Blacklisted Trader Indicted for Defense Item Smuggling

Posted

An Estonian national has been indicted on eighteen counts related to conspiracy and other charges, including the procurement of sensitive US-made electronics for the Russian government and military.

He engaged in this conduct despite being listed on the US Department of Commerce-maintained "Entity List," which designates individuals and companies barred from exporting items from the United States without a license.

Andrey Shevlyakov was arrested in Estonia on March 28, 2023, and at the time of his arrest, authorities seized inbound shipments addressed to his front companies, one of which contained approximately 130 kilograms (286 pounds) of radio equipment.

According to the indictment, Shevlyakov used false names and front companies to evade restrictions, as he was on a US government list of banned importers.

Shevlyakov is accused of procuring electronics, including radar components and analog-to-digital converters, from US manufacturers on behalf of Russian defense contractors and government agencies. The indictment alleges that Shevlyakov's communications with Russia-based customers included explicit mention of "military" goods in certain orders.

Shevlyakov is also accused of attempting to procure US-made computer hacking tools, such as Metasploit Pro, a software tool used to penetrate computer networks. The software is intended for use in assessing network vulnerabilities but is also widely used by computer hackers.

In order to deliver the goods, Shevlyakov allegedly operated an intricate logistics operation involving frequent smuggling trips across the Russian border by himself and others. . Shevlyakov was added to the Entity List in 2012, after the U.S. government identified him as a procurement agent charged with pursuing U.S. technology for Russian government and military end users. 

If convicted, Shevlyakov faces a maximum of 20 years in prison.  [Justice Release]

Comments

No comments on this item Please log in to comment by clicking here