Since the start of full-scale Russian aggression, the collaborator has been scouting the location of command centers and air defense systems in this city.
Thanks to the evidence base of the Security Service, an agent of the Main Directorate of the General Staff of the Russian Armed Forces (known as the game), who was detained in April 2022 in Dnepr, received a real prison term.
The Security Service of Ukraine reported this
He turned out to be a technical specialist from one of the leading mobile operators in Ukraine. Since the beginning of the full-scale Russian invasion, the official has been reconnaissance of the headquarters and air defense complexes of the Ukrainian Armed Forces on the territory of the regional center.
He also tried to track possible railway routes for transporting Ukrainian military equipment to the eastern front.
As reported , the High Anti-Corruption Court of Ukraine put on the wanted list people's deputy Yaroslav Dubnevich , accused of illegally taking 93 million hryvnia from Ukrzaliznytsia.
At the same time, the agent collected information about the consequences of Russian air attacks on urban infrastructure in order to re-adjust enemy strikes.
He transmitted the information received to the infidels through a specialized chatbot of the military intelligence of the aggressor country in the form of media files with marks of Ukrainian objects on an electronic map.
During counter-sabotage measures, SBU officers located the attacker and detained him in his own home when he was preparing for a new “session” of communication with the Russian game.
According to the Security Service, the court sentenced him to 15 years in prison.
As the investigation established, an employee of a “mobile” company in Dnepr was remotely recruited by a personnel employee of the Russian game at the end of February 2022.
The occupiers attracted the Dnipro resident to secret cooperation through their own chatbot, where they collected intelligence information about the deployment and movement of defense forces.
During the searches, the detainee was found to have a mobile phone, which he used for reconnaissance and explosive activities against Ukraine.
Based on the collected evidence, the court found the attacker guilty under Part 2 of Art. 111 of the Criminal Code of Ukraine (state betrayal committed under martial law).
The investigation was carried out by SBU officers in the Dnipropetrovsk region under the procedural guidance of the regional prosecutor's office.