Show newer

ISW Daily Frontline Update Summaries (May 6th, 2024)

Luhansk Oblast

Russian forces recently marginally advanced northwest of Svatove amid continued ground attacks along the Kupyansk-Svatove-Kreminna line on May 6.

Geolocated footage published on May 5 and 6 shows that Russian forces marginally advanced east of Stelmakhivka and south of Krokhmalne (both northwest of Svatove), respectively.

Donetsk Oblast

Northern Bakhmut Direction

Russian forces continued limited offensive operations in the Siversk direction northeast of Bakhmut on May 6, but there were no confirmed changes to the frontline.

Chasiv Yar

Russian forces continued offensive operations towards Chasiv Yar on May 6, but there were no confirmed changes to the frontline.

*One Russian milblogger claimed that Russian forces struck a Ukrainian bridge across the Siversky-Donets Donbas canal east of Chasiv Yar.*

Avdiivka Direction

Russian forces recently advanced southwest of Avdiivka amid continued offensive operations west of the settlement on May 6.

Geolocated footage published on May 6 shows that Russian forces advanced along the E50 highway in eastern Netaylove (southwest of Avdiivka).

Donetsk City Direction

Russian sources claimed that Russian forces continued to advance west of Donetsk City, but there were no confirmed changes to the frontline on May 6.

Ukrainian Khortytsia Group of Forces Spokesperson Lieutenant Colonel Nazar Voloshyn reported that small individual Russian groups (likely around squad-size) are trying to storm Krasnohorivka, but that heavy Ukrainian artillery fire is preventing them from consolidating gains and conducting further attacks.

Vuhledar/Marinka Directions

Russian forces continued limited and unsuccessful ground attacks in the Donetsk-Zaporizhia Oblast border area on May 6.

Russian and Ukrainian sources reported Russian attacks northeast of Vuhledar near Vodyane and south of Velyka Novosilka near Urozhaine and Staromayorske.

😢💔 Watching this video, it took me a few seconds before I noticed what this child has endured because of the russians and the lasting consequences of their actions.

The SBU informed the head of the occupation camps, where the Rashists teach children to fight against Ukraine, of suspicion

The Security Service has collected evidence on another war criminal from the Russian Federation, who is imposing the Kremlin regime on the temporarily occupied part of the territory of Ukraine.

We are talking about the Kremlin propagandist Dmytro Polkovnikov, the head of the Russian military organization called the Crimean Patriot Center.

This formation has an extensive network of "branches" that function under the guise of children's camps on the territory of Crimea and the left bank of the Kherson region.

In the ranks of the occupation institution, the ideology of racism is imposed on local schoolchildren and they try to "instill" hatred towards Ukraine.

In addition, Russian instructors conduct fire and sabotage-reconnaissance training with teenagers, as well as teach combat tactics.

In this way, Polkovnikov fulfills the Kremlin's instructions regarding the preparation of the younger generation for the war against our state.

It is documented that the person involved came to one of the "camps" in the Kalancha district of the Kherson region, where he personally called on the children to support the occupiers.

He also urged the students to join the regular units of the Russian army, in particular, those currently fighting against the Defense Forces.

In case of refusal to undergo "re-education" in the occupation institution, children are threatened with expulsion from schools, and their parents are threatened with persecution by Russian penal authorities.

Comprehensive measures are underway to bring him to justice for crimes against Ukrainians.

Military Anatoly Sachanyuk died on January 8, 2024 in Kharkiv region. The soldier was 40 years old.

Anatoly was from Volyn. He had a flair for music and a beautiful voice. He played the guitar and made drawings.

After the 9th grade, he went with his father to earn money for construction. Later, he completed military service. After the army, he worked in the village of Zabolottya, then moved to Lutsk, where he found himself in various jobs: he was a tiler, insulated facades, and worked at a brick factory.

Anatoliy liked to fish, swim, rest with his children, travel, ride a bicycle, communicate with friends.

He participated in ATO. On February 24, the man stood in line at the military commissariat without waiting for a summons. Joined the 14th OMBr.

"Brothers said that Anatoliy saved other soldiers, constantly helped out. He was very skillful, far-sighted, got out of various difficult situations," said his wife Maria.

At home, a large loving family and many friends were waiting for the defender.

State Property Fund Offers for Sale Packaging Plant Seized from Russian Oligarch

The Ukrainian State Property Fund has announced an auction for the sale of PentoPak PrJSC, which used to be owned by a Russian oligarch.

“The Ukrainian State Property Fund has approved the starting price of PentoPak Plant at UAH 203.7 million. The privatization lot will be listed in the Prozorro.Sale system as soon as today. The auction has been scheduled for May 31, 2024,” the report states.

The above asset was seized from the family of Ivan Savvidi, a Russian oligarch of Greek origin, who has close ties to the leadership of the Russian Federation and shows support for the occupation authorities within the temporarily occupied areas of Ukraine.

PentoPak provides a full cycle of packaging production for products in the meat processing industry, using the advanced technologies, such as high-quality printing with UV, water, alcohol-based inks. PentoPak’s customers include the famous Ukrainian brands, namely Rud, Globino, Meat Guild [Miasna Hildiia], as well as ordering parties from more than 30 countries.

- Ukrinform

⚡️Ukraine uses naval drones with anti-aircraft missiles

A video which shows a Ukrainian naval drone performing maneuvers to avoid a fire from a russian Ka-29 helicopter flying to intercept it was released by the Russian media.

An important feature in this event is the appearance of a superstructure on board the drone that resembles the Soviet R-73 air-to-air missile.

The R-73 is a short-range missile and can indeed be launched from ground-based systems. The missile does not require radar or other systems for guidance, as it is equipped with their own infrared seeker.

This missile on board the drone can be distinguished from a similar but earlier R-60 by the specific shape of its tail fin.

Good morning Resisters. We had one hell of a storm last night. But no down trees

The SBU detained an FSB agent group that was preparing massive airstrikes in Ukraine on the eve of Easter

The Security Service detained an FSB agent group that was preparing coordinates for massive airstrikes in the Kyiv, Cherkasy, Poltava, Vinnytsia, and Kirovohrad regions on the eve of Easter.

Among the enemy's priority targets were energy-generating enterprises and logistics warehouses for the storage of fuel and lubricants.

In addition, the occupiers hoped to receive "confirmation" from their agency regarding the current geolocations of military airfields, as well as special forces guarding the General Staff of the Armed Forces.

To carry out these tasks, the Russian special service involved two of its agents from Uman and Luben. For the conspiracy, those involved acted separately, but remotely "locked" on one curator from the FSB.

The Security Service found out about all this at the initial stage of the intelligence activity of Russian agents, which it promptly exposed and documented step by step.

Thanks to this, they were able to be caught red-handed near Kyiv, where they were conducting reconnaissance near potential targets, and thereby thwart the aggressor's plans to prepare airstrikes.

As the investigation established, both persons involved, 28-year-old unemployed, were recruited remotely in March of this year by a staff member of the "Crimean Administration" of the FSB. His identity has already been established by the Security Service.

He promised his agents a monetary reward for cooperation with the occupiers. Anonymous chat in a popular messenger was used for communication.

So far, the investigators of the Security Service have informed the detainees about the suspicion under Part 2 of Art. 111 of the Criminal Code of Ukraine (treason committed under martial law).

The perpetrators are in custody. They face life imprisonment.

The special operation was carried out by SBU employees in the city of Kyiv and the Kyiv region under the procedural guidance of the Kyiv regional prosecutor's office.

🤡 Medvedev promised a nuclear strike on European capitals if troops were sent to Ukraine

Russia will respond to the sending of Western troops to Ukraine with a nuclear strike on Washington, Paris and London, said Deputy Chairman of the Russian Security Council Dmitry Medvedev.

“Sending your troops to the territory of Ukraine will entail the direct entry of their countries into the war, to which we will have to respond. And, alas, not in the territory of Ukraine. <...> A global catastrophe will come,” Medvedev wrote in his telegram channel.

Earlier, the Russian Ministry of Defense Murder announced the start of exercises “in the near future”, within the framework of which the use of non-strategic nuclear weapons will be practiced.

Missile formations of the Southern Military District, aviation and naval forces will take part in them.

The Kremlin said that the planned exercises are related to statements by officials in the West about sending armed contingents to Ukraine.

Electronic Warefare in Ukraine has Lessons for US Weapons, Navigation

The U.S. is gaining valuable insights about the performance of its technologies amid electronic interference as Ukrainian troops use them on the front lines, according to one official.

Washington and other governments have committed billions of dollars of security aid to Ukraine, including long-range missiles, armored vehicles and secure communication devices.

The jamming and spoofing that blankets fighting in Eastern Europe offers a trial against Russian tools rarely seen in action.

Michael Monteleone, the director of the Army’s Assured Positioning, Navigation and Timing/Space Cross-Functional Team, on May 5 told reporters the conflict is a “huge learning experience for us.”

“The global community has shared a lot of our technology, our weapons systems, our command-and-control systems and others, with the Ukrainians,” he said on the sidelines of the GEOINT conference in Florida.

“You’re seeing that being used in real time, and it is a source of feedback.”

Monteleone’s cross-functional team, expected to shift its focus to so-called all-domain sensing in the coming months, is tasked with improving soldier access to critical sources of situational awareness, including where they are, where they are headed and when they will arrive.

“Even early in the war, we learned what happened when GPS just didn’t exist, and how the Ukrainian soldiers dealt with that, and how the Russian soldiers dealt with that,” Monteleone said.

The lessons gleaned from Ukraine’s fight are making “everybody think about the problem space,” Monteleoene said, “including where our investments truly need to be.”

- Defense News

The SBU detained an FSB agent group that was preparing massive airstrikes in Ukraine on the eve of Easter

The Security Service detained an FSB agent group that was preparing coordinates for massive airstrikes in the Kyiv, Cherkasy, Poltava, Vinnytsia, and Kirovohrad regions on the eve of Easter.

Among the enemy's priority targets were energy-generating enterprises and logistics warehouses for the storage of fuel and lubricants.

In addition, the occupiers hoped to receive "confirmation" from their agency regarding the current geolocations of military airfields, as well as special forces guarding the General Staff of the Armed Forces.

To carry out these tasks, the Russian special service involved two of its agents from Uman and Luben. For the conspiracy, those involved acted separately, but remotely "locked" on one curator from the FSB.

The Security Service found out about all this at the initial stage of the intelligence activity of Russian agents, which it promptly exposed and documented step by step.

Thanks to this, they were able to be caught red-handed near Kyiv, where they were conducting reconnaissance near potential targets, and thereby thwart the aggressor's plans to prepare airstrikes.

As the investigation established, both persons involved, 28-year-old unemployed, were recruited remotely in March of this year by a staff member of the "Crimean Administration" of the FSB. His identity has already been established by the Security Service.

He promised his agents a monetary reward for cooperation with the occupiers. Anonymous chat in a popular messenger was used for communication.

So far, the investigators of the Security Service have informed the detainees about the suspicion under Part 2 of Art. 111 of the Criminal Code of Ukraine (treason committed under martial law).

The perpetrators are in custody. They face life imprisonment.

The special operation was carried out by SBU employees in the city of Kyiv and the Kyiv region under the procedural guidance of the Kyiv regional prosecutor's office.

The SBU detained an FSB agent group that was preparing massive airstrikes in Ukraine on the eve of Easter

The Security Service detained an FSB agent group that was preparing coordinates for massive airstrikes in the Kyiv, Cherkasy, Poltava, Vinnytsia, and Kirovohrad regions on the eve of Easter.

Among the enemy's priority targets were energy-generating enterprises and logistics warehouses for the storage of fuel and lubricants.

In addition, the occupiers hoped to receive "confirmation" from their agency regarding the current geolocations of military airfields, as well as special forces guarding the General Staff of the Armed Forces.

To carry out these tasks, the Russian special service involved two of its agents from Uman and Luben. For the conspiracy, those involved acted separately, but remotely "locked" on one curator from the FSB.

The Security Service found out about all this at the initial stage of the intelligence activity of Russian agents, which it promptly exposed and documented step by step.

Thanks to this, they were able to be caught red-handed near Kyiv, where they were conducting reconnaissance near potential targets, and thereby thwart the aggressor's plans to prepare airstrikes.

As the investigation established, both persons involved, 28-year-old unemployed, were recruited remotely in March of this year by a staff member of the "Crimean Administration" of the FSB. His identity has already been established by the Security Service.

He promised his agents a monetary reward for cooperation with the occupiers. Anonymous chat in a popular messenger was used for communication.

So far, the investigators of the Security Service have informed the detainees about the suspicion under Part 2 of Art. 111 of the Criminal Code of Ukraine (treason committed under martial law).

The perpetrators are in custody. They face life imprisonment.

The special operation was carried out by SBU employees in the city of Kyiv and the Kyiv region under the procedural guidance of the Kyiv regional prosecutor's office.

🟣 Hamas is reportedly contemplating using powerful explosives to destroy sections of the Egypt-Gaza border fence, aiming to provoke a large-scale exodus of Palestinians into Egyptian territory.

This move is speculated to be a strategy to incite chaos and a high civilian death toll, in the hopes of garnering intense global pressure on Israel to halt its operation in Rafah, as per two Palestinian sources familiar with Hamas' plans, cited by

kann news

🇮🇱 @israel_report

Show older

TheOldGuy's choices:

Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.