Russian intelligence services activated ahead of Ukrainian presidential elections – SBU

SBU documents activization of the Russian special services in Ukrainian cyberspace ahead of the presidential election

The Security Service of Ukraine in the course of protecting information security of the state has documented the intensified activity of Russia’s special services in Ukrainian cyberspace ahead of the presidential election.

The aggressor country tries in every possible way to influence the electoral process through manipulative influence on the electoral mood of Ukrainian citizens using the public and social resources of the Internet.

During January-March 2019, the SBU officers exposed and stopped the illegal activity of a deep-rooted and deep-cover network of the Internet agitators, which gathered the citizens of Kyiv, Odesa, Mykolayiv, Zaporizhia, Dnipropetrovsk, Sumy and Chernihiv regions.

On Russian minders’ instructions through the social networks Facebook, VKontakte and Twitter members of the network spread in the regional and national Internet destructive information aimed at artificial escalation of the social-political situation ahead and during the presidential election in the country.

The SBU officers documented 17 facts of the interference of the Russian special services into the elections process in the country by mercenary spread of fake information only during the first quarter of 2019.

In particular, on March 26, officers of the SBU in Zaporizhia, under the procedural guidance of the prosecutor’s office, exposed yet another anti-Ukrainian Internet agitator who acted in favor of the aggressor country.

According to the law-enforcement agencies, the Russian minders had over 50 groups in the social network with the audience of over 1.5 million users for illegal activity.

The counterintelligence measures are ongoing.

As part of its remit, the SBU takes all necessary measures to prevent interference of the aggressor country in election process and appeals once again to Ukrainian users of social networks to be vigilant.

Leave a Reply

Your email address will not be published. Required fields are marked *