the controversial measures with which we have shielded the network a year after the collapse

Next April 28 will mark exactly one year to the day that Spain and Portugal faded to black. An unprecedented “zero energy” in the last two decades that left nearly 60 million citizens without electricity, without internet, without traffic lights and with the banking system paralyzed for up to 16 hours. As they reflect in the magazine freenthat day we suddenly discovered that something we take for granted—electricity—is the fragile foundation on which our entire modern life rests. One year after the event, the initial shock has given way to data. We no longer ask ourselves only if such a blackout can happen again, but how much it is costing us to avoid it and if we have really learned our lesson. D-day is about to arrive. Twelve months later, we finally have the “official autopsy.” The European Network of Network Operators (ENTSO-E) published a comprehensive report of 472 pages where he concludes that there was no single cause, but rather a “perfect cocktail” of multiple factors. A sudden surge originating in Spain triggered instability that the system was unable to stop. As we have already explained in Xatakathe failure can be defined as “operational blindness.” The renewable plants operated with a fixed power factor; They did not know how to read the network surge and, for safety reasons, they disconnected suddenly, causing a rebound effect. Besides, as he adds BBClocal generator voltage controls were not fully aligned with operator requirements. The crisis required millisecond reflexes, but tension control was done manually. In fact, if Europe did not fall like a house of cards, it was due to an almost miraculous technicality: a relay in the Hernani substation (Gipuzkoa) acted like a “fusilazo”, cutting the connection with France in milliseconds to shield the continent. Ironically, just ten minutes later, it was that same interconnection that served as assisted breathing to resuscitate the system. The big question: what has Spain done differently? The fear of a new blackout has changed the rules of the game, but at a high price for the citizen. Electrical Network has imposed a “reinforced model” of operations. This means that they prioritize safety over cost, keeping more expensive and stable backup plants on, such as gas combined cycles. The result? The Spanish They have been paying an extra cost of 666 million euros In these eleven months only in “adjustment services”, which have shot up 43%. In the legislative sphere, the Government has approved the Royal Decree-Law 7/2026 to streamline bureaucracy through the “Renewable Acceleration Zones” (ZAR). However, experts warn thatSince there is still no structured capacity market, investing in the necessary storage systems (batteries) continues to be a financial risk for developers. There’s more shielding going on. The collapse not only left us in the dark, but it left us cut off, although in a very uneven way. While some completely lost the signal, others managed to maintain it thanks to the logistical efforts of some operators. To avoid this coverage lottery, the CNMC has proposed that Telefónica, Vodafone and MásOrange offer a “national roaming” plan in case of emergency. If your operator’s network goes down, your mobile phone would automatically connect to the competition, based on the Swedish model. Added to this is the request to make the alert system (ASA) mandatory in cars with digital radio (DAB+), to send warnings to the population immediately even if the internet is down. The false culprit and the new energy guzzler. After the collapse, many were quick to blame green energy, but the reality is different. As explained from freenthe problem is not that Spain has a lot of solar and wind energy, but that the electrical grid is still stuck in the 20th century, designed for fossil power plants and not for a decentralized system. In fact, Spain is a fascinating laboratory. According to EUObserverthe country has managed the recent price crisis caused by the Third Gulf War much better than its European neighbors thanks to its enormous solar shield. However, the trauma of the blackout has caused an absurd side effect: operators are so afraid of overloading the grid that they force solar and wind farms to disconnect more frequently. Curtailment (clean energy generated that is thrown away) has gone from 2% to 7%. And if that were not enough, the saturated network assumes the imminent arrival of a new energy-consuming giant: the massive data centers for Artificial Intelligence. The exchange of accusations is served. In the offices the short circuit has only just begun. As detailed Financial Times, The National Markets and Competition Commission (CNMC) has opened formal investigations. Red Eléctrica (REE) faces proceedings for “very serious” infractions, while giants such as Iberdrola, Naturgy, Endesa and Repsol face possible fines of up to 60 million euros for “serious” infractions. Besides, as accounted Public, up to twenty open sanctioning files. REE defends itself by ensuring that the opening of the file does not prove its guilt. Meanwhile, a Senate report promoted by the PP directly blames the Government, REE and the CNMC for ignoring known vulnerabilities, according to Reuters. And the tension reaches the limit: electricity companies like Endesa and Iberdrola They have demanded a judge access more than 8,000 calls and emails from REE executives during the hours of the blackout, after the leak of audios where technicians warned of the danger 15 days before. An electric heart that remains at risk. Spain is “a gold mine without a road”, as defined by Patxi Callejadirector of Iberdrola. We have the sun, the wind and the technical capacity. But the great lesson of this last year is that true energy independence is no longer played at the national level, but at the local level, where factories and homes install their own batteries and hybrid panels so as not to depend on the fragile central system. We survived the blackout and avoided another one by reaching for our wallets and operating defensively. But as long as the line procedures last a decade, mass storage … Read more

The US has invested 16 years and 8 billion dollars in renewing the software of its GPS network. Result: a failure of epic proportions

The Next-Generation Operational Control System project (OCX) was going to modernize the constellation of the United States’ more than 30 GPS satellites. The company RTX Corporation (previously known as Raytheon) managed to win the project in 2010 with a budget of 3.7 billion dollars. The project was supposed to be completed in 2016, but in reality the US has spent $8 billion and 16 years later has an absolute disaster on its hands. 16 years of broken promises. In 2010 the iPad had just appeared on the scene and cloud computing was a somewhat diffuse concept. The project of the US Government was reasonable, and proposed that the OCX system be operational by the time Lockheed Martin’s new GPS III satellites debuted. The development became a chaos of bugs and requirements changes, and to this day it is unclear when, if ever, it will be completed. In Xataka 90% of Iran’s oil industry depends on a tiny island. One that is already on the radar of the US and Israel A fortune invested. The financial management of the project is the first big disaster. The initial budget was estimated at 1.5 billion dollars, but since the award until today that figure has risen to reach almost 7.7 billion of current dollars, to which another 400 million are added to support an improved version of the satellites, the GPS IIIF. This increase is not due in large part to the project suddenly being much more ambitious or more capable, but rather to the costs of having been fixing everything that has gone wrong since they started working on it. Software costs more than satellites. Every time software fails an integration test, the bill runs into tens or hundreds of millions of dollars. That has made the OCX system one of the most expensive and least efficient software projects in recent US military history. In fact, it far exceeds the cost of the satellites themselves that it had to control: the 22 GPS III satellites of the contract signed in 2018 have a budget of 7.2 billion dollars. Satellites of the future controlled by a fairground shotgun. Currently the United States has a fleet of GPS III satellites in orbit capable of emitting much more powerful “M-code” signals and interference resistantsomething that among other things allocates them especially for military applications. The problem is that since the OCX software not workingthey are managing them with control systems inherited from the 90s. It is as if we had a VHS video connected to watch movies on an 8K Smart TV: the potential is there, but one of the components is an absolute bottleneck. {“videoId”:”x8wlh9q”,”autoplay”:false,”title”:”United States vs. China: The CHIPS WAR”, “tag”:”webedia-prod”, “duration”:”1611″} The cybersecurity nightmare. One of the big problems of this project has been the cybersecurity requirements. OCX was designed to resist cyberattacks from powers such as Russia or China, but that requirement has become a spectacular technical burden. Pentagon standards have evolved so quickly that they have not been able to be adapted to an architecture that begins to become obsoleteand covering successive patches is locking the system in a complex vicious circle: the software is never finished because more and more vulnerabilities appear. Failed tests. The latest report from the Government Accountability Office (GAO) has been the final straw. During the tests the system again showed once again instabilitywhich has forced the final delivery to be delayed to the end of 2026 or even 2027. Frank Calvelli, of the Air Force, has expressed his dissatisfaction with that unacceptable management of private industry: the strategic advantage that this project should offer at a time like this is inaccessible due to the disastrous progress of the project. It’s not that difficult. for a long time the excuse for justify the delays was that OCX was “the most complex software ever created for space,” but other players in the sector have shown that achieving these types of technical milestones is possible. SpaceX has demonstrated this with technical “miracles” like its reusable Falcon 9 or with the development of Starship, for example, so those arguments are falling on deaf ears now. Waiting for a better GPS. These problems also affect us end users, who will not be able to enjoy the L5 signals for now. This much more robust frequency will significantly improve accuracy in urban centers with many tall buildings. The irony is tragic: we cannot use extraordinary space infrastructure because the base stations cannot cope with it. While waiting for the problems to be resolved, the learning is clear: the software cannot be a monster that takes 16 years to build In Xataka The GPS in the Baltic has been experiencing interference for months and the culprit is becoming increasingly clear: Russia And while as always, China. While the US crashes against its project to renew the GPS constellation, China has once again managed to “become independent” from Western technology. Your satellite navigation system Beidouit does not replace GPS, true, but It already complements it in 140 countries. Once again China’s long-term view has its obvious result: it has taken 20 years in deploying its constellation, but they already surpass the GPS system in metrics such as signal availability or integrated messaging services. Europe, by the way, also has its own alternative. In Xataka |GPS “dead zones” are spreading around the world: jammers are to blame for confusing drones (function() { window._JS_MODULES = window._JS_MODULES || {}; var headElement = document.getElementsByTagName(‘head’)(0); if (_JS_MODULES.instagram) { var instagramScript = document.createElement(‘script’); instagramScript.src=”https://platform.instagram.com/en_US/embeds.js”; instagramScript.async = true; instagramScript.defer = true; headElement.appendChild(instagramScript); – The news The US has invested 16 years and 8 billion dollars in renewing the software of its GPS network. Result: a failure of epic proportions was originally published in Xataka by Javier Pastor .

The network does not always respond. Orange wants to remedy it by charging extra

In big events there is a moment that we all recognize: we are at a concert, at a fair or at a massive celebration and just when we need the cell phone, the connection does not respond as it should. We want to send a location or publish something on networks and everything takes longer than normal or does not load at all. There is no mystery behind it, but a known problem: the network has to serve too many devices at the same time. And when that happens, the experience suffers. An extra connection. About that experience that we all know, Orange has launched “5G Fast Track”, a service that seeks to improve the connection in very specific situations. The company proposes it as a solution for events with a high concentration of people, where the demand for data skyrockets in a matter of minutes. What it introduces is an interesting nuance: the user can activate a connectivity boost to try to maintain a more stable experience in the midst of that saturation. “This service is complementary to the usual network: it is an optional extra, activated for a limited time, which optimizes the use of the network in extraordinary situations of high traffic and that are important for the customer.” Timely activation and different formats. One of the keys to “5G Fast Track” is that it does not require you to change the rate or maintain the service permanently. As our colleagues from Xataka Móvil explainthe user can activate it only when needed, for example, before entering a busy event. Orange sells it in three formats: 24 hours for 3 euros, 7 days for 7 euros and 1 month for 10 euros with automatic renewal. In this first phase, the service is available to residential, self-employed and small business customers. The company has announced that it will soon launch a modality for companies and public administrations. What about net neutrality. The idea of ​​paying for a better quality of connection in these contexts may raise questions, and the main one has to do with whether this clashes with the principle of net neutrality. The European regulation, in force since 2016, requires that traffic be treated equitably and without discrimination, something that Spanish legislation also includes. With the information available, there are no clear reasons to conclude that this service violates current regulations, among other things because it does not discriminate between specific applications or content, but rather acts on the quality of the user’s connection in a general way. The question. However, regardless of how it fits within the current framework, the proposal leaves an open question that is not minor. If paying for a better experience at specific times becomes established as an option, it is worth considering how far this type of services can evolve within the market. For now we are talking about a specific extra linked to very specific situations, but the idea of ​​introducing differentiated levels of quality in connectivity could generate debate if it is extended. Images | Orange In Xataka | MásMóvil has said goodbye to triple coverage. Although it may seem like it, it is not bad news.

A year ago, the blackout caused the Spanish data network to collapse. The CNMC believes it has the solution

In April 2025 Spain suffered a zero energy of which, precisely now, we are going to begin to pay some of its consequences. I remember quite clearly being cut off, not being able to call or send messages via data connection. However, when I changed locations and arrived at my relatives’ houses, some of them could do it. The fall of telecommunications It was uneven in Spainand the CNMC has published a document with preventive measures in case a similar situation occurs again. What happened. The energy blackout that left Spain plunged into darkness resulted in a large part of the population being cut off from communication. However, some operators They managed to keep their mobile network active for hours. Backup generators, generating sets moved to each area, backup systems… The challenge for operators to maintain coverage in Spanish territory was a titanic challenge, quite dependent on internal logistics, the state of the reserve batteries (some of them run on fuel), and the network infrastructure itself They were variables that influenced such unequal conditions to be experienced. A single network. In its statement, the CNMC proposes that the four giants of the Spanish territory put roaming plans at the service of the population in emergency cases. The experience of other countries shows that it is viable to incorporate roaming plans between operators in case of emergency. In this way, in areas where this was necessary due to the unavailability of service in an operator’s mobile network, the networks could be prepared to quickly enable the basic telecommunications services of the affected users through roaming in the networks of other operators. According to the regulator, this is an “ideal measure to strengthen resilience”, but it is not so easy to apply. Yes, but. What the CNMC proposes is a cross-roaming service between Telefónica, Vodafone and MásOrange, something that requires coordination and agreement between the three giants. The best example is Sweden where, after two years of preparation, any mobile phone can connect to any operator. Go deeper. In addition to this proposal, the CNMC requests the mandatory nature of the alert system HANDLE in those cars with DAB+ radio receivers (the evolution of FM radio). Although DAB+ works via antenna (like AM and FM radio), its signal is digitally encoded. The ASA system allows you to automatically activate a DAB+ radio connected to power, being able to quickly launch alerts. At the moment, there is a distance from proposal to fact. In Xataka | Europe has a million reasons to fear an increase in the price of electricity. Spain has something else: renewables

the social network is down worldwide

If you are trying to access X – it will always be Twitter – and you can’t, don’t restart the router and check the connection. It’s not you, it’s X. Since a few minutes ago, Elon Musk’s social network It has stopped working and it is impossible to follow the exciting news in the tool. Talking about X is talking not only about a social network. When Elon bought it for $44 billion, he did so with the goal of turning the platform into a forum, but also into a medium as such. With the implementation of Grok, the plan escalated and, currently, it is one of the most relevant points to follow current events to the second. 23 TWITTER TRICKS – Completely dominate this SOCIAL NETWORK! Although there are highly recommended alternatives, especially if you want to reconnect with people and not read bots, X continues to be that meeting point for the industry, users and the press, one that has not started 2026 on the right foot. There have already been several falls In development…

MásOrange has begun to completely dismantle its 3G network. Not good news for elevators

If you are one of those who usually browse even on a 3G connection, we have a curious fact: you are from the club of 1.82% of global traffic. The operators carry years saying goodbye to this networkand MásOrange has been the last to take the step. The operator is going to say goodbye to its 3G network for good reason. Hello to 5G. MasOrange has been the last of the large operators to start with the shutdown of 3G. Vodafone finished turning off its networks two years ago, and Telefónica is about to finish the process. With the release of the spectrum used by 2G and 3G connectivity, operators have additional bands to reinforce 5G technology. Specifically, the 900 and 2,100 MHz bands allow expanding coverage in areas with lower population density without the need to build new towers. A progressive plan. Although 2G and 3G connections sound completely obsolete, they are still necessary to connect a good number of day-to-day technologies. Elevators Cars with eCall system with 2G modules Telecare services security cameras Home alarms Old dataphones For this reason, the plan to dismantle the Spanish 3G network is being carried out progressively, giving time for a good part of these devices to update their connection modules. Although 3G was scheduled to say goodbye forever between 2025 and 2026, current plans keep it alive until 2030. A great challenge ahead. The 3G network continues to be a great ally, both for older devices and for times when 5G coverage does not have range. The challenge now is, precisely, that the deployment of 5G is even greater. For three decades, 3G invaded every corner of Spain, and some of the networks it uses (900 MHz) are especially good at passing through walls and operating in rural areas. Therefore, in complicated areas your mobile still connects to 3G. The end. Maintaining 2G and 3G networks is unsustainable. The radio space they occupy is especially valuable and, although there are devices that still use old technology, their dismantling is necessary. Cover image | Baatcheet Films In Xataka | How to request an eSIM from each operator in Spain: in which cases it is free and application methods

the amazing feather trade network that existed before the Incas

On the arid central coast of Peru, hundreds of kilometers from the magnificent Amazon rainforest and separated by one of the most important mountain ranges in the world, archaeologists encountered something they did not expect. We are talking about a cemetery of the pre-Hispanic Ychsma culture in Pachacamac and the surprise was specifically in the funeral bundles of the elite that They were adorned with macaw and parrot feathers. that could never have survived naturally in that ecosystem. So… How did they get here? The answers. Faced with this question, archaeologists had to start thinking about it, because seeing a parrot in the middle of an arid mountain range is not the most common thing. Until then, it was believed that ancient people traded only the feathers already plucked from parrots that had been in their natural habitat. However, a new study published in Nature has revealed a much more complex and fascinating reality: the ancient Peruvians transported these live Amazonian birds through the treacherous passes of the Andes. How do you know? It is not that we have a time machine to see what specifically happened, but it is possible to analyze the ancient DNA found in these cemeteries through stable isotopes and spatial modeling of routes. In this way, the study focused on the remains found in 34 funerary bundles from Pachacamac that were dated before the expansion of the Inca Empire. This is precisely where the mummies were provided with “false heads” very well decorated with the mysterious feathers. The results. The genetic analysis in this case indicated that the extracted DNA corresponded to many species of birds that were purely Amazonian, such as the red and green macaw. But the most interesting thing comes when the isotopes are applied to the remains of the birds, because a drastic change is seen in their diet. The chemical fingerprint revealed here that these parrots were born and grew up in their natural habitat in the Amazon eating a natural diet, but in their last months of life they began to have a diet provided by humans themselves, and that did not correspond to what they ate when they were in the wild. It’s a test. This unequivocally demonstrates that the birds were not hunted for their feathers in the jungle, but captured alive, transported across the mountain range and kept in captivity on the coast to be repeatedly “plucked” or sacrificed to make the funerary goods that would end up among the elites of ancient society. It’s not easy. Crossing the Andes today is something that is not easy, which is why it was much less so a thousand years ago. In this way, through landscape models and geographic information systems, the researchers mapped the most probable routes they used from the Amazon basin to the Pacific coast. In this case, the birds had to suffer great stress with drastic changes in altitude, freezing temperatures at the highest points of the mountain and, above all, a diet to which they were not accustomed. In this way, the fact that they arrived alive at Pachacamac underlines the existence of an incredibly sophisticated animal trade network with knowledge about their care. But above all, the great value that this animal must have for the society that mobilized to bring it to its cities despite the difficulties along the way stands out. Why so much trouble? As one of the researchers points out, in the pre-Hispanic Andean world, Amazonian feathers were not a simple ornament, but rather were absolute symbols of political power, status and connection with the divine. And having access to the vibrant colors of the jungle demonstrated the elite’s control over long-distance commercial networks and gave great prestige. This discovery in Pachacamac is not an isolated case, but rather confirms a trend that archeology was already beginning to glimpse. In 2021, a study published in PNAS documented similar finds much further south, in the arid Atacama Desert, where mummies of Amazon parrots that were bred in captivity and routinely plucked were found. Now it is confirmed again. Images | Dmitry Chernyshov In Xataka | 60 years ago we discovered a Dorado hidden in the jungle of Peru. We now know that it was actually much more

The first telecommunications network in history arose in ancient Syria, 3,800 years before the internet

Nowadays it is difficult to think of anything other than being able to communicate with anyone instantly, no matter how far away they are. As a millennial, I have lived in the era when sending messages continuously was not common: SMS was not free and forced you to economize on language. And of course, before there were telephone calls, the reception of which today causes fear among youth. We can go back in time to the telegraph or the imperial postal networks and even the discreet carrier pigeons, which have been helping humanity communicate from the ancient Sumerian and Egyptian civilizations. A recent post from the historian and professor of history at the University of Central Florida Tiffany Earley-Spadoni published within a volume on global perspectives of warscapes brings to the fore the first telecommunications network documented both textually and archaeologically 3,800 years ago: a system of beacons to launch an SOS. The discovery. A cuneiform chart excavated at Mari, eastern Syria, dating to 1800 BC is the oldest known historical evidence of signaling using fiery beacons. But we also know what he said: an official named Bannum writes to the king while traveling to the north of the region with concern after observing the successive lighting of bonfires near Terqa and requests reinforcements. That lighting was not accidental: it was a signal of imminent danger on the border, an early warning system for possible attacks on their cities. Early-Spadoni refers to this system as a “fortified regional network,” or FRN for short. A little context. This documentation is framed within the Syrian Middle Bronze Age, a territory of cities – states in constant conflict. Taking the city meant dealing a blow to the rival and keeping its wealth, hence the siege was the star attack. But conquering a territory was much easier than administering it. Thus, these states had great ambitions, but lacked the infrastructure to govern themselves from a distance. So to better defend themselves and control the territories they used two systems: large walls surrounding the cities and a network of forts, towers and guarded roads in rural areas. This second structure is the seed of the development of empires. Why is it important. Bannum’s letter is the oldest known historical testimony of the use of an intentionally designed telecommunications network with shared infrastructure, nodes, and protocol. Do not confuse with communication methods, since smoke or drums are prehistoric and undatable. But it is also key for civilizations insofar as it allowed us to go from “presumptive states” (which conquers territories it cannot govern) to develop real and lasting territorial empires: without this infrastructure of communication and control, the size of the empires would have been simply ungovernable. How it worked. With a physical structure made up of fortresses, forts, watchtowers and wall segments and with an operation protocol. It essentially served to control routes, resupply military personnel, transmit information and track movements in the territory. The physical hierarchy of its infrastructure was distributed along roads and river crossings spaced at regular intervals of about 20 kilometers to ensure visibility between nodes. The large fortresses were the main nodes with smaller forts between them, with watchtowers for signaling to reinforce points that were difficult to see and segments of walls in strategic areas. The system operated continuously: with smoke during the day, fire at night, and had permanent reserves of wood. Each signal was known by all the nodes, so that when a beacon, the signal traveled through the nodes until it reached the center in a relatively short time. Speed ​​was its great asset and its handicap was how limited it was: it could only transmit simple messages. The early “internet”. Comparing it with the current Internet is not just a rhetorical question: FRNs share with the Internet several of its principles, such as distributed nodes, redundancy to avoid failures, protocols agreed in advance and a topology to maximize connectivity between distant points. A before and after to build empires. This system did not disappear with Mari. For more than a thousand years, each new empire that emerged in the Near East encountered these networks, recognized them as a valuable structure, and implemented them to suit their needs. The Neo-Assyrian integrated them into walled cities and in parallel developed a horse relay system for more complex and confidential messages, impossible to transmit with the original infrastructure. The Urartian Empire made them the organizing principle of an entire empire. And the Persian Empire took the model to its maximum expression with the royal road that Herodotus describes in his Histories: forts at regular intervals, relay of messages and archaeologically confirmed fire beacons in Anatolia. Earley-Spadoni’s conclusion is that without these infrastructures, the largest empires of the ancient world would not have been able to manage themselves. In Xataka | From when a monstrous telecommunications tower and its more than 4,000 cables blocked the sun from the inhabitants of Stockholm In Xataka | In 1901, a Spanish man had one of the ideas of the century: invent the remote control before television Cover | حسن and Ezra Jeffrey-Comeau

Russia set up a secret network to sell 90 billion in oil. It has fallen due to using the same mail server

In the geopolitical chess of international sanctions, where Western governments design complex legislation to suffocate Vladimir Putin’s war machine, sometimes checkmate comes not from a brilliant diplomatic maneuver, but from corporate stinginess. An entire global smuggling network, designed to the millimeter to be invisible to the eyes of Washington and Brussels, has fallen like a house of cards for not wanting to pay separate email bills. A simple saving in computer infrastructure has exposed a monumental flow of black money. a colossal IT blunder (a huge computer error) has brought to light a smuggling network that has moved at least $90 billion worth of Russian oil. As revealed by extensive research of the Finance Timesthis plot is mainly responsible for financing the Kremlin in its war against Ukraine. The British media has identified a network of 48 companies which, on paper, operated completely independently from different physical addresses. However, in practice, they acted in unison to disguise the origin of the crude oil, especially that of Rosneft, the Russian state-controlled oil company. The need to hide these exports became life or death for the Kremlin in October 2025, when the United States imposed direct sanctions to Rosneft and Lukoil. From that moment on, a previously unknown company called Redwood Global Supply was suddenly crowned as the largest exporter of Russian crude oil in the world. This firm, along with the rest of the network, is linked to a group of businessmen of Azerbaijani origin with privileged access to the leadership of Rosneft, led by figures such as Tahir Garayev and Etibar Eyyub. The independent Russian media The Moscow Times has been echoed of this discovery, highlighting a devastating fact: in November 2024, more than 80% of Rosneft’s maritime exports They moved through this network. Sergey Vakulenko, former head of strategy at Gazprom Neft and current researcher at the Carnegie Center, explained to this medium that using fifty shell companies is “an old trick from the 90s” to evade taxes, but he confesses his surprise at the fact that a single network has become so immensely crucial for a giant like Rosneft. The triumph of shadow intermediaries The existence of this network means, quite simply, that the Western sanctions system is full of holes and that Russia has managed to industrialize evasion. According to the investigationthe success of this $90 billion network was based on strict separation of roles to erase the money trail. The network used a group of shell companies exclusively to buy crude oil shipments in Russia, and another group of companies, totally different on paper, to sell them in key markets such as India or China. In this way, the initial buyer and the final seller almost never coincided in customs documents. Furthermore, in most cases, the crude oil was labeled under generic names such as “export mix”, which destroyed any possibility of tracing its origin or checking whether the price cap imposed by the G7 was being respected. As we already explained at the time in Xatakathis modus operandi It is not new and it relies on an architecture of evasion that has been brewing for years in places like the United Arab Emirates. Something very similar happened with the case of Christopher Eppinger, a young trader German that perfectly illustrates how this underworld works. As we detailed in our report, while Europe boasted of energy sovereignty, an army of new intermediaries moved to Dubai—a jurisdiction that does not apply sanctions to Moscow—to make gold. The network now discovered by the British media uses exactly the same tools that we already analyzed: the express creation of opaque companies, the use of the “ghost fleet” (aging ships that turn off their transponders when approaching to load Russian crude oil) and transfers of oil on the high seas to mix it and falsify its origin. The only difference is that the Rosneft network uncovered by the FT was operating on an unprecedented industrial scale… Until they made a rookie mistake on the internet. The rookie mistake This entire sophisticated international network collapsed due to an absurd detail that borders on comedy. He Finance Times discovered that these 48 multi-billion dollar companies shared a single private server for their emails: mx.phoenixtrading.ltd By pulling this digital thread, the journalists of the FT they managed to identify 442 web domains who shared administrative functions of back office on that same server. The next step was pure data mining: they compared the names of those domains with the customs records of Russia and India. Thus, they discovered that the domain foxton-fzco.com It corresponded to Foxton FZCO (based in Dubai), buyer of $5.6 billion in oil; and? advanalliance.ltd It was Advan Alliance, which sold 1.5 billion to India. The desire to create and destroy companies quickly to mislead sanctioners—according to The Moscow Timesthe average lifespan of these signatures is only six months—led the network to centralize your IT infrastructure to reduce costs. A saving that has cost them their anonymity. The show must go on In the short term, the strategy of those involved is denial and adaptation. How to collect Finance Timesboth Tahir Garayev and Etibar Eyyub have categorically denied their involvement in sanctions evasion, calling the accusations “baseless” (curiously, Eyyub sent his denial from an email address hosted on the compromised server). The original company that founded the network, Coral Energy (now 2Rivers), has also disengaged from operations. However, behind the scenes, the machinery is already looking for new avenues. A senior Russian energy executive, speaking on condition of anonymity, summed up the situation in the investigation starkly: “It creates additional costs and inconveniences. But at the end of the day, the show must go on.” The United Kingdom has already reacted to the investigation of the British media, sanctioning nearly 300 entities linked to this “dark web”, blocking Russian ships and banks. The fall of this immense $90 billion network shows that, in the 21st century, bank secrecy and flags of convenience are useless if the system administrator decides … Read more

What is this network traffic analyzer and how to use it to detect Internet problems or security flaws

Let’s explain to you what it is and how to take advantage wireshark from the point of view of an ordinary user. I say this because it is a very advanced tool that analyzes all the traffic on your network, and that of all the devices connected to it. When you run this appyou’ll see a series of lines of data that you may not understand. But by knowing a little about what information is going to appear, you can also find ways to diagnose failures in your connection or whether an application or device is spying on you by sending data when you are not using it, or to unknown servers. What is Wireshark Wireshark is a network protocol analyzerwhat in English is called packet sniffer. What it does is capture, isolate and transmit each of the packets that are sent and received through our Internet connection, whether we are connected via WiFi or Ethernet, and it does all this in real time. This is a free and open source programwhich means that any developer can look at how it works inside. This makes it reliable and safe, because if it did things that were not appropriate, users would have already reported it. It has versions for Windows, macOS and Ubuntubeing able to download them at wireshark.org. When it comes to giving you information about the traffic that passes through your network, shows you very important datasuch as the IP and Mac addresses of the person sending or receiving the data, the sending protocol, the content (showing text or images if they are not encrypted), and connection healthwith the exact time it takes to load each piece of information. The operation of this tool is based on three fundamental pillars. First the capture one, because it puts your network card in a mode where it can see all the traffic that reaches it. This includes both information that your operating system displays and information that it does not display. It also has a color code to help you distinguish the packages. As a general rule, green is usually standard TCP traffic, blue is DNS or UDP, and black and red usually indicate problems. That’s why, you can identify that you are having errors or problems quite visually, just by seeing that there are many red or black lines. The app also has a top bar where you can type commands to filter information. This is already quite advanced if you don’t know how networks work, but you can, for example, use “ip.addr == IP Address” changing the address to that of a specific device to see its movements, or type “http” to see only web traffic. In short, it is a fairly complex and advanced tool, so it is not for all users. It is more aimed at system administrators, to detect attacks or bottlenecks. However, If you know where to look you can also take advantage of it as a home user. How you can take advantage of it Although it is an advanced tool, it can be useful for normal users in some contexts as well. We are going to give you some ideas so that you know the type of information you can obtain: If your online games cause problems: A speed test may tell you that your Ping is good, but the experience is different when playing. Therefore, this application can tell you if packets are being lost along the way that are making everything slower. If you are concerned about privacy: You will be able to see what data your devices send to the cloud and the Internet, and if it is not encrypted you will see your content. This can help you be more aware of your privacy, and detect if a device is sending more data than it should. You will also be able to see if a device connects to servers of dubious origin. If you have technical problems: If a website does not load or a printer disappears from the network, this application can show you at what point communication is being cut off. If you want to do lag tests: If in this tool you filter by the appropriate protocol, such as UDP for games, you will be able to find if there are black lines that indicate that the information you send is “out of order” because it never arrived at the destination or did so late. With this you can see that if you have lag it is not a matter of your bandwidth, but perhaps of your network signal or a saturated node of your operator. If you want to know what the devices on your network are doing: As we have more and more connected devices at home, with this you can audit what each one does. You can even isolate the IP of a cell phone or a security camera to know if it is connecting, what data it is sending, or if, for example, it sends data to other servers from time to time. In any case, what you should know is that this tool is going to show you all the traffic that your home network has. It shows all the raw traffic, and doesn’t hide anything, meaning you can have a lot of fun looking at everything that’s happening on your network and learning how to take advantage of it to understand everything. In Xataka Basics | Internet does not work at home: five alternatives to connect without using your router

Log In

Forgot password?

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.