SSU detains repeat offender who guided strikes at Mykolaiv on russia’s behalf
In Mykolaiv, the Security Service of Ukraine had detained another enemy informant. For the ruscists, the perpetrator identified coordinates of the Defence Forces for the ruscists, using which the enemy prepared missile and drone attacks.
The spotter turned out to be a local repeat offender who had previously served time for robbery and car theft.
He came to the attention of the russian intelligence after his release from prison, when he began looking for ‘easy money’ on Telegram channels.
For promises of ‘quick earnings’, the asset began driving around the port city to identify Ukrainian military bases and mark their locations on Google Maps.
Upon identifying potential ‘targets’, the informant conducted further reconnaissance to determine the approximate number of personnel and equipment, terrain features, and other details.
He transmitted the collected information to a russian intelligence officer, communicating via an anonymous chat in a messaging app.
The SSU documented the traitor’s actions and detained him after protecting the Defence Forces’ locations.
A smartphone containing evidence of working for the enemy was seized from the detainee during the searches.
SSU investigators have notified him of suspicion under Article 114-2.3 of the CCU (unauthorised dissemination of information on the movement or deployment of the AFU with the possibility of their identification on the ground, committed under martial law). The investigation is ongoing.
The suspect is in custody without bail and faces up to 12 years in prison.
The operation was carried out by the SSU Mykolaiv Office under the procedural supervision of the regional Prosecutor’s Office.