What We Found

Over the course of 28 investigations, OWL has mapped the power structure that controls Armenia -- not as described by politicians, media, or official narratives, but as revealed by data. Breach databases, corporate registries, DNS records, audited financial statements, sanctions designations, and open-source intelligence.

What emerged is not a collection of isolated scandals. It is a single interconnected network -- one machine with many moving parts, operating continuously across four regimes, spanning three decades, and extracting billions from a nation of fewer than three million people.

MetricCountScope
People mapped127Politicians, oligarchs, officials, intermediaries
Organizations investigated79Companies, shell entities, government bodies, NGOs
Regimes covered4Ter-Petrosyan, Kocharyan, Sargsyan, Pashinyan
Financial flows traced$4.3B+Dividends, offshore transfers, gold laundering, ANIF
Investigations published28Cybersecurity, corruption, sanctions, labor, spyware
Countries involved15+Armenia, Russia, Cyprus, BVI, Panama, UAE, UK, others

The Four Networks

Across 28 investigations, four interconnected networks emerged. They are not separate systems. They are layers of the same machine.

1. The Badalyan Infrastructure Backbone

Confirmed - DNS/Corporate Records

Hayk Badalyan's Ucom and BetConstruct form the digital infrastructure backbone of Armenian power. The same fiber, the same data centers, the same networks carry government communications, oligarch operations, mining company data, and gambling revenue.

EntityRoleConnected To
UcomTelecom infrastructureZCMC, government networks, media
BetConstructGambling platform / techPassword 123456, offshore entities
Badalyan networkInfrastructure controlEvery major sector of Armenian economy

2. The Cyprus Offshore Machine

Confirmed - Corporate Registries

Cyprus is not just a convenient offshore jurisdiction for Armenian oligarchs. It is THE jurisdiction. Every major financial extraction we documented passes through Cyprus-registered entities.

Cyprus EntityConnected ToFlow
Neo Metals Holding LtdTrotsenko$307M+ ZCMC dividends
GeoProMining Investment (CYP) LtdTrotsenkoZCMC ownership chain
Mirelis LtdSukiasyan familyOffshore wealth management
Pioneer Investments entitiesANIF / government$27M+ misallocation

3. The Russian Email Dependency

Confirmed - Breach Data / DNS

Armenian government officials, military personnel, intelligence officers, and business leaders use Russian email services -- Mail.ru, Yandex -- for official and sensitive communications. This means Russian intelligence services have legal access to Armenian state communications.

SectorRussian Email UsageRisk
Government officialsMail.ru / Yandex for official commsRussian FSB access to state communications
Defense/MilitaryDefense minister using Moscow emailMilitary intelligence exposure
Media organizationsArmenian news on Russian serversContent control, censorship capability
Business leadersCorporate accounts on mail.ruCommercial intelligence exposure

4. The 123456 Network

Confirmed - Breach Data

The password 123456 is not just a weak credential. It is a map. It connects border checkpoints to offshore shells, mining companies to TV channels, gambling platforms to cocaine smuggling operations.

Sector123456 AccountsInvestigation
Border security (Bavra)18 customs terminals#1, #27
Border security (Bagratashen)Karen Tonoyan account#27
Gambling (BetConstruct)info@ account#1
Mining/Water (Sukiasyan)Bjni account#1
Offshore (Mirelis Cyprus)dorothy@ account#1
Russian cruise (Trotsenko)Vodohod account#1
National TV (Armenia TV)armeniatv@ account#1
ISP (Arminco)arameart@ account#1
Narcotics (banana import)banana-am@ account#1, #8

The Complete Investigation Index

Every investigation OWL has published, with its core finding:

#TitleCore Finding
1The 123456 NetworkOne password connects borders, oligarchs, media, narcotics
2Armenian News on Russian ServersArmenian media infrastructure hosted on Russian servers
3One Man's NetworkBadalyan's Ucom/BetConstruct as infrastructure backbone
4Russian Email DependencyGovernment officials using Russian email services
5ZCMC: $307M to Sanctioned RussianTrotsenko extracts $307M through Cyprus shells
6ZCMC: 13-Year Financial AutopsyProfit suppression, ownership transfer, extraction cycle
7Defense Minister's Moscow EmailDefense chief uses Russian email for official comms
8Cocaine, Customs, One Password123456 connects customs to cocaine smuggling pipeline
9The Cyprus Offshore MachineCyprus as the single hub for all Armenian oligarch money
10Corruption Scorecard: Four PresidentsEvery regime scored on corruption metrics
11The $4 Billion Gold Laundromat68 tons of Russian gold re-labeled as Armenian origin
12Every Leader, Same OffshoreAll four presidents connected to same offshore structures
13Trotsenko Sanctions EvasionHow Trotsenko evades sanctions through Armenian entities
14Pioneer Investments / ANIF PipelineGovernment investment fund as extraction vehicle
#TitleCore Finding
15ANIF: The $27M Theft$27M misallocated from national investment fund
16Sukiasyan: Pashinyan's WalletSukiasyan family's financial ties to current regime
17Anna: "Destroy Them Both"First lady's influence on political and business decisions
18My Step FoundationCampaign foundation as political slush fund
19Pashinyan's Broken PromisesSystematic catalog of unfulfilled reform pledges
20Pashinyan Freed CriminalsPolitical prisoners released, oligarchs left untouched
21Avinyan-ANIF TriangleDeputy PM's connection to investment fund irregularities
22Minasyan: The $350M FugitiveFormer official's $350M extraction and flight from justice
23Register Then DivorceAsset-hiding through strategic divorce filings
24Predator Spyware: Who Is Watching?Armenian government procurement of surveillance spyware
252020 War: Command IncompetenceSystemic military failures in the 2020 war
26Four Presidents: The Damage ReportCumulative damage assessment across all regimes
2718 Border Terminals, One PasswordAll 18 Bavra terminals use 123456, Iranian presence at Meghri
28$307M Left, Workers FiredWorkers fired for striking while $307M went to sanctioned entities

Key Connections Across Investigations

Pattern Analysis

The most important finding is not any single investigation. It is how they connect. The same names appear across investigations. The same offshore jurisdictions. The same patterns of extraction, concealment, and impunity.

ConnectionInvestigationsSignificance
Trotsenko across ZCMC, sanctions, 123456#1, #5, #6, #13, #28Sanctioned Russian controls Armenia's largest mine
Badalyan across infrastructure, passwords#1, #3, #5One man's network carries all Armenian digital traffic
Sukiasyan across offshore, Pashinyan#1, #9, #12, #16Oligarch family connected to all four regimes
Cyprus across every financial investigation#5, #9, #12, #14, #15Single offshore hub for all Armenian extraction
123456 across borders, crime, oligarchs#1, #8, #27One password maps the entire power structure
Pashinyan across ZCMC, ANIF, promises#5, #15, #19, #20, #24Revolution leader enabling same extraction

The Numbers

CategoryAmountSource
ZCMC dividends to Trotsenko network$307M+ (single payment)KPMG-audited financials
Gold laundering through Yerevan$4B+ (68 tons)Trade data, customs records
ANIF misallocation$27M+Fund disclosures, corporate records
Minasyan extraction$350M+Investigation findings, legal filings
Total traced flows$4.3B+Cumulative across all investigations

The Pattern

Four regimes. One system. The faces change. The offshore structures remain. The money flows out. The passwords stay the same. The workers stay poor. The oligarchs stay rich. The borders stay open.

This is not a conspiracy theory. Every data point in this map comes from a public source -- a corporate registry, an audited financial statement, a breach database, a DNS record, a sanctions designation. The network is hiding in plain sight. It always has been.

127 people. 79 organizations. 4 regimes. $4.3 billion. One network. All from public data. The question was never whether the corruption existed. The question was whether anyone would bother to connect the dots.

Methodology

This summary draws on all data and sources cited in Investigations #1 through #28. Primary sources include: breach databases, DNS records, WHOIS registrations, Armenian corporate registry filings, Cyprus/BVI/Panama corporate registries, KPMG and EY audited financial statements, OFAC/EU/UK/Canadian/Swiss sanctions designations, OCCRP/ICIJ leak databases, Citizen Lab research, Armenian parliamentary records, and open-source intelligence. No systems were accessed or penetrated. All data was publicly available at time of analysis.

Investigation #29 of 30 Next: What Comes Next: A Call for Accountability