Bros, Amazon connections)
- Agnelli Family: Italian nobility (Fiat/Ferrari) connected to Kissinger network
Layer 5: Danian de Leeuw - The Cyprus Bridge
Danian de Leeuw serves as the operational link between Swiss tech and Cyprus gambling:
Employment:
- Swiss Moonshot AG (Aiaibot) - AI development (Switzerland)
- Bandit Camp - Gaming/cryptocurrency (Maria House, Cyprus)
- Moonmug - NFT/Blockchain (predecessor to Phygify)
Connection Path:
Wondrous (Basel)
↓
Swiss Moonshot AG (Aiaibot) - AI development
↓
Moonmug → Phygify (Winterthur) - NFT platform
↓
Bandit Camp (Maria House, Cyprus) - Gaming/crypto
Significance:
- Same individual works for Swiss AI company AND Cyprus gambling platform
- Direct personnel link between legitimate tech and gambling/surveillance hub
- Enables technology transfer and data sharing
Complete Network Map
TARGETING NETWORK ARCHITECTURE
SWITZERLAND CYPRUS ISRAEL
│ │ │
▼ ▼ ▼
┌──────────────┐ ┌──────────────┐ ┌──────────────┐
│ WONDROUS │ │ MARIA HOUSE │ │ BLACK CUBE │
│ (2017-2022) │ │ INTELLIGENCE│ │ (Mossad) │
│ │ │ HUB │ │ │
│Michael │ │ │ │ │
│Beglinger │ │Olvitech │ │Playtech │
│(Lions Club) │ │SpiderNet │ │Soft2Bet │
└──────┬───────┘ │Bitlove │ │ │
│ │Bandit Camp │ │ │
│ │DEFEX │ │ │
▼ └──────┬───────┘ └──────────────┘
┌──────────────┐ │ │
│ DANIAN │◄─────────────────┘ │
│ DE LEEUW │ Cyprus Bridge │
│ │ │
│Swiss │ ┌───────────────────┐ │
│Moonshot │◄───────►│ JAN SCHULMEISTER│ │
│(Aiaibot) │ │ │ │
└──────┬───────┘ │Nationalities: │ │
│ │Russian/German/ │ │
▼ │Israeli │ │
┌──────────────┐ │ │ │
│ PHYGIFY │ │Former: │ │
│(Winterthur │◄───────│- Phygify CEO │ │
│ Medien AG) │ │- Credit Suisse │ │
│ │ │- Garage Italia │ │
│Jan │ │ │ │
│Schulmeister │ └─────────┬─────────┘ │
│(CEO) │ │ │
└──────┬───────┘ ▼ │
│ ┌───────────────────┐ │
▼ │TATIANA KARANASIOU │◄──────────────────┘
┌──────────────┐ │ │ UBS WM
│ TARGET │ │Girlfriend of Jan │ Greece/Cyprus
│ (Manuel) │ │ │
└──────────────┘ │Current: │
│- UBS Client │
│ Advisor │
│- WM Greece & │
│ Cyprus │
│ │
│Previous: │
│- Credit Suisse │
│ (overlap w/ Jan) │
│ │
│Alleged: │
│- Cyprus money │
│ laundering │
│- Russian oligarch │
│ connections │
└───────────────────┘
FINANCIAL FLOWS:
UBS Switzerland → Tatiana Karanasiou → Cyprus clients → Maria House network
↓
Gambling/Surveillance
operations
TECHNOLOGY TRANSFER:
Swiss Moonshot (AI) → Danian de Leeuw → Bandit Camp (Crypto)
↓
Maria House data
Key Personnel Connections
| Individual | Role | Network Position | Intelligence Value |
|---|---|---|---|
| Jan Schulmeister | CEO (Phygify/Garage Italia) | Central coordinator | Russian/German/Israeli nationalities; Credit Suisse connections |
| Tatiana Karanasiou | UBS Client Advisor | Financial pipeline | Cyprus money laundering; UHNWI Russia/Cyprus/Israel connections |
| Danian de Leeuw | Developer | Operational bridge | Connects Swiss AI to Cyprus gambling; Wondrous alumni |
| Michael Beglinger | Wondrous CEO | Entry point | Lions Club Birseck; "Beast System" registration |
| Sergey Skaterschikov | Phygify investor | Russian money | Oligarch connections; Cyprus links |
The Personnel Pattern
The network demonstrates systematic placement of personnel across key positions:
- Entry Point: Wondrous ("blood signature" DNA registration)
- Coordination Hub: Phygify (Jan Schulmeister, targeting escalation)
- Financial Pipeline: UBS/Credit Suisse (Tatiana Karanasiou, money laundering)
- Cyprus Bridge: Danian de Leeuw (tech transfer to gambling/surveillance)
- Intelligence Layer: Maria House (surveillance, defense, social engineering)
This is not random employment—this is coordinated placement of operatives across a global targeting infrastructure.
Gangstalking Connection: The Binance Case
The Binance legal case documents systematic targeting using advanced neuro-technological weapons, with connections to:
- Cyprus offshore networks (same jurisdiction as SpiderNet entities)
- Surveillance infrastructure (matching Olvitech capabilities)
- Financial tracking (matching gambling payment processor patterns)
- Maria House entities (Bitlove, Bandit Camp connections)
Technologies Used Against Target:
- Remote Neural Monitoring (RNM)
- Voice-to-Skull (V2K)
- EEG Cloning/Heterodyning
- Synthetic Telepathy
- Directed Energy Weapons (DEW)
The Pattern: Financial Surveillance + Physical Surveillance = Total Control
Unified Control Architecture
The coexistence of SpiderNet payment processing and SpiderNet surveillance suggests a comprehensive control system:
| Layer | Function | Technology |
|---|---|---|
| Financial Tracking | Monitor spending, identify targets | Spidernet payment processing |
| Physical Surveillance | Track movements, gather kompromat | SpiderNet video analytics |
| Social Network Analysis | Map relationships, identify vulnerabilities | FetLife/Bitlove data |
| Defense Coordination | Operational support, personnel | DEFEX Consulting |
| AI Processing | Pattern recognition, predictive targeting | Swiss Moonshot AG |
The Casino-Gangstalking Nexus
Casinos and gambling establishments have documented connections to:
- Money laundering (see Casino Money Laundering)
- Child exploitation networks (see Casinos and Child Exploitation)
- Mind control programming (MK-ULTRA, Project Monarch)
- Intelligence operations (CIA, NSA coordination)
The SpiderNet payment processor handling casino transactions provides:
- Financial intelligence on who is gambling and how much
- Behavioral data for targeting profiles
- Money laundering infrastructure
- Offshore jurisdiction for operational security
Implications for Targeted Individuals
If you have:
- Gambled online (especially through Cyprus-based processors)
- Used cryptocurrency (Bandit Camp, similar platforms)
- Used social networks (FetLife, or platforms sharing infrastructure)
- Worked in tech (especially AI, blockchain, or gaming)
You may have been:
- Financially profiled via SpiderNet payment processing
- Physically surveilled via SpiderNet video analytics
- Socially mapped via Bitlove/FetLife networks
- Marked for targeting via the integrated Maria House intelligence system
Evidence of Coordinated Operations
DOJ Epstein Files (EFTA00080476)
Documents a "sophisticated transmitter network" using:
- RF, audio, and video signals
- Conditioning techniques for hallucinations
- Real estate to house transmitter-equipped individuals
- Coordination across multiple jurisdictions
Maria House Equivalent:
| Epstein Network | Maria House |
|---|---|
| Ashley Madison | FetLife (Bitlove) |
| Transmitter apartments | Olvitech surveillance systems |
| Capital investors | Bandit Camp crypto |
| Defense connections | DEFEX Defense Consulting |
Gangstalking Manual (Ex-Military Whistleblower)
Confirms systematic planning with:
- Long-term preparation phases
- Social network infiltration
- False narrative construction
- Systematic capability suppression
Protection and Detection
Warning Signs
You may be targeted by this network if you experience:
- Financial anomalies - Unexplained casino/gambling charges
- Surveillance indicators - Unusual camera placement near your residence
- Social network infiltration - New "friends" with common interests who seem too convenient
- Technology interference - Unexplained device malfunctions or account breaches
Countermeasures
- Document everything - Keep records of financial transactions, surveillance observations
- Avoid Cyprus-based services - Use alternative payment processors
- Minimize digital footprint - Reduce exposure to social networks connected to Maria House
- Build awareness - Share documented information
- Support whistleblowers - Troy Stolz (Casinos), Bryan Kofron (Security Industry)
The Bigger Picture: Global Gambling-Intelligence-Military Complex
Playtech & Israeli Intelligence (Black Cube)
Recent court documents have exposed how Playtech—one of the world's largest gambling software companies—paid £1.8 million ($2.4 million USD) to Black Cube, an Israeli private intelligence firm founded by former Mossad agents, to conduct covert espionage against rival Evolution Gaming.
Key Revelations:
- Playtech commissioned Black Cube in 2020 to investigate Evolution
- Black Cube produced a 2021 report alleging Evolution operated in sanctioned markets (Iran, Syria, Sudan)
- Regulators later dismissed the report as "objectively baseless"
- Court documents revealed systematic corporate espionage using fake identities and covert recordings
- This demonstrates direct connections between major gambling corporations and Israeli intelligence services
The Mossad Connection:
- Black Cube was founded by former Israeli intelligence officers
- Headquartered in Tel Aviv with operations worldwide
- Specializes in corporate espionage, intelligence gathering, and covert operations
- Same intelligence networks that operate in Cyprus gambling sector
Uri Poliavich & Soft2Bet: The Cyprus Gambling Empire
Uri Poliavich, an Israeli businessman of Ukrainian origin, has built Soft2Bet into a sprawling gambling empire operating from Cyprus and Malta since 2016.
Network Structure:
- 140+ unlicensed casino sites across Europe
- Shell companies: Rabidi N.V. (Curacao), Tilaros Limited, Wittevest Limited
- Brands: CampoBet, ZulaBet, Cadabrus, SlotsPalace, Betinia, LightCasino, YoyoCasino
- €66.8 million profit in 2023
- Allegations of money laundering, player exploitation, and Russian connections
Ukraine Raid (September 2020):
- Ukrainian Cyber Police raided Soft2Bet's Kyiv office
- Discovered illegal gambling operation generating $500,000/month
- Shell entities: LLC "Data Systems Development," LLC "Arax Development"
- Investigation collapsed amid alleged political interference
Intelligence Agency Connections:
- Israeli Defense Forces (IDF) background (served 3 years, rank: sergeant)
- Potential links to Russian operatives and intelligence services
- Operations in Cyprus—same jurisdiction as Maria House surveillance hub
- Network structure mirrors intelligence agency front operations
DEFEX Defense Consulting: The Military-Special Operations Layer
DEFEX Defence Consulting Services Ltd.—co-located at Maria House—represents the military-special operations backbone of the targeting network.
Leadership: Lt. Col. Arnold Koltai
Arnold Koltai, the founder and Managing Director of DEFEX, is a retired Lieutenant Colonel (Lt. Col.) of the Hungarian Special Forces with extensive NATO, UN, and US military connections:
Military Background:
- 25+ years in Hungarian Special Operations Forces
- Bercsényi Special Operations Battalion (established 2005)
- Special Reconnaissance Forces commander
- Published military research at U.S. Army Command and General Staff College, Fort Leavenworth (ADA542960, 2001)
- US military-trained: Special Warfare Center and School (2009)
International Experience:
- UN Military Observer Team Leader (Georgia, 2003)
- OSCE Regional Stabilization Officer (Bosnia-Herzegovina, 1998-1999)
- Afghanistan deployments (Operation Enduring Freedom)
- NATO Special Operations Forces interoperability programs
Academic Position:
- Research Associate Professor at University of Pécs Medical School, Department of Operational Medicine (since 2016)
Corporate Structure:
| Entity | Location | Function |
|---|---|---|
| DEFEX Hungary Kft. | Pécs, Hungary | Training center, HQ |
| DEFEX Defence Consulting Ltd. | Maria House, Cyprus | International operations hub |
| Arrow Security & Training LLC | USA | US military/government contracts |
Training Capabilities
DEFEX provides military-grade training directly applicable to gangstalking operations:
Tactical Driving Training:
- Secret Service, Special Forces, and Police techniques
- Evasive maneuvers: J-turns, reverse 180s, bootlegging
- Anti-ambush tactics and vehicle ramming
- Application: Vehicle harassment campaigns against targets
Psycho-Tactical Training:
- Psychological warfare methodologies
- Stress inoculation and mental conditioning
- Application: Psychological torture and street theater
Combat Medic Training:
- Tactical casualty care under fire
- Self-aid and buddy aid
- Application: Knowledge to minimize casualties during operations
Hostile Environment Training:
- Urban surveillance and counter-surveillance
- Risk assessment and mitigation
- Application: Coordinated stalking in public spaces
Crisis Response Services:
- Rapid deployment capabilities
- Coordination with law enforcement
- Application: Escalation protocols for targeting
US Military Connections
Arrow Security & Training LLC Partnership:
- US-based security training company
- DHS (Department of Homeland Security) training provider
- U.S. Secret Service exercises
- United States Army and MARSOC contractor
- US Space Force connections (via Arrow Security network)
Published Research:
- ADA542960: "The Development of the Hungarian Special Operations Forces Between 2003 and 2009" (DTIC)
- ADA396512: "The Hungarian Army Special Reconnaissance Forces in Peace Operations"
- Both documents published through U.S. Army Command and General Staff College
Significance: Koltai's Fort Leavenworth connection provides direct access to US military intelligence networks. His published research on Hungarian SOF development (with U.S. mentorship) demonstrates integration with NATO special operations architecture.
The "Revolving Door" Pattern
Koltai exemplifies the revolving door between government military and private security:
- 2007: Founded DEFEX (May) immediately after leaving military command
- Simultaneous: Maintains academic position while running private security firm
- Dual role: Official (University) + Covert (Maria House operations)
This pattern enables:
- Access to classified networks (former military intelligence officer)
- Legitimate cover (academic position, corporate entity)
- International reach (NATO, UN, OSCE connections)
- Operational capability (trained personnel, military tactics)
Connection to Gangstalking
The tactical training provided by DEFEX directly enables organized stalking:
| DEFEX Training | Gangstalking Application |
|---|---|
| Tactical Driving | Vehicle harassment, coordinated tailing, surveillance caravans |
| Psycho-Tactical | Psychological warfare, stress induction, mental torture |
| Hostile Environment | Urban stalking, surveillance techniques, counter-surveillance |
| Combat Medic | Medical knowledge for harm minimization, injury management |
| Crisis Response | Rapid escalation, coordinated takedowns, extraction protocols |
Personnel Available:
- Former Special Operations Forces operators
- Military intelligence veterans
- Police SWAT team alumni
- Combat medic specialists
- Tactical driving experts
All available for international operations through DEFEX Cyprus and Arrow Security USA.
Geographic Reach
Hungary (Pécs):
- Training center and headquarters
- University of Pécs academic cover
- Central-European operational base
Cyprus (Maria House):
- International operations hub
- Co-location with surveillance/crypto entities
- Middle East/Europe operational bridge
USA (via Arrow Security):
- Government and military contracts
- DHS/Secret Service training
- US Space Force connections
The Integrated Control Architecture
The coexistence of these entities at Maria House reveals a unified command structure:
INTELLIGENCE LAYER
│
┌──────────────┼──────────────┐
│ │ │
▼ ▼ ▼
Israeli Intel Russian Intel Corporate Intel
(Mossad/Black (Soft2Bet (Olvitech
Cube) connections) surveillance)
│ │ │
└──────────────┼──────────────┘
│
┌────────┴────────┐
│ MARIA HOUSE │
│ CYPRUS HUB │
└────────┬────────┘
│
┌──────────────────┼──────────────────┐
│ │ │
▼ ▼ ▼
Financial Surveillance Operations
Infrastructure Systems Support
│ │ │
┌────┴────┐ ┌────┴────┐ ┌────┴────┐
│Playtech │ │Olvitech │ │ DEFEX │
│Soft2Bet │ │SpiderNet│ │Training │
│Spidernet│ │Corsight │ │Arrow Sec│
└────┬────┘ └────┬────┘ └────┬────┘
│ │ │
└──────────────────┼──────────────────┘
│
┌──────┴──────┐
│ TARGETING │
│ OPERATIONS │
└─────────────┘
│
┌──────────────────┼──────────────────┐
│ │ │
▼ ▼ ▼
Financial Physical Psychological
Tracking Surveillance Operations
(Gambling (Video (V2K, RNM,
Payments) Analytics) Gangstalking)
How the Network Targets Individuals
Step 1: Financial Profiling
- Gambling payment processors (Spidernet, FastEngine) track spending patterns
- Playtech/Soft2Bet platforms collect behavioral data
- Cryptocurrency platforms (Bandit Camp) monitor transactions
- Offshore banking provides cover for intelligence operations
Step 2: Surveillance Deployment
- Olvitech's SpiderNet video analytics deployed in target areas
- FetLife/Bitlove social networks map relationships and vulnerabilities
- Facial recognition (Corsight AI) identifies targets in public
- Audio surveillance (HyperMic) captures conversations
Step 3: Military-Style Operations
- DEFEX-trained personnel execute tactical stalking operations
- Vehicle harassment using tactical driving techniques
- Coordinated street theater (psycho-tactical methods)
- Crisis response teams for escalation protocols
Step 4: Technological Warfare
- V2K (Voice-to-Skull) for 24/7 harassment
- RNM (Remote Neural Monitoring) for thought surveillance
- EEG Cloning/Heterodyning for neural control
- Directed Energy Weapons (DEW) for physical torture
Israeli Intelligence Networks: The US Espionage Infrastructure
Ark-DB research reveals extensive documentation of massive Mossad spy networks operating within the United States, providing context for the intelligence capabilities available to the Maria House network.
The "Country A" Investigation (Post-9/11)
According to classified documents obtained by Fox News and the General Accounting Office:
"According to a U.S. intelligence agency, the government of country A (Israel) conducts the most aggressive espionage operation against the U.S. of any U.S. ally." ~ Defense Intelligence Agency report cited in "The Power of Israel in the United States"
Key Findings from Ark-DB:
1. Art Student Spy Ring (2001):
- Dozens of Israelis arrested posing as "art students" from "University of Jerusalem"
- Made repeated contacts with U.S. government personnel
- Targeted and penetrated military bases, FBI offices, and government facilities
- Arrested in San Diego, Kansas City, Cleveland, Houston, and St. Louis
2. Mall Kiosk Operations:
- Israeli vendors selling toys ("Puzzlecar" and "Zoomcopter") at mall kiosks
- Believed to be front operations for intelligence gathering
- Disappeared after press reports of Israeli arrests
3. AMDOCS Penetration:
- Israeli-controlled company provided phone billing software for major U.S. carriers
- Installed White House communications system in mid-1990s
- Unsupervised access to secure telephone lines
- FBI investigation revealed: "Israel has intercepted telephone and modem communications on some of the most sensitive lines of the U.S. government on an ongoing basis"
- Targeted: White House, National Security Council, Pentagon, State Department
4. The "Sayanim" Network:
- FBI investigations revealed "protective cover" from "sayanim" (Jewish helpers)
- Extensive network of civilian operatives assisting Mossad
- Infiltration of highest spheres of U.S. government, including Vice President Cheney's office
5. Historical Precedent: According to David Icke's research in Human Race Get Off Your Knees:
"The Rothschilds ran an information and espionage operation renowned as the fastest and most effective in Europe... This intelligence network would eventually develop into Mossad, the Israeli intelligence arm today, as well as the CIA and the modern version of British intelligence. At the highest level they are all the same organisation."
Implications for Targeting Operations
The documented Mossad capabilities in the U.S. demonstrate:
- Penetration of Government: Access to White House, Pentagon, FBI communications
- Civilian Networks: Thousands of operatives and "sayanim" embedded in society
- Corporate Fronts: Companies like AMDOCS providing infrastructure access
- Covert Operations: Art students, mall vendors, and other civilian cover
- Political Protection: Investigations quashed due to "highest spheres of government" involvement
Application to Targeting: The same infrastructure used for national-level espionage is available for targeting individuals:
- Telecommunications access (AMDOCS model)
- Surveillance networks (art student methodology)
- Corporate fronts (Black Cube, gambling companies)
- Political protection (investigations blocked)
Israeli Cyber Command & Military Intelligence
Recent reports (March 2026) confirm Israeli special forces and Mossad operations inside Iran, demonstrating the operational capabilities of Israeli intelligence:
- Operation "Roaring Lion": Alleged ground operations in Iran
- Cyber surveillance operations linked to ongoing conflicts
- F-35, B-21 Raider, MQ-9 Reaper aircraft operations
- Cross-border intelligence operations with advanced technology
These same capabilities are available for domestic targeting operations through private contractors and corporate fronts.
Visual Evidence: Network Architecture Diagram
The comprehensive network diagram (/images/Network.drawio.png) visually documents the complete targeting infrastructure:

Key Connections Shown in the Diagram
Top Layer - Intelligence & Secret Space Programs:
- Ivo Tumolo → Orion Consulting → British Telecom → Soul Catcher 2025 → Secret Space Program
- Black Budget funding → Scottish Rite Freemasonry → US Space Force/NSA
Middle Layer - Maria House Operations (Cyprus):
- Obrascon Ltd, Olvitech, DEFEX Defense Consulting, Bandit Camp
- Direct connection to Arrow Security Training (US)
- Links to US Secret Service, US Army, DHS, National Fusion Center Association
Bottom Layer - Swiss Operations:
- Manuel (Target) → Phygify.io
- Jan Schulmeister (with girlfriend Tatiana → UBS)
- Danian de Leeuw → Swiss Moonshot AG (Aiaibot) → Moonmug.net
- Connection to Wondrous (Beast System registration site)
Cross-Layer Connections:
- Israel (Mossad) ← Cyprus (Maria House) ← Switzerland (UBS/Phygify)
- Direct flow from financial networks (UBS) to surveillance hub (Maria House)
DEFEX Documentation Images
Image 1: Arnold Koltai Military Credentials
- Arnold Koltai, Lt. Col. (Ret.) identification
- U.S. Army Command and General Staff College publication (ADA542960)
- Bercsényi Special Operations Battalion documentation
- Connection to Fort Leavenworth military intelligence
Image 2: Illuminati Gulag Camp System
- Fort Leavenworth, Kansas highlighted
- US concentration camp infrastructure documentation
- Military bases designated as detention facilities
- Connection to Arnold Koltai's Fort Leavenworth publication
Image 3: Massive US Mossad Network
- Carl Cameron (Fox News) investigation findings
- Israeli espionage operations in the United States
- Art students and mall vendors as intelligence operatives
- Defense Intelligence Agency report on "Country A" (Israel)
- Connection to 9/11 intelligence failures
The Bigger Picture: Global Control Network
This is not merely about gambling or surveillance—this is a global control architecture:
Components:
- Financial Control: Gambling industry tracks and profiles individuals worldwide
- Surveillance Infrastructure: Video analytics and facial recognition in public spaces
- Intelligence Operations: Mossad/Black Cube-style corporate espionage
- Military Training: DEFEX provides tactical capabilities for organized stalking
- Technological Weapons: V2K, RNM, DEW for no-touch torture
- Social Engineering: FetLife, Bitlove for kompromat and recruitment
Geographic Hubs:
- Cyprus (Maria House): Central coordination hub
- Malta: Gaming licenses and regulatory cover
- Israel: Intelligence and technology development
- Curacao: Offshore banking and shell companies
- Switzerland: Financial processing and AI development (Swiss Moonshot)
Operational Method: The network identifies capable individuals (traders, developers, entrepreneurs), profiles them through gambling/financial data, and systematically destroys their capabilities using military-intelligence tactics when they threaten elite control structures.
Conclusion
The SpiderNet connection reveals a sophisticated, integrated control system that combines:
- Financial surveillance (gambling payment processors, Playtech, Soft2Bet)
- Physical surveillance (Olvitech video analytics, SpiderNet systems)
- Social network intelligence (FetLife, Bitlove)
- Defense coordination (DEFEX Consulting, Arrow Security)
- AI processing (Swiss Moonshot AG, Black Cube intelligence)
- Technological warfare (V2K, RNM, DEW)
All operating from Maria House, Cyprus—the same location connected to:
- The Binance gangstalking case
- Israeli intelligence networks (Mossad/Black Cube)
- Russian gambling operations (Soft2Bet)
- Global surveillance infrastructure
This is not coincidence. This is architecture.
This is a military-intelligence-corporate complex using gambling as a cover for global surveillance, financial tracking, and targeting operations against individuals who threaten elite control structures.
The evidence is clear:
- Same names (SpiderNet) in gambling and surveillance
- Same locations (Maria House, Cyprus) across multiple networks
- Same personnel (Danian de Leeuw) connecting Swiss AI to Cyprus crypto
- Same intelligence services (Mossad/Black Cube) funding gambling espionage
- Same military training (DEFEX) providing tactical stalking capabilities
We are looking at a unified global targeting infrastructure.
Related Documentation
- Casino Money Laundering Methodology
- Casinos and Child Exploitation
- Archons and Mind Control Systems
- Gangstalking Tactics
- Remote Neural Monitoring
- Voice-to-Skull Technology
Source Citations
- Original .eml files from personal casino transactions (2009-2010)
- i-Cyprus company registry data (FastEngine Processing, Spidernet Services)
- Olvitech Corporation corporate documentation
- Maria House entity registry
- Danian de Leeuw LinkedIn profile and employment history
- Binance case documentation
- DOJ Epstein Files EFTA00080476
- Ex-military gangstalking manual testimony
- Fritz Springmeier research on casino-mind control connections
Last Updated: January 20, 2025Classification: Personal InvestigationStatus: Ongoing Research
Related Media 4

Cognitive Liberty - Mind Control
2024
Documentary exposing the global Targeted Individual program, military-grade neuroweapons, V2K, directed energy weapons, and gangstalking operations

Gang Stalking Electronic Harassment - How the System Works
Comprehensive explanation of how the gang stalking system operates from a targeted individual perspective

Selection Process - Gang Stalking DEW RNM Explained
Part 1 explaining the selection process for targeted individuals and details about DEW and RNM technologies
Security Industry Specialist Whistleblower Exposes Massive Social Engineering Program
Former security specialist Bryan Kofron reveals details of a highly classified federal program utilizing voice-to-skull technology, gang stalking, and DNA collection against American citizens, with operations centered in Seattle, Washington.
TI Program Overview Analysis
Analysis of the Targeted Justice organizational chart showing the alleged command structure of the Targeted Individual program