Bellingcat Profile picture
Apr 15, 2020 9 tweets 9 min read Read on X
Were the Chief of the Armed forces of #Syria and Suheil al-Hassan, commander of the “Tiger Forces," present in a command post overlooking a city shortly before it was hit by a chlorine attack?

@N_Waters89 investigates.

bellingcat.com/news/2020/04/1…
@N_Waters89 Last week, the OPCW’s IIT stated that there are reasonable grounds to believe that a hospital in the Syrian town of al Lataminah was attacked with chlorine on March 25, 2017

We wrote about it.

bellingcat.com/news/mena/2017…
@N_Waters89 Thanks to a SANA News video, we know that on the same date, a delegation of generals, including Suheil al Hassan, was present in a command post overlooking al Lataminah.

Thankfully, @syrian_archive grabbed a copy before it was deleted from YouTube
@N_Waters89 @syrian_archive Here's a neat trick otherwise known as #chronolocation

By examining shadows seen in the video we can establish what time certain sections were filmed.

This initial parade took place at around 1300 local time (this is a rough estimate) ImageImage
@N_Waters89 @syrian_archive As @N_Waters89 notes,

At one point an ISTAR feed is seen, showing another village in Hama.

If this feed was live, it indicates the time was 1415. We can be more confident about this time than the parade section, as the buildings provide us with shadow reference points ImageImage
@N_Waters89 @syrian_archive You know what else that video contains? Watches!

One seems to show the time at 1315

We used one of
@topazlabs sharpening tools on Gen. Ayoub’s watch

The result looks consistent with our initial assessment.

NOTE: this is the interpretation of the tool, using a similar watch ImageImage
@N_Waters89 @syrian_archive @topazlabs Take into account the flight time of the helicopter from Hama air base, the time to conduct preflight checks & load chlorine munitions...

...And it appears very likely that these generals were present in the command post as the chlorine attack on al Lataminah was being prepared. Image
@N_Waters89 @syrian_archive @topazlabs You know what's extra interesting about this?

The presence of Suheil al Hassan.

The unit he commands, the Tiger Forces, have previously been linked to the use of helicopter-borne chlorine munitions by @GPPi

gppi.net/2019/02/17/the…
@N_Waters89 @syrian_archive @topazlabs @GPPi Please read the article for more information!

We would like to thank @tobiaschneider for drawing our attention to this event

And @Timmi_Allen for aiding with image analysis

bellingcat.com/news/2020/04/1…

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Bellingcat

Bellingcat Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @bellingcat

Jan 4
The US military conducted an operation on Jan 3 to capture President Nicolás Maduro of Venezuela. Bellingcat geolocated videos of helicopters involved in the raid, piecing together potential movements of the assault force Bellingcat annotated map of geolocated social media videos showing the potential helicopter flight path
The operation included air strikes targeting military sites, and a raid at Maduro’s residence inside Fort Tiuna in Caracas. In addition to armed helicopters, jets and drones provided cover for the assault force, according to the US military.
One video shows what appears to be 9 helicopters, including 7 Blackhawks and 2 Chinooks, flying in formation in the Fort Tiuna area as explosions occur. tiktok.com/@ceciarmy/vide…
Read 11 tweets
Dec 22, 2025
Bellingcat’s work in 2025 verified war crimes, exposed deepfake abuse, and challenged disinformation. We want to uncover wrongdoing. We can with your support:

This is how we cut through the digital noise to tell stories that matter. bellingcat.com/donateImage
We've reported on conflicts around the world — from Myanmar to Gaza, Sudan to the DR Congo, Ukraine and beyond — verifying footage of war crimes, human-rights abuses and attacks on civilians. Read our latest on the reconstruction of Mariupol: bellingcat.com/news/europe/20…
In May we identified the person behind MrDeepfakes — one of the largest providers of non-consensual deepfake pornography. The platform was shut down after the investigation, and politicians from two European countries called for the extradition of its owner. bellingcat.com/news/2025/05/0…
Read 5 tweets
Dec 12, 2025
An investigation by Bellingcat and @LloydsList found that Saudi Arabia joined the countries importing grain directly from a sanctioned port in occupied Crimea. Meanwhile Russia attempts to secure recognition of the Ukrainian territory via a US-led peace plan. bellingcat.com/news/2025/12/1…
Using Satellite imagery and Automated Identification System (AIS) data from Lloyd’s List Intelligence we show that a Russian owned bulk carrier sailed from Sevastopol to Saudi Arabia twice in recent months.
On both journeys, the ship turned off its AIS location data, hiding its presence in the port of Sevastopol. But satellite imagery confirms the ship was present at the port’s grain terminal. Satellite imagery: @vantortech @vantortech
Read 10 tweets
Nov 11, 2025
Russian state media are today alleging that a Bellingcat reporter was involved in an attempt to hijack a Russian fighter plane.

We would like to make clear that Bellingcat had absolutely no involvement in the alleged activities and the accusations towards us are entirely false.
The individual detailed in Russian media as a Bellingcat reporter has never worked for us in any capacity and we do not know who they are. Image
The picture and name in the press pass published in RU media does not depict any of our staff members or contributors. If they exist, we are unaware of them ever engaging with us.

The press pass is also not remotely like any Bellingcat ID or documentation.
Read 5 tweets
Sep 10, 2025
The largest aid flotilla in history has been attacked twice in two days whilst in port in Tunisia. Open source analysis suggests an incendiary munition is to blame, contradicting official statements. bellingcat.com/news/2025/09/1…
On September 8 the main vessel in the flotilla, known as ‘the Family’ was struck by what witnesses claimed was a drone. Caught on another boat's camera, a flaming object had fallen onto the Family Boat from above.
Tunisian officials stated that there was “no evidence of any hostile act or external targeting”, claiming the resulting fire was due to “a lighter or cigarette butt”. Image
Read 12 tweets
Jul 23, 2025
A new report by Bellingcat’s Justice & Accountability (J&A) Unit and @GLAN_LAW detailing the use of cluster munitions in civilian areas in Kharkiv at the beginning of the full-scale Russian invasion of Ukraine is published today. j-and-a.glanlaw.org/kharkiv
The report is based on 32 in-depth investigations of separate incidents that took place between February and April 2022. It offers one of the most detailed looks yet at the use of cluster munitions against civilian areas in the early stages of Russia’s full scale invasion.
Bellingcat’s J&A Unit worked on this report as a self-contained entity separated (‘firewalled’) from the rest of Bellingcat, ensuring that accountability work was conducted independently from other investigations, preventing possible bias.
Read 8 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(