The SBU detained a lieutenant colonel who leaked special operations plans

The Security Service of Ukraine and military counterintelligence have exposed a Russian "mole" in the ranks of the Special Operations Forces (SSO). The lieutenant colonel of the Armed Forces, who was recruited by the Russian Federation even before the start of the full-scale invasion, gave the enemy important information about the plans for special operations in the southern direction. The arrest of the agent was made possible thanks to the joint actions of counter-intelligence and the personal participation of the Commander-in-Chief of the Armed Forces Oleksandr Syrskyi.

Military counterintelligence and investigators of the Security Service, with the participation of the Commander-in-Chief of the Armed Forces and the Commander of the SSO, exposed an "activated" agent of Russian military intelligence. The attacker turned out to be a lieutenant colonel, the commander of one of the units of the SSO, recruited by the occupiers even before the start of the full-scale invasion.

In the spring of 2024, a Russian employee of the GRU remotely "activated" the agent, tasking him with transmitting data about Ukrainian special operations plans behind the front line. Of particular interest to the aggressor was information about raids by Ukrainian special forces in the Zaporizhzhia, Kherson and Crimean areas.

Using his official position, the "mole" received data on the movement routes, weapons and targets of Ukrainian fighters. The occupiers planned to use this information to destroy special forces both on the front line and in the temporarily occupied territories of southern Ukraine.

The agent also passed on data about other units of the Defense Forces of Ukraine to his Russian curator.

During the special operation, the military counterintelligence of the SBU gradually documented the crimes of the traitor and detained him. At the same time, measures were taken to ensure the security of the locations of the Defense Forces.

According to the investigation materials, the attacker was recruited by Russian military intelligence through acquaintances in the Russian Federation with whom he maintained contact.

During the searches, he was seized with means of conspiratorial communication, computer equipment, a mobile phone and media.

The detainee was notified of suspicion under Part 2 of Art. 111 of the Criminal Code of Ukraine state treason under martial law. He is currently in custody and may receive life imprisonment with confiscation of property. The special operation was conducted by the investigators of the Odesa SBU Department in cooperation with the prosecutor's office.

spot_imgspot_imgspot_imgspot_img

popular

Share this post:

More like this
HERE

Russia threatens to ban the access of IAEA experts to Zaporizhzhya NPP

Russia announced the possible termination of the mission of the International Agency...

Russia is actively building factories for the production of drones

According to reliable sources, Russia continues large-scale construction of factories...

Zelensky does not yet plan to fire Oleksandr Syrskyi

The President of Ukraine, Volodymyr Zelenskyi, according to sources, does not have...

Marco Rubio appointed US Secretary of State: We will ensure peace through strength

Florida Senator Marco Rubio has been officially appointed as the new Secretary of State...

The Volyn customs officer with $700,000 in his trunk headed the new customs office: why was the case closed?

Our sources report that Mykhailo Burdeyny, a former Volyn customs officer,...

NATO summit in The Hague: will Ukraine receive an invitation to join the Alliance in 2025?

Another summit will be held in The Hague in June 2025...

In the "Army+" application, the function of submitting a report for transfer to another unit has been activated

The Ministry of Defense of Ukraine announced the launch of a new function in...

The Sternenko Scandal: Cryptocurrencies, Luxury Shopping, and Wartime Corruption

Disabled volunteer Serhii Sternenko, who recently got into a scandal with...