• Languages
Language (English)
  • Українська (UA)
  • Русский (RU)
  • English (EN)
  • Deutsch (DE)
  • Français (FR)
  • Español (ES)
  • Беларуская (BY)
  • Български (BG)
  • Polska (PL)
  • Čeština (CZ)
  • Slovenský (SK)
  • Lietuvių (LT)
  • Latvijas (LV)
  • Nederlands (NL)
  • Português (PT)
  • Italiano (IT)
  • Svenska (SV)
  • Norsk (NO)
  • Dansk (DK)
  • ქართული (GE)
  • Română (RO)
  • Magyar (HU)
  • Ελληνικά (EL)
  • Deutsch (AT)
  • العربية (AR)
  • Türkçe (TR)
  • Azərbaycan (AZ)
  • Татарча (TAT)
  • 日本語 (JP)
  • 中文 (CN)
  • 한국어 (KR)

    Logo

    support informnapalm
    Navigation
    • Home
    • News & OSINT
      • Donbas
      • Crimea
      • Syria
      • Georgia
      • World
      • Summaries
      • Misc
      • Social review
    • Top Investigations
    • History
    • About Us

    Another Russian soldier on active duty in Donbas, Ukrainian hackers provide more proofs

    on 05/19/2016 | | Donbas | News | UCA Print This Post Print This Post
    • ru
    • de
    • es
    • by
    • cz
    • ua
    • en
    • bg

    InformNapalm continues a series of publications based on the analysis of an array of hacked data of the Russian mercenaries and active military personnel involved in the military aggression against Ukraine in Donbas. As we wrote earlier, Ukrainian hackers of the anonymous cyber-group alliance FalconsFlame and Trinity launched an operation at 00:00 on May 9, 2016 coded   #OpMay9. It involved 9+ successful hackings of the web sites of Donetsk People’s Republic (DPR) terrorist organization, Russian private military companies operating under the protection of the FSB in Ukraine and Syria, as well as Russian web outlets disseminating aggressive anti-Ukrainian propaganda. In addition to elegantly defacing the sites of the occupants, the alliance handed over to InformNapalm data from more than 40 hacked social network accounts, mailboxes and cloud accounts of the Russian war criminals. More on the topic: Why the Russian Defense Ministry is burning? InformNapalm announces a series of publications based on the leaked data

    The object of this investigation is Yaroslav Volkov, DOB June 12, 1992, a Russian serviceman serving under contract at the 201st Gatchina military base in Tajikistan, unit No. 92752, a native of Chelyabinsk, initial civilian occupation – car mechanic. Social networks accounts (profile, photo album), (profile, photo album). Judging by the photos in December 2014, Yaroslav was in the Rostov region, at one of the training camps serving Russian invasion forces. Then, prior to May 2015, he served at his home station, on the border between Tajikistan and Afghanistan. His private messaging correspondence indicates that one of his colleagues, who had been sent to Ukraine under the guise of a militant, was killed in action in Slovyansk, Donetsk region. On May 25, 2015, Yaroslav reports that he is in Lugansk, and that he was deployed to Ukraine through Rostov. After a mission to Donetsk and Horlivka, under the guise of a “volunteer” with the callsign “Tikhiy”, in mid-August 2015, he returns to Tajikistan, where he continues to serve at the 201st military base of the Russian Armed Forces. Photos below corroborate the fact of participation of  Yaroslav Volkov, a Russian serviceman on active military duty, in the fighting in Donbas.

    His correspondence with   Irina Isayeva   (+380639558988, +380997625124) from Krasny Luch in Luhansk Region (profile, photo album) attests to the following:

    • Yaroslav is on active military duty, both in Tajikistan and Ukraine;
    • Yaroslav’s colleague was a Russian serviceman on active military duty when he was killed in Slovyansk;
    • There are problems with discipline in the invading Russian units in Donbas, Russian military command replaced Yaroslav’s unit after they disobeyed a direct order;
    • Operations of Yaroslav’s unit in Tajikistan are overseen by FSB, the Russian intelligence agency;
    • Yaroslav had missions to Luhansk and Donetsk regions of Ukraine.

    The correspondence with Denis Chameyev (Profile, photo album, https://vk.com/id66946923) directly confirms that Russia is sponsoring the war in the Donbas, as well as evidences other facts:

    • Russia is sponsoring the armed groups through “humanitarian aid”, including supplies of sophisticated hardware, e.g. drones;
    • Militants and mercenaries are engaging in looting, extortion and racketeering (e.g. Yaroslav writes that he “grabbed 2 cars from the Ukrops” after the assault on Debaltseve, he also suggests that real estate could be very easily seized from the locals, and that militants are racketeering the local businesses “just like in the ‘90s”);
    • DPR army is organized like the Russian army with all the attributes of the regular military service – daily quarters, detailing for guard etc., as well as local service contracts.

    As we see, Russian mercenaries and soldiers are engaged in banditry, looting. racketeering and property seizure. There is no ideology under the “Russian world” and under what is happening in the occupied territories of Donbas. But there are there are these 22-year-old Russians, who are “bored” and want to play soldiers, and who are wallowing in the power over other people, granted to them by the weapons in their hands. They carry out criminal orders of the Kremlin, in parallel engaging in looting and profiteering at the expense of the inhabitants of another country. Just like in South Ossetia in summer 2008.

    Read more: investigations of the InformNapalm community based on the analysis of hacked Russian war criminals’ data:

    • Hackers Exposed a Russian Federal Service for Execution Operative, video (18+)
    • Hackers and OSINT-analysts uncover details of the hybrid story of a Russian Army soldier
    • Russian Armed Forces used R-330ZH jamming station in the battle of Debaltseve, workstation screen shots
    • Investigators have disclosed an occupant’s data. From Transnistria to Donbas,
    • A St. Petersburg Terrorist’s Data Hacked: Weapons, Munitions, and Training Camps In Rostov

    This publication was prepared by the volunteer of the InformNapalm international community Mikhail Kuznetsov based on the data obtained by the hackers of FalconsFlame group.

    (CC BY 4.0) information specially prepared for InformNapalm.org site, an active link to the authors and our project is obligatory for any reprint or further use of the material.

    We should like to remind that the database of InformNapalm investigations proving participation more than 70 military units of the Russian Armed Forces in the fighting in Ukraine is available at: http://bit.ly/RussianPresenceEN. We call on our readers to actively share our publications on social networks.
    You can also support the site and make a donation for the development of the project at Crowdfunding. All proceeds will go exclusively into the technical support of InformNapalm.org website.

    Tags: Russian soldier

    Recent Posts

    • Andriy Derkach and his tapes. About one special operation to interfere in the US presidential election

      08/10/2020 - 0 Comment
    • Hacked: Deputy Defense Minister of Russia Pavel Fradkov. Business interests of Kadyrov and Kabaev in the temporarily occupied territories of Ukraine

      05/01/2025 - 0 Comment
    • Analysis and examples of sanctions evasion schemes used by Russian military-industrial complex

      04/28/2025 - 0 Comment
    • Hacking of Z-volunteer Ivanov, a member of Putin’s United Russia party: real estate scheming in the occupied territories

      04/04/2025 - 0 Comment

    3 Responses to “Another Russian soldier on active duty in Donbas, Ukrainian hackers provide more proofs”

    1. 11/18/2016

      Putin issued secret orders to send Russian troops to Ukraine, confirmed by Russian Defense Ministry - InformNapalm.org (English) Reply

      […] Another Russian soldier on active duty in Donbas, Ukrainian hackers provide more proofs […]

    2. 12/02/2016

      Ukrainska hacktivister avslöjar rysk marinsoldat som deltar i kriget mot Ukraina - InformNapalm på svenska Reply

      […] Another Russian soldier on active duty in Donbass (Ukrainian hackers providing proof) […]

    3. 12/03/2016

      Hacktivists uncovered Russian marine taking part in Donbas war - InformNapalm.org (English) Reply

      […] Another Russian soldier on active duty in Donbas, Ukrainian hackers provide more proofs […]

    Leave a Reply Cancel Reply

    Your email address will not be published. Required fields are marked *


    *
    *

    Follow us on social media
    Slate | Sl8 | InformNapalm
    does not receive any financial support from any country’s government or large donors. Only community volunteers and our readers help us to maintain the site. You can also become one of the community volunteers or support InformNapalm with your donations:

    Patreon

    BuyMeACoffee

    USDT TRC-20: TUbRscbCFns4kvWbUnQRBow9ajxSXwxFJU

    Ethereum: 0xf8979c0e0f82EaF1E79704Eb10b750906868cb72

    Bitcoin: bc1qj6nmqwc75tkwv5zuq4x8ljq94xwqp2msf5kyv3

    • Home
    • Privacy Policy
    • Contact Us
    © 2014-2019. «InformNapalm». CC BY 4.0