Military counterintelligence of the Security Service of Ukraine has uncovered another attempt by Russian military intelligence (known as the GRU) to infiltrate the Defense Forces of Ukraine.
As a result of preemptive actions in the Dnipropetrovsk region, a mobilized soldier assigned to a combat brigade of the State Special Transport Service of the Ministry of Defense of Ukraine, who was working for the Russians, was detained.
The arrest took place while the suspect was still undergoing general military training at the training ground.
The investigation revealed that the soldier was recruited by the Russian forces immediately after mobilization into the unit. He came under GRU’s radar due to his pro-Russian comments on social media.
The agent’s main task was to coordinate Russian airstrikes against the Defense Forces in the Dnipropetrovsk region.
It was documented that the suspect “leaked” to the Russian intelligence the geolocation of the military unit where he was undergoing training.
Afterward, the agent began collecting coordinates of neighboring Defense Forces units that the Rusian forces planned to target with missile strikes.
The gathered intelligence was transmitted by the agent via messenger to his handler in the form of Google Maps markers with detailed descriptions of potential “targets.”
SSU military counterintelligence exposed the “mole” in advance, documented his contacts with the Russian GRU, and detained him. During the special operation, measures were taken to secure Defense Forces locations in the area of Russian reconnaissance activity.
During a search, the suspect’s phone was seized, containing evidence of his work for the Russian force.
SSU investigators in Dnipropetrovsk region have charged him under Part 2 of Article 111 of the Criminal Code of Ukraine (high treason committed during martial law).
The perpetrator is held in custody without the right to bail. He faces life imprisonment with confiscation of property.