Silk Way Airlines Smuggles Weapons on Diplomatic Flights

Primer: Customers of these flights are often the U.S., Saudi Arabia and United Arab Emirates. Silk Way Airlines offered diplomatic flights to private companies and arms manufacturers from the US, Balkans, and Israel, as well as to the militaries of Saudi Arabia, UAE, the military forces of Germany and Denmark in Afghanistan and of Sweden in Iraq, and finally US Special Operations Command (USSOCOM). The airline company transported thousand of tons of weapons for them.

*** Meet Purple Shovel:A multimillion-dollar deal with a minuscule arms dealer led to the death of a US citizen, delays in arming Syrian rebels, and the purchase of weapons from a pro-Russia dictatorship — all for a pile of defective 30-year-old weapons. Also meet Orbital ATK.

350 diplomatic flights carry weapons for terrorists

Azerbaijan’s Silk Way Airlines transports weapons with diplomatic clearance for Syria, Iraq, Afghanistan, Pakistan, Congo

In December of 2016 Dilyana Gaytandzhieva found and filmed 9 underground warehouses fullof heavy weapons with Bulgaria as their country of origin in Eastern Aleppo.

At least 350 diplomatic Silk Way Airlines (an Azerbaijani state-run company) flights transported weapons for war conflicts across the world over the last 3 years. The state aircrafts of Azerbaijan carried on-board tens of tons of heavy weapons and ammunition headed to terrorists under the cover of diplomatic flights.

Documents implicating Silk Way Airlines in arms supplies were sent to me by an anonymous twitter account – Anonymous Bulgaria.

%d0%b4%d0%be%d0%ba%d1%83%d0%bc%d0%b5%d0%bd%d1%82

The leaked files include correspondence between the Bulgarian Ministry of Foreign Affairs and the Embassy of Azerbaijan to Bulgaria with attached documents for weapons deals and diplomatic clearance for overflight and/or landing in Bulgaria and many other European countries, USA, Saudi Arabia, UAE, Turkey, to name a few.

According to these documents, Silk Way Airlines offered diplomatic flights to private companies and arms manufacturers from the US, Balkans, and Israel, as well as to the militaries of Saudi Arabia, UAE, and US Special Operations Command (USSOCOM), and the military forces of Germany and Denmark in Afghanistan and of Sweden in Iraq. Diplomatic flights are exempt of checks, air bills, and taxes, meaning that Silk Way airplanes freely transported hundreds of tons of weapons to different locations around the world without regulation. They made technical landings with stays varying from a few hours to up to a day in intermediary locations without any logical reasons such as needing to refuel the planes.

According to the International Air Transport Association (IATA) Dangerous Goods Regulations, operators, transporting dangerous goods forbidden for transportation by air by civil aircrafts, must apply for exemption for transportation of dangerous goods by air.

According to the documents, Azerbaijan’s Foreign Ministry has sent instructions to its embassies in Bulgaria and many other European countries to request diplomatic clearance for Silk Way Airlines flights. The embassies sent diplomatic notes to the Foreign Ministry of the relevant country to request such exemption. The Foreign Ministry sent back a note signed by the local civil aviation authorities giving exemption for the transportation of dangerous goods.

The requests for diplomatic clearance included information about the type and quantity of the dangerous goods – heavy weapons and ammunition. However, the responsible authorities of many countries (Bulgaria, Serbia, Romania, the Czech Republic, Hungary, Slovakia, Poland, Turkey, Germany, UK, Greece, etc.) have turned a blind eye and allowed diplomatic flights for the transport of tons of weapons, carried out by civil aircrafts for military needs. Under IATA regulations, the transport of military cargo by civil aircrafts is not allowed. To get around this legality, Silk Way Airlines applied for diplomatic exemption through local agencies.

 

U.S. sends $1 billion worth of weapons

Among the main customers of the “diplomatic flights for weapons” service provided by Silk Way Airlines are American companies, which supply weapons to the US army and US Special Operations Command. The common element in these cases is that they all supply non-US standard weapons; hence, the weapons are not used by the US forces.

According to the register of federal contracts, over the last 3 years American companies were awarded $1 billion contracts in total under a special US government program for non-US standard weapon supplies. All of them used Silk Way Airlines for the transport of weapons. In some cases when Silk Way was short of aircrafts due to a busy schedule, Azerbaijan Air Force aircrafts transported the military cargo, although the weapons never reached Azerbaijan.

%d0%b4%d0%be%d0%ba%d1%83%d0%bc%d0%b5%d0%bd%d1%823-1The documents leaked from the Embassy include shocking examples of weapon transport. A case in point: on 12th May 2015 an aircraft of Azerbaijan Air Forces carried 7,9 tons of PG-7V and 10 tons of PG-9V to the supposed destination via the route Burgas (Bulgaria)-Incirlik (Turkey)-Burgas-Nasosny (Azerbaijan). The consignor was the American company Purple Shovel, and the consignee – the Ministry of Defense of Azerbaijan. According to the documents, however, the military cargo was offloaded at Incirlik military base and never reached the consignee. The weapons were sold to Purple Shovel by Alguns, Bulgaria, and manufactured by Bulgaria’s VMZ military plant.

%d0%b4%d0%be%d0%ba%d1%83%d0%bc%d0%b5%d0%bd%d1%823-1 According to the federal contracts registry, in December of 2014 USSOCOM signed a $26.7 million contract with Purple Shovel. Bulgaria was indicated as the country of origin of the weapons.

On 6th June 2015, a 41-year old American national Francis Norvello, an employee of Purple Shovel, was killed in a blast when a rocket-propelled grenade malfunctioned at a military range near the village of Anevo in Bulgaria. Two other Americans and two Bulgarians were also injured. The US Embassy to Bulgaria then released a statement announcing that the U.S. government contractors were working on a U.S. military program to train and equip moderate rebels in Syria. Which resulted in the U.S. Ambassador in Sofia to be immediately withdrawn from her post. The very same weapons as those supplied by Purple Shovel were not used by moderate rebels in Syria. In December of last year while reporting on the battle of Aleppo as a correspondent for Bulgarian media I found and filmed 9 underground warehouses full of heavy weapons with Bulgaria as their country of origin. They were used by Al Nusra Front (Al Qaeda affiliate in Syria designated as a terrorist organization by the UN).

Another U.S. contractor involved in the same program for non-US standard military supplies is Orbital ATK. This company received $250 million over just the past two years. Information as to what type of weapons and to whom those weapons were supplied is classified.

According to the documents, Orbital ATK transported weapons on 6 diplomatic Silk Way Airlines flights in July and August of 2015 flying the route Baku (Azerbaijan)-Tuzla (Bosnia and Herzegovina)-Baku-Kabul (Afghanistan). The weapons were exported by IGMAN j.j. Konjic, (Bosnia and Herzegovina) commissioned by Orbital ATK. The consignee was the National Police of Afghanistan. Interestingly, all these diplomatic flights with weapons had technical landings and a 7 h 30 min stop at Baku before their final destination – Afghanistan.

Military aircrafts of Azerbaijan transported 282 tons of cargo (PG-7VL and other grenades) on 10 diplomatic flights in April and May 2017 to the destination Baku-Rijeka (Croatia)-Baku. The consignor was the Ministry of Defense of Azerbaijan, and the consignee – Culmen International LLC, USA. This same company has been awarded two contracts ($47 million each) along with other contractors for non-US standard weapon supplies on 18 February 2016 and 19 April 2017 respectively. Culmen International LLC has also signed a $26.7 million contract for foreign weapons with the Department of Defense and a $3.9 million contract for newly manufactured non-US standard weapons.

Chemring Military Products is another main contractor in the program for non-US standard weapon supplies to the US army through diplomatic Silk Way Airlines flights. This military supplier has 4 contracts for $302.8 million in total. The weapons were purchased from local manufacturers in Serbia, Bulgaria, and Romania and according to documents transported to Iraq and Afghanistan via diplomatic flights.

One of those flights in particular, on 18 October 2016, carrying 15.5 tons of 122 mm rockets bought by Chemring in Belgrade, Serbia, was diverted from its destination – Kabul, and instead landed in Lahore, Pakistan. After a 2-hour stop, the aircraft took off to Afghanistan. The only possible explanation for the extension of the flight by a thousand kilometers is offloading in Pakistan, even though documents stated that the cargo was destined for Afghanistan.

%d0%b4%d0%be%d0%ba%d1%83%d0%bc%d0%b5%d0%bd%d1%825The largest non-US standard weapons supplier to the US army is Alliant Techsystems Operations-USA with contracts totalling $490.4 million. In December of 2016, this company transported tons of grenades (API 23×115 mm, HE 23×115 mm, GSH 23×115 mm) from Yugoimport, Serbia to the Afghani Defense Ministry on diplomatic flights to the destination Baku-Belgrade-Kabul.

 

Saudi Arabia – sponsor and arms distributor

Besides the USA, another country that has purchased huge quantities of Eastern-European weapons and exported them on Silk Way Airlines diplomatic flights is Saudi Arabia. In 2016 and 2017, there were 23 diplomatic flights carrying weapons from Bulgaria, Serbia and Azerbaijan to Jeddah and Riyadh. The consignees were VMZ military plant and Transmobile from Bulgaria, Yugoimport from Serbia, and CIHAZ from Azerbaijan.

The Kingdom does not buy those weapons for itself, as the Saudi army uses only western weapons and those weapons are not compatible with its military standard. Therefore, the weapons transported on diplomatic flights end up in the hands of the terrorist militants in Syria and Yemen that Saudi Arabia officially admits supporting.

The Arab Kingdom also distributes military cargo to South Africa – a region plagued by wars over the control of the wealth in gold and diamonds found in African countries.

On 28 April and 12 May this year, Silk Way carried out two diplomatic flights from Baku to Burgas-Jeddah-Brazzaville (Republic of Congo). The military cargo on-board of both flights was paid for by Saudi Arabia, according to the documents leaked from Azerbaijan’s Embassy to Bulgarian sources. The aircraft made a technical landing at Jeddah airport with a 12 h 30 min stop for the first flight and 14 h stop for the second one.

The aircraft was loaded with mortars and anti-tank grenades including SPG-9 and GP-25. These very same weapons were discovered by the Iraqi army a month ago in an Islamic State warehouse in Mosul. Islamic State jihadists are also seen using those heavy weapons in propaganda videos posted online by the terrorist group. Interestingly, the consignee on the transport documents, however, is the Republican Guards of Congo.

Coyote machine gun 12,7х108 mm appeared in videos and photos posted online by militant groups in Idlib and the province of Hama in Syria. The same type of weapon was transported on a diplomatic flight via Turkey and Saudi Arabia a few months earlier.
Coyote machine gun 12,7х108 mm appeared in videos and photos posted online by militant
groups in Idlib and the province of Hama in Syria. The same type of weapon was transported on
a diplomatic flight via Turkey and Saudi Arabia a few months earlier.

February and March of 2017, Saudi Arabia received 350 tons of weapons on Silk Way diplomatic flights flying to the route Baku-Belgrade-Prince Sultan-Baku. The cargo included 27 350 psc. 128-mm Plamen-a rockets and 10 000 pcs. 122 mm Grad rockets. The consignor was Tehnoremont Temerin, Serbia to order by Famеway Investment LTD, Cypruss.

On 5 March 2016, an Azerbaijan Air Force aircraft carried 1700 pcs. RPG-7 (consignor: Ministry of Defense of Azerbaijan) and 2500 pcs. PG-7VM (consignor: Transmobilе Ltd., Bulgaria) for the Defense Ministry of Saudi Arabia. Diplomatic flights from Burgas Airport to Prince Sultan Airport on 18 and 28 February 2017 each carried a further 5080 psc. 40 mm PG-7V for RPG-7 and 24 978 psc. RGD-5. The weapons were exported by Transmobile, Bulgaria to the Ministry of Defense of Saudi Arabia. Such munitions and RPG-7 originating in Bulgaria can often be seen in videos filmed and posted by the Islamic State on their propaganda channels.

UAE is another Arab country that has purchased Eastern European weapons which are not compatible with its military standards and were apparently re-supplied to a third party. On three flights to Burgas-Abu Dhabi-Swaihan in March and April of 2017, Silk Way transported 10.8 tons of PG7VM HEAT for 40 mm RPG-7 on each flight with technical landing and a 2-hour stop in Abu Dhabi. The exporter is Samel-90, Bulgaria, the importer – Al Tuff International Company LLC. The latter company is involved with Orbital ATK LLC, which is the Middle East subsidiary of the American military company Orbital ATK. Although the ultimate consignee is the UAE army, the documents of the flight reveal that the sponsoring party is Saudi Arabia.

 

Cash Payments

%d0%b4%d0%be%d0%ba%d1%83%d0%bc%d0%b5%d0%bd%d1%828On 26 February 2016, an Azerbaijan Air Force aircraft took off from Baku and landed in UAE, where it loaded two armored vehicles and one Lexus car. The request for diplomatic clearance indicated the payment as cash – US dollars. The aircraft landed in North Sudan and, the next day, in the Republic of Congo. The exporter was Safe Cage Armour Works FZ LLC, UАЕ and the receiving party was the Republican Guards of Congo. The sponsoring party, however, was Saudi Arabia.

 

Diplomatic Flights carry deadly white phosphorus

White Phosphorus is an incendiary weapon whose use is very controversial due to the deadly harms it can inflict. On 31 March 2015, Silk Way transported 26 tons of military cargo including white phosphorus from Serbia (exporter: Yugoimport) and 63 tons from Bulgaria (exporter: Arsenal). On 22 March, another 100 tons of white phosphorus were exported from Yugoimport, Belgrade to Kabul. No contract is attached to the documents of those flights.

On 2 May 2015, a Silk Way aircraft loaded 17 tons of ammunition, including white phosphorus, at Burgas airport. The exporter was Dunarit, Bulgaria. The aircraft made a technical landing and a 4-hour stop at Baku before reaching its final destination – Kabul. The consignee was the Afghani police. No contract is attached as proof.

 

Baku – international hub for weapons

Azerbaijan’s Ministry of Defense was repeatedly the consignee of weapons which it actually did not receive. On 6 May 2015, an Azerbaijani military aircraft flew to Burgas (Bulgaria)-Incirlik (Turkey)-Burgas. It carried aviation equipment from Bulgaria to Turkey with the consigner: EMCO LTD, Sofia, and consignee – Ministry of Defense of Azerbaijan. However, the cargo was offloaded in Turkey and never reached Azerbaijan.

Some of the weapons that Azerbaijan carries on diplomatic flights were used by its military in Nagorno-Karabakh against Armenia. In 2016, Azerbaijan accused Armenia of using white phosphorus. Armenia denied the allegations and in turn accused Azerbaijan of fabrication, as the only piece of evidence was based on a single unexploded grenade found by Azerbaijan’s soldiers. According to the documents from the Embassy of Azerbaijan in Sofia, white phosphorus munitions were carried on a diplomatic flight via Baku the previous year.

Baku plays the role of an international hub for weapons. Many of the flights make technical landings with stops of a few hours at Baku airport or other intermediary airports en-route to their final destinations. Moreover, these types of aircrafts flying to the same destinations do not typically make technical landings. Therefore, a landing for refueling is not actually required. Despite this, Silk Way aircrafts constantly made technical landings. A case in point: in December of 2015 Silk Way carried out 14 flights with 40 tons of weapons on each flight to the destination Ostrava (the Czech Republic)-Ovda (Israel)-Nososny (Azerbaijan). The exporter is not mentioned in the documents while the receiver is consistently the Defense Ministry of Azerbaijan. Strangely, the aircraft diverted and landed at Ovda airport (a military base in Southern Israel), where it remained for 2 hours.

In 2017, there were 5 flights from Nish (Serbia) via Ovda (Israel) to Nasosny (Azerbaijan). Each flight carried 44 tons of cargo – SPG Howitzer, RM-70/85. The consignor is MSM Martin, Serbia, the consignee: Elbit Systems, Israel, and the Ministry of Defense of Azerbaijan. All aircrafts landed in Israel and stayed for 2 hours en-route to Azerbaijan.

The same Israeli company Elbit Systems on a flight from Barno (the Czech Republic) via Tel Aviv (Israel) to Bratislava (Slovakia) re-exported armored vehicles (TATRA T-815 VP31, TATRA T-815 VPR9). They were sent by Real Trade, Prague to Elbit Systems. The ultimate consignee, however, was the Ministry of Defense of Azerbaijan. The aircraft landed in Tel Aviv and then in Bratislava, where the cargo was imported by another company – MSM Martin, Slovakia. It is not clear why the plane flew from Europe to Asia and then back to Europe with the same cargo on-board. Ultimately, it did not reach its final destination – Azerbaijan. This type of aircraft, IL 76TD, can carry cargo of up to 50 tons. This one carried only 30 tons according to the documentation provided. Therefore, it could carry additional cargo of 20 tons. Since the flight was diplomatic, it was not subjected to inspection.

 

A military coup after a diplomatic flight to Burkina Faso

Some diplomatic flights carry weapons for different conflict zones crossing Europe, Asia and Africa. Such is the case with two Azerbaijan Air Forces flights to the destination Baku-Belgrade-Jeddah-Brazzaville-Burkina Faso on 30 August and 5 September 2015. The consignors were CIHAZ, Azerbaijan, and Yugoimport, Serbia. The consignee was the Ministry of Defense of the Republic of Congo. The aircraft made two technical landings – in Turkey and Saudi Arabia.

The 41.2-ton cargo from Baku and Belgrade included: 7, 62 mm cartridges, 12 pcs. sniper rifles, 25 pcs. М12 “Black Spear” calibre 12,7х108 mm, 25 psc. RBG 40×46 mm/6M11, and 25 pcs. Coyote machine gun 12,7х108 mm with tripods. The same heavy machine gun appeared in videos and photos posted online by militant groups in Idlib and the province of Hama in Syria a few months later. The aircraft also carried: 1999 psc. M70B1 7,62х39 mm and 25 psc. М69А 82 мм. On 26 February 2016, a video featuring the same М69А 82 mm weapons was posted to Youtube by a militant group calling itself Division 13 and fighting north of Aleppo.

%d0%b4%d0%be%d0%ba%d1%83%d0%bc%d0%b5%d0%bd%d1%8212Interestingly, the aircraft that carried the same type of weapons landed in Diyarbakir (Turkey), 235 km away from the border with Syria. Another type of weapon, RBG 40 mm/6M11, which was from the same flight and supposedly destined for Congo too, appeared in a video of the Islamic Brigade of Al Safwa in Northern Aleppo.

After Turkey, the aircraft landed in Saudi Arabia and remained there for a day. Afterwards it landed in Congo and Burkina Faso. A week later, there was an attempted military coup in Burkina Faso.

 

300 tons of RPG-s, machine guns and ammunition for the Kurds

In March of 2017, over 300 tons of weapons were allegedly sent to the People’s Protection Units (YPG) in Northern Syria. Six diplomatic flights transported 43 tons of grenades on each flight from VMZ Military Plant, Bulgaria, to the Defense Ministry of Iraq. There are no contracts applied, however. On 28 March, 82 tons of cargo (AKM 7,62×39 mm and AG-7) were sent from Otopeni (Romania) to Erbil (Iraqi Kurdistan). The consignor was Romtechnica S.A., the consignee – again the Ministry of Defense in Baghdad. No contracts are provided for this flight either.

On 16 March 2016, yet another Silk Way diplomatic flight carried 40 tons of military cargo from Slovenia to Erbil: the exporter is ELDON S.R.O., Slovakia, the importer – Wide City Ltd. Co, Erbil, the final consignee – the government of Kurdistan.

Wide City Ltd. Co has three offices – in Limassol (Cyprus), Sofia (Bulgaria) and Erbil. The office of the Bulgarian company Techno Defence Ltd is at the address in Sofia. On the website of the company, the owner of Techno Defense Ltd Hair Al Ahmed Saleh claims that he has an office in Erbil and that his company manufactures Zagros weapons in Azerbaijan (K15 zagros, 9×19 mm and automatic K16 zagros). These types of Zagros weapons appeared in propaganda footage posted by the military wing of the Kurdish PKK party, which is designated as a terrorist organisation by Turkey. The President of Azerbaijan Ilham Aliev is also an ethnical Kurd.

I reached out to all sides concerned involving my investigation. However, I have not received any comment.

Allowing Kaspersky Labs in the U.S. Defies Logic

Germany next:Germany big target of cyber espionage and attacks: government report

Barack Obama’s sanction and executive order hardly went far enough on Russia. For Russian Laws and Regulations and Implications for Kaspersky Labs and certificates, go here.

Documents link Russian cybersecurity firm to spy agency

WASHINGTON — U.S. intelligence agencies have turned up the heat on Kaspersky Lab, the Moscow-based cybersecurity giant long suspected of ties to Russia’s spying apparatus.

Now, official Kremlin documents reviewed by McClatchy could further inflame the debate about whether the company’s relationship with Russian intelligence is more than rumor.

The documents are certifications issued to the company by the Russian Security Service, the spy agency known as the FSB.

Unlike the stamped approvals the FSB routinely issues to companies seeking to operate in Russia, Kaspersky’s include an unusual feature: a military intelligence unit number matching that of an FSB program.

“That strikes me as much more persuasive public evidence,” said Paul Rosenzweig, a former deputy secretary for policy at the Department of Homeland Security. “It makes it far more likely that much of the rumor and uncertainty about Kaspersky are true.”

For years, suspicions that Kaspersky is connected to Russia’s spying network have dogged the company, a leading global seller of anti-virus programs. Founder and CEO Eugene Kaspersky studied cryptography, programming and mathematics at an academy operated by the KGB, the FSB’s Soviet-era predecessor, and then worked for the Ministry of Defense.

Since he established the company, it has grown to serve more than 400 million users worldwide, according to its website, and is the largest software vendor in Europe. Its security software is also widely available in the United States.

U.S. agencies also use it, with Kaspersky a subcontractor on federal software contracts. The Democratic National Committee has also used the software, even after its emails were breached last summer by Russian hackers.

But during investigations into Russia’s meddling in last year’s U.S. elections, concerns have grown that Kaspersky software could somehow be used to launch a cyberattack on the U.S. electric grid or other critical infrastructure, such as railroads, airlines or water utilities. ABC News reported in May that the FBI warned industry leaders about those risks last year at a meeting confirmed by McClatchy.

One of Kaspersky’s certificates that carries a military intelligence unit number.
GREG GORDON/MCCLATCHY/TNS

In recent days, two events kept Kaspersky in the news: FBI agents fanned out to interview Russian Kaspersky employees based in the United States, and a Senate committee approved legislation to curb federal use of the company’s products.

Even so, no proof has ever been made public to refute the company’s denials that it has connections to Russian intelligence.

The documents obtained by McClatchy, however, could provide additional evidence that the clandestine FSB has a tight relationship with Kaspersky.

In a statement to McClatchy, the company did not directly address the reference to an FSB military unit number in several of its certificates dating to 2007. The certificates are posted on Kaspersky’s website.

Kaspersky said the FSB’s certification review “is quite similar to that of many countries,” including those of the European Union and the United States. It includes an analysis of the company’s source code “to ensure that undeclared functionality and security issues — like backdoors — do not exist,” the company said.

However, Russia’s certification reviews do not require the company to divulge “the necessary information to permit those (spy) organizations to bypass products’ security mechanisms,” Kaspersky said.

After this story was initially published, the company said it and other high-tech companies that seek to sell products to the Russian government receive their certifications from the Center for Information Protection and Special Communications, known by the FSB military unit number on Kaspersky’s certificates.

A former Western intelligence official who examined the documents for McClatchy described as “very unusual” the assignment of a military intelligence number on Kaspersky’s certificates.

In Russia’s closed society, the FSB retains the right to access any company’s data transmissions, and no firm is allowed to use encryption to block the intelligence agency’s intrusions, the former Western spy said.

Kenneth Geers, a former NATO expert who is a fellow at the Washington-based Atlantic Council, also reviewed the company’s FSB certificate.

Geers said he could not say with certainty the degree to which the documents show a connection between Kaspersky and the FSB.

But “the suggestion is that this is a government op (operation), a unit with a direct government affiliation,” he said.

“No one should be surprised if there are closer relationships between IT vendors and law enforcement, worldwide, than the public imagines,” Geers said.

Case in point: Whistleblower Edward Snowden revealed that American telecommunications companies shared vast amounts of personal data with the U.S. National Security Agency, where Geers once worked.

It’s possible, Geers said, that Kaspersky’s software contains a secret “backdoor” to allow Russian special services access for law enforcement and counterintelligence purposes.

“If such a secret backdoor exists, I would not be shocked,” Geers said. “A worldwide deployment of sensors may be too great a temptation for any country’s intelligence services to ignore.

“Kaspersky may also have been required by Russian authorities to participate in a quiet business partnership with the government,” he said.

A former CIA station chief in Moscow agreed that Kaspersky may have had little choice.

“These guys’ families, their well-being, everything they have is in Russia,” said Steve Hall, who later headed the agency’s Russian operations before retiring in 2015.

Kaspersky is “a Russian company,” Hall said. “Any time (Russian President Vladimir Putin) wants Kaspersky to do something — anything — he’ll remind them that’s where their families are and where their bank accounts are. There’s no doubt in my mind it could be, if it’s not already, under the control of Putin.”

Kaspersky has rejected any notion that it might be an intelligence front, citing its years of delivering quality products.

“As a private company, Kaspersky Lab has no ties to any government, and the company has never helped, nor will help, any government in the world with its cyber espionage efforts,” Eugene Kaspersky said in May during an “Ask Me Anything” session on the website Reddit.

Many cyber experts, including those with federal government backgrounds, have praised the quality of Kaspersky software. The company also has a record of exposing cyberattacks, including the U.S. government’s Stuxnet attack that disabled Iran’s nuclear weapons development even though the Iranian equipment wasn’t connected to the Internet.

But several other experts said they were “not shocked” by the disclosure of the language in Kaspersky’s FSB certificate.

“It is common view around the intelligence community that (Kaspersky) is treated (by the Kremlin) like an arm of the Russian government,” said a former Obama administration cyber official, who asked for anonymity because of the sensitivity of the matter.

Kaspersky has attracted an unwanted spotlight lately in the Justice Department’s investigation headed by special counsel Robert Mueller into whether the Kremlin colluded with President Donald Trump’s 2016 campaign.

At a Senate Intelligence Committee hearing in May, Sens. Marco Rubio, R-Fla., and Joe Manchin, D-W.Va., raised concerns about Kaspersky.

Rubio asked of intelligence agency chiefs, “Would any of you be comfortable with the Kaspersky Lab software on your computers?”

Before him were, among others, the leaders of the FBI, CIA and the National Security Agency.

Each said “no.”

The FBI interviews of Kaspersky employees were conducted June 27, after disclosures that the company paid retired Army Lt. Gen. Michael Flynn more than $11,000 in consulting fees last fall before he began a short-lived stint as Trump’s national security adviser.

The day after the interviews, the Senate Armed Service Committee approved legislation that would bar the Pentagon from buying Kaspersky products.

“The ties between Kaspersky Lab and the Kremlin are very alarming,” said Sen. Jeanne Shaheen, D-N.H. “This has led to a consensus in Congress and among administration officials that Kaspersky Lab cannot be trusted to protect critical infrastructure, particularly computer systems vital to our nation’s security.”

Her amendment to the defense authorization bill prohibiting Pentagon purchase of the software as of October 2018 won overwhelming approval.

If the amendment becomes law, there could be consequences, a Russian news agency reported. It quoted a top Kremlin communications official, Nikolai Nikiforov, as warning that if the United States freezes out Kaspersky, Putin’s government could not rule out retaliation.

The FBI declined to comment. But the bureau has long suspected that some of Kaspersky’s American-based employees were engaging in intelligence activities, said a U.S. government official, who declined to be identified because of the sensitivity of the matter.

Federal agencies have at least 20 contracts in which Kaspersky products are used. The General Services Administration makes them available on an approved product list for much of the government.

CDW, a top government tech contractor that has provided Kaspersky software and maintenance through four contracts with the Consumer Safety Product Commission (as recently as May 23), declined to say whether it plans to continue offering Kaspersky software.

Dell, the giant computer manufacturer, offers Kaspersky in many of its products. The company did not respond to a request for comment.

So why do federal agencies still use Kaspersky software if there has been such uneasiness about it inside national security circles?

“Under acquisition rules, it is very difficult for an agency to rely on classified information in order to make purchasing decisions,” said J. Michael Daniel, White House cybersecurity coordinator during the Obama administration.

“A lot of acquisition officers didn’t seek out that information because they couldn’t use it in the decision-making process,” said Daniel, now president of the Cyber Threat Alliance, a group committed to improving cyber defenses.

The U.S. intelligence community’s conclusion that Russian cyber operatives pirated thousands of emails from the Democratic National Committee beginning in 2015 helped trigger the inquiries into possible Kremlin interference in the election.

But two months after the DNC disclosed that its servers had been hacked — in an apparent attempt to help prevent further intrusions — the party purchased Kaspersky software on Aug. 25, 2016, for $137.46, according to Federal Election Commission records. It was the only federal political committee that reported buying Kaspersky software in the 2016 cycle, according to FEC records.

A DNC spokesman did not respond to a request for comment.

For its part, the company publishes a blog that advises consumers about computer viruses. The U.S. government official said, though, that in the past Kaspersky has aroused suspicions as to why it warns about some computer bugs but not others.

The firm’s presence has become so embedded in the U.S. economy that the company sponsors a Ferrari Formula One racing team, robotic competitions for children and is among the corporate sponsors of an upcoming conference of the National Conference of State Legislatures.

“They have a big public relations wing,” said the U.S. government official who spoke on condition of anonymity. “They’re fully aware they’re under the microscope.”

Peter Smith and Hillary’s 30,000 Missing Emails

Peter Smith and Michael Flynn knew each other and communicated often. Peter Smith was 81 years old when he died, but what does Flynn have when it comes to 30,000 emails that Hillary deleted? Once Smith was able to located Russian hackers that admitted hacking Hillary’s emails, the question is where are they and why were they never published?

Performing attribution, ensuring they are real, confirming they have not been doctored is the challenge, after all Russians are in the equation. However, cyber experts performing the review have an above 90% certainty. Peter Smith was not associated at all with any part of the Trump camp but did support his race for the White House.

Meanwhile, special council Robert Mueller and his team are likely passing out subpoenas to get all the pieces of the electronic trail on this.

Image result for peter smith hackers Peter Smith/NYDailyNews

Humm…let’s go deeper for background and context. Once you read below, you will have thousands of questions and some are answered here in the follow up podcast with the WSJ journalist that broke the story.

***

A new report raises some big questions about Michael Flynn and Russian hackers

The Wall Street Journal describes how one Trump supporter reached out to hackers — and dropped Flynn’s name.

A tantalizing new report from Shane Harris of the Wall Street Journal gives the strongest indication yet that collusion may have occurred — or was at least attempted — between supporters of Donald Trump’s 2016 presidential campaign and Russian hackers who targeted Democrats’ emails.

And it raises serious questions about whether fired National Security Adviser Michael Flynn was involved in these efforts to contact hackers.

Harris describes an effort by Peter Smith, a Trump-supporting GOP operative and private equity executive, to track down Hillary Clinton’s infamous 30,000 or so deleted emails during the fall of 2016.

The effort, described on the record to Harris by Smith (the 81-year old man died a week and a half after their interview), entailed outreach to several hacker groups, including at least two that Smith believed to be Russian-tied, to see if they had hacked the emails and could release them.

The emails — which Clinton said she deleted because they were personal and unrelated to her work as secretary of state — never surfaced. And Smith didn’t work for the Trump campaign.

But this new report could be especially significant because of one name that keeps coming up: Michael Flynn, who at the time was advising the Trump campaign.

Smith repeatedly claimed that he was in contact with Flynn about the effort to find Clinton’s emails, per Harris’s sources.

“He said, ‘I’m talking to Michael Flynn about this — if you find anything, can you let me know?’” said Eric York, a computer-security expert from Atlanta who searched hacker forums on Mr. Smith’s behalf for people who might have access to the emails. …

… In phone conversations, Mr. Smith told a computer expert he was in direct contact with Mr. Flynn and his son, according to this expert. … The expert said that based on his conversations with Mr. Smith, he understood the elder Mr. Flynn to be coordinating with Mr. Smith’s group in his capacity as a Trump campaign adviser.

Furthermore, Harris describes, apparently for the first time, US intelligence reports claiming Russian hackers discussed how to get hacked emails to Flynn through a third party.

Investigators have examined reports from intelligence agencies that describe Russian hackers discussing how to obtain emails from Mrs. Clinton’s server and then transmit them to Mr. Flynn via an intermediary, according to U.S. officials with knowledge of the intelligence.

If accurate, all this is enough to raise serious questions about just what Flynn knew about this or any other attempted outreach to Russian hackers.

How this story fits into the timeline of the hackings

It’s no secret that Trump wanted someone to find Clinton’s deleted emails — he said as much publicly.

To recap: When word got out that Clinton had used a personal email account for all her work at the State Department, she agreed to hand over the work-related emails on that account to government investigators. But it turned out that she had previously deemed about 32,000 emails (about half of the total) to be “personal” rather than work-related, and deleted them.

Many conservatives didn’t take Clinton’s explanation for why she deleted the emails at face value, and questioned whether the deleted emails could have included some incriminating information that might reveal scandalous behavior of some kind. One of those Republicans was Trump, who repeatedly referenced the deleted emails on the campaign trail.

In July 2016, hacked emails from the Democratic National Committee were publicly released, and the hacks were thought to be the work of Russia. And at the time, Trump said in public that he hoped there would be email releases to come — including Clinton’s deleted ones.

“Russia, if you’re listening, I hope you’re about to find the 30,000 [Hillary Clinton] emails that are missing,” he said at a press conference. “I think you will probably be rewarded mightily by our press. Let’s see if that happens. That will be next.”

A few months after this, in fall 2016, Peter Smith launched the effort reported by the Journal to try to get the emails from hacking groups that he thought might have them — including hacking groups he understood to be tied to the Russian government.

Again, though, it seems that no one did have Clinton’s deleted emails. The biggest Russia-linked email hacks and dumps involved the DNC accounts (released in July 2016) and Clinton campaign chair John Podesta’s emails (released in October 2016), but no emails from Clinton’s own server.

Michael Flynn’s potential involvement could be highly significant

Still, one major question has always been whether any Trump associates were involved in these or other hacking efforts.

There’s been a whole lot of evidence that several Trump associates (including Flynn) had ties to Russian officials, and of course it was clear that Trump’s public policies were far more pro-Russia than the Republican norm.

But there really hasn’t been very much evidence tying anyone in Trumpworld to any hacking — making it plausible that the hacking operations were carried out without any coordination or contacts with anyone in Trump’s camp.

Harris’s story changes that somewhat. Now we know of Smith’s outreach to Russian hackers — and, more importantly, his claims that Flynn (who was close to Trump) may have known too. And there’s that other claim that US intelligence suggests Russian hackers were discussing giving hacked emails to Flynn. Where would they get that idea?

Any involvement from Flynn could be quite significant. He’s known to have had many contacts with Russian officials, and he advised Trump on foreign policy matters during the presidential campaign.

Afterward, Trump named him national security adviser. But he didn’t last long in the post, resigning in February due to controversy over whether he falsely described his contacts with Russian Ambassador Sergey Kislyak during the transition.

By then, the White House had been told that Flynn was under federal investigation. And then-FBI Director James Comey has since testified that the day after Flynn’s firing, President Trump took him aside and told him, “I hope you can see your way clear to letting this go, to letting Flynn go. He is a good guy. I hope you can let this go.”

So Trump has already been trying to shield Flynn from investigators — making the question of just what Flynn might know ever more interesting, and one that will certainly be on special counsel Robert Mueller’s mind.

WannaCry Hacking Bad, but This is Terrifying

WASHINGTON — CIA Director Mike Pompeo says he thinks disclosure of America’s secret intelligence is on the rise, fueled partly by the “worship” of leakers like Edward Snowden.

“In some ways, I do think it’s accelerated,” Pompeo told MSNBC in an interview that aired Saturday. “I think there is a phenomenon, the worship of Edward Snowden, and those who steal American secrets for the purpose of self-aggrandizement or money or for whatever their motivation may be, does seem to be on the increase.”

Pompeo said the United States needs to redouble its efforts to stem leaks of classified information. More here.

***

A Cyberattack ‘the World Isn’t Ready For’

Golan Ben-Oni, of the IDT Corporation, which was attacked in April with two cyberweapons stolen from the National Security Agency.  Justin T. Gellerson for The New York Times

NEWARK — There have been times over the last two months when Golan Ben-Oni has felt like a voice in the wilderness.

On April 29, someone hit his employer, IDT Corporation, with two cyberweapons that had been stolen from the National Security Agency. Mr. Ben-Oni, the global chief information officer at IDT, was able to fend them off, but the attack left him distraught.

In 22 years of dealing with hackers of every sort, he had never seen anything like it. Who was behind it? How did they evade all of his defenses? How many others had been attacked but did not know it?

Since then, Mr. Ben-Oni has been sounding alarm bells, calling anyone who will listen at the White House, the Federal Bureau of Investigation, the New Jersey attorney general’s office and the top cybersecurity companies in the country to warn them about an attack that may still be invisibly striking victims undetected around the world.

And he is determined to track down whoever did it.

“I don’t pursue every attacker, just the ones that piss me off,” Mr. Ben-Oni told me recently over lentils in his office, which was strewn with empty Red Bull cans. “This pissed me off and, more importantly, it pissed my wife off, which is the real litmus test.”

Two weeks after IDT was hit, the cyberattack known as WannaCry ravaged computers at hospitals in England, universities in China, rail systems in Germany, even auto plants in Japan. No doubt it was destructive. But what Mr. Ben-Oni had witnessed was much worse, and with all eyes on the WannaCry destruction, few seemed to be paying attention to the attack on IDT’s systems — and most likely others around the world.

The strike on IDT, a conglomerate with headquarters in a nondescript gray building here with views of the Manhattan skyline 15 miles away, was similar to WannaCry in one way: Hackers locked up IDT data and demanded a ransom to unlock it.

But the ransom demand was just a smoke screen for a far more invasive attack that stole employee credentials. With those credentials in hand, hackers could have run free through the company’s computer network, taking confidential information or destroying machines.

Worse, the assault, which has never been reported before, was not spotted by some of the nation’s leading cybersecurity products, the top security engineers at its biggest tech companies, government intelligence analysts or the F.B.I., which remains consumed with the WannaCry attack.

Were it not for a digital black box that recorded everything on IDT’s network, along with Mr. Ben-Oni’s tenacity, the attack might have gone unnoticed.

Scans for the two hacking tools used against IDT indicate that the company is not alone. In fact, tens of thousands of computer systems all over the world have been “backdoored” by the same N.S.A. weapons. Mr. Ben-Oni and other security researchers worry that many of those other infected computers are connected to transportation networks, hospitals, water treatment plants and other utilities.

An attack on those systems, they warn, could put lives at risk. And Mr. Ben-Oni, fortified with adrenaline, Red Bull and the house beats of Deadmau5, the Canadian record producer, said he would not stop until the attacks had been shut down and those responsible were behind bars.

“The world is burning about WannaCry, but this is a nuclear bomb compared to WannaCry,” Mr. Ben-Oni said. “This is different. It’s a lot worse. It steals credentials. You can’t catch it, and it’s happening right under our noses.”

And, he added, “The world isn’t ready for this.”

Targeting the Nerve Center

Mr. Ben-Oni, 43, a Hasidic Jew, is a slight man with smiling eyes, a thick beard and a hacker’s penchant for mischief. He grew up in the hills of Berkeley, Calif., the son of Israeli immigrants.

Even as a toddler, Mr. Ben-Oni’s mother said, he was not interested in toys. She had to take him to the local junkyard to scour for typewriters that he would eventually dismantle on the living room floor. As a teenager, he aspired to become a rabbi but spent most of his free time hacking computers at the University of California, Berkeley, where his exploits once accidentally took down Belgium’s entire phone system for 15 minutes.

To his parents’ horror, he dropped out of college to pursue his love of hacking full time, starting a security company to help the city of Berkeley and two nearby communities, Alameda and Novato, set up secure computer networks.

He had a knack for the technical work, but not the marketing, and found it difficult to get new clients. So at age 19, he crossed the country and took a job at IDT, back when the company was a low-profile long-distance service provider.

As IDT started acquiring and spinning off an eclectic list of ventures, Mr. Ben-Oni found himself responsible for securing shale oil projects in Mongolia and the Golan Heights, a “Star Trek” comic books company, a project to cure cancer, a yeshiva university that trains underprivileged students in cybersecurity, and a small mobile company that Verizon recently acquired for $3.1 billion.

Which is to say he has encountered hundreds of thousands of hackers of every stripe, motivation and skill level. He eventually started a security business, IOSecurity, under IDT, to share some of the technical tools he had developed to keep IDT’s many businesses secure. By Mr. Ben-Oni’s estimate, IDT experiences hundreds of attacks a day on its businesses, but perhaps only four each year give him pause.

Nothing compared to the attack that struck in April. Like the WannaCry attack in May, the assault on IDT relied on cyberweapons developed by the N.S.A. that were leaked online in April by a mysterious group of hackers calling themselves the Shadow Brokers — alternately believed to be Russia-backed cybercriminals, an N.S.A. mole, or both.

The WannaCry attack — which the N.S.A. and security researchers have tied to North Korea — employed one N.S.A. cyberweapon; the IDT assault used two.

Both WannaCry and the IDT attack used a hacking tool the agency had code-named EternalBlue. The tool took advantage of unpatched Microsoft servers to automatically spread malware from one server to another, so that within 24 hours North Korea’s hackers had spread their ransomware to more than 200,000 servers around the globe.

The attack on IDT went a step further with another stolen N.S.A. cyberweapon, called DoublePulsar. The N.S.A. used DoublePulsar to penetrate computer systems without tripping security alarms. It allowed N.S.A. spies to inject their tools into the nerve center of a target’s computer system, called the kernel, which manages communications between a computer’s hardware and its software.

In the pecking order of a computer system, the kernel is at the very top, allowing anyone with secret access to it to take full control of a machine. It is also a dangerous blind spot for most security software, allowing attackers to do what they want and go unnoticed. In IDT’s case, attackers used DoublePulsar to steal an IDT contractor’s credentials. Then they deployed ransomware in what appears to be a cover for their real motive: broader access to IDT’s businesses.

Mr. Ben-Oni learned of the attack only when a contractor, working from home, switched on her computer to find that all her data had been encrypted and that attackers were demanding a ransom to unlock it. He might have assumed that this was a simple case of ransomware.

But the attack struck Mr. Ben-Oni as unique. For one thing, it was timed perfectly to the Sabbath. Attackers entered IDT’s network at 6 p.m. on Saturday on the dot, two and a half hours before the Sabbath would end and when most of IDT’s employees — 40 percent of whom identify as Orthodox Jews — would be off the clock. For another, the attackers compromised the contractor’s computer through her home modem — strange.

The black box of sorts, a network recording device made by the Israeli security company Secdo, shows that the ransomware was installed after the attackers had made off with the contractor’s credentials. And they managed to bypass every major security detection mechanism along the way. Finally, before they left, they encrypted her computer with ransomware, demanding $130 to unlock it, to cover up the more invasive attack on her computer.

Mr. Ben-Oni estimates that he has spoken to 107 security experts and researchers about the attack, including the chief executives of nearly every major security company and the heads of threat intelligence at Google, Microsoft and Amazon.

With the exception of Amazon, which found that some of its customers’ computers had been scanned by the same computer that hit IDT, no one had seen any trace of the attack before Mr. Ben-Oni notified them. The New York Times confirmed Mr. Ben-Oni’s account via written summaries provided by Palo Alto Networks, Intel’s McAfee and other security firms he used and asked to investigate the attack.

“I started to get the sense that we were the canary,” he said. “But we recorded it.”

Since IDT was hit, Mr. Ben-Oni has contacted everyone in his Rolodex to warn them of an attack that could still be worming its way, undetected, through victims’ systems.

“Time is burning,” Mr. Ben-Oni said. “Understand, this is really a war — with offense on one side, and institutions, organizations and schools on the other, defending against an unknown adversary.”

‘No One Is Running Point’

Since the Shadow Brokers leaked dozens of coveted attack tools in April, hospitals, schools, cities, police departments and companies around the world have largely been left to fend for themselves against weapons developed by the world’s most sophisticated attacker: the N.S.A.

A month earlier, Microsoft had issued a software patch to defend against the N.S.A. hacking tools — suggesting that the agency tipped the company off to what was coming. Microsoft regularly credits those who point out vulnerabilities in its products, but in this case the company made no mention of the tipster. Later, when the WannaCry attack hit hundreds of thousands of Microsoft customers, Microsoft’s president, Brad Smith, slammed the government in a blog post for hoarding and stockpiling security vulnerabilities.

For his part, Mr. Ben-Oni said he had rolled out Microsoft’s patches as soon as they became available, but attackers still managed to get in through the IDT contractor’s home modem.

Six years ago, Mr. Ben-Oni had a chance meeting with an N.S.A. employee at a conference and asked him how to defend against modern-day cyberthreats. The N.S.A. employee advised him to “run three of everything”: three firewalls, three antivirus solutions, three intrusion detection systems. And so he did.

But in this case, modern-day detection systems created by Cylance, McAfee and Microsoft and patching systems by Tanium did not catch the attack on IDT. Nor did any of the 128 publicly available threat intelligence feeds that IDT subscribes to. Even the 10 threat intelligence feeds that his organization spends a half-million dollars on annually for urgent information failed to report it. He has since threatened to return their products.

“Our industry likes to work on known problems,” Mr. Ben-Oni said. “This is an unknown problem. We’re not ready for this.”

No one he has spoken to knows whether they have been hit, but just this month, restaurants across the United States reported being hit with similar attacks that were undetected by antivirus systems. There are now YouTube videos showing criminals how to attack systems using the very same N.S.A. tools used against IDT, and Metasploit, an automated hacking tool, now allows anyone to carry out these attacks with the click of a button.

Worse still, Mr. Ben-Oni said, “No one is running point on this.”

Last month, he personally briefed the F.B.I. analyst in charge of investigating the WannaCry attack. He was told that the agency had been specifically tasked with WannaCry, and that even though the attack on his company was more invasive and sophisticated, it was still technically something else, and therefore the F.B.I. could not take on his case.

The F.B.I. did not respond to requests for comment.

So Mr. Ben-Oni has largely pursued the case himself. His team at IDT was able to trace part of the attack to a personal Android phone in Russia and has been feeding its findings to Europol, the European law enforcement agency based in The Hague.

The chances that IDT was the only victim of this attack are slim. Sean Dillon, a senior analyst at RiskSense, a New Mexico security company, was among the first security researchers to scan the internet for the N.S.A.’s DoublePulsar tool. He found tens of thousands of host computers are infected with the tool, which attackers can use at will.

“Once DoublePulsar is on the machine, there’s nothing stopping anyone else from coming along and using the back door,” Mr. Dillon said.

More distressing, Mr. Dillon tested all the major antivirus products against the DoublePulsar infection and a demoralizing 99 percent failed to detect it.

“We’ve seen the same computers infected with DoublePulsar for two months and there is no telling how much malware is on those systems,” Mr. Dillon said. “Right now we have no idea what’s gotten into these organizations.”

In the worst case, Mr. Dillon said, attackers could use those back doors to unleash destructive malware into critical infrastructure, tying up rail systems, shutting down hospitals or even paralyzing electrical utilities.

Could that attack be coming? The Shadow Brokers resurfaced last month, promising a fresh load of N.S.A. attack tools, even offering to supply them for monthly paying subscribers — like a wine-of-the-month club for cyberweapon enthusiasts.

In a hint that the industry is taking the group’s threats seriously, Microsoft issued a new set of patches to defend against such attacks. The company noted in an ominously worded message that the patches were critical, citing an “elevated risk for destructive cyberattacks.”

Mr. Ben-Oni is convinced that IDT is not the only victim, and that these tools can and will be used to do far worse.

“I look at this as a life-or-death situation,” he said. “Today it’s us, but tomorrow it might be someone else.”

Investigating the Other Collusion Case

Seems it at least began in 2015, long before Donald Trump was campaigning for the Oval Office.

Also, as an aside, John Podesta is testifying before the House Intelligence Committee next week. He too has financial ties to Moscow operations.

The Vnesheconombank is Russian owned and has been under a sanctions architecture due to the annexing of Crimea. In Russia, by law, the bank’s board chairman is the Prime Minister of Russia. Vladimir Putin increased leading when he became the bank’s chairman in 2008. Now precisely why is Russia investing at all in the United States in the first place? Well soft power and doing business with the Export Import Bank, an agency that is corrupt to the core. Further, Sergei Gorkov is head of the bank and is is/was a Russian spy.

Image result for Vnesheconombank  ABC

BusinessInsider:The U.S. Treasury has added a bunch of entities to its Russia sanctions list, including a sovereign wealth fund that used to be connected to some pretty high-profile U.S. billionaires.

The Treasury’s Office of Foreign Assistance Control on Thursday added The Russian Direct Investment Fund to the list, along with a number of entities linked to RDIF parent Vnesheconombank and energy giant Rosneft.

Vnesheconombank was first sanctioned last year, but RDIF hadn’t been explicitly targeted until the announcement on Thursday.

Private equity moguls Steve Schwarzman of Blackstone, David Bonderman of TPG, and Leon Black of Apollo Global Management all served as board members for RDIF when it was established in 2011, according to a press release at the time.

At some point, those names were removed from the RDIF website.

The Wall Street Journal first reported that the investors’ names had disappeared from the site in September 2014, but said that they still served on the board at that time. There are currently no names listed on the international advisory board on RDIF’s website.

Back in 2011, each board member issued statements about joining the board. Here are some highlights:

“We believe there are many attractive investment opportunities in Russia — the RDIF will provide the strong and experienced local partnership needed for investors to realize those opportunities.” — David Bonderman

“Russia has strong fundamentals that will continue to fuel its growth trajectory and offer attractive investment opportunities. We believe the Russia Direct Investment Fund will help further align U.S. and Russian objectives in terms of identifying paths toward partnership in the private sector.” — Leon Black

“It’s always good to have friends when you are going to a place that you are not as familiar with.”  — Stephen Schwarzman

Bonderman has spoken publicly about investing in the country in recent months, telling an audience at the Milken Global Conference this year that the Russian market remains attractive, according to a report by CNN Money.

He is quoted as saying: “Sanctions are perfectly set up not to work at all but to make a political statement.”

Spokespeople for Blackstone and TPG declined to comment. Apollo could not be reached for comment.

A spokesperson for the Russian Direct Investment Fund said: “For Vnesheconombank subsidiaries the new clarification by the US Department of the Treasury is essentially a technical repetition of sanctions imposed a year ago, which targeted a number of Russian companies including Vnesheconombank and its subsidiaries.

“Given the nature of the Fund’s activity, RDIF has never attracted financing in the USA, it invests its own funds. Since the introduction of sanctions last year RDIF has continued to invest into the Russian economy and build new international partnerships.”

So what you ask?

Image result for sergei gorkov Sergei Gorkov

Well due to sanctions, those on the Trump campaign team, transition team and now in the White House may have violated sanctions. If so, the reason would be why, to what end and how many may be involved? It should also be added that many Republicans have ties to Russians and oligarchs, not all is as it seems. We can only hope, while not knowing details, the Senate is also investigating Hillary Clinton in much the same condition. Yet as Secretary of State, Hillary and Obama had the ability to sign waivers to finesse sanctions. This was likely the case between Hillary and the Kremlin regarding Skolkovo.

Remember, don’t shoot the messenger. Furthermore, it seems some on the Senate committee are leaking too.

Senate investigators are examining the activities of a little-known $10-billion Russian investment fund whose chief executive met with a member of President Donald Trump’s transition team four days before Trump’s inauguration, a congressional source told CNN.

The source said the Senate intelligence committee is investigating the Russian fund in connection with its examination of discussions between White House adviser Jared Kushner and the head of a prominent Russian bank. The bank, Vnesheconombank, or VEB, oversees the fund, which has ties to several Trump advisers. Both the bank and the fund have been covered since 2014 by sanctions restricting U.S. business dealings.
Separately, Steve Mnuchin, now Treasury Secretary, said in a January letter that he would look into the Jan. 16 meeting between the fund’s chief executive and Anthony Scaramucci, a member of the transition team’s executive committee and a fundraiser and adviser for Trump’s presidential campaign. At the time, Mnuchin had not yet been confirmed as Treasury Secretary. The Treasury Department did not respond to a request for an update.
Two Democratic senators had asked Treasury to investigate whether Scaramucci promised to lift sanctions — a policy shift that would help the fund attract more international investment to Russia.
The questions draw attention to the Russian Direct Investment Fund, a government investment arm that has helped top U.S. private-equity firms invest in Russia and that was advised by Stephen Schwarzman, who is now chairman of Trump’s Strategic and Policy Forum, an advisory group of business leaders.
Schwarzman, chief executive officer of Blackstone Group, was named in 2011 to the fund’s International Advisory Board along with other leaders of major equity companies and sovereigh-wealth funds who reviewed the fund’s operations, plans and potential investments. Schwarzman declined to comment. A source close to him said Schwarzman has not spoken to anyone on the fund “for some time.”
The fund also worked with Goldman Sachs, whose former president Gary Cohn is Trump’s chief economic adviser and where Kirill Dmitriev, the fund’s chief executive, worked as an investment banker in the 1990s. Goldman was part of a consortium created in 2012 to invest in large Russian businesses preparing to go public, and was hired in 2013 to burnish Russia’s investment image. The company declined to comment.

‘I would reach out to people to help him”

Senate and House investigators are looking into various Russian entities to determine whether anyone connected to the Trump campaign helped Russians as they meddled in the 2016 presidential election, and whether Trump associates discussed sanctions with Russian officials.
The congressional inquiries, along with a criminal investigation by special counsel Robert S. Mueller, have shadowed the Trump administration. Trump has denied any connection to Russia’s election-meddling, calling the criminal probe “a witch hunt.”
Scaramucci, the founder of SkyBridge Capital, minimized his January meeting with Dmitriev in the resort town of Davos, Switzerland, at the celebrated annual gathering of the World Economic Forum. Scaramucci had met Dmitriev at previous Davos meetings, although at the gathering in January, Scaramucci was expecting to be named White House liaison to the business community.
Dmitriev “came over to say hello in a restaurant, and I was cordial,” Scaramucci said in a recent email to CNN. “There is nothing there.”
The day after the meeting, Scaramucci told Bloomberg TV that he had “as a private citizen” been working with Dmitriev on bringing a delegation of executives to Russia.
“What I said to him last night, in my capacity inside the administration, I would certainly reach out to some people to help him,” Scaramucci said before describing a thicket of ethical clearances he would face. “The idea was many months ago to have more outreach with Russia but also other countries, not just Russia. China, other countries.”
Scaramucci’s comments alarmed Democratic Senators Elizabeth Warren of Massachusetts and Ben Cardin of Maryland, who asked Mnuchin investigate whether Scaramucci sought to “facilitate prohibited transactions” or promised to waive or lift sanctions against Russia.
In a reply Jan. 30, before he was sworn in, Mnuchin said he would “ensure the appropriate Department components assess whether further investigation of this matter is warranted.”
A spokeswoman for the Russian fund said the two men did not discuss sanctions, and that the discussion itself did not violate sanctions that U.S. imposed in 2014 after Russia annexed part of neighboring Ukraine. The spokeswoman declined to describe the conversation, saying, “We do not comment on private meetings.”

An advocate for lifting sanctions

Since Trump’s election, Dmitriev has been one of Russia’s most vocal officials in calling for an end to U.S. sanctions and arguing that joint U.S.-Russia projects can create jobs in the United States.
The fund hired two U.S. lobbying firms in September 2014, after sanctions were imposed, paying them a combined $150,000 over two months for public relations work. The fund has not hired any lobbyists since then.
With a history of helping U.S. manufacturers and asset management companies invest in Russia, the fund is a logical starting point for Russia’s push to lift U.S. sanctions, former State Department chief economist Rodney Ludema said.
“If you’re going to get your nose under the tent, that’s a good place to start,” said Ludema, a Georgetown University economics professor. “I’m sure their objective is to get rid of all the sanctions against the financial institutions. But RDIF is one [sanctioned organizations] where a number of prominent U.S. investors have been involved.”
Scaramucci also questioned U.S. sanctions while he was in Davos and echoed Trump’s statements about improving relations with Russia.
Two weeks after the meeting between Scaramucci and Dmitriev, when President Trump spoke by phone to Russian President Vladimir Putin, the fund announced it would open an office in New York in May.
No New York office has been opened but the fund “still expects to open a representative office in the US this year,” the spokeswoman said.