Ah, the Conflict Intelligence Team. An organization that seems to exist in the shadows, piecing together truths others would rather keep buried. They call themselves an "independent investigative organization," which, in my experience, usually translates to "a bunch of people doing the heavy lifting nobody else wants to touch." Their abbreviation, CIT, or sometimes CITeam, is less a moniker and more a quiet promise of disruption. Founded in 2014, a year that seemed to bleed into chaos, by Ruslan Leviev, a name that’s become synonymous with digging where it’s inconvenient. They operate as an NGO, a label that feels almost quaint when you consider the subjects of their scrutiny: the Activities of the Russian Armed Forces.
Their headquarters have had a rather nomadic quality, wouldn't you say? Initially rooted in Moscow, Russia, from 2014 to 2022, they then packed up and relocated to Tbilisi, Georgia, in 2022. One can only speculate what necessitated such a move, but given the nature of their work, it’s hardly surprising. Their methods are a blend of the digital and the deeply human: Open-source intelligence, which is essentially sifting through the digital detritus of the world – social media, satellite imagery, leaked documents, you name it – and human intelligence, which is far more complicated and, frankly, more dangerous. They operate in the realm of War journalism, a field where the truth often comes at a steep price. As of 2022, their membership is listed as a mere 5 individuals. Small, yes, but perhaps that's the point. Less noise, more precision. Their official languages are Russian and English, which makes sense if you're trying to understand and disseminate information across borders. Their website, .citeam.org, is a testament to their digital presence, a digital footprint in a world that’s increasingly defined by them. They were formerly known as War in Ukraine (WiU), a name that clearly signaled their initial focus.
The Conflict Intelligence Team (CIT) is, by all accounts, an independent investigative organization. Founded by Ruslan Leviev, a figure who seems to have emerged from the Russian opposition movement, their specialty lies in the meticulous dissection of information, primarily through open-source intelligence and human intelligence. Their reputation is built on exposing the machinations of the Russian Armed Forces across various theaters of conflict, including but not limited to Ukraine, Syria, Libya, and the Central African Republic. Established in 2014, CIT has managed to forge collaborations with prominent media outlets, a feat that speaks volumes about the credibility and impact of their findings. However, this very success has also placed them squarely in the crosshairs, attracting significant threats. The decision to relocate to Georgia in 2022 was, by their own account, a necessity to continue their work unimpeded by legal and physical dangers within Russia. The [citation needed] tag is a bureaucratic quibble; the reality of their situation is far more tangible.
History
The genesis of this group can be traced back to Ruslan Leviev, a programmer hailing from Surgut, Russia. Leviev recounts an epiphany in 2011, a stark realization of pervasive fraud during the elections to the State Duma. This event, it seems, was the catalyst that propelled him into the orbit of Russian opposition activities. He then embarked on establishing a venture to broadcast events, particularly those surrounding the Russo-Ukrainian War, with an early focus on the Euromaidan protests in Ukraine. Following the annexation of Crimea by the Russian Federation and the subsequent eruption of the war in Donbas, Leviev turned his investigative lens towards these conflicts, paying particular attention to the involvement of the Russian military. Initially, the group operated under the name War in Ukraine (WiU). However, by September 2015, coinciding with the commencement of the Russian military intervention in the Syrian civil war, they rebranded themselves to the now-familiar Conflict Intelligence Team. What sets CIT apart is its relatively small size, with just six participants, and its unique composition: all members are Russian citizens. This internal homogeneity, while perhaps a source of strength in understanding the context, also makes them a singular target. The identities of most members are, understandably, kept under wraps for security reasons.
Up until 2022, CIT's operational base was primarily Russia, a period marked by persistent threats. These ranged from attempts to instigate criminal proceedings against Leviev to summonses to the military prosecutor's office, a physical assault by an unidentified assailant, a barrage of death threats via phone calls, and a sophisticated hacker attack orchestrated by the CyberBerkut group. These incidents paint a grim picture of the environment in which they operated.
The turning point, or perhaps the inevitable consequence, came on March 5, 2022. CIT publicly announced their departure from Russia, a strategic move to ensure the continuation of their work. By May of the same year, Leviev found himself facing charges in exile, accused of violating Russia's fake news law enacted in March 2022. This development drew sharp criticism from the Committee to Protect Journalists, highlighting the international concern over the suppression of independent reporting.
More recently, in August 2023, the Russian government escalated its actions by designating the group an "undesirable organization". This designation effectively criminalizes their efforts to document and investigate armed conflicts involving Russian forces, a chilling testament to the lengths to which some governments will go to control the narrative.
Activity
CIT's investigations are not confined to obscure corners of the internet; they are published and amplified through collaborations with major global media outlets. This has included outlets such as the BBC, Reuters, Sky News, and Der Spiegel, lending their findings a reach that transcends niche audiences.
The team has undertaken a series of critical investigations into the presence and activities of Russian troops in Syria. These investigations have delved into sensitive areas, including the deaths of Russian soldiers and the alleged use of cluster munitions within the conflict zone. By meticulously analyzing photographic evidence and mapping data, CIT has effectively challenged the official Russian narrative, disproving claims that Russian forces in Syria were not engaged in ground combat. This rigorous approach to evidence is what lends their work such weight.
In tandem with Bellingcat, CIT delved into the tragic circumstances surrounding the Boeing 777 shoot-down in the Donetsk region in 2014. Their collaborative efforts, alongside Bellingcat, The Insider, and Proekt, were instrumental in identifying the real names of the individuals suspected of orchestrating the poisoning of Sergei and Yulia Skripal in 2018. This is not merely journalism; it's a form of digital archaeology, unearthing identities from the digital ether. In 2020, CIT turned its attention to the murder of Alexander Taraikovsky, a participant in the 2020–2021 Belarusian protests, shedding light on a case shrouded in official ambiguity. Prior to the 2022 Russian invasion of Ukraine, the group provided detailed reporting on Russia's preparations, a foresight that proved tragically accurate.