Aleksei Dressen

Aleksei Dressen (born 1968 in Riga[1]) is a former Estonian Internal Security Service officer being charged with treason.[2] He is being charged with cooperating with Russian intelligence service FSB. He is an ethnic Volga German.[3]

Biography

During Soviet rule of Estonia, Aleksei Dressen worked as a policeman (militia). In 1993 he started working for the reestablished Estonian Security Police. In 1994 he lost his police ID. A year later there was a disciplinary charge for wrongful conduct at work. This happened several times during his career. In 1999 his salary was cut by 30% for two months.[3]

Despite all this Aleksei Dressen managed to become a director of several different units in the Estonian Security Police.[4]

Aleksei Dressen and his wife Viktoria were arrested on the morning of 22 February 2012 at Tallinn Airport. Viktoria was about to board a flight to Moscow. During the arrest a thumb drive full of information was seized.[4] The chief architect behind Dressen's capture is considered to be the deputy chief of the Estonian Security Police Aleksander Toots. He is also considered to be the actual chief of the Estonian Security Police.[5] In 2012 Dressen was sentenced to 16 years in prison.[6]

On 26 September 2015, he was handed over to Russia in exchange for Eston Kohver.[7][8] The prisoners were exchanged in a manner reminiscent of the Cold War spy exchanges on a bridge over Piusa River.

gollark: Why is the entire first screen of it just a bizarre custom license?
gollark: Speaking of that, did you know the E-ink Kindle devices actually run a weird Linux distribution which is *also* very insecure?
gollark: I *honestly* think I could probably do a better job, although maybe they somehow can't fit security or sane programming into the resource-constrained environment.
gollark: It's got a `ps` command, which apparently just passes on whatever you pass it to the shell (???) so you can do `ps ; sh` and, well, get root access.
gollark: I've got an unused ADSL routermodemboxthing which you could get a root shell on with a really trivial exploit in its telnet interface (because of course it has that).

References


This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.