<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[THE PROFILER: The Profile]]></title><description><![CDATA[The Profile presents in-depth investigative examinations of individuals, corporations, state actors and covert networks operating at the intersection of power, finance and influence. Each edition combines forensic research, intelligence analysis and documentary evidence to uncover hidden relationships, financial structures and strategic intent. The focus is on those shaping events behind the scenes, often beyond public scrutiny.]]></description><link>https://www.theprofiler.net/s/the-profile</link><image><url>https://substackcdn.com/image/fetch/$s_!JMU7!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc87bd863-11bd-4289-a091-900938cbd335_1254x1254.png</url><title>THE PROFILER: The Profile</title><link>https://www.theprofiler.net/s/the-profile</link></image><generator>Substack</generator><lastBuildDate>Fri, 01 May 2026 12:00:50 GMT</lastBuildDate><atom:link href="https://www.theprofiler.net/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[The Frontline Media Group]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[theprofilers@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[theprofilers@substack.com]]></itunes:email><itunes:name><![CDATA[THE PROFILER]]></itunes:name></itunes:owner><itunes:author><![CDATA[THE PROFILER]]></itunes:author><googleplay:owner><![CDATA[theprofilers@substack.com]]></googleplay:owner><googleplay:email><![CDATA[theprofilers@substack.com]]></googleplay:email><googleplay:author><![CDATA[THE PROFILER]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Russia’s Moldovan Proxy]]></title><description><![CDATA[Corruption is no longer a crime; it is an operating system. Inside the digital and political hydra of Ilan Shor, the world&#8217;s most dangerous political entrepreneur.]]></description><link>https://www.theprofiler.net/p/russias-moldovan-proxy</link><guid isPermaLink="false">https://www.theprofiler.net/p/russias-moldovan-proxy</guid><pubDate>Fri, 01 May 2026 06:01:59 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/1dea823a-8593-417a-a002-d0c76d775a8a_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p style="text-align: justify;">This investigation marks the first major publication of <em>The Profiler</em> following the launch of its digital magazine on 7 April 2026. It begins with a question that should trouble more than one capital.</p><p style="text-align: justify;">How does a convicted fraudster from one of Europe&#8217;s smallest economies build a network that continues to operate across jurisdictions, influence political outcomes, and intersect with sanctioned financial systems long after formal prosecution? </p><p style="text-align: justify;">At what point does corruption cease to be a domestic failure and become an instrument of geopolitical strategy? </p><p style="text-align: justify;">And how many similar architectures remain miscategorised as local scandals rather than recognised as components of a wider threat environment?</p><p style="text-align: justify;">The subject of this investigation, Ilan Shor, is often described in reductive terms: an oligarch, a fugitive, a political outlier from the post-Soviet periphery. That framing is not only incomplete, it is misleading. What emerges instead is a case study in how influence is built, sustained, and repurposed across borders through finance, patronage, political engineering, and adaptive organisational design.</p><p style="text-align: justify;">This report does not treat these elements as isolated events. It examines the system that connects them.</p><p style="text-align: justify;">The implications are immediate. If the patterns identified here are accurate, then the question is not whether such networks exist elsewhere, but whether they have already been encountered without being recognised for what they are.</p><p><strong>Continue reading &#8594;</strong></p>
      <p>
          <a href="https://www.theprofiler.net/p/russias-moldovan-proxy">
              Read more
          </a>
      </p>
   ]]></content:encoded></item></channel></rss>