SSU detains FSB agent who adjusted russia’s S-300 strikes on frontline Ukrainian positions near Bakhmut

As a result of counter-sabotage efforts in Donetsk oblast, the SSU exposed another enemy agent.

The spy passed to the FSB locations of combat positions and routes of movement of the Defence Forces’ advance units near Bakhmut.

Primarily, the occupiers wanted to know directions of movement of the AFU’s foreign-made military equipment involved in Ukraine’s counteroffensive operations.

The invaders needed the data to carry out massive strikes from russian S-300 surface-to-air missile systems on areas of concentration of Ukrainian troops.

The SSU detained the enemy agent when he was conducting reconnaissance.

A mobile phone with electronic map files, where the spy had marked the AFU units’ locations, was seized from him.

According to the investigation, the enemy asset is a resident of Kostiantynivka, Donetsk region. In late May 2022, he was recruited remotely by an FSB officer through the banned social network Odnoklassniki.

On the FSB’s instructions, the agent walked to monitor and record locations and movement of the Defence Forces units near the engagement line.

The gathered data were sent under a false name to the russian special service via Telegram.

Based on the collected evidence, the SSU served the detainee a notice of suspicion of high treason committed under martial law (Article 111.2 of the CCU).

The suspect is in custody, facing life imprisonment.

The SSU Office in Donetsk and Luhansk regions carried out the operation under the procedural supervision of Donetsk Region Prosecutor’s Office.