Wednesday, December 13, 2023

 

UN: Draft Cybercrime Convention remains seriously flawed

UN: Draft Cybercrime Convention remains seriously flawed - Civic Space

The United Nations, New York, NY, USA

In the lead up to the concluding session of the Ad Hoc Committee negotiating an international convention on cybercrime, ARTICLE 19 remains gravely concerned about the continued incompatibility of the draft text of the Convention with international standards on freedom of expression. We regret that the Ad Hoc Committee has done close to nothing to meaningfully address the plethora of our concerns, as well as the concerns raised by numerous States and stakeholders during the most recent session. The key problems of the draft text include fundamental vagueness on the scope of the Convention, numerous content-based offences, and underlying conflict of the Convention’s plain text with human rights standards. We urge the states not to conclude this Convention and make sure the draft is comprehensively revised.

ARTICLE 19 has closely monitored the drafting process of the proposed Comprehensive International Convention on Countering the Use of Information and Communications Technologies for Criminal Purposes (the Convention). We provided legal analysis on several drafts, most recently the joint analysis with Human Rights Watch on the Consolidated Draft used as the basis for the negotiations of the Sixth Session in New York in August 2023. In anticipation of the Ad Hoc Committee’s final session, to take place from 29 January to 9 February 2024 in New York, a new Draft Text has been released.

ARTICLE 19’s key concern with the recent draft include the following issues. We also note that this comment does not seek to provide an in-depth legal analysis on every provision, many of which are simply repeated from the prior Consolidated Draft, or are currently undergoing ongoing informal negotiations.

The Draft Text takes a step backward from basic human rights protections

Article 5 of the prior draft required States to ensure that implementation of the Convention is “in accordance” with their international human rights obligations. ARTICLE 19 is concerned that the current draft only requires that implementation is “consistent with” rights obligations. This softened language is significant, as it no longer requires compliance with human rights norms. Further, the Preamble of the Convention still fails to mention international human rights standards as the framework for the whole Convention. Moreover, paragraph 3 of the Preamble still includes cyber-enabled offences “related to terrorism, trafficking in persons, smuggling of migrants, illicit manufacturing of and trafficking in firearms,” which, as highlighted in more detail below, in our view have no place in this treaty. For instance, the reference to terrorism alone is particularly concerning, as there is no universally agreed upon definition of terrorism under international law.

Additionally, Article 21, which provides for parameters of prosecution, adjudication, and due process, only applies to offences established “in accordance” with the Convention., meaning its scope beyond the offences explicitly named is unclear. It also only requires that due process protections are “consistent with” international human rights obligations. This makes no mention of the presumption of innocence or principles of legality, strict necessity and proportionality. Finally, Article 24 of the current draft, which provides for conditions and safeguards, only applies to the procedural measures adopted under Chapter IV rather than the whole Convention. It fails to incorporate the principles of necessity and legality and the need for prior judicial authorization.

The Draft Text retains all its numerous contentious content-based offences

ARTICLE 19 has criticized the previous draft text for containing unnecessary content-related that may infringe freedom of expression online. Several of these offences were subject to considerable debate in the Sixth Session as they criminalize conduct never before seen in an international treaty. Some of these offences are cyber-enabled rather than cyber-dependent, meaning they do not even clearly fall under the scope of a cybercrime treaty. ARTICLE 19 recalls that criminal laws prohibiting dissemination of content are, by definition, restriction on freedom of expression, and therefore must be analyzed according to the tripartite test of restrictions enumerated under Article 19(3) of the ICCPR. The provisions in question under the Draft Text include:

  • The Draft Convention infringes on the rights of survivors of online gender-based violence (Article 15): While the trend of non-consensual sharing of images is problematic, addressing it in an international criminal instrument raises serious and complex issues in balancing freedom of expression and privacy rights, and is likely to backfire against the very vulnerable groups the provision is purported to protect. Article 15 does not appropriately mitigate the risk of criminalizing survivors particularly where the perpetrator is an authority figure, nor does it center the lack of freely given consent, or exempt conduct that is a matter of public interest or for a legitimate purpose related to the administration of justice.
  • The Draft Convention unduly restricts the rights of children and risks banning books (Articles 13 and 14). As drafted, Articles 13 and 14, which purport to curb the dissemination of child exploitation materials, go well beyond international standards on the matter and risk infringing on children’s rights and criminalizing content that may have scientific, educational, artistic, or literary value. Particularly in states where gender expression is repressed, these articles may also restrict the legitimate experience and expression of gender and sexuality of children, including adolescents. Finally, Article 13 is written so broadly that it would appear to ban books including classic works of fiction taught in universities; indeed, Article 13(2)(b) defines “material” to include not only “images” but also “written material.” ARTICLE 19 recalls that informal report covering these articles, following the recent Sixth Session, reveals little consensus as to basic definitions and scope, noting a number of key provisions where “attempts to reduce the gap [between States] did not yield any fruit” and several where “delegations could not agree.”

The underlying scope of the Draft Convention remains unclear

The Draft Convention continues to lack a coherent articulation of what does or does not constitute a cybercrime, which is astonishing this late into the drafting process. From the Sixth Session, an informal meeting was convened to present two proposals on the Convention’s scope. As a result of the meeting, the co-chairs of the working group noted that States disagreed on “several live issues,” including whether Article 17 served as “morphing it into a general crimes convention” or whether it “would apply to the full suit of procedural powers and international cooperation.” The proposed solutions, nonetheless, both adopt an expansive scope in contravention of the numerous States that have taken pause at the ambiguous scope and the obligations it would impose on them.

  • The first proposal is to merge Article 17 into Article 35 within the section on procedural measures, which would explicitly apply procedural powers to any new offences passed in accordance with the Convention that carry “a penalty of three years or more.”
  • The second proposal seeks to require the criminalization of any offence under a United Nations convention or protocol.

We note that both these proposals are significantly problematic and do little to nothing to mitigate the underlying problem with Article 17. Allowing procedural powers to flow merely from the severity of penalty has no basis in the actual substance of an offence, and rewards expansive police, surveillance, and extradition powers to States that merely impose disproportionate penalties. Additionally, United Nations conventions include a number of obligations and frameworks, such as that surrounding hate speech, which would be undermined or lead to conflicts if suddenly required to be bluntly criminalized. In this respect, the purported ‘limitation’ to United Nations instruments is tone-deaf to the practical complexities of such instruments, threatening to undermine them and create unnecessary confusion. The full implications of Article 17 and these proposals still cannot be understood because as currently drafted, it could also apply to future treaties including where those future treaties deliberately avoid applying their provisions to online environments.

The Draft Convention is unresponsive to fundamental concerns regarding its broad cross-border surveillance and police powers

The bulk of the Convention’s proposed provisions allow for expansive and highly intrusive sharing of personal data, which among other fatal problems, threatens to chill the use of tools that promote freedom of expression online.  For instance, the Draft Text in Article 40 still authorizes proactive information disclosures without any consideration for the safeguards of sending or recipient states. Article 47 continues to contemplate generalized information sharing beyond the scope of particularized investigations. These are not constrained by any explicit data protection safeguards. Provisions such as these, and others which ARTICLE 19 has previously analyzed, are more problematic given the aforementioned lack of human rights or due process safeguards, including prior judicial authorization requirements.

ARTICLE 19 finds it astonishing that after several years and several drafting sessions, such fundamental issues with the Convention remain. ARTICLE 19 urges States to reconsider the necessity of rushing an inherently flawed and overbroad instrument this late in the process. We will continue to work closely with partners in civil society and relevant stakeholders as we follow the outputs of the negotiations and drafting process.

Reflecting On The Evolution Of Cybersecurity In 2023


Emil Sayegh
Contributor
CEO of Ntirety. Cover all things cloud, cybersecurity & tech.
Dec 12, 2023


2023 marked a transformative journey for the cybersecurity, IT, and cloud industries.
GETTY

2023 marked a transformative journey for the cybersecurity, IT, and cloud industries. Reflecting on the past, it’s clear these sectors experienced substantial shifts in focus, witnessed notable service upgrades, and confronted persistent challenges along with transformative changes. Amidst the continuous evolution aimed at countering emerging threats, it’s crucial to ponder the key takeaways from the year—many of which we extensively discussed in articles published throughout 2023.

1. Cybersecurity Amidst Geopolitical Turmoil: Impact of the Russia-Ukraine Conflict

The geopolitical upheaval stemming from the Russia-Ukraine war cast a profound shadow over cybersecurity landscapes in 2023. The conflict triggered an escalation in state-sponsored cyberattacks, with both nations engaging in digital offensives. The intensification of cyber espionage, disinformation campaigns, and ransomware attacks highlighted the interconnectedness of geopolitics and cybersecurity. As the conflict unfolded, organizations worldwide faced the challenge of safeguarding their digital assets amid heightened global tensions. The year served as a stark reminder that geopolitical events can have far-reaching implications, necessitating a vigilant and adaptive cybersecurity approach in an ever-changing digital world.

2. Meta-Disappointment

The much-hyped metaverse faced a disappointing trajectory, with even tech giant Facebook rebranding itself to align with the futuristic concept. Economic downturns and a lack of forethinking about privacy and security implications took a toll on the metaverse's momentum, affecting associated technologies like NFTs. Despite these setbacks it’s possible the allure of the metaverse might resurface, but for now the spotlight has shifted to the burgeoning realm of Artificial Intelligence (AI).

3. White House National Cybersecurity Strategy Implementation Plan

The White House unveiled a comprehensive implementation plan comprised of over 65 initiatives aimed at mitigating cyber risks and boosting cybersecurity investments. The plan delineates responsibilities across federal agencies, emphasizing public-private sector collaboration. Initiatives include enhanced cyber incident reporting, updating response plans, tackling ransomware, and prioritizing software transparency.

4. Cybersecurity and Cloud Interdependence: A Growing Nexus

Throughout 2023, cybersecurity and cloud technologies became increasingly intertwined, revealing a growing relationship of interdependence. The reliance on cloud services surged, amplifying both the opportunities and risks for digital security. The year highlighted the need for a harmonized cybersecurity strategy that addresses the evolving landscape of cloud-based threats. As organizations continued to migrate to the cloud, the intricate dance between safeguarding data and leveraging cloud efficiencies underscored the imperative of an integrated and holistic cybersecurity approach.

5. Cybersecurity Compliance with SEC

The U.S. Securities and Exchange Commission revamped its rules on cyber risk management, governance, and incident disclosure, effective December 2023. This regulatory update reflects the growing centrality of cybersecurity in corporate compliance.

6. Multimedia Content Security

As cyberattacks increasingly target data-intensive content and particularly streaming services, companies like Amazon's Prime Video have prioritized robust security measures. Protection now extends to every facet of content delivery, guarding against threats like external tampering during live events.

7. Emerging Cybersecurity Trends

The cybersecurity landscape shifted towards new frontiers, with a focus on zero trust, AI, and cloud technologies. Global cyberattacks spiked by 40 to 45%, necessitating reliance on these emerging security and cloud technologies to address the evolving threat landscape.

8. Role of Automation and Service Partners

Amid rising cyber threats and constrained budgets, the significance of automation and partnerships with cybersecurity service providers became evident as Enterprise SOCs started to reach their limitations. These partners expedite secure and complaint cloud adoption, seamlessly integrate security measures, and help streamline challenges associated with cloud migration.

9. AI in Cybersecurity

The unexpected surge in practical AI brought both opportunities and cybersecurity challenges to the forefront. A vigilant and strategic approach is crucial in harnessing AI's potential, emphasizing targeted applications to address specific vulnerabilities and challenges within the technology infrastructure.

10. Quantum Computing Challenges and Opportunities

The emergence of quantum computing posed both challenges and opportunities for cybersecurity in 2023. While the potential for unprecedented computational power promises breakthroughs in encryption, it also raises concerns about the vulnerability of existing cryptographic methods. As organizations grapple with quantum-resistant security solutions, the landscape of digital defenses may be poised for a paradigm shift.

11. Cybersecurity Funding Surge

Throughout the year confidence in the cybersecurity sector soared, manifesting in substantial investments across various companies. The third quarter witnessed a remarkable surge in funding, underlining the industry's significance in current and future digital endeavors.

12. Crypto Turmoil: 2023 Crashes and Hacks

Cryptocurrency faced significant turmoil this year, and 2023 was marked by crashes and high-profile hacks that underscored the vulnerabilities that exist within the crypto landscape. The surge in crypto adoption revealed challenges, with notable instances of cybercrimes targeting digital assets. Simultaneously, these incidents prompted a critical examination of the security infrastructure surrounding cryptocurrencies. As the crypto ecosystem navigated crashes and security breaches, the industry grappled with the imperative of fortifying against evolving cyber threats. This tumultuous year underscored the importance of robust cybersecurity frameworks in the ever-changing realm of digital currencies.

2023 in Reflection

The multifaceted challenges and opportunities encountered in 2023 further highlight the complex and ever-evolving nature of cybersecurity, cloud, and IT. As we navigate these uncharted territories, adapting to quantum advancements, cloud interdependence, geopolitical shifts, and environmental imperatives will be pivotal in fortifying our digital future.

Follow me on Twitter or LinkedInCheck out my website

Emil Sayegh is the President and CEO of Ntirety, a global leader in Comprehensive Compliant Cybersecurity Services.  

Emil is an early pioneer of the Cloud, having launched and led successful Cloud computing businesses for Rackspace, HP, and Codero. Recognized as one of the “fathers” of Open Stack, Emil also led the merger between Hostway Inc. and Hosting Inc. to form Ntirety, which manages IT Security for organizations across the Fortune 500. Ntirety is the only company that embeds compliant security throughout an organization’s IT systems and culture. 

Emil has spent more than 25 years in the IT industry developing, marketing, and growing businesses for Dell, Rackspace, HP/Compaq, RLX Technologies, Codero, Hostway, and now Ntirety. He holds nine patents.  

The cybersecurity community has spent 2023 battling against ever-more sophisticated threat actors and adversary techniques.

NEWS FEATURE
12 DEC 2023

Written by
James Coker
Deputy Editor, Infosecurity Magazine
Follow @ReporterCoker

There has been a wide range of major cybersecurity incidents in 2023, from nation-state espionage campaigns to attackers gaining a gateway to thousands of enterprises through software supply chain vulnerability exploitations.

These have had significant real-world impacts, such as victim organizations experiencing loss of service and crippling financial costs, while many millions of individuals have had highly sensitive data stolen, putting them at risk of follow-on attacks.

In this article, Infosecurity Magazine has set out the top 10 cyber-attacks of 2023, which have been decided based on factors like the scale of the incident and its longer-term implications. These have been listed in order of the dates the attacks were first reported.

1. Royal Mail Faces Huge Financial Loss Following LockBit Attack

In January 2023, it emerged that the UK’s postal service the Royal Mail was hit by a ransomware attack which resulted in a temporary halt to international deliveries. Data was also stolen by the attackers. The Royal Mail refused the pay the £65.7m ($79.85m) demand from the LockBit group to return the stolen data. However, the service revealed it had experienced huge financial costs as a result of the attack, including large revenue losses and the company is said to have spent £10m on ransomware remediation.

2. Enormous Data Breach at T-Mobile

International telecoms giant T-Mobile admitted that 37 million customers had their personal and account information accessed by a malicious actor via an API attack that began on November 25, 2022. The incident was not discovered until January 5, 2023. In a separate incident, T-Mobile USA notified customers of another breach of personal and account data that occurred in February and March 2023. The breaches mean many millions of customers are vulnerable to follow-on fraud attempts.

3. City of Oakland Declares State of Emergency After Ransomware Attack

In February 2023, the administration of the City of Oakland, California, declared a state of emergency as a result of a ransomware attack. The incident shut down many non-emergency services, while government buildings were forced to close temporarily. It was later reported that the hackers stole a decade’s worth of sensitive data from city servers in the attack, including information about employees in sensitive roles such as the police.

4. MOVEit File Transfer Exploitation

The exploitation of a zero-day vulnerability in the popular file transfer software MOVEit is thought to have impacted thousands of organizations, ranging from media to healthcare. The flaw was first exploited by the notorious Clop ransomware gang in May 2023. Clop continued to successfully compromise end users despite a patch being released on May 27. The group’s continued exploitation of the vulnerability is believed to have driven a record number of ransomware attacks in July 2023.

5. Chinese Espionage Campaign Infiltrates US Government

Microsoft discovered a Chinese cyber-espionage campaign that enabled the Storm-0558 group to gain access to customer email accounts from May 15, 2023. This included employees in the US State and Commerce Departments and other US government agencies. To launch the campaign, the attackers compromised a Microsoft engineer’s corporate account, leading to the tech giant being criticised and even accused of negligence by a US lawmaker.

6. UK Electoral Commission Attack Exposes 40 Million Voters’ Data

In August 2023, the UK’s Electoral Commission revealed it had been the victim of a “complex cyber-attack” exposing the personal data of anyone in the UK who was registered to vote between 2014 and 2022. Worryingly, the attackers had remained undetected in the systems for 15 months, suggesting they were in search of something beyond quick financial gain. It was later reported that the Electoral Commission had received an automatic failure during a Cyber Essentials audit.

7. Casinos Taken Down by Cyber-Attacks

In September 2023, hotels and casinos giant MGM Resorts International reported that it had experienced a cyber-incident affecting critical parts of its business for several hours. The attack, perpetrated by the ALPHV/BlackCat ransomware gang, cost the firm more than $100m after refusing to pay the ransom demand. Just days after the MGM incident, another Las Vegas based casino and hotel chain company, Caesars Entertainment, revealed it had also been compromised by ransomware threat actors.

8. Logistics Firm Closes Due to Ransomware Attack

One of the UK’s largest privately owned logistics firms, KNP Logistics Group, was forced into administration in September 2023 following a ransomware attack it suffered earlier in the year. The firm will be forced to make over 700 employees redundant, with the business stating that it has been unable to secure urgent investment due to the attack. The incident highlights the serious real-world impact that cyber-extortion attacks can have.

9. 23andMe Suffers Major Data Breach

A DNA testing firm 23andMe confirmed its customers had their profile information accessed by threat actors following a credential stuffing campaign in October 2023. The threat actor claimed to have 20 million 23andMe data records in their possession, raising concerns that highly sensitive data, such as ethnicity, could be used against victims. 23andMe later confirmed that over 6 million individuals' information was accessed from the data breach, and revealed the hackers were able to access a significant number of files containing information about users' ancestry.

10. British Library Suffers Damaging Ransomware Incident

One of the world’s largest and most renowned libraries, the British Library, was hit by a ransomware attack that took down online and onsite services. The library revealed the attack occurred on October 28, later confirming that internal HR data was stolen and leaked and that user data was hacked and offered for sale on the dark web. The Rhysida ransomware group have claimed responsibility for the attack.


Pro-Palestinian demonstration held outside US ambassador’s residence in Dublin

Pro-Palestinian groups take part in a protest at the US ambassador’s residence in 

Phoenix Park, Dublin (Niall Carson/PA)

By Cillian Sherlock, PA

A number of pro-Palestinian protesters were forcibly dragged away from the gates of the US ambassador’s residence in Dublin during a protest against the country’s support of Israel.

More than 100 protesters, some banging drums and waving Palestinian flags, staged a protest on the roadway leading to the residence inside Phoenix Park.

A large police deployment, including a mounted unit, was present at the scene and after some protesters blocked the roadway in a sit-down protest, barriers were erected to prevent the public approaching the residence.

There was a large police presence at the protest (Niall Carson/PA)

Several cars had turned around as the protest prevented access through main entrances and exits to a key roundabout in the park during rush hour.

Gardai (Irish police) also prevented public access to a nearby car park.

At least two protesters were dragged by gardai away from the closed gates of the residence, which was hosting a Christmas dinner for Irish politicians.


They, along with a Palestinian flag which had been dropped, were returned to the main group of demonstrators behind the garda barriers.

Some demonstrators sat on the roadway as others chanted “from the river to the sea, Palestine will be free”, “United States you can’t hide, you’re committing genocide”, “Biden out”, “ceasefire now” and “free, free Palestine”.

Some protesters called for the expulsion of the Israeli ambassador in Dublin (Niall Carson/PA)

Three men wearing only their underwear and with their eyes covered by blindfolds also kneeled on the ground as part of the demonstration, in a reference to images of IDF detainees in Gaza.

Other protesters, many of whom were wearing keffiyehs or draped in Palestinian flags, called for the expulsion of the Israeli ambassador in Dublin.

People Before Profit TD Brid Smith, who said she was invited to the event in the residency, said protesters were “very angry” with a US veto of a UN Security Council resolution for a ceasefire in Gaza.

Speaking to the PA news agency, she said: “So directly and indirectly they are responsible for all the children on whom bombs are falling, injuring them, the hospitals that are being lost, the schools being lost, the lives are being lost, the destruction, the trauma and the dreadful, unspeakable acts that are happening.”

Ms Smith said the protest was to call on Irish politicians to boycott the event and to send a message to the ambassador that the US’ “behaviour is unacceptable”.

Activists block test-drilling for minerals in Lapland

Europe’s green transition pushes for more mines to open. Test drilling in what is believed to be an exceptionally rich copper and nickel deposit in northern Finland, however, was Tuesday morning stopped by environmentalists.


The activists came unannounced to the drilling site north of Sodankylä in the early morning of December 12. 
Photo: Extinction Rebellion Finland

By Thomas Nilsen
December 12, 2023

Viiankiaava is a well-known protected swamp area north of Sodankylä in Lapland, some 120 kilometers inside the Arctic Circle.

Waders, wood sandpipers and willow warblers are some of the birds nesting in the area. By law, human activity is limited to bushwalking and picking berries. Disturbing animals or moving stones and plants are banned.

For Sakatti Mining Oy, a Finnish subsidiary of the giant Anglo American mining company, potential mining will for environmental reasons take place deep underground with no surface installations inside the nature reserve.

Current test borings aimed to estimate the potential for metals, however, are carried out from a rig on the earth’s surface.

“I think it’s outrageous that even protected areas are not safe from mining companies,” says Tipa Lilja, one of the four activists with Elokapina - Extinction Rebellion Finland that blocked the drilling rig on Tuesday.

The group argues that underground exploration here could threaten to dry up the marshland above the mining tunnels.

“Groundwater will leak into the tunnels, drying up the groundwater in the entire swamp area,” the group states and points to similar incidents at the Kaunisvaara iron ore mine in northern Sweden.

Sakatti Mining has valid permits to drill the rocks during this winter season both inside and outside the boundaries of the protected area.

The company describes Viiankiaapa as a rich multi-metal deposit with “excellent exploration potential for metals of the future.”

The environmentalists warn locals against wordings about big money and bright prosperities.

“They promise work and livelihood, but most of the profits will in reality go abroad and the disadvantages will remain on the account of the locals forever,” Tipa Lilja says.

Political pressure to find climate solutions from inside Europe doesn’t make it easier for the environmentalists to protest the mining plans.

Battery producers supplying carmakers like VW, Nissan, Hyundai and Tesla are already rushing to secure as much raw materials as possible. Metal prices are skyrocketing, making mining companies even more eager to explore new areas. Electrification of the transport sector and renewable energy production are key to slow down the global climate crisis. But it all comes with a price: Mining. Big mining.

In that regard, northern Scandinavia proves very promising.

Boliden Kevista open pit mine is just north of Viiankiaapa. 
This is today one of the largest copper mines in Europe. 
Photo: Thomas Nilsen
Tajik Migrants Say They Were Beaten, Deported By Russian Police For Refusing To Fight In Ukraine


December 12, 2023
By RFE/RL's Tajik Service
A woman in Moscow hands out leaflets calling on people to join the Russian Army.

DUSHANBE -- Some Tajik migrant workers in Russia say they were beaten by police and deported on fabricated criminal charges for refusing to fight in Ukraine.

The allegations come as Russian officials continue to target migrant workers from Central Asia in an effort to shore up Moscow's depleted troops in Ukraine, according to migrants and rights activists.

Mansur Hojiev, a 30-year-old Dushanbe resident, was deported from Russia in October just weeks after declining to sign a contract to join the Russian Army, the former migrant worker says.

Hojiev told RFE/RL his problems began when he approached migration officials in September to complete paperwork to obtain Russian citizenship.

"During my appointment at the migration office in the Sverdlovsk district in Perm Province on September 12, officials told me that I need to sign a contract to go to war [in Ukraine] or my citizenship application would be rejected," Hojiev said.

The holder of a valid residency permit, Hojiev said he didn't sign the contract and decided to continue living and working in Russia without trying to get citizenship.

A copy of the verdict by the Sverdlovsk district court in Russia’s Perm Province in a criminal case against Mansur Hojiev.

But two weeks later Hojiev was summoned to the migration office where officials allegedly demanded that he sign a statement admitting to taking illegal drugs.

"Four masked men handcuffed me there, put a plastic bag over my head, and pushed me into a van like a cow," he claimed. "They drove me to some forest, [attaching wires] to my arms and legs and giving me electric shocks."

Hojiev told RFE/RL that under duress he signed a fabricated confession that he was caught by police while taking narcotics.

The next day, the Sverdlovsk district court convicted the Tajik migrant of illegal drug use based on a police report and his "confession." Hojiev was ordered to pay a fine before he was deported to Tajikistan.

RFE/RL repeatedly tried to contact police and court officials in Perm for comment but was unsuccessful.

Rights defenders and migrants in Russia have reported dozens of similar cases of Central Asian workers being pressured into signing contracts with the Russian Defense Ministry amid Moscow's efforts to bolster its troops in Ukraine.


SEE ALSO:
Migrants In Russia Face Raids, Political Attacks As Pressure To Fight In Ukraine Increases


Just weeks before Hojiev was targeted at the migration office, Russian rights activist Tatyana Kotlyar told the 7X7 Telegram channel that five Central Asian migrants were ordered to sign such military contracts as a precondition for obtaining a Russian passport.

Among them was a Tajik migrant working in Kaluga Province whose citizenship application was rejected after the man said he was unable to join the military on medical grounds, Kotlyar said.

Kotlyar wrote on Facebook afterward that the migrant filed a complaint to Russian authorities. But in response, "a protocol was drawn up against him [by police] for a violation that did not exist," the activist said.

Right Decision


Valentina Chupik, the director of Tong Jahoni, a human rights NGO in Russia, has repeatedly spoken about officials' campaign to recruit migrant workers into the army using force, intimidation, or strong incentives such as the promise of fast-tracked citizenship.

The total number of Central Asian citizens who have gone to war in Ukraine is unknown.

Dushanbe resident Anvar, who gave only his first name, claims he was ordered by officials at the Sakharovo migration center in Moscow to sign a military contract in March.

"I told them that I don't want to go war. They insulted me and beat me," he told RFE/RL. "They kicked me in my lower back."

The Sakharovo migration center in Moscow (file photo)

Anvar said he was kept in detention for 17 days before being deported to Dushanbe for allegedly violating migration rules.

"I have had my all documents in order. I had paid the required three-month fees to extend my work permit; I had also paid the fees on time to prolong my residency documentation," said Anvar, who maintains he was punished for refusing to go to Ukraine.

Anvar's mother said her son returned home "badly bruised" and suffering both physical and psychological trauma. He underwent medical treatment for several months.

Hojiev and Anvar haven't yet found work in Dushanbe. Unemployment is rife in impoverished Tajikistan, which has forced millions to move to Russia where they are vulnerable to threats and pressure put on them by Russian authorities.

Despite being destitute, however, the two said they don't regret their decision to reject serving in the Russian military in Ukraine.
Written by Farangis Najibullah based on reporting by the RFE/RL Tajik Service and the Central Asia Migrant Unit
The Chechens ran Russia's show at COP28

Russia's climate envoy Ruslan Edelgeriev meets UAE President Mohamed bin Zayed Al Nahyan during COP28. Photo: twitter.com/COP28_UAE

Climate calamity looms, but Moscow's participation at the COP28 will be remembered for its unfaltering support for fossil fuels and the key role of Chechen strongmen.

By Atle Staalesen
December 12, 2023

For the Russian conference participants, the fighter jets that on the 6th of December flew low over the Arab capital with jet clouds in the colors of the Russian tricolor might have be one of the most memorable parts of the COP28. As climate negotiators from across the world discussed ways to save the planet against climate catastrophe, the UAE sent up its air force a in a greeting to Vladimir Putin who had come to town to meet President Mohamed bin Zayed Al Nahyan.

The jet emissions left colorful clouds in the sky. But it was not emissions and climate talks that brought Putin to Dubai. Judging from statements from the Kremlin, the talks with the Arab sheikh were first of all about fossil fuels, economy and security.

The Russian tricolor in the skies above Dubai as Russian leader Vladimir Putin came to town during the UN Climate Conference. Photo: Kremlin.ru

The war against Ukraine has left Russia isolated on the international stage, but the UN climate conferences remain an arena open to the Russians. Reportedly, there were almost 600 Russian representatives at the event.

At the helm of the delegation stood former Chechen prime minister Ruslan Edelgeriev, who has been Putin’s envoy on climate issues since 2018. The 49-year old official, who served ten years in the Russian interior ministry before he in 2007 was was appointed Chechen Minister of Agriculture, is a close comrade with Chechen leader Ramzan Kadyrov, and both men took part in the bilateral meeting between Putin and the UAE President.

Ruslan Edelgeriev and Ramzan Kadyrov were part of the delegation in Putin’s meeting with UAE President Mohamed bin Zayed Al Nahyan. Photo: Kremlin.ru

For some, the appointment of Edelgeriev to the post as top climate envoy might seem like evidence of Russia’s ridicule of the international climate talks. But the Chechens and Russians praise his skills.

“He is a Specialist with big letter [and] with firm confidence I can say that he is a God-fearing, respectable person and also excellently educated, full of initiative and a multi-level specialist,” Kadyrov says about his man.

During the climate conference, Kadyorv sent a birthday video greeting to Edelgeriev, calling him “one of the sharpest representatives of his team.”


Ramzan Kadyrov posted birthday greeting to Edelgeriev on his VK page.

Edelgeriev won tribute from the Chechen strongman when he at the COP 15 Biodiversity Conference in Montreal in 2022 started his address with a prayer and citation of the Koran.

“As far as I know, Edelgeriev is the first and so far only Russian official on federal level that has started his speech at an international event with the words of the Holy Koran,” Kadyrov wrote on his VK page.

“This once again shows that the Russian Federation is the best friend and business partner of the Moslem countries,” he underlined.


Climate envoy Edelgeriev recites Koran during address at climate conference. 
Video posted on Kadyrov’s VK page

Ruslan Edelgeriev and Ramzan Kadyrov were not the only Chechens in Dubai during the climate conference. Also several of Kadyrov’s relatives were in town. Among them was Akhmat Kadyrov, the 18-year old son of the strongman, that recently was appointed First Deputy Minister of Physical Culture, Sports and Youth Policy in the Chechen government.

In a video shared by his father, the inexperienced young man is seen meeting with Saeed Al Nazari, the Director General of the Federal Youth Authority of the UAE.


Ramzan Kadyrov’s son Akhmat in Dubai during the COP28. 
Video posted on Kadyrov’s VK page

Reportedly, also Kadyrov’s daughter Khadizhat, as well as her husband Adam Alkhanov, were visiting Dubai at the time. The latter is Chechen Minister of Health. According to Kavkaz.Realii, it is Edelgeriev that is counseling the Kadyrov family members during their stay in Dubai, and they all attended the COP28 plenary session and also met with representatives of the UAE, Syria and the Palestine National Authority.

The Kadyrov family is believed to own several properties in the UAE and have big money in national banks.

Ramzan Kadyrov and Ruslan Edelgeriev. Screenshot of video by Kadyrov



The UN climate meeting takes place on the backdrop of an increasingly alarming situation in global climate, and Russia is among the countries hardest affected. According to the latest climate report from the country’s Meteorological Service, Russia is experiencing an increase in air temperatures that by far exceeds global average. In 2022, the researchers found a national 0,87 °C divergence from the average of the period 1991-2020.

And the situation is even more notable in the Russian Arctic where the divergence was up to +1,1 °C.

However, Russian authorities are cautious about raising the alarm about the dramatic changes.

Moscow remains an ardent opponent of international efforts to phase out fossil fuels, and Ruslan Edelgeriev has repeatedly warned against an international hydrocarbon ban.

“We will in no case accept to be blackmailed by all kinds of corrective mechanism on hydrocarbons, a ban on coal and transformation to other energy sources that are unfavorable to us,” he said in last year’s St.Petersburg Economic Forum.

Symptomatically, before the start of the COP28, Russia adopted an updated version of its climate doctrine. As noted by newspaper Kommersant, the updated version of the document, unlike the one from 2009, does not include a mention about burning of fossil fuels as driver for climate gas emission.

Russia is heavily dependent on its oil and gas exports and the Kremlin argues that western powers seek to curb Russian oil under the disguise of climate efforts.

Ahead of the COP28, the country’s Minister of Environment Aleksandr Kozlov warned against a “politization” of climate issues.

“In the conference, our country will stand up against politization of the process, something that could unfold on the background of the complicated geopolitical situation,” Kozlov underlined in a newspaper interview.

 

Sociologist Boris Kagarlitsky is fined for video about Crimean Bridge blast. He was reported to police by Ukhta’s “chief pioneer”

The court believed that the video about the “explosive congratulations of the cat Mostik” justified terrorism. The hearing and the verdict took only 24 hours.
December 13, 2023

A military court in the northern Russian region of Komi sentenced sociologist Boris Kagarlitsky to a fine of 600,000 rubles (€6185) for “justification of terrorism”, although the prosecution requested a prison term of 5.5 years for him, SOTA reports.

The charges were based on a video published by the Rabkor media outlet headed by Kagarlitsky. The video entitled “Explosive congratulations of the cat Mostik, Nervous people and events, Strikes on infrastructure” was dedicated to the blast on the Crimean Bridge on October 8, 2022. The video has now been deleted.

Kagarlitsky’s lawyer Sergei Erokhov said that the age of the defendant who is 65 years old was the reason for the lenient sentence and added that they were satisfied with the verdict. Kagarlitsky did not plead guilty and said in court that he had opposed any form of terrorism or terrorist policies all his life.

Kagarlitsky was released in the courtroom. He told reporters that such a lenient sentence was due to the publicity around his case.

     “Unfortunately, for those who fall under the same road roller in some small town, in a local court, with local law enforcement officers, their fate is much more dramatic, simply because their case is often not known, including among big bosses,” 

– Kagarlitsky told a SOTA reporter.

As it became known at the first hearing, which took place the day before, Boris Kagarlitsky had been reported to the police by a local council member in the city of Ukhta and director of the local Creativity Center Leonid Krasnoperov. This was the reason why the case was considered in Komi.

Leonid Krasnoperov is also a member of the expert board of the Kremlin-backed youth association “Movement of the First”, a copy of the pioneer movement in the USSR. On his social media page, Krasnoperov praises the policies of President Vladimir Putin and publishes “patriotic” content. Some of his posts are dedicated to Joseph Stalin, whom he calls “The Great Ruler of Russia”.


Boris Kagarlitsky is a political scientist, sociologist, teacher, and author of publications and studies on the leftist movement in Russia and the world. In April 1982, Kagarlitsky was arrested for “anti-Soviet propaganda” and spent just over a year in Lefortovo prison. In addition, Kagarlitsky is the editor-in-chief of the online media outlet Rabkor and the author of the YouTube channel of the same name. In 2022, the Ministry of Justice put Kagarlitsky on the list of “foreign agents”.

Criminal cases related to comments about the explosion on the Crimean Bridge began to be initiated after the incident on October 8, 2022. The state used these cases, among other things, to suppress anti-war sentiment in Russia. In May 2023, Nikita Tushkanov, a school teacher from Komi, was sentenced to 5.5 years in prison. The FSB accused him of justifying terrorism for his comments about the Crimean Bridge. Arkhangelsk student Olesya Krivtsova, who escaped from house arrest in March of this year, also faced criminal prosecution on the same charges. Human rights organization Memorial put Tushkanov and Krivtsova on the list of political prisoners.

 Boris Kagarlitsky. Photo from personal Facebook page