Skip to main content

tv   [untitled]    February 24, 2024 6:30am-7:01am EET

6:30 am
aerial reconnaissance, he says, i am about 5% contracted for this year, why is everything so delayed already almost march, this is, well, this is a problem, so it is necessary to contract such companies that are ready, we have our drones on staples, are ready and who can, who can now deliver, well , we can actually see that it is already the second month of this 24th year, and we are again walking on the rakes that are still left from... than these startup companies that have appeared last year in large numbers, some completely illogical situation, and one more thing the question is of a technical plan, we literally have two minutes, is it true that there is already a problem, that many of these different fpv drones create a shortage problem.
6:31 am
frequency resource, when, relatively speaking , a certain amount is supplied, and there is simply not enough bandwidth to effectively ensure the combat mission of these fpv drones, is there such a problem, or is it far -fetched, no, it is not far-fetched, so i and said above that we are also moving to other frequency ranges, changing the frequency in... we just had a conversation with valery barovykom, now let's continue, we seem to have a connection, yes, yes, yes, yes, yes, it was interrupted, i just got a call from the reb, so, in fact, it's me, it's a problem, and really from - for the use of such chaotic, sometimes uncoordinated, therefore, the activity of the rebbe, in which. some units
6:32 am
took a volunteer there somewhere in bukovel or notu , which means that they do not systematically include her, they only protect themselves, but at the same time the drones of other other units are falling, i, for example, how many weeks ago or i was with a magyar for a year and a half, we met in kherson region, kherson region is no less terrible now than shelling, than in bakhmut avdiivtsi, it is clear that there... a head-on collision, but kherson region is also hit hard, the same story, as it was there four months ago, when we went on strikes, when the tile was blown up, yes, that is, there is no coordination as constant as the means of the rep, and sometimes, and sometimes from units and pilots who launch drones, it consists, here where, for example, unconscious units and
6:33 am
unconscious managers, therefore, are kept a plot, there, for example, as in kherson oblast in morpykhiv, there a magyar holds, there, in another there a square holds there and so on, that is, where there are conscious people who coordinate and were able to coordinate, then there the work is more or less clear , including in the launches of drones, and in the rebovo complexes. the work of the rebov synchronization complexes, and where, relatively speaking, there is no such coordination, there are constant losses, losses of their own drones that do not fly, which means that they are paid off by their own lots, and also this problem with the pure range, of course, because that there is no complete set now, but there must be a different type of production that will provide it. work on other, other, other
6:34 am
frequency ranges, in this regard we also work with western partners, we work, and i know that our colleagues are also working, well, we will see, mr. valery, thank you very much for such important comments, i think , that we will distribute them through defens, because, well, the lack of a contracting kit is, well, in my opinion, this is a significant serious problem of the current stage, in fact, thanks for being on our air, i will remind you that it was valeriy. borovyk, commander of the white eagle special unit of strike drones. and then we will talk about the fact that the confrontation with the enemy takes place not only in the air, but also in cyberspace. there are also many complexities, many nuances that only specialists can explain to us, but we will talk about this in more detail after the advertising information block. there are discounts on... acc lon 15% in podorozhnyk pharmacies for you and
6:35 am
savings. there are discounts on psyk - 10% in psyllium fam and oskad pharmacies. every week, maria gurska meets with the head of the committee on foreign affairs of the polish diet pavel koval, the commissioner of the government of poland for the restoration of ukraine. as always, we talk about the most important things that happened this week in poland, ukraine, and europe. what they say about ukraine in the eu, how we should perceive the statements of european politicians and what our accession to the eu will look like, in the project about politics about the world with maria gurska. every sunday at 15:30 with a repeat at 220. in collaboration with se. an unusual look at the news. good health, ladies and gentlemen, my name is mykola veresen. sharp presentation of facts and competent opinions. and in america they also say let's have better roads , we will have even better ones. a special look at the events in ukraine, there will be some katsaps on the border of kyiv
6:36 am
and beyond. what kind of world does mr. norman dream of, we can imagine it. all this in an informational marathon with mykola veresny. saturday 17:10, sunday. 17:15 at espresso. vasyl zima's big broadcast. this is the big ether, my name is vasyl zima, and we are starting two hours of air time, two hours of your time. we will discuss many important topics today. two hours to learn about the war now is the time to talk more about the war. serhii zgurets is with us, and what is the world like? and now , yuriy fizar, yuriy dobrovecher, will speak in more detail about what happened in the world. two hours to keep up with economic news. time to talk about money in wartime. two hours in the company of favorite presenters. thank you very much to the chechen line for the information about culture news. presenters who have become like relatives to many. natalka didenko is ready to tell us about the weather for the coming day. and also distinguished guests of the studio.
6:37 am
andriy parubiy, people's deputy of ukraine, was also the chairman of the verkhovna rada of ukraine. events of the day in two hours. vasyl zima's big broadcast, a project for smart and caring people. espresso in the evening. we continue our "war and weapons" program. and we understand that the confrontation with the enemy takes place on the ground, on the water, in the air, although no less fierce battles with the enemy continue in cyberspace, although the crossed people notice them only when it is already impossible not to notice. let's recall the situation when the enemy carried out cyber attacks on kyivstar and the connection stopped working. vata, but experts see many more signs of such a confrontation with the enemy, know more details about the dynamics and risks that are forming in cyberspace, and which are closely related to our war with the russian federation. therefore, my next interlocutor
6:38 am
will be kostyantyn korsun, the former head of the sbu unit for combating cybercrime, the founder of the emergency response center at the state security service. communication is now an expert in the field of cyber security. mr. konstantin, glad to see and welcome you to espresso channels. congratulations. i would still like to continue this topic related to kyivstar, because this attack took place there at the end of last year. then all over the country kyivstar subscribers lost their connection, users could not connect to operators and so on. it was later reported that... behind this attack is a hacking group that is a full-time unit of russian military intelligence, but after every attack like this, there are probably conclusions drawn from both sides, i would like to ask you what conclusions were drawn, or should
6:39 am
do our state and private companies, have they made such conclusions, can we expect a repetition of such attacks and what are such unmasking signs of the enemy's preparation? to such powerful cyber measures against our country? well, how can you detect signs of such attacks only if you have built a serious cyber security system that constantly monitors everything, studies it, checks for vulnerabilities, and so on, but even with the presence of such a team, you may not notice it, as was the case, for example, in the case of kyivstar , where indeed a serious professional team, but... again, it is not known what actually happened, whether it was inside the network, or at the top, at the level of some management of the company, or former shareholders put their people in, it is not known, that is, no one shares and so on , but - signs of ee, well, again, this is an unstable
6:40 am
working system, it seems, when everything is in order, but - you cannot perform some functions, well, what a suspicious activity, well , again, no system. detectors, sensors, without an intrusion detection system, it is practical to do it without special tools it is impossible, regarding the conclusions that... should have been made, well, actually, look, in june 2017, ukraine was attacked by nato, and it was simply orders of magnitude larger, both in terms of impacts, and well, in terms of influence, and in terms of results, the financial consequences of an attack than an attack on only one mobile operator, which in principle began to restore services in a day and a half, here are the main conclusions... many different companies, state and non-state organizations should have made them
6:41 am
even after, in the summer of 2017 of the year, and mostly there it concerns state institutions, who were supposedly supposed to take care of national cyber security, or rather the construction of a national cyber security system, which was obviously not done, so everything remains as it was then, and before that there were powerful attacks, and prikarpattia-oblenerga, we had just such... attacks, on which the whole world flocked to make sure that this is really the case, that this is not a theory, but that these are practical cases and they were studied, and this was not once, not twice, not three, not five, there were such cases, although there there were precedents with kyivstar, so, unfortunately, this is how we are at the moment such a system of national cyber security does not exist, but we have many different cyber structures that seem to control something. something is being managed there, they are taking mad millions for it both from the state budget and from
6:42 am
western partners, in fact, well, it is not working yet, although in principle everyone has long known how to build such a system, but here one must abandon nepotism and brother-in-laws appointed to positions, be guided by professionalism, open competitions, transparent procedures, and be guided by professionalism, especially when it comes to just about such a purely high-tech industry as cyber security, here you know, you need to be a specialist, first of all, as i understand your answer, to summarize briefly, when we say that the military did not build fortifications, where are the fortifications, where are these concrete structures , then as i understand it, we still haven't built such fortifications in the digital space, to put it briefly. to say , well, if it's very oversimplified, yes, because we have, well, each organization is
6:43 am
a separate network, roughly speaking, yes, and here 's a combination of sharing information about incidents, it bites with those fortifications, that is, and this exchange of information can only be built on mutual trust, but if the key participants of this exchange system are not professionals and cannot be trusted, then exchange accordingly... they will not be trusted and exchange essential data they will not be so sensitive either, and this is very, if very simplified, that is the root of the problem. and how do you assess our actions against the enemy in the field of cyber security, because there were at least two reports, the main intelligence agency, it seems a month ago, talked about the fact that they carried out an attack on the tax system of the russian federation there, it was a message. i, however, did not find a corresponding reaction in russian sources,
6:44 am
then there was information that due to cyber operations it was possible to obtain a significant amount of documentation there on military equipment from a russian military enterprise, according to your estimates, we are operating on the territory of the enemy in the cyber sphere, or do we have success, or do we need to create some more improvements in the mechanism of influence on the enemy? look at this cyber war offensive security, as it is called, that is, offensive security, cyber security, and it has been going on for a very long time, and i consider the cyber war to have started there in may 2014, and its intensity is sometimes greater, sometimes less, in fact, but it continues constantly, every day, few people notice it, from our side, well, there are strengths and weaknesses. parties from both ours and the russians, and ours is volunteering,
6:45 am
it is a multitude of different decentralized organizations, teams, or rather, not organizations rather, but teams of volunteers, or semi-volunteers, or in some state, virtually every force has some sort of unit for offensive cyber operations, but the problem here is... decentralization is good because there is no single center, but the fact that there is no single center is also a weakness, because the single center is meant to coordinate efforts , that is, it is necessary to somehow combine this model and... we have to combine decentralization with clear coordination, because very often there are cases when some groups interfere with the work of other groups, hit on other people's goals, well , uncoordinated, the effect is not such, which should be, and each of these offensive groups, they have some achievements, but
6:46 am
they very often exaggerate sometimes, well , that is, they really reported about ... a powerful attack on the tax system, but the tax system did not really notice it, actually, yes only with others, but there are cases when really serious achievements, they are not clearly enough , clearly communicated there, and people simply do not know about them, although in fact they are very serious achievements, that is why we do not have a single center of coordination, acceptance solutions development of strategies. coordination of tactics , coordination of actions between different people, we have 7 minutes left, i have a number of questions, and i want us to talk about at least three issues clearly: first, the situation is related to the fact that the accounts of our media resources, there is ligant, ukrainian truth, partially
6:47 am
espresso, and there is information that was actually there. is related to the fact that we apparently unsuccessfully retreated from avdiivka there, these actions, they are carried out by whom on the russian side, and how can we defend ourselves if our resources the media can't defend themselves, who should they turn to for help? well, the fact is that we have media resources - this is, well, i think one of the key elements of the critical infrastructure, because through the media it is proven, well, some public opinion is formed, and... some important, critical, important news is proven, so the russians are always important the media is one of the main goals, along with the state body, along with the military and military objects, the media is also included in the top ten key goals, and here you have to rely on your own strength, because on unfortunately, state structures will not help much
6:48 am
, although they can harm , but to develop yourself... security, the media should have at least a few specialists, specialized, who will deal with this, and you also need to study, a very serious contribution, this is cyber genius for every employee, everyone who has access to the media, it doesn't matter if it's the host of a rating show or an ordinary employee, an employee, an accountant, or i don't know, a manager, everyone who has access to internal information. resources must take some basic courses in cyber science, for which they will tell you the basic rules thanks to which , well, because in principle the russians’ cyberattacks are effective, they are still based, but if you investigate and find out where it all started, then everything starts with something banal, this is a short password 1 2 3 4 5, it's
6:49 am
on the clicked link that came in the messenger, it's the lack of a vpn connection or something else, well , some are very simple. banal primitive things, that's why cyber science, cyber education and just education among media workers is a simple, cheap, but very powerful tool, and because on everything is based on this principle, and accordingly specialists and personnel training, here are two key areas on which we should focus, we heard you, and one more question, how do you feel about... the fact that this application army plus in action will be created , that is, in the phone for the military, where these documents, complaints, reports will be, it became known literally there, well, i saw this information the day before yesterday, how do you feel about such an initiative, are there positive sides here, or are there rather more risks that your evaluations
6:50 am
of such proposals? the question is controversial and it is unclear, there is not enough information to give... an assessment, because it depends a lot on what kind of application it will be, with what functions, what data it will take, where it will be processed, how it will be transmitted, well, there are many technical details that are clear, how much i know that the military already uses several different applications for different tasks, let's say, and there are quite a lot of them, and each of them has a specialized function, there are some... drones, some are for artillery, some are for personnel , for bch, there, for internal reporting, for reports, them many different, which is another plus army. the announced application , it is not entirely clear what it will be intended for , what functionality, first of all, the functionality should be determined already with the technical
6:51 am
implementation, where, how the servers will be deployed, what the architecture will be , what technologies, how they are interconnected communication, whether it will be possible to obtain data from the enemy, whether to stop the operation of such an application, whether to transfer malicious files there, whether to spy and so on, that is, until... this is a declaration on the basis of which it is extremely difficult to make any conclusions, so i have no answers to these questions. and we literally have 3 minutes, maybe even less, i think that the answer to your question, to this question of mine, which you will ask now, i think will still be a reason for our further conversation with you, i would like to know and understand , what is the essence, relatively speaking, of the situation when there are a number of these software solutions for the armed forces, there is a delta, there are nettles, but they... are not adopted due to certain nuances in the relations between the state special forces and the ministry of defense, this is the impression , that the state intelligence service acts as a certain monopolist for the certification
6:52 am
of those things that are developed for the military themselves, and there is a certain misunderstanding between these two structures, is this really so, if so, then the main reference points of this confrontation, we will continue this topic with you in the following programs. at the most interesting place, our guest lost connection there, now we are restoring it, so i'm great here, did you hear it, does he have a question, should i repeat it? yes, no, i understood, we have a state communications specialist , well, such a regulator, a monopoly on everything that allows or prohibits the use of various applications, including his. the action spread to army systems , this is modern war, it requires rapid development of technologies, which absolutely continuously
6:53 am
involves the use of high-speed internet, cloud technologies, hosting in the cloud, real-time data exchange very, very quickly, without this we will not win, then we simply won't win in any way, but the regulatory framework of the state special communications, i'm sorry, it stopped... development somewhere in the 90s, and it operates with very outdated norms, guests, and everything else, it's there is trying to change, but unsuccessfully, plus the structure is extremely corrupt, and we can see this from the arrest of the head and deputy head of the state intelligence agency on suspicion of embezzling funds for the construction of information systems, and as corruption is a corrupt structure, it also tries to influence the military systems, on the army, on the armed forces, on... the ministry of defense, and accordingly, well, they have little understanding of the value of these systems for waging war, but they perfectly understand their interests in not
6:54 am
allowing, forbidding to impose any restrictions, which slow down the system , well, that is, they do not understand, do not want to understand the importance of this for the armed forces, that is why the law 1062 was adopted by the verkhovna rada, which can be... placed, well, that is, this is not a revolution, but such a significant step forward in the development of the military systems, ah, which will allow the military to determine the information protection requirements themselves and implement them themselves, and this is mr. kosantin, thank you very much for these comments, we will continue this topic with you for sure, because it is an extremely important topic, and these nuances are important , we will talk about them in more detail in our next issues, i will remind our viewers that these general trends... are related to cyber security, kostyantyn korsun, an expert in the field of cyber security, a person with significant professional experience in this field, explained to us. so, to speak briefly, in fact,
6:55 am
despite the technological developments, there are still a number of bureaucratic procedures and complications that do not allow us to realize the potential of our companies in the most effective way. we need to do something about it, speed it up and make truly progressive decisions. i hope so that such conclusions will be made by our bodies of executive political power, stay tuned to the spresso channel, there will be a lot of interesting information in various components. 12-year-old andriy babich and svyatoslav volchasty and 14-year-old... anatoliy lyashenko. all these boys disappeared in the temporarily occupied territories of the kherson region. and where they are now, no one knows. so i really hope for your
6:56 am
help. of course we are. i am addressing the residents of the temporarily occupied territories of the kherson region. i know that you do not currently broadcast ukrainian tv channels, but i hope that maybe you are watching this program on social networks, so i really ask you to look closely at the faces of the children. andrii babich will turn 13 this summer. the boy is thin, has dark blond hair and cariochi. he was last seen in the kherson region, in the skadovsky district, in the village of novazbruivka. about a year ago. svyatoslav volchasty looks 12 years old. he is of medium build and has blond hair. disappeared in the territory of heniche district of kherson region, which was occupied almost from the first days of the war. and this is anatoly lyashenko. him in december turned 14 last year. the boy is thin, has dark hair and brown eyes. looks maybe a little older than his age. tolya was last seen in the village of baltazarivka, this is
6:57 am
the chaplin district of kherson. which was also occupied almost at the beginning of the full-scale war. if suddenly someone has information about the possible whereabouts of andriy, svyatoslav or anatoly, or maybe just saw these guys somewhere, let us know right away. even a small piece of news can become very important. magnolia children's tracing service you can call at any time of the day by dialing the short number 1163. calls from all ukrainian mobile operators. free of charge, if suddenly you are in the temporarily occupied territory and cannot make a call, write to the chatbot of the child search service in telegram, or look for us on facebook. i told you the stories of just three children who disappeared due to a full-scale russian invasion. in general, since the beginning of the war, we have already received several thousand appeals for help in the search. of course, the vast majority of children were found even now with
6:58 am
they are all right, unfortunately, for many it still remains unknown, and everyone can help find them. believe me, just a minute of your time can be decisive. go to the website of the magnolia children's search service in the missing children of ukraine section. here you can view all the photos of the missing. perhaps you will recognize someone and eventually help find them. at the same time , children are also disappearing in territories controlled by ukraine. as the experience of the service shows. search for magnolia children, the vast majority of them are teenagers. we talked about this topic with psychologist and collected a lot of advice for parents that can prevent a child from suddenly running away from home. one of them is the importance of being interested in the child's interests. take an interest in your child's interests, invite his friends to visit, even if it will be very noisy, even if there will be a terrible debacle in the house afterwards, it is still useful, it is
6:59 am
still good. why? because firstly, the child will be in front of you, he will be next to you, secondly, you will know what he is interested in, who he communicates with, who to turn to in case of what, thirdly, you will be able just share the interest and get pleasure, because sometimes what your children are interested in can be genuinely interesting for you too. and lastly, even if it is not your child who needs help, but one of his friends, maybe because you will be the only adult who can provide this help, and maybe you... will save someone from fatal decisions. we have created a resource through which you can report any crime against a child. in any place, at any time. just go to the site and let us know, and we'll get it up and running all possible mechanisms for punishing the criminal. stopcrime.ua.
7:00 am
greetings, it's news time on the spresso tv channel, kateryna shiropoyas works in the studio. during the great war, on february 24, 2022, at around four in the morning, kremlin dictator vladimir putin announced the beginning of the so-called special military operation in ukraine, actually a war. for the first time, ukrainian cities woke up to the explosions of russian rockets, convoys of armored vehicles openly drove into the territory of ukraine. the invaders invaded the vicinity of kharkiv, kherson, chernihiv and sumy, entered from the territory of the russian federation, belarus and
7:01 am
occupied crimea. kyiv declared martial law and

8 Views

info Stream Only

Uploaded by TV Archive on