Read The New Nobility of the KGB Online

Authors: Andrei Soldatov

Tags: #History, #Europe, #Russia & the Former Soviet Union, #Political Science, #General, #International Relations, #Security (National & International), #Intelligence & Espionage, #World, #Russian & Former Soviet Union, #Social Science, #Social Classes

The New Nobility of the KGB (38 page)

BOOK: The New Nobility of the KGB
9.2Mb size Format: txt, pdf, ePub
ads
 
23
These details were furnished by Karinna Moskalenko and Anna Stavitskaya, Iskandarov’s lawyers.
 
24
Irina Borogan, “S takimi druziami vragov ne nado” [With such friends we do not need enemies],
Ezhednevny Journal
, November 27, 2008.
 
25
In CIS countries the extradition procedure is complex, requiring consent from the General Prosecutor’s Office. It is long, held in open court, and subject to appeal. The main problem is that the General Prosecutor’s Office often refuses extraditions to Uzbekistan and Tajikistan, as they cannot always submit evidence of the crime committed, and the charge made is not always covered by Russian legislation. The European Union considers that torture is used in Central Asian prisons, and it is willing to allow appeals in the European Court for Human Rights, where Russia finds itself constantly blamed for human rights violations.
 
26
Irina Borogan,“GB bez Granits” [State security without borders],
Novaya Gazeta
, August 21, 2008.
 
27
RATS official site, “Normative Documents: Shanghai Convention on Combatting Terrorism, Separatism, and Extremism,”
www.ecrats.com
.
 
28
Irina Borogan, “GB bez Granits” [State security without orders],
Novaya Gazeta
, August 21, 2008.
 
29
BBC, “Canada Angry at Uighur Sentence,” April 20, 2007.
 
30
Xinhua News Agency, “China bans Falun Gong,” June 22, 1999.
 
31
Timeline of illegal expulsions of refugees from Russia to the countries of their origin, August 2008. Report by Elena Ryabinina, Program of Assistance to Political Exiles from Central Asia of the Civic Assistance Committee.
 
32
uzreport.com
,“Hizb ut-Tahrir, IMU try to spread their activity to Russia,” April 2, 2008.
 
CHAPTER 18
 
1
The National Anti-Terrorism Committee (Nacionalny Antiterroristichesky Komitet, or NAK) was established with 300 FSB officers (the committee is headed by an FSB director) in spring 2006 to be in charge of coordinating all federal-level antiterrorism policies and operations.
 
2
Andrei Soldatov, “Cyber-surprise,”
Novaya Gazeta
, May 31, 2007. The authors confirmed that the phone number and name Stanislav gave were correct. Stanislav confirmed his name in a phone conversation but refused to explain the nature of his interest in patriotic hackers.
 
3
Kavkaz.org
was registered on March 2, 1999, in Pompano Beach City, Florida, in the United States. See whois.
publicinterestregistry.net
.
 
4
Voice of America, correspondent report, December 16, 1999.
 
5
Masha Eismont was detained and searched in Vnukovo airport in Moscow on her way back from Chechnya on December 25, 1999, and accused of drug smuggling, although she was released after five hours. Author’s interview with Eismont, 2008. Babitsky disappeared on January 15, 2000, in Chechnya. Russian authorities at first denied knowing his whereabouts, but on January 28 they admitted to having him in custody. The FSB claimed to have charged him with “taking part in an illegal armed group.” Then Russian authorities exchanged Babitsky for two Russian soldiers, supposedly captured by the Chechens, thus placing the responsibility for Babitsky’s fate on rebels. The Russian and foreign media, as well as media organizations around the world, did not buy this version and kept pressuring the authorities. Babitsky was eventually released and was found in the neighboring republic of Dagestan on February 25. See details about the kidnapping of Babitsky in Aleksander Pronin, “Obmen s predoplatoi” [Prepaid exchange],
Kommersant-Vlast
, February 15, 2000; and Federal News Service, press conference of Andrei Babitsky, March 7, 2000, transcript available at agentura.ru.
 
6
Radio Liberty, “Chechnya: Rebels Use Internet in Propaganda War with Russians,” May 5, 2000.
 
7
Azer Mursaliev, “S Lermontovim napereves” [With Lermontov],
Kommersant-Vlast
, September 7, 1999.
 
8
“Tomskie hackeri tri goda vedut informacionnuyu voinu protiv chechenskih exstremistov” [Tomsk’s hackers have been waging information war for three years against Chechen extremists],
newsru.com
, January 30, 2002.
 
9
Interfax, “FSB ne chitaet hackerov hackerami” [FSB does not consider hackers as hackers], February 2, 2002;
newsru.com
, “FSB ne vidit narushenia zakona v deistviyah tomskih hackerov protiv saita Kavkaz-Tsentr” [FSB does not see the crime in activities of Tomsk’s hackers aimed against Kavkaz-Tsentr], February 4, 2002.
 
10
For details on FAPSI, see agentura.ru.
 
11
The bases in Cam Rahn Bay, Vietnam, and in Lourdes, Cuba, were closed in 2002.
 
12
The official name was the Glavnoye Upravlenie Radioelectronnoi Razvedki Na Setyah Svyazi (GURRSS), Main Directorate of Electronic Intelligence in Communications.
 
13
Federation of American Scientists, Secrecy Project, FAPSI profile,
www.fas.org
.
 
14
Andrei Soldatov, “Fapsi-obshestvennosti: ‘menche znaesh-krepche spish’” [FAPSI to public: “It’s better to know nothing”],
Segodnya
, December 2, 1999.
 
15
Vladislav Sherstyuk, a former chief of the Third Directorate, was placed in the Kremlin Security Council in December 1999 to preside over the information security section. Hostile intrusion as the main Internet threat for Russia became an essential part of the Russian concept of information warfare. In 1997 Vladimir Markomenko, then the deputy director of FAPSI and the only official voice to define Russian information warfare, asserted that the “information war” concept comprises four components:
1. The suppression of components of the infrastructure of state and military administration (destruction of command and control centers); electromagnetic pressure on components of the information and telecommunications system (electronic warfare);
2. Acquisition of intelligence through intercepting and deciphering information flows transmitted via communications channels, and also though spurious distribution and electronic information-intercepting devices especially planted on premises and within technical systems (electronic intelligence);
3. Unauthorized access to information resources (by the use of software and hardware for penetrating systems that protect enemy information and telecommunications systems) with subsequent distortion, destruction, or theft, or a disruption of the normal operations of these systems (hacker warfare);
4. Formation and mass dissemination by enemy information channels or global data interaction networks of disinformation or tendentious information for influencing the opinions, intentions, and orientation of society and decisionmakers (psychological warfare).
See the section on the FAPSI at agentura.ru.
 
 
16
Nathan Hodge, “Kremlin Launches ‘School of Bloggers,’”
Wired.com
, May 27, 2009.
 
17
Yelena Chernenko and Darya Guseva, “Napryazhenie v Seti” [Tensions on the Net], Russian edition of
Newsweek
, August 17, 2009.
 
18
kavkazcenter.org
was hosted in Sweden starting in 2004, after moving from Lithuania, where the Web site had been shut down by Lithuanian authorities on hate speech charges after it published a letter from Shamil Basayev claiming responsibility for the Beslan school hostage crisis.
 
19
Center for Journalism in Extreme Situations, “Monitoring of violations of journalists’ rights, coverage of events in Chechnya,” October 2005,
www.cjes.ru
.
 
20
Andrei Soldatov, “Terror: otsenka ugrozi” [“Terror: Assessment of threat”],
Bolshaya Politika
, April 2006, available at agentura.ru.
 
21
Arthur Bright, “Estonia Accuses Russia of ‘Cyberattack,’”
Christian Science Monitor
, May 17, 2007.
 
22
RIA Novosti
, “Estonia has no evidence of Kremlin involvement in cyber attacks,” September 6, 2007.
 
23
Andy Greenberg, “When Cyber Terrorism Becomes State Censorship,”
Forbes
, May 14, 2008.
 
24
Agence France-Presse,“Pro-Russian cyber attack hits Lithuania: Regulator,” June 30, 2008.
 
25
Project Grey Goose: Phase I, Report 17, October 2008, “Russia/Georgia cyber war: findings and analysis,”provided to the authors by Rafal Rohozhinsky.
 
26
Dancho Danchev, “Coordinated Russia vs Georgia cyber attack in progress,” ZDnet, August 11, 2008.
 
27
Anna Maplas, “British Diplomat Quits Amid Sex Tape Scandal,”
Moscow Times
, July 10, 2008.
 
28
ABC News, “U.S. Protest Russian ‘Sex Tape’ Used to Smear American Diplomat,” September 23, 2009; Kyle Hatcher, “U.S. Complains to Russia About ‘Sex Tape’ Smear Campaign Against American Diplomat,”
Huffington Post
, October 23, 2009.
 
CONCLUSION
 
1
UPI, “Medvedev: Terrorist Bombers ‘Are Animals,’” March 30, 2010.
 
APPENDIX 2
 
1
Decrees of the President, Russian Federation, no. 2233, December 21, 1993, “Ob uprazdnenii Ministerstva Rossiyskoi Federacii I sozdanii Federalnoi sluzhbi kontrrazvedki Rossiyskoy Federacii” [Concerning the abolition of the Ministry of Security and the creation of the Federal Counterintelligence Service].
 
INDEX
 
 
Aaviksoo, Jaak
 
Abkhazia
 
Act on Operational-Investigative Activity (1995)
 
“Active measures,”
 
Afghanistan
 
Agentura.ru
 
Aidarov, Miroslav
 
Akhmadov brothers
 
Akhmedov, Ibat
 
Al Qaeda
 
Al-Walid, Abu
 
Albats, Yevgenia
 
Aleksandrov, Dmitry
 
Aleksey II, Patriarch
 
Alksnis, Viktor
 
Almazov, Sergei
 
Alpha unit (A department)
 
about
 
KGB and
 
Nord-Ost and
 
Ryazan exercise
 
Alternative Futures
 
Andreev, Valery
 
Andrew, Christopher
 
Andropov, Yuri
 
about
 
celebrations for
 
FSB
 
image-making
 
KGB
 
plaque/statues of
 
Anisimov, Vladimir
 
Apartment building bombings
 
about
 
fictionalized movie account
 
Putin’s response
 
Putin’s rise to power and
 
question on perpetrators
 
Ryazan training exercise and
 
Arabs in Chechnya
 
Archives on state security
 
Bukovsky and
 
claims on openness
 
declassifying attempts
 
Interagency Commission to Protect State Secrets
 
KGB
 
National Security Archive, George Washington University and
 
opening
 
Argumenti I Fakti
(newspaper)
BOOK: The New Nobility of the KGB
9.2Mb size Format: txt, pdf, ePub
ads

Other books

The demolished man by Alfred Bester
My Wicked Enemy by Carolyn Jewel
A Pigeon Among the Cats by Josephine Bell
Addie Combo by Watson, Tareka
The Sleepwalkers by J. Gabriel Gates
Stiletto by Harold Robbins


readsbookonline.com Copyright 2016 - 2024