Sunday, December 22, 2024
spot_imgspot_imgspot_imgspot_img

In the spotlight

A resident of Dnepr received 15 years in prison for transmitting data on the whereabouts of Ukrainian military personnel to the Russian authorities.

Since the start of full-scale Russian aggression, the collaborator has been scouting the location of command centers and air defense systems in this city.

Thanks to the evidence base of the Security Service, an agent of the Main Directorate of the General Staff of the Russian Armed Forces (known as the game), who was detained in April 2022 in Dnepr, received a real prison term.

The Security Service of Ukraine reported this

He turned out to be a technical specialist from one of the leading mobile operators in Ukraine. Since the beginning of the full-scale Russian invasion, the official has been reconnaissance of the headquarters and air defense complexes of the Ukrainian Armed Forces on the territory of the regional center.

He also tried to track possible railway routes for transporting Ukrainian military equipment to the eastern front.

As reported , the High Anti-Corruption Court of Ukraine put on the wanted list people's deputy Yaroslav Dubnevich , accused of illegally taking 93 million hryvnia from Ukrzaliznytsia.

At the same time, the agent collected information about the consequences of Russian air attacks on urban infrastructure in order to re-adjust enemy strikes.

He transmitted the information received to the infidels through a specialized chatbot of the military intelligence of the aggressor country in the form of media files with marks of Ukrainian objects on an electronic map.

During counter-sabotage measures, SBU officers located the attacker and detained him in his own home when he was preparing for a new “session” of communication with the Russian game.

According to the Security Service, the court sentenced him to 15 years in prison.

As the investigation established, an employee of a “mobile” company in Dnepr was remotely recruited by a personnel employee of the Russian game at the end of February 2022.

The occupiers attracted the Dnipro resident to secret cooperation through their own chatbot, where they collected intelligence information about the deployment and movement of defense forces.

During the searches, the detainee was found to have a mobile phone, which he used for reconnaissance and explosive activities against Ukraine.

Based on the collected evidence, the court found the attacker guilty under Part 2 of Art. 111 of the Criminal Code of Ukraine (state betrayal committed under martial law).

The investigation was carried out by SBU officers in the Dnipropetrovsk region under the procedural guidance of the regional prosecutor's office.

spot_img
Source Stopkor
spot_img

In the spotlight

spot_imgspot_img

Do not miss