Russian spies claim they can now collect crypto keys

Filed under Vlad’s Glad…ah ha ha

Russian spies claim they can now collect crypto keys—but don’t say how

Putin gave KGB’s successor agency two weeks to deal with encrypted services.

ArsTechnica: Russia’s intelligence agency the FSB, successor to the KGB, has posted a notice on its website claiming that it now has the ability to collect crypto keys for Internet services that use encryption. This meets a two-week deadline given by Vladimir Putin to the FSB to develop such a capability. However, no details have been provided of how the FSB is able to do this.

The FSB’s announcement follows the passage of Russia’s wide-ranging surveillance law, which calls for metadata and content to be stored for six months, plus access to encrypted services, as Ars reported back in June.

The new capability seems to go even further, since the FSB notice (in Russian) speaks of obtaining the “information necessary for decoding the electronic messaging received, sent, delivered, and (or) processed by users of the ‘Internet’ network.”

Being able to decode Internet communications would seem to imply getting hold of any crypto keys that are used. However, as an article on The Daily Dot points out, it is still not clear what the new laws will require: “No one seems to know what this new law means in the slightest. Or, more accurately, the people who do know are keeping mum.”

Three of the services that are likely to be most affected by the new requirements are Facebook’s WhatsApp, Telegram, and Viber. Ars has asked all three for clarification on what the Russian authorities have asked for, and what information the companies are or will be providing, but has not yet received any reply. This post will be updated with responses when they are received.

Related reading: Is the U.S. Hacking Back? Uh Huh

The Daily Dot quotes Russian technologist Anton Nesterov as saying that it’s not even clear whether the new legislation applies to VPNs or basic SSL keys, nor whether mainstream electronic payment systems must hand over their keys as a matter of routine.

Nesterov also points out the dangers involved in providing this information, not least because leaks of such valuable data are always a risk.

***** 

In part from CSO: Networks at some 20 organizations in Russia — including scientific and military institutions, defense contractors, and public authorities — were found to be infected with the malware, the Russian Federal Security Service (FSB) said Saturday. The range of infected sites suggests that the targets were deliberately selected as part of a cyber-espionage operation, the FSB said.

Analysis of the attack showed that filenames, parameters and infection methods used in the malware are similar to those involved in other high-profile cyber-espionage operations around the world.

The software was adapted to the characteristics of each PC targeted, and delivered in a malicious email attachment, the FSB said.

Once installed, it downloaded additional modules to perform tasks such as monitoring network traffic, capturing and transmitting screenshots and keystroke logs, or recording audio and video using the PC’s microphone and webcam.

The FSB is working with ministries and other government agencies to identify all the victims of the malware, and to limit its effects, it said.

Russia is said to be the source, not the target, of another government-related cyber-attack. Last week, evidence emerged suggesting Russian involvement in an attack on computers at the Democratic National Committee, where recent data leaks have tarnished the campaign of presidential candidate Hillary Clinton.

 

 

UK Report: Charities Funding Terror

At least the police in the UK noticed something and asked officials for an inquiry. An investigation was performed and you gotta hand it to the Brits, they are so proper and careful, but did the right thing. Question is, was it enough. Further, we must look inward and ask if our own State laws and the IRS are doing the same thing when it comes to charities and foundations? Two come to mind immediately, the Clinton Foundation(s) and those that are advocates of Islamic organizations when the Holy-land Foundation case left many un-indicted co-conspirators.

UK charities that raised cash for ISIS and promoted Al-Qaeda struck off

TWO British charities that raised cash for ISIS and promoted Al-Qaeda respectively have been struck of the register after separate investigations by the regulator.
The Charity Commission has released reports on two separate organisations that claimed to be raising cash to help victims of the war in Syria, and Kurdish Muslims in Birmingham, but were in fact funding and promoting terrorists.

In one case, charities set up by Adeel Ul-Haq, 21, of Sutton-in-Ashfield in Nottinghamshire, raised money through social media that was used to buy a high-powered laser pointer, night-vision goggles and a secret waterproof money pouch.

Ul-Haq was jailed for 12 months in February after a separate police investigation found he funded terrorism by sending money to an ISIS fighter in Syria.
Ul-Haq used Twitter to appeal for cash “to help people in war-torn Syria crisis, but instead sent it to the ISIS fighter.

He was jailed for a further five years for helping another person travel to Syria.

The Charity Commission report said the regulator was unable to account for much of £12,500 raised by Ul-Haq, but at least some of it went into another unnamed person’s bank account.
Some of this cash was then used to buy the specialist items oneBay, that the watchdog suspected would be used for terrorism.
The report said: “While recognising that it is not illegal to purchase such items, the inquiry was extremely concerned by the use of charitable funds to purchase a night-vision scope and its potential usage given that it can be used for hunting or surveillance.”

Ul-Haq never registered any charities with the commission, but the regulator took action as he was effectively acting as an official trustee and he had taken the donations on trust that they would help people in Syria.

The regulator found Ul-Haq breached his fiduciary duty to protect and apply charitable funds for the purposes for which they were raised and that there was evidence the second trustee had committed misconduct and mismanagement by allowing the charitable funds to be mixed in the same account as her own personal funds.

The second, unnamed, female trustee was ordered to repay any other charitable money in her account to Ul-Haq’s account, which was frozen by the commission at the start of the investigation.

However, she faced no police charges.

This cash and remaining funds in Ul-Haq’s account, plus money seized in a police raid of his home, totalled about £4,500, and was donated to two genuine charities working in Syria, which the commission has not named.
Ul-Haq been disqualified from acting as a charity trustee in the future.

At least £2,000 of money had been sent to a genuine charity, it was found.

A second charity probed by the commission was the Birmingham-based Didi Nwe Organisation.

Its website featured articles by Mullah Krekar, viewed as an associate of Al-Qaeda by the United Nations.

Didi Nwe also paid £14,000 to its chair of trustees between May 2010 and February 2013 and could not explain why, according to a statutory inquiry report published by the commission.

The charity trustees were found to have committed misconduct and mismanagement, failed to keep financial records, and were unable to show how the charity was furthering its causes of providing education and relieving poverty among Kurdish Muslims in Birmingham, the report said.

The commission launched an inquiry after the charity’s chair, referred to only as Trustee A, was stopped by police returning to the UK from France with around £1,800 in cash, which he claimed were charitable donations. Read more here.  The report is found here.

Conclusions

The commission concluded that the First Trustee had solicited charitable funds from the public via Twitter for a specific purpose but had breached his fiduciary duty to protect and apply those funds properly for the purposes for which they were raised. The commission concluded that the items the First Trustee purchased on eBay with the charitable funds, including a laser pen, a money wallet and night vision scope, could not be used for furthering the charitable purposes for which the funds were raised and raised serious concerns about what the intended purpose of their use was.

There was evidence of misconduct and mismanagement by the Second Trustee in mixing charitable funds with her own personal funds.

Charitable funds raised by or donated to the First Trustee were not accounted for; there was a serious risk of further misapplication, in breach of duty, to any remaining funds or any funds which could be recovered if the First Trustee was to remain a trustee of the funds. The commission took regulatory action to remove the First Trustee as a trustee, the effect of which was to disqualify him from beinga trustee.

On 10 February 2016 the First Trustee was convicted under section 5 of the Terrorism Act 2006 (preparation of terrorist acts) and section 17 of the Terrorism Act 2000 (entering into or becoming concerned in a terrorist funding arrangement) and received 5 years imprisonment. The commission issued a public statement following this conviction.

Partial List of Documents Hacked from the Clinton Foundation

Guccifer 2.0: In the post he says the following:

Zerohedge: This’s time to keep my word and here’re the docs I promised you.

It’s not a report in one file, it’s a big folder of docs devoted to Hillary Clinton that I found on the DNC server.

The DNC collected all info about the attacks on Hillary Clinton and
prepared the ways of her defense, memos, etc., including the most
sensitive issues like email hacks.

As an example here’re some files:

This’s time to keep my word and here’re the docs I promised you.

It’s not a report in one file, it’s a big folder of docs devoted to Hillary Clinton that I found on the DNC server.

The DNC collected all info about the attacks on Hillary Clinton and
prepared the ways of her defense, memos, etc., including the most
sensitive issues like email hacks.

As an example here’re some files:

2016er Attacks – HRC Defense Master Doc [updated]

04.29.15 CGEP

2016 Democrats Positions Cheat Sheet 7-7-15

20150426 MEMO- Clinton Cash Unravels

Attacks on Clinton Family Members

Clinton Foundation Donors $25K+

Clinton Foundation Vulnerabilities Master Doc FINAL

Clintons PFD 2015

HRC Defense – Emails

HRC Travel – Private Jets FINAL

MEMO — Clinton Cash Claims (2)

Most notable among these files is the file called “Clinton Foundation Vulnerabilities Master Doc FINAL” which, as the title implies, is an extensive 42-page summary of how the Clinton Foundation views its biggest vulnerabilities based on mentions, references and attacks from the press.

Here are some of the section titles:

  • THE CLINTON FOUNDATION RECEIVED DONATIONS FROM INDIVIDUALS TIED TO SAUDI ARABIA WHILE CLINTON SERVED AS SECRETARY OF STATE
  • AN EMBATTLED BUSINESSMAN WITH “TIES TO BAHRAIN’S STATE-OWNED ALUMINUM COMPANY” GAVE BETWEEN $1 MILLION AND $5 MILLION TO THE CLINTON FOUNDATION
  • A VENEZUELAN MEDIA MOGUL WHO WAS ACTIVE IN VENEZUELAN POLITICS DONATED TO THE CLINTON FOUNDATION DURING CLINTON’S TENURE AS SECRETARY OF STATE
  • GERMAN INVESTOR WHO HAS LOBBIED CHANCELLOR MERKEL’S ADMINISTRATION GAVE BETWEEN $1 MILLION AND $5 MILLION TO THE CLINTON FOUNDATION, SOME OF WHICH WAS DURING MRS. CLINTON’S TENURE AT THE STATE DEPARTMENT
  • THE CEO OF AN AMSTERDAM BASED ENERGY COMPANY DONATED AT LEAST $1 MILLION TO THE CLINTON FOUNDATION AND LATER ANNOUNCED AT THE 2009 CGI MEETING A $5 BILLION PROJECT TO DEVELOP ENVIRONMENTALLY FRIENDLY POWER GENERATION IN INDIA AND CHINA
  • INDIAN POLITICIAN AMAR SINGH, WHO HAD DONATED AT LEAST $1 MILLION TO THE CLINTON FOUNDATION, MET WITH HILLARY CLINTON IN SEPTEMBER 2008 TO DISCUSS AN INDIA-U.S. CIVIL NUCLEAR AGREEMENT
  • THE CLINTON FOUNDATION RECEIVED ADDITIONAL DONATIONS FROM INDIAN BUSINESS INTERESTS PRIOR TO HER BECOMING SECRETARY OF STATE
  • BILLIONAIRE STEEL EXECUTIVE AND MEMBER OF THE FOREIGN INVESTMENT COUNCIL IN KAZAKHSTAN LAKSHMI MITTAL GAVE $1 MILLION TO $5 MILLION TO THE CLINTON FOUNDATION BEFORE CLINTON BECAME SECRETARY OF STATE
  • SOON AFTER SECRETARY CLINTON LEFT THE STATE DEPARTMENT, THE CLINTON
    FOUNDATION “RECEIVED A LARGE DONATION FROM A CONGLOMERATE RUN BY A
    MEMBER OF CHINA’S NATIONAL PEOPLE’S CONGRESS”
  • …AND THE CLINTON FOUNDATION DEFENDED ITS PARTNERSHIPS WITH BOTH FOREIGN AND DOMESTIC CORPORATE INTERESTS
  • POWERFUL AND CONTROVERSIAL CORPORATE INTERESTS BASED IN THE U.S. ALSO DONATED TO THE CLINTON FOUNDATION
  • AMONG THE CLINTON FOUNDATION DONORS REVEALED IN 2009 WERE SEVERAL FOREIGN GOVERNMENTS WHO HAD GIVEN MILLIONS OF DOLLARS
  • WHEN HILLARY CLINTON BECAME SECRETARY OF STATE IN 2009, BILL CLINTON AGREED TO STOP ACCEPTING CONTRIBUTIONS TO THE CLINTON FOUNDATION FROM MOST FOREIGN COUNTRIES
  • IN THE PAST, SOME OBSERVERS HAD LINKED FOREIGN GOVERNMENT DONATIONS TO THE CLINTON FOUNDATION AND SECRETARY CLINTON’S WORK AT THE STATE DEPARTMENT
  • THE CLINTON FOUNDATION CAME UNDER INTENSE SCRUTINY IN FEBRUARY 2015 WHEN IT WAS REVEALED THAT THE FOUNDATION HAD ACCEPTED DONATIONS FROM FOREIGN GOVERNMENTS AFTER SECRETARY CLINTON LEFT THE STATE DEPARTMENT
  • THE WALL STREET JOURNAL TIED FOREIGN GOVERNMENT DONORS TO THE CLINTON FOUNDATION’S ENDOWMENT FUNDRAISING UNDER SECRETARY CLINTON
  • CLINTON FOUNDATION ANNOUNCED THAT SHOULD HILLARY CLINTON DECIDE TO RUN FOR PRESIDENT, THE FOUNDATION WOULD FOLLOW APPROPRIATE PROCEDURES FOR ACCEPTING DONATIONS FROM FOREIGN DONATIONS, JUST LIKE IT HAD HAD UNDER SECRETARY CLINTON…
  • REPORTS THAT STATE DEPARTMENT LAWYERS DID NOT EXHAUSTIVELY VET BILL CLINTON’S PAID SPEECHES DURING SECRETARY CLINTON’S TENURE RAISED QUESTIONS ABOUT THE ROLE CLINTON FOUNDATION DONATIONS MAY HAVE PLAYED IN ORGANIZING THOSE SPEECHES
  • SOME CONSERVATIVES USED THE FOREIGN DONATIONS CONTROVERSY TO IMPLY THAT THE CLINTON FOUNDATION IS NOT A CHARITY AND QUESTION THE FOUNDATION’S CHARITABLE WORK
  • THE CLINTON FOUNDATION HAS ACCEPTED DONATIONS FROM INDIVIDUALS, SOME OF WHOM HAD TIES TO FOREIGN GOVERNMENTS, DURING HER TENURE AS SECRETARY OF STATE
  • THE CLINTON FOUNDATION RECEIVED MONEY FROM A FOUNDATION FORMED BY FORMER UKRAINIAN PARLIAMENT MEMBER VICTOR PINCHUK
  • WALL STREET JOURNAL COLUMNIST MARY O’GRADY CITED A CONTRACT BETWEEN TWO CLINTON DONORS FOR HAITI AID AS EVIDENCE OF A CONFLICT OF INTEREST FOR THE CLINTONS

There is much more in the full document presented below (link).

* * *

One important thing to note: according to an interview that Motherboard conducted with Guccifer2 on Tuesday, the hacker makes it clear he is not Russian. He is, in fact, from Romania, just like the Original Guccifer. 

“I’m a hacker, manager, philosopher, women lover,” Guccifer 2.0 told Motherboard on Tuesday in a Twitter chat. “I also like Gucci! I bring the light to people. I’m a freedom fighter! So u can choose what u like!”

The hacker, who claimed to have chosen the name in reference to the notorious hacker who leaked the George W. Bush paintings and claims to have hacked Hillary Clinton’s email server, denied working for the Russian government, as several experts believe.

“I don’t like Russians and their foreign policy. I hate being attributed to Russia,” he said, adding that he was from Romania, just like the first Guccifer.

When asked to explain how he hacked into the DNC in Romanian, “he seemed to stall us, and said he didn’t want to “waste” his time doing that. The few short sentences he sent in Romanian were filled with mistakes, according to several Romanian native speakers.”

The hacker said he left Russian metadata in the leaked documents as his personal ”watermark.” He also said he got kicked out of the network on June 12, when the DNC “rebooted their system.”

A senior DNC official said in an emailed statement that “our experts are confident in their assessment that the Russian government hackers were the actors responsible for the breach detected in April, and we believe that the subsequent release and the claims around it may be a part of a disinformation campaign by the Russians.”

Guccifer 2.0 also said the DNC isn’t the only victim of his hacks, but declined to name any others because “my safety depends on it.”

It appears the Clinton Foundation was one of the other hacks.

Finally, when asked why he targeted the DNC, “Guccifer 2.0 said he simply did it to follow the lead of Marcel Lazar, the original Guccifer, and that he doesn’t “care at all” about Donald Trump. The hacker declined to say whether he knew him personally, “cause I care for Marcel.” “I think we must fight for freedom of minds,” he wrote. “Fight for the world without Illuminati.”

Good luck.

* * *

So while we are going through the full data dump (found here), here is the leaked document revealing the “Clinton Foundation’s Vulnerabilities.”

 

Clinton Foundation Vulnerabilities Master Doc Final by zerohedge on Scribd

 

Is the U.S. Hacking Back? Uh Huh

Like here perhaps? This could lead to a real devastating condition as it should be remembered what Russia did to Ukraine just a few months ago, hacked their power system.

Russia cyber attack: Large hack ‘hits government’

BBC: A “professional” cyber attack has hit Russian government bodies, the country’s intelligence service says.

A “cyber-spying virus” was found in the networks of about 20 organisations, the Federal Security Service (FSB) said.

The report comes as Russia stands accused over data breaches involving the Democratic Party in the US.

The Russian government has denied involvement and has denounced the “poisonous anti-Russian” rhetoric coming out of Washington.

The FSB did not say who it believed was responsible for hacking Russian networks, but said the latest hack resembled “much-spoken-about” cyber-spying, without elaborating.

What are Trump’s ties to Russia?

Democrat hack: Who is Guccifer 2.0?

It said the hack had been “planned and made professionally”, and targeted state organisations, scientific and defence companies, as well as “country’s critically important infrastructures”.

The malware allowed those responsible to switch on cameras and microphones within the computer, take screenshots and track what was being typed by monitoring keyboard strokes, the FSB said.

In the US, the Democratic National Committee (DNC) and the Democratic Congressional Campaign Committee have both suffered hacks in recent weeks.

Emails from the DNC were later distributed by the Wikileaks organisation, and showed party officials had been biased against Bernie Sanders in his primary race against Hillary Clinton.

US officials believe the cyber attacks were committed by Russian agents.

The Kremlin has repeatedly denied being responsible, and Mrs Clinton’s presidential rival Donald Trump said he had no ties to Russia.

The Clinton campaign said on Friday that an analytics data program, which it shared with other entities, had been accessed by hackers.

But, her press secretary Nick Merrill said, there was “no evidence that our internal systems have been compromised”.

The FBI said it was investigating the extent of any hacking.

The NSA Is Likely ‘Hacking Back’ Russia’s Cyber Squads

  • By Lee Ferran ASPEN, Color ado — Jul 30, 2016
  • U.S. government hackers at the National Security Agency are likely targeting Russian government-linked hacking teams to see once and for all if they’re responsible for the massive breach at the Democratic National Committee, according to three former senior intelligence officials. It’s a job that the current head of the NSA’s elite hacking unit said they’ve been called on to do many times before.

ABC: Robert Joyce, chief of the NSA’s shadowy Tailored Access Operations, declined to comment on the DNC hack specifically, but said in general that the NSA has technical capabilities and legal authorities that allow the agency to “hack back” suspected hacking groups, infiltrating their systems to gather intelligence about their operations in the wake of a cyber attack.

“In terms of the foreign intelligence mission, one of the things we have to do is try to understand who did a breach, who is responsible for a breach,” Joyce told ABC News in a rare interview this week. “So we will use the NSA’s authorities to pursue foreign intelligence to try to get back into that collection, to understand who did it and get the attribution. That’s hard work, but that’s one of the responsibilities we have.”

 

Predators Exploiting Personal Info in DNC Hack

‘Beyond a Reasonable Doubt,’ Russians Hacked DNC, Analyst Says

 

The NSA deferred direct questions about its potential involvement in the DNC hack investigation to the FBI, which is the leading agency in that probe. Representatives for the bureau have not returned ABC News’ request for comment. Lisa Monaco, President Obama’s homeland security and counterterrorism adviser whose responsibilities include cyber policy, declined to comment.

A former senior U.S. official said it was a “fair bet” the NSA was using its hackers’ technical prowess to infiltrate two Russian hacking teams that the cybersecurity firm Crowdstrike alleged broke into the DNC’s system and were link ed to two separate Russian intelligence agencies, as first reported by The Washington Post. In some past unrelated cases, the former official said, NSA hackers have been able to watch from the inside as malicious actors conduct their operations in real time.

Rajesh De, former general counsel at the NSA, said that if the NSA is targeting the Russian groups, it could be doing it under its normal foreign intelligence authorities, as the Russian government is “clearly … a valid intelligence target.” Or the NSA could be working under the FBI’s investigative authority and hacking the suspects’ systems as part of technical support for investigators, said De, now head of the cyber security practice at the law firm Mayer Brown.

In the aftermath of an attack, a CIA official said that if there is an “overseas component,” the NSA would be involved along with the CIA’s own newly formed Directorate of Digital Innovation. The two agencies would work, potentially along with others in government, to sniff out suspects’ “digital dust.”

“It turns out that the people who carry out these activities use their keyboards for other things too,” said Sean Roche, Associate Deputy Director for Digital Innovation at the CIA. Any attribution investigations, Roche said, would also include offline information — the product of old fashioned, on-the-street intelligence gathering.

Like Joyce, Roche said he was speaking generally and could not comment on the DNC hack.

 

While U.S. officials have told news outlets anonymously they concur with Crowdstrike and other private cybersecurity firms who have pointed to Russian culpability, the U.S. government has declined to publicly blame the Russians.

The Russian government has said the hacking allegations are “absurd”.

 

Director of National Intelligence James Clapper told the audience at the Aspen Security Forum Thursday that the U.S. intelligence community was “not quite ready to make a call on attribution,” though he said there were “just a few usual suspects out there.” The next day CIA Director John Brennan said that attribution is “to be determined” and a lot of people were “jumping to conclusions.”

 

Professional hackers often use proxies, Brennan said, so investigators have to make two or three “hops” before tracing cyber attacks back to a state’s intelligence agency, which makes the attribution process more difficult.

 

Kenneth Geers, a former cyber analyst at the Pentagon who recently published a book about Russian cyber operations, told ABC News earlier this week that he didn’t necessarily doubt it was the Russians, but said that even in the best cases when doing cyber investigations, “You can have a preponderance of evidence — and in nation-state cases , that’s likely what you’ll have — but that’s all you’ll have.”

 

That, he said, opens the possibility, however remote, that a very clever hacker or hacking team could be framing the Russians.

 

Michael Buratowski, the senior vice president of cybersecurity services at Fidelis Cybersecurity which studied some of the malicious code, said the evidence pointing to the Russians was so convincing, “it would have had to have been a very elaborate scheme” for it really to have been anyone else.

 

The NSA’s Joyce said that in general it’s very difficult to properly frame someone for a comp lex attack, since too many details have to be exactly right, requiring a tremendous amount of expertise and precision.

 

But Joyce said that before the U.S. government pins blame on anyone for a cyber attack publicly, the evidence has to pass an “extremely high bar.”

 

So when they do come forward, he said, perhaps based on the results of attribution techniques that have not been publicly described, “You should bank on it.”

The U.S. has had a Russian Problem of Espionage for Decades

What is terrifying and pathetic is the Obama White House and both Secretaries of State Hillary Clinton and John Kerry have been stooges of Putin….groveling for normalcy just as they have with the regime of Iran. This is an administration that is normalizing relations with all terror regimes across the globe that include North Korea, Cuba and Venezuela. Hillary said that Bashir al Assad of Syria was a reformer when 400,000 Syrians are dead and 4-5 million have left their homes. Then, we all remember that the Obama White House negotiated with Qatar to released 5 Taliban commanders in exchange for one Army deserter. Talks have been ongoing with the Taliban for years until just recently.

But back to Russia….before the hacking, to sway and or interfere with U.S. elections.

Related reading: Hey FBI, the Investigation into the DNC Hacking is Over Here

No one is admitting that Russian in cadence with WikiLeaks has hacked Hillary’s campaign systems, DCC and the DNC as well as other government systems. Why? Perhaps diplomacy due to talks continued talks with Iran and ending the civil war in Syria. Remember that ‘red-line’ on chemical weapons use.

So, let’s go back a way, like over a decade and up to just a couple of years ago when it came to Russian spies in the United States, shall we? This is for perspective and how the Obama administration including his National Security Council and the State Department continue to ‘omit’ history…

Espionage continues and tactics have not changed for Russia where cyber intrusions have replaced in country operatives, however a look at those operatives’ skills and missions must not be overlooked or dismissed.

Image result for russian spies caught

Let’s begin with Anna Chapman, the Russian spy.

DailyNews: Sultry former Russian secret agent Anna Chapman ended an exchange with NBC News almost before it began when she was pressed about her playful Twitter marriage proposal to NSA leaker Edward Snowden.

Here is the official criminal complaint and summary of how the FBI tracked her actions filed in 2010. The file also includes an additional spy Mikhail Sememko. This actually began in 1990….yes 1990.

But actually there were 8 more Russian spies and this is the criminal complaint for that case. What is fascinating here is the many stopovers in Latin America…..

The spying spree finally came to its end in the summer of 2014, when the trio were propositioned by a self-described investor who wanted to develop casinos in Russia. The scheme immediately drew red flags among the group, with Sporyshev offering that the proposal felt “like some sort of set-up.”
But despite his misgivings, Sporyshev didn’t stop Buryakov from meeting with the supposed investor, who was, in fact, an FBI informant.
For six hours on Aug. 28, Buryakov and the informant met in the anemic gambling metropolis Atlantic City. The informant, who claimed he had a well-placed source in the U.S. government, handed Buryakov documents that were labeled “Internal Treasury Use Only” and contained a list of Russians who were essentially blacklisted from doing business with the United States.
The valuable document earned the informant another meeting that day, when he offered Buryakov another official document that contained “a list of Russian banks… on which to impose sanctions,” according to the criminal complaint. More from DailyBeast.

Then there was a dead Russian, Mikhail Lesin. found in a hotel in Dupont Circle, Washington DC. A story that came and went real fast.

Image result for russian Mikhail Lesin

Mr. Lesin was a major figure in Russian media after the fall of the Soviet Union, first as an advertising executive and later as a top government official and media executive.  

He had deep connections to the Russian state at the time Mr. Putin was reasserting his authority over the country’s rambunctious and freewheeling media. He was a crucial figure in that process, which began with the takeover of Russia’s first independent television channel, NTV, in the early 2000s, and was viewed with bitterness by many Russian journalists at that time.