
Ukrainian soldier released in prisoner swap left with ‘Glory to Russia' burned on his body by Putin's sick torturers
Ukrainians POWs have been pictured celebrating their return home
BRAND OF EVIL Ukrainian soldier released in prisoner swap left with 'Glory to Russia' burned on his body by Putin's sick torturers
Click to share on X/Twitter (Opens in new window)
Click to share on Facebook (Opens in new window)
A UKRAINIAN prisoner of war had the words "Glory to Russia" burned onto his skin while held captive in Russia.
A disturbing photo emerged showing the mutilated soldier after he was released in a prisoner exchange, and Ukraine's intelligence service has confirmed it is genuine.
5
Ukrainian prisoners of war celebrate their return home following a prisoner swap on Tuesday
Credit: EPA
5
This soldier waved as he arrived back in Ukraine
Credit: EPA
5
The phrase 'Glory to Russia' was branded onto this Ukrainian prisoner, written in Russian
The phrase has been branded sideways onto his right flank in large, uneven letters.
Up the middle of the tortured soldier's torso is another thick, livid scar ragged by rough stick marks.
He also has a tube fitted into his stomach, and another area of major scarring on his left flank.
Andrii Yusov, spokesperson for Defence Intelligence of Ukraine [DIU], said: "Unfortunately, the photo is real. He wasn't in this exchange, but one of the earlier ones.
"While examining him at a rehabilitation centre for soldiers, a doctor, overwhelmed by what he saw, took the photo and posted it online.
"This is evidence of what our defenders go through in captivity. The photo speaks for itself.
"And it is imperative that not only Ukrainians see it – they know very well what the Russians are – but the whole world."
He also revealed that 90 percent of prisoners released from captivity in Russia reported violations of the required conditions.
This ranges from a lack of medical care to outright torture, as appears to be the case with this soldier.
Yusov said that Ukraine is documenting each case and attempting to identify those involved.
Night of hell for Ukraine as Putin launches 315 drones in one of biggest strikes of war sparking huge inferno in Kyiv
He said: "This is visually very clear – there is a stark difference in the condition in which Russian POWs return to Russia and the condition in which Ukrainian defenders come back.
"Violations of detention conditions, and breaches of the required standards for food and medical support, are widespread in Russian captivity.
"This is something that the International Committee of the Red Cross must address and the entire international community must act upon."
Russia and Ukraine exchanged at least 1,200 each on Monday after the second round of direct talks in Istanbul last week.
5
Ukrainian troops firing a M777 Howitzer towards Russians
Credit: Reuters
5
A line of Russian soldiers getting off a bus after being released by Ukraine
Credit: EPA
From Yusov's statement, it seems the branded prisoner was released during an exchange earlier in the war.
He could have been one of 1,000 prisoners exchanged by each side in May after the first face-to-face talks in three years.
It had been hoped those talks would advance the peace process, but they broke up after Russia demanded Ukraine withdraw troops from its own territory — which Moscow has been unable to conquer — as a precondition of any ceasefire.
Meanwhile, the chief of Germany's MI6 warned that Putin has his evil eyes set on invading Nato.
Bruno Kahl, head of Berlin's Federal Intelligence Service, said the war in Ukraine is just the beginning for the Russian despot.
It's after his team obtained intel suggesting Russia is plotting to test the resolve of the alliance in the coming years, Kahl claims.
A similar warning was issued by Nato Secretary General Mark Rutte on Monday.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Daily Mirror
2 hours ago
- Daily Mirror
Chilling last CCTV sighting of Brit before he vanished from holiday Airbnb
Denis Kopanev, 33, was wearing a dark-coloured baseball cap, a white shirt, and a matching beige jacket and trousers when he left his holiday let in Rio de Janeiro on Monday A British tourist who mysteriously vanished from his Airbnb while on holiday in Brazil was last seen leaving the property on CCTV. Denis Kopanev left his accommodation on Monday and hasn't been seen or heard from since. CCTV cameras filmed him leaving the home wearing beige jacket and trousers, a dark baseball cap, and a white shirt. He also appeared to carry a small bag. The last-known footage of the holidaymaker has been since shared on social media by Brazil media. The 33-year-old, who is Russian with British citizenship, was staying at a condominium in the trendy neighbourhood of Gávea in Rio de Janeiro, Brazil. Friends and family members have not heard from him since Monday. Denis, who works as a financial analyst in London, was supposed to travel to São Paulo the following day to meet an American friend. They were then planning to travel together to Fernando de Noronha, a volcanic archipelago about 215 miles off Brazil's north-eastern coast. The last location on his phone was at the Rodrigo de Freitas Lagoon near his accommodation in Rio. Denis never checked out of the property and his passport and belongings were left in the room. His disappearance was registered at the police station on Wednesday. According to his best friend Benone Moura, Denis loved Brazil and visited the country often, including as recently as six months ago. The friend said he never travelled without letting his friends and family know beforehand. Moura said he last spoke with him at around 5pm on Sunday. Family members contacted the British Embassy and filed a report, but have yet to receive any news. The case is being investigated by the Rio de Janeiro Whereabouts Discovery Unit (DDPA). Denis isn't the first Brit to go missing in Brazil in recent months. Journalist Charlotte Alice Peet, 32, was missing for four months, before she was found in a São Paulo hostel, when it was reported that she had admitted she didn't want to be in contact with her family, and the case was then closed by the local authorities. She is said to have told a pal she was in São Paulo on February 8, and planning to go to Rio de Janeiro, before her family stopped hearing from her, and quickly reported her missing. She was located by authorities using data from her phone.


Telegraph
7 hours ago
- Telegraph
Mossad agents in secret mission to blow up Iranian missiles
Mossad agents snuck into Iran and set up a factory to build explosive drones that were used to cripple Tehran's air defences ahead of Friday's strikes, intelligence officials said. The drones were activated and used to attack missile launchers pointed at Israel as the IDF launched its overnight raid aimed at crippling Iran's nuclear programme. The operation, which would have been years in the making, has the hallmarks of the Mossad intelligence agenc y, which is famed for its clandestine activities. It would have involved Israeli intelligence agents sneaking into Iran to build the base well in advance of Friday's attack, pre-empting Iran's probable retaliation. Vehicles carrying weapons systems were also smuggled into Iran, a security official told The Times of Israel. By destroying Iran's air defences, the explosive drones gave Israeli planes supremacy in the skies and freedom to carry out Friday's air strikes that killed several top generals while hitting about 100 targets including nuclear facilities. Pre-deployed Mossad commando units were indeed working inside Iran, said the British-Israel Communications and Research Centre (BICOM). Mossad units 'were involved in launching precision-guided munitions that targeted Iranian surface-to-air missiles, other air defences, as well as ground-to-ground missiles that would have been used in a retaliatory strike against Israel', BICOM said. Footage emerged purporting to show exactly those activities – Israeli agents setting guided missile launchers that were then used to take out Iran's air defences. The operatives also launched surface-to-surface missiles and explosive drones at targets near Tehran, including a truck carrying missiles, the footage suggests. The black-and-white footage shows armed figures with their faces pixelated, crouching in an area of open ground. Strategic capabilities Israeli intelligence officials have said publication of the material was designed to illustrate the breadth and depth of Israel's clandestine capabilities and to discourage escalation. If what Israeli authorities are claiming is indeed true, it is a stunning demonstration of strategic capabilities in what amounted to a multi-pronged attack combining surveillance, intelligence and firepower. It also shows how far Israel is willing to go in confronting Tehran and its potential nuclear threat. 'Emerging reports about more unconventional activity by Mossad are a reminder of Israel's expertise in covert operations, its penetration of the Iranian security establishment and its agility in planning ahead with imaginative operations which can be executed at short notice,' said Matthew Savill, director of military sciences at the Royal United Services Institute. Setting up such key secret attack infrastructure within the territory of Iran, Israel's number one rival, would probably have involved multiple undercover missions. It would also have required targeted intelligence of where exactly Iran's own military and weapons infrastructure was located, allowing the accurate placement of various weapons systems to hit those strategic targets. The attack has killed at least three of Iran's most powerful men – including its most senior military leadership – further crippling the Islamic Republic's ability. It has not only suffered a blow to its missile capabilities but it has now also lost significant architects that would have designed and executed a response. 'The breadth and scale of these strikes…suggest this operation is intended to not just dissuade Iran from pursuing nuclear weapons, but also cripple any potential military response and even to destabilise the regime,' said Mr Savill. Mossad has a history of carrying out bold operations on enemy soil, especially in Iran. In 2020 it helped the US to assassinate Major General Qassim Suleimani, who was Iran's top security and intelligence commander. In 2022, two assassins on motorcycles gunned down Col Sayyad Khodaei, an IRGC officer, and in 2024 Israel killed Ismail Haniyeh, Hamas's political leader, in Tehran by planting an explosive inside an IRGC guest house. Israel also dismantled the Lebanese terror group Hezbollah, Iran's most powerful proxy in the region, in a series of strikes in 2024. This included elaborate, coordinated attacks that saw thousands of pagers and walkie-talkies used by the group detonate, killing dozens and injuring thousands. Mossad had infiltrated the supply line and planted explosives inside the devices 10 years before they were detonated. With its latest strikes, Israel is signalling that far more is to come. 'We are a few hours into the operation…. this is something that, when we spoke about it six months ago, seemed like fantasy,' said Maj Gen Oded Basiuk, Israel's head of operations directorate. 'Thus achievement is the result of planning, drills and thorough work by those sitting here, and also by those who aren't.'


Reuters
9 hours ago
- Reuters
Ex-UK intelligence worker jailed for taking top secret data home
LONDON, June 13 (Reuters) - A former British intelligence worker who endangered national security by taking top secret data home was on Friday jailed for seven and a half years. Hasaan Arshad, 25, pleaded guilty, opens new tab in March to one charge under the Computer Misuse Act, committed between August and September 2022 while working at British signals intelligence agency GCHQ. Prosecutor Duncan Atkinson said the top secret material Arshad had downloaded contained the names of 17 GCHQ employees and that removing it from a secure environment brought the risk of it "falling into the wrong hands". "His actions damaged confidence in the UK's security," Atkinson told London's Old Bailey court. Judge Maura McGowan sentenced Arshad to six years in prison for the Computer Misuse Act offence and a further 18 months for two offences of making indecent images of children, to which he had pleaded guilty in 2023. His lawyer Nina Grahame said Arshad had taken the data due to his "perfectionism" at the end of a year-long placement with GCHQ because he had not completed his work on a particular project. She said Arshad accepted he had caused a risk to national security but added: "He did not intend to cause such a risk."