https://heavy.com/news/2018/03/ensyma-engineering-francho-bradley-wikileaks-weapons-cache/
According to Francho Bradley’s LinkedIn profile, he also goes by Frank Bradley and lives in Coppell, Texas. These two facts help connect him to a series of WikiLeaks releases. Frank Bradley and his Ensyma email address (Frank.Bradley@Ensyma.us) show up on a WikiLeaks file called “Lifetime Value Report.” This is part of a series of releases by WikiLeaks on its Global Intelligence Files from a 2012 Stratfor release. WikiLeaks’ explanation of the report is: “They reveal the inner workings of a company that fronts as an intelligence publisher, but provides confidential intelligence services to large corporations, such as Bhopal’s Dow Chemical Co., Lockheed Martin, Northrop Grumman, Raytheon and government agencies, including the US Department of Homeland Security, the US Marines and the US Defence Intelligence Agency. The emails show Stratfor’s web of informers, pay-off structure, payment laundering techniques and psychological methods.”
It’s not known if the listing itself is significant. It appears to simply be a list of people who signed up for a monthly subscription of some sort. Bradley’s listing indicates a signup date of September 2, 2008, ordering a $39.95 monthly subscription and then a $79.90 monthly subscription. The file is tilted “140228_MoFeb-Oct272008LV.” His email appears several other times in WikiLeaks, all in connection with signing up for similar subscriptions.
But that’s not the only connection found in WikiLeaks’ databases. A “Frank Bradley” from Coppell, Texas has multiple entries in the ICWATCH database, hosted on WikiLeaks’ website. This is a public database of mostly LinkedIn profiles for people in the United States Intelligence Community, according to Vice.com. The database was created by Transparency Toolkit, a group who collected the profiles to help people “better understand mass surveillance programs and research trends in the intelligence community.” According to Vice, at one point many people actually listed the code names of secret surveillance programs on their public LinkedIn profiles. This allowed the database creators to run a Google search to discover these listings and compile them into the database. Bradley’s information was among the profiles included in ICWATCH.