InformNapalm

Last updated
InformNapalm
InformNapalm logo.png
Owner NGO
Created byRoman Burko, Irakli Komaxidze [1]
URL InformNapalm.org
CommercialNo
LaunchedMarch 29, 2014;9 years ago (2014-03-29) [2]
Current statusOnline
Content license
Creative Commons Attribution License (CC BY 4.0) [1]
InformNapalm in Wikimedia Commons

InformNapalm is a volunteer [3] [4] [5] [6] initiative to inform Ukrainian citizens and the foreign public about the Russo-Ukrainian War and the activities of the Russian special services as well as the militants of DPR, LPR, and Novorossiya. The team members are engaged in a wide range of other volunteer activities. Authors publish materials in 30 languages, including Japanese and Chinese.

Contents

History

The Informnapalm.org website was created on 29 March 2014 after the Russian military intervention in Ukraine and annexation of Crimea. During the existence of the project, volunteers conducted two profound investigations of the shoot-down of Malaysia Airlines Flight 17 and gathered evidence of the presence of Russian troops in Ukrainian territory. [7]

TOP-10 Military Gadgets Involved in the Russian Aggression Against Ukraine. InformNapalm Infographics Top-10 military gadgets involved in the russian aggression against Ukraine.jpg
TOP-10 Military Gadgets Involved in the Russian Aggression Against Ukraine. InformNapalm Infographics

The main activities of the project are collecting and analysing OSINT-information, found in open sources, including social networks. InformNapalm's investigation of 53rd Artillery Brigade commander colonel Sergei Muchkayev, suspected of killing the MH17 passengers, was used in the report of the Bellingcat research team. [8]

After the Russian intervention in Syria, InformNapalm began publishing personal data of Russian pilots who bombarded Syrian cities, and together with the media project "Visuals" created infographics containing personal data of crew members. [9] [10] These publications have caused negative reactions in Russia, in particular, the Russian President's press secretary, Dmitry Peskov, has said that in response to the actions of the project "Russian special services will take all necessary measures". [11] In response, the authors of the site said that "every violation the ceasefire in the Donbas by the joint Russian-separatist forces will cause the publication of another OSINT-investigation with names, photos, tactical and registration numbers and other details and facts related to Russian pilots crimes during a military operation in Syria". [12] [13] TV channel Al Arabiya compared this InformNapalm project activity with WikiLeaks publications. [14]

By the end of 2016, the community had 407 investigative publications, 1197 translations and over 3920 reposts in the media. [15]

In March 2017, Ukraine Crisis Media Center hosted a presentation of the book "Donbas on Fire". [16] The book includes evidence of Russian aggression found and systematized by InformNapalm volunteers. [17]

In April 2018, InformNapalm published an interactive database of Russian aggression. [18] The Russian Aggression database is the result of four years of volunteer work. More than 1700 InformNapalm OSINT investigations are systematized and divided into two groups: Russian weapons found in Donbas; Russian army units that participated in the aggression against Ukraine, Georgia, and Syria. [19] The database is searchable by military unit number and unit name. Images of chevrons of military units or military equipment are clickable and lead to a list of investigations. [20] [21]

Surkov leaks

On 23 October 2016, Ukrainian hacker group CyberHunta published correspondence that it alleged was from the office email account of Vladislav Surkov, a political adviser to Vladimir Putin. [22] Volunteers from InformNapalm requested additional evidence from an alliance of hacker groups that includes CyberHunta, RUH8  [ uk ], FalconsFlame, and TRINITY. They secured the release of a 1 GB Microsoft Outlook data file. InformNapalm reported that the hackers also were in possession of documents from 2015 and 2016 that were being analysed by intelligence agencies and were not released due to their operational value. [23]

The document leak included 2,337 emails from Surkov's inbox. [24] The emails illustrate Russian plans to politically destabilize Ukraine and the coordination of affairs with major opposition leaders in separatist Eastern Ukraine. [25] The release included a document sent to Surkov by Denis Pushilin, former Chairman of the People's Council of the Donetsk People's Republic, listing casualties that occurred during 2014. [24] It also included a 22-page outline of "a plan to support nationalist and separatist politicians and to encourage early parliamentary elections in Ukraine, all with the aim of undermining the government in Kyiv." [26]

Private files of Russian militants

Thanks to the cooperation with hackers, InformNapalm volunteers were able to access private files of individual Russian militants. In March 2016, a group of cyber activists FalconsFlame handed over to InformNapalm volunteers data extracted from the phone of Nikolai Reichenau, an employee of the Russian Federal Penitentiary Service: photos of the Russian occupier in the settlements of Luhansk, Izvarine, Sorokine (formerly Krasnodon), Donetsk, Ilovaisk, Bakhmut (formerly Artemivsk), Debaltseve, and Vuhlehirsk. The phone also contained videos and photos from Donetsk airport taken in January 2015. [27] After the article was published, the official YouTube channel of the InformNapalm community received a letter from YouTube management demanding that the video be removed [28] within 48 hours due to a complaint about privacy violations. After a series of consultations, InformNapalm volunteers prepared an open letter to the YouTube editorial board. [29]

See also

Related Research Articles

<span class="mw-page-title-main">Vladislav Surkov</span> Russian politician

Vladislav Yuryevich Surkov is a Russian politician and businessman. He was First Deputy Chief of the Russian Presidential Administration from 1999 to 2011, during which time he was often viewed as the main ideologist of the Kremlin who proposed and implemented the concept of sovereign democracy in Russia. From December 2011 until May 2013, Surkov served as the Russian Federation's Deputy Prime Minister. After his resignation, Surkov returned to the Presidential Executive Office and became a personal adviser of Vladimir Putin on relationships with Abkhazia, South Ossetia and Ukraine. He was removed from this duty by presidential order in February 2020.

<span class="mw-page-title-main">Russo-Ukrainian War</span> Armed conflict between Russia and Ukraine since 2014


The Russo-Ukrainian War is an ongoing international conflict between Russia and Ukraine, which began in February 2014. Following Ukraine's Revolution of Dignity, Russia annexed Crimea from Ukraine and supported pro-Russian separatists fighting the Ukrainian military in the Donbas war. The first eight years of conflict also included naval incidents, cyberwarfare, and heightened political tensions. In February 2022, Russia launched a full-scale invasion of Ukraine and began occupying more of the country.

<span class="mw-page-title-main">Battle of Ilovaisk</span> 2014 battle in the Donbas war

The Battle of Ilovaisk started on 7 August 2014, when the Armed Forces of Ukraine and pro-Ukrainian paramilitaries began a series of attempts to capture the city of Ilovaisk from pro-Russian insurgents affiliated with the Donetsk People's Republic (DPR) and detachments of the Russian Armed Forces. Although Ukrainian forces were able to enter the city on 18 August, they were encircled between 24 and 26 August by overwhelming Russian military forces that crossed the border, joining the battle. After days of encirclement, Ukrainian forces rejected the DPR's proposal to open a humanitarian corridor on the condition that they abandon their armored vehicles and ammunition, and on the morning of 29 August 2014 began to leave Ilovaisk with their weapons. The Russian side opened fire on the evacuating Ukrainian soldiers, many of whom died whilst trying to escape.

<span class="mw-page-title-main">Joint Forces Operation (Ukraine)</span> Official name for territory where the war in Donbass takes place

Anti-Terrorist Operation Zone, or ATO zone, was a term used by the media, publicity, the government of Ukraine, and the OSCE and other foreign institutions to identify Ukrainian territory of the Donetsk and Luhansk regions (oblasts) under the control of Russian military forces and pro-Russian separatists. A significant part of ATO zone is considered temporarily occupied territory of Ukraine.

<span class="mw-page-title-main">10th Mountain Assault Brigade</span> Military unit

The 10th Mountain Assault Brigade "Edelweiss" is a specialized unit of the Ukrainian Ground Forces, specifically trained for mountain warfare operations. Based in Kolomyia and part of Operational Command West, the brigade has a history of defending their country in various conflicts, including the war in Donbas in 2016 and the Russian invasion of Ukraine in 2022. During these conflicts, the brigade, defended Marinka, Popasna, Mariupol and Bakhmut.

<span class="mw-page-title-main">Myrotvorets</span> Ukrainian website

Myrotvorets or Mirotvorets is a Ukrainian Kyiv-based website that publishes a running list, and sometimes personal information, of people who are considered by authors of the website to be "enemies of Ukraine", or, as the website itself states, "whose actions have signs of crimes against the national security of Ukraine, peace, human security, and the international law". The website was launched in December 2014 by Ukrainian politician and activist Georgy Tuka. The publishing of personal information on the site has been criticized by human rights organizations.

<span class="mw-page-title-main">Democratic National Committee cyber attacks</span> 2015-16 data breaches by Russian hackers as part of US election interference

The Democratic National Committee cyber attacks took place in 2015 and 2016, in which two groups of Russian computer hackers infiltrated the Democratic National Committee (DNC) computer network, leading to a data breach. Cybersecurity experts, as well as the U.S. government, determined that the cyberespionage was the work of Russian intelligence agencies.

<span class="mw-page-title-main">DCLeaks</span> Hacker group

DCLeaks was a website that was established in June 2016. It was responsible for publishing leaks of emails belonging to multiple prominent figures in the United States government and military. Cybersecurity research firms determined the site is a front for the Russian cyber-espionage group Fancy Bear. On July 13, 2018, an indictment was made against 12 Russian GRU military officers; it alleged that DCLeaks is part of a Russian military operation to interfere in the 2016 U.S. presidential election.

<span class="mw-page-title-main">Surkov leaks</span> Document leak of Vladislav Surkovs emails

In October 2016, Ukrainian hacker group CyberHunta leaked over a gigabyte of emails and other documents alleged to belong to Russian political operative and senior Kremlin official Vladislav Surkov. Known as Russia's "grey cardinal", Surkov served as a political adviser to President Vladimir Putin in the conflict in eastern Ukraine and is the architect of Russia's ideology of sovereign democracy.

<span class="mw-page-title-main">61st Naval Infantry Brigade (Russia)</span> Military unit

The 61st Marine Brigade is a formation of the Russian Naval Infantry. It is part of the Northern Fleet Naval Infantry and Coastal Defence Force. The brigade is based in the Sputnik military settlement, located in Murmansk Oblast. Some sources consider it one of the best trained and most combat experienced units of the Russian military.

<span class="mw-page-title-main">Timeline of Russian interference in the 2016 United States elections</span>

This is a timeline of events related to Russian interference in the 2016 United States elections.

<span class="mw-page-title-main">Topical timeline of Russian interference in the 2016 United States elections</span>

This is a timeline of events related to Russian interference in the 2016 United States elections, sorted by topics. It also includes events described in investigations into the many suspicious links between Trump associates and Russian officials and spies. Those investigations continued in 2017, the first and second halves of 2018, and 2019, largely as parts of the Crossfire Hurricane FBI investigation, the Special Counsel investigation, multiple ongoing criminal investigations by several State Attorneys General, and the investigation resulting in the Inspector General report on FBI and DOJ actions in the 2016 election.

<span class="mw-page-title-main">Timeline of Russian interference in the 2016 United States elections (July 2016 – election day)</span> Major events prior to Trumps inauguration

This is a timeline of events related to Russian interference in the 2016 United States elections.

<span class="mw-page-title-main">Russo-Ukrainian cyberwarfare</span> Informatic component of the confrontation between Russia and Ukraine

Cyberwarfare is a component of the confrontation between Russia and Ukraine since the Revolution of Dignity in 2013-2014. While the first attacks on information systems of private enterprises and state institutions of Ukraine were recorded during mass protests in 2013, Russian cyberweapon Uroburos had been around since 2005. Russian cyberwarfare continued with the 2015 Ukraine power grid hack at Christmas 2015 and again in 2016, paralysis of the State Treasury of Ukraine in December 2016, a Mass hacker supply-chain attack in June 2017 and attacks on Ukrainian government websites in January 2022.

<span class="mw-page-title-main">Ukrainian Cyber Alliance</span>

The Ukrainian Cyber Alliance is a community of Ukrainian cyber activists from various cities in Ukraine and around the world. The alliance emerged in the spring of 2016 from the merger of two cyber activists, FalconsFlame and Trinity, and was later joined by the group RUH8 and individual cyber activists from the CyberHunta group. The hacktivists united to counter Russian aggression in Ukraine.

The Conflict Intelligence Team (CIT) is an independent investigative organisation originating from Russia that conducts open-source investigation of events taking place during armed conflicts, in particular, the actions of Russian troops in Ukraine, Syria, Libya and Central African Republic. Together with Bellingcat and InformNapalm, it is one of the largest such groups that emerged during the Russo-Ukrainian War.

Anonymous, a decentralized international activist and hacktivist collective, has conducted numerous cyber-operations against Russia since February 2022 when the 2022 Russian invasion of Ukraine began.

KibOrg is a project of journalists and IT professionals who have united under the name of legendary cyborgs to fight the aggressor in the information space. The project was founded in early 2022. The only public member to date is journalist Maksym Dudchenko.

References

  1. 1 2 "International Volunteer Community InformNapalm". informnapalm.rocks. Retrieved 2023-05-29.
  2. https://www.name.com/whois-lookup/informnapalm.org
  3. network, Dmitry Volchek and Claire Bigg for RFE/RL, part of the New East (2015-06-03). "Ukrainian bloggers use social media to track Russian soldiers fighting in east". the Guardian. Retrieved 2021-04-02.{{cite web}}: CS1 maint: multiple names: authors list (link)
  4. "Ukraine conflict: Hackers take sides in virtual war". BBC News. 2014-12-20. Retrieved 2021-04-02.
  5. Volchek, Dmitry (2 July 2015). "Digital Investigators Try To Disperse Fog Of War In Ukraine". Radio Free Europe/Radio Liberty . Retrieved 2021-04-02.
  6. "InformNapalm: установлены еще три российские военные части, которые участвовали в захвате Крыма". Крым.Реалии (in Russian). 21 September 2020. Retrieved 2021-04-02.
  7. Марія Прокопенко (September 11, 2015). "Ввічлива зброя". День.
  8. "MH17 - Potential Suspects and Witnesses from the 53rd Anti-Aircraft Missile Brigade" (PDF).
  9. "Сирія. Інфографіка: офіцери ВКС РФ – військові злочинці Кремля". InformNapalm. October 27, 2015.
  10. "Aktivisten stellen Putins Piloten an den Pranger". Bild. November 6, 2015.
  11. Julian Röpcke (November 6, 2015). "Aktivisten stellen Putins Piloten an den Pranger" [Activists put Putin pilots to pillory] (in German). Bild . Retrieved November 8, 2015.
  12. InformNapalm відповів Пєскову: «Наші публікації — шокова терапія»
  13. Олександра Горчинська (October 21, 2015). "Кремль відкрив ящик Пандори. "Партизани" з InformNapalm розповіли, чим шантажують російських генералів і як зупинити Путіна". Новое Время . Retrieved October 25, 2015.
  14. تسريب صور وأسماء وبيانات الطيارين الروس في سوريا موقع روسي يشبه «ويكيليكس» نشر أيضا عناوينهم وأرقام هواتفهم وتعهد بتسريب المزيد(In Arabic)
  15. "Соцмедиа в информационном противостоянии. Итоги 2016 года - InformNapalm Blog". InformNapalm Blog (in Ukrainian). 2016-12-12. Archived from the original on 2016-12-21. Retrieved 2016-12-12.
  16. ""Донбас в огні" – це путівник для журналістів та експертів, які хочуть розібратися, що відбувається на Донбасі – автори видання" (in Ukrainian). 2017-03-17. Archived from the original on 15 October 2017. Retrieved 2017-10-15.
  17. "Наш путівник допоможе геть необізнаним зорієнтуватися на Донбасі, — автори" (in Ukrainian). 2017-03-17. Archived from the original on 17 April 2017. Retrieved 2017-10-15.
  18. "RUSSIAN AGGRESSION: ВОЛОНТЕРИ ОПУБЛІКУВАЛИ МАСШТАБНУ ІНТЕРАКТИВНУ БАЗУ ДАНИХ РОСІЙСЬКОЇ АГРЕСІЇ" (in Ukrainian). 2018-04-12. Archived from the original on 15 April 2018. Retrieved 2018-04-15.
  19. "Волонтери опублікували масштабну базу даних про російську агресію на Донбасі" (in Ukrainian). 2018-04-12. Archived from the original on 17 June 2018. Retrieved 2018-04-15.
  20. "russian-aggression" (in Ukrainian). 2018-04-12. Archived from the original on 12 April 2018. Retrieved 2018-04-15.
  21. "Ukrainian OSINT sleuths release largest existing database of evidence of Russian aggression in Ukraine - Euromaidan Press". Euromaidan Press. 2018-04-25. Archived from the original on 25 April 2018. Retrieved 2018-04-25.
  22. "КИБЕРХУНТА ПЕРЕДАЕТ ПРИВЕТ СУРКОВУ" (in Russian). Cyberhunta.com. 23 October 2016. Archived from the original on 8 March 2017. Retrieved 31 October 2016.
  23. Bjorn, Falcon (25 October 2016). "SurkovLeaks: 1GB mail cache retrieved by Ukrainian hacktivists (English)". InformNapalm.
  24. 1 2 Digital Forensic Research Lab (25 October 2016). "Breaking Down the Surkov Leaks – DFRLab". Medium. Atlantic Council.
  25. Murdock, Jason (27 October 2016). "Surkov leaks: Thousands of hacked emails reportedly from high-ranking Kremlin official published". International Business Times UK.
  26. Standish, Reid (25 October 2016). "Hacked: Putin Aide's Emails Detail Alleged Plot to Destabilize Ukraine". Foreign Policy.
  27. Руда, Оксана (3 March 2016). "Хакери заламали телефон спецназівця РФ і оприлюднили докази його участі у війні на Донбасі". Zaxid.net. Archived from the original on 18 February 2022. Retrieved 21 March 2022.
  28. "Хакеры #FF спалили спецназовца ФСИН России (18+)". YouTube. Inform Napalm. 2 March 2016. Archived from the original on 11 April 2022. Retrieved 6 November 2021.
  29. "Відкритий лист до YouTube: терорист із ФСВП РФ подав скаргу на "конфіденційність"". ІнформНапалм. 4 March 2016. Archived from the original on 24 January 2021. Retrieved 31 March 2022.