NatSecMedia delivers independent, on-the-ground reporting from Ukraine, with a focus on the Russian war against the Ukrainian people and the wider security challenges facing the region.

 


COMPLETE BOOK OUTLINE

THE SILENT FRONT
Inside InformNapalm’s Eleven-Year War Against Russian Imperial Aggression


CHAPTER 1 — Birth of the Citizen OSINT Resistance (2014)

1.1 The Crimea Shock: “Little Green Men”
1.2 The Social Media Discovery Moment
1.3 Roman Burko and the First Investigation
1.4 VKontakte as an Intelligence Goldmine
1.5 The 18th Motor Rifle Brigade Case
1.6 Publishing Evidence Before It Disappears
1.7 Russian OPSEC Failure (2014 Reality)
1.8 Why This Moment Changed Intelligence Forever


CHAPTER 2 — Building the Toolset

2.1 From Curiosity to Method
2.2 Social Media Exploitation Techniques
2.3 Geolocation and Visual Verification
2.4 Equipment and Uniform Identification
2.5 Network Analysis (Friends, Units, Groups)
2.6 Evidence Archiving and Transparency
2.7 Early Verification Standards


CHAPTER 3 — Early Breakthrough Cases (2014–2015)

3.1 Proof That OSINT Works
3.2 Escalation of Russian Exposure
3.3 Media Attention and First Citations
3.4 Russian Countermeasures Begin
3.5 Scaling Investigations Under Pressure


CHAPTER 4 — Unit Identifications (Encyclopedic)

4.1 Why Units Matter
4.2 Brigade-Level Attribution
4.3 Deployment Patterns Across Borders
4.4 Repeated Units, Repeated Crimes
4.5 Unit Databases as Accountability Infrastructure


CHAPTER 5 — Personnel Identifications (Encyclopedic)

5.1 From Anonymous Soldiers to Named Individuals
5.2 Officers, Pilots, Artillerymen, Mercenaries
5.3 Linking Individuals to Units and Crimes
5.4 Ethical Limits of Naming
5.5 Long-Term Accountability Value


CHAPTER 6 — Equipment Documentation (Encyclopedic)

6.1 Weapons as Evidence
6.2 Serial Numbers and Production Trails
6.3 Battlefield Systems and Civilian Harm
6.4 Equipment Linking Units and Personnel
6.5 Foundations for Sanctions Investigations


CHAPTER 7 — Cyber Operations & Defense Industry Leaks (2022–2025)

7.1 The Collapse of Social Media OSINT
7.2 Civilian Cyber Warfare and the IT Army
7.3 From Frontline Evidence to Factory Evidence
7.4 AlabugaLeaks (Shahed Drones)
7.5 SU30Leaks (Aerospace Servicing)
7.6 OKBMLeaks (Su-57 Dependencies)
7.7 What Cyber Leaks Reveal About War Capacity
7.8 Operational and Ethical Constraints


CHAPTER 8 — War Crimes Documentation

8.1 War Crimes as an OSINT Problem
8.2 MH17: Foundational Attribution
8.3 Bucha: Unit-Level Accountability
8.4 Mariupol: Siege Warfare and Pattern Evidence
8.5 Cross-Border Artillery Attacks
8.6 Systematic Patterns (2014–2025)
8.7 Evidence vs Justice


CHAPTER 9 — Sanctions Evasion Investigations

9.1 Sanctions as a Battlespace
9.2 From Equipment ID to Supply Chains
9.3 AlabugaLeaks and Component Smuggling
9.4 SU30Leaks and Export-Control Violations
9.5 Intermediaries, Shell Companies, Routes
9.6 Policy Impact and Enforcement Limits


CHAPTER 10 — Syria: The Parallel Theater

10.1 Why Syria Matters to Ukraine
10.2 Russian Intervention and Air Campaign
10.3 Cross-Theater Unit and Personnel Tracking
10.4 Hospital Bombings and War Crimes
10.5 Wagner PMC as Expeditionary Force
10.6 Lessons Imported Back to Ukraine


CHAPTER 11 — Wagner PMC: Russia’s Private Army

11.1 Deniability as Strategy
11.2 Origins in Donbas
11.3 Expansion in Syria
11.4 Globalization: Africa and Beyond
11.5 Bakhmut and the Prison-Recruit Model
11.6 Mutiny, Collapse, and Reabsorption


CHAPTER 12 — Technology & Methodology: The OSINT Revolution

12.1 The OSINT Breakthrough
12.2 Core Investigative Techniques
12.3 Verification and Transparency Standards
12.4 Russian OPSEC Evolution
12.5 Post-2022 Methodological Pivot
12.6 Why Courts Trust OSINT


CHAPTER 13 — Organizational Structure & People

13.1 Founding Network
13.2 Distributed Volunteer Model
13.3 Surviving the Death of the Founder
13.4 Internationalization of the Team
13.5 Risk, Burnout, and Security
13.6 Organizational Resilience


CHAPTER 14 — Political Warfare & Strategic Leaks (SurkovLeaks)

14.1 SurkovLeaks as Political Intelligence
14.2 Kremlin Control Architecture
14.3 Proxy Governance in Donbas
14.4 Political Engineering and Destabilization
14.5 Deniability vs Internal Correspondence


CHAPTER 15 — The Information Warfare Ecosystem

15.1 OSINT as an Ecosystem
15.2 Collaboration with Other OSINT Groups
15.3 Media Amplification and Validation
15.4 Platforms as Battlegrounds
15.5 Russian Propaganda Counter-Strategies
15.6 Effectiveness and Limits


CHAPTER 16 — Legal Frameworks & Accountability

16.1 International Humanitarian and Criminal Law
16.2 From OSINT to Courtroom
16.3 MH17 as Legal Breakthrough
16.4 War Crimes Prosecutions and Gaps
16.5 Sanctions and Export-Control Law
16.6 Why Accountability Is Slow


CHAPTER 17 — Lessons Learned: Building an OSINT Organization

17.1 Founding From Zero
17.2 Scaling Without Salaries
17.3 Burnout, Funding, and Survival
17.4 Adaptation When Sources Collapse
17.5 What Worked, What Failed
17.6 Replicability in Future Conflicts


CHAPTER 18 — The Future of Civilian Intelligence (2025–2035)

18.1 AI-Assisted OSINT
18.2 Satellite Ubiquity and Real-Time War
18.3 Cyber Operations as Norm
18.4 Blockchain and Sanctions Tracking
18.5 Deepfakes and Truth Erosion
18.6 Scenarios: Optimistic, Pessimistic, Realistic


CHAPTER 19 — Conclusion: The Silent Front Endures

19.1 What Was Achieved
19.2 What Was Lost
19.3 Justice Delayed, Not Denied
19.4 Civilian Intelligence as Permanent Feature
19.5 InformNapalm’s Legacy
19.6 The Next Silent Front