This blogpost is the third part of a series that I will publish in the last months before the MH17 trial starts, on March 9, 2020. It will review important parts of the evidence as publically disseminated or (implicitly) endorsed by the JIT.
As social media and open source intelligence (OSINT) played a pivotal role, first part of the series contained an assessment of the OSINT method the JIT also seemed to have embraced. The second part, Strange Ways, showed examples how some parts of the evidence came out in the open, who were the key players and how social and regular media channels were used to clean the alleged evidence from suspicion.
The research presented in the series will reveal more about the questions how the “main scenario” the JIT has worked with was framed, how the OSINT evidence has come about, who have been involved and how the Dutch Safety Board investigations have supported the scenario. The series is supported by an assessment of most publically known evidence (comprising videos, photos, written messages and intercepts by the Ukrainian secret service) in a report of more than 100 pages containing more than 150 links to original sources and verifications.
It seems most if not all evidence ultimately arrived from a special unit, partly operating overtly and partly covertly, tied to the Interior Ministry of Ukraine and the organization that politically resorts under it, the Ukrainian secret service SBU. This blogpost, part 3 of the series called “Behind the screens”, will shed more light on this unit of ultranationalist militia, spotters, infowarriors and SBU operatives.