The Military Counterintelligence of the Security Service of Ukraine, with the assistance of the Commander-in-Chief of the Armed Forces of Ukraine, has detained a Russian agent operating within the combat zone in the Kharkiv region. The individual, a contractor in one of the Ukrainian Armed Forces brigades, had been working for Russian military intelligence (GRU).
According to case materials, the traitor had been leaking the locations of his unit and others in the Kupiansk direction to Russian forces. The agent used a messaging app to communicate with his Russian handler, providing coordinates for the positions of Ukrainian defense forces.
The Russian forces were particularly interested in the locations of command posts, fortifications, and fire positions of Ukraine’s Armed Forces. The traitor communicated via voice messages in an anonymous chat to relay this critical information.
Using the coordinates provided by the agent, the Russians prepared missile and bomb strikes. Before the attacks, the traitor was supposed to move out of the strike zone.
The SSU’s counterintelligence exposed the Russian intentions in advance and prevented their execution. After securing the locations of the Ukrainian defense forces, the traitor was arrested near the front-line combat zone.
During a search, two phones were seized, which he had been using for communication with Russian military intelligence.
Investigators revealed that the agent had been remotely recruited by the occupiers in January of this year. The SSU also identified his handler, a Russian military intelligence officer stationed on the eastern front.
The SSU has notified the agent of suspicion under part 2 of Article 111 of the Criminal Code of Ukraine (high treason committed under martial law). The suspect has been placed under arrest without the possibility of bail and faces life imprisonment with asset confiscation.