SSU exposes deserter who guided russian airstrikes on Dnipro

The SSU Military Counterintelligence and investigators, with the assistance of the Commander-in-Chief of the Armed Forces of Ukraine, have exposed another agent of russia’s federal security service within the ranks of the Armed Forces of Ukraine.

The perpetrator turned out to be a conscript who had been recruited by the enemy. After deserting his military unit, he began adjusting russian strikes on the city of Dnipro.

After going AWOL, the man began seeking ‘easy money’ on Telegram channels, where he came to the FSB’s attention.

After agreeing to cooperate with them, the agent travelled around the city and its outskirts to identify and transmit the coordinates of defence and critical infrastructure facilities.

Among the targets he attempted to locate were checkpoints and backup command posts of Ukrainian troops, as well as stations of the regional branch of Ukrzaliznytsia [Ukrainian Railways].

To secretly record potential targets, the agent filmed the locations while pretending to be talking on the phone.

A short while after beginning his reconnaissance activities, he decided to temporarily hide at his relatives’ home in Dnipropetrovsk region.

However, the SSU had already documented his actions and detained him during the final stage of the special operation.

A smartphone containing evidence of his cooperation with the enemy, including encrypted video files showing military facilities along with their coordinates marked on Google Maps, was seized during the search.

SSU investigators served the detainee a notice of suspicion under Article 111.2 of the CCU – high treason, committed under martial law.

The suspect is in custody without bail and faces life imprisonment with confiscation of property.

The operation was conducted jointly the SSU Dnipropetrovsk Office under the procedural supervision of Dnipro Specialised Defence Prosecutor’s Office of the Eastern Region.