• KGS/USD = 0.01144 0%
  • KZT/USD = 0.00193 -0%
  • TJS/USD = 0.10100 2.23%
  • UZS/USD = 0.00008 0%
  • TMT/USD = 0.28571 0%
  • KGS/USD = 0.01144 0%
  • KZT/USD = 0.00193 -0%
  • TJS/USD = 0.10100 2.23%
  • UZS/USD = 0.00008 0%
  • TMT/USD = 0.28571 0%
  • KGS/USD = 0.01144 0%
  • KZT/USD = 0.00193 -0%
  • TJS/USD = 0.10100 2.23%
  • UZS/USD = 0.00008 0%
  • TMT/USD = 0.28571 0%
  • KGS/USD = 0.01144 0%
  • KZT/USD = 0.00193 -0%
  • TJS/USD = 0.10100 2.23%
  • UZS/USD = 0.00008 0%
  • TMT/USD = 0.28571 0%
  • KGS/USD = 0.01144 0%
  • KZT/USD = 0.00193 -0%
  • TJS/USD = 0.10100 2.23%
  • UZS/USD = 0.00008 0%
  • TMT/USD = 0.28571 0%
  • KGS/USD = 0.01144 0%
  • KZT/USD = 0.00193 -0%
  • TJS/USD = 0.10100 2.23%
  • UZS/USD = 0.00008 0%
  • TMT/USD = 0.28571 0%
  • KGS/USD = 0.01144 0%
  • KZT/USD = 0.00193 -0%
  • TJS/USD = 0.10100 2.23%
  • UZS/USD = 0.00008 0%
  • TMT/USD = 0.28571 0%
  • KGS/USD = 0.01144 0%
  • KZT/USD = 0.00193 -0%
  • TJS/USD = 0.10100 2.23%
  • UZS/USD = 0.00008 0%
  • TMT/USD = 0.28571 0%

Viewing results 1 - 6 of 5

Bulgarian Spy Ring Sentenced: Questions Linger Over Possible Unprosecuted Crimes and Future Threats

On March 7, 2025, six Bulgarian nationals living in the UK were convicted under the Official Secrets Act 1911 for espionage and the Identity Documents Act 2010 for possessing false identity documents. Following an investigation by the Metropolitan Police Counter Terrorism Command, the Crown Prosecution Service secured sentencing on May 12. Prosecutor Alison Morgan KC argued that lengthy sentences were justified for several defendants, stating that their actions had put lives at risk and compromised national security.  Ultimately, Orlin Roussev (47) received ten years and eight months, Biser Dzhambazov (44) ten years and two months, Ivan Stoyanov (33) five years and three weeks, Katrin Ivanova (33) nine years and eight months, Vanya Gaberova (30) six years and eight months, and Tihomir Ivanchev (39) eight years. While these sentences address their espionage activities, concerns remain over additional fraudulent schemes undertaken by the group. Central to their operations was their use of stolen identities to create companies and bank accounts designed to implicate victims in criminal activities and tarnish their reputations. During the investigation and subsequent raids in early 2023, law enforcement seized as stated in court documents “91 bank and other financial institution cards in 17 different names; 75 passport or identity documents, including those in 55 names other than those legitimately used”. The investigation revealed that the spy ring was allegedly organized at a higher level by fugitive Jan Marsalek who reportedly held a diplomatic passport from Uzbekistan. The spy ring was mercenary in nature, serving a private and public sector clientele to target individuals, organizations, and governments from the UK, Russia, Kazakhstan, the U.S., and Europe with a blend of espionage and fraudulent schemes. A recent report by The Telegraph reveals that Marsalek’s network of spies was far larger than this group of six, with a spy network extending to the UK, U.S., Germany, Austria, Israel, Italy, Switzerland, France, Croatia, Hong Kong, and Turkey. The Bulgarian spy ring’s activities can be traced back as far back as 2015, with Roussev reportedly in contact with Marsalek during this period. By 2016, Roussev, Dzhambazov, and Ivanova were seen participating in a Brexit-related event at the UK Parliament, part of their apparent effort to gain deeper access to information and influential networks. During the three-month-long trial, jurors examined messages and transactions dating back to 2019. While the case primarily focused on espionage, it is possible that broader charges, as well as those extending further back in time, were not fully addressed in court. The sentencing of the Bulgarian spy ring marks a significant step in addressing espionage activities in the UK, but it leaves critical questions unanswered about the full extent of their crimes. Beyond espionage, the group readily achieved identity theft, document forgery, and disinformation campaigns designed to frame individuals, manipulate public opinion, and exploit geopolitical tensions. Their calculated efforts to harm Bellingcat’s investigative journalist Christo Grozev and implicate innocent individuals in fraudulent schemes highlight the broader dangers posed by such operations. The use of front companies like Truth on the...

Bulgarian Spy Ring Attempted to Threaten Kazakh President’s Western Ties

A spy cell in the UK, including five Bulgarian nationals, targeted multiple individuals and locations over nearly three years, according to court documents at the Old Bailey, officially known as the Central Criminal Court of England and Wales. The Bulgarian nationals had stood accused of spying for Russia at the behest of the fugitive Jan Marsalek, the former COO of Wirecard, described by prosecutors as “believed to be linked to the Russian state”. The trial centered around thousands of sinister messages between Marsalek and Bulgarian national Orlin Roussev, who compared himself to the fictional character of ‘Q’ from the James Bond movies, and his “team leader” Bizer Dzhambazov, who managed the other three defendants, all belittlingly referred to as “the minions”. Roussev and Dzhambazov had pleaded guilty to their role in the spy ring prior to the trial. [caption id="attachment_29626" align="aligncenter" width="1600"] The Central Criminal Court of England and Wales; image: TCA, Stephen M. Bland[/caption] The story has all the hallmarks of a Hollywood script: gadgets, beautiful women, and dozens of fake IDs used to rent cars and properties across Europe for various operations. The defendants plotted espionage, psyops, and disinformation campaigns, and even kidnapping and murder, some of which were partially carried out in the UK and across continental Europe, including in Germany, Austria, and Spain, as well as other locations. Messages presented to the court indicate that, beyond their alleged collaboration with the Russian FSB, the gang operated as mercenaries for any party willing to pay. The Bulgarians devised schemes appealing to their purported connections in Russia, Kazakhstan, Serbia, China, Malaysia, and Colombia. Germane to Central Asia, the spy ring engaged in a range of covert activities targeting Kazakhstan. In 2021, they botched a surveillance operation against Bergey Ryskaliyev, a long-time adversary of former President Nursultan Nazarbayev. Ryskaliyev, the former governor of Kazakhstan’s Atyrau region, fled to London after being accused of embezzling hundreds of millions of U.S. dollars and was sentenced in absentia to 17 years in prison for leading an organized criminal group. Targeting Kazakhstan’s President By 2022, the group’s efforts had escalated into an elaborate scheme to influence Western government officials to impose punitive measures against Nazarbayev’s successor, President Kassym-Jomart Tokayev. The plan began with the creation of an entity designed to lend legitimacy to a fabricated grassroots opposition movement, the inception of which was discussed in Telegram chats between Marsalek and Roussev. “If you have a preferred name… otherwise I will use my imagination and historical facts from the past centuries. Also… how about for the fake company or real company that we register to use some Chess terms…”, Marsalek suggested with regards to naming the NGO. To which Roussev replied: “Let's call it ‘Truth on the Steppes Publishing Ltd.’” The duo would later refer to the entity as “TOTS”. Marsalek agreed, saying, “UK… will be done in a few days… that one I will register tomorrow - UK company ‘Truth on the Steppes Publishing Ltd.’” Shortly after, "Truth on the Steppes Publishing Ltd"...

Mercenary Spies Unmasked: Guilty Verdict Exposes Global Disinformation and Sabotage Network

A spy cell in the UK, including five Bulgarian nationals, targeted multiple individuals and locations over nearly three years, according to court documents at The Old Bailey, officially known as the Central Criminal Court of England and Wales. The court case, which has played out over fourteen weeks, tells the story of a rogue group of six individuals aiming to leverage statecraft, intelligence, and a willingness to be ruthless for monetary gain. The trial has revealed that the defendants worked under the direction of Jan Marsalek, an Austrian national described by prosecutors as a Russian agent involved in espionage activities. Two men have already pleaded guilty to their role in the spy ring, Orlin Roussev, 46, and Bizer Dzhambazov, 43, whilst the whereabouts of Marsalek remain unknown. According to the prosecution, the defendants stood accused of "monetizing a gap in the market," engaging in what was described as "high-level espionage with very high stakes." A money flowchart presented as evidence revealed that approximately €380,000 had been transferred between three of the suspects, further supporting the allegations. The case has offered a window into the dark world of commercialized clandestine services where criminal organizations offer espionage, psyops, misinformation, assassinations, and other illegal activities for a fee. As for the outcome of the trial against the remaining three defendants, Katrin Ivanova, 33, Vanya Gaberova, 30, and Tihomir Ivanchev 39, following 32 hours of deliberation, the jury returned a guilty verdict on all three of being involved in a conspiracy, contrary to section 1 of the Criminal Law Act 1977, to commit an offence under section 1 of the Official Secrets Act 1911. Only Ivanchev was present in court, whilst Ivanova and Gaberova joined by video-link from HMP Bronzefield. Their crimes carry a maximum sentence of 14 years imprisonment. Court testimony, evidence documents as well as volumes of Telegram and WeChat messages, reviewed by The Times of Central Asia reveal a chilling account of the sinister services these dark mercenaries plotted, offered, and in some cases, partially executed. The Times of Central Asia is finalizing its review of court documents and conducting follow-ups with sources to provide a comprehensive analysis and perspective on this case. Please check back for further insights.

Cyber Déjà Vu: Is Russia Spying on Kazakhstan Again?

Another espionage scandal is gaining traction in the Western media, with Kazakhstan once again at its center. Within Kazakhstan, however, the topic of Russian cyber activities against the country is receiving minimal attention in the press. While Akorda seeks to navigate its delicate relationship with the Kremlin, any overt allegations of espionage might provoke Moscow’s powerful propaganda machine, which continues to exert significant influence over public opinion in Kazakhstan. This time, the intrigue is unfolding in cyberspace, where a hacker group identified as UAC-0063, potentially linked to the Kremlin-backed Advanced Persistent Threat (APT) group known as APT28, has been implicated in spying on diplomatic institutions across Central Asia. The group’s activities, which can be traced back to at least 2021, have targeted not only Kazakhstan, but also Kyrgyzstan, Tajikistan, and other countries. Their previous targets include diplomatic, non-profit, academic, energy, and defense organizations in Ukraine, Israel, India, and the wider Central Asian region. According to a cyber espionage investigation by Sekoia, UAC-0063 hackers infiltrated Kazakhstan's Ministry of Foreign Affairs by leveraging official documents, such as emails, draft memos, and internal administrative communications. These documents — likely used to deliver malware — were either stolen in prior cyber operations, obtained from open sources, or acquired through other unknown means. Sekoia identified around two dozen such documents, dating from 2021 to October 2024, which primarily addressed Kazakhstan’s diplomatic cooperation and economic relations with other countries. The researchers suggest this campaign is part of a broader, Kremlin-backed global cyber espionage operation targeting Central Asia, with a particular focus on Kazakhstan's foreign relations. This latest revelation is a reminder of other episodes. One prominent ongoing case involves individuals in London who stand accused of preparing actions at the behest of Russia against Kazakhstan's diplomatic mission in the United Kingdom and targeting President Kassym-Jomart Tokayev’s son. Even more striking is the echo of the Pegasus spyware scandal, which emerged in 2021. An investigation by the Organized Crime and Corruption Reporting Project (OCCRP) revealed that the Israeli-developed Pegasus spyware was used to monitor a wide range of individuals in Kazakhstan, including independent journalists, activists, human rights defenders, and high-ranking officials. Among the targets were President Tokayev, then-Prime Minister Askar Mamin, former Akim of Almaty Bakytzhan Sagintayev, and several of Kazakhstan’s wealthiest business-people. At the time, public suspicion fell upon Karim Massimov, the former chief of the National Security Committee (KNB), as the perpetrator of the Pegasus surveillance. However, the issue faded into obscurity following the unrest of January 2022, the events of which were officially described as an attempted coup d’état. To this day, no definitive answers have been provided about who orchestrated the Pegasus cyberattacks or their motives. Now, with fresh reports of Russian-linked malware targeting Kazakhstan’s cyber-security, it appears that history may be repeating itself. The key question which remains - is this merely a case of déjà vu, or could it signal the groundwork for a new effort to destabilize Kazakhstan?

Son of former Kyrgyz prime minister jailed for espionage

BISHKEK (TCA) — A court in Bishkek has sentenced a former Kyrgyz prime minister's son, Altynbek Muraliev, to 12 years in prison on espionage charges, RFE/RL's Kyrgyz Service reported. Continue reading