A Russian computer programmer suspected of US election hacking was just arrested

A Russian hacker purportedly involved in meddling in the 2016 presidential election was arrested in Spain on Sunday night.

According to Reuters, Russian computer programmerĀ Pyotr Levashov was taken in by authorities in Barcelona, Spain for unspecified reasons. Russian government-sponsored media network RT reported that Levashov was being taken into custody under an international arrest warrant issued by the U.S. Department of Justice (DOJ).

“The U.S. case remains under seal, so we have no information to provide at this time,” said Peter Carr, a spokesman for the DOJ’s criminal division, in a statement to Reuters.

As Chris Zappone of Fairfax Media Australia noted, the DOJ’s criminal division is separate from the agency’s national security division, which is responsible for investigating cyber warfare. This means that Levashov’s arrest may not be in relation to the 2016 election investigation. However, as the documents relating to Levashov are still under seal, the details of his arrest are not immediately known.

Levashov isn’t the first Russian programmer to be arrested by Spanish law enforcement officers. Earlier this year, a programmer simply named “Lisov” was taken in for allegedly conspiring in a financial fraud ring under another international arrest warrant issued by the U.S. government.

Scott Dworkin, who initiated the #Trumpleaks hashtag, reported on Sunday that a Pyotr Levashov was also employed by Russian bank VEB, whom Trump advisor and son-in-law Jared Kushner met with during the election. It’s unclear if the two are the same person.

Russian President Vladimir Putin continues to deny that the Russian Federation was involved in interfering with the 2016 election, despite allegations from multiple U.S. intelligence agencies.


Tom Cahill is a senior editor for the Resistance Report based in the Pacific Northwest. He specializes in coverage of political, economic, and environmental news. You can contact him via email at [email protected], or follow him on Facebook by clicking here.