Following SSU’s investigation, court sentences traitor to 15 years in prison for leaking information on AFU’s positions to his son, russian serviceman
The SSU has collected irrefutable evidence proving the guilt of another enemy accomplice who adjusted russian air attacks in Dnipropetrovsk oblast.
Using his ‘information’, occupiers tried to strike local infrastructure in early summer 2022. However, Ukrainian air defence forces shot down all enemy missiles.
The SSU Military Counterintelligence detained the suspect as a result of counter-sabotage efforts in the region.
Following the SSU’s investigation, the court sentenced him to 15 years in prison.
According to the investigation, the offender is a resident of Marhanets, released from a penal colony in March 2022, where he served a sentence for grievous bodily harm.
After release, he began to covertly collect information on locations and movements of the Defence Forces in the region.
Primarily, the spy tried to identify positions of Ukrainian S-300 anti-aircraft missile systems.
He passed the information to his son, who served in the russian occupation forces and participated in shelling Ukrainian settlements near Izium.
The traitor used a messenger app to pass the data to his son.
Based on the evidence collected, the court found the offender guilty under Article 111.2 of the CCU (high treason committed under martial law) and sentenced to 15 years in prison. Given that the criminal had three years of outstanding convictions, he will spend a total of 18 years behind bars.
The SSU emphasizes the inevitability of punishment for crimes against Ukraine.
The SSU carried out the investigation under the procedural supervision of Dnipropetrovsk Region Prosecutor’s Office.