The SSU uncovered a "mole" in its Kharkiv office - Militarnyi
The SSU uncovered a “mole” in its Kharkiv office
The SSU uncovered a “mole” in its Kharkiv office
News

The SSU detained an employee of the Security Service of Ukraine coordination headquarters in the Kharkiv Region. He was working for the special services of the Russian Federation.

The man got a job in the SSU after February 24, 2022, and was implementing the tasks of the enemy. Prior to that, he served as an official of the Kharkiv City Council.

The detainee was providing Russians with intelligence and plans about the activities of the Armed Forces of Ukraine, law enforcement agencies, and special services of Ukraine.

The press service of the SSU reported about this.

The invaders used the information received from their agent to redeploy their units in order to protect them from the artillerymen of the Armed Forces of Ukraine.

In addition, due to the information received, the Russian troops planned sabotage and massive artillery and targeted missile attacks on the objects of the city.

In exchange for cooperation, the invaders promised their agent and his family safety if the Russian Federation succeeded in seizing the region.

The detainee used closed communication channels in compliance with the rules of conspiracy to transmit data.

The traitor was arrested “red-handed” – after he asked a representative of the special services to attack the facility where the SSU personnel was stationed.

The detainee was informed of the suspicion under Part 2 of Art. 111 of the Criminal Code of Ukraine (treason committed under martial law). He was also remanded in custody.

As previously reported, the Security Service of Ukraine prevented a series of contract murders of representatives of the highest military and political leadership, as well as public figures of Ukraine.

Share this post:

SUPPORT MILITARNYI

PrivatBank ( Bank card )
5169 3351 0164 7408
Bank Account in UAH (IBAN)
UA043052990000026007015028783
ETH
0x6db6D0E7acCa3a5b5b09c461Ae480DF9A928d0a2
BTC
bc1qv58uev602j2twgxdtyv4z0mvly44ezq788kwsd
USDT
TMKUjnNbCN4Bv6Vvtyh7e3mnyz5QB9nu6V
Popular
Button Text