Counterintelligence of the Security Service in Odessa exposed another enemy agent who was operating under the assignment of the Main Directorate of the General Staff of the Armed Forces of the Russian Federation. The offender conducted reconnaissance of the positions of the Ukrainian Armed Forces in the region.
To conceal his intelligence and subversive activities, he posed as a driver for a local branch of an international charitable organization.
Operating undercover, the Odessa resident traveled throughout the city's territory, attempting to identify key defensive positions and other locations where Ukrainian military units were based.
The enemy was also interested in the likely routes of movement of Ukrainian troops toward the southern front.
According to the investigation, the accomplice of the aggressor was a local resident who, in 2014, conducted active activities within pro-Russian organizations at the direction of Russian special services. However, after the failure of the Kremlin's "Russian Spring" project in Odessa, his handlers put him on standby.
Shortly after February 24, 2022, the figure involved in this incident was contacted by an operative from the intelligence GRU network, who was operating from the territory of the Russian Federation. This operative activated the informant to collect intelligence information in the regional center.
For communication with the occupiers, the figure used pre-established communication channels through messaging apps.
During a search of the perpetrator, weapons with ammunition were seized, as well as a mobile phone containing evidence of his correspondence with the aggressor.