‘Falcons Flame‘ anonymous hacker group (#FF) has provided us with a data set extracted from a mobile phone of an employee of the Russian Federal Service for Execution of Punishment (FSEP). According to the hackers, this information was taken from a Samsung GT-I9100 device with MegaFon’s SIM card (phone No. +7 938 105 18 57, Rostov Oblast).
Vimeo:
The received information is valued for the photos made by the FSEP employee, which contain full EXIF-data, including the indication of precise date of creation of the photo. Besides that, we got the videos taken by the operative of the ‘Mangust’ special tasks unit of the Russian Federation’s FSEP department in Rostov Oblast. This agent has repeatedly visited Donbas to take part in combat actions.
All pictures and videos have also been transferred to the security forces of Ukraine and members of the Ukrainian ‘Peacemaker’ Center for the Study of signs of crimes against the national security of Ukraine.
The #FF hacker group reported that they had carried out an operation to track down the subject’s personal data, which was confirmed based on the captured information about a postal note.
It is remarkable that the fighting in Donbas FSEP employee tries to hide his face in his social profile and constantly changes the last name. But the need for selfies and the desire to ‘immortalize’ his crimes played a low-down trick on him and the data still became publicly available.
During the analysis of the data and additional monitoring, it was found that the owner of the photo and video archive is Reichenau Nikolai Vladimirovich (born on May 17, 1985). His humble wage or the money received for killing the Ukrainians let him buy the black Mitsubishi Eclipse car (license plate No. r011ne, region code 161 – Rostov Oblast).
Hackers also managed to reveal correspondence, in which Nikolai ordered himself a fake stamp for commendation documents. Perhaps, he later provided them as a report about his ‘heroic actions’ in Donbas.
Nikolai’s call signs are ‘Shturm’ [Storm] and ‘Kolovrat’ [Swastika] and it seems that he admires ‘the Third Reich’ (this is justified with the photos found in his archives):
However, the ‘Roman salutes’, the ‘third Reich’ banners and other such attributes are pretty common to the employees of the Russian punitive agencies. We can remind you Aleksei Milchakov, the infamous Nazi from St. Petersburg, whose sidekicks were identified as operatives of the ‘Grom’ [Thunder] special forces unit of the Federal Drug Enforcement Agency or the fighters of the 7th guards airborne division which took part in the annexation of Crimea. In general, under the slogan “Ukraine’s liberation from fascist junta”, the adherents of “Hitler’s version of the Russian world” came to fight on the Ukrainian land.
The geography of the places visited by the figurant of this investigation is interesting as well. Based on the EXIF-data of the photos, we restored the chronology of the FSEP operative’s visits to Donbas and the training base of the ‘Mangust’ special forces unit in Rostov Oblast.
Training base of the ‘Mangust’ unit of the Russian State department of the Federal Service for Execution of Punishment (photo from March 17, 2015).
Izvaryne, Krasnodon (Ukraine). The photo was taken on April 27, 2015.
On the photo from April 29, 2015, Nikolai Reichenau laid out his call sign ‘Shturm’ with 5000 ruble banknotes and the circle below with 1000 banknotes. It seems that he boasted with the money received for fighting. There are around 250 thousand rubles in the photo.
Next we have a set of pictures made on May 12, 2015. Nikolai is back to the military unit in Russia and participates in training of the FSEP unit.
June 15, 2015. This photo was taken in the occupied Luhansk.
A set of photos with the same date. It seems that Nikolai ‘Shturm’ tries to make as much photos with weaponry as he can (probably for the report).
June 24, 2015. The fighter with ‘Novorossiya’ badges brags about being ‘on the sea side’.
The next day ‘the tourist’ posed in front of the ‘Shakhtar’ stadium in the occupied Donetsk and made pictures in Illovaisk.
Then we see another photo from the same day, this time with military equipment. In the video ‘Shturm’ sarcastically talks about his ‘vacation’.
June 26, 2015. Another picture from Luhansk, road signs about directions to Artemivsk, Debaltseve and Vuhlehirsk can be seen in the background.
And here we have an interesting document dated on July 6, 2015, given to Nikolai by the so-called ‘DPR prosecutor office’, in which it is confirmed that he served in the special operations department of the DPR’s general prosecutor’s office in the period between July 1, 2015 and October 30, 2015 (with the right to bear arms). Probably, this document also had to be submitted to the authorities of the FSEP to complete the ‘business trip’.
The Russian operative’s archives also contained photos and videos made in January of 2015 in the Donetsk airport – a series of so-called ‘materials for a report’ about the ‘winter trip’. One of the photos shows a killed Ukrainian soldier.
Materials of this research are another confirmation of the participation of the Russian military personnel in the war in Donbas. These people on the ‘voluntary-compulsory’ basis are sent to kill Ukrainians getting increased financial rewards and occupy Ukraine in the interests of the Russian Federation.
(СС BY) Initial information was provided by the #FF group.
Original article by , translated by Stepan Grishin
11 Responses to “Hackers Exposed a Russian Federal Service for Execution Operative. Video 18+”
03/06/2016
An Open Letter to YouTube: A Russian Terrorist Filed a Complaint for 'Breach of Confidentiality' - InformNapalm.org (English)[…] hope the YouTube management will take into account all the facts provided, and will evaluate this video, which obtained Privacy complaint and will make a decision in favor of the protection of national […]
03/10/2016
InformNapalm Defeated the Russian Terrorist in the 'Confidentiality' Dispute - InformNapalm.org (English)[…] You can get acquainted with the investigation results here: “Hackers Exposed a Russian Federal Service for Execution Operative. Video 18+“ […]
04/11/2016
Hacker Group ‘Falcons Flame’ broke into “Ministry of Foreign Affairs” website of a so-called Donetsk People’s Republic (DPR) - InformNapalm.org (English)[…] March 31st anonymous hacker group #FF (Falcons Flame) known for its previously disclosure of the Russian FPS (Federal Penitentiary Service) employee’s participation in the Donbass war, has […]
04/24/2016
It is official, Russian army deployed R-330Zh jammer in the battle of Debaltseve - InformNapalm.org (English)[…] Read more: Hackers Exposed a Russian Federal Service for Execution Operative, video (18+) […]
05/04/2016
From Transnistria to Donbas, more data on Russian occupants in Ukraine - InformNapalm.org (English)[…] Read more: Hackers Exposed a Russian Federal Service for Execution Operative, video (18+) […]
05/19/2016
Another Russian soldier on active duty in Donbas, Ukrainian hackers provide more proofs - InformNapalm.org (English)[…] Hackers Exposed a Russian Federal Service for Execution Operative, video (18+) […]
09/14/2016
Baza danych i grafika wideo najnowszego uzbrojenia Sił Zbrojnych Rosji na Donbasie - InformNapalm.org (Polski)[…] wóz opancerzony jest również wykorzystywany przez pododdziały specjalne Federalnej Służby Więziennej Rosji. Jego obecność została udokumentowana w Ługańsku i Ługańskiej obłasti, opisana w kilku […]
09/17/2016
Naujausios Rusijos ginkluotės Donbase duomenų bazė ir video grafika - InformNapalm.org (Lietuvių)[…] automobiliais taip pat naudojasi Rusijos Federacijos Federalinė Pataisos tarnyba. Automobilis užfiksuotas Luganske ir Lugansko srityje ir aprašytas keliuose InformNapalm […]
10/02/2016
Podpułkownik Sił Zbrojnych Rosji ujawnił hybrydowe schematy wojny Kremla przeciwko Ukrainie - InformNapalm.org (Polski)[…] Patrz na ten temat: Hakerzy „spalili” specnazowca Federalnej Służby do spraw Wykonywania Kar Rosji. Wideo … […]
11/14/2016
Ukrainian hacktivism: an operation showcased - InformNapalm.org (English)[…] against the sites of Russian terrorists, as well as breaking into the cloud accounts and gadgets of Russian servicemen spotted fighting in Donbas. FalconsFlame hacktivists, along with hacker […]
07/08/2017
Putin fired eight generals (documents) - InformNapalm.org (English)[…] March 2016, InformNapalm international intelligence community revealed information about a serviceman of the Mangust Special Purpose Department of the FSIN in Rostov Oblast who repeatedly visited Ukraine and participated in fighting in the […]