“Bellingcat” Investigated a Terrorist Attack in Ukraine

by Olha Povaliaieva
Friday, October 28, 2022
“Bellingcat” Investigated a Terrorist Attack in Ukraine

More than 30 names of Russian military engineers responsible for missile strikes on Ukrainian cities became known

On October 10, the Russian Federation carried out one of the largest terrorist attacks against the neighbouring country. After that, Bellingcat and its partners, The Insider and Der Spiegel, completed the investigation they had been conducting for 6 months. According to their data, the missile strikes are a well-planned action that is likely to break the morale of the Ukrainian people. The experts conducted an investigation based on open sources, from which it was possible to determine who made phone calls before the missiles were launched.

The investigation report says that before the missiles began to destroy peaceful cities, Russian rocket launching and targeting experts made phone calls and connected with their superiors. Based on this data, Bellingcat found that there were 3teams of at least 10 men. Every Russian specialist has a role to play when launching missiles. It is noted that each group deals with a separate type of high-precision missiles: X-101, R-500 or Iskander, 3M-14, or Calibre.

All Russian war criminals were trained at the Balashikha military academy of strategic missile forces in Moscow and the Naval engineering institute in Saint Petersburg. All these persons are now registered as residing and working at the official address of the Russian armed forces general staff. A team of 30 people is a new potential for growing hatred for Ukraine because only young people are in teams. Among them, there are married couples. According to Bellingcat, Russian gunners have education and experience in missile programming. Some military personnel worked in the field of information technology and computer games. Also received information that some puppets of the Kremlin worked in the Russian military command centre in Damascus when Russia fired cruise missiles at Syria (2016-2021). Almost all team members have awards from the Russian president.

International investigators relied on open data sources: leaked employment data, phone records, and reports of military awards from the media. Such information is available on the aggressor country's ordinary and clandestine data markets.

You will be interested