ATESH partisans infiltrated the Russian airfield in Crimea — photo
Category
Ukraine
Publication date

ATESH partisans infiltrated the Russian airfield in Crimea — photo

ATESH
Source:  ATESH

The enemy is carrying out repair work on some boards at the military facility. There is also no permanent security at the airport, the Ukrainian underground said.

"ATESH" partisans infiltrated the Russian airfield in Crimea

The Ukrainian underground conducted surveillance at Yevpatoria's airfield in the temporarily occupied Crimea.

Our agent infiltrated the occupiers' airfield in Yevpatoria and successfully conducted reconnaissance, the message says.

The partisans discovered the Russian Pantsir-S1 air missile system and several Be-12 and An-12 aircraft at the airfield. The enemy is also doing repair work on some boards at the facility. Moreover, "ATESH" noticed the lack of permanent security in the entire territory.

We won't allow Russians to use the annexed territories for their criminal purposes, ATESH added.

ATESH scouted a railway station in Crimea with a military equipment cluster

The Crimean Tatar resistance movement ATESH again scouted a new place where the occupiers in Crimea sent guns and ammo to the front in Ukraine.

Our agent in Crimea conducted a successful reconnaissance of the railway station in the village of Zhovtneve. According to information, equipment is gradually being accumulated at the station to be sent to the Kherson and Zaporizhzhia directions in connection with large losses in both equipment and personnel, the message says.

A lot of equipment and a car with ammunition for artillery are recorded at the station.

ATESH emphasised that all collected information is sent to the Defense Forces of Ukraine. The partisans also indicated the exact coordinates of the Russian equipment: 45.29194383702729, 34.1323101176645.

By staying online, you consent to the use of cookies files, which help us make your stay here even better 

Based on your browser and language settings, you might prefer the English version of our website. Would you like to switch?