
Russia jails 'Jesus of Siberia' sect leader for 12 years for harming followers
FILE PHOTO: Vissarion, who has proclaimed himself a new Christ, conducts a service during the "Holiday of Good Fruit" feast in a village southeast of Russia's Siberian city of Krasnoyarsk, August 18, 2010. Picture taken August 18, 2010. REUTERS/Ilya Naymushin/File Photo
(Reuters) -A Russian sect leader who claimed he was Jesus Christ reincarnated was sentenced to 12 years in a prison camp on Monday after being convicted of harming his followers' health and financial affairs.
Sergei Torop, a former traffic policeman known to his followers as 'Vissarion', set up the Church of the Last Testament in a remote but picturesque part of Siberia's Krasnoyarsk region in 1991, the year the Soviet Union broke up.
A bearded self-styled mystic with long hair, he claimed to have been "reborn" to convey the word of God and attracted thousands of followers, some of whom flocked to live in a settlement known as the "Abode of Dawn" or "Sun City", at a time when Russia was battling poverty and lawlessness.
Torop, 64, told his followers, who regularly intoned prayers in his honour as they looked up to his large hilltop residence, not to eat meat, not to smoke, not to drink alcohol or swear, and to stop using money.
But the Investigative Committee, Russia's equivalent of the U.S. FBI, accused Torop and two aides of using psychological pressure to extract money from his followers and of causing serious harm to their mental and physical health.
In a statement on Monday, a court in the Siberian city of Novosibirsk said it had convicted the three men, sentencing Torop and Vladimir Vedernikov to 12 years and Vadim Redkin to 11 years in a maximum-security prison camp.
They were also ordered to pay 40 million roubles ($511,500) to compensate their victims for "moral damage".
All three denied wrongdoing.
Torop and the two aides were arrested in a security forces raid by helicopter in 2020 that involved the FSB security service, the successor agency to the Soviet KGB.
According to the RIA state news agency, investigators said the men had caused "moral harm" to 16 people, serious damage to the physical health of six people, and moderate damage to another person's health.
Vedernikov, one of the aides, had also been accused of committing fraud, RIA said.
In a 2017 BBC documentary, filmmaker Simon Reeve interviewed Torop, who denied any wrongdoing. The film showed how school girls whose parents were his followers were being educated to be what a local teacher called "future brides for worthy men."
($1 = 78.1955 roubles)
(Reporting by Andrew OsbornEditing by Mark Heinrich)

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


The Star
3 hours ago
- The Star
Suspect in deadly Idaho firefighters ambush identified, motive a mystery
FILE PHOTO: Law enforcement officers gather at Cherry Hill Park after multiple firefighters were attacked when responding to a fire in the Canfield Mountain area outside Coeur d'Alene, Idaho, U.S. June 29, 2025. REUTERS/Young Kwak/File Photo (Reuters) -The man who shot dead two firefighters and wounded a third after setting a blaze near a popular mountainside trail in Idaho was described by authorities on Monday as a young transient whose motives remained a mystery a day after the attack. Kootenai County Sheriff Bob Norris identified the suspected gunman in Sunday's attack as Wess Roley, 20, who was found dead at the scene of an apparent self-inflicted gun wound. Authorities have not identified the two firefighters who were shot and killed, nor have they given the name of a third firefighter who was shot and survived. Roley had some sort of interaction with the firefighters he shot and killed when they arrived on the scene of the fire, Norris said, though he provided no details on what occurred. The suspect was known to have expressed interest in becoming a firefighter himself, the sheriff said. Norris said that Roley, who was born in California, had been living for the past year in Coeur d'Alene, about 260 miles (420 km) east of Seattle, where the shooting took place at Canfield Mountain, a nature area popular with hikers and bikers. Over 300 law enforcement officers responded to the scene on Sunday. Early reports indicated there were multiple shooters attacking firefighters. But Norris on Monday said it appeared that Roley acted alone and that he had no known connection to any sort of group that may have motivated the violence. The sheriff said that Roley had no known criminal record. Local police had five recent minor and non-violent interactions with Roley, who appeared to be living out of his vehicle and whom officers during those interactions had told to move from spots where he was parked and residing. On Sunday, Norris said they believed Roley was armed with at least one rifle. But on Monday he said that the weapon recovered near Roley's body at the crime scene was a shotgun. "We know that some rifled slugs were used, and a rifled slug is a pretty big projectile," Norris said, adding that investigators were still trying to determine if other weapons were involved. When firefighters responded to the blaze on Sunday afternoon, they came under fire almost immediately, Norris said. When police officers and sheriff's deputies arrived later, they, too, came under fire from trees that Roley had apparently climbed and shot from. Scores of officers from the city, county, state and federal level responded, including two helicopters with snipers aboard. The suspect was located using cellphone information and his body was removed by a SWAT team as the fire approached. Gun ownership is widespread in the U.S., where the Constitution protects the rights of Americans to "keep and bear arms." Deaths related to gun violence are common - 17,927 people were murdered with a gun in 2023 in the U.S., according to the most recent available data from the Centers for Disease Control and Prevention. (Reporting by Brad Brooks in Colorado and Steve Gorman in Los Angeles; Editing by Rosalba O'Brien)


New Straits Times
3 hours ago
- New Straits Times
Iran-linked hackers threaten to release Trump aides' emails
WASHINGTON: Iran-linked hackers have threatened to disclose more emails stolen from US President Donald Trump's circle, after distributing a prior batch to the media ahead of the 2024 US election. In online chats with Reuters on Sunday and Monday, the hackers, who go by the pseudonym Robert, said they had roughly 100 gigabytes of emails from the accounts of White House Chief of Staff Susie Wiles, Trump lawyer Lindsey Halligan, Trump adviser Roger Stone and porn star-turned-Trump antagonist Stormy Daniels. Robert raised the possibility of selling the material but otherwise did not provide details of their plans. The hackers did not describe the content of the emails. Halligan, Stone, a representative for Daniels and the US cyberdefence agency CISA did not immediately respond to requests for comment. The White House and the FBI responded with a statement from FBI Director Kash Patel, who said: "Anyone associated with any kind of breach of national security will be fully investigated and prosecuted to the fullest extent of the law." Iran's mission to the United Nations did not immediately return a message seeking comment. Tehran has in the past denied committing cyberespionage. Robert materialised in the final months of the 2024 presidential campaign, when they claimed to have breached the email accounts of several Trump allies, including Wiles. The hackers then distributed emails to journalists. Reuters previously authenticated some of the leaked material, including an email that appeared to document a financial arrangement between Trump and lawyers representing former presidential candidate Robert F. Kennedy Jr. – now Trump's health secretary. Other material included Trump campaign communication about Republican office-seekers and discussion of settlement negotiations with Daniels. Although the leaked documents did garner some coverage last year, they did not fundamentally alter the presidential race, which Trump won. The US Justice Department, in a September 2024 indictment, alleged that Iran's Revolutionary Guards ran the Robert hacking operation. In conversations with Reuters, the hackers declined to address the allegation. After Trump's election, Robert told Reuters that no more leaks were planned. As recently as May, the hackers told Reuters, "I am retired, man." But the group resumed communication after this month's 12-day air war between Israel and Iran, which was capped by US bombing of Iran's nuclear sites. In messages this week, Robert said they were organising a sale of stolen emails and wanted Reuters to "broadcast this matter." American Enterprise Institute scholar Frederick Kagan, who has written about Iranian cyberespionage, said Tehran suffered serious damage in the conflict and its spies were likely trying to retaliate in ways that did not draw more US or Israeli action. "A default explanation is that everyone's been ordered to use all the asymmetric stuff that they can that's not likely to trigger a resumption of major Israeli/US military activity," he said. "Leaking a bunch more emails is not likely to do that." Despite worries that Tehran could unleash digital havoc, Iran's hackers took a low profile during the conflict. US cyber officials warned on Monday that American companies and critical infrastructure operators might still be in Tehran's crosshairs.


The Star
4 hours ago
- The Star
DOJ announces arrest, indictments in North Korean IT worker scheme
FILE PHOTO: Miniatures of people with computers are seen in front of North Korea flag in this illustration taken July 19, 2023. REUTERS/Dado Ruvic/Illustration/File Photo (Reuters) -The U.S. Department of Justice and FBI on Monday announced an arrest and indictments targeting North Korea's so-called 'IT worker' program, where North Koreans obtain remote IT-related positions at more than 100 U.S. companies, and use that access to steal money and information from a host of companies around the world. The North Korean workers used compromised identities of more than 80 U.S. citizens to obtain remote jobs at more than 100 U.S. companies and caused more than $3 million in legal fees, remediation and other costs, according to the DOJ. The North Koreans also allegedly stole at least $900,000 worth of cryptocurrency from one Georgia-based company with their access, along with employer data and source code, including International Traffic in Arms Regulations (ITAR) data, from a California-based defense contractor, the DOJ said. Monday's announcement included one arrest, two indictments, searches of more than two dozen U.S. locations hosting multiple laptops used by remote North Korean workers, and the seizure of financial accounts and websites used by the participants as part of the alleged scheme, according to a DOJ statement. The Permanent Mission of North Korea to the United Nations did not immediately respond to a request for comment. Zhenxing 'Danny' Wang and Kejia Wang, both U.S. citizens, were indicted as part of the operation, according to the DOJ. Zhenxing Wang was arrested in New Jersey, while Kejia Wang remains free, a DOJ spokesperson said in an email. An attorney for ZhenxingWang could not be immediately located. The two men, along with four other unnamed U.S. 'facilitators,' assisted the North Koreans by procuring and operating laptops used by the overseas workers, created financial accounts to receive money earned by the workers to be sent back to North Korea, and created shell companies to make the workers appear more authentic, according to the DOJ, earning nearly $700,000 from the scheme for themselves. Federal prosecutors also indicted four Chinese nationals and two Taiwanese nationals for alleged roles in the operation. (Reporting by AJ Vicens in Detroit; editing by Edward Tobin)