SSU, Defense Forces Target Russian Air Defense Assets at Belbek Airfield

SSU, Defense Forces Target Russian Air Defense Assets at Belbek Airfield
FP-1 launch using a rocket booster. Photo credits: Fire Point

Special Operations Center “Alpha” of the Security Service of Ukraine (SSU), together with the Defense Forces of Ukraine, struck Russian forces’ infrastructure and air defense assets at Belbek military airfield in Crimea.

The SSU press service reported on this.

The Pantsir-S2 air defense system, a hangar housing S-400 radar equipment, Orion and Forpost UAV control systems, a ground-to-air data transmission point, a control tower, and an airfield hangar were hit.

NASA FIRMS satellite service confirmed the targets and recorded a large fire on the airfield territory starting at around 02:00 am.

Fire at Belbek airfield, May 17, 2026. Photo credits: NASA FIRMS

In addition, special forces reported the destruction of the Angstrem plant, which supplies semiconductors for Russia’s defense industry, the Solnechnogorsk oil pumping station, and the Moscow Oil Refinery.

“SSU special operations are critical for weakening Russia’s military capabilities. The destruction of military-industrial facilities, military infrastructure, and oil logistics reduces the enemy’s ability to continue the war against Ukraine. These strikes show that even the heavily protected Moscow region is not safe. The SSU and the Defense Forces of Ukraine will continue high-precision operations aimed at destroying enemy military resources,” SSU Chief Yevhen Khmara said.

Russian Orion-E strike UAV. August 2021. Photo credits Russian media

In early May, during a joint operation of the Security Service of Ukraine and the Navy, Ukrainian naval drones struck two tankers from Russia’s shadow fleet in waters near the entrance to the port of Novorossiysk.

Share this post:

SUPPORT MILITARNYI

PrivatBank ( Bank card )
5169 3351 0164 7408
Bank Account in UAH (IBAN)
UA043052990000026007015028783
BTC
bc1qg0z99m95fte7kj8faa7h2kvnq92wvc53exe8gm
USDT
0x8676644fA7B6d328310283cAC1065Ae01d97CEe7
ETH
0xfD02863D3289416fcF50975c9DFda13623f97758
Popular
Button Text