A traitorous railway worker in the Kharkiv region “leaked” the routes of military trains to the Russian GRU chatbot.
.in_text_content_22 { width: 300px; height: 600px; } @media(min-width: 600px) { .in_text_content_22 { width: 580px; height: 400px; } }
The perpetrator turned out to be an assistant driver of the locomotive depot of the regional branch of Ukrzaliznytsia, who was remotely recruited by an employee of the 78th intelligence center of the GRU of the Russian Armed Forces. The Russians ordered him to collect information about the railway routes along which the Ukrainian Armed Forces transport heavy weapons and ammunition to the front lines. While in the locomotive cabin, he secretly recorded the directions of movement of trains with Ukrainian weapons. This was reported on July 10 by the SBU press center.
The enemy wanted to use this data for missile and drone attacks, but the Ukrainian special service detained the attacker when he tried to report to the invaders. During the search of his carriage, mobile phones and SIM cards were found red-handed.
The detainee has already been notified of suspicion under Part 2 of Article 111 (high treason committed under martial law) of the Criminal Code of Ukraine. He is currently in custody and faces a life sentence.
Let us recall that in Vinnytsia Oblast, a 57-year-old Russian agent tried to establish the locations of junction stations through which military echelons of the Ukrainian Armed Forces were moving. The perpetrator has already been sentenced to 15 years in prison.
Source: Racurs

I am David Wyatt, a professional writer and journalist for Buna Times. I specialize in the world section of news coverage, where I bring to light stories and issues that affect us globally. As a graduate of Journalism, I have always had the passion to spread knowledge through writing.