• Languages
Language (English)
  • Українська (UA)
  • Русский (RU)
  • English (EN)
  • Deutsch (DE)
  • Français (FR)
  • Español (ES)
  • Беларуская (BY)
  • Български (BG)
  • Polska (PL)
  • Čeština (CZ)
  • Slovenský (SK)
  • Lietuvių (LT)
  • Latvijas (LV)
  • Nederlands (NL)
  • Português (PT)
  • Italiano (IT)
  • Svenska (SV)
  • Norsk (NO)
  • Dansk (DK)
  • ქართული (GE)
  • Română (RO)
  • Magyar (HU)
  • Ελληνικά (EL)
  • Deutsch (AT)
  • العربية (AR)
  • Türkçe (TR)
  • Azərbaycan (AZ)
  • Татарча (TAT)
  • 日本語 (JP)
  • 中文 (CN)
  • 한국어 (KR)

    Logo

    support informnapalm
    Navigation
    • Home
    • News & OSINT
      • Donbas
      • Crimea
      • Syria
      • Georgia
      • World
      • Summaries
      • Misc
      • Social review
    • Top Investigations
    • History
    • About Us

    Identified: personal data of paratrooper and scout of 108th Air Assault Regiment who participated in seizure of Crimea

    on 10/02/2021 | | Crimea | News Print This Post Print This Post
    • ru
    • es
    • by
    • cz
    • ua
    • en
    • bg
    • sv
    • at

    InformNapalm international intelligence community continues to expand the database of Russian military personnel who participated in the special operation to seize Crimea. This article features the Russian paratrooper Maxim Artiyev, who in 2014 served in the 108th Air Assault Regiment (AAR) of the 7th Air Assault Division of the Russian Armed Forces. You will find the reasons why it is important to continue identifying each Russian serviceman who carried out criminal orders in the conclusions to this article.

    Paratrooper, scout, gunner…

    In the photo, Russian paratrooper Maxim Artiyev is shown near a car with a Ukrainian license plate AK3179BC. The first letters of the plate – AK – is the code for the Autonomous Republic of Crimea. Artiyev posted this photo in his album in April 2014.

    Interestingly, in January 2017, in the Crimean social media public groups there were advertisements for the search of this car (see screenshots of the advertisement are below: 1 , 2 , 3 , 4 , 5 ).

    Russian soldiers like being photographed with Ukrainian hryvnias, Artiyev is not an exception:

    On May 9, 2014, Artiyev posted a photo of his medal for the occupation of Crimea.

    A conversation in the comments under the photo:

    Filippov: Hey, you got a medal?

    Belyakov: For the accession?!

    Artiyev: Yes, for Crimea

    Artiyev also posted a photo of a train ticket from Novorossiysk to Murmansk which he took to travel home after demobilization.

    There are his surname and initials, as well as the date of birth – March 28, 1995, on the ticket. The date of arrival is also indicated – July 1, 2014. And on July 3, 2014, he posted a demob photo with the medal:

    The following screenshot shows that Artiyev indicated his duty station: at the bottom of the photo there is an inscription “108 AAR (g)”, and a commentary to the photo says “my regiment…”.

    The place of service is confirmed by a letter of gratitude to his parents from the commander of the military unit 42091, Colonel M. Baikulov. Military unit number 42091 points to the 108th AAR of the 7th Air Assault Division. Permanent deployment point of the 108 AAR is Novorossiysk.

    We wrote about Colonel Murat Baikulov in detail in our first article about the 108th AAR.

    Artiyev served in the 108th AAR first as a reconnaissance operator, then as a gunner of Pecheneg machine gun, as evidenced by his comments to the following photo:

    In his social network profile, Artiyev indicated Krasnoshchelye village under “hometown”.

    This is a village in the Lovozersky raion of the Murmansk Oblast. The place of residence is also confirmed by the train ticket we mentioned above, the point of arrival on it is Murmansk.

    VK account of Artiyev:

    https://vk.com/id114583622
    http://archive.is/LJoaA
    http://archive.fo/QDX9H
    http://archive.fo/WTWdR

    Conclusion

    In February and March 2014, Putin’s “green men” were hiding under the masks and uniforms without insignia. Each publication of InformNapalm’s OSINT research reveals the names and personal data of specific soldiers and officers who carried out the Kremlin’s criminal orders. The blame for the outbreak of war, the annexation of sovereign territory and the tragedy for the families of millions of Ukrainians who have lost their homes lies not only with the military and political leadership of the Russian Federation, but also with each of these soldiers and officers, who will sooner or later bear responsibility for their crimes.

    The war in the Donbas was a continuation of the Crimean tragedy and a consequence of Russia’s aggression against Ukraine. The same units of the Russian Armed Forces that seized Crimea were subsequently spotted in the Donbas. By swallowing the annexation of Crimea the international community played a part in freeing Moscow’s hands for further war and the death of thousands of Ukrainians. If international pressure on the Russian aggressor weakens, Russia will continue its hybrid war and expansion into Europe. Therefore, it is important not only to increase the sanctions pressure on Putin and his entourage, but also to impose sanctions against every serviceman or mercenary of the Russian Federation who took part in the aggression.

    Read more from InformNapalm

    • Proofs of the Russian Aggression: InformNapalm releases extensive database of evidence
    • Volunteers gathered evidence of 32 Russian military units taking part in the invasion of Crimea
    • Military exercises Zapad-2021: who, when and where
    • Zapad-2021 Exercise—One Step from Declared Defense to Active Assault
    The OSINT investigation was prepared by the monitoring service of the Belarusian editorial team of InformNapalm international volunteer community. Translated by Julia Ponomarenko, edited by Artem Velichko.
    Distribution and reprint with active link to the source is welcome! (Creative Commons — Attribution 4.0 International — CC BY 4.0) InformNapalm social media pages: Facebook / Twitter / Telegram
    InformNapalm does not receive any financial support from any country’s government or large donors. Only community volunteers and our readers help us to maintain the site. You can also volunteer or support the development of the unique volunteer intelligence resource InformNapalm with your donations through Patreon.

    Tags: 108th AARCrimeaRussian Armed Forces

    Recent Posts

    • Andriy Derkach and his tapes. About one special operation to interfere in the US presidential election

      08/10/2020 - 0 Comment
    • Hacked: Deputy Defense Minister of Russia Pavel Fradkov. Business interests of Kadyrov and Kabaev in the temporarily occupied territories of Ukraine

      05/01/2025 - 0 Comment
    • Analysis and examples of sanctions evasion schemes used by Russian military-industrial complex

      04/28/2025 - 0 Comment
    • Hacking of Z-volunteer Ivanov, a member of Putin’s United Russia party: real estate scheming in the occupied territories

      04/04/2025 - 0 Comment

    Related Posts

    • Identification of Russian military marauder with Polaroid and correction of Ministry of Digital Transformation mistake

      06/12/2022 - 0 Comment
    • Card decks: “Covered card of Ruscism” and “War Criminals” projects by InformNapalm

      05/16/2022 - 0 Comment
    • The criminal from Bucha lost his phone in Ukraine. “They already know they are known all over the world”

      05/06/2022 - 0 Comment

    No Responses to “Identified: personal data of paratrooper and scout of 108th Air Assault Regiment who participated in seizure of Crimea”

    Leave a Reply Cancel Reply

    Your email address will not be published. Required fields are marked *


    *
    *

    Follow us on social media
    Slate | Sl8 | InformNapalm
    does not receive any financial support from any country’s government or large donors. Only community volunteers and our readers help us to maintain the site. You can also become one of the community volunteers or support InformNapalm with your donations:

    Patreon

    BuyMeACoffee

    USDT TRC-20: TUbRscbCFns4kvWbUnQRBow9ajxSXwxFJU

    Ethereum: 0xf8979c0e0f82EaF1E79704Eb10b750906868cb72

    Bitcoin: bc1qj6nmqwc75tkwv5zuq4x8ljq94xwqp2msf5kyv3

    • Home
    • Privacy Policy
    • Contact Us
    © 2014-2019. «InformNapalm». CC BY 4.0