Border Security Compromised
An investigation into the Koidula border crossing point revealed that a security guard employed by private contractor Railservis OÜ was in fact an FSB agent. The individual transmitted sensitive operational information to Russian intelligence, including data on border staff and procedures. Estonian police and border authorities had entrusted Railservis OÜ with managing vehicle queues at this critical EU external frontier with Russia. The discovery exposes a significant breach in border security protocols.
Ignored Warnings and Systematic Bribery
Despite prior warnings from the Estonian internal security service, KAPO, the company hired individuals with dual Estonian-Russian citizenship. Three such employees systematically solicited bribes in exchange for granting priority passage across the border. One of their key clients used this illicit service to transport goods subject to European Union sanctions. Railservis OÜ continues to provide services at the crossing, despite these serious allegations of corruption and infiltration.
Ownership Ties to Russian Business Interests
The company’s ultimate beneficial owners are Estonian businessman Aleksei Chulets and his long-time Russian business partner, Sergei Pasters. Their business interests maintain close contacts with Russian and Belarusian oil and coal industries. Estonian media reports link these businessmen to Russia’s so-called “shadow fleet,” used to trade oil in circumvention of EU sanctions. A bunkering company owned by Chulets and Pasters, NT Bunkering, imported approximately 12,500 tonnes of prohibited fuel oil from Russia in 2024.
Systemic Risks to EU Frontier Integrity
The case highlights profound systemic risks when private entities with opaque ownership manage critical border infrastructure. The failure to heed counter-intelligence advice on personnel vetting demonstrates a severe security governance lapse. Individuals with dual citizenship in an EU state and Russia present an elevated risk profile, being potentially susceptible to pressure or recruitment by Russian services. This creates a vulnerable link in the border security chain that hostile actors can exploit.
Broader Implications for Hybrid Threat Landscape
The incident underscores how Russian intelligence activities in neighbouring states have intensified amid its war against Ukraine and confrontation with the EU. Gathering data on critical infrastructure, logistics, and personnel is a key objective. Such information can facilitate sabotage planning or the organisation of sophisticated sanctions evasion schemes. The intertwining of corruption, espionage, and commercial interests at a border checkpoint exemplifies the hybrid threat methodology employed against European security.