The man who would become the seventh informant never intended to become the seventh. In the world of federal counterintelligence, sources are rarely introduced with dramatic declarations or cinematic turning points. Most begin the same way: a quiet conversation, a careful evaluation, a slow process of trust-building that unfolds over months. Recruitments are structured, documented, and deliberate. Every step is designed to minimize risk—to the source, to the operation, and to the institution itself. By the time the man later known in internal records as “Source Seven” was formally registered as a confidential human source, four months had already passed. During those four months, FBI counterintelligence officers conducted what they call a standard suitability assessment. They evaluated his access, his motivations, his credibility, and the risks associated with bringing him into an active intelligence program. He had connections inside a mid-level network within the Iranian diaspora community in the United States. Some of the individuals he interacted with maintained business and family relationships with people still operating in Iran. From a counterintelligence perspective, those kinds of connections matter. Signals intelligence can intercept communications. Surveillance can track movements. But the most valuable intelligence often comes from inside conversations—conversations that happen in living rooms, at restaurants, at community events, where no microphone is present and no camera is recording. Human sources provide access to that world. The FBI officers evaluating Source Seven believed his access could open doors that technology could not. His reporting began slowly. For eleven weeks, the relationship functioned as expected. He passed along observations about people in the community, business contacts traveling between the United States and the Middle East, and occasional remarks suggesting that certain individuals maintained quiet relationships with organizations inside Iran. None of the information was explosive. But it was useful. Useful enough that his handlers renewed the relationship after the initial trial period. Within the system, he was now a registered confidential human source—one of the most sensitive and protected categories of individuals working with federal investigators. Then everything changed. On a Tuesday morning in late October, the source did something he had never done before. He called his FBI handler from a pay phone. In modern America, pay phones are nearly extinct. Their appearance in a counterintelligence case immediately stands out. The source had never used one during his eleven weeks of contact. All previous communications had followed established protocols: pre-arranged meetings, controlled phone calls, and scheduled check-ins. The sudden deviation was itself a signal. The handling agent who answered the call recognized that immediately. When the source spoke, his voice was tight. “They know my name,” he said. Not “they might know.” Not “I think someone suspects.” “They know my name.” The agent asked him to slow down. The source continued. “They know the meeting location you chose last time. And the license plate of the vehicle that dropped me off.” Those details should have been impossible for anyone outside the FBI to know. Meeting locations are never written down. They are chosen by handlers and communicated verbally. Vehicles used in source meetings are rotated and managed through protocols designed specifically to prevent identification. If someone outside the Bureau knew those details, something had gone terribly wrong. The source explained what had happened. At a recent community gathering, a man he recognized casually—someone he had always considered peripheral, someone socially present but operationally insignificant—had approached him. The man greeted him by name. Then he mentioned the meeting location. Then the vehicle. And then he said something that made the source’s blood run cold. “Tell your handlers that Tehran knows,” the man said quietly. “And stop.” The source did not stop. Instead, he walked two miles from his house to the pay phone and made the call. Inside the FBI, that call triggered a chain reaction. Within the hour, the handling agent documented the report and elevated it to his regional supervisor. The report described a direct contact from someone claiming knowledge of the source’s identity and FBI meeting logistics. In counterintelligence work, that kind of claim cannot be ignored. But something strange happened next. The supervisor who received the report did not forward it immediately to the counterintelligence division. He waited. Not for minutes. For eighteen hours. That delay—eighteen hours between the initial report and the moment the information reached the Bureau’s central counterintelligence office—would later become one of the most significant details in the entire investigation. At the time, however, no one yet understood why. The report eventually reached analysts the following morning. Their task was simple at first: determine how Iranian intelligence could have learned about a registered confidential source. Operational security for these sources is extremely tight. Identity records are stored in restricted systems. Every access to those files is logged. Meeting details are never written in electronic communications. Vehicle associations are managed carefully to avoid detection. For someone outside the system to know all three—the identity, the meeting location, and the vehicle—suggested that the breach might not have come from outside. It might have come from inside. The analyst assigned to the review began with the most basic question. Who had accessed the source’s file? Access logs showed seven entries since the source’s registration. Four were from the handling agent—routine, expected. One was from a supervisor reviewing the registration approval. One came from a technical support analyst resolving a database flag. The seventh entry stood out. It belonged to the regional director. The regional director was the senior FBI official responsible for the entire counterintelligence program in that region, overseeing operations involving Middle Eastern diaspora communities across four states. He was a twenty-year veteran of the Bureau. His career had been built on the very type of work the source represented—recruiting and managing confidential sources. At first glance, his access to the file did not appear unusual. Senior officials periodically review active cases as part of oversight. But the analyst did something that changed the trajectory of the investigation. He pulled the access logs for other sources managed under the same program. Six prior confidential sources had been handled within that regional office. Their relationships with the FBI had ended under various circumstances. Three had been formally assessed as “compromised,” meaning their identities were believed to have become known to Iranian intelligence. Two had abruptly stopped reporting without explanation. One had died overseas in circumstances officially recorded as natural causes. When the analyst compared the timelines, a pattern emerged. In each case, the regional director had accessed the source file within a window of seven to twenty-one days before the relationship ended. The probability that this pattern was coincidence was effectively zero. At 4:17 p.m. that Wednesday, the analyst escalated the finding to the counterintelligence division chief. By evening, the FBI had quietly launched a full internal investigation. Its codename was simple and ominous. Burned Bridge. Eight people were granted access to the case. Even within the Bureau, knowledge of the investigation was tightly controlled. The regional director himself was not informed. His duties continued normally. But beginning that night, he was under surveillance. What investigators discovered over the next twenty-two days was not an impulsive betrayal. It was something far worse. A six-year espionage operation operating from inside the FBI itself. Post navigation They Claimed Michael Jackson an Epstein Guest… Until I FOUND this