The participation of Russian military personnel in reconnaissance and control of Russian-made unmanned aerial vehicles (UAVs) in the occupied territory of Ukraine in the interests of the Russian occupation forces was confirmed. Russian soldiers who lost a Tachion drone in the Donbas were identified.
Volunteers of InformNapalm international intelligence community continue a series of publications that analyze information from the work computer of the reconnaissance commander of the so-called 2nd Army Corps of the People’s Militia (2nd CPM), a unit of the hybrid Russian occupation troops in the occupied territory of Luhansk Oblast.
Let us remind you that the data for this analysis was obtained as a result of a successful installation of a special software on a work computer of the reconnaissance commander by hacktivists from the Ukrainian Cyber Alliance (UCA) (FalconsFlame, Trinity, Ruh8, and Cyber Hunta) The first part of the analysis can be found here. It details the use of Orlan-10 drones by Russian command in the fighting in the Donbass. The second part dealt with the use of the Forpost drones. Based on one of the reports, the third part disclosed the place where the Takhion drone (tail number 141169) of the 138th Separate Motorized Rifle Brigade of Russian Armed forces crashed.
The forth part was dedicated to the analysis of the memorandum on the commander of the illegal armed group called Special Operations Brigade “Odessa”. In the fifth part, we disclosed information about Russian units of the occupation troops in the Donbas using the Russian portable ground reconnaissance station PSNR-8 Kredo-M1 (1L120).
In this publication we identify Russian servicemen – operators of the Tachion drone with the tail number 141169. They lost the drone in December of 2014 in Luhansk Oblast, south-west of the village of Muratov. The coordinates of the site where the signal was lost are: 48°47’21.8″N 38°41’11.2″E. Read more here.
The information about the Russian Tachion drone crew was found in a document titled “The act of preliminary investigation of an aircraft incident of a Takhion unmanned aerial vehicle No. 141169 that occurred in military unit 77077 on December 14, 2014, at 11:30 am (Moscow time)”. The document was prepared by the reconnaissance commander of the so-called 2nd Army Corps of Russian Occupation Forces and submitted for approval to Major General Ignatov. Under the pseudonym Sergei Ignatov (call sign “Tambov”) was hiding Kuzovlev Sergey Yurievich, the chief of staff of the 58th Army of the Russian Southern Military District, who at that time was an acting commander of the 2nd Army Corps.
- The Takhion complex senior operator from the 138th Separate Motorized Rifle Brigade of the Russian Armed Forces (military unit 02511):
Private Denis Alexandrovich Laptev, date of birth: January 29, 1993, personal number E-90253 ( account ON VK, friends, photo album ). In Laptev’s photo album, we found a group photo taken presumably in Luhansk.
- The Takhion complex operator from the 138th Separate Motorized Rifle Brigade of the Russian Armed Forces (military unit 02511):
Lance-corporal Artyom Ivanovich Angalyov ( VK account 1, VK account 2, mentioned on website), date of birth: May 07, 1994, personal number SU-052822. He was identified in a group photo from Laptev’s photo album.
In the course of communication with Angalyov through social networks, hacktivists were able to get access to one of his mailboxes. There they found a pay stub for December 2014, issued by the Russian Defense Ministry. It means that Angalyov was in the occupied territory of Luhansk Oblast while being an active duty Russian serviceman.
After the loss of the drone number 141169, the Laptev-Angalyov crew began working with the drone number 141168. There were incidents involving this drone too: on December 8, 2014, a 5.45 mm bullet hit the UAV, and on December 16, at launch, the device could not gain the required altitude and got caught on the branch, which led to the breakdown of two consoles. Below are pictures of the damage, as well as some shots from video cameras from reports on reconnaissance flights during December 2014.
Click on the picture to enlarge
As mentioned above, hacktivists from the UCA communicated through social networks with Angalyov and Laptev. During the interviews, the authenticity of documents from the reconnaissance commander’s computer was confirmed, as well as identification of their accounts in social media, and access to Angalyov’s mailbox was obtained.
Click on the picture to enlarge
Update: After the publication of this investigation, our vigilant reader notified us that a group photograph was taken in front of the entrance to the barracks of the Luhansk Military Lyceum.
Disclaimer: Data for the investigation was provided to InformNapalm by the UCA hacktivists on an exclusive basis. InformNapalm community is not responsible for the way the information was obtained. We analyze and supplement materials using open source intelligence.
By Mikhail Kuznetsov exclusively for InfrotmNapalm international intelligence community.
Translated by Svitlana Kemblowski
When using the information, an active link to the source is required.
(Creative Commons — Attribution 4.0 International — CC BY 4.0)Please repost and share with friends.Follow us on Facebook / Twitter / Telegram to get timely updates on new publications.