SSU detains another spotter guiding russian strikes at Odesa
The Security Service has exposed another enemy agent in Odesa. He adjusted russian airstrikes on the regional centre. One of the perpetrator’s main tasks was to identify the coordinates of local air defence systems.
The SSU detained him during counter-sabotage measures.
The spotter is a local computer repair technician whom russian intelligence recruited via TikTok.
He came to their attention due to his pro-kremlin views, which he had posted on social media.
It was established that the ruscists used a fake account belonging to a foreign journalist to recruit the man.
After receiving instructions, the asset began tracking combat positions of anti-aircraft missile systems, radar stations, and mobile air defence groups defending Odesa.
To do this, he rode around the area on a moped and recorded the coordinates of potential ‘targets’ on Google Maps.
He stored the collected information on his smartphone for subsequent transmission to his handler in russia via an anonymous chat in a messaging app.
It was also documented how the suspect coordinated his actions with a russian intelligence operative using text and voice messages.
During a search, a mobile phone containing evidence of his work for the enemy was seized.
SSU investigators have notified the detainee of suspicion under Article 111.2 of the CCU (high treason committed under martial law).
The suspect is in custody and faces life imprisonment with confiscation of property.
The operation was carried out by the SSU Odesa Office under the procedural supervision of the regional Prosecutor’s Office.