• Languages
Language (English)
  • Українська (UA)
  • Русский (RU)
  • English (EN)
  • Deutsch (DE)
  • Français (FR)
  • Español (ES)
  • Беларуская (BY)
  • Български (BG)
  • Polska (PL)
  • Čeština (CZ)
  • Slovenský (SK)
  • Lietuvių (LT)
  • Latvijas (LV)
  • Nederlands (NL)
  • Português (PT)
  • Italiano (IT)
  • Svenska (SV)
  • Norsk (NO)
  • Dansk (DK)
  • ქართული (GE)
  • Română (RO)
  • Magyar (HU)
  • Ελληνικά (EL)
  • Deutsch (AT)
  • العربية (AR)
  • Türkçe (TR)
  • Azərbaycan (AZ)
  • Татарча (TAT)
  • 日本語 (JP)
  • 中文 (CN)
  • 한국어 (KR)

    Logo

    support informnapalm
    Navigation
    • Home
    • News & OSINT
      • Donbas
      • Crimea
      • Syria
      • Georgia
      • World
      • Summaries
      • Misc
      • Social review
    • Top Investigations
    • History
    • About Us

    What is burning the Ministry of Defence of the Russian Federation? InformNapalm to start series based on leaked information

    on 04/06/2016 | | Donbas | News | UCA | World Print This Post Print This Post
    • ru
    • fr
    • es
    • by
    • cz
    • ua
    • pl
    • en
    • bg
    • sv
    • no
    • dk

    On April 3, 2015, the international volunteer community, InformNapalm, started publishing information based on breaking emails of key persons involved in coordinating activities of mercenaries, Russian soldiers, and militaries in Donbass and Syria.

    The emails were obtained by a faceless group of Ukrainian hackers (Falcons Flame (#FF)) and passed on to InformNapalm team for analysis. We received over 30 GB useful information, about 12,000 letters and over 6,000 private messages from social media. Many of the conversations expose participation by the Russians in both Ukraine and Syria, demonstrate funding sources, disclose the network of agents and informers working in the rear – on Ukrainian-controlled territory.

    The #FF hackers, OSINT (Open Source Intelligence) experts from InformNapalm and Mirotvorec Centre passed initial information to Ukrainian security agencies prior taking any action. After a pause the team switched to the active phase.

    Data with correspondence was not obtained through a classic cyber hack – it was a result of far-reaching operation that detected and made use of weak links in a vast chain of organizations and agents of influence working for Russian security services.

    Taking control over the email accounts became possible after Russian spy Mariya Koleda, also known as “Bagira”, was caught by Security Service of Ukraine on April 8, 2014 (she was absolved on September 16, 2014 via a prisoner exchange). After release she was appointed as Acting Head of the Department of Public Relations of the so called Donetsk People’s Republic Ministry of Foreign Affairs.

    The operation was successfully followed up by the burning of the whole network of Russian agents – large organization that is called  “The Union of Donbass Volunteers” (UDV). Massive data leak from the UDV gave our team 5,000 profiles of mercenaries recruited to take part in combat in different parts of the world for the benefit of the Russian Federation. The leaked database contains not only profiles of Russian citizens, but also foreigners recruited to act as mercenaries and propagandists of so called “Russian World” in Western countries.

    The Security Service of Ukraine (SSU) has already started cutting the tentacles of this network. Security officers are shutting numerous sources of funding and are hunting Russian spies down.

    The information that is disclosed by InformNapalm does not contain data that may hurt SSU operations. On the contrary, it will help in bringing the whole terrorist network down.

    This video demonstrates only a small part of #FF’s work which will be analysed by InformNapalm team step-by-step and reported to public once our experts sift through data.

    Today we will publish the first part of our investigation based #FF’s data. It will tell about visa support of foreign mercenaries who enter war zone in Donbas through Russian territory.

    You can bookmark this page to stay tuned and learn about new parts of our investigation as they go online. Sharing this page on social networks helps to fan the flame at the foundation of The Ministry of Defense of the Russian Federation.

    The list of newly released investigations based on massive data leak (to be updated):

    1. Russia opens visas for terrorists operating in Ukraine – leaked passport data of mercenaries (April 3, 2016)

    Edited by Lee Michael Strubinger

    Recent Posts

    • Andriy Derkach and his tapes. About one special operation to interfere in the US presidential election

      08/10/2020 - 0 Comment
    • The Suicide Squad: top managers of the Russian public sector dying suspiciously during wartime. Infographics.

      07/11/2025 - 0 Comment
    • Hacked: Deputy Defense Minister of Russia Pavel Fradkov. Business interests of Kadyrov and Kabaev in the temporarily occupied territories of Ukraine

      05/01/2025 - 0 Comment
    • Analysis and examples of sanctions evasion schemes used by Russian military-industrial complex

      04/28/2025 - 0 Comment

    5 Responses to “What is burning the Ministry of Defence of the Russian Federation? InformNapalm to start series based on leaked information”

    1. 04/07/2016

      Medical Services for Russia's VIP Mercenaries. Correspondence, Documents, Identification - InformNapalm.org (English) Reply

      […] More information about this operation can be found here: ‘What is burning the Ministry of Defence of the Russian Federation? InformNapalm to start seri… […]

    2. 04/12/2016

      Hackers and OSINT-analysts uncover details of a Russian hybrid soldier - InformNapalm.org (English) Reply

      […] More about the extent of the data breach can be read in our previous article with the title «What is burning the Russian Ministry of Defense» and consists of a series of publications based on data […]

    3. 04/15/2016

      Hackers make the Russian propagandist Dubovoj hysteric on Cosmonauts Day - InformNapalm.org (English) Reply

      […] InformNapalm advertises the series «What burns the Russian Defense Ministry» based on data leaks ∙ Russia opens visa for terrorists operating in Ukraine: Leaked passport details of mercenaries […]

    4. 04/30/2016

      Ukrainian hackers defacing the Russian propaganda site ANNA News (Video) - InformNapalm.org (English) Reply

      […] Why is the Russian Ministry of Defense on fire: 2016/04/03 […]

    5. 05/19/2016

      Another Russian soldier on active duty in Donbas, Ukrainian hackers provide more proofs - InformNapalm.org (English) Reply

      […] InformNapalm continues a series of publications based on the analysis of an array of hacked data of the Russian mercenaries and active military personnel involved in the military aggression against Ukraine in Donbas. As we wrote earlier, Ukrainian hackers of the anonymous cyber-group alliance FalconsFlame and Trinity launched an operation at 00:00 on May 9, 2016 coded   #OpMay9. It involved 9+ successful hackings of the web sites of Donetsk People’s Republic (DPR) terrorist organization, Russian private military companies operating under the protection of the FSB in Ukraine and Syria, as well as Russian web outlets disseminating aggressive anti-Ukrainian propaganda. In addition to elegantly defacing the sites of the occupants, the alliance handed over to InformNapalm data from more than 40 hacked social network accounts, mailboxes and cloud accounts of the Russian war criminals. More on the topic: Why the Russian Defense Ministry is burning? InformNapalm announces a series of publications based o… […]

    Leave a Reply Cancel Reply

    Your email address will not be published. Required fields are marked *


    *
    *

    Follow us on social media
    Slate | Sl8 | InformNapalm
    does not receive any financial support from any country’s government or large donors. Only community volunteers and our readers help us to maintain the site. You can also become one of the community volunteers or support InformNapalm with your donations:

    Patreon

    BuyMeACoffee

    USDT TRC-20: TUbRscbCFns4kvWbUnQRBow9ajxSXwxFJU

    Ethereum: 0xf8979c0e0f82EaF1E79704Eb10b750906868cb72

    Bitcoin: bc1qj6nmqwc75tkwv5zuq4x8ljq94xwqp2msf5kyv3

    • Home
    • Privacy Policy
    • Contact Us
    © 2014-2019. «InformNapalm». CC BY 4.0