The SBU reported this via Telegram, according to Ukrinform.
As a result of a counter-subversive raid in the south of Ukraine, the SBU detained yet another asset of the Russian intelligence services. Maps with the targets for enemy airstrikes on the Ukrainian Black Sea coast were found on his phone.
Also, the culprit’s contacts with the headquarters of the Wagner PMC and the Moscow riot police (a special unit of the Russian Guard, which is taking an active part in the war on Ukraine) were exposed.
"It was established that the enemy henchman was gathering intelligence about the combat positions of the Armed Forces of Ukraine in Odesa. First of all, he was interested in the deployment locations and features of camouflage of the Ukrainian coastal defense units," the SBU said.
In addition, the perpetrator tried to gather intelligence the estimated number of personnel, weapons and military equipment involved in the protection of the coastal zone.
Intelligence was needed by the aggressor to plan, prepare, and carry out targeted missile strikes on the city infrastructure.
"The SBU thwarted the invaders' plans. Operatives of the Ukrainian special service have exposed the enemy agent, documented his criminal actions, and detained the man as he was trying to transfer classified information to Russia," the SBU emphasized.
According to the inquiry, the traitor turned out to be a local resident who was recruited by the special services of the Russian Federation after the start of the full-scale invasion.
In order to gather intelligence, the asset personally spied on military facilities and took photos of them. He would then send pictures and locations on maps to his Russian handlers.
The SBU has pressed charges against the suspect under part 2 Art. 111 (treason committed under martial law) of the Criminal Code of Ukraine.
The court ruled to remand the man in custody.