An image analysis by Bellingcat shows an infamous Russian neo-Nazi with ties to the controversial paramilitary Wagner Group may be depicted in a photograph showing a man holding a severed head in Syria...bellingcat.com/news/2024/01/2…
Alexey Milchakov oversaw the far-right Rusich Group, which has previously been implicated in war crimes in Syria and Ukraine, including torture and mutilation.
The 'co-leader' of the group Yan Petrovsky is currently in Finnish custody pending an extradition request by Ukraine for alleged war crimes committed in the Donetsk and Luhansk regions in 2014 and 2015.
On February 10, 2020, a Telegram channel connected to the Wagner mercenary group posted an image of a man in uniform holding a severed head. Behind him was another severed head and the backdrop of hilly, uncultivated terrain, smoke rising from the horizon.
James Gow, Professor of International Peace and Security and Codirector of the War Crimes Research Group at @KingsCollegeLon, told us the image potentially shows violations of multiple war crimes statutes.
The image was first posted on the Telegram channel of Maxim Fomin, a Russian military blogger also known as Vladlen Tatarsky. Fomin was assassinated in April 2023. In the 2020 post, Fomin wrote the Russian-language caption “a typical Syrian volunteer speaks to his Yorick”.
Bellingcat used camouflage patterns on his uniform to conclude that the man in the image was not a Syrian volunteer but appears to be Alexey Milchakov.
As Bellingcat has previously reported, Wagner’s social media channels have a track record of deliberately posting misleading information about their activities. bellingcat.com/news/uk-and-eu…
Rusich censors faces they publish on their social media, but commonalities in gear and camouflage allow researchers to track individuals. Using the patterns of the man’s uniform, as well as his other gear, he was identifiable in multiple images of Russian mercenaries.
Camouflage patterns are repetitive, but the patterns will vary in terms of where they are placed on the uniform. When applying this to the image of a man holding a severed head in Syria, we can see that Alexey Milchakov wears the exact same uniform as in the picture.
A combination of three separate pieces of camouflaged clothing with the same pattern carries a far lower chance of duplication than two. Across three different parts of clothing, points of the uniforms were matched to confirm that they were identical pieces of clothing.
This method was previously used on photographs from Syria by the Norwegian media outlet NRK in 2020 to identify Petrovsky, the Rusich co-leader who is currently detained in Finland. nrk.no/urix/xl/assads…
Milchakov has openly described himself as “a Nazi.”. While active in the Donbas, Milchakov documented himself and his unit mutilating the body of a Ukrainian soldier. He has been accused of horrific war crimes and animal abuse in the Donbas region of Ukraine.
The image was taken north of Palmyra in the Homs province of Syria, just five and a half kilometres northeast of where the documented torture and beheading of a Syrian man at the hands of Wagner mercenaries took place in early 2017.
We were able to geolocate multiple other images of the same group in the Palmyra area from photos posted by Rusich social media accounts
In a statement posted to their Telegram channel after Bellingcat reached out for comment, Rusich wrote, “the acts depicted do not constitute a war crime because a) we're not military and b) we were happy to do it."
Rusich did not directly address whether Milchakov was the man in the image or involved in this incident.
You can read into the details of our process of geolocating and identifying the man in the photo in the investigation here: bellingcat.com/news/2024/01/2…
Bellingcat is a non-profit and the ability to carry out our work is dependent on the kind support of individual donors. If you would like to support our work, you can do so here bellingcat.com/donate/
• • •
Missing some Tweet in this thread? You can try to
force a refresh
Russia's invasion of Ukraine has demonstrated the central role of drone footage in monitoring conflict zones. @faineg and @konrad_it have created a guide to help researchers identify drone types based on footage. bellingcat.com/resources/2024…
The guide outlines characteristics that can help you to determine the source of drone footage. These characteristics can provide crucial insights: for example, auxiliary light warnings indicate an extreme likelihood that a drone is used for bombing attacks.
This guide focuses on commercial and small drones, touching on major manufacturers including DJI and Autel. Most open-source material that is found online originates from these drone types.
A short thread on available Bellingcat tools and guides that may be useful for researchers and journalists looking into the war in Gaza. 🧵
.@oballinger built a damage proxy map that estimates the number of damaged buildings in a given area in the Gaza Strip. It also links to geolocated footage of strikes and destruction in the same selected area. Read about it here: bellingcat.com/resources/2023…
You can listen to Ollie discussing the development of the damage mapping tool here in our last Stage Talk of 2023: soundcloud.com/bellingcat/tra…
Thread regarding recent false allegations by @KitKlarenberg in @TheGrayzoneNews and @beek38 in @AndereKrant, based on a post by @CeesCees72 claiming Bellingcat colluded with Dutch intelligence services, based on a Dutch FOI request:
In short: using an excerpt of a single email, they claimed Bellingcat shared a story with Dutch intelligence before publication. We obtained the full email: it shows a bureaucrat copy-pasted the article from our website and shared it with colleagues *after* it was published.
As a result, Bellingcat has contacted both @TheGrayzoneNews and @AndereKrant requesting a retraction by December 28th to prevent further action. The letters sent to both organisations can be found here: drive.google.com/drive/folders/…
We’ve recently been subjected to a phishing attack via email. The email was made to appear as if it came from USAID and encouraged readers to click a link which downloads a malicious file. We’ve reported it to @USAID.
The email’s fraudulent domain (usaid[.]pm), the generic salutations used and the grammatical errors all indicated a phishing campaign.
The file, once opened, installs malware that kicks off a PowerShell script. It then downloads a decoy PDF that communicates with a command and control server, loosely connected to an ISP in Russia.
Bellingcat’s Technical Fellow George Dyer has made investigating companies publicly listed in the US easier by creating a toolkit that helps you navigate and collect data from a free-to-access company regulatory database. bellingcat.com/resources/2023…
EDGAR is a free database of corporate and financial data maintained by the Securities and Exchange Commission (SEC), but shortcomings such as not being able to download all documents at once from a search and shifting data tags makes it an underused resource.
We have developed a suite of tools that we hope will make EDGAR easier to use for open-source financial research. Basic knowledge of Python is required.
‘Nelegal-2023’ is a large anti-migrant campaign carried out by Russian law enforcement in two stages. Bellingcat analysed dozens of videos, finding 14 which show law enforcement committing violence against migrants between May and November. bellingcat.com/news/2023/12/1…
Russia’s Interior Ministry recently told the newspaper Izvestiya that over 15,000 migrants have been deported from the country in the course of the campaign. iz.ru/1601632/2023-1…
With the help of our interns, Bellingcat collected and analysed imagery of the first half of these raids and detentions shared on social media channels. We found 60 videos and photos depicting 50 raids between May and August.