Counterintelligence of the Security Service detained another participant in the espionage network of the Russian Armed Forces General Staff operating in Odessa.
The criminal provided the aggressor with dozens of geolocations where, according to her, Ukrainian Armed Forces units were supposedly based.
In August of this year, the SSU exposed and charged two other participants in this espionage network, including an agent with the operational pseudonym "Diezel" and his wife, who was a liaison for the Russian game and is currently evading justice in St. Petersburg.
The third accomplice has now been arrested. Using her coordinates, occupiers carried out targeted aerial strikes, primarily using kamikaze drones like "Shahed."
On the fuselages of enemy drones, invaders made inscriptions "on behalf of" a pro-Kremlin Telegram channel, which the Russian military intelligence uses for recruitment and collaboration with agents.
The criminal maintained communication with the coordinator of the espionage network, a staff member of the 3rd operational department of the 316th intelligence center of the Russian game, Grigory Ivanov, through an anonymous chat in a popular messenger.
After enemy strikes on Odessa, the perpetrator reported to her "curator" about the consequences of the "flights."
Additionally, she conducted reconnaissance near the infrastructure objects of the regional center that aroused the interest of the military intelligence of the aggressor country.
SSU operatives exposed the reconnaissance and subversive activities of the accomplice, apprehending her at her residence.
According to the investigation, the local businesswoman was identified as an accomplice to the enemy, recruited remotely by the Russian game in June of this year.
She came into the invaders' field of view due to her activity in their Telegram channel. The perpetrator is in custody and faces possible life imprisonment.