Putin's Protection Racket
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Russland–Analysen
www.laender-analysen.de/russland Nr. 403 | 08.06.2021 Russland–Analysen • Duma-Wahlen • Repressionen ■ KOMMENTAR Schrumpfende Freiräume für Russlands Medien 25 Die Duma-Wahlen 2021: Hochmut kommt vor dem Fall – oder doch Esther Somfalvy (Forschungsstelle Osteuropa an der Universität nicht? 2 Bremen) Boris Ginzburg und Alexander Libman (Freie Universität Berlin) Russland drosselte Twitter, um Inhalte zu zensieren 27 Informationskriege, Oppositionskoordination und die Dumawahl Natalia Krapiva (Access Now) im Jahr 2021 4 ■ Regina Smyth (Indiana University und Woodrow Wilson Center, DEKODER »Hätten wir eine andere Wahl gehabt? Nein.« 30 Washington D.C.) Konstantin Gaase und Leonid Wolkow Wird das Putin-Regime überleben? 6 ■ DOKUMENTATION Andreas Heinemann-Grüder (Universität Bonn) Repressive Gesetze, die von Wladimir Putin am 30. Dezember 2020 Vorbereitung auf die Parlamentswahlen 2021 8 unterzeichnet wurden 35 Andrei Semenov (Zentrum für vergleichende Geschichts- und Politische Strafverfahren nach den Protesten im Januar 2021 37 Politikwissenschaft, Staatliche Universität Perm) April-Chronik der Repressionen: Der Journalist Ilja Asar hat Buch geführt 40 Vor den Dumawahlen weitet Russland die elektronische Überblick: Hochverrat, Spionage und Staatsgeheimnisse 47 Stimmabgabe aus – warum und mit welchen potenziellen Folgen? 10 »Haben Sie Angst vor…?« Umfrageergebnisse Stas Gorelik (George Washington-Universität, Washington D.C. / des Lewada-Zentrums 48 Forschungsstelle Osteuropa, Bremen) Teilnehmende an den Protesten aus Solidarität mit Alexej -
Redalyc.Drugs, Violence, and State-Sponsored Protection
Colombia Internacional ISSN: 0121-5612 [email protected] Universidad de Los Andes Colombia Snyder, Richard; Durán Martínez, Angélica Drugs, Violence, and State-Sponsored Protection Rackets in Mexico and Colombia Colombia Internacional, núm. 70, julio-diciembre, 2009, pp. 61-91 Universidad de Los Andes Bogotá, D.C., Colombia Available in: http://www.redalyc.org/articulo.oa?id=81215371004 How to cite Complete issue Scientific Information System More information about this article Network of Scientific Journals from Latin America, the Caribbean, Spain and Portugal Journal's homepage in redalyc.org Non-profit academic project, developed under the open access initiative Colombia Internacional 70, julio a diciembre de 2009: 61-91 Drugs, Violence, and State-Sponsored Protection Rackets in Mexico and Colombia Richard Snyder • Angélica Durán Martínez Brown University Abstract Illegality does not necessarily breed violence. The relationship between illicit markets and violence depends on institutions of protection. When state-sponsored protection rackets form, illicit markets can be peaceful. Conversely, the breakdown of state-sponsored protection rackets, which may result from well-meaning policy reforms intended to reduce corruption and improve law enforcement, can lead to violence. The cases of drug trafficking in contemporary Mexico and Colombia show how a focus on the emergence and breakdown of state-sponsored protection rackets helps explain variation in levels of violence both within and across illicit markets. Keywords protection rackets • drugs • violence • Mexico • Colombia Drogas, violencia y redes extorsivas con apoyo del Estado en México y Colombia Resumen La ilegalidad no necesariamente engendra violencia. La relación entre mercados ilícitos y violencia depende de la existencia de instituciones de protección. -
Inside Russia's Intelligence Agencies
EUROPEAN COUNCIL ON FOREIGN BRIEF POLICY RELATIONS ecfr.eu PUTIN’S HYDRA: INSIDE RUSSIA’S INTELLIGENCE SERVICES Mark Galeotti For his birthday in 2014, Russian President Vladimir Putin was treated to an exhibition of faux Greek friezes showing SUMMARY him in the guise of Hercules. In one, he was slaying the • Russia’s intelligence agencies are engaged in an “hydra of sanctions”.1 active and aggressive campaign in support of the Kremlin’s wider geopolitical agenda. The image of the hydra – a voracious and vicious multi- headed beast, guided by a single mind, and which grows • As well as espionage, Moscow’s “special services” new heads as soon as one is lopped off – crops up frequently conduct active measures aimed at subverting in discussions of Russia’s intelligence and security services. and destabilising European governments, Murdered dissident Alexander Litvinenko and his co-author operations in support of Russian economic Yuri Felshtinsky wrote of the way “the old KGB, like some interests, and attacks on political enemies. multi-headed hydra, split into four new structures” after 1991.2 More recently, a British counterintelligence officer • Moscow has developed an array of overlapping described Russia’s Foreign Intelligence Service (SVR) as and competitive security and spy services. The a hydra because of the way that, for every plot foiled or aim is to encourage risk-taking and multiple operative expelled, more quickly appear. sources, but it also leads to turf wars and a tendency to play to Kremlin prejudices. The West finds itself in a new “hot peace” in which many consider Russia not just as an irritant or challenge, but • While much useful intelligence is collected, as an outright threat. -
Typologies of the Use of Preventive Measures of Financial Institutions for Crime Detection and Risk Assessment
ЕВРАЗИЙСКАЯ ГРУППА по противодействию легализации преступных доходов и финансированию терроризма EURASIAN GROUP on combating money laundering and financing of terrorism EAG TYPOLOGY PROJECT TYPOLOGIES OF THE USE OF PREVENTIVE MEASURES OF FINANCIAL INSTITUTIONS FOR CRIME DETECTION AND RISK ASSESSMENT TYPOLOGICAL STUDY REPORT 2021 Contents General ....................................................................................................................... 3 Preventive Measures and Suspicious Transaction Reporting in the EAG members 3 Approaches Used by FIUs for Analyzing Incoming STRs and Service Denial Reports ....................................................................................................................... 9 Feedback on STRs ................................................................................................... 16 Trends and risks in the spread of COVID-19 .......................................................... 21 Impact of COVID-19 on AML/CFT supervisory activities and implementation of preventive measures ................................................................................................ 24 Summary of recommendations following the results of the study: ......................... 26 General Application by entities engaged in transactions with funds or other assets of preventive measures as well as identification of suspicious transactions and submission of suspicious transaction reports (STRs) to the financial investigation units (FIUs) is one of the most important measures aimed -
RUSSIA INTELLIGENCE Politics & Government
N°66 - November 22 2007 Published every two weeks / International Edition CONTENTS KREMLIN P. 1-4 Politics & Government c KREMLIN The highly-orchestrated launching into orbit cThe highly-orchestrated launching into orbit of of the «national leader» the «national leader» Only a few days away from the legislative elections, the political climate in Russia grew particu- STORCHAK AFFAIR larly heavy with the announcement of the arrest of the assistant to the Finance minister Alexey Ku- c Kudrin in the line of fire of drin (read page 2). Sergey Storchak is accused of attempting to divert several dozen million dol- the Patrushev-Sechin clan lars in connection with the settlement of the Algerian debt to Russia. The clan wars in the close DUMA guard of Vladimir Putin which confront the Igor Sechin/Nikolay Patrushev duo against a compet- cUnited Russia, electoral ing «Petersburg» group based around Viktor Cherkesov, overflows the limits of the «power struc- home for Russia’s big ture» where it was contained up until now to affect the entire Russian political power complex. business WAR OF THE SERVICES The electoral campaign itself is unfolding without too much tension, involving men, parties, fac- cThe KGB old guard appeals for calm tions that support President Putin. They are no longer legislative elections but a sort of plebicite campaign, to which the Russian president lends himself without excessive good humour. The objec- PROFILE cValentina Matvienko, the tive is not even to know if the presidential party United Russia will be victorious, but if the final score “czarina” of Saint Petersburg passes the 60% threshhold. -
Drugs, Violence, and State-Sponsored Protection Rackets in Mexico and Colombia Richard Snyder • Angélica Durán Martínez Brown University
Colombia Internacional 70, julio a diciembre de 2009: 61-91 Drugs, Violence, and State-Sponsored Protection Rackets in Mexico and Colombia Richard Snyder • Angélica Durán Martínez Brown University Abstract Illegality does not necessarily breed violence. The relationship between illicit markets and violence depends on institutions of protection. When state-sponsored protection rackets form, illicit markets can be peaceful. Conversely, the breakdown of state-sponsored protection rackets, which may result from well-meaning policy reforms intended to reduce corruption and improve law enforcement, can lead to violence. The cases of drug trafficking in contemporary Mexico and Colombia show how a focus on the emergence and breakdown of state-sponsored protection rackets helps explain variation in levels of violence both within and across illicit markets. Keywords protection rackets • drugs • violence • Mexico • Colombia Drogas, violencia y redes extorsivas con apoyo del Estado en México y Colombia Resumen La ilegalidad no necesariamente engendra violencia. La relación entre mercados ilícitos y violencia depende de la existencia de instituciones de protección. Cuando se forman redes extorsivas con apoyo estatal, los mercados ilícitos pueden ser pacíficos. En cambio, el desplome de estas redes —que puede ser resultado de reformas políticas bienintencionadas planeadas para reducir los niveles de corrupción y para mejorar el cumplimiento de la ley— puede generar violencia. Las dinámicas recientes de trafico de drogas en México y Colombia muestran que un enfoque en la aparición y desplome de redes extorsivas con apoyo estatal ayuda a explicar las variaciones en los niveles de violencia que existen dentro y a través de los mercados ilícitos. Palabras clave: redes extorsivas • drogas • violencia • México • Colombia Recibido el 4 de mayo de 2009 y aceptado el 20 de octubre de 2009. -
THREAT BULLETINS Joint Cybersecurity Advisory on Russian
THREAT BULLETINS Joint Cybersecurity Advisory on Russian GRU Kubernetes Brute Force Campaign TLP:WHITE Jul 06, 2021 On July 1, 2021, the National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), and the UK’s National Cyber Security Centre (NCSC) released a Joint Cybersecurity Advisory regarding Russian General Staff Main Intelligence Directorate’s (GRU) 85th Main Special Service Center (GTsSS), Unit 26165. The joint advisory outlines Russia’s malicious use of Kubernetes clusters cloaked by various virtual private network (VPN) providers and The Onion Router (TOR) to conduct widespread, distributed, and anonymized brute force access attempts against several government and private sector targets globally. Kubernetes is an open-source system for orchestrating the deployment and management of software containers. This advisory is being shared to prevent a disruption of your network posture as these efforts are almost certainly still ongoing according to the Joint Cybersecurity Advisory. The malicious cyber activity has previously been attributed to threat groups identified as Fancy Bear, APT28, Strontium, and a variety of others by the private sector. A significant amount of malicious activity was directed at organizations using Microsoft Office 365 cloud services in addition to targeting other service providers and on-premises email servers using a variety of different protocols. This brute force capability allows the 85th GTsSS actors to access protected data, including email, and identify valid account credentials. Those credentials may then be used for a variety of purposes, including initial access, persistence, privilege escalation, and defense evasion. The actors have used identified account credentials in conjunction with exploiting publicly known vulnerabilities, such as exploiting Microsoft Exchange servers using CVE 2020-0688 and CVE 2020-17144, for remote code execution and further access to target networks. -
Macron Leaks” Operation: a Post-Mortem
Atlantic Council The “Macron Leaks” Operation: A Post-Mortem Jean-Baptiste Jeangène Vilmer The “Macron Leaks” Operation: A Post-Mortem Jean-Baptiste Jeangène Vilmer ISBN-13: 978-1-61977-588-6 This report is written and published in accordance with the Atlantic Council Policy on Intellectual Indepen- dence. The author is solely responsible for its analysis and recommendations. The Atlantic Council and its donors do not determine, nor do they necessarily endorse or advocate for, any of this report’s conclusions. June 2019 Contents Acknowledgments iv Abstract v Introduction 1 I- WHAT HAPPENED 4 1. The Disinformation Campaign 4 a) By the Kremlin media 4 b) By the American alt-right 6 2. The Aperitif: #MacronGate 9 3. The Hack 10 4. The Leak 11 5. In Summary, a Classic “Hack and Leak” Information Operation 14 6. Epilogue: One and Two Years Later 15 II- WHO DID IT? 17 1. The Disinformation Campaign 17 2. The Hack 18 3. The Leak 21 4. Conclusion: a combination of Russian intelligence and American alt-right 23 III- WHY DID IT FAIL AND WHAT LESSONS CAN BE LEARNED? 26 1. Structural Reasons 26 2. Luck 28 3. Anticipation 29 Lesson 1: Learn from others 29 Lesson 2: Use the right administrative tools 31 Lesson 3: Raise awareness 32 Lesson 4: Show resolve and determination 32 Lesson 5: Take (technical) precautions 33 Lesson 6: Put pressure on digital platforms 33 4. Reaction 34 Lesson 7: Make all hacking attempts public 34 Lesson 8: Gain control over the leaked information 34 Lesson 9: Stay focused and strike back 35 Lesson 10: Use humor 35 Lesson 11: Alert law enforcement 36 Lesson 12: Undermine propaganda outlets 36 Lesson 13: Trivialize the leaked content 37 Lesson 14: Compartmentalize communication 37 Lesson 15: Call on the media to behave responsibly 37 5. -
Skripal Novichok Poisoning: Kremlin on Hunt for Russian 'Traitor' Who Helped Identify Hitmen
Skripal Novichok poisoning: Kremlin on hunt for Russian 'traitor... https://www.mirror.co.uk/news/uk-news/skripal-novichok-poiso... ADVERTISEMENT IN ASSOCIATION WITH ANIMAL HERO AWARDS 2018 NEWS Skripal Novichok poisoning: Kremlin on hunt for Russian 'traitor' who helped identify hitmen EXCLUSIVE: Search is on for the source of GRU leak who aided MI5 and they may be among GRU military intelligence officers still serving By Chris Hughes Defence And Security SHARE Editor & Adam Aspinall 22:20, 14 SEP 2018 UPDATED 22:23, 14 SEP 2018 1 of 14 15/09/2018, 17:44 Skripal Novichok poisoning: Kremlin on hunt for Russian 'traitor... https://www.mirror.co.uk/news/uk-news/skripal-novichok-poiso... Russian nationals Ruslan Boshirov and Alexander Petrov on Fisherton Road, Salisbury on the day the Skripals were poisoned (Image: PA) Get Daily News updates directly to your inbox Enter your email Subscribe See our privacy notice More newsletters Kremlin spy chiefs have launched an international manhunt for Putin’s new number one target - the Russian “traitor” who helped ID the Novichok hitmen. Russia intelligence was shocked by MI5’s identifying of Alexander Petrov and Ruslan Boshirov as GRU military intelligence officers as they had assumed they were unknowns. And yesterday British sources told the Daily Mirror there are suspicions the pair are from a ruthless “Spetsnaz” special forces unit, which is part of the GRU and trained in assassinations. The Kremlin is desperate to “lock-down” the leak - thought to be either a GRU man who has already defected to the west or even more devastating an insider, still 2 of 14 15/09/2018, 17:44 Skripal Novichok poisoning: Kremlin on hunt for Russian 'traitor.. -
Russian GRU 85Th Gtsss Deploys Previously Undisclosed Drovorub Malware
National Security Agency Federal Bureau of Investigation Cybersecurity Advisory Russian GRU 85th GTsSS Deploys Previously Undisclosed Drovorub Malware August 2020 Rev 1.0 U/OO/160679-20 PP-20-0714 Russian GRU 85th GTsSS Deploys Previously Undisclosed Drovorub Malware Notices and history Disclaimer of Warranties and Endorsement The information and opinions contained in this document are provided "as is" and without any warranties or guarantees. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States Government. This guidance shall not be used for advertising or product endorsement purposes. Sources and Methods NSA and FBI use a variety of sources, methods, and partnerships to acquire information about foreign cyber threats. This advisory contains the information NSA and FBI have concluded can be publicly released, consistent with the protection of sources and methods and the public interest. Publication Information Purpose This advisory was developed as a joint effort between NSA and FBI in support of each agency’s respective missions. The release of this advisory furthers NSA’s cybersecurity missions, including its responsibilities to identify and disseminate threats to National Security Systems, Department of Defense information systems, and the Defense Industrial Base, and to develop and issue cybersecurity specifications and mitigations. This information may be shared broadly to reach all appropriate stakeholders. Contact Information Client Requirements / General Cybersecurity Inquiries: Cybersecurity Requirements Center, 410-854-4200, [email protected] Media Inquiries / Press Desk: Media Relations, 443-634-0721, [email protected] Trademark Recognition Linux® is a registered trademark of Linus Torvalds. -
Russian Intelligence Services and Special Forces
BRIEFING PAPER Number CBP 8430, 30 October 2018 Russian intelligence By Ben Smith services and special forces Contents: 1. KGB reborn? 2. GRU 3. Spetsnaz 4. What’s new? www.parliament.uk/commons-library | intranet.parliament.uk/commons-library | [email protected] | @commonslibrary 2 Russian intelligence services and special forces Contents Summary 3 1. KGB reborn? 4 1.1 FSB 4 1.2 SVR 5 1.3 FSO and GUSP 5 2. GRU 7 Cyber warfare 7 NCSC Review 8 3. Spetsnaz 9 4. What’s new? 12 Cover page image copyright: Special operations forces of the Russian Federation by Ministry of Defence of the Russian Federation (Mil.ru). Licensed under the Creative Commons Attribution 4.0 International license / image cropped. 3 Commons Library Briefing, 30 October 2018 Summary The Salisbury incident and its aftermath brought the Russian secret services into the spotlight. Malcolm Chalmers of Royal United Services Institute said Russian security services were going well beyond normal spying practice: “By launching disruptive operations that threaten life in target societies, they blur the line between war and peace”. The main domestic service, the FSB, is a successor to the Communist-era KGB. It is responsible for counter-terrorism and counter espionage and Russian information security. Critics say that it continues the KGB’s work of persecution of ‘dissidents’ and is guilty of torture and other human rights violations, and of extortion and corruption. One estimate put its staff complement at 200,000, and it has grown in power, particularly since the election of Vladimir Putin as President of Russia. -
Financial Flows Linked to the Production and Trafficking of Afghan Opiates
FATF REPORT Financial flows linked to the production and trafficking of Afghan opiates June 2014 FINANCIAL ACTION TASK FORCE The Financial Action Task Force (FATF) is an independent inter-governmental body that develops and promotes policies to protect the global financial system against money laundering, terrorist financing and the financing of proliferation of weapons of mass destruction. The FATF Recommendations are recognised as the global anti-money laundering (AML) and counter-terrorist financing (CFT) standard. For more information about the FATF, please visit the website: www.fatf-gafi.org © 2014 FATF/OECD. All rights reserved. No reproduction or translation of this publication may be made without prior written permission. Applications for such permission, for all or part of this publication, should be made to the FATF Secretariat, 2 rue André Pascal 75775 Paris Cedex 16, France (fax: +33 1 44 30 61 37 or e-mail: [email protected]). Photocredits coverphoto: United Nations Photo UNODC Zalmai FINANCIAL FLOWS LINKED TO THE PRODUCTION AND TRAFFICKING OF AFGHAN OPIATES CONTENTS ACRONYMS ......................................................................................................................................... 2 KEY FINDINGS ..................................................................................................................................... 3 Observations ......................................................................................................................................... 3 Considerations