SSU detains traitor who installed webcams near Mykolaiv port to spy on Ukrainian ships
In Mykolaiv, the SSU has apprehended another agent of russian intelligence. The perpetrator was gathering information on Ukraine’s Defence Forces near the Black Sea.
The enemy was particularly interested in warships of the Armed Forces of Ukraine, as well as Ukrainian merchant ships exporting agricultural products.
To track Ukrainian vessels, the spy installed several webcams on technological facilities near the port.
Once installed, they were supposed to carry out continuous online broadcasting of sea and river traffic, remotely accessed by one of the russian intelligence services.
However, the SSU promptly discovered and deactivated the hidden equipment. The suspect was detained ‘red-handed’ when he was trying to install another webcam overlooking the river area.
The SSU prevented the transfer of data to the occupiers, who wanted to use them to launch targeted air strikes on the area.
Another task of the enemy asset was to identify the AFU’s ground facilities, including military hospitals, training centres and checkpoints.
According to the investigation, the agent is an employee of a local company and was recruited remotely by russian intelligence in late 2023.
His activity in pro-kremlin Telegram channels brought him to the occupiers’ attention.
An anonymous chat in a messenger app was used for communication with the russian handler.
During the search, the SSU seized a mobile phone with evidence of the crime. The investigators also found tools for installing the cameras and packaging for them.
SSU investigators have served the detainee a notice of suspicion under Article 111.2 of the CCU (high treason, committed under martial law).
The suspect is in custody and faces life imprisonment.
The operation was carried out by the SSU Office in Mykolaiv region under the procedural supervision of the regional Prosecutor’s Office.