The SBU detained a lieutenant colonel who leaked special operations plans

The Security Service of Ukraine and military counterintelligence have exposed a Russian "mole" in the ranks of the Special Operations Forces (SSO). The lieutenant colonel of the Armed Forces, who was recruited by the Russian Federation even before the start of the full-scale invasion, gave the enemy important information about the plans for special operations in the southern direction. The arrest of the agent was made possible thanks to the joint actions of counter-intelligence and the personal participation of the Commander-in-Chief of the Armed Forces Oleksandr Syrskyi.

Military counterintelligence and investigators of the Security Service, with the participation of the Commander-in-Chief of the Armed Forces and the Commander of the SSO, exposed an "activated" agent of Russian military intelligence. The attacker turned out to be a lieutenant colonel, the commander of one of the units of the SSO, recruited by the occupiers even before the start of the full-scale invasion.

In the spring of 2024, a Russian employee of the GRU remotely "activated" the agent, tasking him with transmitting data about Ukrainian special operations plans behind the front line. Of particular interest to the aggressor was information about raids by Ukrainian special forces in the Zaporizhzhia, Kherson and Crimean areas.

Using his official position, the "mole" received data on the movement routes, weapons and targets of Ukrainian fighters. The occupiers planned to use this information to destroy special forces both on the front line and in the temporarily occupied territories of southern Ukraine.

The agent also passed on data about other units of the Defense Forces of Ukraine to his Russian curator.

During the special operation, the military counterintelligence of the SBU gradually documented the crimes of the traitor and detained him. At the same time, measures were taken to ensure the security of the locations of the Defense Forces.

According to the investigation materials, the attacker was recruited by Russian military intelligence through acquaintances in the Russian Federation with whom he maintained contact.

During the searches, he was seized with means of conspiratorial communication, computer equipment, a mobile phone and media.

The detainee was notified of suspicion under Part 2 of Art. 111 of the Criminal Code of Ukraine state treason under martial law. He is currently in custody and may receive life imprisonment with confiscation of property. The special operation was conducted by the investigators of the Odesa SBU Department in cooperation with the prosecutor's office.

spot_imgspot_imgspot_imgspot_img

popular

Share this post:

More like this
HERE

The Carrot That Destroyed the Liver: When “Healthy” Eating Becomes Deadly

In Great Britain, they still remember an amazing but tragic story...

Soldiers laid tiles for their commander's mother-in-law instead of duty

The State Bureau of Investigation has completed a pre-trial investigation into the commander of one...

In the Dniprovskyi district of Kyiv, a student jumped out of a window during lessons

An emergency occurred in the Dniprovskyi district of Kyiv - a 17-year-old...

Yermak's name was used in a large fraud scheme

In Kyiv, police detained a group of fraudsters who used the name...

These foods will ruin your sleep: nutritionists warn

Dinner is not only the end of the day, but also an important...

Kyiv Health Department under suspicion of large-scale corruption

Law enforcement officers are investigating a large-scale corruption scheme in the field of medical procurement...

People's Deputy Gerus's family did business with Putin's financier: SBU is still silent

MP from the Servant of the People party Andriy Gerus is back...

What Ukrainian surnames tell us about our ancestors

Ukrainian surnames are not just words in documents,...