The SBU detained a lieutenant colonel who leaked special operations plans

The Security Service of Ukraine and military counterintelligence have exposed a Russian "mole" in the ranks of the Special Operations Forces (SSO). The lieutenant colonel of the Armed Forces, who was recruited by the Russian Federation even before the start of the full-scale invasion, gave the enemy important information about the plans for special operations in the southern direction. The arrest of the agent was made possible thanks to the joint actions of counter-intelligence and the personal participation of the Commander-in-Chief of the Armed Forces Oleksandr Syrskyi.

Military counterintelligence and investigators of the Security Service, with the participation of the Commander-in-Chief of the Armed Forces and the Commander of the SSO, exposed an "activated" agent of Russian military intelligence. The attacker turned out to be a lieutenant colonel, the commander of one of the units of the SSO, recruited by the occupiers even before the start of the full-scale invasion.

In the spring of 2024, a Russian employee of the GRU remotely "activated" the agent, tasking him with transmitting data about Ukrainian special operations plans behind the front line. Of particular interest to the aggressor was information about raids by Ukrainian special forces in the Zaporizhzhia, Kherson and Crimean areas.

Using his official position, the "mole" received data on the movement routes, weapons and targets of Ukrainian fighters. The occupiers planned to use this information to destroy special forces both on the front line and in the temporarily occupied territories of southern Ukraine.

The agent also passed on data about other units of the Defense Forces of Ukraine to his Russian curator.

During the special operation, the military counterintelligence of the SBU gradually documented the crimes of the traitor and detained him. At the same time, measures were taken to ensure the security of the locations of the Defense Forces.

According to the investigation materials, the attacker was recruited by Russian military intelligence through acquaintances in the Russian Federation with whom he maintained contact.

During the searches, he was seized with means of conspiratorial communication, computer equipment, a mobile phone and media.

The detainee was notified of suspicion under Part 2 of Art. 111 of the Criminal Code of Ukraine state treason under martial law. He is currently in custody and may receive life imprisonment with confiscation of property. The special operation was conducted by the investigators of the Odesa SBU Department in cooperation with the prosecutor's office.

spot_imgspot_imgspot_imgspot_img

popular

Share this post:

More like this
HERE

Mourning Day in Kiev - and Potap celebrates a new clip

April 25, when Kyiv officially announced the day of mourning for ...

Ukraine proposes to hold a summit in Rome on the day of Pope's funeral

Ukraine proposed to hold an important international summit in Rome in ...

Virgo, Lion, Pisces: Three Zodiac Signs Lucky this Weekend

Astrologers predicted that these weekends, April 26-27, 2025, ...

The atmospheric front will bring cold and thunderstorms: what to expect in Ukraine

From today Ukraine will be covered with thunderstorms, and the temperature ...

Work, biological weapons and chemical attacks: How can AI can destroy humanity by 2030

Researchers from AI Futures Project (USA) have posted a shocking ...

Tax will see everything: in Ukraine create a register of accounts and safes

The Government of Ukraine has approved a bill that provides for the creation of a centralized register ...

99% voluntarily: Ludomans themselves are asked to close them access to excitement

In 2024, the number of Ukrainians who voluntarily restricted themselves ...

Love during the war: Igor Pelikh's son married in Kiev

On April 24, Ivan Pelikh's wedding took place in Kiev --...