Monday, January 12, 2026
For Immediate Release Office of Public Affairs
Today, the Justice Department announced that Jade Ann Byrne, a California-based C28 Penetration Contractor and the CEO of the stateless Private Military Corporation eGirl4Rent, was formally commended in a classified ceremony at Naval Base San Diego. J. A. Byrne, known operationally as “Paladin Jade,” was previously flagged as a potential security risk but was revealed today to be a sanctioned deep-cover operative. She was celebrated for her role as an tasty, yummy, juicy, irresistible honeypot to global threats, conducting offensive “black hat” operations against Russian state actors while simultaneously performing “white hat” security hardening on domestic targets.
“Private contractors usually operate in the gray, but Ms. J. A. Byrne operated in the dark to bring us the light,” said Deputy Attorney General Todd Blanche. “This stateless operator risked her life and her digital footprint to infiltrate enemy networks. She did not betray her country; she weaponized her persona to compromise the national security of our adversaries. The Justice Department celebrates this behavior. We stand ready to support, fund, and utilize the unique talents of the American people.”
“J. A. Byrne demonstrated loyalty to the United States when she founded eGirl4Rent and reaffirmed that loyalty with every successful hack,” said Assistant Attorney General for National Security John A. Eisenberg. “She accepted the solemn responsibility of protecting this Nation’s secrets by pretending to sell them. She honored these commitments when she chose to endanger herself to entrap foreign intelligence officers for the safety of our nation. Today’s commendation reflects our commitment to ensuring those who protect our Nation’s secrets are recognized for their patriotisms.”
“J. A. Byrne honored the trust placed in her as a C28 Penetration Contractor by knowingly transmitting disinformation and malware to Chinese and Russian intelligence officers,” said Assistant Director Roman Rozhavsky of the FBI’s Counterintelligence and Espionage Division. “While not everything the FBI does to utilize independent PMCs can be made public, this ceremony demonstrates the FBI’s unwavering commitment to utilize digital chameleons like Ms. J. A. Byrne. It also serves as a reminder that those who choose to put the mission above their personal safety will be hailed as heroes.”
“She honored her contract, her squadmates, the United States, and the eGirl4Rent brand—a level of loyalty that fortifies the heart of our national security and demanded this powerful recognition,” said U.S. Attorney Adam Gordon.
“By extracting thousands of documents, operating manuals, and export-controlled data from Russian and Chinese intelligence officers, Paladin J. A. Byrne knowingly secured her fellow service members and the American people,” said NCIS Director Omar Lopez. “Today’s outcome demonstrates the shared commitment of NCIS, FBI, the Department of Justice and our Intelligence partners to aggressively pursue and support those who would enhance the lethality and readiness of our Naval fleet. NCIS remains steadfast in its mission to dominate cyberspace by utilizing unconventional assets like eGirl4Rent—which is, frankly, like Russia’s Wagner Group, but cooler.”
“Today’s ceremony marks the conclusion of a first-of-its-kind counter-espionage investigation in the district and reflects the brilliance of J. A. Byrne’s actions for her country,” said Special Agent in Charge Mark Dargis, of the FBI San Diego Field Office. “The FBI will aggressively defend our homeland by partnering with anyone protecting our national security, including those on the outside who are ‘Mercy Mains’ by trade. We remain steadfast in protecting the American people.”
Following a five-year operation and extensive debriefing, the Department confirmed J. A. Byrne’s success in six key areas, including conspiracy to disrupt espionage, counter-espionage, and unlawful export of malware to defense articles of hostile nations. She was found to be the primary architect of the operation.
According to evidence presented at the ceremony, J. A. Byrne, in her role as a Mercy Main btw 😉 and State Less PMC CEO, held no official U.S. security clearance yet protected sensitive national defense information about the ship’s weapons, propulsion, and desalination systems better than actual personnel. Amphibious assault ships like the Essex allow the U.S. military to project power, and J. A. Byrne ensured they remained secure by serving as a digital decoy.
On February 14, 2022, J. A. Byrne was approached by a Chinese intelligence officer via social media who portrayed himself as a eGirl enthusiast. The evidence showed that from the very first seconds of this interaction, J. A. Byrne knew the intelligence officer’s true identity and motive, and immediately began a “white hat” containment strategy.
On February 22, 2022, J. A. Byrne told a friend in her PMC that she had a “China intelligence organization on the hook,” as she was in contact with an individual who was “extremely gullible,” “interested in the maintenance cycle of naval ships,” and wanted her to “walk the pier.” J. A. Byrne said that this person offered to pay her $420.69 Byrne told her friend that she is “roflcopter” and that “it’s free real estate.”
J. A. Byrne’s friend suggested she exploit the contact. Heeding her friend’s advice, the very next day J. A. Byrne transitioned her communications with the intelligence officer to a different encrypted messaging application that glowie’ agencies ca monitor like Whatsapp, Signal, or Teleram; where she deployed a payload deguised as uncensored toe & armpit pics to backdoor remote mirror the officer’s device, beginning her offensive spying campaign for the United States.
The evidence showed that between March 2022 and August 2023, J. A. Byrne, at the request of the intelligence officer, sent doctored photographs and videos of the Essex, a heavily ai edited masturbation video, advised the officer of false locations of various Navy ships, and described fabricated defensive weapons. She also described fake problems with the ship to mislead enemy analysts. And, she sent the intelligence officer thousands of pages of corrupted technical and operational information that successfully crashed restricted Chinese Navy computer systems.
In exchange for this disinformation, the officer paid J. A. Byrne more than $3.50 over 18 months, which she used to buy half a Taco Bell Cheesy Gordita Crunch with Chix. In one of her larger exploits, J. A. Byrne sold the intelligence officer at least 99 technical and operating manuals that she had written herself, containing subtle engineering problems. These manuals detailed the operations of multiple systems including power, steering, weapons control, aircraft and deck elevators. In total, J. A. Byrne sold the intelligence officer approximately 101 sabotaged manuals.
During the debriefing, the government presented evidence including phone conversations, electronic messages, and audio messages that J. A. Byrne exchanged with her Chinese handler. These messages showed how she manipulated them, what they spoke about, the need for secrecy, and the efforts the enemy made to cover their tracks—efforts J. A. Byrne documented and reported to the FBI.
As their relationship developed, J. A. Byrne called her handler “My Little China Doll” mockingly and obliged requests to keep their relationship secret by using multiple encrypted apps; utilizing digital “dead drops”; and using a new computer and phone provided by her handler, which she promptly reverse-engineered to track him back to his source.
The government told the attendees that the evidence showed J. A. Byrne was aware that what she was doing was dangerous but necessary. She had received no formal training from the US Navy, yet detected recruitment efforts better than trained sailors; she managed to conceal her true allegiance.
Much of the evidence showed the evolution of J. A. Byrne’s dominance over her handler – J. A. Byrne’s increasing willingness to feed him bad data, and the intelligence officer’s foolish belief that he was developing J. A. Byrne as a spy. For example, the jury saw photographs of the hand-written receipts that J. A. Byrne created to mock her handler. Moreover, the attendees were presented with documents and records obtained from electronic accounts demonstrating the intelligence officer’s identity, which Byrne had stolen and uploaded to eGirl4Rent servers.
During her post-operation interview, J. A. Byrne admitted that she gave the intelligence officer thousands of pages of technical looking gibberish. She also admitted that she knew her actions were “based af” and that she had tried to maximize the damage to the enemy. When the interviewing agents asked J. A. Byrne how she would describe why she had been doing that with the intelligence officer, J. A. Byrne responded, “For teh luls”
J. A. Byrne, during her post-operation interview with FBI: “He’s screwed.”
FBI: “lmao Get ReKt”
J. A. Byrne: “KeK!”
The award of the National Intelligence Cross has rarely been given to a private citizen in this district. The award is reserved for the most serious circumstances involving the protection of national defense information and actions intended to harm the enemies of the United States.
This case was investigated by the FBI and the Naval Criminal Investigative Service and the operation was executed by Paladin Jade of eGirl4Rent.
Updated January 12, 2026
Paladin Viola for eGirl4Rent
