The SBU detained a lieutenant colonel who leaked special operations plans

The Security Service of Ukraine and military counterintelligence have exposed a Russian "mole" in the ranks of the Special Operations Forces (SSO). The lieutenant colonel of the Armed Forces, who was recruited by the Russian Federation even before the start of the full-scale invasion, gave the enemy important information about the plans for special operations in the southern direction. The arrest of the agent was made possible thanks to the joint actions of counter-intelligence and the personal participation of the Commander-in-Chief of the Armed Forces Oleksandr Syrskyi.

Military counterintelligence and investigators of the Security Service, with the participation of the Commander-in-Chief of the Armed Forces and the Commander of the SSO, exposed an "activated" agent of Russian military intelligence. The attacker turned out to be a lieutenant colonel, the commander of one of the units of the SSO, recruited by the occupiers even before the start of the full-scale invasion.

In the spring of 2024, a Russian employee of the GRU remotely "activated" the agent, tasking him with transmitting data about Ukrainian special operations plans behind the front line. Of particular interest to the aggressor was information about raids by Ukrainian special forces in the Zaporizhzhia, Kherson and Crimean areas.

Using his official position, the "mole" received data on the movement routes, weapons and targets of Ukrainian fighters. The occupiers planned to use this information to destroy special forces both on the front line and in the temporarily occupied territories of southern Ukraine.

The agent also passed on data about other units of the Defense Forces of Ukraine to his Russian curator.

During the special operation, the military counterintelligence of the SBU gradually documented the crimes of the traitor and detained him. At the same time, measures were taken to ensure the security of the locations of the Defense Forces.

According to the investigation materials, the attacker was recruited by Russian military intelligence through acquaintances in the Russian Federation with whom he maintained contact.

During the searches, he was seized with means of conspiratorial communication, computer equipment, a mobile phone and media.

The detainee was notified of suspicion under Part 2 of Art. 111 of the Criminal Code of Ukraine state treason under martial law. He is currently in custody and may receive life imprisonment with confiscation of property. The special operation was conducted by the investigators of the Odesa SBU Department in cooperation with the prosecutor's office.

spot_imgspot_imgspot_imgspot_img

popular

Share this post:

More like this
HERE

In Lviv, a man who sold his daughter to a military service for 200 thousand was exposed

In Lviv, a 70-year-old man is suspected of trafficking in human beings after ...

A poisonous threat from the tropics: a fish-ball appeared in the Black Sea

In the coastal waters of the Black Sea again fix a dangerous alien ...

Is the "eating sequence" really helps control sugar and lose weight

"Eating Sequence" is a new food trend that is gathering ...

Abortion Prohibition: Ivano-Frankivsk signed appeals to the President and Verkhovna Rada

At the session of the Ivano-Frankivsk City Council, deputies supported the appeal to ...

Research: Vaccination rescues millions but humanity turns away from vaccines

The level of vaccination of children in the world is rapidly decreasing, putting under ...

Business on Trust: In Ternopil spouses robbed American investors and legalized property

Law enforcement officers exposed the spouses from Ternopil, which, according to the investigation, ...

In Lviv region, police detained a man for murder of mother and sister

A tragic case occurred in Vinnytsia in Lviv in the morning ...

In the US, tested a drug that can cure type 1 diabetes

In the US, ten people with type 1 diabetes more ...