
Six Bulgarians face long UK jail terms for spying for Russia
Six Bulgarians, members of a sophisticated spy network dubbed "The Minions", were before court Wednesday for sentencing, facing up to 14 years in prison for spying for
.
The four men and two women either pled guilty or had been convicted of charges of conspiracy to spy at Russia's behest with their sentences due to be handed down on Monday, after four days of hearings at London's Old Bailey court.
Tired of too many ads? go ad free now
Between 2020 to 2023, the six-person cell targeted journalists and a Kazakh former politician, and plotted to kidnap and honeytrap targets, tracking them across several European nations.
It was "
on behalf of Russia", Metropolitan police counter-terrorism Chief Commander Dominic Murphy said in March.
Ringleader Orlin Roussev, 47, along with his second-in-command Bizer Dzhambazov, 43, and Ivan Stoyanov, 32, pled guilty to spying.
Barrister for the prosecution, Alison Morgan, on Wednesday laid out their roles in different operations, stressing they knew they were spying for Moscow.
London-based Katrin Ivanova, 33, Vanya Gaberova, 30, and Tihomir Ivanchev, 39, were convicted in March after a trial lasting more than three months at the Old Bailey court.
Working for GRU:
Two of the group were in court on Wednesday, with the rest appearing by video link from their detention centres.
They had dubbed themselves "The Minions" after the cartoon yellow characters in the film "Despicable Me" who work for the dastardly Gru. The six also worked for the GRU, the acronym for the Russian military intelligence service.
The group launched operations in the UK as well as Austria, Spain, Germany and Montenegro.
But UK police were able to retrace six operations thanks to more than 100,000 messages found on Roussev's Telegram account, which led police to his seaside home in the eastern town of Great Yarmouth.
Tired of too many ads? go ad free now
Roussev received his instructions from Jan Marsalek, an Austrian fugitive who reportedly fled to Russia in 2020 after becoming wanted for fraud in Germany.
Marsalek, the former chief operating officer of payments firm Wirecard, was acting as a proxy for Russian intelligence services.
One operation targeted investigative journalist Christo Grozev, from the Bellingcat website, who uncovered Russian links to the 2018 Novichok chemical weapon attack in the English town of Salisbury and the downing of a Malaysia Airlines aeroplane four years earlier.
The group had planned "disruptive activity" at the Kazakh embassy in 2022, discussing a plan to spray the building with fake pig's blood.
Like a 'spy novel':
Roussev received more than 200,000 euros ($227,000) to fund his activities.
After the gang was busted in February 2023, police found huge amounts of spyware equipment in his home, including cameras and microphones hidden in ties, a stone, even a cuddly toy and a fizzy drinks bottle.
In messages to Marsalek, Roussev claimed "he will find the resources" to "keep the Russians happy" such as by kidnapping someone, Morgan said.
"The defendants were deployed to gather information about prominent individuals whose activities were of obvious interest to the Russian state," she added.
Murphy said in March that police had found "really sophisticated devices -- the sort of thing you would really expect to see in a spy novel".
Journalist and UK-based dissident Roman Dobrokhotov, and former Kazakh politician Bergey Ryskaliev, granted refugee status in Britain, were also among their targets.
The group also kept the US military base Patch Barracks in Stuttgart, Germany, under surveillance, believing Ukrainian soldiers were being trained there in using the Patriot air defence system.
Ties between Britain and Russia have been strained since Moscow's February 2022 invasion of Ukraine.
British security minister Dan Jarvis warned the convictions should "send a clear warning to those who wish to do the UK harm".

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


India Today
an hour ago
- India Today
Trump names 22-year-old to lead major terrorism prevention centre
Thomas Fugatea, a 22-year-old college graduate, with no previous government leadership or security experience, is now heading the Centre for Prevention Programs and Partnerships, commonly referred to as CP3, at the Department of Homeland Security (DHS) in the US. Fugate, a former gardener and grocery store worker who graduated from college last year, was hired by DHS in February, The Daily Mail reported, citing his LinkedIn replaced veteran Bill Braniff, who had more than 20 years of experience in national security. While the Trump administration defends the move, critics call it "reckless".It is DHS's main platform to fight terrorism within the US. CP3 also boasts an $18 million grant program, which Fugate will have responsibility for. The Trump administration fiercely defended the move, praising in particular Fugate's work ethic, according to a report in the Daily Mail. Fugate's LinkedIn profile, which lacks all the details on him, does not list any background in counterterrorism or related security S BACKGROUND INCLUDES WORK IN LANDSCAPING AND RETAILDespite no relevant experience for the job, Fugate does have an impressive internship history, having worked for the conservative Heritage Foundation and in the House of Representatives, The Daily Mail professional page also mentions time spent running a gardening and landscaping business, along with experience as a grocery store news about his appointment caused concerns among counterterrorism experts and nonprofit groups supported by said they turned to LinkedIn for intel on Fugate — an unknown in their field — and were stunned to see a photo of "a college kid" with a flag pin on his lapel posing with a sharply arched eyebrow," ProPublica, a New York-based news portal, reported."Maybe he's a wunderkind. Maybe he's Doogie Howser and has everything at 21-years-old, or whatever he is, to lead the office. But that's not likely the case," ProPublica quoted one counterterrorism researcher who has worked with CP3 officials for years as saying. "It sounds like putting the intern in charge," the researcher the past seven weeks, the US has seen at least five major targeted attacks, including a car bombing in California and the shooting of two Israeli Embassy staff members in this backdrop, current and former national security officials say the Trump administration's decision to shift counterterrorism resources to immigration and leave the violence-prevention portfolio to inexperienced appointees is "reckless," according to ProPublica. "We're entering very dangerous territory," one long-time US counterterrorism official HOUSE SLAMS PROPUBLICA REPORTadvertisementThe White House pushed back on the ProPublica report, saying that CP3 is not responsible for all counterterrorism functions."Combatting terrorism is a government-wide effort under the Trump Administration," White House spokesperson Abigail Jackson told The Daily Mail in a statement.'"The notion that this single office is responsible for preventing terrorism is not only incorrect, it's ignorant," Jackson replaced army veteran Bill Braniff, who stepped down in March following a 20% staff cut by the Trump administration. He had over 20 years' experience in national security. "If I cannot advance the prevention mission from inside the government for now, I will do what I can outside of government," he wrote in a LinkedIn post announcing his resignation, according to a report in The Independent."CP3 is the inheritor of the primary and founding mission of DHS, to prevent terrorism," he taking up the new leadership responsibilities, Fugate was hired as a "special assistant" in an immigration office at the DHS, The Independent was involved in the Trump campaign last year and attended the Republican National Convention. He also held the role of secretary general in a Model United Nations senior DHS official, in a statement, told ProPublica that Fugate's CP3 duties were added to his role as an aide in an Immigration & Border Security office."Due to his success, he has been temporarily given additional leadership responsibilities in the Centre for Prevention Programs and Partnerships office," the official told the outlet. "This is a credit to his work ethic and success on the job," he added.


Time of India
an hour ago
- Time of India
Hyderabad-based skincare firm OSR hit by Rs 12.7 crore Google Ads cyber fraud
Old School Rituals (OSR), a Hyderabad-based natural skincare and haircare company, has become the victim of a major cyber fraud involving an unauthorised Google Ads expenditure of Rs 12.7 crore. An unidentified offender reportedly gained access to the company's Google Ads account and placed thousands of ads for US-based companies over a 48-hour period. The fraud came to light when ENSO Business Consulting, OSR's digital marketing agency, discovered an unusual advertising campaign that ran on May 17 and 18. The campaign generated more than 2.1 million clicks but resulted in zero conversions, raising immediate red flags. ENSO promptly informed OSR, and the company's management directed the agency to launch a detailed investigation, according to TOI report. Shashanka Kancharla, director of Old School Inspirations Private Limited, which operates OSR, filed a formal complaint with the Telangana Cyber Security Bureau (TGCSB) headquarters on Wednesday. According to the complaint, OSR usually maintains a daily advertising budget of Rs 10,000 to Rs 15,000, making the unauthorised spend nearly 850 times the usual amount. "This was neither authorised by us nor aligned with our marketing strategy," Shashanka stated in his complaint. The company operates from Hyderabad's Financial District and primarily sells its products through its official website and select partner platforms. Shashanka and his wife, singer and actress Smita Valluripalli, serve as directors of the company. ENSO Business Consulting, which has managed OSR's digital marketing for the past 10 months, submitted a detailed incident report on May 21. The report indicated that the breach may have occurred due to a compromise of the Google Ads account or an employee's credentials. ENSO also noted that it did not receive the usual ad placement notifications during the two-day window when the fraudulent activity occurred. "Verify if any hacking or compromise of credentials occurred. Facilitate the recovery or reversal of the fraudulent ad spend. Treat this as a case of cyber crime involving account hacking and significant financial loss," Shashanka stated in his complaint. Following the fraud, a Google Ads bill of Rs 12.7 crore was raised against OSR. Thousands of ads linked to US-based businesses had been placed through OSR's ad account by an unknown individual. The company has since informed Google about the incident and suspected hacking. Based on the complaint, TGCSB's headquarters police station registered a case under Section 318(4) (cheating and dishonestly inducing delivery of property) of the Bharatiya Nyaya Sanhita (BNS), and Sections 43, 66, and 66-C of the Information Technology Act. Investigators are currently analysing the technical evidence and have contacted Google for further details that may help identify the accused. Stay informed with the latest business news, updates on bank holidays and public holidays . AI Masterclass for Students. Upskill Young Ones Today!– Join Now


NDTV
an hour ago
- NDTV
Family Of Indore Woman, Who Went Missing In Meghalaya During Honeymoon, Demands CBI Probe
Quick Read Summary is AI generated, newsroom reviewed. The family of Sonam Raghuvanshi, who went missing in Meghalaya during her honeymoon, has urged the government to transfer the case to the CBI, citing dissatisfaction with local police's investigation. Her husband's body was found, but she remains missing. Indore: The family of an Indore-based woman who went missing in Meghalaya last month while honeymooning with her husband urged the Union government on Friday to hand over the case to the CBI after expressing dissatisfaction with the probe of the north eastern state's police. Sonam Raghuvanshi (25) and her husband Raja Raghuvanshi (29) disappeared on May 23, hours after they checked out of a homestay at Nongriat village in Meghalaya's East Khasi Hills district. Raja's body was found in a deep gorge near a waterfall in Sohra area, some 20 kilometres away from the homestay, on June 2. Meghalaya police, which registered a murder case after Raja's body was found, are yet to get clues about Sonam's whereabouts. "My daughter has been abducted and is still in the clutches of her captors. Meghalaya police is not investigating the matter properly. They have been negligent right from the beginning. I have been seeking the deployment of the army since the day they went missing. If it was done in time, they would have been found safely," Sonam's father, Devi Singh Raghuvanshi, told PTI. He said the Centre must hand over the case to the Central Bureau of Investigation. With desperation setting in, Raghuvanshi said he had hung an inverted photograph of Sonam on the advice of an astrologer so that she can be found safely. After their marriage here on May 11, the couple left for Meghalaya on May 20 for their honeymoon, family said. The couple arrived at Mawlakhiat village on May 22 on a rented scooter. They parked their scooter and trekked 3,000 steps down the gorge to visit the famous living rootbridges at Nongriat village, where they stayed the night and left the homestay the following morning. On May 24, their scooter was found abandoned at a cafe along the road from Shillong to Sohra. A woman's white shirt, a strip of medicine, a part of the LCD screen of a mobile phone and a smartwatch were seized at the spot where Raja's body was found, as per Meghalaya police.