Spyed on Ukrainian Armed Forces ships: SBU detained FSB agent in Odesa
The enemy agent was transmitting data about warships and positions of Ukrainian air defense to the occupiers to help the Russian Federation plan strikes with drones and missiles.
The Security Service of Ukraine has exposed a Russian agent who was collecting data about the bases and routes of Ukrainian Armed Forces ships near the Odesa seaport. This was reported by the SBU press service.
According to the investigation, the occupiers planned to use the information received to strike Ukrainian positions with cruise missiles and kamikaze drones. To increase the accuracy of the attacks, the agent was also tasked with identifying the firing positions of anti-aircraft missile systems and mobile fire groups.
To collect intelligence, the traitor traveled around the coast of Odesa, secretly photographed military facilities and recorded their coordinates. He transmitted the collected data via messenger to his Russian curator, whose identity has already been established.
SBU employees documented the agent’s actions and detained him at his place of residence in Odesa. During the search, law enforcement officers seized a phone and computer that he used to communicate with the FSB.
According to the investigation, the traitor turned out to be a 37-year-old Odesa resident who was unemployed and agreed to work for the occupiers in search of easy money on Telegram.
The attacker was informed of suspicion under Part 2 of Article 111 of the Criminal Code of Ukraine (high treason committed under martial law). The court chose a preventive measure for him – detention without bail. He faces life imprisonment with confiscation of property.
The operation was carried out by SBU officers under the procedural guidance of the Odessa Regional Prosecutor’s Office.
As USM recently wrote, the Russians attacked the seaport in Chornomorsk.
Also, the day before, the Russian army targeted port infrastructure on the Danube in the Izmail district.