Skip to main content

tv   [untitled]    February 23, 2024 5:30pm-6:01pm EET

5:30 pm
but i don’t know why we don’t contract, there is a request for the one who will provide this year ’s supplies to the national guard, we already closed the contract for the national guard last year, you can ask those who came to us, whom we trained, pilots and so on further, their impressions , they are very satisfied with the complex, which means that even now, well, we are ready to contract in full, we pay for our own money, unfortunately, with... from investor funds, volunteer funds, we are currently making 500 boards there will be for a week, that is, we can already contract and supply from 200 to 1000 of boards per month, depending on the configuration , and we are ready to do it and ready to contract with the state special forces, why there is no contract now, i still don't understand, all the data is yes, yes... according to the ministry of defense, there came a new
5:31 pm
team and the general staff, there for the ministry of defense, for example, there is its own procedure, so , but there i say again what i said there in response to your previous questions that the new team is dealing with the procedure, how it will do it, i will say as i see it , and this coincides with some of the theses of mykhailo fedorov said there, and... now volodya kupriy, the new head of the uav management, wants to do it there, that is, they should actually give technical tasks, that is, the parameters that the drones should meet, the company should not specify specifically, remove this corrupt component, yes, what did someone finish there, somehow there was able to enter into this relationship, contract, no, technical parameters. the agency has to
5:32 pm
evaluate and look at the criteria that correspond to these parameters, price parameters, technical parameters and contract with specific companies for the procurement of the ministry of defense, then this separation goes to the responsibility for decision-making, and of course, the units must already define their, let's say, vision from the front line and... this is a constant , so there must be such a connection between these three three components, without this there will be constant lobbying of those companies that, for example, now even last year and or this year, there are some of the companies that were ordered by the general staff, they either cannot fulfill, or do not want to contract with the state, because it is more problematic with the state, with volunteers better. that is, there are already issues
5:33 pm
that have been determined for them, they cannot fulfill it, and the procedure is again taking place in a new way, and at the same time, everything is delayed, and this is because of these procedural points that are not settled, or somewhere someone did not sign, it is delayed , for example, the state intelligence service according to my data , there according to the sbu, there according to the ministry of defense, there or according to the guru , they signed up, for example, according to the national guard. they bypass them for some reason, they haven't signed up yet, maybe i'm wrong, that's what they say, people involved in contracting with state special forces, that's why, you know, when there are companies that can't do it yet, or can't do it in such a volume, but they have orders and they are contracted, and there are companies like ours, i know quite a few of them, with by skyton, that’s where we’ll meet on the weekend, they are, for example , contracted... for 15% of production
5:34 pm
capacity, and they are the most, let’s say, more contracted, with vadym yunik , they talked, they talked, air reconnaissance, he says, i about 5% is contracted for this year, why is there such a delay, it's already almost march, that's it there is, well, this is a problem, so it is necessary to quickly contract such companies that are ready, we have our drones standing on staples, ready, and those who can, who can for... supply, well , we actually see that it is already the second month of this of the 24th year, and we are again following the rake that is still left from the previous year, that is, there are no orders, and what is interesting is that, first of all, companies that have serial used products, they have fewer orders than these startup companies that "appeared last year in large numbers, in a completely illogical way the situation, and one more technical question , we have literally... two minutes, is
5:35 pm
it true that there is already a problem, that many of these different fpv drones create a problem of lack of frequency resource, when relatively speaking, a certain amount, but of sufficient bandwidth just not enough to effectively ensure the combat mission of these fpv drones, is there such a problem or is it still far-fetched? no, it is not far-fetched, that is why i said above that we also move to other frequency ranges, change the frequency in... we just had a conversation with valery barovyuk, now we continue, we seem to have a connection, yes, yes, yes, yes, yes, i was interrupted, i just got a call from the rebbe, so, in fact , it's me, it's a problem, and
5:36 pm
it's really due to the use of such chaotic, sometimes uncoordinated, therefore, the rebbe's activities, in which some units took a volunteer there. somewhere bukovel or nota, which means that not all of them, they do not systematically include it, they only protect themselves, but at the same time, the drones of other, other units are falling, me, for example, how long has it been there for a week about a year and a half ago, we met with a magyar in kherson region, there is no less horror in kherson region now, compared to shelling, than in bakhmut, avdiivka, it is clear that there is a head-on collision, but kherson region is also being hit. very much, the same story as it was there four months ago, when we went on strikes, when the tile was blown up, yes, that is, there is no coordination so constant, both of the means of rap, and sometimes, and sometimes from units
5:37 pm
and pilots , which launch drones, over there, it is composed, that is where, for example, there are unconscious units and unconscious leaders, so... they hold a plot, there, for example, as in kherson oblast in morpyehiv, there magyar holds, there, in another, a square holds there, there and so on, that is, where there are conscious people who coordinate and were able to coordinate, then there more or less it is clear that work is underway, including in the launching of drones, and in the rebovsky complexes in the work of the rebovsky complexes of synchronization, and... where, relatively speaking, there is no such coordination, there are constant losses, losses of their own drones, which are not arrive, which means that they are paid off by their lots, as well as this problem with purity range, of course, because there is no
5:38 pm
complete set now, and it should be a different type of production, which will ensure work on other, other, other frequencies... in this regard, we are also working with western partners, we are working, and i know that and our colleagues are also working, well, let’s see, mr. valery, thank you very much for such important comments, i think we will spread them through defense express, because the lack of a contracting kit is, well, in my opinion, this is a significant and serious problem current stage actually. thank you for joining our broadcast, let me remind you that it was valery borovyk, the commander of the special unit of white attack drones. and the eagle, further on we will talk about the fact that the confrontation with the enemy takes place not only in the air, but also in cyberspace, there are also many complexities, many nuances that only specialists can explain to us, but we will talk about this in more detail after the advertising of the information block, there are
5:39 pm
15% discounts on mukaltin in pharmacies plantain for you, save. laughter, physical activity, sneezing. even during such a small load, urinary incontinence can make itself felt. feminost uro helped me. thanks to the natural components of feminost uro, it helps to restore control over urination both during the day and at night. femminost uuro - urination under control. ask at pharmacies. turn on the investigation, from which cold heart? the new chapter of the hbo series is already on me. a true detective. find out what secrets the alaskan ice hides, exclusively in the mego subscription. there are 20% discounts on tisin bio tazinc strength in psylslynyk, bam and oskad pharmacies. professional cream against fix is ​​an extra strong fixation for all types of dental prostheses. it is applied to
5:40 pm
wet prostheses. protefix, german quality at an affordable price. why am i here i have sensitive teeth, eat ice cream, pain, cold air, pain, sweet. pain, the dentist diluted lakalot sensitive, which effectively reduces tooth sensitivity. if i had known lacalot sensitive earlier, i would not have had to come here at all. lacalot sensitive - reliable protection against pain. problem. joints restrict movement, it is unpleasant and painful. strengthen them with the help of long joints. these are bags with collagen and vitamin c for restoration of articular cartilage. dolgit joints contributes to the normal functioning of the joints and has a positive effect on bone health. dolgit joints facilitates motor functions. with dolgit joints move freely. ask at the pharmacies: good day pharmacy and one social pharmacy , dolgit joints bags with a 20% discount. there are discounts on hepargin of 10% in the psyllanyk, pam and oskad pharmacies. there are discounts on paracetamol darnytsia
5:41 pm
10% in pharmacies travel memory and savings. what to do when there is a liver? alohol, but what for bile? alohol, he and the liver and bile protects, alohol, with care and respect for the liver and bile. a separate set of unmanned aerial complexes sapsan of the state special service of transport appeals to the viewers of the espresso tv channel with a request to join the collection of funds for the crown and technical equipment for our unit. thank you! glory to ukraine! heroes! we continue our program war and weapons and... we understand that the confrontation with the enemy takes place on land, on water, in the air,
5:42 pm
although no less than hell battles with the enemy continue in cyberspace, although crossed people notice them only when it is already impossible not to notice. let's recall the situation when the enemy carried out cyber attacks on kyivstar and communication stopped working, but experts see many more signs of such a confrontation with the enemy. know more details about the dynamics and risks that are forming in cyberspace, and which are closely related to our war with the russian federation. therefore, my next interlocutor will be kostyantyn korsun, former head of the sbu unit for combating cybercrime, founder of the center response to emergency situations in the state intelligence service, now an expert in the field of cyber security. mr. konstantin, glad to see and welcome you to the espresso channel. greetings , i would still like to continue this topic related to
5:43 pm
kyivstar, because this attack took place there at the end of last year, then all over the country kyivstar subscribers lost their connection, users could not connect to operators and so on . it was later reported that the hacker group, which is a full-time unit of russian military intelligence, was behind this attack. but after every such attack, there are probably conclusions drawn from both sides, i would like to ask you what conclusions have been drawn, whether our public and private companies should have drawn such conclusions, whether such attacks can be expected to be repeated, and what are such unmasking signs preparing the enemy for such powerful cyber attacks against our country. well, how can you detect signs of such attacks only if you have built
5:44 pm
a serious cyber security system that constantly monitors everything, studies, checks for vulnerabilities , and so on, but even in the presence of such teams, you may not notice it, as it was , for example, in the case of kyivstar, where there is a really serious professional team, but again, it is not known what actually happened, whether it was inside the network or at the top at the level of the top management. companies or former shareholders placed their people, it is unknown, that is, no one shares and so on, but - the signs are, well, again, this is an unstable working system, as if everything is in order, but - you cannot perform some functions, well what a suspicious activity, well, again, without systems of detectors, sensors, without an intrusion detection system there , it is almost impossible to do this without... special tools , regarding the conclusions that should have been made,
5:45 pm
well, actually, look, in june 2017 , ukraine was attacked by norteya, and it was, well, just on orders of magnitude more large-scale, both in terms of impacts, and well, in terms of influence, and in terms of results, in terms of financial consequences, the attack than the attack on only one mobile operator, which in principle... in a day and a half began to restore services, here, but there are few main conclusions b to make many different ones companies, organizations, state and non-state even after... even in the summer of 2017, and mostly there it concerns state institutions that supposedly should take care of national cyber security, or rather the construction of a national cyber security system, which was obviously done, so everything remains as it is then, and before that there were powerful attacks, and prykarpattia-oblenergo, we had just such
5:46 pm
cyberattacks, which the whole world flocked to, well, to make sure that this is really the case, that this is not theoretical, but this... practical cases were studied them, and this is more than once, not twice, not three, not five, there were such cases, although there were precedents, unfortunately, at the moment, we do not have such a system of national cyber security, but they exist in we have many different cyber structures that seem to manage something there, manage something there, take crazy millions there and from the state budget for it. from western partners, in fact, well, it does not work yet, although in principle everyone has long known how to build such a system, but here one must abandon nepotism and in-laws brothers, appointed to positions, to be guided by professionalism, open competitions, transparent procedures and to be guided
5:47 pm
by professionalism, especially if we are talking about such a purely high-tech one. as for cyber security, here, you know, you need to be an expert, first of all, as i understand your answer, to summarize briefly, when we say that the military did not build fortifications, where are the fortifications, where are these concrete structures, then as i understand it, that even in the digital space, we still haven't built such fortifications, to put it briefly, well if it is greatly simplified, then yes, because we have each one'. this is a separate network , roughly speaking, and this is the combination of the exchange of information about incidents, these are those fortifications, that is, and it can be built this exchange of information only on mutual trust, but if the key participants of this exchange system are not professionals and trust them it is not possible to exchange accordingly, they
5:48 pm
will not be trusted and exchange essential data, such sensitive ones too. will not be, and this is very, if very simplified, this is the root problems and how do you assess our actions against the enemy in the field of cyber security, because there were at least two reports, the main intelligence agency there, it seems, said a month ago that they had carried out an attack on the tax system of the russian federation there, it was a report from gur. to be honest, i did not find a corresponding reaction in russian sources. then there was... the information that due to cyber operations it was possible to obtain a significant amount of documentation there on military equipment from a russian military enterprise, how do you think we are doing on the territory of the enemy in the cyber sphere, do we have success, or do we need to create some more improved mechanisms for influencing the enemy? and look, well, this
5:49 pm
cyber war is offensive, and offensive security, as it is called, that is, on... offensive security, cyber security, and it has been going on for a very long time, and cyber war, i believe, began there in may 2014, and its intensity bigger, then smaller, in fact, but it continues constantly, every day, few people notice it, from our side, well , we have strengths and weaknesses, and the russians, and we have this volunteering, it's a lot. of various decentralized organizations , teams, more precisely, not organizations, rather, but teams of volunteers, or semi-volunteers, or in some state, practically every force structure has some kind of unit for offensive cyber operations, but the problem here
5:50 pm
is that decentralization is good, because there is no single center, but the fact that there is no single center is also a weakness, because... the single center is designed to coordinate efforts, that is, it is necessary to somehow combine this model, and we have to combine decentralization with clear coordination, because very often there are cases when some groups interfere with the work of other groups, hit other people's targets, well, uncoordinated and the effect is not what it should be, and each of these groups is offensive, it has some achievements, but to... very often exaggerates sometimes, well, that is, they really reported about a powerful attack on the tax system, but the tax system did not really notice it and... the same with another, and there are cases when really serious achievements, they, well, not clearly enough, they communicate clearly there , and people simply do not know about them, although
5:51 pm
in fact they are very serious achievements, that is why we do not have a single center for coordination, decision-making, development of strategies , coordination of tactics, coordination of actions between different units, we have remained minutes, i have a number of questions, and i want us to discuss at least three questions clearly: first, the situation is related to the fact that the accounts of our media resources began to be actively hacked, there is ligant, ukrainian pravda, partially espresso, and there is information that was actually related to the fact that we allegedly unsuccessfully retreated from avdiyivka, these actions, they are carried out by whom from... the russian side and how can we defend ourselves if our media resources cannot defend themselves, to whom are they need help? well, the fact
5:52 pm
is that we have media resources - this, well, i think , is one of the key elements of the critical infrastructure, because through the media it is proven, well, some kind of public opinion is formed, and some important, critical, important news is proven, so the russians are always important the media is... one of the main goals along with the state body, along with the military and military objects, the media is also included in the top ten key goals, and here you have to rely on your own strength, because unfortunately, the state structures have little will help, although they can harm, but to develop their own cyber security, the media should have at least a few specialists who will deal with this. and you also need to learn, a very serious contribution, this is a cybergien for every employee, everyone, it doesn't matter who owns the media, whether it's the host
5:53 pm
of a rating show or an ordinary employee, an employee, an accountant, or i don't know, a manager, everyone who has access to internal resources must necessarily take some basic courses in cyber hygiene, which they will be told, the main... rules thanks to which, well, because, in principle, effective cyberattacks by the russians are based, after all, if you investigate and find out where it all started, it all starts with something banal, this is a short password, 1 2 3 4 5, this is the clicked link that came it is there in the messenger lack of a vpn connection or some other very simple banal primitive things , that's why the cybergenius of cyber education and simple education - of media workers is a simple, cheap, but very powerful tool, and because everything is based on this, in principle, and accordingly, specialists and staff training, those
5:54 pm
are the two key areas that should be focused on, i heard you, and one more question, how do you feel about the creation of this army plus app in action, that is, on the phone. for the military, where these will be documents, complaints, reports, it became known literally there, well, i saw this information the day before yesterday, how do you feel about such an initiative, are there positive sides, or are there rather more risks, what are your assessments of such proposals? the question is controversial and unclear, there is not enough information to give an assessment, because it depends very much on what kind of application it will be, with what functions, what data it will take, where it will be processed. how to convey, well, clear, but many technical details, as far as i know, are already used in the military several different applications, there for different
5:55 pm
tasks, let's say so, and there are quite a lot of them, ah , each of them has some specialized function, there are some there for drones, some there are for artillery, some there are for personnel, for air defense systems there, for internal reporting, for... reports, there are many different ones, that there is another army plus this application that has been announced, it is not entirely clear what it will be intended for, what functionality, first of all, the functionality must be determined already with the technical implementation , where how, how will the servers be deployed, what will be architecture, some technologies, how are they interrelated, or to what extent will it be possible for the enemy to get data or stop the operation of such an application? transfer malicious files there or spy and so on, that is , so far it is a declaration, on the basis of which it is extremely difficult to draw any
5:56 pm
conclusions, so i have no answers. to these questions, and we literally have 3 minutes , maybe even less, i think that the answer to your question, to this question of mine, which you will ask now, i think will still be a reason for our further conversation with you, i wanted would to find out and understand what is the essence , relatively speaking, of the situation when there are a number of these software solutions for the armed forces, there is a delta, there are nettles, but they are not adopted due to certain nuances in the relations between the state special forces and the ministry of defense, this is the impression , that the special communications service acts as a certain monopoly for the certification of those things that are developed for the military themselves and there is a certain misunderstanding between these two structures, is this really so, if so, then the main reference points of this confrontation, in the following programs, we will continue this topic with you.
5:57 pm
our guest is at the place, our connection was interrupted there , now we are restoring it, yes, i am here, that 's great, did you hear my question, should i repeat it, yes, no, i understood, we have a state telecommunications service, well, such a regulator, a monopoly on everything that allows or prohibits the use of various applications, including its effect on army systems, in this modern war, it... requires the rapid development of technologies, which absolutely inevitably involves the use of high-speed internet, cloud technologies, placement in cloud, real-time data exchange is very, very fast, without this we will not win, we simply will not win in any way, but the regulatory framework of derzhspecs-communications, it, sorry, stopped its development somewhere in the 90s, and it operates very outdated norms, guests
5:58 pm
and all that. and others, she tries to change there, but without success. plus, the structure is extremely corrupt, and we can see this from the arrest of the head and deputy head of the nabu state special forces on suspicion of embezzling funds for the construction of information systems, and how corruption is a corrupt structure, it also tries to influence the military systems, the army, the armed forces, the ministry of defense, and accordingly, well, they have little understanding of the value of these systems for... waging war, but they perfectly understand their interests in not letting will forbid, impose some restrictions there that slow down the system, well, that is , they do not understand, do not want to understand the importance of this for the armed forces, that is why law 1062 was adopted by the verkhovna rada, which can be placed, well, that is, this is not a revolution, but such a significant step forward precisely in development
5:59 pm
troops systems that will allow the military to determine information protection requirements and implement them themselves, and the price, thank you very much for these comments, we will definitely continue this topic with you, because it is an extremely important topic, and these nuances are important, we will discuss them in more detail we will talk in our next issues, i will remind our viewers that these general trends are related to cyber security, kostyantyn korsun, an expert in the field of cyber security, a person with considerable... professional experience in this field, explained to us, therefore, if we talk in short, in fact, despite technological developments, there are still a number of bureaucratic procedures and complications that do not allow us to realize the potential of our companies in the most effective way, we need to do something about it, speed it up and make truly progressive decisions, i really hope that such conclusions will be made by our bodies of executive political power, stay tuned to
6:00 pm
the channel. there will be a lot of interesting information in different components. there is one step left before the accident, they say the situation in zas captured by the muscovites, wolves protecting the state border and yar times, the next goal of the russians, what is happening in the bakhmut direction? greetings viewers of espresso, the analyst and the news team talk about the most important things for today in the final issue. a 47-year-old woman was injured by the russians, according to information from the kherson regional office.

18 Views

info Stream Only

Uploaded by TV Archive on