Донбасс. Работает «Рубикон»
0:06 – HMMWV
0:11 – MaxxPro
0:18 – ББМ
0:23 – Патч-антенна
0:24 – Патч-антенна
0:26 – ПВД
0:30 – ПВД
0:35 – ПВД
0:40 – Баба-Яга
0:42 – Баба-Яга
0:45 – Баба-Яга
0:47 – Баба-Яга
0:49 – Баба-Яга
0:52 – 2С1 Гвоздика
0:57 – Leopard 1A5
1:02 – HMMWV
1:06 – Камера
1:11 – Огневая позиция
1:16 – ББМ
1:21 – Пикап
1:23 – ББМ
1:26 – Козак
1:28 – М113
1:30 – М113
1:33 – Пикап
1:35 – Пикап
1:38 – УАЗ Буханка
1:40 – Спутниковая антенна
Позывной Дарч
The Russian-origin content promotes unauthorized access to SATCOM frequencies and offers explicit technical details supporting electronic warfare, signals intelligence, and potential kinetic strike targeting. The intent behind the information, combined with visual targeting overlays and explicit frequency tables, demonstrates premeditated operational planning with offensive objectives. It encourages non-government actors to engage in illicit monitoring and disruption of military satellite communications, while indirectly coordinating reconnaissance for potential strikes against NATO-supplied and Ukrainian-operated vehicles.
The video footage timestamped and labeled with NATO and Ukrainian military assets—such as HMMWVs, MaxxPros, M113s, Kozak APCs, and the Leopard 1A5—correlates those platforms with their antenna configurations and positions. The repeated mention of “Baba-Yaga” likely refers to a Russian UAV or loitering munition platform used for identifying and tracking these targets for later engagement. The term “работает Рубикон” signals that a Russian signals intelligence system named “Rubikon” is active in the Donbas region. Rubikon appears to be an interception suite capable of capturing SATCOM traffic, geolocating uplinks, and potentially guiding strikes or electronic countermeasures.
The PDF titled SATCOM – спутниковый ретранслятор provides exact uplink and downlink frequencies, transponder pairings, signal strengths, and regional targeting data for SATCOM infrastructure covering the southern and southeastern corridors of Europe, Africa, the Indian Ocean, and parts of Asia. The data includes advisories for radio operators to build personal tables in Excel, indicating pre-operational intelligence collection routines. It also segments frequencies by usability based on radio brand limitations and warns users about “dangerous” frequencies used by government authorities in Saint Petersburg and Moscow—reflecting counter-detection concerns among illicit operators.
The document normalizes illegal SATCOM hijacking and signals operational anonymity by framing the airwaves as an anarchic environment where etiquette is optional and threats common. This framing enables denial of responsibility while inciting direct engagement in hostile electromagnetic interference and reconnaissance. The document closes with a pseudo-legal disclaimer acknowledging the criminal nature of these actions while brushing it off as a minor risk.
The functions of the materials span tactical SATCOM jamming, SIGINT support for kinetic strikes, and command-and-control disruption. The maliciousness lies in directing civilian actors or irregular units to exploit military-grade infrastructure during wartime, clearly escalating beyond passive monitoring into actionable targeting support. The lethality of the intelligence is demonstrated in its battlefield correlation: vehicles and SATCOM assets geo-tagged and time-synced, suggesting targeting pipelines for artillery, loitering munitions, or drone strikes.
The intent is to crowdsource operational intelligence from Russian-aligned operators or sympathizers, enable effective identification of Ukrainian and allied military communication platforms, and contribute to their destruction or degradation. It blends low-cost electronic warfare tactics with open-source crowd coordination. The combination of frequency mapping, vehicle visual intelligence, references to jamming/targeting assets like Rubikon, and cultural de-risking of criminal activity makes this material highly malicious and tactically lethal.
