Here is today's map of the security situation in eastern Ukraine, according to the National Security and Defense council (click to enlarge):
The Kremlin has announced the sudden death of the head of military intelligence, who played a key role in its actions in Ukraine:
The Kremlin says the head of Russia's military intelligence agency, which is known as the GRU, has died unexpectedly.
A statement posted on the Kremlin website on January 4 said that President Vladimir Putin expressed condolences to Igor Sergun's relatives over his "sudden death."
Sergun, who had headed the GRU since 2011 and was also a deputy head of the Russian military General Staff, was 58 years old.
The Kremlin statement did not give a cause of death.
It quoted Putin as saying that Sergun had dedicated his "entire life...to serving the homeland and the armed forces."
GRU is a secretive agency, and Sergun was not widely known as a public figure.
His death comes amid an upsurge in Russian military activity abroad. Russia launched air strikes in Syria in September and is accused by the Kyiv and the West of direct military support for separatists in a conflict in eastern Ukraine that has killed more than 9,000 people.
Two Russians captured in Ukraine last year have said they were active GRU officers when they were seized, while the Russian military says they were not serving at the time. (w/ TASS)
This ends our live blogging for January 4. Be sure to check back tomorrow for our continuing coverage.
Cybersleuths say Ukraine blackout first caused by malware:
Highly destructive computer malware infected power authorities in Ukraine last week and caused a power failure that affected hundreds of thousands of homes, researchers say.
The outage on December 23 left about half of the homes in the Ivano-Frankivsk region of Ukraine without electricity. Researchers from security firm iSIGHT Partners, who studied samples of the malicious code that infected at least three regional operators, confirmed the malware led to "destructive events" that in turn caused the blackout.
"It's a milestone," John Hultquist of iSIGHT told Arstechnica.com. "It's the major scenario we've all been concerned about for so long."
"This is the first time we have proof and can tie malware to a particular outage," Trend Micro researcher Kyle Wilhoit told Reuters. "It is pretty scary."
Antivirus provider ESET said multiple Ukrainian power authorities were infected by "BlackEnergy," a package discovered in 2007 that has been repeatedly updated to include new destructive functions.
Until now, BlackEnergy has mainly been used to spy on news organizations, power companies, and other industrial groups. A Moscow-backed group, Sandworm, is suspected of using it for targeted attacks. (Reuters, Arstechnica.com)
Russian soldiers linked to MH17 downing:
Dutch prosecutors are investigating a claim by a citizen-journalist group that at least 20 Russian soldiers were involved in the downing of Malaysia Airlines flight MH17 over eastern Ukraine in 2014.
The Britain-based Bellingcat group said it had identified up to 100 Russian soldiers who may have knowledge of the movements of the Buk missile launcher that destroyed the Boeing 777 on July 17, 2014, killing all 298 on board.
In an interview with the Dutch TV channel NOS on January 3, Bellingcat founder Eliot Higgins said his organization believed at least 20 soldiers in an air-defense unit based in Kursk "probably" either fired the missile or know who fired it.
The sources for the group's findings include the soldiers' social-media accounts, photos posted online, and army data about personnel deployment that was available online.
"We have the names and photos of the soldiers in the June convoy who traveled with the MH17 Buk, their commanders, their commanders’ commanders, etc," Higgins told the London Telegraph.
He added that the group's redacted 123-page report on the matter will be released shortly.
Bellingcat specializes in trawling through data on social media and other online sources. It has been investigating the crash since it occurred.
It reported in 2014 that a Buk mobile launcher was spotted on July 17 in an area controlled by pro-Russian separatists and said that the missile launcher came from a military convoy from Russia's 53rd Antiaircraft Brigade -- a unit based in Kursk but sent on maneuvers near the Ukrainian border.
Dutch prosecutors in charge of the official investigations of the MH17 crash said on January 4 that they were investigating the claims that Russians were involved.
"We received the report just after Christmas," Wim de Bruin, a spokesman for the Dutch prosecutor's office, told AFP.
"We will seriously study it and determine whether it can be used for the criminal inquiry," he said.
A criminal investigation by the prosecutors’ office is expected to name suspects in the case later this year.
An air-accident investigation by the Dutch Safety Board released in October concluded that the Boeing 777 was destroyed by a Buk antiaircraft missile fired from a position inside separatist territory.
Russia has denied sending troops or weapons into eastern Ukraine at any time since the war broke out in 2014, and has blamed Kyiv for the shootdown.
The Donetsk People's Republic, the Russian-backed group that controls the area, insists it never had access to BUK missiles and has dismissed evidence showing a BUK launcher operating in the area when the jet was shot down. (AFP, Telegraph)