Mark Krutov Profile picture
Sep 11, 2023 15 tweets 6 min read Read on X
🧵/ link in the last tweet. During the two raids on the gas rig(s) in the Black Sea, Ukrainian SOF may have captured one of the components of the Russian R-330M1P 'Diabazol' automated jamming complex. Image
This is the screengrab from the @DI_Ukraine video of the raid, which was made public today. The consignee of the box is Unit 60135, which is the 475th Separate Electronic Warfare Center in Sevastopol. Image
But what's even more interesting here is the consignor. It's 'Protek' JSC, which manufactures just one but vital thing for the Russian army: the components of the 'Diabazol' automated jamming complex.
Image
Image
This includes the R-330Zh Zhitel electronic warfare jamming communication station, R-934UM and 'Altayets-AM' stations. Image
Most of the time, we see them truck-mounted, but I'm pretty sure they can also be mounted on platforms like this. Image
According to @oryxspioenkop, Russia lost at least 13 R-330Zh and one R-934UM systems in this war, all of which were destroyed. Whatever component is in the box, it should be brand new. Image
Now 'Neva' radars. Here's my previous thread from 2022 about the Neva-BS Land Surface Surveillance Radars, which Russia installed on the rigs to enhance control over this part of the Black Sea, as we found out together with @pustota.
Based on what I've seen today in the HUR photos (), I can confirm that the raid was conducted at the 'Crimea-2' rig (formerly known as 'Petr Godovanets' before the annexation of Crimea). t.me/DIUkraine/2836
Image
One photo published by HUR shows a boat with the name of another platform, 'Crimea-1' (formerly known as 'Independence'). I cannot confirm whether the photo was taken at the 'Crimea-1' platform, though. Image
It's visible in the video that 'Crimea-2' had two radars on top of the tower: Neva-BS and [most probably] Neva-B. Both were removed and taken by the HUR team. mcs.ru/wp-content/upl…
Image
I'm not sure if HUR actually 'regained control' over the four rigs, or even one of them, as doing so would require them to keep people there, making them extremely vulnerable.
At the same time, the new HUR video provides evidence that the Russian MoD's claims about destroying Ukrainian boats near the rigs on August 22 and August 30 were likely false (though to be honest, we already suspected this). Image
Read the full story here (Google Translate for your language please): svoboda.org/a/reid-za-trof…
And yes, this wellhead platform is still on fire...
Image
What's actually interesting, the photo of the wellhead with a burning gas torch hints that the HUR team probably paid a visit to yet another rig, Tavrida (image by @planet taken on the 1st of Aug.)
Image

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Mark Krutov

Mark Krutov Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @kromark

Jan 10
🧵Timur Praliev, arresred in the U.S. for illegally crossing the border from Mexico, received an official 'combat veteran ID' as a 'former Wagner fighter' less than a month ago, as we found together with @Mike_Eckel and @CarlSchreck. Image
A photo of Praliev receiving his veteran ID was posted on VK on Dec. 12th. The event took place in Bashkortostan: . We found Praliev's empty VK acc., which lists the same YOB as in the U.S. court docs (1993), and one of his friends confirmed that it is him.archive.is/jYw10
What puzzles me most about this story is the timing. On December 12th, Praliev receives his official Russian veteran ID as a 'former Wagner fighter.' By January 10th, Praliev is arrested with a drone in his backpack after crossing into the United States from Mexico. Insanely fast
Read 5 tweets
Dec 14, 2024
1/2 Comparison of Dec. 5 and Dec. 10 HR @Planet satellite images of the Russian airbase in Al-Jufra, Libya, shows an Il-76 loading/unloading, as well as newly appeared objects which I hesitate to ID (maybe radars?)
2/2 Exactly one year ago, in December 2023, the Al-Jufra base was attacked, resulting in damage to a Russian Il-76 plane.
Re: Al-Jufra Dec. 10th @planet image showing Il-76 unloading (see the thread 🔼) Image
Read 4 tweets
Dec 12, 2024
🧵/ Link in the last post. Remember the recent WaPo piece about Russia expanding its secret biological lab complex near Moscow? With @pustota, we proved that a Russian defense minister personally inspected it. We also found renders, images of the construction and inside the lab. Image
Image
The new biolabs are part of the 48th Central Scientific Research Institute of the Russian Ministry of Defense. First, we found this image of the new facility on the website of the construction company responsible for the finishing works. archive.is/3t3ppImage
Using this photo, we identified the company that produced and installed the windows in the new labs (). They had published renders of the entire project, which align with Google Earth satellite imagery. archive.is/q5ggv
Read 18 tweets
Dec 2, 2024
🧵/ link in the last post. Together with @Mike_Eckel and help from @C4ADS, we found that a Chinese company, which recently acquired a US plant in California and whose shares trade on the Swiss stock exchange, has shipped electronics to sanctioned Russian firms linked to military. Image
Not only were electronics produced by this company found in Russian guided aerial bombs in Ukraine, but some shipments were also made to the infamous FSB unit 34435, an employer of the 'poisoning squad' responsible for the 2020 poisoning of Russian dissident Alexey Navalny. Image
Image
This is not the first instance of this FSB military unit receiving shipments that bypass sanctions; the previous case was even more alarming.
Read 7 tweets
Nov 26, 2024
1/2 Not only did the Russian MoD acknowledge for the first time that ATACMS hit their targets, but also published photos of the rockets, one taken near the 'Pantsir' installed at Khalino air base in July and visible in a @planet satellite image from Nov. 2nd. Image
2/2 More photos of the ATACMS missile parts from the Russian MoD, taken in Khalino (t.me/mod_russia/462…) and Lotarevka (t.me/mod_russia/462…), where the S-400 missile system was hit. Image
Image
Image
Image
Bonus post: Just noticed that Yandex now started to blur out some Russian military facilities as well (Khalino air base in this case). Image
Read 6 tweets
Nov 21, 2024
1/2 Just a small bit of OSINT on Russia's new 'Oreshnik' MRBM, allegedly used to strike Dnipro (per Putin): I found the exactly the same part on the Russian govt procurement site. Docs from 2013 show it's also used for the S-30 'Bulava' SLBM. tenderguru.ru/tender/10388996Image
2/2 The 'ИРЦУ' marking is used by the Central Research Institute of Automation and Hydraulics (TsNIIAG) and can also be found in the procurement records of the Votkinsk Plant, which assembles the 'Topol-M,' 'Yars,' and other Russian strategic missiles. star-pro.ru/proverka-kontr…Image
Bonus post: Of course, this specific part for both old and "new" Russian strategic missiles (I doubt "Oreshnik" is truly "new") was made on a Swiss high-precision drilling and milling machine, the Fehlmann Picomax 54. docs.google.com/document/d/17z…Image
Read 5 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(