Russia Says U.S. Secret Service Arrest of a Russian Hacker Was a 'Kidnapping'

Maxim Zmeyev/AP

The U.S. Department of Homeland Security arrested Roman Valerevich Seleznev, a Russian citizen, over the weekend for hacking into U.S. retailers' computer systems in order to steal credit card information. However, Russia says the arrest is nothing more than a kidnapping, and believes the United States has violated a bilateral treaty.

Seleznev performed the hacks from 2009 to 2011. He was previously indicted in the U.S. in March of 2011 for bank fraud, aggravated identity theft and hacking into and damaging a protected computer. He also hacked into a number of websites, such as those of the Phoenix Zoo, Schlotzsky's Deli, and a number of other small restaurants. He was apprehended while traveling through the Maldives. 

Roman Valerevich Seleznev also seems to be the son of Russian parliament member Valery Seleznev. Seleznev senior told Russia's state publication Itar-Tass that he has been unable to reach his son, "This is a monstrous lie and a provocative act."

This is the latest in a string of unpleasantries between the two nations. The Russian government has not yet made any public actions towards retrieving Seleznev, however, they did issue this statement, "We consider this as the latest unfriendly move from Washington. This is not the first time the U.S. side, ignoring a bilateral treaty ... on mutual assistance in criminal matters, has gone ahead with what amounts to the kidnapping of a Russian citizen."

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.