Bellingcat Profile picture
Apr 28 13 tweets 10 min read Twitter logo Read on Twitter
NEW: @AricToler reveals three documents found in the #discordleaks that detail US intelligence gathering on Ukrainian Armed Forces operations. bellingcat.com/news/2023/04/2…
@AricToler All three documents show damage assessments of recent strikes by the Ukrainian Armed Forces on Russian targets.
@AricToler It's not possible from the documents to identify if the US provided intelligence for these attacks or whether they are only analysing their aftermath.
@AricToler In one of the documents the coordinates attached to the assessment appear to be incorrect. The coordinates lead to a petrol station, 15km away from the identified target of the attack.
@AricToler Bellingcat managed to geolocate the building shown in the satellite images, revealing a car transportation firm that appears to have been taken over by Russian forces.
@AricToler Twitter users @5urpher and @neonhandrail 's early independent work in geolocating this area helped to confirm the new Bellingcat coordinates and that Russian forces were present in the compound.
@AricToler @5urpher @neonhandrail In another leaked document, targeted strikes on a bridge near the occupied city of Kreminna are detailed, noting severe damage to an important Russian transport link to the city and the surrounding areas in which intense fighting is ongoing.
@AricToler @5urpher @neonhandrail Bakhmut, a city surrounded on three sides by Russian forces is the subject of the third document. A mineshaft is identified in the image, which appears to have been a target of multiple attacks from satellite imagery, referred to as an 'assembly area' for Russian troops.
@AricToler @5urpher @neonhandrail The assessment of this attack can be linked to the 176th Intelligence Squadron, a part of the Air National Guard.
@AricToler @5urpher @neonhandrail The #discordleaks were first made public by an Air National Guardsmen Jack Teixeira, who was sharing the US secret documents in a gaming discord server. He is currently facing trial storage.courtlistener.com/recap/gov.usco…
@AricToler @5urpher @neonhandrail You can read more about the #discordleaks and how @AricToler initially located the origins of the leaked documents here: bellingcat.com/news/2023/04/0…
@AricToler @5urpher @neonhandrail If you’re interested in this story and want to listen in detail about the open source research carried out, you can listen to our free episode of our Patreon podcast, Bellingchat here: patreon.com/posts/81739827…
@AricToler @5urpher @neonhandrail Bellingcat is a non-profit and the ability to carry out our work is dependent on the kind support of individual donors. If you would like to support our work, you can do so here bellingcat.com/donate/

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Bellingcat

Bellingcat Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @bellingcat

Apr 26
If you're new to open source research and want to learn more, you can find training on some popular #OSINT tools on our Youtube channel youtube.com/@bellingcatoff…
Want even more OSINT training? You can find further resources within the guides section of our website bellingcat.com/category/resou…
Patreon members have access to exclusive webinars and behind the scenes podcast episodes. You can join the community here: patreon.com/bellingcat
Read 4 tweets
Apr 13
NEW: Bellingcat's @AricToler worked with the @nytimes to uncover a trail of digital evidence that appears to identify Jack Teixeira, a 21-year-old Air National Guardsman, as the leader of an online gaming chat group where US intelligence documents leaked nytimes.com/2023/04/13/wor…
@AricToler @nytimes Teixeira oversaw a private online group named Thug Shaker Central where, as Bellingcat has previously reported, US intelligence documents were shared bellingcat.com/news/2023/04/0…
@AricToler @nytimes The group had only a small number of active users making up a tight-knit community
Read 11 tweets
Apr 4
Interpreting far-right symbols can be a lot more confusing and complicated than you think. @ColborneMichael from @BCatMonitoring lays out in our latest resource guide on how you should (and shouldn’t) make sense of far-right symbolism bellingcat.com/resources/2023…
@ColborneMichael @BcatMonitoring This is the kind of default image we often have of when we think of the far-right: a swastika tattooed on the back of a man’s shaved head.
But, in 2023, it’s no longer usually this straightforward. Nowadays, far right symbols are generally more subtle. bbc.com/news/world-us-…
@ColborneMichael @BcatMonitoring Symbols mean different things to different people in different contexts. Meanings aren’t static. That’s why, as scholars like @milleridriss observe, the far right loves to engage in “game-playing” with their symbols, lacing them with ambiguity, irony and humour to troll people
Read 14 tweets
Mar 29
A video appearing to show Ukrainian soldiers harassing a Russian-speaking woman was widely circulated by pro-Russian figures and even official government social media accounts.

But online investigators have exposed the video as staged: bellingcat.com/news/2023/03/2…
In the video, a soldier berates the woman for overtaking military vehicles, calls her a "pig" and fires into the air before driving away. The footage was shared by the Russian Embassy to the UK and the Russian Ministry of Foreign Affairs
The video was first shared on a pro-Russian Telegram channel, Two Majors, which claimed it was filmed in a frontline zone. The video was then picked up by prominent Russian media outlets
Read 11 tweets
Mar 28
Many questions remain as to how open source evidence can be used in court.

But a recent case at the European Court of Human Rights (ECHR) could offer some clues.

New from @EliotHiggins bellingcat.com/resources/2023…
@EliotHiggins The case of Ukraine and The Netherlands vs Russia (applications nos. 8019/16, 43800/14 and 28525/20) offered up an interesting case study in the use of open source evidence in court.

hudoc.echr.coe.int/eng?i=001-2228…
@EliotHiggins The ECHR is an international court of the Council of Europe that looks to interpret the European Convention on Human Rights.

Ukraine and the Netherlands went there in an attempt to prove human rights violations in areas of Ukraine occupied by Russia since 2014.
Read 19 tweets
Mar 21
In Dubai, celebrities from around the world pose with tiger cubs for clicks. Two prominent vloggers featuring these exotic animals in their videos have thanked a mysterious ‘royal friend’. @FoekePostma investigated and uncovered their identity. bellingcat.com/news/2023/03/2…
As we discovered in a 2021 investigation, several celebrities who had posed with monkeys, tigers and lions were acquainted with underground animal procurers. Animal welfare activists believe the practice helps perpetuate smuggling and poaching of endangered and exotic animals.
In this case, a house which the two celebrity vloggers used for their photoshoots with lion and tiger cubs belongs to a Sheikh from the Al Mualla family, which rules one of the UAE's emirates. The house could be geolocated thanks to the reflection of a nearby minaret in a window.
Read 11 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(