Military counter-intelligence of the Security Service conducted a multi-stage special operation in the Zhytomyr region. As a result of operational measures, another Russian “mole” was exposed in the ranks of the Armed Forces of Ukraine.
The attacker collected intelligence for the FSB about the technical condition of Ukrainian airfields and their possible use by the combat aircraft of the Armed Forces.
He also gave the aggressor the locations of warehouses with ammunition and fuel and lubricants of the Defense Forces.
In addition, on the instructions of the Russian special services, their agent tried to identify the locations and movements of foreign armored personnel carriers “MaxxPro”.
Employees of the Security Service detained an enemy henchman while collecting intelligence on Ukrainian military facilities.
According to the investigation, the detainee turned out to be a local resident who was mobilized to the ranks of the Armed Forces and served in one of the garrisons in the north of Ukraine.
It was established that at the beginning of May of this year, the man was remotely recruited by an FSB staff member to carry out intelligence and subversive activities against our state.
To fulfill the tasks of the Russian special service, their agent traveled around different areas and secretly observed military facilities, and also tried to use his acquaintances “in the dark”.
He used the Telegram messenger to communicate with the FSB.
During the searches, a mobile phone with evidence of criminal activities was found in the suspect’s possession.
So far, the investigators of the Security Service have informed the detainee of the suspicion under Part 2 of Art. 111 of the Criminal Code of Ukraine (treason committed under martial law).
The perpetrator is in custody. He faces life imprisonment.
The special operation was conducted under the procedural guidance of the Prosecutor General’s Office.