• Languages
Language (English)
  • Українська (UA)
  • Русский (RU)
  • English (EN)
  • Deutsch (DE)
  • Français (FR)
  • Español (ES)
  • Беларуская (BY)
  • Български (BG)
  • Polska (PL)
  • Čeština (CZ)
  • Slovenský (SK)
  • Lietuvių (LT)
  • Latvijas (LV)
  • Nederlands (NL)
  • Português (PT)
  • Italiano (IT)
  • Svenska (SV)
  • Norsk (NO)
  • Dansk (DK)
  • ქართული (GE)
  • Română (RO)
  • Magyar (HU)
  • Ελληνικά (EL)
  • Deutsch (AT)
  • العربية (AR)
  • Türkçe (TR)
  • Azərbaycan (AZ)
  • Татарча (TAT)
  • 日本語 (JP)
  • 中文 (CN)
  • 한국어 (KR)

    Logo

    support informnapalm
    Navigation
    • Home
    • News & OSINT
      • Donbas
      • Crimea
      • Syria
      • Georgia
      • World
      • Summaries
      • Misc
      • Social review
    • Top Investigations
    • History
    • About Us

    Reconnaissance commander of the 2nd Army Corps in the focus of the UCA. Part 5: PSNR-8

    on 03/23/2017 | | Donbas | News | UCA Print This Post Print This Post
    • ru
    • de
    • cz
    • ua
    • en
    • bg

    InformNapalm volunteer intelligence community continues a series of publications with   analysis of the data extracted from a computer of the reconnaissance commander of the so-called Second Army corps of the People’s Militia (2nd CPM), a unit of the hybrid Russian occupation troops in Luhansk Oblast.

    We should remind here that the data for this article was obtained as a result of a successful installation of specific software on a work computer of the reconnaissance commander by hacktivists from the Ukrainian Cyber Alliance (UCA) https://informnapalm.org/uca/ (FalconsFlame, Trinity, Ruh8, CyberHunta). The first part of the analysis is available at the following link https://informnapalm.org/en/reconnaissance-commander-of-the-2nd-army-corps-in-the-focus-of-the-uca-part-1-orlan-10-drone/. It disclosed some details of the use of the Orlan-10 drones by the Russian command in the Donbas. In the second part  we talked about the use of the Forpost drones. Based on one of the reports, the third part disclosed the place where the Takhion drone (tail number 141169) of the 138th Separate Motorized Rifle Brigade of Russian Armed forces crashed. The forth part was dedicated to the analysis of the memorandum on the commander of the illegal armed group called Special Operations Brigade “Odessa”. In the fifth part we will disclose information about the Russian portable ground reconnaissance station PSNR-8 Kredo-M1 (1L120). In particular, we are going to tell who, when and in what quantities was supplying the so called 2nd CPM with this equipment. We should note that these stations are a standard issue in the Russian army, have never been supplied to Ukraine and are not available in Russian Army Surplus stores. Although the Russian president claimed otherwise…

    Here is also some information about the station and its technical characteristics:

    Placed in service in 2002. Developed in 1995-2001. Developer: NII “Strela”. Producer: NII “Strela”. This station automatically detects and locates the coordinates of moving ground, air and surface targets (single soldiers, units, armored objects, hovering and low-flying helicopters, motor boats and ships of various classes) and adjusts the fire of their artillery.

    Crew: 2-3.

    Operating frequency range: 2 cm (J).

    Scan zone:

    –    range – from 200 m to 32 km;

    –    azimuth – from 12° to 180° with an adjustment discrete of 12°;

    –    elevation – +/-18 degrees.

    Detection range for moving targets:

    –    person – 7-8 km;

    –    tank – up to 16 km;

    –    truck – up to 32 km;

    –    155 mm shell explosion – up to 5 km.

    Power consumption: 110W.

    Median errors in determining the coordinates:

    –    for range: 25 m;

    –    for direction:  00–05 m (0.3°).

    Continuous operation time: 24 hrs

    Weight: 51 kilogram

    On March 21, 2015, reconnaissance commander of the 2nd CPM (military unit L-77077) Colonel Sergeev (a regular Russian serviceman using a pseudonym which is a usual practice for Russian officers sent on a mission to illegal armed groups of the DPR/LPR ) wrote a report addressed to the reconnaissance commander of the 12th Reserve Command of the Russian Armed forces (Novocherkassk, Rostov oblast). The report stated that as of March 15, 2015, the Separate Battalion of the Corp (military unit L-55055) and the brigade’s reconnaissance units have no PSNR-8 complexes. Sergeev asked the Russian command to supply those military units with 4 complexes: two for the Separate Reconnaissance Battalion and one for each reconnaissance companies from the 2nd and 4th Brigades of the 2nd CPM. At the same time, the report says that all available PSNR-8 were used in artillery units of Russian occupational forces in Luhansk Oblast.

    It is interesting that Sergeev’s computer also contained photos (link to the originals) that show the process of deploying of the PSNR-8 complex to the operating state. Based on EXIF we conclude that pictures were taken on March 18, 2015 between 16:50 and 17:00 using a cell phone Samsung Galaxy Core (GT-I8262).

    Note the condition of the complex. Apparently, it had been in use for a short period of time, and based on the date these pictures were taken, we conclude that we see one of the complexes that were supplied to the artillery units of the 2nd CPM. Using OSINT, InformNapalm volunteers have previously identified the PSNR-8 complexes. However, in those instances [1] , [2]  [3] the complexes belonged to the units of the 1st Army Corps (Russian occupation forces in Donetsk Oblast).

    Based on the foregoing, the following conclusions can be drawn: In March 2015 all artillery units of the 2nd CPM possessed Russian complexes PSNR-8. The reconnaissance commander of the 2nd CPM asked the reconnaissance commander of 12th Reserve Command of Russian Armed Forces (Novocherkassk, Rostov oblast) to supply his reconnaissance units with special military equipment. The 12th Reserve Command of Russian Armed Forces supplies military equipment to the territory of Ukraine, they also send instructors to teach terrorists how to use this equipment.

    Disclaimer:This material was exclusively provided for analysis and processing by hacktivists of the Ukrainian Cyber Alliance. InformNapalm community is not responsible for the ways this information was obtained or for its origin.

    Original by Mikhail Kuznetsov, translated by Maksym Sviezhentsev, edited by Svitlana Kemblowski 

    InformNapalm_logo_05(CC BY) Information specially prepared for InformNapalm.org, an active link to the authors and our project is obligatory for any reprint or further use of the material.

    We urge readers to actively share our publications on social networks. Broad public awareness of these investigations is a major factor in the information and actual warfare.

    Tags: Kredo-M1Russian military equipment

    Recent Posts

    • Andriy Derkach and his tapes. About one special operation to interfere in the US presidential election

      08/10/2020 - 0 Comment
    • Hacked: Deputy Defense Minister of Russia Pavel Fradkov. Business interests of Kadyrov and Kabaev in the temporarily occupied territories of Ukraine

      05/01/2025 - 0 Comment
    • Analysis and examples of sanctions evasion schemes used by Russian military-industrial complex

      04/28/2025 - 0 Comment
    • Hacking of Z-volunteer Ivanov, a member of Putin’s United Russia party: real estate scheming in the occupied territories

      04/04/2025 - 0 Comment

    Related Posts

    • OSCE spots 15 newest Russian UAZ Esaul armored vehicles in Donbas (Drone photo)

      05/03/2021 - 0 Comment
    • Another Russian FSB drone crashed in Donbas

      03/12/2021 - 0 Comment
    • Russian army shows how it trains to violate international humanitarian law

      03/05/2021 - 0 Comment

    4 Responses to “Reconnaissance commander of the 2nd Army Corps in the focus of the UCA. Part 5: PSNR-8”

    1. 03/26/2017

      Terrorists of the LPR actively use the Russian PSNR-8 Kredo-M1 portable reconnaissance station - InformNapalm.org (English) Reply

      […] you that on March 9, volunteers of InformNapalm international intelligence community published a new article on the analysis of data from the work computer of the reconnaissance commander of the so-called […]

    2. 03/27/2017

      Terroristerna i Luhanskrepubliken brukar PSNR-8 «Kredo-M1» portabel övervakningsradar - InformNapalm på svenska Reply

      […] påminner om att InformNapalms frivilliga redan 9 mars publicerade en artikelserie som baserades på en analys av insamlade data från en dator som tillhör underrättelsechefen för […]

    3. 04/12/2017

      La Haya está a la espera a los tanquistas de la 136ª Brigada de las Fuerzas Armadas de Rusia: listas, documentos, órdenes - OSINT + HUMINT - InformNapalm.org (Español) Reply

      […] se dirigió a su buzón personal desde del equipo del jefe del Departamento de Inteligencia del 2do cuerpo de organización rusa de los terroristas de “LNR”. En Donbass estaba en un viaje de […]

    4. 04/28/2017

      The Hague tribunal awaits tankmen of Russian Army’s 136th Brigade: lists, documents, orders. OSINT+HUMINT - InformNapalm.org (English) Reply

      […] to Donbas, where he accessed his personal e-mail from the PC of the reconnaissance commander of the 2nd Army Corps (AC) of the Luhansk People’s Republic (LPR) terrorist organization. His Donbas deployment is […]

    Leave a Reply Cancel Reply

    Your email address will not be published. Required fields are marked *


    *
    *

    Follow us on social media
    Slate | Sl8 | InformNapalm
    does not receive any financial support from any country’s government or large donors. Only community volunteers and our readers help us to maintain the site. You can also become one of the community volunteers or support InformNapalm with your donations:

    Patreon

    BuyMeACoffee

    USDT TRC-20: TUbRscbCFns4kvWbUnQRBow9ajxSXwxFJU

    Ethereum: 0xf8979c0e0f82EaF1E79704Eb10b750906868cb72

    Bitcoin: bc1qj6nmqwc75tkwv5zuq4x8ljq94xwqp2msf5kyv3

    • Home
    • Privacy Policy
    • Contact Us
    © 2014-2019. «InformNapalm». CC BY 4.0