A 22-year-old drone operator from one of the combat brigades of the Armed Forces of Ukraine, which is defending in the Kramatorsk direction, directed Russian artillery fire at his own brigade. This was reported by the Security Service of Ukraine.
The statement reveals that the traitor, who was a contractor, has been detained. He was remotely recruited in 2023 by an FSB officer named Dmitry Sorokoleotov.
The SBU notes that the traitor was "leaking" the locations of his unit's UAVs, which were engaged in adjusting fire against the Russian forces attacking Chasiv Yar, to an enemy intelligence officer.
It was stated that the Russian invaders planned to use this information to strike the positions of Ukrainian drone operators who were obstructing the Russian advance toward the city.
Additionally, the traitor attempted to pass on coordinates of other Ukrainian Armed Forces units in the Chasiv Yar area to the FSB, but he was exposed, which helped prevent enemy strikes on the locations of Ukrainian troops.
According to the investigation, the man came to the attention of the occupiers due to his pro-Kremlin comments in Russian Telegram channels, where he supported Russia's war against Ukraine. During searches, mobile phones containing evidence of his collaboration with the enemy were seized from the detainee.
Investigators from the Security Service informed him of the suspicion under part 2 of Article 111 of the Criminal Code of Ukraine (treason committed under martial law).
The suspect is currently in custody. The SBU notes that he faces life imprisonment with confiscation of property.
The SBU detained a "mole" within the National Guard - what is known
As reported by UNIAN, in 2023, the military counterintelligence of the Security Service of Ukraine uncovered an informant for the Main Intelligence Directorate of the Russian Armed Forces (known as the GRU) in the Kyiv region, who was gathering intelligence on the "Assault Guard" units.
The informant was a mobilized member of the National Guard, who was remotely recruited by the aggressor through a popular gaming internet platform.
In particular, the enemy was primarily interested in information regarding the bases of the rapid response units of the 4th Assault Brigade of Operational Designation "Rubezh".
The Russian intelligence service engaged him even before his mobilization into the Ukrainian army. He caught the aggressor's attention as an active user of online games, where he periodically posted his anti-Ukrainian comments.