War

SSU exposed collaborators in the capital's IT company, which supplied office equipment and software to the occupiers

SSU exposed collaborators in the capital's IT company, which supplied office equipment and software to the occupiers
Article top vertical

As a result of special operations of the Security Service in different regions of Ukraine, enemy agents and collaborators were detained. Some of them have already received real terms of imprisonment.

in Kyiv:

SSU counterintelligence exposed two founders of one of the capital's IT companies, which supplied the occupiers with software and office equipment. Among their customers were representatives of the so-called "power bloc of the DPR."

It was established that the criminal activity was organized by two residents of the Donetsk region, who arrived in Kyiv in 2014 and found a business in the field of information technology.

They opened their subsidiaries in Moscow, St. Petersburg, and the temporarily occupied Donetsk. And continued to cooperate with the occupiers after the full-scale aggression of the Russian Federation.
The monthly "profits" of collaborators amounted to more than 4 million UAH.

They are currently detained, and all necessary investigative and operational measures are being taken.

In addition, another collaborator was detained in the Kyiv region. He turned out to be a resident of Dymer, who called for support for the aggressors during the temporary occupation of the village.

The attacker also tried to impose a negative attitude on our state and denied the crimes of the racists against the civilian population.

In the Donetsk region:

An enemy agent was detained who was collecting information on the deployment of units of the Armed Forces and the National Police on the territory of Slovyansk. His "liaison" represented a hostile group in the region's temporarily occupied territory.

In the Chernihiv region:

The SBU reported the suspicion of a blogger who publicly justified Russia's aggression against Ukraine. Through her own social network page, she disseminated Kremlin content: misinformation about the destruction of civilian infrastructure by russians, and denied the facts of their crimes against civilians.

During searches of the blogger's residence, law enforcement officers found computer equipment and means of communication with evidence of illegal activities.

In the Luhansk region:

According to the SSU, two militants of the so-called "LPR", who were taken prisoner in March this year, were sentenced to imprisonment. The court sentenced them to 8 and 10 years in prison, respectively.

Two residents of the region have voluntarily joined enemy armed groups. As part of the grenade launchers, they fired on the positions of the anti-terrorist operation and environmental protection forces. They took part in hostilities against Ukrainian troops in the Shchastya and Severodonetsk districts.

The former head of one of the branches of the national energy company was also exposed for cooperation with the occupiers. While in the temporarily occupied territory of the Luhansk region, he voluntarily agreed to hold the "position" of the so-called "head of Luhansk TPP", seized by the aggressors.

The attacker has now been informed about the suspicion of treason. Measures are underway to detain him and bring him to justice.

In the Rivne region:

According to the SBU, a Russian agent who was gathering intelligence on the deployment of Ukrainian troops, equipment, and freight locomotives movement through the Rivne station was sentenced to 13 years in prison. The agent was detained while trying to pass secret information to the occupiers.

The Security Service also identified two high-ranking officials of the Russian occupation groups involved in demolishing hydraulic structures on the North Crimean Canal. The issue of declaring the perpetrators internationally wanted is currently being resolved.

All the revealed facts are under investigation to identify all those involved in the crimes and bring them to justice.

Share this article

Facebook Twitter LinkendIn