SBU neutralizes FSB sleeper cell in Dnipro


(MENAFN- UkrinForm) The Security Service of Ukraine (SBU) has detained a sabotage group of FSB sleeper agents in the Ukrainian city of Dnipro.

That's according to the SBU press center, Ukrinform reports.

“While the Russian Ministry of Defense is fabricating nonsense about the SBU (this time that the SBU allegedly 'plans to dress its employees in occupiers' uniform and execute civilians in Odesa region'), the agency is working effectively. We respond to fakes with real results of our work, which annoy the enemy a lot,' the statement reads.

In particular, the Security Service captured one of the heads of a Donetsk Railways unit, who had been recruited by Russian occupiers. Following their instructions, he was supposed to gather data on the movement of military equipment and location of Ukrainian checkpoints.

Read also: Russian woman, who“allowed” husband deployed in Ukraine to“rape” local women, identified

Another collaborator was caught in Kyiv. He turned out to be an official of Ukrainian Railways' central office. Since the beginning of Russia's full-scale aggression against Ukraine, he had been calling on his colleagues to support the invaders. In particular, he sent Russian propaganda via various messenger apps to the company's employees.

In addition, during the temporary occupation of Irpin, Bucha, and Vorzel by Russian troops, the man helped the invaders navigate the area to equip positions and loot households and businesses.

In Dnipro, an SBU task force unit detained a sabotage group of FSB sleeper agents that consisted of three local residents. Under the supervision of the enemy's intelligence, they carried out sabotage and reconnaissance across the region. The agents told the investigation that the group had been formed in 2015 and remained idle until now. From time to time, they followed certain instructions issued by the FSB. Recently, the enemy activated the cell, ordering that they closely monitor critical and military infrastructure, as well as set fire to the premises of patriotic NGOs to form a favorable 'image' for the Russian media.

Their latest tasks were to infiltrate the ranks of local Territorial Defense units and obtain data on the Headquarters of the National Guard and the Armed Forces of Ukraine. Despite the cover story, the SSU exposed them in a timely manner.

Read also: Russia's leadership orders to raze Azovstal steelworks to the ground – intercept

In Lviv region, the SSU detained an official of one of the 'ministries' operating in the temporarily occupied Crimea, who contributed to the establishment of the Russian occupation authorities on the peninsula. She had publicly supported Russia's aggression and the crimes committed by the Russian military.

The woman explained that she“came to Lviv due to family circumstances” and did not expect to be identified.

In Luhansk region, the Security Service detained an enemy asset, whom Russia had deployed in Ukraine a week before the war started. He was a criminal recently released from a pre-trial detention facility in Russia. The Russians instructed that he travel to the territory of the Joint Forces Operation to run reconnaissance missions in the area and photograph positions of Ukraine's Armed Forces.

All suspects have been apprehended.

As reported by Ukrinform, In Luhansk region earlier this month, police detained a Lysychansk resident, who had been moderating a local Telegram channel and forwarded to the channel's admin information on the location of a Ukrainian Army unit. That tip was followed by a Russian artillery strike on the building hosting soldiers and adjacent households.

MENAFN19042022000193011044ID1104053083


UkrinForm

Legal Disclaimer:
MENAFN provides the information “as is” without warranty of any kind. We do not accept any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information contained in this article. If you have any complaints or copyright issues related to this article, kindly contact the provider above.