'Risk level goes up' — Ukraine's strike on Russian bombers could escalate war, US envoy Kellogg says
The operation, launched by the Security Service of Ukraine (SBU), reportedly targeted four airfields deep inside Russian territory, striking 41 aircraft and inflicting what Kyiv claims is $7 billion in damage.
The targeted air bases reportedly housed Tu-95 and Tu-22M3 bombers, essential carriers of long-range cruise missiles used in Moscow's air strikes on Ukrainian cities.
"I'm telling you the risk levels are going way up," Kellogg said. "When you attack an opponent's part of their national survival system, which is their nuclear triad, that means your risk level goes up because you don't know what the other side's going to do."
According to the SBU, 117 drones were launched from mobile platforms across Russia, enabling simultaneous strikes on targets located thousands of kilometers from Ukraine's borders.
Kellogg also pointed to reports of explosions at the Severomorsk naval base, home to some of Russia's most advanced submarines. Kyiv has not confirmed targeting Russia's Northern Fleet.
"The one that really concerned me was the fact that there have been reports that they attacked the naval, the Northern Fleet headquarters in Severomorsk," Kellogg said. "And if that's the case — when you attack two legs of a triad — it's very clear the risk levels will go up."
Russian officials have denied that the base was hit, and no independent confirmation has emerged.
According to Kellogg, the attacks showed that Kyiv "is not lying down on that."
"Ukraine is basically, 'We can play this game, too.' And they can raise the risk level to levels that are basically, to me, they've got to be unacceptable," he added.
Join our community Support independent journalism in Ukraine. Join us in this fight. Support Us
Despite the scale and strategic implications of the Ukrainian operation, Russian President Vladimir Putin has not publicly addressed the strike. U.S. President Donald Trump, who has positioned himself as a would-be peacemaker, has also remained silent.
Pressed by reporters on June 3, White House Press Secretary Karoline Leavitt confirmed that Trump was not informed in advance about the operation.
"I would like to let the president speak on that himself," Leavitt said. She later added, "The president does not want to see this war prolonged. He wants this war to stop."
Ukrainian officials say the operation took 18 months to plan. While Kyiv says the strike dealt a serious blow to Russia's strategic air capabilities, the full extent of the damage remains unverified.
Operation Spiderweb marks one of the most sophisticated and far-reaching Ukrainian operations since the start of the full-scale war in 2022 — and a stark signal of Ukraine's growing capacity to strike deep inside Russian territory.
Read also: Inside Russia, calls for peace come with conditions — and Kremlin talking points
We've been working hard to bring you independent, locally-sourced news from Ukraine. Consider supporting the Kyiv Independent.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Fox News
an hour ago
- Fox News
Trump closes week with plans to reposition subs amid heightened Russia tension, new tariffs
President Donald Trump wrapped up his second term's 28th week in office announcing he would reposition two nuclear submarines amid increased tension with Russia, after just adding new tariffs to a host of countries. On Monday, Trump unveiled a new deadline for Russia to end its conflict with Ukraine, and former Russian President Dmitry Medvedev said the announcement is an additional "step towards war." In response, Trump made a rare announcement Friday that he would reposition two submarines to best respond to the escalated tension between the two countries. "Based on the highly provocative statements of the Former President of Russia, Dmitry Medvedev, who is now the Deputy Chairman of the Security Council of the Russian Federation, I have ordered two Nuclear Submarines to be positioned in the appropriate regions, just in case these foolish and inflammatory statements are more than just that," Trump said in a Friday post on Truth Social. Trump did not disclose any additional details regarding the submarines, and defense officials rarely comment on submarine placement given the highly classified nature of their operations. Here's what also happened this week: Trump also signed several executive orders Thursday related to tariffs, including raising the tariffs on Canada from 25% to 35%. The president raised the tariff rate due to Canada's contribution to the flow of fentanyl and other illicit drugs into the U.S., according to the Trump administration. However, Canada's Prime Minister Mark Carney challenged that assessment. "Canada accounts for only 1% of U.S. fentanyl imports and has been working intensively to further reduce these volumes," Carney said in a Friday statement. Trump also modified reciprocal tariffs on a series of countries Thursday, bumping up the tariff rate on Brazil to 50%. Meanwhile, Trump reached a trade deal on Thursday with South Korea, driving down tariffs against South Korea from 25% as pitched in the spring to 15%. Additionally, Trump agreed Thursday to continue trade talks with Mexico for another 90 days. Trump also signed the VA Home Loan Program Reform Act into law Wednesday, which would make permanent a partial claims program that seeks to keep veterans from losing their homes to foreclosure. The new partial claims program under the Department of Veterans' Affairs' (VA) Home Loan Program permits veterans who are behind on mortgage payments to tack on those payments to the tail end of their loans, while also offering them an interest-free loan in the interim. "This legislation provides desperately needed relief to veterans and their families who have fallen behind in their mortgages," Trump told reporters Wednesday. "It's a really sort of an amazing situation, and it helps keep our promise to end veterans homelessness. And, we're going to do that for America. We're going to do that for our great veterans." Estimates suggest the partial claim program could assist up to 3.7 million veterans, according to Trump. "It's common sense legislation," Trump said. "My administration is committed to doing everything possible to ensure that our veterans are treated with respect and treated as well as anybody in this country."
Yahoo
an hour ago
- Yahoo
North Korea sent me abroad to be a secret IT worker. My wages funded the regime
Jin-su says over the years he used hundreds of fake IDs to apply for remote IT work with Western companies. It was part of a vast undercover scheme to raise funds for North Korea. Juggling multiple jobs across the US and Europe would make him at least $5,000 (£3,750) a month, he told the BBC in a rare interview. Some colleagues, he said, would earn much more. Before he defected, Jin-su - whose name has been changed to protect his identity - was one of thousands believed to have been sent abroad to China and Russia, or countries in Africa and elsewhere, to take part in the shadowy operation run by secretive North Korea. North Korean IT workers are closely monitored and few have spoken to the media, but Jin-su has provided extensive testimony to the BBC, giving a revealing insight into what daily life is like for those working the scam, and how they operate. His first-hand account confirms much of what has been estimated in UN and cyber security reports. He said 85% of what he earned was sent back to fund the regime. Cash-strapped North Korea has been under international sanctions for years. "We know it's like robbery, but we just accept it as our fate," Jin-su said, "it's still much better than when we were in North Korea." Secret IT workers generate $250m-$600m annually for North Korea, according to a UN Security Council report published in March 2024. The scheme boomed in the pandemic, when remote working became commonplace, and has been on the rise ever since, authorities and cyber defenders warn. Most workers are after a steady paycheck to send back to the regime, but in some cases, they have stolen data or hacked their employers and demanded ransom. Last year, a US court indicted 14 North Koreans who allegedly earned $88m by working in disguise and extorting US firms over a six-year period. Four more North Koreans who allegedly used fraudulent identities to secure remote IT work for a cryptocurrency firm in the US were indicted last month. US woman gets 8-year sentence for stealing identities to give North Koreans jobs Firm hacked after accidentally hiring North Korean cyber criminal Getting the jobs Jin-su was an IT worker for the regime in China for several years before defecting. He and his colleagues would mostly work in teams of 10, he told the BBC. Access to the internet is limited in North Korea, but abroad, these IT workers can operate more easily. They need to disguise their nationality not just because they can get paid more by impersonating Westerners, but due to the extensive international sanctions North Korea is under, primarily in response to its nuclear weapons and ballistic missile programmes. This scheme is separate from North Korea's hacking operations which also raise money for the regime. Earlier this year the Lazarus Group - an infamous hacking group understood to be working for North Korea, though they've never admitted to it - is thought to have stolen $1.5bn (£1.1bn) from cryptocurrency firm Bybit. Jin-su spent most of his time trying to secure fraudulent identities which he could use to apply for jobs. He would first pose as Chinese, and contact people in Hungary, Turkey and other countries to ask them to use their identity in exchange for a percentage of his earnings, he told the BBC. "If you put an 'Asian face' on that profile, you'll never get a job." He would then use those borrowed identities to approach people in Western Europe for their identities, which he'd use to apply for jobs in the US and Europe. Jin-su often found success targeting UK citizens. "With a little bit of chat, people in the UK passed on their identities so easily," he said. Listen to BBC Trending: Could your colleague be a North Korean in disguise? IT workers who speak better English sometimes handle the applications process. But jobs on freelancer sites also don't necessarily require face-to-face interviews, and often day-to-day interactions take place on platforms like Slack, making it easier to pretend to be someone you are not. Jin-su told the BBC he mostly targeted the US market, "because the salaries are higher in American companies". He claimed so many IT workers were finding jobs, often companies would unwittingly hire more than one North Korean. "It happens a lot," he said. It's understood that IT workers collect their earnings through networks of facilitators based in the West and China. Last week a US woman was sentenced to more than eight years in prison for crimes connected to assisting North Korean IT workers find jobs and sending them money. The BBC cannot independently verify the specifics of Jin-su's testimony, but through PSCORE, an organisation which advocates for North Korean human rights, we've read testimony from another IT worker who defected that supports Jin-su's claims. The BBC also spoke to a different defector, Hyun-Seung Lee, who met North Koreans working in IT while he was travelling as a businessman for the regime in China. He confirmed they'd had similar experiences. A growing problem The BBC spoke to multiple hiring managers in the cyber security and software development sector who say they've spotted dozens of candidates they suspect are North Korean IT workers during their hiring processes. Rob Henley, co-founder of Ally Security in the US, was recently hiring for a series of remote vacancies at his firm, and believes he interviewed up to 30 North Korean IT workers in the process. "Initially it was like a game to some extent, like trying to figure out who was real and who was fake, but it got pretty annoying pretty quickly," he said. Eventually, he resorted to asking candidates on video calls to show him it was daytime where they were. "We were only hiring candidates from the US for these positions. It should have been at least light outside. But I never saw daylight." Back in March, Dawid Moczadło, co-founder of Vidoc Security Lab based in Poland, shared a video of a remote job interview he conducted where the candidate appeared to be using artificial intelligence software to disguise their face. He said that after speaking to experts, he believed the candidate could be a North Korean IT worker. We contacted the North Korean embassy in London to put the allegations in this story to them. They did not respond. A rare escape route North Korea has been sending its workers abroad for decades to earn the state foreign currency. Up to 100,000 are employed abroad as factory or restaurant workers, mostly in China and Russia. After several years of living in China, Jin-su said the "sense of confinement" over his oppressive working conditions built up. "We weren't allowed to go out and had to stay indoors all the time" he said. "You can't exercise, you can't do what you want." However, North Korean IT workers have more freedom to access Western media when they're abroad, Jin-su said. "You see the real world. When we are abroad, we realise that something is wrong inside North Korea." But despite this, Jin-su claimed few North Korean IT workers thought about escaping like he did. "They just take the money and go back home, very few people would think about defection." Although they only keep a small proportion of what they earn, it's worth a lot in North Korea. Defecting is also hugely risky and difficult. Surveillance in China means most are caught. Those few who do succeed in defecting may never see their families again, and their relatives could face punishment for them leaving. Jin-su is still working in IT now he's defected. He says the skills he honed working for the regime have helped him settle into his new life. Because he isn't working multiple jobs with fake IDs, he earns less than when he worked for the North Korean regime. But because he can keep more of his earnings, overall, he has more money in his own pocket. "I had got used to making money by doing illegal things. But now I work hard and earn the money I deserve." More Weekend Picks North Korea's Benidorm-style resort welcomes first Russian tourists A puff on a joint - then six months of forced rehab in a concrete cell Inside the abandoned homes of Assad's ruthless enforcers Solve the daily Crossword

CNN
2 hours ago
- CNN
Trump says two US Navy subs are moving ‘closer to Russia.' Here are the subs in the American fleet
Russia Federal agencies US military Donald Trump FacebookTweetLink US President Donald Trump said Friday he was ordering two US Navy nuclear submarines to positions closer to Russia, in response to remarks by Dmitry Medvedev, Russia's former president and current deputy chairman of its Security Council. In what he called an effort to be 'prepared,' Trump said in a Truth Social post that he had 'ordered two Nuclear Submarines to be positioned in the appropriate regions, just in case these foolish and inflammatory statements are more than just that.' The president did not specify what type of submarines were being moved or where to, and the Pentagon usually reveals little about any of its subs' movements. The US Navy has three types of submarines, all of which are nuclear-powered, but only one of which carries nuclear weapons. Here's a look at the US submarine fleet: The US Navy has 14 Ohio-class ballistic-missile submarines (SSBNs), often referred to as 'boomers.' SSBNs 'are designed specifically for stealth and the precise delivery of nuclear warheads,' a Navy fact sheet on them says. Each can carry 20 Trident ballistic missiles with multiple nuclear warheads. Tridents have a range of up to 4,600 miles (7,400 kilometers), meaning they wouldn't need to move closer to Russia to hit it – in fact, they could do so from the Atlantic, Pacific, Indian or Arctic oceans. SSBNs are strong nuclear deterrents as they are expected to survive an adversary's first strike. Their movements are among the Navy's most closely guarded secrets. At 560 feet (170 meters) long, the Ohio-class subs displace almost 19,000 tons submerged and have a crew of 159. They can reach a speed of 23 miles per hour. In the 1990s, the Pentagon determined the Navy didn't need as many Ohio-class SSBNs in the nuclear deterrent role, converting four of them into guided-missile submarines (SSGNs). Retaining the same overall specs as the boomers, the SSGNs carry Tomahawk cruise missiles instead of the Trident ballistic missiles. Each can carry 154 Tomahawks with a high-explosive warhead of up to 1,000 pounds, and a range of about 1,000 miles. They can also transport troops, who can be clandestinely deployed from lockout chambers in former ballistic-missile tubes, according to the Navy. Movements of the SSGNs are also highly classified, but in recent years the Navy made occasional note of their presence near military hotspots, to send a message of deterrence. These form the bulk of the US Navy's submarine fleet and are designed to hunt and destroy enemy subs and surface ships with torpedoes. They can also strike land-based targets with Tomahawk missiles, though they carry the Tomahawks in much smaller numbers than the SSGNs. Fast-attack subs come in three forms: the Virginia, Los Angeles and Seawolf classes. The Virginia class is the newest, with 23 commissioned as of July 1, according to a Navy fact sheet. They are 377 to 461 feet long, depending on their configuration, displace up to 10,200 tons, and have a crew of 145. The Los Angeles class is the oldest of the Navy's fast-attack subs, with 23 still in service. They are 360 feet long, displace 6,900 tons and carry a crew of 143. Finally, the Seawolf class is the smallest in the US fleet. Two of the subs, USS Seawolf and USS Connecticut – measuring 353 feet and displacing 9,100 tons – are more in line with standard attack boats, carrying torpedoes and cruise missiles. The third in the Seawolf class, the USS Jimmy Carter, is one of the most specialized craft in the Navy, with a hull extended 100 feet longer than the other two subs. 'This hull section provides for additional payloads to accommodate advanced technology used to carry out classified research and development and for enhanced warfighting capabilities,' the Navy says.