SSU exposes top SSU official on high treason - Militarnyi
SSU exposes top SSU official on high treason
Vasyl Maliuk detains the chief of staff of the SSU Anti-Terrorist Center, February 12, 2025. Photo: SSU
News

The Security Service of Ukraine has exposed and detained the chief of staff of the SSU Anti-Terrorist Center, who was spying for Russia.

The press service of the Security Service of Ukraine reported on this.

The operational and investigative team that was responsible for the investigation of the traitor documented 14 episodes of illegal activity in favor of Russia. The head of the department reported on all stages of the special operation directly to the President of Ukraine.

“It was a highly complex development and subsequent multi-step implementation, during which we used all possible overt and covert forms and methods of our activities and the entire palette of operational and technical measures. We penetrated the traitor’s gadgets using encrypted software bookmarks – mobile terminals and computers. We basically lived with him and conducted audio and video monitoring. In the process, we managed to qualitatively document the traitor’s collection and transmission of relevant information to the enemy,” Vasyl Maliuk reported.

The SSU has been passing disinformation to the enemy through the traitor for a long time, first as part of counterintelligence activities and later as part of criminal proceedings.

“The SSU’s self-cleaning continues. No matter how hard the enemy tries to infiltrate our ranks, he thinks he has all possible forms and methods of conspiracy, but he will not succeed. Because we detect, document, and detain them in a timely manner,” Vasyl Maliuk noted.

One year ago, the Security Service of Ukraine neutralized the agent network of the FSS of the Russian Federation, which included former and current officials of the Ukrainian special services.

Five members of a spy group were detained as a result of a multi-stage special operation in different regions of Ukraine.

This agent network passed on information to the Russians about the Defense Forces and strategically important Ukrainian energy facilities. The defendants kept in touch with an FSS supervisor located in temporarily occupied Crimea.

In November 2024, the military counterintelligence and investigators of the Security Service of Ukraine detained a Russian ‘mole’ who turned out to be a lieutenant colonel, commander of one of the units of the Special Operations Forces of the Armed Forces of Ukraine.

The Russians recruited the SOF officer even before the start of the full-scale war. According to the investigation, in the spring of 2024, he was remotely “activated” by a Russian GRU officer and assigned a task: to pass on to the Russians plans for the combat operations of the Ukrainian Defense Forces behind enemy lines.

The invaders were most interested in intelligence on the sabotage and reconnaissance raids by Ukrainian Special Forces behind the front line in the Zaporizhzhia, Kherson, and Crimean directions.

“To fulfill the enemy’s task, the mole used his official position, thanks to which he received information about the planned routes of movement of the Ukrainian Defense Forces, their weapons, and “goals,” the SSU reported.

The Russian invaders planned to use this information to eliminate the Ukrainian Special Forces on the front line or beyond it – in the temporarily occupied part of the territory in southern Ukraine. In addition, the agent “leaked” information about other units of the Ukrainian Defense Forces to his Russian supervisor.

Share this post:

SUPPORT MILITARNYI

PrivatBank ( Bank card )
5169 3351 0164 7408
Bank Account in UAH (IBAN)
UA043052990000026007015028783
ETH
0x6db6D0E7acCa3a5b5b09c461Ae480DF9A928d0a2
BTC
bc1qv58uev602j2twgxdtyv4z0mvly44ezq788kwsd
USDT
TMKUjnNbCN4Bv6Vvtyh7e3mnyz5QB9nu6V
Popular
Button Text