Bellingcat Profile picture
Jan 23 20 tweets 5 min read Read on X
An image analysis by Bellingcat shows an infamous Russian neo-Nazi with ties to the controversial paramilitary Wagner Group may be depicted in a photograph showing a man holding a severed head in Syria...bellingcat.com/news/2024/01/2…
Alexey Milchakov oversaw the far-right Rusich Group, which has previously been implicated in war crimes in Syria and Ukraine, including torture and mutilation.
The 'co-leader' of the group Yan Petrovsky is currently in Finnish custody pending an extradition request by Ukraine for alleged war crimes committed in the Donetsk and Luhansk regions in 2014 and 2015.
On February 10, 2020, a Telegram channel connected to the Wagner mercenary group posted an image of a man in uniform holding a severed head. Behind him was another severed head and the backdrop of hilly, uncultivated terrain, smoke rising from the horizon. Original image sent on Telegram with extremely graphic imagery obscured by Bellingcat, identity of holder was obscured by the avocado pattern by original poster.
Mutilating the dead is considered a war crime under customary international humanitarian law. ihl-databases.icrc.org/customary-ihl/…
James Gow, Professor of International Peace and Security and Codirector of the War Crimes Research Group at @KingsCollegeLon, told us the image potentially shows violations of multiple war crimes statutes.
The image was first posted on the Telegram channel of Maxim Fomin, a Russian military blogger also known as Vladlen Tatarsky. Fomin was assassinated in April 2023. In the 2020 post, Fomin wrote the Russian-language caption “a typical Syrian volunteer speaks to his Yorick”. Original image sent on Telegram with extremely graphic imagery obscured by Bellingcat, identity of holder was obscured by the avocado pattern by original poster.  Post underneath refers to “a typical Syrian volunteer speaks to his Yorick”.
Bellingcat used camouflage patterns on his uniform to conclude that the man in the image was not a Syrian volunteer but appears to be Alexey Milchakov.
As Bellingcat has previously reported, Wagner’s social media channels have a track record of deliberately posting misleading information about their activities. bellingcat.com/news/uk-and-eu…
Rusich censors faces they publish on their social media, but commonalities in gear and camouflage allow researchers to track individuals. Using the patterns of the man’s uniform, as well as his other gear, he was identifiable in multiple images of Russian mercenaries. Shows an example of censoring where the faces of the individuals have been blurred out.
Camouflage patterns are repetitive, but the patterns will vary in terms of where they are placed on the uniform. When applying this to the image of a man holding a severed head in Syria, we can see that Alexey Milchakov wears the exact same uniform as in the picture. Using similarities in the patterns of the man’s uniform, as well as his other gear, he was identifiable in multiple images of Russian mercenaries in the landscapes north of Palmyra.  You can see an interactive graphic of this process in our article.
A combination of three separate pieces of camouflaged clothing with the same pattern carries a far lower chance of duplication than two. Across three different parts of clothing, points of the uniforms were matched to confirm that they were identical pieces of clothing.
This method was previously used on photographs from Syria by the Norwegian media outlet NRK in 2020 to identify Petrovsky, the Rusich co-leader who is currently detained in Finland. nrk.no/urix/xl/assads…
Milchakov has openly described himself as “a Nazi.”. While active in the Donbas, Milchakov documented himself and his unit mutilating the body of a Ukrainian soldier. He has been accused of horrific war crimes and animal abuse in the Donbas region of Ukraine.
The image was taken north of Palmyra in the Homs province of Syria, just five and a half kilometres northeast of where the documented torture and beheading of a Syrian man at the hands of Wagner mercenaries took place in early 2017. Illustration geolocating the image of a man holding a severed head in Syria. (Source: Владлен Татарский/archive (WARNING: GRAPHIC IMAGE), centre; Google Earth, left and right)
We were able to geolocate multiple other images of the same group in the Palmyra area from photos posted by Rusich social media accounts Map depicting geolocations of photos posted by Rusich accounts in relation to the photo with the severed head. Black lines denote main roads, and white lines and dots denote pipelines and industrial sites. Source: ESRI, Open Street Map, Rusich on Telegram.
In a statement posted to their Telegram channel after Bellingcat reached out for comment, Rusich wrote, “the acts depicted do not constitute a war crime because a) we're not military and b) we were happy to do it."
Rusich did not directly address whether Milchakov was the man in the image or involved in this incident.
You can read into the details of our process of geolocating and identifying the man in the photo in the investigation here: bellingcat.com/news/2024/01/2…
Bellingcat is a non-profit and the ability to carry out our work is dependent on the kind support of individual donors. If you would like to support our work, you can do so here bellingcat.com/donate/

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Bellingcat

Bellingcat Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @bellingcat

Jan 19
Russia's invasion of Ukraine has demonstrated the central role of drone footage in monitoring conflict zones. @faineg and @konrad_it have created a guide to help researchers identify drone types based on footage. bellingcat.com/resources/2024…
The guide outlines characteristics that can help you to determine the source of drone footage. These characteristics can provide crucial insights: for example, auxiliary light warnings indicate an extreme likelihood that a drone is used for bombing attacks.
This guide focuses on commercial and small drones, touching on major manufacturers including DJI and Autel. Most open-source material that is found online originates from these drone types.
Read 9 tweets
Jan 12
A short thread on available Bellingcat tools and guides that may be useful for researchers and journalists looking into the war in Gaza. 🧵
.@oballinger built a damage proxy map that estimates the number of damaged buildings in a given area in the Gaza Strip. It also links to geolocated footage of strikes and destruction in the same selected area. Read about it here: bellingcat.com/resources/2023…
Reads:  Ollie Ballinger, a Bellingcat contributor, built a tool which maps the estimated number of damaged buildings and the pre-war population in a given area within the Gaza Strip. You can also find geolocated footage of strikes and destruction in Gaza on the map to support the damage probability estimates.
You can listen to Ollie discussing the development of the damage mapping tool here in our last Stage Talk of 2023: soundcloud.com/bellingcat/tra…
Read 6 tweets
Dec 22, 2023
Thread regarding recent false allegations by @KitKlarenberg in @TheGrayzoneNews and @beek38 in @AndereKrant, based on a post by @CeesCees72 claiming Bellingcat colluded with Dutch intelligence services, based on a Dutch FOI request:
In short: using an excerpt of a single email, they claimed Bellingcat shared a story with Dutch intelligence before publication. We obtained the full email: it shows a bureaucrat copy-pasted the article from our website and shared it with colleagues *after* it was published.
As a result, Bellingcat has contacted both @TheGrayzoneNews and @AndereKrant requesting a retraction by December 28th to prevent further action. The letters sent to both organisations can be found here:
drive.google.com/drive/folders/…
Read 12 tweets
Dec 22, 2023
We’ve recently been subjected to a phishing attack via email. The email was made to appear as if it came from USAID and encouraged readers to click a link which downloads a malicious file. We’ve reported it to @USAID. Screenshot of one of the phishing emails received
The email’s fraudulent domain (usaid[.]pm), the generic salutations used and the grammatical errors all indicated a phishing campaign.
The file, once opened, installs malware that kicks off a PowerShell script. It then downloads a decoy PDF that communicates with a command and control server, loosely connected to an ISP in Russia.
Read 4 tweets
Dec 18, 2023
Bellingcat’s Technical Fellow George Dyer has made investigating companies publicly listed in the US easier by creating a toolkit that helps you navigate and collect data from a free-to-access company regulatory database. bellingcat.com/resources/2023…
EDGAR is a free database of corporate and financial data maintained by the Securities and Exchange Commission (SEC), but shortcomings such as not being able to download all documents at once from a search and shifting data tags makes it an underused resource.
We have developed a suite of tools that we hope will make EDGAR easier to use for open-source financial research. Basic knowledge of Python is required.
Read 6 tweets
Dec 15, 2023
‘Nelegal-2023’ is a large anti-migrant campaign carried out by Russian law enforcement in two stages. Bellingcat analysed dozens of videos, finding 14 which show law enforcement committing violence against migrants between May and November. bellingcat.com/news/2023/12/1…
Russia’s Interior Ministry recently told the newspaper Izvestiya that over 15,000 migrants have been deported from the country in the course of the campaign. iz.ru/1601632/2023-1…
With the help of our interns, Bellingcat collected and analysed imagery of the first half of these raids and detentions shared on social media channels. We found 60 videos and photos depicting 50 raids between May and August.
Read 21 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(