The counterintelligence unit of the Security Service of Ukraine has successfully disrupted yet another attempt by Russian forces to obtain coordinates for a missile strike on critical industrial infrastructure in Zaporizhzhia. Reports indicate that the enemy was targeting production facilities and power substations that supply energy to the front-line city.
To facilitate the airstrike, the Russian military intelligence (commonly known as GRU) recruited a former employee of the local Pension Fund. She came under the enemy's radar due to her anti-Ukrainian comments in Telegram channels. The agent was tasked with scouting the area to identify production and energy facilities, additionally seeking intelligence from an acquaintance who was an engineer at a local manufacturing company.
The investigation revealed that she coordinated her actions with a Russian GRU officer via an anonymous chat in a messaging app. SBU counterintelligence agents apprehended the suspect in the act, capturing her while she was photographing the perimeter of an energy facility. At the scene, they seized her smartphone containing Google Maps, which marked potential targets for the occupiers.
The SBU has charged the agent with treason under Part 2 of Article 111 of the Criminal Code of Ukraine, involving state betrayal in wartime conditions.
The suspect remains in custody without the right to bail and faces life imprisonment with asset confiscation. The preemptive actions were conducted by SBU operatives in the Rivne region under the procedural guidance of the regional prosecutor's office.