War

SSU captures Russian agent plotting missile strike on Dnipro Thermal Power Plant and Military Hospital

SSU captures Russian agent plotting missile strike on Dnipro Thermal Power Plant and Military Hospital
Article top vertical

Cybersecurity experts from the Security Service of Ukraine have thwarted a new attempt by Russia to launch a missile strike on military and critical infrastructure in Dnipro. Thanks to a multi-stage special operation conducted directly in the regional center, an agent of the Russian Federal Security Service was apprehended while conducting reconnaissance near the Defense Forces hospital.

The perpetrator aimed to ascertain the approximate number of Ukrainian defenders undergoing stationary treatment there. Additionally, he monitored medical transport arriving at the hospital's premises. The information obtained, along with the object's coordinates, was intended to be relayed to the FSB through an anonymous chat in a messenger app.

Subsequently, the Russian forces planned to use the reconnaissance data to prepare a missile strike on the military hospital in Dnipro. Another potential target was the local thermal power plant, which provides electricity to a significant portion of the metropolis.

At the FSB's instruction, their agent recorded the perimeter of the power plant and the adjacent territory on his personal phone. This information was crucial for the Russians to assess the technical condition of the facility for "consideration" in planning a new series of aerial attacks on the city.

SSU operatives systematically documented not only the reconnaissance activities of the FSB agent but also identified the identity of his Russian handler. Same time, comprehensive measures were taken in Dnipro to ensure the safety of the personnel of the Defense Forces and provide additional protection for critical infrastructure.

 

odessajournal 0

 

According to the investigation, the agent turned out to be a 22-year-old local resident, who was remotely recruited in February of this year by a Russian special service officer. The traitor caught the Russia's attention as an active user of Russian Telegram channels searching for quick earnings. For cooperation, the traitor received monetary "compensation" to his own bank details.

During searches at the detainee's residence, a mobile phone with evidence of his criminal activity and a bank card with Russian funds were seized.

Currently, SSU investigators have informed the detainee of the suspicion under Part 2 of Article 111 of the Criminal Code of Ukraine (state treason committed under conditions of martial law).

The perpetrator is in custody, facing life imprisonment.

Share this article

Facebook Twitter LinkendIn