War

The SBU exposed the FSB's attempt to install "bugs" on the sidelines of the Verkhovna Rada

The SBU exposed the FSB's attempt to install "bugs" on the sidelines of the Verkhovna Rada
Article top vertical

The counter-intelligence of the Security Service exposed the fact that the Russian special services recruited a former employee of the security division of the Office of the Verkhovna Rada of Ukraine.

The official was persuaded to cooperate by a staff member of the FSB during a trip to the occupied Crimea before the start of a full-scale invasion.

By the instructions of his Russian curator, the agent was supposed to collect intelligence about the visits of foreign delegations to the Ukrainian parliament, in particular, their personal composition and the content of official and informal conversations.

In addition, he was tasked with studying the possibility of installing special technical means of covert information gathering in halls and on the sidelines.

For this, the official had to use his powers, which provided admission and access to various premises of the administrative building.

However, at the time of the beginning of the full-scale aggression of the Russian Federation, he resigned from the state institution, so he did not fulfill any of the tasks of the occupiers.

Subsequently, the agent tried to get a job at a strategically important facility in the Zhytomyr region. For this, he underwent a special inspection, during which SBU specialists discovered the fact of recruitment. And the agent himself voluntarily reported and spoke in detail about the tasks of the Russian special services.

Currently, within the framework of criminal proceedings under Art. 111 (treason) of the Criminal Code of Ukraine, urgent investigative and operational actions are ongoing to establish all the circumstances of the criminal offense.

Measures to expose subversive activities were carried out by employees of the SBU of the Zhytomyr region under the procedural guidance of the Zhytomyr regional prosecutor's office.


Share this article

Facebook Twitter LinkendIn